Home | History | Annotate | Download | only in decrepit
      1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com)
      2  * All rights reserved.
      3  *
      4  * This package is an SSL implementation written
      5  * by Eric Young (eay (at) cryptsoft.com).
      6  * The implementation was written so as to conform with Netscapes SSL.
      7  *
      8  * This library is free for commercial and non-commercial use as long as
      9  * the following conditions are aheared to.  The following conditions
     10  * apply to all code found in this distribution, be it the RC4, RSA,
     11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     12  * included with this distribution is covered by the same copyright terms
     13  * except that the holder is Tim Hudson (tjh (at) cryptsoft.com).
     14  *
     15  * Copyright remains Eric Young's, and as such any Copyright notices in
     16  * the code are not to be removed.
     17  * If this package is used in a product, Eric Young should be given attribution
     18  * as the author of the parts of the library used.
     19  * This can be in the form of a textual message at program startup or
     20  * in documentation (online or textual) provided with the package.
     21  *
     22  * Redistribution and use in source and binary forms, with or without
     23  * modification, are permitted provided that the following conditions
     24  * are met:
     25  * 1. Redistributions of source code must retain the copyright
     26  *    notice, this list of conditions and the following disclaimer.
     27  * 2. Redistributions in binary form must reproduce the above copyright
     28  *    notice, this list of conditions and the following disclaimer in the
     29  *    documentation and/or other materials provided with the distribution.
     30  * 3. All advertising materials mentioning features or use of this software
     31  *    must display the following acknowledgement:
     32  *    "This product includes cryptographic software written by
     33  *     Eric Young (eay (at) cryptsoft.com)"
     34  *    The word 'cryptographic' can be left out if the rouines from the library
     35  *    being used are not cryptographic related :-).
     36  * 4. If you include any Windows specific code (or a derivative thereof) from
     37  *    the apps directory (application code) you must include an acknowledgement:
     38  *    "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)"
     39  *
     40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     50  * SUCH DAMAGE.
     51  *
     52  * The licence and distribution terms for any publically available version or
     53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
     54  * copied and put under another distribution licence
     55  * [including the GNU Public Licence.] */
     56 
     57 #ifndef OPENSSL_HEADER_DECREPIT_MACROS_H
     58 #define OPENSSL_HEADER_DECREPIT_MACROS_H
     59 
     60 
     61 /* NOTE - c is not incremented as per n2l */
     62 #define n2ln(c, l1, l2, n)                       \
     63   {                                              \
     64     c += n;                                      \
     65     l1 = l2 = 0;                                 \
     66     switch (n) {                                 \
     67       case 8:                                    \
     68         l2 = ((unsigned long)(*(--(c))));        \
     69       case 7:                                    \
     70         l2 |= ((unsigned long)(*(--(c)))) << 8;  \
     71       case 6:                                    \
     72         l2 |= ((unsigned long)(*(--(c)))) << 16; \
     73       case 5:                                    \
     74         l2 |= ((unsigned long)(*(--(c)))) << 24; \
     75       case 4:                                    \
     76         l1 = ((unsigned long)(*(--(c))));        \
     77       case 3:                                    \
     78         l1 |= ((unsigned long)(*(--(c)))) << 8;  \
     79       case 2:                                    \
     80         l1 |= ((unsigned long)(*(--(c)))) << 16; \
     81       case 1:                                    \
     82         l1 |= ((unsigned long)(*(--(c)))) << 24; \
     83     }                                            \
     84   }
     85 
     86 /* NOTE - c is not incremented as per l2n */
     87 #define l2nn(l1, l2, c, n)                               \
     88   {                                                      \
     89     c += n;                                              \
     90     switch (n) {                                         \
     91       case 8:                                            \
     92         *(--(c)) = (unsigned char)(((l2)) & 0xff);       \
     93       case 7:                                            \
     94         *(--(c)) = (unsigned char)(((l2) >> 8) & 0xff);  \
     95       case 6:                                            \
     96         *(--(c)) = (unsigned char)(((l2) >> 16) & 0xff); \
     97       case 5:                                            \
     98         *(--(c)) = (unsigned char)(((l2) >> 24) & 0xff); \
     99       case 4:                                            \
    100         *(--(c)) = (unsigned char)(((l1)) & 0xff);       \
    101       case 3:                                            \
    102         *(--(c)) = (unsigned char)(((l1) >> 8) & 0xff);  \
    103       case 2:                                            \
    104         *(--(c)) = (unsigned char)(((l1) >> 16) & 0xff); \
    105       case 1:                                            \
    106         *(--(c)) = (unsigned char)(((l1) >> 24) & 0xff); \
    107     }                                                    \
    108   }
    109 
    110 #define l2n(l, c)                                   \
    111   (*((c)++) = (unsigned char)(((l) >> 24L) & 0xff), \
    112    *((c)++) = (unsigned char)(((l) >> 16L) & 0xff), \
    113    *((c)++) = (unsigned char)(((l) >> 8L) & 0xff),  \
    114    *((c)++) = (unsigned char)(((l)) & 0xff))
    115 
    116 #define n2l(c, l)                           \
    117   (l = ((unsigned long)(*((c)++))) << 24L,  \
    118    l |= ((unsigned long)(*((c)++))) << 16L, \
    119    l |= ((unsigned long)(*((c)++))) << 8L,  \
    120    l |= ((unsigned long)(*((c)++))))
    121 
    122 
    123 #endif  /* OPENSSL_HEADER_DECREPIT_MACROS_H */
    124