ekg2  GIT master
Definicje | Funkcje
Dokumentacja pliku gg-keygen-sha1.h

Idź do kodu źródłowego tego pliku.

Definicje

#define rol(value, bits)   (((value) << (bits)) | ((value) >> (32 - (bits))))
 
#define blk0(i)
 
#define blk(i)
 
#define R0(v, w, x, y, z, i)   z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30);
 
#define R1(v, w, x, y, z, i)   z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30);
 
#define R2(v, w, x, y, z, i)   z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30);
 
#define R3(v, w, x, y, z, i)   z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30);
 
#define R4(v, w, x, y, z, i)   z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
 
#define S0(v, w, x, y, z, i)   z+=((w&(x^y))^y)+0x5A827999+rol(v,5);w=rol(w,30);
 
#define S1(v, w, x, y, z, i)   z+=((w&(x^y))^y)+0x5A827999+rol(v,5);w=rol(w,30);
 
#define S2(v, w, x, y, z, i)   z+=(w^x^y)+0x6ED9EBA1+rol(v,5);w=rol(w,30);
 
#define S3(v, w, x, y, z, i)   z+=(((w|x)&y)|(w&x))+0x8F1BBCDC+rol(v,5);w=rol(w,30);
 
#define S4(v, w, x, y, z, i)   z+=(w^x^y)+0xCA62C1D6+rol(v,5);w=rol(w,30);
 
#define SHA_STATE0   0x67452301
 
#define SHA_STATE1   0xEFCDAB89
 
#define SHA_STATE2   0x98BADCFE
 
#define SHA_STATE3   0x10325476
 
#define SHA_STATE4   0xC3D2E1F0
 

Funkcje

static int gg_login_sha1hash (const unsigned char *password, const size_t passlen, const guint32 seed, const guint32 *dig)
 

Dokumentacja definicji

§ blk

#define blk (   i)
Wartość:
(block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \
^block->l[(i+2)&15]^block->l[i&15],1))
#define rol(value, bits)
Definition: gg-keygen-sha1.h:3
int i
Definition: ekg_hash_benchmark.c:110

§ blk0

#define blk0 (   i)
Wartość:
(block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \
|(rol(block->l[i],8)&0x00FF00FF))
#define rol(value, bits)
Definition: gg-keygen-sha1.h:3
int i
Definition: ekg_hash_benchmark.c:110

§ R0

#define R0 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30);

§ R1

#define R1 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30);

§ R2

#define R2 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30);

§ R3

#define R3 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30);

§ R4

#define R4 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);

§ rol

#define rol (   value,
  bits 
)    (((value) << (bits)) | ((value) >> (32 - (bits))))

§ S0

#define S0 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=((w&(x^y))^y)+0x5A827999+rol(v,5);w=rol(w,30);

§ S1

#define S1 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=((w&(x^y))^y)+0x5A827999+rol(v,5);w=rol(w,30);

§ S2

#define S2 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(w^x^y)+0x6ED9EBA1+rol(v,5);w=rol(w,30);

§ S3

#define S3 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(((w|x)&y)|(w&x))+0x8F1BBCDC+rol(v,5);w=rol(w,30);

§ S4

#define S4 (   v,
  w,
  x,
  y,
  z,
  i 
)    z+=(w^x^y)+0xCA62C1D6+rol(v,5);w=rol(w,30);

§ SHA_STATE0

#define SHA_STATE0   0x67452301

§ SHA_STATE1

#define SHA_STATE1   0xEFCDAB89

§ SHA_STATE2

#define SHA_STATE2   0x98BADCFE

§ SHA_STATE3

#define SHA_STATE3   0x10325476

§ SHA_STATE4

#define SHA_STATE4   0xC3D2E1F0

Dokumentacja funkcji

§ gg_login_sha1hash()

static int gg_login_sha1hash ( const unsigned char *  password,
const size_t  passlen,
const guint32  seed,
const guint32 *  dig 
)
inlinestatic