Difference between revisions of "SHA-1"
Jump to navigation
Jump to search
m |
m (I don't know where that bug came from) |
||
Line 183: | Line 183: | ||
j = 32; | j = 32; | ||
do | do | ||
buf += llGetSubString(hexc, b = ((T >> (j -= | buf += llGetSubString(hexc, b = ((T >> (j -= 4)) & 0xF), b); | ||
while (j); | while (j); | ||
}while ((i = -~i)); | }while ((i = -~i)); | ||
Line 316: | Line 316: | ||
bit_length = 32; | bit_length = 32; | ||
do | do | ||
buf += llGetSubString(hexc, b = ((T >> (bit_length -= | buf += llGetSubString(hexc, b = ((T >> (bit_length -= 4)) & 0xF), b); | ||
while (bit_length); | while (bit_length); | ||
}while ((i = -~i)); | }while ((i = -~i)); |
Revision as of 20:45, 24 October 2007
LSL Portal | Functions | Events | Types | Operators | Constants | Flow Control | Script Library | Categorized Library | Tutorials |
Preforms a SHA1 Hash on the text. Similar to and MD5 hash, although (slightly) more secure. Two versions of the function are provided, one for UTF-8 Strings (all strings in LSL are UTF-8) and the other is for Base64 Strings (you need to tell it how many bits long the data is).
View http://en.wikipedia.org/wiki/SHA1 for more information.
////////////////////////////////////////////////////////////////////////////////////// // // UTF-8 SHA1 // Version 1.0 // ESL Compiled: "Oct 24 2007", "22:15:01" // Copyright (C) 2007 Strife Onizuka // Based on Pseudo-code from http://en.wikipedia.org/wiki/SHA hash functions // https://wiki.secondlife.com/wiki/SHA1 // // This library is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public License // as published by the Free Software Foundation; // version 3 of the License. // // This library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with this library. If not, see <http://www.gnu.org/licenses/> // or write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, // Boston, MA 02111-1307 USA // ////////////////////////////////////////////////////////////////////////////////////// //===================================================// // Combined Library // // "Oct 24 2007", "22:15:01" // // Copyright (C) 2004-2007, Strife Onizuka (cc-by) // // http://creativecommons.org/licenses/by/3.0/ // //===================================================// //{ string TrimRight(string src, string chrs)//Mono Unsafe, LSO Safe { integer i = llStringLength(src); do;while(~llSubStringIndex(chrs, llGetSubString(src, (i = ~-i), i)) && i); return llDeleteSubString(src, (-~(i)), 0xFFFF); } string hexc="0123456789ABCDEF"; //} Combined Library integer rol(integer number, integer ammount) { return (number << ammount) | ((number >> (32 - ammount)) & (~(-1 << ammount))); } string UTF8_SHA1(string plain) { integer H1 = 0x67452301; integer H2 = 0xefcdab89; integer H3 = 0x98badcfe; integer H4 = 0x10325476; integer H5 = 0xc3d2e1f0; //OR on the extra bit. integer j = llStringLength(plain) << 3; integer b = (~-(((j + 552) & -512) >> 5)); integer T = llBase64ToInteger(TrimRight(llGetSubString(plain = llStringToBase64(plain), -4, -1),"=")+"AAAA"); string buf; integer i = 0; for(;i < 85 ; (i = -~i)) buf += "A"; if(j) { i = 0x800000; if(T & 0xFF00) i = 0x00000080; else if(T & 0xFF0000) i = 0x00008000; } else T = i = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104 // llOwnerSay(llList2CSV([i,j])); plain = llGetSubString( llDeleteSubString(plain, -4, -1) + llGetSubString(llIntegerToBase64(T | i), 0, 5) + buf, 0, (b << 4) / 3) + llIntegerToBase64(j << (6 - ((b % 3) << 1))); buf = ""; list x; for (i = 0; i < b; i += 16) { integer A = H1; integer B = H2; integer C = H3; integer D = H4; integer E = H5; for(j = 0; j < 16; (j = -~j)) { T = ((i + j) << 4) / 3; integer offset = ((i + j) % 3) << 1; if(offset) T = ((llBase64ToInteger(llGetSubString(plain, T, T+5)) << offset) | (llBase64ToInteger("A"+llGetSubString(plain, T+2, T+6)) >> (6 - offset))); else T = llBase64ToInteger(llGetSubString(plain, T, T+5)); // llOwnerSay("W["+(string)j+"]="+hex(T)); x += T; T += rol(A,5) + (D ^ (B & (C ^ D))) + E + 0x5a827999; E = D; D = C; C = rol(B, 30); B = A; A = T; } // llOwnerSay(llList2CSV(hexm(x))); for (; j < 20; (j = -~j)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)j+"]="+hex(T)); T += rol(A,5) + (D ^ (B & (C ^ D))) + E + 0x5a827999; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; j < 40; (j = -~j)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)j+"]="+hex(T)); T += rol(A,5) + (B ^ C ^ D) + E + 0x6ed9eba1; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; j < 60; (j = -~j)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)j+"]="+hex(T)); T += rol(A,5) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; j < 80; (j = -~j)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)j+"]="+hex(T)); T += rol(A,5) + (B ^ C ^ D) + E + 0xca62c1d6; E = D; D = C; C = rol(B, 30); B = A; A = T; } H1 += A; H2 += B; H3 += C; H4 += D; H5 += E; } x = [H1, H2, H3, H4, H5]; i = -5; do { T = llList2Integer(x,i); j = 32; do buf += llGetSubString(hexc, b = ((T >> (j -= 4)) & 0xF), b); while (j); }while ((i = -~i)); return buf; } string Base64_SHA1(string plain, integer bit_length) { integer H1 = 0x67452301; integer H2 = 0xefcdab89; integer H3 = 0x98badcfe; integer H4 = 0x10325476; integer H5 = 0xc3d2e1f0; //OR on the extra bit. integer b = (~-(((bit_length + 552) & -512) >> 5)); integer T = llBase64ToInteger(TrimRight(llGetSubString(plain, -4, -1),"=")+"AAAA"); string buf; integer i = 0; for(;i < 85 ; (i = -~i)) buf += "A"; if(bit_length) { i = 0x800000; if(T & 0xFF00) i = 0x00000080; else if(T & 0xFF0000) i = 0x00008000; } else T = i = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104 // llOwnerSay(llList2CSV([i,bit_length])); plain = llGetSubString( llDeleteSubString(plain, -4, -1) + llGetSubString(llIntegerToBase64(T | i), 0, 5) + buf, 0, (b << 4) / 3) + llIntegerToBase64(bit_length << (6 - ((b % 3) << 1))); buf = ""; list x; for (i = 0; i < b; i += 16) { integer A = H1; integer B = H2; integer C = H3; integer D = H4; integer E = H5; for(bit_length = 0; bit_length < 16; (bit_length = -~bit_length)) { T = ((i + bit_length) << 4) / 3; integer offset = ((i + bit_length) % 3) << 1; if(offset) T = ((llBase64ToInteger(llGetSubString(plain, T, T+5)) << offset) | (llBase64ToInteger("A"+llGetSubString(plain, T+2, T+6)) >> (6 - offset))); else T = llBase64ToInteger(llGetSubString(plain, T, T+5)); // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); x += T; T += rol(A,5) + (D ^ (B & (C ^ D))) + E + 0x5a827999; E = D; D = C; C = rol(B, 30); B = A; A = T; } // llOwnerSay(llList2CSV(hexm(x))); for (; bit_length < 20; (bit_length = -~bit_length)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); T += rol(A,5) + (D ^ (B & (C ^ D))) + E + 0x5a827999; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; bit_length < 40; (bit_length = -~bit_length)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); T += rol(A,5) + (B ^ C ^ D) + E + 0x6ed9eba1; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; bit_length < 60; (bit_length = -~bit_length)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); T += rol(A,5) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc; E = D; D = C; C = rol(B, 30); B = A; A = T; } for (; bit_length < 80; (bit_length = -~bit_length)) { x = llList2List(x + T = rol(llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16), 1), -16, -1); // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); T += rol(A,5) + (B ^ C ^ D) + E + 0xca62c1d6; E = D; D = C; C = rol(B, 30); B = A; A = T; } H1 += A; H2 += B; H3 += C; H4 += D; H5 += E; } x = [H1, H2, H3, H4, H5]; i = -5; do { T = llList2Integer(x,i); bit_length = 32; do buf += llGetSubString(hexc, b = ((T >> (bit_length -= 4)) & 0xF), b); while (bit_length); }while ((i = -~i)); return buf; } default { state_entry() { llOwnerSay(""); llOwnerSay(UTF8_SHA1("")); llOwnerSay("DA39A3EE5E6B4B0D3255BFEF95601890AFD80709"); llOwnerSay(""); llOwnerSay(UTF8_SHA1("abc")); llOwnerSay("A9993E364706816ABA3E25717850C26C9CD0D89D"); llOwnerSay(""); llOwnerSay(UTF8_SHA1("The quick brown fox jumps over the lazy dog")); llOwnerSay("2FD4E1C67A2D28FCED849EE1BB76E7391B93EB12"); // llOwnerSay((string)llGetTime()); } }