⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 shacal2_8cpp-source.html

📁 著名的密码库Crypto++的文档 C++语言的杰作。程序员必备。
💻 HTML
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><title>Crypto++: shacal2.cpp Source File</title><link href="doxygen.css" rel="stylesheet" type="text/css"><link href="tabs.css" rel="stylesheet" type="text/css"></head><body><!-- Generated by Doxygen 1.5.2 --><div class="tabs">  <ul>    <li><a href="index.html"><span>Main&nbsp;Page</span></a></li>    <li><a href="namespaces.html"><span>Namespaces</span></a></li>    <li><a href="classes.html"><span>Classes</span></a></li>    <li class="current"><a href="files.html"><span>Files</span></a></li>  </ul></div><div class="tabs">  <ul>    <li><a href="files.html"><span>File&nbsp;List</span></a></li>    <li><a href="globals.html"><span>File&nbsp;Members</span></a></li>  </ul></div><h1>shacal2.cpp</h1><div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// shacal2.cpp - by Kevin Springle, 2003</span><a name="l00002"></a>00002 <span class="comment">//</span><a name="l00003"></a>00003 <span class="comment">// Portions of this code were derived from</span><a name="l00004"></a>00004 <span class="comment">// Wei Dai's implementation of SHA-2</span><a name="l00005"></a>00005 <span class="comment">//</span><a name="l00006"></a>00006 <span class="comment">// The original code and all modifications are in the public domain.</span><a name="l00007"></a>00007 <a name="l00008"></a>00008 <span class="preprocessor">#include "pch.h"</span><a name="l00009"></a>00009 <span class="preprocessor">#include "<a class="code" href="shacal2_8h.html">shacal2.h</a>"</span><a name="l00010"></a>00010 <span class="preprocessor">#include "misc.h"</span><a name="l00011"></a>00011 <a name="l00012"></a>00012 NAMESPACE_BEGIN(CryptoPP)<a name="l00013"></a>00013 <a name="l00014"></a>00014 <span class="comment">// SHACAL-2 function and round definitions</span><a name="l00015"></a>00015 <a name="l00016"></a>00016 <span class="preprocessor">#define S0(x) (rotrFixed(x,2)^rotrFixed(x,13)^rotrFixed(x,22))</span><a name="l00017"></a>00017 <span class="preprocessor"></span><span class="preprocessor">#define S1(x) (rotrFixed(x,6)^rotrFixed(x,11)^rotrFixed(x,25))</span><a name="l00018"></a>00018 <span class="preprocessor"></span><span class="preprocessor">#define s0(x) (rotrFixed(x,7)^rotrFixed(x,18)^(x&gt;&gt;3))</span><a name="l00019"></a>00019 <span class="preprocessor"></span><span class="preprocessor">#define s1(x) (rotrFixed(x,17)^rotrFixed(x,19)^(x&gt;&gt;10))</span><a name="l00020"></a>00020 <span class="preprocessor"></span><a name="l00021"></a>00021 <span class="preprocessor">#define Ch(x,y,z) (z^(x&amp;(y^z)))</span><a name="l00022"></a>00022 <span class="preprocessor"></span><span class="preprocessor">#define Maj(x,y,z) ((x&amp;y)|(z&amp;(x|y)))</span><a name="l00023"></a>00023 <span class="preprocessor"></span><a name="l00024"></a>00024 <span class="comment">/* R is the SHA-256 round function. */</span><a name="l00025"></a>00025 <span class="comment">/* This macro increments the k argument as a side effect. */</span><a name="l00026"></a>00026 <span class="preprocessor">#define R(a,b,c,d,e,f,g,h,k) \</span><a name="l00027"></a>00027 <span class="preprocessor">        h+=S1(e)+Ch(e,f,g)+*k++;d+=h;h+=S0(a)+Maj(a,b,c);</span><a name="l00028"></a>00028 <span class="preprocessor"></span><a name="l00029"></a>00029 <span class="comment">/* P is the inverse of the SHA-256 round function. */</span><a name="l00030"></a>00030 <span class="comment">/* This macro decrements the k argument as a side effect. */</span><a name="l00031"></a>00031 <span class="preprocessor">#define P(a,b,c,d,e,f,g,h,k) \</span><a name="l00032"></a>00032 <span class="preprocessor">        h-=S0(a)+Maj(a,b,c);d-=h;h-=S1(e)+Ch(e,f,g)+*--k;</span><a name="l00033"></a>00033 <span class="preprocessor"></span><a name="l00034"></a>00034 <span class="keywordtype">void</span> SHACAL2::Base::UncheckedSetKey(<span class="keyword">const</span> byte *userKey, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> keylen, <span class="keyword">const</span> <a class="code" href="class_name_value_pairs.html" title="interface for retrieving values given their names">NameValuePairs</a> &amp;)<a name="l00035"></a>00035 {<a name="l00036"></a>00036         AssertValidKeyLength(keylen);<a name="l00037"></a>00037 <a name="l00038"></a>00038         word32 *rk = m_key;<a name="l00039"></a>00039         <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i;<a name="l00040"></a>00040 <a name="l00041"></a>00041         GetUserKey(<a class="code" href="cryptlib_8h.html#aeb92d42f5a6e27b8ba19f18d69d142bf0c3bb6c718cc7ff0bffef4e8f178c57">BIG_ENDIAN_ORDER</a>, rk, m_key.size(), userKey, keylen);<a name="l00042"></a>00042         <span class="keywordflow">for</span> (i = 0; i &lt; 48; i++, rk++)<a name="l00043"></a>00043         {<a name="l00044"></a>00044                 rk[16] = rk[0] + s0(rk[1]) + rk[9] + s1(rk[14]);<a name="l00045"></a>00045                 rk[0] += K[i];<a name="l00046"></a>00046         }<a name="l00047"></a>00047         <span class="keywordflow">for</span> (i = 48; i &lt; 64; i++, rk++)<a name="l00048"></a>00048         {<a name="l00049"></a>00049                 rk[0] += K[i];<a name="l00050"></a>00050         }<a name="l00051"></a>00051 }<a name="l00052"></a>00052 <a name="l00053"></a>00053 <span class="keyword">typedef</span> <a class="code" href="struct_block_get_and_put.html">BlockGetAndPut&lt;word32, BigEndian&gt;</a> <a class="code" href="struct_block_get_and_put.html">Block</a>;<a name="l00054"></a>00054 <a name="l00055"></a>00055 <span class="keywordtype">void</span> SHACAL2::Enc::ProcessAndXorBlock(<span class="keyword">const</span> byte *inBlock, <span class="keyword">const</span> byte *xorBlock, byte *outBlock)<span class="keyword"> const</span><a name="l00056"></a>00056 <span class="keyword"></span>{<a name="l00057"></a>00057         word32 a, b, c, d, e, f, g, h;<a name="l00058"></a>00058         <span class="keyword">const</span> word32 *rk = m_key;<a name="l00059"></a>00059 <a name="l00060"></a>00060         <span class="comment">/*</span><a name="l00061"></a>00061 <span class="comment">         * map byte array block to cipher state:</span><a name="l00062"></a>00062 <span class="comment">         */</span><a name="l00063"></a>00063         <a class="code" href="struct_block_get_and_put.html#07781cc0817613fe47e8070999cf4b95">Block::Get</a>(inBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00064"></a>00064 <a name="l00065"></a>00065         <span class="comment">// Perform SHA-256 transformation.</span><a name="l00066"></a>00066 <a name="l00067"></a>00067         <span class="comment">/* 64 operations, partially loop unrolled */</span><a name="l00068"></a>00068         <span class="keywordflow">for</span> (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> j=0; j&lt;64; j+=8)<a name="l00069"></a>00069         {<a name="l00070"></a>00070                 R(a,b,c,d,e,f,g,h,rk);<a name="l00071"></a>00071                 R(h,a,b,c,d,e,f,g,rk);<a name="l00072"></a>00072                 R(g,h,a,b,c,d,e,f,rk);<a name="l00073"></a>00073                 R(f,g,h,a,b,c,d,e,rk);<a name="l00074"></a>00074                 R(e,f,g,h,a,b,c,d,rk);<a name="l00075"></a>00075                 R(d,e,f,g,h,a,b,c,rk);<a name="l00076"></a>00076                 R(c,d,e,f,g,h,a,b,rk);<a name="l00077"></a>00077                 R(b,c,d,e,f,g,h,a,rk);<a name="l00078"></a>00078         }<a name="l00079"></a>00079 <a name="l00080"></a>00080         <span class="comment">/*</span><a name="l00081"></a>00081 <span class="comment">         * map cipher state to byte array block:</span><a name="l00082"></a>00082 <span class="comment">         */</span><a name="l00083"></a>00083 <a name="l00084"></a>00084         <a class="code" href="struct_block_get_and_put.html#63d96a17e8118407e02896d0b0f8d92d">Block::Put</a>(xorBlock, outBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00085"></a>00085 }<a name="l00086"></a>00086 <a name="l00087"></a>00087 <span class="keywordtype">void</span> SHACAL2::Dec::ProcessAndXorBlock(<span class="keyword">const</span> byte *inBlock, <span class="keyword">const</span> byte *xorBlock, byte *outBlock)<span class="keyword"> const</span><a name="l00088"></a>00088 <span class="keyword"></span>{<a name="l00089"></a>00089         word32 a, b, c, d, e, f, g, h;<a name="l00090"></a>00090         <span class="keyword">const</span> word32 *rk = m_key + 64;<a name="l00091"></a>00091 <a name="l00092"></a>00092         <span class="comment">/*</span><a name="l00093"></a>00093 <span class="comment">         * map byte array block to cipher state:</span><a name="l00094"></a>00094 <span class="comment">         */</span><a name="l00095"></a>00095         <a class="code" href="struct_block_get_and_put.html#07781cc0817613fe47e8070999cf4b95">Block::Get</a>(inBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00096"></a>00096 <a name="l00097"></a>00097         <span class="comment">// Perform inverse SHA-256 transformation.</span><a name="l00098"></a>00098 <a name="l00099"></a>00099         <span class="comment">/* 64 operations, partially loop unrolled */</span><a name="l00100"></a>00100         <span class="keywordflow">for</span> (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> j=0; j&lt;64; j+=8)<a name="l00101"></a>00101         {<a name="l00102"></a>00102                 P(b,c,d,e,f,g,h,a,rk);<a name="l00103"></a>00103                 P(c,d,e,f,g,h,a,b,rk);<a name="l00104"></a>00104                 P(d,e,f,g,h,a,b,c,rk);<a name="l00105"></a>00105                 P(e,f,g,h,a,b,c,d,rk);<a name="l00106"></a>00106                 P(f,g,h,a,b,c,d,e,rk);<a name="l00107"></a>00107                 P(g,h,a,b,c,d,e,f,rk);<a name="l00108"></a>00108                 P(h,a,b,c,d,e,f,g,rk);<a name="l00109"></a>00109                 P(a,b,c,d,e,f,g,h,rk);<a name="l00110"></a>00110         }<a name="l00111"></a>00111 <a name="l00112"></a>00112         <span class="comment">/*</span><a name="l00113"></a>00113 <span class="comment">         * map cipher state to byte array block:</span><a name="l00114"></a>00114 <span class="comment">         */</span><a name="l00115"></a>00115 <a name="l00116"></a>00116         <a class="code" href="struct_block_get_and_put.html#63d96a17e8118407e02896d0b0f8d92d">Block::Put</a>(xorBlock, outBlock)(a)(b)(c)(d)(e)(f)(g)(h);<a name="l00117"></a>00117 }<a name="l00118"></a>00118 <a name="l00119"></a>00119 <span class="comment">// The SHACAL-2 round constants are identical to the SHA-256 round constants.</span><a name="l00120"></a>00120 <span class="keyword">const</span> word32 SHACAL2::Base::K[64] =<a name="l00121"></a>00121 {<a name="l00122"></a>00122         0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,<a name="l00123"></a>00123         0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,<a name="l00124"></a>00124         0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,<a name="l00125"></a>00125         0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,<a name="l00126"></a>00126         0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,<a name="l00127"></a>00127         0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,<a name="l00128"></a>00128         0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,<a name="l00129"></a>00129         0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,<a name="l00130"></a>00130         0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,<a name="l00131"></a>00131         0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,<a name="l00132"></a>00132         0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,<a name="l00133"></a>00133         0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,<a name="l00134"></a>00134         0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,<a name="l00135"></a>00135         0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,<a name="l00136"></a>00136         0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,<a name="l00137"></a>00137         0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2<a name="l00138"></a>00138 };<a name="l00139"></a>00139 <a name="l00140"></a>00140 NAMESPACE_END</pre></div><hr size="1"><address style="text-align: right;"><small>Generated on Fri Jun 1 11:11:24 2007 for Crypto++ by&nbsp;<a href="http://www.doxygen.org/index.html"><img src="doxygen.png" alt="doxygen" align="middle" border="0"></a> 1.5.2 </small></address></body></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -