webkit
2cdf99a9e3038c7e01b3c37e8ad903ecbe5eecf1
https://github.com/WebKit/webkit
Source
ThirdParty
libwebrtc
Source
third_party
boringssl
src
decrepit
macros.h
Go to the documentation of this file.
1
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2
* All rights reserved.
3
*
4
* This package is an SSL implementation written
5
* by Eric Young (eay@cryptsoft.com).
6
* The implementation was written so as to conform with Netscapes SSL.
7
*
8
* This library is free for commercial and non-commercial use as long as
9
* the following conditions are aheared to. The following conditions
10
* apply to all code found in this distribution, be it the RC4, RSA,
11
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
12
* included with this distribution is covered by the same copyright terms
13
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
14
*
15
* Copyright remains Eric Young's, and as such any Copyright notices in
16
* the code are not to be removed.
17
* If this package is used in a product, Eric Young should be given attribution
18
* as the author of the parts of the library used.
19
* This can be in the form of a textual message at program startup or
20
* in documentation (online or textual) provided with the package.
21
*
22
* Redistribution and use in source and binary forms, with or without
23
* modification, are permitted provided that the following conditions
24
* are met:
25
* 1. Redistributions of source code must retain the copyright
26
* notice, this list of conditions and the following disclaimer.
27
* 2. Redistributions in binary form must reproduce the above copyright
28
* notice, this list of conditions and the following disclaimer in the
29
* documentation and/or other materials provided with the distribution.
30
* 3. All advertising materials mentioning features or use of this software
31
* must display the following acknowledgement:
32
* "This product includes cryptographic software written by
33
* Eric Young (eay@cryptsoft.com)"
34
* The word 'cryptographic' can be left out if the rouines from the library
35
* being used are not cryptographic related :-).
36
* 4. If you include any Windows specific code (or a derivative thereof) from
37
* the apps directory (application code) you must include an acknowledgement:
38
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39
*
40
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50
* SUCH DAMAGE.
51
*
52
* The licence and distribution terms for any publically available version or
53
* derivative of this code cannot be changed. i.e. this code cannot simply be
54
* copied and put under another distribution licence
55
* [including the GNU Public Licence.] */
56
57
#ifndef OPENSSL_HEADER_DECREPIT_MACROS_H
58
#define OPENSSL_HEADER_DECREPIT_MACROS_H
59
60
61
/* NOTE - c is not incremented as per n2l */
62
#define n2ln(c, l1, l2, n) \
63
{ \
64
c += n; \
65
l1 = l2 = 0; \
66
switch (n) { \
67
case 8: \
68
l2 = ((unsigned long)(*(--(c)))); \
69
case 7: \
70
l2 |= ((unsigned long)(*(--(c)))) << 8; \
71
case 6: \
72
l2 |= ((unsigned long)(*(--(c)))) << 16; \
73
case 5: \
74
l2 |= ((unsigned long)(*(--(c)))) << 24; \
75
case 4: \
76
l1 = ((unsigned long)(*(--(c)))); \
77
case 3: \
78
l1 |= ((unsigned long)(*(--(c)))) << 8; \
79
case 2: \
80
l1 |= ((unsigned long)(*(--(c)))) << 16; \
81
case 1: \
82
l1 |= ((unsigned long)(*(--(c)))) << 24; \
83
} \
84
}
85
86
/* NOTE - c is not incremented as per l2n */
87
#define l2nn(l1, l2, c, n) \
88
{ \
89
c += n; \
90
switch (n) { \
91
case 8: \
92
*(--(c)) = (unsigned char)(((l2)) & 0xff); \
93
case 7: \
94
*(--(c)) = (unsigned char)(((l2) >> 8) & 0xff); \
95
case 6: \
96
*(--(c)) = (unsigned char)(((l2) >> 16) & 0xff); \
97
case 5: \
98
*(--(c)) = (unsigned char)(((l2) >> 24) & 0xff); \
99
case 4: \
100
*(--(c)) = (unsigned char)(((l1)) & 0xff); \
101
case 3: \
102
*(--(c)) = (unsigned char)(((l1) >> 8) & 0xff); \
103
case 2: \
104
*(--(c)) = (unsigned char)(((l1) >> 16) & 0xff); \
105
case 1: \
106
*(--(c)) = (unsigned char)(((l1) >> 24) & 0xff); \
107
} \
108
}
109
110
#define l2n(l, c) \
111
(*((c)++) = (unsigned char)(((l) >> 24L) & 0xff), \
112
*((c)++) = (unsigned char)(((l) >> 16L) & 0xff), \
113
*((c)++) = (unsigned char)(((l) >> 8L) & 0xff), \
114
*((c)++) = (unsigned char)(((l)) & 0xff))
115
116
#define n2l(c, l) \
117
(l = ((unsigned long)(*((c)++))) << 24L, \
118
l |= ((unsigned long)(*((c)++))) << 16L, \
119
l |= ((unsigned long)(*((c)++))) << 8L, \
120
l |= ((unsigned long)(*((c)++))))
121
122
123
#endif
/* OPENSSL_HEADER_DECREPIT_MACROS_H */
Generated by
1.8.13