diff options
author | jsing <> | 2023-07-08 07:58:25 +0000 |
---|---|---|
committer | jsing <> | 2023-07-08 07:58:25 +0000 |
commit | df461b97942223971be70a60b9fd46902754373f (patch) | |
tree | 4edbac709686175b8388fbe81440d63763c2c654 /src | |
parent | 4eb1c2dc65dce42bad9e9a153aae65df2c10d7fa (diff) | |
download | openbsd-df461b97942223971be70a60b9fd46902754373f.tar.gz openbsd-df461b97942223971be70a60b9fd46902754373f.tar.bz2 openbsd-df461b97942223971be70a60b9fd46902754373f.zip |
Remove unused SHA-1 implementation.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/sha/sha1.c | 87 |
1 files changed, 1 insertions, 86 deletions
diff --git a/src/lib/libcrypto/sha/sha1.c b/src/lib/libcrypto/sha/sha1.c index c4a280121c..77830e2c68 100644 --- a/src/lib/libcrypto/sha/sha1.c +++ b/src/lib/libcrypto/sha/sha1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sha1.c,v 1.9 2023/07/08 07:52:25 jsing Exp $ */ | 1 | /* $OpenBSD: sha1.c,v 1.10 2023/07/08 07:58:25 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -105,7 +105,6 @@ void sha1_block_data_order(SHA_CTX *c, const void *p, size_t num); | |||
105 | #define F_40_59(b, c, d) (((b) & (c)) | (((b)|(c)) & (d))) | 105 | #define F_40_59(b, c, d) (((b) & (c)) | (((b)|(c)) & (d))) |
106 | #define F_60_79(b, c, d) F_20_39(b, c, d) | 106 | #define F_60_79(b, c, d) F_20_39(b, c, d) |
107 | 107 | ||
108 | #ifndef OPENSSL_SMALL_FOOTPRINT | ||
109 | 108 | ||
110 | #define BODY_00_15(i, a, b, c, d, e, f, xi) \ | 109 | #define BODY_00_15(i, a, b, c, d, e, f, xi) \ |
111 | (f)=xi+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | 110 | (f)=xi+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ |
@@ -331,90 +330,6 @@ sha1_block_data_order(SHA_CTX *c, const void *p, size_t num) | |||
331 | } | 330 | } |
332 | #endif | 331 | #endif |
333 | 332 | ||
334 | #else /* OPENSSL_SMALL_FOOTPRINT */ | ||
335 | |||
336 | #define BODY_00_15(xi) do { \ | ||
337 | T=E+K_00_19+F_00_19(B, C, D); \ | ||
338 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
339 | A=ROTATE(A,5)+T+xi; } while(0) | ||
340 | |||
341 | #define BODY_16_19(xa, xb, xc, xd) do { \ | ||
342 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
343 | T+=E+K_00_19+F_00_19(B, C, D); \ | ||
344 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
345 | A=ROTATE(A,5)+T; } while(0) | ||
346 | |||
347 | #define BODY_20_39(xa, xb, xc, xd) do { \ | ||
348 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
349 | T+=E+K_20_39+F_20_39(B, C, D); \ | ||
350 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
351 | A=ROTATE(A,5)+T; } while(0) | ||
352 | |||
353 | #define BODY_40_59(xa, xb, xc, xd) do { \ | ||
354 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
355 | T+=E+K_40_59+F_40_59(B, C, D); \ | ||
356 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
357 | A=ROTATE(A,5)+T; } while(0) | ||
358 | |||
359 | #define BODY_60_79(xa, xb, xc, xd) do { \ | ||
360 | Xupdate(T, xa, xa, xb, xc, xd); \ | ||
361 | T=E+K_60_79+F_60_79(B, C, D); \ | ||
362 | E=D, D=C, C=ROTATE(B,30), B=A; \ | ||
363 | A=ROTATE(A,5)+T+xa; } while(0) | ||
364 | |||
365 | #if !defined(SHA1_ASM) | ||
366 | static void | ||
367 | sha1_block_data_order(SHA_CTX *c, const void *p, size_t num) | ||
368 | { | ||
369 | const unsigned char *data = p; | ||
370 | unsigned MD32_REG_T A, B, C, D, E, T, l; | ||
371 | int i; | ||
372 | SHA_LONG X[16]; | ||
373 | |||
374 | A = c->h0; | ||
375 | B = c->h1; | ||
376 | C = c->h2; | ||
377 | D = c->h3; | ||
378 | E = c->h4; | ||
379 | |||
380 | for (;;) { | ||
381 | for (i = 0; i < 16; i++) { | ||
382 | HOST_c2l(data, l); | ||
383 | X[i] = l; | ||
384 | BODY_00_15(X[i]); | ||
385 | } | ||
386 | for (i = 0; i < 4; i++) { | ||
387 | BODY_16_19(X[i], X[i + 2], X[i + 8], X[(i + 13)&15]); | ||
388 | } | ||
389 | for (; i < 24; i++) { | ||
390 | BODY_20_39(X[i&15], X[(i + 2)&15], X[(i + 8)&15], X[(i + 13)&15]); | ||
391 | } | ||
392 | for (i = 0; i < 20; i++) { | ||
393 | BODY_40_59(X[(i + 8)&15], X[(i + 10)&15], X[i&15], X[(i + 5)&15]); | ||
394 | } | ||
395 | for (i = 4; i < 24; i++) { | ||
396 | BODY_60_79(X[(i + 8)&15], X[(i + 10)&15], X[i&15], X[(i + 5)&15]); | ||
397 | } | ||
398 | |||
399 | c->h0 = (c->h0 + A)&0xffffffffL; | ||
400 | c->h1 = (c->h1 + B)&0xffffffffL; | ||
401 | c->h2 = (c->h2 + C)&0xffffffffL; | ||
402 | c->h3 = (c->h3 + D)&0xffffffffL; | ||
403 | c->h4 = (c->h4 + E)&0xffffffffL; | ||
404 | |||
405 | if (--num == 0) | ||
406 | break; | ||
407 | |||
408 | A = c->h0; | ||
409 | B = c->h1; | ||
410 | C = c->h2; | ||
411 | D = c->h3; | ||
412 | E = c->h4; | ||
413 | |||
414 | } | ||
415 | } | ||
416 | #endif | ||
417 | #endif | ||
418 | 333 | ||
419 | int | 334 | int |
420 | SHA1_Init(SHA_CTX *c) | 335 | SHA1_Init(SHA_CTX *c) |