mirror of
https://github.com/dlang/phobos.git
synced 2025-04-26 13:10:35 +03:00
1248 lines
55 KiB
D
1248 lines
55 KiB
D
// Written in the D programming language.
|
|
/**
|
|
* Computes SHA1 and SHA2 hashes of arbitrary data. SHA hashes are 20 to 64 byte
|
|
* quantities (depending on the SHA algorithm) that are like a checksum or CRC,
|
|
* but are more robust.
|
|
*
|
|
$(SCRIPT inhibitQuickIndex = 1;)
|
|
|
|
$(DIVC quickindex,
|
|
$(BOOKTABLE ,
|
|
$(TR $(TH Category) $(TH Functions)
|
|
)
|
|
$(TR $(TDNW Template API) $(TD $(MYREF SHA1)
|
|
)
|
|
)
|
|
$(TR $(TDNW OOP API) $(TD $(MYREF SHA1Digest))
|
|
)
|
|
$(TR $(TDNW Helpers) $(TD $(MYREF sha1Of))
|
|
)
|
|
)
|
|
)
|
|
|
|
* SHA2 comes in several different versions, all supported by this module:
|
|
* SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and SHA-512/256.
|
|
*
|
|
* This module conforms to the APIs defined in $(MREF std, digest). To understand the
|
|
* differences between the template and the OOP API, see $(MREF std, digest).
|
|
*
|
|
* This module publicly imports `std.digest` and can be used as a stand-alone
|
|
* module.
|
|
*
|
|
* License: $(HTTP www.boost.org/LICENSE_1_0.txt, Boost License 1.0).
|
|
*
|
|
* CTFE:
|
|
* Digests do not work in CTFE
|
|
*
|
|
* Authors:
|
|
* The routines and algorithms are derived from the
|
|
* $(I Secure Hash Signature Standard (SHS) (FIPS PUB 180-2)). $(BR )
|
|
* Kai Nacke, Johannes Pfau, Nick Sabalausky
|
|
*
|
|
* References:
|
|
* $(UL
|
|
* $(LI $(LINK2 http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf, FIPS PUB180-2))
|
|
* $(LI $(LINK2 http://software.intel.com/en-us/articles/improving-the-performance-of-the-secure-hash-algorithm-1/, Fast implementation of SHA1))
|
|
* $(LI $(LINK2 http://en.wikipedia.org/wiki/Secure_Hash_Algorithm, Wikipedia article about SHA))
|
|
* )
|
|
*
|
|
* Source: $(PHOBOSSRC std/digest/sha.d)
|
|
*
|
|
*/
|
|
|
|
/* Copyright Kai Nacke 2012.
|
|
* Distributed under the Boost Software License, Version 1.0.
|
|
* (See accompanying file LICENSE_1_0.txt or copy at
|
|
* http://www.boost.org/LICENSE_1_0.txt)
|
|
*/
|
|
module std.digest.sha;
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Template API
|
|
import std.digest.sha;
|
|
|
|
ubyte[20] hash1 = sha1Of("abc");
|
|
assert(toHexString(hash1) == "A9993E364706816ABA3E25717850C26C9CD0D89D");
|
|
|
|
ubyte[28] hash224 = sha224Of("abc");
|
|
assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7");
|
|
|
|
//Feeding data
|
|
ubyte[1024] data;
|
|
SHA1 sha1;
|
|
sha1.start();
|
|
sha1.put(data[]);
|
|
sha1.start(); //Start again
|
|
sha1.put(data[]);
|
|
hash1 = sha1.finish();
|
|
}
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//OOP API
|
|
import std.digest.sha;
|
|
|
|
auto sha1 = new SHA1Digest();
|
|
ubyte[] hash1 = sha1.digest("abc");
|
|
assert(toHexString(hash1) == "A9993E364706816ABA3E25717850C26C9CD0D89D");
|
|
|
|
auto sha224 = new SHA224Digest();
|
|
ubyte[] hash224 = sha224.digest("abc");
|
|
assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7");
|
|
|
|
//Feeding data
|
|
ubyte[1024] data;
|
|
sha1.put(data[]);
|
|
sha1.reset(); //Start again
|
|
sha1.put(data[]);
|
|
hash1 = sha1.finish();
|
|
}
|
|
|
|
version (D_InlineAsm_X86)
|
|
{
|
|
version (D_PIC) {} // https://issues.dlang.org/show_bug.cgi?id=9378
|
|
else private version = USE_SSSE3;
|
|
}
|
|
else version (D_InlineAsm_X86_64)
|
|
{
|
|
private version = USE_SSSE3;
|
|
}
|
|
|
|
import core.bitop;
|
|
|
|
public import std.digest;
|
|
|
|
/*
|
|
* Helper methods for encoding the buffer.
|
|
* Can be removed if the optimizer can inline the methods from std.bitmanip.
|
|
*/
|
|
version (LittleEndian)
|
|
{
|
|
private alias nativeToBigEndian = bswap;
|
|
private alias bigEndianToNative = bswap;
|
|
}
|
|
else pragma(inline, true) private pure @nogc nothrow @safe
|
|
{
|
|
uint nativeToBigEndian(uint val) { return val; }
|
|
ulong nativeToBigEndian(ulong val) { return val; }
|
|
alias bigEndianToNative = nativeToBigEndian;
|
|
}
|
|
|
|
/**
|
|
* Template API SHA1/SHA2 implementation. Supports: SHA-1, SHA-224, SHA-256,
|
|
* SHA-384, SHA-512, SHA-512/224 and SHA-512/256.
|
|
*
|
|
* The hashBlockSize and digestSize are in bits. However, it's likely easier to
|
|
* simply use the convenience aliases: SHA1, SHA224, SHA256, SHA384, SHA512,
|
|
* SHA512_224 and SHA512_256.
|
|
*
|
|
* See `std.digest` for differences between template and OOP API.
|
|
*/
|
|
struct SHA(uint hashBlockSize, uint digestSize)
|
|
{
|
|
enum blockSize = hashBlockSize;
|
|
|
|
static assert(blockSize == 512 || blockSize == 1024,
|
|
"Invalid SHA blockSize, must be 512 or 1024");
|
|
static assert(digestSize == 160 || digestSize == 224 || digestSize == 256 || digestSize == 384 || digestSize == 512,
|
|
"Invalid SHA digestSize, must be 224, 256, 384 or 512");
|
|
static assert(!(blockSize == 512 && digestSize > 256),
|
|
"Invalid SHA digestSize for a blockSize of 512. The digestSize must be 160, 224 or 256.");
|
|
static assert(!(blockSize == 1024 && digestSize < 224),
|
|
"Invalid SHA digestSize for a blockSize of 1024. The digestSize must be 224, 256, 384 or 512.");
|
|
|
|
static if (digestSize == 160) /* SHA-1 */
|
|
{
|
|
version (USE_SSSE3)
|
|
{
|
|
import core.cpuid : ssse3;
|
|
import std.internal.digest.sha_SSSE3 : sse3_constants=constants, transformSSSE3;
|
|
|
|
static void transform(uint[5]* state, const(ubyte[64])* block) pure nothrow @nogc
|
|
{
|
|
if (ssse3)
|
|
{
|
|
version (D_InlineAsm_X86_64)
|
|
// constants as extra argument for PIC
|
|
// see https://issues.dlang.org/show_bug.cgi?id=9378
|
|
transformSSSE3(state, block, &sse3_constants);
|
|
else
|
|
transformSSSE3(state, block);
|
|
}
|
|
else
|
|
transformX86(state, block);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
alias transform = transformX86;
|
|
}
|
|
}
|
|
else static if (blockSize == 512) /* SHA-224, SHA-256 */
|
|
alias transform = transformSHA2!uint;
|
|
else static if (blockSize == 1024) /* SHA-384, SHA-512, SHA-512/224, SHA-512/256 */
|
|
alias transform = transformSHA2!ulong;
|
|
else
|
|
static assert(0);
|
|
|
|
private:
|
|
/* magic initialization constants - state (ABCDEFGH) */
|
|
static if (blockSize == 512 && digestSize == 160) /* SHA-1 */
|
|
{
|
|
uint[5] state =
|
|
[0x67452301,0xefcdab89,0x98badcfe,0x10325476,0xc3d2e1f0];
|
|
}
|
|
else static if (blockSize == 512 && digestSize == 224) /* SHA-224 */
|
|
{
|
|
uint[8] state = [
|
|
0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,
|
|
0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,
|
|
];
|
|
}
|
|
else static if (blockSize == 512 && digestSize == 256) /* SHA-256 */
|
|
{
|
|
uint[8] state = [
|
|
0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
|
|
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,
|
|
];
|
|
}
|
|
else static if (blockSize == 1024 && digestSize == 224) /* SHA-512/224 */
|
|
{
|
|
ulong[8] state = [
|
|
0x8C3D37C8_19544DA2, 0x73E19966_89DCD4D6,
|
|
0x1DFAB7AE_32FF9C82, 0x679DD514_582F9FCF,
|
|
0x0F6D2B69_7BD44DA8, 0x77E36F73_04C48942,
|
|
0x3F9D85A8_6A1D36C8, 0x1112E6AD_91D692A1,
|
|
];
|
|
}
|
|
else static if (blockSize == 1024 && digestSize == 256) /* SHA-512/256 */
|
|
{
|
|
ulong[8] state = [
|
|
0x22312194_FC2BF72C, 0x9F555FA3_C84C64C2,
|
|
0x2393B86B_6F53B151, 0x96387719_5940EABD,
|
|
0x96283EE2_A88EFFE3, 0xBE5E1E25_53863992,
|
|
0x2B0199FC_2C85B8AA, 0x0EB72DDC_81C52CA2,
|
|
];
|
|
}
|
|
else static if (blockSize == 1024 && digestSize == 384) /* SHA-384 */
|
|
{
|
|
ulong[8] state = [
|
|
0xcbbb9d5d_c1059ed8, 0x629a292a_367cd507,
|
|
0x9159015a_3070dd17, 0x152fecd8_f70e5939,
|
|
0x67332667_ffc00b31, 0x8eb44a87_68581511,
|
|
0xdb0c2e0d_64f98fa7, 0x47b5481d_befa4fa4,
|
|
];
|
|
}
|
|
else static if (blockSize == 1024 && digestSize == 512) /* SHA-512 */
|
|
{
|
|
ulong[8] state = [
|
|
0x6a09e667_f3bcc908, 0xbb67ae85_84caa73b,
|
|
0x3c6ef372_fe94f82b, 0xa54ff53a_5f1d36f1,
|
|
0x510e527f_ade682d1, 0x9b05688c_2b3e6c1f,
|
|
0x1f83d9ab_fb41bd6b, 0x5be0cd19_137e2179,
|
|
];
|
|
}
|
|
else
|
|
static assert(0);
|
|
|
|
/* constants */
|
|
static if (blockSize == 512)
|
|
{
|
|
static immutable uint[64] constants = [
|
|
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
|
|
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
|
|
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
|
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
|
|
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
|
|
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
|
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
|
|
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
|
|
];
|
|
}
|
|
else static if (blockSize == 1024)
|
|
{
|
|
static immutable ulong[80] constants = [
|
|
0x428a2f98_d728ae22, 0x71374491_23ef65cd, 0xb5c0fbcf_ec4d3b2f, 0xe9b5dba5_8189dbbc,
|
|
0x3956c25b_f348b538, 0x59f111f1_b605d019, 0x923f82a4_af194f9b, 0xab1c5ed5_da6d8118,
|
|
0xd807aa98_a3030242, 0x12835b01_45706fbe, 0x243185be_4ee4b28c, 0x550c7dc3_d5ffb4e2,
|
|
0x72be5d74_f27b896f, 0x80deb1fe_3b1696b1, 0x9bdc06a7_25c71235, 0xc19bf174_cf692694,
|
|
0xe49b69c1_9ef14ad2, 0xefbe4786_384f25e3, 0x0fc19dc6_8b8cd5b5, 0x240ca1cc_77ac9c65,
|
|
0x2de92c6f_592b0275, 0x4a7484aa_6ea6e483, 0x5cb0a9dc_bd41fbd4, 0x76f988da_831153b5,
|
|
0x983e5152_ee66dfab, 0xa831c66d_2db43210, 0xb00327c8_98fb213f, 0xbf597fc7_beef0ee4,
|
|
0xc6e00bf3_3da88fc2, 0xd5a79147_930aa725, 0x06ca6351_e003826f, 0x14292967_0a0e6e70,
|
|
0x27b70a85_46d22ffc, 0x2e1b2138_5c26c926, 0x4d2c6dfc_5ac42aed, 0x53380d13_9d95b3df,
|
|
0x650a7354_8baf63de, 0x766a0abb_3c77b2a8, 0x81c2c92e_47edaee6, 0x92722c85_1482353b,
|
|
0xa2bfe8a1_4cf10364, 0xa81a664b_bc423001, 0xc24b8b70_d0f89791, 0xc76c51a3_0654be30,
|
|
0xd192e819_d6ef5218, 0xd6990624_5565a910, 0xf40e3585_5771202a, 0x106aa070_32bbd1b8,
|
|
0x19a4c116_b8d2d0c8, 0x1e376c08_5141ab53, 0x2748774c_df8eeb99, 0x34b0bcb5_e19b48a8,
|
|
0x391c0cb3_c5c95a63, 0x4ed8aa4a_e3418acb, 0x5b9cca4f_7763e373, 0x682e6ff3_d6b2b8a3,
|
|
0x748f82ee_5defb2fc, 0x78a5636f_43172f60, 0x84c87814_a1f0ab72, 0x8cc70208_1a6439ec,
|
|
0x90befffa_23631e28, 0xa4506ceb_de82bde9, 0xbef9a3f7_b2c67915, 0xc67178f2_e372532b,
|
|
0xca273ece_ea26619c, 0xd186b8c7_21c0c207, 0xeada7dd6_cde0eb1e, 0xf57d4f7f_ee6ed178,
|
|
0x06f067aa_72176fba, 0x0a637dc5_a2c898a6, 0x113f9804_bef90dae, 0x1b710b35_131c471b,
|
|
0x28db77f5_23047d84, 0x32caab7b_40c72493, 0x3c9ebe0a_15c9bebc, 0x431d67c4_9c100d4c,
|
|
0x4cc5d4be_cb3e42b6, 0x597f299c_fc657e2a, 0x5fcb6fab_3ad6faec, 0x6c44198c_4a475817,
|
|
];
|
|
}
|
|
else
|
|
static assert(0);
|
|
|
|
/*
|
|
* number of bits, modulo 2^64 (ulong[1]) or 2^128 (ulong[2]),
|
|
* should just use ucent instead of ulong[2] once it's available
|
|
*/
|
|
ulong[blockSize/512] count;
|
|
ubyte[blockSize/8] buffer; /* input buffer */
|
|
|
|
static immutable ubyte[128] padding =
|
|
[
|
|
0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
|
|
0x00, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
|
|
];
|
|
|
|
/*
|
|
* Basic SHA1/SHA2 functions.
|
|
*/
|
|
pragma(inline, true)
|
|
static @safe pure nothrow @nogc
|
|
{
|
|
/* All SHA1/SHA2 */
|
|
T Ch(T)(T x, T y, T z) { return z ^ (x & (y ^ z)); }
|
|
T Maj(T)(T x, T y, T z) { return (x & y) | (z & (x ^ y)); }
|
|
|
|
/* SHA-1 */
|
|
uint Parity(uint x, uint y, uint z) { return x ^ y ^ z; }
|
|
|
|
/* SHA-224, SHA-256 */
|
|
uint BigSigma0(uint x) { return core.bitop.ror(x, 2) ^ core.bitop.ror(x, 13) ^ core.bitop.ror(x, 22); }
|
|
uint BigSigma1(uint x) { return core.bitop.ror(x, 6) ^ core.bitop.ror(x, 11) ^ core.bitop.ror(x, 25); }
|
|
uint SmSigma0(uint x) { return core.bitop.ror(x, 7) ^ core.bitop.ror(x, 18) ^ x >> 3; }
|
|
uint SmSigma1(uint x) { return core.bitop.ror(x, 17) ^ core.bitop.ror(x, 19) ^ x >> 10; }
|
|
|
|
/* SHA-384, SHA-512, SHA-512/224, SHA-512/256 */
|
|
ulong BigSigma0(ulong x) { return core.bitop.ror(x, 28) ^ core.bitop.ror(x, 34) ^ core.bitop.ror(x, 39); }
|
|
ulong BigSigma1(ulong x) { return core.bitop.ror(x, 14) ^ core.bitop.ror(x, 18) ^ core.bitop.ror(x, 41); }
|
|
ulong SmSigma0(ulong x) { return core.bitop.ror(x, 1) ^ core.bitop.ror(x, 8) ^ x >> 7; }
|
|
ulong SmSigma1(ulong x) { return core.bitop.ror(x, 19) ^ core.bitop.ror(x, 61) ^ x >> 6; }
|
|
}
|
|
|
|
/*
|
|
* SHA1 basic transformation. Transforms state based on block.
|
|
*/
|
|
static void T_0_15(int i, const(ubyte[64])* input, ref uint[16] W, uint A, ref uint B, uint C, uint D,
|
|
uint E, ref uint T) pure nothrow @nogc
|
|
{
|
|
uint Wi = W[i] = bigEndianToNative(*cast(uint*) &((*input)[i*4]));
|
|
T = Ch(B, C, D) + E + core.bitop.rol(A, 5) + Wi + 0x5a827999;
|
|
B = core.bitop.rol(B, 30);
|
|
}
|
|
|
|
static void T_16_19(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E, ref uint T)
|
|
pure nothrow @nogc
|
|
{
|
|
W[i&15] = core.bitop.rol(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1);
|
|
T = Ch(B, C, D) + E + core.bitop.rol(A, 5) + W[i&15] + 0x5a827999;
|
|
B = core.bitop.rol(B, 30);
|
|
}
|
|
|
|
static void T_20_39(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E,
|
|
ref uint T) pure nothrow @nogc
|
|
{
|
|
W[i&15] = core.bitop.rol(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1);
|
|
T = Parity(B, C, D) + E + core.bitop.rol(A, 5) + W[i&15] + 0x6ed9eba1;
|
|
B = core.bitop.rol(B, 30);
|
|
}
|
|
|
|
static void T_40_59(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E,
|
|
ref uint T) pure nothrow @nogc
|
|
{
|
|
W[i&15] = core.bitop.rol(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1);
|
|
T = Maj(B, C, D) + E + core.bitop.rol(A, 5) + W[i&15] + 0x8f1bbcdc;
|
|
B = core.bitop.rol(B, 30);
|
|
}
|
|
|
|
static void T_60_79(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E,
|
|
ref uint T) pure nothrow @nogc
|
|
{
|
|
W[i&15] = core.bitop.rol(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1);
|
|
T = Parity(B, C, D) + E + core.bitop.rol(A, 5) + W[i&15] + 0xca62c1d6;
|
|
B = core.bitop.rol(B, 30);
|
|
}
|
|
|
|
private static void transformX86(uint[5]* state, const(ubyte[64])* block) pure nothrow @nogc
|
|
{
|
|
uint A, B, C, D, E, T;
|
|
uint[16] W = void;
|
|
|
|
A = (*state)[0];
|
|
B = (*state)[1];
|
|
C = (*state)[2];
|
|
D = (*state)[3];
|
|
E = (*state)[4];
|
|
|
|
T_0_15 ( 0, block, W, A, B, C, D, E, T);
|
|
T_0_15 ( 1, block, W, T, A, B, C, D, E);
|
|
T_0_15 ( 2, block, W, E, T, A, B, C, D);
|
|
T_0_15 ( 3, block, W, D, E, T, A, B, C);
|
|
T_0_15 ( 4, block, W, C, D, E, T, A, B);
|
|
T_0_15 ( 5, block, W, B, C, D, E, T, A);
|
|
T_0_15 ( 6, block, W, A, B, C, D, E, T);
|
|
T_0_15 ( 7, block, W, T, A, B, C, D, E);
|
|
T_0_15 ( 8, block, W, E, T, A, B, C, D);
|
|
T_0_15 ( 9, block, W, D, E, T, A, B, C);
|
|
T_0_15 (10, block, W, C, D, E, T, A, B);
|
|
T_0_15 (11, block, W, B, C, D, E, T, A);
|
|
T_0_15 (12, block, W, A, B, C, D, E, T);
|
|
T_0_15 (13, block, W, T, A, B, C, D, E);
|
|
T_0_15 (14, block, W, E, T, A, B, C, D);
|
|
T_0_15 (15, block, W, D, E, T, A, B, C);
|
|
T_16_19(16, W, C, D, E, T, A, B);
|
|
T_16_19(17, W, B, C, D, E, T, A);
|
|
T_16_19(18, W, A, B, C, D, E, T);
|
|
T_16_19(19, W, T, A, B, C, D, E);
|
|
T_20_39(20, W, E, T, A, B, C, D);
|
|
T_20_39(21, W, D, E, T, A, B, C);
|
|
T_20_39(22, W, C, D, E, T, A, B);
|
|
T_20_39(23, W, B, C, D, E, T, A);
|
|
T_20_39(24, W, A, B, C, D, E, T);
|
|
T_20_39(25, W, T, A, B, C, D, E);
|
|
T_20_39(26, W, E, T, A, B, C, D);
|
|
T_20_39(27, W, D, E, T, A, B, C);
|
|
T_20_39(28, W, C, D, E, T, A, B);
|
|
T_20_39(29, W, B, C, D, E, T, A);
|
|
T_20_39(30, W, A, B, C, D, E, T);
|
|
T_20_39(31, W, T, A, B, C, D, E);
|
|
T_20_39(32, W, E, T, A, B, C, D);
|
|
T_20_39(33, W, D, E, T, A, B, C);
|
|
T_20_39(34, W, C, D, E, T, A, B);
|
|
T_20_39(35, W, B, C, D, E, T, A);
|
|
T_20_39(36, W, A, B, C, D, E, T);
|
|
T_20_39(37, W, T, A, B, C, D, E);
|
|
T_20_39(38, W, E, T, A, B, C, D);
|
|
T_20_39(39, W, D, E, T, A, B, C);
|
|
T_40_59(40, W, C, D, E, T, A, B);
|
|
T_40_59(41, W, B, C, D, E, T, A);
|
|
T_40_59(42, W, A, B, C, D, E, T);
|
|
T_40_59(43, W, T, A, B, C, D, E);
|
|
T_40_59(44, W, E, T, A, B, C, D);
|
|
T_40_59(45, W, D, E, T, A, B, C);
|
|
T_40_59(46, W, C, D, E, T, A, B);
|
|
T_40_59(47, W, B, C, D, E, T, A);
|
|
T_40_59(48, W, A, B, C, D, E, T);
|
|
T_40_59(49, W, T, A, B, C, D, E);
|
|
T_40_59(50, W, E, T, A, B, C, D);
|
|
T_40_59(51, W, D, E, T, A, B, C);
|
|
T_40_59(52, W, C, D, E, T, A, B);
|
|
T_40_59(53, W, B, C, D, E, T, A);
|
|
T_40_59(54, W, A, B, C, D, E, T);
|
|
T_40_59(55, W, T, A, B, C, D, E);
|
|
T_40_59(56, W, E, T, A, B, C, D);
|
|
T_40_59(57, W, D, E, T, A, B, C);
|
|
T_40_59(58, W, C, D, E, T, A, B);
|
|
T_40_59(59, W, B, C, D, E, T, A);
|
|
T_60_79(60, W, A, B, C, D, E, T);
|
|
T_60_79(61, W, T, A, B, C, D, E);
|
|
T_60_79(62, W, E, T, A, B, C, D);
|
|
T_60_79(63, W, D, E, T, A, B, C);
|
|
T_60_79(64, W, C, D, E, T, A, B);
|
|
T_60_79(65, W, B, C, D, E, T, A);
|
|
T_60_79(66, W, A, B, C, D, E, T);
|
|
T_60_79(67, W, T, A, B, C, D, E);
|
|
T_60_79(68, W, E, T, A, B, C, D);
|
|
T_60_79(69, W, D, E, T, A, B, C);
|
|
T_60_79(70, W, C, D, E, T, A, B);
|
|
T_60_79(71, W, B, C, D, E, T, A);
|
|
T_60_79(72, W, A, B, C, D, E, T);
|
|
T_60_79(73, W, T, A, B, C, D, E);
|
|
T_60_79(74, W, E, T, A, B, C, D);
|
|
T_60_79(75, W, D, E, T, A, B, C);
|
|
T_60_79(76, W, C, D, E, T, A, B);
|
|
T_60_79(77, W, B, C, D, E, T, A);
|
|
T_60_79(78, W, A, B, C, D, E, T);
|
|
T_60_79(79, W, T, A, B, C, D, E);
|
|
|
|
(*state)[0] += E;
|
|
(*state)[1] += T;
|
|
(*state)[2] += A;
|
|
(*state)[3] += B;
|
|
(*state)[4] += C;
|
|
|
|
/* Zeroize sensitive information. */
|
|
W[] = 0;
|
|
}
|
|
|
|
/*
|
|
* SHA2 basic transformation. Transforms state based on block.
|
|
*/
|
|
pragma(inline, true)
|
|
static void T_SHA2_0_15(Word)(int i, const(ubyte[blockSize/8])* input, ref Word[16] W,
|
|
Word A, Word B, Word C, ref Word D, Word E, Word F, Word G, ref Word H, Word K)
|
|
pure nothrow @nogc
|
|
{
|
|
Word Wi = W[i] = bigEndianToNative(*cast(Word*) &((*input)[i*Word.sizeof]));
|
|
Word T1 = H + BigSigma1(E) + Ch(E, F, G) + K + Wi;
|
|
Word T2 = BigSigma0(A) + Maj(A, B, C);
|
|
D += T1;
|
|
H = T1 + T2;
|
|
}
|
|
|
|
// Temporarily disable inlining because it increases build speed by 10x.
|
|
// pragma(inline, true)
|
|
static void T_SHA2_16_79(Word)(int i, ref Word[16] W,
|
|
Word A, Word B, Word C, ref Word D, Word E, Word F, Word G, ref Word H, Word K)
|
|
pure nothrow @nogc
|
|
{
|
|
W[i&15] = SmSigma1(W[(i-2)&15]) + W[(i-7)&15] + SmSigma0(W[(i-15)&15]) + W[i&15];
|
|
Word T1 = H + BigSigma1(E) + Ch(E, F, G) + K + W[i&15];
|
|
Word T2 = BigSigma0(A) + Maj(A, B, C);
|
|
D += T1;
|
|
H = T1 + T2;
|
|
}
|
|
|
|
private static void transformSHA2(Word)(Word[8]* state, const(ubyte[blockSize/8])* block)
|
|
pure nothrow @nogc
|
|
{
|
|
Word A, B, C, D, E, F, G, H;
|
|
Word[16] W = void;
|
|
|
|
A = (*state)[0];
|
|
B = (*state)[1];
|
|
C = (*state)[2];
|
|
D = (*state)[3];
|
|
E = (*state)[4];
|
|
F = (*state)[5];
|
|
G = (*state)[6];
|
|
H = (*state)[7];
|
|
|
|
T_SHA2_0_15!Word ( 0, block, W, A, B, C, D, E, F, G, H, constants[ 0]);
|
|
T_SHA2_0_15!Word ( 1, block, W, H, A, B, C, D, E, F, G, constants[ 1]);
|
|
T_SHA2_0_15!Word ( 2, block, W, G, H, A, B, C, D, E, F, constants[ 2]);
|
|
T_SHA2_0_15!Word ( 3, block, W, F, G, H, A, B, C, D, E, constants[ 3]);
|
|
T_SHA2_0_15!Word ( 4, block, W, E, F, G, H, A, B, C, D, constants[ 4]);
|
|
T_SHA2_0_15!Word ( 5, block, W, D, E, F, G, H, A, B, C, constants[ 5]);
|
|
T_SHA2_0_15!Word ( 6, block, W, C, D, E, F, G, H, A, B, constants[ 6]);
|
|
T_SHA2_0_15!Word ( 7, block, W, B, C, D, E, F, G, H, A, constants[ 7]);
|
|
T_SHA2_0_15!Word ( 8, block, W, A, B, C, D, E, F, G, H, constants[ 8]);
|
|
T_SHA2_0_15!Word ( 9, block, W, H, A, B, C, D, E, F, G, constants[ 9]);
|
|
T_SHA2_0_15!Word (10, block, W, G, H, A, B, C, D, E, F, constants[10]);
|
|
T_SHA2_0_15!Word (11, block, W, F, G, H, A, B, C, D, E, constants[11]);
|
|
T_SHA2_0_15!Word (12, block, W, E, F, G, H, A, B, C, D, constants[12]);
|
|
T_SHA2_0_15!Word (13, block, W, D, E, F, G, H, A, B, C, constants[13]);
|
|
T_SHA2_0_15!Word (14, block, W, C, D, E, F, G, H, A, B, constants[14]);
|
|
T_SHA2_0_15!Word (15, block, W, B, C, D, E, F, G, H, A, constants[15]);
|
|
T_SHA2_16_79!Word(16, W, A, B, C, D, E, F, G, H, constants[16]);
|
|
T_SHA2_16_79!Word(17, W, H, A, B, C, D, E, F, G, constants[17]);
|
|
T_SHA2_16_79!Word(18, W, G, H, A, B, C, D, E, F, constants[18]);
|
|
T_SHA2_16_79!Word(19, W, F, G, H, A, B, C, D, E, constants[19]);
|
|
T_SHA2_16_79!Word(20, W, E, F, G, H, A, B, C, D, constants[20]);
|
|
T_SHA2_16_79!Word(21, W, D, E, F, G, H, A, B, C, constants[21]);
|
|
T_SHA2_16_79!Word(22, W, C, D, E, F, G, H, A, B, constants[22]);
|
|
T_SHA2_16_79!Word(23, W, B, C, D, E, F, G, H, A, constants[23]);
|
|
T_SHA2_16_79!Word(24, W, A, B, C, D, E, F, G, H, constants[24]);
|
|
T_SHA2_16_79!Word(25, W, H, A, B, C, D, E, F, G, constants[25]);
|
|
T_SHA2_16_79!Word(26, W, G, H, A, B, C, D, E, F, constants[26]);
|
|
T_SHA2_16_79!Word(27, W, F, G, H, A, B, C, D, E, constants[27]);
|
|
T_SHA2_16_79!Word(28, W, E, F, G, H, A, B, C, D, constants[28]);
|
|
T_SHA2_16_79!Word(29, W, D, E, F, G, H, A, B, C, constants[29]);
|
|
T_SHA2_16_79!Word(30, W, C, D, E, F, G, H, A, B, constants[30]);
|
|
T_SHA2_16_79!Word(31, W, B, C, D, E, F, G, H, A, constants[31]);
|
|
T_SHA2_16_79!Word(32, W, A, B, C, D, E, F, G, H, constants[32]);
|
|
T_SHA2_16_79!Word(33, W, H, A, B, C, D, E, F, G, constants[33]);
|
|
T_SHA2_16_79!Word(34, W, G, H, A, B, C, D, E, F, constants[34]);
|
|
T_SHA2_16_79!Word(35, W, F, G, H, A, B, C, D, E, constants[35]);
|
|
T_SHA2_16_79!Word(36, W, E, F, G, H, A, B, C, D, constants[36]);
|
|
T_SHA2_16_79!Word(37, W, D, E, F, G, H, A, B, C, constants[37]);
|
|
T_SHA2_16_79!Word(38, W, C, D, E, F, G, H, A, B, constants[38]);
|
|
T_SHA2_16_79!Word(39, W, B, C, D, E, F, G, H, A, constants[39]);
|
|
T_SHA2_16_79!Word(40, W, A, B, C, D, E, F, G, H, constants[40]);
|
|
T_SHA2_16_79!Word(41, W, H, A, B, C, D, E, F, G, constants[41]);
|
|
T_SHA2_16_79!Word(42, W, G, H, A, B, C, D, E, F, constants[42]);
|
|
T_SHA2_16_79!Word(43, W, F, G, H, A, B, C, D, E, constants[43]);
|
|
T_SHA2_16_79!Word(44, W, E, F, G, H, A, B, C, D, constants[44]);
|
|
T_SHA2_16_79!Word(45, W, D, E, F, G, H, A, B, C, constants[45]);
|
|
T_SHA2_16_79!Word(46, W, C, D, E, F, G, H, A, B, constants[46]);
|
|
T_SHA2_16_79!Word(47, W, B, C, D, E, F, G, H, A, constants[47]);
|
|
T_SHA2_16_79!Word(48, W, A, B, C, D, E, F, G, H, constants[48]);
|
|
T_SHA2_16_79!Word(49, W, H, A, B, C, D, E, F, G, constants[49]);
|
|
T_SHA2_16_79!Word(50, W, G, H, A, B, C, D, E, F, constants[50]);
|
|
T_SHA2_16_79!Word(51, W, F, G, H, A, B, C, D, E, constants[51]);
|
|
T_SHA2_16_79!Word(52, W, E, F, G, H, A, B, C, D, constants[52]);
|
|
T_SHA2_16_79!Word(53, W, D, E, F, G, H, A, B, C, constants[53]);
|
|
T_SHA2_16_79!Word(54, W, C, D, E, F, G, H, A, B, constants[54]);
|
|
T_SHA2_16_79!Word(55, W, B, C, D, E, F, G, H, A, constants[55]);
|
|
T_SHA2_16_79!Word(56, W, A, B, C, D, E, F, G, H, constants[56]);
|
|
T_SHA2_16_79!Word(57, W, H, A, B, C, D, E, F, G, constants[57]);
|
|
T_SHA2_16_79!Word(58, W, G, H, A, B, C, D, E, F, constants[58]);
|
|
T_SHA2_16_79!Word(59, W, F, G, H, A, B, C, D, E, constants[59]);
|
|
T_SHA2_16_79!Word(60, W, E, F, G, H, A, B, C, D, constants[60]);
|
|
T_SHA2_16_79!Word(61, W, D, E, F, G, H, A, B, C, constants[61]);
|
|
T_SHA2_16_79!Word(62, W, C, D, E, F, G, H, A, B, constants[62]);
|
|
T_SHA2_16_79!Word(63, W, B, C, D, E, F, G, H, A, constants[63]);
|
|
|
|
static if (is(Word == ulong))
|
|
{
|
|
T_SHA2_16_79!Word(64, W, A, B, C, D, E, F, G, H, constants[64]);
|
|
T_SHA2_16_79!Word(65, W, H, A, B, C, D, E, F, G, constants[65]);
|
|
T_SHA2_16_79!Word(66, W, G, H, A, B, C, D, E, F, constants[66]);
|
|
T_SHA2_16_79!Word(67, W, F, G, H, A, B, C, D, E, constants[67]);
|
|
T_SHA2_16_79!Word(68, W, E, F, G, H, A, B, C, D, constants[68]);
|
|
T_SHA2_16_79!Word(69, W, D, E, F, G, H, A, B, C, constants[69]);
|
|
T_SHA2_16_79!Word(70, W, C, D, E, F, G, H, A, B, constants[70]);
|
|
T_SHA2_16_79!Word(71, W, B, C, D, E, F, G, H, A, constants[71]);
|
|
T_SHA2_16_79!Word(72, W, A, B, C, D, E, F, G, H, constants[72]);
|
|
T_SHA2_16_79!Word(73, W, H, A, B, C, D, E, F, G, constants[73]);
|
|
T_SHA2_16_79!Word(74, W, G, H, A, B, C, D, E, F, constants[74]);
|
|
T_SHA2_16_79!Word(75, W, F, G, H, A, B, C, D, E, constants[75]);
|
|
T_SHA2_16_79!Word(76, W, E, F, G, H, A, B, C, D, constants[76]);
|
|
T_SHA2_16_79!Word(77, W, D, E, F, G, H, A, B, C, constants[77]);
|
|
T_SHA2_16_79!Word(78, W, C, D, E, F, G, H, A, B, constants[78]);
|
|
T_SHA2_16_79!Word(79, W, B, C, D, E, F, G, H, A, constants[79]);
|
|
}
|
|
|
|
(*state)[0] += A;
|
|
(*state)[1] += B;
|
|
(*state)[2] += C;
|
|
(*state)[3] += D;
|
|
(*state)[4] += E;
|
|
(*state)[5] += F;
|
|
(*state)[6] += G;
|
|
(*state)[7] += H;
|
|
|
|
/* Zeroize sensitive information. */
|
|
W[] = 0;
|
|
}
|
|
|
|
public:
|
|
/**
|
|
* SHA initialization. Begins an SHA1/SHA2 operation.
|
|
*
|
|
* Note:
|
|
* For this SHA Digest implementation calling start after default construction
|
|
* is not necessary. Calling start is only necessary to reset the Digest.
|
|
*
|
|
* Generic code which deals with different Digest types should always call start though.
|
|
*
|
|
* Example:
|
|
* --------
|
|
* SHA1 digest;
|
|
* //digest.start(); //Not necessary
|
|
* digest.put(0);
|
|
* --------
|
|
*/
|
|
void start() @safe pure nothrow @nogc
|
|
{
|
|
this = typeof(this).init;
|
|
}
|
|
|
|
/**
|
|
* Use this to feed the digest with data.
|
|
* Also implements the $(REF isOutputRange, std,range,primitives)
|
|
* interface for `ubyte` and `const(ubyte)[]`.
|
|
*/
|
|
void put(scope const(ubyte)[] input...) @trusted pure nothrow @nogc
|
|
{
|
|
enum blockSizeInBytes = blockSize/8;
|
|
|
|
size_t i;
|
|
uint index, partLen;
|
|
auto inputLen = input.length;
|
|
|
|
/* Compute number of bytes mod block size (64 or 128 bytes) */
|
|
index = (cast(uint) count[0] >> 3) & (blockSizeInBytes - 1);
|
|
|
|
/* Update number of bits */
|
|
static if (blockSize == 512)
|
|
count[0] += inputLen * 8;
|
|
else static if (blockSize == 1024)
|
|
{
|
|
/* ugly hack to work around lack of ucent */
|
|
auto oldCount0 = count[0];
|
|
count[0] += inputLen * 8;
|
|
if (count[0] < oldCount0)
|
|
count[1]++;
|
|
}
|
|
else
|
|
static assert(0);
|
|
|
|
partLen = blockSizeInBytes - index;
|
|
|
|
/* Transform as many times as possible. */
|
|
if (inputLen >= partLen)
|
|
{
|
|
(&buffer[index])[0 .. partLen] = input.ptr[0 .. partLen];
|
|
transform (&state, &buffer);
|
|
|
|
for (i = partLen; i + blockSizeInBytes-1 < inputLen; i += blockSizeInBytes)
|
|
transform(&state, cast(ubyte[blockSizeInBytes]*)(input.ptr + i));
|
|
|
|
index = 0;
|
|
}
|
|
else
|
|
i = 0;
|
|
|
|
/* Buffer remaining input */
|
|
if (inputLen - i)
|
|
(&buffer[index])[0 .. inputLen-i] = (&input[i])[0 .. inputLen-i];
|
|
}
|
|
|
|
@safe unittest
|
|
{
|
|
typeof(this) dig;
|
|
dig.put(cast(ubyte) 0); //single ubyte
|
|
dig.put(cast(ubyte) 0, cast(ubyte) 0); //variadic
|
|
ubyte[10] buf;
|
|
dig.put(buf); //buffer
|
|
}
|
|
|
|
|
|
/**
|
|
* Returns the finished SHA hash. This also calls $(LREF start) to
|
|
* reset the internal state.
|
|
*/
|
|
ubyte[digestSize/8] finish() @trusted pure nothrow @nogc
|
|
{
|
|
static if (blockSize == 512)
|
|
{
|
|
uint[8] data = void;
|
|
uint index, padLen;
|
|
|
|
/* Save number of bits */
|
|
ulong bits = nativeToBigEndian(count[0]);
|
|
|
|
/* Pad out to 56 mod 64. */
|
|
index = (cast(uint) count[0] >> 3) & (64 - 1);
|
|
padLen = (index < 56) ? (56 - index) : (120 - index);
|
|
put(padding[0 .. padLen]);
|
|
|
|
/* Append length (before padding) */
|
|
put((cast(ubyte*) &bits)[0 .. bits.sizeof]);
|
|
|
|
/* Store state in digest */
|
|
static foreach (i; 0 .. (digestSize == 160) ? 5 : 8)
|
|
data[i] = nativeToBigEndian(state[i]);
|
|
|
|
/* Zeroize sensitive information. */
|
|
start();
|
|
return (cast(ubyte*) data.ptr)[0 .. digestSize/8];
|
|
}
|
|
else static if (blockSize == 1024)
|
|
{
|
|
ulong[8] data = void;
|
|
uint index, padLen;
|
|
|
|
/* Save number of bits */
|
|
ulong[2] bits = [nativeToBigEndian(count[1]), nativeToBigEndian(count[0])];
|
|
|
|
/* Pad out to 112 mod 128. */
|
|
index = (cast(uint) count[0] >> 3) & (128 - 1);
|
|
padLen = (index < 112) ? (112 - index) : (240 - index);
|
|
put(padding[0 .. padLen]);
|
|
|
|
/* Append length (before padding) */
|
|
put((cast(ubyte*) &bits)[0 .. bits.sizeof]);
|
|
|
|
/* Store state in digest */
|
|
static foreach (i; 0 .. 8)
|
|
data[i] = nativeToBigEndian(state[i]);
|
|
|
|
/* Zeroize sensitive information. */
|
|
start();
|
|
return (cast(ubyte*) data.ptr)[0 .. digestSize/8];
|
|
}
|
|
else
|
|
static assert(0);
|
|
}
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Simple example
|
|
SHA1 hash;
|
|
hash.start();
|
|
hash.put(cast(ubyte) 0);
|
|
ubyte[20] result = hash.finish();
|
|
}
|
|
}
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Simple example, hashing a string using sha1Of helper function
|
|
ubyte[20] hash = sha1Of("abc");
|
|
//Let's get a hash string
|
|
assert(toHexString(hash) == "A9993E364706816ABA3E25717850C26C9CD0D89D");
|
|
|
|
//The same, but using SHA-224
|
|
ubyte[28] hash224 = sha224Of("abc");
|
|
assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7");
|
|
}
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Using the basic API
|
|
SHA1 hash;
|
|
hash.start();
|
|
ubyte[1024] data;
|
|
//Initialize data here...
|
|
hash.put(data);
|
|
ubyte[20] result = hash.finish();
|
|
}
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Let's use the template features:
|
|
//Note: When passing a SHA1 to a function, it must be passed by reference!
|
|
void doSomething(T)(ref T hash)
|
|
if (isDigest!T)
|
|
{
|
|
hash.put(cast(ubyte) 0);
|
|
}
|
|
SHA1 sha;
|
|
sha.start();
|
|
doSomething(sha);
|
|
assert(toHexString(sha.finish()) == "5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F");
|
|
}
|
|
|
|
alias SHA1 = SHA!(512, 160); /// SHA alias for SHA-1, hash is ubyte[20]
|
|
alias SHA224 = SHA!(512, 224); /// SHA alias for SHA-224, hash is ubyte[28]
|
|
alias SHA256 = SHA!(512, 256); /// SHA alias for SHA-256, hash is ubyte[32]
|
|
alias SHA384 = SHA!(1024, 384); /// SHA alias for SHA-384, hash is ubyte[48]
|
|
alias SHA512 = SHA!(1024, 512); /// SHA alias for SHA-512, hash is ubyte[64]
|
|
alias SHA512_224 = SHA!(1024, 224); /// SHA alias for SHA-512/224, hash is ubyte[28]
|
|
alias SHA512_256 = SHA!(1024, 256); /// SHA alias for SHA-512/256, hash is ubyte[32]
|
|
|
|
@safe unittest
|
|
{
|
|
assert(isDigest!SHA1);
|
|
assert(isDigest!SHA224);
|
|
assert(isDigest!SHA256);
|
|
assert(isDigest!SHA384);
|
|
assert(isDigest!SHA512);
|
|
assert(isDigest!SHA512_224);
|
|
assert(isDigest!SHA512_256);
|
|
}
|
|
|
|
@system unittest
|
|
{
|
|
import std.conv : hexString;
|
|
import std.range;
|
|
|
|
ubyte[20] digest;
|
|
ubyte[28] digest224;
|
|
ubyte[32] digest256;
|
|
ubyte[48] digest384;
|
|
ubyte[64] digest512;
|
|
ubyte[28] digest512_224;
|
|
ubyte[32] digest512_256;
|
|
|
|
SHA1 sha;
|
|
sha.put(cast(ubyte[])"abcdef");
|
|
sha.start();
|
|
sha.put(cast(ubyte[])"");
|
|
assert(sha.finish() == cast(ubyte[]) hexString!"da39a3ee5e6b4b0d3255bfef95601890afd80709");
|
|
|
|
SHA224 sha224;
|
|
sha224.put(cast(ubyte[])"abcdef");
|
|
sha224.start();
|
|
sha224.put(cast(ubyte[])"");
|
|
assert(sha224.finish() == cast(ubyte[]) hexString!"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f");
|
|
|
|
SHA256 sha256;
|
|
sha256.put(cast(ubyte[])"abcdef");
|
|
sha256.start();
|
|
sha256.put(cast(ubyte[])"");
|
|
assert(sha256.finish() == cast(ubyte[])
|
|
hexString!"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855");
|
|
|
|
SHA384 sha384;
|
|
sha384.put(cast(ubyte[])"abcdef");
|
|
sha384.start();
|
|
sha384.put(cast(ubyte[])"");
|
|
assert(sha384.finish() == cast(ubyte[]) hexString!("38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c"
|
|
~"0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"));
|
|
|
|
SHA512 sha512;
|
|
sha512.put(cast(ubyte[])"abcdef");
|
|
sha512.start();
|
|
sha512.put(cast(ubyte[])"");
|
|
assert(sha512.finish() == cast(ubyte[])
|
|
hexString!("cf83e1357eefb8bdf1542850d66d8007d620e4050b571"
|
|
~"5dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"));
|
|
|
|
SHA512_224 sha512_224;
|
|
sha512_224.put(cast(ubyte[])"abcdef");
|
|
sha512_224.start();
|
|
sha512_224.put(cast(ubyte[])"");
|
|
assert(sha512_224.finish() == cast(ubyte[]) hexString!"6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4");
|
|
|
|
SHA512_256 sha512_256;
|
|
sha512_256.put(cast(ubyte[])"abcdef");
|
|
sha512_256.start();
|
|
sha512_256.put(cast(ubyte[])"");
|
|
assert(sha512_256.finish() == cast(ubyte[])
|
|
hexString!"c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a");
|
|
|
|
digest = sha1Of ("");
|
|
digest224 = sha224Of ("");
|
|
digest256 = sha256Of ("");
|
|
digest384 = sha384Of ("");
|
|
digest512 = sha512Of ("");
|
|
digest512_224 = sha512_224Of("");
|
|
digest512_256 = sha512_256Of("");
|
|
assert(digest == cast(ubyte[]) hexString!"da39a3ee5e6b4b0d3255bfef95601890afd80709");
|
|
assert(digest224 == cast(ubyte[]) hexString!"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f");
|
|
assert(digest256 == cast(ubyte[]) hexString!"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855");
|
|
assert(digest384 == cast(ubyte[]) hexString!("38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c"
|
|
~"0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83"
|
|
~"f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a");
|
|
|
|
digest = sha1Of ("a");
|
|
digest224 = sha224Of ("a");
|
|
digest256 = sha256Of ("a");
|
|
digest384 = sha384Of ("a");
|
|
digest512 = sha512Of ("a");
|
|
digest512_224 = sha512_224Of("a");
|
|
digest512_256 = sha512_256Of("a");
|
|
assert(digest == cast(ubyte[]) hexString!"86f7e437faa5a7fce15d1ddcb9eaeaea377667b8");
|
|
assert(digest224 == cast(ubyte[]) hexString!"abd37534c7d9a2efb9465de931cd7055ffdb8879563ae98078d6d6d5");
|
|
assert(digest256 == cast(ubyte[]) hexString!"ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb");
|
|
assert(digest384 == cast(ubyte[]) hexString!("54a59b9f22b0b80880d8427e548b7c23abd873486e1f035dce9"
|
|
~"cd697e85175033caa88e6d57bc35efae0b5afd3145f31"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("1f40fc92da241694750979ee6cf582f2d5d7d28e18335de05ab"
|
|
~"c54d0560e0f5302860c652bf08d560252aa5e74210546f369fbbbce8c12cfc7957b2652fe9a75"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"d5cdb9ccc769a5121d4175f2bfdd13d6310e0d3d361ea75d82108327");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"455e518824bc0601f9fb858ff5c37d417d67c2f8e0df2babe4808858aea830f8");
|
|
|
|
digest = sha1Of ("abc");
|
|
digest224 = sha224Of ("abc");
|
|
digest256 = sha256Of ("abc");
|
|
digest384 = sha384Of ("abc");
|
|
digest512 = sha512Of ("abc");
|
|
digest512_224 = sha512_224Of("abc");
|
|
digest512_256 = sha512_256Of("abc");
|
|
assert(digest == cast(ubyte[]) hexString!"a9993e364706816aba3e25717850c26c9cd0d89d");
|
|
assert(digest224 == cast(ubyte[]) hexString!"23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7");
|
|
assert(digest256 == cast(ubyte[]) hexString!"ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad");
|
|
assert(digest384 == cast(ubyte[]) hexString!("cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a"
|
|
~"8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9"
|
|
~"eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"4634270f707b6a54daae7530460842e20e37ed265ceee9a43e8924aa");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"53048e2681941ef99b2e29b76b4c7dabe4c2d0c634fc6d46e0e2f13107e7af23");
|
|
|
|
digest = sha1Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest224 = sha224Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest256 = sha256Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest384 = sha384Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest512 = sha512Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest512_224 = sha512_224Of("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
digest512_256 = sha512_256Of("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
|
|
assert(digest == cast(ubyte[]) hexString!"84983e441c3bd26ebaae4aa1f95129e5e54670f1");
|
|
assert(digest224 == cast(ubyte[]) hexString!"75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525");
|
|
assert(digest256 == cast(ubyte[]) hexString!"248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1");
|
|
assert(digest384 == cast(ubyte[]) hexString!("3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe"
|
|
~"8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a827"
|
|
~"9be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"e5302d6d54bb242275d1e7622d68df6eb02dedd13f564c13dbda2174");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"bde8e1f9f19bb9fd3406c90ec6bc47bd36d8ada9f11880dbc8a22a7078b6a461");
|
|
|
|
digest = sha1Of ("message digest");
|
|
digest224 = sha224Of ("message digest");
|
|
digest256 = sha256Of ("message digest");
|
|
digest384 = sha384Of ("message digest");
|
|
digest512 = sha512Of ("message digest");
|
|
digest512_224 = sha512_224Of("message digest");
|
|
digest512_256 = sha512_256Of("message digest");
|
|
assert(digest == cast(ubyte[]) hexString!"c12252ceda8be8994d5fa0290a47231c1d16aae3");
|
|
assert(digest224 == cast(ubyte[]) hexString!"2cb21c83ae2f004de7e81c3c7019cbcb65b71ab656b22d6d0c39b8eb");
|
|
assert(digest256 == cast(ubyte[]) hexString!"f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650");
|
|
assert(digest384 == cast(ubyte[]) hexString!("473ed35167ec1f5d8e550368a3db39be54639f828868e9454c"
|
|
~"239fc8b52e3c61dbd0d8b4de1390c256dcbb5d5fd99cd5"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("107dbf389d9e9f71a3a95f6c055b9251bc5268c2be16d6c134"
|
|
~"92ea45b0199f3309e16455ab1e96118e8a905d5597b72038ddb372a89826046de66687bb420e7c"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"ad1a4db188fe57064f4f24609d2a83cd0afb9b398eb2fcaeaae2c564");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"0cf471fd17ed69d990daf3433c89b16d63dec1bb9cb42a6094604ee5d7b4e9fb");
|
|
|
|
digest = sha1Of ("abcdefghijklmnopqrstuvwxyz");
|
|
digest224 = sha224Of ("abcdefghijklmnopqrstuvwxyz");
|
|
digest256 = sha256Of ("abcdefghijklmnopqrstuvwxyz");
|
|
digest384 = sha384Of ("abcdefghijklmnopqrstuvwxyz");
|
|
digest512 = sha512Of ("abcdefghijklmnopqrstuvwxyz");
|
|
digest512_224 = sha512_224Of("abcdefghijklmnopqrstuvwxyz");
|
|
digest512_256 = sha512_256Of("abcdefghijklmnopqrstuvwxyz");
|
|
assert(digest == cast(ubyte[]) hexString!"32d10c7b8cf96570ca04ce37f2a19d84240d3a89");
|
|
assert(digest224 == cast(ubyte[]) hexString!"45a5f72c39c5cff2522eb3429799e49e5f44b356ef926bcf390dccc2");
|
|
assert(digest256 == cast(ubyte[]) hexString!"71c480df93d6ae2f1efad1447c66c9525e316218cf51fc8d9ed832f2daf18b73");
|
|
assert(digest384 == cast(ubyte[]) hexString!("feb67349df3db6f5924815d6c3dc133f091809213731fe5c7b5"
|
|
~"f4999e463479ff2877f5f2936fa63bb43784b12f3ebb4"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("4dbff86cc2ca1bae1e16468a05cb9881c97f1753bce3619034"
|
|
~"898faa1aabe429955a1bf8ec483d7421fe3c1646613a59ed5441fb0f321389f77f48a879c7b1f1"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"ff83148aa07ec30655c1b40aff86141c0215fe2a54f767d3f38743d8");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"fc3189443f9c268f626aea08a756abe7b726b05f701cb08222312ccfd6710a26");
|
|
|
|
digest = sha1Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest224 = sha224Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest256 = sha256Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest384 = sha384Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest512 = sha512Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest512_224 = sha512_224Of("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
digest512_256 = sha512_256Of("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789");
|
|
assert(digest == cast(ubyte[]) hexString!"761c457bf73b14d27e9e9265c46f4b4dda11f940");
|
|
assert(digest224 == cast(ubyte[]) hexString!"bff72b4fcb7d75e5632900ac5f90d219e05e97a7bde72e740db393d9");
|
|
assert(digest256 == cast(ubyte[]) hexString!"db4bfcbd4da0cd85a60c3c37d3fbd8805c77f15fc6b1fdfe614ee0a7c8fdb4c0");
|
|
assert(digest384 == cast(ubyte[]) hexString!("1761336e3f7cbfe51deb137f026f89e01a448e3b1fafa64039"
|
|
~"c1464ee8732f11a5341a6f41e0c202294736ed64db1a84"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("1e07be23c26a86ea37ea810c8ec7809352515a970e9253c26f"
|
|
~"536cfc7a9996c45c8370583e0a78fa4a90041d71a4ceab7423f19c71b9d5a3e01249f0bebd5894"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"a8b4b9174b99ffc67d6f49be9981587b96441051e16e6dd036b140d3");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"cdf1cc0effe26ecc0c13758f7b4a48e000615df241284185c39eb05d355bb9c8");
|
|
|
|
digest = sha1Of ("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest224 = sha224Of ("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest256 = sha256Of ("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest384 = sha384Of ("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest512 = sha512Of ("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest512_224 = sha512_224Of("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
digest512_256 = sha512_256Of("1234567890123456789012345678901234567890"~
|
|
"1234567890123456789012345678901234567890");
|
|
assert(digest == cast(ubyte[]) hexString!"50abf5706a150990a08b2c5ea40fa0e585554732");
|
|
assert(digest224 == cast(ubyte[]) hexString!"b50aecbe4e9bb0b57bc5f3ae760a8e01db24f203fb3cdcd13148046e");
|
|
assert(digest256 == cast(ubyte[]) hexString!"f371bc4a311f2b009eef952dd83ca80e2b60026c8e935592d0f9c308453c813e");
|
|
assert(digest384 == cast(ubyte[]) hexString!("b12932b0627d1c060942f5447764155655bd4da0c9afa6dd9b"
|
|
~"9ef53129af1b8fb0195996d2de9ca0df9d821ffee67026"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("72ec1ef1124a45b047e8b7c75a932195135bb61de24ec0d191"
|
|
~"4042246e0aec3a2354e093d76f3048b456764346900cb130d2a4fd5dd16abb5e30bcb850dee843"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"ae988faaa47e401a45f704d1272d99702458fea2ddc6582827556dd2");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"2c9fdbc0c90bdd87612ee8455474f9044850241dc105b1e8b94b8ddf5fac9148");
|
|
|
|
ubyte[] onemilliona = new ubyte[1000000];
|
|
onemilliona[] = 'a';
|
|
digest = sha1Of(onemilliona);
|
|
digest224 = sha224Of(onemilliona);
|
|
digest256 = sha256Of(onemilliona);
|
|
digest384 = sha384Of(onemilliona);
|
|
digest512 = sha512Of(onemilliona);
|
|
digest512_224 = sha512_224Of(onemilliona);
|
|
digest512_256 = sha512_256Of(onemilliona);
|
|
assert(digest == cast(ubyte[]) hexString!"34aa973cd4c4daa4f61eeb2bdbad27316534016f");
|
|
assert(digest224 == cast(ubyte[]) hexString!"20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67");
|
|
assert(digest256 == cast(ubyte[]) hexString!"cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0");
|
|
assert(digest384 == cast(ubyte[]) hexString!("9d0e1809716474cb086e834e310a4a1ced149e9c00f2485279"
|
|
~"72cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("e718483d0ce769644e2e42c7bc15b4638e1f98b13b20442856"
|
|
~"32a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"37ab331d76f0d36de422bd0edeb22a28accd487b7a8453ae965dd287");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"9a59a052930187a97038cae692f30708aa6491923ef5194394dc68d56c74fb21");
|
|
|
|
auto oneMillionRange = repeat!ubyte(cast(ubyte)'a', 1000000);
|
|
digest = sha1Of(oneMillionRange);
|
|
digest224 = sha224Of(oneMillionRange);
|
|
digest256 = sha256Of(oneMillionRange);
|
|
digest384 = sha384Of(oneMillionRange);
|
|
digest512 = sha512Of(oneMillionRange);
|
|
digest512_224 = sha512_224Of(oneMillionRange);
|
|
digest512_256 = sha512_256Of(oneMillionRange);
|
|
assert(digest == cast(ubyte[]) hexString!"34aa973cd4c4daa4f61eeb2bdbad27316534016f");
|
|
assert(digest224 == cast(ubyte[]) hexString!"20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67");
|
|
assert(digest256 == cast(ubyte[]) hexString!"cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0");
|
|
assert(digest384 == cast(ubyte[]) hexString!("9d0e1809716474cb086e834e310a4a1ced149e9c00f2485279"
|
|
~"72cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985"));
|
|
assert(digest512 == cast(ubyte[]) hexString!("e718483d0ce769644e2e42c7bc15b4638e1f98b13b20442856"
|
|
~"32a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b"));
|
|
assert(digest512_224 == cast(ubyte[]) hexString!"37ab331d76f0d36de422bd0edeb22a28accd487b7a8453ae965dd287");
|
|
assert(digest512_256 == cast(ubyte[]) hexString!"9a59a052930187a97038cae692f30708aa6491923ef5194394dc68d56c74fb21");
|
|
|
|
enum ubyte[20] input = cast(ubyte[20]) hexString!"a9993e364706816aba3e25717850c26c9cd0d89d";
|
|
assert(toHexString(input)
|
|
== "A9993E364706816ABA3E25717850C26C9CD0D89D");
|
|
}
|
|
|
|
/**
|
|
* These are convenience aliases for $(REF digest, std,digest) using the
|
|
* SHA implementation.
|
|
*/
|
|
//simple alias doesn't work here, hope this gets inlined...
|
|
auto sha1Of(T...)(T data)
|
|
{
|
|
return digest!(SHA1, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha224Of(T...)(T data)
|
|
{
|
|
return digest!(SHA224, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha256Of(T...)(T data)
|
|
{
|
|
return digest!(SHA256, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha384Of(T...)(T data)
|
|
{
|
|
return digest!(SHA384, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha512Of(T...)(T data)
|
|
{
|
|
return digest!(SHA512, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha512_224Of(T...)(T data)
|
|
{
|
|
return digest!(SHA512_224, T)(data);
|
|
}
|
|
///ditto
|
|
auto sha512_256Of(T...)(T data)
|
|
{
|
|
return digest!(SHA512_256, T)(data);
|
|
}
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
ubyte[20] hash = sha1Of("abc");
|
|
assert(hash == digest!SHA1("abc"));
|
|
|
|
ubyte[28] hash224 = sha224Of("abc");
|
|
assert(hash224 == digest!SHA224("abc"));
|
|
|
|
ubyte[32] hash256 = sha256Of("abc");
|
|
assert(hash256 == digest!SHA256("abc"));
|
|
|
|
ubyte[48] hash384 = sha384Of("abc");
|
|
assert(hash384 == digest!SHA384("abc"));
|
|
|
|
ubyte[64] hash512 = sha512Of("abc");
|
|
assert(hash512 == digest!SHA512("abc"));
|
|
|
|
ubyte[28] hash512_224 = sha512_224Of("abc");
|
|
assert(hash512_224 == digest!SHA512_224("abc"));
|
|
|
|
ubyte[32] hash512_256 = sha512_256Of("abc");
|
|
assert(hash512_256 == digest!SHA512_256("abc"));
|
|
}
|
|
|
|
@safe unittest
|
|
{
|
|
string a = "Mary has ", b = "a little lamb";
|
|
int[] c = [ 1, 2, 3, 4, 5 ];
|
|
auto d = toHexString(sha1Of(a, b, c));
|
|
version (LittleEndian)
|
|
assert(d[] == "CDBB611D00AC2387B642D3D7BDF4C3B342237110", d.dup);
|
|
else
|
|
assert(d[] == "A0F1196C7A379C09390476D9CA4AA11B71FD11C8", d.dup);
|
|
}
|
|
|
|
/**
|
|
* OOP API SHA1 and SHA2 implementations.
|
|
* See `std.digest` for differences between template and OOP API.
|
|
*
|
|
* This is an alias for $(D $(REF WrapperDigest, std,digest)!SHA1), see
|
|
* there for more information.
|
|
*/
|
|
alias SHA1Digest = WrapperDigest!SHA1;
|
|
alias SHA224Digest = WrapperDigest!SHA224; ///ditto
|
|
alias SHA256Digest = WrapperDigest!SHA256; ///ditto
|
|
alias SHA384Digest = WrapperDigest!SHA384; ///ditto
|
|
alias SHA512Digest = WrapperDigest!SHA512; ///ditto
|
|
alias SHA512_224Digest = WrapperDigest!SHA512_224; ///ditto
|
|
alias SHA512_256Digest = WrapperDigest!SHA512_256; ///ditto
|
|
|
|
///
|
|
@safe unittest
|
|
{
|
|
//Simple example, hashing a string using Digest.digest helper function
|
|
auto sha = new SHA1Digest();
|
|
ubyte[] hash = sha.digest("abc");
|
|
//Let's get a hash string
|
|
assert(toHexString(hash) == "A9993E364706816ABA3E25717850C26C9CD0D89D");
|
|
|
|
//The same, but using SHA-224
|
|
auto sha224 = new SHA224Digest();
|
|
ubyte[] hash224 = sha224.digest("abc");
|
|
//Let's get a hash string
|
|
assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7");
|
|
}
|
|
|
|
///
|
|
@system unittest
|
|
{
|
|
//Let's use the OOP features:
|
|
void test(Digest dig)
|
|
{
|
|
dig.put(cast(ubyte) 0);
|
|
}
|
|
auto sha = new SHA1Digest();
|
|
test(sha);
|
|
|
|
//Let's use a custom buffer:
|
|
ubyte[20] buf;
|
|
ubyte[] result = sha.finish(buf[]);
|
|
assert(toHexString(result) == "5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F");
|
|
}
|
|
|
|
@system unittest
|
|
{
|
|
import std.conv : hexString;
|
|
import std.exception;
|
|
auto sha = new SHA1Digest();
|
|
|
|
sha.put(cast(ubyte[])"abcdef");
|
|
sha.reset();
|
|
sha.put(cast(ubyte[])"");
|
|
assert(sha.finish() == cast(ubyte[]) hexString!"da39a3ee5e6b4b0d3255bfef95601890afd80709");
|
|
|
|
sha.put(cast(ubyte[])"abcdefghijklmnopqrstuvwxyz");
|
|
ubyte[22] result;
|
|
auto result2 = sha.finish(result[]);
|
|
assert(result[0 .. 20] == result2 && result2 == cast(ubyte[]) hexString!"32d10c7b8cf96570ca04ce37f2a19d84240d3a89");
|
|
|
|
debug
|
|
assertThrown!Error(sha.finish(result[0 .. 15]));
|
|
|
|
assert(sha.length == 20);
|
|
|
|
assert(sha.digest("") == cast(ubyte[]) hexString!"da39a3ee5e6b4b0d3255bfef95601890afd80709");
|
|
|
|
assert(sha.digest("a") == cast(ubyte[]) hexString!"86f7e437faa5a7fce15d1ddcb9eaeaea377667b8");
|
|
|
|
assert(sha.digest("abc") == cast(ubyte[]) hexString!"a9993e364706816aba3e25717850c26c9cd0d89d");
|
|
|
|
assert(sha.digest("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq")
|
|
== cast(ubyte[]) hexString!"84983e441c3bd26ebaae4aa1f95129e5e54670f1");
|
|
|
|
assert(sha.digest("message digest") == cast(ubyte[]) hexString!"c12252ceda8be8994d5fa0290a47231c1d16aae3");
|
|
|
|
assert(sha.digest("abcdefghijklmnopqrstuvwxyz")
|
|
== cast(ubyte[]) hexString!"32d10c7b8cf96570ca04ce37f2a19d84240d3a89");
|
|
|
|
assert(sha.digest("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789")
|
|
== cast(ubyte[]) hexString!"761c457bf73b14d27e9e9265c46f4b4dda11f940");
|
|
|
|
assert(sha.digest("1234567890123456789012345678901234567890",
|
|
"1234567890123456789012345678901234567890")
|
|
== cast(ubyte[]) hexString!"50abf5706a150990a08b2c5ea40fa0e585554732");
|
|
|
|
ubyte[] onemilliona = new ubyte[1000000];
|
|
onemilliona[] = 'a';
|
|
assert(sha.digest(onemilliona) == cast(ubyte[]) hexString!"34aa973cd4c4daa4f61eeb2bdbad27316534016f");
|
|
}
|