📄 shacal2_8cpp-source.html
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><title>Crypto++: shacal2.cpp Source File</title><link href="doxygen.css" rel="stylesheet" type="text/css"><link href="tabs.css" rel="stylesheet" type="text/css"></head><body><!-- Generated by Doxygen 1.5.2 --><div class="tabs"> <ul> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li><a href="classes.html"><span>Classes</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul></div><div class="tabs"> <ul> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>File Members</span></a></li> </ul></div><h1>shacal2.cpp</h1><div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// shacal2.cpp - by Kevin Springle, 2003</span><a name="l00002"></a>00002 <span class="comment">//</span><a name="l00003"></a>00003 <span class="comment">// Portions of this code were derived from</span><a name="l00004"></a>00004 <span class="comment">// Wei Dai's implementation of SHA-2</span><a name="l00005"></a>00005 <span class="comment">//</span><a name="l00006"></a>00006 <span class="comment">// The original code and all modifications are in the public domain.</span><a name="l00007"></a>00007 <a name="l00008"></a>00008 <span class="preprocessor">#include "pch.h"</span><a name="l00009"></a>00009 <span class="preprocessor">#include "<a class="code" href="shacal2_8h.html">shacal2.h</a>"</span><a name="l00010"></a>00010 <span class="preprocessor">#include "misc.h"</span><a name="l00011"></a>00011 <a name="l00012"></a>00012 NAMESPACE_BEGIN(CryptoPP)<a name="l00013"></a>00013 <a name="l00014"></a>00014 <span class="comment">// SHACAL-2 function and round definitions</span><a name="l00015"></a>00015 <a name="l00016"></a>00016 <span class="preprocessor">#define S0(x) (rotrFixed(x,2)^rotrFixed(x,13)^rotrFixed(x,22))</span><a name="l00017"></a>00017 <span class="preprocessor"></span><span class="preprocessor">#define S1(x) (rotrFixed(x,6)^rotrFixed(x,11)^rotrFixed(x,25))</span><a name="l00018"></a>00018 <span class="preprocessor"></span><span class="preprocessor">#define s0(x) (rotrFixed(x,7)^rotrFixed(x,18)^(x>>3))</span><a name="l00019"></a>00019 <span class="preprocessor"></span><span class="preprocessor">#define s1(x) (rotrFixed(x,17)^rotrFixed(x,19)^(x>>10))</span><a name="l00020"></a>00020 <span class="preprocessor"></span><a name="l00021"></a>00021 <span class="preprocessor">#define Ch(x,y,z) (z^(x&(y^z)))</span><a name="l00022"></a>00022 <span class="preprocessor"></span><span class="preprocessor">#define Maj(x,y,z) ((x&y)|(z&(x|y)))</span><a name="l00023"></a>00023 <span class="preprocessor"></span><a name="l00024"></a>00024 <span class="comment">/* R is the SHA-256 round function. */</span><a name="l00025"></a>00025 <span class="comment">/* This macro increments the k argument as a side effect. */</span><a name="l00026"></a>00026 <span class="preprocessor">#define R(a,b,c,d,e,f,g,h,k) \</span><a name="l00027"></a>00027 <span class="preprocessor"> h+=S1(e)+Ch(e,f,g)+*k++;d+=h;h+=S0(a)+Maj(a,b,c);</span><a name="l00028"></a>00028 <span class="preprocessor"></span><a name="l00029"></a>00029 <span class="comment">/* P is the inverse of the SHA-256 round function. */</span><a name="l00030"></a>00030 <span class="comment">/* This macro decrements the k argument as a side effect. */</span><a name="l00031"></a>00031 <span class="preprocessor">#define P(a,b,c,d,e,f,g,h,k) \</span><a name="l00032"></a>00032 <span class="preprocessor"> h-=S0(a)+Maj(a,b,c);d-=h;h-=S1(e)+Ch(e,f,g)+*--k;</span><a name="l00033"></a>00033 <span class="preprocessor"></span><a name="l00034"></a>00034 <span class="keywordtype">void</span> SHACAL2::Base::UncheckedSetKey(<span class="keyword">const</span> byte *userKey, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> keylen, <span class="keyword">const</span> <a class="code" href="class_name_value_pairs.html" title="interface for retrieving values given their names">NameValuePairs</a> &)<a name="l00035"></a>00035 {<a name="l00036"></a>00036 AssertValidKeyLength(keylen);<a name="l00037"></a>00037 <a name="l00038"></a>00038 word32 *rk = m_key;<a name="l00039"></a>00039 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i;<a name="l00040"></a>00040 <a name="l00041"></a>00041 GetUserKey(<a class="code" href="cryptlib_8h.html#aeb92d42f5a6e27b8ba19f18d69d142bf0c3bb6c718cc7ff0bffef4e8f178c57">BIG_ENDIAN_ORDER</a>, rk, m_key.size(), userKey, keylen);<a name="l00042"></a>00042 <span class="keywordflow">for</span> (i = 0; i < 48; i++, rk++)<a name="l00043"></a>00043 {<a name="l00044"></a>00044 rk[16] = rk[0] + s0(rk[1]) + rk[9] + s1(rk[14]);<a name="l00045"></a>00045 rk[0] += K[i];<a name="l00046"></a>00046 }<a name="l00047"></a>00047 <span class="keywordflow">for</span> (i = 48; i < 64; i++, rk++)<a name="l00048"></a>00048 {<a name="l00049"></a>00049 rk[0] += K[i];<a name="l00050"></a>00050 }<a name="l00051"></a>00051 }<a name="l00052"></a>00052 <a name="l00053"></a>00053 <span class="keyword">typedef</span> <a class="code" href="struct_block_get_and_put.html">BlockGetAndPut<word32, BigEndian></a> <a class="code" href="struct_block_get_and_put.html">Block</a>;<a name="l00054"></a>00054 <a name="l00055"></a>00055 <span class="keywordtype">void</span> SHACAL2::Enc::ProcessAndXorBlock(<span class="keyword">const</span> byte *inBlock, <span class="keyword">const</span> byte *xorBlock, byte *outBlock)<span class="keyword"> const</span><a name="l00056"></a>00056 <span class="keyword"></span>{<a name="l00057"></a>00057 word32 a, b, c, d, e, f, g, h;<a name="l00058"></a>00058 <span class="keyword">const</span> word32 *rk = m_key;<a name="l00059"></a>00059 <a name="l00060"></a>00060 <span class="comment">/*</span><a name="l00061"></a>00061 <span class="comment"> * map byte array block to cipher state:</span><a name="l00062"></a>00062 <span class="comment"> */</span><a name="l00063"></a>00063 <a class="code" href="struct_block_get_and_put.html#07781cc0817613fe47e8070999cf4b95">Block::Get</a>(inBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00064"></a>00064 <a name="l00065"></a>00065 <span class="comment">// Perform SHA-256 transformation.</span><a name="l00066"></a>00066 <a name="l00067"></a>00067 <span class="comment">/* 64 operations, partially loop unrolled */</span><a name="l00068"></a>00068 <span class="keywordflow">for</span> (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> j=0; j<64; j+=8)<a name="l00069"></a>00069 {<a name="l00070"></a>00070 R(a,b,c,d,e,f,g,h,rk);<a name="l00071"></a>00071 R(h,a,b,c,d,e,f,g,rk);<a name="l00072"></a>00072 R(g,h,a,b,c,d,e,f,rk);<a name="l00073"></a>00073 R(f,g,h,a,b,c,d,e,rk);<a name="l00074"></a>00074 R(e,f,g,h,a,b,c,d,rk);<a name="l00075"></a>00075 R(d,e,f,g,h,a,b,c,rk);<a name="l00076"></a>00076 R(c,d,e,f,g,h,a,b,rk);<a name="l00077"></a>00077 R(b,c,d,e,f,g,h,a,rk);<a name="l00078"></a>00078 }<a name="l00079"></a>00079 <a name="l00080"></a>00080 <span class="comment">/*</span><a name="l00081"></a>00081 <span class="comment"> * map cipher state to byte array block:</span><a name="l00082"></a>00082 <span class="comment"> */</span><a name="l00083"></a>00083 <a name="l00084"></a>00084 <a class="code" href="struct_block_get_and_put.html#63d96a17e8118407e02896d0b0f8d92d">Block::Put</a>(xorBlock, outBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00085"></a>00085 }<a name="l00086"></a>00086 <a name="l00087"></a>00087 <span class="keywordtype">void</span> SHACAL2::Dec::ProcessAndXorBlock(<span class="keyword">const</span> byte *inBlock, <span class="keyword">const</span> byte *xorBlock, byte *outBlock)<span class="keyword"> const</span><a name="l00088"></a>00088 <span class="keyword"></span>{<a name="l00089"></a>00089 word32 a, b, c, d, e, f, g, h;<a name="l00090"></a>00090 <span class="keyword">const</span> word32 *rk = m_key + 64;<a name="l00091"></a>00091 <a name="l00092"></a>00092 <span class="comment">/*</span><a name="l00093"></a>00093 <span class="comment"> * map byte array block to cipher state:</span><a name="l00094"></a>00094 <span class="comment"> */</span><a name="l00095"></a>00095 <a class="code" href="struct_block_get_and_put.html#07781cc0817613fe47e8070999cf4b95">Block::Get</a>(inBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00096"></a>00096 <a name="l00097"></a>00097 <span class="comment">// Perform inverse SHA-256 transformation.</span><a name="l00098"></a>00098 <a name="l00099"></a>00099 <span class="comment">/* 64 operations, partially loop unrolled */</span><a name="l00100"></a>00100 <span class="keywordflow">for</span> (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> j=0; j<64; j+=8)<a name="l00101"></a>00101 {<a name="l00102"></a>00102 P(b,c,d,e,f,g,h,a,rk);<a name="l00103"></a>00103 P(c,d,e,f,g,h,a,b,rk);<a name="l00104"></a>00104 P(d,e,f,g,h,a,b,c,rk);<a name="l00105"></a>00105 P(e,f,g,h,a,b,c,d,rk);<a name="l00106"></a>00106 P(f,g,h,a,b,c,d,e,rk);<a name="l00107"></a>00107 P(g,h,a,b,c,d,e,f,rk);<a name="l00108"></a>00108 P(h,a,b,c,d,e,f,g,rk);<a name="l00109"></a>00109 P(a,b,c,d,e,f,g,h,rk);<a name="l00110"></a>00110 }<a name="l00111"></a>00111 <a name="l00112"></a>00112 <span class="comment">/*</span><a name="l00113"></a>00113 <span class="comment"> * map cipher state to byte array block:</span><a name="l00114"></a>00114 <span class="comment"> */</span><a name="l00115"></a>00115 <a name="l00116"></a>00116 <a class="code" href="struct_block_get_and_put.html#63d96a17e8118407e02896d0b0f8d92d">Block::Put</a>(xorBlock, outBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00117"></a>00117 }<a name="l00118"></a>00118 <a name="l00119"></a>00119 <span class="comment">// The SHACAL-2 round constants are identical to the SHA-256 round constants.</span><a name="l00120"></a>00120 <span class="keyword">const</span> word32 SHACAL2::Base::K[64] =<a name="l00121"></a>00121 {<a name="l00122"></a>00122 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,<a name="l00123"></a>00123 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,<a name="l00124"></a>00124 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,<a name="l00125"></a>00125 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,<a name="l00126"></a>00126 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,<a name="l00127"></a>00127 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,<a name="l00128"></a>00128 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,<a name="l00129"></a>00129 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,<a name="l00130"></a>00130 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,<a name="l00131"></a>00131 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,<a name="l00132"></a>00132 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,<a name="l00133"></a>00133 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,<a name="l00134"></a>00134 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,<a name="l00135"></a>00135 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,<a name="l00136"></a>00136 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,<a name="l00137"></a>00137 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2<a name="l00138"></a>00138 };<a name="l00139"></a>00139 <a name="l00140"></a>00140 NAMESPACE_END</pre></div><hr size="1"><address style="text-align: right;"><small>Generated on Fri Jun 1 11:11:24 2007 for Crypto++ by <a href="http://www.doxygen.org/index.html"><img src="doxygen.png" alt="doxygen" align="middle" border="0"></a> 1.5.2 </small></address></body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -