From aee0fd8320514627d8ea5306bd4666bcd74d9c46 Mon Sep 17 00:00:00 2001 From: Glenn L McGrath Date: Tue, 18 Nov 2003 19:33:13 +0000 Subject: [PATCH] Replaced by md5_sha1_sum.c --- coreutils/sha1sum.c | 492 ---------------------------------------------------- 1 file changed, 492 deletions(-) delete mode 100644 coreutils/sha1sum.c diff --git a/coreutils/sha1sum.c b/coreutils/sha1sum.c deleted file mode 100644 index 1148aac..0000000 --- a/coreutils/sha1sum.c +++ /dev/null @@ -1,492 +0,0 @@ -/* - * Based on shasum from http://www.netsw.org/crypto/hash/ - * Majorly hacked up to use Dr Brian Gladman's sha1 code - * - * Copyright (C) 1999 Scott G. Miller - * Copyright (C) 2003 Glenn L. McGrath - * Copyright (C) 2003 Erik Andersen - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. - */ - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include "busybox.h" - - -/* - --------------------------------------------------------------------------- - Begin Dr. Gladman's sha1 code - --------------------------------------------------------------------------- -*/ - -/* - --------------------------------------------------------------------------- - Copyright (c) 2002, Dr Brian Gladman , Worcester, UK. - All rights reserved. - - LICENSE TERMS - - The free distribution and use of this software in both source and binary - form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - - ALTERNATIVELY, provided that this notice is retained in full, this product - may be distributed under the terms of the GNU General Public License (GPL), - in which case the provisions of the GPL apply INSTEAD OF those given above. - - DISCLAIMER - - This software is provided 'as is' with no explicit or implied warranties - in respect of its properties, including, but not limited to, correctness - and/or fitness for purpose. - --------------------------------------------------------------------------- - Issue Date: 10/11/2002 - - This is a byte oriented version of SHA1 that operates on arrays of bytes - stored in memory. It runs at 22 cycles per byte on a Pentium P4 processor -*/ - -#define SHA1_BLOCK_SIZE 64 -#define SHA1_DIGEST_SIZE 20 -#define SHA1_HASH_SIZE SHA1_DIGEST_SIZE -#define SHA2_GOOD 0 -#define SHA2_BAD 1 - -/* type to hold the SHA1 context */ -typedef struct -{ uint32_t count[2]; - uint32_t hash[5]; - uint32_t wbuf[16]; -} sha1_ctx; - -#define rotl32(x,n) (((x) << n) | ((x) >> (32 - n))) - -#if __BYTE_ORDER == __BIG_ENDIAN -# define swap_b32(x) (x) -#elif defined(bswap_32) -# define swap_b32(x) bswap_32(x) -#else -# define swap_b32(x) ((rotl32((x), 8) & 0x00ff00ff) | (rotl32((x), 24) & 0xff00ff00)) -#endif - -#define SHA1_MASK (SHA1_BLOCK_SIZE - 1) - -/* reverse byte order in 32-bit words */ -#define ch(x,y,z) (((x) & (y)) ^ (~(x) & (z))) -#define parity(x,y,z) ((x) ^ (y) ^ (z)) -#define maj(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z))) - -/* A normal version as set out in the FIPS. This version uses */ -/* partial loop unrolling and is optimised for the Pentium 4 */ -#define rnd(f,k) \ - t = a; a = rotl32(a,5) + f(b,c,d) + e + k + w[i]; \ - e = d; d = c; c = rotl32(b, 30); b = t - -void sha1_compile(sha1_ctx ctx[1]) -{ - uint32_t w[80], i, a, b, c, d, e, t; - - /* note that words are compiled from the buffer into 32-bit */ - /* words in big-endian order so an order reversal is needed */ - /* here on little endian machines */ - for(i = 0; i < SHA1_BLOCK_SIZE / 4; ++i) - w[i] = swap_b32(ctx->wbuf[i]); - - for(i = SHA1_BLOCK_SIZE / 4; i < 80; ++i) - w[i] = rotl32(w[i - 3] ^ w[i - 8] ^ w[i - 14] ^ w[i - 16], 1); - - a = ctx->hash[0]; - b = ctx->hash[1]; - c = ctx->hash[2]; - d = ctx->hash[3]; - e = ctx->hash[4]; - - for(i = 0; i < 20; ++i) - { - rnd(ch, 0x5a827999); - } - - for(i = 20; i < 40; ++i) - { - rnd(parity, 0x6ed9eba1); - } - - for(i = 40; i < 60; ++i) - { - rnd(maj, 0x8f1bbcdc); - } - - for(i = 60; i < 80; ++i) - { - rnd(parity, 0xca62c1d6); - } - - ctx->hash[0] += a; - ctx->hash[1] += b; - ctx->hash[2] += c; - ctx->hash[3] += d; - ctx->hash[4] += e; -} - -void sha1_begin(sha1_ctx ctx[1]) -{ - ctx->count[0] = ctx->count[1] = 0; - ctx->hash[0] = 0x67452301; - ctx->hash[1] = 0xefcdab89; - ctx->hash[2] = 0x98badcfe; - ctx->hash[3] = 0x10325476; - ctx->hash[4] = 0xc3d2e1f0; -} - -/* SHA1 hash data in an array of bytes into hash buffer and call the */ -/* hash_compile function as required. */ -void sha1_hash(const unsigned char data[], unsigned int len, sha1_ctx ctx[1]) -{ - uint32_t pos = (uint32_t)(ctx->count[0] & SHA1_MASK), - freeb = SHA1_BLOCK_SIZE - pos; - const unsigned char *sp = data; - - if((ctx->count[0] += len) < len) - ++(ctx->count[1]); - - while(len >= freeb) /* tranfer whole blocks while possible */ - { - memcpy(((unsigned char*)ctx->wbuf) + pos, sp, freeb); - sp += freeb; len -= freeb; freeb = SHA1_BLOCK_SIZE; pos = 0; - sha1_compile(ctx); - } - - memcpy(((unsigned char*)ctx->wbuf) + pos, sp, len); -} - -/* SHA1 Final padding and digest calculation */ -#if __BYTE_ORDER == __LITTLE_ENDIAN -static uint32_t mask[4] = - { 0x00000000, 0x000000ff, 0x0000ffff, 0x00ffffff }; -static uint32_t bits[4] = - { 0x00000080, 0x00008000, 0x00800000, 0x80000000 }; -#else -static uint32_t mask[4] = - { 0x00000000, 0xff000000, 0xffff0000, 0xffffff00 }; -static uint32_t bits[4] = - { 0x80000000, 0x00800000, 0x00008000, 0x00000080 }; -#endif - -void sha1_end(unsigned char hval[], sha1_ctx ctx[1]) -{ - uint32_t i, cnt = (uint32_t)(ctx->count[0] & SHA1_MASK); - - /* mask out the rest of any partial 32-bit word and then set */ - /* the next byte to 0x80. On big-endian machines any bytes in */ - /* the buffer will be at the top end of 32 bit words, on little */ - /* endian machines they will be at the bottom. Hence the AND */ - /* and OR masks above are reversed for little endian systems */ - ctx->wbuf[cnt >> 2] = (ctx->wbuf[cnt >> 2] & mask[cnt & 3]) | bits[cnt & 3]; - - /* we need 9 or more empty positions, one for the padding byte */ - /* (above) and eight for the length count. If there is not */ - /* enough space pad and empty the buffer */ - if(cnt > SHA1_BLOCK_SIZE - 9) - { - if(cnt < 60) ctx->wbuf[15] = 0; - sha1_compile(ctx); - cnt = 0; - } - else /* compute a word index for the empty buffer positions */ - cnt = (cnt >> 2) + 1; - - while(cnt < 14) /* and zero pad all but last two positions */ - ctx->wbuf[cnt++] = 0; - - /* assemble the eight byte counter in the buffer in big-endian */ - /* format */ - - ctx->wbuf[14] = swap_b32((ctx->count[1] << 3) | (ctx->count[0] >> 29)); - ctx->wbuf[15] = swap_b32(ctx->count[0] << 3); - - sha1_compile(ctx); - - /* extract the hash value as bytes in case the hash buffer is */ - /* misaligned for 32-bit words */ - - for(i = 0; i < SHA1_DIGEST_SIZE; ++i) - hval[i] = (unsigned char)(ctx->hash[i >> 2] >> 8 * (~i & 3)); -} - -#if 0 -void sha1(unsigned char hval[], const unsigned char data[], unsigned int len) -{ sha1_ctx cx[1]; - - sha1_begin(cx); sha1_hash(data, len, cx); sha1_end(hval, cx); -} -#endif - -/* - --------------------------------------------------------------------------- - End of Dr. Gladman's sha1 code - --------------------------------------------------------------------------- -*/ - -/* Using a larger blocksize can make things _much_ faster - * by avoiding a zillion tiny little reads */ -#define BLOCKSIZE 65536 -/* Ensure that BLOCKSIZE is a multiple of 64. */ -#if BLOCKSIZE % SHA1_BLOCK_SIZE != 0 -# error "BLOCKSIZE not a multiple of 64" -#endif - -static int sha1sum_stream(FILE *stream, unsigned char *hashval) -{ - int result = 0; - sha1_ctx cx[1]; - size_t sum, n; - RESERVE_CONFIG_BUFFER(buffer, BLOCKSIZE + 72); - - /* Initialize the computation context. */ - sha1_begin(cx); - - /* Iterate over full file contents. */ - while (1) - { - /* We read the file in blocks of BLOCKSIZE bytes. One call of the - computation function processes the whole buffer so that with the - next round of the loop another block can be read. */ - sum = 0; - - /* Read block. Take care for partial reads. */ - while (1) - { - n = fread (buffer + sum, 1, BLOCKSIZE - sum, stream); - sum += n; - - if (sum == BLOCKSIZE) - break; - - if (n == 0) { - /* Check for the error flag IFF N == 0, so that we don't - exit the loop after a partial read due to e.g., EAGAIN - or EWOULDBLOCK. */ - if (feof (stream)) { - sum = 0; - goto process_partial_block; - } - if (ferror (stream)) { - result++; - goto all_done; - } - goto process_partial_block; - } - - /* We've read at least one byte, so ignore errors. But always - check for EOF, since feof may be true even though N > 0. - Otherwise, we could end up calling fread after EOF. */ - if (feof (stream)) - goto process_partial_block; - } - - /* Process buffer */ - sha1_hash(buffer, BLOCKSIZE, cx); - } - -process_partial_block: - - /* Process any remaining bytes. */ - if (sum > 0) - sha1_hash(buffer, sum, cx); - - /* Finalize and write the hash into our buffer. */ - sha1_end(hashval, cx); - -all_done: - - RELEASE_CONFIG_BUFFER(buffer); - return result; -} - -#define FLAG_SILENT 1 -#define FLAG_CHECK 2 -#define FLAG_WARN 4 - -static unsigned char *hash_bin_to_hex(unsigned char *hash_value, unsigned char hash_length) -{ - int x, len, max; - unsigned char *hex_value; - - max = (hash_length * 2) + 2; - hex_value = xmalloc(max); - for (x = len = 0; x < hash_length; x++) { - len += snprintf(hex_value+len, max-len, "%02x", hash_value[x]); - } - return(hex_value); -} - -FILE *wfopen_file_or_stdin(const char *file_ptr) -{ - FILE *stream; - - if ((file_ptr[0] == '-') && (file_ptr[1] == '\0')) { - stream = stdin; - } else { - stream = bb_wfopen(file_ptr, "r"); - } - - return(stream); -} - -/* This could become a common function for md5 as well, by using md5_stream */ -extern int authenticate(int argc, char **argv, - int (*hash_ptr)(FILE *stream, unsigned char *hashval), - const unsigned char hash_length) -{ - unsigned char hash_value[hash_length]; - unsigned int flags; - int return_value = EXIT_SUCCESS; - -#ifdef CONFIG_FEATURE_SHA1SUM_CHECK - flags = bb_getopt_ulflags(argc, argv, "scw"); -#else - flags = bb_getopt_ulflags(argc, argv, "s"); -#endif - -#ifdef CONFIG_FEATURE_SHA1SUM_CHECK - if (!(flags & FLAG_CHECK)) { - if (flags & FLAG_SILENT) { - bb_error_msg_and_die("the -s option is meaningful only when verifying checksums"); - } - else if (flags & FLAG_WARN) { - bb_error_msg_and_die("the -w option is meaningful only when verifying checksums"); - } - } -#endif - - if (argc == optind) { - argv[argc++] = "-"; - } - -#ifdef CONFIG_FEATURE_SHA1SUM_CHECK - if (flags & FLAG_CHECK) { - FILE *pre_computed_stream; - int count_total = 0; - int count_failed = 0; - unsigned char *file_ptr = argv[optind]; - - if (optind + 1 != argc) { - bb_error_msg_and_die("only one argument may be specified when using -c"); - } - pre_computed_stream = wfopen_file_or_stdin(file_ptr); - while (!feof(pre_computed_stream) && !ferror(pre_computed_stream)) { - FILE *stream; - char *line; - char *line_ptr; - char *hex_value; - - line = bb_get_chomped_line_from_file(pre_computed_stream); - if (line == NULL) { - break; - } - count_total++; - line_ptr = strchr(line, ' '); - if (line_ptr == NULL) { - if (flags & FLAG_WARN) { - bb_error_msg("Invalid format"); - } - free(line); - continue; - } - *line_ptr = '\0'; - line_ptr++; - if ((flags & FLAG_WARN) && (*line_ptr != ' ')) { - bb_error_msg("Invalid format"); - free(line); - continue; - } - line_ptr++; - stream = bb_wfopen(line_ptr, "r"); - if (hash_ptr(stream, hash_value) == EXIT_FAILURE) { - bb_perror_msg("%s", file_ptr); - return_value = EXIT_FAILURE; - } - if (fclose(stream) == EOF) { - bb_perror_msg("Couldnt close file %s", file_ptr); - } - hex_value = hash_bin_to_hex(hash_value, hash_length); - printf("%s: ", line_ptr); - if (strcmp(hex_value, line) != 0) { - puts("FAILED"); - count_failed++; - } else { - puts("ok"); - } - free(line); - } - if (count_failed) { - bb_error_msg("WARNING: %d of %d computed checksum did NOT match", count_failed, count_total); - } - if (bb_fclose_nonstdin(pre_computed_stream) == EOF) { - bb_perror_msg_and_die("Couldnt close file %s", file_ptr); - } - } else -#endif - while (optind < argc) { - FILE *stream; - unsigned char *file_ptr = argv[optind]; - - optind++; - - stream = wfopen_file_or_stdin(file_ptr); - if (stream == NULL) { - return_value = EXIT_FAILURE; - continue; - } - if (hash_ptr(stream, hash_value) == EXIT_FAILURE) { - bb_perror_msg("%s", file_ptr); - return_value = EXIT_FAILURE; - } - else if (!flags & FLAG_SILENT) { - char *hex_value = hash_bin_to_hex(hash_value, hash_length); - printf("%s %s\n", hex_value, file_ptr); - free(hex_value); - } - - if (bb_fclose_nonstdin(stream) == EOF) { - bb_perror_msg("Couldnt close file %s", file_ptr); - return_value = EXIT_FAILURE; - } - } - - return(return_value); -} - -extern int sha1sum_main(int argc, char **argv) -{ - return (authenticate(argc, argv, sha1sum_stream, SHA1_HASH_SIZE)); -} -- 2.7.4