webkit  2cdf99a9e3038c7e01b3c37e8ad903ecbe5eecf1
https://github.com/WebKit/webkit
macros.h
Go to the documentation of this file.
1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young (eay@cryptsoft.com).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to. The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  * notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  * notice, this list of conditions and the following disclaimer in the
29  * documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  * must display the following acknowledgement:
32  * "This product includes cryptographic software written by
33  * Eric Young (eay@cryptsoft.com)"
34  * The word 'cryptographic' can be left out if the rouines from the library
35  * being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  * the apps directory (application code) you must include an acknowledgement:
38  * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed. i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.] */
56 
57 #ifndef OPENSSL_HEADER_DECREPIT_MACROS_H
58 #define OPENSSL_HEADER_DECREPIT_MACROS_H
59 
60 
61 /* NOTE - c is not incremented as per n2l */
62 #define n2ln(c, l1, l2, n) \
63  { \
64  c += n; \
65  l1 = l2 = 0; \
66  switch (n) { \
67  case 8: \
68  l2 = ((unsigned long)(*(--(c)))); \
69  case 7: \
70  l2 |= ((unsigned long)(*(--(c)))) << 8; \
71  case 6: \
72  l2 |= ((unsigned long)(*(--(c)))) << 16; \
73  case 5: \
74  l2 |= ((unsigned long)(*(--(c)))) << 24; \
75  case 4: \
76  l1 = ((unsigned long)(*(--(c)))); \
77  case 3: \
78  l1 |= ((unsigned long)(*(--(c)))) << 8; \
79  case 2: \
80  l1 |= ((unsigned long)(*(--(c)))) << 16; \
81  case 1: \
82  l1 |= ((unsigned long)(*(--(c)))) << 24; \
83  } \
84  }
85 
86 /* NOTE - c is not incremented as per l2n */
87 #define l2nn(l1, l2, c, n) \
88  { \
89  c += n; \
90  switch (n) { \
91  case 8: \
92  *(--(c)) = (unsigned char)(((l2)) & 0xff); \
93  case 7: \
94  *(--(c)) = (unsigned char)(((l2) >> 8) & 0xff); \
95  case 6: \
96  *(--(c)) = (unsigned char)(((l2) >> 16) & 0xff); \
97  case 5: \
98  *(--(c)) = (unsigned char)(((l2) >> 24) & 0xff); \
99  case 4: \
100  *(--(c)) = (unsigned char)(((l1)) & 0xff); \
101  case 3: \
102  *(--(c)) = (unsigned char)(((l1) >> 8) & 0xff); \
103  case 2: \
104  *(--(c)) = (unsigned char)(((l1) >> 16) & 0xff); \
105  case 1: \
106  *(--(c)) = (unsigned char)(((l1) >> 24) & 0xff); \
107  } \
108  }
109 
110 #define l2n(l, c) \
111  (*((c)++) = (unsigned char)(((l) >> 24L) & 0xff), \
112  *((c)++) = (unsigned char)(((l) >> 16L) & 0xff), \
113  *((c)++) = (unsigned char)(((l) >> 8L) & 0xff), \
114  *((c)++) = (unsigned char)(((l)) & 0xff))
115 
116 #define n2l(c, l) \
117  (l = ((unsigned long)(*((c)++))) << 24L, \
118  l |= ((unsigned long)(*((c)++))) << 16L, \
119  l |= ((unsigned long)(*((c)++))) << 8L, \
120  l |= ((unsigned long)(*((c)++))))
121 
122 
123 #endif /* OPENSSL_HEADER_DECREPIT_MACROS_H */