Mercurial > vim
comparison src/sha256.c @ 18812:d34ec6fe207d v8.1.2394
patch 8.1.2394: using old C style comments
Commit: https://github.com/vim/vim/commit/63d9e730f726341bf41ee4f4b829253cb9879110
Author: Bram Moolenaar <Bram@vim.org>
Date: Thu Dec 5 21:10:38 2019 +0100
patch 8.1.2394: using old C style comments
Problem: Using old C style comments.
Solution: Use // comments where appropriate.
author | Bram Moolenaar <Bram@vim.org> |
---|---|
date | Thu, 05 Dec 2019 21:15:04 +0100 |
parents | 27b9a84395b5 |
children | c1d1639b52dd |
comparison
equal
deleted
inserted
replaced
18811:65b77e62ec07 | 18812:d34ec6fe207d |
---|---|
258 PUT_UINT32(ctx->state[4], digest, 16); | 258 PUT_UINT32(ctx->state[4], digest, 16); |
259 PUT_UINT32(ctx->state[5], digest, 20); | 259 PUT_UINT32(ctx->state[5], digest, 20); |
260 PUT_UINT32(ctx->state[6], digest, 24); | 260 PUT_UINT32(ctx->state[6], digest, 24); |
261 PUT_UINT32(ctx->state[7], digest, 28); | 261 PUT_UINT32(ctx->state[7], digest, 28); |
262 } | 262 } |
263 #endif /* FEAT_CRYPT || FEAT_PERSISTENT_UNDO */ | 263 #endif // FEAT_CRYPT || FEAT_PERSISTENT_UNDO |
264 | 264 |
265 #if defined(FEAT_CRYPT) || defined(PROTO) | 265 #if defined(FEAT_CRYPT) || defined(PROTO) |
266 /* | 266 /* |
267 * Returns hex digest of "buf[buf_len]" in a static array. | 267 * Returns hex digest of "buf[buf_len]" in a static array. |
268 * if "salt" is not NULL also do "salt[salt_len]". | 268 * if "salt" is not NULL also do "salt[salt_len]". |
299 sha256_key( | 299 sha256_key( |
300 char_u *buf, | 300 char_u *buf, |
301 char_u *salt, | 301 char_u *salt, |
302 int salt_len) | 302 int salt_len) |
303 { | 303 { |
304 /* No passwd means don't encrypt */ | 304 // No passwd means don't encrypt |
305 if (buf == NULL || *buf == NUL) | 305 if (buf == NULL || *buf == NUL) |
306 return (char_u *)""; | 306 return (char_u *)""; |
307 | 307 |
308 return sha256_bytes(buf, (int)STRLEN(buf), salt, salt_len); | 308 return sha256_bytes(buf, (int)STRLEN(buf), salt, salt_len); |
309 } | 309 } |
368 } | 368 } |
369 if (memcmp(output, sha_self_test_vector[i], 64)) | 369 if (memcmp(output, sha_self_test_vector[i], 64)) |
370 { | 370 { |
371 failures++; | 371 failures++; |
372 output[sizeof(output) - 1] = '\0'; | 372 output[sizeof(output) - 1] = '\0'; |
373 /* printf("sha256_self_test %d failed %s\n", i, output); */ | 373 // printf("sha256_self_test %d failed %s\n", i, output); |
374 } | 374 } |
375 } | 375 } |
376 return failures > 0 ? FAIL : OK; | 376 return failures > 0 ? FAIL : OK; |
377 } | 377 } |
378 | 378 |
380 get_some_time(void) | 380 get_some_time(void) |
381 { | 381 { |
382 # ifdef HAVE_GETTIMEOFDAY | 382 # ifdef HAVE_GETTIMEOFDAY |
383 struct timeval tv; | 383 struct timeval tv; |
384 | 384 |
385 /* Using usec makes it less predictable. */ | 385 // Using usec makes it less predictable. |
386 gettimeofday(&tv, NULL); | 386 gettimeofday(&tv, NULL); |
387 return (unsigned int)(tv.tv_sec + tv.tv_usec); | 387 return (unsigned int)(tv.tv_sec + tv.tv_usec); |
388 # else | 388 # else |
389 return (unsigned int)time(NULL); | 389 return (unsigned int)time(NULL); |
390 # endif | 390 # endif |
412 random_data[i] = (char_u)((get_some_time() ^ rand()) & 0xff); | 412 random_data[i] = (char_u)((get_some_time() ^ rand()) & 0xff); |
413 sha256_start(&ctx); | 413 sha256_start(&ctx); |
414 sha256_update(&ctx, (char_u *)random_data, sizeof(random_data)); | 414 sha256_update(&ctx, (char_u *)random_data, sizeof(random_data)); |
415 sha256_finish(&ctx, sha256sum); | 415 sha256_finish(&ctx, sha256sum); |
416 | 416 |
417 /* put first block into header. */ | 417 // put first block into header. |
418 for (i = 0; i < header_len; i++) | 418 for (i = 0; i < header_len; i++) |
419 header[i] = sha256sum[i % sizeof(sha256sum)]; | 419 header[i] = sha256sum[i % sizeof(sha256sum)]; |
420 | 420 |
421 /* put remaining block into salt. */ | 421 // put remaining block into salt. |
422 if (salt != NULL) | 422 if (salt != NULL) |
423 for (i = 0; i < salt_len; i++) | 423 for (i = 0; i < salt_len; i++) |
424 salt[i] = sha256sum[(i + header_len) % sizeof(sha256sum)]; | 424 salt[i] = sha256sum[(i + header_len) % sizeof(sha256sum)]; |
425 } | 425 } |
426 | 426 |
427 #endif /* FEAT_CRYPT */ | 427 #endif // FEAT_CRYPT |