diff options
Diffstat (limited to 'src/lib/libcrypto/sha')
-rw-r--r-- | src/lib/libcrypto/sha/asm/sha1-586.pl | 540 | ||||
-rw-r--r-- | src/lib/libcrypto/sha/sha.h | 119 | ||||
-rw-r--r-- | src/lib/libcrypto/sha/sha1_one.c | 76 | ||||
-rw-r--r-- | src/lib/libcrypto/sha/sha1dgst.c | 73 | ||||
-rw-r--r-- | src/lib/libcrypto/sha/sha_locl.h | 471 |
5 files changed, 0 insertions, 1279 deletions
diff --git a/src/lib/libcrypto/sha/asm/sha1-586.pl b/src/lib/libcrypto/sha/asm/sha1-586.pl deleted file mode 100644 index fe51fd0794..0000000000 --- a/src/lib/libcrypto/sha/asm/sha1-586.pl +++ /dev/null | |||
@@ -1,540 +0,0 @@ | |||
1 | #!/usr/local/bin/perl | ||
2 | |||
3 | $normal=0; | ||
4 | |||
5 | push(@INC,"perlasm","../../perlasm"); | ||
6 | require "x86asm.pl"; | ||
7 | |||
8 | &asm_init($ARGV[0],"sha1-586.pl",$ARGV[$#ARGV] eq "386"); | ||
9 | |||
10 | $A="eax"; | ||
11 | $B="ecx"; | ||
12 | $C="ebx"; | ||
13 | $D="edx"; | ||
14 | $E="edi"; | ||
15 | $T="esi"; | ||
16 | $tmp1="ebp"; | ||
17 | |||
18 | $off=9*4; | ||
19 | |||
20 | @K=(0x5a827999,0x6ed9eba1,0x8f1bbcdc,0xca62c1d6); | ||
21 | |||
22 | &sha1_block_data("sha1_block_asm_data_order"); | ||
23 | |||
24 | &asm_finish(); | ||
25 | |||
26 | sub Nn | ||
27 | { | ||
28 | local($p)=@_; | ||
29 | local(%n)=($A,$T,$B,$A,$C,$B,$D,$C,$E,$D,$T,$E); | ||
30 | return($n{$p}); | ||
31 | } | ||
32 | |||
33 | sub Np | ||
34 | { | ||
35 | local($p)=@_; | ||
36 | local(%n)=($A,$T,$B,$A,$C,$B,$D,$C,$E,$D,$T,$E); | ||
37 | local(%n)=($A,$B,$B,$C,$C,$D,$D,$E,$E,$T,$T,$A); | ||
38 | return($n{$p}); | ||
39 | } | ||
40 | |||
41 | sub Na | ||
42 | { | ||
43 | local($n)=@_; | ||
44 | return( (($n )&0x0f), | ||
45 | (($n+ 2)&0x0f), | ||
46 | (($n+ 8)&0x0f), | ||
47 | (($n+13)&0x0f), | ||
48 | (($n+ 1)&0x0f)); | ||
49 | } | ||
50 | |||
51 | sub X_expand | ||
52 | { | ||
53 | local($in)=@_; | ||
54 | |||
55 | &comment("First, load the words onto the stack in network byte order"); | ||
56 | for ($i=0; $i<16; $i+=2) | ||
57 | { | ||
58 | &mov($A,&DWP(($i+0)*4,$in,"",0));# unless $i == 0; | ||
59 | &mov($B,&DWP(($i+1)*4,$in,"",0)); | ||
60 | &bswap($A); | ||
61 | &bswap($B); | ||
62 | &mov(&swtmp($i+0),$A); | ||
63 | &mov(&swtmp($i+1),$B); | ||
64 | } | ||
65 | |||
66 | &comment("We now have the X array on the stack"); | ||
67 | &comment("starting at sp-4"); | ||
68 | } | ||
69 | |||
70 | # Rules of engagement | ||
71 | # F is always trashable at the start, the running total. | ||
72 | # E becomes the next F so it can be trashed after it has been 'accumulated' | ||
73 | # F becomes A in the next round. We don't need to access it much. | ||
74 | # During the X update part, the result ends up in $X[$n0]. | ||
75 | |||
76 | sub BODY_00_15 | ||
77 | { | ||
78 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
79 | |||
80 | return if $n & 1; | ||
81 | &comment("00_15 $n"); | ||
82 | |||
83 | &mov($f,$c); | ||
84 | |||
85 | &mov($tmp1,$a); | ||
86 | &xor($f,$d); # F2 | ||
87 | |||
88 | &rotl($tmp1,5); # A2 | ||
89 | |||
90 | &and($f,$b); # F3 | ||
91 | &add($tmp1,$e); | ||
92 | |||
93 | &rotr($b,1); # B1 <- F | ||
94 | &mov($e,&swtmp($n)); # G1 | ||
95 | |||
96 | &rotr($b,1); # B1 <- F | ||
97 | &xor($f,$d); # F4 | ||
98 | |||
99 | &lea($tmp1,&DWP($K,$tmp1,$e,1)); | ||
100 | |||
101 | ############################ | ||
102 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
103 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
104 | $n++; | ||
105 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
106 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
107 | |||
108 | &mov($f,$c); | ||
109 | |||
110 | &add($a,$tmp1); # MOVED DOWN | ||
111 | &xor($f,$d); # F2 | ||
112 | |||
113 | &mov($tmp1,$a); | ||
114 | &and($f,$b); # F3 | ||
115 | |||
116 | &rotl($tmp1,5); # A2 | ||
117 | |||
118 | &add($tmp1,$e); | ||
119 | &mov($e,&swtmp($n)); # G1 | ||
120 | |||
121 | &rotr($b,1); # B1 <- F | ||
122 | &xor($f,$d); # F4 | ||
123 | |||
124 | &rotr($b,1); # B1 <- F | ||
125 | &lea($tmp1,&DWP($K,$tmp1,$e,1)); | ||
126 | |||
127 | &add($f,$tmp1); | ||
128 | } | ||
129 | |||
130 | sub BODY_16_19 | ||
131 | { | ||
132 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
133 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
134 | |||
135 | return if $n & 1; | ||
136 | &comment("16_19 $n"); | ||
137 | |||
138 | &nop() if ($pos < 0); | ||
139 | &mov($tmp1,&swtmp($n0)); # X1 | ||
140 | &mov($f,&swtmp($n1)); # X2 | ||
141 | &xor($f,$tmp1); # X3 | ||
142 | &mov($tmp1,&swtmp($n2)); # X4 | ||
143 | &xor($f,$tmp1); # X5 | ||
144 | &mov($tmp1,&swtmp($n3)); # X6 | ||
145 | &xor($f,$tmp1); # X7 - slot | ||
146 | &mov($tmp1,$c); # F1 | ||
147 | &rotl($f,1); # X8 - slot | ||
148 | &xor($tmp1,$d); # F2 | ||
149 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
150 | &and($tmp1,$b); # F3 | ||
151 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
152 | &xor($tmp1,$d); # F4 | ||
153 | &mov($e,$a); # A1 | ||
154 | &add($f,$tmp1); # tot+=F(); | ||
155 | |||
156 | &rotl($e,5); # A2 | ||
157 | |||
158 | &rotr($b,1); # B1 <- F | ||
159 | &add($f,$e); # tot+=a | ||
160 | |||
161 | ############################ | ||
162 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
163 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
164 | $n++; | ||
165 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
166 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
167 | |||
168 | |||
169 | &mov($f,&swtmp($n0)); # X1 | ||
170 | &mov($tmp1,&swtmp($n1)); # X2 | ||
171 | &xor($f,$tmp1); # X3 | ||
172 | &mov($tmp1,&swtmp($n2)); # X4 | ||
173 | &xor($f,$tmp1); # X5 | ||
174 | &mov($tmp1,&swtmp($n3)); # X6 | ||
175 | &rotr($c,1); #&rotr($b,1); # B1 <- F # MOVED DOWN | ||
176 | &xor($f,$tmp1); # X7 - slot | ||
177 | &rotl($f,1); # X8 - slot | ||
178 | &mov($tmp1,$c); # F1 | ||
179 | &xor($tmp1,$d); # F2 | ||
180 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
181 | &and($tmp1,$b); # F3 | ||
182 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
183 | |||
184 | &xor($tmp1,$d); # F4 | ||
185 | &mov($e,$a); # A1 | ||
186 | |||
187 | &rotl($e,5); # A2 | ||
188 | |||
189 | &rotr($b,1); # B1 <- F | ||
190 | &add($f,$e); # tot+=a | ||
191 | |||
192 | &rotr($b,1); # B1 <- F | ||
193 | &add($f,$tmp1); # tot+=F(); | ||
194 | |||
195 | } | ||
196 | |||
197 | sub BODY_20_39 | ||
198 | { | ||
199 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
200 | |||
201 | &comment("20_39 $n"); | ||
202 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
203 | |||
204 | &mov($f,&swtmp($n0)); # X1 | ||
205 | &mov($tmp1,&swtmp($n1)); # X2 | ||
206 | &xor($f,$tmp1); # X3 | ||
207 | &mov($tmp1,&swtmp($n2)); # X4 | ||
208 | &xor($f,$tmp1); # X5 | ||
209 | &mov($tmp1,&swtmp($n3)); # X6 | ||
210 | &xor($f,$tmp1); # X7 - slot | ||
211 | &mov($tmp1,$b); # F1 | ||
212 | &rotl($f,1); # X8 - slot | ||
213 | &xor($tmp1,$c); # F2 | ||
214 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
215 | &xor($tmp1,$d); # F3 | ||
216 | |||
217 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
218 | &mov($e,$a); # A1 | ||
219 | |||
220 | &rotl($e,5); # A2 | ||
221 | |||
222 | if ($n != 79) # last loop | ||
223 | { | ||
224 | &rotr($b,1); # B1 <- F | ||
225 | &add($e,$tmp1); # tmp1=F()+a | ||
226 | |||
227 | &rotr($b,1); # B2 <- F | ||
228 | &add($f,$e); # tot+=tmp1; | ||
229 | } | ||
230 | else | ||
231 | { | ||
232 | &add($e,$tmp1); # tmp1=F()+a | ||
233 | &mov($tmp1,&wparam(0)); | ||
234 | |||
235 | &rotr($b,1); # B1 <- F | ||
236 | &add($f,$e); # tot+=tmp1; | ||
237 | |||
238 | &rotr($b,1); # B2 <- F | ||
239 | } | ||
240 | } | ||
241 | |||
242 | sub BODY_40_59 | ||
243 | { | ||
244 | local($pos,$K,$X,$n,$a,$b,$c,$d,$e,$f)=@_; | ||
245 | |||
246 | &comment("40_59 $n"); | ||
247 | return if $n & 1; | ||
248 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
249 | |||
250 | &mov($f,&swtmp($n0)); # X1 | ||
251 | &mov($tmp1,&swtmp($n1)); # X2 | ||
252 | &xor($f,$tmp1); # X3 | ||
253 | &mov($tmp1,&swtmp($n2)); # X4 | ||
254 | &xor($f,$tmp1); # X5 | ||
255 | &mov($tmp1,&swtmp($n3)); # X6 | ||
256 | &xor($f,$tmp1); # X7 - slot | ||
257 | &mov($tmp1,$b); # F1 | ||
258 | &rotl($f,1); # X8 - slot | ||
259 | &or($tmp1,$c); # F2 | ||
260 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
261 | &and($tmp1,$d); # F3 | ||
262 | |||
263 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
264 | &mov($e,$b); # F4 | ||
265 | |||
266 | &rotr($b,1); # B1 <- F | ||
267 | &and($e,$c); # F5 | ||
268 | |||
269 | &or($tmp1,$e); # F6 | ||
270 | &mov($e,$a); # A1 | ||
271 | |||
272 | &rotl($e,5); # A2 | ||
273 | |||
274 | &add($tmp1,$e); # tmp1=F()+a | ||
275 | |||
276 | ############################ | ||
277 | # &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
278 | # &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
279 | $n++; | ||
280 | local($n0,$n1,$n2,$n3,$np)=&Na($n); | ||
281 | ($b,$c,$d,$e,$f,$a)=($a,$b,$c,$d,$e,$f); | ||
282 | |||
283 | &mov($f,&swtmp($n0)); # X1 | ||
284 | &add($a,$tmp1); # tot+=tmp1; # moved was add f,tmp1 | ||
285 | &mov($tmp1,&swtmp($n1)); # X2 | ||
286 | &xor($f,$tmp1); # X3 | ||
287 | &mov($tmp1,&swtmp($n2)); # X4 | ||
288 | &xor($f,$tmp1); # X5 | ||
289 | &mov($tmp1,&swtmp($n3)); # X6 | ||
290 | &rotr($c,1); # B2 <- F # moved was rotr b,1 | ||
291 | &xor($f,$tmp1); # X7 - slot | ||
292 | &rotl($f,1); # X8 - slot | ||
293 | &mov($tmp1,$b); # F1 | ||
294 | &mov(&swtmp($n0),$f); # X9 - anytime | ||
295 | &or($tmp1,$c); # F2 | ||
296 | &lea($f,&DWP($K,$f,$e,1)); # tot=X+K+e | ||
297 | &mov($e,$b); # F4 | ||
298 | &and($tmp1,$d); # F3 | ||
299 | &and($e,$c); # F5 | ||
300 | |||
301 | &or($tmp1,$e); # F6 | ||
302 | &mov($e,$a); # A1 | ||
303 | |||
304 | &rotl($e,5); # A2 | ||
305 | |||
306 | &rotr($b,1); # B1 <- F | ||
307 | &add($tmp1,$e); # tmp1=F()+a | ||
308 | |||
309 | &rotr($b,1); # B2 <- F | ||
310 | &add($f,$tmp1); # tot+=tmp1; | ||
311 | } | ||
312 | |||
313 | sub BODY_60_79 | ||
314 | { | ||
315 | &BODY_20_39(@_); | ||
316 | } | ||
317 | |||
318 | sub sha1_block_host | ||
319 | { | ||
320 | local($name, $sclabel)=@_; | ||
321 | |||
322 | &function_begin_B($name,""); | ||
323 | |||
324 | # parameter 1 is the MD5_CTX structure. | ||
325 | # A 0 | ||
326 | # B 4 | ||
327 | # C 8 | ||
328 | # D 12 | ||
329 | # E 16 | ||
330 | |||
331 | &mov("ecx", &wparam(2)); | ||
332 | &push("esi"); | ||
333 | &shl("ecx",6); | ||
334 | &mov("esi", &wparam(1)); | ||
335 | &push("ebp"); | ||
336 | &add("ecx","esi"); # offset to leave on | ||
337 | &push("ebx"); | ||
338 | &mov("ebp", &wparam(0)); | ||
339 | &push("edi"); | ||
340 | &mov($D, &DWP(12,"ebp","",0)); | ||
341 | &stack_push(18+9); | ||
342 | &mov($E, &DWP(16,"ebp","",0)); | ||
343 | &mov($C, &DWP( 8,"ebp","",0)); | ||
344 | &mov(&swtmp(17),"ecx"); | ||
345 | |||
346 | &comment("First we need to setup the X array"); | ||
347 | |||
348 | for ($i=0; $i<16; $i+=2) | ||
349 | { | ||
350 | &mov($A,&DWP(($i+0)*4,"esi","",0));# unless $i == 0; | ||
351 | &mov($B,&DWP(($i+1)*4,"esi","",0)); | ||
352 | &mov(&swtmp($i+0),$A); | ||
353 | &mov(&swtmp($i+1),$B); | ||
354 | } | ||
355 | &jmp($sclabel); | ||
356 | &function_end_B($name); | ||
357 | } | ||
358 | |||
359 | |||
360 | sub sha1_block_data | ||
361 | { | ||
362 | local($name)=@_; | ||
363 | |||
364 | &function_begin_B($name,""); | ||
365 | |||
366 | # parameter 1 is the MD5_CTX structure. | ||
367 | # A 0 | ||
368 | # B 4 | ||
369 | # C 8 | ||
370 | # D 12 | ||
371 | # E 16 | ||
372 | |||
373 | &mov("ecx", &wparam(2)); | ||
374 | &push("esi"); | ||
375 | &shl("ecx",6); | ||
376 | &mov("esi", &wparam(1)); | ||
377 | &push("ebp"); | ||
378 | &add("ecx","esi"); # offset to leave on | ||
379 | &push("ebx"); | ||
380 | &mov("ebp", &wparam(0)); | ||
381 | &push("edi"); | ||
382 | &mov($D, &DWP(12,"ebp","",0)); | ||
383 | &stack_push(18+9); | ||
384 | &mov($E, &DWP(16,"ebp","",0)); | ||
385 | &mov($C, &DWP( 8,"ebp","",0)); | ||
386 | &mov(&swtmp(17),"ecx"); | ||
387 | |||
388 | &comment("First we need to setup the X array"); | ||
389 | |||
390 | &set_label("start") unless $normal; | ||
391 | |||
392 | &X_expand("esi"); | ||
393 | &mov(&wparam(1),"esi"); | ||
394 | |||
395 | &set_label("shortcut", 0, 1); | ||
396 | &comment(""); | ||
397 | &comment("Start processing"); | ||
398 | |||
399 | # odd start | ||
400 | &mov($A, &DWP( 0,"ebp","",0)); | ||
401 | &mov($B, &DWP( 4,"ebp","",0)); | ||
402 | $X="esp"; | ||
403 | &BODY_00_15(-2,$K[0],$X, 0,$A,$B,$C,$D,$E,$T); | ||
404 | &BODY_00_15( 0,$K[0],$X, 1,$T,$A,$B,$C,$D,$E); | ||
405 | &BODY_00_15( 0,$K[0],$X, 2,$E,$T,$A,$B,$C,$D); | ||
406 | &BODY_00_15( 0,$K[0],$X, 3,$D,$E,$T,$A,$B,$C); | ||
407 | &BODY_00_15( 0,$K[0],$X, 4,$C,$D,$E,$T,$A,$B); | ||
408 | &BODY_00_15( 0,$K[0],$X, 5,$B,$C,$D,$E,$T,$A); | ||
409 | &BODY_00_15( 0,$K[0],$X, 6,$A,$B,$C,$D,$E,$T); | ||
410 | &BODY_00_15( 0,$K[0],$X, 7,$T,$A,$B,$C,$D,$E); | ||
411 | &BODY_00_15( 0,$K[0],$X, 8,$E,$T,$A,$B,$C,$D); | ||
412 | &BODY_00_15( 0,$K[0],$X, 9,$D,$E,$T,$A,$B,$C); | ||
413 | &BODY_00_15( 0,$K[0],$X,10,$C,$D,$E,$T,$A,$B); | ||
414 | &BODY_00_15( 0,$K[0],$X,11,$B,$C,$D,$E,$T,$A); | ||
415 | &BODY_00_15( 0,$K[0],$X,12,$A,$B,$C,$D,$E,$T); | ||
416 | &BODY_00_15( 0,$K[0],$X,13,$T,$A,$B,$C,$D,$E); | ||
417 | &BODY_00_15( 0,$K[0],$X,14,$E,$T,$A,$B,$C,$D); | ||
418 | &BODY_00_15( 1,$K[0],$X,15,$D,$E,$T,$A,$B,$C); | ||
419 | &BODY_16_19(-1,$K[0],$X,16,$C,$D,$E,$T,$A,$B); | ||
420 | &BODY_16_19( 0,$K[0],$X,17,$B,$C,$D,$E,$T,$A); | ||
421 | &BODY_16_19( 0,$K[0],$X,18,$A,$B,$C,$D,$E,$T); | ||
422 | &BODY_16_19( 1,$K[0],$X,19,$T,$A,$B,$C,$D,$E); | ||
423 | |||
424 | &BODY_20_39(-1,$K[1],$X,20,$E,$T,$A,$B,$C,$D); | ||
425 | &BODY_20_39( 0,$K[1],$X,21,$D,$E,$T,$A,$B,$C); | ||
426 | &BODY_20_39( 0,$K[1],$X,22,$C,$D,$E,$T,$A,$B); | ||
427 | &BODY_20_39( 0,$K[1],$X,23,$B,$C,$D,$E,$T,$A); | ||
428 | &BODY_20_39( 0,$K[1],$X,24,$A,$B,$C,$D,$E,$T); | ||
429 | &BODY_20_39( 0,$K[1],$X,25,$T,$A,$B,$C,$D,$E); | ||
430 | &BODY_20_39( 0,$K[1],$X,26,$E,$T,$A,$B,$C,$D); | ||
431 | &BODY_20_39( 0,$K[1],$X,27,$D,$E,$T,$A,$B,$C); | ||
432 | &BODY_20_39( 0,$K[1],$X,28,$C,$D,$E,$T,$A,$B); | ||
433 | &BODY_20_39( 0,$K[1],$X,29,$B,$C,$D,$E,$T,$A); | ||
434 | &BODY_20_39( 0,$K[1],$X,30,$A,$B,$C,$D,$E,$T); | ||
435 | &BODY_20_39( 0,$K[1],$X,31,$T,$A,$B,$C,$D,$E); | ||
436 | &BODY_20_39( 0,$K[1],$X,32,$E,$T,$A,$B,$C,$D); | ||
437 | &BODY_20_39( 0,$K[1],$X,33,$D,$E,$T,$A,$B,$C); | ||
438 | &BODY_20_39( 0,$K[1],$X,34,$C,$D,$E,$T,$A,$B); | ||
439 | &BODY_20_39( 0,$K[1],$X,35,$B,$C,$D,$E,$T,$A); | ||
440 | &BODY_20_39( 0,$K[1],$X,36,$A,$B,$C,$D,$E,$T); | ||
441 | &BODY_20_39( 0,$K[1],$X,37,$T,$A,$B,$C,$D,$E); | ||
442 | &BODY_20_39( 0,$K[1],$X,38,$E,$T,$A,$B,$C,$D); | ||
443 | &BODY_20_39( 1,$K[1],$X,39,$D,$E,$T,$A,$B,$C); | ||
444 | |||
445 | &BODY_40_59(-1,$K[2],$X,40,$C,$D,$E,$T,$A,$B); | ||
446 | &BODY_40_59( 0,$K[2],$X,41,$B,$C,$D,$E,$T,$A); | ||
447 | &BODY_40_59( 0,$K[2],$X,42,$A,$B,$C,$D,$E,$T); | ||
448 | &BODY_40_59( 0,$K[2],$X,43,$T,$A,$B,$C,$D,$E); | ||
449 | &BODY_40_59( 0,$K[2],$X,44,$E,$T,$A,$B,$C,$D); | ||
450 | &BODY_40_59( 0,$K[2],$X,45,$D,$E,$T,$A,$B,$C); | ||
451 | &BODY_40_59( 0,$K[2],$X,46,$C,$D,$E,$T,$A,$B); | ||
452 | &BODY_40_59( 0,$K[2],$X,47,$B,$C,$D,$E,$T,$A); | ||
453 | &BODY_40_59( 0,$K[2],$X,48,$A,$B,$C,$D,$E,$T); | ||
454 | &BODY_40_59( 0,$K[2],$X,49,$T,$A,$B,$C,$D,$E); | ||
455 | &BODY_40_59( 0,$K[2],$X,50,$E,$T,$A,$B,$C,$D); | ||
456 | &BODY_40_59( 0,$K[2],$X,51,$D,$E,$T,$A,$B,$C); | ||
457 | &BODY_40_59( 0,$K[2],$X,52,$C,$D,$E,$T,$A,$B); | ||
458 | &BODY_40_59( 0,$K[2],$X,53,$B,$C,$D,$E,$T,$A); | ||
459 | &BODY_40_59( 0,$K[2],$X,54,$A,$B,$C,$D,$E,$T); | ||
460 | &BODY_40_59( 0,$K[2],$X,55,$T,$A,$B,$C,$D,$E); | ||
461 | &BODY_40_59( 0,$K[2],$X,56,$E,$T,$A,$B,$C,$D); | ||
462 | &BODY_40_59( 0,$K[2],$X,57,$D,$E,$T,$A,$B,$C); | ||
463 | &BODY_40_59( 0,$K[2],$X,58,$C,$D,$E,$T,$A,$B); | ||
464 | &BODY_40_59( 1,$K[2],$X,59,$B,$C,$D,$E,$T,$A); | ||
465 | |||
466 | &BODY_60_79(-1,$K[3],$X,60,$A,$B,$C,$D,$E,$T); | ||
467 | &BODY_60_79( 0,$K[3],$X,61,$T,$A,$B,$C,$D,$E); | ||
468 | &BODY_60_79( 0,$K[3],$X,62,$E,$T,$A,$B,$C,$D); | ||
469 | &BODY_60_79( 0,$K[3],$X,63,$D,$E,$T,$A,$B,$C); | ||
470 | &BODY_60_79( 0,$K[3],$X,64,$C,$D,$E,$T,$A,$B); | ||
471 | &BODY_60_79( 0,$K[3],$X,65,$B,$C,$D,$E,$T,$A); | ||
472 | &BODY_60_79( 0,$K[3],$X,66,$A,$B,$C,$D,$E,$T); | ||
473 | &BODY_60_79( 0,$K[3],$X,67,$T,$A,$B,$C,$D,$E); | ||
474 | &BODY_60_79( 0,$K[3],$X,68,$E,$T,$A,$B,$C,$D); | ||
475 | &BODY_60_79( 0,$K[3],$X,69,$D,$E,$T,$A,$B,$C); | ||
476 | &BODY_60_79( 0,$K[3],$X,70,$C,$D,$E,$T,$A,$B); | ||
477 | &BODY_60_79( 0,$K[3],$X,71,$B,$C,$D,$E,$T,$A); | ||
478 | &BODY_60_79( 0,$K[3],$X,72,$A,$B,$C,$D,$E,$T); | ||
479 | &BODY_60_79( 0,$K[3],$X,73,$T,$A,$B,$C,$D,$E); | ||
480 | &BODY_60_79( 0,$K[3],$X,74,$E,$T,$A,$B,$C,$D); | ||
481 | &BODY_60_79( 0,$K[3],$X,75,$D,$E,$T,$A,$B,$C); | ||
482 | &BODY_60_79( 0,$K[3],$X,76,$C,$D,$E,$T,$A,$B); | ||
483 | &BODY_60_79( 0,$K[3],$X,77,$B,$C,$D,$E,$T,$A); | ||
484 | &BODY_60_79( 0,$K[3],$X,78,$A,$B,$C,$D,$E,$T); | ||
485 | &BODY_60_79( 2,$K[3],$X,79,$T,$A,$B,$C,$D,$E); | ||
486 | |||
487 | &comment("End processing"); | ||
488 | &comment(""); | ||
489 | # D is the tmp value | ||
490 | |||
491 | # E -> A | ||
492 | # T -> B | ||
493 | # A -> C | ||
494 | # B -> D | ||
495 | # C -> E | ||
496 | # D -> T | ||
497 | |||
498 | # The last 2 have been moved into the last loop | ||
499 | # &mov($tmp1,&wparam(0)); | ||
500 | |||
501 | &mov($D, &DWP(12,$tmp1,"",0)); | ||
502 | &add($D,$B); | ||
503 | &mov($B, &DWP( 4,$tmp1,"",0)); | ||
504 | &add($B,$T); | ||
505 | &mov($T, $A); | ||
506 | &mov($A, &DWP( 0,$tmp1,"",0)); | ||
507 | &mov(&DWP(12,$tmp1,"",0),$D); | ||
508 | |||
509 | &add($A,$E); | ||
510 | &mov($E, &DWP(16,$tmp1,"",0)); | ||
511 | &add($E,$C); | ||
512 | &mov($C, &DWP( 8,$tmp1,"",0)); | ||
513 | &add($C,$T); | ||
514 | |||
515 | &mov(&DWP( 0,$tmp1,"",0),$A); | ||
516 | &mov("esi",&wparam(1)); | ||
517 | &mov(&DWP( 8,$tmp1,"",0),$C); | ||
518 | &add("esi",64); | ||
519 | &mov("eax",&swtmp(17)); | ||
520 | &mov(&DWP(16,$tmp1,"",0),$E); | ||
521 | &cmp("esi","eax"); | ||
522 | &mov(&DWP( 4,$tmp1,"",0),$B); | ||
523 | &jl(&label("start")); | ||
524 | |||
525 | &stack_pop(18+9); | ||
526 | &pop("edi"); | ||
527 | &pop("ebx"); | ||
528 | &pop("ebp"); | ||
529 | &pop("esi"); | ||
530 | &ret(); | ||
531 | |||
532 | # keep a note of shortcut label so it can be used outside | ||
533 | # block. | ||
534 | my $sclabel = &label("shortcut"); | ||
535 | |||
536 | &function_end_B($name); | ||
537 | # Putting this here avoids problems with MASM in debugging mode | ||
538 | &sha1_block_host("sha1_block_asm_host_order", $sclabel); | ||
539 | } | ||
540 | |||
diff --git a/src/lib/libcrypto/sha/sha.h b/src/lib/libcrypto/sha/sha.h deleted file mode 100644 index 77f6d9695e..0000000000 --- a/src/lib/libcrypto/sha/sha.h +++ /dev/null | |||
@@ -1,119 +0,0 @@ | |||
1 | /* crypto/sha/sha.h */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #ifndef HEADER_SHA_H | ||
60 | #define HEADER_SHA_H | ||
61 | |||
62 | #ifdef __cplusplus | ||
63 | extern "C" { | ||
64 | #endif | ||
65 | |||
66 | #if defined(NO_SHA) || (defined(NO_SHA0) && defined(NO_SHA1)) | ||
67 | #error SHA is disabled. | ||
68 | #endif | ||
69 | |||
70 | /* | ||
71 | * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! | ||
72 | * ! SHA_LONG has to be at least 32 bits wide. If it's wider, then ! | ||
73 | * ! SHA_LONG_LOG2 has to be defined along. ! | ||
74 | * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! | ||
75 | */ | ||
76 | |||
77 | #if defined(WIN16) || defined(__LP32__) | ||
78 | #define SHA_LONG unsigned long | ||
79 | #elif defined(_CRAY) || defined(__ILP64__) | ||
80 | #define SHA_LONG unsigned long | ||
81 | #define SHA_LONG_LOG2 3 | ||
82 | #else | ||
83 | #define SHA_LONG unsigned int | ||
84 | #endif | ||
85 | |||
86 | #define SHA_LBLOCK 16 | ||
87 | #define SHA_CBLOCK (SHA_LBLOCK*4) /* SHA treats input data as a | ||
88 | * contiguous array of 32 bit | ||
89 | * wide big-endian values. */ | ||
90 | #define SHA_LAST_BLOCK (SHA_CBLOCK-8) | ||
91 | #define SHA_DIGEST_LENGTH 20 | ||
92 | |||
93 | typedef struct SHAstate_st | ||
94 | { | ||
95 | SHA_LONG h0,h1,h2,h3,h4; | ||
96 | SHA_LONG Nl,Nh; | ||
97 | SHA_LONG data[SHA_LBLOCK]; | ||
98 | int num; | ||
99 | } SHA_CTX; | ||
100 | |||
101 | #ifndef NO_SHA0 | ||
102 | void SHA_Init(SHA_CTX *c); | ||
103 | void SHA_Update(SHA_CTX *c, const void *data, unsigned long len); | ||
104 | void SHA_Final(unsigned char *md, SHA_CTX *c); | ||
105 | unsigned char *SHA(const unsigned char *d, unsigned long n,unsigned char *md); | ||
106 | void SHA_Transform(SHA_CTX *c, const unsigned char *data); | ||
107 | #endif | ||
108 | #ifndef NO_SHA1 | ||
109 | void SHA1_Init(SHA_CTX *c); | ||
110 | void SHA1_Update(SHA_CTX *c, const void *data, unsigned long len); | ||
111 | void SHA1_Final(unsigned char *md, SHA_CTX *c); | ||
112 | unsigned char *SHA1(const unsigned char *d, unsigned long n,unsigned char *md); | ||
113 | void SHA1_Transform(SHA_CTX *c, const unsigned char *data); | ||
114 | #endif | ||
115 | #ifdef __cplusplus | ||
116 | } | ||
117 | #endif | ||
118 | |||
119 | #endif | ||
diff --git a/src/lib/libcrypto/sha/sha1_one.c b/src/lib/libcrypto/sha/sha1_one.c deleted file mode 100644 index 861752eaa7..0000000000 --- a/src/lib/libcrypto/sha/sha1_one.c +++ /dev/null | |||
@@ -1,76 +0,0 @@ | |||
1 | /* crypto/sha/sha1_one.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include <string.h> | ||
61 | #include <openssl/sha.h> | ||
62 | |||
63 | #ifndef NO_SHA1 | ||
64 | unsigned char *SHA1(const unsigned char *d, unsigned long n, unsigned char *md) | ||
65 | { | ||
66 | SHA_CTX c; | ||
67 | static unsigned char m[SHA_DIGEST_LENGTH]; | ||
68 | |||
69 | if (md == NULL) md=m; | ||
70 | SHA1_Init(&c); | ||
71 | SHA1_Update(&c,d,n); | ||
72 | SHA1_Final(md,&c); | ||
73 | memset(&c,0,sizeof(c)); | ||
74 | return(md); | ||
75 | } | ||
76 | #endif | ||
diff --git a/src/lib/libcrypto/sha/sha1dgst.c b/src/lib/libcrypto/sha/sha1dgst.c deleted file mode 100644 index c09edb4cd7..0000000000 --- a/src/lib/libcrypto/sha/sha1dgst.c +++ /dev/null | |||
@@ -1,73 +0,0 @@ | |||
1 | /* crypto/sha/sha1dgst.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #if !defined(NO_SHA1) && !defined(NO_SHA) | ||
60 | |||
61 | #undef SHA_0 | ||
62 | #define SHA_1 | ||
63 | |||
64 | #include <openssl/opensslv.h> | ||
65 | |||
66 | const char *SHA1_version="SHA1" OPENSSL_VERSION_PTEXT; | ||
67 | |||
68 | /* The implementation is in ../md32_common.h */ | ||
69 | |||
70 | #include "sha_locl.h" | ||
71 | |||
72 | #endif | ||
73 | |||
diff --git a/src/lib/libcrypto/sha/sha_locl.h b/src/lib/libcrypto/sha/sha_locl.h deleted file mode 100644 index 2f8aef83f3..0000000000 --- a/src/lib/libcrypto/sha/sha_locl.h +++ /dev/null | |||
@@ -1,471 +0,0 @@ | |||
1 | /* crypto/sha/sha_locl.h */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <stdlib.h> | ||
60 | #include <string.h> | ||
61 | |||
62 | #include <openssl/opensslconf.h> | ||
63 | #include <openssl/sha.h> | ||
64 | |||
65 | #ifndef SHA_LONG_LOG2 | ||
66 | #define SHA_LONG_LOG2 2 /* default to 32 bits */ | ||
67 | #endif | ||
68 | |||
69 | #define DATA_ORDER_IS_BIG_ENDIAN | ||
70 | |||
71 | #define HASH_LONG SHA_LONG | ||
72 | #define HASH_LONG_LOG2 SHA_LONG_LOG2 | ||
73 | #define HASH_CTX SHA_CTX | ||
74 | #define HASH_CBLOCK SHA_CBLOCK | ||
75 | #define HASH_LBLOCK SHA_LBLOCK | ||
76 | #define HASH_MAKE_STRING(c,s) do { \ | ||
77 | unsigned long ll; \ | ||
78 | ll=(c)->h0; HOST_l2c(ll,(s)); \ | ||
79 | ll=(c)->h1; HOST_l2c(ll,(s)); \ | ||
80 | ll=(c)->h2; HOST_l2c(ll,(s)); \ | ||
81 | ll=(c)->h3; HOST_l2c(ll,(s)); \ | ||
82 | ll=(c)->h4; HOST_l2c(ll,(s)); \ | ||
83 | } while (0) | ||
84 | |||
85 | #if defined(SHA_0) | ||
86 | |||
87 | # define HASH_UPDATE SHA_Update | ||
88 | # define HASH_TRANSFORM SHA_Transform | ||
89 | # define HASH_FINAL SHA_Final | ||
90 | # define HASH_INIT SHA_Init | ||
91 | # define HASH_BLOCK_HOST_ORDER sha_block_host_order | ||
92 | # define HASH_BLOCK_DATA_ORDER sha_block_data_order | ||
93 | # define Xupdate(a,ix,ia,ib,ic,id) (ix=(a)=(ia^ib^ic^id)) | ||
94 | |||
95 | void sha_block_host_order (SHA_CTX *c, const void *p,int num); | ||
96 | void sha_block_data_order (SHA_CTX *c, const void *p,int num); | ||
97 | |||
98 | #elif defined(SHA_1) | ||
99 | |||
100 | # define HASH_UPDATE SHA1_Update | ||
101 | # define HASH_TRANSFORM SHA1_Transform | ||
102 | # define HASH_FINAL SHA1_Final | ||
103 | # define HASH_INIT SHA1_Init | ||
104 | # define HASH_BLOCK_HOST_ORDER sha1_block_host_order | ||
105 | # define HASH_BLOCK_DATA_ORDER sha1_block_data_order | ||
106 | # if defined(__MWERKS__) && defined(__MC68K__) | ||
107 | /* Metrowerks for Motorola fails otherwise:-( <appro@fy.chalmers.se> */ | ||
108 | # define Xupdate(a,ix,ia,ib,ic,id) do { (a)=(ia^ib^ic^id); \ | ||
109 | ix=(a)=ROTATE((a),1); \ | ||
110 | } while (0) | ||
111 | # else | ||
112 | # define Xupdate(a,ix,ia,ib,ic,id) ( (a)=(ia^ib^ic^id), \ | ||
113 | ix=(a)=ROTATE((a),1) \ | ||
114 | ) | ||
115 | # endif | ||
116 | |||
117 | # ifdef SHA1_ASM | ||
118 | # if defined(__i386) || defined(_M_IX86) || defined(__INTEL__) | ||
119 | # define sha1_block_host_order sha1_block_asm_host_order | ||
120 | # define DONT_IMPLEMENT_BLOCK_HOST_ORDER | ||
121 | # define sha1_block_data_order sha1_block_asm_data_order | ||
122 | # define DONT_IMPLEMENT_BLOCK_DATA_ORDER | ||
123 | # define HASH_BLOCK_DATA_ORDER_ALIGNED sha1_block_asm_data_order | ||
124 | # endif | ||
125 | # endif | ||
126 | void sha1_block_host_order (SHA_CTX *c, const void *p,int num); | ||
127 | void sha1_block_data_order (SHA_CTX *c, const void *p,int num); | ||
128 | |||
129 | #else | ||
130 | # error "Either SHA_0 or SHA_1 must be defined." | ||
131 | #endif | ||
132 | |||
133 | #include "md32_common.h" | ||
134 | |||
135 | #define INIT_DATA_h0 0x67452301UL | ||
136 | #define INIT_DATA_h1 0xefcdab89UL | ||
137 | #define INIT_DATA_h2 0x98badcfeUL | ||
138 | #define INIT_DATA_h3 0x10325476UL | ||
139 | #define INIT_DATA_h4 0xc3d2e1f0UL | ||
140 | |||
141 | void HASH_INIT (SHA_CTX *c) | ||
142 | { | ||
143 | c->h0=INIT_DATA_h0; | ||
144 | c->h1=INIT_DATA_h1; | ||
145 | c->h2=INIT_DATA_h2; | ||
146 | c->h3=INIT_DATA_h3; | ||
147 | c->h4=INIT_DATA_h4; | ||
148 | c->Nl=0; | ||
149 | c->Nh=0; | ||
150 | c->num=0; | ||
151 | } | ||
152 | |||
153 | #define K_00_19 0x5a827999UL | ||
154 | #define K_20_39 0x6ed9eba1UL | ||
155 | #define K_40_59 0x8f1bbcdcUL | ||
156 | #define K_60_79 0xca62c1d6UL | ||
157 | |||
158 | /* As pointed out by Wei Dai <weidai@eskimo.com>, F() below can be | ||
159 | * simplified to the code in F_00_19. Wei attributes these optimisations | ||
160 | * to Peter Gutmann's SHS code, and he attributes it to Rich Schroeppel. | ||
161 | * #define F(x,y,z) (((x) & (y)) | ((~(x)) & (z))) | ||
162 | * I've just become aware of another tweak to be made, again from Wei Dai, | ||
163 | * in F_40_59, (x&a)|(y&a) -> (x|y)&a | ||
164 | */ | ||
165 | #define F_00_19(b,c,d) ((((c) ^ (d)) & (b)) ^ (d)) | ||
166 | #define F_20_39(b,c,d) ((b) ^ (c) ^ (d)) | ||
167 | #define F_40_59(b,c,d) (((b) & (c)) | (((b)|(c)) & (d))) | ||
168 | #define F_60_79(b,c,d) F_20_39(b,c,d) | ||
169 | |||
170 | #define BODY_00_15(i,a,b,c,d,e,f,xi) \ | ||
171 | (f)=xi+(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | ||
172 | (b)=ROTATE((b),30); | ||
173 | |||
174 | #define BODY_16_19(i,a,b,c,d,e,f,xi,xa,xb,xc,xd) \ | ||
175 | Xupdate(f,xi,xa,xb,xc,xd); \ | ||
176 | (f)+=(e)+K_00_19+ROTATE((a),5)+F_00_19((b),(c),(d)); \ | ||
177 | (b)=ROTATE((b),30); | ||
178 | |||
179 | #define BODY_20_31(i,a,b,c,d,e,f,xi,xa,xb,xc,xd) \ | ||
180 | Xupdate(f,xi,xa,xb,xc,xd); \ | ||
181 | (f)+=(e)+K_20_39+ROTATE((a),5)+F_20_39((b),(c),(d)); \ | ||
182 | (b)=ROTATE((b),30); | ||
183 | |||
184 | #define BODY_32_39(i,a,b,c,d,e,f,xa,xb,xc,xd) \ | ||
185 | Xupdate(f,xa,xa,xb,xc,xd); \ | ||
186 | (f)+=(e)+K_20_39+ROTATE((a),5)+F_20_39((b),(c),(d)); \ | ||
187 | (b)=ROTATE((b),30); | ||
188 | |||
189 | #define BODY_40_59(i,a,b,c,d,e,f,xa,xb,xc,xd) \ | ||
190 | Xupdate(f,xa,xa,xb,xc,xd); \ | ||
191 | (f)+=(e)+K_40_59+ROTATE((a),5)+F_40_59((b),(c),(d)); \ | ||
192 | (b)=ROTATE((b),30); | ||
193 | |||
194 | #define BODY_60_79(i,a,b,c,d,e,f,xa,xb,xc,xd) \ | ||
195 | Xupdate(f,xa,xa,xb,xc,xd); \ | ||
196 | (f)=xa+(e)+K_60_79+ROTATE((a),5)+F_60_79((b),(c),(d)); \ | ||
197 | (b)=ROTATE((b),30); | ||
198 | |||
199 | #ifdef X | ||
200 | #undef X | ||
201 | #endif | ||
202 | #ifndef MD32_XARRAY | ||
203 | /* | ||
204 | * Originally X was an array. As it's automatic it's natural | ||
205 | * to expect RISC compiler to accomodate at least part of it in | ||
206 | * the register bank, isn't it? Unfortunately not all compilers | ||
207 | * "find" this expectation reasonable:-( On order to make such | ||
208 | * compilers generate better code I replace X[] with a bunch of | ||
209 | * X0, X1, etc. See the function body below... | ||
210 | * <appro@fy.chalmers.se> | ||
211 | */ | ||
212 | # define X(i) XX##i | ||
213 | #else | ||
214 | /* | ||
215 | * However! Some compilers (most notably HP C) get overwhelmed by | ||
216 | * that many local variables so that we have to have the way to | ||
217 | * fall down to the original behavior. | ||
218 | */ | ||
219 | # define X(i) XX[i] | ||
220 | #endif | ||
221 | |||
222 | #ifndef DONT_IMPLEMENT_BLOCK_HOST_ORDER | ||
223 | void HASH_BLOCK_HOST_ORDER (SHA_CTX *c, const void *d, int num) | ||
224 | { | ||
225 | const SHA_LONG *W=d; | ||
226 | register unsigned long A,B,C,D,E,T; | ||
227 | #ifndef MD32_XARRAY | ||
228 | unsigned long XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7, | ||
229 | XX8, XX9,XX10,XX11,XX12,XX13,XX14,XX15; | ||
230 | #else | ||
231 | SHA_LONG XX[16]; | ||
232 | #endif | ||
233 | |||
234 | A=c->h0; | ||
235 | B=c->h1; | ||
236 | C=c->h2; | ||
237 | D=c->h3; | ||
238 | E=c->h4; | ||
239 | |||
240 | for (;;) | ||
241 | { | ||
242 | BODY_00_15( 0,A,B,C,D,E,T,W[ 0]); | ||
243 | BODY_00_15( 1,T,A,B,C,D,E,W[ 1]); | ||
244 | BODY_00_15( 2,E,T,A,B,C,D,W[ 2]); | ||
245 | BODY_00_15( 3,D,E,T,A,B,C,W[ 3]); | ||
246 | BODY_00_15( 4,C,D,E,T,A,B,W[ 4]); | ||
247 | BODY_00_15( 5,B,C,D,E,T,A,W[ 5]); | ||
248 | BODY_00_15( 6,A,B,C,D,E,T,W[ 6]); | ||
249 | BODY_00_15( 7,T,A,B,C,D,E,W[ 7]); | ||
250 | BODY_00_15( 8,E,T,A,B,C,D,W[ 8]); | ||
251 | BODY_00_15( 9,D,E,T,A,B,C,W[ 9]); | ||
252 | BODY_00_15(10,C,D,E,T,A,B,W[10]); | ||
253 | BODY_00_15(11,B,C,D,E,T,A,W[11]); | ||
254 | BODY_00_15(12,A,B,C,D,E,T,W[12]); | ||
255 | BODY_00_15(13,T,A,B,C,D,E,W[13]); | ||
256 | BODY_00_15(14,E,T,A,B,C,D,W[14]); | ||
257 | BODY_00_15(15,D,E,T,A,B,C,W[15]); | ||
258 | |||
259 | BODY_16_19(16,C,D,E,T,A,B,X( 0),W[ 0],W[ 2],W[ 8],W[13]); | ||
260 | BODY_16_19(17,B,C,D,E,T,A,X( 1),W[ 1],W[ 3],W[ 9],W[14]); | ||
261 | BODY_16_19(18,A,B,C,D,E,T,X( 2),W[ 2],W[ 4],W[10],W[15]); | ||
262 | BODY_16_19(19,T,A,B,C,D,E,X( 3),W[ 3],W[ 5],W[11],X( 0)); | ||
263 | |||
264 | BODY_20_31(20,E,T,A,B,C,D,X( 4),W[ 4],W[ 6],W[12],X( 1)); | ||
265 | BODY_20_31(21,D,E,T,A,B,C,X( 5),W[ 5],W[ 7],W[13],X( 2)); | ||
266 | BODY_20_31(22,C,D,E,T,A,B,X( 6),W[ 6],W[ 8],W[14],X( 3)); | ||
267 | BODY_20_31(23,B,C,D,E,T,A,X( 7),W[ 7],W[ 9],W[15],X( 4)); | ||
268 | BODY_20_31(24,A,B,C,D,E,T,X( 8),W[ 8],W[10],X( 0),X( 5)); | ||
269 | BODY_20_31(25,T,A,B,C,D,E,X( 9),W[ 9],W[11],X( 1),X( 6)); | ||
270 | BODY_20_31(26,E,T,A,B,C,D,X(10),W[10],W[12],X( 2),X( 7)); | ||
271 | BODY_20_31(27,D,E,T,A,B,C,X(11),W[11],W[13],X( 3),X( 8)); | ||
272 | BODY_20_31(28,C,D,E,T,A,B,X(12),W[12],W[14],X( 4),X( 9)); | ||
273 | BODY_20_31(29,B,C,D,E,T,A,X(13),W[13],W[15],X( 5),X(10)); | ||
274 | BODY_20_31(30,A,B,C,D,E,T,X(14),W[14],X( 0),X( 6),X(11)); | ||
275 | BODY_20_31(31,T,A,B,C,D,E,X(15),W[15],X( 1),X( 7),X(12)); | ||
276 | |||
277 | BODY_32_39(32,E,T,A,B,C,D,X( 0),X( 2),X( 8),X(13)); | ||
278 | BODY_32_39(33,D,E,T,A,B,C,X( 1),X( 3),X( 9),X(14)); | ||
279 | BODY_32_39(34,C,D,E,T,A,B,X( 2),X( 4),X(10),X(15)); | ||
280 | BODY_32_39(35,B,C,D,E,T,A,X( 3),X( 5),X(11),X( 0)); | ||
281 | BODY_32_39(36,A,B,C,D,E,T,X( 4),X( 6),X(12),X( 1)); | ||
282 | BODY_32_39(37,T,A,B,C,D,E,X( 5),X( 7),X(13),X( 2)); | ||
283 | BODY_32_39(38,E,T,A,B,C,D,X( 6),X( 8),X(14),X( 3)); | ||
284 | BODY_32_39(39,D,E,T,A,B,C,X( 7),X( 9),X(15),X( 4)); | ||
285 | |||
286 | BODY_40_59(40,C,D,E,T,A,B,X( 8),X(10),X( 0),X( 5)); | ||
287 | BODY_40_59(41,B,C,D,E,T,A,X( 9),X(11),X( 1),X( 6)); | ||
288 | BODY_40_59(42,A,B,C,D,E,T,X(10),X(12),X( 2),X( 7)); | ||
289 | BODY_40_59(43,T,A,B,C,D,E,X(11),X(13),X( 3),X( 8)); | ||
290 | BODY_40_59(44,E,T,A,B,C,D,X(12),X(14),X( 4),X( 9)); | ||
291 | BODY_40_59(45,D,E,T,A,B,C,X(13),X(15),X( 5),X(10)); | ||
292 | BODY_40_59(46,C,D,E,T,A,B,X(14),X( 0),X( 6),X(11)); | ||
293 | BODY_40_59(47,B,C,D,E,T,A,X(15),X( 1),X( 7),X(12)); | ||
294 | BODY_40_59(48,A,B,C,D,E,T,X( 0),X( 2),X( 8),X(13)); | ||
295 | BODY_40_59(49,T,A,B,C,D,E,X( 1),X( 3),X( 9),X(14)); | ||
296 | BODY_40_59(50,E,T,A,B,C,D,X( 2),X( 4),X(10),X(15)); | ||
297 | BODY_40_59(51,D,E,T,A,B,C,X( 3),X( 5),X(11),X( 0)); | ||
298 | BODY_40_59(52,C,D,E,T,A,B,X( 4),X( 6),X(12),X( 1)); | ||
299 | BODY_40_59(53,B,C,D,E,T,A,X( 5),X( 7),X(13),X( 2)); | ||
300 | BODY_40_59(54,A,B,C,D,E,T,X( 6),X( 8),X(14),X( 3)); | ||
301 | BODY_40_59(55,T,A,B,C,D,E,X( 7),X( 9),X(15),X( 4)); | ||
302 | BODY_40_59(56,E,T,A,B,C,D,X( 8),X(10),X( 0),X( 5)); | ||
303 | BODY_40_59(57,D,E,T,A,B,C,X( 9),X(11),X( 1),X( 6)); | ||
304 | BODY_40_59(58,C,D,E,T,A,B,X(10),X(12),X( 2),X( 7)); | ||
305 | BODY_40_59(59,B,C,D,E,T,A,X(11),X(13),X( 3),X( 8)); | ||
306 | |||
307 | BODY_60_79(60,A,B,C,D,E,T,X(12),X(14),X( 4),X( 9)); | ||
308 | BODY_60_79(61,T,A,B,C,D,E,X(13),X(15),X( 5),X(10)); | ||
309 | BODY_60_79(62,E,T,A,B,C,D,X(14),X( 0),X( 6),X(11)); | ||
310 | BODY_60_79(63,D,E,T,A,B,C,X(15),X( 1),X( 7),X(12)); | ||
311 | BODY_60_79(64,C,D,E,T,A,B,X( 0),X( 2),X( 8),X(13)); | ||
312 | BODY_60_79(65,B,C,D,E,T,A,X( 1),X( 3),X( 9),X(14)); | ||
313 | BODY_60_79(66,A,B,C,D,E,T,X( 2),X( 4),X(10),X(15)); | ||
314 | BODY_60_79(67,T,A,B,C,D,E,X( 3),X( 5),X(11),X( 0)); | ||
315 | BODY_60_79(68,E,T,A,B,C,D,X( 4),X( 6),X(12),X( 1)); | ||
316 | BODY_60_79(69,D,E,T,A,B,C,X( 5),X( 7),X(13),X( 2)); | ||
317 | BODY_60_79(70,C,D,E,T,A,B,X( 6),X( 8),X(14),X( 3)); | ||
318 | BODY_60_79(71,B,C,D,E,T,A,X( 7),X( 9),X(15),X( 4)); | ||
319 | BODY_60_79(72,A,B,C,D,E,T,X( 8),X(10),X( 0),X( 5)); | ||
320 | BODY_60_79(73,T,A,B,C,D,E,X( 9),X(11),X( 1),X( 6)); | ||
321 | BODY_60_79(74,E,T,A,B,C,D,X(10),X(12),X( 2),X( 7)); | ||
322 | BODY_60_79(75,D,E,T,A,B,C,X(11),X(13),X( 3),X( 8)); | ||
323 | BODY_60_79(76,C,D,E,T,A,B,X(12),X(14),X( 4),X( 9)); | ||
324 | BODY_60_79(77,B,C,D,E,T,A,X(13),X(15),X( 5),X(10)); | ||
325 | BODY_60_79(78,A,B,C,D,E,T,X(14),X( 0),X( 6),X(11)); | ||
326 | BODY_60_79(79,T,A,B,C,D,E,X(15),X( 1),X( 7),X(12)); | ||
327 | |||
328 | c->h0=(c->h0+E)&0xffffffffL; | ||
329 | c->h1=(c->h1+T)&0xffffffffL; | ||
330 | c->h2=(c->h2+A)&0xffffffffL; | ||
331 | c->h3=(c->h3+B)&0xffffffffL; | ||
332 | c->h4=(c->h4+C)&0xffffffffL; | ||
333 | |||
334 | if (--num <= 0) break; | ||
335 | |||
336 | A=c->h0; | ||
337 | B=c->h1; | ||
338 | C=c->h2; | ||
339 | D=c->h3; | ||
340 | E=c->h4; | ||
341 | |||
342 | W+=SHA_LBLOCK; | ||
343 | } | ||
344 | } | ||
345 | #endif | ||
346 | |||
347 | #ifndef DONT_IMPLEMENT_BLOCK_DATA_ORDER | ||
348 | void HASH_BLOCK_DATA_ORDER (SHA_CTX *c, const void *p, int num) | ||
349 | { | ||
350 | const unsigned char *data=p; | ||
351 | register unsigned long A,B,C,D,E,T,l; | ||
352 | #ifndef MD32_XARRAY | ||
353 | unsigned long XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7, | ||
354 | XX8, XX9,XX10,XX11,XX12,XX13,XX14,XX15; | ||
355 | #else | ||
356 | SHA_LONG XX[16]; | ||
357 | #endif | ||
358 | |||
359 | A=c->h0; | ||
360 | B=c->h1; | ||
361 | C=c->h2; | ||
362 | D=c->h3; | ||
363 | E=c->h4; | ||
364 | |||
365 | for (;;) | ||
366 | { | ||
367 | |||
368 | HOST_c2l(data,l); X( 0)=l; HOST_c2l(data,l); X( 1)=l; | ||
369 | BODY_00_15( 0,A,B,C,D,E,T,X( 0)); HOST_c2l(data,l); X( 2)=l; | ||
370 | BODY_00_15( 1,T,A,B,C,D,E,X( 1)); HOST_c2l(data,l); X( 3)=l; | ||
371 | BODY_00_15( 2,E,T,A,B,C,D,X( 2)); HOST_c2l(data,l); X( 4)=l; | ||
372 | BODY_00_15( 3,D,E,T,A,B,C,X( 3)); HOST_c2l(data,l); X( 5)=l; | ||
373 | BODY_00_15( 4,C,D,E,T,A,B,X( 4)); HOST_c2l(data,l); X( 6)=l; | ||
374 | BODY_00_15( 5,B,C,D,E,T,A,X( 5)); HOST_c2l(data,l); X( 7)=l; | ||
375 | BODY_00_15( 6,A,B,C,D,E,T,X( 6)); HOST_c2l(data,l); X( 8)=l; | ||
376 | BODY_00_15( 7,T,A,B,C,D,E,X( 7)); HOST_c2l(data,l); X( 9)=l; | ||
377 | BODY_00_15( 8,E,T,A,B,C,D,X( 8)); HOST_c2l(data,l); X(10)=l; | ||
378 | BODY_00_15( 9,D,E,T,A,B,C,X( 9)); HOST_c2l(data,l); X(11)=l; | ||
379 | BODY_00_15(10,C,D,E,T,A,B,X(10)); HOST_c2l(data,l); X(12)=l; | ||
380 | BODY_00_15(11,B,C,D,E,T,A,X(11)); HOST_c2l(data,l); X(13)=l; | ||
381 | BODY_00_15(12,A,B,C,D,E,T,X(12)); HOST_c2l(data,l); X(14)=l; | ||
382 | BODY_00_15(13,T,A,B,C,D,E,X(13)); HOST_c2l(data,l); X(15)=l; | ||
383 | BODY_00_15(14,E,T,A,B,C,D,X(14)); | ||
384 | BODY_00_15(15,D,E,T,A,B,C,X(15)); | ||
385 | |||
386 | BODY_16_19(16,C,D,E,T,A,B,X( 0),X( 0),X( 2),X( 8),X(13)); | ||
387 | BODY_16_19(17,B,C,D,E,T,A,X( 1),X( 1),X( 3),X( 9),X(14)); | ||
388 | BODY_16_19(18,A,B,C,D,E,T,X( 2),X( 2),X( 4),X(10),X(15)); | ||
389 | BODY_16_19(19,T,A,B,C,D,E,X( 3),X( 3),X( 5),X(11),X( 0)); | ||
390 | |||
391 | BODY_20_31(20,E,T,A,B,C,D,X( 4),X( 4),X( 6),X(12),X( 1)); | ||
392 | BODY_20_31(21,D,E,T,A,B,C,X( 5),X( 5),X( 7),X(13),X( 2)); | ||
393 | BODY_20_31(22,C,D,E,T,A,B,X( 6),X( 6),X( 8),X(14),X( 3)); | ||
394 | BODY_20_31(23,B,C,D,E,T,A,X( 7),X( 7),X( 9),X(15),X( 4)); | ||
395 | BODY_20_31(24,A,B,C,D,E,T,X( 8),X( 8),X(10),X( 0),X( 5)); | ||
396 | BODY_20_31(25,T,A,B,C,D,E,X( 9),X( 9),X(11),X( 1),X( 6)); | ||
397 | BODY_20_31(26,E,T,A,B,C,D,X(10),X(10),X(12),X( 2),X( 7)); | ||
398 | BODY_20_31(27,D,E,T,A,B,C,X(11),X(11),X(13),X( 3),X( 8)); | ||
399 | BODY_20_31(28,C,D,E,T,A,B,X(12),X(12),X(14),X( 4),X( 9)); | ||
400 | BODY_20_31(29,B,C,D,E,T,A,X(13),X(13),X(15),X( 5),X(10)); | ||
401 | BODY_20_31(30,A,B,C,D,E,T,X(14),X(14),X( 0),X( 6),X(11)); | ||
402 | BODY_20_31(31,T,A,B,C,D,E,X(15),X(15),X( 1),X( 7),X(12)); | ||
403 | |||
404 | BODY_32_39(32,E,T,A,B,C,D,X( 0),X( 2),X( 8),X(13)); | ||
405 | BODY_32_39(33,D,E,T,A,B,C,X( 1),X( 3),X( 9),X(14)); | ||
406 | BODY_32_39(34,C,D,E,T,A,B,X( 2),X( 4),X(10),X(15)); | ||
407 | BODY_32_39(35,B,C,D,E,T,A,X( 3),X( 5),X(11),X( 0)); | ||
408 | BODY_32_39(36,A,B,C,D,E,T,X( 4),X( 6),X(12),X( 1)); | ||
409 | BODY_32_39(37,T,A,B,C,D,E,X( 5),X( 7),X(13),X( 2)); | ||
410 | BODY_32_39(38,E,T,A,B,C,D,X( 6),X( 8),X(14),X( 3)); | ||
411 | BODY_32_39(39,D,E,T,A,B,C,X( 7),X( 9),X(15),X( 4)); | ||
412 | |||
413 | BODY_40_59(40,C,D,E,T,A,B,X( 8),X(10),X( 0),X( 5)); | ||
414 | BODY_40_59(41,B,C,D,E,T,A,X( 9),X(11),X( 1),X( 6)); | ||
415 | BODY_40_59(42,A,B,C,D,E,T,X(10),X(12),X( 2),X( 7)); | ||
416 | BODY_40_59(43,T,A,B,C,D,E,X(11),X(13),X( 3),X( 8)); | ||
417 | BODY_40_59(44,E,T,A,B,C,D,X(12),X(14),X( 4),X( 9)); | ||
418 | BODY_40_59(45,D,E,T,A,B,C,X(13),X(15),X( 5),X(10)); | ||
419 | BODY_40_59(46,C,D,E,T,A,B,X(14),X( 0),X( 6),X(11)); | ||
420 | BODY_40_59(47,B,C,D,E,T,A,X(15),X( 1),X( 7),X(12)); | ||
421 | BODY_40_59(48,A,B,C,D,E,T,X( 0),X( 2),X( 8),X(13)); | ||
422 | BODY_40_59(49,T,A,B,C,D,E,X( 1),X( 3),X( 9),X(14)); | ||
423 | BODY_40_59(50,E,T,A,B,C,D,X( 2),X( 4),X(10),X(15)); | ||
424 | BODY_40_59(51,D,E,T,A,B,C,X( 3),X( 5),X(11),X( 0)); | ||
425 | BODY_40_59(52,C,D,E,T,A,B,X( 4),X( 6),X(12),X( 1)); | ||
426 | BODY_40_59(53,B,C,D,E,T,A,X( 5),X( 7),X(13),X( 2)); | ||
427 | BODY_40_59(54,A,B,C,D,E,T,X( 6),X( 8),X(14),X( 3)); | ||
428 | BODY_40_59(55,T,A,B,C,D,E,X( 7),X( 9),X(15),X( 4)); | ||
429 | BODY_40_59(56,E,T,A,B,C,D,X( 8),X(10),X( 0),X( 5)); | ||
430 | BODY_40_59(57,D,E,T,A,B,C,X( 9),X(11),X( 1),X( 6)); | ||
431 | BODY_40_59(58,C,D,E,T,A,B,X(10),X(12),X( 2),X( 7)); | ||
432 | BODY_40_59(59,B,C,D,E,T,A,X(11),X(13),X( 3),X( 8)); | ||
433 | |||
434 | BODY_60_79(60,A,B,C,D,E,T,X(12),X(14),X( 4),X( 9)); | ||
435 | BODY_60_79(61,T,A,B,C,D,E,X(13),X(15),X( 5),X(10)); | ||
436 | BODY_60_79(62,E,T,A,B,C,D,X(14),X( 0),X( 6),X(11)); | ||
437 | BODY_60_79(63,D,E,T,A,B,C,X(15),X( 1),X( 7),X(12)); | ||
438 | BODY_60_79(64,C,D,E,T,A,B,X( 0),X( 2),X( 8),X(13)); | ||
439 | BODY_60_79(65,B,C,D,E,T,A,X( 1),X( 3),X( 9),X(14)); | ||
440 | BODY_60_79(66,A,B,C,D,E,T,X( 2),X( 4),X(10),X(15)); | ||
441 | BODY_60_79(67,T,A,B,C,D,E,X( 3),X( 5),X(11),X( 0)); | ||
442 | BODY_60_79(68,E,T,A,B,C,D,X( 4),X( 6),X(12),X( 1)); | ||
443 | BODY_60_79(69,D,E,T,A,B,C,X( 5),X( 7),X(13),X( 2)); | ||
444 | BODY_60_79(70,C,D,E,T,A,B,X( 6),X( 8),X(14),X( 3)); | ||
445 | BODY_60_79(71,B,C,D,E,T,A,X( 7),X( 9),X(15),X( 4)); | ||
446 | BODY_60_79(72,A,B,C,D,E,T,X( 8),X(10),X( 0),X( 5)); | ||
447 | BODY_60_79(73,T,A,B,C,D,E,X( 9),X(11),X( 1),X( 6)); | ||
448 | BODY_60_79(74,E,T,A,B,C,D,X(10),X(12),X( 2),X( 7)); | ||
449 | BODY_60_79(75,D,E,T,A,B,C,X(11),X(13),X( 3),X( 8)); | ||
450 | BODY_60_79(76,C,D,E,T,A,B,X(12),X(14),X( 4),X( 9)); | ||
451 | BODY_60_79(77,B,C,D,E,T,A,X(13),X(15),X( 5),X(10)); | ||
452 | BODY_60_79(78,A,B,C,D,E,T,X(14),X( 0),X( 6),X(11)); | ||
453 | BODY_60_79(79,T,A,B,C,D,E,X(15),X( 1),X( 7),X(12)); | ||
454 | |||
455 | c->h0=(c->h0+E)&0xffffffffL; | ||
456 | c->h1=(c->h1+T)&0xffffffffL; | ||
457 | c->h2=(c->h2+A)&0xffffffffL; | ||
458 | c->h3=(c->h3+B)&0xffffffffL; | ||
459 | c->h4=(c->h4+C)&0xffffffffL; | ||
460 | |||
461 | if (--num <= 0) break; | ||
462 | |||
463 | A=c->h0; | ||
464 | B=c->h1; | ||
465 | C=c->h2; | ||
466 | D=c->h3; | ||
467 | E=c->h4; | ||
468 | |||
469 | } | ||
470 | } | ||
471 | #endif | ||