SHA-1: Difference between revisions
Jump to navigation
Jump to search
m I don't know where that bug came from |
No edit summary |
||
| Line 8: | Line 8: | ||
// | // | ||
// UTF-8 SHA1 | // UTF-8 SHA1 | ||
// Version 1. | // Version 1.1 | ||
// ESL Compiled: "Oct | // ESL Compiled: "Oct 25 2007", "13:01:17" | ||
// Copyright (C) 2007 Strife Onizuka | // Copyright (C) 2007 Strife Onizuka | ||
// Based on Pseudo-code from http://en.wikipedia.org/wiki/ | // Based on Pseudo-code from http://en.wikipedia.org/wiki/SHA1 | ||
// https://wiki.secondlife.com/wiki/SHA1 | // https://wiki.secondlife.com/wiki/SHA1 | ||
// | // | ||
| Line 33: | Line 33: | ||
//===================================================// | //===================================================// | ||
// Combined Library // | // Combined Library // | ||
// "Oct | // "Oct 25 2007", "13:01:17" // | ||
// Copyright (C) 2004-2007, Strife Onizuka (cc-by) // | // Copyright (C) 2004-2007, Strife Onizuka (cc-by) // | ||
// http://creativecommons.org/licenses/by/3.0/ // | // http://creativecommons.org/licenses/by/3.0/ // | ||
| Line 50: | Line 50: | ||
//} Combined Library | //} Combined Library | ||
string UTF8_SHA1(string plain) { | string UTF8_SHA1(string plain) { | ||
| Line 67: | Line 63: | ||
integer T = llBase64ToInteger(TrimRight(llGetSubString(plain = llStringToBase64(plain), -4, -1),"=")+"AAAA"); | integer T = llBase64ToInteger(TrimRight(llGetSubString(plain = llStringToBase64(plain), -4, -1),"=")+"AAAA"); | ||
string buf; | string buf; | ||
integer i = | integer i = -85; | ||
do buf += "A"; while((i = -~i)); | |||
if(j) | if(j) | ||
{ | { | ||
| Line 79: | Line 74: | ||
} | } | ||
else | else | ||
T | T = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104 | ||
// llOwnerSay(llList2CSV([i,j])); | // llOwnerSay(llList2CSV([i,j])); | ||
plain = llGetSubString( llDeleteSubString(plain, -4, -1) + | plain = llGetSubString( llDeleteSubString(plain, -4, -1) + | ||
| Line 85: | Line 80: | ||
buf, 0, (b << 4) / 3) + | buf, 0, (b << 4) / 3) + | ||
llIntegerToBase64(j << (6 - ((b % 3) << 1))); | llIntegerToBase64(j << (6 - ((b % 3) << 1))); | ||
list x; | list x; | ||
integer S = i = 0; | |||
do | |||
{ | { | ||
integer A = H1; | integer A = H1; | ||
| Line 95: | Line 89: | ||
integer D = H4; | integer D = H4; | ||
integer E = H5; | integer E = H5; | ||
x = (list)(j = 0);//the zero gets flushed off the stack by the later loops | |||
do | |||
{ | { | ||
T = ((i + j) << 4) / 3 | T = llBase64ToInteger(buf = llGetSubString(plain, T = ((i + j) << 4) / 3, T+6)) << (S = ((i + j) % 3) << 1); | ||
if(S) | |||
if( | T = T | (llBase64ToInteger("A"+llDeleteSubString(buf, 0, 1)) >> (6 - S)); | ||
T = | |||
// llOwnerSay("W["+(string)j+"]="+hex(T)); | // llOwnerSay("W["+(string)j+"]="+hex(T)); | ||
x += T; | x += T; | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(16 > (j = -~j)); | ||
// llOwnerSay(llList2CSV(hexm(x))); | // llOwnerSay(llList2CSV(hexm(x))); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)j+"]="+hex(T)); | // llOwnerSay("W["+(string)j+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(20 > (j = -~j)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)j+"]="+hex(T)); | // llOwnerSay("W["+(string)j+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0x6ed9eba1; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(40 > (j = -~j)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)j+"]="+hex(T)); | // llOwnerSay("W["+(string)j+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(60 > (j = -~j)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)j+"]="+hex(T)); | // llOwnerSay("W["+(string)j+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0xca62c1d6; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(80 > (j = -~j)); | ||
H1 += A; | H1 += A; | ||
H2 += B; | H2 += B; | ||
| Line 175: | Line 158: | ||
H4 += D; | H4 += D; | ||
H5 += E; | H5 += E; | ||
} | }while(b > i += 16); | ||
x = [H1, H2, H3, H4, H5]; | x = [H1, H2, H3, H4, H5]; | ||
i = -5; | i = -5; | ||
buf = ""; | |||
do | do | ||
{ | { | ||
| Line 189: | Line 173: | ||
} | } | ||
string Base64_SHA1(string plain, integer bit_length) { | string Base64_SHA1(string plain, integer bit_length) {//$[E20009] | ||
integer H1 = 0x67452301; | integer H1 = 0x67452301; | ||
integer H2 = 0xefcdab89; | integer H2 = 0xefcdab89; | ||
| Line 200: | Line 184: | ||
integer T = llBase64ToInteger(TrimRight(llGetSubString(plain, -4, -1),"=")+"AAAA"); | integer T = llBase64ToInteger(TrimRight(llGetSubString(plain, -4, -1),"=")+"AAAA"); | ||
string buf; | string buf; | ||
integer i = | integer i = -85; | ||
do buf += "A"; while((i = -~i)); | |||
if(bit_length) | if(bit_length) | ||
{ | { | ||
| Line 212: | Line 195: | ||
} | } | ||
else | else | ||
T | T = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104 | ||
// llOwnerSay(llList2CSV([i,bit_length])); | // llOwnerSay(llList2CSV([i,bit_length])); | ||
plain = llGetSubString( llDeleteSubString(plain, -4, -1) + | plain = llGetSubString( llDeleteSubString(plain, -4, -1) + | ||
| Line 218: | Line 201: | ||
buf, 0, (b << 4) / 3) + | buf, 0, (b << 4) / 3) + | ||
llIntegerToBase64(bit_length << (6 - ((b % 3) << 1))); | llIntegerToBase64(bit_length << (6 - ((b % 3) << 1))); | ||
list x; | list x; | ||
integer S = i = 0; | |||
do | |||
{ | { | ||
integer A = H1; | integer A = H1; | ||
| Line 228: | Line 210: | ||
integer D = H4; | integer D = H4; | ||
integer E = H5; | integer E = H5; | ||
x = (list)(bit_length = 0);//the zero gets flushed off the stack by the later loops | |||
do | |||
{ | { | ||
T = ((i + bit_length) << 4) / 3 | T = llBase64ToInteger(buf = llGetSubString(plain, T = ((i + bit_length) << 4) / 3, T+6)) << (S = ((i + bit_length) % 3) << 1); | ||
if(S) | |||
if( | T = T | (llBase64ToInteger("A"+llDeleteSubString(buf, 0, 1)) >> (6 - S)); | ||
T = | |||
// llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | ||
x += T; | x += T; | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(16 > (bit_length = -~bit_length)); | ||
// llOwnerSay(llList2CSV(hexm(x))); | // llOwnerSay(llList2CSV(hexm(x))); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(20 > (bit_length = -~bit_length)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0x6ed9eba1; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(40 > (bit_length = -~bit_length)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(60 > (bit_length = -~bit_length)); | ||
do | |||
{ | { | ||
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16); | |||
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1); | |||
// llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | // llOwnerSay("W["+(string)bit_length+"]="+hex(T)); | ||
T += | T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0xca62c1d6; | ||
E = D; | E = D; | ||
D = C; | D = C; | ||
C = | C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF)); | ||
B = A; | B = A; | ||
A = T; | A = T; | ||
} | }while(80 > (bit_length = -~bit_length)); | ||
H1 += A; | H1 += A; | ||
H2 += B; | H2 += B; | ||
| Line 308: | Line 279: | ||
H4 += D; | H4 += D; | ||
H5 += E; | H5 += E; | ||
} | }while(b > i += 16); | ||
x = [H1, H2, H3, H4, H5]; | x = [H1, H2, H3, H4, H5]; | ||
i = -5; | i = -5; | ||
buf = ""; | |||
do | do | ||
{ | { | ||
Revision as of 09:15, 25 October 2007
| LSL Portal | Functions | Events | Types | Operators | Constants | Flow Control | Script Library | Categorized Library | Tutorials |
Preforms a SHA1 Hash on the text. Similar to and MD5 hash, although (slightly) more secure. Two versions of the function are provided, one for UTF-8 Strings (all strings in LSL are UTF-8) and the other is for Base64 Strings (you need to tell it how many bits long the data is).
View http://en.wikipedia.org/wiki/SHA1 for more information.
//////////////////////////////////////////////////////////////////////////////////////
//
// UTF-8 SHA1
// Version 1.1
// ESL Compiled: "Oct 25 2007", "13:01:17"
// Copyright (C) 2007 Strife Onizuka
// Based on Pseudo-code from http://en.wikipedia.org/wiki/SHA1
// https://wiki.secondlife.com/wiki/SHA1
//
// This library is free software; you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public License
// as published by the Free Software Foundation;
// version 3 of the License.
//
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with this library. If not, see <http://www.gnu.org/licenses/>
// or write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330,
// Boston, MA 02111-1307 USA
//
//////////////////////////////////////////////////////////////////////////////////////
//===================================================//
// Combined Library //
// "Oct 25 2007", "13:01:17" //
// Copyright (C) 2004-2007, Strife Onizuka (cc-by) //
// http://creativecommons.org/licenses/by/3.0/ //
//===================================================//
//{
string TrimRight(string src, string chrs)//Mono Unsafe, LSO Safe
{
integer i = llStringLength(src);
do;while(~llSubStringIndex(chrs, llGetSubString(src, (i = ~-i), i)) && i);
return llDeleteSubString(src, (-~(i)), 0xFFFF);
}
string hexc="0123456789ABCDEF";
//} Combined Library
string UTF8_SHA1(string plain) {
integer H1 = 0x67452301;
integer H2 = 0xefcdab89;
integer H3 = 0x98badcfe;
integer H4 = 0x10325476;
integer H5 = 0xc3d2e1f0;
//OR on the extra bit.
integer j = llStringLength(plain) << 3;
integer b = (~-(((j + 552) & -512) >> 5));
integer T = llBase64ToInteger(TrimRight(llGetSubString(plain = llStringToBase64(plain), -4, -1),"=")+"AAAA");
string buf;
integer i = -85;
do buf += "A"; while((i = -~i));
if(j)
{
i = 0x800000;
if(T & 0xFF00)
i = 0x00000080;
else if(T & 0xFF0000)
i = 0x00008000;
}
else
T = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104
// llOwnerSay(llList2CSV([i,j]));
plain = llGetSubString( llDeleteSubString(plain, -4, -1) +
llGetSubString(llIntegerToBase64(T | i), 0, 5) +
buf, 0, (b << 4) / 3) +
llIntegerToBase64(j << (6 - ((b % 3) << 1)));
list x;
integer S = i = 0;
do
{
integer A = H1;
integer B = H2;
integer C = H3;
integer D = H4;
integer E = H5;
x = (list)(j = 0);//the zero gets flushed off the stack by the later loops
do
{
T = llBase64ToInteger(buf = llGetSubString(plain, T = ((i + j) << 4) / 3, T+6)) << (S = ((i + j) % 3) << 1);
if(S)
T = T | (llBase64ToInteger("A"+llDeleteSubString(buf, 0, 1)) >> (6 - S));
// llOwnerSay("W["+(string)j+"]="+hex(T));
x += T;
T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(16 > (j = -~j));
// llOwnerSay(llList2CSV(hexm(x)));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)j+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(20 > (j = -~j));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)j+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0x6ed9eba1;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(40 > (j = -~j));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)j+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(60 > (j = -~j));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)j+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0xca62c1d6;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(80 > (j = -~j));
H1 += A;
H2 += B;
H3 += C;
H4 += D;
H5 += E;
}while(b > i += 16);
x = [H1, H2, H3, H4, H5];
i = -5;
buf = "";
do
{
T = llList2Integer(x,i);
j = 32;
do
buf += llGetSubString(hexc, b = ((T >> (j -= 4)) & 0xF), b);
while (j);
}while ((i = -~i));
return buf;
}
string Base64_SHA1(string plain, integer bit_length) {//$[E20009]
integer H1 = 0x67452301;
integer H2 = 0xefcdab89;
integer H3 = 0x98badcfe;
integer H4 = 0x10325476;
integer H5 = 0xc3d2e1f0;
//OR on the extra bit.
integer b = (~-(((bit_length + 552) & -512) >> 5));
integer T = llBase64ToInteger(TrimRight(llGetSubString(plain, -4, -1),"=")+"AAAA");
string buf;
integer i = -85;
do buf += "A"; while((i = -~i));
if(bit_length)
{
i = 0x800000;
if(T & 0xFF00)
i = 0x00000080;
else if(T & 0xFF0000)
i = 0x00008000;
}
else
T = 0x80000000;//T is corrupt because of https://jira.secondlife.com/browse/SVC-104
// llOwnerSay(llList2CSV([i,bit_length]));
plain = llGetSubString( llDeleteSubString(plain, -4, -1) +
llGetSubString(llIntegerToBase64(T | i), 0, 5) +
buf, 0, (b << 4) / 3) +
llIntegerToBase64(bit_length << (6 - ((b % 3) << 1)));
list x;
integer S = i = 0;
do
{
integer A = H1;
integer B = H2;
integer C = H3;
integer D = H4;
integer E = H5;
x = (list)(bit_length = 0);//the zero gets flushed off the stack by the later loops
do
{
T = llBase64ToInteger(buf = llGetSubString(plain, T = ((i + bit_length) << 4) / 3, T+6)) << (S = ((i + bit_length) % 3) << 1);
if(S)
T = T | (llBase64ToInteger("A"+llDeleteSubString(buf, 0, 1)) >> (6 - S));
// llOwnerSay("W["+(string)bit_length+"]="+hex(T));
x += T;
T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(16 > (bit_length = -~bit_length));
// llOwnerSay(llList2CSV(hexm(x)));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)bit_length+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (D ^ (B & (C ^ D))) + E + 0x5a827999;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(20 > (bit_length = -~bit_length));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)bit_length+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0x6ed9eba1;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(40 > (bit_length = -~bit_length));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)bit_length+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + ((B & C) | (B & D) | (C & D)) + E + 0x8f1bbcdc;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(60 > (bit_length = -~bit_length));
do
{
S = llList2Integer(x, -3) ^ llList2Integer(x, -8) ^ llList2Integer(x, -14) ^ llList2Integer(x, -16);
x = llList2List(x + T = ((S << 1) | !!(S & 0x80000000)), -16, -1);
// llOwnerSay("W["+(string)bit_length+"]="+hex(T));
T += ((A << 5) | ((A >> 27) & 0x1F)) + (B ^ C ^ D) + E + 0xca62c1d6;
E = D;
D = C;
C = ((B << 30) | ((B >> 2) & 0x3FFFFFFF));
B = A;
A = T;
}while(80 > (bit_length = -~bit_length));
H1 += A;
H2 += B;
H3 += C;
H4 += D;
H5 += E;
}while(b > i += 16);
x = [H1, H2, H3, H4, H5];
i = -5;
buf = "";
do
{
T = llList2Integer(x,i);
bit_length = 32;
do
buf += llGetSubString(hexc, b = ((T >> (bit_length -= 4)) & 0xF), b);
while (bit_length);
}while ((i = -~i));
return buf;
}
default
{
state_entry()
{
llOwnerSay("");
llOwnerSay(UTF8_SHA1(""));
llOwnerSay("DA39A3EE5E6B4B0D3255BFEF95601890AFD80709");
llOwnerSay("");
llOwnerSay(UTF8_SHA1("abc"));
llOwnerSay("A9993E364706816ABA3E25717850C26C9CD0D89D");
llOwnerSay("");
llOwnerSay(UTF8_SHA1("The quick brown fox jumps over the lazy dog"));
llOwnerSay("2FD4E1C67A2D28FCED849EE1BB76E7391B93EB12");
// llOwnerSay((string)llGetTime());
}
}