react-native-quick-crypto 1.0.0-beta.2 → 1.0.0-beta.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (462) hide show
  1. package/QuickCrypto.podspec +143 -7
  2. package/README.md +12 -6
  3. package/android/CMakeLists.txt +82 -21
  4. package/android/build.gradle +47 -4
  5. package/android/src/main/cpp/cpp-adapter.cpp +3 -10
  6. package/android/src/main/java/com/margelo/nitro/quickcrypto/QuickCryptoPackage.java +13 -10
  7. package/app.plugin.js +3 -0
  8. package/cpp/blake3/HybridBlake3.cpp +118 -0
  9. package/cpp/blake3/HybridBlake3.hpp +35 -0
  10. package/cpp/cipher/CCMCipher.cpp +199 -0
  11. package/cpp/cipher/CCMCipher.hpp +26 -0
  12. package/cpp/cipher/ChaCha20Cipher.cpp +97 -0
  13. package/cpp/cipher/ChaCha20Cipher.hpp +25 -0
  14. package/cpp/cipher/ChaCha20Poly1305Cipher.cpp +170 -0
  15. package/cpp/cipher/ChaCha20Poly1305Cipher.hpp +30 -0
  16. package/cpp/cipher/HybridCipher.cpp +322 -0
  17. package/cpp/cipher/HybridCipher.hpp +68 -0
  18. package/cpp/cipher/HybridCipherFactory.hpp +97 -0
  19. package/cpp/cipher/OCBCipher.cpp +55 -0
  20. package/cpp/cipher/OCBCipher.hpp +19 -0
  21. package/cpp/cipher/XSalsa20Cipher.cpp +61 -0
  22. package/cpp/cipher/XSalsa20Cipher.hpp +33 -0
  23. package/cpp/ec/HybridEcKeyPair.cpp +428 -0
  24. package/cpp/ec/HybridEcKeyPair.hpp +48 -0
  25. package/cpp/ed25519/HybridEdKeyPair.cpp +300 -0
  26. package/cpp/ed25519/HybridEdKeyPair.hpp +63 -0
  27. package/cpp/hash/HybridHash.cpp +185 -0
  28. package/cpp/hash/HybridHash.hpp +43 -0
  29. package/cpp/hmac/HybridHmac.cpp +95 -0
  30. package/cpp/hmac/HybridHmac.hpp +31 -0
  31. package/cpp/keys/HybridKeyObjectHandle.cpp +243 -0
  32. package/cpp/keys/HybridKeyObjectHandle.hpp +42 -0
  33. package/cpp/keys/KeyObjectData.cpp +226 -0
  34. package/cpp/keys/KeyObjectData.hpp +71 -0
  35. package/cpp/keys/node.h +5 -0
  36. package/cpp/pbkdf2/HybridPbkdf2.cpp +51 -0
  37. package/cpp/pbkdf2/HybridPbkdf2.hpp +24 -0
  38. package/cpp/random/HybridRandom.cpp +32 -18
  39. package/cpp/random/HybridRandom.hpp +18 -30
  40. package/cpp/rsa/HybridRsaKeyPair.cpp +154 -0
  41. package/cpp/rsa/HybridRsaKeyPair.hpp +43 -0
  42. package/cpp/utils/Macros.hpp +68 -0
  43. package/cpp/utils/Utils.hpp +53 -1
  44. package/deps/blake3/.cargo/config.toml +2 -0
  45. package/deps/blake3/.git-blame-ignore-revs +2 -0
  46. package/deps/blake3/.github/workflows/build_b3sum.py +38 -0
  47. package/deps/blake3/.github/workflows/ci.yml +491 -0
  48. package/deps/blake3/.github/workflows/tag.yml +43 -0
  49. package/deps/blake3/.github/workflows/upload_github_release_asset.py +73 -0
  50. package/deps/blake3/CONTRIBUTING.md +31 -0
  51. package/deps/blake3/Cargo.toml +135 -0
  52. package/deps/blake3/LICENSE_A2 +202 -0
  53. package/deps/blake3/LICENSE_A2LLVM +219 -0
  54. package/deps/blake3/LICENSE_CC0 +121 -0
  55. package/deps/blake3/README.md +229 -0
  56. package/deps/blake3/b3sum/Cargo.lock +513 -0
  57. package/deps/blake3/b3sum/Cargo.toml +26 -0
  58. package/deps/blake3/b3sum/README.md +72 -0
  59. package/deps/blake3/b3sum/src/main.rs +564 -0
  60. package/deps/blake3/b3sum/src/unit_tests.rs +235 -0
  61. package/deps/blake3/b3sum/tests/cli_tests.rs +680 -0
  62. package/deps/blake3/b3sum/what_does_check_do.md +176 -0
  63. package/deps/blake3/benches/bench.rs +623 -0
  64. package/deps/blake3/build.rs +389 -0
  65. package/deps/blake3/c/CMakeLists.txt +383 -0
  66. package/deps/blake3/c/CMakePresets.json +73 -0
  67. package/deps/blake3/c/Makefile.testing +82 -0
  68. package/deps/blake3/c/README.md +403 -0
  69. package/deps/blake3/c/blake3-config.cmake.in +14 -0
  70. package/deps/blake3/c/blake3.c +650 -0
  71. package/deps/blake3/c/blake3.h +86 -0
  72. package/deps/blake3/c/blake3_avx2.c +326 -0
  73. package/deps/blake3/c/blake3_avx2_x86-64_unix.S +1815 -0
  74. package/deps/blake3/c/blake3_avx2_x86-64_windows_gnu.S +1817 -0
  75. package/deps/blake3/c/blake3_avx2_x86-64_windows_msvc.asm +1828 -0
  76. package/deps/blake3/c/blake3_avx512.c +1388 -0
  77. package/deps/blake3/c/blake3_avx512_x86-64_unix.S +4824 -0
  78. package/deps/blake3/c/blake3_avx512_x86-64_windows_gnu.S +2615 -0
  79. package/deps/blake3/c/blake3_avx512_x86-64_windows_msvc.asm +2634 -0
  80. package/deps/blake3/c/blake3_c_rust_bindings/Cargo.toml +32 -0
  81. package/deps/blake3/c/blake3_c_rust_bindings/README.md +4 -0
  82. package/deps/blake3/c/blake3_c_rust_bindings/benches/bench.rs +477 -0
  83. package/deps/blake3/c/blake3_c_rust_bindings/build.rs +253 -0
  84. package/deps/blake3/c/blake3_c_rust_bindings/cross_test.sh +31 -0
  85. package/deps/blake3/c/blake3_c_rust_bindings/src/lib.rs +333 -0
  86. package/deps/blake3/c/blake3_c_rust_bindings/src/test.rs +696 -0
  87. package/deps/blake3/c/blake3_dispatch.c +332 -0
  88. package/deps/blake3/c/blake3_impl.h +333 -0
  89. package/deps/blake3/c/blake3_neon.c +366 -0
  90. package/deps/blake3/c/blake3_portable.c +160 -0
  91. package/deps/blake3/c/blake3_sse2.c +566 -0
  92. package/deps/blake3/c/blake3_sse2_x86-64_unix.S +2291 -0
  93. package/deps/blake3/c/blake3_sse2_x86-64_windows_gnu.S +2332 -0
  94. package/deps/blake3/c/blake3_sse2_x86-64_windows_msvc.asm +2350 -0
  95. package/deps/blake3/c/blake3_sse41.c +560 -0
  96. package/deps/blake3/c/blake3_sse41_x86-64_unix.S +2028 -0
  97. package/deps/blake3/c/blake3_sse41_x86-64_windows_gnu.S +2069 -0
  98. package/deps/blake3/c/blake3_sse41_x86-64_windows_msvc.asm +2089 -0
  99. package/deps/blake3/c/blake3_tbb.cpp +37 -0
  100. package/deps/blake3/c/dependencies/CMakeLists.txt +3 -0
  101. package/deps/blake3/c/dependencies/tbb/CMakeLists.txt +28 -0
  102. package/deps/blake3/c/example.c +36 -0
  103. package/deps/blake3/c/example_tbb.c +57 -0
  104. package/deps/blake3/c/libblake3.pc.in +12 -0
  105. package/deps/blake3/c/main.c +166 -0
  106. package/deps/blake3/c/test.py +97 -0
  107. package/deps/blake3/media/B3.svg +70 -0
  108. package/deps/blake3/media/BLAKE3.svg +85 -0
  109. package/deps/blake3/media/speed.svg +1474 -0
  110. package/deps/blake3/reference_impl/Cargo.toml +8 -0
  111. package/deps/blake3/reference_impl/README.md +14 -0
  112. package/deps/blake3/reference_impl/reference_impl.rs +374 -0
  113. package/deps/blake3/src/ffi_avx2.rs +65 -0
  114. package/deps/blake3/src/ffi_avx512.rs +169 -0
  115. package/deps/blake3/src/ffi_neon.rs +82 -0
  116. package/deps/blake3/src/ffi_sse2.rs +126 -0
  117. package/deps/blake3/src/ffi_sse41.rs +126 -0
  118. package/deps/blake3/src/guts.rs +60 -0
  119. package/deps/blake3/src/hazmat.rs +704 -0
  120. package/deps/blake3/src/io.rs +64 -0
  121. package/deps/blake3/src/join.rs +92 -0
  122. package/deps/blake3/src/lib.rs +1835 -0
  123. package/deps/blake3/src/platform.rs +587 -0
  124. package/deps/blake3/src/portable.rs +198 -0
  125. package/deps/blake3/src/rust_avx2.rs +474 -0
  126. package/deps/blake3/src/rust_sse2.rs +775 -0
  127. package/deps/blake3/src/rust_sse41.rs +766 -0
  128. package/deps/blake3/src/test.rs +1049 -0
  129. package/deps/blake3/src/traits.rs +227 -0
  130. package/deps/blake3/src/wasm32_simd.rs +794 -0
  131. package/deps/blake3/test_vectors/Cargo.toml +19 -0
  132. package/deps/blake3/test_vectors/cross_test.sh +25 -0
  133. package/deps/blake3/test_vectors/src/bin/generate.rs +4 -0
  134. package/deps/blake3/test_vectors/src/lib.rs +350 -0
  135. package/deps/blake3/test_vectors/test_vectors.json +217 -0
  136. package/deps/blake3/tools/compiler_version/Cargo.toml +7 -0
  137. package/deps/blake3/tools/compiler_version/build.rs +6 -0
  138. package/deps/blake3/tools/compiler_version/src/main.rs +27 -0
  139. package/deps/blake3/tools/instruction_set_support/Cargo.toml +6 -0
  140. package/deps/blake3/tools/instruction_set_support/src/main.rs +10 -0
  141. package/deps/blake3/tools/release.md +16 -0
  142. package/deps/fastpbkdf2/fastpbkdf2.c +356 -0
  143. package/deps/fastpbkdf2/fastpbkdf2.h +68 -0
  144. package/deps/ncrypto/ncrypto.cc +4679 -0
  145. package/deps/ncrypto/ncrypto.h +1625 -0
  146. package/lib/commonjs/blake3.js +98 -0
  147. package/lib/commonjs/blake3.js.map +1 -0
  148. package/lib/commonjs/cipher.js +180 -0
  149. package/lib/commonjs/cipher.js.map +1 -0
  150. package/lib/commonjs/ec.js +344 -0
  151. package/lib/commonjs/ec.js.map +1 -0
  152. package/lib/commonjs/ed.js +185 -0
  153. package/lib/commonjs/ed.js.map +1 -0
  154. package/lib/commonjs/expo-plugin/@types.js +2 -0
  155. package/lib/commonjs/expo-plugin/@types.js.map +1 -0
  156. package/lib/commonjs/expo-plugin/withRNQC.js +25 -0
  157. package/lib/commonjs/expo-plugin/withRNQC.js.map +1 -0
  158. package/lib/commonjs/expo-plugin/withSodiumAndroid.js +25 -0
  159. package/lib/commonjs/expo-plugin/withSodiumAndroid.js.map +1 -0
  160. package/lib/commonjs/expo-plugin/withSodiumIos.js +26 -0
  161. package/lib/commonjs/expo-plugin/withSodiumIos.js.map +1 -0
  162. package/lib/commonjs/expo-plugin/withXCode.js +51 -0
  163. package/lib/commonjs/expo-plugin/withXCode.js.map +1 -0
  164. package/lib/commonjs/hash.js +215 -0
  165. package/lib/commonjs/hash.js.map +1 -0
  166. package/lib/commonjs/hmac.js +109 -0
  167. package/lib/commonjs/hmac.js.map +1 -0
  168. package/lib/commonjs/index.js +152 -32
  169. package/lib/commonjs/index.js.map +1 -1
  170. package/lib/commonjs/keys/classes.js +250 -0
  171. package/lib/commonjs/keys/classes.js.map +1 -0
  172. package/lib/commonjs/keys/generateKeyPair.js +102 -0
  173. package/lib/commonjs/keys/generateKeyPair.js.map +1 -0
  174. package/lib/commonjs/keys/index.js +89 -0
  175. package/lib/commonjs/keys/index.js.map +1 -0
  176. package/lib/commonjs/keys/signVerify.js +41 -0
  177. package/lib/commonjs/keys/signVerify.js.map +1 -0
  178. package/lib/commonjs/keys/utils.js +123 -0
  179. package/lib/commonjs/keys/utils.js.map +1 -0
  180. package/lib/commonjs/pbkdf2.js +89 -0
  181. package/lib/commonjs/pbkdf2.js.map +1 -0
  182. package/lib/commonjs/random.js +9 -3
  183. package/lib/commonjs/random.js.map +1 -1
  184. package/lib/commonjs/rsa.js +129 -0
  185. package/lib/commonjs/rsa.js.map +1 -0
  186. package/lib/commonjs/specs/blake3.nitro.js +6 -0
  187. package/lib/commonjs/specs/blake3.nitro.js.map +1 -0
  188. package/lib/commonjs/specs/cipher.nitro.js +6 -0
  189. package/lib/commonjs/specs/cipher.nitro.js.map +1 -0
  190. package/lib/commonjs/specs/ecKeyPair.nitro.js +6 -0
  191. package/lib/commonjs/specs/ecKeyPair.nitro.js.map +1 -0
  192. package/lib/commonjs/specs/edKeyPair.nitro.js +6 -0
  193. package/lib/commonjs/specs/edKeyPair.nitro.js.map +1 -0
  194. package/lib/commonjs/specs/hash.nitro.js +6 -0
  195. package/lib/commonjs/specs/hash.nitro.js.map +1 -0
  196. package/lib/commonjs/specs/hmac.nitro.js +6 -0
  197. package/lib/commonjs/specs/hmac.nitro.js.map +1 -0
  198. package/lib/commonjs/specs/keyObjectHandle.nitro.js +6 -0
  199. package/lib/commonjs/specs/keyObjectHandle.nitro.js.map +1 -0
  200. package/lib/commonjs/specs/pbkdf2.nitro.js +6 -0
  201. package/lib/commonjs/specs/pbkdf2.nitro.js.map +1 -0
  202. package/lib/commonjs/specs/rsaKeyPair.nitro.js +6 -0
  203. package/lib/commonjs/specs/rsaKeyPair.nitro.js.map +1 -0
  204. package/lib/commonjs/subtle.js +365 -0
  205. package/lib/commonjs/subtle.js.map +1 -0
  206. package/lib/commonjs/utils/cipher.js +64 -0
  207. package/lib/commonjs/utils/cipher.js.map +1 -0
  208. package/lib/commonjs/utils/conversion.js +140 -6
  209. package/lib/commonjs/utils/conversion.js.map +1 -1
  210. package/lib/commonjs/utils/errors.js +14 -0
  211. package/lib/commonjs/utils/errors.js.map +1 -0
  212. package/lib/commonjs/utils/hashnames.js +91 -0
  213. package/lib/commonjs/utils/hashnames.js.map +1 -0
  214. package/lib/commonjs/utils/index.js +65 -5
  215. package/lib/commonjs/utils/index.js.map +1 -1
  216. package/lib/commonjs/utils/noble.js +82 -0
  217. package/lib/commonjs/utils/noble.js.map +1 -0
  218. package/lib/commonjs/utils/types.js +52 -0
  219. package/lib/commonjs/utils/types.js.map +1 -1
  220. package/lib/commonjs/utils/validation.js +98 -0
  221. package/lib/commonjs/utils/validation.js.map +1 -0
  222. package/lib/module/blake3.js +90 -0
  223. package/lib/module/blake3.js.map +1 -0
  224. package/lib/module/cipher.js +173 -0
  225. package/lib/module/cipher.js.map +1 -0
  226. package/lib/module/ec.js +336 -0
  227. package/lib/module/ec.js.map +1 -0
  228. package/lib/module/ed.js +178 -0
  229. package/lib/module/ed.js.map +1 -0
  230. package/lib/module/expo-plugin/@types.js +2 -0
  231. package/lib/module/expo-plugin/@types.js.map +1 -0
  232. package/lib/module/expo-plugin/withRNQC.js +21 -0
  233. package/lib/module/expo-plugin/withRNQC.js.map +1 -0
  234. package/lib/module/expo-plugin/withSodiumAndroid.js +20 -0
  235. package/lib/module/expo-plugin/withSodiumAndroid.js.map +1 -0
  236. package/lib/module/expo-plugin/withSodiumIos.js +20 -0
  237. package/lib/module/expo-plugin/withSodiumIos.js.map +1 -0
  238. package/lib/module/expo-plugin/withXCode.js +46 -0
  239. package/lib/module/expo-plugin/withXCode.js.map +1 -0
  240. package/lib/module/hash.js +207 -0
  241. package/lib/module/hash.js.map +1 -0
  242. package/lib/module/hmac.js +104 -0
  243. package/lib/module/hmac.js.map +1 -0
  244. package/lib/module/index.js +33 -29
  245. package/lib/module/index.js.map +1 -1
  246. package/lib/module/keys/classes.js +241 -0
  247. package/lib/module/keys/classes.js.map +1 -0
  248. package/lib/module/keys/generateKeyPair.js +96 -0
  249. package/lib/module/keys/generateKeyPair.js.map +1 -0
  250. package/lib/module/keys/index.js +32 -0
  251. package/lib/module/keys/index.js.map +1 -0
  252. package/lib/module/keys/signVerify.js +41 -0
  253. package/lib/module/keys/signVerify.js.map +1 -0
  254. package/lib/module/keys/utils.js +114 -0
  255. package/lib/module/keys/utils.js.map +1 -0
  256. package/lib/module/pbkdf2.js +83 -0
  257. package/lib/module/pbkdf2.js.map +1 -0
  258. package/lib/module/random.js +7 -1
  259. package/lib/module/random.js.map +1 -1
  260. package/lib/module/rsa.js +123 -0
  261. package/lib/module/rsa.js.map +1 -0
  262. package/lib/module/specs/blake3.nitro.js +4 -0
  263. package/lib/module/specs/blake3.nitro.js.map +1 -0
  264. package/lib/module/specs/cipher.nitro.js +4 -0
  265. package/lib/module/specs/cipher.nitro.js.map +1 -0
  266. package/lib/module/specs/ecKeyPair.nitro.js +4 -0
  267. package/lib/module/specs/ecKeyPair.nitro.js.map +1 -0
  268. package/lib/module/specs/edKeyPair.nitro.js +4 -0
  269. package/lib/module/specs/edKeyPair.nitro.js.map +1 -0
  270. package/lib/module/specs/hash.nitro.js +4 -0
  271. package/lib/module/specs/hash.nitro.js.map +1 -0
  272. package/lib/module/specs/hmac.nitro.js +4 -0
  273. package/lib/module/specs/hmac.nitro.js.map +1 -0
  274. package/lib/module/specs/keyObjectHandle.nitro.js +4 -0
  275. package/lib/module/specs/keyObjectHandle.nitro.js.map +1 -0
  276. package/lib/module/specs/pbkdf2.nitro.js +4 -0
  277. package/lib/module/specs/pbkdf2.nitro.js.map +1 -0
  278. package/lib/module/specs/rsaKeyPair.nitro.js +4 -0
  279. package/lib/module/specs/rsaKeyPair.nitro.js.map +1 -0
  280. package/lib/module/subtle.js +360 -0
  281. package/lib/module/subtle.js.map +1 -0
  282. package/lib/module/utils/cipher.js +56 -0
  283. package/lib/module/utils/cipher.js.map +1 -0
  284. package/lib/module/utils/conversion.js +120 -8
  285. package/lib/module/utils/conversion.js.map +1 -1
  286. package/lib/module/utils/errors.js +10 -0
  287. package/lib/module/utils/errors.js.map +1 -0
  288. package/lib/module/utils/hashnames.js +89 -0
  289. package/lib/module/utils/hashnames.js.map +1 -0
  290. package/lib/module/utils/index.js +6 -5
  291. package/lib/module/utils/index.js.map +1 -1
  292. package/lib/module/utils/noble.js +76 -0
  293. package/lib/module/utils/noble.js.map +1 -0
  294. package/lib/module/utils/types.js +53 -0
  295. package/lib/module/utils/types.js.map +1 -1
  296. package/lib/module/utils/validation.js +87 -0
  297. package/lib/module/utils/validation.js.map +1 -0
  298. package/lib/tsconfig.tsbuildinfo +1 -1
  299. package/lib/typescript/blake3.d.ts +33 -0
  300. package/lib/typescript/blake3.d.ts.map +1 -0
  301. package/lib/typescript/cipher.d.ts +60 -0
  302. package/lib/typescript/cipher.d.ts.map +1 -0
  303. package/lib/typescript/ec.d.ts +13 -0
  304. package/lib/typescript/ec.d.ts.map +1 -0
  305. package/lib/typescript/ed.d.ts +43 -0
  306. package/lib/typescript/ed.d.ts.map +1 -0
  307. package/lib/typescript/expo-plugin/@types.d.ts +8 -0
  308. package/lib/typescript/expo-plugin/@types.d.ts.map +1 -0
  309. package/lib/typescript/expo-plugin/withRNQC.d.ts +4 -0
  310. package/lib/typescript/expo-plugin/withRNQC.d.ts.map +1 -0
  311. package/lib/typescript/expo-plugin/withSodiumAndroid.d.ts +4 -0
  312. package/lib/typescript/expo-plugin/withSodiumAndroid.d.ts.map +1 -0
  313. package/lib/typescript/expo-plugin/withSodiumIos.d.ts +4 -0
  314. package/lib/typescript/expo-plugin/withSodiumIos.d.ts.map +1 -0
  315. package/lib/typescript/expo-plugin/withXCode.d.ts +9 -0
  316. package/lib/typescript/expo-plugin/withXCode.d.ts.map +1 -0
  317. package/lib/typescript/hash.d.ts +122 -0
  318. package/lib/typescript/hash.d.ts.map +1 -0
  319. package/lib/typescript/hmac.d.ts +66 -0
  320. package/lib/typescript/hmac.d.ts.map +1 -0
  321. package/lib/typescript/index.d.ts +110 -9
  322. package/lib/typescript/index.d.ts.map +1 -1
  323. package/lib/typescript/keys/classes.d.ts +79 -0
  324. package/lib/typescript/keys/classes.d.ts.map +1 -0
  325. package/lib/typescript/keys/generateKeyPair.d.ts +6 -0
  326. package/lib/typescript/keys/generateKeyPair.d.ts.map +1 -0
  327. package/lib/typescript/keys/index.d.ts +7 -0
  328. package/lib/typescript/keys/index.d.ts.map +1 -0
  329. package/lib/typescript/keys/signVerify.d.ts +1 -0
  330. package/lib/typescript/keys/signVerify.d.ts.map +1 -0
  331. package/lib/typescript/keys/utils.d.ts +34 -0
  332. package/lib/typescript/keys/utils.d.ts.map +1 -0
  333. package/lib/typescript/pbkdf2.d.ts +12 -0
  334. package/lib/typescript/pbkdf2.d.ts.map +1 -0
  335. package/lib/typescript/random.d.ts +11 -5
  336. package/lib/typescript/random.d.ts.map +1 -1
  337. package/lib/typescript/rsa.d.ts +10 -0
  338. package/lib/typescript/rsa.d.ts.map +1 -0
  339. package/lib/typescript/specs/blake3.nitro.d.ts +15 -0
  340. package/lib/typescript/specs/blake3.nitro.d.ts.map +1 -0
  341. package/lib/typescript/specs/cipher.nitro.d.ts +29 -0
  342. package/lib/typescript/specs/cipher.nitro.d.ts.map +1 -0
  343. package/lib/typescript/specs/ecKeyPair.nitro.d.ts +20 -0
  344. package/lib/typescript/specs/ecKeyPair.nitro.d.ts.map +1 -0
  345. package/lib/typescript/specs/edKeyPair.nitro.d.ts +17 -0
  346. package/lib/typescript/specs/edKeyPair.nitro.d.ts.map +1 -0
  347. package/lib/typescript/specs/hash.nitro.d.ts +13 -0
  348. package/lib/typescript/specs/hash.nitro.d.ts.map +1 -0
  349. package/lib/typescript/specs/hmac.nitro.d.ts +10 -0
  350. package/lib/typescript/specs/hmac.nitro.d.ts.map +1 -0
  351. package/lib/typescript/specs/keyObjectHandle.nitro.d.ts +14 -0
  352. package/lib/typescript/specs/keyObjectHandle.nitro.d.ts.map +1 -0
  353. package/lib/typescript/specs/pbkdf2.nitro.d.ts +9 -0
  354. package/lib/typescript/specs/pbkdf2.nitro.d.ts.map +1 -0
  355. package/lib/typescript/specs/rsaKeyPair.nitro.d.ts +20 -0
  356. package/lib/typescript/specs/rsaKeyPair.nitro.d.ts.map +1 -0
  357. package/lib/typescript/subtle.d.ts +17 -0
  358. package/lib/typescript/subtle.d.ts.map +1 -0
  359. package/lib/typescript/utils/cipher.d.ts +7 -0
  360. package/lib/typescript/utils/cipher.d.ts.map +1 -0
  361. package/lib/typescript/utils/conversion.d.ts +24 -2
  362. package/lib/typescript/utils/conversion.d.ts.map +1 -1
  363. package/lib/typescript/utils/errors.d.ts +7 -0
  364. package/lib/typescript/utils/errors.d.ts.map +1 -0
  365. package/lib/typescript/utils/hashnames.d.ts +13 -0
  366. package/lib/typescript/utils/hashnames.d.ts.map +1 -0
  367. package/lib/typescript/utils/index.d.ts +6 -5
  368. package/lib/typescript/utils/index.d.ts.map +1 -1
  369. package/lib/typescript/utils/noble.d.ts +19 -0
  370. package/lib/typescript/utils/noble.d.ts.map +1 -0
  371. package/lib/typescript/utils/types.d.ts +252 -2
  372. package/lib/typescript/utils/types.d.ts.map +1 -1
  373. package/lib/typescript/utils/validation.d.ts +13 -0
  374. package/lib/typescript/utils/validation.d.ts.map +1 -0
  375. package/nitrogen/generated/.gitattributes +1 -0
  376. package/nitrogen/generated/android/QuickCrypto+autolinking.cmake +47 -4
  377. package/nitrogen/generated/android/QuickCrypto+autolinking.gradle +4 -3
  378. package/nitrogen/generated/android/QuickCryptoOnLoad.cpp +144 -0
  379. package/nitrogen/generated/android/QuickCryptoOnLoad.hpp +25 -0
  380. package/nitrogen/generated/android/kotlin/com/margelo/nitro/crypto/QuickCryptoOnLoad.kt +35 -0
  381. package/nitrogen/generated/ios/QuickCrypto+autolinking.rb +11 -8
  382. package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.cpp +11 -3
  383. package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.hpp +5 -3
  384. package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Umbrella.hpp +16 -7
  385. package/nitrogen/generated/ios/QuickCryptoAutolinking.mm +135 -0
  386. package/nitrogen/generated/ios/QuickCryptoAutolinking.swift +12 -0
  387. package/nitrogen/generated/shared/c++/CFRGKeyPairType.hpp +84 -0
  388. package/nitrogen/generated/shared/c++/CipherArgs.hpp +86 -0
  389. package/nitrogen/generated/shared/c++/HybridBlake3Spec.cpp +28 -0
  390. package/nitrogen/generated/shared/c++/HybridBlake3Spec.hpp +76 -0
  391. package/nitrogen/generated/shared/c++/HybridCipherFactorySpec.cpp +21 -0
  392. package/nitrogen/generated/shared/c++/HybridCipherFactorySpec.hpp +67 -0
  393. package/nitrogen/generated/shared/c++/HybridCipherSpec.cpp +28 -0
  394. package/nitrogen/generated/shared/c++/HybridCipherSpec.hpp +76 -0
  395. package/nitrogen/generated/shared/c++/HybridEcKeyPairSpec.cpp +29 -0
  396. package/nitrogen/generated/shared/c++/HybridEcKeyPairSpec.hpp +77 -0
  397. package/nitrogen/generated/shared/c++/HybridEdKeyPairSpec.cpp +30 -0
  398. package/nitrogen/generated/shared/c++/HybridEdKeyPairSpec.hpp +75 -0
  399. package/nitrogen/generated/shared/c++/HybridHashSpec.cpp +26 -0
  400. package/nitrogen/generated/shared/c++/HybridHashSpec.hpp +75 -0
  401. package/nitrogen/generated/shared/c++/HybridHmacSpec.cpp +23 -0
  402. package/nitrogen/generated/shared/c++/HybridHmacSpec.hpp +66 -0
  403. package/nitrogen/generated/shared/c++/HybridKeyObjectHandleSpec.cpp +26 -0
  404. package/nitrogen/generated/shared/c++/HybridKeyObjectHandleSpec.hpp +92 -0
  405. package/nitrogen/generated/shared/c++/HybridPbkdf2Spec.cpp +22 -0
  406. package/nitrogen/generated/shared/c++/HybridPbkdf2Spec.hpp +66 -0
  407. package/nitrogen/generated/shared/c++/HybridRandomSpec.cpp +2 -3
  408. package/nitrogen/generated/shared/c++/HybridRandomSpec.hpp +9 -6
  409. package/nitrogen/generated/shared/c++/HybridRsaKeyPairSpec.cpp +29 -0
  410. package/nitrogen/generated/shared/c++/HybridRsaKeyPairSpec.hpp +77 -0
  411. package/nitrogen/generated/shared/c++/JWK.hpp +161 -0
  412. package/nitrogen/generated/shared/c++/JWKkty.hpp +84 -0
  413. package/nitrogen/generated/shared/c++/JWKuse.hpp +76 -0
  414. package/nitrogen/generated/shared/c++/KFormatType.hpp +63 -0
  415. package/nitrogen/generated/shared/c++/KeyDetail.hpp +92 -0
  416. package/nitrogen/generated/shared/c++/KeyEncoding.hpp +64 -0
  417. package/nitrogen/generated/shared/c++/KeyObject.hpp +67 -0
  418. package/nitrogen/generated/shared/c++/KeyType.hpp +63 -0
  419. package/nitrogen/generated/shared/c++/KeyUsage.hpp +116 -0
  420. package/nitrogen/generated/shared/c++/NamedCurve.hpp +80 -0
  421. package/package.json +66 -39
  422. package/src/blake3.ts +123 -0
  423. package/src/cipher.ts +335 -0
  424. package/src/ec.ts +432 -0
  425. package/src/ed.ts +256 -0
  426. package/src/expo-plugin/@types.ts +7 -0
  427. package/src/expo-plugin/withRNQC.ts +23 -0
  428. package/src/expo-plugin/withSodiumAndroid.ts +24 -0
  429. package/src/expo-plugin/withSodiumIos.ts +30 -0
  430. package/src/expo-plugin/withXCode.ts +55 -0
  431. package/src/hash.ts +274 -0
  432. package/src/hmac.ts +135 -0
  433. package/src/index.ts +32 -29
  434. package/src/keys/classes.ts +317 -0
  435. package/src/keys/generateKeyPair.ts +145 -0
  436. package/src/keys/index.ts +52 -0
  437. package/src/keys/signVerify.ts +39 -0
  438. package/src/keys/utils.ts +190 -0
  439. package/src/pbkdf2.ts +154 -0
  440. package/src/random.ts +26 -23
  441. package/src/rsa.ts +176 -0
  442. package/src/specs/blake3.nitro.ts +12 -0
  443. package/src/specs/cipher.nitro.ts +25 -0
  444. package/src/specs/ecKeyPair.nitro.ts +38 -0
  445. package/src/specs/edKeyPair.nitro.ts +43 -0
  446. package/src/specs/hash.nitro.ts +10 -0
  447. package/src/specs/hmac.nitro.ts +7 -0
  448. package/src/specs/keyObjectHandle.nitro.ts +31 -0
  449. package/src/specs/pbkdf2.nitro.ts +18 -0
  450. package/src/specs/random.nitro.ts +2 -2
  451. package/src/specs/rsaKeyPair.nitro.ts +33 -0
  452. package/src/subtle.ts +614 -0
  453. package/src/utils/cipher.ts +60 -0
  454. package/src/utils/conversion.ts +143 -9
  455. package/src/utils/errors.ts +15 -0
  456. package/src/utils/hashnames.ts +98 -0
  457. package/src/utils/index.ts +6 -6
  458. package/src/utils/noble.ts +85 -0
  459. package/src/utils/types.ts +423 -3
  460. package/src/utils/validation.ts +130 -0
  461. package/ios/QuickCryptoOnLoad.mm +0 -19
  462. package/lib/module/package.json +0 -1
@@ -0,0 +1,1049 @@
1
+ use crate::{CVBytes, CVWords, IncrementCounter, BLOCK_LEN, CHUNK_LEN, OUT_LEN};
2
+ use arrayref::array_ref;
3
+ use arrayvec::ArrayVec;
4
+ use core::usize;
5
+ use rand::prelude::*;
6
+
7
+ // Interesting input lengths to run tests on.
8
+ pub const TEST_CASES: &[usize] = &[
9
+ 0,
10
+ 1,
11
+ 2,
12
+ 3,
13
+ 4,
14
+ 5,
15
+ 6,
16
+ 7,
17
+ 8,
18
+ BLOCK_LEN - 1,
19
+ BLOCK_LEN,
20
+ BLOCK_LEN + 1,
21
+ 2 * BLOCK_LEN - 1,
22
+ 2 * BLOCK_LEN,
23
+ 2 * BLOCK_LEN + 1,
24
+ CHUNK_LEN - 1,
25
+ CHUNK_LEN,
26
+ CHUNK_LEN + 1,
27
+ 2 * CHUNK_LEN,
28
+ 2 * CHUNK_LEN + 1,
29
+ 3 * CHUNK_LEN,
30
+ 3 * CHUNK_LEN + 1,
31
+ 4 * CHUNK_LEN,
32
+ 4 * CHUNK_LEN + 1,
33
+ 5 * CHUNK_LEN,
34
+ 5 * CHUNK_LEN + 1,
35
+ 6 * CHUNK_LEN,
36
+ 6 * CHUNK_LEN + 1,
37
+ 7 * CHUNK_LEN,
38
+ 7 * CHUNK_LEN + 1,
39
+ 8 * CHUNK_LEN,
40
+ 8 * CHUNK_LEN + 1,
41
+ 16 * CHUNK_LEN - 1,
42
+ 16 * CHUNK_LEN, // AVX512's bandwidth
43
+ 16 * CHUNK_LEN + 1,
44
+ 31 * CHUNK_LEN - 1,
45
+ 31 * CHUNK_LEN, // 16 + 8 + 4 + 2 + 1
46
+ 31 * CHUNK_LEN + 1,
47
+ 100 * CHUNK_LEN, // subtrees larger than MAX_SIMD_DEGREE chunks
48
+ ];
49
+
50
+ pub const TEST_CASES_MAX: usize = 100 * CHUNK_LEN;
51
+
52
+ // There's a test to make sure these two are equal below.
53
+ pub const TEST_KEY: CVBytes = *b"whats the Elvish word for friend";
54
+ pub const TEST_KEY_WORDS: CVWords = [
55
+ 1952540791, 1752440947, 1816469605, 1752394102, 1919907616, 1868963940, 1919295602, 1684956521,
56
+ ];
57
+
58
+ // Paint the input with a repeating byte pattern. We use a cycle length of 251,
59
+ // because that's the largest prime number less than 256. This makes it
60
+ // unlikely to swapping any two adjacent input blocks or chunks will give the
61
+ // same answer.
62
+ pub fn paint_test_input(buf: &mut [u8]) {
63
+ for (i, b) in buf.iter_mut().enumerate() {
64
+ *b = (i % 251) as u8;
65
+ }
66
+ }
67
+
68
+ type CompressInPlaceFn =
69
+ unsafe fn(cv: &mut CVWords, block: &[u8; BLOCK_LEN], block_len: u8, counter: u64, flags: u8);
70
+
71
+ type CompressXofFn = unsafe fn(
72
+ cv: &CVWords,
73
+ block: &[u8; BLOCK_LEN],
74
+ block_len: u8,
75
+ counter: u64,
76
+ flags: u8,
77
+ ) -> [u8; 64];
78
+
79
+ // A shared helper function for platform-specific tests.
80
+ pub fn test_compress_fn(compress_in_place_fn: CompressInPlaceFn, compress_xof_fn: CompressXofFn) {
81
+ let initial_state = TEST_KEY_WORDS;
82
+ let block_len: u8 = 61;
83
+ let mut block = [0; BLOCK_LEN];
84
+ paint_test_input(&mut block[..block_len as usize]);
85
+ // Use a counter with set bits in both 32-bit words.
86
+ let counter = (5u64 << 32) + 6;
87
+ let flags = crate::CHUNK_END | crate::ROOT | crate::KEYED_HASH;
88
+
89
+ let portable_out =
90
+ crate::portable::compress_xof(&initial_state, &block, block_len, counter as u64, flags);
91
+
92
+ let mut test_state = initial_state;
93
+ unsafe { compress_in_place_fn(&mut test_state, &block, block_len, counter as u64, flags) };
94
+ let test_state_bytes = crate::platform::le_bytes_from_words_32(&test_state);
95
+ let test_xof =
96
+ unsafe { compress_xof_fn(&initial_state, &block, block_len, counter as u64, flags) };
97
+
98
+ assert_eq!(&portable_out[..32], &test_state_bytes[..]);
99
+ assert_eq!(&portable_out[..], &test_xof[..]);
100
+ }
101
+
102
+ type HashManyFn<A> = unsafe fn(
103
+ inputs: &[&A],
104
+ key: &CVWords,
105
+ counter: u64,
106
+ increment_counter: IncrementCounter,
107
+ flags: u8,
108
+ flags_start: u8,
109
+ flags_end: u8,
110
+ out: &mut [u8],
111
+ );
112
+
113
+ // A shared helper function for platform-specific tests.
114
+ pub fn test_hash_many_fn(
115
+ hash_many_chunks_fn: HashManyFn<[u8; CHUNK_LEN]>,
116
+ hash_many_parents_fn: HashManyFn<[u8; 2 * OUT_LEN]>,
117
+ ) {
118
+ // Test a few different initial counter values.
119
+ // - 0: The base case.
120
+ // - u32::MAX: The low word of the counter overflows for all inputs except the first.
121
+ // - i32::MAX: *No* overflow. But carry bugs in tricky SIMD code can screw this up, if you XOR
122
+ // when you're supposed to ANDNOT...
123
+ let initial_counters = [0, u32::MAX as u64, i32::MAX as u64];
124
+ for counter in initial_counters {
125
+ #[cfg(feature = "std")]
126
+ dbg!(counter);
127
+
128
+ // 31 (16 + 8 + 4 + 2 + 1) inputs
129
+ const NUM_INPUTS: usize = 31;
130
+ let mut input_buf = [0; CHUNK_LEN * NUM_INPUTS];
131
+ crate::test::paint_test_input(&mut input_buf);
132
+
133
+ // First hash chunks.
134
+ let mut chunks = ArrayVec::<&[u8; CHUNK_LEN], NUM_INPUTS>::new();
135
+ for i in 0..NUM_INPUTS {
136
+ chunks.push(array_ref!(input_buf, i * CHUNK_LEN, CHUNK_LEN));
137
+ }
138
+ let mut portable_chunks_out = [0; NUM_INPUTS * OUT_LEN];
139
+ crate::portable::hash_many(
140
+ &chunks,
141
+ &TEST_KEY_WORDS,
142
+ counter,
143
+ IncrementCounter::Yes,
144
+ crate::KEYED_HASH,
145
+ crate::CHUNK_START,
146
+ crate::CHUNK_END,
147
+ &mut portable_chunks_out,
148
+ );
149
+
150
+ let mut test_chunks_out = [0; NUM_INPUTS * OUT_LEN];
151
+ unsafe {
152
+ hash_many_chunks_fn(
153
+ &chunks[..],
154
+ &TEST_KEY_WORDS,
155
+ counter,
156
+ IncrementCounter::Yes,
157
+ crate::KEYED_HASH,
158
+ crate::CHUNK_START,
159
+ crate::CHUNK_END,
160
+ &mut test_chunks_out,
161
+ );
162
+ }
163
+ for n in 0..NUM_INPUTS {
164
+ #[cfg(feature = "std")]
165
+ dbg!(n);
166
+ assert_eq!(
167
+ &portable_chunks_out[n * OUT_LEN..][..OUT_LEN],
168
+ &test_chunks_out[n * OUT_LEN..][..OUT_LEN]
169
+ );
170
+ }
171
+
172
+ // Then hash parents.
173
+ let mut parents = ArrayVec::<&[u8; 2 * OUT_LEN], NUM_INPUTS>::new();
174
+ for i in 0..NUM_INPUTS {
175
+ parents.push(array_ref!(input_buf, i * 2 * OUT_LEN, 2 * OUT_LEN));
176
+ }
177
+ let mut portable_parents_out = [0; NUM_INPUTS * OUT_LEN];
178
+ crate::portable::hash_many(
179
+ &parents,
180
+ &TEST_KEY_WORDS,
181
+ counter,
182
+ IncrementCounter::No,
183
+ crate::KEYED_HASH | crate::PARENT,
184
+ 0,
185
+ 0,
186
+ &mut portable_parents_out,
187
+ );
188
+
189
+ let mut test_parents_out = [0; NUM_INPUTS * OUT_LEN];
190
+ unsafe {
191
+ hash_many_parents_fn(
192
+ &parents[..],
193
+ &TEST_KEY_WORDS,
194
+ counter,
195
+ IncrementCounter::No,
196
+ crate::KEYED_HASH | crate::PARENT,
197
+ 0,
198
+ 0,
199
+ &mut test_parents_out,
200
+ );
201
+ }
202
+ for n in 0..NUM_INPUTS {
203
+ #[cfg(feature = "std")]
204
+ dbg!(n);
205
+ assert_eq!(
206
+ &portable_parents_out[n * OUT_LEN..][..OUT_LEN],
207
+ &test_parents_out[n * OUT_LEN..][..OUT_LEN]
208
+ );
209
+ }
210
+ }
211
+ }
212
+
213
+ #[allow(unused)]
214
+ type XofManyFunction = unsafe fn(
215
+ cv: &CVWords,
216
+ block: &[u8; BLOCK_LEN],
217
+ block_len: u8,
218
+ counter: u64,
219
+ flags: u8,
220
+ out: &mut [u8],
221
+ );
222
+
223
+ // A shared helper function for platform-specific tests.
224
+ #[allow(unused)]
225
+ pub fn test_xof_many_fn(xof_many_function: XofManyFunction) {
226
+ let mut block = [0; BLOCK_LEN];
227
+ let block_len = 42;
228
+ crate::test::paint_test_input(&mut block[..block_len]);
229
+ let cv = [40, 41, 42, 43, 44, 45, 46, 47];
230
+ let flags = crate::KEYED_HASH;
231
+
232
+ // Test a few different initial counter values.
233
+ // - 0: The base case.
234
+ // - u32::MAX: The low word of the counter overflows for all inputs except the first.
235
+ // - i32::MAX: *No* overflow. But carry bugs in tricky SIMD code can screw this up, if you XOR
236
+ // when you're supposed to ANDNOT...
237
+ let initial_counters = [0, u32::MAX as u64, i32::MAX as u64];
238
+ for counter in initial_counters {
239
+ #[cfg(feature = "std")]
240
+ dbg!(counter);
241
+
242
+ // 31 (16 + 8 + 4 + 2 + 1) outputs
243
+ const OUTPUT_SIZE: usize = 31 * BLOCK_LEN;
244
+
245
+ let mut portable_out = [0u8; OUTPUT_SIZE];
246
+ for (i, out_block) in portable_out.chunks_exact_mut(64).enumerate() {
247
+ out_block.copy_from_slice(&crate::portable::compress_xof(
248
+ &cv,
249
+ &block,
250
+ block_len as u8,
251
+ counter + i as u64,
252
+ flags,
253
+ ));
254
+ }
255
+
256
+ let mut test_out = [0u8; OUTPUT_SIZE];
257
+ unsafe {
258
+ xof_many_function(&cv, &block, block_len as u8, counter, flags, &mut test_out);
259
+ }
260
+
261
+ assert_eq!(portable_out, test_out);
262
+ }
263
+
264
+ // Test that xof_many doesn't write more blocks than requested. Note that the current assembly
265
+ // implementation always outputs at least one block, so we don't test the zero case.
266
+ for block_count in 1..=32 {
267
+ let mut array = [0; BLOCK_LEN * 33];
268
+ let output_start = 17;
269
+ let output_len = block_count * BLOCK_LEN;
270
+ let output_end = output_start + output_len;
271
+ let output = &mut array[output_start..output_end];
272
+ unsafe {
273
+ xof_many_function(&cv, &block, block_len as u8, 0, flags, output);
274
+ }
275
+ for i in 0..array.len() {
276
+ if i < output_start || output_end <= i {
277
+ assert_eq!(0, array[i], "index {i}");
278
+ }
279
+ }
280
+ }
281
+ }
282
+
283
+ #[test]
284
+ fn test_key_bytes_equal_key_words() {
285
+ assert_eq!(
286
+ TEST_KEY_WORDS,
287
+ crate::platform::words_from_le_bytes_32(&TEST_KEY),
288
+ );
289
+ }
290
+
291
+ #[test]
292
+ fn test_reference_impl_size() {
293
+ // Because the Rust compiler optimizes struct layout, it's possible that
294
+ // some future version of the compiler will produce a different size. If
295
+ // that happens, we can either disable this test, or test for multiple
296
+ // expected values. For now, the purpose of this test is to make sure we
297
+ // notice if that happens.
298
+ assert_eq!(1880, core::mem::size_of::<reference_impl::Hasher>());
299
+ }
300
+
301
+ #[test]
302
+ fn test_counter_words() {
303
+ let counter: u64 = (1 << 32) + 2;
304
+ assert_eq!(crate::counter_low(counter), 2);
305
+ assert_eq!(crate::counter_high(counter), 1);
306
+ }
307
+
308
+ #[test]
309
+ fn test_largest_power_of_two_leq() {
310
+ let input_output = &[
311
+ // The zero case is nonsensical, but it does work.
312
+ (0, 1),
313
+ (1, 1),
314
+ (2, 2),
315
+ (3, 2),
316
+ (4, 4),
317
+ (5, 4),
318
+ (6, 4),
319
+ (7, 4),
320
+ (8, 8),
321
+ // the largest possible usize
322
+ (usize::MAX, (usize::MAX >> 1) + 1),
323
+ ];
324
+ for &(input, output) in input_output {
325
+ assert_eq!(
326
+ output,
327
+ crate::largest_power_of_two_leq(input),
328
+ "wrong output for n={}",
329
+ input
330
+ );
331
+ }
332
+ }
333
+
334
+ #[test]
335
+ fn test_compare_reference_impl() {
336
+ const OUT: usize = 303; // more than 64, not a multiple of 4
337
+ let mut input_buf = [0; TEST_CASES_MAX];
338
+ paint_test_input(&mut input_buf);
339
+ for &case in TEST_CASES {
340
+ let input = &input_buf[..case];
341
+ #[cfg(feature = "std")]
342
+ dbg!(case);
343
+
344
+ // regular
345
+ {
346
+ let mut reference_hasher = reference_impl::Hasher::new();
347
+ reference_hasher.update(input);
348
+ let mut expected_out = [0; OUT];
349
+ reference_hasher.finalize(&mut expected_out);
350
+
351
+ // all at once
352
+ let test_out = crate::hash(input);
353
+ assert_eq!(test_out, *array_ref!(expected_out, 0, 32));
354
+ // incremental
355
+ let mut hasher = crate::Hasher::new();
356
+ hasher.update(input);
357
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
358
+ assert_eq!(hasher.finalize(), test_out);
359
+ // incremental (rayon)
360
+ #[cfg(feature = "rayon")]
361
+ {
362
+ let mut hasher = crate::Hasher::new();
363
+ hasher.update_rayon(input);
364
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
365
+ assert_eq!(hasher.finalize(), test_out);
366
+ }
367
+ // xof
368
+ let mut extended = [0; OUT];
369
+ hasher.finalize_xof().fill(&mut extended);
370
+ assert_eq!(extended, expected_out);
371
+ }
372
+
373
+ // keyed
374
+ {
375
+ let mut reference_hasher = reference_impl::Hasher::new_keyed(&TEST_KEY);
376
+ reference_hasher.update(input);
377
+ let mut expected_out = [0; OUT];
378
+ reference_hasher.finalize(&mut expected_out);
379
+
380
+ // all at once
381
+ let test_out = crate::keyed_hash(&TEST_KEY, input);
382
+ assert_eq!(test_out, *array_ref!(expected_out, 0, 32));
383
+ // incremental
384
+ let mut hasher = crate::Hasher::new_keyed(&TEST_KEY);
385
+ hasher.update(input);
386
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
387
+ assert_eq!(hasher.finalize(), test_out);
388
+ // incremental (rayon)
389
+ #[cfg(feature = "rayon")]
390
+ {
391
+ let mut hasher = crate::Hasher::new_keyed(&TEST_KEY);
392
+ hasher.update_rayon(input);
393
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
394
+ assert_eq!(hasher.finalize(), test_out);
395
+ }
396
+ // xof
397
+ let mut extended = [0; OUT];
398
+ hasher.finalize_xof().fill(&mut extended);
399
+ assert_eq!(extended, expected_out);
400
+ }
401
+
402
+ // derive_key
403
+ {
404
+ let context = "BLAKE3 2019-12-27 16:13:59 example context (not the test vector one)";
405
+ let mut reference_hasher = reference_impl::Hasher::new_derive_key(context);
406
+ reference_hasher.update(input);
407
+ let mut expected_out = [0; OUT];
408
+ reference_hasher.finalize(&mut expected_out);
409
+
410
+ // all at once
411
+ let test_out = crate::derive_key(context, input);
412
+ assert_eq!(test_out, expected_out[..32]);
413
+ // incremental
414
+ let mut hasher = crate::Hasher::new_derive_key(context);
415
+ hasher.update(input);
416
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
417
+ assert_eq!(hasher.finalize(), *array_ref!(test_out, 0, 32));
418
+ // incremental (rayon)
419
+ #[cfg(feature = "rayon")]
420
+ {
421
+ let mut hasher = crate::Hasher::new_derive_key(context);
422
+ hasher.update_rayon(input);
423
+ assert_eq!(hasher.finalize(), *array_ref!(expected_out, 0, 32));
424
+ assert_eq!(hasher.finalize(), *array_ref!(test_out, 0, 32));
425
+ }
426
+ // xof
427
+ let mut extended = [0; OUT];
428
+ hasher.finalize_xof().fill(&mut extended);
429
+ assert_eq!(extended, expected_out);
430
+ }
431
+ }
432
+ }
433
+
434
+ #[test]
435
+ fn test_compare_reference_impl_long_xof() {
436
+ let mut reference_output = [0u8; 32 * BLOCK_LEN - 1];
437
+ let mut reference_hasher = reference_impl::Hasher::new_keyed(&TEST_KEY);
438
+ reference_hasher.update(b"hello world");
439
+ reference_hasher.finalize(&mut reference_output);
440
+
441
+ let mut test_output = [0u8; 32 * BLOCK_LEN - 1];
442
+ let mut test_hasher = crate::Hasher::new_keyed(&TEST_KEY);
443
+ test_hasher.update(b"hello world");
444
+ test_hasher.finalize_xof().fill(&mut test_output);
445
+
446
+ assert_eq!(reference_output, test_output);
447
+ }
448
+
449
+ #[test]
450
+ fn test_xof_partial_blocks() {
451
+ const OUT_LEN: usize = 6 * BLOCK_LEN;
452
+ let mut reference_out = [0u8; OUT_LEN];
453
+ reference_impl::Hasher::new().finalize(&mut reference_out);
454
+
455
+ let mut all_at_once_out = [0u8; OUT_LEN];
456
+ crate::Hasher::new()
457
+ .finalize_xof()
458
+ .fill(&mut all_at_once_out);
459
+ assert_eq!(reference_out, all_at_once_out);
460
+
461
+ let mut partial_out = [0u8; OUT_LEN];
462
+ let partial_start = 32;
463
+ let partial_end = OUT_LEN - 32;
464
+ let mut xof = crate::Hasher::new().finalize_xof();
465
+ xof.fill(&mut partial_out[..partial_start]);
466
+ xof.fill(&mut partial_out[partial_start..partial_end]);
467
+ xof.fill(&mut partial_out[partial_end..]);
468
+ assert_eq!(reference_out, partial_out);
469
+ }
470
+
471
+ fn reference_hash(input: &[u8]) -> crate::Hash {
472
+ let mut hasher = reference_impl::Hasher::new();
473
+ hasher.update(input);
474
+ let mut bytes = [0; 32];
475
+ hasher.finalize(&mut bytes);
476
+ bytes.into()
477
+ }
478
+
479
+ #[test]
480
+ fn test_compare_update_multiple() {
481
+ // Don't use all the long test cases here, since that's unnecessarily slow
482
+ // in debug mode.
483
+ let mut short_test_cases = TEST_CASES;
484
+ while *short_test_cases.last().unwrap() > 4 * CHUNK_LEN {
485
+ short_test_cases = &short_test_cases[..short_test_cases.len() - 1];
486
+ }
487
+ assert_eq!(*short_test_cases.last().unwrap(), 4 * CHUNK_LEN);
488
+
489
+ let mut input_buf = [0; 2 * TEST_CASES_MAX];
490
+ paint_test_input(&mut input_buf);
491
+
492
+ for &first_update in short_test_cases {
493
+ #[cfg(feature = "std")]
494
+ dbg!(first_update);
495
+ let first_input = &input_buf[..first_update];
496
+ let mut test_hasher = crate::Hasher::new();
497
+ test_hasher.update(first_input);
498
+
499
+ for &second_update in short_test_cases {
500
+ #[cfg(feature = "std")]
501
+ dbg!(second_update);
502
+ let second_input = &input_buf[first_update..][..second_update];
503
+ let total_input = &input_buf[..first_update + second_update];
504
+
505
+ // Clone the hasher with first_update bytes already written, so
506
+ // that the next iteration can reuse it.
507
+ let mut test_hasher = test_hasher.clone();
508
+ test_hasher.update(second_input);
509
+ let expected = reference_hash(total_input);
510
+ assert_eq!(expected, test_hasher.finalize());
511
+ }
512
+ }
513
+ }
514
+
515
+ #[test]
516
+ fn test_fuzz_hasher() {
517
+ const INPUT_MAX: usize = 4 * CHUNK_LEN;
518
+ let mut input_buf = [0; 3 * INPUT_MAX];
519
+ paint_test_input(&mut input_buf);
520
+
521
+ // Don't do too many iterations in debug mode, to keep the tests under a
522
+ // second or so. CI should run tests in release mode also. Provide an
523
+ // environment variable for specifying a larger number of fuzz iterations.
524
+ let num_tests = if cfg!(debug_assertions) { 100 } else { 10_000 };
525
+
526
+ // Use a fixed RNG seed for reproducibility.
527
+ let mut rng = rand_chacha::ChaCha8Rng::from_seed([1; 32]);
528
+ for _num_test in 0..num_tests {
529
+ #[cfg(feature = "std")]
530
+ dbg!(_num_test);
531
+ let mut hasher = crate::Hasher::new();
532
+ let mut total_input = 0;
533
+ // For each test, write 3 inputs of random length.
534
+ for _ in 0..3 {
535
+ let input_len = rng.random_range(0..(INPUT_MAX + 1));
536
+ #[cfg(feature = "std")]
537
+ dbg!(input_len);
538
+ let input = &input_buf[total_input..][..input_len];
539
+ hasher.update(input);
540
+ total_input += input_len;
541
+ }
542
+ let expected = reference_hash(&input_buf[..total_input]);
543
+ assert_eq!(expected, hasher.finalize());
544
+ }
545
+ }
546
+
547
+ #[test]
548
+ fn test_fuzz_xof() {
549
+ let mut input_buf = [0u8; 3 * BLOCK_LEN];
550
+ paint_test_input(&mut input_buf);
551
+
552
+ // Don't do too many iterations in debug mode, to keep the tests under a
553
+ // second or so. CI should run tests in release mode also. Provide an
554
+ // environment variable for specifying a larger number of fuzz iterations.
555
+ let num_tests = if cfg!(debug_assertions) { 100 } else { 2500 };
556
+
557
+ // Use a fixed RNG seed for reproducibility.
558
+ let mut rng = rand_chacha::ChaCha8Rng::from_seed([1; 32]);
559
+ for _num_test in 0..num_tests {
560
+ #[cfg(feature = "std")]
561
+ dbg!(_num_test);
562
+ // 31 (16 + 8 + 4 + 2 + 1) outputs
563
+ let mut output_buf = [0; 31 * CHUNK_LEN];
564
+ let input_len = rng.random_range(0..input_buf.len());
565
+ let mut xof = crate::Hasher::new()
566
+ .update(&input_buf[..input_len])
567
+ .finalize_xof();
568
+ let partial_start = rng.random_range(0..output_buf.len());
569
+ let partial_end = rng.random_range(partial_start..output_buf.len());
570
+ xof.fill(&mut output_buf[..partial_start]);
571
+ xof.fill(&mut output_buf[partial_start..partial_end]);
572
+ xof.fill(&mut output_buf[partial_end..]);
573
+
574
+ let mut reference_buf = [0; 31 * CHUNK_LEN];
575
+ let mut reference_hasher = reference_impl::Hasher::new();
576
+ reference_hasher.update(&input_buf[..input_len]);
577
+ reference_hasher.finalize(&mut reference_buf);
578
+
579
+ assert_eq!(reference_buf, output_buf);
580
+ }
581
+ }
582
+
583
+ #[test]
584
+ fn test_xof_seek() {
585
+ let mut out = [0; 533];
586
+ let mut hasher = crate::Hasher::new();
587
+ hasher.update(b"foo");
588
+ hasher.finalize_xof().fill(&mut out);
589
+ assert_eq!(hasher.finalize().as_bytes(), &out[0..32]);
590
+
591
+ let mut reader = hasher.finalize_xof();
592
+ reader.set_position(303);
593
+ let mut out2 = [0; 102];
594
+ reader.fill(&mut out2);
595
+ assert_eq!(&out[303..][..102], &out2[..]);
596
+
597
+ #[cfg(feature = "std")]
598
+ {
599
+ use std::io::prelude::*;
600
+ let mut reader = hasher.finalize_xof();
601
+ reader.seek(std::io::SeekFrom::Start(303)).unwrap();
602
+ let mut out3 = Vec::new();
603
+ reader.by_ref().take(102).read_to_end(&mut out3).unwrap();
604
+ assert_eq!(&out[303..][..102], &out3[..]);
605
+
606
+ assert_eq!(
607
+ reader.seek(std::io::SeekFrom::Current(0)).unwrap(),
608
+ 303 + 102
609
+ );
610
+ reader.seek(std::io::SeekFrom::Current(-5)).unwrap();
611
+ assert_eq!(
612
+ reader.seek(std::io::SeekFrom::Current(0)).unwrap(),
613
+ 303 + 102 - 5
614
+ );
615
+ let mut out4 = [0; 17];
616
+ assert_eq!(reader.read(&mut out4).unwrap(), 17);
617
+ assert_eq!(&out[303 + 102 - 5..][..17], &out4[..]);
618
+ assert_eq!(
619
+ reader.seek(std::io::SeekFrom::Current(0)).unwrap(),
620
+ 303 + 102 - 5 + 17
621
+ );
622
+ assert!(reader.seek(std::io::SeekFrom::End(0)).is_err());
623
+ assert!(reader.seek(std::io::SeekFrom::Current(-1000)).is_err());
624
+ }
625
+ }
626
+
627
+ #[test]
628
+ fn test_msg_schedule_permutation() {
629
+ let permutation = [2, 6, 3, 10, 7, 0, 4, 13, 1, 11, 12, 5, 9, 14, 15, 8];
630
+
631
+ let mut generated = [[0; 16]; 7];
632
+ generated[0] = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15];
633
+
634
+ for round in 1..7 {
635
+ for i in 0..16 {
636
+ generated[round][i] = generated[round - 1][permutation[i]];
637
+ }
638
+ }
639
+
640
+ assert_eq!(generated, crate::MSG_SCHEDULE);
641
+ }
642
+
643
+ #[test]
644
+ fn test_reset() {
645
+ let mut hasher = crate::Hasher::new();
646
+ hasher.update(&[42; 3 * CHUNK_LEN + 7]);
647
+ hasher.reset();
648
+ hasher.update(&[42; CHUNK_LEN + 3]);
649
+ assert_eq!(hasher.finalize(), crate::hash(&[42; CHUNK_LEN + 3]));
650
+
651
+ let key = &[99; crate::KEY_LEN];
652
+ let mut keyed_hasher = crate::Hasher::new_keyed(key);
653
+ keyed_hasher.update(&[42; 3 * CHUNK_LEN + 7]);
654
+ keyed_hasher.reset();
655
+ keyed_hasher.update(&[42; CHUNK_LEN + 3]);
656
+ assert_eq!(
657
+ keyed_hasher.finalize(),
658
+ crate::keyed_hash(key, &[42; CHUNK_LEN + 3]),
659
+ );
660
+
661
+ let context = "BLAKE3 2020-02-12 10:20:58 reset test";
662
+ let mut kdf = crate::Hasher::new_derive_key(context);
663
+ kdf.update(&[42; 3 * CHUNK_LEN + 7]);
664
+ kdf.reset();
665
+ kdf.update(&[42; CHUNK_LEN + 3]);
666
+ let expected = crate::derive_key(context, &[42; CHUNK_LEN + 3]);
667
+ assert_eq!(kdf.finalize(), expected);
668
+ }
669
+
670
+ #[test]
671
+ fn test_hex_encoding_decoding() {
672
+ let digest_str = "04e0bb39f30b1a3feb89f536c93be15055482df748674b00d26e5a75777702e9";
673
+ let mut hasher = crate::Hasher::new();
674
+ hasher.update(b"foo");
675
+ let digest = hasher.finalize();
676
+ assert_eq!(digest.to_hex().as_str(), digest_str);
677
+ #[cfg(feature = "std")]
678
+ assert_eq!(digest.to_string(), digest_str);
679
+
680
+ // Test round trip
681
+ let digest = crate::Hash::from_hex(digest_str).unwrap();
682
+ assert_eq!(digest.to_hex().as_str(), digest_str);
683
+
684
+ // Test uppercase
685
+ let digest = crate::Hash::from_hex(digest_str.to_uppercase()).unwrap();
686
+ assert_eq!(digest.to_hex().as_str(), digest_str);
687
+
688
+ // Test string parsing via FromStr
689
+ let digest: crate::Hash = digest_str.parse().unwrap();
690
+ assert_eq!(digest.to_hex().as_str(), digest_str);
691
+
692
+ // Test errors
693
+ let bad_len = "04e0bb39f30b1";
694
+ let _result = crate::Hash::from_hex(bad_len).unwrap_err();
695
+ #[cfg(feature = "std")]
696
+ assert_eq!(_result.to_string(), "expected 64 hex bytes, received 13");
697
+
698
+ let bad_char = "Z4e0bb39f30b1a3feb89f536c93be15055482df748674b00d26e5a75777702e9";
699
+ let _result = crate::Hash::from_hex(bad_char).unwrap_err();
700
+ #[cfg(feature = "std")]
701
+ assert_eq!(_result.to_string(), "invalid hex character: 'Z'");
702
+
703
+ let _result = crate::Hash::from_hex([128; 64]).unwrap_err();
704
+ #[cfg(feature = "std")]
705
+ assert_eq!(_result.to_string(), "invalid hex character: 0x80");
706
+ }
707
+
708
+ // This test is a mimized failure case for the Windows SSE2 bug described in
709
+ // https://github.com/BLAKE3-team/BLAKE3/issues/206.
710
+ //
711
+ // Before that issue was fixed, this test would fail on Windows in the following configuration:
712
+ //
713
+ // cargo test --features=no_avx512,no_avx2,no_sse41 --release
714
+ //
715
+ // Bugs like this one (stomping on a caller's register) are very sensitive to the details of
716
+ // surrounding code, so it's not especially likely that this test will catch another bug (or even
717
+ // the same bug) in the future. Still, there's no harm in keeping it.
718
+ #[test]
719
+ fn test_issue_206_windows_sse2() {
720
+ // This stupid loop has to be here to trigger the bug. I don't know why.
721
+ for _ in &[0] {
722
+ // The length 65 (two blocks) is significant. It doesn't repro with 64 (one block). It also
723
+ // doesn't repro with an all-zero input.
724
+ let input = &[0xff; 65];
725
+ let expected_hash = [
726
+ 183, 235, 50, 217, 156, 24, 190, 219, 2, 216, 176, 255, 224, 53, 28, 95, 57, 148, 179,
727
+ 245, 162, 90, 37, 121, 0, 142, 219, 62, 234, 204, 225, 161,
728
+ ];
729
+
730
+ // This throwaway call has to be here to trigger the bug.
731
+ crate::Hasher::new().update(input);
732
+
733
+ // This assert fails when the bug is triggered.
734
+ assert_eq!(crate::Hasher::new().update(input).finalize(), expected_hash);
735
+ }
736
+ }
737
+
738
+ #[test]
739
+ fn test_hash_conversions() {
740
+ let bytes1 = [42; 32];
741
+ let hash1: crate::Hash = bytes1.into();
742
+ let bytes2: [u8; 32] = hash1.into();
743
+ assert_eq!(bytes1, bytes2);
744
+
745
+ let bytes3 = *hash1.as_bytes();
746
+ assert_eq!(bytes1, bytes3);
747
+
748
+ let hash2 = crate::Hash::from_bytes(bytes1);
749
+ assert_eq!(hash1, hash2);
750
+
751
+ let hex = hash1.to_hex();
752
+ let hash3 = crate::Hash::from_hex(hex.as_bytes()).unwrap();
753
+ assert_eq!(hash1, hash3);
754
+
755
+ let slice1: &[u8] = bytes1.as_slice();
756
+ let hash4 = crate::Hash::from_slice(slice1).expect("correct length");
757
+ assert_eq!(hash1, hash4);
758
+
759
+ assert!(crate::Hash::from_slice(&[]).is_err());
760
+ assert!(crate::Hash::from_slice(&[42]).is_err());
761
+ assert!(crate::Hash::from_slice([42; 31].as_slice()).is_err());
762
+ assert!(crate::Hash::from_slice([42; 33].as_slice()).is_err());
763
+ assert!(crate::Hash::from_slice([42; 100].as_slice()).is_err());
764
+ }
765
+
766
+ #[test]
767
+ const fn test_hash_const_conversions() {
768
+ let bytes = [42; 32];
769
+ let hash = crate::Hash::from_bytes(bytes);
770
+ _ = hash.as_bytes();
771
+ }
772
+
773
+ #[cfg(feature = "zeroize")]
774
+ #[test]
775
+ fn test_zeroize() {
776
+ use zeroize::Zeroize;
777
+
778
+ let mut hash = crate::Hash([42; 32]);
779
+ hash.zeroize();
780
+ assert_eq!(hash.0, [0u8; 32]);
781
+
782
+ let mut hasher = crate::Hasher {
783
+ chunk_state: crate::ChunkState {
784
+ cv: [42; 8],
785
+ chunk_counter: 42,
786
+ buf: [42; 64],
787
+ buf_len: 42,
788
+ blocks_compressed: 42,
789
+ flags: 42,
790
+ platform: crate::Platform::Portable,
791
+ },
792
+ initial_chunk_counter: 42,
793
+ key: [42; 8],
794
+ cv_stack: [[42; 32]; { crate::MAX_DEPTH + 1 }].into(),
795
+ };
796
+ hasher.zeroize();
797
+ assert_eq!(hasher.chunk_state.cv, [0; 8]);
798
+ assert_eq!(hasher.chunk_state.chunk_counter, 0);
799
+ assert_eq!(hasher.chunk_state.buf, [0; 64]);
800
+ assert_eq!(hasher.chunk_state.buf_len, 0);
801
+ assert_eq!(hasher.chunk_state.blocks_compressed, 0);
802
+ assert_eq!(hasher.chunk_state.flags, 0);
803
+ assert!(matches!(
804
+ hasher.chunk_state.platform,
805
+ crate::Platform::Portable
806
+ ));
807
+ assert_eq!(hasher.initial_chunk_counter, 0);
808
+ assert_eq!(hasher.key, [0; 8]);
809
+ assert_eq!(&*hasher.cv_stack, &[[0u8; 32]; 0]);
810
+
811
+ let mut output_reader = crate::OutputReader {
812
+ inner: crate::Output {
813
+ input_chaining_value: [42; 8],
814
+ block: [42; 64],
815
+ counter: 42,
816
+ block_len: 42,
817
+ flags: 42,
818
+ platform: crate::Platform::Portable,
819
+ },
820
+ position_within_block: 42,
821
+ };
822
+
823
+ output_reader.zeroize();
824
+ assert_eq!(output_reader.inner.input_chaining_value, [0; 8]);
825
+ assert_eq!(output_reader.inner.block, [0; 64]);
826
+ assert_eq!(output_reader.inner.counter, 0);
827
+ assert_eq!(output_reader.inner.block_len, 0);
828
+ assert_eq!(output_reader.inner.flags, 0);
829
+ assert!(matches!(
830
+ output_reader.inner.platform,
831
+ crate::Platform::Portable
832
+ ));
833
+ assert_eq!(output_reader.position_within_block, 0);
834
+ }
835
+
836
+ #[test]
837
+ #[cfg(feature = "std")]
838
+ fn test_update_reader() -> Result<(), std::io::Error> {
839
+ // This is a brief test, since update_reader() is mostly a wrapper around update(), which already
840
+ // has substantial testing.
841
+ let mut input = vec![0; 1_000_000];
842
+ paint_test_input(&mut input);
843
+ assert_eq!(
844
+ crate::Hasher::new().update_reader(&input[..])?.finalize(),
845
+ crate::hash(&input),
846
+ );
847
+ Ok(())
848
+ }
849
+
850
+ #[test]
851
+ #[cfg(feature = "std")]
852
+ fn test_update_reader_interrupted() -> std::io::Result<()> {
853
+ use std::io;
854
+ struct InterruptingReader<'a> {
855
+ already_interrupted: bool,
856
+ slice: &'a [u8],
857
+ }
858
+ impl<'a> InterruptingReader<'a> {
859
+ fn new(slice: &'a [u8]) -> Self {
860
+ Self {
861
+ already_interrupted: false,
862
+ slice,
863
+ }
864
+ }
865
+ }
866
+ impl<'a> io::Read for InterruptingReader<'a> {
867
+ fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
868
+ if !self.already_interrupted {
869
+ self.already_interrupted = true;
870
+ return Err(io::Error::from(io::ErrorKind::Interrupted));
871
+ }
872
+ let take = std::cmp::min(self.slice.len(), buf.len());
873
+ buf[..take].copy_from_slice(&self.slice[..take]);
874
+ self.slice = &self.slice[take..];
875
+ Ok(take)
876
+ }
877
+ }
878
+
879
+ let input = b"hello world";
880
+ let mut reader = InterruptingReader::new(input);
881
+ let mut hasher = crate::Hasher::new();
882
+ hasher.update_reader(&mut reader)?;
883
+ assert_eq!(hasher.finalize(), crate::hash(input));
884
+ Ok(())
885
+ }
886
+
887
+ #[test]
888
+ #[cfg(feature = "mmap")]
889
+ // NamedTempFile isn't Miri-compatible
890
+ #[cfg(not(miri))]
891
+ fn test_mmap() -> Result<(), std::io::Error> {
892
+ // This is a brief test, since update_mmap() is mostly a wrapper around update(), which already
893
+ // has substantial testing.
894
+ use std::io::prelude::*;
895
+ let mut input = vec![0; 1_000_000];
896
+ paint_test_input(&mut input);
897
+ let mut tempfile = tempfile::NamedTempFile::new()?;
898
+ tempfile.write_all(&input)?;
899
+ tempfile.flush()?;
900
+ assert_eq!(
901
+ crate::Hasher::new()
902
+ .update_mmap(tempfile.path())?
903
+ .finalize(),
904
+ crate::hash(&input),
905
+ );
906
+ Ok(())
907
+ }
908
+
909
+ #[test]
910
+ #[cfg(feature = "mmap")]
911
+ #[cfg(target_os = "linux")]
912
+ fn test_mmap_virtual_file() -> Result<(), std::io::Error> {
913
+ // Virtual files like /proc/version can't be mmapped, because their contents don't actually
914
+ // exist anywhere in memory. Make sure we fall back to regular file IO in these cases.
915
+ // Currently this is handled with a length check, where the assumption is that virtual files
916
+ // will always report length 0. If that assumption ever breaks, hopefully this test will catch
917
+ // it.
918
+ let virtual_filepath = "/proc/version";
919
+ let mut mmap_hasher = crate::Hasher::new();
920
+ // We'll fail right here if the fallback doesn't work.
921
+ mmap_hasher.update_mmap(virtual_filepath)?;
922
+ let mut read_hasher = crate::Hasher::new();
923
+ read_hasher.update_reader(std::fs::File::open(virtual_filepath)?)?;
924
+ assert_eq!(mmap_hasher.finalize(), read_hasher.finalize());
925
+ Ok(())
926
+ }
927
+
928
+ #[test]
929
+ #[cfg(feature = "mmap")]
930
+ #[cfg(feature = "rayon")]
931
+ // NamedTempFile isn't Miri-compatible
932
+ #[cfg(not(miri))]
933
+ fn test_mmap_rayon() -> Result<(), std::io::Error> {
934
+ // This is a brief test, since update_mmap_rayon() is mostly a wrapper around update_rayon(),
935
+ // which already has substantial testing.
936
+ use std::io::prelude::*;
937
+ let mut input = vec![0; 1_000_000];
938
+ paint_test_input(&mut input);
939
+ let mut tempfile = tempfile::NamedTempFile::new()?;
940
+ tempfile.write_all(&input)?;
941
+ tempfile.flush()?;
942
+ assert_eq!(
943
+ crate::Hasher::new()
944
+ .update_mmap_rayon(tempfile.path())?
945
+ .finalize(),
946
+ crate::hash(&input),
947
+ );
948
+ Ok(())
949
+ }
950
+
951
+ #[test]
952
+ #[cfg(feature = "std")]
953
+ #[cfg(feature = "serde")]
954
+ fn test_serde() {
955
+ // Henrik suggested that we use 0xfe / 254 for byte test data instead of 0xff / 255, due to the
956
+ // fact that 0xfe is not a well formed CBOR item.
957
+ let hash: crate::Hash = [0xfe; 32].into();
958
+
959
+ let json = serde_json::to_string(&hash).unwrap();
960
+ assert_eq!(
961
+ json,
962
+ "[254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254,254]",
963
+ );
964
+ let hash2: crate::Hash = serde_json::from_str(&json).unwrap();
965
+ assert_eq!(hash, hash2);
966
+
967
+ let mut cbor = Vec::<u8>::new();
968
+ ciborium::into_writer(&hash, &mut cbor).unwrap();
969
+ assert_eq!(
970
+ cbor,
971
+ [
972
+ 0x98, 0x20, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe,
973
+ 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe,
974
+ 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe,
975
+ 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe,
976
+ 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe, 0x18, 0xfe,
977
+ ]
978
+ );
979
+ let hash_from_cbor: crate::Hash = ciborium::from_reader(&cbor[..]).unwrap();
980
+ assert_eq!(hash_from_cbor, hash);
981
+
982
+ // Version 1.5.2 of this crate changed the default serialization format to a bytestring
983
+ // (instead of an array/list) to save bytes on the wire. That was a backwards compatibility
984
+ // mistake for non-self-describing formats, and it's been reverted. Since some small number of
985
+ // serialized bytestrings will probably exist forever in the wild, we shold test that we can
986
+ // still deserialize these from self-describing formats.
987
+ let bytestring_cbor: &[u8] = &[
988
+ 0x58, 0x20, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe,
989
+ 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe,
990
+ 0xfe, 0xfe, 0xfe, 0xfe,
991
+ ];
992
+ let hash_from_bytestring_cbor: crate::Hash = ciborium::from_reader(bytestring_cbor).unwrap();
993
+ assert_eq!(hash_from_bytestring_cbor, hash);
994
+ }
995
+
996
+ // `cargo +nightly miri test` currently works, but it takes forever, because some of our test
997
+ // inputs are quite large. Most of our unsafe code is platform specific and incompatible with Miri
998
+ // anyway, but we'd like it to be possible for callers to run their own tests under Miri, assuming
999
+ // they don't use incompatible features like Rayon or mmap. This test should get reasonable
1000
+ // coverage of our public API without using any large inputs, so we can run it in CI and catch
1001
+ // obvious breaks. (For example, constant_time_eq is not compatible with Miri.)
1002
+ #[test]
1003
+ fn test_miri_smoketest() {
1004
+ let mut hasher = crate::Hasher::new_derive_key("Miri smoketest");
1005
+ hasher.update(b"foo");
1006
+ #[cfg(feature = "std")]
1007
+ hasher.update_reader(&b"bar"[..]).unwrap();
1008
+ assert_eq!(hasher.finalize(), hasher.finalize());
1009
+ let mut reader = hasher.finalize_xof();
1010
+ reader.set_position(999999);
1011
+ reader.fill(&mut [0]);
1012
+ }
1013
+
1014
+ // I had to move these tests out of the deprecated guts module, because leaving them there causes
1015
+ // an un-silenceable warning: https://github.com/rust-lang/rust/issues/47238
1016
+ #[cfg(test)]
1017
+ #[allow(deprecated)]
1018
+ mod guts_tests {
1019
+ use crate::guts::*;
1020
+
1021
+ #[test]
1022
+ fn test_chunk() {
1023
+ assert_eq!(
1024
+ crate::hash(b"foo"),
1025
+ ChunkState::new(0).update(b"foo").finalize(true)
1026
+ );
1027
+ }
1028
+
1029
+ #[test]
1030
+ fn test_parents() {
1031
+ let mut hasher = crate::Hasher::new();
1032
+ let mut buf = [0; crate::CHUNK_LEN];
1033
+
1034
+ buf[0] = 'a' as u8;
1035
+ hasher.update(&buf);
1036
+ let chunk0_cv = ChunkState::new(0).update(&buf).finalize(false);
1037
+
1038
+ buf[0] = 'b' as u8;
1039
+ hasher.update(&buf);
1040
+ let chunk1_cv = ChunkState::new(1).update(&buf).finalize(false);
1041
+
1042
+ hasher.update(b"c");
1043
+ let chunk2_cv = ChunkState::new(2).update(b"c").finalize(false);
1044
+
1045
+ let parent = parent_cv(&chunk0_cv, &chunk1_cv, false);
1046
+ let root = parent_cv(&parent, &chunk2_cv, true);
1047
+ assert_eq!(hasher.finalize(), root);
1048
+ }
1049
+ }