HashFunction.cpp 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648
  1. /**
  2. * Copyright (c) 2006-2023 LOVE Development Team
  3. *
  4. * This software is provided 'as-is', without any express or implied
  5. * warranty. In no event will the authors be held liable for any damages
  6. * arising from the use of this software.
  7. *
  8. * Permission is granted to anyone to use this software for any purpose,
  9. * including commercial applications, and to alter it and redistribute it
  10. * freely, subject to the following restrictions:
  11. *
  12. * 1. The origin of this software must not be misrepresented; you must not
  13. * claim that you wrote the original software. If you use this software
  14. * in a product, an acknowledgment in the product documentation would be
  15. * appreciated but is not required.
  16. * 2. Altered source versions must be plainly marked as such, and must not be
  17. * misrepresented as being the original software.
  18. * 3. This notice may not be removed or altered from any source distribution.
  19. **/
  20. #include "HashFunction.h"
  21. // FIXME: Probably trivial by having tole and tobe functions, which can be ifdeffed to being identity functions
  22. #ifdef LOVE_BIG_ENDIAN
  23. # error Hashing not yet implemented for big endian
  24. #endif
  25. namespace love
  26. {
  27. namespace data
  28. {
  29. namespace
  30. {
  31. namespace impl
  32. {
  33. inline uint32 leftrot(uint32 x, uint8 amount)
  34. {
  35. return (x << amount) | (x >> (32 - amount));
  36. }
  37. inline uint32 rightrot(uint32 x, uint8 amount)
  38. {
  39. return (x >> amount) | (x << (32 - amount));
  40. }
  41. inline uint64 rightrot(uint64 x, uint8 amount)
  42. {
  43. return (x >> amount) | (x << (64 - amount));
  44. }
  45. /**
  46. * The following implementation is based on the pseudocode provided by multiple
  47. * authors on wikipedia: https://en.wikipedia.org/wiki/MD5
  48. * The pseudocode is licensed under the CC-BY-SA license, but no authorship
  49. * information is present. I believe this note, and the zlib license of this
  50. * project satisfy the conditions of the license.
  51. **/
  52. class MD5 : public HashFunction
  53. {
  54. private:
  55. static const uint8 shifts[64];
  56. static const uint32 constants[64];
  57. public:
  58. bool isSupported(Function function) const override
  59. {
  60. return function == FUNCTION_MD5;
  61. }
  62. void hash(Function function, const char *input, uint64 length, Value &output) const override
  63. {
  64. if (function != FUNCTION_MD5)
  65. throw love::Exception("Hash function not supported by MD5 implementation");
  66. uint32 a0 = 0x67452301;
  67. uint32 b0 = 0xefcdab89;
  68. uint32 c0 = 0x98badcfe;
  69. uint32 d0 = 0x10325476;
  70. //Do the required padding (MD5, SHA1 and SHA2 use the same padding)
  71. uint64 paddedLength = length + 1; //Consider the appended bit
  72. if (paddedLength % 64 < 56)
  73. paddedLength += 56 - paddedLength % 64;
  74. if (paddedLength % 64 > 56)
  75. paddedLength += 120 - paddedLength % 64;
  76. uint8 *padded = new uint8[paddedLength + 8];
  77. memcpy(padded, input, length);
  78. memset(padded + length, 0, paddedLength - length);
  79. padded[length] = 0x80;
  80. //Now we need the length in bits
  81. *((uint64*) &padded[paddedLength]) = length * 8;
  82. paddedLength += 8;
  83. for (uint64 i = 0; i < paddedLength; i += 64)
  84. {
  85. uint32 *chunk = (uint32*) &padded[i];
  86. uint32 A = a0;
  87. uint32 B = b0;
  88. uint32 C = c0;
  89. uint32 D = d0;
  90. uint32 F;
  91. uint32 g;
  92. for (int j = 0; j < 64; j++)
  93. {
  94. if (j < 16)
  95. {
  96. F = (B & C) | (~B & D);
  97. g = j;
  98. }
  99. else if (j < 32)
  100. {
  101. F = (D & B) | (~D & C);
  102. g = (5*j + 1) % 16;
  103. }
  104. else if (j < 48)
  105. {
  106. F = B ^ C ^ D;
  107. g = (3*j + 5) % 16;
  108. }
  109. else
  110. {
  111. F = C ^ (B | ~D);
  112. g = (7*j) % 16;
  113. }
  114. uint32 temp = D;
  115. D = C;
  116. C = B;
  117. B += leftrot(A + F + constants[j] + chunk[g], shifts[j]);
  118. A = temp;
  119. }
  120. a0 += A;
  121. b0 += B;
  122. c0 += C;
  123. d0 += D;
  124. }
  125. delete[] padded;
  126. memcpy(&output.data[ 0], &a0, 4);
  127. memcpy(&output.data[ 4], &b0, 4);
  128. memcpy(&output.data[ 8], &c0, 4);
  129. memcpy(&output.data[12], &d0, 4);
  130. output.size = 16;
  131. }
  132. } md5;
  133. const uint8 MD5::shifts[64] = {
  134. 7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22,
  135. 5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20,
  136. 4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23,
  137. 6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21,
  138. };
  139. const uint32 MD5::constants[64] = {
  140. 0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee,
  141. 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501,
  142. 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be,
  143. 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821,
  144. 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa,
  145. 0xd62f105d, 0x02441453, 0xd8a1e681, 0xe7d3fbc8,
  146. 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed,
  147. 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a,
  148. 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c,
  149. 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70,
  150. 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x04881d05,
  151. 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665,
  152. 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039,
  153. 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1,
  154. 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1,
  155. 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391,
  156. };
  157. /**
  158. * The following implementation was based on the text, not the code listings,
  159. * in RFC3174. I believe this means no copyright other than that of the L�VE
  160. * Development Team applies.
  161. **/
  162. class SHA1 : public HashFunction
  163. {
  164. public:
  165. bool isSupported(Function function) const override
  166. {
  167. return function == FUNCTION_SHA1;
  168. }
  169. void hash(Function function, const char *input, uint64 length, Value &output) const override
  170. {
  171. if (function != FUNCTION_SHA1)
  172. throw love::Exception("Hash function not supported by SHA1 implementation");
  173. uint32 intermediate[5] = {
  174. 0x67452301, 0xEFCDAB89, 0x98BADCFE, 0x10325476, 0xC3D2E1F0
  175. };
  176. //Do the required padding (MD5, SHA1 and SHA2 use the same padding)
  177. uint64 paddedLength = length + 1; //Consider the appended bit
  178. if (paddedLength % 64 < 56)
  179. paddedLength += 56 - paddedLength % 64;
  180. if (paddedLength % 64 > 56)
  181. paddedLength += 120 - paddedLength % 64;
  182. uint8 *padded = new uint8[paddedLength + 8];
  183. memcpy(padded, input, length);
  184. memset(padded + length, 0, paddedLength - length);
  185. padded[length] = 0x80;
  186. // Now we need the length in bits (big endian)
  187. length *= 8;
  188. for (int i = 0; i < 8; ++i, ++paddedLength)
  189. padded[paddedLength] = (length >> (56 - i * 8)) & 0xFF;
  190. // Allocate our extended words
  191. uint32 words[80];
  192. for (uint64 i = 0; i < paddedLength; i += 64)
  193. {
  194. uint32 *chunk = (uint32*) &padded[i];
  195. for (int j = 0; j < 16; j++)
  196. {
  197. char *c = (char*) &words[j];
  198. c[0] = (chunk[j] >> 24) & 0xFF;
  199. c[1] = (chunk[j] >> 16) & 0xFF;
  200. c[2] = (chunk[j] >> 8) & 0xFF;
  201. c[3] = (chunk[j] >> 0) & 0xFF;
  202. }
  203. for (int j = 16; j < 80; j++)
  204. words[j] = leftrot(words[j-3] ^ words[j-8] ^ words[j-14] ^ words[j-16], 1);
  205. uint32 A = intermediate[0];
  206. uint32 B = intermediate[1];
  207. uint32 C = intermediate[2];
  208. uint32 D = intermediate[3];
  209. uint32 E = intermediate[4];
  210. for (int j = 0; j < 80; j++)
  211. {
  212. uint32 temp = leftrot(A, 5) + E + words[j];
  213. if (j < 20)
  214. temp += 0x5A827999 + ((B & C) | (~B & D));
  215. else if (j < 40)
  216. temp += 0x6ED9EBA1 + (B ^ C ^ D);
  217. else if (j < 60)
  218. temp += 0x8F1BBCDC + ((B & C) | (B & D) | (C & D));
  219. else
  220. temp += 0xCA62C1D6 + (B ^ C ^ D);
  221. E = D;
  222. D = C;
  223. C = leftrot(B, 30);
  224. B = A;
  225. A = temp;
  226. }
  227. intermediate[0] += A;
  228. intermediate[1] += B;
  229. intermediate[2] += C;
  230. intermediate[3] += D;
  231. intermediate[4] += E;
  232. }
  233. delete[] padded;
  234. for (int i = 0; i < 20; i += 4)
  235. {
  236. output.data[i+0] = (intermediate[i/4] >> 24) & 0xFF;
  237. output.data[i+1] = (intermediate[i/4] >> 16) & 0xFF;
  238. output.data[i+2] = (intermediate[i/4] >> 8) & 0xFF;
  239. output.data[i+3] = (intermediate[i/4] >> 0) & 0xFF;
  240. }
  241. output.size = 20;
  242. }
  243. } sha1;
  244. /**
  245. * This implementation was based on the description in RFC-6234.
  246. **/
  247. // SHA-2: SHA-224 and SHA-256
  248. class SHA256 : public HashFunction
  249. {
  250. private:
  251. static const uint32 initial224[8];
  252. static const uint32 initial256[8];
  253. static const uint32 constants[64];
  254. public:
  255. bool isSupported(Function function) const override
  256. {
  257. return function == FUNCTION_SHA224 || function == FUNCTION_SHA256;
  258. }
  259. void hash(Function function, const char *input, uint64 length, Value &output) const override
  260. {
  261. if (!isSupported(function))
  262. throw love::Exception("Hash function not supported by SHA-224/SHA-256 implementation");
  263. //Do the required padding (MD5, SHA1 and SHA2 use the same padding)
  264. uint64 paddedLength = length + 1; //Consider the appended bit
  265. if (paddedLength % 64 < 56)
  266. paddedLength += 56 - paddedLength % 64;
  267. if (paddedLength % 64 > 56)
  268. paddedLength += 120 - paddedLength % 64;
  269. uint8 *padded = new uint8[paddedLength + 8];
  270. memcpy(padded, input, length);
  271. memset(padded + length, 0, paddedLength - length);
  272. padded[length] = 0x80;
  273. // Now we need the length in bits (big endian)
  274. length *= 8;
  275. for (int i = 0; i < 8; ++i, ++paddedLength)
  276. padded[paddedLength] = (length >> (56 - i * 8)) & 0xFF;
  277. uint32 intermediate[8];
  278. if (function == FUNCTION_SHA224)
  279. memcpy(intermediate, initial224, sizeof(intermediate));
  280. else
  281. memcpy(intermediate, initial256, sizeof(intermediate));
  282. // Allocate our extended words
  283. uint32 words[64];
  284. for (uint64 i = 0; i < paddedLength; i += 64)
  285. {
  286. uint32 *chunk = (uint32*) &padded[i];
  287. for (int j = 0; j < 16; j++)
  288. {
  289. char *c = (char*) &words[j];
  290. c[0] = (chunk[j] >> 24) & 0xFF;
  291. c[1] = (chunk[j] >> 16) & 0xFF;
  292. c[2] = (chunk[j] >> 8) & 0xFF;
  293. c[3] = (chunk[j] >> 0) & 0xFF;
  294. }
  295. for (int j = 16; j < 64; j++)
  296. {
  297. words[j] = rightrot(words[j-2], 17) ^ rightrot(words[j-2], 19) ^ (words[j-2] >> 10);
  298. words[j] += rightrot(words[j-15], 7) ^ rightrot(words[j-15], 18) ^ (words[j-15] >> 3);
  299. words[j] += words[j-7] + words[j-16];
  300. }
  301. uint32 A = intermediate[0];
  302. uint32 B = intermediate[1];
  303. uint32 C = intermediate[2];
  304. uint32 D = intermediate[3];
  305. uint32 E = intermediate[4];
  306. uint32 F = intermediate[5];
  307. uint32 G = intermediate[6];
  308. uint32 H = intermediate[7];
  309. for (int j = 0; j < 64; j++)
  310. {
  311. uint32 temp1 = H + constants[j] + words[j];
  312. temp1 += rightrot(E, 6) ^ rightrot(E, 11) ^ rightrot(E, 25);
  313. temp1 += (E & F) ^ (~E & G);
  314. uint32 temp2 = rightrot(A, 2) ^ rightrot(A, 13) ^ rightrot(A, 22);
  315. temp2 += (A & B) ^ (A & C) ^ (B & C);
  316. H = G;
  317. G = F;
  318. F = E;
  319. E = D + temp1;
  320. D = C;
  321. C = B;
  322. B = A;
  323. A = temp1 + temp2;
  324. }
  325. intermediate[0] += A;
  326. intermediate[1] += B;
  327. intermediate[2] += C;
  328. intermediate[3] += D;
  329. intermediate[4] += E;
  330. intermediate[5] += F;
  331. intermediate[6] += G;
  332. intermediate[7] += H;
  333. }
  334. delete[] padded;
  335. int hashlength = 32;
  336. if (function == FUNCTION_SHA224)
  337. hashlength = 28;
  338. for (int i = 0; i < hashlength; i += 4)
  339. {
  340. output.data[i+0] = (intermediate[i/4] >> 24) & 0xFF;
  341. output.data[i+1] = (intermediate[i/4] >> 16) & 0xFF;
  342. output.data[i+2] = (intermediate[i/4] >> 8) & 0xFF;
  343. output.data[i+3] = (intermediate[i/4] >> 0) & 0xFF;
  344. }
  345. output.size = hashlength;
  346. }
  347. } sha256;
  348. const uint32 SHA256::initial224[8] = {
  349. 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939,
  350. 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,
  351. };
  352. const uint32 SHA256::initial256[8] = {
  353. 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
  354. 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,
  355. };
  356. const uint32 SHA256::constants[64] = {
  357. 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
  358. 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
  359. 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
  360. 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
  361. 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
  362. 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
  363. 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
  364. 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
  365. 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
  366. 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
  367. 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
  368. 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
  369. 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
  370. 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
  371. 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
  372. 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
  373. };
  374. /**
  375. * This implementation was based on the description in RFC-6234.
  376. **/
  377. // SHA-2: SHA-384 and SHA-512
  378. class SHA512 : public HashFunction
  379. {
  380. private:
  381. static const uint64 initial384[8];
  382. static const uint64 initial512[8];
  383. static const uint64 constants[80];
  384. public:
  385. bool isSupported(Function function) const override
  386. {
  387. return function == FUNCTION_SHA384 || function == FUNCTION_SHA512;
  388. }
  389. void hash(Function function, const char *input, uint64 length, Value &output) const override
  390. {
  391. if (!isSupported(function))
  392. throw love::Exception("Hash function not supported by SHA-384/SHA-512 implementation");
  393. uint64 intermediates[8];
  394. if (function == FUNCTION_SHA384)
  395. memcpy(intermediates, initial384, sizeof(intermediates));
  396. else
  397. memcpy(intermediates, initial512, sizeof(intermediates));
  398. //Do the required padding
  399. uint64 paddedLength = length + 1; //Consider the appended bit
  400. if (paddedLength % 128 < 112)
  401. paddedLength += 112 - paddedLength % 128;
  402. if (paddedLength % 128 > 112)
  403. paddedLength += 240 - paddedLength % 128;
  404. uint8 *padded = new uint8[paddedLength + 16];
  405. paddedLength += 8;
  406. memcpy(padded, input, length);
  407. memset(padded + length, 0, paddedLength - length);
  408. padded[length] = 0x80;
  409. // Now we need the length in bits (big endian), note we only write a 64-bit int, so
  410. // we have filled the first 8 bytes with zeroes
  411. length *= 8;
  412. for (int i = 0; i < 8; ++i, ++paddedLength)
  413. padded[paddedLength] = (length >> (56 - i * 8)) & 0xFF;
  414. // Allocate our extended words
  415. uint64 words[80];
  416. for (uint64 i = 0; i < paddedLength; i += 128)
  417. {
  418. uint64 *chunk = (uint64*) &padded[i];
  419. for (int j = 0; j < 16; ++j)
  420. {
  421. char *c = (char*) &words[j];
  422. c[0] = (chunk[j] >> 56) & 0xFF;
  423. c[1] = (chunk[j] >> 48) & 0xFF;
  424. c[2] = (chunk[j] >> 40) & 0xFF;
  425. c[3] = (chunk[j] >> 32) & 0xFF;
  426. c[4] = (chunk[j] >> 24) & 0xFF;
  427. c[5] = (chunk[j] >> 16) & 0xFF;
  428. c[6] = (chunk[j] >> 8) & 0xFF;
  429. c[7] = (chunk[j] >> 0) & 0xFF;
  430. }
  431. for (int j = 16; j < 80; ++j)
  432. {
  433. words[j] = words[j-7] + words[j-16];
  434. words[j] += rightrot(words[j-2], 19) ^ rightrot(words[j-2], 61) ^ (words[j-2] >> 6);
  435. words[j] += rightrot(words[j-15], 1) ^ rightrot(words[j-15], 8) ^ (words[j-15] >> 7);
  436. }
  437. uint64 A = intermediates[0];
  438. uint64 B = intermediates[1];
  439. uint64 C = intermediates[2];
  440. uint64 D = intermediates[3];
  441. uint64 E = intermediates[4];
  442. uint64 F = intermediates[5];
  443. uint64 G = intermediates[6];
  444. uint64 H = intermediates[7];
  445. for (int j = 0; j < 80; ++j)
  446. {
  447. uint64 temp1 = H + constants[j] + words[j];
  448. temp1 += rightrot(E, 14) ^ rightrot(E, 18) ^ rightrot(E, 41);
  449. temp1 += (E & F) ^ (~E & G);
  450. uint64 temp2 = rightrot(A, 28) ^ rightrot(A, 34) ^ rightrot(A, 39);
  451. temp2 += (A & B) ^ (A & C) ^ (B & C);
  452. H = G;
  453. G = F;
  454. F = E;
  455. E = D + temp1;
  456. D = C;
  457. C = B;
  458. B = A;
  459. A = temp1 + temp2;
  460. }
  461. intermediates[0] += A;
  462. intermediates[1] += B;
  463. intermediates[2] += C;
  464. intermediates[3] += D;
  465. intermediates[4] += E;
  466. intermediates[5] += F;
  467. intermediates[6] += G;
  468. intermediates[7] += H;
  469. }
  470. delete[] padded;
  471. int hashlength = 64;
  472. if (function == FUNCTION_SHA384)
  473. hashlength = 48;
  474. for (int i = 0; i < hashlength; i += 8)
  475. {
  476. output.data[i+0] = (intermediates[i/8] >> 56) & 0xFF;
  477. output.data[i+1] = (intermediates[i/8] >> 48) & 0xFF;
  478. output.data[i+2] = (intermediates[i/8] >> 40) & 0xFF;
  479. output.data[i+3] = (intermediates[i/8] >> 32) & 0xFF;
  480. output.data[i+4] = (intermediates[i/8] >> 24) & 0xFF;
  481. output.data[i+5] = (intermediates[i/8] >> 16) & 0xFF;
  482. output.data[i+6] = (intermediates[i/8] >> 8) & 0xFF;
  483. output.data[i+7] = (intermediates[i/8] >> 0) & 0xFF;
  484. }
  485. output.size = hashlength;
  486. }
  487. } sha512;
  488. const uint64 SHA512::initial384[8] = {
  489. 0xcbbb9d5dc1059ed8, 0x629a292a367cd507, 0x9159015a3070dd17, 0x152fecd8f70e5939,
  490. 0x67332667ffc00b31, 0x8eb44a8768581511, 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4,
  491. };
  492. const uint64 SHA512::initial512[8] = {
  493. 0x6a09e667f3bcc908, 0xbb67ae8584caa73b, 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1,
  494. 0x510e527fade682d1, 0x9b05688c2b3e6c1f, 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179,
  495. };
  496. const uint64 SHA512::constants[80] = {
  497. 0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc,
  498. 0x3956c25bf348b538, 0x59f111f1b605d019, 0x923f82a4af194f9b, 0xab1c5ed5da6d8118,
  499. 0xd807aa98a3030242, 0x12835b0145706fbe, 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2,
  500. 0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235, 0xc19bf174cf692694,
  501. 0xe49b69c19ef14ad2, 0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65,
  502. 0x2de92c6f592b0275, 0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5,
  503. 0x983e5152ee66dfab, 0xa831c66d2db43210, 0xb00327c898fb213f, 0xbf597fc7beef0ee4,
  504. 0xc6e00bf33da88fc2, 0xd5a79147930aa725, 0x06ca6351e003826f, 0x142929670a0e6e70,
  505. 0x27b70a8546d22ffc, 0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df,
  506. 0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, 0x92722c851482353b,
  507. 0xa2bfe8a14cf10364, 0xa81a664bbc423001, 0xc24b8b70d0f89791, 0xc76c51a30654be30,
  508. 0xd192e819d6ef5218, 0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8,
  509. 0x19a4c116b8d2d0c8, 0x1e376c085141ab53, 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8,
  510. 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3,
  511. 0x748f82ee5defb2fc, 0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec,
  512. 0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915, 0xc67178f2e372532b,
  513. 0xca273eceea26619c, 0xd186b8c721c0c207, 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178,
  514. 0x06f067aa72176fba, 0x0a637dc5a2c898a6, 0x113f9804bef90dae, 0x1b710b35131c471b,
  515. 0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c,
  516. 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817,
  517. };
  518. } // impl
  519. }
  520. HashFunction *HashFunction::getHashFunction(Function function)
  521. {
  522. switch(function)
  523. {
  524. case FUNCTION_MD5:
  525. return &impl::md5;
  526. case FUNCTION_SHA1:
  527. return &impl::sha1;
  528. case FUNCTION_SHA224:
  529. case FUNCTION_SHA256:
  530. return &impl::sha256;
  531. case FUNCTION_SHA384:
  532. case FUNCTION_SHA512:
  533. return &impl::sha512;
  534. case FUNCTION_MAX_ENUM:
  535. return nullptr;
  536. // No default for compiler warnings
  537. }
  538. return nullptr;
  539. }
  540. bool HashFunction::getConstant(const char *in, Function &out)
  541. {
  542. return functionNames.find(in, out);
  543. }
  544. bool HashFunction::getConstant(const Function &in, const char *&out)
  545. {
  546. return functionNames.find(in, out);
  547. }
  548. std::vector<std::string> HashFunction::getConstants(Function)
  549. {
  550. return functionNames.getNames();
  551. }
  552. StringMap<HashFunction::Function, HashFunction::FUNCTION_MAX_ENUM>::Entry HashFunction::functionEntries[] =
  553. {
  554. {"md5", FUNCTION_MD5},
  555. {"sha1", FUNCTION_SHA1},
  556. {"sha224", FUNCTION_SHA224},
  557. {"sha256", FUNCTION_SHA256},
  558. {"sha384", FUNCTION_SHA384},
  559. {"sha512", FUNCTION_SHA512},
  560. };
  561. StringMap<HashFunction::Function, HashFunction::FUNCTION_MAX_ENUM> HashFunction::functionNames(HashFunction::functionEntries, sizeof(HashFunction::functionEntries));
  562. } // data
  563. } // love