diff options
| author | jsing <> | 2023-07-08 07:58:25 +0000 |
|---|---|---|
| committer | jsing <> | 2023-07-08 07:58:25 +0000 |
| commit | df461b97942223971be70a60b9fd46902754373f (patch) | |
| tree | 4edbac709686175b8388fbe81440d63763c2c654 /src | |
| parent | 4eb1c2dc65dce42bad9e9a153aae65df2c10d7fa (diff) | |
| download | openbsd-df461b97942223971be70a60b9fd46902754373f.tar.gz openbsd-df461b97942223971be70a60b9fd46902754373f.tar.bz2 openbsd-df461b97942223971be70a60b9fd46902754373f.zip | |
Remove unused SHA-1 implementation.
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/sha/sha1.c | 87 |
1 files changed, 1 insertions, 86 deletions
diff --git a/src/lib/libcrypto/sha/sha1.c b/src/lib/libcrypto/sha/sha1.c index c4a280121c..77830e2c68 100644 --- a/src/lib/libcrypto/sha/sha1.c +++ b/src/lib/libcrypto/sha/sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: sha1.c,v 1.9 2023/07/08 07:52:25 jsing Exp $ */ | 1 | /* $OpenBSD: sha1.c,v 1.10 2023/07/08 07:58:25 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -105,7 +105,6 @@ void sha1_block_data_order(SHA_CTX *c, const void *p, size_t num); | |||
| 105 | #define F_40_59(b, c, d) (((b) & (c)) | (((b)|(c)) & (d))) | 105 | #define F_40_59(b, c, d) (((b) & (c)) | (((b)|(c)) & (d))) |
| 106 | #define F_60_79(b, c, d) F_20_39(b, c, d) | 106 | #define F_60_79(b, c, d) F_20_39(b, c, d) |
| 107 | 107 | ||
| 108 | #ifndef OPENSSL_SMALL_FOOTPRINT | ||
| 109 | 108 | ||
| 110 | #define BODY_00_15(i, a, b, c, d, e, f, xi) \ | 109 | #define BODY_00_15(i, a, b, c, d, e, f, xi) \ |
| 111 | (f)=xi+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | 110 | (f)=xi+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ |
| @@ -331,90 +330,6 @@ sha1_block_data_order(SHA_CTX *c, const void *p, size_t num) | |||
| 331 | } | 330 | } |
| 332 | #endif | 331 | #endif |
| 333 | 332 | ||
| 334 | #else /* OPENSSL_SMALL_FOOTPRINT */ | ||
| 335 | |||
| 336 | #define BODY_00_15(xi) do { \ | ||
| 337 | T=E+K_00_19+F_00_19(B, C, D); \ | ||
| 338 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
| 339 | A=ROTATE(A,5)+T+xi; } while(0) | ||
| 340 | |||
| 341 | #define BODY_16_19(xa, xb, xc, xd) do { \ | ||
| 342 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
| 343 | T+=E+K_00_19+F_00_19(B, C, D); \ | ||
| 344 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
| 345 | A=ROTATE(A,5)+T; } while(0) | ||
| 346 | |||
| 347 | #define BODY_20_39(xa, xb, xc, xd) do { \ | ||
| 348 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
| 349 | T+=E+K_20_39+F_20_39(B, C, D); \ | ||
| 350 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
| 351 | A=ROTATE(A,5)+T; } while(0) | ||
| 352 | |||
| 353 | #define BODY_40_59(xa, xb, xc, xd) do { \ | ||
| 354 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
| 355 | T+=E+K_40_59+F_40_59(B, C, D); \ | ||
| 356 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
| 357 | A=ROTATE(A,5)+T; } while(0) | ||
| 358 | |||
| 359 | #define BODY_60_79(xa, xb, xc, xd) do { \ | ||
| 360 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
| 361 | T=E+K_60_79+F_60_79(B, C, D); \ | ||
| 362 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
| 363 | A=ROTATE(A,5)+T+xa; } while(0) | ||
| 364 | |||
| 365 | #if !defined(SHA1_ASM) | ||
| 366 | static void | ||
| 367 | sha1_block_data_order(SHA_CTX *c, const void *p, size_t num) | ||
| 368 | { | ||
| 369 | const unsigned char *data = p; | ||
| 370 | unsigned MD32_REG_T A, B, C, D, E, T, l; | ||
| 371 | int i; | ||
| 372 | SHA_LONG X[16]; | ||
| 373 | |||
| 374 | A = c->h0; | ||
| 375 | B = c->h1; | ||
| 376 | C = c->h2; | ||
| 377 | D = c->h3; | ||
| 378 | E = c->h4; | ||
| 379 | |||
| 380 | for (;;) { | ||
| 381 | for (i = 0; i < 16; i++) { | ||
| 382 | HOST_c2l(data, l); | ||
| 383 | X[i] = l; | ||
| 384 | BODY_00_15(X[i]); | ||
| 385 | } | ||
| 386 | for (i = 0; i < 4; i++) { | ||
| 387 | BODY_16_19(X[i], X[i + 2], X[i + 8], X[(i + 13)&15]); | ||
| 388 | } | ||
| 389 | for (; i < 24; i++) { | ||
| 390 | BODY_20_39(X[i&15], X[(i + 2)&15], X[(i + 8)&15], X[(i + 13)&15]); | ||
| 391 | } | ||
| 392 | for (i = 0; i < 20; i++) { | ||
| 393 | BODY_40_59(X[(i + 8)&15], X[(i + 10)&15], X[i&15], X[(i + 5)&15]); | ||
| 394 | } | ||
| 395 | for (i = 4; i < 24; i++) { | ||
| 396 | BODY_60_79(X[(i + 8)&15], X[(i + 10)&15], X[i&15], X[(i + 5)&15]); | ||
| 397 | } | ||
| 398 | |||
| 399 | c->h0 = (c->h0 + A)&0xffffffffL; | ||
| 400 | c->h1 = (c->h1 + B)&0xffffffffL; | ||
| 401 | c->h2 = (c->h2 + C)&0xffffffffL; | ||
| 402 | c->h3 = (c->h3 + D)&0xffffffffL; | ||
| 403 | c->h4 = (c->h4 + E)&0xffffffffL; | ||
| 404 | |||
| 405 | if (--num == 0) | ||
| 406 | break; | ||
| 407 | |||
| 408 | A = c->h0; | ||
| 409 | B = c->h1; | ||
| 410 | C = c->h2; | ||
| 411 | D = c->h3; | ||
| 412 | E = c->h4; | ||
| 413 | |||
| 414 | } | ||
| 415 | } | ||
| 416 | #endif | ||
| 417 | #endif | ||
| 418 | 333 | ||
| 419 | int | 334 | int |
| 420 | SHA1_Init(SHA_CTX *c) | 335 | SHA1_Init(SHA_CTX *c) |
