diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-13 21:12:02 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-13 21:12:02 +0000 |
commit | 77e50caaf2ef81cd91075cf836fed0e75718ffb4 (patch) | |
tree | 53b7b411290b63192fc9e924a3b6b65cdf67e9d0 /debian/vendor-h2o/deps/mruby-digest | |
parent | Adding upstream version 1.8.3. (diff) | |
download | dnsdist-77e50caaf2ef81cd91075cf836fed0e75718ffb4.tar.xz dnsdist-77e50caaf2ef81cd91075cf836fed0e75718ffb4.zip |
Adding debian version 1.8.3-2.debian/1.8.3-2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/vendor-h2o/deps/mruby-digest')
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/.travis.yml | 2 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/Makefile | 14 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/README.md | 55 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/mrbgem.rake | 4 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/mrblib/digest.rb | 46 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/run_test.rb | 28 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/src/digest.c | 1007 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/src/picohash.h | 751 | ||||
-rw-r--r-- | debian/vendor-h2o/deps/mruby-digest/test/digest.rb | 203 |
9 files changed, 2110 insertions, 0 deletions
diff --git a/debian/vendor-h2o/deps/mruby-digest/.travis.yml b/debian/vendor-h2o/deps/mruby-digest/.travis.yml new file mode 100644 index 0000000..ffe2272 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/.travis.yml @@ -0,0 +1,2 @@ +script: + - "ruby run_test.rb all test" diff --git a/debian/vendor-h2o/deps/mruby-digest/Makefile b/debian/vendor-h2o/deps/mruby-digest/Makefile new file mode 100644 index 0000000..21f8afe --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/Makefile @@ -0,0 +1,14 @@ +GEM := mruby-digest + +include $(MAKEFILE_4_GEM) + +GEM_C_FILES := $(wildcard $(SRC_DIR)/*.c) +GEM_OBJECTS := $(patsubst %.c, %.o, $(GEM_C_FILES)) + +GEM_RB_FILES := $(wildcard $(MRB_DIR)/*.rb) + +gem-all : $(GEM_OBJECTS) gem-c-and-rb-files + +gem-clean : gem-clean-c-and-rb-files + +gem-test : gem-test-c-and-rb-files diff --git a/debian/vendor-h2o/deps/mruby-digest/README.md b/debian/vendor-h2o/deps/mruby-digest/README.md new file mode 100644 index 0000000..2ae6552 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/README.md @@ -0,0 +1,55 @@ +mruby-digest +========= + +This library is a fork of [github.com/iij/mruby-digest](https://github.com/iij/mruby-digest). +Unlike the original, this fork does not have any dependencies; it uses [picohash](https://github.com/kazuho/picohash) - a public domain library for hash calculation. + +## Features + +Message Digest and HMAC classes are available. They are compatible with CRuby's ones. + +- Digest::MD5, Digest::RMD160, Digest::SHA1, Digest::SHA256, Digest::SHA384 and + Digest::SHA512 + - Note: some of them are not available if libcrypto.a does not support them on your system. +- Digest::HMAC + +## Install + - add conf.gem line to `build_config.rb` + +```ruby +MRuby::Build.new do |conf| + + # ... (snip) ... + + conf.gem :git => 'https://github.com/iij/mruby-digest.git' +end +``` + +## Usage +```ruby +Digest::MD5.digest('ruby') +Digest::MD5.hexdigest('ruby') +``` + +## License + +Copyright (c) 2012-2015 Internet Initiative Japan Inc., Kazuho Oku + +Permission is hereby granted, free of charge, to any person obtaining a +copy of this software and associated documentation files (the "Software"), +to deal in the Software without restriction, including without limitation +the rights to use, copy, modify, merge, publish, distribute, sublicense, +and/or sell copies of the Software, and to permit persons to whom the +Software is furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING +FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER +DEALINGS IN THE SOFTWARE. + diff --git a/debian/vendor-h2o/deps/mruby-digest/mrbgem.rake b/debian/vendor-h2o/deps/mruby-digest/mrbgem.rake new file mode 100644 index 0000000..9324f16 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/mrbgem.rake @@ -0,0 +1,4 @@ +MRuby::Gem::Specification.new('mruby-digest') do |spec| + spec.license = 'MIT' + spec.authors = 'Internet Initiative Japan Inc.' +end diff --git a/debian/vendor-h2o/deps/mruby-digest/mrblib/digest.rb b/debian/vendor-h2o/deps/mruby-digest/mrblib/digest.rb new file mode 100644 index 0000000..7779f54 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/mrblib/digest.rb @@ -0,0 +1,46 @@ +if Object.const_defined? :Digest +module Digest + class Base + def self.digest(data) + self.new.update(data).digest + end + def self.file(path) + self.new.update(File.open(path).read) + end + def self.hexdigest(data) + self.new.update(data).hexdigest + end + def ==(other) + if other.kind_of? String + self.hexdigest == other + else + self.digest == other.digest + end + end + def file(path) + self.update(File.open(path).read) + end + def hexdigest! + x = self.hexdigest + self.reset + x + end + + alias length digest_length + alias size digest_length + alias to_s hexdigest + alias << update + end + + class HMAC + def self.digest(data, key, digest) + self.new(key, digest).update(data).digest + end + def self.hexdigest(data, key, digest) + self.new(key, digest).update(data).hexdigest + end + + alias << update + end +end +end diff --git a/debian/vendor-h2o/deps/mruby-digest/run_test.rb b/debian/vendor-h2o/deps/mruby-digest/run_test.rb new file mode 100644 index 0000000..3401ed8 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/run_test.rb @@ -0,0 +1,28 @@ +#!/usr/bin/env ruby +# +# mrbgems test runner +# + +gemname = File.basename(File.dirname(File.expand_path __FILE__)) + +if __FILE__ == $0 + repository, dir = 'https://github.com/mruby/mruby.git', 'tmp/mruby' + build_args = ARGV + build_args = ['all', 'test'] if build_args.nil? or build_args.empty? + + Dir.mkdir 'tmp' unless File.exist?('tmp') + unless File.exist?(dir) + system "git clone #{repository} #{dir}" + end + + exit system(%Q[cd #{dir}; MRUBY_CONFIG=#{File.expand_path __FILE__} ruby minirake #{build_args.join(' ')}]) +end + +MRuby::Build.new do |conf| + toolchain :gcc + enable_debug + enable_test + conf.gembox 'default' + + conf.gem File.expand_path(File.dirname(__FILE__)) +end diff --git a/debian/vendor-h2o/deps/mruby-digest/src/digest.c b/debian/vendor-h2o/deps/mruby-digest/src/digest.c new file mode 100644 index 0000000..634376d --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/src/digest.c @@ -0,0 +1,1007 @@ +/* +** digest.c - Digest and subclasses +** +** See Copyright Notice in mruby.h +*/ + +#include "mruby.h" + +#define USE_DIGEST_PICOHASH + +#if !defined(USE_DIGEST_PICOHASH) +#elif defined(__APPLE__) +#define USE_DIGEST_OSX_COMMONCRYPTO +#else +#define USE_DIGEST_OPENSSL +#endif + +#if defined(USE_DIGEST_PICOHASH) +#include "picohash.h" +#elif defined(USE_DIGEST_OPENSSL) +#include <openssl/evp.h> +#include <openssl/hmac.h> +#include <openssl/sha.h> +#elif defined(USE_DIGEST_OSX_COMMONCRYPTO) +#include <CommonCrypto/CommonDigest.h> +#include <CommonCrypto/CommonHMAC.h> +#else +#error "define USE_DIGEST_PICOHASH or USE_DIGEST_OPENSSL or USE_DIGEST_OSX_COMMONCRYPTO" +#endif +#include <limits.h> +#include <stdio.h> +#include <string.h> +#include "mruby/array.h" +#include "mruby/class.h" +#include "mruby/data.h" +#include "mruby/string.h" +#include "mruby/variable.h" + +#define TYPESYM "__type__" + + +/* + * library-independent layer API + */ +enum { + MD_TYPE_MD5, + MD_TYPE_RMD160, + MD_TYPE_SHA1, + MD_TYPE_SHA256, + MD_TYPE_SHA384, + MD_TYPE_SHA512, +}; + +struct mrb_md; +struct mrb_hmac; + +static void lib_init(void); +static int lib_md_block_length(const struct mrb_md *); +static mrb_value lib_md_digest(mrb_state *, const struct mrb_md *); +static mrb_value lib_md_digest_bang(mrb_state *, struct mrb_md *); +static int lib_md_digest_length(const struct mrb_md *); +static void lib_md_free(mrb_state *, void *); +static void lib_md_init(mrb_state *, struct mrb_md *, int); +static void lib_md_init_copy(mrb_state *, struct mrb_md *, struct mrb_md *); +static void lib_md_reset(mrb_state *, struct mrb_md *); +static void lib_md_update(mrb_state *, struct mrb_md *, unsigned char *, mrb_int); + +static mrb_value lib_hmac_digest(mrb_state *, const struct mrb_hmac *); +static int lib_hmac_block_length(const struct mrb_hmac *); +static int lib_hmac_digest_length(const struct mrb_hmac *); +static void lib_hmac_free(mrb_state *, void *); +static void lib_hmac_init(mrb_state *, struct mrb_hmac *, int, const unsigned char *, mrb_int); +static void lib_hmac_update(mrb_state *, struct mrb_hmac *, unsigned char *, mrb_int); + + +#if defined(USE_DIGEST_PICOHASH) + +#define HAVE_MD5 +#define HAVE_SHA1 + +struct mrb_md { + picohash_ctx_t ctx; +}; + +struct mrb_hmac { + picohash_ctx_t ctx; +}; + +static void +lib_md_free(mrb_state *mrb, void *ptr) +{ + struct mrb_md *md = ptr; + if (md != NULL) + mrb_free(mrb, md); +} + +static void +lib_hmac_free(mrb_state *mrb, void *ptr) +{ + struct mrb_hmac *hmac = ptr; + if (hmac != NULL) + mrb_free(mrb, hmac); +} + +static struct mrb_data_type mrb_md_type = { "MD", lib_md_free }; +static struct mrb_data_type mrb_hmac_type = { "HMAC", lib_hmac_free }; + +static void +lib_init(void) +{ +} + +static int +lib_md_block_length(const struct mrb_md *md) +{ + return (int)md->ctx.block_length; +} + +static mrb_value +lib_md_digest(mrb_state *mrb, const struct mrb_md *md) +{ + picohash_ctx_t ctx; + unsigned char mdstr[PICOHASH_MAX_DIGEST_LENGTH]; + + ctx = md->ctx; + picohash_final(&ctx, mdstr); + return mrb_str_new(mrb, (char *)mdstr, ctx.digest_length); +} + +static mrb_value +lib_md_digest_bang(mrb_state *mrb, struct mrb_md *md) +{ + unsigned char mdstr[PICOHASH_MAX_DIGEST_LENGTH]; + + picohash_final(&md->ctx, mdstr); + picohash_reset(&md->ctx); + return mrb_str_new(mrb, (char *)mdstr, md->ctx.digest_length); +} + +static int +lib_md_digest_length(const struct mrb_md *md) +{ + return md->ctx.digest_length; +} + +static void (*md_type_md(int type))(picohash_ctx_t *) +{ + switch (type) { + case MD_TYPE_MD5: return picohash_init_md5; + case MD_TYPE_SHA1: return picohash_init_sha1; + default: return NULL; + } +} + +static void +lib_md_init(mrb_state *mrb, struct mrb_md *md, int type) +{ + void (*ctor)(picohash_ctx_t *) = md_type_md(type); + if (ctor == NULL) + mrb_raise(mrb, E_NOTIMP_ERROR, "not supported"); + ctor(&md->ctx); +} + +static void +lib_md_init_copy(mrb_state *mrb, struct mrb_md *mdnew, struct mrb_md *mdold) +{ + mdnew->ctx = mdold->ctx; + picohash_reset(&mdnew->ctx); +} + +static void +lib_md_reset(mrb_state *mrb, struct mrb_md *md) +{ + picohash_reset(&md->ctx); +} + +static void +lib_md_update(mrb_state *mrb, struct mrb_md *md, unsigned char *str, mrb_int len) +{ +#if MRB_INT_MAX > SIZE_MAX + if (len > SIZE_MAX) + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string (not supported yet)"); +#endif + picohash_update(&md->ctx, str, len); +} + +static mrb_value +lib_hmac_digest(mrb_state *mrb, const struct mrb_hmac *hmac) +{ + picohash_ctx_t ctx; + unsigned char mdstr[PICOHASH_MAX_DIGEST_LENGTH]; + + ctx = hmac->ctx; + picohash_final(&ctx, mdstr); + return mrb_str_new(mrb, (char *)mdstr, ctx.digest_length); +} + +static int +lib_hmac_block_length(const struct mrb_hmac *hmac) +{ + return hmac->ctx.block_length; +} + +static int +lib_hmac_digest_length(const struct mrb_hmac *hmac) +{ + return hmac->ctx.digest_length; +} + +static void +lib_hmac_init(mrb_state *mrb, struct mrb_hmac *hmac, int type, const unsigned char *key, mrb_int keylen) +{ + void (*ctor)(picohash_ctx_t *) = md_type_md(type); + +#if MRB_INT_MAX > SIZE_MAX + if (keylen > SIZE_MAX) + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long key"); +#endif + if (ctor == NULL) + mrb_raise(mrb, E_NOTIMP_ERROR, "not supported"); + picohash_init_hmac(&hmac->ctx, ctor, key, keylen); +} + +static void +lib_hmac_update(mrb_state *mrb, struct mrb_hmac *hmac, unsigned char *data, mrb_int len) +{ +#if MRB_INT_MAX > SIZE_MAX + if (len > SIZE_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string (not supported yet)"); + } +#endif + picohash_update(&hmac->ctx, data, len); +} + +#elif defined(USE_DIGEST_OPENSSL) +/* + * OpenSSL Implementation + */ + +#define HAVE_MD5 + +#ifndef OPENSSL_NO_RIPEMD +#define HAVE_RMD160 +#endif + +#define HAVE_SHA1 +#ifdef SHA256_DIGEST_LENGTH +#define HAVE_SHA256 +#endif +#ifdef SHA512_DIGEST_LENGTH +#define HAVE_SHA384 +#define HAVE_SHA512 +#endif + +struct mrb_md { + EVP_MD_CTX *ctx; +}; + +struct mrb_hmac { + HMAC_CTX ctx; + const EVP_MD *md; +}; + +static void +lib_md_free(mrb_state *mrb, void *ptr) +{ + struct mrb_md *md = ptr; + + if (md != NULL) { + if (md->ctx != NULL) { + EVP_MD_CTX_destroy(md->ctx); + } + mrb_free(mrb, md); + } +} + +static void +lib_hmac_free(mrb_state *mrb, void *ptr) +{ + struct mrb_hmac *hmac = ptr; + + if (hmac != NULL) { + HMAC_CTX_cleanup(&hmac->ctx); + mrb_free(mrb, hmac); + } +} + +static struct mrb_data_type mrb_md_type = { "MD", lib_md_free }; +static struct mrb_data_type mrb_hmac_type = { "HMAC", lib_hmac_free }; + +static void +lib_init(void) +{ + OpenSSL_add_all_digests(); +} + +static int +lib_md_block_length(const struct mrb_md *md) +{ + return EVP_MD_CTX_block_size(md->ctx); +} + +static mrb_value +lib_md_digest(mrb_state *mrb, const struct mrb_md *md) +{ + EVP_MD_CTX ctx; + unsigned int mdlen; + unsigned char mdstr[EVP_MAX_MD_SIZE]; + + EVP_MD_CTX_copy(&ctx, md->ctx); + EVP_DigestFinal(&ctx, mdstr, &mdlen); + return mrb_str_new(mrb, (char *)mdstr, mdlen); +} + +static mrb_value +lib_md_digest_bang(mrb_state *mrb, struct mrb_md *md) +{ + unsigned int mdlen; + unsigned char mdstr[EVP_MAX_MD_SIZE]; + + EVP_DigestFinal_ex(md->ctx, mdstr, &mdlen); + EVP_DigestInit_ex(md->ctx, EVP_MD_CTX_md(md->ctx), NULL); + return mrb_str_new(mrb, (char *)mdstr, mdlen); +} + +static int +lib_md_digest_length(const struct mrb_md *md) +{ + return EVP_MD_CTX_size(md->ctx); +} + +const EVP_MD * +md_type_md(int type) +{ + switch (type) { + case MD_TYPE_MD5: return EVP_md5(); +#ifdef HAVE_RMD160 + case MD_TYPE_RMD160: return EVP_ripemd160(); +#endif + case MD_TYPE_SHA1: return EVP_sha1(); +#ifdef HAVE_SHA256 + case MD_TYPE_SHA256: return EVP_sha256(); +#endif +#ifdef HAVE_SHA512 + case MD_TYPE_SHA384: return EVP_sha384(); + case MD_TYPE_SHA512: return EVP_sha512(); +#endif + default: return NULL; + } +} + +static void +lib_md_init(mrb_state *mrb, struct mrb_md *md, int type) +{ + const EVP_MD *evpmd; + + md->ctx = NULL; + evpmd = md_type_md(type); + if (!evpmd) { + mrb_raise(mrb, E_NOTIMP_ERROR, "not supported"); + } + md->ctx = EVP_MD_CTX_create(); + EVP_DigestInit_ex(md->ctx, evpmd, NULL); +} + +static void +lib_md_init_copy(mrb_state *mrb, struct mrb_md *mdnew, struct mrb_md *mdold) +{ + mdnew->ctx = EVP_MD_CTX_create(); + EVP_DigestInit_ex(mdnew->ctx, EVP_MD_CTX_md(mdold->ctx), NULL); +} + +static void +lib_md_reset(mrb_state *mrb, struct mrb_md *md) +{ + //EVP_MD_CTX_init(&md->ctx); + EVP_DigestInit_ex(md->ctx, EVP_MD_CTX_md(md->ctx), NULL); +} + +static void +lib_md_update(mrb_state *mrb, struct mrb_md *md, unsigned char *str, mrb_int len) +{ +#if MRB_INT_MAX > SIZE_MAX + if (len > SIZE_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string (not supported yet)"); + } +#endif + EVP_DigestUpdate(md->ctx, str, len); +} + +static mrb_value +lib_hmac_digest(mrb_state *mrb, const struct mrb_hmac *hmac) +{ + HMAC_CTX ctx; + unsigned int mdlen; + unsigned char mdstr[EVP_MAX_MD_SIZE]; + + memcpy(&ctx, &hmac->ctx, sizeof(ctx)); + HMAC_Final(&ctx, mdstr, &mdlen); + return mrb_str_new(mrb, (char *)mdstr, mdlen); +} + +static int +lib_hmac_block_length(const struct mrb_hmac *hmac) +{ + return EVP_MD_block_size(hmac->md); +} + +static int +lib_hmac_digest_length(const struct mrb_hmac *hmac) +{ + return EVP_MD_size(hmac->md); +} + +static void +lib_hmac_init(mrb_state *mrb, struct mrb_hmac *hmac, int type, const unsigned char *key, mrb_int keylen) +{ +#if MRB_INT_MAX > INT_MAX + if (keylen > INT_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long key"); + } +#endif + hmac->md = md_type_md(type); + HMAC_CTX_init(&hmac->ctx); + HMAC_Init_ex(&hmac->ctx, key, keylen, hmac->md, NULL); +} + +static void +lib_hmac_update(mrb_state *mrb, struct mrb_hmac *hmac, unsigned char *data, mrb_int len) +{ +#if MRB_INT_MAX > INT_MAX + if (len > INT_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string (not supported yet)"); + } +#endif + HMAC_Update(&hmac->ctx, data, len); +} + +#elif defined(USE_DIGEST_OSX_COMMONCRYPTO) +/* + * Mac OS X CommonCrypto Implementation + */ + +#define HAVE_MD5 +/* #define HAVE_RMD160 */ +#define HAVE_SHA1 +#define HAVE_SHA256 +#define HAVE_SHA384 +#define HAVE_SHA512 + +struct mrb_md { + int type; + void *ctx; + int ctx_size; +}; + +struct mrb_hmac { + int type; + CCHmacContext ctx; +}; + +static int +md_ctx_size(int type) +{ + switch (type) { + case MD_TYPE_MD5: return sizeof(CC_MD5_CTX); + case MD_TYPE_SHA1: return sizeof(CC_SHA1_CTX); + case MD_TYPE_SHA256: return sizeof(CC_SHA256_CTX); + case MD_TYPE_SHA384: return sizeof(CC_SHA512_CTX); /* ! */ + case MD_TYPE_SHA512: return sizeof(CC_SHA512_CTX); + default: return 0; + } +} + +static void +lib_md_free(mrb_state *mrb, void *ptr) +{ + struct mrb_md *md = ptr; + + memset(md->ctx, 0, md_ctx_size(md->type)); + mrb_free(mrb, md->ctx); + mrb_free(mrb, md); +} + +static void +lib_hmac_free(mrb_state *mrb, void *ptr) +{ + struct mrb_hmac *hmac = ptr; + + memset(&hmac->ctx, 0, sizeof(hmac->ctx)); + mrb_free(mrb, hmac); +} + +static struct mrb_data_type mrb_md_type = { "MD", lib_md_free }; +static struct mrb_data_type mrb_hmac_type = { "HMAC", lib_hmac_free }; + +#define MAX_DIGEST_LENGTH CC_SHA512_DIGEST_LENGTH + +union ctx_union { + CC_MD5_CTX md5; + CC_SHA1_CTX sha1; + CC_SHA256_CTX sha256; + /* we don't have CC_SHA384_CTX! */ + CC_SHA512_CTX sha512; +}; + +static void +lib_init(void) +{ +} + +static int +md_block_length(int type) +{ + switch (type) { + case MD_TYPE_MD5: return CC_MD5_BLOCK_BYTES; + case MD_TYPE_SHA1: return CC_SHA1_BLOCK_BYTES; + case MD_TYPE_SHA256: return CC_SHA256_BLOCK_BYTES; + case MD_TYPE_SHA384: return CC_SHA384_BLOCK_BYTES; + case MD_TYPE_SHA512: return CC_SHA512_BLOCK_BYTES; + default: return 0; + } +} + +static int +lib_md_block_length(const struct mrb_md *md) +{ + return md_block_length(md->type); +} + +static void +md_init(int type, void *ctxp) +{ + switch (type) { + case MD_TYPE_MD5: CC_MD5_Init(ctxp); break; + case MD_TYPE_SHA1: CC_SHA1_Init(ctxp); break; + case MD_TYPE_SHA256: CC_SHA256_Init(ctxp); break; + case MD_TYPE_SHA384: CC_SHA384_Init(ctxp); break; + case MD_TYPE_SHA512: CC_SHA512_Init(ctxp); break; + default: break; + } +} + +static void +md_final(int type, unsigned char *str, void *ctx) +{ + switch (type) { + case MD_TYPE_MD5: CC_MD5_Final(str, ctx); break; + case MD_TYPE_SHA1: CC_SHA1_Final(str, ctx); break; + case MD_TYPE_SHA256: CC_SHA256_Final(str, ctx); break; + case MD_TYPE_SHA384: CC_SHA384_Final(str, ctx); break; + case MD_TYPE_SHA512: CC_SHA512_Final(str, ctx); break; + default: break; + } +} + +static int +md_digest_length(int type) +{ + switch (type) { + case MD_TYPE_MD5: return 16; + case MD_TYPE_SHA1: return 20; + case MD_TYPE_SHA256: return 32; + case MD_TYPE_SHA384: return 48; + case MD_TYPE_SHA512: return 64; + default: return 0; + } +} + +static mrb_value +lib_md_digest(mrb_state *mrb, const struct mrb_md *md) +{ + union ctx_union ctx; + unsigned char mdstr[MAX_DIGEST_LENGTH]; + + memcpy(&ctx, md->ctx, md_ctx_size(md->type)); + md_final(md->type, mdstr, &ctx); + return mrb_str_new(mrb, (char *)mdstr, md_digest_length(md->type)); +} + +static mrb_value +lib_md_digest_bang(mrb_state *mrb, struct mrb_md *md) +{ + unsigned char mdstr[MAX_DIGEST_LENGTH]; + + md_final(md->type, mdstr, md->ctx); + md_init(md->type, md->ctx); + return mrb_str_new(mrb, (char *)mdstr, md_digest_length(md->type)); +} + +static int +lib_md_digest_length(const struct mrb_md *md) +{ + return md_digest_length(md->type); +} + +static void +lib_md_init(mrb_state *mrb, struct mrb_md *md, int type) +{ + int ctxsize; + + ctxsize = md_ctx_size(type); + if (ctxsize == 0) { + mrb_raise(mrb, E_NOTIMP_ERROR, "not supported"); + } + md->type = type; + md->ctx = NULL; + md->ctx = mrb_malloc(mrb, ctxsize); + md_init(type, md->ctx); +} + +static void +lib_md_init_copy(mrb_state *mrb, struct mrb_md *mdnew, struct mrb_md *mdold) +{ + lib_md_init(mrb, mdnew, mdold->type); +} + +static void +lib_md_reset(mrb_state *mrb, struct mrb_md *md) +{ + md_init(md->type, md->ctx); +} + +static void +lib_md_update(mrb_state *mrb, struct mrb_md *md, unsigned char *data, mrb_int len) +{ + if (sizeof(len) > sizeof(CC_LONG)) { + if (len != (CC_LONG)len) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string (not supported yet)"); + } + } + switch (md->type) { + case MD_TYPE_MD5: CC_MD5_Update(md->ctx, data, len); break; + case MD_TYPE_SHA1: CC_SHA1_Update(md->ctx, data, len); break; + case MD_TYPE_SHA256: CC_SHA256_Update(md->ctx, data, len); break; + case MD_TYPE_SHA384: CC_SHA384_Update(md->ctx, data, len); break; + case MD_TYPE_SHA512: CC_SHA512_Update(md->ctx, data, len); break; + default: break; + } +} + +static int +lib_hmac_block_length(const struct mrb_hmac *hmac) +{ + return md_block_length(hmac->type); +} + +static mrb_value +lib_hmac_digest(mrb_state *mrb, const struct mrb_hmac *hmac) +{ + CCHmacContext ctx; + unsigned char str[MAX_DIGEST_LENGTH]; + + memcpy(&ctx, &hmac->ctx, sizeof(ctx)); + CCHmacFinal(&ctx, str); + return mrb_str_new(mrb, (const char *)str, md_digest_length(hmac->type)); +} + +static int +lib_hmac_digest_length(const struct mrb_hmac *hmac) +{ + return md_digest_length(hmac->type); +} + +static void +lib_hmac_init(mrb_state *mrb, struct mrb_hmac *hmac, int type, const unsigned char *key, mrb_int keylen) +{ + CCHmacAlgorithm algorithm; + +#if MRB_INT_MAX > SIZE_MAX + if (len > SIZE_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long key"); + } +#endif + switch (type) { + case MD_TYPE_MD5: algorithm = kCCHmacAlgMD5; break; + case MD_TYPE_SHA1: algorithm = kCCHmacAlgSHA1; break; + case MD_TYPE_SHA256: algorithm = kCCHmacAlgSHA256; break; + case MD_TYPE_SHA384: algorithm = kCCHmacAlgSHA384; break; + case MD_TYPE_SHA512: algorithm = kCCHmacAlgSHA512; break; + default: + mrb_raisef(mrb, E_RUNTIME_ERROR, "mruby-digest: internal error: unexpected HMAC type: %S", mrb_fixnum_value(type)); + algorithm = 0; + break; + } + hmac->type = type; + CCHmacInit(&hmac->ctx, algorithm, key, keylen); +} + +static void +lib_hmac_update(mrb_state *mrb, struct mrb_hmac *hmac, unsigned char *data, mrb_int len) +{ +#if MRB_INT_MAX > SIZE_MAX + if (len > SIZE_MAX) { + mrb_raise(mrb, E_ARGUMENT_ERROR, "too long string"); + } +#endif + CCHmacUpdate(&hmac->ctx, data, len); +} + +#endif + +static void +basecheck(mrb_state *mrb, mrb_value self, struct mrb_md **mdp) +{ + struct RClass *c; + struct mrb_md *md; + mrb_value t; + + c = mrb_obj_class(mrb, self); + t = mrb_const_get(mrb, mrb_obj_value(c), mrb_intern_lit(mrb, TYPESYM)); + if (mrb_nil_p(t)) { + mrb_raise(mrb, E_NOTIMP_ERROR, "Digest::Base is an abstract class"); + } + md = (struct mrb_md *)DATA_PTR(self); + if (!md) { + mrb_raise(mrb, E_RUNTIME_ERROR, "no md found (BUG?)"); + } + if (mdp) *mdp = md; +} + +static mrb_value +mrb_digest_block_length(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + + basecheck(mrb, self, &md); + return mrb_fixnum_value(lib_md_block_length(md)); +} + +static mrb_value +mrb_digest_digest(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + + md = (struct mrb_md *)DATA_PTR(self); + if (!md) return mrb_nil_value(); + return lib_md_digest(mrb, md); +} + +static mrb_value +mrb_digest_digest_bang(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + + md = (struct mrb_md *)DATA_PTR(self); + if (!md) return mrb_nil_value(); + return lib_md_digest_bang(mrb, md); +} + +static mrb_value +mrb_digest_digest_length(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + + basecheck(mrb, self, &md); + return mrb_fixnum_value(lib_md_digest_length(md)); +} + +static mrb_value +digest2hexdigest(mrb_state *mrb, mrb_value b) +{ + mrb_value h; + int i, len; + char *bp, buf[3]; + + bp = RSTRING_PTR(b); + len = RSTRING_LEN(b); + h = mrb_str_buf_new(mrb, len * 2); + for (i = 0; i < len; i++) { + snprintf(buf, sizeof(buf), "%02x", (unsigned char )bp[i]); + mrb_str_buf_cat(mrb, h, buf, 2); + } + return h; +} + +static mrb_value +mrb_digest_hexdigest(mrb_state *mrb, mrb_value self) +{ + return digest2hexdigest(mrb, mrb_digest_digest(mrb, self)); +} + +static mrb_value +mrb_digest_init(mrb_state *mrb, mrb_value self) +{ + struct RClass *c; + struct mrb_md *md; + mrb_value t; + + md = (struct mrb_md *)DATA_PTR(self); + if (md) { + lib_md_free(mrb, md); + } + DATA_TYPE(self) = &mrb_md_type; + DATA_PTR(self) = NULL; + + c = mrb_obj_class(mrb, self); + if (!mrb_const_defined(mrb, mrb_obj_value(c), mrb_intern_lit(mrb, TYPESYM))) { + mrb_raise(mrb, E_NOTIMP_ERROR, "Digest::Base is an abstract class"); + } + t = mrb_const_get(mrb, mrb_obj_value(c), mrb_intern_lit(mrb, TYPESYM)); +#if 0 + if (lib_md_supported(t)) { + mrb_raise(mrb, E_NOTIMP_ERROR, "unknown algorithm"); + } +#endif + + md = (struct mrb_md *)mrb_malloc(mrb, sizeof(*md)); + DATA_PTR(self) = md; + lib_md_init(mrb, md, mrb_fixnum(t)); + return self; +} + +static mrb_value +mrb_digest_init_copy(mrb_state *mrb, mrb_value copy) +{ + struct mrb_md *m1, *m2; + mrb_value src; + + mrb_get_args(mrb, "o", &src); + if (mrb_obj_equal(mrb, copy, src)) return copy; + if (!mrb_obj_is_instance_of(mrb, src, mrb_obj_class(mrb, copy))) { + mrb_raise(mrb, E_TYPE_ERROR, "wrong argument class"); + } + if (!DATA_PTR(copy)) { + DATA_PTR(copy) = mrb_malloc(mrb, sizeof(struct mrb_md)); + DATA_TYPE(copy) = &mrb_md_type; + } + m1 = DATA_PTR(src); + m2 = DATA_PTR(copy); + lib_md_init_copy(mrb, m2, m1); + return copy; +} + +static mrb_value +mrb_digest_reset(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + + md = (struct mrb_md *)DATA_PTR(self); + if (!md) return mrb_nil_value(); + lib_md_reset(mrb, md); + return self; +} + +static mrb_value +mrb_digest_update(mrb_state *mrb, mrb_value self) +{ + struct mrb_md *md; + mrb_int len; + char *str; + + md = (struct mrb_md *)DATA_PTR(self); + if (!md) return mrb_nil_value(); + mrb_get_args(mrb, "s", &str, &len); + lib_md_update(mrb, md, (unsigned char *)str, len); + return self; +} + +static mrb_value +mrb_hmac_block_length(mrb_state *mrb, mrb_value self) +{ + struct mrb_hmac *hmac; + + hmac = (struct mrb_hmac *)DATA_PTR(self); + if (!hmac) return mrb_nil_value(); + return mrb_fixnum_value(lib_hmac_block_length(hmac)); +} + +static mrb_value +mrb_hmac_digest(mrb_state *mrb, mrb_value self) +{ + struct mrb_hmac *hmac; + + hmac = (struct mrb_hmac *)DATA_PTR(self); + if (!hmac) return mrb_nil_value(); + return lib_hmac_digest(mrb, hmac); +} + +static mrb_value +mrb_hmac_digest_length(mrb_state *mrb, mrb_value self) +{ + struct mrb_hmac *hmac; + + hmac = (struct mrb_hmac *)DATA_PTR(self); + if (!hmac) return mrb_nil_value(); + return mrb_fixnum_value(lib_hmac_digest_length(hmac)); +} + +static mrb_value +mrb_hmac_hexdigest(mrb_state *mrb, mrb_value self) +{ + return digest2hexdigest(mrb, mrb_hmac_digest(mrb, self)); +} + +static mrb_value +mrb_hmac_init(mrb_state *mrb, mrb_value self) +{ + struct mrb_hmac *hmac; + mrb_value digest, t; + mrb_int keylen; + char *key; + + hmac = (struct mrb_hmac *)DATA_PTR(self); + if (hmac) { + lib_hmac_free(mrb, hmac); + } + DATA_TYPE(self) = &mrb_hmac_type; + DATA_PTR(self) = NULL; + + mrb_get_args(mrb, "so", &key, &keylen, &digest); + t = mrb_const_get(mrb, digest, mrb_intern_lit(mrb, TYPESYM)); + if (mrb_nil_p(t)) { + mrb_raise(mrb, E_RUNTIME_ERROR, "not a digester"); + } + + hmac = (struct mrb_hmac *)mrb_malloc(mrb, sizeof(*hmac)); + DATA_PTR(self) = hmac; + lib_hmac_init(mrb, hmac, mrb_fixnum(t), (unsigned char *)key, keylen); + return self; +} + +static mrb_value +mrb_hmac_init_copy(mrb_state *mrb, mrb_value copy) +{ + mrb_raise(mrb, E_RUNTIME_ERROR, "cannot duplicate HMAC"); + return copy; +} + +static mrb_value +mrb_hmac_update(mrb_state *mrb, mrb_value self) +{ + struct mrb_hmac *hmac; + mrb_int len; + char *str; + + hmac = (struct mrb_hmac *)DATA_PTR(self); + if (!hmac) return mrb_nil_value(); + mrb_get_args(mrb, "s", &str, &len); + lib_hmac_update(mrb, hmac, (unsigned char *)str, len); + return self; +} + + +void +mrb_mruby_digest_gem_init(mrb_state *mrb) +{ + struct RClass *b, *d, *h; + + lib_init(); + + d = mrb_define_module(mrb, "Digest"); + + b = mrb_define_class_under(mrb, d, "Base", mrb->object_class); + mrb_define_method(mrb, b, "block_length", mrb_digest_block_length, MRB_ARGS_NONE()); + mrb_define_method(mrb, b, "digest", mrb_digest_digest, MRB_ARGS_NONE()); + mrb_define_method(mrb, b, "digest!", mrb_digest_digest_bang, MRB_ARGS_NONE()); /* XXX: can be defined in mrblib... */ + mrb_define_method(mrb, b, "digest_length", mrb_digest_digest_length, MRB_ARGS_NONE()); + //mrb_define_method(mrb, b, "file", mrb_digest_file, MRB_ARGS_REQ(1)); + mrb_define_method(mrb, b, "hexdigest", mrb_digest_hexdigest, MRB_ARGS_NONE()); + //mrb_define_method(mrb, b, "hexdigest!", mrb_digest_hexdigest_bang, MRB_ARGS_NONE()); /* XXX: can be defined in mrblib... */ + mrb_define_method(mrb, b, "initialize", mrb_digest_init, MRB_ARGS_NONE()); + mrb_define_method(mrb, b, "initialize_copy", mrb_digest_init_copy, MRB_ARGS_REQ(1)); + mrb_define_method(mrb, b, "reset", mrb_digest_reset, MRB_ARGS_NONE()); + mrb_define_method(mrb, b, "update", mrb_digest_update, MRB_ARGS_REQ(1)); + +#define DEFCLASS(n) \ +do { \ + struct RClass *a = mrb_define_class_under(mrb, d, #n, b); \ + MRB_SET_INSTANCE_TT(a, MRB_TT_DATA); \ + mrb_define_const(mrb, a, TYPESYM, mrb_fixnum_value(MD_TYPE_##n)); \ +} while (0) + +#ifdef HAVE_MD5 + DEFCLASS(MD5); +#endif +#ifdef HAVE_RMD160 + DEFCLASS(RMD160); +#endif +#ifdef HAVE_SHA1 + DEFCLASS(SHA1); +#endif +#ifdef HAVE_SHA256 + DEFCLASS(SHA256); +#endif +#ifdef HAVE_SHA384 + DEFCLASS(SHA384); +#endif +#ifdef HAVE_SHA512 + DEFCLASS(SHA512); +#endif + + h = mrb_define_class_under(mrb, d, "HMAC", mrb->object_class); + MRB_SET_INSTANCE_TT(h, MRB_TT_DATA); + mrb_define_method(mrb, h, "block_length", mrb_hmac_block_length, MRB_ARGS_NONE()); + mrb_define_method(mrb, h, "digest", mrb_hmac_digest, MRB_ARGS_NONE()); + mrb_define_method(mrb, h, "digest_length", mrb_hmac_digest_length, MRB_ARGS_NONE()); + mrb_define_method(mrb, h, "hexdigest", mrb_hmac_hexdigest, MRB_ARGS_NONE()); + mrb_define_method(mrb, h, "initialize", mrb_hmac_init, MRB_ARGS_REQ(2)); + mrb_define_method(mrb, h, "initialize_copy", mrb_hmac_init_copy, MRB_ARGS_REQ(1)); + mrb_define_method(mrb, h, "update", mrb_hmac_update, MRB_ARGS_REQ(1)); +} + +void +mrb_mruby_digest_gem_final(mrb_state *mrb) +{ +} diff --git a/debian/vendor-h2o/deps/mruby-digest/src/picohash.h b/debian/vendor-h2o/deps/mruby-digest/src/picohash.h new file mode 100644 index 0000000..4c0206d --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/src/picohash.h @@ -0,0 +1,751 @@ +/* + * The code is placed under public domain by Kazuho Oku <kazuhooku@gmail.com>. + * + * The MD5 implementation is based on a public domain implementation written by + * Solar Designer <solar@openwall.com> in 2001, which is used by Dovecot. + * + * The SHA1 implementation is based on a public domain implementation written + * by Wei Dai and other contributors for libcrypt, used also in liboauth. + * + * The SHA224/SHA256 implementation is based on a public domain implementation + * by Sam Hocevar <sam@hocevar.net> for LibTomCrypt. + */ +#ifndef _picohash_h_ +#define _picohash_h_ + +#include <assert.h> +#include <inttypes.h> +#include <string.h> + +#ifdef __BIG_ENDIAN__ +#define _PICOHASH_BIG_ENDIAN +#elif defined __LITTLE_ENDIAN__ +/* override */ +#elif defined __BYTE_ORDER +#if __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__ +#define _PICOHASH_BIG_ENDIAN +#endif +#else // ! defined __LITTLE_ENDIAN__ +#include <endian.h> // machine/endian.h +#if __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__ +#define _PICOHASH_BIG_ENDIAN +#endif +#endif + +#define PICOHASH_MD5_BLOCK_LENGTH 64 +#define PICOHASH_MD5_DIGEST_LENGTH 16 + +typedef struct { + uint_fast32_t lo, hi; + uint_fast32_t a, b, c, d; + unsigned char buffer[64]; + uint_fast32_t block[PICOHASH_MD5_DIGEST_LENGTH]; +} _picohash_md5_ctx_t; + +static void _picohash_md5_init(_picohash_md5_ctx_t *ctx); +static void _picohash_md5_update(_picohash_md5_ctx_t *ctx, const void *data, size_t size); +static void _picohash_md5_final(_picohash_md5_ctx_t *ctx, void *digest); + +#define PICOHASH_SHA1_BLOCK_LENGTH 64 +#define PICOHASH_SHA1_DIGEST_LENGTH 20 + +typedef struct { + uint32_t buffer[PICOHASH_SHA1_BLOCK_LENGTH / 4]; + uint32_t state[PICOHASH_SHA1_DIGEST_LENGTH / 4]; + uint64_t byteCount; + uint8_t bufferOffset; +} _picohash_sha1_ctx_t; + +static void _picohash_sha1_init(_picohash_sha1_ctx_t *ctx); +static void _picohash_sha1_update(_picohash_sha1_ctx_t *ctx, const void *input, size_t len); +static void _picohash_sha1_final(_picohash_sha1_ctx_t *ctx, void *digest); + +#define PICOHASH_SHA256_BLOCK_LENGTH 64 +#define PICOHASH_SHA256_DIGEST_LENGTH 32 +#define PICOHASH_SHA224_BLOCK_LENGTH PICOHASH_SHA256_BLOCK_LENGTH +#define PICOHASH_SHA224_DIGEST_LENGTH 28 + +typedef struct { + uint64_t length; + uint32_t state[PICOHASH_SHA256_DIGEST_LENGTH / 4]; + uint32_t curlen; + unsigned char buf[PICOHASH_SHA256_BLOCK_LENGTH]; +} _picohash_sha256_ctx_t; + +static void _picohash_sha256_init(_picohash_sha256_ctx_t *ctx); +static void _picohash_sha256_update(_picohash_sha256_ctx_t *ctx, const void *data, size_t len); +static void _picohash_sha256_final(_picohash_sha256_ctx_t *ctx, void *digest); +static void _picohash_sha224_init(_picohash_sha256_ctx_t *ctx); +static void _picohash_sha224_final(_picohash_sha256_ctx_t *ctx, void *digest); + +#define PICOHASH_MAX_BLOCK_LENGTH 64 +#define PICOHASH_MAX_DIGEST_LENGTH 32 + +typedef struct { + union { + _picohash_md5_ctx_t _md5; + _picohash_sha1_ctx_t _sha1; + _picohash_sha256_ctx_t _sha256; + }; + size_t block_length; + size_t digest_length; + void (*_reset)(void *ctx); + void (*_update)(void *ctx, const void *input, size_t len); + void (*_final)(void *ctx, void *digest); + struct { + unsigned char key[PICOHASH_MAX_BLOCK_LENGTH]; + void (*hash_reset)(void *ctx); + void (*hash_final)(void *ctx, void *digest); + } _hmac; +} picohash_ctx_t; + +static void picohash_init_md5(picohash_ctx_t *ctx); +static void picohash_init_sha1(picohash_ctx_t *ctx); +static void picohash_init_sha224(picohash_ctx_t *ctx); +static void picohash_init_sha256(picohash_ctx_t *ctx); +static void picohash_update(picohash_ctx_t *ctx, const void *input, size_t len); +static void picohash_final(picohash_ctx_t *ctx, void *digest); +static void picohash_reset(picohash_ctx_t *ctx); + +static void picohash_init_hmac(picohash_ctx_t *ctx, void (*initf)(picohash_ctx_t *), const void *key, size_t key_len); + +/* following are private definitions */ + +/* + * The basic MD5 functions. + * + * F is optimized compared to its RFC 1321 definition just like in Colin + * Plumb's implementation. + */ +#define _PICOHASH_MD5_F(x, y, z) ((z) ^ ((x) & ((y) ^ (z)))) +#define _PICOHASH_MD5_G(x, y, z) ((y) ^ ((z) & ((x) ^ (y)))) +#define _PICOHASH_MD5_H(x, y, z) ((x) ^ (y) ^ (z)) +#define _PICOHASH_MD5_I(x, y, z) ((y) ^ ((x) | ~(z))) + +/* + * The MD5 transformation for all four rounds. + */ +#define _PICOHASH_MD5_STEP(f, a, b, c, d, x, t, s) \ + (a) += f((b), (c), (d)) + (x) + (t); \ + (a) = (((a) << (s)) | (((a)&0xffffffff) >> (32 - (s)))); \ + (a) += (b); + +/* + * SET reads 4 input bytes in little-endian byte order and stores them + * in a properly aligned word in host byte order. + * + * The check for little-endian architectures which tolerate unaligned + * memory accesses is just an optimization. Nothing will break if it + * doesn't work. + */ +#if defined(__i386__) || defined(__x86_64__) || defined(__vax__) +#define _PICOHASH_MD5_SET(n) (*(const uint32_t *)&ptr[(n)*4]) +#define _PICOHASH_MD5_GET(n) _PICOHASH_MD5_SET(n) +#else +#define _PICOHASH_MD5_SET(n) \ + (ctx->block[(n)] = (uint_fast32_t)ptr[(n)*4] | ((uint_fast32_t)ptr[(n)*4 + 1] << 8) | ((uint_fast32_t)ptr[(n)*4 + 2] << 16) | \ + ((uint_fast32_t)ptr[(n)*4 + 3] << 24)) +#define _PICOHASH_MD5_GET(n) (ctx->block[(n)]) +#endif + +/* + * This processes one or more 64-byte data blocks, but does NOT update + * the bit counters. There're no alignment requirements. + */ +static const void *_picohash_md5_body(_picohash_md5_ctx_t *ctx, const void *data, size_t size) +{ + const unsigned char *ptr; + uint_fast32_t a, b, c, d; + uint_fast32_t saved_a, saved_b, saved_c, saved_d; + + ptr = data; + + a = ctx->a; + b = ctx->b; + c = ctx->c; + d = ctx->d; + + do { + saved_a = a; + saved_b = b; + saved_c = c; + saved_d = d; + + /* Round 1 */ + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, a, b, c, d, _PICOHASH_MD5_SET(0), 0xd76aa478, 7) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, d, a, b, c, _PICOHASH_MD5_SET(1), 0xe8c7b756, 12) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, c, d, a, b, _PICOHASH_MD5_SET(2), 0x242070db, 17) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, b, c, d, a, _PICOHASH_MD5_SET(3), 0xc1bdceee, 22) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, a, b, c, d, _PICOHASH_MD5_SET(4), 0xf57c0faf, 7) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, d, a, b, c, _PICOHASH_MD5_SET(5), 0x4787c62a, 12) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, c, d, a, b, _PICOHASH_MD5_SET(6), 0xa8304613, 17) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, b, c, d, a, _PICOHASH_MD5_SET(7), 0xfd469501, 22) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, a, b, c, d, _PICOHASH_MD5_SET(8), 0x698098d8, 7) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, d, a, b, c, _PICOHASH_MD5_SET(9), 0x8b44f7af, 12) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, c, d, a, b, _PICOHASH_MD5_SET(10), 0xffff5bb1, 17) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, b, c, d, a, _PICOHASH_MD5_SET(11), 0x895cd7be, 22) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, a, b, c, d, _PICOHASH_MD5_SET(12), 0x6b901122, 7) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, d, a, b, c, _PICOHASH_MD5_SET(13), 0xfd987193, 12) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, c, d, a, b, _PICOHASH_MD5_SET(14), 0xa679438e, 17) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_F, b, c, d, a, _PICOHASH_MD5_SET(15), 0x49b40821, 22) + + /* Round 2 */ + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, a, b, c, d, _PICOHASH_MD5_GET(1), 0xf61e2562, 5) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, d, a, b, c, _PICOHASH_MD5_GET(6), 0xc040b340, 9) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, c, d, a, b, _PICOHASH_MD5_GET(11), 0x265e5a51, 14) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, b, c, d, a, _PICOHASH_MD5_GET(0), 0xe9b6c7aa, 20) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, a, b, c, d, _PICOHASH_MD5_GET(5), 0xd62f105d, 5) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, d, a, b, c, _PICOHASH_MD5_GET(10), 0x02441453, 9) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, c, d, a, b, _PICOHASH_MD5_GET(15), 0xd8a1e681, 14) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, b, c, d, a, _PICOHASH_MD5_GET(4), 0xe7d3fbc8, 20) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, a, b, c, d, _PICOHASH_MD5_GET(9), 0x21e1cde6, 5) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, d, a, b, c, _PICOHASH_MD5_GET(14), 0xc33707d6, 9) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, c, d, a, b, _PICOHASH_MD5_GET(3), 0xf4d50d87, 14) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, b, c, d, a, _PICOHASH_MD5_GET(8), 0x455a14ed, 20) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, a, b, c, d, _PICOHASH_MD5_GET(13), 0xa9e3e905, 5) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, d, a, b, c, _PICOHASH_MD5_GET(2), 0xfcefa3f8, 9) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, c, d, a, b, _PICOHASH_MD5_GET(7), 0x676f02d9, 14) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_G, b, c, d, a, _PICOHASH_MD5_GET(12), 0x8d2a4c8a, 20) + + /* Round 3 */ + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, a, b, c, d, _PICOHASH_MD5_GET(5), 0xfffa3942, 4) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, d, a, b, c, _PICOHASH_MD5_GET(8), 0x8771f681, 11) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, c, d, a, b, _PICOHASH_MD5_GET(11), 0x6d9d6122, 16) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, b, c, d, a, _PICOHASH_MD5_GET(14), 0xfde5380c, 23) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, a, b, c, d, _PICOHASH_MD5_GET(1), 0xa4beea44, 4) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, d, a, b, c, _PICOHASH_MD5_GET(4), 0x4bdecfa9, 11) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, c, d, a, b, _PICOHASH_MD5_GET(7), 0xf6bb4b60, 16) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, b, c, d, a, _PICOHASH_MD5_GET(10), 0xbebfbc70, 23) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, a, b, c, d, _PICOHASH_MD5_GET(13), 0x289b7ec6, 4) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, d, a, b, c, _PICOHASH_MD5_GET(0), 0xeaa127fa, 11) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, c, d, a, b, _PICOHASH_MD5_GET(3), 0xd4ef3085, 16) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, b, c, d, a, _PICOHASH_MD5_GET(6), 0x04881d05, 23) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, a, b, c, d, _PICOHASH_MD5_GET(9), 0xd9d4d039, 4) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, d, a, b, c, _PICOHASH_MD5_GET(12), 0xe6db99e5, 11) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, c, d, a, b, _PICOHASH_MD5_GET(15), 0x1fa27cf8, 16) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_H, b, c, d, a, _PICOHASH_MD5_GET(2), 0xc4ac5665, 23) + + /* Round 4 */ + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, a, b, c, d, _PICOHASH_MD5_GET(0), 0xf4292244, 6) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, d, a, b, c, _PICOHASH_MD5_GET(7), 0x432aff97, 10) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, c, d, a, b, _PICOHASH_MD5_GET(14), 0xab9423a7, 15) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, b, c, d, a, _PICOHASH_MD5_GET(5), 0xfc93a039, 21) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, a, b, c, d, _PICOHASH_MD5_GET(12), 0x655b59c3, 6) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, d, a, b, c, _PICOHASH_MD5_GET(3), 0x8f0ccc92, 10) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, c, d, a, b, _PICOHASH_MD5_GET(10), 0xffeff47d, 15) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, b, c, d, a, _PICOHASH_MD5_GET(1), 0x85845dd1, 21) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, a, b, c, d, _PICOHASH_MD5_GET(8), 0x6fa87e4f, 6) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, d, a, b, c, _PICOHASH_MD5_GET(15), 0xfe2ce6e0, 10) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, c, d, a, b, _PICOHASH_MD5_GET(6), 0xa3014314, 15) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, b, c, d, a, _PICOHASH_MD5_GET(13), 0x4e0811a1, 21) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, a, b, c, d, _PICOHASH_MD5_GET(4), 0xf7537e82, 6) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, d, a, b, c, _PICOHASH_MD5_GET(11), 0xbd3af235, 10) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, c, d, a, b, _PICOHASH_MD5_GET(2), 0x2ad7d2bb, 15) + _PICOHASH_MD5_STEP(_PICOHASH_MD5_I, b, c, d, a, _PICOHASH_MD5_GET(9), 0xeb86d391, 21) + + a += saved_a; + b += saved_b; + c += saved_c; + d += saved_d; + + ptr += 64; + } while (size -= 64); + + ctx->a = a; + ctx->b = b; + ctx->c = c; + ctx->d = d; + + return ptr; +} + +inline void _picohash_md5_init(_picohash_md5_ctx_t *ctx) +{ + ctx->a = 0x67452301; + ctx->b = 0xefcdab89; + ctx->c = 0x98badcfe; + ctx->d = 0x10325476; + + ctx->lo = 0; + ctx->hi = 0; +} + +inline void _picohash_md5_update(_picohash_md5_ctx_t *ctx, const void *data, size_t size) +{ + uint_fast32_t saved_lo; + unsigned long used, free; + + saved_lo = ctx->lo; + if ((ctx->lo = (saved_lo + size) & 0x1fffffff) < saved_lo) + ctx->hi++; + ctx->hi += size >> 29; + + used = saved_lo & 0x3f; + + if (used) { + free = 64 - used; + + if (size < free) { + memcpy(&ctx->buffer[used], data, size); + return; + } + + memcpy(&ctx->buffer[used], data, free); + data = (const unsigned char *)data + free; + size -= free; + _picohash_md5_body(ctx, ctx->buffer, 64); + } + + if (size >= 64) { + data = _picohash_md5_body(ctx, data, size & ~(unsigned long)0x3f); + size &= 0x3f; + } + + memcpy(ctx->buffer, data, size); +} + +inline void _picohash_md5_final(_picohash_md5_ctx_t *ctx, void *_digest) +{ + unsigned char *digest = _digest; + unsigned long used, free; + + used = ctx->lo & 0x3f; + + ctx->buffer[used++] = 0x80; + + free = 64 - used; + + if (free < 8) { + memset(&ctx->buffer[used], 0, free); + _picohash_md5_body(ctx, ctx->buffer, 64); + used = 0; + free = 64; + } + + memset(&ctx->buffer[used], 0, free - 8); + + ctx->lo <<= 3; + ctx->buffer[56] = ctx->lo; + ctx->buffer[57] = ctx->lo >> 8; + ctx->buffer[58] = ctx->lo >> 16; + ctx->buffer[59] = ctx->lo >> 24; + ctx->buffer[60] = ctx->hi; + ctx->buffer[61] = ctx->hi >> 8; + ctx->buffer[62] = ctx->hi >> 16; + ctx->buffer[63] = ctx->hi >> 24; + + _picohash_md5_body(ctx, ctx->buffer, 64); + + digest[0] = ctx->a; + digest[1] = ctx->a >> 8; + digest[2] = ctx->a >> 16; + digest[3] = ctx->a >> 24; + digest[4] = ctx->b; + digest[5] = ctx->b >> 8; + digest[6] = ctx->b >> 16; + digest[7] = ctx->b >> 24; + digest[8] = ctx->c; + digest[9] = ctx->c >> 8; + digest[10] = ctx->c >> 16; + digest[11] = ctx->c >> 24; + digest[12] = ctx->d; + digest[13] = ctx->d >> 8; + digest[14] = ctx->d >> 16; + digest[15] = ctx->d >> 24; + + memset(ctx, 0, sizeof(*ctx)); +} + +#define _PICOHASH_SHA1_K0 0x5a827999 +#define _PICOHASH_SHA1_K20 0x6ed9eba1 +#define _PICOHASH_SHA1_K40 0x8f1bbcdc +#define _PICOHASH_SHA1_K60 0xca62c1d6 + +static inline uint32_t _picohash_sha1_rol32(uint32_t number, uint8_t bits) +{ + return ((number << bits) | (number >> (32 - bits))); +} + +static inline void _picohash_sha1_hash_block(_picohash_sha1_ctx_t *s) +{ + uint8_t i; + uint32_t a, b, c, d, e, t; + + a = s->state[0]; + b = s->state[1]; + c = s->state[2]; + d = s->state[3]; + e = s->state[4]; + for (i = 0; i < 80; i++) { + if (i >= 16) { + t = s->buffer[(i + 13) & 15] ^ s->buffer[(i + 8) & 15] ^ s->buffer[(i + 2) & 15] ^ s->buffer[i & 15]; + s->buffer[i & 15] = _picohash_sha1_rol32(t, 1); + } + if (i < 20) { + t = (d ^ (b & (c ^ d))) + _PICOHASH_SHA1_K0; + } else if (i < 40) { + t = (b ^ c ^ d) + _PICOHASH_SHA1_K20; + } else if (i < 60) { + t = ((b & c) | (d & (b | c))) + _PICOHASH_SHA1_K40; + } else { + t = (b ^ c ^ d) + _PICOHASH_SHA1_K60; + } + t += _picohash_sha1_rol32(a, 5) + e + s->buffer[i & 15]; + e = d; + d = c; + c = _picohash_sha1_rol32(b, 30); + b = a; + a = t; + } + s->state[0] += a; + s->state[1] += b; + s->state[2] += c; + s->state[3] += d; + s->state[4] += e; +} + +static inline void _picohash_sha1_add_uncounted(_picohash_sha1_ctx_t *s, uint8_t data) +{ + uint8_t *const b = (uint8_t *)s->buffer; +#ifdef _PICOHASH_BIG_ENDIAN + b[s->bufferOffset] = data; +#else + b[s->bufferOffset ^ 3] = data; +#endif + s->bufferOffset++; + if (s->bufferOffset == PICOHASH_SHA1_BLOCK_LENGTH) { + _picohash_sha1_hash_block(s); + s->bufferOffset = 0; + } +} + +inline void _picohash_sha1_init(_picohash_sha1_ctx_t *s) +{ + s->state[0] = 0x67452301; + s->state[1] = 0xefcdab89; + s->state[2] = 0x98badcfe; + s->state[3] = 0x10325476; + s->state[4] = 0xc3d2e1f0; + s->byteCount = 0; + s->bufferOffset = 0; +} + +inline void _picohash_sha1_update(_picohash_sha1_ctx_t *s, const void *_data, size_t len) +{ + const uint8_t *data = _data; + for (; len != 0; --len) { + ++s->byteCount; + _picohash_sha1_add_uncounted(s, *data++); + } +} + +inline void _picohash_sha1_final(_picohash_sha1_ctx_t *s, void *digest) +{ + // Pad with 0x80 followed by 0x00 until the end of the block + _picohash_sha1_add_uncounted(s, 0x80); + while (s->bufferOffset != 56) + _picohash_sha1_add_uncounted(s, 0x00); + + // Append length in the last 8 bytes + _picohash_sha1_add_uncounted(s, s->byteCount >> 53); // Shifting to multiply by 8 + _picohash_sha1_add_uncounted(s, s->byteCount >> 45); // as SHA-1 supports bitstreams as well as + _picohash_sha1_add_uncounted(s, s->byteCount >> 37); // byte. + _picohash_sha1_add_uncounted(s, s->byteCount >> 29); + _picohash_sha1_add_uncounted(s, s->byteCount >> 21); + _picohash_sha1_add_uncounted(s, s->byteCount >> 13); + _picohash_sha1_add_uncounted(s, s->byteCount >> 5); + _picohash_sha1_add_uncounted(s, s->byteCount << 3); + +#ifndef SHA_BIG_ENDIAN + { // Swap byte order back + int i; + for (i = 0; i < 5; i++) { + s->state[i] = (((s->state[i]) << 24) & 0xff000000) | (((s->state[i]) << 8) & 0x00ff0000) | + (((s->state[i]) >> 8) & 0x0000ff00) | (((s->state[i]) >> 24) & 0x000000ff); + } + } +#endif + + memcpy(digest, s->state, sizeof(s->state)); +} + +#define _picohash_sha256_ch(x, y, z) (z ^ (x & (y ^ z))) +#define _picohash_sha256_maj(x, y, z) (((x | y) & z) | (x & y)) +#define _picohash_sha256_s(x, y) \ + (((((uint32_t)(x)&0xFFFFFFFFUL) >> (uint32_t)((y)&31)) | ((uint32_t)(x) << (uint32_t)(32 - ((y)&31)))) & 0xFFFFFFFFUL) +#define _picohash_sha256_r(x, n) (((x)&0xFFFFFFFFUL) >> (n)) +#define _picohash_sha256_sigma0(x) (_picohash_sha256_s(x, 2) ^ _picohash_sha256_s(x, 13) ^ _picohash_sha256_s(x, 22)) +#define _picohash_sha256_sigma1(x) (_picohash_sha256_s(x, 6) ^ _picohash_sha256_s(x, 11) ^ _picohash_sha256_s(x, 25)) +#define _picohash_sha256_gamma0(x) (_picohash_sha256_s(x, 7) ^ _picohash_sha256_s(x, 18) ^ _picohash_sha256_r(x, 3)) +#define _picohash_sha256_gamma1(x) (_picohash_sha256_s(x, 17) ^ _picohash_sha256_s(x, 19) ^ _picohash_sha256_r(x, 10)) +#define _picohash_sha256_rnd(a, b, c, d, e, f, g, h, i) \ + t0 = h + _picohash_sha256_sigma1(e) + _picohash_sha256_ch(e, f, g) + K[i] + W[i]; \ + t1 = _picohash_sha256_sigma0(a) + _picohash_sha256_maj(a, b, c); \ + d += t0; \ + h = t0 + t1; + +static inline void _picohash_sha256_compress(_picohash_sha256_ctx_t *ctx, unsigned char *buf) +{ + static const uint32_t K[64] = { + 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, + 0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL, 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL, + 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL, 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, + 0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL, + 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL, 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL, + 0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, 0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, + 0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL, 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL, + 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL, 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL}; + uint32_t S[8], W[64], t, t0, t1; + int i; + + /* copy state into S */ + for (i = 0; i < 8; i++) + S[i] = ctx->state[i]; + + /* copy the state into 512-bits into W[0..15] */ + for (i = 0; i < 16; i++) + W[i] = + (uint32_t)buf[4 * i] << 24 | (uint32_t)buf[4 * i + 1] << 16 | (uint32_t)buf[4 * i + 2] << 8 | (uint32_t)buf[4 * i + 3]; + + /* fill W[16..63] */ + for (i = 16; i < 64; i++) + W[i] = _picohash_sha256_gamma1(W[i - 2]) + W[i - 7] + _picohash_sha256_gamma0(W[i - 15]) + W[i - 16]; + + /* Compress */ + for (i = 0; i < 64; ++i) { + _picohash_sha256_rnd(S[0], S[1], S[2], S[3], S[4], S[5], S[6], S[7], i); + t = S[7]; + S[7] = S[6]; + S[6] = S[5]; + S[5] = S[4]; + S[4] = S[3]; + S[3] = S[2]; + S[2] = S[1]; + S[1] = S[0]; + S[0] = t; + } + + /* feedback */ + for (i = 0; i < 8; i++) + ctx->state[i] = ctx->state[i] + S[i]; +} + +static inline void _picohash_sha256_do_final(_picohash_sha256_ctx_t *ctx, void *digest, size_t len) +{ + unsigned char *out = digest; + size_t i; + + /* increase the length of the message */ + ctx->length += ctx->curlen * 8; + + /* append the '1' bit */ + ctx->buf[ctx->curlen++] = (unsigned char)0x80; + + /* if the length is currently above 56 bytes we append zeros + * then compress. Then we can fall back to padding zeros and length + * encoding like normal. + */ + if (ctx->curlen > 56) { + while (ctx->curlen < 64) { + ctx->buf[ctx->curlen++] = (unsigned char)0; + } + _picohash_sha256_compress(ctx, ctx->buf); + ctx->curlen = 0; + } + + /* pad upto 56 bytes of zeroes */ + while (ctx->curlen < 56) { + ctx->buf[ctx->curlen++] = (unsigned char)0; + } + + /* store length */ + for (i = 0; i != 8; ++i) + ctx->buf[56 + i] = ctx->length >> (56 - 8 * i); + _picohash_sha256_compress(ctx, ctx->buf); + + /* copy output */ + for (i = 0; i != len / 4; ++i) { + out[i * 4] = ctx->state[i] >> 24; + out[i * 4 + 1] = ctx->state[i] >> 16; + out[i * 4 + 2] = ctx->state[i] >> 8; + out[i * 4 + 3] = ctx->state[i]; + } +} + +inline void _picohash_sha256_init(_picohash_sha256_ctx_t *ctx) +{ + ctx->curlen = 0; + ctx->length = 0; + ctx->state[0] = 0x6A09E667UL; + ctx->state[1] = 0xBB67AE85UL; + ctx->state[2] = 0x3C6EF372UL; + ctx->state[3] = 0xA54FF53AUL; + ctx->state[4] = 0x510E527FUL; + ctx->state[5] = 0x9B05688CUL; + ctx->state[6] = 0x1F83D9ABUL; + ctx->state[7] = 0x5BE0CD19UL; +} + +inline void _picohash_sha256_update(_picohash_sha256_ctx_t *ctx, const void *data, size_t len) +{ + const unsigned char *in = data; + size_t n; + + while (len > 0) { + if (ctx->curlen == 0 && len >= PICOHASH_SHA256_BLOCK_LENGTH) { + _picohash_sha256_compress(ctx, (unsigned char *)in); + ctx->length += PICOHASH_SHA256_BLOCK_LENGTH * 8; + in += PICOHASH_SHA256_BLOCK_LENGTH; + len -= PICOHASH_SHA256_BLOCK_LENGTH; + } else { + n = PICOHASH_SHA256_BLOCK_LENGTH - ctx->curlen; + if (n > len) + n = len; + memcpy(ctx->buf + ctx->curlen, in, (size_t)n); + ctx->curlen += n; + in += n; + len -= n; + if (ctx->curlen == 64) { + _picohash_sha256_compress(ctx, ctx->buf); + ctx->length += 8 * PICOHASH_SHA256_BLOCK_LENGTH; + ctx->curlen = 0; + } + } + } +} + +inline void _picohash_sha256_final(_picohash_sha256_ctx_t *ctx, void *digest) +{ + _picohash_sha256_do_final(ctx, digest, PICOHASH_SHA256_DIGEST_LENGTH); +} + +inline void _picohash_sha224_init(_picohash_sha256_ctx_t *ctx) +{ + ctx->curlen = 0; + ctx->length = 0; + ctx->state[0] = 0xc1059ed8UL; + ctx->state[1] = 0x367cd507UL; + ctx->state[2] = 0x3070dd17UL; + ctx->state[3] = 0xf70e5939UL; + ctx->state[4] = 0xffc00b31UL; + ctx->state[5] = 0x68581511UL; + ctx->state[6] = 0x64f98fa7UL; + ctx->state[7] = 0xbefa4fa4UL; +} + +inline void _picohash_sha224_final(_picohash_sha256_ctx_t *ctx, void *digest) +{ + _picohash_sha256_do_final(ctx, digest, PICOHASH_SHA224_DIGEST_LENGTH); +} + +inline void picohash_init_md5(picohash_ctx_t *ctx) +{ + ctx->block_length = PICOHASH_MD5_BLOCK_LENGTH; + ctx->digest_length = PICOHASH_MD5_DIGEST_LENGTH; + ctx->_reset = (void *)_picohash_md5_init; + ctx->_update = (void *)_picohash_md5_update; + ctx->_final = (void *)_picohash_md5_final; + + _picohash_md5_init(&ctx->_md5); +} + +inline void picohash_init_sha1(picohash_ctx_t *ctx) +{ + ctx->block_length = PICOHASH_SHA1_BLOCK_LENGTH; + ctx->digest_length = PICOHASH_SHA1_DIGEST_LENGTH; + ctx->_reset = (void *)_picohash_sha1_init; + ctx->_update = (void *)_picohash_sha1_update; + ctx->_final = (void *)_picohash_sha1_final; + _picohash_sha1_init(&ctx->_sha1); +} + +inline void picohash_init_sha224(picohash_ctx_t *ctx) +{ + ctx->block_length = PICOHASH_SHA224_BLOCK_LENGTH; + ctx->digest_length = PICOHASH_SHA224_DIGEST_LENGTH; + ctx->_reset = (void *)_picohash_sha224_init; + ctx->_update = (void *)_picohash_sha256_update; + ctx->_final = (void *)_picohash_sha224_final; + _picohash_sha224_init(&ctx->_sha256); +} + +inline void picohash_init_sha256(picohash_ctx_t *ctx) +{ + ctx->block_length = PICOHASH_SHA256_BLOCK_LENGTH; + ctx->digest_length = PICOHASH_SHA256_DIGEST_LENGTH; + ctx->_reset = (void *)_picohash_sha256_init; + ctx->_update = (void *)_picohash_sha256_update; + ctx->_final = (void *)_picohash_sha256_final; + _picohash_sha256_init(&ctx->_sha256); +} + +inline void picohash_update(picohash_ctx_t *ctx, const void *input, size_t len) +{ + ctx->_update(ctx, input, len); +} + +inline void picohash_final(picohash_ctx_t *ctx, void *digest) +{ + ctx->_final(ctx, digest); +} + +inline void picohash_reset(picohash_ctx_t *ctx) +{ + ctx->_reset(ctx); +} + +static inline void _picohash_hmac_apply_key(picohash_ctx_t *ctx, unsigned char delta) +{ + size_t i; + for (i = 0; i != ctx->block_length; ++i) + ctx->_hmac.key[i] ^= delta; + picohash_update(ctx, ctx->_hmac.key, ctx->block_length); + for (i = 0; i != ctx->block_length; ++i) + ctx->_hmac.key[i] ^= delta; +} + +static void _picohash_hmac_final(picohash_ctx_t *ctx, void *digest) +{ + unsigned char inner_digest[PICOHASH_MAX_DIGEST_LENGTH]; + + ctx->_hmac.hash_final(ctx, inner_digest); + + ctx->_hmac.hash_reset(ctx); + _picohash_hmac_apply_key(ctx, 0x5c); + picohash_update(ctx, inner_digest, ctx->digest_length); + memset(inner_digest, 0, ctx->digest_length); + + ctx->_hmac.hash_final(ctx, digest); +} + +static inline void _picohash_hmac_reset(picohash_ctx_t *ctx) +{ + ctx->_hmac.hash_reset(ctx); + _picohash_hmac_apply_key(ctx, 0x36); +} + +inline void picohash_init_hmac(picohash_ctx_t *ctx, void (*initf)(picohash_ctx_t *), const void *key, size_t key_len) +{ + initf(ctx); + + memset(ctx->_hmac.key, 0, ctx->block_length); + if (key_len > ctx->block_length) { + /* hash the key if it is too long */ + picohash_update(ctx, key, key_len); + picohash_final(ctx, ctx->_hmac.key); + ctx->_hmac.hash_reset(ctx); + } else { + memcpy(ctx->_hmac.key, key, key_len); + } + + /* replace reset and final function */ + ctx->_hmac.hash_reset = ctx->_reset; + ctx->_hmac.hash_final = ctx->_final; + ctx->_reset = (void *)_picohash_hmac_reset; + ctx->_final = (void *)_picohash_hmac_final; + + /* start calculating the inner hash */ + _picohash_hmac_apply_key(ctx, 0x36); +} + +#endif diff --git a/debian/vendor-h2o/deps/mruby-digest/test/digest.rb b/debian/vendor-h2o/deps/mruby-digest/test/digest.rb new file mode 100644 index 0000000..fd13fa4 --- /dev/null +++ b/debian/vendor-h2o/deps/mruby-digest/test/digest.rb @@ -0,0 +1,203 @@ +## +# Digest Test + +if Object.const_defined?(:Digest) + assert('Digest') do + Digest.class == Module + end + + assert('Digest::Base') do + Digest::Base.class == Class + end + + assert('Digest::Base#new') do + e1 = nil + begin + Digest::Base.new + rescue NotImplementedError => e + e1 = e + end + e1.class == NotImplementedError + end + + assert('Digest::MD5') do + Digest::MD5.class == Class + end + + assert('Digest::MD5 superclass') do + Digest::MD5.superclass == Digest::Base + end + + assert('Digest::MD5.digest') do + Digest::MD5.digest('ruby') == "X\xE5=\x13$\xEE\xF6&_\xDB\x97\xB0\x8E\xD9\xAA\xDF" + end + + #assert('Digest::MD5.file') + + assert('Digest::MD5.hexdigest') do + Digest::MD5.hexdigest('ruby') == "58e53d1324eef6265fdb97b08ed9aadf" + end + + assert('Digest::MD5#update') do + d = Digest::MD5.new + d.update('ruby') + d.hexdigest == "58e53d1324eef6265fdb97b08ed9aadf" + end + + assert('Digest::MD5#update 2') do + d = Digest::MD5.new + d.update('ruby') + d.update('digest') + d.hexdigest == "2ac1b3e3db06239e3244817f281450f1" + end + + assert('Digest::MD5#<<') do + a = Digest::MD5.new + b = Digest::MD5.new + a.update('ruby') + b << "r" << "u" << "b" << "y" + a.hexdigest == b.hexdigest + end + + assert('Digest::MD5#== with Digest::XXX') do + x1 = Digest::MD5.new.update("ruby") + x2 = Digest::MD5.new.update("ruby") + x3 = Digest::MD5.new.update("RUBY") + (x1 == x2) == true and + (x1 == x3) == false + end + + assert('Digest::MD5#== with String') do + Digest::MD5.new.update("ruby") == "58e53d1324eef6265fdb97b08ed9aadf" + end + + assert('Digest::MD5#block_length') do + Digest::MD5.new.block_length == 64 + end + + assert('Digest::MD5#digest') do + Digest::MD5.new.update("ruby").digest == "X\xE5=\x13$\xEE\xF6&_\xDB\x97\xB0\x8E\xD9\xAA\xDF" + end + + assert('Digest::MD5#digest!') do + d = Digest::MD5.new.update("ruby") + d.digest! + #d.digest! == "\xD4\x1D\x8C\xD9\x8F\x00\xB2\x04\xE9\x80\t\x98\xEC\xF8B~" + # XXX: mrbtest dumps core! + d.digest! == Digest::MD5.new.digest + end + + assert('Digest::MD5#digest_length') do + d = Digest::MD5.new + n = 16 + d.digest_length == n and + d.length == n and + d.size == n + end + + #assert('Digest::MD5#file') + + assert('Digest::MD5#hexdigest') do + d = Digest::MD5.new.update("ruby") + s = "58e53d1324eef6265fdb97b08ed9aadf" + d.hexdigest == s and + d.to_s == s + end + + assert('Digest::MD5#hexdigest!') do + d = Digest::MD5.new.update("ruby") + d.hexdigest! + d.hexdigest! == "d41d8cd98f00b204e9800998ecf8427e" + end + + assert('Digest::MD5#reset') do + d = Digest::MD5.new.update("ruby") + d.reset + d.hexdigest! == "d41d8cd98f00b204e9800998ecf8427e" + end + + if Digest.const_defined? :RMD160 + assert('Digest::RMD160#hexdigest') do + d = Digest::RMD160.new.update("ruby") + s = "29d9b710bc50866fa2399c3061cd02c0c8ffa197" + d.hexdigest == s + end + end + + if Digest.const_defined? :SHA1 + assert('Digest::SHA1#hexdigest') do + d = Digest::SHA1.new.update("ruby") + s = "18e40e1401eef67e1ae69efab09afb71f87ffb81" + d.hexdigest == s + end + end + + if Digest.const_defined? :SHA256 + assert('Digest::SHA256#hexdigest') do + d = Digest::SHA256.new.update("ruby") + s = "b9138194ffe9e7c8bb6d79d1ed56259553d18d9cb60b66e3ba5aa2e5b078055a" + d.hexdigest == s + end + end + + if Digest.const_defined? :SHA384 + assert('Digest::SHA384#hexdigest') do + d = Digest::SHA384.new.update("ruby") + s = "635365ef93ebf2c7a4e40b0b497da727ab8c2914eb9f052e6be40476f95d3daf44786790f5f0e843fab419b43022e069" + d.hexdigest == s + end + end + + if Digest.const_defined? :SHA512 + assert('Digest::SHA512#hexdigest') do + d = Digest::SHA512.new.update("ruby") + s = "423408d7723a3d80baefa804bd50b61a89667efec1713386a7b8efe28e5d13968307a908778cad210d7aa2dfe7db9a2aa86895f9fc1eeefcc99814310b207a6b" + d.hexdigest == s + end + end + + assert('Digest::HMAC') do + Digest::HMAC.class == Class + end + + assert('Digest::HMAC.digest') do + Digest::HMAC.digest("data", "hash key", Digest::SHA1) == "\xFD \xECC=\xFD\x97\x0E\xEC!FW\xCF\xB5Gl]\x913f" + end + + assert('Digest::HMAC.hexdigest') do + Digest::HMAC.hexdigest("data", "hash key", Digest::SHA1) == "fd20ec433dfd970eec214657cfb5476c5d913366" + end + + assert('Digest::HMAC#<<') do + a = Digest::HMAC.new('hash key', Digest::SHA1) + b = Digest::HMAC.new('hash key', Digest::SHA1) + a.update('ruby') + b << "r" << "u" << "b" << "y" + a.hexdigest == b.hexdigest + end + + assert('Digest::HMAC#block_length') do + d = Digest::HMAC.new("hash key", Digest::SHA1) + d.block_length == 64 + end + + assert('Digest::HMAC#digest_length') do + d = Digest::HMAC.new("hash key", Digest::SHA1) + d.digest_length == 20 + end + + # assert('Digest::HMAC#reset') + + assert('Digest::HMAC#update') do + d = Digest::HMAC.new("hash key", Digest::SHA1) + d.update('data') + d.hexdigest == "fd20ec433dfd970eec214657cfb5476c5d913366" + end + + assert('Digest::HMAC#update 2') do + d = Digest::HMAC.new("hash key", Digest::SHA1) + d.update('ruby') + d.update('digest') + d.hexdigest == "e4be3728777e43deba3aa522a4247ea83b19a1c7" + end +end |