| // Written in the D programming language. |
| /** |
| * Computes SHA1 and SHA2 hashes of arbitrary data. SHA hashes are 20 to 64 byte |
| * quantities (depending on the SHA algorithm) that are like a checksum or CRC, |
| * but are more robust. |
| * |
| $(SCRIPT inhibitQuickIndex = 1;) |
| |
| $(DIVC quickindex, |
| $(BOOKTABLE , |
| $(TR $(TH Category) $(TH Functions) |
| ) |
| $(TR $(TDNW Template API) $(TD $(MYREF SHA1) |
| ) |
| ) |
| $(TR $(TDNW OOP API) $(TD $(MYREF SHA1Digest)) |
| ) |
| $(TR $(TDNW Helpers) $(TD $(MYREF sha1Of)) |
| ) |
| ) |
| ) |
| |
| * SHA2 comes in several different versions, all supported by this module: |
| * SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and SHA-512/256. |
| * |
| * This module conforms to the APIs defined in $(MREF std, digest). To understand the |
| * differences between the template and the OOP API, see $(MREF std, digest). |
| * |
| * This module publicly imports $(D std.digest) and can be used as a stand-alone |
| * module. |
| * |
| * License: $(HTTP www.boost.org/LICENSE_1_0.txt, Boost License 1.0). |
| * |
| * CTFE: |
| * Digests do not work in CTFE |
| * |
| * Authors: |
| * The routines and algorithms are derived from the |
| * $(I Secure Hash Signature Standard (SHS) (FIPS PUB 180-2)). $(BR ) |
| * Kai Nacke, Johannes Pfau, Nick Sabalausky |
| * |
| * References: |
| * $(UL |
| * $(LI $(LINK2 http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf, FIPS PUB180-2)) |
| * $(LI $(LINK2 http://software.intel.com/en-us/articles/improving-the-performance-of-the-secure-hash-algorithm-1/, Fast implementation of SHA1)) |
| * $(LI $(LINK2 http://en.wikipedia.org/wiki/Secure_Hash_Algorithm, Wikipedia article about SHA)) |
| * ) |
| * |
| * Source: $(PHOBOSSRC std/digest/_sha.d) |
| * |
| */ |
| |
| /* Copyright Kai Nacke 2012. |
| * Distributed under the Boost Software License, Version 1.0. |
| * (See accompanying file LICENSE_1_0.txt or copy at |
| * http://www.boost.org/LICENSE_1_0.txt) |
| */ |
| module std.digest.sha; |
| |
| /// |
| @safe unittest |
| { |
| //Template API |
| import std.digest.sha; |
| |
| ubyte[20] hash1 = sha1Of("abc"); |
| assert(toHexString(hash1) == "A9993E364706816ABA3E25717850C26C9CD0D89D"); |
| |
| ubyte[28] hash224 = sha224Of("abc"); |
| assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7"); |
| |
| //Feeding data |
| ubyte[1024] data; |
| SHA1 sha1; |
| sha1.start(); |
| sha1.put(data[]); |
| sha1.start(); //Start again |
| sha1.put(data[]); |
| hash1 = sha1.finish(); |
| } |
| |
| /// |
| @safe unittest |
| { |
| //OOP API |
| import std.digest.sha; |
| |
| auto sha1 = new SHA1Digest(); |
| ubyte[] hash1 = sha1.digest("abc"); |
| assert(toHexString(hash1) == "A9993E364706816ABA3E25717850C26C9CD0D89D"); |
| |
| auto sha224 = new SHA224Digest(); |
| ubyte[] hash224 = sha224.digest("abc"); |
| assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7"); |
| |
| //Feeding data |
| ubyte[1024] data; |
| sha1.put(data[]); |
| sha1.reset(); //Start again |
| sha1.put(data[]); |
| hash1 = sha1.finish(); |
| } |
| |
| version (Win64) |
| { |
| // wrong calling convention |
| } |
| else version (D_InlineAsm_X86) |
| { |
| version (D_PIC) {} // Bugzilla 9378 |
| else private version = USE_SSSE3; |
| } |
| else version (D_InlineAsm_X86_64) |
| { |
| private version = USE_SSSE3; |
| } |
| |
| version (LittleEndian) import core.bitop : bswap; |
| |
| |
| version (unittest) |
| { |
| import std.exception; |
| } |
| |
| |
| public import std.digest; |
| |
| /* |
| * Helper methods for encoding the buffer. |
| * Can be removed if the optimizer can inline the methods from std.bitmanip. |
| */ |
| private ubyte[8] nativeToBigEndian(ulong val) @trusted pure nothrow @nogc |
| { |
| version (LittleEndian) |
| immutable ulong res = (cast(ulong) bswap(cast(uint) val)) << 32 | bswap(cast(uint) (val >> 32)); |
| else |
| immutable ulong res = val; |
| return *cast(ubyte[8]*) &res; |
| } |
| |
| private ubyte[4] nativeToBigEndian(uint val) @trusted pure nothrow @nogc |
| { |
| version (LittleEndian) |
| immutable uint res = bswap(val); |
| else |
| immutable uint res = val; |
| return *cast(ubyte[4]*) &res; |
| } |
| |
| private ulong bigEndianToNative(ubyte[8] val) @trusted pure nothrow @nogc |
| { |
| version (LittleEndian) |
| { |
| import std.bitmanip : bigEndianToNative; |
| return bigEndianToNative!ulong(val); |
| } |
| else |
| return *cast(ulong*) &val; |
| } |
| |
| private uint bigEndianToNative(ubyte[4] val) @trusted pure nothrow @nogc |
| { |
| version (LittleEndian) |
| return bswap(*cast(uint*) &val); |
| else |
| return *cast(uint*) &val; |
| } |
| |
| //rotateLeft rotates x left n bits |
| private uint rotateLeft(uint x, uint n) @safe pure nothrow @nogc |
| { |
| // With recently added optimization to DMD (commit 32ea0206 at 07/28/11), this is translated to rol. |
| // No assembler required. |
| return (x << n) | (x >> (32-n)); |
| } |
| |
| //rotateRight rotates x right n bits |
| private uint rotateRight(uint x, uint n) @safe pure nothrow @nogc |
| { |
| return (x >> n) | (x << (32-n)); |
| } |
| private ulong rotateRight(ulong x, uint n) @safe pure nothrow @nogc |
| { |
| return (x >> n) | (x << (64-n)); |
| } |
| |
| /** |
| * Template API SHA1/SHA2 implementation. Supports: SHA-1, SHA-224, SHA-256, |
| * SHA-384, SHA-512, SHA-512/224 and SHA-512/256. |
| * |
| * The hashBlockSize and digestSize are in bits. However, it's likely easier to |
| * simply use the convenience aliases: SHA1, SHA224, SHA256, SHA384, SHA512, |
| * SHA512_224 and SHA512_256. |
| * |
| * See $(D std.digest) for differences between template and OOP API. |
| */ |
| struct SHA(uint hashBlockSize, uint digestSize) |
| { |
| enum blockSize = hashBlockSize; |
| |
| static assert(blockSize == 512 || blockSize == 1024, |
| "Invalid SHA blockSize, must be 512 or 1024"); |
| static assert(digestSize == 160 || digestSize == 224 || digestSize == 256 || digestSize == 384 || digestSize == 512, |
| "Invalid SHA digestSize, must be 224, 256, 384 or 512"); |
| static assert(!(blockSize == 512 && digestSize > 256), |
| "Invalid SHA digestSize for a blockSize of 512. The digestSize must be 160, 224 or 256."); |
| static assert(!(blockSize == 1024 && digestSize < 224), |
| "Invalid SHA digestSize for a blockSize of 1024. The digestSize must be 224, 256, 384 or 512."); |
| |
| static if (digestSize == 160) /* SHA-1 */ |
| { |
| version (USE_SSSE3) |
| { |
| import core.cpuid : ssse3; |
| import std.internal.digest.sha_SSSE3 : sse3_constants=constants, transformSSSE3; |
| |
| static void transform(uint[5]* state, const(ubyte[64])* block) pure nothrow @nogc |
| { |
| if (ssse3) |
| { |
| version (D_InlineAsm_X86_64) |
| // constants as extra argument for PIC, see Bugzilla 9378 |
| transformSSSE3(state, block, &sse3_constants); |
| else |
| transformSSSE3(state, block); |
| } |
| else |
| transformX86(state, block); |
| } |
| } |
| else |
| { |
| alias transform = transformX86; |
| } |
| } |
| else static if (blockSize == 512) /* SHA-224, SHA-256 */ |
| alias transform = transformSHA2!uint; |
| else static if (blockSize == 1024) /* SHA-384, SHA-512, SHA-512/224, SHA-512/256 */ |
| alias transform = transformSHA2!ulong; |
| else |
| static assert(0); |
| |
| private: |
| /* magic initialization constants - state (ABCDEFGH) */ |
| static if (blockSize == 512 && digestSize == 160) /* SHA-1 */ |
| { |
| uint[5] state = |
| [0x67452301,0xefcdab89,0x98badcfe,0x10325476,0xc3d2e1f0]; |
| } |
| else static if (blockSize == 512 && digestSize == 224) /* SHA-224 */ |
| { |
| uint[8] state = [ |
| 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, |
| 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4, |
| ]; |
| } |
| else static if (blockSize == 512 && digestSize == 256) /* SHA-256 */ |
| { |
| uint[8] state = [ |
| 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, |
| 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19, |
| ]; |
| } |
| else static if (blockSize == 1024 && digestSize == 224) /* SHA-512/224 */ |
| { |
| ulong[8] state = [ |
| 0x8C3D37C8_19544DA2, 0x73E19966_89DCD4D6, |
| 0x1DFAB7AE_32FF9C82, 0x679DD514_582F9FCF, |
| 0x0F6D2B69_7BD44DA8, 0x77E36F73_04C48942, |
| 0x3F9D85A8_6A1D36C8, 0x1112E6AD_91D692A1, |
| ]; |
| } |
| else static if (blockSize == 1024 && digestSize == 256) /* SHA-512/256 */ |
| { |
| ulong[8] state = [ |
| 0x22312194_FC2BF72C, 0x9F555FA3_C84C64C2, |
| 0x2393B86B_6F53B151, 0x96387719_5940EABD, |
| 0x96283EE2_A88EFFE3, 0xBE5E1E25_53863992, |
| 0x2B0199FC_2C85B8AA, 0x0EB72DDC_81C52CA2, |
| ]; |
| } |
| else static if (blockSize == 1024 && digestSize == 384) /* SHA-384 */ |
| { |
| ulong[8] state = [ |
| 0xcbbb9d5d_c1059ed8, 0x629a292a_367cd507, |
| 0x9159015a_3070dd17, 0x152fecd8_f70e5939, |
| 0x67332667_ffc00b31, 0x8eb44a87_68581511, |
| 0xdb0c2e0d_64f98fa7, 0x47b5481d_befa4fa4, |
| ]; |
| } |
| else static if (blockSize == 1024 && digestSize == 512) /* SHA-512 */ |
| { |
| ulong[8] state = [ |
| 0x6a09e667_f3bcc908, 0xbb67ae85_84caa73b, |
| 0x3c6ef372_fe94f82b, 0xa54ff53a_5f1d36f1, |
| 0x510e527f_ade682d1, 0x9b05688c_2b3e6c1f, |
| 0x1f83d9ab_fb41bd6b, 0x5be0cd19_137e2179, |
| ]; |
| } |
| else |
| static assert(0); |
| |
| /* constants */ |
| static if (blockSize == 512) |
| { |
| static immutable uint[64] constants = [ |
| 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, |
| 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, |
| 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, |
| 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, |
| 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, |
| 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, |
| 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, |
| 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2, |
| ]; |
| } |
| else static if (blockSize == 1024) |
| { |
| static immutable ulong[80] constants = [ |
| 0x428a2f98_d728ae22, 0x71374491_23ef65cd, 0xb5c0fbcf_ec4d3b2f, 0xe9b5dba5_8189dbbc, |
| 0x3956c25b_f348b538, 0x59f111f1_b605d019, 0x923f82a4_af194f9b, 0xab1c5ed5_da6d8118, |
| 0xd807aa98_a3030242, 0x12835b01_45706fbe, 0x243185be_4ee4b28c, 0x550c7dc3_d5ffb4e2, |
| 0x72be5d74_f27b896f, 0x80deb1fe_3b1696b1, 0x9bdc06a7_25c71235, 0xc19bf174_cf692694, |
| 0xe49b69c1_9ef14ad2, 0xefbe4786_384f25e3, 0x0fc19dc6_8b8cd5b5, 0x240ca1cc_77ac9c65, |
| 0x2de92c6f_592b0275, 0x4a7484aa_6ea6e483, 0x5cb0a9dc_bd41fbd4, 0x76f988da_831153b5, |
| 0x983e5152_ee66dfab, 0xa831c66d_2db43210, 0xb00327c8_98fb213f, 0xbf597fc7_beef0ee4, |
| 0xc6e00bf3_3da88fc2, 0xd5a79147_930aa725, 0x06ca6351_e003826f, 0x14292967_0a0e6e70, |
| 0x27b70a85_46d22ffc, 0x2e1b2138_5c26c926, 0x4d2c6dfc_5ac42aed, 0x53380d13_9d95b3df, |
| 0x650a7354_8baf63de, 0x766a0abb_3c77b2a8, 0x81c2c92e_47edaee6, 0x92722c85_1482353b, |
| 0xa2bfe8a1_4cf10364, 0xa81a664b_bc423001, 0xc24b8b70_d0f89791, 0xc76c51a3_0654be30, |
| 0xd192e819_d6ef5218, 0xd6990624_5565a910, 0xf40e3585_5771202a, 0x106aa070_32bbd1b8, |
| 0x19a4c116_b8d2d0c8, 0x1e376c08_5141ab53, 0x2748774c_df8eeb99, 0x34b0bcb5_e19b48a8, |
| 0x391c0cb3_c5c95a63, 0x4ed8aa4a_e3418acb, 0x5b9cca4f_7763e373, 0x682e6ff3_d6b2b8a3, |
| 0x748f82ee_5defb2fc, 0x78a5636f_43172f60, 0x84c87814_a1f0ab72, 0x8cc70208_1a6439ec, |
| 0x90befffa_23631e28, 0xa4506ceb_de82bde9, 0xbef9a3f7_b2c67915, 0xc67178f2_e372532b, |
| 0xca273ece_ea26619c, 0xd186b8c7_21c0c207, 0xeada7dd6_cde0eb1e, 0xf57d4f7f_ee6ed178, |
| 0x06f067aa_72176fba, 0x0a637dc5_a2c898a6, 0x113f9804_bef90dae, 0x1b710b35_131c471b, |
| 0x28db77f5_23047d84, 0x32caab7b_40c72493, 0x3c9ebe0a_15c9bebc, 0x431d67c4_9c100d4c, |
| 0x4cc5d4be_cb3e42b6, 0x597f299c_fc657e2a, 0x5fcb6fab_3ad6faec, 0x6c44198c_4a475817, |
| ]; |
| } |
| else |
| static assert(0); |
| |
| /* |
| * number of bits, modulo 2^64 (ulong[1]) or 2^128 (ulong[2]), |
| * should just use ucent instead of ulong[2] once it's available |
| */ |
| ulong[blockSize/512] count; |
| ubyte[blockSize/8] buffer; /* input buffer */ |
| |
| static immutable ubyte[128] padding = |
| [ |
| 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| |
| 0x00, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
| 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 |
| ]; |
| |
| /* |
| * Basic SHA1/SHA2 functions. |
| */ |
| static @safe pure nothrow @nogc |
| { |
| /* All SHA1/SHA2 */ |
| T Ch(T)(T x, T y, T z) { return z ^ (x & (y ^ z)); } |
| T Maj(T)(T x, T y, T z) { return (x & y) | (z & (x ^ y)); } |
| |
| /* SHA-1 */ |
| uint Parity(uint x, uint y, uint z) { return x ^ y ^ z; } |
| |
| /* SHA-224, SHA-256 */ |
| uint BigSigma0(uint x) { return rotateRight(x, 2) ^ rotateRight(x, 13) ^ rotateRight(x, 22); } |
| uint BigSigma1(uint x) { return rotateRight(x, 6) ^ rotateRight(x, 11) ^ rotateRight(x, 25); } |
| uint SmSigma0(uint x) { return rotateRight(x, 7) ^ rotateRight(x, 18) ^ x >> 3; } |
| uint SmSigma1(uint x) { return rotateRight(x, 17) ^ rotateRight(x, 19) ^ x >> 10; } |
| |
| /* SHA-384, SHA-512, SHA-512/224, SHA-512/256 */ |
| ulong BigSigma0(ulong x) { return rotateRight(x, 28) ^ rotateRight(x, 34) ^ rotateRight(x, 39); } |
| ulong BigSigma1(ulong x) { return rotateRight(x, 14) ^ rotateRight(x, 18) ^ rotateRight(x, 41); } |
| ulong SmSigma0(ulong x) { return rotateRight(x, 1) ^ rotateRight(x, 8) ^ x >> 7; } |
| ulong SmSigma1(ulong x) { return rotateRight(x, 19) ^ rotateRight(x, 61) ^ x >> 6; } |
| } |
| |
| /* |
| * SHA1 basic transformation. Transforms state based on block. |
| */ |
| static void T_0_15(int i, const(ubyte[64])* input, ref uint[16] W, uint A, ref uint B, uint C, uint D, |
| uint E, ref uint T) pure nothrow @nogc |
| { |
| uint Wi = W[i] = bigEndianToNative(*cast(ubyte[4]*)&((*input)[i*4])); |
| T = Ch(B, C, D) + E + rotateLeft(A, 5) + Wi + 0x5a827999; |
| B = rotateLeft(B, 30); |
| } |
| |
| static void T_16_19(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E, ref uint T) |
| pure nothrow @nogc |
| { |
| W[i&15] = rotateLeft(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1); |
| T = Ch(B, C, D) + E + rotateLeft(A, 5) + W[i&15] + 0x5a827999; |
| B = rotateLeft(B, 30); |
| } |
| |
| static void T_20_39(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E, |
| ref uint T) pure nothrow @nogc |
| { |
| W[i&15] = rotateLeft(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1); |
| T = Parity(B, C, D) + E + rotateLeft(A, 5) + W[i&15] + 0x6ed9eba1; |
| B = rotateLeft(B, 30); |
| } |
| |
| static void T_40_59(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E, |
| ref uint T) pure nothrow @nogc |
| { |
| W[i&15] = rotateLeft(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1); |
| T = Maj(B, C, D) + E + rotateLeft(A, 5) + W[i&15] + 0x8f1bbcdc; |
| B = rotateLeft(B, 30); |
| } |
| |
| static void T_60_79(int i, ref uint[16] W, uint A, ref uint B, uint C, uint D, uint E, |
| ref uint T) pure nothrow @nogc |
| { |
| W[i&15] = rotateLeft(W[(i-3)&15] ^ W[(i-8)&15] ^ W[(i-14)&15] ^ W[(i-16)&15], 1); |
| T = Parity(B, C, D) + E + rotateLeft(A, 5) + W[i&15] + 0xca62c1d6; |
| B = rotateLeft(B, 30); |
| } |
| |
| private static void transformX86(uint[5]* state, const(ubyte[64])* block) pure nothrow @nogc |
| { |
| uint A, B, C, D, E, T; |
| uint[16] W = void; |
| |
| A = (*state)[0]; |
| B = (*state)[1]; |
| C = (*state)[2]; |
| D = (*state)[3]; |
| E = (*state)[4]; |
| |
| T_0_15 ( 0, block, W, A, B, C, D, E, T); |
| T_0_15 ( 1, block, W, T, A, B, C, D, E); |
| T_0_15 ( 2, block, W, E, T, A, B, C, D); |
| T_0_15 ( 3, block, W, D, E, T, A, B, C); |
| T_0_15 ( 4, block, W, C, D, E, T, A, B); |
| T_0_15 ( 5, block, W, B, C, D, E, T, A); |
| T_0_15 ( 6, block, W, A, B, C, D, E, T); |
| T_0_15 ( 7, block, W, T, A, B, C, D, E); |
| T_0_15 ( 8, block, W, E, T, A, B, C, D); |
| T_0_15 ( 9, block, W, D, E, T, A, B, C); |
| T_0_15 (10, block, W, C, D, E, T, A, B); |
| T_0_15 (11, block, W, B, C, D, E, T, A); |
| T_0_15 (12, block, W, A, B, C, D, E, T); |
| T_0_15 (13, block, W, T, A, B, C, D, E); |
| T_0_15 (14, block, W, E, T, A, B, C, D); |
| T_0_15 (15, block, W, D, E, T, A, B, C); |
| T_16_19(16, W, C, D, E, T, A, B); |
| T_16_19(17, W, B, C, D, E, T, A); |
| T_16_19(18, W, A, B, C, D, E, T); |
| T_16_19(19, W, T, A, B, C, D, E); |
| T_20_39(20, W, E, T, A, B, C, D); |
| T_20_39(21, W, D, E, T, A, B, C); |
| T_20_39(22, W, C, D, E, T, A, B); |
| T_20_39(23, W, B, C, D, E, T, A); |
| T_20_39(24, W, A, B, C, D, E, T); |
| T_20_39(25, W, T, A, B, C, D, E); |
| T_20_39(26, W, E, T, A, B, C, D); |
| T_20_39(27, W, D, E, T, A, B, C); |
| T_20_39(28, W, C, D, E, T, A, B); |
| T_20_39(29, W, B, C, D, E, T, A); |
| T_20_39(30, W, A, B, C, D, E, T); |
| T_20_39(31, W, T, A, B, C, D, E); |
| T_20_39(32, W, E, T, A, B, C, D); |
| T_20_39(33, W, D, E, T, A, B, C); |
| T_20_39(34, W, C, D, E, T, A, B); |
| T_20_39(35, W, B, C, D, E, T, A); |
| T_20_39(36, W, A, B, C, D, E, T); |
| T_20_39(37, W, T, A, B, C, D, E); |
| T_20_39(38, W, E, T, A, B, C, D); |
| T_20_39(39, W, D, E, T, A, B, C); |
| T_40_59(40, W, C, D, E, T, A, B); |
| T_40_59(41, W, B, C, D, E, T, A); |
| T_40_59(42, W, A, B, C, D, E, T); |
| T_40_59(43, W, T, A, B, C, D, E); |
| T_40_59(44, W, E, T, A, B, C, D); |
| T_40_59(45, W, D, E, T, A, B, C); |
| T_40_59(46, W, C, D, E, T, A, B); |
| T_40_59(47, W, B, C, D, E, T, A); |
| T_40_59(48, W, A, B, C, D, E, T); |
| T_40_59(49, W, T, A, B, C, D, E); |
| T_40_59(50, W, E, T, A, B, C, D); |
| T_40_59(51, W, D, E, T, A, B, C); |
| T_40_59(52, W, C, D, E, T, A, B); |
| T_40_59(53, W, B, C, D, E, T, A); |
| T_40_59(54, W, A, B, C, D, E, T); |
| T_40_59(55, W, T, A, B, C, D, E); |
| T_40_59(56, W, E, T, A, B, C, D); |
| T_40_59(57, W, D, E, T, A, B, C); |
| T_40_59(58, W, C, D, E, T, A, B); |
| T_40_59(59, W, B, C, D, E, T, A); |
| T_60_79(60, W, A, B, C, D, E, T); |
| T_60_79(61, W, T, A, B, C, D, E); |
| T_60_79(62, W, E, T, A, B, C, D); |
| T_60_79(63, W, D, E, T, A, B, C); |
| T_60_79(64, W, C, D, E, T, A, B); |
| T_60_79(65, W, B, C, D, E, T, A); |
| T_60_79(66, W, A, B, C, D, E, T); |
| T_60_79(67, W, T, A, B, C, D, E); |
| T_60_79(68, W, E, T, A, B, C, D); |
| T_60_79(69, W, D, E, T, A, B, C); |
| T_60_79(70, W, C, D, E, T, A, B); |
| T_60_79(71, W, B, C, D, E, T, A); |
| T_60_79(72, W, A, B, C, D, E, T); |
| T_60_79(73, W, T, A, B, C, D, E); |
| T_60_79(74, W, E, T, A, B, C, D); |
| T_60_79(75, W, D, E, T, A, B, C); |
| T_60_79(76, W, C, D, E, T, A, B); |
| T_60_79(77, W, B, C, D, E, T, A); |
| T_60_79(78, W, A, B, C, D, E, T); |
| T_60_79(79, W, T, A, B, C, D, E); |
| |
| (*state)[0] += E; |
| (*state)[1] += T; |
| (*state)[2] += A; |
| (*state)[3] += B; |
| (*state)[4] += C; |
| |
| /* Zeroize sensitive information. */ |
| W[] = 0; |
| } |
| |
| /* |
| * SHA2 basic transformation. Transforms state based on block. |
| */ |
| static void T_SHA2_0_15(Word)(int i, const(ubyte[blockSize/8])* input, ref Word[16] W, |
| Word A, Word B, Word C, ref Word D, Word E, Word F, Word G, ref Word H, Word K) |
| pure nothrow @nogc |
| { |
| Word Wi = W[i] = bigEndianToNative(*cast(ubyte[Word.sizeof]*)&((*input)[i*Word.sizeof])); |
| Word T1 = H + BigSigma1(E) + Ch(E, F, G) + K + Wi; |
| Word T2 = BigSigma0(A) + Maj(A, B, C); |
| D += T1; |
| H = T1 + T2; |
| } |
| |
| static void T_SHA2_16_79(Word)(int i, ref Word[16] W, |
| Word A, Word B, Word C, ref Word D, Word E, Word F, Word G, ref Word H, Word K) |
| pure nothrow @nogc |
| { |
| W[i&15] = SmSigma1(W[(i-2)&15]) + W[(i-7)&15] + SmSigma0(W[(i-15)&15]) + W[i&15]; |
| Word T1 = H + BigSigma1(E) + Ch(E, F, G) + K + W[i&15]; |
| Word T2 = BigSigma0(A) + Maj(A, B, C); |
| D += T1; |
| H = T1 + T2; |
| } |
| |
| private static void transformSHA2(Word)(Word[8]* state, const(ubyte[blockSize/8])* block) |
| pure nothrow @nogc |
| { |
| Word A, B, C, D, E, F, G, H; |
| Word[16] W = void; |
| |
| A = (*state)[0]; |
| B = (*state)[1]; |
| C = (*state)[2]; |
| D = (*state)[3]; |
| E = (*state)[4]; |
| F = (*state)[5]; |
| G = (*state)[6]; |
| H = (*state)[7]; |
| |
| T_SHA2_0_15!Word ( 0, block, W, A, B, C, D, E, F, G, H, constants[ 0]); |
| T_SHA2_0_15!Word ( 1, block, W, H, A, B, C, D, E, F, G, constants[ 1]); |
| T_SHA2_0_15!Word ( 2, block, W, G, H, A, B, C, D, E, F, constants[ 2]); |
| T_SHA2_0_15!Word ( 3, block, W, F, G, H, A, B, C, D, E, constants[ 3]); |
| T_SHA2_0_15!Word ( 4, block, W, E, F, G, H, A, B, C, D, constants[ 4]); |
| T_SHA2_0_15!Word ( 5, block, W, D, E, F, G, H, A, B, C, constants[ 5]); |
| T_SHA2_0_15!Word ( 6, block, W, C, D, E, F, G, H, A, B, constants[ 6]); |
| T_SHA2_0_15!Word ( 7, block, W, B, C, D, E, F, G, H, A, constants[ 7]); |
| T_SHA2_0_15!Word ( 8, block, W, A, B, C, D, E, F, G, H, constants[ 8]); |
| T_SHA2_0_15!Word ( 9, block, W, H, A, B, C, D, E, F, G, constants[ 9]); |
| T_SHA2_0_15!Word (10, block, W, G, H, A, B, C, D, E, F, constants[10]); |
| T_SHA2_0_15!Word (11, block, W, F, G, H, A, B, C, D, E, constants[11]); |
| T_SHA2_0_15!Word (12, block, W, E, F, G, H, A, B, C, D, constants[12]); |
| T_SHA2_0_15!Word (13, block, W, D, E, F, G, H, A, B, C, constants[13]); |
| T_SHA2_0_15!Word (14, block, W, C, D, E, F, G, H, A, B, constants[14]); |
| T_SHA2_0_15!Word (15, block, W, B, C, D, E, F, G, H, A, constants[15]); |
| T_SHA2_16_79!Word(16, W, A, B, C, D, E, F, G, H, constants[16]); |
| T_SHA2_16_79!Word(17, W, H, A, B, C, D, E, F, G, constants[17]); |
| T_SHA2_16_79!Word(18, W, G, H, A, B, C, D, E, F, constants[18]); |
| T_SHA2_16_79!Word(19, W, F, G, H, A, B, C, D, E, constants[19]); |
| T_SHA2_16_79!Word(20, W, E, F, G, H, A, B, C, D, constants[20]); |
| T_SHA2_16_79!Word(21, W, D, E, F, G, H, A, B, C, constants[21]); |
| T_SHA2_16_79!Word(22, W, C, D, E, F, G, H, A, B, constants[22]); |
| T_SHA2_16_79!Word(23, W, B, C, D, E, F, G, H, A, constants[23]); |
| T_SHA2_16_79!Word(24, W, A, B, C, D, E, F, G, H, constants[24]); |
| T_SHA2_16_79!Word(25, W, H, A, B, C, D, E, F, G, constants[25]); |
| T_SHA2_16_79!Word(26, W, G, H, A, B, C, D, E, F, constants[26]); |
| T_SHA2_16_79!Word(27, W, F, G, H, A, B, C, D, E, constants[27]); |
| T_SHA2_16_79!Word(28, W, E, F, G, H, A, B, C, D, constants[28]); |
| T_SHA2_16_79!Word(29, W, D, E, F, G, H, A, B, C, constants[29]); |
| T_SHA2_16_79!Word(30, W, C, D, E, F, G, H, A, B, constants[30]); |
| T_SHA2_16_79!Word(31, W, B, C, D, E, F, G, H, A, constants[31]); |
| T_SHA2_16_79!Word(32, W, A, B, C, D, E, F, G, H, constants[32]); |
| T_SHA2_16_79!Word(33, W, H, A, B, C, D, E, F, G, constants[33]); |
| T_SHA2_16_79!Word(34, W, G, H, A, B, C, D, E, F, constants[34]); |
| T_SHA2_16_79!Word(35, W, F, G, H, A, B, C, D, E, constants[35]); |
| T_SHA2_16_79!Word(36, W, E, F, G, H, A, B, C, D, constants[36]); |
| T_SHA2_16_79!Word(37, W, D, E, F, G, H, A, B, C, constants[37]); |
| T_SHA2_16_79!Word(38, W, C, D, E, F, G, H, A, B, constants[38]); |
| T_SHA2_16_79!Word(39, W, B, C, D, E, F, G, H, A, constants[39]); |
| T_SHA2_16_79!Word(40, W, A, B, C, D, E, F, G, H, constants[40]); |
| T_SHA2_16_79!Word(41, W, H, A, B, C, D, E, F, G, constants[41]); |
| T_SHA2_16_79!Word(42, W, G, H, A, B, C, D, E, F, constants[42]); |
| T_SHA2_16_79!Word(43, W, F, G, H, A, B, C, D, E, constants[43]); |
| T_SHA2_16_79!Word(44, W, E, F, G, H, A, B, C, D, constants[44]); |
| T_SHA2_16_79!Word(45, W, D, E, F, G, H, A, B, C, constants[45]); |
| T_SHA2_16_79!Word(46, W, C, D, E, F, G, H, A, B, constants[46]); |
| T_SHA2_16_79!Word(47, W, B, C, D, E, F, G, H, A, constants[47]); |
| T_SHA2_16_79!Word(48, W, A, B, C, D, E, F, G, H, constants[48]); |
| T_SHA2_16_79!Word(49, W, H, A, B, C, D, E, F, G, constants[49]); |
| T_SHA2_16_79!Word(50, W, G, H, A, B, C, D, E, F, constants[50]); |
| T_SHA2_16_79!Word(51, W, F, G, H, A, B, C, D, E, constants[51]); |
| T_SHA2_16_79!Word(52, W, E, F, G, H, A, B, C, D, constants[52]); |
| T_SHA2_16_79!Word(53, W, D, E, F, G, H, A, B, C, constants[53]); |
| T_SHA2_16_79!Word(54, W, C, D, E, F, G, H, A, B, constants[54]); |
| T_SHA2_16_79!Word(55, W, B, C, D, E, F, G, H, A, constants[55]); |
| T_SHA2_16_79!Word(56, W, A, B, C, D, E, F, G, H, constants[56]); |
| T_SHA2_16_79!Word(57, W, H, A, B, C, D, E, F, G, constants[57]); |
| T_SHA2_16_79!Word(58, W, G, H, A, B, C, D, E, F, constants[58]); |
| T_SHA2_16_79!Word(59, W, F, G, H, A, B, C, D, E, constants[59]); |
| T_SHA2_16_79!Word(60, W, E, F, G, H, A, B, C, D, constants[60]); |
| T_SHA2_16_79!Word(61, W, D, E, F, G, H, A, B, C, constants[61]); |
| T_SHA2_16_79!Word(62, W, C, D, E, F, G, H, A, B, constants[62]); |
| T_SHA2_16_79!Word(63, W, B, C, D, E, F, G, H, A, constants[63]); |
| |
| static if (is(Word == ulong)) |
| { |
| T_SHA2_16_79!Word(64, W, A, B, C, D, E, F, G, H, constants[64]); |
| T_SHA2_16_79!Word(65, W, H, A, B, C, D, E, F, G, constants[65]); |
| T_SHA2_16_79!Word(66, W, G, H, A, B, C, D, E, F, constants[66]); |
| T_SHA2_16_79!Word(67, W, F, G, H, A, B, C, D, E, constants[67]); |
| T_SHA2_16_79!Word(68, W, E, F, G, H, A, B, C, D, constants[68]); |
| T_SHA2_16_79!Word(69, W, D, E, F, G, H, A, B, C, constants[69]); |
| T_SHA2_16_79!Word(70, W, C, D, E, F, G, H, A, B, constants[70]); |
| T_SHA2_16_79!Word(71, W, B, C, D, E, F, G, H, A, constants[71]); |
| T_SHA2_16_79!Word(72, W, A, B, C, D, E, F, G, H, constants[72]); |
| T_SHA2_16_79!Word(73, W, H, A, B, C, D, E, F, G, constants[73]); |
| T_SHA2_16_79!Word(74, W, G, H, A, B, C, D, E, F, constants[74]); |
| T_SHA2_16_79!Word(75, W, F, G, H, A, B, C, D, E, constants[75]); |
| T_SHA2_16_79!Word(76, W, E, F, G, H, A, B, C, D, constants[76]); |
| T_SHA2_16_79!Word(77, W, D, E, F, G, H, A, B, C, constants[77]); |
| T_SHA2_16_79!Word(78, W, C, D, E, F, G, H, A, B, constants[78]); |
| T_SHA2_16_79!Word(79, W, B, C, D, E, F, G, H, A, constants[79]); |
| } |
| |
| (*state)[0] += A; |
| (*state)[1] += B; |
| (*state)[2] += C; |
| (*state)[3] += D; |
| (*state)[4] += E; |
| (*state)[5] += F; |
| (*state)[6] += G; |
| (*state)[7] += H; |
| |
| /* Zeroize sensitive information. */ |
| W[] = 0; |
| } |
| |
| public: |
| /** |
| * SHA initialization. Begins an SHA1/SHA2 operation. |
| * |
| * Note: |
| * For this SHA Digest implementation calling start after default construction |
| * is not necessary. Calling start is only necessary to reset the Digest. |
| * |
| * Generic code which deals with different Digest types should always call start though. |
| * |
| * Example: |
| * -------- |
| * SHA1 digest; |
| * //digest.start(); //Not necessary |
| * digest.put(0); |
| * -------- |
| */ |
| void start() @safe pure nothrow @nogc |
| { |
| this = typeof(this).init; |
| } |
| |
| /** |
| * Use this to feed the digest with data. |
| * Also implements the $(REF isOutputRange, std,range,primitives) |
| * interface for $(D ubyte) and $(D const(ubyte)[]). |
| */ |
| void put(scope const(ubyte)[] input...) @trusted pure nothrow @nogc |
| { |
| enum blockSizeInBytes = blockSize/8; |
| uint i, index, partLen; |
| auto inputLen = input.length; |
| |
| /* Compute number of bytes mod block size (64 or 128 bytes) */ |
| index = (cast(uint) count[0] >> 3) & (blockSizeInBytes - 1); |
| |
| /* Update number of bits */ |
| static if (blockSize == 512) |
| count[0] += inputLen * 8; |
| else static if (blockSize == 1024) |
| { |
| /* ugly hack to work around lack of ucent */ |
| auto oldCount0 = count[0]; |
| count[0] += inputLen * 8; |
| if (count[0] < oldCount0) |
| count[1]++; |
| } |
| else |
| static assert(0); |
| |
| partLen = blockSizeInBytes - index; |
| |
| /* Transform as many times as possible. */ |
| if (inputLen >= partLen) |
| { |
| (&buffer[index])[0 .. partLen] = input.ptr[0 .. partLen]; |
| transform (&state, &buffer); |
| |
| for (i = partLen; i + blockSizeInBytes-1 < inputLen; i += blockSizeInBytes) |
| transform(&state, cast(ubyte[blockSizeInBytes]*)(input.ptr + i)); |
| |
| index = 0; |
| } |
| else |
| i = 0; |
| |
| /* Buffer remaining input */ |
| if (inputLen - i) |
| (&buffer[index])[0 .. inputLen-i] = (&input[i])[0 .. inputLen-i]; |
| } |
| |
| @safe unittest |
| { |
| typeof(this) dig; |
| dig.put(cast(ubyte) 0); //single ubyte |
| dig.put(cast(ubyte) 0, cast(ubyte) 0); //variadic |
| ubyte[10] buf; |
| dig.put(buf); //buffer |
| } |
| |
| |
| /** |
| * Returns the finished SHA hash. This also calls $(LREF start) to |
| * reset the internal state. |
| */ |
| ubyte[digestSize/8] finish() @trusted pure nothrow @nogc |
| { |
| static if (blockSize == 512) |
| { |
| ubyte[32] data = void; |
| uint index, padLen; |
| |
| /* Save number of bits */ |
| ubyte[8] bits = nativeToBigEndian(count[0]); |
| |
| /* Pad out to 56 mod 64. */ |
| index = (cast(uint) count[0] >> 3) & (64 - 1); |
| padLen = (index < 56) ? (56 - index) : (120 - index); |
| put(padding[0 .. padLen]); |
| |
| /* Append length (before padding) */ |
| put(bits); |
| |
| /* Store state in digest */ |
| for (auto i = 0; i < ((digestSize == 160)? 5 : 8); i++) |
| data[i*4..(i+1)*4] = nativeToBigEndian(state[i])[]; |
| |
| /* Zeroize sensitive information. */ |
| start(); |
| return data[0 .. digestSize/8]; |
| } |
| else static if (blockSize == 1024) |
| { |
| ubyte[64] data = void; |
| uint index, padLen; |
| |
| /* Save number of bits */ |
| ubyte[16] bits; |
| bits[ 0 .. 8] = nativeToBigEndian(count[1]); |
| bits[8 .. 16] = nativeToBigEndian(count[0]); |
| |
| /* Pad out to 112 mod 128. */ |
| index = (cast(uint) count[0] >> 3) & (128 - 1); |
| padLen = (index < 112) ? (112 - index) : (240 - index); |
| put(padding[0 .. padLen]); |
| |
| /* Append length (before padding) */ |
| put(bits); |
| |
| /* Store state in digest */ |
| for (auto i = 0; i < 8; i++) |
| data[i*8..(i+1)*8] = nativeToBigEndian(state[i])[]; |
| |
| /* Zeroize sensitive information. */ |
| start(); |
| return data[0 .. digestSize/8]; |
| } |
| else |
| static assert(0); |
| } |
| /// |
| @safe unittest |
| { |
| //Simple example |
| SHA1 hash; |
| hash.start(); |
| hash.put(cast(ubyte) 0); |
| ubyte[20] result = hash.finish(); |
| } |
| } |
| |
| alias SHA1 = SHA!(512, 160); /// SHA alias for SHA-1, hash is ubyte[20] |
| alias SHA224 = SHA!(512, 224); /// SHA alias for SHA-224, hash is ubyte[28] |
| alias SHA256 = SHA!(512, 256); /// SHA alias for SHA-256, hash is ubyte[32] |
| alias SHA384 = SHA!(1024, 384); /// SHA alias for SHA-384, hash is ubyte[48] |
| alias SHA512 = SHA!(1024, 512); /// SHA alias for SHA-512, hash is ubyte[64] |
| alias SHA512_224 = SHA!(1024, 224); /// SHA alias for SHA-512/224, hash is ubyte[28] |
| alias SHA512_256 = SHA!(1024, 256); /// SHA alias for SHA-512/256, hash is ubyte[32] |
| |
| /// |
| @safe unittest |
| { |
| //Simple example, hashing a string using sha1Of helper function |
| ubyte[20] hash = sha1Of("abc"); |
| //Let's get a hash string |
| assert(toHexString(hash) == "A9993E364706816ABA3E25717850C26C9CD0D89D"); |
| |
| //The same, but using SHA-224 |
| ubyte[28] hash224 = sha224Of("abc"); |
| assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7"); |
| } |
| |
| /// |
| @safe unittest |
| { |
| //Using the basic API |
| SHA1 hash; |
| hash.start(); |
| ubyte[1024] data; |
| //Initialize data here... |
| hash.put(data); |
| ubyte[20] result = hash.finish(); |
| } |
| |
| /// |
| @safe unittest |
| { |
| //Let's use the template features: |
| //Note: When passing a SHA1 to a function, it must be passed by reference! |
| void doSomething(T)(ref T hash) |
| if (isDigest!T) |
| { |
| hash.put(cast(ubyte) 0); |
| } |
| SHA1 sha; |
| sha.start(); |
| doSomething(sha); |
| assert(toHexString(sha.finish()) == "5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F"); |
| } |
| |
| @safe unittest |
| { |
| assert(isDigest!SHA1); |
| assert(isDigest!SHA224); |
| assert(isDigest!SHA256); |
| assert(isDigest!SHA384); |
| assert(isDigest!SHA512); |
| assert(isDigest!SHA512_224); |
| assert(isDigest!SHA512_256); |
| } |
| |
| @system unittest |
| { |
| import std.conv : hexString; |
| import std.range; |
| |
| ubyte[20] digest; |
| ubyte[28] digest224; |
| ubyte[32] digest256; |
| ubyte[48] digest384; |
| ubyte[64] digest512; |
| ubyte[28] digest512_224; |
| ubyte[32] digest512_256; |
| |
| SHA1 sha; |
| sha.put(cast(ubyte[])"abcdef"); |
| sha.start(); |
| sha.put(cast(ubyte[])""); |
| assert(sha.finish() == cast(ubyte[]) x"da39a3ee5e6b4b0d3255bfef95601890afd80709"); |
| |
| SHA224 sha224; |
| sha224.put(cast(ubyte[])"abcdef"); |
| sha224.start(); |
| sha224.put(cast(ubyte[])""); |
| assert(sha224.finish() == cast(ubyte[]) x"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"); |
| |
| SHA256 sha256; |
| sha256.put(cast(ubyte[])"abcdef"); |
| sha256.start(); |
| sha256.put(cast(ubyte[])""); |
| assert(sha256.finish() == cast(ubyte[]) x"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"); |
| |
| SHA384 sha384; |
| sha384.put(cast(ubyte[])"abcdef"); |
| sha384.start(); |
| sha384.put(cast(ubyte[])""); |
| assert(sha384.finish() == cast(ubyte[]) hexString!("38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c" |
| ~"0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b")); |
| |
| SHA512 sha512; |
| sha512.put(cast(ubyte[])"abcdef"); |
| sha512.start(); |
| sha512.put(cast(ubyte[])""); |
| assert(sha512.finish() == cast(ubyte[]) hexString!("cf83e1357eefb8bdf1542850d66d8007d620e4050b571" |
| ~"5dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e")); |
| |
| SHA512_224 sha512_224; |
| sha512_224.put(cast(ubyte[])"abcdef"); |
| sha512_224.start(); |
| sha512_224.put(cast(ubyte[])""); |
| assert(sha512_224.finish() == cast(ubyte[]) x"6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4"); |
| |
| SHA512_256 sha512_256; |
| sha512_256.put(cast(ubyte[])"abcdef"); |
| sha512_256.start(); |
| sha512_256.put(cast(ubyte[])""); |
| assert(sha512_256.finish() == cast(ubyte[]) x"c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a"); |
| |
| digest = sha1Of (""); |
| digest224 = sha224Of (""); |
| digest256 = sha256Of (""); |
| digest384 = sha384Of (""); |
| digest512 = sha512Of (""); |
| digest512_224 = sha512_224Of(""); |
| digest512_256 = sha512_256Of(""); |
| assert(digest == cast(ubyte[]) x"da39a3ee5e6b4b0d3255bfef95601890afd80709"); |
| assert(digest224 == cast(ubyte[]) x"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"); |
| assert(digest256 == cast(ubyte[]) x"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"); |
| assert(digest384 == cast(ubyte[]) hexString!("38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c" |
| ~"0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b")); |
| assert(digest512 == cast(ubyte[]) hexString!("cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83" |
| ~"f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e")); |
| assert(digest512_224 == cast(ubyte[]) x"6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4"); |
| assert(digest512_256 == cast(ubyte[]) x"c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a"); |
| |
| digest = sha1Of ("a"); |
| digest224 = sha224Of ("a"); |
| digest256 = sha256Of ("a"); |
| digest384 = sha384Of ("a"); |
| digest512 = sha512Of ("a"); |
| digest512_224 = sha512_224Of("a"); |
| digest512_256 = sha512_256Of("a"); |
| assert(digest == cast(ubyte[]) x"86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"); |
| assert(digest224 == cast(ubyte[]) x"abd37534c7d9a2efb9465de931cd7055ffdb8879563ae98078d6d6d5"); |
| assert(digest256 == cast(ubyte[]) x"ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb"); |
| assert(digest384 == cast(ubyte[]) hexString!("54a59b9f22b0b80880d8427e548b7c23abd873486e1f035dce9" |
| ~"cd697e85175033caa88e6d57bc35efae0b5afd3145f31")); |
| assert(digest512 == cast(ubyte[]) hexString!("1f40fc92da241694750979ee6cf582f2d5d7d28e18335de05ab" |
| ~"c54d0560e0f5302860c652bf08d560252aa5e74210546f369fbbbce8c12cfc7957b2652fe9a75")); |
| assert(digest512_224 == cast(ubyte[]) x"d5cdb9ccc769a5121d4175f2bfdd13d6310e0d3d361ea75d82108327"); |
| assert(digest512_256 == cast(ubyte[]) x"455e518824bc0601f9fb858ff5c37d417d67c2f8e0df2babe4808858aea830f8"); |
| |
| digest = sha1Of ("abc"); |
| digest224 = sha224Of ("abc"); |
| digest256 = sha256Of ("abc"); |
| digest384 = sha384Of ("abc"); |
| digest512 = sha512Of ("abc"); |
| digest512_224 = sha512_224Of("abc"); |
| digest512_256 = sha512_256Of("abc"); |
| assert(digest == cast(ubyte[]) x"a9993e364706816aba3e25717850c26c9cd0d89d"); |
| assert(digest224 == cast(ubyte[]) x"23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7"); |
| assert(digest256 == cast(ubyte[]) x"ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad"); |
| assert(digest384 == cast(ubyte[]) hexString!("cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a" |
| ~"8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7")); |
| assert(digest512 == cast(ubyte[]) hexString!("ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9" |
| ~"eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f")); |
| assert(digest512_224 == cast(ubyte[]) x"4634270f707b6a54daae7530460842e20e37ed265ceee9a43e8924aa"); |
| assert(digest512_256 == cast(ubyte[]) x"53048e2681941ef99b2e29b76b4c7dabe4c2d0c634fc6d46e0e2f13107e7af23"); |
| |
| digest = sha1Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest224 = sha224Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest256 = sha256Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest384 = sha384Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest512 = sha512Of ("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest512_224 = sha512_224Of("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| digest512_256 = sha512_256Of("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"); |
| assert(digest == cast(ubyte[]) x"84983e441c3bd26ebaae4aa1f95129e5e54670f1"); |
| assert(digest224 == cast(ubyte[]) x"75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525"); |
| assert(digest256 == cast(ubyte[]) x"248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1"); |
| assert(digest384 == cast(ubyte[]) hexString!("3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe" |
| ~"8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b")); |
| assert(digest512 == cast(ubyte[]) hexString!("204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a827" |
| ~"9be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445")); |
| assert(digest512_224 == cast(ubyte[]) x"e5302d6d54bb242275d1e7622d68df6eb02dedd13f564c13dbda2174"); |
| assert(digest512_256 == cast(ubyte[]) x"bde8e1f9f19bb9fd3406c90ec6bc47bd36d8ada9f11880dbc8a22a7078b6a461"); |
| |
| digest = sha1Of ("message digest"); |
| digest224 = sha224Of ("message digest"); |
| digest256 = sha256Of ("message digest"); |
| digest384 = sha384Of ("message digest"); |
| digest512 = sha512Of ("message digest"); |
| digest512_224 = sha512_224Of("message digest"); |
| digest512_256 = sha512_256Of("message digest"); |
| assert(digest == cast(ubyte[]) x"c12252ceda8be8994d5fa0290a47231c1d16aae3"); |
| assert(digest224 == cast(ubyte[]) x"2cb21c83ae2f004de7e81c3c7019cbcb65b71ab656b22d6d0c39b8eb"); |
| assert(digest256 == cast(ubyte[]) x"f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650"); |
| assert(digest384 == cast(ubyte[]) hexString!("473ed35167ec1f5d8e550368a3db39be54639f828868e9454c" |
| ~"239fc8b52e3c61dbd0d8b4de1390c256dcbb5d5fd99cd5")); |
| assert(digest512 == cast(ubyte[]) hexString!("107dbf389d9e9f71a3a95f6c055b9251bc5268c2be16d6c134" |
| ~"92ea45b0199f3309e16455ab1e96118e8a905d5597b72038ddb372a89826046de66687bb420e7c")); |
| assert(digest512_224 == cast(ubyte[]) x"ad1a4db188fe57064f4f24609d2a83cd0afb9b398eb2fcaeaae2c564"); |
| assert(digest512_256 == cast(ubyte[]) x"0cf471fd17ed69d990daf3433c89b16d63dec1bb9cb42a6094604ee5d7b4e9fb"); |
| |
| digest = sha1Of ("abcdefghijklmnopqrstuvwxyz"); |
| digest224 = sha224Of ("abcdefghijklmnopqrstuvwxyz"); |
| digest256 = sha256Of ("abcdefghijklmnopqrstuvwxyz"); |
| digest384 = sha384Of ("abcdefghijklmnopqrstuvwxyz"); |
| digest512 = sha512Of ("abcdefghijklmnopqrstuvwxyz"); |
| digest512_224 = sha512_224Of("abcdefghijklmnopqrstuvwxyz"); |
| digest512_256 = sha512_256Of("abcdefghijklmnopqrstuvwxyz"); |
| assert(digest == cast(ubyte[]) x"32d10c7b8cf96570ca04ce37f2a19d84240d3a89"); |
| assert(digest224 == cast(ubyte[]) x"45a5f72c39c5cff2522eb3429799e49e5f44b356ef926bcf390dccc2"); |
| assert(digest256 == cast(ubyte[]) x"71c480df93d6ae2f1efad1447c66c9525e316218cf51fc8d9ed832f2daf18b73"); |
| assert(digest384 == cast(ubyte[]) hexString!("feb67349df3db6f5924815d6c3dc133f091809213731fe5c7b5" |
| ~"f4999e463479ff2877f5f2936fa63bb43784b12f3ebb4")); |
| assert(digest512 == cast(ubyte[]) hexString!("4dbff86cc2ca1bae1e16468a05cb9881c97f1753bce3619034" |
| ~"898faa1aabe429955a1bf8ec483d7421fe3c1646613a59ed5441fb0f321389f77f48a879c7b1f1")); |
| assert(digest512_224 == cast(ubyte[]) x"ff83148aa07ec30655c1b40aff86141c0215fe2a54f767d3f38743d8"); |
| assert(digest512_256 == cast(ubyte[]) x"fc3189443f9c268f626aea08a756abe7b726b05f701cb08222312ccfd6710a26"); |
| |
| digest = sha1Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest224 = sha224Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest256 = sha256Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest384 = sha384Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest512 = sha512Of ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest512_224 = sha512_224Of("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| digest512_256 = sha512_256Of("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"); |
| assert(digest == cast(ubyte[]) x"761c457bf73b14d27e9e9265c46f4b4dda11f940"); |
| assert(digest224 == cast(ubyte[]) x"bff72b4fcb7d75e5632900ac5f90d219e05e97a7bde72e740db393d9"); |
| assert(digest256 == cast(ubyte[]) x"db4bfcbd4da0cd85a60c3c37d3fbd8805c77f15fc6b1fdfe614ee0a7c8fdb4c0"); |
| assert(digest384 == cast(ubyte[]) hexString!("1761336e3f7cbfe51deb137f026f89e01a448e3b1fafa64039" |
| ~"c1464ee8732f11a5341a6f41e0c202294736ed64db1a84")); |
| assert(digest512 == cast(ubyte[]) hexString!("1e07be23c26a86ea37ea810c8ec7809352515a970e9253c26f" |
| ~"536cfc7a9996c45c8370583e0a78fa4a90041d71a4ceab7423f19c71b9d5a3e01249f0bebd5894")); |
| assert(digest512_224 == cast(ubyte[]) x"a8b4b9174b99ffc67d6f49be9981587b96441051e16e6dd036b140d3"); |
| assert(digest512_256 == cast(ubyte[]) x"cdf1cc0effe26ecc0c13758f7b4a48e000615df241284185c39eb05d355bb9c8"); |
| |
| digest = sha1Of ("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest224 = sha224Of ("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest256 = sha256Of ("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest384 = sha384Of ("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest512 = sha512Of ("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest512_224 = sha512_224Of("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| digest512_256 = sha512_256Of("1234567890123456789012345678901234567890"~ |
| "1234567890123456789012345678901234567890"); |
| assert(digest == cast(ubyte[]) x"50abf5706a150990a08b2c5ea40fa0e585554732"); |
| assert(digest224 == cast(ubyte[]) x"b50aecbe4e9bb0b57bc5f3ae760a8e01db24f203fb3cdcd13148046e"); |
| assert(digest256 == cast(ubyte[]) x"f371bc4a311f2b009eef952dd83ca80e2b60026c8e935592d0f9c308453c813e"); |
| assert(digest384 == cast(ubyte[]) hexString!("b12932b0627d1c060942f5447764155655bd4da0c9afa6dd9b" |
| ~"9ef53129af1b8fb0195996d2de9ca0df9d821ffee67026")); |
| assert(digest512 == cast(ubyte[]) hexString!("72ec1ef1124a45b047e8b7c75a932195135bb61de24ec0d191" |
| ~"4042246e0aec3a2354e093d76f3048b456764346900cb130d2a4fd5dd16abb5e30bcb850dee843")); |
| assert(digest512_224 == cast(ubyte[]) x"ae988faaa47e401a45f704d1272d99702458fea2ddc6582827556dd2"); |
| assert(digest512_256 == cast(ubyte[]) x"2c9fdbc0c90bdd87612ee8455474f9044850241dc105b1e8b94b8ddf5fac9148"); |
| |
| ubyte[] onemilliona = new ubyte[1000000]; |
| onemilliona[] = 'a'; |
| digest = sha1Of(onemilliona); |
| digest224 = sha224Of(onemilliona); |
| digest256 = sha256Of(onemilliona); |
| digest384 = sha384Of(onemilliona); |
| digest512 = sha512Of(onemilliona); |
| digest512_224 = sha512_224Of(onemilliona); |
| digest512_256 = sha512_256Of(onemilliona); |
| assert(digest == cast(ubyte[]) x"34aa973cd4c4daa4f61eeb2bdbad27316534016f"); |
| assert(digest224 == cast(ubyte[]) x"20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67"); |
| assert(digest256 == cast(ubyte[]) x"cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0"); |
| assert(digest384 == cast(ubyte[]) hexString!("9d0e1809716474cb086e834e310a4a1ced149e9c00f2485279" |
| ~"72cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985")); |
| assert(digest512 == cast(ubyte[]) hexString!("e718483d0ce769644e2e42c7bc15b4638e1f98b13b20442856" |
| ~"32a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b")); |
| assert(digest512_224 == cast(ubyte[]) x"37ab331d76f0d36de422bd0edeb22a28accd487b7a8453ae965dd287"); |
| assert(digest512_256 == cast(ubyte[]) x"9a59a052930187a97038cae692f30708aa6491923ef5194394dc68d56c74fb21"); |
| |
| auto oneMillionRange = repeat!ubyte(cast(ubyte)'a', 1000000); |
| digest = sha1Of(oneMillionRange); |
| digest224 = sha224Of(oneMillionRange); |
| digest256 = sha256Of(oneMillionRange); |
| digest384 = sha384Of(oneMillionRange); |
| digest512 = sha512Of(oneMillionRange); |
| digest512_224 = sha512_224Of(oneMillionRange); |
| digest512_256 = sha512_256Of(oneMillionRange); |
| assert(digest == cast(ubyte[]) x"34aa973cd4c4daa4f61eeb2bdbad27316534016f"); |
| assert(digest224 == cast(ubyte[]) x"20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67"); |
| assert(digest256 == cast(ubyte[]) x"cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0"); |
| assert(digest384 == cast(ubyte[]) hexString!("9d0e1809716474cb086e834e310a4a1ced149e9c00f2485279" |
| ~"72cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985")); |
| assert(digest512 == cast(ubyte[]) hexString!("e718483d0ce769644e2e42c7bc15b4638e1f98b13b20442856" |
| ~"32a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b")); |
| assert(digest512_224 == cast(ubyte[]) x"37ab331d76f0d36de422bd0edeb22a28accd487b7a8453ae965dd287"); |
| assert(digest512_256 == cast(ubyte[]) x"9a59a052930187a97038cae692f30708aa6491923ef5194394dc68d56c74fb21"); |
| |
| assert(toHexString(cast(ubyte[20]) x"a9993e364706816aba3e25717850c26c9cd0d89d") |
| == "A9993E364706816ABA3E25717850C26C9CD0D89D"); |
| } |
| |
| /** |
| * These are convenience aliases for $(REF digest, std,digest) using the |
| * SHA implementation. |
| */ |
| //simple alias doesn't work here, hope this gets inlined... |
| auto sha1Of(T...)(T data) |
| { |
| return digest!(SHA1, T)(data); |
| } |
| ///ditto |
| auto sha224Of(T...)(T data) |
| { |
| return digest!(SHA224, T)(data); |
| } |
| ///ditto |
| auto sha256Of(T...)(T data) |
| { |
| return digest!(SHA256, T)(data); |
| } |
| ///ditto |
| auto sha384Of(T...)(T data) |
| { |
| return digest!(SHA384, T)(data); |
| } |
| ///ditto |
| auto sha512Of(T...)(T data) |
| { |
| return digest!(SHA512, T)(data); |
| } |
| ///ditto |
| auto sha512_224Of(T...)(T data) |
| { |
| return digest!(SHA512_224, T)(data); |
| } |
| ///ditto |
| auto sha512_256Of(T...)(T data) |
| { |
| return digest!(SHA512_256, T)(data); |
| } |
| |
| /// |
| @safe unittest |
| { |
| ubyte[20] hash = sha1Of("abc"); |
| assert(hash == digest!SHA1("abc")); |
| |
| ubyte[28] hash224 = sha224Of("abc"); |
| assert(hash224 == digest!SHA224("abc")); |
| |
| ubyte[32] hash256 = sha256Of("abc"); |
| assert(hash256 == digest!SHA256("abc")); |
| |
| ubyte[48] hash384 = sha384Of("abc"); |
| assert(hash384 == digest!SHA384("abc")); |
| |
| ubyte[64] hash512 = sha512Of("abc"); |
| assert(hash512 == digest!SHA512("abc")); |
| |
| ubyte[28] hash512_224 = sha512_224Of("abc"); |
| assert(hash512_224 == digest!SHA512_224("abc")); |
| |
| ubyte[32] hash512_256 = sha512_256Of("abc"); |
| assert(hash512_256 == digest!SHA512_256("abc")); |
| } |
| |
| @safe unittest |
| { |
| string a = "Mary has ", b = "a little lamb"; |
| int[] c = [ 1, 2, 3, 4, 5 ]; |
| string d = toHexString(sha1Of(a, b, c)); |
| version (LittleEndian) |
| assert(d == "CDBB611D00AC2387B642D3D7BDF4C3B342237110", d); |
| else |
| assert(d == "A0F1196C7A379C09390476D9CA4AA11B71FD11C8", d); |
| } |
| |
| /** |
| * OOP API SHA1 and SHA2 implementations. |
| * See $(D std.digest) for differences between template and OOP API. |
| * |
| * This is an alias for $(D $(REF WrapperDigest, std,digest)!SHA1), see |
| * there for more information. |
| */ |
| alias SHA1Digest = WrapperDigest!SHA1; |
| alias SHA224Digest = WrapperDigest!SHA224; ///ditto |
| alias SHA256Digest = WrapperDigest!SHA256; ///ditto |
| alias SHA384Digest = WrapperDigest!SHA384; ///ditto |
| alias SHA512Digest = WrapperDigest!SHA512; ///ditto |
| alias SHA512_224Digest = WrapperDigest!SHA512_224; ///ditto |
| alias SHA512_256Digest = WrapperDigest!SHA512_256; ///ditto |
| |
| /// |
| @safe unittest |
| { |
| //Simple example, hashing a string using Digest.digest helper function |
| auto sha = new SHA1Digest(); |
| ubyte[] hash = sha.digest("abc"); |
| //Let's get a hash string |
| assert(toHexString(hash) == "A9993E364706816ABA3E25717850C26C9CD0D89D"); |
| |
| //The same, but using SHA-224 |
| auto sha224 = new SHA224Digest(); |
| ubyte[] hash224 = sha224.digest("abc"); |
| //Let's get a hash string |
| assert(toHexString(hash224) == "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7"); |
| } |
| |
| /// |
| @system unittest |
| { |
| //Let's use the OOP features: |
| void test(Digest dig) |
| { |
| dig.put(cast(ubyte) 0); |
| } |
| auto sha = new SHA1Digest(); |
| test(sha); |
| |
| //Let's use a custom buffer: |
| ubyte[20] buf; |
| ubyte[] result = sha.finish(buf[]); |
| assert(toHexString(result) == "5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F"); |
| } |
| |
| @system unittest |
| { |
| auto sha = new SHA1Digest(); |
| |
| sha.put(cast(ubyte[])"abcdef"); |
| sha.reset(); |
| sha.put(cast(ubyte[])""); |
| assert(sha.finish() == cast(ubyte[]) x"da39a3ee5e6b4b0d3255bfef95601890afd80709"); |
| |
| sha.put(cast(ubyte[])"abcdefghijklmnopqrstuvwxyz"); |
| ubyte[22] result; |
| auto result2 = sha.finish(result[]); |
| assert(result[0 .. 20] == result2 && result2 == cast(ubyte[]) x"32d10c7b8cf96570ca04ce37f2a19d84240d3a89"); |
| |
| debug |
| assertThrown!Error(sha.finish(result[0 .. 15])); |
| |
| assert(sha.length == 20); |
| |
| assert(sha.digest("") == cast(ubyte[]) x"da39a3ee5e6b4b0d3255bfef95601890afd80709"); |
| |
| assert(sha.digest("a") == cast(ubyte[]) x"86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"); |
| |
| assert(sha.digest("abc") == cast(ubyte[]) x"a9993e364706816aba3e25717850c26c9cd0d89d"); |
| |
| assert(sha.digest("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") |
| == cast(ubyte[]) x"84983e441c3bd26ebaae4aa1f95129e5e54670f1"); |
| |
| assert(sha.digest("message digest") == cast(ubyte[]) x"c12252ceda8be8994d5fa0290a47231c1d16aae3"); |
| |
| assert(sha.digest("abcdefghijklmnopqrstuvwxyz") |
| == cast(ubyte[]) x"32d10c7b8cf96570ca04ce37f2a19d84240d3a89"); |
| |
| assert(sha.digest("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") |
| == cast(ubyte[]) x"761c457bf73b14d27e9e9265c46f4b4dda11f940"); |
| |
| assert(sha.digest("1234567890123456789012345678901234567890", |
| "1234567890123456789012345678901234567890") |
| == cast(ubyte[]) x"50abf5706a150990a08b2c5ea40fa0e585554732"); |
| |
| ubyte[] onemilliona = new ubyte[1000000]; |
| onemilliona[] = 'a'; |
| assert(sha.digest(onemilliona) == cast(ubyte[]) x"34aa973cd4c4daa4f61eeb2bdbad27316534016f"); |
| } |