mirror of
https://github.com/hashcat/hashcat.git
synced 2025-01-13 01:01:26 +00:00
163 lines
5.0 KiB
C
163 lines
5.0 KiB
C
/**********************************************************************
|
|
* Copyright (c) 2013, 2014 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
**********************************************************************/
|
|
|
|
#ifndef SECP256K1_UTIL_H
|
|
#define SECP256K1_UTIL_H
|
|
|
|
#if defined HAVE_CONFIG_H
|
|
#include "libsecp256k1-config.h"
|
|
#endif
|
|
|
|
#include <stdlib.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
|
|
typedef struct {
|
|
void (*fn)(const char *text, void* data);
|
|
const void* data;
|
|
} secp256k1_callback;
|
|
|
|
static SECP256K1_INLINE void secp256k1_callback_call(const secp256k1_callback * const cb, const char * const text) {
|
|
cb->fn(text, (void*)cb->data);
|
|
}
|
|
|
|
#ifdef DETERMINISTIC
|
|
#define TEST_FAILURE(msg) do { \
|
|
fprintf(stderr, "%s\n", msg); \
|
|
abort(); \
|
|
} while(0);
|
|
#else
|
|
#define TEST_FAILURE(msg) do { \
|
|
fprintf(stderr, "%s:%d: %s\n", __FILE__, __LINE__, msg); \
|
|
abort(); \
|
|
} while(0)
|
|
#endif
|
|
|
|
#if SECP256K1_GNUC_PREREQ(3, 0)
|
|
#define EXPECT(x,c) __builtin_expect((x),(c))
|
|
#else
|
|
#define EXPECT(x,c) (x)
|
|
#endif
|
|
|
|
#ifdef DETERMINISTIC
|
|
#define CHECK(cond) do { \
|
|
if (EXPECT(!(cond), 0)) { \
|
|
TEST_FAILURE("test condition failed"); \
|
|
} \
|
|
} while(0)
|
|
#else
|
|
#define CHECK(cond) do { \
|
|
if (EXPECT(!(cond), 0)) { \
|
|
TEST_FAILURE("test condition failed: " #cond); \
|
|
} \
|
|
} while(0)
|
|
#endif
|
|
|
|
/* Like assert(), but when VERIFY is defined, and side-effect safe. */
|
|
#if defined(COVERAGE)
|
|
#define VERIFY_CHECK(check)
|
|
#define VERIFY_SETUP(stmt)
|
|
#elif defined(VERIFY)
|
|
#define VERIFY_CHECK CHECK
|
|
#define VERIFY_SETUP(stmt) do { stmt; } while(0)
|
|
#else
|
|
#define VERIFY_CHECK(cond) do { (void)(cond); } while(0)
|
|
#define VERIFY_SETUP(stmt)
|
|
#endif
|
|
|
|
static SECP256K1_INLINE void *checked_malloc(const secp256k1_callback* cb, size_t size) {
|
|
void *ret = malloc(size);
|
|
if (ret == NULL) {
|
|
secp256k1_callback_call(cb, "Out of memory");
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static SECP256K1_INLINE void *checked_realloc(const secp256k1_callback* cb, void *ptr, size_t size) {
|
|
void *ret = realloc(ptr, size);
|
|
if (ret == NULL) {
|
|
secp256k1_callback_call(cb, "Out of memory");
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
#if defined(__BIGGEST_ALIGNMENT__)
|
|
#define ALIGNMENT __BIGGEST_ALIGNMENT__
|
|
#else
|
|
/* Using 16 bytes alignment because common architectures never have alignment
|
|
* requirements above 8 for any of the types we care about. In addition we
|
|
* leave some room because currently we don't care about a few bytes. */
|
|
#define ALIGNMENT 16
|
|
#endif
|
|
|
|
#define ROUND_TO_ALIGN(size) (((size + ALIGNMENT - 1) / ALIGNMENT) * ALIGNMENT)
|
|
|
|
/* Assume there is a contiguous memory object with bounds [base, base + max_size)
|
|
* of which the memory range [base, *prealloc_ptr) is already allocated for usage,
|
|
* where *prealloc_ptr is an aligned pointer. In that setting, this functions
|
|
* reserves the subobject [*prealloc_ptr, *prealloc_ptr + alloc_size) of
|
|
* alloc_size bytes by increasing *prealloc_ptr accordingly, taking into account
|
|
* alignment requirements.
|
|
*
|
|
* The function returns an aligned pointer to the newly allocated subobject.
|
|
*
|
|
* This is useful for manual memory management: if we're simply given a block
|
|
* [base, base + max_size), the caller can use this function to allocate memory
|
|
* in this block and keep track of the current allocation state with *prealloc_ptr.
|
|
*
|
|
* It is VERIFY_CHECKed that there is enough space left in the memory object and
|
|
* *prealloc_ptr is aligned relative to base.
|
|
*/
|
|
static SECP256K1_INLINE void *manual_alloc(void** prealloc_ptr, size_t alloc_size, void* base, size_t max_size) {
|
|
size_t aligned_alloc_size = ROUND_TO_ALIGN(alloc_size);
|
|
void* ret;
|
|
VERIFY_CHECK(prealloc_ptr != NULL);
|
|
VERIFY_CHECK(*prealloc_ptr != NULL);
|
|
VERIFY_CHECK(base != NULL);
|
|
VERIFY_CHECK((unsigned char*)*prealloc_ptr >= (unsigned char*)base);
|
|
VERIFY_CHECK(((unsigned char*)*prealloc_ptr - (unsigned char*)base) % ALIGNMENT == 0);
|
|
VERIFY_CHECK((unsigned char*)*prealloc_ptr - (unsigned char*)base + aligned_alloc_size <= max_size);
|
|
ret = *prealloc_ptr;
|
|
*((unsigned char**)prealloc_ptr) += aligned_alloc_size;
|
|
return ret;
|
|
}
|
|
|
|
/* Macro for restrict, when available and not in a VERIFY build. */
|
|
#if defined(SECP256K1_BUILD) && defined(VERIFY)
|
|
# define SECP256K1_RESTRICT
|
|
#else
|
|
# if (!defined(__STDC_VERSION__) || (__STDC_VERSION__ < 199901L) )
|
|
# if SECP256K1_GNUC_PREREQ(3,0)
|
|
# define SECP256K1_RESTRICT __restrict__
|
|
# elif (defined(_MSC_VER) && _MSC_VER >= 1400)
|
|
# define SECP256K1_RESTRICT __restrict
|
|
# else
|
|
# define SECP256K1_RESTRICT
|
|
# endif
|
|
# else
|
|
# define SECP256K1_RESTRICT restrict
|
|
# endif
|
|
#endif
|
|
|
|
#if defined(_WIN32)
|
|
# define I64FORMAT "I64d"
|
|
# define I64uFORMAT "I64u"
|
|
#else
|
|
# define I64FORMAT "lld"
|
|
# define I64uFORMAT "llu"
|
|
#endif
|
|
|
|
#if defined(HAVE___INT128)
|
|
# if defined(__GNUC__)
|
|
# define SECP256K1_GNUC_EXT __extension__
|
|
# else
|
|
# define SECP256K1_GNUC_EXT
|
|
# endif
|
|
SECP256K1_GNUC_EXT typedef unsigned __int128 uint128_t;
|
|
#endif
|
|
|
|
#endif /* SECP256K1_UTIL_H */
|