⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pgpsha.c

📁 著名的加密软件的应用于电子邮件中
💻 C
📖 第 1 页 / 共 2 页
字号:

/* Update SHA for a block of data. */

static void
shaUpdate(void *priv, byte const *buf, size_t len)
{
 struct SHAContext *ctx = (struct SHAContext *)priv;
 unsigned i;

/* Update bitcount */

#ifdef HAVE64
		i = (unsigned)ctx->bytes % SHA_BLOCKBYTES;
		ctx->bytes += len;
	#else
		word32 t = ctx->bytesLo;
		if ( ( ctx->bytesLo = t + len ) < t )
		 ctx->bytesHi++; /* Carry from low to high */

		i = (unsigned)t % SHA_BLOCKBYTES; /* Bytes already in ctx->key */
	#endif

		/* i is always less than SHA_BLOCKBYTES. */
		if (SHA_BLOCKBYTES-i > len) {
		 memcpy((byte *)ctx->key + i, buf, len);
		 return;
		}

		if (i) { /* First chunk is an odd size */
		memcpy((byte *)ctx->key + i, buf, SHA_BLOCKBYTES - i);
		shaByteSwap(ctx->key, (byte *)ctx->key, SHA_BLOCKWORDS);
		shaTransform(ctx);
		buf += SHA_BLOCKBYTES-i;
		len -= SHA_BLOCKBYTES-i;
	}

/* Process data in 64-byte chunks */
while (len >= SHA_BLOCKBYTES) {
		shaByteSwap(ctx->key, buf, SHA_BLOCKWORDS);
		shaTransform(ctx);
		buf += SHA_BLOCKBYTES;
		len -= SHA_BLOCKBYTES;
	}

/* Handle any remaining bytes of data. */
if (len)
 memcpy(ctx->key, buf, len);
}

/*
* Final wrapup - pad to 64-byte boundary with the bit pattern
* 1 0* (64-bit count of bits processed, MSB-first)
*/
static byte const *
shaFinal(void *priv)
{
 struct SHAContext *ctx = (struct SHAContext *)priv;
 byte *digest;
#if HAVE64
		unsigned i = (unsigned)ctx->bytes % SHA_BLOCKBYTES;
	#else
		unsigned i = (unsigned)ctx->bytesLo % SHA_BLOCKBYTES;
	#endif
		byte *p = (byte *)ctx->key + i; /* First unused byte */
		word32 t;

		/* Set the first char of padding to 0x80. There is always room. */
		*p++ = 0x80;

		/* Bytes of padding needed to make 64 bytes (0..63) */
		i = SHA_BLOCKBYTES - 1 - i;

		if (i < 8) { /* Padding forces an extra block */
			memset(p, 0, i);
			shaByteSwap(ctx->key, (byte *)ctx->key, 16);
			shaTransform(ctx);
			p = (byte *)ctx->key;
			i = 64;
		}
		memset(p, 0, i-8);
		shaByteSwap(ctx->key, (byte *)ctx->key, 14);

		/* Append length in bits and transform */
#if HAVE64
		ctx->key[14] = (word32)(ctx->bytes >> 29);
		ctx->key[15] = (word32)ctx->bytes << 3;
	#else
		ctx->key[14] = ctx->bytesHi << 3 | ctx->bytesLo >> 29;
		ctx->key[15] = ctx->bytesLo << 3;
	#endif
		shaTransform(ctx);

		digest = (byte *)ctx->iv;
		for (i = 0; i < SHA_HASHWORDS; i++) {
			t = ctx->iv[i];
			digest[0] = (byte)(t >> 24);
			digest[1] = (byte)(t >> 16);
			digest[2] = (byte)(t >> 8);
			digest[3] = (byte)t;
			digest += 4;
		}
		/* In case it's sensitive */
/* XXX memset(ctx, 0, sizeof(ctx)); */
 return (byte const *)ctx->iv;
}

#if 0
/*
* Nobody knows an SHA format, so we make one up out of the
* context-dependent tag space.
*/
static byte const SHADERprefix[] = {
		0x82, /* context-specific [2], primitive */
		0x14 /* Length 20 */
		 /* 20 SHA digest bytes go here */
	};
	#else
/*
* Actually, there is one. SHA.1 has an OID of 1.3.14.3.2.26
* (From the 1994 Open Systems Environment Implementor's Workshop (OIW))
* The rest of the format is stolen from MD5. Do we need the @#$@$
* NULL in there?
*/
static byte const SHADERprefix[] = {
		0x30, /* Universal, Constructed, Sequence */
		0x21, /* Length 33 (bytes following) */
			0x30, /* Universal, Constructed, Sequence */
			0x09, /* Length 9 */
				0x06, /* Universal, Primitive, object-identifier */
				0x05, /* Length 8 */
					43, /* 43 = ISO(1)*40 + 3 */
					14,
					3,
					2,
					26,
				0x05, /* Universal, Primitive, NULL */
				0x00, /* Length 0 */
			0x04, /* Universal, Primitive, Octet string */
			0x14 /* Length 20 */
			 /* 20 SHA.1 digest bytes go here */
	};
#endif

struct PgpHash const HashSHA = {
		"SHA1", PGP_HASH_SHA,
		SHADERprefix, sizeof(SHADERprefix),
		SHA_HASHBYTES,
		sizeof(struct SHAContext),
		sizeof(struct{char _a; struct SHAContext _b;}) -
			sizeof(struct SHAContext),
		shaInit, shaUpdate, shaFinal
	};

#if TESTMAIN

/* ----------------------------- SHA Test code --------------------------- */
#include <stdio.h>
#include <stdlib.h> /* For exit() */
#include <time.h>

/* Size of buffer for SHA speed test data */

#define TEST_BLOCK_SIZE	( SHA_HASHBYTES * 100 )

/* Number of bytes of test data to process */

#define TEST_BYTES 10000000L
#define TEST_BLOCKS ( TEST_BYTES / TEST_BLOCK_SIZE )

#if SHA_VERSION
static char const *shaTestResults[] = {
		"A9993E364706816ABA3E25717850C26C9CD0D89D",
		"84983E441C3BD26EBAAE4AA1F95129E5E54670F1",
		"34AA973CD4C4DAA4F61EEB2BDBAD27316534016F",
		"34AA973CD4C4DAA4F61EEB2BDBAD27316534016F",
		"34AA973CD4C4DAA4F61EEB2BDBAD27316534016F" };
#else
static char const *shaTestResults[] = {
 "0164B8A914CD2A5E74C4F7FF082C4D97F1EDF880",
 "D2516EE1ACFA5BAF33DFC1C471E438449EF134C8",
 "3232AFFA48628A26653B5AAA44541FD90D690603",
 "3232AFFA48628A26653B5AAA44541FD90D690603",
"3232AFFA48628A26653B5AAA44541FD90D690603" };
#endif

static int
compareSHAresults(byte const *hash, int level)
	{
		char buf[41];
		int i;

		for (i = 0; i < SHA_HASHBYTES; i++)
		 sprintf(buf+2*i, "%02X", hash[i]);

		if (strcmp(buf, shaTestResults[level-1]) == 0) {
		 printf("Test %d passed, result = %s\n", level, buf);
		 return 0;
		} else {
			printf("Error in SHA implementation: Test %d failed\n", level);
			printf("  Result = %s\n", buf);
			printf("Expected = %s\n", shaTestResults[level-1]);
			return -1;
		}
	}


int
main(void)
	{
		struct SHAContext sha;
		byte data[TEST_BLOCK_SIZE];
		byte const *hash;
		clock_t ticks;
		long i;

		/*
		* Test output data (these are the only test data given in the
		* Secure Hash Standard document, but chances are if it works
		* for this it'll work for anything)
		*/
		shaInit(&sha);
		shaUpdate(&sha, (byte *)"abc", 3);
		hash = shaFinal(&sha);
		if (compareSHAresults(hash, 1) < 0)
		 exit (-1);

		shaInit(&sha);
		shaUpdate(&sha, (byte *)"abcdbcdecdefdefgefghfghighijhijki\
jkljklmklmnlmnomnopnopq", 56);
		hash = shaFinal(&sha);
		if (compareSHAresults(hash, 2) < 0)
		 exit (-1);

		/* 1,000,000 bytes of ASCII 'a' (0x61), by 64's */
		shaInit(&sha);
		for (i = 0; i < 15625; i++)
		 shaUpdate(&sha, (byte *)"aaaaaaaaaaaaaaaaaaaaaaaaa\
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 64);
 hash = shaFinal(&sha);
 if (compareSHAresults(hash, 3) < 0)
		 exit (-1);

		/* 1,000,000 bytes of ASCII 'a' (0x61), by 25's */
		shaInit(&sha);
		for (i = 0; i < 40000; i++)
		 shaUpdate(&sha, (byte *)"aaaaaaaaaaaaaaaaaaaaaaaaa", 25);
		hash = shaFinal(&sha);
		if (compareSHAresults(hash, 4) < 0)
		 exit (-1);

		/* 1,000,000 bytes of ASCII 'a' (0x61), by 125's */
		shaInit(&sha);
		for (i = 0; i < 8000; i++)
		 shaUpdate(&sha, (byte *)"aaaaaaaaaaaaaaaaaaaaaaaaa\
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 125);
		hash = shaFinal(&sha);
		if (compareSHAresults(hash, 5) < 0)
		 exit (-1);

		/* Now perform time trial, generating MD for 10MB of data. First,
		initialize the test data */
		memset(data, 0, TEST_BLOCK_SIZE);

		/* Get start time */
		printf("SHA time trial.  Processing %ld characters...\n", TEST_BYTES);
		ticks = clock();

		/* Calculate SHA message digest in TEST_BLOCK_SIZE byte blocks */
		shaInit(&sha);
		for (i = TEST_BLOCKS; i > 0; i--)
		 shaUpdate(&sha, data, TEST_BLOCK_SIZE);
		hash = shaFinal(&sha);

		/* Get finish time and print difference */
		ticks = clock() - ticks;
		printf("Ticks to process test input: %lu\n", (unsigned long)ticks);

		return 0;
	}
#endif /* Test driver */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -