sha3 2.0.0 → 2.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/.clang-format +1 -1
- data/.document +1 -2
- data/.rdoc_options +1 -0
- data/.rubocop.yml +3 -0
- data/Gemfile +1 -0
- data/README.md +37 -4
- data/Rakefile +4 -2
- data/doc/sha3.rb +2 -0
- data/ext/sha3/config.h +2 -2
- data/ext/sha3/digest.c +296 -211
- data/ext/sha3/digest.h +1 -66
- data/ext/sha3/extconf.rb +3 -3
- data/ext/sha3/kmac.c +504 -0
- data/ext/sha3/kmac.h +14 -0
- data/ext/sha3/sha3.c +31 -0
- data/ext/sha3/sha3.h +17 -0
- data/lib/constants.rb +5 -0
- data/lib/sha3.rb +28 -24
- data.tar.gz.sig +0 -0
- metadata +15 -21
- metadata.gz.sig +0 -0
data/ext/sha3/digest.h
CHANGED
@@ -5,77 +5,12 @@
|
|
5
5
|
|
6
6
|
#include <ruby.h>
|
7
7
|
#include <ruby/encoding.h>
|
8
|
-
#include <string.h>
|
9
|
-
|
10
|
-
#include "KeccakHash.h"
|
11
8
|
|
12
9
|
#ifdef __cplusplus
|
13
10
|
extern "C" {
|
14
11
|
#endif
|
15
12
|
|
16
|
-
|
17
|
-
|
18
|
-
typedef HashReturn (*keccak_init_func)(Keccak_HashInstance*);
|
19
|
-
|
20
|
-
typedef struct {
|
21
|
-
Keccak_HashInstance* state;
|
22
|
-
int hashbitlen;
|
23
|
-
algorithm_type algorithm;
|
24
|
-
} MDX;
|
25
|
-
|
26
|
-
VALUE sha3_module;
|
27
|
-
VALUE digest_class;
|
28
|
-
VALUE digest_error_class;
|
29
|
-
|
30
|
-
/* Static IDs for faster symbol lookup */
|
31
|
-
static ID sha3_224_id;
|
32
|
-
static ID sha3_256_id;
|
33
|
-
static ID sha3_384_id;
|
34
|
-
static ID sha3_512_id;
|
35
|
-
static ID shake_128_id;
|
36
|
-
static ID shake_256_id;
|
37
|
-
|
38
|
-
// TypedData functions
|
39
|
-
extern const rb_data_type_t mdx_type;
|
40
|
-
|
41
|
-
// Static inline functions replacing macros
|
42
|
-
static inline void get_mdx(VALUE obj, MDX** mdx) {
|
43
|
-
TypedData_Get_Struct((obj), MDX, &mdx_type, (*mdx));
|
44
|
-
if (!(*mdx)) {
|
45
|
-
rb_raise(rb_eRuntimeError, "Digest data not initialized!");
|
46
|
-
}
|
47
|
-
}
|
48
|
-
|
49
|
-
static inline void safe_get_mdx(VALUE obj, MDX** mdx) {
|
50
|
-
if (!rb_obj_is_kind_of(obj, digest_class)) {
|
51
|
-
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(obj),
|
52
|
-
rb_class2name(digest_class));
|
53
|
-
}
|
54
|
-
get_mdx(obj, mdx);
|
55
|
-
}
|
56
|
-
|
57
|
-
/* Allocation and initialization */
|
58
|
-
static VALUE rb_digest_alloc(VALUE);
|
59
|
-
static VALUE rb_digest_init(int, VALUE*, VALUE);
|
60
|
-
|
61
|
-
/* Core digest operations */
|
62
|
-
static VALUE rb_digest_copy(VALUE, VALUE);
|
63
|
-
static VALUE rb_digest_finish(int, VALUE*, VALUE);
|
64
|
-
static VALUE rb_digest_reset(VALUE);
|
65
|
-
static VALUE rb_digest_update(VALUE, VALUE);
|
66
|
-
|
67
|
-
/* Digest properties */
|
68
|
-
static VALUE rb_digest_block_length(VALUE);
|
69
|
-
static VALUE rb_digest_length(VALUE);
|
70
|
-
static VALUE rb_digest_name(VALUE);
|
71
|
-
|
72
|
-
/* Output methods */
|
73
|
-
static VALUE rb_digest_digest(int, VALUE*, VALUE);
|
74
|
-
static VALUE rb_digest_hexdigest(int, VALUE*, VALUE);
|
75
|
-
static VALUE rb_digest_hex_squeeze(VALUE, VALUE);
|
76
|
-
static VALUE rb_digest_squeeze(VALUE, VALUE);
|
77
|
-
static VALUE rb_digest_self_digest(VALUE, VALUE, VALUE);
|
78
|
-
static VALUE rb_digest_self_hexdigest(VALUE, VALUE, VALUE);
|
13
|
+
extern void Init_sha3_digest(void);
|
79
14
|
|
80
15
|
#ifdef __cplusplus
|
81
16
|
}
|
data/ext/sha3/extconf.rb
CHANGED
@@ -4,7 +4,7 @@ require 'mkmf'
|
|
4
4
|
require 'rbconfig'
|
5
5
|
|
6
6
|
b64 = 8.size == 8
|
7
|
-
extension_name = '
|
7
|
+
extension_name = 'sha3_ext'
|
8
8
|
ref_dir = b64 ? 'ref-64bits' : 'ref-32bits'
|
9
9
|
|
10
10
|
dir_config(extension_name)
|
@@ -40,10 +40,10 @@ $VPATH << vpath_dirs_processed
|
|
40
40
|
# Add include flags
|
41
41
|
$INCFLAGS << vpath_dirs_processed
|
42
42
|
.map { |dir| " -I$(srcdir)#{dir}" }
|
43
|
-
.join
|
43
|
+
.join
|
44
44
|
|
45
45
|
# Base source files
|
46
|
-
$srcs = ['digest.c']
|
46
|
+
$srcs = ['digest.c', 'kmac.c', 'sha3.c']
|
47
47
|
|
48
48
|
# Find and add all .c files from the filtered directories
|
49
49
|
$srcs += vpath_dirs
|
data/ext/sha3/kmac.c
ADDED
@@ -0,0 +1,504 @@
|
|
1
|
+
#include "kmac.h"
|
2
|
+
|
3
|
+
#include "KeccakHash.h"
|
4
|
+
#include "SP800-185.h"
|
5
|
+
#include "sha3.h"
|
6
|
+
|
7
|
+
// SHA3::KMAC.new(algorithm, output_length, key, customization)
|
8
|
+
// SHA3::KMAC128.new(output_length, key, customization)
|
9
|
+
// SHA3::KMAC256.new(output_length, key, customization)
|
10
|
+
// kmac.update
|
11
|
+
// kmac.digest | kmac.hexdigest
|
12
|
+
|
13
|
+
/*** Types and structs ***/
|
14
|
+
|
15
|
+
typedef enum { KMAC_128 = 0, KMAC_256 } sha3_kmac_algorithms;
|
16
|
+
|
17
|
+
typedef struct {
|
18
|
+
KMAC_Instance* state;
|
19
|
+
sha3_kmac_algorithms algorithm;
|
20
|
+
|
21
|
+
size_t output_length;
|
22
|
+
} sha3_kmac_context_t;
|
23
|
+
|
24
|
+
/*** Function prototypes ***/
|
25
|
+
|
26
|
+
static int compare_contexts(const sha3_kmac_context_t*, const sha3_kmac_context_t*);
|
27
|
+
static void sha3_kmac_free_context(void*);
|
28
|
+
static size_t sha3_kmac_context_size(const void*);
|
29
|
+
|
30
|
+
/* Allocation and initialization */
|
31
|
+
static VALUE rb_sha3_kmac_alloc(VALUE);
|
32
|
+
static VALUE rb_sha3_kmac_init(int, VALUE*, VALUE);
|
33
|
+
static VALUE rb_sha3_kmac_copy(VALUE, VALUE);
|
34
|
+
|
35
|
+
/* Core digest operations */
|
36
|
+
static VALUE rb_sha3_kmac_finish(int, VALUE*, VALUE);
|
37
|
+
static VALUE rb_sha3_kmac_update(VALUE, VALUE);
|
38
|
+
|
39
|
+
/* Digest properties */
|
40
|
+
static VALUE rb_sha3_kmac_name(VALUE);
|
41
|
+
|
42
|
+
/* Output methods */
|
43
|
+
static VALUE rb_sha3_kmac_digest(int, VALUE*, VALUE);
|
44
|
+
static VALUE rb_sha3_kmac_hexdigest(int, VALUE*, VALUE);
|
45
|
+
static VALUE rb_sha3_kmac_self_digest(int, VALUE*, VALUE);
|
46
|
+
static VALUE rb_sha3_kmac_self_hexdigest(int, VALUE*, VALUE);
|
47
|
+
|
48
|
+
/*** Global variables ***/
|
49
|
+
|
50
|
+
VALUE _sha3_kmac_class;
|
51
|
+
VALUE _sha3_kmac_error_class;
|
52
|
+
|
53
|
+
/* Define the ID variables */
|
54
|
+
static ID _kmac_128_id;
|
55
|
+
static ID _kmac_256_id;
|
56
|
+
|
57
|
+
/* TypedData structure for sha3_kmac_context_t */
|
58
|
+
const rb_data_type_t sha3_kmac_data_type_t = {"SHA3::KMAC",
|
59
|
+
{
|
60
|
+
NULL,
|
61
|
+
sha3_kmac_free_context,
|
62
|
+
sha3_kmac_context_size,
|
63
|
+
},
|
64
|
+
NULL,
|
65
|
+
NULL,
|
66
|
+
RUBY_TYPED_FREE_IMMEDIATELY};
|
67
|
+
|
68
|
+
void Init_sha3_kmac(void) {
|
69
|
+
_kmac_128_id = rb_intern("kmac_128");
|
70
|
+
_kmac_256_id = rb_intern("kmac_256");
|
71
|
+
|
72
|
+
if (NIL_P(_sha3_module)) {
|
73
|
+
_sha3_module = rb_define_module("SHA3");
|
74
|
+
}
|
75
|
+
|
76
|
+
/*
|
77
|
+
* Document-class: SHA3::KMAC
|
78
|
+
*
|
79
|
+
* It is a subclass of the Digest::Class class, which provides a framework for
|
80
|
+
* creating and manipulating hash digests.
|
81
|
+
*/
|
82
|
+
_sha3_kmac_class = rb_define_class_under(_sha3_module, "KMAC", rb_cObject);
|
83
|
+
|
84
|
+
/*
|
85
|
+
* Document-class: SHA3::KMAC::KMACError
|
86
|
+
*
|
87
|
+
* All KMAC methods raise this exception on error.
|
88
|
+
*
|
89
|
+
* It is a subclass of the StandardError class -- see the Ruby documentation
|
90
|
+
* for more information.
|
91
|
+
*/
|
92
|
+
_sha3_kmac_error_class = rb_define_class_under(_sha3_kmac_class, "KMACError", rb_eStandardError);
|
93
|
+
|
94
|
+
rb_define_alloc_func(_sha3_kmac_class, rb_sha3_kmac_alloc);
|
95
|
+
rb_define_method(_sha3_kmac_class, "initialize", rb_sha3_kmac_init, -1);
|
96
|
+
rb_define_method(_sha3_kmac_class, "initialize_copy", rb_sha3_kmac_copy, 1);
|
97
|
+
rb_define_method(_sha3_kmac_class, "update", rb_sha3_kmac_update, 1);
|
98
|
+
rb_define_method(_sha3_kmac_class, "name", rb_sha3_kmac_name, 0);
|
99
|
+
|
100
|
+
rb_define_method(_sha3_kmac_class, "digest", rb_sha3_kmac_digest, -1);
|
101
|
+
rb_define_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_hexdigest, -1);
|
102
|
+
|
103
|
+
rb_define_private_method(_sha3_kmac_class, "finish", rb_sha3_kmac_finish, -1);
|
104
|
+
|
105
|
+
rb_define_alias(_sha3_kmac_class, "<<", "update");
|
106
|
+
|
107
|
+
rb_define_singleton_method(_sha3_kmac_class, "digest", rb_sha3_kmac_self_digest, -1);
|
108
|
+
rb_define_singleton_method(_sha3_kmac_class, "hexdigest", rb_sha3_kmac_self_hexdigest, -1);
|
109
|
+
|
110
|
+
return;
|
111
|
+
}
|
112
|
+
|
113
|
+
static int compare_contexts(const sha3_kmac_context_t* context1, const sha3_kmac_context_t* context2) {
|
114
|
+
// First check the algorithm
|
115
|
+
if (context1->algorithm != context2->algorithm) {
|
116
|
+
return 0;
|
117
|
+
}
|
118
|
+
|
119
|
+
// Compare the internal state structure
|
120
|
+
if (memcmp(context1->state, context2->state, sizeof(KMAC_Instance)) != 0) {
|
121
|
+
return 0;
|
122
|
+
}
|
123
|
+
|
124
|
+
// All comparisons passed
|
125
|
+
return 1;
|
126
|
+
}
|
127
|
+
|
128
|
+
static inline void get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
|
129
|
+
TypedData_Get_Struct((obj), sha3_kmac_context_t, &sha3_kmac_data_type_t, (*context));
|
130
|
+
if (!(*context)) {
|
131
|
+
rb_raise(rb_eRuntimeError, "KMAC data not initialized!");
|
132
|
+
}
|
133
|
+
}
|
134
|
+
|
135
|
+
static inline void safe_get_sha3_kmac_context(VALUE obj, sha3_kmac_context_t** context) {
|
136
|
+
if (!rb_obj_is_kind_of(obj, _sha3_kmac_class)) {
|
137
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(obj),
|
138
|
+
rb_class2name(_sha3_kmac_class));
|
139
|
+
}
|
140
|
+
get_sha3_kmac_context(obj, context);
|
141
|
+
}
|
142
|
+
|
143
|
+
static void sha3_kmac_free_context(void* ptr) {
|
144
|
+
sha3_kmac_context_t* context = (sha3_kmac_context_t*)ptr;
|
145
|
+
if (context) {
|
146
|
+
if (context->state) {
|
147
|
+
free(context->state);
|
148
|
+
}
|
149
|
+
free(context);
|
150
|
+
}
|
151
|
+
}
|
152
|
+
|
153
|
+
static size_t sha3_kmac_context_size(const void* ptr) {
|
154
|
+
const sha3_kmac_context_t* context = (const sha3_kmac_context_t*)ptr;
|
155
|
+
size_t size = sizeof(sha3_kmac_context_t);
|
156
|
+
|
157
|
+
if (context && context->state) {
|
158
|
+
size += sizeof(KMAC_Instance);
|
159
|
+
}
|
160
|
+
|
161
|
+
return size;
|
162
|
+
}
|
163
|
+
|
164
|
+
static VALUE rb_sha3_kmac_alloc(VALUE klass) {
|
165
|
+
sha3_kmac_context_t* context = (sha3_kmac_context_t*)malloc(sizeof(sha3_kmac_context_t));
|
166
|
+
if (!context) {
|
167
|
+
rb_raise(_sha3_kmac_error_class, "failed to allocate object memory");
|
168
|
+
}
|
169
|
+
|
170
|
+
context->state = (KMAC_Instance*)calloc(1, sizeof(KMAC_Instance));
|
171
|
+
if (!context->state) {
|
172
|
+
sha3_kmac_free_context(context);
|
173
|
+
rb_raise(_sha3_kmac_error_class, "failed to allocate state memory");
|
174
|
+
}
|
175
|
+
|
176
|
+
VALUE obj = TypedData_Wrap_Struct(klass, &sha3_kmac_data_type_t, context);
|
177
|
+
context->output_length = 0; // Default output length in bits
|
178
|
+
context->algorithm = KMAC_128; // Default algorithm
|
179
|
+
|
180
|
+
return obj;
|
181
|
+
}
|
182
|
+
|
183
|
+
/*
|
184
|
+
* :call-seq:
|
185
|
+
* ::new(algorithm, output_length, key, [customization]) -> instance
|
186
|
+
*
|
187
|
+
* Creates a new KMAC object.
|
188
|
+
*
|
189
|
+
* +algorithm+::
|
190
|
+
* The KMAC algorithm to use (as a Symbol).
|
191
|
+
* Valid algorithms are:
|
192
|
+
* - :kmac_128
|
193
|
+
* - :kmac_256
|
194
|
+
*
|
195
|
+
* +output_length+::
|
196
|
+
* The length of the output in bytes.
|
197
|
+
*
|
198
|
+
* +key+::
|
199
|
+
* The key to use for the KMAC.
|
200
|
+
*
|
201
|
+
* +customization+::
|
202
|
+
* _optional_ The customization string to use.
|
203
|
+
*
|
204
|
+
* = example
|
205
|
+
* SHA3::KMAC.new(:kmac_128, 32, "key")
|
206
|
+
* SHA3::KMAC.new(:kmac_256, 64, "key", "customization")
|
207
|
+
*/
|
208
|
+
static VALUE rb_sha3_kmac_init(int argc, VALUE* argv, VALUE self) {
|
209
|
+
sha3_kmac_context_t* context;
|
210
|
+
VALUE algorithm, output_length, key, customization;
|
211
|
+
|
212
|
+
rb_scan_args(argc, argv, "31", &algorithm, &output_length, &key, &customization);
|
213
|
+
|
214
|
+
get_sha3_kmac_context(self, &context);
|
215
|
+
|
216
|
+
ID sym = SYM2ID(algorithm);
|
217
|
+
if (rb_equal(sym, _kmac_128_id)) {
|
218
|
+
context->algorithm = KMAC_128;
|
219
|
+
} else if (rb_equal(sym, _kmac_256_id)) {
|
220
|
+
context->algorithm = KMAC_256;
|
221
|
+
} else {
|
222
|
+
rb_raise(_sha3_kmac_error_class, "invalid algorithm");
|
223
|
+
}
|
224
|
+
|
225
|
+
if (!NIL_P(output_length)) {
|
226
|
+
Check_Type(output_length, T_FIXNUM);
|
227
|
+
context->output_length = NUM2ULONG(output_length) * 8;
|
228
|
+
}
|
229
|
+
|
230
|
+
if (!NIL_P(key)) {
|
231
|
+
Check_Type(key, T_STRING);
|
232
|
+
size_t key_len = RSTRING_LEN(key) * 8;
|
233
|
+
const unsigned char* key_ptr = (const unsigned char*)RSTRING_PTR(key);
|
234
|
+
|
235
|
+
if (context->algorithm == KMAC_128) {
|
236
|
+
if (KMAC128_Initialize(context->state, key_ptr, key_len, context->output_length,
|
237
|
+
NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
|
238
|
+
NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
|
239
|
+
rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC128");
|
240
|
+
}
|
241
|
+
} else {
|
242
|
+
if (KMAC256_Initialize(context->state, key_ptr, key_len, context->output_length,
|
243
|
+
NIL_P(customization) ? NULL : (const unsigned char*)RSTRING_PTR(customization),
|
244
|
+
NIL_P(customization) ? 0 : RSTRING_LEN(customization) * 8) != 0) {
|
245
|
+
rb_raise(_sha3_kmac_error_class, "failed to initialize KMAC256");
|
246
|
+
}
|
247
|
+
}
|
248
|
+
}
|
249
|
+
|
250
|
+
return self;
|
251
|
+
}
|
252
|
+
|
253
|
+
/*
|
254
|
+
* :call-seq:
|
255
|
+
* initialize_copy(other) -> kmac
|
256
|
+
*
|
257
|
+
* Initializes the KMAC with the state of another KMAC.
|
258
|
+
*
|
259
|
+
* +other+::
|
260
|
+
* The KMAC to copy the state from.
|
261
|
+
*
|
262
|
+
* = example
|
263
|
+
* new_kmac = kmac.dup
|
264
|
+
*/
|
265
|
+
static VALUE rb_sha3_kmac_copy(VALUE self, VALUE other) {
|
266
|
+
sha3_kmac_context_t* context;
|
267
|
+
sha3_kmac_context_t* other_context;
|
268
|
+
|
269
|
+
rb_check_frozen(self);
|
270
|
+
if (self == other) {
|
271
|
+
return self;
|
272
|
+
}
|
273
|
+
|
274
|
+
if (!rb_obj_is_kind_of(other, _sha3_kmac_class)) {
|
275
|
+
rb_raise(rb_eTypeError, "wrong argument (%s)! (expected %s)", rb_obj_classname(other),
|
276
|
+
rb_class2name(_sha3_kmac_class));
|
277
|
+
}
|
278
|
+
|
279
|
+
safe_get_sha3_kmac_context(other, &other_context);
|
280
|
+
get_sha3_kmac_context(self, &context);
|
281
|
+
|
282
|
+
context->algorithm = other_context->algorithm;
|
283
|
+
context->output_length = other_context->output_length;
|
284
|
+
memcpy(context->state, other_context->state, sizeof(KMAC_Instance));
|
285
|
+
|
286
|
+
if (!compare_contexts(context, other_context)) {
|
287
|
+
rb_raise(_sha3_kmac_error_class, "failed to copy state");
|
288
|
+
}
|
289
|
+
|
290
|
+
return self;
|
291
|
+
}
|
292
|
+
|
293
|
+
/*
|
294
|
+
* :call-seq:
|
295
|
+
* update(string) -> kmac
|
296
|
+
*
|
297
|
+
* Updates the KMAC with the given string.
|
298
|
+
*
|
299
|
+
* +string+::
|
300
|
+
* The string to update the KMAC with.
|
301
|
+
*
|
302
|
+
* = example
|
303
|
+
* kmac.update("more data")
|
304
|
+
* kmac << "more data" # alias for update
|
305
|
+
*/
|
306
|
+
static VALUE rb_sha3_kmac_update(VALUE self, VALUE data) {
|
307
|
+
sha3_kmac_context_t* context;
|
308
|
+
size_t data_len;
|
309
|
+
|
310
|
+
Check_Type(data, T_STRING);
|
311
|
+
data_len = RSTRING_LEN(data) * 8;
|
312
|
+
|
313
|
+
get_sha3_kmac_context(self, &context);
|
314
|
+
|
315
|
+
if (context->algorithm == KMAC_128) {
|
316
|
+
if (KMAC128_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
|
317
|
+
rb_raise(_sha3_kmac_error_class, "failed to update KMAC128");
|
318
|
+
}
|
319
|
+
} else {
|
320
|
+
if (KMAC256_Update(context->state, (const BitSequence*)RSTRING_PTR(data), data_len) != 0) {
|
321
|
+
rb_raise(_sha3_kmac_error_class, "failed to update KMAC256");
|
322
|
+
}
|
323
|
+
}
|
324
|
+
|
325
|
+
return self;
|
326
|
+
}
|
327
|
+
|
328
|
+
/*
|
329
|
+
* :call-seq:
|
330
|
+
* finish([message]) -> String
|
331
|
+
*
|
332
|
+
* Returns the final KMAC as a binary string.
|
333
|
+
*
|
334
|
+
* +message+::
|
335
|
+
* _optional_ Output buffer to receive the final KMAC value.
|
336
|
+
*
|
337
|
+
* = example
|
338
|
+
* kmac.finish
|
339
|
+
*/
|
340
|
+
static VALUE rb_sha3_kmac_finish(int argc, VALUE* argv, VALUE self) {
|
341
|
+
sha3_kmac_context_t* context;
|
342
|
+
VALUE output;
|
343
|
+
|
344
|
+
rb_scan_args(argc, argv, "01", &output);
|
345
|
+
|
346
|
+
get_sha3_kmac_context(self, &context);
|
347
|
+
|
348
|
+
if (NIL_P(output)) {
|
349
|
+
output = rb_str_new(0, context->output_length / 8);
|
350
|
+
} else {
|
351
|
+
StringValue(output);
|
352
|
+
rb_str_resize(output, context->output_length / 8);
|
353
|
+
}
|
354
|
+
|
355
|
+
if (context->algorithm == KMAC_128) {
|
356
|
+
if (KMAC128_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
|
357
|
+
rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC128");
|
358
|
+
}
|
359
|
+
} else {
|
360
|
+
if (KMAC256_Final(context->state, (BitSequence*)RSTRING_PTR(output)) != 0) {
|
361
|
+
rb_raise(_sha3_kmac_error_class, "failed to finalize KMAC256");
|
362
|
+
}
|
363
|
+
}
|
364
|
+
|
365
|
+
return output;
|
366
|
+
}
|
367
|
+
|
368
|
+
/*
|
369
|
+
* :call-seq:
|
370
|
+
* name -> String
|
371
|
+
*
|
372
|
+
* Returns the name of the algorithm.
|
373
|
+
*
|
374
|
+
* = example
|
375
|
+
* kmac.name #=> "KMAC128" or "KMAC256"
|
376
|
+
*/
|
377
|
+
static VALUE rb_sha3_kmac_name(VALUE self) {
|
378
|
+
sha3_kmac_context_t* context;
|
379
|
+
|
380
|
+
get_sha3_kmac_context(self, &context);
|
381
|
+
|
382
|
+
switch (context->algorithm) {
|
383
|
+
case KMAC_128:
|
384
|
+
return rb_str_new2("KMAC128");
|
385
|
+
case KMAC_256:
|
386
|
+
return rb_str_new2("KMAC256");
|
387
|
+
default:
|
388
|
+
rb_raise(_sha3_kmac_error_class, "unknown algorithm");
|
389
|
+
}
|
390
|
+
}
|
391
|
+
|
392
|
+
/*
|
393
|
+
* :call-seq:
|
394
|
+
* digest() -> string
|
395
|
+
* digest([data]) -> string
|
396
|
+
*
|
397
|
+
* Returns the binary representation of the KMAC.
|
398
|
+
* This method creates a copy of the current instance so that
|
399
|
+
* the original state is preserved for future updates.
|
400
|
+
*
|
401
|
+
* +data+::
|
402
|
+
* _optional_ Update state with additional data before returning KMAC.
|
403
|
+
*
|
404
|
+
* = example
|
405
|
+
* kmac.digest
|
406
|
+
* kmac.digest('final chunk')
|
407
|
+
*/
|
408
|
+
static VALUE rb_sha3_kmac_digest(int argc, VALUE* argv, VALUE self) {
|
409
|
+
VALUE copy, data;
|
410
|
+
|
411
|
+
rb_scan_args(argc, argv, "01", &data);
|
412
|
+
|
413
|
+
// Create a copy of the instance to avoid modifying the original
|
414
|
+
copy = rb_obj_clone(self);
|
415
|
+
|
416
|
+
// If data is provided, update the copy's state
|
417
|
+
if (!NIL_P(data)) {
|
418
|
+
rb_sha3_kmac_update(copy, data);
|
419
|
+
}
|
420
|
+
|
421
|
+
// Call finish on the copy
|
422
|
+
return rb_sha3_kmac_finish(0, NULL, copy);
|
423
|
+
}
|
424
|
+
|
425
|
+
/*
|
426
|
+
* :call-seq:
|
427
|
+
* hexdigest() -> string
|
428
|
+
* hexdigest([data]) -> string
|
429
|
+
*
|
430
|
+
* Returns the hexadecimal representation of the KMAC.
|
431
|
+
* This method creates a copy of the current instance so that
|
432
|
+
* the original state is preserved for future updates.
|
433
|
+
*
|
434
|
+
* +data+::
|
435
|
+
* _optional_ Update state with additional data before returning KMAC.
|
436
|
+
*
|
437
|
+
* = example
|
438
|
+
* kmac.hexdigest
|
439
|
+
* kmac.hexdigest('final chunk')
|
440
|
+
*/
|
441
|
+
static VALUE rb_sha3_kmac_hexdigest(int argc, VALUE* argv, VALUE self) {
|
442
|
+
VALUE bin_str = rb_sha3_kmac_digest(argc, argv, self);
|
443
|
+
return rb_funcall(bin_str, rb_intern("unpack1"), 1, rb_str_new2("H*"));
|
444
|
+
}
|
445
|
+
|
446
|
+
/*
|
447
|
+
* :call-seq:
|
448
|
+
* ::digest(algorithm, data, output_length, key, [customization]) -> string
|
449
|
+
*
|
450
|
+
* One-shot operation to return the binary KMAC digest without explicitly creating an instance.
|
451
|
+
*
|
452
|
+
* +algorithm+::
|
453
|
+
* The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
|
454
|
+
* +data+::
|
455
|
+
* The data to digest
|
456
|
+
* +output_length+::
|
457
|
+
* The length of the output in bytes
|
458
|
+
* +key+::
|
459
|
+
* The key to use for the KMAC
|
460
|
+
* +customization+::
|
461
|
+
* _optional_ The customization string to use
|
462
|
+
*
|
463
|
+
* = example
|
464
|
+
* SHA3::KMAC.digest(:kmac_128, "data", 32, "key")
|
465
|
+
* SHA3::KMAC.digest(:kmac_128, "data", 32, "key", "customization")
|
466
|
+
*/
|
467
|
+
static VALUE rb_sha3_kmac_self_digest(int argc, VALUE* argv, VALUE klass) {
|
468
|
+
VALUE algorithm, data, output_length, key, customization;
|
469
|
+
|
470
|
+
rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
|
471
|
+
|
472
|
+
VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
|
473
|
+
return rb_funcall(kmac, rb_intern("digest"), 1, data);
|
474
|
+
}
|
475
|
+
|
476
|
+
/*
|
477
|
+
* :call-seq:
|
478
|
+
* ::hexdigest(algorithm, data, output_length, key, [customization]) -> string
|
479
|
+
*
|
480
|
+
* One-shot operation to return the hexadecimal KMAC digest without explicitly creating an instance.
|
481
|
+
*
|
482
|
+
* +algorithm+::
|
483
|
+
* The KMAC algorithm to use (as a Symbol) - :kmac_128 or :kmac_256
|
484
|
+
* +data+::
|
485
|
+
* The data to digest
|
486
|
+
* +output_length+::
|
487
|
+
* The length of the output in bytes
|
488
|
+
* +key+::
|
489
|
+
* The key to use for the KMAC
|
490
|
+
* +customization+::
|
491
|
+
* _optional_ The customization string to use
|
492
|
+
*
|
493
|
+
* = example
|
494
|
+
* SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key")
|
495
|
+
* SHA3::KMAC.hexdigest(:kmac_128, "data", 32, "key", "customization")
|
496
|
+
*/
|
497
|
+
static VALUE rb_sha3_kmac_self_hexdigest(int argc, VALUE* argv, VALUE klass) {
|
498
|
+
VALUE algorithm, data, output_length, key, customization;
|
499
|
+
|
500
|
+
rb_scan_args(argc, argv, "41", &algorithm, &data, &output_length, &key, &customization);
|
501
|
+
|
502
|
+
VALUE kmac = rb_funcall(klass, rb_intern("new"), 4, algorithm, output_length, key, customization);
|
503
|
+
return rb_funcall(kmac, rb_intern("hexdigest"), 1, data);
|
504
|
+
}
|
data/ext/sha3/kmac.h
ADDED
data/ext/sha3/sha3.c
ADDED
@@ -0,0 +1,31 @@
|
|
1
|
+
#include "sha3.h"
|
2
|
+
|
3
|
+
#include "digest.h"
|
4
|
+
#include "kmac.h"
|
5
|
+
|
6
|
+
VALUE _sha3_module;
|
7
|
+
|
8
|
+
void Init_sha3_ext(void) {
|
9
|
+
/*
|
10
|
+
* Document-module: SHA3
|
11
|
+
*
|
12
|
+
* This module provides implementations of the SHA-3 family of cryptographic hash functions
|
13
|
+
* and the SHAKE extendable-output functions.
|
14
|
+
*
|
15
|
+
* It includes the SHA3::Digest and SHA3::KMAC classes, which offer methods for computing digests and keyed message
|
16
|
+
* authentication codes (KMAC).
|
17
|
+
*
|
18
|
+
* == Classes
|
19
|
+
* SHA3::Digest
|
20
|
+
* SHA3::Digest::DigestError
|
21
|
+
* SHA3::KMAC
|
22
|
+
* SHA3::KMAC::KMACError
|
23
|
+
*
|
24
|
+
*/
|
25
|
+
_sha3_module = rb_define_module("SHA3");
|
26
|
+
|
27
|
+
Init_sha3_digest();
|
28
|
+
Init_sha3_kmac();
|
29
|
+
|
30
|
+
return;
|
31
|
+
}
|
data/ext/sha3/sha3.h
ADDED