sha3 1.0.5 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/.clang-format +54 -0
  4. data/.document +3 -3
  5. data/.rdoc_options +11 -0
  6. data/.rspec +2 -2
  7. data/.rubocop.yml +8 -1
  8. data/CHANGELOG.md +23 -0
  9. data/Gemfile +12 -0
  10. data/LICENSE.txt +1 -1
  11. data/README.md +185 -65
  12. data/Rakefile +12 -4
  13. data/certs/io+sha3@jsg.io.pem +26 -0
  14. data/doc/sha3.rb +83 -0
  15. data/ext/sha3/config.h +2 -2
  16. data/ext/sha3/digest.c +726 -169
  17. data/ext/sha3/digest.h +6 -35
  18. data/ext/sha3/extconf.rb +42 -38
  19. data/ext/sha3/kmac.c +504 -0
  20. data/ext/sha3/kmac.h +14 -0
  21. data/ext/sha3/lib/high/Keccak/KeccakDuplex.c +81 -0
  22. data/ext/sha3/lib/high/Keccak/KeccakDuplex.h +73 -0
  23. data/ext/sha3/lib/high/Keccak/KeccakDuplex.inc +201 -0
  24. data/ext/sha3/lib/high/Keccak/KeccakSponge.c +2 -18
  25. data/ext/sha3/lib/high/Keccak/KeccakSponge.h +4 -10
  26. data/ext/sha3/lib/high/Keccak/KeccakSponge.inc +27 -31
  27. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.c +61 -0
  28. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.h +67 -0
  29. data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.inc +128 -0
  30. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.c +93 -0
  31. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.h +599 -0
  32. data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.inc +573 -0
  33. data/ext/sha3/lib/high/common/Phases.h +25 -0
  34. data/ext/sha3/lib/low/KeccakP-1600/common/KeccakP-1600-64.macros +19 -9
  35. data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-SnP.h +18 -12
  36. data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference32BI.c +28 -36
  37. data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-SnP.h +18 -12
  38. data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.c +28 -59
  39. data/ext/sha3/lib/low/common/PlSnP-Fallback.inc +291 -0
  40. data/ext/sha3/lib/low/common/SnP-Relaned.h +145 -0
  41. data/ext/sha3/sha3.c +28 -59
  42. data/ext/sha3/sha3.h +4 -13
  43. data/lib/constants.rb +5 -0
  44. data/lib/sha3.rb +25 -24
  45. data.tar.gz.sig +0 -0
  46. metadata +61 -127
  47. metadata.gz.sig +0 -0
  48. data/.yardopts +0 -1
  49. data/ChangeLog.rdoc +0 -27
  50. data/certs/johanns.pem +0 -25
  51. data/lib/sha3/doc.rb +0 -121
  52. data/lib/sha3/version.rb +0 -9
  53. data/sha3.gemspec +0 -54
  54. data/tests.sh +0 -29
data/ext/sha3/digest.h CHANGED
@@ -1,45 +1,16 @@
1
- /* Copyright (c) 2012 - 2013 Johanns Gregorian <io+sha3@jsani.com> */
1
+ // Copyright (c) 2012 - 2025 Johanns Gregorian <io+sha3@jsg.io>
2
2
 
3
3
  #ifndef _DIGEST_H_
4
4
  #define _DIGEST_H_
5
5
 
6
+ #include <ruby.h>
7
+ #include <ruby/encoding.h>
8
+
6
9
  #ifdef __cplusplus
7
- extern "C"
8
- {
10
+ extern "C" {
9
11
  #endif
10
12
 
11
- // From ruby/ext/openssl/ossl_digest.c
12
- #define GETMDX(obj, mdx) \
13
- do \
14
- { \
15
- Data_Get_Struct((obj), MDX, (mdx)); \
16
- if (!(mdx)) \
17
- { \
18
- rb_raise(rb_eRuntimeError, "Digest data not initialized!"); \
19
- } \
20
- } while (0)
21
-
22
- #define SAFEGETMDX(obj, mdx) \
23
- do \
24
- { \
25
- if (!rb_obj_is_kind_of(obj, cSHA3Digest)) \
26
- { \
27
- rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", \
28
- rb_obj_classname(obj), rb_class2name(cSHA3Digest)); \
29
- } \
30
- GETMDX(obj, mdx); \
31
- } while (0)
32
-
33
- extern VALUE cSHA3Digest;
34
- extern VALUE eSHA3DigestError;
35
-
36
- typedef struct
37
- {
38
- Keccak_HashInstance *state;
39
- int hashbitlen;
40
- } MDX;
41
-
42
- void Init_sha3_n_digest(void);
13
+ extern void Init_sha3_digest(void);
43
14
 
44
15
  #ifdef __cplusplus
45
16
  }
data/ext/sha3/extconf.rb CHANGED
@@ -3,48 +3,52 @@
3
3
  require 'mkmf'
4
4
  require 'rbconfig'
5
5
 
6
- # Maintaining XKCP lib directory structure to hopefully simplify
7
- # future upgrades.
6
+ b64 = 8.size == 8
7
+ extension_name = 'sha3_ext'
8
+ ref_dir = b64 ? 'ref-64bits' : 'ref-32bits'
8
9
 
9
- keccak_base_files = [
10
- 'lib/high/Keccak/KeccakSponge.c',
11
- 'lib/high/Keccak/FIPS202/KeccakHash.c'
12
- ]
10
+ dir_config(extension_name)
13
11
 
14
- if 1.size == 8
15
- Logging.message "=== Using 64-bit reference ===\n"
12
+ # Set compiler flags
13
+ $CFLAGS << ' -fomit-frame-pointer -O3 -g0 -fms-extensions'
16
14
 
17
- keccak_base_files << 'lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.c'
18
- else
19
- Logging.message "=== Using 32-bit reference ===\n"
15
+ # Add architecture-specific optimizations if enabled
16
+ $CFLAGS << ' -march=native' if enable_config('march-tune-native', false)
20
17
 
21
- keccak_base_files << 'lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference32BI.c'
22
- end
18
+ # Add security hardening flags
19
+ $CFLAGS << ' -D_FORTIFY_SOURCE=2 -fstack-protector-strong'
23
20
 
24
- FileUtils.cp keccak_base_files.map { |f| "#{$srcdir}/#{f}" }, $srcdir
21
+ # Add warning flags to catch potential issues
22
+ $CFLAGS << ' -Wall -Wextra -Wformat -Wformat-security'
25
23
 
26
- extension_name = 'sha3_n'
27
- dir_config(extension_name)
24
+ # Add vectorization flags for better performance on supported platforms
25
+ $CFLAGS << ' -ftree-vectorize' if RUBY_PLATFORM =~ /x86_64|amd64|arm64/
26
+
27
+ # Find all relevant subdirectories and filter appropriately
28
+ vpath_dirs = Dir.glob("#{$srcdir}/lib/**/*")
29
+ .select { |path| File.directory?(path) }
30
+ .select { |dir| !dir.include?('KeccakP-1600/ref-') || dir.include?(ref_dir) }
31
+
32
+ # Process directory paths for both VPATH and INCFLAGS
33
+ vpath_dirs_processed = vpath_dirs.map { |dir| dir.sub($srcdir, '') }
34
+
35
+ # Add source directories to VPATH
36
+ $VPATH << vpath_dirs_processed
37
+ .map { |dir| "$(srcdir)#{dir}" }
38
+ .join(File::PATH_SEPARATOR)
39
+
40
+ # Add include flags
41
+ $INCFLAGS << vpath_dirs_processed
42
+ .map { |dir| " -I$(srcdir)#{dir}" }
43
+ .join
44
+
45
+ # Base source files
46
+ $srcs = ['digest.c', 'kmac.c', 'sha3.c']
47
+
48
+ # Find and add all .c files from the filtered directories
49
+ $srcs += vpath_dirs
50
+ .flat_map { |dir| Dir.glob("#{dir}/*.c") }
51
+ .map { |file| File.basename(file) }
52
+ .uniq
28
53
 
29
- $INCFLAGS << [
30
- ' -I$(src) ',
31
- ' -I$(srcdir)lib/ ',
32
- ' -I$(srcdir)/lib/common ',
33
- ' -I$(srcdir)/lib/high/Keccak ',
34
- ' -I$(srcdir)/lib/high/Keccak/FIPS202 ',
35
- ' -I$(srcdir)/lib/low/KeccakP-1600/common ',
36
- ' -I$(srcdir)/lib/low/KeccakP-1600/ref-32bits ',
37
- ' -I$(srcdir)/lib/low/KeccakP-1600/ref-64bits '
38
- ].join
39
-
40
- $CFLAGS << ' -fomit-frame-pointer -O3 -g0 -fms-extensions '
41
- $CFLAGS << ' -march=native ' if enable_config('march-tune-native', false)
42
-
43
- find_header('sha3.h')
44
- find_header('digest.h')
45
- find_header('align.h')
46
- find_header('brg_endian.h')
47
- find_header('KeccakSponge.h')
48
- find_header('KeccakHash.h')
49
-
50
- create_makefile extension_name
54
+ create_makefile(extension_name)
data/ext/sha3/kmac.c ADDED
@@ -0,0 +1,504 @@
1
+ #include "kmac.h"
2
+
3
+ #include "KeccakHash.h"
4
+ #include "SP800-185.h"
5
+ #include "sha3.h"
6
+
7
+ // SHA3::KMAC.new(algorithm, output_length, key, customization)
8
+ // SHA3::KMAC128.new(output_length, key, customization)
9
+ // SHA3::KMAC256.new(output_length, key, customization)
10
+ // kmac.update
11
+ // kmac.digest | kmac.hexdigest
12
+
13
+ /*** Types and structs ***/
14
+
15
+ typedef enum { KMAC_128 = 0, KMAC_256 } sha3_kmac_algorithms;
16
+
17
+ typedef struct {
18
+ KMAC_Instance* state;
19
+ sha3_kmac_algorithms algorithm;
20
+
21
+ size_t output_length;
22
+ } sha3_kmac_context_t;
23
+
24
+ /*** Function prototypes ***/
25
+
26
+ static int compare_contexts(const sha3_kmac_context_t*, const sha3_kmac_context_t*);
27
+ static void sha3_kmac_free_context(void*);
28
+ static size_t sha3_kmac_context_size(const void*);
29
+
30
+ /* Allocation and initialization */
31
+ static VALUE rb_sha3_kmac_alloc(VALUE);
32
+ static VALUE rb_sha3_kmac_init(int, VALUE*, VALUE);
33
+ static VALUE rb_sha3_kmac_copy(VALUE, VALUE);
34
+
35
+ /* Core digest operations */
36
+ static VALUE rb_sha3_kmac_finish(int, VALUE*, VALUE);
37
+ static VALUE rb_sha3_kmac_update(VALUE, VALUE);
38
+
39
+ /* Digest properties */
40
+ static VALUE rb_sha3_kmac_name(VALUE);
41
+
42
+ /* Output methods */
43
+ static VALUE rb_sha3_kmac_digest(int, VALUE*, VALUE);
44
+ static VALUE rb_sha3_kmac_hexdigest(int, VALUE*, VALUE);
45
+ static VALUE rb_sha3_kmac_self_digest(int, VALUE*, VALUE);
46
+ static VALUE rb_sha3_kmac_self_hexdigest(int, VALUE*, VALUE);
47
+
48
+ /*** Global variables ***/
49
+
50
+ VALUE _sha3_kmac_class;
51
+ VALUE _sha3_kmac_error_class;
52
+
53
+ /* Define the ID variables */
54
+ static ID _kmac_128_id;
55
+ static ID _kmac_256_id;
56
+
57
+ /* TypedData structure for sha3_kmac_context_t */
58
+ const rb_data_type_t sha3_kmac_data_type_t = {"SHA3::KMAC",
59
+ {
60
+ NULL,
61
+ sha3_kmac_free_context,
62
+ sha3_kmac_context_size,
63
+ },
64
+ NULL,
65
+ NULL,
66
+ RUBY_TYPED_FREE_IMMEDIATELY};
67
+
68
+ void Init_sha3_kmac(void) {
69
+ _kmac_128_id = rb_intern("kmac_128");
70
+ _kmac_256_id = rb_intern("kmac_256");
71
+
72
+ if (NIL_P(_sha3_module)) {
73
+ _sha3_module = rb_define_module("SHA3");
74
+ }
75
+
76
+ /*
77
+ * Document-class: SHA3::KMAC
78
+ *
79
+ * It is a subclass of the Digest::Class class, which provides a framework for
80
+ * creating and manipulating hash digests.
81
+ */
82
+ _sha3_kmac_class = rb_define_class_under(_sha3_module, "KMAC", rb_cObject);
83
+
84
+ /*
85
+ * Document-class: SHA3::KMAC::KMACError
86
+ *
87
+ * All KMAC methods raise this exception on error.
88
+ *
89
+ * It is a subclass of the StandardError class -- see the Ruby documentation
90
+ * for more information.
91
+ */
92
+ _sha3_kmac_error_class = rb_define_class_under(_sha3_kmac_class, "KMACError", rb_eStandardError);
93
+
94
+ rb_define_alloc_func(_sha3_kmac_class, rb_sha3_kmac_alloc);
95
+ rb_define_method(_sha3_kmac_class, "initialize", rb_sha3_kmac_init, -1);
96
+ rb_define_method(_sha3_kmac_class, "initialize_copy", rb_sha3_kmac_copy, 1);
97
+ rb_define_method(_sha3_kmac_class, "update", rb_sha3_kmac_update, 1);
98
+ rb_define_method(_sha3_kmac_class, "name", rb_sha3_kmac_name, 0);
99
+
100
+ rb_define_method(_sha3_kmac_class, "digest", rb_sha3_kmac_digest, -1);
101
+ rb_define_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_hexdigest, -1);
102
+
103
+ rb_define_private_method(_sha3_kmac_class, "finish", rb_sha3_kmac_finish, -1);
104
+
105
+ rb_define_alias(_sha3_kmac_class, "<<", "update");
106
+
107
+ rb_define_singleton_method(_sha3_kmac_class, "digest", rb_sha3_kmac_self_digest, -1);
108
+ rb_define_singleton_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_self_hexdigest, -1);
109
+
110
+ return;
111
+ }
112
+
113
+ static int compare_contexts(const sha3_kmac_context_t* context1, const sha3_kmac_context_t* context2) {
114
+ // First check the algorithm
115
+ if (context1->algorithm != context2->algorithm) {
116
+ return 0;
117
+ }
118
+
119
+ // Compare the internal state structure
120
+ if (memcmp(context1->state, context2->state, sizeof(KMAC_Instance)) != 0) {
121
+ return 0;
122
+ }
123
+
124
+ // All comparisons passed
125
+ return 1;
126
+ }
127
+
128
+ static inline void get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
129
+ TypedData_Get_Struct((obj), sha3_kmac_context_t, &sha3_kmac_data_type_t, (*context));
130
+ if (!(*context)) {
131
+ rb_raise(rb_eRuntimeError, "KMAC data not initialized!");
132
+ }
133
+ }
134
+
135
+ static inline void safe_get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
136
+ if (!rb_obj_is_kind_of(obj, _sha3_kmac_class)) {
137
+ rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(obj),
138
+ rb_class2name(_sha3_kmac_class));
139
+ }
140
+ get_sha3_kmac_context(obj, context);
141
+ }
142
+
143
+ static void sha3_kmac_free_context(void* ptr) {
144
+ sha3_kmac_context_t* context = (sha3_kmac_context_t*)ptr;
145
+ if (context) {
146
+ if (context->state) {
147
+ free(context->state);
148
+ }
149
+ free(context);
150
+ }
151
+ }
152
+
153
+ static size_t sha3_kmac_context_size(const void* ptr) {
154
+ const sha3_kmac_context_t* context = (const sha3_kmac_context_t*)ptr;
155
+ size_t size = sizeof(sha3_kmac_context_t);
156
+
157
+ if (context && context->state) {
158
+ size += sizeof(KMAC_Instance);
159
+ }
160
+
161
+ return size;
162
+ }
163
+
164
+ static VALUE rb_sha3_kmac_alloc(VALUE klass) {
165
+ sha3_kmac_context_t* context = (sha3_kmac_context_t*)malloc(sizeof(sha3_kmac_context_t));
166
+ if (!context) {
167
+ rb_raise(_sha3_kmac_error_class, "failed to allocate object memory");
168
+ }
169
+
170
+ context->state = (KMAC_Instance*)calloc(1, sizeof(KMAC_Instance));
171
+ if (!context->state) {
172
+ sha3_kmac_free_context(context);
173
+ rb_raise(_sha3_kmac_error_class, "failed to allocate state memory");
174
+ }
175
+
176
+ VALUE obj = TypedData_Wrap_Struct(klass, &sha3_kmac_data_type_t, context);
177
+ context->output_length = 0; // Default output length in bits
178
+ context->algorithm = KMAC_128; // Default algorithm
179
+
180
+ return obj;
181
+ }
182
+
183
+ /*
184
+ * :call-seq:
185
+ * ::new(algorithm, output_length, key, [customization]) -> instance
186
+ *
187
+ * Creates a new KMAC object.
188
+ *
189
+ * +algorithm+::
190
+ * The KMAC algorithm to use (as a Symbol).
191
+ * Valid algorithms are:
192
+ * - :kmac_128
193
+ * - :kmac_256
194
+ *
195
+ * +output_length+::
196
+ * The length of the output in bytes.
197
+ *
198
+ * +key+::
199
+ * The key to use for the KMAC.
200
+ *
201
+ * +customization+::
202
+ * _optional_ The customization string to use.
203
+ *
204
+ * = example
205
+ * SHA3::KMAC.new(:kmac_128, 32, "key")
206
+ * SHA3::KMAC.new(:kmac_256, 64, "key", "customization")
207
+ */
208
+ static VALUE rb_sha3_kmac_init(int argc, VALUE* argv, VALUE self) {
209
+ sha3_kmac_context_t* context;
210
+ VALUE algorithm, output_length, key, customization;
211
+
212
+ rb_scan_args(argc, argv, "31", &algorithm, &output_length, &key, &customization);
213
+
214
+ get_sha3_kmac_context(self, &context);
215
+
216
+ ID sym = SYM2ID(algorithm);
217
+ if (rb_equal(sym, _kmac_128_id)) {
218
+ context->algorithm = KMAC_128;
219
+ } else if (rb_equal(sym, _kmac_256_id)) {
220
+ context->algorithm = KMAC_256;
221
+ } else {
222
+ rb_raise(_sha3_kmac_error_class, "invalid algorithm");
223
+ }
224
+
225
+ if (!NIL_P(output_length)) {
226
+ Check_Type(output_length, T_FIXNUM);
227
+ context->output_length = NUM2ULONG(output_length) * 8;
228
+ }
229
+
230
+ if (!NIL_P(key)) {
231
+ Check_Type(key, T_STRING);
232
+ size_t key_len = RSTRING_LEN(key) * 8;
233
+ const unsigned char* key_ptr = (const unsigned char*)RSTRING_PTR(key);
234
+
235
+ if (context->algorithm == KMAC_128) {
236
+ if (KMAC128_Initialize(context->state, key_ptr, key_len, context->output_length,
237
+ NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
238
+ NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
239
+ rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC128");
240
+ }
241
+ } else {
242
+ if (KMAC256_Initialize(context->state, key_ptr, key_len, context->output_length,
243
+ NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
244
+ NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
245
+ rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC256");
246
+ }
247
+ }
248
+ }
249
+
250
+ return self;
251
+ }
252
+
253
+ /*
254
+ * :call-seq:
255
+ * initialize_copy(other) -> kmac
256
+ *
257
+ * Initializes the KMAC with the state of another KMAC.
258
+ *
259
+ * +other+::
260
+ * The KMAC to copy the state from.
261
+ *
262
+ * = example
263
+ * new_kmac = kmac.dup
264
+ */
265
+ static VALUE rb_sha3_kmac_copy(VALUE self, VALUE other) {
266
+ sha3_kmac_context_t* context;
267
+ sha3_kmac_context_t* other_context;
268
+
269
+ rb_check_frozen(self);
270
+ if (self == other) {
271
+ return self;
272
+ }
273
+
274
+ if (!rb_obj_is_kind_of(other, _sha3_kmac_class)) {
275
+ rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(other),
276
+ rb_class2name(_sha3_kmac_class));
277
+ }
278
+
279
+ safe_get_sha3_kmac_context(other, &other_context);
280
+ get_sha3_kmac_context(self, &context);
281
+
282
+ context->algorithm = other_context->algorithm;
283
+ context->output_length = other_context->output_length;
284
+ memcpy(context->state, other_context->state, sizeof(KMAC_Instance));
285
+
286
+ if (!compare_contexts(context, other_context)) {
287
+ rb_raise(_sha3_kmac_error_class, "failed to copy state");
288
+ }
289
+
290
+ return self;
291
+ }
292
+
293
+ /*
294
+ * :call-seq:
295
+ * update(string) -> kmac
296
+ *
297
+ * Updates the KMAC with the given string.
298
+ *
299
+ * +string+::
300
+ * The string to update the KMAC with.
301
+ *
302
+ * = example
303
+ * kmac.update("more data")
304
+ * kmac << "more data" # alias for update
305
+ */
306
+ static VALUE rb_sha3_kmac_update(VALUE self, VALUE data) {
307
+ sha3_kmac_context_t* context;
308
+ size_t data_len;
309
+
310
+ Check_Type(data, T_STRING);
311
+ data_len = RSTRING_LEN(data) * 8;
312
+
313
+ get_sha3_kmac_context(self, &context);
314
+
315
+ if (context->algorithm == KMAC_128) {
316
+ if (KMAC128_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
317
+ rb_raise(_sha3_kmac_error_class, "failed to update KMAC128");
318
+ }
319
+ } else {
320
+ if (KMAC256_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
321
+ rb_raise(_sha3_kmac_error_class, "failed to update KMAC256");
322
+ }
323
+ }
324
+
325
+ return self;
326
+ }
327
+
328
+ /*
329
+ * :call-seq:
330
+ * finish([message]) -> String
331
+ *
332
+ * Returns the final KMAC as a binary string.
333
+ *
334
+ * +message+::
335
+ * _optional_ Output buffer to receive the final KMAC value.
336
+ *
337
+ * = example
338
+ * kmac.finish
339
+ */
340
+ static VALUE rb_sha3_kmac_finish(int argc, VALUE* argv, VALUE self) {
341
+ sha3_kmac_context_t* context;
342
+ VALUE output;
343
+
344
+ rb_scan_args(argc, argv, "01", &output);
345
+
346
+ get_sha3_kmac_context(self, &context);
347
+
348
+ if (NIL_P(output)) {
349
+ output = rb_str_new(0, context->output_length / 8);
350
+ } else {
351
+ StringValue(output);
352
+ rb_str_resize(output, context->output_length / 8);
353
+ }
354
+
355
+ if (context->algorithm == KMAC_128) {
356
+ if (KMAC128_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
357
+ rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC128");
358
+ }
359
+ } else {
360
+ if (KMAC256_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
361
+ rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC256");
362
+ }
363
+ }
364
+
365
+ return output;
366
+ }
367
+
368
+ /*
369
+ * :call-seq:
370
+ * name -> String
371
+ *
372
+ * Returns the name of the algorithm.
373
+ *
374
+ * = example
375
+ * kmac.name #=> "KMAC128" or "KMAC256"
376
+ */
377
+ static VALUE rb_sha3_kmac_name(VALUE self) {
378
+ sha3_kmac_context_t* context;
379
+
380
+ get_sha3_kmac_context(self, &context);
381
+
382
+ switch (context->algorithm) {
383
+ case KMAC_128:
384
+ return rb_str_new2("KMAC128");
385
+ case KMAC_256:
386
+ return rb_str_new2("KMAC256");
387
+ default:
388
+ rb_raise(_sha3_kmac_error_class, "unknown algorithm");
389
+ }
390
+ }
391
+
392
+ /*
393
+ * :call-seq:
394
+ * digest() -> string
395
+ * digest([data]) -> string
396
+ *
397
+ * Returns the binary representation of the KMAC.
398
+ * This method creates a copy of the current instance so that
399
+ * the original state is preserved for future updates.
400
+ *
401
+ * +data+::
402
+ * _optional_ Update state with additional data before returning KMAC.
403
+ *
404
+ * = example
405
+ * kmac.digest
406
+ * kmac.digest('final chunk')
407
+ */
408
+ static VALUE rb_sha3_kmac_digest(int argc, VALUE* argv, VALUE self) {
409
+ VALUE copy, data;
410
+
411
+ rb_scan_args(argc, argv, "01", &data);
412
+
413
+ // Create a copy of the instance to avoid modifying the original
414
+ copy = rb_obj_clone(self);
415
+
416
+ // If data is provided, update the copy's state
417
+ if (!NIL_P(data)) {
418
+ rb_sha3_kmac_update(copy, data);
419
+ }
420
+
421
+ // Call finish on the copy
422
+ return rb_sha3_kmac_finish(0, NULL, copy);
423
+ }
424
+
425
+ /*
426
+ * :call-seq:
427
+ * hexdigest() -> string
428
+ * hexdigest([data]) -> string
429
+ *
430
+ * Returns the hexadecimal representation of the KMAC.
431
+ * This method creates a copy of the current instance so that
432
+ * the original state is preserved for future updates.
433
+ *
434
+ * +data+::
435
+ * _optional_ Update state with additional data before returning KMAC.
436
+ *
437
+ * = example
438
+ * kmac.hexdigest
439
+ * kmac.hexdigest('final chunk')
440
+ */
441
+ static VALUE rb_sha3_kmac_hexdigest(int argc, VALUE* argv, VALUE self) {
442
+ VALUE bin_str = rb_sha3_kmac_digest(argc, argv, self);
443
+ return rb_funcall(bin_str, rb_intern("unpack1"), 1, rb_str_new2("H*"));
444
+ }
445
+
446
+ /*
447
+ * :call-seq:
448
+ * ::digest(algorithm, data, output_length, key, [customization]) -> string
449
+ *
450
+ * One-shot operation to return the binary KMAC digest without explicitly creating an instance.
451
+ *
452
+ * +algorithm+::
453
+ * The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
454
+ * +data+::
455
+ * The data to digest
456
+ * +output_length+::
457
+ * The length of the output in bytes
458
+ * +key+::
459
+ * The key to use for the KMAC
460
+ * +customization+::
461
+ * _optional_ The customization string to use
462
+ *
463
+ * = example
464
+ * SHA3::KMAC.digest(:kmac_128, "data", 32, "key")
465
+ * SHA3::KMAC.digest(:kmac_128, "data", 32, "key", "customization")
466
+ */
467
+ static VALUE rb_sha3_kmac_self_digest(int argc, VALUE* argv, VALUE klass) {
468
+ VALUE algorithm, data, output_length, key, customization;
469
+
470
+ rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
471
+
472
+ VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
473
+ return rb_funcall(kmac, rb_intern("digest"), 1, data);
474
+ }
475
+
476
+ /*
477
+ * :call-seq:
478
+ * ::hexdigest(algorithm, data, output_length, key, [customization]) -> string
479
+ *
480
+ * One-shot operation to return the hexadecimal KMAC digest without explicitly creating an instance.
481
+ *
482
+ * +algorithm+::
483
+ * The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
484
+ * +data+::
485
+ * The data to digest
486
+ * +output_length+::
487
+ * The length of the output in bytes
488
+ * +key+::
489
+ * The key to use for the KMAC
490
+ * +customization+::
491
+ * _optional_ The customization string to use
492
+ *
493
+ * = example
494
+ * SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key")
495
+ * SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key", "customization")
496
+ */
497
+ static VALUE rb_sha3_kmac_self_hexdigest(int argc, VALUE* argv, VALUE klass) {
498
+ VALUE algorithm, data, output_length, key, customization;
499
+
500
+ rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
501
+
502
+ VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
503
+ return rb_funcall(kmac, rb_intern("hexdigest"), 1, data);
504
+ }
data/ext/sha3/kmac.h ADDED
@@ -0,0 +1,14 @@
1
+ #ifndef _KMAC_H_
2
+ #define _KMAC_H_
3
+
4
+ #ifdef __cplusplus
5
+ extern "C" {
6
+ #endif
7
+
8
+ extern void Init_sha3_kmac(void);
9
+
10
+ #ifdef __cplusplus
11
+ }
12
+ #endif
13
+
14
+ #endif // _KMAC_H_