diff options
| author | ryker <> | 1998-10-05 20:13:14 +0000 |
|---|---|---|
| committer | ryker <> | 1998-10-05 20:13:14 +0000 |
| commit | fe5d0717e2760d02faf23bf5a714f17b33ae4abb (patch) | |
| tree | 8d4ad346f10a36bdd90b503d222bda6b4ecd0037 /src/lib/libcrypto/sha | |
| parent | 75bf5ead4149b2b67781def7ace1ec720ae1753e (diff) | |
| parent | aeeae06a79815dc190061534d47236cec09f9e32 (diff) | |
| download | openbsd-fe5d0717e2760d02faf23bf5a714f17b33ae4abb.tar.gz openbsd-fe5d0717e2760d02faf23bf5a714f17b33ae4abb.tar.bz2 openbsd-fe5d0717e2760d02faf23bf5a714f17b33ae4abb.zip | |
This commit was generated by cvs2git to track changes on a CVS vendor
branch.
Diffstat (limited to 'src/lib/libcrypto/sha')
| -rw-r--r-- | src/lib/libcrypto/sha/asm/sha1-586.pl | 491 | ||||
| -rw-r--r-- | src/lib/libcrypto/sha/sha.h | 109 | ||||
| -rw-r--r-- | src/lib/libcrypto/sha/sha1_one.c | 77 | ||||
| -rw-r--r-- | src/lib/libcrypto/sha/sha1dgst.c | 468 | ||||
| -rw-r--r-- | src/lib/libcrypto/sha/sha_locl.h | 246 |
5 files changed, 1391 insertions, 0 deletions
diff --git a/src/lib/libcrypto/sha/asm/sha1-586.pl b/src/lib/libcrypto/sha/asm/sha1-586.pl new file mode 100644 index 0000000000..d6d998f8ee --- /dev/null +++ b/src/lib/libcrypto/sha/asm/sha1-586.pl | |||
| @@ -0,0 +1,491 @@ | |||
| 1 | #!/usr/bin/perl | ||
| 2 | |||
| 3 | $normal=0; | ||
| 4 | |||
| 5 | push(@INC,"perlasm","../../perlasm"); | ||
| 6 | require "x86asm.pl"; | ||
| 7 | |||
| 8 | &asm_init($ARGV[0],"sha1-586.pl"); | ||
| 9 | |||
| 10 | $A="eax"; | ||
| 11 | $B="ebx"; | ||
| 12 | $C="ecx"; | ||
| 13 | $D="edx"; | ||
| 14 | $E="edi"; | ||
| 15 | $T="esi"; | ||
| 16 | $tmp1="ebp"; | ||
| 17 | |||
| 18 | $off=9*4; | ||
| 19 | |||
| 20 | @K=(0x5a827999,0x6ed9eba1,0x8f1bbcdc,0xca62c1d6); | ||
| 21 | |||
| 22 | &sha1_block("sha1_block_x86"); | ||
| 23 | |||
| 24 | &asm_finish(); | ||
| 25 | |||
| 26 | sub Nn | ||
| 27 | { | ||
| 28 | local($p)=@_; | ||
| 29 | local(%n)=($A,$T,$B,$A,$C,$B,$D,$C,$E,$D,$T,$E); | ||
| 30 | return($n{$p}); | ||
| 31 | } | ||
| 32 | |||
| 33 | sub Np | ||
| 34 | { | ||
| 35 | local($p)=@_; | ||
| 36 | local(%n)=($A,$T,$B,$A,$C,$B,$D,$C,$E,$D,$T,$E); | ||
| 37 | local(%n)=($A,$B,$B,$C,$C,$D,$D,$E,$E,$T,$T,$A); | ||
| 38 | return($n{$p}); | ||
| 39 | } | ||
| 40 | |||
| 41 | sub Na | ||
| 42 | { | ||
| 43 | local($n)=@_; | ||
| 44 | return( (($n )&0x0f), | ||
| 45 | (($n+ 2)&0x0f), | ||
| 46 | (($n+ 8)&0x0f), | ||
| 47 | (($n+13)&0x0f), | ||
| 48 | (($n+ 1)&0x0f)); | ||
| 49 | } | ||
| 50 | |||
| 51 | sub X_expand | ||
| 52 | { | ||
| 53 | local($in)=@_; | ||
| 54 | |||
| 55 | &comment("First, load the words onto the stack in network byte order"); | ||
| 56 | for ($i=0; $i<16; $i++) | ||
| 57 | { | ||
| 58 | &mov("eax",&DWP(($i+0)*4,$in,"",0)) unless $i == 0; | ||
| 59 | &bswap("eax"); | ||
| 60 | &mov(&swtmp($i+0),"eax"); | ||
| 61 | } | ||
| 62 | |||
| 63 | &comment("We now have the X array on the stack"); | ||
| 64 | &comment("starting at sp-4"); | ||
| 65 | } | ||
| 66 | |||
| 67 | # Rules of engagement | ||
| 68 | # F is always trashable at the start, the running total. | ||
| 69 | # E becomes the next F so it can be trashed after it has been 'accumulated' | ||
| 70 | # F becomes A in the next round. We don't need to access it much. | ||
| 71 | # During the X update part, the result ends up in $X[$n0]. | ||
| 72 | |||
| 73 | sub BODY_00_15 | ||
| 74 | { | ||
| 75 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
| 76 | |||
| 77 | return if $n & 1; | ||
| 78 | &comment("00_15 $n"); | ||
| 79 | |||
| 80 | &mov($f,$c); | ||
| 81 | |||
| 82 | &mov($tmp1,$a); | ||
| 83 | &xor($f,$d); # F2 | ||
| 84 | |||
| 85 | &rotl($tmp1,5); # A2 | ||
| 86 | |||
| 87 | &and($f,$b); # F3 | ||
| 88 | &add($tmp1,$e); | ||
| 89 | |||
| 90 | &rotr($b,1); # B1 <- F | ||
| 91 | &mov($e,&swtmp($n)); # G1 | ||
| 92 | |||
| 93 | &rotr($b,1); # B1 <- F | ||
| 94 | &xor($f,$d); # F4 | ||
| 95 | |||
| 96 | &lea($tmp1,&DWP($K,$tmp1,$e,1)); | ||
| 97 | |||
| 98 | ############################ | ||
| 99 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
| 100 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
| 101 | $n++; | ||
| 102 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 103 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
| 104 | |||
| 105 | &mov($f,$c); | ||
| 106 | |||
| 107 | &add($a,$tmp1); # MOVED DOWN | ||
| 108 | &xor($f,$d); # F2 | ||
| 109 | |||
| 110 | &mov($tmp1,$a); | ||
| 111 | &and($f,$b); # F3 | ||
| 112 | |||
| 113 | &rotl($tmp1,5); # A2 | ||
| 114 | |||
| 115 | &add($tmp1,$e); | ||
| 116 | &mov($e,&swtmp($n)); # G1 | ||
| 117 | |||
| 118 | &rotr($b,1); # B1 <- F | ||
| 119 | &xor($f,$d); # F4 | ||
| 120 | |||
| 121 | &rotr($b,1); # B1 <- F | ||
| 122 | &lea($tmp1,&DWP($K,$tmp1,$e,1)); | ||
| 123 | |||
| 124 | &add($f,$tmp1); | ||
| 125 | } | ||
| 126 | |||
| 127 | sub BODY_16_19 | ||
| 128 | { | ||
| 129 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
| 130 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 131 | |||
| 132 | return if $n & 1; | ||
| 133 | &comment("16_19 $n"); | ||
| 134 | |||
| 135 | &nop() if ($pos < 0); | ||
| 136 | &mov($tmp1,&swtmp($n0)); # X1 | ||
| 137 | &mov($f,&swtmp($n1)); # X2 | ||
| 138 | &xor($f,$tmp1); # X3 | ||
| 139 | &mov($tmp1,&swtmp($n2)); # X4 | ||
| 140 | &xor($f,$tmp1); # X5 | ||
| 141 | &mov($tmp1,&swtmp($n3)); # X6 | ||
| 142 | &xor($f,$tmp1); # X7 - slot | ||
| 143 | &mov($tmp1,$c); # F1 | ||
| 144 | &rotl($f,1); # X8 - slot | ||
| 145 | &xor($tmp1,$d); # F2 | ||
| 146 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
| 147 | &and($tmp1,$b); # F3 | ||
| 148 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
| 149 | &xor($tmp1,$d); # F4 | ||
| 150 | &mov($e,$a); # A1 | ||
| 151 | &add($f,$tmp1); # tot+=F(); | ||
| 152 | |||
| 153 | &rotl($e,5); # A2 | ||
| 154 | |||
| 155 | &rotr($b,1); # B1 <- F | ||
| 156 | &add($f,$e); # tot+=a | ||
| 157 | |||
| 158 | ############################ | ||
| 159 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
| 160 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
| 161 | $n++; | ||
| 162 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 163 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
| 164 | |||
| 165 | |||
| 166 | &mov($f,&swtmp($n0)); # X1 | ||
| 167 | &mov($tmp1,&swtmp($n1)); # X2 | ||
| 168 | &xor($f,$tmp1); # X3 | ||
| 169 | &mov($tmp1,&swtmp($n2)); # X4 | ||
| 170 | &xor($f,$tmp1); # X5 | ||
| 171 | &mov($tmp1,&swtmp($n3)); # X6 | ||
| 172 | &rotr($c,1); #&rotr($b,1); # B1 <- F # MOVED DOWN | ||
| 173 | &xor($f,$tmp1); # X7 - slot | ||
| 174 | &rotl($f,1); # X8 - slot | ||
| 175 | &mov($tmp1,$c); # F1 | ||
| 176 | &xor($tmp1,$d); # F2 | ||
| 177 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
| 178 | &and($tmp1,$b); # F3 | ||
| 179 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
| 180 | |||
| 181 | &xor($tmp1,$d); # F4 | ||
| 182 | &mov($e,$a); # A1 | ||
| 183 | |||
| 184 | &rotl($e,5); # A2 | ||
| 185 | |||
| 186 | &rotr($b,1); # B1 <- F | ||
| 187 | &add($f,$e); # tot+=a | ||
| 188 | |||
| 189 | &rotr($b,1); # B1 <- F | ||
| 190 | &add($f,$tmp1); # tot+=F(); | ||
| 191 | |||
| 192 | } | ||
| 193 | |||
| 194 | sub BODY_20_39 | ||
| 195 | { | ||
| 196 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
| 197 | |||
| 198 | &comment("20_39 $n"); | ||
| 199 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 200 | |||
| 201 | &mov($f,&swtmp($n0)); # X1 | ||
| 202 | &mov($tmp1,&swtmp($n1)); # X2 | ||
| 203 | &xor($f,$tmp1); # X3 | ||
| 204 | &mov($tmp1,&swtmp($n2)); # X4 | ||
| 205 | &xor($f,$tmp1); # X5 | ||
| 206 | &mov($tmp1,&swtmp($n3)); # X6 | ||
| 207 | &xor($f,$tmp1); # X7 - slot | ||
| 208 | &mov($tmp1,$b); # F1 | ||
| 209 | &rotl($f,1); # X8 - slot | ||
| 210 | &xor($tmp1,$c); # F2 | ||
| 211 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
| 212 | &xor($tmp1,$d); # F3 | ||
| 213 | |||
| 214 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
| 215 | &mov($e,$a); # A1 | ||
| 216 | |||
| 217 | &rotl($e,5); # A2 | ||
| 218 | |||
| 219 | if ($n != 79) # last loop | ||
| 220 | { | ||
| 221 | &rotr($b,1); # B1 <- F | ||
| 222 | &add($e,$tmp1); # tmp1=F()+a | ||
| 223 | |||
| 224 | &rotr($b,1); # B2 <- F | ||
| 225 | &add($f,$e); # tot+=tmp1; | ||
| 226 | } | ||
| 227 | else | ||
| 228 | { | ||
| 229 | &add($e,$tmp1); # tmp1=F()+a | ||
| 230 | &mov($tmp1,&wparam(0)); | ||
| 231 | |||
| 232 | &rotr($b,1); # B1 <- F | ||
| 233 | &add($f,$e); # tot+=tmp1; | ||
| 234 | |||
| 235 | &rotr($b,1); # B2 <- F | ||
| 236 | } | ||
| 237 | } | ||
| 238 | |||
| 239 | sub BODY_40_59 | ||
| 240 | { | ||
| 241 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
| 242 | |||
| 243 | &comment("40_59 $n"); | ||
| 244 | return if $n & 1; | ||
| 245 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 246 | |||
| 247 | &mov($f,&swtmp($n0)); # X1 | ||
| 248 | &mov($tmp1,&swtmp($n1)); # X2 | ||
| 249 | &xor($f,$tmp1); # X3 | ||
| 250 | &mov($tmp1,&swtmp($n2)); # X4 | ||
| 251 | &xor($f,$tmp1); # X5 | ||
| 252 | &mov($tmp1,&swtmp($n3)); # X6 | ||
| 253 | &xor($f,$tmp1); # X7 - slot | ||
| 254 | &mov($tmp1,$b); # F1 | ||
| 255 | &rotl($f,1); # X8 - slot | ||
| 256 | &or($tmp1,$c); # F2 | ||
| 257 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
| 258 | &and($tmp1,$d); # F3 | ||
| 259 | |||
| 260 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
| 261 | &mov($e,$b); # F4 | ||
| 262 | |||
| 263 | &rotr($b,1); # B1 <- F | ||
| 264 | &and($e,$c); # F5 | ||
| 265 | |||
| 266 | &or($tmp1,$e); # F6 | ||
| 267 | &mov($e,$a); # A1 | ||
| 268 | |||
| 269 | &rotl($e,5); # A2 | ||
| 270 | |||
| 271 | &add($tmp1,$e); # tmp1=F()+a | ||
| 272 | |||
| 273 | ############################ | ||
| 274 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
| 275 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
| 276 | $n++; | ||
| 277 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
| 278 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
| 279 | |||
| 280 | &mov($f,&swtmp($n0)); # X1 | ||
| 281 | &add($a,$tmp1); # tot+=tmp1; # moved was add f,tmp1 | ||
| 282 | &mov($tmp1,&swtmp($n1)); # X2 | ||
| 283 | &xor($f,$tmp1); # X3 | ||
| 284 | &mov($tmp1,&swtmp($n2)); # X4 | ||
| 285 | &xor($f,$tmp1); # X5 | ||
| 286 | &mov($tmp1,&swtmp($n3)); # X6 | ||
| 287 | &rotr($c,1); # B2 <- F # moved was rotr b,1 | ||
| 288 | &xor($f,$tmp1); # X7 - slot | ||
| 289 | &rotl($f,1); # X8 - slot | ||
| 290 | &mov($tmp1,$b); # F1 | ||
| 291 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
| 292 | &or($tmp1,$c); # F2 | ||
| 293 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
| 294 | &mov($e,$b); # F4 | ||
| 295 | &and($tmp1,$d); # F3 | ||
| 296 | &and($e,$c); # F5 | ||
| 297 | |||
| 298 | &or($tmp1,$e); # F6 | ||
| 299 | &mov($e,$a); # A1 | ||
| 300 | |||
| 301 | &rotl($e,5); # A2 | ||
| 302 | |||
| 303 | &rotr($b,1); # B1 <- F | ||
| 304 | &add($tmp1,$e); # tmp1=F()+a | ||
| 305 | |||
| 306 | &rotr($b,1); # B2 <- F | ||
| 307 | &add($f,$tmp1); # tot+=tmp1; | ||
| 308 | } | ||
| 309 | |||
| 310 | sub BODY_60_79 | ||
| 311 | { | ||
| 312 | &BODY_20_39(@_); | ||
| 313 | } | ||
| 314 | |||
| 315 | sub sha1_block | ||
| 316 | { | ||
| 317 | local($name)=@_; | ||
| 318 | |||
| 319 | &function_begin_B($name,""); | ||
| 320 | |||
| 321 | # parameter 1 is the MD5_CTX structure. | ||
| 322 | # A 0 | ||
| 323 | # B 4 | ||
| 324 | # C 8 | ||
| 325 | # D 12 | ||
| 326 | # E 16 | ||
| 327 | |||
| 328 | &push("esi"); | ||
| 329 | &push("ebp"); | ||
| 330 | &mov("eax", &wparam(2)); | ||
| 331 | &mov("esi", &wparam(1)); | ||
| 332 | &add("eax", "esi"); # offset to leave on | ||
| 333 | &mov("ebp", &wparam(0)); | ||
| 334 | &push("ebx"); | ||
| 335 | &sub("eax", 64); | ||
| 336 | &push("edi"); | ||
| 337 | &mov($B, &DWP( 4,"ebp","",0)); | ||
| 338 | &stack_push(18); | ||
| 339 | &mov($D, &DWP(12,"ebp","",0)); | ||
| 340 | &mov($E, &DWP(16,"ebp","",0)); | ||
| 341 | &mov($C, &DWP( 8,"ebp","",0)); | ||
| 342 | &mov(&swtmp(17),"eax"); | ||
| 343 | |||
| 344 | &comment("First we need to setup the X array"); | ||
| 345 | &mov("eax",&DWP(0,"esi","",0)); # pulled out of X_expand | ||
| 346 | |||
| 347 | &set_label("start") unless $normal; | ||
| 348 | |||
| 349 | &X_expand("esi"); | ||
| 350 | &mov(&swtmp(16),"esi"); | ||
| 351 | |||
| 352 | &comment(""); | ||
| 353 | &comment("Start processing"); | ||
| 354 | |||
| 355 | # odd start | ||
| 356 | &mov($A, &DWP( 0,"ebp","",0)); | ||
| 357 | $X="esp"; | ||
| 358 | &BODY_00_15(-2,$K[0],$X, 0,$A,$B,$C,$D,$E,$T); | ||
| 359 | &BODY_00_15( 0,$K[0],$X, 1,$T,$A,$B,$C,$D,$E); | ||
| 360 | &BODY_00_15( 0,$K[0],$X, 2,$E,$T,$A,$B,$C,$D); | ||
| 361 | &BODY_00_15( 0,$K[0],$X, 3,$D,$E,$T,$A,$B,$C); | ||
| 362 | &BODY_00_15( 0,$K[0],$X, 4,$C,$D,$E,$T,$A,$B); | ||
| 363 | &BODY_00_15( 0,$K[0],$X, 5,$B,$C,$D,$E,$T,$A); | ||
| 364 | &BODY_00_15( 0,$K[0],$X, 6,$A,$B,$C,$D,$E,$T); | ||
| 365 | &BODY_00_15( 0,$K[0],$X, 7,$T,$A,$B,$C,$D,$E); | ||
| 366 | &BODY_00_15( 0,$K[0],$X, 8,$E,$T,$A,$B,$C,$D); | ||
| 367 | &BODY_00_15( 0,$K[0],$X, 9,$D,$E,$T,$A,$B,$C); | ||
| 368 | &BODY_00_15( 0,$K[0],$X,10,$C,$D,$E,$T,$A,$B); | ||
| 369 | &BODY_00_15( 0,$K[0],$X,11,$B,$C,$D,$E,$T,$A); | ||
| 370 | &BODY_00_15( 0,$K[0],$X,12,$A,$B,$C,$D,$E,$T); | ||
| 371 | &BODY_00_15( 0,$K[0],$X,13,$T,$A,$B,$C,$D,$E); | ||
| 372 | &BODY_00_15( 0,$K[0],$X,14,$E,$T,$A,$B,$C,$D); | ||
| 373 | &BODY_00_15( 1,$K[0],$X,15,$D,$E,$T,$A,$B,$C); | ||
| 374 | &BODY_16_19(-1,$K[0],$X,16,$C,$D,$E,$T,$A,$B); | ||
| 375 | &BODY_16_19( 0,$K[0],$X,17,$B,$C,$D,$E,$T,$A); | ||
| 376 | &BODY_16_19( 0,$K[0],$X,18,$A,$B,$C,$D,$E,$T); | ||
| 377 | &BODY_16_19( 1,$K[0],$X,19,$T,$A,$B,$C,$D,$E); | ||
| 378 | |||
| 379 | &BODY_20_39(-1,$K[1],$X,20,$E,$T,$A,$B,$C,$D); | ||
| 380 | &BODY_20_39( 0,$K[1],$X,21,$D,$E,$T,$A,$B,$C); | ||
| 381 | &BODY_20_39( 0,$K[1],$X,22,$C,$D,$E,$T,$A,$B); | ||
| 382 | &BODY_20_39( 0,$K[1],$X,23,$B,$C,$D,$E,$T,$A); | ||
| 383 | &BODY_20_39( 0,$K[1],$X,24,$A,$B,$C,$D,$E,$T); | ||
| 384 | &BODY_20_39( 0,$K[1],$X,25,$T,$A,$B,$C,$D,$E); | ||
| 385 | &BODY_20_39( 0,$K[1],$X,26,$E,$T,$A,$B,$C,$D); | ||
| 386 | &BODY_20_39( 0,$K[1],$X,27,$D,$E,$T,$A,$B,$C); | ||
| 387 | &BODY_20_39( 0,$K[1],$X,28,$C,$D,$E,$T,$A,$B); | ||
| 388 | &BODY_20_39( 0,$K[1],$X,29,$B,$C,$D,$E,$T,$A); | ||
| 389 | &BODY_20_39( 0,$K[1],$X,30,$A,$B,$C,$D,$E,$T); | ||
| 390 | &BODY_20_39( 0,$K[1],$X,31,$T,$A,$B,$C,$D,$E); | ||
| 391 | &BODY_20_39( 0,$K[1],$X,32,$E,$T,$A,$B,$C,$D); | ||
| 392 | &BODY_20_39( 0,$K[1],$X,33,$D,$E,$T,$A,$B,$C); | ||
| 393 | &BODY_20_39( 0,$K[1],$X,34,$C,$D,$E,$T,$A,$B); | ||
| 394 | &BODY_20_39( 0,$K[1],$X,35,$B,$C,$D,$E,$T,$A); | ||
| 395 | &BODY_20_39( 0,$K[1],$X,36,$A,$B,$C,$D,$E,$T); | ||
| 396 | &BODY_20_39( 0,$K[1],$X,37,$T,$A,$B,$C,$D,$E); | ||
| 397 | &BODY_20_39( 0,$K[1],$X,38,$E,$T,$A,$B,$C,$D); | ||
| 398 | &BODY_20_39( 1,$K[1],$X,39,$D,$E,$T,$A,$B,$C); | ||
| 399 | |||
| 400 | &BODY_40_59(-1,$K[2],$X,40,$C,$D,$E,$T,$A,$B); | ||
| 401 | &BODY_40_59( 0,$K[2],$X,41,$B,$C,$D,$E,$T,$A); | ||
| 402 | &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
| 403 | &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
| 404 | &BODY_40_59( 0,$K[2],$X,44,$E,$T,$A,$B,$C,$D); | ||
| 405 | &BODY_40_59( 0,$K[2],$X,45,$D,$E,$T,$A,$B,$C); | ||
| 406 | &BODY_40_59( 0,$K[2],$X,46,$C,$D,$E,$T,$A,$B); | ||
| 407 | &BODY_40_59( 0,$K[2],$X,47,$B,$C,$D,$E,$T,$A); | ||
| 408 | &BODY_40_59( 0,$K[2],$X,48,$A,$B,$C,$D,$E,$T); | ||
| 409 | &BODY_40_59( 0,$K[2],$X,49,$T,$A,$B,$C,$D,$E); | ||
| 410 | &BODY_40_59( 0,$K[2],$X,50,$E,$T,$A,$B,$C,$D); | ||
| 411 | &BODY_40_59( 0,$K[2],$X,51,$D,$E,$T,$A,$B,$C); | ||
| 412 | &BODY_40_59( 0,$K[2],$X,52,$C,$D,$E,$T,$A,$B); | ||
| 413 | &BODY_40_59( 0,$K[2],$X,53,$B,$C,$D,$E,$T,$A); | ||
| 414 | &BODY_40_59( 0,$K[2],$X,54,$A,$B,$C,$D,$E,$T); | ||
| 415 | &BODY_40_59( 0,$K[2],$X,55,$T,$A,$B,$C,$D,$E); | ||
| 416 | &BODY_40_59( 0,$K[2],$X,56,$E,$T,$A,$B,$C,$D); | ||
| 417 | &BODY_40_59( 0,$K[2],$X,57,$D,$E,$T,$A,$B,$C); | ||
| 418 | &BODY_40_59( 0,$K[2],$X,58,$C,$D,$E,$T,$A,$B); | ||
| 419 | &BODY_40_59( 1,$K[2],$X,59,$B,$C,$D,$E,$T,$A); | ||
| 420 | |||
| 421 | &BODY_60_79(-1,$K[3],$X,60,$A,$B,$C,$D,$E,$T); | ||
| 422 | &BODY_60_79( 0,$K[3],$X,61,$T,$A,$B,$C,$D,$E); | ||
| 423 | &BODY_60_79( 0,$K[3],$X,62,$E,$T,$A,$B,$C,$D); | ||
| 424 | &BODY_60_79( 0,$K[3],$X,63,$D,$E,$T,$A,$B,$C); | ||
| 425 | &BODY_60_79( 0,$K[3],$X,64,$C,$D,$E,$T,$A,$B); | ||
| 426 | &BODY_60_79( 0,$K[3],$X,65,$B,$C,$D,$E,$T,$A); | ||
| 427 | &BODY_60_79( 0,$K[3],$X,66,$A,$B,$C,$D,$E,$T); | ||
| 428 | &BODY_60_79( 0,$K[3],$X,67,$T,$A,$B,$C,$D,$E); | ||
| 429 | &BODY_60_79( 0,$K[3],$X,68,$E,$T,$A,$B,$C,$D); | ||
| 430 | &BODY_60_79( 0,$K[3],$X,69,$D,$E,$T,$A,$B,$C); | ||
| 431 | &BODY_60_79( 0,$K[3],$X,70,$C,$D,$E,$T,$A,$B); | ||
| 432 | &BODY_60_79( 0,$K[3],$X,71,$B,$C,$D,$E,$T,$A); | ||
| 433 | &BODY_60_79( 0,$K[3],$X,72,$A,$B,$C,$D,$E,$T); | ||
| 434 | &BODY_60_79( 0,$K[3],$X,73,$T,$A,$B,$C,$D,$E); | ||
| 435 | &BODY_60_79( 0,$K[3],$X,74,$E,$T,$A,$B,$C,$D); | ||
| 436 | &BODY_60_79( 0,$K[3],$X,75,$D,$E,$T,$A,$B,$C); | ||
| 437 | &BODY_60_79( 0,$K[3],$X,76,$C,$D,$E,$T,$A,$B); | ||
| 438 | &BODY_60_79( 0,$K[3],$X,77,$B,$C,$D,$E,$T,$A); | ||
| 439 | &BODY_60_79( 0,$K[3],$X,78,$A,$B,$C,$D,$E,$T); | ||
| 440 | &BODY_60_79( 2,$K[3],$X,79,$T,$A,$B,$C,$D,$E); | ||
| 441 | |||
| 442 | &comment("End processing"); | ||
| 443 | &comment(""); | ||
| 444 | # D is the tmp value | ||
| 445 | |||
| 446 | # E -> A | ||
| 447 | # T -> B | ||
| 448 | # A -> C | ||
| 449 | # B -> D | ||
| 450 | # C -> E | ||
| 451 | # D -> T | ||
| 452 | |||
| 453 | # The last 2 have been moved into the last loop | ||
| 454 | # &mov($tmp1,&wparam(0)); | ||
| 455 | |||
| 456 | &mov($D, &DWP(12,$tmp1,"",0)); | ||
| 457 | &add($D,$B); | ||
| 458 | &mov($B, &DWP( 4,$tmp1,"",0)); | ||
| 459 | &add($B,$T); | ||
| 460 | &mov($T, $A); | ||
| 461 | &mov($A, &DWP( 0,$tmp1,"",0)); | ||
| 462 | &mov(&DWP(12,$tmp1,"",0),$D); | ||
| 463 | |||
| 464 | &add($A,$E); | ||
| 465 | &mov($E, &DWP(16,$tmp1,"",0)); | ||
| 466 | &add($E,$C); | ||
| 467 | &mov($C, &DWP( 8,$tmp1,"",0)); | ||
| 468 | &add($C,$T); | ||
| 469 | |||
| 470 | &mov(&DWP( 0,$tmp1,"",0),$A); | ||
| 471 | &mov("esi",&swtmp(16)); | ||
| 472 | &mov(&DWP( 8,$tmp1,"",0),$C); # This is for looping | ||
| 473 | &add("esi",64); | ||
| 474 | &mov("eax",&swtmp(17)); | ||
| 475 | &mov(&DWP(16,$tmp1,"",0),$E); | ||
| 476 | &cmp("eax","esi"); | ||
| 477 | &mov(&DWP( 4,$tmp1,"",0),$B); # This is for looping | ||
| 478 | &jl(&label("end")); | ||
| 479 | &mov("eax",&DWP(0,"esi","",0)); # Pulled down from | ||
| 480 | &jmp(&label("start")); | ||
| 481 | |||
| 482 | &set_label("end"); | ||
| 483 | &stack_pop(18); | ||
| 484 | &pop("edi"); | ||
| 485 | &pop("ebx"); | ||
| 486 | &pop("ebp"); | ||
| 487 | &pop("esi"); | ||
| 488 | &ret(); | ||
| 489 | &function_end_B($name); | ||
| 490 | } | ||
| 491 | |||
diff --git a/src/lib/libcrypto/sha/sha.h b/src/lib/libcrypto/sha/sha.h new file mode 100644 index 0000000000..4cf0ea0225 --- /dev/null +++ b/src/lib/libcrypto/sha/sha.h | |||
| @@ -0,0 +1,109 @@ | |||
| 1 | /* crypto/sha/sha.h */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #ifndef HEADER_SHA_H | ||
| 60 | #define HEADER_SHA_H | ||
| 61 | |||
| 62 | #ifdef __cplusplus | ||
| 63 | extern "C" { | ||
| 64 | #endif | ||
| 65 | |||
| 66 | #define SHA_CBLOCK 64 | ||
| 67 | #define SHA_LBLOCK 16 | ||
| 68 | #define SHA_BLOCK 16 | ||
| 69 | #define SHA_LAST_BLOCK 56 | ||
| 70 | #define SHA_LENGTH_BLOCK 8 | ||
| 71 | #define SHA_DIGEST_LENGTH 20 | ||
| 72 | |||
| 73 | typedef struct SHAstate_st | ||
| 74 | { | ||
| 75 | unsigned long h0,h1,h2,h3,h4; | ||
| 76 | unsigned long Nl,Nh; | ||
| 77 | unsigned long data[SHA_LBLOCK]; | ||
| 78 | int num; | ||
| 79 | } SHA_CTX; | ||
| 80 | |||
| 81 | #ifndef NOPROTO | ||
| 82 | void SHA_Init(SHA_CTX *c); | ||
| 83 | void SHA_Update(SHA_CTX *c, unsigned char *data, unsigned long len); | ||
| 84 | void SHA_Final(unsigned char *md, SHA_CTX *c); | ||
| 85 | unsigned char *SHA(unsigned char *d, unsigned long n,unsigned char *md); | ||
| 86 | void SHA_Transform(SHA_CTX *c, unsigned char *data); | ||
| 87 | void SHA1_Init(SHA_CTX *c); | ||
| 88 | void SHA1_Update(SHA_CTX *c, unsigned char *data, unsigned long len); | ||
| 89 | void SHA1_Final(unsigned char *md, SHA_CTX *c); | ||
| 90 | unsigned char *SHA1(unsigned char *d, unsigned long n,unsigned char *md); | ||
| 91 | void SHA1_Transform(SHA_CTX *c, unsigned char *data); | ||
| 92 | #else | ||
| 93 | void SHA_Init(); | ||
| 94 | void SHA_Update(); | ||
| 95 | void SHA_Final(); | ||
| 96 | unsigned char *SHA(); | ||
| 97 | void SHA_Transform(); | ||
| 98 | void SHA1_Init(); | ||
| 99 | void SHA1_Update(); | ||
| 100 | void SHA1_Final(); | ||
| 101 | unsigned char *SHA1(); | ||
| 102 | void SHA1_Transform(); | ||
| 103 | #endif | ||
| 104 | |||
| 105 | #ifdef __cplusplus | ||
| 106 | } | ||
| 107 | #endif | ||
| 108 | |||
| 109 | #endif | ||
diff --git a/src/lib/libcrypto/sha/sha1_one.c b/src/lib/libcrypto/sha/sha1_one.c new file mode 100644 index 0000000000..fe5770d601 --- /dev/null +++ b/src/lib/libcrypto/sha/sha1_one.c | |||
| @@ -0,0 +1,77 @@ | |||
| 1 | /* crypto/sha/sha1_one.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <string.h> | ||
| 61 | #include "sha.h" | ||
| 62 | |||
| 63 | unsigned char *SHA1(d, n, md) | ||
| 64 | unsigned char *d; | ||
| 65 | unsigned long n; | ||
| 66 | unsigned char *md; | ||
| 67 | { | ||
| 68 | SHA_CTX c; | ||
| 69 | static unsigned char m[SHA_DIGEST_LENGTH]; | ||
| 70 | |||
| 71 | if (md == NULL) md=m; | ||
| 72 | SHA1_Init(&c); | ||
| 73 | SHA1_Update(&c,d,n); | ||
| 74 | SHA1_Final(md,&c); | ||
| 75 | memset(&c,0,sizeof(c)); | ||
| 76 | return(md); | ||
| 77 | } | ||
diff --git a/src/lib/libcrypto/sha/sha1dgst.c b/src/lib/libcrypto/sha/sha1dgst.c new file mode 100644 index 0000000000..2b0ae1f0d4 --- /dev/null +++ b/src/lib/libcrypto/sha/sha1dgst.c | |||
| @@ -0,0 +1,468 @@ | |||
| 1 | /* crypto/sha/sha1dgst.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <string.h> | ||
| 61 | #undef SHA_0 | ||
| 62 | #define SHA_1 | ||
| 63 | #include "sha.h" | ||
| 64 | #include "sha_locl.h" | ||
| 65 | |||
| 66 | char *SHA1_version="SHA1 part of SSLeay 0.9.0b 29-Jun-1998"; | ||
| 67 | |||
| 68 | /* Implemented from SHA-1 document - The Secure Hash Algorithm | ||
| 69 | */ | ||
| 70 | |||
| 71 | #define INIT_DATA_h0 (unsigned long)0x67452301L | ||
| 72 | #define INIT_DATA_h1 (unsigned long)0xefcdab89L | ||
| 73 | #define INIT_DATA_h2 (unsigned long)0x98badcfeL | ||
| 74 | #define INIT_DATA_h3 (unsigned long)0x10325476L | ||
| 75 | #define INIT_DATA_h4 (unsigned long)0xc3d2e1f0L | ||
| 76 | |||
| 77 | #define K_00_19 0x5a827999L | ||
| 78 | #define K_20_39 0x6ed9eba1L | ||
| 79 | #define K_40_59 0x8f1bbcdcL | ||
| 80 | #define K_60_79 0xca62c1d6L | ||
| 81 | |||
| 82 | #ifndef NOPROTO | ||
| 83 | # ifdef SHA1_ASM | ||
| 84 | void sha1_block_x86(SHA_CTX *c, register unsigned long *p, int num); | ||
| 85 | # define sha1_block sha1_block_x86 | ||
| 86 | # else | ||
| 87 | void sha1_block(SHA_CTX *c, register unsigned long *p, int num); | ||
| 88 | # endif | ||
| 89 | #else | ||
| 90 | # ifdef SHA1_ASM | ||
| 91 | void sha1_block_x86(); | ||
| 92 | # define sha1_block sha1_block_x86 | ||
| 93 | # else | ||
| 94 | void sha1_block(); | ||
| 95 | # endif | ||
| 96 | #endif | ||
| 97 | |||
| 98 | |||
| 99 | #if defined(L_ENDIAN) && defined(SHA1_ASM) | ||
| 100 | # define M_c2nl c2l | ||
| 101 | # define M_p_c2nl p_c2l | ||
| 102 | # define M_c2nl_p c2l_p | ||
| 103 | # define M_p_c2nl_p p_c2l_p | ||
| 104 | # define M_nl2c l2c | ||
| 105 | #else | ||
| 106 | # define M_c2nl c2nl | ||
| 107 | # define M_p_c2nl p_c2nl | ||
| 108 | # define M_c2nl_p c2nl_p | ||
| 109 | # define M_p_c2nl_p p_c2nl_p | ||
| 110 | # define M_nl2c nl2c | ||
| 111 | #endif | ||
| 112 | |||
| 113 | void SHA1_Init(c) | ||
| 114 | SHA_CTX *c; | ||
| 115 | { | ||
| 116 | c->h0=INIT_DATA_h0; | ||
| 117 | c->h1=INIT_DATA_h1; | ||
| 118 | c->h2=INIT_DATA_h2; | ||
| 119 | c->h3=INIT_DATA_h3; | ||
| 120 | c->h4=INIT_DATA_h4; | ||
| 121 | c->Nl=0; | ||
| 122 | c->Nh=0; | ||
| 123 | c->num=0; | ||
| 124 | } | ||
| 125 | |||
| 126 | void SHA1_Update(c, data, len) | ||
| 127 | SHA_CTX *c; | ||
| 128 | register unsigned char *data; | ||
| 129 | unsigned long len; | ||
| 130 | { | ||
| 131 | register ULONG *p; | ||
| 132 | int ew,ec,sw,sc; | ||
| 133 | ULONG l; | ||
| 134 | |||
| 135 | if (len == 0) return; | ||
| 136 | |||
| 137 | l=(c->Nl+(len<<3))&0xffffffffL; | ||
| 138 | if (l < c->Nl) /* overflow */ | ||
| 139 | c->Nh++; | ||
| 140 | c->Nh+=(len>>29); | ||
| 141 | c->Nl=l; | ||
| 142 | |||
| 143 | if (c->num != 0) | ||
| 144 | { | ||
| 145 | p=c->data; | ||
| 146 | sw=c->num>>2; | ||
| 147 | sc=c->num&0x03; | ||
| 148 | |||
| 149 | if ((c->num+len) >= SHA_CBLOCK) | ||
| 150 | { | ||
| 151 | l= p[sw]; | ||
| 152 | M_p_c2nl(data,l,sc); | ||
| 153 | p[sw++]=l; | ||
| 154 | for (; sw<SHA_LBLOCK; sw++) | ||
| 155 | { | ||
| 156 | M_c2nl(data,l); | ||
| 157 | p[sw]=l; | ||
| 158 | } | ||
| 159 | len-=(SHA_CBLOCK-c->num); | ||
| 160 | |||
| 161 | sha1_block(c,p,64); | ||
| 162 | c->num=0; | ||
| 163 | /* drop through and do the rest */ | ||
| 164 | } | ||
| 165 | else | ||
| 166 | { | ||
| 167 | c->num+=(int)len; | ||
| 168 | if ((sc+len) < 4) /* ugly, add char's to a word */ | ||
| 169 | { | ||
| 170 | l= p[sw]; | ||
| 171 | M_p_c2nl_p(data,l,sc,len); | ||
| 172 | p[sw]=l; | ||
| 173 | } | ||
| 174 | else | ||
| 175 | { | ||
| 176 | ew=(c->num>>2); | ||
| 177 | ec=(c->num&0x03); | ||
| 178 | l= p[sw]; | ||
| 179 | M_p_c2nl(data,l,sc); | ||
| 180 | p[sw++]=l; | ||
| 181 | for (; sw < ew; sw++) | ||
| 182 | { M_c2nl(data,l); p[sw]=l; } | ||
| 183 | if (ec) | ||
| 184 | { | ||
| 185 | M_c2nl_p(data,l,ec); | ||
| 186 | p[sw]=l; | ||
| 187 | } | ||
| 188 | } | ||
| 189 | return; | ||
| 190 | } | ||
| 191 | } | ||
| 192 | /* We can only do the following code for assember, the reason | ||
| 193 | * being that the sha1_block 'C' version changes the values | ||
| 194 | * in the 'data' array. The assember code avoids this and | ||
| 195 | * copies it to a local array. I should be able to do this for | ||
| 196 | * the C version as well.... | ||
| 197 | */ | ||
| 198 | #if 1 | ||
| 199 | #if defined(B_ENDIAN) || defined(SHA1_ASM) | ||
| 200 | if ((((unsigned int)data)%sizeof(ULONG)) == 0) | ||
| 201 | { | ||
| 202 | sw=len/SHA_CBLOCK; | ||
| 203 | if (sw) | ||
| 204 | { | ||
| 205 | sw*=SHA_CBLOCK; | ||
| 206 | sha1_block(c,(ULONG *)data,sw); | ||
| 207 | data+=sw; | ||
| 208 | len-=sw; | ||
| 209 | } | ||
| 210 | } | ||
| 211 | #endif | ||
| 212 | #endif | ||
| 213 | /* we now can process the input data in blocks of SHA_CBLOCK | ||
| 214 | * chars and save the leftovers to c->data. */ | ||
| 215 | p=c->data; | ||
| 216 | while (len >= SHA_CBLOCK) | ||
| 217 | { | ||
| 218 | #if defined(B_ENDIAN) || defined(L_ENDIAN) | ||
| 219 | if (p != (unsigned long *)data) | ||
| 220 | memcpy(p,data,SHA_CBLOCK); | ||
| 221 | data+=SHA_CBLOCK; | ||
| 222 | # ifdef L_ENDIAN | ||
| 223 | # ifndef SHA1_ASM /* Will not happen */ | ||
| 224 | for (sw=(SHA_LBLOCK/4); sw; sw--) | ||
| 225 | { | ||
| 226 | Endian_Reverse32(p[0]); | ||
| 227 | Endian_Reverse32(p[1]); | ||
| 228 | Endian_Reverse32(p[2]); | ||
| 229 | Endian_Reverse32(p[3]); | ||
| 230 | p+=4; | ||
| 231 | } | ||
| 232 | p=c->data; | ||
| 233 | # endif | ||
| 234 | # endif | ||
| 235 | #else | ||
| 236 | for (sw=(SHA_BLOCK/4); sw; sw--) | ||
| 237 | { | ||
| 238 | M_c2nl(data,l); *(p++)=l; | ||
| 239 | M_c2nl(data,l); *(p++)=l; | ||
| 240 | M_c2nl(data,l); *(p++)=l; | ||
| 241 | M_c2nl(data,l); *(p++)=l; | ||
| 242 | } | ||
| 243 | p=c->data; | ||
| 244 | #endif | ||
| 245 | sha1_block(c,p,64); | ||
| 246 | len-=SHA_CBLOCK; | ||
| 247 | } | ||
| 248 | ec=(int)len; | ||
| 249 | c->num=ec; | ||
| 250 | ew=(ec>>2); | ||
| 251 | ec&=0x03; | ||
| 252 | |||
| 253 | for (sw=0; sw < ew; sw++) | ||
| 254 | { M_c2nl(data,l); p[sw]=l; } | ||
| 255 | M_c2nl_p(data,l,ec); | ||
| 256 | p[sw]=l; | ||
| 257 | } | ||
| 258 | |||
| 259 | void SHA1_Transform(c,b) | ||
| 260 | SHA_CTX *c; | ||
| 261 | unsigned char *b; | ||
| 262 | { | ||
| 263 | ULONG p[16]; | ||
| 264 | #ifndef B_ENDIAN | ||
| 265 | ULONG *q; | ||
| 266 | int i; | ||
| 267 | #endif | ||
| 268 | |||
| 269 | #if defined(B_ENDIAN) || defined(L_ENDIAN) | ||
| 270 | memcpy(p,b,64); | ||
| 271 | #ifdef L_ENDIAN | ||
| 272 | q=p; | ||
| 273 | for (i=(SHA_LBLOCK/4); i; i--) | ||
| 274 | { | ||
| 275 | Endian_Reverse32(q[0]); | ||
| 276 | Endian_Reverse32(q[1]); | ||
| 277 | Endian_Reverse32(q[2]); | ||
| 278 | Endian_Reverse32(q[3]); | ||
| 279 | q+=4; | ||
| 280 | } | ||
| 281 | #endif | ||
| 282 | #else | ||
| 283 | q=p; | ||
| 284 | for (i=(SHA_LBLOCK/4); i; i--) | ||
| 285 | { | ||
| 286 | ULONG l; | ||
| 287 | c2nl(b,l); *(q++)=l; | ||
| 288 | c2nl(b,l); *(q++)=l; | ||
| 289 | c2nl(b,l); *(q++)=l; | ||
| 290 | c2nl(b,l); *(q++)=l; | ||
| 291 | } | ||
| 292 | #endif | ||
| 293 | sha1_block(c,p,64); | ||
| 294 | } | ||
| 295 | |||
| 296 | #ifndef SHA1_ASM | ||
| 297 | |||
| 298 | void sha1_block(c, W, num) | ||
| 299 | SHA_CTX *c; | ||
| 300 | register unsigned long *W; | ||
| 301 | int num; | ||
| 302 | { | ||
| 303 | register ULONG A,B,C,D,E,T; | ||
| 304 | ULONG X[16]; | ||
| 305 | |||
| 306 | A=c->h0; | ||
| 307 | B=c->h1; | ||
| 308 | C=c->h2; | ||
| 309 | D=c->h3; | ||
| 310 | E=c->h4; | ||
| 311 | |||
| 312 | for (;;) | ||
| 313 | { | ||
| 314 | BODY_00_15( 0,A,B,C,D,E,T,W); | ||
| 315 | BODY_00_15( 1,T,A,B,C,D,E,W); | ||
| 316 | BODY_00_15( 2,E,T,A,B,C,D,W); | ||
| 317 | BODY_00_15( 3,D,E,T,A,B,C,W); | ||
| 318 | BODY_00_15( 4,C,D,E,T,A,B,W); | ||
| 319 | BODY_00_15( 5,B,C,D,E,T,A,W); | ||
| 320 | BODY_00_15( 6,A,B,C,D,E,T,W); | ||
| 321 | BODY_00_15( 7,T,A,B,C,D,E,W); | ||
| 322 | BODY_00_15( 8,E,T,A,B,C,D,W); | ||
| 323 | BODY_00_15( 9,D,E,T,A,B,C,W); | ||
| 324 | BODY_00_15(10,C,D,E,T,A,B,W); | ||
| 325 | BODY_00_15(11,B,C,D,E,T,A,W); | ||
| 326 | BODY_00_15(12,A,B,C,D,E,T,W); | ||
| 327 | BODY_00_15(13,T,A,B,C,D,E,W); | ||
| 328 | BODY_00_15(14,E,T,A,B,C,D,W); | ||
| 329 | BODY_00_15(15,D,E,T,A,B,C,W); | ||
| 330 | BODY_16_19(16,C,D,E,T,A,B,W,W,W,W); | ||
| 331 | BODY_16_19(17,B,C,D,E,T,A,W,W,W,W); | ||
| 332 | BODY_16_19(18,A,B,C,D,E,T,W,W,W,W); | ||
| 333 | BODY_16_19(19,T,A,B,C,D,E,W,W,W,X); | ||
| 334 | |||
| 335 | BODY_20_31(20,E,T,A,B,C,D,W,W,W,X); | ||
| 336 | BODY_20_31(21,D,E,T,A,B,C,W,W,W,X); | ||
| 337 | BODY_20_31(22,C,D,E,T,A,B,W,W,W,X); | ||
| 338 | BODY_20_31(23,B,C,D,E,T,A,W,W,W,X); | ||
| 339 | BODY_20_31(24,A,B,C,D,E,T,W,W,X,X); | ||
| 340 | BODY_20_31(25,T,A,B,C,D,E,W,W,X,X); | ||
| 341 | BODY_20_31(26,E,T,A,B,C,D,W,W,X,X); | ||
| 342 | BODY_20_31(27,D,E,T,A,B,C,W,W,X,X); | ||
| 343 | BODY_20_31(28,C,D,E,T,A,B,W,W,X,X); | ||
| 344 | BODY_20_31(29,B,C,D,E,T,A,W,W,X,X); | ||
| 345 | BODY_20_31(30,A,B,C,D,E,T,W,X,X,X); | ||
| 346 | BODY_20_31(31,T,A,B,C,D,E,W,X,X,X); | ||
| 347 | BODY_32_39(32,E,T,A,B,C,D,X); | ||
| 348 | BODY_32_39(33,D,E,T,A,B,C,X); | ||
| 349 | BODY_32_39(34,C,D,E,T,A,B,X); | ||
| 350 | BODY_32_39(35,B,C,D,E,T,A,X); | ||
| 351 | BODY_32_39(36,A,B,C,D,E,T,X); | ||
| 352 | BODY_32_39(37,T,A,B,C,D,E,X); | ||
| 353 | BODY_32_39(38,E,T,A,B,C,D,X); | ||
| 354 | BODY_32_39(39,D,E,T,A,B,C,X); | ||
| 355 | |||
| 356 | BODY_40_59(40,C,D,E,T,A,B,X); | ||
| 357 | BODY_40_59(41,B,C,D,E,T,A,X); | ||
| 358 | BODY_40_59(42,A,B,C,D,E,T,X); | ||
| 359 | BODY_40_59(43,T,A,B,C,D,E,X); | ||
| 360 | BODY_40_59(44,E,T,A,B,C,D,X); | ||
| 361 | BODY_40_59(45,D,E,T,A,B,C,X); | ||
| 362 | BODY_40_59(46,C,D,E,T,A,B,X); | ||
| 363 | BODY_40_59(47,B,C,D,E,T,A,X); | ||
| 364 | BODY_40_59(48,A,B,C,D,E,T,X); | ||
| 365 | BODY_40_59(49,T,A,B,C,D,E,X); | ||
| 366 | BODY_40_59(50,E,T,A,B,C,D,X); | ||
| 367 | BODY_40_59(51,D,E,T,A,B,C,X); | ||
| 368 | BODY_40_59(52,C,D,E,T,A,B,X); | ||
| 369 | BODY_40_59(53,B,C,D,E,T,A,X); | ||
| 370 | BODY_40_59(54,A,B,C,D,E,T,X); | ||
| 371 | BODY_40_59(55,T,A,B,C,D,E,X); | ||
| 372 | BODY_40_59(56,E,T,A,B,C,D,X); | ||
| 373 | BODY_40_59(57,D,E,T,A,B,C,X); | ||
| 374 | BODY_40_59(58,C,D,E,T,A,B,X); | ||
| 375 | BODY_40_59(59,B,C,D,E,T,A,X); | ||
| 376 | |||
| 377 | BODY_60_79(60,A,B,C,D,E,T,X); | ||
| 378 | BODY_60_79(61,T,A,B,C,D,E,X); | ||
| 379 | BODY_60_79(62,E,T,A,B,C,D,X); | ||
| 380 | BODY_60_79(63,D,E,T,A,B,C,X); | ||
| 381 | BODY_60_79(64,C,D,E,T,A,B,X); | ||
| 382 | BODY_60_79(65,B,C,D,E,T,A,X); | ||
| 383 | BODY_60_79(66,A,B,C,D,E,T,X); | ||
| 384 | BODY_60_79(67,T,A,B,C,D,E,X); | ||
| 385 | BODY_60_79(68,E,T,A,B,C,D,X); | ||
| 386 | BODY_60_79(69,D,E,T,A,B,C,X); | ||
| 387 | BODY_60_79(70,C,D,E,T,A,B,X); | ||
| 388 | BODY_60_79(71,B,C,D,E,T,A,X); | ||
| 389 | BODY_60_79(72,A,B,C,D,E,T,X); | ||
| 390 | BODY_60_79(73,T,A,B,C,D,E,X); | ||
| 391 | BODY_60_79(74,E,T,A,B,C,D,X); | ||
| 392 | BODY_60_79(75,D,E,T,A,B,C,X); | ||
| 393 | BODY_60_79(76,C,D,E,T,A,B,X); | ||
| 394 | BODY_60_79(77,B,C,D,E,T,A,X); | ||
| 395 | BODY_60_79(78,A,B,C,D,E,T,X); | ||
| 396 | BODY_60_79(79,T,A,B,C,D,E,X); | ||
| 397 | |||
| 398 | c->h0=(c->h0+E)&0xffffffffL; | ||
| 399 | c->h1=(c->h1+T)&0xffffffffL; | ||
| 400 | c->h2=(c->h2+A)&0xffffffffL; | ||
| 401 | c->h3=(c->h3+B)&0xffffffffL; | ||
| 402 | c->h4=(c->h4+C)&0xffffffffL; | ||
| 403 | |||
| 404 | num-=64; | ||
| 405 | if (num <= 0) break; | ||
| 406 | |||
| 407 | A=c->h0; | ||
| 408 | B=c->h1; | ||
| 409 | C=c->h2; | ||
| 410 | D=c->h3; | ||
| 411 | E=c->h4; | ||
| 412 | |||
| 413 | W+=16; | ||
| 414 | } | ||
| 415 | } | ||
| 416 | #endif | ||
| 417 | |||
| 418 | void SHA1_Final(md, c) | ||
| 419 | unsigned char *md; | ||
| 420 | SHA_CTX *c; | ||
| 421 | { | ||
| 422 | register int i,j; | ||
| 423 | register ULONG l; | ||
| 424 | register ULONG *p; | ||
| 425 | static unsigned char end[4]={0x80,0x00,0x00,0x00}; | ||
| 426 | unsigned char *cp=end; | ||
| 427 | |||
| 428 | /* c->num should definitly have room for at least one more byte. */ | ||
| 429 | p=c->data; | ||
| 430 | j=c->num; | ||
| 431 | i=j>>2; | ||
| 432 | #ifdef PURIFY | ||
| 433 | if ((j&0x03) == 0) p[i]=0; | ||
| 434 | #endif | ||
| 435 | l=p[i]; | ||
| 436 | M_p_c2nl(cp,l,j&0x03); | ||
| 437 | p[i]=l; | ||
| 438 | i++; | ||
| 439 | /* i is the next 'undefined word' */ | ||
| 440 | if (c->num >= SHA_LAST_BLOCK) | ||
| 441 | { | ||
| 442 | for (; i<SHA_LBLOCK; i++) | ||
| 443 | p[i]=0; | ||
| 444 | sha1_block(c,p,64); | ||
| 445 | i=0; | ||
| 446 | } | ||
| 447 | for (; i<(SHA_LBLOCK-2); i++) | ||
| 448 | p[i]=0; | ||
| 449 | p[SHA_LBLOCK-2]=c->Nh; | ||
| 450 | p[SHA_LBLOCK-1]=c->Nl; | ||
| 451 | #if defined(L_ENDIAN) && defined(SHA1_ASM) | ||
| 452 | Endian_Reverse32(p[SHA_LBLOCK-2]); | ||
| 453 | Endian_Reverse32(p[SHA_LBLOCK-1]); | ||
| 454 | #endif | ||
| 455 | sha1_block(c,p,64); | ||
| 456 | cp=md; | ||
| 457 | l=c->h0; nl2c(l,cp); | ||
| 458 | l=c->h1; nl2c(l,cp); | ||
| 459 | l=c->h2; nl2c(l,cp); | ||
| 460 | l=c->h3; nl2c(l,cp); | ||
| 461 | l=c->h4; nl2c(l,cp); | ||
| 462 | |||
| 463 | /* clear stuff, sha1_block may be leaving some stuff on the stack | ||
| 464 | * but I'm not worried :-) */ | ||
| 465 | c->num=0; | ||
| 466 | /* memset((char *)&c,0,sizeof(c));*/ | ||
| 467 | } | ||
| 468 | |||
diff --git a/src/lib/libcrypto/sha/sha_locl.h b/src/lib/libcrypto/sha/sha_locl.h new file mode 100644 index 0000000000..2814ad15fa --- /dev/null +++ b/src/lib/libcrypto/sha/sha_locl.h | |||
| @@ -0,0 +1,246 @@ | |||
| 1 | /* crypto/sha/sha_locl.h */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdlib.h> | ||
| 60 | #include <string.h> | ||
| 61 | |||
| 62 | #ifdef undef | ||
| 63 | /* one or the other needs to be defined */ | ||
| 64 | #ifndef SHA_1 /* FIPE 180-1 */ | ||
| 65 | #define SHA_0 /* FIPS 180 */ | ||
| 66 | #endif | ||
| 67 | #endif | ||
| 68 | |||
| 69 | #define ULONG unsigned long | ||
| 70 | #define UCHAR unsigned char | ||
| 71 | #define UINT unsigned int | ||
| 72 | |||
| 73 | #ifdef NOCONST | ||
| 74 | #define const | ||
| 75 | #endif | ||
| 76 | |||
| 77 | #undef c2nl | ||
| 78 | #define c2nl(c,l) (l =(((unsigned long)(*((c)++)))<<24), \ | ||
| 79 | l|=(((unsigned long)(*((c)++)))<<16), \ | ||
| 80 | l|=(((unsigned long)(*((c)++)))<< 8), \ | ||
| 81 | l|=(((unsigned long)(*((c)++))) )) | ||
| 82 | |||
| 83 | #undef p_c2nl | ||
| 84 | #define p_c2nl(c,l,n) { \ | ||
| 85 | switch (n) { \ | ||
| 86 | case 0: l =((unsigned long)(*((c)++)))<<24; \ | ||
| 87 | case 1: l|=((unsigned long)(*((c)++)))<<16; \ | ||
| 88 | case 2: l|=((unsigned long)(*((c)++)))<< 8; \ | ||
| 89 | case 3: l|=((unsigned long)(*((c)++))); \ | ||
| 90 | } \ | ||
| 91 | } | ||
| 92 | |||
| 93 | #undef c2nl_p | ||
| 94 | /* NOTE the pointer is not incremented at the end of this */ | ||
| 95 | #define c2nl_p(c,l,n) { \ | ||
| 96 | l=0; \ | ||
| 97 | (c)+=n; \ | ||
| 98 | switch (n) { \ | ||
| 99 | case 3: l =((unsigned long)(*(--(c))))<< 8; \ | ||
| 100 | case 2: l|=((unsigned long)(*(--(c))))<<16; \ | ||
| 101 | case 1: l|=((unsigned long)(*(--(c))))<<24; \ | ||
| 102 | } \ | ||
| 103 | } | ||
| 104 | |||
| 105 | #undef p_c2nl_p | ||
| 106 | #define p_c2nl_p(c,l,sc,len) { \ | ||
| 107 | switch (sc) \ | ||
| 108 | { \ | ||
| 109 | case 0: l =((unsigned long)(*((c)++)))<<24; \ | ||
| 110 | if (--len == 0) break; \ | ||
| 111 | case 1: l|=((unsigned long)(*((c)++)))<<16; \ | ||
| 112 | if (--len == 0) break; \ | ||
| 113 | case 2: l|=((unsigned long)(*((c)++)))<< 8; \ | ||
| 114 | } \ | ||
| 115 | } | ||
| 116 | |||
| 117 | #undef nl2c | ||
| 118 | #define nl2c(l,c) (*((c)++)=(unsigned char)(((l)>>24)&0xff), \ | ||
| 119 | *((c)++)=(unsigned char)(((l)>>16)&0xff), \ | ||
| 120 | *((c)++)=(unsigned char)(((l)>> 8)&0xff), \ | ||
| 121 | *((c)++)=(unsigned char)(((l) )&0xff)) | ||
| 122 | |||
| 123 | #undef c2l | ||
| 124 | #define c2l(c,l) (l =(((unsigned long)(*((c)++))) ), \ | ||
| 125 | l|=(((unsigned long)(*((c)++)))<< 8), \ | ||
| 126 | l|=(((unsigned long)(*((c)++)))<<16), \ | ||
| 127 | l|=(((unsigned long)(*((c)++)))<<24)) | ||
| 128 | |||
| 129 | #undef p_c2l | ||
| 130 | #define p_c2l(c,l,n) { \ | ||
| 131 | switch (n) { \ | ||
| 132 | case 0: l =((unsigned long)(*((c)++))); \ | ||
| 133 | case 1: l|=((unsigned long)(*((c)++)))<< 8; \ | ||
| 134 | case 2: l|=((unsigned long)(*((c)++)))<<16; \ | ||
| 135 | case 3: l|=((unsigned long)(*((c)++)))<<24; \ | ||
| 136 | } \ | ||
| 137 | } | ||
| 138 | |||
| 139 | #undef c2l_p | ||
| 140 | /* NOTE the pointer is not incremented at the end of this */ | ||
| 141 | #define c2l_p(c,l,n) { \ | ||
| 142 | l=0; \ | ||
| 143 | (c)+=n; \ | ||
| 144 | switch (n) { \ | ||
| 145 | case 3: l =((unsigned long)(*(--(c))))<<16; \ | ||
| 146 | case 2: l|=((unsigned long)(*(--(c))))<< 8; \ | ||
| 147 | case 1: l|=((unsigned long)(*(--(c)))); \ | ||
| 148 | } \ | ||
| 149 | } | ||
| 150 | |||
| 151 | #undef p_c2l_p | ||
| 152 | #define p_c2l_p(c,l,sc,len) { \ | ||
| 153 | switch (sc) \ | ||
| 154 | { \ | ||
| 155 | case 0: l =((unsigned long)(*((c)++))); \ | ||
| 156 | if (--len == 0) break; \ | ||
| 157 | case 1: l|=((unsigned long)(*((c)++)))<< 8; \ | ||
| 158 | if (--len == 0) break; \ | ||
| 159 | case 2: l|=((unsigned long)(*((c)++)))<<16; \ | ||
| 160 | } \ | ||
| 161 | } | ||
| 162 | |||
| 163 | #undef l2c | ||
| 164 | #define l2c(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \ | ||
| 165 | *((c)++)=(unsigned char)(((l)>> 8)&0xff), \ | ||
| 166 | *((c)++)=(unsigned char)(((l)>>16)&0xff), \ | ||
| 167 | *((c)++)=(unsigned char)(((l)>>24)&0xff)) | ||
| 168 | |||
| 169 | #undef ROTATE | ||
| 170 | #if defined(WIN32) | ||
| 171 | #define ROTATE(a,n) _lrotl(a,n) | ||
| 172 | #else | ||
| 173 | #define ROTATE(a,n) (((a)<<(n))|(((a)&0xffffffff)>>(32-(n)))) | ||
| 174 | #endif | ||
| 175 | |||
| 176 | /* A nice byte order reversal from Wei Dai <weidai@eskimo.com> */ | ||
| 177 | #if defined(WIN32) | ||
| 178 | /* 5 instructions with rotate instruction, else 9 */ | ||
| 179 | #define Endian_Reverse32(a) \ | ||
| 180 | { \ | ||
| 181 | unsigned long l=(a); \ | ||
| 182 | (a)=((ROTATE(l,8)&0x00FF00FF)|(ROTATE(l,24)&0xFF00FF00)); \ | ||
| 183 | } | ||
| 184 | #else | ||
| 185 | /* 6 instructions with rotate instruction, else 8 */ | ||
| 186 | #define Endian_Reverse32(a) \ | ||
| 187 | { \ | ||
| 188 | unsigned long l=(a); \ | ||
| 189 | l=(((l&0xFF00FF00)>>8L)|((l&0x00FF00FF)<<8L)); \ | ||
| 190 | (a)=ROTATE(l,16L); \ | ||
| 191 | } | ||
| 192 | #endif | ||
| 193 | |||
| 194 | /* As pointed out by Wei Dai <weidai@eskimo.com>, F() below can be | ||
| 195 | * simplified to the code in F_00_19. Wei attributes these optimisations | ||
| 196 | * to Peter Gutmann's SHS code, and he attributes it to Rich Schroeppel. | ||
| 197 | * #define F(x,y,z) (((x) & (y)) | ((~(x)) & (z))) | ||
| 198 | * I've just become aware of another tweak to be made, again from Wei Dai, | ||
| 199 | * in F_40_59, (x&a)|(y&a) -> (x|y)&a | ||
| 200 | */ | ||
| 201 | #define F_00_19(b,c,d) ((((c) ^ (d)) & (b)) ^ (d)) | ||
| 202 | #define F_20_39(b,c,d) ((b) ^ (c) ^ (d)) | ||
| 203 | #define F_40_59(b,c,d) (((b) & (c)) | (((b)|(c)) & (d))) | ||
| 204 | #define F_60_79(b,c,d) F_20_39(b,c,d) | ||
| 205 | |||
| 206 | #ifdef SHA_0 | ||
| 207 | #undef Xupdate | ||
| 208 | #define Xupdate(a,i,ia,ib,ic,id) X[(i)&0x0f]=(a)=\ | ||
| 209 | (ia[(i)&0x0f]^ib[((i)+2)&0x0f]^ic[((i)+8)&0x0f]^id[((i)+13)&0x0f]); | ||
| 210 | #endif | ||
| 211 | #ifdef SHA_1 | ||
| 212 | #undef Xupdate | ||
| 213 | #define Xupdate(a,i,ia,ib,ic,id) (a)=\ | ||
| 214 | (ia[(i)&0x0f]^ib[((i)+2)&0x0f]^ic[((i)+8)&0x0f]^id[((i)+13)&0x0f]);\ | ||
| 215 | X[(i)&0x0f]=(a)=ROTATE((a),1); | ||
| 216 | #endif | ||
| 217 | |||
| 218 | #define BODY_00_15(i,a,b,c,d,e,f,xa) \ | ||
| 219 | (f)=xa[i]+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | ||
| 220 | (b)=ROTATE((b),30); | ||
| 221 | |||
| 222 | #define BODY_16_19(i,a,b,c,d,e,f,xa,xb,xc,xd) \ | ||
| 223 | Xupdate(f,i,xa,xb,xc,xd); \ | ||
| 224 | (f)+=(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | ||
| 225 | (b)=ROTATE((b),30); | ||
| 226 | |||
| 227 | #define BODY_20_31(i,a,b,c,d,e,f,xa,xb,xc,xd) \ | ||
| 228 | Xupdate(f,i,xa,xb,xc,xd); \ | ||
| 229 | (f)+=(e)+K_20_39+ROTATE((a),5)+F_20_39((b),(c),(d)); \ | ||
| 230 | (b)=ROTATE((b),30); | ||
| 231 | |||
| 232 | #define BODY_32_39(i,a,b,c,d,e,f,xa) \ | ||
| 233 | Xupdate(f,i,xa,xa,xa,xa); \ | ||
| 234 | (f)+=(e)+K_20_39+ROTATE((a),5)+F_20_39((b),(c),(d)); \ | ||
| 235 | (b)=ROTATE((b),30); | ||
| 236 | |||
| 237 | #define BODY_40_59(i,a,b,c,d,e,f,xa) \ | ||
| 238 | Xupdate(f,i,xa,xa,xa,xa); \ | ||
| 239 | (f)+=(e)+K_40_59+ROTATE((a),5)+F_40_59((b),(c),(d)); \ | ||
| 240 | (b)=ROTATE((b),30); | ||
| 241 | |||
| 242 | #define BODY_60_79(i,a,b,c,d,e,f,xa) \ | ||
| 243 | Xupdate(f,i,xa,xa,xa,xa); \ | ||
| 244 | (f)=X[(i)&0x0f]+(e)+K_60_79+ROTATE((a),5)+F_60_79((b),(c),(d)); \ | ||
| 245 | (b)=ROTATE((b),30); | ||
| 246 | |||
