sha3 1.0.5 → 2.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/.clang-format +54 -0
- data/.document +3 -3
- data/.rdoc_options +11 -0
- data/.rspec +2 -2
- data/.rubocop.yml +8 -1
- data/CHANGELOG.md +23 -0
- data/Gemfile +12 -0
- data/LICENSE.txt +1 -1
- data/README.md +185 -65
- data/Rakefile +12 -4
- data/certs/io+sha3@jsg.io.pem +26 -0
- data/doc/sha3.rb +83 -0
- data/ext/sha3/config.h +2 -2
- data/ext/sha3/digest.c +726 -169
- data/ext/sha3/digest.h +6 -35
- data/ext/sha3/extconf.rb +42 -38
- data/ext/sha3/kmac.c +504 -0
- data/ext/sha3/kmac.h +14 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.c +81 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.h +73 -0
- data/ext/sha3/lib/high/Keccak/KeccakDuplex.inc +201 -0
- data/ext/sha3/lib/high/Keccak/KeccakSponge.c +2 -18
- data/ext/sha3/lib/high/Keccak/KeccakSponge.h +4 -10
- data/ext/sha3/lib/high/Keccak/KeccakSponge.inc +27 -31
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.c +61 -0
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.h +67 -0
- data/ext/sha3/lib/high/Keccak/PRG/KeccakPRG.inc +128 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.c +93 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.h +599 -0
- data/ext/sha3/lib/high/Keccak/SP800-185/SP800-185.inc +573 -0
- data/ext/sha3/lib/high/common/Phases.h +25 -0
- data/ext/sha3/lib/low/KeccakP-1600/common/KeccakP-1600-64.macros +19 -9
- data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-SnP.h +18 -12
- data/ext/sha3/lib/low/KeccakP-1600/ref-32bits/KeccakP-1600-reference32BI.c +28 -36
- data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-SnP.h +18 -12
- data/ext/sha3/lib/low/KeccakP-1600/ref-64bits/KeccakP-1600-reference.c +28 -59
- data/ext/sha3/lib/low/common/PlSnP-Fallback.inc +291 -0
- data/ext/sha3/lib/low/common/SnP-Relaned.h +145 -0
- data/ext/sha3/sha3.c +28 -59
- data/ext/sha3/sha3.h +4 -13
- data/lib/constants.rb +5 -0
- data/lib/sha3.rb +25 -24
- data.tar.gz.sig +0 -0
- metadata +61 -127
- metadata.gz.sig +0 -0
- data/.yardopts +0 -1
- data/ChangeLog.rdoc +0 -27
- data/certs/johanns.pem +0 -25
- data/lib/sha3/doc.rb +0 -121
- data/lib/sha3/version.rb +0 -9
- data/sha3.gemspec +0 -54
- data/tests.sh +0 -29
data/ext/sha3/digest.h
CHANGED
@@ -1,45 +1,16 @@
|
|
1
|
-
|
1
|
+
// Copyright (c) 2012 - 2025 Johanns Gregorian <io+sha3@jsg.io>
|
2
2
|
|
3
3
|
#ifndef _DIGEST_H_
|
4
4
|
#define _DIGEST_H_
|
5
5
|
|
6
|
+
#include <ruby.h>
|
7
|
+
#include <ruby/encoding.h>
|
8
|
+
|
6
9
|
#ifdef __cplusplus
|
7
|
-
extern "C"
|
8
|
-
{
|
10
|
+
extern "C" {
|
9
11
|
#endif
|
10
12
|
|
11
|
-
|
12
|
-
#define GETMDX(obj, mdx) \
|
13
|
-
do \
|
14
|
-
{ \
|
15
|
-
Data_Get_Struct((obj), MDX, (mdx)); \
|
16
|
-
if (!(mdx)) \
|
17
|
-
{ \
|
18
|
-
rb_raise(rb_eRuntimeError, "Digest data not initialized!"); \
|
19
|
-
} \
|
20
|
-
} while (0)
|
21
|
-
|
22
|
-
#define SAFEGETMDX(obj, mdx) \
|
23
|
-
do \
|
24
|
-
{ \
|
25
|
-
if (!rb_obj_is_kind_of(obj, cSHA3Digest)) \
|
26
|
-
{ \
|
27
|
-
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", \
|
28
|
-
rb_obj_classname(obj), rb_class2name(cSHA3Digest)); \
|
29
|
-
} \
|
30
|
-
GETMDX(obj, mdx); \
|
31
|
-
} while (0)
|
32
|
-
|
33
|
-
extern VALUE cSHA3Digest;
|
34
|
-
extern VALUE eSHA3DigestError;
|
35
|
-
|
36
|
-
typedef struct
|
37
|
-
{
|
38
|
-
Keccak_HashInstance *state;
|
39
|
-
int hashbitlen;
|
40
|
-
} MDX;
|
41
|
-
|
42
|
-
void Init_sha3_n_digest(void);
|
13
|
+
extern void Init_sha3_digest(void);
|
43
14
|
|
44
15
|
#ifdef __cplusplus
|
45
16
|
}
|
data/ext/sha3/extconf.rb
CHANGED
@@ -3,48 +3,52 @@
|
|
3
3
|
require 'mkmf'
|
4
4
|
require 'rbconfig'
|
5
5
|
|
6
|
-
|
7
|
-
|
6
|
+
b64 = 8.size == 8
|
7
|
+
extension_name = 'sha3_ext'
|
8
|
+
ref_dir = b64 ? 'ref-64bits' : 'ref-32bits'
|
8
9
|
|
9
|
-
|
10
|
-
'lib/high/Keccak/KeccakSponge.c',
|
11
|
-
'lib/high/Keccak/FIPS202/KeccakHash.c'
|
12
|
-
]
|
10
|
+
dir_config(extension_name)
|
13
11
|
|
14
|
-
|
15
|
-
|
12
|
+
# Set compiler flags
|
13
|
+
$CFLAGS << ' -fomit-frame-pointer -O3 -g0 -fms-extensions'
|
16
14
|
|
17
|
-
|
18
|
-
|
19
|
-
Logging.message "=== Using 32-bit reference ===\n"
|
15
|
+
# Add architecture-specific optimizations if enabled
|
16
|
+
$CFLAGS << ' -march=native' if enable_config('march-tune-native', false)
|
20
17
|
|
21
|
-
|
22
|
-
|
18
|
+
# Add security hardening flags
|
19
|
+
$CFLAGS << ' -D_FORTIFY_SOURCE=2 -fstack-protector-strong'
|
23
20
|
|
24
|
-
|
21
|
+
# Add warning flags to catch potential issues
|
22
|
+
$CFLAGS << ' -Wall -Wextra -Wformat -Wformat-security'
|
25
23
|
|
26
|
-
|
27
|
-
|
24
|
+
# Add vectorization flags for better performance on supported platforms
|
25
|
+
$CFLAGS << ' -ftree-vectorize' if RUBY_PLATFORM =~ /x86_64|amd64|arm64/
|
26
|
+
|
27
|
+
# Find all relevant subdirectories and filter appropriately
|
28
|
+
vpath_dirs = Dir.glob("#{$srcdir}/lib/**/*")
|
29
|
+
.select { |path| File.directory?(path) }
|
30
|
+
.select { |dir| !dir.include?('KeccakP-1600/ref-') || dir.include?(ref_dir) }
|
31
|
+
|
32
|
+
# Process directory paths for both VPATH and INCFLAGS
|
33
|
+
vpath_dirs_processed = vpath_dirs.map { |dir| dir.sub($srcdir, '') }
|
34
|
+
|
35
|
+
# Add source directories to VPATH
|
36
|
+
$VPATH << vpath_dirs_processed
|
37
|
+
.map { |dir| "$(srcdir)#{dir}" }
|
38
|
+
.join(File::PATH_SEPARATOR)
|
39
|
+
|
40
|
+
# Add include flags
|
41
|
+
$INCFLAGS << vpath_dirs_processed
|
42
|
+
.map { |dir| " -I$(srcdir)#{dir}" }
|
43
|
+
.join
|
44
|
+
|
45
|
+
# Base source files
|
46
|
+
$srcs = ['digest.c', 'kmac.c', 'sha3.c']
|
47
|
+
|
48
|
+
# Find and add all .c files from the filtered directories
|
49
|
+
$srcs += vpath_dirs
|
50
|
+
.flat_map { |dir| Dir.glob("#{dir}/*.c") }
|
51
|
+
.map { |file| File.basename(file) }
|
52
|
+
.uniq
|
28
53
|
|
29
|
-
|
30
|
-
' -I$(src) ',
|
31
|
-
' -I$(srcdir)lib/ ',
|
32
|
-
' -I$(srcdir)/lib/common ',
|
33
|
-
' -I$(srcdir)/lib/high/Keccak ',
|
34
|
-
' -I$(srcdir)/lib/high/Keccak/FIPS202 ',
|
35
|
-
' -I$(srcdir)/lib/low/KeccakP-1600/common ',
|
36
|
-
' -I$(srcdir)/lib/low/KeccakP-1600/ref-32bits ',
|
37
|
-
' -I$(srcdir)/lib/low/KeccakP-1600/ref-64bits '
|
38
|
-
].join
|
39
|
-
|
40
|
-
$CFLAGS << ' -fomit-frame-pointer -O3 -g0 -fms-extensions '
|
41
|
-
$CFLAGS << ' -march=native ' if enable_config('march-tune-native', false)
|
42
|
-
|
43
|
-
find_header('sha3.h')
|
44
|
-
find_header('digest.h')
|
45
|
-
find_header('align.h')
|
46
|
-
find_header('brg_endian.h')
|
47
|
-
find_header('KeccakSponge.h')
|
48
|
-
find_header('KeccakHash.h')
|
49
|
-
|
50
|
-
create_makefile extension_name
|
54
|
+
create_makefile(extension_name)
|
data/ext/sha3/kmac.c
ADDED
@@ -0,0 +1,504 @@
|
|
1
|
+
#include "kmac.h"
|
2
|
+
|
3
|
+
#include "KeccakHash.h"
|
4
|
+
#include "SP800-185.h"
|
5
|
+
#include "sha3.h"
|
6
|
+
|
7
|
+
// SHA3::KMAC.new(algorithm, output_length, key, customization)
|
8
|
+
// SHA3::KMAC128.new(output_length, key, customization)
|
9
|
+
// SHA3::KMAC256.new(output_length, key, customization)
|
10
|
+
// kmac.update
|
11
|
+
// kmac.digest | kmac.hexdigest
|
12
|
+
|
13
|
+
/*** Types and structs ***/
|
14
|
+
|
15
|
+
typedef enum { KMAC_128 = 0, KMAC_256 } sha3_kmac_algorithms;
|
16
|
+
|
17
|
+
typedef struct {
|
18
|
+
KMAC_Instance* state;
|
19
|
+
sha3_kmac_algorithms algorithm;
|
20
|
+
|
21
|
+
size_t output_length;
|
22
|
+
} sha3_kmac_context_t;
|
23
|
+
|
24
|
+
/*** Function prototypes ***/
|
25
|
+
|
26
|
+
static int compare_contexts(const sha3_kmac_context_t*, const sha3_kmac_context_t*);
|
27
|
+
static void sha3_kmac_free_context(void*);
|
28
|
+
static size_t sha3_kmac_context_size(const void*);
|
29
|
+
|
30
|
+
/* Allocation and initialization */
|
31
|
+
static VALUE rb_sha3_kmac_alloc(VALUE);
|
32
|
+
static VALUE rb_sha3_kmac_init(int, VALUE*, VALUE);
|
33
|
+
static VALUE rb_sha3_kmac_copy(VALUE, VALUE);
|
34
|
+
|
35
|
+
/* Core digest operations */
|
36
|
+
static VALUE rb_sha3_kmac_finish(int, VALUE*, VALUE);
|
37
|
+
static VALUE rb_sha3_kmac_update(VALUE, VALUE);
|
38
|
+
|
39
|
+
/* Digest properties */
|
40
|
+
static VALUE rb_sha3_kmac_name(VALUE);
|
41
|
+
|
42
|
+
/* Output methods */
|
43
|
+
static VALUE rb_sha3_kmac_digest(int, VALUE*, VALUE);
|
44
|
+
static VALUE rb_sha3_kmac_hexdigest(int, VALUE*, VALUE);
|
45
|
+
static VALUE rb_sha3_kmac_self_digest(int, VALUE*, VALUE);
|
46
|
+
static VALUE rb_sha3_kmac_self_hexdigest(int, VALUE*, VALUE);
|
47
|
+
|
48
|
+
/*** Global variables ***/
|
49
|
+
|
50
|
+
VALUE _sha3_kmac_class;
|
51
|
+
VALUE _sha3_kmac_error_class;
|
52
|
+
|
53
|
+
/* Define the ID variables */
|
54
|
+
static ID _kmac_128_id;
|
55
|
+
static ID _kmac_256_id;
|
56
|
+
|
57
|
+
/* TypedData structure for sha3_kmac_context_t */
|
58
|
+
const rb_data_type_t sha3_kmac_data_type_t = {"SHA3::KMAC",
|
59
|
+
{
|
60
|
+
NULL,
|
61
|
+
sha3_kmac_free_context,
|
62
|
+
sha3_kmac_context_size,
|
63
|
+
},
|
64
|
+
NULL,
|
65
|
+
NULL,
|
66
|
+
RUBY_TYPED_FREE_IMMEDIATELY};
|
67
|
+
|
68
|
+
void Init_sha3_kmac(void) {
|
69
|
+
_kmac_128_id = rb_intern("kmac_128");
|
70
|
+
_kmac_256_id = rb_intern("kmac_256");
|
71
|
+
|
72
|
+
if (NIL_P(_sha3_module)) {
|
73
|
+
_sha3_module = rb_define_module("SHA3");
|
74
|
+
}
|
75
|
+
|
76
|
+
/*
|
77
|
+
* Document-class: SHA3::KMAC
|
78
|
+
*
|
79
|
+
* It is a subclass of the Digest::Class class, which provides a framework for
|
80
|
+
* creating and manipulating hash digests.
|
81
|
+
*/
|
82
|
+
_sha3_kmac_class = rb_define_class_under(_sha3_module, "KMAC", rb_cObject);
|
83
|
+
|
84
|
+
/*
|
85
|
+
* Document-class: SHA3::KMAC::KMACError
|
86
|
+
*
|
87
|
+
* All KMAC methods raise this exception on error.
|
88
|
+
*
|
89
|
+
* It is a subclass of the StandardError class -- see the Ruby documentation
|
90
|
+
* for more information.
|
91
|
+
*/
|
92
|
+
_sha3_kmac_error_class = rb_define_class_under(_sha3_kmac_class, "KMACError", rb_eStandardError);
|
93
|
+
|
94
|
+
rb_define_alloc_func(_sha3_kmac_class, rb_sha3_kmac_alloc);
|
95
|
+
rb_define_method(_sha3_kmac_class, "initialize", rb_sha3_kmac_init, -1);
|
96
|
+
rb_define_method(_sha3_kmac_class, "initialize_copy", rb_sha3_kmac_copy, 1);
|
97
|
+
rb_define_method(_sha3_kmac_class, "update", rb_sha3_kmac_update, 1);
|
98
|
+
rb_define_method(_sha3_kmac_class, "name", rb_sha3_kmac_name, 0);
|
99
|
+
|
100
|
+
rb_define_method(_sha3_kmac_class, "digest", rb_sha3_kmac_digest, -1);
|
101
|
+
rb_define_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_hexdigest, -1);
|
102
|
+
|
103
|
+
rb_define_private_method(_sha3_kmac_class, "finish", rb_sha3_kmac_finish, -1);
|
104
|
+
|
105
|
+
rb_define_alias(_sha3_kmac_class, "<<", "update");
|
106
|
+
|
107
|
+
rb_define_singleton_method(_sha3_kmac_class, "digest", rb_sha3_kmac_self_digest, -1);
|
108
|
+
rb_define_singleton_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_self_hexdigest, -1);
|
109
|
+
|
110
|
+
return;
|
111
|
+
}
|
112
|
+
|
113
|
+
static int compare_contexts(const sha3_kmac_context_t* context1, const sha3_kmac_context_t* context2) {
|
114
|
+
// First check the algorithm
|
115
|
+
if (context1->algorithm != context2->algorithm) {
|
116
|
+
return 0;
|
117
|
+
}
|
118
|
+
|
119
|
+
// Compare the internal state structure
|
120
|
+
if (memcmp(context1->state, context2->state, sizeof(KMAC_Instance)) != 0) {
|
121
|
+
return 0;
|
122
|
+
}
|
123
|
+
|
124
|
+
// All comparisons passed
|
125
|
+
return 1;
|
126
|
+
}
|
127
|
+
|
128
|
+
static inline void get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
|
129
|
+
TypedData_Get_Struct((obj), sha3_kmac_context_t, &sha3_kmac_data_type_t, (*context));
|
130
|
+
if (!(*context)) {
|
131
|
+
rb_raise(rb_eRuntimeError, "KMAC data not initialized!");
|
132
|
+
}
|
133
|
+
}
|
134
|
+
|
135
|
+
static inline void safe_get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
|
136
|
+
if (!rb_obj_is_kind_of(obj, _sha3_kmac_class)) {
|
137
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(obj),
|
138
|
+
rb_class2name(_sha3_kmac_class));
|
139
|
+
}
|
140
|
+
get_sha3_kmac_context(obj, context);
|
141
|
+
}
|
142
|
+
|
143
|
+
static void sha3_kmac_free_context(void* ptr) {
|
144
|
+
sha3_kmac_context_t* context = (sha3_kmac_context_t*)ptr;
|
145
|
+
if (context) {
|
146
|
+
if (context->state) {
|
147
|
+
free(context->state);
|
148
|
+
}
|
149
|
+
free(context);
|
150
|
+
}
|
151
|
+
}
|
152
|
+
|
153
|
+
static size_t sha3_kmac_context_size(const void* ptr) {
|
154
|
+
const sha3_kmac_context_t* context = (const sha3_kmac_context_t*)ptr;
|
155
|
+
size_t size = sizeof(sha3_kmac_context_t);
|
156
|
+
|
157
|
+
if (context && context->state) {
|
158
|
+
size += sizeof(KMAC_Instance);
|
159
|
+
}
|
160
|
+
|
161
|
+
return size;
|
162
|
+
}
|
163
|
+
|
164
|
+
static VALUE rb_sha3_kmac_alloc(VALUE klass) {
|
165
|
+
sha3_kmac_context_t* context = (sha3_kmac_context_t*)malloc(sizeof(sha3_kmac_context_t));
|
166
|
+
if (!context) {
|
167
|
+
rb_raise(_sha3_kmac_error_class, "failed to allocate object memory");
|
168
|
+
}
|
169
|
+
|
170
|
+
context->state = (KMAC_Instance*)calloc(1, sizeof(KMAC_Instance));
|
171
|
+
if (!context->state) {
|
172
|
+
sha3_kmac_free_context(context);
|
173
|
+
rb_raise(_sha3_kmac_error_class, "failed to allocate state memory");
|
174
|
+
}
|
175
|
+
|
176
|
+
VALUE obj = TypedData_Wrap_Struct(klass, &sha3_kmac_data_type_t, context);
|
177
|
+
context->output_length = 0; // Default output length in bits
|
178
|
+
context->algorithm = KMAC_128; // Default algorithm
|
179
|
+
|
180
|
+
return obj;
|
181
|
+
}
|
182
|
+
|
183
|
+
/*
|
184
|
+
* :call-seq:
|
185
|
+
* ::new(algorithm, output_length, key, [customization]) -> instance
|
186
|
+
*
|
187
|
+
* Creates a new KMAC object.
|
188
|
+
*
|
189
|
+
* +algorithm+::
|
190
|
+
* The KMAC algorithm to use (as a Symbol).
|
191
|
+
* Valid algorithms are:
|
192
|
+
* - :kmac_128
|
193
|
+
* - :kmac_256
|
194
|
+
*
|
195
|
+
* +output_length+::
|
196
|
+
* The length of the output in bytes.
|
197
|
+
*
|
198
|
+
* +key+::
|
199
|
+
* The key to use for the KMAC.
|
200
|
+
*
|
201
|
+
* +customization+::
|
202
|
+
* _optional_ The customization string to use.
|
203
|
+
*
|
204
|
+
* = example
|
205
|
+
* SHA3::KMAC.new(:kmac_128, 32, "key")
|
206
|
+
* SHA3::KMAC.new(:kmac_256, 64, "key", "customization")
|
207
|
+
*/
|
208
|
+
static VALUE rb_sha3_kmac_init(int argc, VALUE* argv, VALUE self) {
|
209
|
+
sha3_kmac_context_t* context;
|
210
|
+
VALUE algorithm, output_length, key, customization;
|
211
|
+
|
212
|
+
rb_scan_args(argc, argv, "31", &algorithm, &output_length, &key, &customization);
|
213
|
+
|
214
|
+
get_sha3_kmac_context(self, &context);
|
215
|
+
|
216
|
+
ID sym = SYM2ID(algorithm);
|
217
|
+
if (rb_equal(sym, _kmac_128_id)) {
|
218
|
+
context->algorithm = KMAC_128;
|
219
|
+
} else if (rb_equal(sym, _kmac_256_id)) {
|
220
|
+
context->algorithm = KMAC_256;
|
221
|
+
} else {
|
222
|
+
rb_raise(_sha3_kmac_error_class, "invalid algorithm");
|
223
|
+
}
|
224
|
+
|
225
|
+
if (!NIL_P(output_length)) {
|
226
|
+
Check_Type(output_length, T_FIXNUM);
|
227
|
+
context->output_length = NUM2ULONG(output_length) * 8;
|
228
|
+
}
|
229
|
+
|
230
|
+
if (!NIL_P(key)) {
|
231
|
+
Check_Type(key, T_STRING);
|
232
|
+
size_t key_len = RSTRING_LEN(key) * 8;
|
233
|
+
const unsigned char* key_ptr = (const unsigned char*)RSTRING_PTR(key);
|
234
|
+
|
235
|
+
if (context->algorithm == KMAC_128) {
|
236
|
+
if (KMAC128_Initialize(context->state, key_ptr, key_len, context->output_length,
|
237
|
+
NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
|
238
|
+
NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
|
239
|
+
rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC128");
|
240
|
+
}
|
241
|
+
} else {
|
242
|
+
if (KMAC256_Initialize(context->state, key_ptr, key_len, context->output_length,
|
243
|
+
NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
|
244
|
+
NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
|
245
|
+
rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC256");
|
246
|
+
}
|
247
|
+
}
|
248
|
+
}
|
249
|
+
|
250
|
+
return self;
|
251
|
+
}
|
252
|
+
|
253
|
+
/*
|
254
|
+
* :call-seq:
|
255
|
+
* initialize_copy(other) -> kmac
|
256
|
+
*
|
257
|
+
* Initializes the KMAC with the state of another KMAC.
|
258
|
+
*
|
259
|
+
* +other+::
|
260
|
+
* The KMAC to copy the state from.
|
261
|
+
*
|
262
|
+
* = example
|
263
|
+
* new_kmac = kmac.dup
|
264
|
+
*/
|
265
|
+
static VALUE rb_sha3_kmac_copy(VALUE self, VALUE other) {
|
266
|
+
sha3_kmac_context_t* context;
|
267
|
+
sha3_kmac_context_t* other_context;
|
268
|
+
|
269
|
+
rb_check_frozen(self);
|
270
|
+
if (self == other) {
|
271
|
+
return self;
|
272
|
+
}
|
273
|
+
|
274
|
+
if (!rb_obj_is_kind_of(other, _sha3_kmac_class)) {
|
275
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(other),
|
276
|
+
rb_class2name(_sha3_kmac_class));
|
277
|
+
}
|
278
|
+
|
279
|
+
safe_get_sha3_kmac_context(other, &other_context);
|
280
|
+
get_sha3_kmac_context(self, &context);
|
281
|
+
|
282
|
+
context->algorithm = other_context->algorithm;
|
283
|
+
context->output_length = other_context->output_length;
|
284
|
+
memcpy(context->state, other_context->state, sizeof(KMAC_Instance));
|
285
|
+
|
286
|
+
if (!compare_contexts(context, other_context)) {
|
287
|
+
rb_raise(_sha3_kmac_error_class, "failed to copy state");
|
288
|
+
}
|
289
|
+
|
290
|
+
return self;
|
291
|
+
}
|
292
|
+
|
293
|
+
/*
|
294
|
+
* :call-seq:
|
295
|
+
* update(string) -> kmac
|
296
|
+
*
|
297
|
+
* Updates the KMAC with the given string.
|
298
|
+
*
|
299
|
+
* +string+::
|
300
|
+
* The string to update the KMAC with.
|
301
|
+
*
|
302
|
+
* = example
|
303
|
+
* kmac.update("more data")
|
304
|
+
* kmac << "more data" # alias for update
|
305
|
+
*/
|
306
|
+
static VALUE rb_sha3_kmac_update(VALUE self, VALUE data) {
|
307
|
+
sha3_kmac_context_t* context;
|
308
|
+
size_t data_len;
|
309
|
+
|
310
|
+
Check_Type(data, T_STRING);
|
311
|
+
data_len = RSTRING_LEN(data) * 8;
|
312
|
+
|
313
|
+
get_sha3_kmac_context(self, &context);
|
314
|
+
|
315
|
+
if (context->algorithm == KMAC_128) {
|
316
|
+
if (KMAC128_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
|
317
|
+
rb_raise(_sha3_kmac_error_class, "failed to update KMAC128");
|
318
|
+
}
|
319
|
+
} else {
|
320
|
+
if (KMAC256_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
|
321
|
+
rb_raise(_sha3_kmac_error_class, "failed to update KMAC256");
|
322
|
+
}
|
323
|
+
}
|
324
|
+
|
325
|
+
return self;
|
326
|
+
}
|
327
|
+
|
328
|
+
/*
|
329
|
+
* :call-seq:
|
330
|
+
* finish([message]) -> String
|
331
|
+
*
|
332
|
+
* Returns the final KMAC as a binary string.
|
333
|
+
*
|
334
|
+
* +message+::
|
335
|
+
* _optional_ Output buffer to receive the final KMAC value.
|
336
|
+
*
|
337
|
+
* = example
|
338
|
+
* kmac.finish
|
339
|
+
*/
|
340
|
+
static VALUE rb_sha3_kmac_finish(int argc, VALUE* argv, VALUE self) {
|
341
|
+
sha3_kmac_context_t* context;
|
342
|
+
VALUE output;
|
343
|
+
|
344
|
+
rb_scan_args(argc, argv, "01", &output);
|
345
|
+
|
346
|
+
get_sha3_kmac_context(self, &context);
|
347
|
+
|
348
|
+
if (NIL_P(output)) {
|
349
|
+
output = rb_str_new(0, context->output_length / 8);
|
350
|
+
} else {
|
351
|
+
StringValue(output);
|
352
|
+
rb_str_resize(output, context->output_length / 8);
|
353
|
+
}
|
354
|
+
|
355
|
+
if (context->algorithm == KMAC_128) {
|
356
|
+
if (KMAC128_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
|
357
|
+
rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC128");
|
358
|
+
}
|
359
|
+
} else {
|
360
|
+
if (KMAC256_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
|
361
|
+
rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC256");
|
362
|
+
}
|
363
|
+
}
|
364
|
+
|
365
|
+
return output;
|
366
|
+
}
|
367
|
+
|
368
|
+
/*
|
369
|
+
* :call-seq:
|
370
|
+
* name -> String
|
371
|
+
*
|
372
|
+
* Returns the name of the algorithm.
|
373
|
+
*
|
374
|
+
* = example
|
375
|
+
* kmac.name #=> "KMAC128" or "KMAC256"
|
376
|
+
*/
|
377
|
+
static VALUE rb_sha3_kmac_name(VALUE self) {
|
378
|
+
sha3_kmac_context_t* context;
|
379
|
+
|
380
|
+
get_sha3_kmac_context(self, &context);
|
381
|
+
|
382
|
+
switch (context->algorithm) {
|
383
|
+
case KMAC_128:
|
384
|
+
return rb_str_new2("KMAC128");
|
385
|
+
case KMAC_256:
|
386
|
+
return rb_str_new2("KMAC256");
|
387
|
+
default:
|
388
|
+
rb_raise(_sha3_kmac_error_class, "unknown algorithm");
|
389
|
+
}
|
390
|
+
}
|
391
|
+
|
392
|
+
/*
|
393
|
+
* :call-seq:
|
394
|
+
* digest() -> string
|
395
|
+
* digest([data]) -> string
|
396
|
+
*
|
397
|
+
* Returns the binary representation of the KMAC.
|
398
|
+
* This method creates a copy of the current instance so that
|
399
|
+
* the original state is preserved for future updates.
|
400
|
+
*
|
401
|
+
* +data+::
|
402
|
+
* _optional_ Update state with additional data before returning KMAC.
|
403
|
+
*
|
404
|
+
* = example
|
405
|
+
* kmac.digest
|
406
|
+
* kmac.digest('final chunk')
|
407
|
+
*/
|
408
|
+
static VALUE rb_sha3_kmac_digest(int argc, VALUE* argv, VALUE self) {
|
409
|
+
VALUE copy, data;
|
410
|
+
|
411
|
+
rb_scan_args(argc, argv, "01", &data);
|
412
|
+
|
413
|
+
// Create a copy of the instance to avoid modifying the original
|
414
|
+
copy = rb_obj_clone(self);
|
415
|
+
|
416
|
+
// If data is provided, update the copy's state
|
417
|
+
if (!NIL_P(data)) {
|
418
|
+
rb_sha3_kmac_update(copy, data);
|
419
|
+
}
|
420
|
+
|
421
|
+
// Call finish on the copy
|
422
|
+
return rb_sha3_kmac_finish(0, NULL, copy);
|
423
|
+
}
|
424
|
+
|
425
|
+
/*
|
426
|
+
* :call-seq:
|
427
|
+
* hexdigest() -> string
|
428
|
+
* hexdigest([data]) -> string
|
429
|
+
*
|
430
|
+
* Returns the hexadecimal representation of the KMAC.
|
431
|
+
* This method creates a copy of the current instance so that
|
432
|
+
* the original state is preserved for future updates.
|
433
|
+
*
|
434
|
+
* +data+::
|
435
|
+
* _optional_ Update state with additional data before returning KMAC.
|
436
|
+
*
|
437
|
+
* = example
|
438
|
+
* kmac.hexdigest
|
439
|
+
* kmac.hexdigest('final chunk')
|
440
|
+
*/
|
441
|
+
static VALUE rb_sha3_kmac_hexdigest(int argc, VALUE* argv, VALUE self) {
|
442
|
+
VALUE bin_str = rb_sha3_kmac_digest(argc, argv, self);
|
443
|
+
return rb_funcall(bin_str, rb_intern("unpack1"), 1, rb_str_new2("H*"));
|
444
|
+
}
|
445
|
+
|
446
|
+
/*
|
447
|
+
* :call-seq:
|
448
|
+
* ::digest(algorithm, data, output_length, key, [customization]) -> string
|
449
|
+
*
|
450
|
+
* One-shot operation to return the binary KMAC digest without explicitly creating an instance.
|
451
|
+
*
|
452
|
+
* +algorithm+::
|
453
|
+
* The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
|
454
|
+
* +data+::
|
455
|
+
* The data to digest
|
456
|
+
* +output_length+::
|
457
|
+
* The length of the output in bytes
|
458
|
+
* +key+::
|
459
|
+
* The key to use for the KMAC
|
460
|
+
* +customization+::
|
461
|
+
* _optional_ The customization string to use
|
462
|
+
*
|
463
|
+
* = example
|
464
|
+
* SHA3::KMAC.digest(:kmac_128, "data", 32, "key")
|
465
|
+
* SHA3::KMAC.digest(:kmac_128, "data", 32, "key", "customization")
|
466
|
+
*/
|
467
|
+
static VALUE rb_sha3_kmac_self_digest(int argc, VALUE* argv, VALUE klass) {
|
468
|
+
VALUE algorithm, data, output_length, key, customization;
|
469
|
+
|
470
|
+
rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
|
471
|
+
|
472
|
+
VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
|
473
|
+
return rb_funcall(kmac, rb_intern("digest"), 1, data);
|
474
|
+
}
|
475
|
+
|
476
|
+
/*
|
477
|
+
* :call-seq:
|
478
|
+
* ::hexdigest(algorithm, data, output_length, key, [customization]) -> string
|
479
|
+
*
|
480
|
+
* One-shot operation to return the hexadecimal KMAC digest without explicitly creating an instance.
|
481
|
+
*
|
482
|
+
* +algorithm+::
|
483
|
+
* The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
|
484
|
+
* +data+::
|
485
|
+
* The data to digest
|
486
|
+
* +output_length+::
|
487
|
+
* The length of the output in bytes
|
488
|
+
* +key+::
|
489
|
+
* The key to use for the KMAC
|
490
|
+
* +customization+::
|
491
|
+
* _optional_ The customization string to use
|
492
|
+
*
|
493
|
+
* = example
|
494
|
+
* SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key")
|
495
|
+
* SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key", "customization")
|
496
|
+
*/
|
497
|
+
static VALUE rb_sha3_kmac_self_hexdigest(int argc, VALUE* argv, VALUE klass) {
|
498
|
+
VALUE algorithm, data, output_length, key, customization;
|
499
|
+
|
500
|
+
rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
|
501
|
+
|
502
|
+
VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
|
503
|
+
return rb_funcall(kmac, rb_intern("hexdigest"), 1, data);
|
504
|
+
}
|