sha3 1.0.5 → 2.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/.clang-format +54 -0
- data/.document +3 -3
- data/.rdoc_options +11 -0
- data/.rspec +2 -2
- data/.rubocop.yml +8 -1
- data/CHANGELOG.md +23 -0
- data/Gemfile +12 -0
- data/LICENSE.txt +1 -1
- data/README.md +185 -65
- data/Rakefile +12 -4
- data/certs/io+sha3@jsg.io.pem +26 -0
- data/doc/sha3.rb +83 -0
- data/ext/sha3/config.h +2 -2
- data/ext/sha3/digest.c +726 -169
- data/ext/sha3/digest.h +6 -35
- data/ext/sha3/extconf.rb +42 -38
- data/ext/sha3/kmac.c +504 -0
- data/ext/sha3/kmac.h +14 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.c +81 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.h +73 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.inc +201 -0
- data/ext/sha3/lib/high/Keccak/KeccakSponge.c +2 -18
- data/ext/sha3/lib/high/Keccak/KeccakSponge.h +4 -10
- data/ext/sha3/lib/high/Keccak/KeccakSponge.inc +27 -31
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.c +61 -0
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.h +67 -0
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.inc +128 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.c +93 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.h +599 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.inc +573 -0
- data/ext/sha3/lib/high/common/Phases.h +25 -0
- data/ext/sha3/lib/low/KeccakP-1600/common/KeccakP-1600-64.macros +19 -9
- data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-SnP.h +18 -12
- data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference32BI.c +28 -36
- data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-SnP.h +18 -12
- data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.c +28 -59
- data/ext/sha3/lib/low/common/PlSnP-Fallback.inc +291 -0
- data/ext/sha3/lib/low/common/SnP-Relaned.h +145 -0
- data/ext/sha3/sha3.c +28 -59
- data/ext/sha3/sha3.h +4 -13
- data/lib/constants.rb +5 -0
- data/lib/sha3.rb +25 -24
- data.tar.gz.sig +0 -0
- metadata +61 -127
- metadata.gz.sig +0 -0
- data/.yardopts +0 -1
- data/ChangeLog.rdoc +0 -27
- data/certs/johanns.pem +0 -25
- data/lib/sha3/doc.rb +0 -121
- data/lib/sha3/version.rb +0 -9
- data/sha3.gemspec +0 -54
- data/tests.sh +0 -29
data/ext/sha3/digest.c
CHANGED
@@ -1,10 +1,8 @@
|
|
1
|
-
|
1
|
+
#include "digest.h"
|
2
2
|
|
3
|
+
#include "KeccakHash.h"
|
3
4
|
#include "sha3.h"
|
4
5
|
|
5
|
-
VALUE cSHA3Digest;
|
6
|
-
VALUE eSHA3DigestError;
|
7
|
-
|
8
6
|
/*
|
9
7
|
* == Notes
|
10
8
|
*
|
@@ -19,252 +17,811 @@ VALUE eSHA3DigestError;
|
|
19
17
|
*
|
20
18
|
*/
|
21
19
|
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
20
|
+
/*** Types and structs ***/
|
21
|
+
|
22
|
+
typedef enum { SHA3_224 = 0, SHA3_256, SHA3_384, SHA3_512, SHAKE_128, SHAKE_256 } sha3_digest_algorithms;
|
23
|
+
|
24
|
+
typedef struct {
|
25
|
+
Keccak_HashInstance* state;
|
26
|
+
int hashbitlen;
|
27
|
+
sha3_digest_algorithms algorithm;
|
28
|
+
} sha3_digest_context_t;
|
29
|
+
|
30
|
+
typedef HashReturn (*keccak_init_func)(Keccak_HashInstance*);
|
31
|
+
|
32
|
+
/*** Function prototypes ***/
|
33
|
+
|
34
|
+
static int compare_contexts(const sha3_digest_context_t*, const sha3_digest_context_t*);
|
35
|
+
static inline void get_sha3_digest_context(VALUE, sha3_digest_context_t**);
|
36
|
+
static inline void safe_get_sha3_digest_context(VALUE, sha3_digest_context_t**);
|
37
|
+
|
38
|
+
static int get_hashbit_length(VALUE, sha3_digest_algorithms*);
|
39
|
+
static HashReturn keccak_hash_initialize(sha3_digest_context_t*);
|
40
|
+
|
41
|
+
static void sha3_digest_free_context(void*);
|
42
|
+
static size_t sha3_digest_context_size(const void*);
|
43
|
+
|
44
|
+
/* Allocation and initialization */
|
45
|
+
static VALUE rb_sha3_digest_alloc(VALUE);
|
46
|
+
static VALUE rb_sha3_digest_init(int, VALUE*, VALUE);
|
47
|
+
static VALUE rb_sha3_digest_copy(VALUE, VALUE);
|
48
|
+
|
49
|
+
/* Core digest operations */
|
50
|
+
static VALUE rb_sha3_digest_finish(int, VALUE*, VALUE);
|
51
|
+
static VALUE rb_sha3_digest_reset(VALUE);
|
52
|
+
static VALUE rb_sha3_digest_update(VALUE, VALUE);
|
53
|
+
|
54
|
+
/* Digest properties */
|
55
|
+
static VALUE rb_sha3_digest_block_length(VALUE);
|
56
|
+
static VALUE rb_sha3_digest_length(VALUE);
|
57
|
+
static VALUE rb_sha3_digest_name(VALUE);
|
58
|
+
|
59
|
+
/* Output methods */
|
60
|
+
static VALUE rb_sha3_digest_digest(int, VALUE*, VALUE);
|
61
|
+
static VALUE rb_sha3_digest_hexdigest(int, VALUE*, VALUE);
|
62
|
+
static VALUE rb_sha3_digest_hex_squeeze(VALUE, VALUE);
|
63
|
+
static VALUE rb_sha3_digest_squeeze(VALUE, VALUE);
|
64
|
+
static VALUE rb_sha3_digest_self_digest(VALUE, VALUE, VALUE);
|
65
|
+
static VALUE rb_sha3_digest_self_hexdigest(VALUE, VALUE, VALUE);
|
66
|
+
|
67
|
+
/*** Globals variables ***/
|
68
|
+
|
69
|
+
VALUE _sha3_digest_class;
|
70
|
+
VALUE _sha3_digest_error_class;
|
71
|
+
|
72
|
+
/* Define the ID variables */
|
73
|
+
static ID _sha3_224_id;
|
74
|
+
static ID _sha3_256_id;
|
75
|
+
static ID _sha3_384_id;
|
76
|
+
static ID _sha3_512_id;
|
77
|
+
static ID _shake_128_id;
|
78
|
+
static ID _shake_256_id;
|
79
|
+
|
80
|
+
/* TypedData structure for sha3_digest_context_t */
|
81
|
+
const rb_data_type_t sha3_digest_data_type_t = {"SHA3::Digest",
|
82
|
+
{
|
83
|
+
NULL,
|
84
|
+
sha3_digest_free_context,
|
85
|
+
sha3_digest_context_size,
|
86
|
+
},
|
87
|
+
NULL,
|
88
|
+
NULL,
|
89
|
+
RUBY_TYPED_FREE_IMMEDIATELY};
|
90
|
+
|
91
|
+
void Init_sha3_digest(void) {
|
92
|
+
rb_require("digest");
|
30
93
|
|
31
|
-
|
94
|
+
/* Initialize static symbol IDs for faster lookup in get_hlen() */
|
95
|
+
_sha3_224_id = rb_intern("sha3_224");
|
96
|
+
_sha3_256_id = rb_intern("sha3_256");
|
97
|
+
_sha3_384_id = rb_intern("sha3_384");
|
98
|
+
_sha3_512_id = rb_intern("sha3_512");
|
99
|
+
_shake_128_id = rb_intern("shake_128");
|
100
|
+
_shake_256_id = rb_intern("shake_256");
|
101
|
+
|
102
|
+
if (NIL_P(_sha3_module)) {
|
103
|
+
// This is both a safeguard and a workaround for RDoc
|
104
|
+
_sha3_module = rb_define_module("SHA3");
|
32
105
|
}
|
33
106
|
|
34
|
-
|
107
|
+
/*
|
108
|
+
* Document-class: SHA3::Digest
|
109
|
+
*
|
110
|
+
* It is a subclass of the Digest::Class class, which provides a framework for
|
111
|
+
* creating and manipulating hash digest. Supported Algorithms are:
|
112
|
+
* - SHA3-224
|
113
|
+
* - SHA3-256
|
114
|
+
* - SHA3-384
|
115
|
+
* - SHA3-512
|
116
|
+
* - SHAKE128
|
117
|
+
* - SHAKE256
|
118
|
+
*/
|
119
|
+
_sha3_digest_class = rb_define_class_under(_sha3_module, "Digest", rb_path2class("Digest::Class"));
|
120
|
+
|
121
|
+
/*
|
122
|
+
* Document-class: SHA3::Digest::DigestError
|
123
|
+
*
|
124
|
+
* All SHA3::Digest methods raise this exception on error.
|
125
|
+
*
|
126
|
+
* It is a subclass of the StandardError class -- see the Ruby documentation
|
127
|
+
* for more information.
|
128
|
+
*/
|
129
|
+
_sha3_digest_error_class = rb_define_class_under(_sha3_digest_class, "DigestError", rb_eStandardError);
|
130
|
+
|
131
|
+
rb_define_alloc_func(_sha3_digest_class, rb_sha3_digest_alloc);
|
132
|
+
rb_define_method(_sha3_digest_class, "initialize", rb_sha3_digest_init, -1);
|
133
|
+
rb_define_method(_sha3_digest_class, "update", rb_sha3_digest_update, 1);
|
134
|
+
rb_define_method(_sha3_digest_class, "reset", rb_sha3_digest_reset, 0);
|
135
|
+
rb_define_method(_sha3_digest_class, "initialize_copy", rb_sha3_digest_copy, 1);
|
136
|
+
rb_define_method(_sha3_digest_class, "digest_length", rb_sha3_digest_length, 0);
|
137
|
+
rb_define_method(_sha3_digest_class, "block_length", rb_sha3_digest_block_length, 0);
|
138
|
+
rb_define_method(_sha3_digest_class, "name", rb_sha3_digest_name, 0);
|
139
|
+
|
140
|
+
rb_define_method(_sha3_digest_class, "squeeze", rb_sha3_digest_squeeze, 1);
|
141
|
+
rb_define_method(_sha3_digest_class, "hex_squeeze", rb_sha3_digest_hex_squeeze, 1);
|
142
|
+
rb_define_method(_sha3_digest_class, "digest", rb_sha3_digest_digest, -1);
|
143
|
+
rb_define_method(_sha3_digest_class, "hexdigest", rb_sha3_digest_hexdigest, -1);
|
144
|
+
|
145
|
+
rb_define_private_method(_sha3_digest_class, "finish", rb_sha3_digest_finish, -1);
|
146
|
+
|
147
|
+
/* Define the class method self.digest */
|
148
|
+
rb_define_singleton_method(_sha3_digest_class, "digest", rb_sha3_digest_self_digest, 2);
|
149
|
+
rb_define_singleton_method(_sha3_digest_class, "hexdigest", rb_sha3_digest_self_hexdigest, 2);
|
150
|
+
|
151
|
+
rb_define_alias(_sha3_digest_class, "<<", "update");
|
35
152
|
}
|
36
153
|
|
37
|
-
|
38
|
-
{
|
39
|
-
|
40
|
-
|
154
|
+
// Static inline functions replacing macros
|
155
|
+
static inline void get_sha3_digest_context(VALUE obj, sha3_digest_context_t** context) {
|
156
|
+
TypedData_Get_Struct((obj), sha3_digest_context_t, &sha3_digest_data_type_t, (*context));
|
157
|
+
if (!(*context)) {
|
158
|
+
rb_raise(rb_eRuntimeError, "Digest data not initialized!");
|
159
|
+
}
|
160
|
+
}
|
41
161
|
|
42
|
-
|
43
|
-
if (!
|
44
|
-
|
45
|
-
|
162
|
+
static inline void safe_get_sha3_digest_context(VALUE obj, sha3_digest_context_t** context) {
|
163
|
+
if (!rb_obj_is_kind_of(obj, _sha3_digest_class)) {
|
164
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(obj),
|
165
|
+
rb_class2name(_sha3_digest_class));
|
46
166
|
}
|
167
|
+
get_sha3_digest_context(obj, context);
|
168
|
+
}
|
47
169
|
|
48
|
-
|
49
|
-
if (
|
50
|
-
|
51
|
-
|
52
|
-
|
170
|
+
int get_hashbit_length(VALUE obj, sha3_digest_algorithms* algorithm) {
|
171
|
+
if (TYPE(obj) == T_SYMBOL) {
|
172
|
+
ID symid = SYM2ID(obj);
|
173
|
+
|
174
|
+
if (symid == _sha3_224_id) {
|
175
|
+
*algorithm = SHA3_224;
|
176
|
+
return 224;
|
177
|
+
} else if (symid == _sha3_256_id) {
|
178
|
+
*algorithm = SHA3_256;
|
179
|
+
return 256;
|
180
|
+
} else if (symid == _sha3_384_id) {
|
181
|
+
*algorithm = SHA3_384;
|
182
|
+
return 384;
|
183
|
+
} else if (symid == _sha3_512_id) {
|
184
|
+
*algorithm = SHA3_512;
|
185
|
+
return 512;
|
186
|
+
} else if (symid == _shake_128_id) {
|
187
|
+
*algorithm = SHAKE_128;
|
188
|
+
return 128;
|
189
|
+
} else if (symid == _shake_256_id) {
|
190
|
+
*algorithm = SHAKE_256;
|
191
|
+
return 256;
|
192
|
+
}
|
193
|
+
|
194
|
+
rb_raise(_sha3_digest_error_class,
|
195
|
+
"invalid hash algorithm symbol (should be: :sha3_224, "
|
196
|
+
":sha3_256, :sha3_384, :sha3_512, :shake_128, or :shake_256)");
|
53
197
|
}
|
54
198
|
|
55
|
-
|
199
|
+
rb_raise(_sha3_digest_error_class, "unknown type value");
|
200
|
+
return 0; // Never reached, but silences compiler warnings
|
201
|
+
}
|
56
202
|
|
57
|
-
|
58
|
-
|
203
|
+
static void sha3_digest_free_context(void* ptr) {
|
204
|
+
sha3_digest_context_t* context = (sha3_digest_context_t*)ptr;
|
205
|
+
if (context) {
|
206
|
+
if (context->state) {
|
207
|
+
free(context->state);
|
208
|
+
}
|
209
|
+
free(context);
|
210
|
+
}
|
211
|
+
}
|
59
212
|
|
60
|
-
|
213
|
+
static size_t sha3_digest_context_size(const void* ptr) {
|
214
|
+
const sha3_digest_context_t* context = (const sha3_digest_context_t*)ptr;
|
215
|
+
size_t size = sizeof(sha3_digest_context_t);
|
216
|
+
|
217
|
+
if (context && context->state) {
|
218
|
+
size += sizeof(Keccak_HashInstance);
|
219
|
+
}
|
220
|
+
|
221
|
+
return size;
|
61
222
|
}
|
62
223
|
|
63
|
-
static
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
224
|
+
static HashReturn keccak_hash_initialize(sha3_digest_context_t* context) {
|
225
|
+
switch (context->algorithm) {
|
226
|
+
case SHA3_224:
|
227
|
+
return Keccak_HashInitialize_SHA3_224(context->state);
|
228
|
+
case SHA3_256:
|
229
|
+
return Keccak_HashInitialize_SHA3_256(context->state);
|
230
|
+
case SHA3_384:
|
231
|
+
return Keccak_HashInitialize_SHA3_384(context->state);
|
232
|
+
case SHA3_512:
|
233
|
+
return Keccak_HashInitialize_SHA3_512(context->state);
|
234
|
+
case SHAKE_128:
|
235
|
+
return Keccak_HashInitialize_SHAKE128(context->state);
|
236
|
+
case SHAKE_256:
|
237
|
+
return Keccak_HashInitialize_SHAKE256(context->state);
|
238
|
+
}
|
239
|
+
|
240
|
+
return KECCAK_FAIL;
|
241
|
+
}
|
242
|
+
|
243
|
+
static VALUE rb_sha3_digest_alloc(VALUE klass) {
|
244
|
+
sha3_digest_context_t* context = (sha3_digest_context_t*)malloc(sizeof(sha3_digest_context_t));
|
245
|
+
if (!context) {
|
246
|
+
rb_raise(_sha3_digest_error_class, "failed to allocate object memory");
|
247
|
+
}
|
248
|
+
|
249
|
+
context->state = (Keccak_HashInstance*)calloc(1, sizeof(Keccak_HashInstance));
|
250
|
+
if (!context->state) {
|
251
|
+
sha3_digest_free_context(context);
|
252
|
+
rb_raise(_sha3_digest_error_class, "failed to allocate state memory");
|
253
|
+
}
|
254
|
+
|
255
|
+
VALUE obj = TypedData_Wrap_Struct(klass, &sha3_digest_data_type_t, context);
|
256
|
+
context->hashbitlen = 0;
|
257
|
+
context->algorithm = SHA3_256; // Default algorithm
|
258
|
+
|
259
|
+
return obj;
|
86
260
|
}
|
87
261
|
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
262
|
+
/*
|
263
|
+
* :call-seq:
|
264
|
+
* ::new() -> instance
|
265
|
+
* ::new([algorithm], [message]) -> instance
|
266
|
+
*
|
267
|
+
* Creates a new digest object.
|
268
|
+
*
|
269
|
+
* +algorithm+::
|
270
|
+
* _optional_ The algorithm to use.
|
271
|
+
* Valid algorithms are:
|
272
|
+
* - :sha3_224
|
273
|
+
* - :sha3_256
|
274
|
+
* - :sha3_384
|
275
|
+
* - :sha3_512
|
276
|
+
* - :shake_128
|
277
|
+
* - :shake_256
|
278
|
+
*
|
279
|
+
* +message+::
|
280
|
+
* _optional_ The message to hash.
|
281
|
+
*
|
282
|
+
* = example
|
283
|
+
* SHA3::Digest.new(:sha3_256)
|
284
|
+
* SHA3::Digest.new(:shake_128, "initial data")
|
285
|
+
*/
|
286
|
+
static VALUE rb_sha3_digest_init(int argc, VALUE* argv, VALUE self) {
|
287
|
+
sha3_digest_context_t* context;
|
92
288
|
VALUE hlen, data;
|
93
289
|
|
94
290
|
rb_scan_args(argc, argv, "02", &hlen, &data);
|
95
|
-
|
291
|
+
get_sha3_digest_context(self, &context);
|
96
292
|
|
97
|
-
if (
|
98
|
-
|
99
|
-
|
100
|
-
}
|
101
|
-
|
102
|
-
{
|
103
|
-
mdx->hashbitlen = 256;
|
293
|
+
if (NIL_P(hlen)) {
|
294
|
+
context->algorithm = SHA3_256;
|
295
|
+
context->hashbitlen = 256;
|
296
|
+
} else {
|
297
|
+
context->hashbitlen = get_hashbit_length(hlen, &context->algorithm);
|
104
298
|
}
|
105
299
|
|
106
|
-
if (
|
107
|
-
|
108
|
-
rb_raise(eSHA3DigestError, "failed to initialize algorithm state");
|
300
|
+
if (keccak_hash_initialize(context) != KECCAK_SUCCESS) {
|
301
|
+
rb_raise(_sha3_digest_error_class, "failed to initialize algorithm state");
|
109
302
|
}
|
110
303
|
|
111
|
-
if (!NIL_P(data))
|
112
|
-
|
113
|
-
return c_digest_update(self, data);
|
304
|
+
if (!NIL_P(data)) {
|
305
|
+
return rb_sha3_digest_update(self, data);
|
114
306
|
}
|
115
307
|
|
116
308
|
return self;
|
117
309
|
}
|
118
310
|
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
311
|
+
/*
|
312
|
+
* :call-seq:
|
313
|
+
* update(string) -> digest
|
314
|
+
*
|
315
|
+
* Updates the digest with the given string.
|
316
|
+
*
|
317
|
+
* +string+::
|
318
|
+
* The string to update the digest with.
|
319
|
+
*
|
320
|
+
* = example
|
321
|
+
* digest.update("more data")
|
322
|
+
* digest << "more data" # alias for update
|
323
|
+
*/
|
324
|
+
static VALUE rb_sha3_digest_update(VALUE self, VALUE data) {
|
325
|
+
sha3_digest_context_t* context;
|
123
326
|
BitLength dlen;
|
124
327
|
|
125
328
|
StringValue(data);
|
126
|
-
|
329
|
+
get_sha3_digest_context(self, &context);
|
330
|
+
|
331
|
+
// Check for empty data
|
332
|
+
if (RSTRING_LEN(data) == 0) {
|
333
|
+
return self;
|
334
|
+
}
|
335
|
+
|
336
|
+
// Check for NULL data pointer
|
337
|
+
if (RSTRING_PTR(data) == NULL) {
|
338
|
+
rb_raise(_sha3_digest_error_class, "cannot update with NULL data");
|
339
|
+
}
|
127
340
|
|
128
341
|
dlen = (RSTRING_LEN(data) * 8);
|
129
342
|
|
130
|
-
if (Keccak_HashUpdate(
|
131
|
-
|
132
|
-
rb_raise(eSHA3DigestError, "failed to update hash data");
|
343
|
+
if (Keccak_HashUpdate(context->state, (BitSequence*)RSTRING_PTR(data), dlen) != KECCAK_SUCCESS) {
|
344
|
+
rb_raise(_sha3_digest_error_class, "failed to update hash data");
|
133
345
|
}
|
134
346
|
|
135
347
|
return self;
|
136
348
|
}
|
137
349
|
|
138
|
-
|
139
|
-
|
140
|
-
|
141
|
-
|
142
|
-
|
143
|
-
|
350
|
+
/*
|
351
|
+
* :call-seq:
|
352
|
+
* reset -> digest
|
353
|
+
*
|
354
|
+
* Resets the digest to its initial state.
|
355
|
+
*
|
356
|
+
* = example
|
357
|
+
* digest.reset
|
358
|
+
*/
|
359
|
+
static VALUE rb_sha3_digest_reset(VALUE self) {
|
360
|
+
sha3_digest_context_t* context;
|
361
|
+
get_sha3_digest_context(self, &context);
|
144
362
|
|
145
|
-
memset(
|
363
|
+
memset(context->state, 0, sizeof(Keccak_HashInstance));
|
146
364
|
|
147
|
-
if (
|
148
|
-
|
149
|
-
rb_raise(eSHA3DigestError, "failed to reset internal state");
|
365
|
+
if (keccak_hash_initialize(context) != KECCAK_SUCCESS) {
|
366
|
+
rb_raise(_sha3_digest_error_class, "failed to reset internal state");
|
150
367
|
}
|
151
368
|
|
152
369
|
return self;
|
153
370
|
}
|
154
371
|
|
155
|
-
static int
|
156
|
-
|
157
|
-
|
158
|
-
|
159
|
-
|
160
|
-
|
161
|
-
|
162
|
-
|
163
|
-
|
164
|
-
|
372
|
+
static int compare_contexts(const sha3_digest_context_t* context1, const sha3_digest_context_t* context2) {
|
373
|
+
// First check the hashbitlen and algorithm
|
374
|
+
if (context1->hashbitlen != context2->hashbitlen || context1->algorithm != context2->algorithm) {
|
375
|
+
return 0;
|
376
|
+
}
|
377
|
+
|
378
|
+
// Compare the internal state structure
|
379
|
+
if (memcmp(&(context1->state->sponge.state), &(context2->state->sponge.state),
|
380
|
+
sizeof(context1->state->sponge.state)) != 0) {
|
381
|
+
return 0;
|
382
|
+
}
|
383
|
+
|
384
|
+
// Compare sponge parameters
|
385
|
+
if ((context1->state->sponge.rate != context2->state->sponge.rate) ||
|
386
|
+
(context1->state->sponge.byteIOIndex != context2->state->sponge.byteIOIndex) ||
|
387
|
+
(context1->state->sponge.squeezing != context2->state->sponge.squeezing)) {
|
388
|
+
return 0;
|
389
|
+
}
|
390
|
+
|
391
|
+
// Compare hash-specific parameters
|
392
|
+
if ((context1->state->fixedOutputLength != context2->state->fixedOutputLength) ||
|
393
|
+
(context1->state->delimitedSuffix != context2->state->delimitedSuffix)) {
|
394
|
+
return 0;
|
395
|
+
}
|
396
|
+
|
397
|
+
// All comparisons passed
|
398
|
+
return 1;
|
165
399
|
}
|
166
400
|
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
401
|
+
/*
|
402
|
+
* :call-seq:
|
403
|
+
* initialize_copy(other) -> digest
|
404
|
+
*
|
405
|
+
* Initializes the digest with the state of another digest.
|
406
|
+
*
|
407
|
+
* +other+::
|
408
|
+
* The digest to copy the state from.
|
409
|
+
*
|
410
|
+
* = example
|
411
|
+
* new_digest = digest.dup
|
412
|
+
*/
|
413
|
+
static VALUE rb_sha3_digest_copy(VALUE self, VALUE other) {
|
414
|
+
sha3_digest_context_t* context;
|
415
|
+
sha3_digest_context_t* other_context;
|
171
416
|
|
172
417
|
rb_check_frozen(self);
|
173
|
-
if (self ==
|
174
|
-
{
|
418
|
+
if (self == other) {
|
175
419
|
return self;
|
176
420
|
}
|
177
421
|
|
178
|
-
|
179
|
-
|
422
|
+
if (!rb_obj_is_kind_of(other, _sha3_digest_class)) {
|
423
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(other),
|
424
|
+
rb_class2name(_sha3_digest_class));
|
425
|
+
}
|
180
426
|
|
181
|
-
|
182
|
-
|
427
|
+
safe_get_sha3_digest_context(other, &other_context);
|
428
|
+
get_sha3_digest_context(self, &context);
|
183
429
|
|
184
|
-
|
185
|
-
|
186
|
-
|
430
|
+
context->hashbitlen = other_context->hashbitlen;
|
431
|
+
context->algorithm = other_context->algorithm;
|
432
|
+
memcpy(context->state, other_context->state, sizeof(Keccak_HashInstance));
|
187
433
|
|
188
|
-
if (!
|
189
|
-
|
190
|
-
rb_raise(eSHA3DigestError, "failed to copy state");
|
434
|
+
if (!compare_contexts(context, other_context)) {
|
435
|
+
rb_raise(_sha3_digest_error_class, "failed to copy state");
|
191
436
|
}
|
192
437
|
|
193
438
|
return self;
|
194
439
|
}
|
195
440
|
|
196
|
-
|
197
|
-
|
198
|
-
|
199
|
-
|
200
|
-
|
441
|
+
/*
|
442
|
+
* :call-seq:
|
443
|
+
* length -> Integer
|
444
|
+
*
|
445
|
+
* Returns the length of the digest in bytes.
|
446
|
+
*
|
447
|
+
* = example
|
448
|
+
* digest.length #=> 32 for SHA3-256
|
449
|
+
*/
|
450
|
+
static VALUE rb_sha3_digest_length(VALUE self) {
|
451
|
+
sha3_digest_context_t* context;
|
452
|
+
get_sha3_digest_context(self, &context);
|
201
453
|
|
202
|
-
return ULL2NUM(
|
454
|
+
return ULL2NUM(context->hashbitlen / 8);
|
203
455
|
}
|
204
456
|
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
|
457
|
+
/*
|
458
|
+
* :call-seq:
|
459
|
+
* block_length -> Integer
|
460
|
+
*
|
461
|
+
* Returns the block length of the algorithm in bytes.
|
462
|
+
*
|
463
|
+
* = example
|
464
|
+
* digest.block_length
|
465
|
+
*/
|
466
|
+
static VALUE rb_sha3_digest_block_length(VALUE self) {
|
467
|
+
sha3_digest_context_t* context;
|
468
|
+
get_sha3_digest_context(self, &context);
|
210
469
|
|
211
|
-
return ULL2NUM(200 - (2 * (
|
470
|
+
return ULL2NUM(200 - (2 * (context->hashbitlen / 8)));
|
212
471
|
}
|
213
472
|
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
|
473
|
+
/*
|
474
|
+
* :call-seq:
|
475
|
+
* name -> String
|
476
|
+
*
|
477
|
+
* Returns the name of the algorithm.
|
478
|
+
*
|
479
|
+
* = example
|
480
|
+
* digest.name #=> "SHA3-256"
|
481
|
+
*/
|
482
|
+
static VALUE rb_sha3_digest_name(VALUE self) {
|
483
|
+
sha3_digest_context_t* context;
|
484
|
+
get_sha3_digest_context(self, &context);
|
485
|
+
|
486
|
+
switch (context->algorithm) {
|
487
|
+
case SHA3_224:
|
488
|
+
return rb_str_new2("SHA3-224");
|
489
|
+
case SHA3_256:
|
490
|
+
return rb_str_new2("SHA3-256");
|
491
|
+
case SHA3_384:
|
492
|
+
return rb_str_new2("SHA3-384");
|
493
|
+
case SHA3_512:
|
494
|
+
return rb_str_new2("SHA3-512");
|
495
|
+
case SHAKE_128:
|
496
|
+
return rb_str_new2("SHAKE128");
|
497
|
+
case SHAKE_256:
|
498
|
+
return rb_str_new2("SHAKE256");
|
499
|
+
default:
|
500
|
+
rb_raise(_sha3_digest_error_class, "unknown algorithm");
|
501
|
+
}
|
218
502
|
}
|
219
503
|
|
220
|
-
|
221
|
-
|
222
|
-
|
223
|
-
|
504
|
+
/*
|
505
|
+
* :call-seq:
|
506
|
+
* finish([message]) -> String
|
507
|
+
*
|
508
|
+
* Returns the final digest as a binary string.
|
509
|
+
*
|
510
|
+
* +message+::
|
511
|
+
* _optional_ Update state with additional data before finalizing.
|
512
|
+
*
|
513
|
+
* = example
|
514
|
+
* digest.finish
|
515
|
+
* digest.finish("final chunk")
|
516
|
+
*/
|
517
|
+
static VALUE rb_sha3_digest_finish(int argc, VALUE* argv, VALUE self) {
|
518
|
+
sha3_digest_context_t* context;
|
224
519
|
VALUE str;
|
520
|
+
int digest_bytes;
|
225
521
|
|
226
522
|
rb_scan_args(argc, argv, "01", &str);
|
227
|
-
|
523
|
+
get_sha3_digest_context(self, &context);
|
228
524
|
|
229
|
-
|
230
|
-
|
231
|
-
|
232
|
-
|
233
|
-
|
234
|
-
|
525
|
+
// For both SHA3 and SHAKE algorithms, use the security strength (hashbitlen)
|
526
|
+
// as the default output length
|
527
|
+
digest_bytes = context->hashbitlen / 8;
|
528
|
+
|
529
|
+
if (NIL_P(str)) {
|
530
|
+
str = rb_str_new(0, digest_bytes);
|
531
|
+
} else {
|
235
532
|
StringValue(str);
|
236
|
-
rb_str_resize(str,
|
533
|
+
rb_str_resize(str, digest_bytes);
|
237
534
|
}
|
238
535
|
|
239
|
-
if (Keccak_HashFinal(
|
240
|
-
|
241
|
-
rb_raise(eSHA3DigestError, "failed to finalize digest");
|
536
|
+
if (Keccak_HashFinal(context->state, (BitSequence*)RSTRING_PTR(str)) != KECCAK_SUCCESS) {
|
537
|
+
rb_raise(_sha3_digest_error_class, "failed to finalize digest");
|
242
538
|
}
|
243
539
|
|
244
540
|
return str;
|
245
541
|
}
|
246
542
|
|
247
|
-
|
248
|
-
|
249
|
-
|
543
|
+
/*
|
544
|
+
* :call-seq:
|
545
|
+
* squeeze(length) -> String
|
546
|
+
*
|
547
|
+
* Returns the squeezed output as a binary string. Only available for SHAKE algorithms.
|
548
|
+
* This method creates a copy of the current instance to preserve the original state.
|
549
|
+
*
|
550
|
+
* +length+::
|
551
|
+
* The length in bytes of the output to squeeze.
|
552
|
+
*
|
553
|
+
* = example
|
554
|
+
* digest.squeeze(32) # Get 32 bytes of output
|
555
|
+
*/
|
556
|
+
static VALUE rb_sha3_digest_squeeze(VALUE self, VALUE length) {
|
557
|
+
sha3_digest_context_t* context;
|
558
|
+
VALUE str, copy;
|
559
|
+
int output_bytes;
|
560
|
+
|
561
|
+
Check_Type(length, T_FIXNUM);
|
562
|
+
output_bytes = NUM2INT(length);
|
563
|
+
|
564
|
+
if (output_bytes <= 0) {
|
565
|
+
rb_raise(_sha3_digest_error_class, "output length must be positive");
|
566
|
+
}
|
567
|
+
|
568
|
+
get_sha3_digest_context(self, &context);
|
569
|
+
|
570
|
+
// Only SHAKE algorithms support arbitrary-length output
|
571
|
+
if (context->algorithm != SHAKE_128 && context->algorithm != SHAKE_256) {
|
572
|
+
rb_raise(_sha3_digest_error_class, "squeeze is only supported for SHAKE algorithms");
|
573
|
+
}
|
574
|
+
|
575
|
+
// Create a copy of the digest object to avoid modifying the original
|
576
|
+
copy = rb_obj_clone(self);
|
577
|
+
|
578
|
+
// Get the sha3_digest_context_t struct from the copy
|
579
|
+
sha3_digest_context_t* context_copy;
|
580
|
+
get_sha3_digest_context(copy, &context_copy);
|
581
|
+
|
582
|
+
str = rb_str_new(0, output_bytes);
|
583
|
+
|
584
|
+
// Finalize the hash on the copy
|
585
|
+
if (Keccak_HashFinal(context_copy->state, NULL) != KECCAK_SUCCESS) {
|
586
|
+
rb_raise(_sha3_digest_error_class, "failed to finalize digest");
|
587
|
+
}
|
588
|
+
|
589
|
+
// Then squeeze out the desired number of bytes
|
590
|
+
if (Keccak_HashSqueeze(context_copy->state, (BitSequence*)RSTRING_PTR(str), output_bytes * 8) != KECCAK_SUCCESS) {
|
591
|
+
rb_raise(_sha3_digest_error_class, "failed to squeeze output");
|
592
|
+
}
|
593
|
+
|
594
|
+
return str;
|
595
|
+
}
|
596
|
+
|
597
|
+
/*
|
598
|
+
* :call-seq:
|
599
|
+
* hex_squeeze(length) -> String
|
600
|
+
*
|
601
|
+
* Returns the hexadecimal representation of the squeezed output. Only available for SHAKE
|
602
|
+
* algorithms.
|
603
|
+
*
|
604
|
+
* +length+::
|
605
|
+
* The length in bytes of the output to squeeze.
|
606
|
+
*
|
607
|
+
* = example
|
608
|
+
* digest.hex_squeeze(32) # Get 64 hex characters (32 bytes)
|
609
|
+
*/
|
610
|
+
static VALUE rb_sha3_digest_hex_squeeze(VALUE self, VALUE length) {
|
611
|
+
// Get the binary output using the existing squeeze function
|
612
|
+
VALUE bin_str = rb_sha3_digest_squeeze(self, length);
|
613
|
+
// Use Ruby's built-in unpack method to convert to hex
|
614
|
+
return rb_funcall(bin_str, rb_intern("unpack1"), 1, rb_str_new2("H*"));
|
615
|
+
}
|
616
|
+
|
617
|
+
/*
|
618
|
+
* :call-seq:
|
619
|
+
* digest() -> string
|
620
|
+
* digest([data]) -> string
|
621
|
+
* digest(length) -> string
|
622
|
+
* digest(length, data) -> string
|
623
|
+
*
|
624
|
+
* Returns the binary representation of the digest.
|
625
|
+
*
|
626
|
+
* +length+::
|
627
|
+
* The length of the output to squeeze when using SHAKE algorithms.
|
628
|
+
* This parameter is required for SHAKE algorithms.
|
629
|
+
*
|
630
|
+
* +data+::
|
631
|
+
* _optional_ Update state with additional data before returning digest.
|
632
|
+
*
|
633
|
+
* = example
|
634
|
+
* digest.digest()
|
635
|
+
* digest.digest('compute me')
|
636
|
+
* digest.digest(12) # For SHAKE algorithms
|
637
|
+
* digest.digest(12, 'compute me') # For SHAKE algorithms
|
638
|
+
*/
|
639
|
+
static VALUE rb_sha3_digest_digest(int argc, VALUE* argv, VALUE self) {
|
640
|
+
sha3_digest_context_t* context;
|
641
|
+
get_sha3_digest_context(self, &context);
|
642
|
+
|
643
|
+
if (context->algorithm != SHAKE_128 && context->algorithm != SHAKE_256) {
|
644
|
+
return rb_call_super(argc, argv);
|
645
|
+
}
|
646
|
+
|
647
|
+
VALUE length, data;
|
648
|
+
rb_scan_args(argc, argv, "02", &length, &data);
|
649
|
+
|
650
|
+
// For SHAKE algorithms
|
651
|
+
if (NIL_P(length)) {
|
652
|
+
rb_raise(_sha3_digest_error_class, "output length must be specified for SHAKE algorithms");
|
653
|
+
}
|
654
|
+
|
655
|
+
// Add type checking for length
|
656
|
+
Check_Type(length, T_FIXNUM);
|
657
|
+
|
658
|
+
// If data is provided, update the state before squeezing
|
659
|
+
if (!NIL_P(data)) {
|
660
|
+
rb_sha3_digest_update(self, data);
|
661
|
+
}
|
662
|
+
|
663
|
+
return rb_sha3_digest_squeeze(self, length);
|
664
|
+
}
|
665
|
+
|
666
|
+
/*
|
667
|
+
* :call-seq:
|
668
|
+
* hexdigest() -> string
|
669
|
+
* hexdigest([data]) -> string
|
670
|
+
* hexdigest(length) -> string
|
671
|
+
* hexdigest(length, data) -> string
|
672
|
+
*
|
673
|
+
* Returns the hexadecimal representation of the digest.
|
674
|
+
*
|
675
|
+
* +length+::
|
676
|
+
* The length of the output to squeeze when using SHAKE algorithms.
|
677
|
+
* This parameter is required for SHAKE algorithms.
|
678
|
+
*
|
679
|
+
* +data+::
|
680
|
+
* _optional_ Update state with additional data before returning digest.
|
681
|
+
*
|
682
|
+
* = example
|
683
|
+
* digest.hexdigest()
|
684
|
+
* digest.hexdigest('compute me')
|
685
|
+
* digest.hexdigest(12) # For SHAKE algorithms
|
686
|
+
* digest.hexdigest(12, 'compute me') # For SHAKE algorithms
|
687
|
+
*/
|
688
|
+
static VALUE rb_sha3_digest_hexdigest(int argc, VALUE* argv, VALUE self) {
|
689
|
+
sha3_digest_context_t* context;
|
690
|
+
get_sha3_digest_context(self, &context);
|
691
|
+
|
692
|
+
if (context->algorithm != SHAKE_128 && context->algorithm != SHAKE_256) {
|
693
|
+
return rb_call_super(argc, argv);
|
694
|
+
}
|
695
|
+
|
696
|
+
VALUE length, data;
|
697
|
+
rb_scan_args(argc, argv, "02", &length, &data);
|
698
|
+
|
699
|
+
if (NIL_P(length)) {
|
700
|
+
rb_raise(_sha3_digest_error_class, "output length must be specified for SHAKE algorithms");
|
701
|
+
}
|
702
|
+
|
703
|
+
// Add type checking for length
|
704
|
+
Check_Type(length, T_FIXNUM);
|
705
|
+
|
706
|
+
// If data is provided, update the state before squeezing
|
707
|
+
if (!NIL_P(data)) {
|
708
|
+
rb_sha3_digest_update(self, data);
|
709
|
+
}
|
710
|
+
|
711
|
+
return rb_sha3_digest_hex_squeeze(self, length);
|
712
|
+
}
|
713
|
+
|
714
|
+
/*
|
715
|
+
* :call-seq:
|
716
|
+
* SHA3::Digest.digest(name, data) -> string
|
717
|
+
*
|
718
|
+
* Returns the binary digest of the given +data+ using the algorithm specified by +name+.
|
719
|
+
*
|
720
|
+
* +name+::
|
721
|
+
* The hash algorithm to use (as a Symbol).
|
722
|
+
* Valid algorithms are:
|
723
|
+
* - :sha3_224
|
724
|
+
* - :sha3_256
|
725
|
+
* - :sha3_384
|
726
|
+
* - :sha3_512
|
727
|
+
* - :shake_128
|
728
|
+
* - :shake_256
|
729
|
+
*
|
730
|
+
* +data+::
|
731
|
+
* The data to hash.
|
732
|
+
*
|
733
|
+
* = example
|
734
|
+
* SHA3::Digest.digest(:sha3_256, "data to hash")
|
735
|
+
*
|
736
|
+
* = note
|
737
|
+
* This method defaults to squeezing 16 bytes for SHAKE128 and 32 bytes for SHAKE256.
|
738
|
+
* To squeeze a different length, use #squeeze instance method.
|
739
|
+
*/
|
740
|
+
static VALUE rb_sha3_digest_self_digest(VALUE klass, VALUE name, VALUE data) {
|
741
|
+
VALUE args[2];
|
742
|
+
|
743
|
+
// Need to add type checking for the data parameter
|
744
|
+
StringValue(data);
|
745
|
+
|
746
|
+
/* For SHAKE algorithms, we need to handle them differently */
|
747
|
+
if (TYPE(name) == T_SYMBOL) {
|
748
|
+
ID symid = SYM2ID(name);
|
749
|
+
if (symid == _shake_128_id || symid == _shake_256_id) {
|
750
|
+
/* Create a new digest instance with the specified algorithm */
|
751
|
+
VALUE digest = rb_class_new_instance(1, &name, klass);
|
752
|
+
|
753
|
+
/* Update it with the data */
|
754
|
+
rb_sha3_digest_update(digest, data);
|
755
|
+
|
756
|
+
/* For SHAKE algorithms, use a default output length based on the security strength */
|
757
|
+
int output_length = (symid == _shake_128_id) ? 16 : 32; /* 128/8 or 256/8 */
|
758
|
+
|
759
|
+
/* Return the squeezed output */
|
760
|
+
return rb_sha3_digest_squeeze(digest, INT2NUM(output_length));
|
761
|
+
}
|
762
|
+
}
|
763
|
+
|
764
|
+
/* Call the superclass method with arguments in reverse order */
|
765
|
+
args[0] = data;
|
766
|
+
args[1] = name;
|
767
|
+
|
768
|
+
return rb_call_super(2, args);
|
769
|
+
}
|
770
|
+
|
771
|
+
/*
|
772
|
+
* :call-seq:
|
773
|
+
* SHA3::Digest.hexdigest(name, data) -> string
|
774
|
+
*
|
775
|
+
* Returns the hexadecimal representation of the given +data+ using the algorithm specified by
|
776
|
+
* +name+.
|
777
|
+
*
|
778
|
+
* +name+::
|
779
|
+
* The hash algorithm to use (as a Symbol).
|
780
|
+
* Valid algorithms are:
|
781
|
+
* - :sha3_224
|
782
|
+
* - :sha3_256
|
783
|
+
* - :sha3_384
|
784
|
+
* - :sha3_512
|
785
|
+
* - :shake_128
|
786
|
+
* - :shake_256
|
787
|
+
*
|
788
|
+
* +data+::
|
789
|
+
* The data to hash.
|
790
|
+
*
|
791
|
+
* = example
|
792
|
+
* SHA3::Digest.hexdigest(:sha3_256, "data to hash")
|
793
|
+
*
|
794
|
+
* = note
|
795
|
+
* This method defaults to squeezing 16 bytes for SHAKE128 and 32 bytes for SHAKE256.
|
796
|
+
* To squeeze a different length, use #hex_squeeze instance method.
|
797
|
+
*/
|
798
|
+
static VALUE rb_sha3_digest_self_hexdigest(VALUE klass, VALUE name, VALUE data) {
|
799
|
+
VALUE args[2];
|
800
|
+
|
801
|
+
// Need to add type checking for the data parameter
|
802
|
+
StringValue(data);
|
803
|
+
|
804
|
+
/* For SHAKE algorithms, we need to handle them differently */
|
805
|
+
if (TYPE(name) == T_SYMBOL) {
|
806
|
+
ID symid = SYM2ID(name);
|
807
|
+
if (symid == _shake_128_id || symid == _shake_256_id) {
|
808
|
+
/* Create a new digest instance with the specified algorithm */
|
809
|
+
VALUE digest = rb_class_new_instance(1, &name, klass);
|
810
|
+
|
811
|
+
/* Update it with the data */
|
812
|
+
rb_sha3_digest_update(digest, data);
|
813
|
+
|
814
|
+
/* For SHAKE algorithms, use a default output length based on the security strength */
|
815
|
+
int output_length = (symid == _shake_128_id) ? 16 : 32; /* 128/8 or 256/8 */
|
816
|
+
|
817
|
+
/* Return the hexadecimal representation of the squeezed output */
|
818
|
+
return rb_sha3_digest_hex_squeeze(digest, INT2NUM(output_length));
|
819
|
+
}
|
820
|
+
}
|
821
|
+
|
822
|
+
/* Call the superclass method with arguments in reverse order */
|
823
|
+
args[0] = data;
|
824
|
+
args[1] = name;
|
250
825
|
|
251
|
-
|
252
|
-
cSHA3Digest = rb_define_class_under(mSHA3, "Digest", rb_path2class("Digest::Class"));
|
253
|
-
/* SHA3::Digest::DigestError (class) */
|
254
|
-
eSHA3DigestError = rb_define_class_under(cSHA3Digest, "DigestError", rb_eStandardError);
|
255
|
-
|
256
|
-
// SHA3::Digest (class) methods
|
257
|
-
rb_define_alloc_func(cSHA3Digest, c_digest_alloc);
|
258
|
-
rb_define_method(cSHA3Digest, "initialize", c_digest_init, -1);
|
259
|
-
rb_define_method(cSHA3Digest, "update", c_digest_update, 1);
|
260
|
-
rb_define_method(cSHA3Digest, "reset", c_digest_reset, 0);
|
261
|
-
rb_define_method(cSHA3Digest, "initialize_copy", c_digest_copy, 1);
|
262
|
-
rb_define_method(cSHA3Digest, "digest_length", c_digest_length, 0);
|
263
|
-
rb_define_method(cSHA3Digest, "block_length", c_digest_block_length, 0);
|
264
|
-
rb_define_method(cSHA3Digest, "name", c_digest_name, 0);
|
265
|
-
rb_define_private_method(cSHA3Digest, "finish", c_digest_finish, -1);
|
266
|
-
|
267
|
-
rb_define_alias(cSHA3Digest, "<<", "update");
|
268
|
-
|
269
|
-
return;
|
826
|
+
return rb_call_super(2, args);
|
270
827
|
}
|