⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sha2.cpp

📁 一个非常有用的开源代码
💻 CPP
📖 第 1 页 / 共 2 页
字号:
        /* the following 32-bit length fields are assembled in the		*/	/* wrong byte order on little endian machines but this is		*/	/* corrected later since they are only ever used as 32-bit		*/	/* word values.													*/    ctx->wdat[14] = (ctx->count[1] << 3) | (ctx->count[0] >> 29);    ctx->wdat[15] = ctx->count[0] << 3;    sha256_compile(ctx);	/* extract the hash value as bytes in case the hash buffer is	*/	/* mislaigned for 32-bit words									*/	for(i = 0; i < SHA256_DIGEST_LENGTH; ++i)        hval[i] = (unsigned char)(ctx->hash[i >> 2] >> (24 - 8 * (i & 3)));}#endif#if defined(SHA_2) || defined(SHA_384) || defined(SHA_512)/* SHA512 mixing function definitions   */#define s512_0(x) (rotr64((x), 28) ^ rotr64((x), 34) ^ rotr64((x), 39)) #define s512_1(x) (rotr64((x), 14) ^ rotr64((x), 18) ^ rotr64((x), 41)) #define g512_0(x) (rotr64((x),  1) ^ rotr64((x),  8) ^ ((x) >>  7)) #define g512_1(x) (rotr64((x), 19) ^ rotr64((x), 61) ^ ((x) >>  6)) /* rotated SHA512 round definition. Rather than swapping variables as in    *//* FIPS-180, different variables are 'rotated' on each round, returning     *//* to their starting positions every eight rounds                           */#define h5(i) ctx->wdat[i & 15] += \    g512_1(ctx->wdat[(i + 14) & 15]) + ctx->wdat[(i + 9) & 15] + g512_0(ctx->wdat[(i + 1) & 15])#define h5_cycle(i,j)  \    v[(7 - i) & 7] += (j ? h5(i) : ctx->wdat[i & 15]) + k512[i + j] \        + s512_1(v[(4 - i) & 7]) + ch(v[(4 - i) & 7], v[(5 - i) & 7], v[(6 - i) & 7]); \    v[(3 - i) & 7] += v[(7 - i) & 7]; \    v[(7 - i) & 7] += s512_0(v[(0 - i) & 7]) + maj(v[(0 - i) & 7], v[(1 - i) & 7], v[(2 - i) & 7])/* SHA384/SHA512 mixing data    */const uint64_t  k512[80] = {    x_64(428a2f98d728ae22), x_64(7137449123ef65cd),     x_64(b5c0fbcfec4d3b2f), x_64(e9b5dba58189dbbc),    x_64(3956c25bf348b538), x_64(59f111f1b605d019),    x_64(923f82a4af194f9b), x_64(ab1c5ed5da6d8118),    x_64(d807aa98a3030242), x_64(12835b0145706fbe),    x_64(243185be4ee4b28c), x_64(550c7dc3d5ffb4e2),    x_64(72be5d74f27b896f), x_64(80deb1fe3b1696b1),    x_64(9bdc06a725c71235), x_64(c19bf174cf692694),    x_64(e49b69c19ef14ad2), x_64(efbe4786384f25e3),    x_64(0fc19dc68b8cd5b5), x_64(240ca1cc77ac9c65),    x_64(2de92c6f592b0275), x_64(4a7484aa6ea6e483),    x_64(5cb0a9dcbd41fbd4), x_64(76f988da831153b5),    x_64(983e5152ee66dfab), x_64(a831c66d2db43210),    x_64(b00327c898fb213f), x_64(bf597fc7beef0ee4),    x_64(c6e00bf33da88fc2), x_64(d5a79147930aa725),    x_64(06ca6351e003826f), x_64(142929670a0e6e70),    x_64(27b70a8546d22ffc), x_64(2e1b21385c26c926),    x_64(4d2c6dfc5ac42aed), x_64(53380d139d95b3df),    x_64(650a73548baf63de), x_64(766a0abb3c77b2a8),    x_64(81c2c92e47edaee6), x_64(92722c851482353b),    x_64(a2bfe8a14cf10364), x_64(a81a664bbc423001),    x_64(c24b8b70d0f89791), x_64(c76c51a30654be30),    x_64(d192e819d6ef5218), x_64(d69906245565a910),    x_64(f40e35855771202a), x_64(106aa07032bbd1b8),    x_64(19a4c116b8d2d0c8), x_64(1e376c085141ab53),    x_64(2748774cdf8eeb99), x_64(34b0bcb5e19b48a8),    x_64(391c0cb3c5c95a63), x_64(4ed8aa4ae3418acb),    x_64(5b9cca4f7763e373), x_64(682e6ff3d6b2b8a3),    x_64(748f82ee5defb2fc), x_64(78a5636f43172f60),    x_64(84c87814a1f0ab72), x_64(8cc702081a6439ec),    x_64(90befffa23631e28), x_64(a4506cebde82bde9),    x_64(bef9a3f7b2c67915), x_64(c67178f2e372532b),    x_64(ca273eceea26619c), x_64(d186b8c721c0c207),    x_64(eada7dd6cde0eb1e), x_64(f57d4f7fee6ed178),    x_64(06f067aa72176fba), x_64(0a637dc5a2c898a6),    x_64(113f9804bef90dae), x_64(1b710b35131c471b),    x_64(28db77f523047d84), x_64(32caab7b40c72493),    x_64(3c9ebe0a15c9bebc), x_64(431d67c49c100d4c),    x_64(4cc5d4becb3e42b6), x_64(597f299cfc657e2a),    x_64(5fcb6fab3ad6faec), x_64(6c44198c4a475817)};/* Compile 64 bytes of hash data into SHA384/SHA512 digest value  */static void sha512_compile(sha512_ctx ctx[1]){   uint64_t    v[8];    uint32_t    j;    memcpy(v, ctx->hash, 64);    for(j = 0; j < 80; j += 16)    {        h5_cycle( 0, j); h5_cycle( 1, j); h5_cycle( 2, j); h5_cycle( 3, j);        h5_cycle( 4, j); h5_cycle( 5, j); h5_cycle( 6, j); h5_cycle( 7, j);        h5_cycle( 8, j); h5_cycle( 9, j); h5_cycle(10, j); h5_cycle(11, j);        h5_cycle(12, j); h5_cycle(13, j); h5_cycle(14, j); h5_cycle(15, j);    }    ctx->hash[0] += v[0]; ctx->hash[1] += v[1]; ctx->hash[2] += v[2]; ctx->hash[3] += v[3];    ctx->hash[4] += v[4]; ctx->hash[5] += v[5]; ctx->hash[6] += v[6]; ctx->hash[7] += v[7];}/* SHA512 hash data in an array of bytes into hash buffer and call the      *//* hash_compile function as required.                                       *//* If FAST_COPY is defined the data to be hashed is processed as an array   *//* bytes and compiled into the buffer ctx->wdat[] of 32-bit words in the    *//* native byte order.  On little endian machines a 32-bit word byte swap    *//* is then performed before this data is compiled into the hash. But when   *//* FAST_COPY is not defined the bytes are compiled into the buffer in the   *//* big-endian format directly so no later byte order changes are needed.    */#if defined(FAST_COPY)void sha512_hash(const unsigned char data[], const unsigned long len, sha512_ctx ctx[1]){   uint32_t            free = 128 - (uint32_t)(ctx->count[0] & 127), rlen = len, j;    const unsigned char *sp = data;    unsigned char       *p = ((unsigned char*)ctx->wdat) + (ctx->count[0] & 127);    while(rlen >= free)     /* tranfer whole blocks while possible  */    {        memcpy(p, sp, free);        if((ctx->count[0] += free) < free)            ++(ctx->count[1]);        sp += free; rlen -= free; free = 128;         p = (unsigned char*)ctx->wdat;#if defined(SWAP_BYTES)        for(j = 0; j < 16; ++j)            ctx->wdat[j] = bswap_64(ctx->wdat[j]);#endif        sha512_compile(ctx);    }    memcpy(p, sp, rlen);    /* transfer partial block               */    if((ctx->count[0] += rlen) < rlen)        ++(ctx->count[1]);    p = (unsigned char*)ctx->wdat;    rlen = (uint32_t)(ctx->count[0] & 127);    while(rlen & 7)         /* ensure rest of 32-bit word is zero   */        *(p + rlen++) = 0;}#elif defined(WORD_COPY)    /* alternative implementations          */void sha512_hash(const unsigned char data[], unsigned long len, sha512_ctx ctx[1]){   uint32_t    i = 0, cnt, j;    uint64_t    *ptr, val;    ptr = ctx->wdat + ((ctx->count[0] >> 3) & 15);    cnt = (ctx->count[0] << 3) & 56;    val = (cnt ? *ptr : 0);    while(i < len)    {   /* assemble values in big-endian format */        val |= ((uint64_t)data[i++]) << 56 - cnt;        if(!++(ctx->count[0])) ++(ctx->count[1]);        if(!(cnt = (cnt + 8) & 56))        {   *ptr++ = val; val = 0;            if(ptr - ctx->wdat == 16)             {                sha512_compile(ctx);                 ptr = ctx->wdat;            }        }    }    *ptr = val;}#elsevoid sha512_hash(const unsigned char data[], unsigned long len, sha512_ctx ctx[1]){   uint32_t i = 0, cnt = ctx->count[0], j;    while(i < len)    {   /* assemble values in big-endian format */        if((cnt & 7) == 0) ctx->wdat[(cnt >> 3) & 15] = 0;        ctx->wdat[(cnt >> 3) & 15] |= (uint64_t)data[i++] << (56 - (8 * (cnt & 7)));        if(!++(ctx->count[0])) ++(ctx->count[1]);        if((++cnt & 127) == 0)         {            sha512_compile(ctx);        }    }}#endif/* SHA384/512 Final padding and digest calculation  */static void sha_end(unsigned char hval[], sha512_ctx ctx[1], const unsigned int hlen){   uint32_t    i, j, cnt = (uint32_t)(ctx->count[0] & 127);#if defined(SWAP_BYTES)        for(i = 0, j = (cnt + 7) >> 3; i < j; ++i)            ctx->wdat[i] = bswap_64(ctx->wdat[i]);#endif    /* we are now in big-endian order within the ctx-wdat[] buffer  */    if(cnt & 7)        ctx->wdat[(cnt >> 3) & 15]             |= x_64(0000000000000080) << (56  - (8 * (cnt & 7)));    else        ctx->wdat[(cnt >> 3) & 15] = x_64(8000000000000000);    if((cnt & 127) > 111)    {        if((cnt & 127) == 111) ctx->wdat[14] = 0;        if((cnt & 127) <= 119) ctx->wdat[15] = 0;        sha512_compile(ctx);        cnt = 0;    }    else        cnt = (cnt >> 3) + 1;    while(cnt < 14)        ctx->wdat[cnt++] = 0;        /* the following 32-bit length fields are assembled in the wrong	*/	/* byte	order on little endian machines but this is corrected later	*/	/* since they are only picked up as 32-bit word values.				*/    ctx->wdat[14] = (ctx->count[1] << 3) | (ctx->count[0] >> 29);    ctx->wdat[15] = ctx->count[0] << 3;    sha512_compile(ctx);    for(i = 0; i < hlen; ++i)        hval[i] = (unsigned char)(ctx->hash[i >> 3] >> (56 - 8 * (i & 7)));}#endif#if defined(SHA_2) || defined(SHA_256)/* SHA256 initialisation data */const uint32_t i256[8] ={    x_32(6a09e667), x_32(bb67ae85), x_32(3c6ef372), x_32(a54ff53a),    x_32(510e527f), x_32(9b05688c), x_32(1f83d9ab), x_32(5be0cd19)};#if defined(SHA_256)void sha256_begin(sha256_ctx ctx[1]){    ctx->count[0] = ctx->count[1] = 0;    memcpy(ctx->hash, i256, 32);}#endif#endif#if defined(SHA_2) || defined(SHA_384)/* SHA384 initialisation data   */const uint64_t  i384[80] = {    x_64(cbbb9d5dc1059ed8), x_64(629a292a367cd507),    x_64(9159015a3070dd17), x_64(152fecd8f70e5939),    x_64(67332667ffc00b31), x_64(8eb44a8768581511),    x_64(db0c2e0d64f98fa7), x_64(47b5481dbefa4fa4)};#if defined(SHA_384)void sha384_begin(sha384_ctx ctx[1]){    ctx->count[0] = ctx->count[1] = 0;    memcpy(ctx->hash, i384, 64);}void sha384_end(unsigned char hval[], sha384_ctx ctx[1]){    sha_end(hval, ctx, SHA384_DIGEST_LENGTH);}#endif#endif#if defined(SHA_2) || defined(SHA_512)/* SHA512 initialisation data   */const uint64_t  i512[80] = {    x_64(6a09e667f3bcc908), x_64(bb67ae8584caa73b),    x_64(3c6ef372fe94f82b), x_64(a54ff53a5f1d36f1),    x_64(510e527fade682d1), x_64(9b05688c2b3e6c1f),    x_64(1f83d9abfb41bd6b), x_64(5be0cd19137e2179)};#if defined(SHA_512)void sha512_begin(sha512_ctx ctx[1]){    ctx->count[0] = ctx->count[1] = 0;    memcpy(ctx->hash, i512, 64);}void sha512_end(unsigned char hval[], sha512_ctx ctx[1]){    sha_end(hval, ctx, SHA512_DIGEST_LENGTH);}#endif#endif#if defined(SHA_2)#define CTX_256(x)  ((x)->uu->ctx256)#define CTX_384(x)  ((x)->uu->ctx512)#define CTX_512(x)  ((x)->uu->ctx512)/* SHA2 initialisation */int sha2_begin(sha2_ctx ctx[1], const unsigned long len){   unsigned long   l = len;    switch(len)    {        case 256:   l = len >> 3;        case  32:   CTX_256(ctx)->count[0] = CTX_256(ctx)->count[1] = 0;                    memcpy(CTX_256(ctx)->hash, i256, 32); break;        case 384:   l = len >> 3;        case  48:   CTX_384(ctx)->count[0] = CTX_384(ctx)->count[1] = 0;                    memcpy(CTX_384(ctx)->hash, i384, 64); break;        case 512:   l = len >> 3;        case  64:   CTX_512(ctx)->count[0] = CTX_512(ctx)->count[1] = 0;                    memcpy(CTX_512(ctx)->hash, i512, 64); break;        default:    return SHA2_BAD;    }        ctx->sha2_len = l; return SHA2_GOOD;}void sha2_hash(const unsigned char data[], const unsigned long len, sha2_ctx ctx[1]){    switch(ctx->sha2_len)    {        case 32: sha256_hash(data, len, CTX_256(ctx)); return;        case 48: sha384_hash(data, len, CTX_384(ctx)); return;        case 64: sha512_hash(data, len, CTX_512(ctx)); return;    }}void sha2_end(unsigned char hval[], sha2_ctx ctx[1]){    switch(ctx->sha2_len)    {        case 32: sha256_end(hval, CTX_256(ctx)); return;        case 48: sha_end(hval, CTX_384(ctx), SHA384_DIGEST_LENGTH); return;        case 64: sha_end(hval, CTX_512(ctx), SHA512_DIGEST_LENGTH); return;    }}#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -