Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 334166 Details for
Bug 449976
keywording for ~m68k-mint for ruby with patches
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
sha2 patch
ruby-1.8.7-sha2.patch (text/plain), 4.43 KB, created by
Alan Hourihane
on 2013-01-03 10:56:25 UTC
(
hide
)
Description:
sha2 patch
Filename:
MIME Type:
Creator:
Alan Hourihane
Created:
2013-01-03 10:56:25 UTC
Size:
4.43 KB
patch
obsolete
>--- ext/digest/sha2/sha2.c.old 2012-12-19 00:08:00.000000000 +0000 >+++ ext/digest/sha2/sha2.c 2012-12-19 00:08:32.000000000 +0000 >@@ -176,8 +176,8 @@ > * only. > */ > void SHA512_Last(SHA512_CTX*); >-void SHA256_Transform(SHA256_CTX*, const sha2_word32*); >-void SHA512_Transform(SHA512_CTX*, const sha2_word64*); >+void _SHA256_Transform(SHA256_CTX*, const sha2_word32*); >+void _SHA512_Transform(SHA512_CTX*, const sha2_word64*); > > > /*** SHA-XYZ INITIAL HASH VALUES AND CONSTANTS ************************/ >@@ -329,7 +329,7 @@ > (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ > j++ > >-void SHA256_Transform(SHA256_CTX* context, const sha2_word32* data) { >+void _SHA256_Transform(SHA256_CTX* context, const sha2_word32* data) { > sha2_word32 a, b, c, d, e, f, g, h, s0, s1; > sha2_word32 T1, *W256; > int j; >@@ -387,7 +387,7 @@ > > #else /* SHA2_UNROLL_TRANSFORM */ > >-void SHA256_Transform(SHA256_CTX* context, const sha2_word32* data) { >+void _SHA256_Transform(SHA256_CTX* context, const sha2_word32* data) { > sha2_word32 a, b, c, d, e, f, g, h, s0, s1; > sha2_word32 T1, T2, *W256; > int j; >@@ -489,7 +489,7 @@ > context->bitcount += freespace << 3; > len -= freespace; > data += freespace; >- SHA256_Transform(context, (sha2_word32*)context->buffer); >+ _SHA256_Transform(context, (sha2_word32*)context->buffer); > } else { > /* The buffer is not yet full */ > MEMCPY_BCOPY(&context->buffer[usedspace], data, len); >@@ -501,7 +501,7 @@ > } > while (len >= SHA256_BLOCK_LENGTH) { > /* Process as many complete blocks as we can */ >- SHA256_Transform(context, (const sha2_word32*)data); >+ _SHA256_Transform(context, (const sha2_word32*)data); > context->bitcount += SHA256_BLOCK_LENGTH << 3; > len -= SHA256_BLOCK_LENGTH; > data += SHA256_BLOCK_LENGTH; >@@ -541,7 +541,7 @@ > MEMSET_BZERO(&context->buffer[usedspace], SHA256_BLOCK_LENGTH - usedspace); > } > /* Do second-to-last transform: */ >- SHA256_Transform(context, (sha2_word32*)context->buffer); >+ _SHA256_Transform(context, (sha2_word32*)context->buffer); > > /* And set-up for the last transform: */ > MEMSET_BZERO(context->buffer, SHA256_SHORT_BLOCK_LENGTH); >@@ -557,7 +557,7 @@ > *(sha2_word64*)&context->buffer[SHA256_SHORT_BLOCK_LENGTH] = context->bitcount; > > /* Final transform: */ >- SHA256_Transform(context, (sha2_word32*)context->buffer); >+ _SHA256_Transform(context, (sha2_word32*)context->buffer); > > #ifndef WORDS_BIGENDIAN > { >@@ -624,7 +624,7 @@ > (h) = T1 + Sigma0_512(a) + Maj((a), (b), (c)); \ > j++ > >-void SHA512_Transform(SHA512_CTX* context, const sha2_word64* data) { >+void _SHA512_Transform(SHA512_CTX* context, const sha2_word64* data) { > sha2_word64 a, b, c, d, e, f, g, h, s0, s1; > sha2_word64 T1, *W512 = (sha2_word64*)context->buffer; > int j; >@@ -679,7 +679,7 @@ > > #else /* SHA2_UNROLL_TRANSFORM */ > >-void SHA512_Transform(SHA512_CTX* context, const sha2_word64* data) { >+void _SHA512_Transform(SHA512_CTX* context, const sha2_word64* data) { > sha2_word64 a, b, c, d, e, f, g, h, s0, s1; > sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; > int j; >@@ -779,7 +779,7 @@ > ADDINC128(context->bitcount, freespace << 3); > len -= freespace; > data += freespace; >- SHA512_Transform(context, (const sha2_word64*)context->buffer); >+ _SHA512_Transform(context, (const sha2_word64*)context->buffer); > } else { > /* The buffer is not yet full */ > MEMCPY_BCOPY(&context->buffer[usedspace], data, len); >@@ -791,7 +791,7 @@ > } > while (len >= SHA512_BLOCK_LENGTH) { > /* Process as many complete blocks as we can */ >- SHA512_Transform(context, (const sha2_word64*)data); >+ _SHA512_Transform(context, (const sha2_word64*)data); > ADDINC128(context->bitcount, SHA512_BLOCK_LENGTH << 3); > len -= SHA512_BLOCK_LENGTH; > data += SHA512_BLOCK_LENGTH; >@@ -826,7 +826,7 @@ > MEMSET_BZERO(&context->buffer[usedspace], SHA512_BLOCK_LENGTH - usedspace); > } > /* Do second-to-last transform: */ >- SHA512_Transform(context, (const sha2_word64*)context->buffer); >+ _SHA512_Transform(context, (const sha2_word64*)context->buffer); > > /* And set-up for the last transform: */ > MEMSET_BZERO(context->buffer, SHA512_BLOCK_LENGTH - 2); >@@ -843,7 +843,7 @@ > *(sha2_word64*)&context->buffer[SHA512_SHORT_BLOCK_LENGTH+8] = context->bitcount[0]; > > /* Final transform: */ >- SHA512_Transform(context, (const sha2_word64*)context->buffer); >+ _SHA512_Transform(context, (const sha2_word64*)context->buffer); > } > > void SHA512_Finish(SHA512_CTX* context, sha2_byte digest[]) {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 449976
:
334164
| 334166