diff --git a/programs/develop/libraries/libcrash/trunk/Tupfile.lua b/programs/develop/libraries/libcrash/trunk/Tupfile.lua
index 7f1895b022..1983d62fc5 100644
--- a/programs/develop/libraries/libcrash/trunk/Tupfile.lua
+++ b/programs/develop/libraries/libcrash/trunk/Tupfile.lua
@@ -1,3 +1,5 @@
if tup.getconfig("NO_FASM") ~= "" then return end
-tup.rule("libcrash.asm", "fasm %f %o " .. tup.getconfig("KPACK_CMD"), "libcrash.obj")
-tup.rule("crashtest.asm", "fasm %f %o " .. tup.getconfig("KPACK_CMD"), "crashtest")
+HELPERDIR = (tup.getconfig("HELPERDIR") == "") and "../../../.." or tup.getconfig("HELPERDIR")
+tup.include(HELPERDIR .. "/use_fasm.lua")
+tup.rule("libcrash.asm", FASM .. " %f %o " .. tup.getconfig("KPACK_CMD"), "libcrash.obj")
+tup.rule("crashtest.asm", FASM .. " %f %o " .. tup.getconfig("KPACK_CMD"), "crashtest")
diff --git a/programs/develop/libraries/libcrash/trunk/crc32.asm b/programs/develop/libraries/libcrash/trunk/crc32.asm
index 1d6d3e4c2f..f44811642a 100644
--- a/programs/develop/libraries/libcrash/trunk/crc32.asm
+++ b/programs/develop/libraries/libcrash/trunk/crc32.asm
@@ -1,112 +1,133 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-proc crc32.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_crc32.hash]
- mov esi, crc32._.hash_init
- mov ecx, 1
- rep movsd
- ret
-endp
-
-
-proc crc32.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov esi, [_msg]
- lea edi, [ebx + ctx_crc32.hash]
- mov eax, [edi]
- mov ecx, [_size]
- jecxz .quit
-
- @@:
- movzx edx, al
- xor dl, byte[esi]
- add esi, 1
- shr eax, 8
- xor eax, [crc32._.table + edx*4]
- dec ecx
- jnz @b
-
- stosd
- .quit:
- ret
-endp
-
-
-proc crc32.final _ctx
- mov ebx, [_ctx]
- lea esi, [ebx + ctx_crc32.hash]
- mov edi, esi
- lodsd
- xor eax, 0xffffffff
- bswap eax
- stosd
- ret
-endp
-
-
-align CRC32_ALIGN
-
-crc32._.hash_init dd 0xffffffff
-
-crc32._.table dd \
- 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,\
- 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,\
- 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2,\
- 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7,\
- 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,\
- 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172,\
- 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c,\
- 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59,\
- 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423,\
- 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,\
- 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106,\
- 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433,\
- 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d,\
- 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e,\
- 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,\
- 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65,\
- 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7,\
- 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0,\
- 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa,\
- 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,\
- 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81,\
- 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a,\
- 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84,\
- 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1,\
- 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,\
- 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc,\
- 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e,\
- 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b,\
- 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55,\
- 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,\
- 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28,\
- 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d,\
- 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f,\
- 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38,\
- 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,\
- 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777,\
- 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69,\
- 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2,\
- 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc,\
- 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,\
- 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693,\
- 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94,\
- 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+CRC32_HASH_SIZE = 4
+
+CRC32_ALIGN = 4
+CRC32_ALIGN_MASK = CRC32_ALIGN - 1
+
+struct ctx_crc32
+ hash rd 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_crc32
+end if
+
+proc crc32.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_crc32.hash]
+ mov esi, crc32._.hash_init
+ mov ecx, 1
+ rep movsd
+ ret
+endp
+
+
+proc crc32.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ lea edi, [ebx + ctx_crc32.hash]
+ mov eax, [edi]
+ mov ecx, [_size]
+ jecxz .quit
+
+ @@:
+ movzx edx, al
+ xor dl, byte[esi]
+ add esi, 1
+ shr eax, 8
+ xor eax, [crc32._.table + edx*4]
+ dec ecx
+ jnz @b
+
+ stosd
+ .quit:
+ ret
+endp
+
+
+proc crc32.final _ctx
+ mov ebx, [_ctx]
+ lea esi, [ebx + ctx_crc32.hash]
+ mov edi, esi
+ lodsd
+ xor eax, 0xffffffff
+ bswap eax
+ stosd
+ ret
+endp
+
+
+proc crc32.oneshot _ctx, _data, _len
+ stdcall crc32.init, [_ctx]
+ stdcall crc32.update, [_ctx], [_data], [_len]
+ stdcall crc32.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align CRC32_ALIGN
+crc32._.hash_init dd 0xffffffff
+
+crc32._.table dd \
+ 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,\
+ 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,\
+ 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2,\
+ 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7,\
+ 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,\
+ 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172,\
+ 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c,\
+ 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59,\
+ 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423,\
+ 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,\
+ 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106,\
+ 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433,\
+ 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d,\
+ 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e,\
+ 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,\
+ 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65,\
+ 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7,\
+ 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0,\
+ 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa,\
+ 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,\
+ 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81,\
+ 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a,\
+ 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84,\
+ 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1,\
+ 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,\
+ 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc,\
+ 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e,\
+ 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b,\
+ 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55,\
+ 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,\
+ 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28,\
+ 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d,\
+ 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f,\
+ 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38,\
+ 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,\
+ 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777,\
+ 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69,\
+ 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2,\
+ 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc,\
+ 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,\
+ 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693,\
+ 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94,\
+ 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/libcrash.asm b/programs/develop/libraries/libcrash/trunk/libcrash.asm
index 6dcae6866a..76b35cb40e 100644
--- a/programs/develop/libraries/libcrash/trunk/libcrash.asm
+++ b/programs/develop/libraries/libcrash/trunk/libcrash.asm
@@ -19,11 +19,11 @@ format MS COFF
public @EXPORT as 'EXPORTS'
-include '../../../../struct.inc'
-include '../../../../proc32.inc'
-include '../../../../macros.inc'
-include '../../../../config.inc'
-;include '../../../../debug.inc'
+include 'struct.inc'
+include 'proc32.inc'
+include 'macros.inc'
+include 'config.inc'
+include 'kglobals.inc'
purge section,mov,add,sub
section '.flat' code readable align 16
@@ -103,21 +103,23 @@ endp
section '.data' data readable align 16
-crash._.bin2hex_table db '0123456789abcdef'
+crash._.bin2hex_table db '0123456789abcdef'
crash._.table dd \
- crc32.init, crc32.update, crc32.final, CRC32_HASH_SIZE, \
- md4.init, md4.update, md4.final, MD4_HASH_SIZE, \
- md5.init, md5.update, md5.final, MD5_HASH_SIZE, \
- sha1.init, sha1.update, sha1.final, SHA1_HASH_SIZE, \
- sha224.init, sha224.update, sha224.final, SHA224_HASH_SIZE, \
- sha256.init, sha256.update, sha256.final, SHA256_HASH_SIZE, \
- sha384.init, sha384.update, sha384.final, SHA384_HASH_SIZE, \
- sha512.init, sha512.update, sha512.final, SHA512_HASH_SIZE, \
- sha3224.init, sha3224.update, sha3224.final, SHA3224_HASH_SIZE,\
- sha3256.init, sha3256.update, sha3256.final, SHA3256_HASH_SIZE,\
- sha3384.init, sha3384.update, sha3384.final, SHA3384_HASH_SIZE,\
- sha3512.init, sha3512.update, sha3512.final, SHA3512_HASH_SIZE
+ crc32.init, crc32.update, crc32.final, crc32.oneshot, CRC32_HASH_SIZE, \
+ md4.init, md4.update, md4.final, md4.oneshot, MD4_HASH_SIZE, \
+ md5.init, md5.update, md5.final, md5.oneshot, MD5_HASH_SIZE, \
+ sha1.init, sha1.update, sha1.final, sha1.oneshot, SHA1_HASH_SIZE, \
+ sha224.init, sha224.update, sha224.final, sha224.oneshot, SHA224_HASH_SIZE, \
+ sha256.init, sha256.update, sha256.final, sha256.oneshot, SHA256_HASH_SIZE, \
+ sha384.init, sha384.update, sha384.final, sha384.oneshot, SHA384_HASH_SIZE, \
+ sha512.init, sha512.update, sha512.final, sha512.oneshot, SHA512_HASH_SIZE, \
+ sha3_224.init, sha3_224.update, sha3_224.final, sha3_224.oneshot, SHA3_224_HASH_SIZE,\
+ sha3_256.init, sha3_256.update, sha3_256.final, sha3_256.oneshot, SHA3_256_HASH_SIZE,\
+ sha3_384.init, sha3_384.update, sha3_384.final, sha3_384.oneshot, SHA3_384_HASH_SIZE,\
+ sha3_512.init, sha3_512.update, sha3_512.final, sha3_512.oneshot, SHA3_512_HASH_SIZE
+
+IncludeIGlobals
align 4
@EXPORT:
@@ -129,36 +131,48 @@ export \
crc32.init, 'crc32_init' , \
crc32.update, 'crc32_update' , \
crc32.final, 'crc32_final' , \
+ crc32.oneshot, 'crc32_oneshot' , \
md4.init, 'md4_init' , \
md4.update, 'md4_update' , \
md4.final, 'md4_final' , \
+ md4.oneshot, 'md4_oneshot' , \
md5.init, 'md5_init' , \
md5.update, 'md5_update' , \
md5.final, 'md5_final' , \
+ md5.oneshot, 'md5_oneshot' , \
sha1.init, 'sha1_init' , \
sha1.update, 'sha1_update' , \
sha1.final, 'sha1_final' , \
+ sha1.oneshot, 'sha1_oneshot' , \
sha224.init, 'sha224_init' , \
sha224.update, 'sha224_update' , \
sha224.final, 'sha224_final' , \
+ sha224.oneshot, 'sha224_oneshot' , \
sha256.init, 'sha256_init' , \
sha256.update, 'sha256_update' , \
sha256.final, 'sha256_final' , \
+ sha256.oneshot, 'sha256_oneshot' , \
sha384.init, 'sha384_init' , \
sha384.update, 'sha384_update' , \
sha384.final, 'sha384_final' , \
+ sha384.oneshot, 'sha384_oneshot' , \
sha512.init, 'sha512_init' , \
sha512.update, 'sha512_update' , \
sha512.final, 'sha512_final' , \
- sha3224.init, 'sha3_224_init' , \
- sha3224.update, 'sha3_224_update' , \
- sha3224.final, 'sha3_224_final' , \
- sha3256.init, 'sha3_256_init' , \
- sha3256.update, 'sha3_256_update' , \
- sha3256.final, 'sha3_256_final' , \
- sha3384.init, 'sha3_384_init' , \
- sha3384.update, 'sha3_384_update' , \
- sha3384.final, 'sha3_384_final' , \
- sha3512.init, 'sha3_512_init' , \
- sha3512.update, 'sha3_512_update' , \
- sha3512.final, 'sha3_512_final'
+ sha512.oneshot, 'sha512_oneshot' , \
+ sha3_224.init, 'sha3_224_init' , \
+ sha3_224.update, 'sha3_224_update' , \
+ sha3_224.final, 'sha3_224_final' , \
+ sha3_224.oneshot, 'sha3_224_oneshot' , \
+ sha3_256.init, 'sha3_256_init' , \
+ sha3_256.update, 'sha3_256_update' , \
+ sha3_256.final, 'sha3_256_final' , \
+ sha3_256.oneshot, 'sha3_256_oneshot' , \
+ sha3_384.init, 'sha3_384_init' , \
+ sha3_384.update, 'sha3_384_update' , \
+ sha3_384.final, 'sha3_384_final' , \
+ sha3_384.oneshot, 'sha3_384_oneshot' , \
+ sha3_512.init, 'sha3_512_init' , \
+ sha3_512.update, 'sha3_512_update' , \
+ sha3_512.final, 'sha3_512_final' , \
+ sha3_512.oneshot, 'sha3_512_oneshot'
diff --git a/programs/develop/libraries/libcrash/trunk/libcrash.inc b/programs/develop/libraries/libcrash/trunk/libcrash.inc
index 6930df00be..67a8c682cd 100644
--- a/programs/develop/libraries/libcrash/trunk/libcrash.inc
+++ b/programs/develop/libraries/libcrash/trunk/libcrash.inc
@@ -1,175 +1,81 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2014,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-LIBCRASH_CRC32 = 0
-LIBCRASH_MD4 = 1
-LIBCRASH_MD5 = 2
-LIBCRASH_SHA1 = 3
-LIBCRASH_SHA224 = 4
-LIBCRASH_SHA256 = 5
-LIBCRASH_SHA384 = 6
-LIBCRASH_SHA512 = 7
-LIBCRASH_SHA3_224 = 8
-LIBCRASH_SHA3_256 = 9
-LIBCRASH_SHA3_384 = 10
-LIBCRASH_SHA3_512 = 11
-LIBCRASH_LAST = 11
-
-
-struct crash_item
- init dd ?
- update dd ?
- final dd ?
- len_out dd ?
-ends
-
-; CRC32
-
-CRC32_HASH_SIZE = 4
-CRC32_ALIGN = 4
-CRC32_ALIGN_MASK = CRC32_ALIGN - 1
-
-struct ctx_crc32
- hash rd 1
-ends
-
-; MD4
-
-MD4_BLOCK_SIZE = 64
-MD4_HASH_SIZE = 16
-MD4_ALIGN = 4
-MD4_ALIGN_MASK = MD4_ALIGN - 1
-
-struct ctx_md4
- hash rb MD4_HASH_SIZE
- block rb MD4_BLOCK_SIZE
- index rd 1
- msglen_0 rd 1
- msglen_1 rd 1
-ends
-
-; MD5
-
-MD5_BLOCK_SIZE = 64
-MD5_HASH_SIZE = 16
-MD5_ALIGN = 4
-MD5_ALIGN_MASK = MD5_ALIGN - 1
-
-struct ctx_md5
- hash rb MD5_HASH_SIZE
- block rb MD5_BLOCK_SIZE
- index rd 1
- msglen_0 rd 1
- msglen_1 rd 1
-ends
-
-; SHA1
-
-SHA1_BLOCK_SIZE = 64
-SHA1_HASH_SIZE = 20
-SHA1_ALIGN = 4
-SHA1_ALIGN_MASK = SHA1_ALIGN - 1
-
-struct ctx_sha1
- hash rb SHA1_HASH_SIZE
- block rb SHA1_BLOCK_SIZE
- index rd 1
- msglen_0 rd 1
- msglen_1 rd 1
-ends
-
-; SHA2
-
-SHA224256_BLOCK_SIZE = 64
-SHA224256_INIT_SIZE = 32
-SHA224_HASH_SIZE = 28
-SHA256_HASH_SIZE = 32
-SHA224256_ALIGN = 4
-SHA224256_ALIGN_MASK = SHA224256_ALIGN - 1
-
-struct ctx_sha224256
- hash rb SHA224256_INIT_SIZE
- block rb SHA224256_BLOCK_SIZE
- index rd 1
- msglen_0 rd 1
- msglen_1 rd 1
-ends
-
-SHA384512_BLOCK_SIZE = 128
-SHA384512_INIT_SIZE = 64
-
-SHA384_HASH_SIZE = 48
-SHA512_HASH_SIZE = 64
-
-SHA384512_ALIGN = 16
-SHA384512_ALIGN_MASK = SHA384512_ALIGN - 1
-
-struct ctx_sha384512
- hash rb SHA384512_INIT_SIZE
- block rb SHA384512_BLOCK_SIZE
- index rd 1
- msglen_0 rd 1
- msglen_1 rd 1
- msglen_2 rd 1
- msglen_3 rd 1
- rd 3 ; align
- ; tmp vars
- w rq 80
- A rq 1
- B rq 1
- C rq 1
- D rq 1
- E rq 1
- F rq 1
- G rq 1
- H rq 1
- temp rq 1
-ends
-
-; SHA3
-
-SHA3224_BLOCK_SIZE = 144
-SHA3256_BLOCK_SIZE = 136
-SHA3384_BLOCK_SIZE = 104
-SHA3512_BLOCK_SIZE = 72
-SHA3MAX_BLOCK_SIZE = SHA3224_BLOCK_SIZE
-
-SHA3_INIT_SIZE = 200
-
-SHA3224_HASH_SIZE = 28
-SHA3256_HASH_SIZE = 32
-SHA3384_HASH_SIZE = 48
-SHA3512_HASH_SIZE = 64
-
-SHA3_ALIGN = 16
-SHA3_ALIGN_MASK = SHA3_ALIGN-1
-
-struct ctx_sha3
- hash rb SHA3_INIT_SIZE
- rb SHA3_ALIGN - (SHA3_INIT_SIZE mod SHA3_ALIGN)
- block rb SHA3MAX_BLOCK_SIZE
- rb SHA3_ALIGN - (SHA3MAX_BLOCK_SIZE mod SHA3_ALIGN)
- index rd 1
- block_size rd 1
- rounds_cnt rd 1
- rd 1 ; align
- ; tmp vars
- C rq 5
- D rq 5
-ends
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2014,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+LIBCRASH_CRC32 = 0
+LIBCRASH_MD4 = 1
+LIBCRASH_MD5 = 2
+LIBCRASH_SHA1 = 3
+LIBCRASH_SHA224 = 4
+LIBCRASH_SHA256 = 5
+LIBCRASH_SHA384 = 6
+LIBCRASH_SHA512 = 7
+LIBCRASH_SHA3_224 = 8
+LIBCRASH_SHA3_256 = 9
+LIBCRASH_SHA3_384 = 10
+LIBCRASH_SHA3_512 = 11
+LIBCRASH_LAST = 11
+
+
+struct crash_item
+ init dd ?
+ update dd ?
+ final dd ?
+ oneshot dd ?
+ len_out dd ?
+ends
+
+struct crash_ctx
+ hash rb 1024 ; context starts with hash data
+ends
+
+
+CRC32_HASH_SIZE = 4
+CRC32_BLOCK_SIZE = 1
+
+MD4_HASH_SIZE = 16
+MD4_BLOCK_SIZE = 64
+
+MD5_HASH_SIZE = 16
+MD5_BLOCK_SIZE = 64
+
+SHA1_HASH_SIZE = 20
+SHA1_BLOCK_SIZE = 64
+
+SHA224_HASH_SIZE = 28
+SHA224_BLOCK_SIZE = 64
+
+SHA256_HASH_SIZE = 32
+SHA256_BLOCK_SIZE = 64
+
+SHA384_HASH_SIZE = 48
+SHA384_BLOCK_SIZE = 128
+
+SHA512_HASH_SIZE = 64
+SHA512_BLOCK_SIZE = 128
+
+SHA3_224_HASH_SIZE = 28
+SHA3_224_BLOCK_SIZE = 144
+
+SHA3_256_HASH_SIZE = 32
+SHA3_256_BLOCK_SIZE = 136
+
+SHA3_384_HASH_SIZE = 48
+SHA3_384_BLOCK_SIZE = 104
+
+SHA3_512_HASH_SIZE = 64
+SHA3_512_BLOCK_SIZE = 72
diff --git a/programs/develop/libraries/libcrash/trunk/md4.asm b/programs/develop/libraries/libcrash/trunk/md4.asm
index f3cdf0e93f..07f57e614a 100644
--- a/programs/develop/libraries/libcrash/trunk/md4.asm
+++ b/programs/develop/libraries/libcrash/trunk/md4.asm
@@ -1,237 +1,263 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-macro md4._.f b, c, d
-{
- mov eax, c
- xor eax, d
- and eax, b
- xor eax, d
-}
-
-macro md4._.g b, c, d
-{
- push c d
- mov eax, b
- and eax, c
- and c, d
- and d, b
- or eax, c
- or eax, d
- pop d c
-}
-
-macro md4._.h b, c, d
-{
- mov eax, b
- xor eax, c
- xor eax, d
-}
-
-macro md4._.round func, a, b, c, d, index, shift, ac
-{
- func b, c, d
- add eax, [esi + index*4]
- lea a, [a + eax + ac]
- rol a, shift
-}
-
-
-proc md4.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md4.hash]
- mov esi, md4._.hash_init
- mov ecx, MD4_HASH_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_md4.index], eax
- mov [ebx + ctx_md4.msglen_0], eax
- mov [ebx + ctx_md4.msglen_1], eax
- ret
-endp
-
-
-proc md4._.block _hash
-
- mov eax, [_hash]
- mov edi, [eax + 0x0]
- mov ebx, [eax + 0x4]
- mov ecx, [eax + 0x8]
- mov edx, [eax + 0xc]
-
- md4._.round md4._.f, edi, ebx, ecx, edx, 0, 3, 0x00000000
- md4._.round md4._.f, edx, edi, ebx, ecx, 1, 7, 0x00000000
- md4._.round md4._.f, ecx, edx, edi, ebx, 2, 11, 0x00000000
- md4._.round md4._.f, ebx, ecx, edx, edi, 3, 19, 0x00000000
- md4._.round md4._.f, edi, ebx, ecx, edx, 4, 3, 0x00000000
- md4._.round md4._.f, edx, edi, ebx, ecx, 5, 7, 0x00000000
- md4._.round md4._.f, ecx, edx, edi, ebx, 6, 11, 0x00000000
- md4._.round md4._.f, ebx, ecx, edx, edi, 7, 19, 0x00000000
- md4._.round md4._.f, edi, ebx, ecx, edx, 8, 3, 0x00000000
- md4._.round md4._.f, edx, edi, ebx, ecx, 9, 7, 0x00000000
- md4._.round md4._.f, ecx, edx, edi, ebx, 10, 11, 0x00000000
- md4._.round md4._.f, ebx, ecx, edx, edi, 11, 19, 0x00000000
- md4._.round md4._.f, edi, ebx, ecx, edx, 12, 3, 0x00000000
- md4._.round md4._.f, edx, edi, ebx, ecx, 13, 7, 0x00000000
- md4._.round md4._.f, ecx, edx, edi, ebx, 14, 11, 0x00000000
- md4._.round md4._.f, ebx, ecx, edx, edi, 15, 19, 0x00000000
-
- md4._.round md4._.g, edi, ebx, ecx, edx, 0, 3, 0x5a827999
- md4._.round md4._.g, edx, edi, ebx, ecx, 4, 5, 0x5a827999
- md4._.round md4._.g, ecx, edx, edi, ebx, 8, 9, 0x5a827999
- md4._.round md4._.g, ebx, ecx, edx, edi, 12, 13, 0x5a827999
- md4._.round md4._.g, edi, ebx, ecx, edx, 1, 3, 0x5a827999
- md4._.round md4._.g, edx, edi, ebx, ecx, 5, 5, 0x5a827999
- md4._.round md4._.g, ecx, edx, edi, ebx, 9, 9, 0x5a827999
- md4._.round md4._.g, ebx, ecx, edx, edi, 13, 13, 0x5a827999
- md4._.round md4._.g, edi, ebx, ecx, edx, 2, 3, 0x5a827999
- md4._.round md4._.g, edx, edi, ebx, ecx, 6, 5, 0x5a827999
- md4._.round md4._.g, ecx, edx, edi, ebx, 10, 9, 0x5a827999
- md4._.round md4._.g, ebx, ecx, edx, edi, 14, 13, 0x5a827999
- md4._.round md4._.g, edi, ebx, ecx, edx, 3, 3, 0x5a827999
- md4._.round md4._.g, edx, edi, ebx, ecx, 7, 5, 0x5a827999
- md4._.round md4._.g, ecx, edx, edi, ebx, 11, 9, 0x5a827999
- md4._.round md4._.g, ebx, ecx, edx, edi, 15, 13, 0x5a827999
-
- md4._.round md4._.h, edi, ebx, ecx, edx, 0, 3, 0x6ed9eba1
- md4._.round md4._.h, edx, edi, ebx, ecx, 8, 9, 0x6ed9eba1
- md4._.round md4._.h, ecx, edx, edi, ebx, 4, 11, 0x6ed9eba1
- md4._.round md4._.h, ebx, ecx, edx, edi, 12, 15, 0x6ed9eba1
- md4._.round md4._.h, edi, ebx, ecx, edx, 2, 3, 0x6ed9eba1
- md4._.round md4._.h, edx, edi, ebx, ecx, 10, 9, 0x6ed9eba1
- md4._.round md4._.h, ecx, edx, edi, ebx, 6, 11, 0x6ed9eba1
- md4._.round md4._.h, ebx, ecx, edx, edi, 14, 15, 0x6ed9eba1
- md4._.round md4._.h, edi, ebx, ecx, edx, 1, 3, 0x6ed9eba1
- md4._.round md4._.h, edx, edi, ebx, ecx, 9, 9, 0x6ed9eba1
- md4._.round md4._.h, ecx, edx, edi, ebx, 5, 11, 0x6ed9eba1
- md4._.round md4._.h, ebx, ecx, edx, edi, 13, 15, 0x6ed9eba1
- md4._.round md4._.h, edi, ebx, ecx, edx, 3, 3, 0x6ed9eba1
- md4._.round md4._.h, edx, edi, ebx, ecx, 11, 9, 0x6ed9eba1
- md4._.round md4._.h, ecx, edx, edi, ebx, 7, 11, 0x6ed9eba1
- md4._.round md4._.h, ebx, ecx, edx, edi, 15, 15, 0x6ed9eba1
-
- mov eax, [_hash]
- add [eax + 0x0], edi
- add [eax + 0x4], ebx
- add [eax + 0x8], ecx
- add [eax + 0xc], edx
-
- ret
-endp
-
-
-proc md4.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov ecx, [_size]
- add [ebx + ctx_md4.msglen_0], ecx
- adc [ebx + ctx_md4.msglen_1], 0
-
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_md4.index]
- and eax, MD4_BLOCK_SIZE-1
- jnz .copy_to_buf
- test esi, MD4_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- cmp [_size], MD4_BLOCK_SIZE
- jb .copy_quit
- lea eax, [ebx + ctx_md4.hash]
- stdcall md4._.block, eax
- sub [_size], MD4_BLOCK_SIZE
- add esi, MD4_BLOCK_SIZE
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_md4.block]
- add edi, eax
- mov ecx, MD4_BLOCK_SIZE
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_md4.index], ecx
- rep movsb
- lea eax, [ebx + ctx_md4.hash]
- lea esi, [ebx + ctx_md4.block]
- stdcall md4._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md4.block]
- mov eax, [ebx + ctx_md4.index]
- and eax, MD4_BLOCK_SIZE-1
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_md4.index], ecx
- rep movsb
- .quit:
- ret
-endp
-
-
-proc md4.final _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md4.block]
- mov ecx, [ebx + ctx_md4.msglen_0]
- and ecx, MD4_BLOCK_SIZE-1
- add edi, ecx
- mov byte[edi], 0x80
- inc edi
- neg ecx
- add ecx, MD4_BLOCK_SIZE
- cmp ecx, 8
- ja .last
-
- dec ecx
- xor eax, eax
- rep stosb
- lea esi, [ebx + ctx_md4.block]
- lea eax, [ebx + ctx_md4.hash]
- stdcall md4._.block, eax
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md4.block]
- mov ecx, MD4_BLOCK_SIZE+1
- .last:
- dec ecx
- sub ecx, 8
- xor eax, eax
- rep stosb
- mov eax, [ebx + ctx_md4.msglen_0]
- mov edx, [ebx + ctx_md4.msglen_1]
- shld edx, eax, 3
- shl eax, 3
- mov dword[edi], eax
- mov dword[edi+4], edx
- lea esi, [ebx + ctx_md4.block]
- lea eax, [ebx + ctx_md4.hash]
- stdcall md4._.block, eax
-
- ret
-endp
-
-
-align MD4_ALIGN
-
-md4._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+MD4_HASH_SIZE = 16
+MD4_BLOCK_SIZE = 64
+
+MD4_ALIGN = 4
+MD4_ALIGN_MASK = MD4_ALIGN - 1
+
+struct ctx_md4
+ hash rb MD4_HASH_SIZE
+ block rb MD4_BLOCK_SIZE
+ index rd 1
+ msglen_0 rd 1
+ msglen_1 rd 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_md4
+end if
+
+macro md4._.f b, c, d
+{
+ mov eax, c
+ xor eax, d
+ and eax, b
+ xor eax, d
+}
+
+macro md4._.g b, c, d
+{
+ push c d
+ mov eax, b
+ and eax, c
+ and c, d
+ and d, b
+ or eax, c
+ or eax, d
+ pop d c
+}
+
+macro md4._.h b, c, d
+{
+ mov eax, b
+ xor eax, c
+ xor eax, d
+}
+
+macro md4._.round func, a, b, c, d, index, shift, ac
+{
+ func b, c, d
+ add eax, [esi + index*4]
+ lea a, [a + eax + ac]
+ rol a, shift
+}
+
+
+proc md4.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md4.hash]
+ mov esi, md4._.hash_init
+ mov ecx, MD4_HASH_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_md4.index], eax
+ mov [ebx + ctx_md4.msglen_0], eax
+ mov [ebx + ctx_md4.msglen_1], eax
+ ret
+endp
+
+
+proc md4._.block _hash
+
+ mov eax, [_hash]
+ mov edi, [eax + 0x0]
+ mov ebx, [eax + 0x4]
+ mov ecx, [eax + 0x8]
+ mov edx, [eax + 0xc]
+
+ md4._.round md4._.f, edi, ebx, ecx, edx, 0, 3, 0x00000000
+ md4._.round md4._.f, edx, edi, ebx, ecx, 1, 7, 0x00000000
+ md4._.round md4._.f, ecx, edx, edi, ebx, 2, 11, 0x00000000
+ md4._.round md4._.f, ebx, ecx, edx, edi, 3, 19, 0x00000000
+ md4._.round md4._.f, edi, ebx, ecx, edx, 4, 3, 0x00000000
+ md4._.round md4._.f, edx, edi, ebx, ecx, 5, 7, 0x00000000
+ md4._.round md4._.f, ecx, edx, edi, ebx, 6, 11, 0x00000000
+ md4._.round md4._.f, ebx, ecx, edx, edi, 7, 19, 0x00000000
+ md4._.round md4._.f, edi, ebx, ecx, edx, 8, 3, 0x00000000
+ md4._.round md4._.f, edx, edi, ebx, ecx, 9, 7, 0x00000000
+ md4._.round md4._.f, ecx, edx, edi, ebx, 10, 11, 0x00000000
+ md4._.round md4._.f, ebx, ecx, edx, edi, 11, 19, 0x00000000
+ md4._.round md4._.f, edi, ebx, ecx, edx, 12, 3, 0x00000000
+ md4._.round md4._.f, edx, edi, ebx, ecx, 13, 7, 0x00000000
+ md4._.round md4._.f, ecx, edx, edi, ebx, 14, 11, 0x00000000
+ md4._.round md4._.f, ebx, ecx, edx, edi, 15, 19, 0x00000000
+
+ md4._.round md4._.g, edi, ebx, ecx, edx, 0, 3, 0x5a827999
+ md4._.round md4._.g, edx, edi, ebx, ecx, 4, 5, 0x5a827999
+ md4._.round md4._.g, ecx, edx, edi, ebx, 8, 9, 0x5a827999
+ md4._.round md4._.g, ebx, ecx, edx, edi, 12, 13, 0x5a827999
+ md4._.round md4._.g, edi, ebx, ecx, edx, 1, 3, 0x5a827999
+ md4._.round md4._.g, edx, edi, ebx, ecx, 5, 5, 0x5a827999
+ md4._.round md4._.g, ecx, edx, edi, ebx, 9, 9, 0x5a827999
+ md4._.round md4._.g, ebx, ecx, edx, edi, 13, 13, 0x5a827999
+ md4._.round md4._.g, edi, ebx, ecx, edx, 2, 3, 0x5a827999
+ md4._.round md4._.g, edx, edi, ebx, ecx, 6, 5, 0x5a827999
+ md4._.round md4._.g, ecx, edx, edi, ebx, 10, 9, 0x5a827999
+ md4._.round md4._.g, ebx, ecx, edx, edi, 14, 13, 0x5a827999
+ md4._.round md4._.g, edi, ebx, ecx, edx, 3, 3, 0x5a827999
+ md4._.round md4._.g, edx, edi, ebx, ecx, 7, 5, 0x5a827999
+ md4._.round md4._.g, ecx, edx, edi, ebx, 11, 9, 0x5a827999
+ md4._.round md4._.g, ebx, ecx, edx, edi, 15, 13, 0x5a827999
+
+ md4._.round md4._.h, edi, ebx, ecx, edx, 0, 3, 0x6ed9eba1
+ md4._.round md4._.h, edx, edi, ebx, ecx, 8, 9, 0x6ed9eba1
+ md4._.round md4._.h, ecx, edx, edi, ebx, 4, 11, 0x6ed9eba1
+ md4._.round md4._.h, ebx, ecx, edx, edi, 12, 15, 0x6ed9eba1
+ md4._.round md4._.h, edi, ebx, ecx, edx, 2, 3, 0x6ed9eba1
+ md4._.round md4._.h, edx, edi, ebx, ecx, 10, 9, 0x6ed9eba1
+ md4._.round md4._.h, ecx, edx, edi, ebx, 6, 11, 0x6ed9eba1
+ md4._.round md4._.h, ebx, ecx, edx, edi, 14, 15, 0x6ed9eba1
+ md4._.round md4._.h, edi, ebx, ecx, edx, 1, 3, 0x6ed9eba1
+ md4._.round md4._.h, edx, edi, ebx, ecx, 9, 9, 0x6ed9eba1
+ md4._.round md4._.h, ecx, edx, edi, ebx, 5, 11, 0x6ed9eba1
+ md4._.round md4._.h, ebx, ecx, edx, edi, 13, 15, 0x6ed9eba1
+ md4._.round md4._.h, edi, ebx, ecx, edx, 3, 3, 0x6ed9eba1
+ md4._.round md4._.h, edx, edi, ebx, ecx, 11, 9, 0x6ed9eba1
+ md4._.round md4._.h, ecx, edx, edi, ebx, 7, 11, 0x6ed9eba1
+ md4._.round md4._.h, ebx, ecx, edx, edi, 15, 15, 0x6ed9eba1
+
+ mov eax, [_hash]
+ add [eax + 0x0], edi
+ add [eax + 0x4], ebx
+ add [eax + 0x8], ecx
+ add [eax + 0xc], edx
+
+ ret
+endp
+
+
+proc md4.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov ecx, [_size]
+ add [ebx + ctx_md4.msglen_0], ecx
+ adc [ebx + ctx_md4.msglen_1], 0
+
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_md4.index]
+ and eax, MD4_BLOCK_SIZE-1
+ jnz .copy_to_buf
+ test esi, MD4_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ cmp [_size], MD4_BLOCK_SIZE
+ jb .copy_quit
+ lea eax, [ebx + ctx_md4.hash]
+ stdcall md4._.block, eax
+ sub [_size], MD4_BLOCK_SIZE
+ add esi, MD4_BLOCK_SIZE
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_md4.block]
+ add edi, eax
+ mov ecx, MD4_BLOCK_SIZE
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_md4.index], ecx
+ rep movsb
+ lea eax, [ebx + ctx_md4.hash]
+ lea esi, [ebx + ctx_md4.block]
+ stdcall md4._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md4.block]
+ mov eax, [ebx + ctx_md4.index]
+ and eax, MD4_BLOCK_SIZE-1
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_md4.index], ecx
+ rep movsb
+ .quit:
+ ret
+endp
+
+
+proc md4.final _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md4.block]
+ mov ecx, [ebx + ctx_md4.msglen_0]
+ and ecx, MD4_BLOCK_SIZE-1
+ add edi, ecx
+ mov byte[edi], 0x80
+ inc edi
+ neg ecx
+ add ecx, MD4_BLOCK_SIZE
+ cmp ecx, 8
+ ja .last
+
+ dec ecx
+ xor eax, eax
+ rep stosb
+ lea esi, [ebx + ctx_md4.block]
+ lea eax, [ebx + ctx_md4.hash]
+ stdcall md4._.block, eax
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md4.block]
+ mov ecx, MD4_BLOCK_SIZE+1
+ .last:
+ dec ecx
+ sub ecx, 8
+ xor eax, eax
+ rep stosb
+ mov eax, [ebx + ctx_md4.msglen_0]
+ mov edx, [ebx + ctx_md4.msglen_1]
+ shld edx, eax, 3
+ shl eax, 3
+ mov dword[edi], eax
+ mov dword[edi+4], edx
+ lea esi, [ebx + ctx_md4.block]
+ lea eax, [ebx + ctx_md4.hash]
+ stdcall md4._.block, eax
+
+ ret
+endp
+
+
+proc md4.oneshot _ctx, _data, _len
+ stdcall md4.init, [_ctx]
+ stdcall md4.update, [_ctx], [_data], [_len]
+ stdcall md4.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align MD4_ALIGN
+md4._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/md5.asm b/programs/develop/libraries/libcrash/trunk/md5.asm
index 3dc3f822ff..7925995c59 100644
--- a/programs/develop/libraries/libcrash/trunk/md5.asm
+++ b/programs/develop/libraries/libcrash/trunk/md5.asm
@@ -1,265 +1,291 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-macro md5._.f b, c, d
-{
- push c
- xor c, d
- and b, c
- xor b, d
- pop c
-}
-
-macro md5._.g b, c, d
-{
- push c d
- and b, d
- not d
- and c, d
- or b, c
- pop d c
-}
-
-macro md5._.h b, c, d
-{
- xor b, c
- xor b, d
-}
-
-macro md5._.i b, c, d
-{
- push d
- not d
- or b, d
- xor b, c
- pop d
-}
-
-macro md5._.round func, a, b, c, d, index, shift, ac
-{
- push b
- func b, c, d
- lea a, [a + b + ac]
- add a, [esi + index*4]
- rol a, shift
- pop b
- add a, b
-}
-
-
-proc md5.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md5.hash]
- mov esi, md5._.hash_init
- mov ecx, MD5_HASH_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_md5.index], eax
- mov [ebx + ctx_md5.msglen_0], eax
- mov [ebx + ctx_md5.msglen_1], eax
- ret
-endp
-
-
-proc md5._.block _hash
-
- mov edi, [_hash]
- mov eax, [edi + 0x0]
- mov ebx, [edi + 0x4]
- mov ecx, [edi + 0x8]
- mov edx, [edi + 0xc]
-
- md5._.round md5._.f, eax, ebx, ecx, edx, 0, 7, 0xd76aa478
- md5._.round md5._.f, edx, eax, ebx, ecx, 1, 12, 0xe8c7b756
- md5._.round md5._.f, ecx, edx, eax, ebx, 2, 17, 0x242070db
- md5._.round md5._.f, ebx, ecx, edx, eax, 3, 22, 0xc1bdceee
- md5._.round md5._.f, eax, ebx, ecx, edx, 4, 7, 0xf57c0faf
- md5._.round md5._.f, edx, eax, ebx, ecx, 5, 12, 0x4787c62a
- md5._.round md5._.f, ecx, edx, eax, ebx, 6, 17, 0xa8304613
- md5._.round md5._.f, ebx, ecx, edx, eax, 7, 22, 0xfd469501
- md5._.round md5._.f, eax, ebx, ecx, edx, 8, 7, 0x698098d8
- md5._.round md5._.f, edx, eax, ebx, ecx, 9, 12, 0x8b44f7af
- md5._.round md5._.f, ecx, edx, eax, ebx, 10, 17, 0xffff5bb1
- md5._.round md5._.f, ebx, ecx, edx, eax, 11, 22, 0x895cd7be
- md5._.round md5._.f, eax, ebx, ecx, edx, 12, 7, 0x6b901122
- md5._.round md5._.f, edx, eax, ebx, ecx, 13, 12, 0xfd987193
- md5._.round md5._.f, ecx, edx, eax, ebx, 14, 17, 0xa679438e
- md5._.round md5._.f, ebx, ecx, edx, eax, 15, 22, 0x49b40821
-
- md5._.round md5._.g, eax, ebx, ecx, edx, 1, 5, 0xf61e2562
- md5._.round md5._.g, edx, eax, ebx, ecx, 6, 9, 0xc040b340
- md5._.round md5._.g, ecx, edx, eax, ebx, 11, 14, 0x265e5a51
- md5._.round md5._.g, ebx, ecx, edx, eax, 0, 20, 0xe9b6c7aa
- md5._.round md5._.g, eax, ebx, ecx, edx, 5, 5, 0xd62f105d
- md5._.round md5._.g, edx, eax, ebx, ecx, 10, 9, 0x02441453
- md5._.round md5._.g, ecx, edx, eax, ebx, 15, 14, 0xd8a1e681
- md5._.round md5._.g, ebx, ecx, edx, eax, 4, 20, 0xe7d3fbc8
- md5._.round md5._.g, eax, ebx, ecx, edx, 9, 5, 0x21e1cde6
- md5._.round md5._.g, edx, eax, ebx, ecx, 14, 9, 0xc33707d6
- md5._.round md5._.g, ecx, edx, eax, ebx, 3, 14, 0xf4d50d87
- md5._.round md5._.g, ebx, ecx, edx, eax, 8, 20, 0x455a14ed
- md5._.round md5._.g, eax, ebx, ecx, edx, 13, 5, 0xa9e3e905
- md5._.round md5._.g, edx, eax, ebx, ecx, 2, 9, 0xfcefa3f8
- md5._.round md5._.g, ecx, edx, eax, ebx, 7, 14, 0x676f02d9
- md5._.round md5._.g, ebx, ecx, edx, eax, 12, 20, 0x8d2a4c8a
-
- md5._.round md5._.h, eax, ebx, ecx, edx, 5, 4, 0xfffa3942
- md5._.round md5._.h, edx, eax, ebx, ecx, 8, 11, 0x8771f681
- md5._.round md5._.h, ecx, edx, eax, ebx, 11, 16, 0x6d9d6122
- md5._.round md5._.h, ebx, ecx, edx, eax, 14, 23, 0xfde5380c
- md5._.round md5._.h, eax, ebx, ecx, edx, 1, 4, 0xa4beea44
- md5._.round md5._.h, edx, eax, ebx, ecx, 4, 11, 0x4bdecfa9
- md5._.round md5._.h, ecx, edx, eax, ebx, 7, 16, 0xf6bb4b60
- md5._.round md5._.h, ebx, ecx, edx, eax, 10, 23, 0xbebfbc70
- md5._.round md5._.h, eax, ebx, ecx, edx, 13, 4, 0x289b7ec6
- md5._.round md5._.h, edx, eax, ebx, ecx, 0, 11, 0xeaa127fa
- md5._.round md5._.h, ecx, edx, eax, ebx, 3, 16, 0xd4ef3085
- md5._.round md5._.h, ebx, ecx, edx, eax, 6, 23, 0x04881d05
- md5._.round md5._.h, eax, ebx, ecx, edx, 9, 4, 0xd9d4d039
- md5._.round md5._.h, edx, eax, ebx, ecx, 12, 11, 0xe6db99e5
- md5._.round md5._.h, ecx, edx, eax, ebx, 15, 16, 0x1fa27cf8
- md5._.round md5._.h, ebx, ecx, edx, eax, 2, 23, 0xc4ac5665
-
- md5._.round md5._.i, eax, ebx, ecx, edx, 0, 6, 0xf4292244
- md5._.round md5._.i, edx, eax, ebx, ecx, 7, 10, 0x432aff97
- md5._.round md5._.i, ecx, edx, eax, ebx, 14, 15, 0xab9423a7
- md5._.round md5._.i, ebx, ecx, edx, eax, 5, 21, 0xfc93a039
- md5._.round md5._.i, eax, ebx, ecx, edx, 12, 6, 0x655b59c3
- md5._.round md5._.i, edx, eax, ebx, ecx, 3, 10, 0x8f0ccc92
- md5._.round md5._.i, ecx, edx, eax, ebx, 10, 15, 0xffeff47d
- md5._.round md5._.i, ebx, ecx, edx, eax, 1, 21, 0x85845dd1
- md5._.round md5._.i, eax, ebx, ecx, edx, 8, 6, 0x6fa87e4f
- md5._.round md5._.i, edx, eax, ebx, ecx, 15, 10, 0xfe2ce6e0
- md5._.round md5._.i, ecx, edx, eax, ebx, 6, 15, 0xa3014314
- md5._.round md5._.i, ebx, ecx, edx, eax, 13, 21, 0x4e0811a1
- md5._.round md5._.i, eax, ebx, ecx, edx, 4, 6, 0xf7537e82
- md5._.round md5._.i, edx, eax, ebx, ecx, 11, 10, 0xbd3af235
- md5._.round md5._.i, ecx, edx, eax, ebx, 2, 15, 0x2ad7d2bb
- md5._.round md5._.i, ebx, ecx, edx, eax, 9, 21, 0xeb86d391
-
- mov edi, [_hash]
- add [edi + 0x0], eax
- add [edi + 0x4], ebx
- add [edi + 0x8], ecx
- add [edi + 0xc], edx
-
- ret
-endp
-
-
-proc md5.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov ecx, [_size]
- add [ebx + ctx_md5.msglen_0], ecx
- adc [ebx + ctx_md5.msglen_1], 0
-
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_md5.index]
- and eax, MD5_BLOCK_SIZE-1
- jnz .copy_to_buf
- test esi, MD5_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- cmp [_size], MD5_BLOCK_SIZE
- jb .copy_quit
- lea eax, [ebx + ctx_md5.hash]
- stdcall md5._.block, eax
- sub [_size], MD5_BLOCK_SIZE
- add esi, MD5_BLOCK_SIZE
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_md5.block]
- add edi, eax
- mov ecx, MD5_BLOCK_SIZE
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_md5.index], ecx
- rep movsb
- lea eax, [ebx + ctx_md5.hash]
- lea esi, [ebx + ctx_md5.block]
- stdcall md5._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md5.block]
- mov eax, [ebx + ctx_md5.index]
- and eax, MD5_BLOCK_SIZE-1
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_md5.index], ecx
- rep movsb
- .quit:
-
- ret
-endp
-
-
-proc md5.final _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md5.block]
- mov ecx, [ebx + ctx_md5.msglen_0]
- and ecx, MD5_BLOCK_SIZE-1
- add edi, ecx
- mov byte[edi], 0x80
- inc edi
- neg ecx
- add ecx, MD5_BLOCK_SIZE
- cmp ecx, 8
- ja .last
-
- dec ecx
- xor eax, eax
- rep stosb
- lea esi, [ebx + ctx_md5.block]
- lea eax, [ebx + ctx_md5.hash]
- stdcall md5._.block, eax
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_md5.block]
- mov ecx, MD5_BLOCK_SIZE+1
- .last:
- dec ecx
- sub ecx, 8
- xor eax, eax
- rep stosb
- mov eax, [ebx + ctx_md5.msglen_0]
- mov edx, [ebx + ctx_md5.msglen_1]
- shld edx, eax, 3
- shl eax, 3
- mov dword[edi], eax
- mov dword[edi+4], edx
- lea esi, [ebx + ctx_md5.block]
- lea eax, [ebx + ctx_md5.hash]
- stdcall md5._.block, eax
-
- ret
-endp
-
-
-align MD5_ALIGN
-
-md5._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+MD5_HASH_SIZE = 16
+MD5_BLOCK_SIZE = 64
+
+MD5_ALIGN = 4
+MD5_ALIGN_MASK = MD5_ALIGN - 1
+
+struct ctx_md5
+ hash rb MD5_HASH_SIZE
+ block rb MD5_BLOCK_SIZE
+ index rd 1
+ msglen_0 rd 1
+ msglen_1 rd 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_md5
+end if
+
+macro md5._.f b, c, d
+{
+ push c
+ xor c, d
+ and b, c
+ xor b, d
+ pop c
+}
+
+macro md5._.g b, c, d
+{
+ push c d
+ and b, d
+ not d
+ and c, d
+ or b, c
+ pop d c
+}
+
+macro md5._.h b, c, d
+{
+ xor b, c
+ xor b, d
+}
+
+macro md5._.i b, c, d
+{
+ push d
+ not d
+ or b, d
+ xor b, c
+ pop d
+}
+
+macro md5._.round func, a, b, c, d, index, shift, ac
+{
+ push b
+ func b, c, d
+ lea a, [a + b + ac]
+ add a, [esi + index*4]
+ rol a, shift
+ pop b
+ add a, b
+}
+
+
+proc md5.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md5.hash]
+ mov esi, md5._.hash_init
+ mov ecx, MD5_HASH_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_md5.index], eax
+ mov [ebx + ctx_md5.msglen_0], eax
+ mov [ebx + ctx_md5.msglen_1], eax
+ ret
+endp
+
+
+proc md5._.block _hash
+
+ mov edi, [_hash]
+ mov eax, [edi + 0x0]
+ mov ebx, [edi + 0x4]
+ mov ecx, [edi + 0x8]
+ mov edx, [edi + 0xc]
+
+ md5._.round md5._.f, eax, ebx, ecx, edx, 0, 7, 0xd76aa478
+ md5._.round md5._.f, edx, eax, ebx, ecx, 1, 12, 0xe8c7b756
+ md5._.round md5._.f, ecx, edx, eax, ebx, 2, 17, 0x242070db
+ md5._.round md5._.f, ebx, ecx, edx, eax, 3, 22, 0xc1bdceee
+ md5._.round md5._.f, eax, ebx, ecx, edx, 4, 7, 0xf57c0faf
+ md5._.round md5._.f, edx, eax, ebx, ecx, 5, 12, 0x4787c62a
+ md5._.round md5._.f, ecx, edx, eax, ebx, 6, 17, 0xa8304613
+ md5._.round md5._.f, ebx, ecx, edx, eax, 7, 22, 0xfd469501
+ md5._.round md5._.f, eax, ebx, ecx, edx, 8, 7, 0x698098d8
+ md5._.round md5._.f, edx, eax, ebx, ecx, 9, 12, 0x8b44f7af
+ md5._.round md5._.f, ecx, edx, eax, ebx, 10, 17, 0xffff5bb1
+ md5._.round md5._.f, ebx, ecx, edx, eax, 11, 22, 0x895cd7be
+ md5._.round md5._.f, eax, ebx, ecx, edx, 12, 7, 0x6b901122
+ md5._.round md5._.f, edx, eax, ebx, ecx, 13, 12, 0xfd987193
+ md5._.round md5._.f, ecx, edx, eax, ebx, 14, 17, 0xa679438e
+ md5._.round md5._.f, ebx, ecx, edx, eax, 15, 22, 0x49b40821
+
+ md5._.round md5._.g, eax, ebx, ecx, edx, 1, 5, 0xf61e2562
+ md5._.round md5._.g, edx, eax, ebx, ecx, 6, 9, 0xc040b340
+ md5._.round md5._.g, ecx, edx, eax, ebx, 11, 14, 0x265e5a51
+ md5._.round md5._.g, ebx, ecx, edx, eax, 0, 20, 0xe9b6c7aa
+ md5._.round md5._.g, eax, ebx, ecx, edx, 5, 5, 0xd62f105d
+ md5._.round md5._.g, edx, eax, ebx, ecx, 10, 9, 0x02441453
+ md5._.round md5._.g, ecx, edx, eax, ebx, 15, 14, 0xd8a1e681
+ md5._.round md5._.g, ebx, ecx, edx, eax, 4, 20, 0xe7d3fbc8
+ md5._.round md5._.g, eax, ebx, ecx, edx, 9, 5, 0x21e1cde6
+ md5._.round md5._.g, edx, eax, ebx, ecx, 14, 9, 0xc33707d6
+ md5._.round md5._.g, ecx, edx, eax, ebx, 3, 14, 0xf4d50d87
+ md5._.round md5._.g, ebx, ecx, edx, eax, 8, 20, 0x455a14ed
+ md5._.round md5._.g, eax, ebx, ecx, edx, 13, 5, 0xa9e3e905
+ md5._.round md5._.g, edx, eax, ebx, ecx, 2, 9, 0xfcefa3f8
+ md5._.round md5._.g, ecx, edx, eax, ebx, 7, 14, 0x676f02d9
+ md5._.round md5._.g, ebx, ecx, edx, eax, 12, 20, 0x8d2a4c8a
+
+ md5._.round md5._.h, eax, ebx, ecx, edx, 5, 4, 0xfffa3942
+ md5._.round md5._.h, edx, eax, ebx, ecx, 8, 11, 0x8771f681
+ md5._.round md5._.h, ecx, edx, eax, ebx, 11, 16, 0x6d9d6122
+ md5._.round md5._.h, ebx, ecx, edx, eax, 14, 23, 0xfde5380c
+ md5._.round md5._.h, eax, ebx, ecx, edx, 1, 4, 0xa4beea44
+ md5._.round md5._.h, edx, eax, ebx, ecx, 4, 11, 0x4bdecfa9
+ md5._.round md5._.h, ecx, edx, eax, ebx, 7, 16, 0xf6bb4b60
+ md5._.round md5._.h, ebx, ecx, edx, eax, 10, 23, 0xbebfbc70
+ md5._.round md5._.h, eax, ebx, ecx, edx, 13, 4, 0x289b7ec6
+ md5._.round md5._.h, edx, eax, ebx, ecx, 0, 11, 0xeaa127fa
+ md5._.round md5._.h, ecx, edx, eax, ebx, 3, 16, 0xd4ef3085
+ md5._.round md5._.h, ebx, ecx, edx, eax, 6, 23, 0x04881d05
+ md5._.round md5._.h, eax, ebx, ecx, edx, 9, 4, 0xd9d4d039
+ md5._.round md5._.h, edx, eax, ebx, ecx, 12, 11, 0xe6db99e5
+ md5._.round md5._.h, ecx, edx, eax, ebx, 15, 16, 0x1fa27cf8
+ md5._.round md5._.h, ebx, ecx, edx, eax, 2, 23, 0xc4ac5665
+
+ md5._.round md5._.i, eax, ebx, ecx, edx, 0, 6, 0xf4292244
+ md5._.round md5._.i, edx, eax, ebx, ecx, 7, 10, 0x432aff97
+ md5._.round md5._.i, ecx, edx, eax, ebx, 14, 15, 0xab9423a7
+ md5._.round md5._.i, ebx, ecx, edx, eax, 5, 21, 0xfc93a039
+ md5._.round md5._.i, eax, ebx, ecx, edx, 12, 6, 0x655b59c3
+ md5._.round md5._.i, edx, eax, ebx, ecx, 3, 10, 0x8f0ccc92
+ md5._.round md5._.i, ecx, edx, eax, ebx, 10, 15, 0xffeff47d
+ md5._.round md5._.i, ebx, ecx, edx, eax, 1, 21, 0x85845dd1
+ md5._.round md5._.i, eax, ebx, ecx, edx, 8, 6, 0x6fa87e4f
+ md5._.round md5._.i, edx, eax, ebx, ecx, 15, 10, 0xfe2ce6e0
+ md5._.round md5._.i, ecx, edx, eax, ebx, 6, 15, 0xa3014314
+ md5._.round md5._.i, ebx, ecx, edx, eax, 13, 21, 0x4e0811a1
+ md5._.round md5._.i, eax, ebx, ecx, edx, 4, 6, 0xf7537e82
+ md5._.round md5._.i, edx, eax, ebx, ecx, 11, 10, 0xbd3af235
+ md5._.round md5._.i, ecx, edx, eax, ebx, 2, 15, 0x2ad7d2bb
+ md5._.round md5._.i, ebx, ecx, edx, eax, 9, 21, 0xeb86d391
+
+ mov edi, [_hash]
+ add [edi + 0x0], eax
+ add [edi + 0x4], ebx
+ add [edi + 0x8], ecx
+ add [edi + 0xc], edx
+
+ ret
+endp
+
+
+proc md5.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov ecx, [_size]
+ add [ebx + ctx_md5.msglen_0], ecx
+ adc [ebx + ctx_md5.msglen_1], 0
+
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_md5.index]
+ and eax, MD5_BLOCK_SIZE-1
+ jnz .copy_to_buf
+ test esi, MD5_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ cmp [_size], MD5_BLOCK_SIZE
+ jb .copy_quit
+ lea eax, [ebx + ctx_md5.hash]
+ stdcall md5._.block, eax
+ sub [_size], MD5_BLOCK_SIZE
+ add esi, MD5_BLOCK_SIZE
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_md5.block]
+ add edi, eax
+ mov ecx, MD5_BLOCK_SIZE
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_md5.index], ecx
+ rep movsb
+ lea eax, [ebx + ctx_md5.hash]
+ lea esi, [ebx + ctx_md5.block]
+ stdcall md5._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md5.block]
+ mov eax, [ebx + ctx_md5.index]
+ and eax, MD5_BLOCK_SIZE-1
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_md5.index], ecx
+ rep movsb
+ .quit:
+
+ ret
+endp
+
+
+proc md5.final _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md5.block]
+ mov ecx, [ebx + ctx_md5.msglen_0]
+ and ecx, MD5_BLOCK_SIZE-1
+ add edi, ecx
+ mov byte[edi], 0x80
+ inc edi
+ neg ecx
+ add ecx, MD5_BLOCK_SIZE
+ cmp ecx, 8
+ ja .last
+
+ dec ecx
+ xor eax, eax
+ rep stosb
+ lea esi, [ebx + ctx_md5.block]
+ lea eax, [ebx + ctx_md5.hash]
+ stdcall md5._.block, eax
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_md5.block]
+ mov ecx, MD5_BLOCK_SIZE+1
+ .last:
+ dec ecx
+ sub ecx, 8
+ xor eax, eax
+ rep stosb
+ mov eax, [ebx + ctx_md5.msglen_0]
+ mov edx, [ebx + ctx_md5.msglen_1]
+ shld edx, eax, 3
+ shl eax, 3
+ mov dword[edi], eax
+ mov dword[edi+4], edx
+ lea esi, [ebx + ctx_md5.block]
+ lea eax, [ebx + ctx_md5.hash]
+ stdcall md5._.block, eax
+
+ ret
+endp
+
+
+proc md5.oneshot _ctx, _data, _len
+ stdcall md5.init, [_ctx]
+ stdcall md5.update, [_ctx], [_data], [_len]
+ stdcall md5.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align MD5_ALIGN
+md5._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/sha1.asm b/programs/develop/libraries/libcrash/trunk/sha1.asm
index 93d4414cad..4031929d13 100644
--- a/programs/develop/libraries/libcrash/trunk/sha1.asm
+++ b/programs/develop/libraries/libcrash/trunk/sha1.asm
@@ -1,273 +1,299 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-proc sha1._.f
- push ebx ecx edx
- xor ecx, edx
- and ebx, ecx
- xor ebx, edx
- mov esi, ebx
- pop edx ecx ebx
- ret
-endp
-
-proc sha1._.g
- push ebx ecx edx
- xor ebx, ecx
- xor ebx, edx
- mov esi, ebx
- pop edx ecx ebx
- ret
-endp
-
-proc sha1._.h
- push ebx ecx edx
- mov esi, ebx
- and ebx, ecx
- and ecx, edx
- and esi, edx
- or ebx, ecx
- or esi, ebx
- pop edx ecx ebx
- ret
-endp
-
-macro sha1._.round f, k, c
-{
- mov esi, eax
- rol esi, 5
- mov [temp], esi
- call f
-
- add esi, edi
- add [temp], esi
- mov esi, [w + (c)*4]
- add esi, k
- add [temp], esi
-
- mov edi, edx
- mov edx, ecx
- mov ecx, ebx
- rol ecx, 30
- mov ebx, eax
- mov eax, [temp]
-}
-
-
-proc sha1.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha1.hash]
- mov esi, sha1._.hash_init
- mov ecx, SHA1_HASH_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_sha1.index], eax
- mov [ebx + ctx_sha1.msglen_0], eax
- mov [ebx + ctx_sha1.msglen_1], eax
- ret
-endp
-
-
-proc sha1._.block _hash
-locals
- temp rd 1
- w rd 80
-endl
- lea edi, [w]
- xor ecx, ecx
- @@:
- mov eax, [esi]
- add esi, 4
- bswap eax
- mov [edi], eax
- add edi, 4
- add ecx, 1
- cmp ecx, 16
- jne @b
- @@:
- mov eax, [w + (ecx - 3)*4]
- xor eax, [w + (ecx - 8)*4]
- xor eax, [w + (ecx - 14)*4]
- xor eax, [w + (ecx - 16)*4]
- rol eax, 1
- mov [w + ecx*4], eax
- add ecx, 1
- cmp ecx, 80
- jne @b
-
- mov edi, [_hash]
- mov eax, [edi + 0x00]
- mov ebx, [edi + 0x04]
- mov ecx, [edi + 0x08]
- mov edx, [edi + 0x0c]
- mov edi, [edi + 0x10]
-
- push esi
-
-repeat 20
- sha1._.round sha1._.f, 0x5a827999, %-1
-end repeat
-
-repeat 20
- sha1._.round sha1._.g, 0x6ed9eba1, %-1+20
-end repeat
-
-repeat 20
- sha1._.round sha1._.h, 0x8f1bbcdc, %-1+40
-end repeat
-
-repeat 20
- sha1._.round sha1._.g, 0xca62c1d6, %-1+60
-end repeat
-
- pop esi
-
- mov [temp], edi
- mov edi, [_hash]
- add [edi + 0x00], eax
- add [edi + 0x04], ebx
- add [edi + 0x08], ecx
- add [edi + 0x0c], edx
- mov eax, [temp]
- add [edi + 0x10], eax
-
- ret
-endp
-
-
-proc sha1.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov ecx, [_size]
- add [ebx + ctx_sha1.msglen_0], ecx
- adc [ebx + ctx_sha1.msglen_1], 0
-
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_sha1.index]
- and eax, SHA1_BLOCK_SIZE-1
- jnz .copy_to_buf
- test esi, SHA1_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- cmp [_size], SHA1_BLOCK_SIZE
- jb .copy_quit
- lea eax, [ebx + ctx_sha1.hash]
- stdcall sha1._.block, eax
- sub [_size], SHA1_BLOCK_SIZE
-; add esi, SHA1_BLOCK_SIZE ; FIXME
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_sha1.block]
- add edi, eax
- mov ecx, SHA1_BLOCK_SIZE
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_sha1.index], ecx
- rep movsb
- lea eax, [ebx + ctx_sha1.hash]
- lea esi, [ebx + ctx_sha1.block]
- stdcall sha1._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha1.block]
- mov eax, [ebx + ctx_sha1.index]
- and eax, SHA1_BLOCK_SIZE-1
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_sha1.index], ecx
- rep movsb
- .quit:
-
- ret
-endp
-
-
-proc sha1.final _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha1.block]
- mov ecx, [ebx + ctx_sha1.msglen_0]
- and ecx, SHA1_BLOCK_SIZE-1
- add edi, ecx
- mov byte[edi], 0x80
- inc edi
- neg ecx
- add ecx, SHA1_BLOCK_SIZE
- cmp ecx, 8
- ja .last
-
- dec ecx
- xor eax, eax
- rep stosb
- lea esi, [ebx + ctx_sha1.block]
- lea eax, [ebx + ctx_sha1.hash]
- stdcall sha1._.block, eax
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha1.block]
- mov ecx, SHA1_BLOCK_SIZE+1
- .last:
- dec ecx
- sub ecx, 8
- xor eax, eax
- rep stosb
- mov eax, [ebx + ctx_sha1.msglen_0]
- mov edx, [ebx + ctx_sha1.msglen_1]
- shld edx, eax, 3
- shl eax, 3
- bswap eax
- bswap edx
- mov dword[edi], edx
- mov dword[edi+4], eax
- lea esi, [ebx + ctx_sha1.block]
- lea eax, [ebx + ctx_sha1.hash]
- stdcall sha1._.block, eax
-
- mov ebx, [_ctx]
- lea eax, [ebx + ctx_sha1.hash]
- stdcall sha1._.postprocess, ebx, eax
-
- ret
-endp
-
-
-proc sha1._.postprocess _ctx, _hash
- mov ecx, 5
- mov esi, [_hash]
- mov edi, esi
- @@:
- lodsd
- bswap eax
- stosd
- dec ecx
- jnz @b
- ret
-endp
-
-
-align SHA1_ALIGN
-
-sha1._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+SHA1_HASH_SIZE = 20
+SHA1_BLOCK_SIZE = 64
+
+SHA1_ALIGN = 4
+SHA1_ALIGN_MASK = SHA1_ALIGN - 1
+
+struct ctx_sha1
+ hash rb SHA1_HASH_SIZE
+ block rb SHA1_BLOCK_SIZE
+ index rd 1
+ msglen_0 rd 1
+ msglen_1 rd 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_sha1
+end if
+
+proc sha1._.f
+ push ebx ecx edx
+ xor ecx, edx
+ and ebx, ecx
+ xor ebx, edx
+ mov esi, ebx
+ pop edx ecx ebx
+ ret
+endp
+
+proc sha1._.g
+ push ebx ecx edx
+ xor ebx, ecx
+ xor ebx, edx
+ mov esi, ebx
+ pop edx ecx ebx
+ ret
+endp
+
+proc sha1._.h
+ push ebx ecx edx
+ mov esi, ebx
+ and ebx, ecx
+ and ecx, edx
+ and esi, edx
+ or ebx, ecx
+ or esi, ebx
+ pop edx ecx ebx
+ ret
+endp
+
+macro sha1._.round f, k, c
+{
+ mov esi, eax
+ rol esi, 5
+ mov [temp], esi
+ call f
+
+ add esi, edi
+ add [temp], esi
+ mov esi, [w + (c)*4]
+ add esi, k
+ add [temp], esi
+
+ mov edi, edx
+ mov edx, ecx
+ mov ecx, ebx
+ rol ecx, 30
+ mov ebx, eax
+ mov eax, [temp]
+}
+
+
+proc sha1.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha1.hash]
+ mov esi, sha1._.hash_init
+ mov ecx, SHA1_HASH_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_sha1.index], eax
+ mov [ebx + ctx_sha1.msglen_0], eax
+ mov [ebx + ctx_sha1.msglen_1], eax
+ ret
+endp
+
+
+proc sha1._.block _hash
+locals
+ temp rd 1
+ w rd 80
+endl
+ lea edi, [w]
+ xor ecx, ecx
+ @@:
+ mov eax, [esi]
+ add esi, 4
+ bswap eax
+ mov [edi], eax
+ add edi, 4
+ add ecx, 1
+ cmp ecx, 16
+ jne @b
+ @@:
+ mov eax, [w + (ecx - 3)*4]
+ xor eax, [w + (ecx - 8)*4]
+ xor eax, [w + (ecx - 14)*4]
+ xor eax, [w + (ecx - 16)*4]
+ rol eax, 1
+ mov [w + ecx*4], eax
+ add ecx, 1
+ cmp ecx, 80
+ jne @b
+
+ mov edi, [_hash]
+ mov eax, [edi + 0x00]
+ mov ebx, [edi + 0x04]
+ mov ecx, [edi + 0x08]
+ mov edx, [edi + 0x0c]
+ mov edi, [edi + 0x10]
+
+ push esi
+
+repeat 20
+ sha1._.round sha1._.f, 0x5a827999, %-1
+end repeat
+
+repeat 20
+ sha1._.round sha1._.g, 0x6ed9eba1, %-1+20
+end repeat
+
+repeat 20
+ sha1._.round sha1._.h, 0x8f1bbcdc, %-1+40
+end repeat
+
+repeat 20
+ sha1._.round sha1._.g, 0xca62c1d6, %-1+60
+end repeat
+
+ pop esi
+
+ mov [temp], edi
+ mov edi, [_hash]
+ add [edi + 0x00], eax
+ add [edi + 0x04], ebx
+ add [edi + 0x08], ecx
+ add [edi + 0x0c], edx
+ mov eax, [temp]
+ add [edi + 0x10], eax
+
+ ret
+endp
+
+
+proc sha1.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov ecx, [_size]
+ add [ebx + ctx_sha1.msglen_0], ecx
+ adc [ebx + ctx_sha1.msglen_1], 0
+
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_sha1.index]
+ and eax, SHA1_BLOCK_SIZE-1
+ jnz .copy_to_buf
+ test esi, SHA1_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ cmp [_size], SHA1_BLOCK_SIZE
+ jb .copy_quit
+ lea eax, [ebx + ctx_sha1.hash]
+ stdcall sha1._.block, eax
+ sub [_size], SHA1_BLOCK_SIZE
+; add esi, SHA1_BLOCK_SIZE ; FIXME
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_sha1.block]
+ add edi, eax
+ mov ecx, SHA1_BLOCK_SIZE
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_sha1.index], ecx
+ rep movsb
+ lea eax, [ebx + ctx_sha1.hash]
+ lea esi, [ebx + ctx_sha1.block]
+ stdcall sha1._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha1.block]
+ mov eax, [ebx + ctx_sha1.index]
+ and eax, SHA1_BLOCK_SIZE-1
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_sha1.index], ecx
+ rep movsb
+ .quit:
+
+ ret
+endp
+
+
+proc sha1.final _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha1.block]
+ mov ecx, [ebx + ctx_sha1.msglen_0]
+ and ecx, SHA1_BLOCK_SIZE-1
+ add edi, ecx
+ mov byte[edi], 0x80
+ inc edi
+ neg ecx
+ add ecx, SHA1_BLOCK_SIZE
+ cmp ecx, 8
+ ja .last
+
+ dec ecx
+ xor eax, eax
+ rep stosb
+ lea esi, [ebx + ctx_sha1.block]
+ lea eax, [ebx + ctx_sha1.hash]
+ stdcall sha1._.block, eax
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha1.block]
+ mov ecx, SHA1_BLOCK_SIZE+1
+ .last:
+ dec ecx
+ sub ecx, 8
+ xor eax, eax
+ rep stosb
+ mov eax, [ebx + ctx_sha1.msglen_0]
+ mov edx, [ebx + ctx_sha1.msglen_1]
+ shld edx, eax, 3
+ shl eax, 3
+ bswap eax
+ bswap edx
+ mov dword[edi], edx
+ mov dword[edi+4], eax
+ lea esi, [ebx + ctx_sha1.block]
+ lea eax, [ebx + ctx_sha1.hash]
+ stdcall sha1._.block, eax
+
+ mov ebx, [_ctx]
+ lea eax, [ebx + ctx_sha1.hash]
+ stdcall sha1._.postprocess, ebx, eax
+
+ ret
+endp
+
+
+proc sha1._.postprocess _ctx, _hash
+ mov ecx, 5
+ mov esi, [_hash]
+ mov edi, esi
+ @@:
+ lodsd
+ bswap eax
+ stosd
+ dec ecx
+ jnz @b
+ ret
+endp
+
+
+proc sha1.oneshot _ctx, _data, _len
+ stdcall sha1.init, [_ctx]
+ stdcall sha1.update, [_ctx], [_data], [_len]
+ stdcall sha1.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align SHA1_ALIGN
+sha1._.hash_init dd 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/sha224_256.asm b/programs/develop/libraries/libcrash/trunk/sha224_256.asm
index 2a9e04f5e3..d68eec268a 100644
--- a/programs/develop/libraries/libcrash/trunk/sha224_256.asm
+++ b/programs/develop/libraries/libcrash/trunk/sha224_256.asm
@@ -1,399 +1,441 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-macro sha224256._.chn x, y, z
-{
- mov eax, [y]
- xor eax, [z]
- and eax, [x]
- xor eax, [z]
-}
-
-macro sha224256._.maj x, y, z
-{
- mov eax, [x]
- xor eax, [y]
- and eax, [z]
- mov ecx, [x]
- and ecx, [y]
- xor eax, ecx
-}
-
-macro sha224256._.Sigma0 x
-{
- mov eax, x
- mov ecx, eax
- ror ecx, 2
- ror eax, 13
- xor eax, ecx
- mov ecx, x
- ror ecx, 22
- xor eax, ecx
-}
-
-macro sha224256._.Sigma1 x
-{
- mov eax, x
- mov ecx, eax
- ror ecx, 6
- ror eax, 11
- xor eax, ecx
- mov ecx, x
- ror ecx, 25
- xor eax, ecx
-}
-
-macro sha224256._.sigma0 x
-{
- mov eax, x
- mov ecx, eax
- ror ecx, 7
- ror eax, 18
- xor eax, ecx
- mov ecx, x
- shr ecx, 3
- xor eax, ecx
-}
-
-macro sha224256._.sigma1 x
-{
- mov eax, x
- mov ecx, eax
- ror ecx, 17
- ror eax, 19
- xor eax, ecx
- mov ecx, x
- shr ecx, 10
- xor eax, ecx
-}
-
-macro sha224256._.recalculate_w n
-{
- mov edx, [w + ((n-2) and 15)*4]
- sha224256._.sigma1 edx
- add eax, [w + ((n-7) and 15)*4]
- push eax
- mov edx, [w + ((n-15) and 15)*4]
- sha224256._.sigma0 edx
- pop ecx
- add eax, ecx
- add [w + (n)*4], eax
-}
-
-macro sha224256._.round a, b, c, d, e, f, g, h, k
-{
- mov ebx, [h]
- mov edx, [e]
- sha224256._.Sigma1 edx
-
- add ebx, eax
- sha224256._.chn e, f, g
-
- add ebx, eax
- add ebx, [k]
- add ebx, edi
-
- add [d], ebx
-
- mov edx, [a]
- sha224256._.Sigma0 edx
- add ebx, eax
- sha224256._.maj a, b, c
- add eax, ebx
- mov [h], eax
-}
-
-
-macro sha224256._.round_1_16 a, b, c, d, e, f, g, h, n
-{
-
- mov eax, [esi + (n)*4]
- bswap eax
-
- mov dword[w + (n)*4], eax
- mov edi, eax
- sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n)*4)
-}
-
-macro sha224256._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
-{
- sha224256._.recalculate_w n
- mov edi, [w + (n)*4]
- sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n+16*rep_num)*4)
-}
-
-
-proc sha224.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha224256.hash]
- mov esi, sha224._.hash_init
- mov ecx, SHA224256_INIT_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_sha224256.index], eax
- mov [ebx + ctx_sha224256.msglen_0], eax
- mov [ebx + ctx_sha224256.msglen_1], eax
- ret
-endp
-
-
-proc sha256.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha224256.hash]
- mov esi, sha256._.hash_init
- mov ecx, SHA224256_INIT_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_sha224256.index], eax
- mov [ebx + ctx_sha224256.msglen_0], eax
- mov [ebx + ctx_sha224256.msglen_1], eax
- ret
-endp
-
-
-proc sha224256._.block _hash
-locals
- w rd 64
- A rd 1
- B rd 1
- C rd 1
- D rd 1
- E rd 1
- F rd 1
- G rd 1
- H rd 1
-endl
- mov edi, [_hash]
- mov eax, [edi + 0x00]
- mov [A], eax
- mov eax, [edi + 0x04]
- mov [B], eax
- mov eax, [edi + 0x08]
- mov [C], eax
- mov eax, [edi + 0x0c]
- mov [D], eax
- mov eax, [edi + 0x10]
- mov [E], eax
- mov eax, [edi + 0x14]
- mov [F], eax
- mov eax, [edi + 0x18]
- mov [G], eax
- mov eax, [edi + 0x1c]
- mov [H], eax
-
- sha224256._.round_1_16 A, B, C, D, E, F, G, H, 0
- sha224256._.round_1_16 H, A, B, C, D, E, F, G, 1
- sha224256._.round_1_16 G, H, A, B, C, D, E, F, 2
- sha224256._.round_1_16 F, G, H, A, B, C, D, E, 3
- sha224256._.round_1_16 E, F, G, H, A, B, C, D, 4
- sha224256._.round_1_16 D, E, F, G, H, A, B, C, 5
- sha224256._.round_1_16 C, D, E, F, G, H, A, B, 6
- sha224256._.round_1_16 B, C, D, E, F, G, H, A, 7
- sha224256._.round_1_16 A, B, C, D, E, F, G, H, 8
- sha224256._.round_1_16 H, A, B, C, D, E, F, G, 9
- sha224256._.round_1_16 G, H, A, B, C, D, E, F, 10
- sha224256._.round_1_16 F, G, H, A, B, C, D, E, 11
- sha224256._.round_1_16 E, F, G, H, A, B, C, D, 12
- sha224256._.round_1_16 D, E, F, G, H, A, B, C, 13
- sha224256._.round_1_16 C, D, E, F, G, H, A, B, 14
- sha224256._.round_1_16 B, C, D, E, F, G, H, A, 15
-
-repeat 3
- sha224256._.round_17_64 A, B, C, D, E, F, G, H, 0, %
- sha224256._.round_17_64 H, A, B, C, D, E, F, G, 1, %
- sha224256._.round_17_64 G, H, A, B, C, D, E, F, 2, %
- sha224256._.round_17_64 F, G, H, A, B, C, D, E, 3, %
- sha224256._.round_17_64 E, F, G, H, A, B, C, D, 4, %
- sha224256._.round_17_64 D, E, F, G, H, A, B, C, 5, %
- sha224256._.round_17_64 C, D, E, F, G, H, A, B, 6, %
- sha224256._.round_17_64 B, C, D, E, F, G, H, A, 7, %
- sha224256._.round_17_64 A, B, C, D, E, F, G, H, 8, %
- sha224256._.round_17_64 H, A, B, C, D, E, F, G, 9, %
- sha224256._.round_17_64 G, H, A, B, C, D, E, F, 10, %
- sha224256._.round_17_64 F, G, H, A, B, C, D, E, 11, %
- sha224256._.round_17_64 E, F, G, H, A, B, C, D, 12, %
- sha224256._.round_17_64 D, E, F, G, H, A, B, C, 13, %
- sha224256._.round_17_64 C, D, E, F, G, H, A, B, 14, %
- sha224256._.round_17_64 B, C, D, E, F, G, H, A, 15, %
-end repeat
-
- mov edi, [_hash]
- mov eax, [A]
- add [edi + 0x00], eax
- mov eax, [B]
- add [edi + 0x04], eax
- mov eax, [C]
- add [edi + 0x08], eax
- mov eax, [D]
- add [edi + 0x0c], eax
- mov eax, [E]
- add [edi + 0x10], eax
- mov eax, [F]
- add [edi + 0x14], eax
- mov eax, [G]
- add [edi + 0x18], eax
- mov eax, [H]
- add [edi + 0x1c], eax
-
- ret
-endp
-
-sha256.update = sha224.update
-proc sha224.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov ecx, [_size]
- add [ebx + ctx_sha224256.msglen_0], ecx
- adc [ebx + ctx_sha224256.msglen_1], 0
-
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_sha224256.index]
- and eax, SHA224256_BLOCK_SIZE-1
- jnz .copy_to_buf
- test esi, SHA224256_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- cmp [_size], SHA224256_BLOCK_SIZE
- jb .copy_quit
- lea eax, [ebx + ctx_sha224256.hash]
- stdcall sha224256._.block, eax
- sub [_size], SHA224256_BLOCK_SIZE
- add esi, SHA224256_BLOCK_SIZE ; FIXME
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_sha224256.block]
- add edi, eax
- mov ecx, SHA224256_BLOCK_SIZE
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_sha224256.index], ecx
- rep movsb
- lea eax, [ebx + ctx_sha224256.hash]
- lea esi, [ebx + ctx_sha224256.block]
- stdcall sha224256._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha224256.block]
- mov eax, [ebx + ctx_sha224256.index]
- and eax, SHA224256_BLOCK_SIZE-1
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_sha224256.index], ecx
- rep movsb
- .quit:
-
- ret
-endp
-
-
-sha256.final = sha224.final
-proc sha224.final _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha224256.block]
- mov ecx, [ebx + ctx_sha224256.msglen_0]
- and ecx, SHA224256_BLOCK_SIZE-1
- add edi, ecx
- mov byte[edi], 0x80
- inc edi
- neg ecx
- add ecx, SHA224256_BLOCK_SIZE
- cmp ecx, 8
- ja .last
-
- dec ecx
- xor eax, eax
- rep stosb
- lea esi, [ebx + ctx_sha224256.block]
- lea eax, [ebx + ctx_sha224256.hash]
- stdcall sha224256._.block, eax
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha224256.block]
- mov ecx, SHA224256_BLOCK_SIZE+1
- .last:
- dec ecx
- sub ecx, 8
- xor eax, eax
- rep stosb
- mov eax, [ebx + ctx_sha224256.msglen_0]
- mov edx, [ebx + ctx_sha224256.msglen_1]
- shld edx, eax, 3
- shl eax, 3
- bswap eax
- bswap edx
- mov dword[edi], edx
- mov dword[edi+4], eax
- lea esi, [ebx + ctx_sha224256.block]
- lea eax, [ebx + ctx_sha224256.hash]
- stdcall sha224256._.block, eax
-
- mov ebx, [_ctx]
- lea eax, [ebx + ctx_sha224256.hash]
- stdcall sha224256._.postprocess, ebx, eax
-
- ret
-endp
-
-
-proc sha224256._.postprocess _ctx, _hash
- mov ecx, 8
- mov esi, [_hash]
- mov edi, esi
- @@:
- lodsd
- bswap eax
- stosd
- dec ecx
- jnz @b
- ret
-endp
-
-
-align SHA224256_ALIGN
-
-sha224._.hash_init dd 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,\
- 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4
-
-sha256._.hash_init dd 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,\
- 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
-
-sha256_table dd 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,\
- 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\
- 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,\
- 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\
- 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,\
- 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\
- 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,\
- 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\
- 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,\
- 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\
- 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,\
- 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\
- 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,\
- 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\
- 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,\
- 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+SHA224256_BLOCK_SIZE = 64
+SHA224_BLOCK_SIZE = SHA224256_BLOCK_SIZE
+SHA256_BLOCK_SIZE = SHA224256_BLOCK_SIZE
+SHA224_HASH_SIZE = 28
+SHA256_HASH_SIZE = 32
+
+SHA224256_INIT_SIZE = 32
+SHA224256_ALIGN = 4
+SHA224256_ALIGN_MASK = SHA224256_ALIGN - 1
+
+struct ctx_sha224256
+ hash rb SHA224256_INIT_SIZE
+ block rb SHA224256_BLOCK_SIZE
+ index rd 1
+ msglen_0 rd 1
+ msglen_1 rd 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_sha224256
+end if
+
+
+macro sha224256._.chn x, y, z
+{
+ mov eax, [y]
+ xor eax, [z]
+ and eax, [x]
+ xor eax, [z]
+}
+
+macro sha224256._.maj x, y, z
+{
+ mov eax, [x]
+ xor eax, [y]
+ and eax, [z]
+ mov ecx, [x]
+ and ecx, [y]
+ xor eax, ecx
+}
+
+macro sha224256._.Sigma0 x
+{
+ mov eax, x
+ mov ecx, eax
+ ror ecx, 2
+ ror eax, 13
+ xor eax, ecx
+ mov ecx, x
+ ror ecx, 22
+ xor eax, ecx
+}
+
+macro sha224256._.Sigma1 x
+{
+ mov eax, x
+ mov ecx, eax
+ ror ecx, 6
+ ror eax, 11
+ xor eax, ecx
+ mov ecx, x
+ ror ecx, 25
+ xor eax, ecx
+}
+
+macro sha224256._.sigma0 x
+{
+ mov eax, x
+ mov ecx, eax
+ ror ecx, 7
+ ror eax, 18
+ xor eax, ecx
+ mov ecx, x
+ shr ecx, 3
+ xor eax, ecx
+}
+
+macro sha224256._.sigma1 x
+{
+ mov eax, x
+ mov ecx, eax
+ ror ecx, 17
+ ror eax, 19
+ xor eax, ecx
+ mov ecx, x
+ shr ecx, 10
+ xor eax, ecx
+}
+
+macro sha224256._.recalculate_w n
+{
+ mov edx, [w + ((n-2) and 15)*4]
+ sha224256._.sigma1 edx
+ add eax, [w + ((n-7) and 15)*4]
+ push eax
+ mov edx, [w + ((n-15) and 15)*4]
+ sha224256._.sigma0 edx
+ pop ecx
+ add eax, ecx
+ add [w + (n)*4], eax
+}
+
+macro sha224256._.round a, b, c, d, e, f, g, h, k
+{
+ mov ebx, [h]
+ mov edx, [e]
+ sha224256._.Sigma1 edx
+
+ add ebx, eax
+ sha224256._.chn e, f, g
+
+ add ebx, eax
+ add ebx, [k]
+ add ebx, edi
+
+ add [d], ebx
+
+ mov edx, [a]
+ sha224256._.Sigma0 edx
+ add ebx, eax
+ sha224256._.maj a, b, c
+ add eax, ebx
+ mov [h], eax
+}
+
+
+macro sha224256._.round_1_16 a, b, c, d, e, f, g, h, n
+{
+
+ mov eax, [esi + (n)*4]
+ bswap eax
+
+ mov dword[w + (n)*4], eax
+ mov edi, eax
+ sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n)*4)
+}
+
+macro sha224256._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
+{
+ sha224256._.recalculate_w n
+ mov edi, [w + (n)*4]
+ sha224256._.round a, b, c, d, e, f, g, h, (sha256_table + (n+16*rep_num)*4)
+}
+
+
+proc sha224.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha224256.hash]
+ mov esi, sha224._.hash_init
+ mov ecx, SHA224256_INIT_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_sha224256.index], eax
+ mov [ebx + ctx_sha224256.msglen_0], eax
+ mov [ebx + ctx_sha224256.msglen_1], eax
+ ret
+endp
+
+
+proc sha256.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha224256.hash]
+ mov esi, sha256._.hash_init
+ mov ecx, SHA224256_INIT_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_sha224256.index], eax
+ mov [ebx + ctx_sha224256.msglen_0], eax
+ mov [ebx + ctx_sha224256.msglen_1], eax
+ ret
+endp
+
+
+proc sha224256._.block _hash
+locals
+ w rd 64
+ A rd 1
+ B rd 1
+ C rd 1
+ D rd 1
+ E rd 1
+ F rd 1
+ G rd 1
+ H rd 1
+endl
+ mov edi, [_hash]
+ mov eax, [edi + 0x00]
+ mov [A], eax
+ mov eax, [edi + 0x04]
+ mov [B], eax
+ mov eax, [edi + 0x08]
+ mov [C], eax
+ mov eax, [edi + 0x0c]
+ mov [D], eax
+ mov eax, [edi + 0x10]
+ mov [E], eax
+ mov eax, [edi + 0x14]
+ mov [F], eax
+ mov eax, [edi + 0x18]
+ mov [G], eax
+ mov eax, [edi + 0x1c]
+ mov [H], eax
+
+ sha224256._.round_1_16 A, B, C, D, E, F, G, H, 0
+ sha224256._.round_1_16 H, A, B, C, D, E, F, G, 1
+ sha224256._.round_1_16 G, H, A, B, C, D, E, F, 2
+ sha224256._.round_1_16 F, G, H, A, B, C, D, E, 3
+ sha224256._.round_1_16 E, F, G, H, A, B, C, D, 4
+ sha224256._.round_1_16 D, E, F, G, H, A, B, C, 5
+ sha224256._.round_1_16 C, D, E, F, G, H, A, B, 6
+ sha224256._.round_1_16 B, C, D, E, F, G, H, A, 7
+ sha224256._.round_1_16 A, B, C, D, E, F, G, H, 8
+ sha224256._.round_1_16 H, A, B, C, D, E, F, G, 9
+ sha224256._.round_1_16 G, H, A, B, C, D, E, F, 10
+ sha224256._.round_1_16 F, G, H, A, B, C, D, E, 11
+ sha224256._.round_1_16 E, F, G, H, A, B, C, D, 12
+ sha224256._.round_1_16 D, E, F, G, H, A, B, C, 13
+ sha224256._.round_1_16 C, D, E, F, G, H, A, B, 14
+ sha224256._.round_1_16 B, C, D, E, F, G, H, A, 15
+
+repeat 3
+ sha224256._.round_17_64 A, B, C, D, E, F, G, H, 0, %
+ sha224256._.round_17_64 H, A, B, C, D, E, F, G, 1, %
+ sha224256._.round_17_64 G, H, A, B, C, D, E, F, 2, %
+ sha224256._.round_17_64 F, G, H, A, B, C, D, E, 3, %
+ sha224256._.round_17_64 E, F, G, H, A, B, C, D, 4, %
+ sha224256._.round_17_64 D, E, F, G, H, A, B, C, 5, %
+ sha224256._.round_17_64 C, D, E, F, G, H, A, B, 6, %
+ sha224256._.round_17_64 B, C, D, E, F, G, H, A, 7, %
+ sha224256._.round_17_64 A, B, C, D, E, F, G, H, 8, %
+ sha224256._.round_17_64 H, A, B, C, D, E, F, G, 9, %
+ sha224256._.round_17_64 G, H, A, B, C, D, E, F, 10, %
+ sha224256._.round_17_64 F, G, H, A, B, C, D, E, 11, %
+ sha224256._.round_17_64 E, F, G, H, A, B, C, D, 12, %
+ sha224256._.round_17_64 D, E, F, G, H, A, B, C, 13, %
+ sha224256._.round_17_64 C, D, E, F, G, H, A, B, 14, %
+ sha224256._.round_17_64 B, C, D, E, F, G, H, A, 15, %
+end repeat
+
+ mov edi, [_hash]
+ mov eax, [A]
+ add [edi + 0x00], eax
+ mov eax, [B]
+ add [edi + 0x04], eax
+ mov eax, [C]
+ add [edi + 0x08], eax
+ mov eax, [D]
+ add [edi + 0x0c], eax
+ mov eax, [E]
+ add [edi + 0x10], eax
+ mov eax, [F]
+ add [edi + 0x14], eax
+ mov eax, [G]
+ add [edi + 0x18], eax
+ mov eax, [H]
+ add [edi + 0x1c], eax
+
+ ret
+endp
+
+
+sha224.update = sha224256.update
+sha256.update = sha224256.update
+proc sha224256.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov ecx, [_size]
+ add [ebx + ctx_sha224256.msglen_0], ecx
+ adc [ebx + ctx_sha224256.msglen_1], 0
+
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_sha224256.index]
+ and eax, SHA224256_BLOCK_SIZE-1
+ jnz .copy_to_buf
+ test esi, SHA224256_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ cmp [_size], SHA224256_BLOCK_SIZE
+ jb .copy_quit
+ lea eax, [ebx + ctx_sha224256.hash]
+ stdcall sha224256._.block, eax
+ sub [_size], SHA224256_BLOCK_SIZE
+ add esi, SHA224256_BLOCK_SIZE ; FIXME
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_sha224256.block]
+ add edi, eax
+ mov ecx, SHA224256_BLOCK_SIZE
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_sha224256.index], ecx
+ rep movsb
+ lea eax, [ebx + ctx_sha224256.hash]
+ lea esi, [ebx + ctx_sha224256.block]
+ stdcall sha224256._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha224256.block]
+ mov eax, [ebx + ctx_sha224256.index]
+ and eax, SHA224256_BLOCK_SIZE-1
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_sha224256.index], ecx
+ rep movsb
+ .quit:
+
+ ret
+endp
+
+
+sha224.final = sha224256.final
+sha256.final = sha224256.final
+proc sha224256.final _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha224256.block]
+ mov ecx, [ebx + ctx_sha224256.msglen_0]
+ and ecx, SHA224256_BLOCK_SIZE-1
+ add edi, ecx
+ mov byte[edi], 0x80
+ inc edi
+ neg ecx
+ add ecx, SHA224256_BLOCK_SIZE
+ cmp ecx, 8
+ ja .last
+
+ dec ecx
+ xor eax, eax
+ rep stosb
+ lea esi, [ebx + ctx_sha224256.block]
+ lea eax, [ebx + ctx_sha224256.hash]
+ stdcall sha224256._.block, eax
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha224256.block]
+ mov ecx, SHA224256_BLOCK_SIZE+1
+ .last:
+ dec ecx
+ sub ecx, 8
+ xor eax, eax
+ rep stosb
+ mov eax, [ebx + ctx_sha224256.msglen_0]
+ mov edx, [ebx + ctx_sha224256.msglen_1]
+ shld edx, eax, 3
+ shl eax, 3
+ bswap eax
+ bswap edx
+ mov dword[edi], edx
+ mov dword[edi+4], eax
+ lea esi, [ebx + ctx_sha224256.block]
+ lea eax, [ebx + ctx_sha224256.hash]
+ stdcall sha224256._.block, eax
+
+ mov ebx, [_ctx]
+ lea eax, [ebx + ctx_sha224256.hash]
+ stdcall sha224256._.postprocess, ebx, eax
+
+ ret
+endp
+
+
+proc sha224256._.postprocess _ctx, _hash
+ mov ecx, 8
+ mov esi, [_hash]
+ mov edi, esi
+ @@:
+ lodsd
+ bswap eax
+ stosd
+ dec ecx
+ jnz @b
+ ret
+endp
+
+
+proc sha224.oneshot _ctx, _data, _len
+ stdcall sha224.init, [_ctx]
+ stdcall sha224.update, [_ctx], [_data], [_len]
+ stdcall sha224.final, [_ctx]
+ ret
+endp
+
+
+proc sha256.oneshot _ctx, _data, _len
+ stdcall sha256.init, [_ctx]
+ stdcall sha256.update, [_ctx], [_data], [_len]
+ stdcall sha256.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align SHA224256_ALIGN
+sha224._.hash_init dd 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,\
+ 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4
+
+sha256._.hash_init dd 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,\
+ 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
+
+sha256_table dd 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,\
+ 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\
+ 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,\
+ 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\
+ 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,\
+ 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\
+ 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,\
+ 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\
+ 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,\
+ 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\
+ 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,\
+ 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\
+ 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,\
+ 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\
+ 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,\
+ 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/sha3.asm b/programs/develop/libraries/libcrash/trunk/sha3.asm
index 4197a80666..6c538450f2 100644
--- a/programs/develop/libraries/libcrash/trunk/sha3.asm
+++ b/programs/develop/libraries/libcrash/trunk/sha3.asm
@@ -1,417 +1,482 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-macro sha3._.rol_xor nd, ncl, ncr
-{
- movq mm0, [C + 8*(ncl)]
- movq mm1, mm0
- psllq mm0, 1
- psrlq mm1, 63
- por mm0, mm1
- pxor mm0, [C + 8*(ncr)]
- movq [D + 8*(nd)], mm0
-}
-
-proc sha3._.theta
-;locals
-; C rq 5
-; D rq 5
-;endl
-C equ ebx + ctx_sha3.C
-D equ ebx + ctx_sha3.D
-
-repeat 5
- movq mm0, [edi + 8*(%-1 + 0)]
- pxor mm0, [edi + 8*(%-1 + 5)]
- pxor mm0, [edi + 8*(%-1 + 10)]
- pxor mm0, [edi + 8*(%-1 + 15)]
- pxor mm0, [edi + 8*(%-1 + 20)]
- movq [C + 8*(%-1)], mm0
-end repeat
-
- sha3._.rol_xor 0, 1, 4
- sha3._.rol_xor 1, 2, 0
- sha3._.rol_xor 2, 3, 1
- sha3._.rol_xor 3, 4, 2
- sha3._.rol_xor 4, 0, 3
-
-repeat 5
- movq mm1, [D + 8*(%-1)]
- movq mm0, mm1
- pxor mm0, [edi + 8*(%-1 + 0)]
- movq [edi + 8*(%-1 + 0)], mm0
- movq mm0, mm1
- pxor mm0, [edi + 8*(%-1 + 5)]
- movq [edi + 8*(%-1 + 5)], mm0
- movq mm0, mm1
- pxor mm0, [edi + 8*(%-1 + 10)]
- movq [edi + 8*(%-1 + 10)], mm0
- movq mm0, mm1
- pxor mm0, [edi + 8*(%-1 + 15)]
- movq [edi + 8*(%-1 + 15)], mm0
- movq mm0, mm1
- pxor mm0, [edi + 8*(%-1 + 20)]
- movq [edi + 8*(%-1 + 20)], mm0
-end repeat
-
-restore C,D
- ret
-endp
-
-
-proc sha3._.pi
- movq mm1, [edi + 8*1]
- movq mm0, [edi + 8*6]
- movq [edi + 8*1], mm0
- movq mm0, [edi + 8*9]
- movq [edi + 8*6], mm0
- movq mm0, [edi + 8*22]
- movq [edi + 8*9], mm0
- movq mm0, [edi + 8*14]
- movq [edi + 8*22], mm0
- movq mm0, [edi + 8*20]
- movq [edi + 8*14], mm0
- movq mm0, [edi + 8*2]
- movq [edi + 8*20], mm0
- movq mm0, [edi + 8*12]
- movq [edi + 8*2], mm0
- movq mm0, [edi + 8*13]
- movq [edi + 8*12], mm0
- movq mm0, [edi + 8*19]
- movq [edi + 8*13], mm0
- movq mm0, [edi + 8*23]
- movq [edi + 8*19], mm0
- movq mm0, [edi + 8*15]
- movq [edi + 8*23], mm0
- movq mm0, [edi + 8*4]
- movq [edi + 8*15], mm0
- movq mm0, [edi + 8*24]
- movq [edi + 8*4], mm0
- movq mm0, [edi + 8*21]
- movq [edi + 8*24], mm0
- movq mm0, [edi + 8*8]
- movq [edi + 8*21], mm0
- movq mm0, [edi + 8*16]
- movq [edi + 8*8], mm0
- movq mm0, [edi + 8*5]
- movq [edi + 8*16], mm0
- movq mm0, [edi + 8*3]
- movq [edi + 8*5], mm0
- movq mm0, [edi + 8*18]
- movq [edi + 8*3], mm0
- movq mm0, [edi + 8*17]
- movq [edi + 8*18], mm0
- movq mm0, [edi + 8*11]
- movq [edi + 8*17], mm0
- movq mm0, [edi + 8*7]
- movq [edi + 8*11], mm0
- movq mm0, [edi + 8*10]
- movq [edi + 8*7], mm0
- movq [edi + 8*10], mm1
-
- ret
-endp
-
-
-proc sha3._.chi
-
- mov eax, 0xffffffff
- movd mm0, eax
- movq mm2, mm0
- punpckldq mm2, mm0
-
-repeat 5
- movq mm6, [edi + 8*(0 + 5*(%-1))]
- movq mm7, [edi + 8*(1 + 5*(%-1))]
-
- movq mm0, [edi + 8*(0 + 5*(%-1))]
- movq mm1, mm7
- pandn mm1, mm2
- pand mm1, [edi + 8*(2 + 5*(%-1))]
- pxor mm0, mm1
- movq [edi + 8*(0 + 5*(%-1))], mm0
-
- movq mm0, [edi + 8*(1 + 5*(%-1))]
- movq mm1, [edi + 8*(2 + 5*(%-1))]
- pandn mm1, mm2
- pand mm1, [edi + 8*(3 + 5*(%-1))]
- pxor mm0, mm1
- movq [edi + 8*(1 + 5*(%-1))], mm0
-
- movq mm0, [edi + 8*(2 + 5*(%-1))]
- movq mm1, [edi + 8*(3 + 5*(%-1))]
- pandn mm1, mm2
- pand mm1, [edi + 8*(4 + 5*(%-1))]
- pxor mm0, mm1
- movq [edi + 8*(2 + 5*(%-1))], mm0
-
- movq mm0, [edi + 8*(3 + 5*(%-1))]
- movq mm1, [edi + 8*(4 + 5*(%-1))]
- pandn mm1, mm2
- pand mm1, mm6
- pxor mm0, mm1
- movq [edi + 8*(3 + 5*(%-1))], mm0
-
- movq mm0, [edi + 8*(4 + 5*(%-1))]
- movq mm1, mm6
- pandn mm1, mm2
- pand mm1, mm7
- pxor mm0, mm1
- movq [edi + 8*(4 + 5*(%-1))], mm0
-end repeat
- ret
-endp
-
-
-macro sha3._.rol_mov n, c
-{
- movq mm0, [edi + 8*(n)]
- movq mm1, mm0
- psllq mm0, (c)
- psrlq mm1, (64-(c))
- por mm0, mm1
- movq [edi + 8*(n)], mm0
-}
-
-proc sha3._.permutation
-
-repeat 24
- stdcall sha3._.theta
-
- sha3._.rol_mov 1, 1
- sha3._.rol_mov 2, 62
- sha3._.rol_mov 3, 28
- sha3._.rol_mov 4, 27
- sha3._.rol_mov 5, 36
- sha3._.rol_mov 6, 44
- sha3._.rol_mov 7, 6
- sha3._.rol_mov 8, 55
- sha3._.rol_mov 9, 20
- sha3._.rol_mov 10, 3
- sha3._.rol_mov 11, 10
- sha3._.rol_mov 12, 43
- sha3._.rol_mov 13, 25
- sha3._.rol_mov 14, 39
- sha3._.rol_mov 15, 41
- sha3._.rol_mov 16, 45
- sha3._.rol_mov 17, 15
- sha3._.rol_mov 18, 21
- sha3._.rol_mov 19, 8
- sha3._.rol_mov 20, 18
- sha3._.rol_mov 21, 2
- sha3._.rol_mov 22, 61
- sha3._.rol_mov 23, 56
- sha3._.rol_mov 24, 14
-
- stdcall sha3._.pi
- stdcall sha3._.chi
-
- movq mm0, [edi + 8*(0)]
- pxor mm0, [sha3._.round + 8*(%-1)]
- movq [edi + 8*(0)], mm0
-end repeat
-
- ret
-endp
-
-
-proc sha3._.init _ctx
- mov [ebx + ctx_sha3.block_size], eax
- shr eax, 3
- dec eax
- mov [ebx + ctx_sha3.rounds_cnt], eax
- xor eax, eax
- lea edi, [ebx + ctx_sha3.hash]
- mov ecx, SHA3_INIT_SIZE/4
- rep stosd
- mov [ebx + ctx_sha3.index], eax
- ret
-endp
-
-
-proc sha3224.init _ctx
- mov ebx, [_ctx]
- mov eax, SHA3224_BLOCK_SIZE
- stdcall sha3._.init
- ret
-endp
-
-
-proc sha3256.init _ctx
- mov ebx, [_ctx]
- mov eax, SHA3256_BLOCK_SIZE
- stdcall sha3._.init
- ret
-endp
-
-
-proc sha3384.init _ctx
- mov ebx, [_ctx]
- mov eax, SHA3384_BLOCK_SIZE
- stdcall sha3._.init
- ret
-endp
-
-
-proc sha3512.init _ctx
- mov ebx, [_ctx]
- mov eax, SHA3512_BLOCK_SIZE
- stdcall sha3._.init
- ret
-endp
-
-
-proc sha3._.block _hash
- mov ecx, [ebx + ctx_sha3.rounds_cnt]
- mov edi, [_hash]
-
- @@:
- movq mm0, [esi + 8*ecx]
- pxor mm0, [edi + 8*ecx]
- movq [edi + 8*ecx], mm0
- dec ecx
- jns @b
-
- stdcall sha3._.permutation
-
- ret
-endp
-
-
-sha3224.update = sha3.update
-sha3256.update = sha3.update
-sha3384.update = sha3.update
-sha3512.update = sha3.update
-proc sha3.update _ctx, _msg, _size
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_sha3.index]
- test eax, eax
- jnz .copy_to_buf
- test esi, SHA3_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- mov eax, [ebx + ctx_sha3.block_size]
- cmp [_size], eax
- jb .copy_quit
- lea eax, [ebx + ctx_sha3.hash]
- push ebx esi
- stdcall sha3._.block, eax
- pop esi ebx
- mov eax, [ebx + ctx_sha3.block_size]
- sub [_size], eax
- add esi, [ebx + ctx_sha3.block_size]
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_sha3.block]
- add edi, eax
- mov ecx, [ebx + ctx_sha3.block_size]
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_sha3.index], ecx
- mov eax, [ebx + ctx_sha3.block_size]
- cmp [ebx + ctx_sha3.index], eax
- jb @f
- sub [ebx + ctx_sha3.index], eax
- @@:
- rep movsb
- lea eax, [ebx + ctx_sha3.hash]
- lea esi, [ebx + ctx_sha3.block]
- stdcall sha3._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha3.block]
- mov eax, [ebx + ctx_sha3.index]
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_sha3.index], ecx
- rep movsb
- .quit:
- ret
-endp
-
-
-sha3224.final = sha3.final
-sha3256.final = sha3.final
-sha3384.final = sha3.final
-sha3512.final = sha3.final
-proc sha3.final _ctx
- pushad
- mov ebx, [_ctx]
- mov eax, [ebx + ctx_sha3.index]
- xor edx, edx
- mov ecx, [ebx + ctx_sha3.block_size]
- div ecx
- sub ecx, edx
- ja @f
- add ecx, [ebx + ctx_sha3.block_size]
- @@:
- add [ebx + ctx_sha3.index], ecx
- mov eax, [ebx + ctx_sha3.block_size]
- cmp [ebx + ctx_sha3.index], eax
- jb @f
- sub [ebx + ctx_sha3.index], eax
- @@:
-
- mov byte[edi], 0x06
- inc edi
- dec ecx
- xor eax, eax
- rep stosb
- or byte[edi - 1], 0x80
-
- mov ebx, [_ctx]
- lea esi, [ebx + ctx_sha3.block]
- lea eax, [ebx + ctx_sha3.hash]
- stdcall sha3._.block, eax
-
- mov ebx, [_ctx]
- lea eax, [ebx + ctx_sha3.hash]
- stdcall sha3._.postprocess, ebx, eax
-
- popad
- ret
-endp
-
-
-proc sha3._.postprocess _ctx, _hash
- emms
- ret
-endp
-
-
-align SHA3_ALIGN
-
-sha3._.round dq 0x0000000000000001, 0x0000000000008082, 0x800000000000808A,\
- 0x8000000080008000, 0x000000000000808B, 0x0000000080000001,\
- 0x8000000080008081, 0x8000000000008009, 0x000000000000008A,\
- 0x0000000000000088, 0x0000000080008009, 0x000000008000000A,\
- 0x000000008000808B, 0x800000000000008B, 0x8000000000008089,\
- 0x8000000000008003, 0x8000000000008002, 0x8000000000000080,\
- 0x000000000000800A, 0x800000008000000A, 0x8000000080008081,\
- 0x8000000000008080, 0x0000000080000001, 0x8000000080008008
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+SHA3_224_HASH_SIZE = 28
+SHA3_256_HASH_SIZE = 32
+SHA3_384_HASH_SIZE = 48
+SHA3_512_HASH_SIZE = 64
+
+SHA3_224_BLOCK_SIZE = 144
+SHA3_256_BLOCK_SIZE = 136
+SHA3_384_BLOCK_SIZE = 104
+SHA3_512_BLOCK_SIZE = 72
+SHA3MAX_BLOCK_SIZE = SHA3_224_BLOCK_SIZE
+
+SHA3_INIT_SIZE = 200
+SHA3_ALIGN = 16
+SHA3_ALIGN_MASK = SHA3_ALIGN-1
+
+struct ctx_sha3
+ hash rb SHA3_INIT_SIZE
+ rb SHA3_ALIGN - (SHA3_INIT_SIZE mod SHA3_ALIGN)
+ block rb SHA3MAX_BLOCK_SIZE
+ rb SHA3_ALIGN - (SHA3MAX_BLOCK_SIZE mod SHA3_ALIGN)
+ index rd 1
+ block_size rd 1
+ rounds_cnt rd 1
+ rd 1 ; align
+ ; tmp vars
+ C rq 5
+ D rq 5
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_sha3
+end if
+
+macro sha3._.rol_xor nd, ncl, ncr
+{
+ movq mm0, [C + 8*(ncl)]
+ movq mm1, mm0
+ psllq mm0, 1
+ psrlq mm1, 63
+ por mm0, mm1
+ pxor mm0, [C + 8*(ncr)]
+ movq [D + 8*(nd)], mm0
+}
+
+proc sha3._.theta
+;locals
+; C rq 5
+; D rq 5
+;endl
+C equ ebx + ctx_sha3.C
+D equ ebx + ctx_sha3.D
+
+repeat 5
+ movq mm0, [edi + 8*(%-1 + 0)]
+ pxor mm0, [edi + 8*(%-1 + 5)]
+ pxor mm0, [edi + 8*(%-1 + 10)]
+ pxor mm0, [edi + 8*(%-1 + 15)]
+ pxor mm0, [edi + 8*(%-1 + 20)]
+ movq [C + 8*(%-1)], mm0
+end repeat
+
+ sha3._.rol_xor 0, 1, 4
+ sha3._.rol_xor 1, 2, 0
+ sha3._.rol_xor 2, 3, 1
+ sha3._.rol_xor 3, 4, 2
+ sha3._.rol_xor 4, 0, 3
+
+repeat 5
+ movq mm1, [D + 8*(%-1)]
+ movq mm0, mm1
+ pxor mm0, [edi + 8*(%-1 + 0)]
+ movq [edi + 8*(%-1 + 0)], mm0
+ movq mm0, mm1
+ pxor mm0, [edi + 8*(%-1 + 5)]
+ movq [edi + 8*(%-1 + 5)], mm0
+ movq mm0, mm1
+ pxor mm0, [edi + 8*(%-1 + 10)]
+ movq [edi + 8*(%-1 + 10)], mm0
+ movq mm0, mm1
+ pxor mm0, [edi + 8*(%-1 + 15)]
+ movq [edi + 8*(%-1 + 15)], mm0
+ movq mm0, mm1
+ pxor mm0, [edi + 8*(%-1 + 20)]
+ movq [edi + 8*(%-1 + 20)], mm0
+end repeat
+
+restore C,D
+ ret
+endp
+
+
+proc sha3._.pi
+ movq mm1, [edi + 8*1]
+ movq mm0, [edi + 8*6]
+ movq [edi + 8*1], mm0
+ movq mm0, [edi + 8*9]
+ movq [edi + 8*6], mm0
+ movq mm0, [edi + 8*22]
+ movq [edi + 8*9], mm0
+ movq mm0, [edi + 8*14]
+ movq [edi + 8*22], mm0
+ movq mm0, [edi + 8*20]
+ movq [edi + 8*14], mm0
+ movq mm0, [edi + 8*2]
+ movq [edi + 8*20], mm0
+ movq mm0, [edi + 8*12]
+ movq [edi + 8*2], mm0
+ movq mm0, [edi + 8*13]
+ movq [edi + 8*12], mm0
+ movq mm0, [edi + 8*19]
+ movq [edi + 8*13], mm0
+ movq mm0, [edi + 8*23]
+ movq [edi + 8*19], mm0
+ movq mm0, [edi + 8*15]
+ movq [edi + 8*23], mm0
+ movq mm0, [edi + 8*4]
+ movq [edi + 8*15], mm0
+ movq mm0, [edi + 8*24]
+ movq [edi + 8*4], mm0
+ movq mm0, [edi + 8*21]
+ movq [edi + 8*24], mm0
+ movq mm0, [edi + 8*8]
+ movq [edi + 8*21], mm0
+ movq mm0, [edi + 8*16]
+ movq [edi + 8*8], mm0
+ movq mm0, [edi + 8*5]
+ movq [edi + 8*16], mm0
+ movq mm0, [edi + 8*3]
+ movq [edi + 8*5], mm0
+ movq mm0, [edi + 8*18]
+ movq [edi + 8*3], mm0
+ movq mm0, [edi + 8*17]
+ movq [edi + 8*18], mm0
+ movq mm0, [edi + 8*11]
+ movq [edi + 8*17], mm0
+ movq mm0, [edi + 8*7]
+ movq [edi + 8*11], mm0
+ movq mm0, [edi + 8*10]
+ movq [edi + 8*7], mm0
+ movq [edi + 8*10], mm1
+
+ ret
+endp
+
+
+proc sha3._.chi
+
+ mov eax, 0xffffffff
+ movd mm0, eax
+ movq mm2, mm0
+ punpckldq mm2, mm0
+
+repeat 5
+ movq mm6, [edi + 8*(0 + 5*(%-1))]
+ movq mm7, [edi + 8*(1 + 5*(%-1))]
+
+ movq mm0, [edi + 8*(0 + 5*(%-1))]
+ movq mm1, mm7
+ pandn mm1, mm2
+ pand mm1, [edi + 8*(2 + 5*(%-1))]
+ pxor mm0, mm1
+ movq [edi + 8*(0 + 5*(%-1))], mm0
+
+ movq mm0, [edi + 8*(1 + 5*(%-1))]
+ movq mm1, [edi + 8*(2 + 5*(%-1))]
+ pandn mm1, mm2
+ pand mm1, [edi + 8*(3 + 5*(%-1))]
+ pxor mm0, mm1
+ movq [edi + 8*(1 + 5*(%-1))], mm0
+
+ movq mm0, [edi + 8*(2 + 5*(%-1))]
+ movq mm1, [edi + 8*(3 + 5*(%-1))]
+ pandn mm1, mm2
+ pand mm1, [edi + 8*(4 + 5*(%-1))]
+ pxor mm0, mm1
+ movq [edi + 8*(2 + 5*(%-1))], mm0
+
+ movq mm0, [edi + 8*(3 + 5*(%-1))]
+ movq mm1, [edi + 8*(4 + 5*(%-1))]
+ pandn mm1, mm2
+ pand mm1, mm6
+ pxor mm0, mm1
+ movq [edi + 8*(3 + 5*(%-1))], mm0
+
+ movq mm0, [edi + 8*(4 + 5*(%-1))]
+ movq mm1, mm6
+ pandn mm1, mm2
+ pand mm1, mm7
+ pxor mm0, mm1
+ movq [edi + 8*(4 + 5*(%-1))], mm0
+end repeat
+ ret
+endp
+
+
+macro sha3._.rol_mov n, c
+{
+ movq mm0, [edi + 8*(n)]
+ movq mm1, mm0
+ psllq mm0, (c)
+ psrlq mm1, (64-(c))
+ por mm0, mm1
+ movq [edi + 8*(n)], mm0
+}
+
+proc sha3._.permutation
+
+repeat 24
+ stdcall sha3._.theta
+
+ sha3._.rol_mov 1, 1
+ sha3._.rol_mov 2, 62
+ sha3._.rol_mov 3, 28
+ sha3._.rol_mov 4, 27
+ sha3._.rol_mov 5, 36
+ sha3._.rol_mov 6, 44
+ sha3._.rol_mov 7, 6
+ sha3._.rol_mov 8, 55
+ sha3._.rol_mov 9, 20
+ sha3._.rol_mov 10, 3
+ sha3._.rol_mov 11, 10
+ sha3._.rol_mov 12, 43
+ sha3._.rol_mov 13, 25
+ sha3._.rol_mov 14, 39
+ sha3._.rol_mov 15, 41
+ sha3._.rol_mov 16, 45
+ sha3._.rol_mov 17, 15
+ sha3._.rol_mov 18, 21
+ sha3._.rol_mov 19, 8
+ sha3._.rol_mov 20, 18
+ sha3._.rol_mov 21, 2
+ sha3._.rol_mov 22, 61
+ sha3._.rol_mov 23, 56
+ sha3._.rol_mov 24, 14
+
+ stdcall sha3._.pi
+ stdcall sha3._.chi
+
+ movq mm0, [edi + 8*(0)]
+ pxor mm0, [sha3._.round + 8*(%-1)]
+ movq [edi + 8*(0)], mm0
+end repeat
+
+ ret
+endp
+
+
+proc sha3._.init _ctx
+ mov [ebx + ctx_sha3.block_size], eax
+ shr eax, 3
+ dec eax
+ mov [ebx + ctx_sha3.rounds_cnt], eax
+ xor eax, eax
+ lea edi, [ebx + ctx_sha3.hash]
+ mov ecx, SHA3_INIT_SIZE/4
+ rep stosd
+ mov [ebx + ctx_sha3.index], eax
+ ret
+endp
+
+
+proc sha3_224.init _ctx
+ mov ebx, [_ctx]
+ mov eax, SHA3_224_BLOCK_SIZE
+ stdcall sha3._.init
+ ret
+endp
+
+
+proc sha3_256.init _ctx
+ mov ebx, [_ctx]
+ mov eax, SHA3_256_BLOCK_SIZE
+ stdcall sha3._.init
+ ret
+endp
+
+
+proc sha3_384.init _ctx
+ mov ebx, [_ctx]
+ mov eax, SHA3_384_BLOCK_SIZE
+ stdcall sha3._.init
+ ret
+endp
+
+
+proc sha3_512.init _ctx
+ mov ebx, [_ctx]
+ mov eax, SHA3_512_BLOCK_SIZE
+ stdcall sha3._.init
+ ret
+endp
+
+
+proc sha3._.block _hash
+ mov ecx, [ebx + ctx_sha3.rounds_cnt]
+ mov edi, [_hash]
+
+ @@:
+ movq mm0, [esi + 8*ecx]
+ pxor mm0, [edi + 8*ecx]
+ movq [edi + 8*ecx], mm0
+ dec ecx
+ jns @b
+
+ stdcall sha3._.permutation
+
+ ret
+endp
+
+
+sha3_224.update = sha3.update
+sha3_256.update = sha3.update
+sha3_384.update = sha3.update
+sha3_512.update = sha3.update
+proc sha3.update _ctx, _msg, _size
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_sha3.index]
+ test eax, eax
+ jnz .copy_to_buf
+ test esi, SHA3_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ mov eax, [ebx + ctx_sha3.block_size]
+ cmp [_size], eax
+ jb .copy_quit
+ lea eax, [ebx + ctx_sha3.hash]
+ push ebx esi
+ stdcall sha3._.block, eax
+ pop esi ebx
+ mov eax, [ebx + ctx_sha3.block_size]
+ sub [_size], eax
+ add esi, [ebx + ctx_sha3.block_size]
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_sha3.block]
+ add edi, eax
+ mov ecx, [ebx + ctx_sha3.block_size]
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_sha3.index], ecx
+ mov eax, [ebx + ctx_sha3.block_size]
+ cmp [ebx + ctx_sha3.index], eax
+ jb @f
+ sub [ebx + ctx_sha3.index], eax
+ @@:
+ rep movsb
+ lea eax, [ebx + ctx_sha3.hash]
+ lea esi, [ebx + ctx_sha3.block]
+ stdcall sha3._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha3.block]
+ mov eax, [ebx + ctx_sha3.index]
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_sha3.index], ecx
+ rep movsb
+ .quit:
+ ret
+endp
+
+
+sha3_224.final = sha3.final
+sha3_256.final = sha3.final
+sha3_384.final = sha3.final
+sha3_512.final = sha3.final
+proc sha3.final _ctx
+ pushad
+ mov ebx, [_ctx]
+ mov eax, [ebx + ctx_sha3.index]
+ xor edx, edx
+ mov ecx, [ebx + ctx_sha3.block_size]
+ div ecx
+ sub ecx, edx
+ ja @f
+ add ecx, [ebx + ctx_sha3.block_size]
+ @@:
+ add [ebx + ctx_sha3.index], ecx
+ mov eax, [ebx + ctx_sha3.block_size]
+ cmp [ebx + ctx_sha3.index], eax
+ jb @f
+ sub [ebx + ctx_sha3.index], eax
+ @@:
+
+ mov byte[edi], 0x06
+ inc edi
+ dec ecx
+ xor eax, eax
+ rep stosb
+ or byte[edi - 1], 0x80
+
+ mov ebx, [_ctx]
+ lea esi, [ebx + ctx_sha3.block]
+ lea eax, [ebx + ctx_sha3.hash]
+ stdcall sha3._.block, eax
+
+ mov ebx, [_ctx]
+ lea eax, [ebx + ctx_sha3.hash]
+ stdcall sha3._.postprocess, ebx, eax
+
+ popad
+ ret
+endp
+
+
+proc sha3._.postprocess _ctx, _hash
+ emms
+ ret
+endp
+
+
+proc sha3_224.oneshot _ctx, _data, _len
+ stdcall sha3_224.init, [_ctx]
+ stdcall sha3.update, [_ctx], [_data], [_len]
+ stdcall sha3.final, [_ctx]
+ ret
+endp
+
+
+proc sha3_256.oneshot _ctx, _data, _len
+ stdcall sha3_256.init, [_ctx]
+ stdcall sha3.update, [_ctx], [_data], [_len]
+ stdcall sha3.final, [_ctx]
+ ret
+endp
+
+
+proc sha3_384.oneshot _ctx, _data, _len
+ stdcall sha3_384.init, [_ctx]
+ stdcall sha3.update, [_ctx], [_data], [_len]
+ stdcall sha3.final, [_ctx]
+ ret
+endp
+
+
+proc sha3_512.oneshot _ctx, _data, _len
+ stdcall sha3_512.init, [_ctx]
+ stdcall sha3.update, [_ctx], [_data], [_len]
+ stdcall sha3.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align SHA3_ALIGN
+sha3._.round dq 0x0000000000000001, 0x0000000000008082, 0x800000000000808A,\
+ 0x8000000080008000, 0x000000000000808B, 0x0000000080000001,\
+ 0x8000000080008081, 0x8000000000008009, 0x000000000000008A,\
+ 0x0000000000000088, 0x0000000080008009, 0x000000008000000A,\
+ 0x000000008000808B, 0x800000000000008B, 0x8000000000008089,\
+ 0x8000000000008003, 0x8000000000008002, 0x8000000000000080,\
+ 0x000000000000800A, 0x800000008000000A, 0x8000000080008081,\
+ 0x8000000000008080, 0x0000000080000001, 0x8000000080008008
+endg
diff --git a/programs/develop/libraries/libcrash/trunk/sha384_512.asm b/programs/develop/libraries/libcrash/trunk/sha384_512.asm
index df57fe5903..abe3a982e6 100644
--- a/programs/develop/libraries/libcrash/trunk/sha384_512.asm
+++ b/programs/develop/libraries/libcrash/trunk/sha384_512.asm
@@ -1,511 +1,566 @@
-; libcrash -- cryptographic hash functions
-;
-; Copyright (C) 2012-2013,2016 Ivan Baravy (dunkaist)
-;
-; This program is free software: you can redistribute it and/or modify
-; it under the terms of the GNU General Public License as published by
-; the Free Software Foundation, either version 3 of the License, or
-; (at your option) any later version.
-;
-; This program is distributed in the hope that it will be useful,
-; but WITHOUT ANY WARRANTY; without even the implied warranty of
-; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-; GNU General Public License for more details.
-;
-; You should have received a copy of the GNU General Public License
-; along with this program. If not, see .
-
-
-macro sha384512._.chn x, y, z
-{
- movq mm0, [y]
- pxor mm0, [z]
- pand mm0, [x]
- pxor mm0, [z]
-}
-
-macro sha384512._.maj x, y, z
-{
- movq mm0, [x]
- pxor mm0, [y]
- pand mm0, [z]
- movq mm2, [x]
- pand mm2, [y]
- pxor mm0, mm2
-}
-
-macro sha384512._.Sigma0 x
-{
- movq mm0, x
- movq mm2, mm0
- movq mm7, mm2
- psrlq mm2, 28
- psllq mm7, 36
- por mm2, mm7
- movq mm7, mm0
- psrlq mm0, 34
- psllq mm7, 30
- por mm0, mm7
- pxor mm0, mm2
- movq mm2, x
- movq mm7, mm2
- psrlq mm2, 39
- psllq mm7, 25
- por mm2, mm7
- pxor mm0, mm2
-}
-
-macro sha384512._.Sigma1 x
-{
- movq mm0, x
- movq mm2, mm0
- movq mm7, mm2
- psrlq mm2, 14
- psllq mm7, 50
- por mm2, mm7
- movq mm7, mm0
- psrlq mm0, 18
- psllq mm7, 46
- por mm0, mm7
- pxor mm0, mm2
- movq mm2, x
- movq mm7, mm2
- psrlq mm2, 41
- psllq mm7, 23
- por mm2, mm7
- pxor mm0, mm2
-}
-
-macro sha384512._.sigma0 x
-{
- movq mm0, x
- movq mm2, mm0
- movq mm7, mm2
- psrlq mm2, 1
- psllq mm7, 63
- por mm2, mm7
- movq mm7, mm0
- psrlq mm0, 8
- psllq mm7, 56
- por mm0, mm7
- pxor mm0, mm2
- movq mm2, x
- psrlq mm2, 7
- pxor mm0, mm2
-}
-
-macro sha384512._.sigma1 x
-{
- movq mm0, x
- movq mm2, mm0
- movq mm7, mm2
- psrlq mm2, 19
- psllq mm7, 45
- por mm2, mm7
- movq mm7, mm0
- psrlq mm0, 61
- psllq mm7, 3
- por mm0, mm7
- pxor mm0, mm2
- movq mm2, x
- psrlq mm2, 6
- pxor mm0, mm2
-}
-
-macro sha384512._.recalculate_w n
-{
- movq mm3, [w + ((n-2) and 15)*8]
- sha384512._.sigma1 mm3
- paddq mm0, [w + ((n-7) and 15)*8]
- movq mm6, mm0
- movq mm3, [w + ((n-15) and 15)*8]
- sha384512._.sigma0 mm3
- movq mm2, mm6
- paddq mm0, mm2
- movq mm7, [w + (n)*8]
- paddq mm7, mm0
- movq [w + (n)*8], mm7
-}
-
-macro sha384512._.round a, b, c, d, e, f, g, h, k
-{
- movq mm1, [h]
- movq mm3, [e]
- sha384512._.Sigma1 mm3
- paddq mm1, mm0
- sha384512._.chn e, f, g
- paddq mm1, mm0
- paddq mm1, [k]
- paddq mm1, mm5
- movq mm7, [d]
- paddq mm7, mm1
- movq [d], mm7
- movq mm3, [a]
- sha384512._.Sigma0 mm3
- paddq mm1, mm0
- sha384512._.maj a, b, c
- paddq mm0, mm1
- movq [h], mm0
-}
-
-
-macro sha384512._.round_1_16 a, b, c, d, e, f, g, h, n
-{
-
- movq mm0, [esi + (n)*8]
- movq [temp], mm0
- mov eax, dword[temp]
- bswap eax
- push eax
- mov eax, dword[temp + 4]
- bswap eax
- mov dword[temp], eax
- pop eax
- mov dword[temp + 4], eax
- movq mm0, [temp]
- movq [w + (n)*8], mm0
- movq mm5, mm0
- sha384512._.round a, b, c, d, e, f, g, h, (sha384512._.table + (n)*8)
-}
-
-macro sha384512._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
-{
- sha384512._.recalculate_w n
- movq mm5, [w + (n)*8]
- sha384512._.round a, b, c, d, e, f, g, h, (sha384512._.table + (n+16*rep_num)*8)
-}
-
-
-proc sha384.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha384512.hash]
- mov esi, sha384._.hash_init
- mov ecx, SHA384512_INIT_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_sha384512.index], eax
- mov [ebx + ctx_sha384512.msglen_0], eax
- mov [ebx + ctx_sha384512.msglen_1], eax
- mov [ebx + ctx_sha384512.msglen_2], eax
- mov [ebx + ctx_sha384512.msglen_3], eax
- ret
-endp
-
-
-proc sha512.init _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha384512.hash]
- mov esi, sha512._.hash_init
- mov ecx, SHA384512_INIT_SIZE/4
- rep movsd
- xor eax, eax
- mov [ebx + ctx_sha384512.index], eax
- mov [ebx + ctx_sha384512.msglen_0], eax
- mov [ebx + ctx_sha384512.msglen_1], eax
- mov [ebx + ctx_sha384512.msglen_2], eax
- mov [ebx + ctx_sha384512.msglen_3], eax
- ret
-endp
-
-
-proc sha384512._.block _hash
-;locals
-; w rq 80
-; A rq 1
-; B rq 1
-; C rq 1
-; D rq 1
-; E rq 1
-; F rq 1
-; G rq 1
-; H rq 1
-; temp rq 1
-;endl
-w equ ebx + ctx_sha384512.w
-A equ ebx + ctx_sha384512.A
-B equ ebx + ctx_sha384512.B
-C equ ebx + ctx_sha384512.C
-D equ ebx + ctx_sha384512.D
-E equ ebx + ctx_sha384512.E
-F equ ebx + ctx_sha384512.F
-G equ ebx + ctx_sha384512.G
-H equ ebx + ctx_sha384512.H
-temp equ ebx + ctx_sha384512.temp
-
- mov edi, [_hash]
- movq mm0, [edi + 0x00]
- movq [A], mm0
- movq mm0, [edi + 0x08]
- movq [B], mm0
- movq mm0, [edi + 0x10]
- movq [C], mm0
- movq mm0, [edi + 0x18]
- movq [D], mm0
- movq mm0, [edi + 0x20]
- movq [E], mm0
- movq mm0, [edi + 0x28]
- movq [F], mm0
- movq mm0, [edi + 0x30]
- movq [G], mm0
- movq mm0, [edi + 0x38]
- movq [H], mm0
-
-
- sha384512._.round_1_16 A, B, C, D, E, F, G, H, 0
- sha384512._.round_1_16 H, A, B, C, D, E, F, G, 1
- sha384512._.round_1_16 G, H, A, B, C, D, E, F, 2
- sha384512._.round_1_16 F, G, H, A, B, C, D, E, 3
- sha384512._.round_1_16 E, F, G, H, A, B, C, D, 4
- sha384512._.round_1_16 D, E, F, G, H, A, B, C, 5
- sha384512._.round_1_16 C, D, E, F, G, H, A, B, 6
- sha384512._.round_1_16 B, C, D, E, F, G, H, A, 7
- sha384512._.round_1_16 A, B, C, D, E, F, G, H, 8
- sha384512._.round_1_16 H, A, B, C, D, E, F, G, 9
- sha384512._.round_1_16 G, H, A, B, C, D, E, F, 10
- sha384512._.round_1_16 F, G, H, A, B, C, D, E, 11
- sha384512._.round_1_16 E, F, G, H, A, B, C, D, 12
- sha384512._.round_1_16 D, E, F, G, H, A, B, C, 13
- sha384512._.round_1_16 C, D, E, F, G, H, A, B, 14
- sha384512._.round_1_16 B, C, D, E, F, G, H, A, 15
-
-repeat 4
- sha384512._.round_17_64 A, B, C, D, E, F, G, H, 0, %
- sha384512._.round_17_64 H, A, B, C, D, E, F, G, 1, %
- sha384512._.round_17_64 G, H, A, B, C, D, E, F, 2, %
- sha384512._.round_17_64 F, G, H, A, B, C, D, E, 3, %
- sha384512._.round_17_64 E, F, G, H, A, B, C, D, 4, %
- sha384512._.round_17_64 D, E, F, G, H, A, B, C, 5, %
- sha384512._.round_17_64 C, D, E, F, G, H, A, B, 6, %
- sha384512._.round_17_64 B, C, D, E, F, G, H, A, 7, %
- sha384512._.round_17_64 A, B, C, D, E, F, G, H, 8, %
- sha384512._.round_17_64 H, A, B, C, D, E, F, G, 9, %
- sha384512._.round_17_64 G, H, A, B, C, D, E, F, 10, %
- sha384512._.round_17_64 F, G, H, A, B, C, D, E, 11, %
- sha384512._.round_17_64 E, F, G, H, A, B, C, D, 12, %
- sha384512._.round_17_64 D, E, F, G, H, A, B, C, 13, %
- sha384512._.round_17_64 C, D, E, F, G, H, A, B, 14, %
- sha384512._.round_17_64 B, C, D, E, F, G, H, A, 15, %
-end repeat
-
-
- mov edi, [_hash]
- movq mm0, [A]
- paddq mm0, [edi + 0x00]
- movq [edi + 0x00], mm0
- movq mm0, [B]
- paddq mm0, [edi + 0x08]
- movq [edi + 0x08], mm0
- movq mm0, [C]
- paddq mm0, [edi + 0x10]
- movq [edi + 0x10], mm0
- movq mm0, [D]
- paddq mm0, [edi + 0x18]
- movq [edi + 0x18], mm0
- movq mm0, [E]
- paddq mm0, [edi + 0x20]
- movq [edi + 0x20], mm0
- movq mm0, [F]
- paddq mm0, [edi + 0x28]
- movq [edi + 0x28], mm0
- movq mm0, [G]
- paddq mm0, [edi + 0x30]
- movq [edi + 0x30], mm0
- movq mm0, [H]
- paddq mm0, [edi + 0x38]
- movq [edi + 0x38], mm0
-
- ret
-restore w,A,B,C,D,E,F,G,H,temp
-endp
-
-sha512.update = sha384.update
-proc sha384.update _ctx, _msg, _size
- mov ebx, [_ctx]
- mov ecx, [_size]
- add [ebx + ctx_sha384512.msglen_0], ecx
- adc [ebx + ctx_sha384512.msglen_1], 0
- adc [ebx + ctx_sha384512.msglen_2], 0
- adc [ebx + ctx_sha384512.msglen_3], 0
-
- .next_block:
- mov ebx, [_ctx]
- mov esi, [_msg]
- mov eax, [ebx + ctx_sha384512.index]
- and eax, SHA384512_BLOCK_SIZE-1
- jnz .copy_to_buf
- test esi, SHA384512_ALIGN_MASK
- jnz .copy_to_buf
- .no_copy:
- ; data is aligned, hash it in place without copying
- mov ebx, [_ctx]
- cmp [_size], SHA384512_BLOCK_SIZE
- jb .copy_quit
- lea eax, [ebx + ctx_sha384512.hash]
- stdcall sha384512._.block, eax
- sub [_size], SHA384512_BLOCK_SIZE
- add esi, SHA384512_BLOCK_SIZE ; FIXME
- jmp .no_copy
-
- .copy_to_buf:
- lea edi, [ebx + ctx_sha384512.block]
- add edi, eax
- mov ecx, SHA384512_BLOCK_SIZE
- sub ecx, eax
- cmp [_size], ecx
- jb .copy_quit
- sub [_size], ecx
- add [_msg], ecx
- add [ebx + ctx_sha384512.index], ecx
- rep movsb
- lea eax, [ebx + ctx_sha384512.hash]
- lea esi, [ebx + ctx_sha384512.block]
- stdcall sha384512._.block, eax
- jmp .next_block
-
- .copy_quit:
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha384512.block]
- mov eax, [ebx + ctx_sha384512.index]
- and eax, SHA384512_BLOCK_SIZE-1
- add edi, eax
- mov ecx, [_size]
- add [ebx + ctx_sha384512.index], ecx
- rep movsb
- .quit:
-
- ret
-endp
-
-
-sha512.final = sha384.final
-proc sha384.final _ctx
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha384512.block]
- mov ecx, [ebx + ctx_sha384512.msglen_0]
- and ecx, SHA384512_BLOCK_SIZE-1
- add edi, ecx
- mov byte[edi], 0x80
- inc edi
- neg ecx
- add ecx, SHA384512_BLOCK_SIZE
- cmp ecx, 16
- ja .last
-
- dec ecx
- xor eax, eax
- rep stosb
- lea esi, [ebx + ctx_sha384512.block]
- lea eax, [ebx + ctx_sha384512.hash]
- stdcall sha384512._.block, eax
- mov ebx, [_ctx]
- lea edi, [ebx + ctx_sha384512.block]
- mov ecx, SHA384512_BLOCK_SIZE+1
- .last:
- dec ecx
- sub ecx, 16
- xor eax, eax
- rep stosb
- mov eax, [ebx + ctx_sha384512.msglen_1]
- shld [ebx + ctx_sha384512.msglen_0], eax, 3
- mov eax, [ebx + ctx_sha384512.msglen_2]
- shld [ebx + ctx_sha384512.msglen_1], eax, 3
- mov eax, [ebx + ctx_sha384512.msglen_3]
- shld [ebx + ctx_sha384512.msglen_2], eax, 3
- shl eax, 3
- bswap eax
- mov dword[edi + 0], eax
- mov eax, [ebx + ctx_sha384512.msglen_2]
- bswap eax
- mov dword[edi + 4], eax
- mov eax, [ebx + ctx_sha384512.msglen_1]
- bswap eax
- mov dword[edi + 8], eax
- mov eax, [ebx + ctx_sha384512.msglen_0]
- bswap eax
- mov dword[edi + 12], eax
- mov ebx, [_ctx]
- lea esi, [ebx + ctx_sha384512.block]
- lea eax, [ebx + ctx_sha384512.hash]
- stdcall sha384512._.block, eax
-
- mov ebx, [_ctx]
- lea eax, [ebx + ctx_sha384512.hash]
- stdcall sha384512._.postprocess, ebx, eax
-
- ret
-endp
-
-
-proc sha384512._.postprocess _ctx, _hash
- mov ecx, 8
- mov esi, [_hash]
- mov edi, esi
- @@:
- lodsd
- mov ebx, eax
- lodsd
- bswap eax
- bswap ebx
- stosd
- mov eax, ebx
- stosd
- dec ecx ; FIXME: what should I fix here?
- jnz @b
- emms
- ret
-endp
-
-
-align SHA384512_ALIGN
-
-sha384._.hash_init dq 0xcbbb9d5dc1059ed8, 0x629a292a367cd507,\
- 0x9159015a3070dd17, 0x152fecd8f70e5939,\
- 0x67332667ffc00b31, 0x8eb44a8768581511,\
- 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4
-
-sha512._.hash_init dq 0x6a09e667f3bcc908, 0xbb67ae8584caa73b,\
- 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1,\
- 0x510e527fade682d1, 0x9b05688c2b3e6c1f,\
- 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179
-
-sha384512._.table dq 0x428a2f98d728ae22, 0x7137449123ef65cd,\
- 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc,\
- 0x3956c25bf348b538, 0x59f111f1b605d019,\
- 0x923f82a4af194f9b, 0xab1c5ed5da6d8118,\
- 0xd807aa98a3030242, 0x12835b0145706fbe,\
- 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2,\
- 0x72be5d74f27b896f, 0x80deb1fe3b1696b1,\
- 0x9bdc06a725c71235, 0xc19bf174cf692694,\
- 0xe49b69c19ef14ad2, 0xefbe4786384f25e3,\
- 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65,\
- 0x2de92c6f592b0275, 0x4a7484aa6ea6e483,\
- 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5,\
- 0x983e5152ee66dfab, 0xa831c66d2db43210,\
- 0xb00327c898fb213f, 0xbf597fc7beef0ee4,\
- 0xc6e00bf33da88fc2, 0xd5a79147930aa725,\
- 0x06ca6351e003826f, 0x142929670a0e6e70,\
- 0x27b70a8546d22ffc, 0x2e1b21385c26c926,\
- 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df,\
- 0x650a73548baf63de, 0x766a0abb3c77b2a8,\
- 0x81c2c92e47edaee6, 0x92722c851482353b,\
- 0xa2bfe8a14cf10364, 0xa81a664bbc423001,\
- 0xc24b8b70d0f89791, 0xc76c51a30654be30,\
- 0xd192e819d6ef5218, 0xd69906245565a910,\
- 0xf40e35855771202a, 0x106aa07032bbd1b8,\
- 0x19a4c116b8d2d0c8, 0x1e376c085141ab53,\
- 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8,\
- 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb,\
- 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3,\
- 0x748f82ee5defb2fc, 0x78a5636f43172f60,\
- 0x84c87814a1f0ab72, 0x8cc702081a6439ec,\
- 0x90befffa23631e28, 0xa4506cebde82bde9,\
- 0xbef9a3f7b2c67915, 0xc67178f2e372532b,\
- 0xca273eceea26619c, 0xd186b8c721c0c207,\
- 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178,\
- 0x06f067aa72176fba, 0x0a637dc5a2c898a6,\
- 0x113f9804bef90dae, 0x1b710b35131c471b,\
- 0x28db77f523047d84, 0x32caab7b40c72493,\
- 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c,\
- 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a,\
- 0x5fcb6fab3ad6faec, 0x6c44198c4a475817
-
+; libcrash -- cryptographic hash functions
+;
+; Copyright (C) 2012-2013,2016,2019 Ivan Baravy (dunkaist)
+;
+; This program is free software: you can redistribute it and/or modify
+; it under the terms of the GNU General Public License as published by
+; the Free Software Foundation, either version 3 of the License, or
+; (at your option) any later version.
+;
+; This program is distributed in the hope that it will be useful,
+; but WITHOUT ANY WARRANTY; without even the implied warranty of
+; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+; GNU General Public License for more details.
+;
+; You should have received a copy of the GNU General Public License
+; along with this program. If not, see .
+
+
+SHA384512_BLOCK_SIZE = 128
+SHA384_BLOCK_SIZE = SHA384512_BLOCK_SIZE
+SHA512_BLOCK_SIZE = SHA384512_BLOCK_SIZE
+SHA384_HASH_SIZE = 48
+SHA512_HASH_SIZE = 64
+
+SHA384512_INIT_SIZE = 64
+SHA384512_ALIGN = 16
+SHA384512_ALIGN_MASK = SHA384512_ALIGN - 1
+
+struct ctx_sha384512
+ hash rb SHA384512_INIT_SIZE
+ block rb SHA384512_BLOCK_SIZE
+ index rd 1
+ msglen_0 rd 1
+ msglen_1 rd 1
+ msglen_2 rd 1
+ msglen_3 rd 1
+ rd 3 ; align
+ ; tmp vars
+ w rq 80
+ A rq 1
+ B rq 1
+ C rq 1
+ D rq 1
+ E rq 1
+ F rq 1
+ G rq 1
+ H rq 1
+ temp rq 1
+ends
+
+if defined sizeof.crash_ctx
+ assert sizeof.crash_ctx >= sizeof.ctx_sha384512
+end if
+
+macro sha384512._.chn x, y, z
+{
+ movq mm0, [y]
+ pxor mm0, [z]
+ pand mm0, [x]
+ pxor mm0, [z]
+}
+
+macro sha384512._.maj x, y, z
+{
+ movq mm0, [x]
+ pxor mm0, [y]
+ pand mm0, [z]
+ movq mm2, [x]
+ pand mm2, [y]
+ pxor mm0, mm2
+}
+
+macro sha384512._.Sigma0 x
+{
+ movq mm0, x
+ movq mm2, mm0
+ movq mm7, mm2
+ psrlq mm2, 28
+ psllq mm7, 36
+ por mm2, mm7
+ movq mm7, mm0
+ psrlq mm0, 34
+ psllq mm7, 30
+ por mm0, mm7
+ pxor mm0, mm2
+ movq mm2, x
+ movq mm7, mm2
+ psrlq mm2, 39
+ psllq mm7, 25
+ por mm2, mm7
+ pxor mm0, mm2
+}
+
+macro sha384512._.Sigma1 x
+{
+ movq mm0, x
+ movq mm2, mm0
+ movq mm7, mm2
+ psrlq mm2, 14
+ psllq mm7, 50
+ por mm2, mm7
+ movq mm7, mm0
+ psrlq mm0, 18
+ psllq mm7, 46
+ por mm0, mm7
+ pxor mm0, mm2
+ movq mm2, x
+ movq mm7, mm2
+ psrlq mm2, 41
+ psllq mm7, 23
+ por mm2, mm7
+ pxor mm0, mm2
+}
+
+macro sha384512._.sigma0 x
+{
+ movq mm0, x
+ movq mm2, mm0
+ movq mm7, mm2
+ psrlq mm2, 1
+ psllq mm7, 63
+ por mm2, mm7
+ movq mm7, mm0
+ psrlq mm0, 8
+ psllq mm7, 56
+ por mm0, mm7
+ pxor mm0, mm2
+ movq mm2, x
+ psrlq mm2, 7
+ pxor mm0, mm2
+}
+
+macro sha384512._.sigma1 x
+{
+ movq mm0, x
+ movq mm2, mm0
+ movq mm7, mm2
+ psrlq mm2, 19
+ psllq mm7, 45
+ por mm2, mm7
+ movq mm7, mm0
+ psrlq mm0, 61
+ psllq mm7, 3
+ por mm0, mm7
+ pxor mm0, mm2
+ movq mm2, x
+ psrlq mm2, 6
+ pxor mm0, mm2
+}
+
+macro sha384512._.recalculate_w n
+{
+ movq mm3, [w + ((n-2) and 15)*8]
+ sha384512._.sigma1 mm3
+ paddq mm0, [w + ((n-7) and 15)*8]
+ movq mm6, mm0
+ movq mm3, [w + ((n-15) and 15)*8]
+ sha384512._.sigma0 mm3
+ movq mm2, mm6
+ paddq mm0, mm2
+ movq mm7, [w + (n)*8]
+ paddq mm7, mm0
+ movq [w + (n)*8], mm7
+}
+
+macro sha384512._.round a, b, c, d, e, f, g, h, k
+{
+ movq mm1, [h]
+ movq mm3, [e]
+ sha384512._.Sigma1 mm3
+ paddq mm1, mm0
+ sha384512._.chn e, f, g
+ paddq mm1, mm0
+ paddq mm1, [k]
+ paddq mm1, mm5
+ movq mm7, [d]
+ paddq mm7, mm1
+ movq [d], mm7
+ movq mm3, [a]
+ sha384512._.Sigma0 mm3
+ paddq mm1, mm0
+ sha384512._.maj a, b, c
+ paddq mm0, mm1
+ movq [h], mm0
+}
+
+
+macro sha384512._.round_1_16 a, b, c, d, e, f, g, h, n
+{
+
+ movq mm0, [esi + (n)*8]
+ movq [temp], mm0
+ mov eax, dword[temp]
+ bswap eax
+ push eax
+ mov eax, dword[temp + 4]
+ bswap eax
+ mov dword[temp], eax
+ pop eax
+ mov dword[temp + 4], eax
+ movq mm0, [temp]
+ movq [w + (n)*8], mm0
+ movq mm5, mm0
+ sha384512._.round a, b, c, d, e, f, g, h, (sha384512._.table + (n)*8)
+}
+
+macro sha384512._.round_17_64 a, b, c, d, e, f, g, h, n, rep_num
+{
+ sha384512._.recalculate_w n
+ movq mm5, [w + (n)*8]
+ sha384512._.round a, b, c, d, e, f, g, h, (sha384512._.table + (n+16*rep_num)*8)
+}
+
+
+proc sha384.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha384512.hash]
+ mov esi, sha384._.hash_init
+ mov ecx, SHA384512_INIT_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_sha384512.index], eax
+ mov [ebx + ctx_sha384512.msglen_0], eax
+ mov [ebx + ctx_sha384512.msglen_1], eax
+ mov [ebx + ctx_sha384512.msglen_2], eax
+ mov [ebx + ctx_sha384512.msglen_3], eax
+ ret
+endp
+
+
+proc sha512.init _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha384512.hash]
+ mov esi, sha512._.hash_init
+ mov ecx, SHA384512_INIT_SIZE/4
+ rep movsd
+ xor eax, eax
+ mov [ebx + ctx_sha384512.index], eax
+ mov [ebx + ctx_sha384512.msglen_0], eax
+ mov [ebx + ctx_sha384512.msglen_1], eax
+ mov [ebx + ctx_sha384512.msglen_2], eax
+ mov [ebx + ctx_sha384512.msglen_3], eax
+ ret
+endp
+
+
+proc sha384512._.block _hash
+;locals
+; w rq 80
+; A rq 1
+; B rq 1
+; C rq 1
+; D rq 1
+; E rq 1
+; F rq 1
+; G rq 1
+; H rq 1
+; temp rq 1
+;endl
+w equ ebx + ctx_sha384512.w
+A equ ebx + ctx_sha384512.A
+B equ ebx + ctx_sha384512.B
+C equ ebx + ctx_sha384512.C
+D equ ebx + ctx_sha384512.D
+E equ ebx + ctx_sha384512.E
+F equ ebx + ctx_sha384512.F
+G equ ebx + ctx_sha384512.G
+H equ ebx + ctx_sha384512.H
+temp equ ebx + ctx_sha384512.temp
+
+ mov edi, [_hash]
+ movq mm0, [edi + 0x00]
+ movq [A], mm0
+ movq mm0, [edi + 0x08]
+ movq [B], mm0
+ movq mm0, [edi + 0x10]
+ movq [C], mm0
+ movq mm0, [edi + 0x18]
+ movq [D], mm0
+ movq mm0, [edi + 0x20]
+ movq [E], mm0
+ movq mm0, [edi + 0x28]
+ movq [F], mm0
+ movq mm0, [edi + 0x30]
+ movq [G], mm0
+ movq mm0, [edi + 0x38]
+ movq [H], mm0
+
+
+ sha384512._.round_1_16 A, B, C, D, E, F, G, H, 0
+ sha384512._.round_1_16 H, A, B, C, D, E, F, G, 1
+ sha384512._.round_1_16 G, H, A, B, C, D, E, F, 2
+ sha384512._.round_1_16 F, G, H, A, B, C, D, E, 3
+ sha384512._.round_1_16 E, F, G, H, A, B, C, D, 4
+ sha384512._.round_1_16 D, E, F, G, H, A, B, C, 5
+ sha384512._.round_1_16 C, D, E, F, G, H, A, B, 6
+ sha384512._.round_1_16 B, C, D, E, F, G, H, A, 7
+ sha384512._.round_1_16 A, B, C, D, E, F, G, H, 8
+ sha384512._.round_1_16 H, A, B, C, D, E, F, G, 9
+ sha384512._.round_1_16 G, H, A, B, C, D, E, F, 10
+ sha384512._.round_1_16 F, G, H, A, B, C, D, E, 11
+ sha384512._.round_1_16 E, F, G, H, A, B, C, D, 12
+ sha384512._.round_1_16 D, E, F, G, H, A, B, C, 13
+ sha384512._.round_1_16 C, D, E, F, G, H, A, B, 14
+ sha384512._.round_1_16 B, C, D, E, F, G, H, A, 15
+
+repeat 4
+ sha384512._.round_17_64 A, B, C, D, E, F, G, H, 0, %
+ sha384512._.round_17_64 H, A, B, C, D, E, F, G, 1, %
+ sha384512._.round_17_64 G, H, A, B, C, D, E, F, 2, %
+ sha384512._.round_17_64 F, G, H, A, B, C, D, E, 3, %
+ sha384512._.round_17_64 E, F, G, H, A, B, C, D, 4, %
+ sha384512._.round_17_64 D, E, F, G, H, A, B, C, 5, %
+ sha384512._.round_17_64 C, D, E, F, G, H, A, B, 6, %
+ sha384512._.round_17_64 B, C, D, E, F, G, H, A, 7, %
+ sha384512._.round_17_64 A, B, C, D, E, F, G, H, 8, %
+ sha384512._.round_17_64 H, A, B, C, D, E, F, G, 9, %
+ sha384512._.round_17_64 G, H, A, B, C, D, E, F, 10, %
+ sha384512._.round_17_64 F, G, H, A, B, C, D, E, 11, %
+ sha384512._.round_17_64 E, F, G, H, A, B, C, D, 12, %
+ sha384512._.round_17_64 D, E, F, G, H, A, B, C, 13, %
+ sha384512._.round_17_64 C, D, E, F, G, H, A, B, 14, %
+ sha384512._.round_17_64 B, C, D, E, F, G, H, A, 15, %
+end repeat
+
+
+ mov edi, [_hash]
+ movq mm0, [A]
+ paddq mm0, [edi + 0x00]
+ movq [edi + 0x00], mm0
+ movq mm0, [B]
+ paddq mm0, [edi + 0x08]
+ movq [edi + 0x08], mm0
+ movq mm0, [C]
+ paddq mm0, [edi + 0x10]
+ movq [edi + 0x10], mm0
+ movq mm0, [D]
+ paddq mm0, [edi + 0x18]
+ movq [edi + 0x18], mm0
+ movq mm0, [E]
+ paddq mm0, [edi + 0x20]
+ movq [edi + 0x20], mm0
+ movq mm0, [F]
+ paddq mm0, [edi + 0x28]
+ movq [edi + 0x28], mm0
+ movq mm0, [G]
+ paddq mm0, [edi + 0x30]
+ movq [edi + 0x30], mm0
+ movq mm0, [H]
+ paddq mm0, [edi + 0x38]
+ movq [edi + 0x38], mm0
+
+ ret
+restore w,A,B,C,D,E,F,G,H,temp
+endp
+
+
+sha384.update = sha384512.update
+sha512.update = sha384512.update
+proc sha384512.update _ctx, _msg, _size
+ mov ebx, [_ctx]
+ mov ecx, [_size]
+ add [ebx + ctx_sha384512.msglen_0], ecx
+ adc [ebx + ctx_sha384512.msglen_1], 0
+ adc [ebx + ctx_sha384512.msglen_2], 0
+ adc [ebx + ctx_sha384512.msglen_3], 0
+
+ .next_block:
+ mov ebx, [_ctx]
+ mov esi, [_msg]
+ mov eax, [ebx + ctx_sha384512.index]
+ and eax, SHA384512_BLOCK_SIZE-1
+ jnz .copy_to_buf
+ test esi, SHA384512_ALIGN_MASK
+ jnz .copy_to_buf
+ .no_copy:
+ ; data is aligned, hash it in place without copying
+ mov ebx, [_ctx]
+ cmp [_size], SHA384512_BLOCK_SIZE
+ jb .copy_quit
+ lea eax, [ebx + ctx_sha384512.hash]
+ stdcall sha384512._.block, eax
+ sub [_size], SHA384512_BLOCK_SIZE
+ add esi, SHA384512_BLOCK_SIZE ; FIXME
+ jmp .no_copy
+
+ .copy_to_buf:
+ lea edi, [ebx + ctx_sha384512.block]
+ add edi, eax
+ mov ecx, SHA384512_BLOCK_SIZE
+ sub ecx, eax
+ cmp [_size], ecx
+ jb .copy_quit
+ sub [_size], ecx
+ add [_msg], ecx
+ add [ebx + ctx_sha384512.index], ecx
+ rep movsb
+ lea eax, [ebx + ctx_sha384512.hash]
+ lea esi, [ebx + ctx_sha384512.block]
+ stdcall sha384512._.block, eax
+ jmp .next_block
+
+ .copy_quit:
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha384512.block]
+ mov eax, [ebx + ctx_sha384512.index]
+ and eax, SHA384512_BLOCK_SIZE-1
+ add edi, eax
+ mov ecx, [_size]
+ add [ebx + ctx_sha384512.index], ecx
+ rep movsb
+ .quit:
+
+ ret
+endp
+
+
+sha384.final = sha384512.final
+sha512.final = sha384512.final
+proc sha384512.final _ctx
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha384512.block]
+ mov ecx, [ebx + ctx_sha384512.msglen_0]
+ and ecx, SHA384512_BLOCK_SIZE-1
+ add edi, ecx
+ mov byte[edi], 0x80
+ inc edi
+ neg ecx
+ add ecx, SHA384512_BLOCK_SIZE
+ cmp ecx, 16
+ ja .last
+
+ dec ecx
+ xor eax, eax
+ rep stosb
+ lea esi, [ebx + ctx_sha384512.block]
+ lea eax, [ebx + ctx_sha384512.hash]
+ stdcall sha384512._.block, eax
+ mov ebx, [_ctx]
+ lea edi, [ebx + ctx_sha384512.block]
+ mov ecx, SHA384512_BLOCK_SIZE+1
+ .last:
+ dec ecx
+ sub ecx, 16
+ xor eax, eax
+ rep stosb
+ mov eax, [ebx + ctx_sha384512.msglen_1]
+ shld [ebx + ctx_sha384512.msglen_0], eax, 3
+ mov eax, [ebx + ctx_sha384512.msglen_2]
+ shld [ebx + ctx_sha384512.msglen_1], eax, 3
+ mov eax, [ebx + ctx_sha384512.msglen_3]
+ shld [ebx + ctx_sha384512.msglen_2], eax, 3
+ shl eax, 3
+ bswap eax
+ mov dword[edi + 0], eax
+ mov eax, [ebx + ctx_sha384512.msglen_2]
+ bswap eax
+ mov dword[edi + 4], eax
+ mov eax, [ebx + ctx_sha384512.msglen_1]
+ bswap eax
+ mov dword[edi + 8], eax
+ mov eax, [ebx + ctx_sha384512.msglen_0]
+ bswap eax
+ mov dword[edi + 12], eax
+ mov ebx, [_ctx]
+ lea esi, [ebx + ctx_sha384512.block]
+ lea eax, [ebx + ctx_sha384512.hash]
+ stdcall sha384512._.block, eax
+
+ mov ebx, [_ctx]
+ lea eax, [ebx + ctx_sha384512.hash]
+ stdcall sha384512._.postprocess, ebx, eax
+
+ ret
+endp
+
+
+proc sha384512._.postprocess _ctx, _hash
+ mov ecx, 8
+ mov esi, [_hash]
+ mov edi, esi
+ @@:
+ lodsd
+ mov ebx, eax
+ lodsd
+ bswap eax
+ bswap ebx
+ stosd
+ mov eax, ebx
+ stosd
+ dec ecx ; FIXME: what should I fix here?
+ jnz @b
+ emms
+ ret
+endp
+
+
+proc sha384.oneshot _ctx, _data, _len
+ stdcall sha384.init, [_ctx]
+ stdcall sha384.update, [_ctx], [_data], [_len]
+ stdcall sha384.final, [_ctx]
+ ret
+endp
+
+
+proc sha512.oneshot _ctx, _data, _len
+ stdcall sha512.init, [_ctx]
+ stdcall sha512.update, [_ctx], [_data], [_len]
+ stdcall sha512.final, [_ctx]
+ ret
+endp
+
+
+iglobal
+align SHA384512_ALIGN
+sha384._.hash_init dq 0xcbbb9d5dc1059ed8, 0x629a292a367cd507,\
+ 0x9159015a3070dd17, 0x152fecd8f70e5939,\
+ 0x67332667ffc00b31, 0x8eb44a8768581511,\
+ 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4
+
+sha512._.hash_init dq 0x6a09e667f3bcc908, 0xbb67ae8584caa73b,\
+ 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1,\
+ 0x510e527fade682d1, 0x9b05688c2b3e6c1f,\
+ 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179
+
+sha384512._.table dq 0x428a2f98d728ae22, 0x7137449123ef65cd,\
+ 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc,\
+ 0x3956c25bf348b538, 0x59f111f1b605d019,\
+ 0x923f82a4af194f9b, 0xab1c5ed5da6d8118,\
+ 0xd807aa98a3030242, 0x12835b0145706fbe,\
+ 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2,\
+ 0x72be5d74f27b896f, 0x80deb1fe3b1696b1,\
+ 0x9bdc06a725c71235, 0xc19bf174cf692694,\
+ 0xe49b69c19ef14ad2, 0xefbe4786384f25e3,\
+ 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65,\
+ 0x2de92c6f592b0275, 0x4a7484aa6ea6e483,\
+ 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5,\
+ 0x983e5152ee66dfab, 0xa831c66d2db43210,\
+ 0xb00327c898fb213f, 0xbf597fc7beef0ee4,\
+ 0xc6e00bf33da88fc2, 0xd5a79147930aa725,\
+ 0x06ca6351e003826f, 0x142929670a0e6e70,\
+ 0x27b70a8546d22ffc, 0x2e1b21385c26c926,\
+ 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df,\
+ 0x650a73548baf63de, 0x766a0abb3c77b2a8,\
+ 0x81c2c92e47edaee6, 0x92722c851482353b,\
+ 0xa2bfe8a14cf10364, 0xa81a664bbc423001,\
+ 0xc24b8b70d0f89791, 0xc76c51a30654be30,\
+ 0xd192e819d6ef5218, 0xd69906245565a910,\
+ 0xf40e35855771202a, 0x106aa07032bbd1b8,\
+ 0x19a4c116b8d2d0c8, 0x1e376c085141ab53,\
+ 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8,\
+ 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb,\
+ 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3,\
+ 0x748f82ee5defb2fc, 0x78a5636f43172f60,\
+ 0x84c87814a1f0ab72, 0x8cc702081a6439ec,\
+ 0x90befffa23631e28, 0xa4506cebde82bde9,\
+ 0xbef9a3f7b2c67915, 0xc67178f2e372532b,\
+ 0xca273eceea26619c, 0xd186b8c721c0c207,\
+ 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178,\
+ 0x06f067aa72176fba, 0x0a637dc5a2c898a6,\
+ 0x113f9804bef90dae, 0x1b710b35131c471b,\
+ 0x28db77f523047d84, 0x32caab7b40c72493,\
+ 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c,\
+ 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a,\
+ 0x5fcb6fab3ad6faec, 0x6c44198c4a475817
+endg
diff --git a/programs/network/ssh/dh_gex.inc b/programs/network/ssh/dh_gex.inc
index 88691a781c..320db6f0d3 100644
--- a/programs/network/ssh/dh_gex.inc
+++ b/programs/network/ssh/dh_gex.inc
@@ -231,7 +231,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx
rep movsd
mov [con.session_id_prefix], 'A'
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
@@ -249,7 +249,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx/4
rep movsd
inc [con.session_id_prefix]
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
@@ -267,7 +267,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx
rep movsd
inc [con.session_id_prefix]
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
@@ -285,7 +285,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx/4
rep movsd
inc [con.session_id_prefix]
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
@@ -303,7 +303,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx/4
rep movsd
inc [con.session_id_prefix]
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
@@ -321,7 +321,7 @@ end if
mov esi, con.k_h_ctx
mov edi, con.temp_ctx
- mov ecx, sizeof.ctx_sha224256/4
+ mov ecx, sizeof.crash_ctx/4
rep movsd
inc [con.session_id_prefix]
invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1
diff --git a/programs/network/ssh/hmac_md5.inc b/programs/network/ssh/hmac_md5.inc
index 472b43ca3b..8d7746928a 100644
--- a/programs/network/ssh/hmac_md5.inc
+++ b/programs/network/ssh/hmac_md5.inc
@@ -22,8 +22,8 @@
struct hmac_md5_context
hash rb MD5_HASH_SIZE
- ipad_ctx ctx_md5
- opad_ctx ctx_md5
+ ipad_ctx crash_ctx
+ opad_ctx crash_ctx
ends
; We will precompute partial hashes of K XOR ipad and K XOR opad,
diff --git a/programs/network/ssh/hmac_sha1.inc b/programs/network/ssh/hmac_sha1.inc
index 34c3830e2c..9e16eb28ec 100644
--- a/programs/network/ssh/hmac_sha1.inc
+++ b/programs/network/ssh/hmac_sha1.inc
@@ -22,8 +22,8 @@
struct hmac_sha1_context
hash rb SHA1_HASH_SIZE
- ipad_ctx ctx_sha1
- opad_ctx ctx_sha1
+ ipad_ctx crash_ctx
+ opad_ctx crash_ctx
ends
; We will precompute partial hashes of K XOR ipad and K XOR opad,
diff --git a/programs/network/ssh/hmac_sha256.inc b/programs/network/ssh/hmac_sha256.inc
index 61c2d0ffb4..4405a0115e 100644
--- a/programs/network/ssh/hmac_sha256.inc
+++ b/programs/network/ssh/hmac_sha256.inc
@@ -22,8 +22,8 @@
struct hmac_sha256_context
hash rb SHA256_HASH_SIZE
- ipad_ctx ctx_sha224256
- opad_ctx ctx_sha224256
+ ipad_ctx crash_ctx
+ opad_ctx crash_ctx
ends
; We will precompute partial hashes of K XOR ipad and K XOR opad,
@@ -32,21 +32,21 @@ ends
proc hmac_sha256_setkey ctx, key, key_length
locals
- k_temp rb SHA224256_BLOCK_SIZE
+ k_temp rb SHA256_BLOCK_SIZE
endl
pusha
; input esi = key, ecx=key_length
mov ecx, [key_length]
- cmp ecx, SHA224256_BLOCK_SIZE
+ cmp ecx, SHA256_BLOCK_SIZE
ja .hash_it
; Key is smaller then or equal to blocksize,
; copy key to ipad
mov esi, [key]
lea edi, [k_temp]
rep movsb
- mov ecx, SHA224256_BLOCK_SIZE
+ mov ecx, SHA256_BLOCK_SIZE
sub ecx, [key_length]
jz .finish
; append zeros to the key
@@ -64,13 +64,13 @@ endl
mov ecx, SHA256_HASH_SIZE/4
rep movsd
xor eax, eax
- mov ecx, (SHA224256_BLOCK_SIZE-SHA256_HASH_SIZE)/4
+ mov ecx, (SHA256_BLOCK_SIZE-SHA256_HASH_SIZE)/4
rep stosd
.finish:
; xor ipad buffer with 0x36363...
lea esi, [k_temp]
- mov ecx, SHA224256_BLOCK_SIZE/4
+ mov ecx, SHA256_BLOCK_SIZE/4
@@:
xor dword[esi], 0x36363636 ; ipad constant
add esi, 4
@@ -84,15 +84,15 @@ endl
lea esi, [k_temp]
DEBUGF 1, "HASH: "
- stdcall dump_hex, esi, SHA224256_BLOCK_SIZE/4
+ stdcall dump_hex, esi, SHA256_BLOCK_SIZE/4
mov ebx, [ctx]
lea edi, [ebx+hmac_sha256_context.ipad_ctx]
- invoke sha256_update, edi, esi, SHA224256_BLOCK_SIZE
+ invoke sha256_update, edi, esi, SHA256_BLOCK_SIZE
; xor opad buffer with 0x5c5c5...
lea esi, [k_temp]
- mov ecx, SHA224256_BLOCK_SIZE/4
+ mov ecx, SHA256_BLOCK_SIZE/4
@@:
xor dword[esi], 0x36363636 xor 0x5c5c5c5c ; opad constant
add esi, 4
@@ -106,11 +106,11 @@ endl
lea esi, [k_temp]
DEBUGF 1, "HASH: "
- stdcall dump_hex, esi, SHA224256_BLOCK_SIZE/4
+ stdcall dump_hex, esi, SHA256_BLOCK_SIZE/4
mov ebx, [ctx]
lea edi, [ebx+hmac_sha256_context.opad_ctx]
- invoke sha256_update, edi, esi, SHA224256_BLOCK_SIZE
+ invoke sha256_update, edi, esi, SHA256_BLOCK_SIZE
popa
ret
@@ -124,8 +124,8 @@ endp
proc hmac_sha256 ctx, _data, _length
locals
- inner_ctx ctx_sha224256
- outer_ctx ctx_sha224256
+ inner_ctx crash_ctx
+ outer_ctx crash_ctx
endl
pusha
@@ -138,7 +138,7 @@ endl
mov esi, [ctx]
lea esi, [esi+hmac_sha256_context.ipad_ctx]
lea edi, [inner_ctx]
-repeat (sizeof.ctx_sha224256)/4*2
+repeat (sizeof.crash_ctx)/4*2
movsd
end repeat
diff --git a/programs/network/ssh/ssh.asm b/programs/network/ssh/ssh.asm
index 5c1449f335..dd9947908d 100644
--- a/programs/network/ssh/ssh.asm
+++ b/programs/network/ssh/ssh.asm
@@ -165,8 +165,8 @@ struct ssh_connection
dh_signature dd ?
rb MAX_BITS/8
- temp_ctx ctx_sha224256
- k_h_ctx ctx_sha224256
+ temp_ctx crash_ctx
+ k_h_ctx crash_ctx
mpint_tmp dd ?
rb MAX_BITS/8