diff options
Diffstat (limited to 'v_windows/v/old/vlib/crypto/md5')
| -rw-r--r-- | v_windows/v/old/vlib/crypto/md5/md5.v | 154 | ||||
| -rw-r--r-- | v_windows/v/old/vlib/crypto/md5/md5_test.v | 8 | ||||
| -rw-r--r-- | v_windows/v/old/vlib/crypto/md5/md5block_generic.v | 132 | 
3 files changed, 294 insertions, 0 deletions
diff --git a/v_windows/v/old/vlib/crypto/md5/md5.v b/v_windows/v/old/vlib/crypto/md5/md5.v new file mode 100644 index 0000000..17796b1 --- /dev/null +++ b/v_windows/v/old/vlib/crypto/md5/md5.v @@ -0,0 +1,154 @@ +// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved. +// Use of this source code is governed by an MIT license +// that can be found in the LICENSE file. +// Package md5 implements the MD5 hash algorithm as defined in RFC 1321. +// MD5 is cryptographically broken and should not be used for secure +// applications. +// Based off:   https://github.com/golang/go/blob/master/src/crypto/md5 +// Last commit: https://github.com/golang/go/commit/ed7f323c8f4f6bc61a75146bf34f5b8f73063a17 +module md5 + +import encoding.binary + +pub const ( +	// The size of an MD5 checksum in bytes. +	size       = 16 +	// The blocksize of MD5 in bytes. +	block_size = 64 +) + +const ( +	init0 = 0x67452301 +	init1 = 0xEFCDAB89 +	init2 = 0x98BADCFE +	init3 = 0x10325476 +) + +// Digest represents the partial evaluation of a checksum. +struct Digest { +mut: +	s   []u32 +	x   []byte +	nx  int +	len u64 +} + +fn (mut d Digest) reset() { +	d.s = []u32{len: (4)} +	d.x = []byte{len: md5.block_size} +	d.s[0] = u32(md5.init0) +	d.s[1] = u32(md5.init1) +	d.s[2] = u32(md5.init2) +	d.s[3] = u32(md5.init3) +	d.nx = 0 +	d.len = 0 +} + +// new returns a new Digest (implementing hash.Hash) computing the MD5 checksum. +pub fn new() &Digest { +	mut d := &Digest{} +	d.reset() +	return d +} + +// write writes the contents of `p_` to the internal hash representation. +pub fn (mut d Digest) write(p_ []byte) ?int { +	unsafe { +		mut p := p_ +		nn := p.len +		d.len += u64(nn) +		if d.nx > 0 { +			n := copy(d.x[d.nx..], p) +			d.nx += n +			if d.nx == md5.block_size { +				block(mut d, d.x) +				d.nx = 0 +			} +			if n >= p.len { +				p = [] +			} else { +				p = p[n..] +			} +		} +		if p.len >= md5.block_size { +			n := p.len & ~(md5.block_size - 1) +			block(mut d, p[..n]) +			if n >= p.len { +				p = [] +			} else { +				p = p[n..] +			} +		} +		if p.len > 0 { +			d.nx = copy(d.x, p) +		} +		return nn +	} +} + +// sum returns the md5 sum of the bytes in `b_in`. +pub fn (d &Digest) sum(b_in []byte) []byte { +	// Make a copy of d so that caller can keep writing and summing. +	mut d0 := *d +	hash := d0.checksum() +	mut b_out := b_in.clone() +	for b in hash { +		b_out << b +	} +	return b_out +} + +// checksum returns the byte checksum of the `Digest`. +pub fn (mut d Digest) checksum() []byte { +	// Append 0x80 to the end of the message and then append zeros +	// until the length is a multiple of 56 bytes. Finally append +	// 8 bytes representing the message length in bits. +	// +	// 1 byte end marker :: 0-63 padding bytes :: 8 byte length +	// tmp := [1 + 63 + 8]byte{0x80} +	mut tmp := []byte{len: (1 + 63 + 8)} +	tmp[0] = 0x80 +	pad := ((55 - d.len) % 64) // calculate number of padding bytes +	binary.little_endian_put_u64(mut tmp[1 + pad..], d.len << 3) // append length in bits +	d.write(tmp[..1 + pad + 8]) or { panic(err) } +	// The previous write ensures that a whole number of +	// blocks (i.e. a multiple of 64 bytes) have been hashed. +	if d.nx != 0 { +		panic('d.nx != 0') +	} +	mut digest := []byte{len: md5.size} +	binary.little_endian_put_u32(mut digest, d.s[0]) +	binary.little_endian_put_u32(mut digest[4..], d.s[1]) +	binary.little_endian_put_u32(mut digest[8..], d.s[2]) +	binary.little_endian_put_u32(mut digest[12..], d.s[3]) +	return digest +} + +// sum returns the MD5 checksum of the data. +pub fn sum(data []byte) []byte { +	mut d := new() +	d.write(data) or { panic(err) } +	return d.checksum() +} + +fn block(mut dig Digest, p []byte) { +	// For now just use block_generic until we have specific +	// architecture optimized versions +	block_generic(mut dig, p) +} + +// size returns the size of the checksum in bytes. +pub fn (d &Digest) size() int { +	return md5.size +} + +// block_size returns the block size of the checksum in bytes. +pub fn (d &Digest) block_size() int { +	return md5.block_size +} + +// hexhash returns a hexadecimal MD5 hash sum `string` of `s`. +// Example: assert md5.hexhash('V') == '5206560a306a2e085a437fd258eb57ce' +pub fn hexhash(s string) string { +	return sum(s.bytes()).hex() +} diff --git a/v_windows/v/old/vlib/crypto/md5/md5_test.v b/v_windows/v/old/vlib/crypto/md5/md5_test.v new file mode 100644 index 0000000..fd43c1c --- /dev/null +++ b/v_windows/v/old/vlib/crypto/md5/md5_test.v @@ -0,0 +1,8 @@ +// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved. +// Use of this source code is governed by an MIT license +// that can be found in the LICENSE file. +import crypto.md5 + +fn test_crypto_md5() { +	assert md5.sum('this is a md5 checksum.'.bytes()).hex() == '6fb421ff99036547655984da12973431' +} diff --git a/v_windows/v/old/vlib/crypto/md5/md5block_generic.v b/v_windows/v/old/vlib/crypto/md5/md5block_generic.v new file mode 100644 index 0000000..ebc4a8d --- /dev/null +++ b/v_windows/v/old/vlib/crypto/md5/md5block_generic.v @@ -0,0 +1,132 @@ +// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved. +// Use of this source code is governed by an MIT license +// that can be found in the LICENSE file. + +// This is the generic version with no architecture optimizations. +// In its own file so that an architecture +// optimized verision can be substituted + +module md5 + +import math.bits +import encoding.binary + +fn block_generic(mut dig Digest, p []byte) { +	// load state +	mut a := dig.s[0] +	mut b := dig.s[1] +	mut c := dig.s[2] +	mut d := dig.s[3] + +	for i := 0; i <= p.len - block_size; i += block_size { +		mut q := p[i..] +		q = q[..block_size] +		// save current state +		aa := a +		bb := b +		cc := c +		dd := d + +		// load input block +		x0 := binary.little_endian_u32(q[4 * 0x0..]) +		x1 := binary.little_endian_u32(q[4 * 0x1..]) +		x2 := binary.little_endian_u32(q[4 * 0x2..]) +		x3 := binary.little_endian_u32(q[4 * 0x3..]) +		x4 := binary.little_endian_u32(q[4 * 0x4..]) +		x5 := binary.little_endian_u32(q[4 * 0x5..]) +		x6 := binary.little_endian_u32(q[4 * 0x6..]) +		x7 := binary.little_endian_u32(q[4 * 0x7..]) +		x8 := binary.little_endian_u32(q[4 * 0x8..]) +		x9 := binary.little_endian_u32(q[4 * 0x9..]) +		xa := binary.little_endian_u32(q[4 * 0xa..]) +		xb := binary.little_endian_u32(q[4 * 0xb..]) +		xc := binary.little_endian_u32(q[4 * 0xc..]) +		xd := binary.little_endian_u32(q[4 * 0xd..]) +		xe := binary.little_endian_u32(q[4 * 0xe..]) +		xf := binary.little_endian_u32(q[4 * 0xf..]) + +		// round 1 +		a = b + bits.rotate_left_32((((c ^ d) & b) ^ d) + a + x0 + u32(0xd76aa478), 7) +		d = a + bits.rotate_left_32((((b ^ c) & a) ^ c) + d + x1 + u32(0xe8c7b756), 12) +		c = d + bits.rotate_left_32((((a ^ b) & d) ^ b) + c + x2 + u32(0x242070db), 17) +		b = c + bits.rotate_left_32((((d ^ a) & c) ^ a) + b + x3 + u32(0xc1bdceee), 22) +		a = b + bits.rotate_left_32((((c ^ d) & b) ^ d) + a + x4 + u32(0xf57c0faf), 7) +		d = a + bits.rotate_left_32((((b ^ c) & a) ^ c) + d + x5 + u32(0x4787c62a), 12) +		c = d + bits.rotate_left_32((((a ^ b) & d) ^ b) + c + x6 + u32(0xa8304613), 17) +		b = c + bits.rotate_left_32((((d ^ a) & c) ^ a) + b + x7 + u32(0xfd469501), 22) +		a = b + bits.rotate_left_32((((c ^ d) & b) ^ d) + a + x8 + u32(0x698098d8), 7) +		d = a + bits.rotate_left_32((((b ^ c) & a) ^ c) + d + x9 + u32(0x8b44f7af), 12) +		c = d + bits.rotate_left_32((((a ^ b) & d) ^ b) + c + xa + u32(0xffff5bb1), 17) +		b = c + bits.rotate_left_32((((d ^ a) & c) ^ a) + b + xb + u32(0x895cd7be), 22) +		a = b + bits.rotate_left_32((((c ^ d) & b) ^ d) + a + xc + u32(0x6b901122), 7) +		d = a + bits.rotate_left_32((((b ^ c) & a) ^ c) + d + xd + u32(0xfd987193), 12) +		c = d + bits.rotate_left_32((((a ^ b) & d) ^ b) + c + xe + u32(0xa679438e), 17) +		b = c + bits.rotate_left_32((((d ^ a) & c) ^ a) + b + xf + u32(0x49b40821), 22) + +		// round 2 +		a = b + bits.rotate_left_32((((b ^ c) & d) ^ c) + a + x1 + u32(0xf61e2562), 5) +		d = a + bits.rotate_left_32((((a ^ b) & c) ^ b) + d + x6 + u32(0xc040b340), 9) +		c = d + bits.rotate_left_32((((d ^ a) & b) ^ a) + c + xb + u32(0x265e5a51), 14) +		b = c + bits.rotate_left_32((((c ^ d) & a) ^ d) + b + x0 + u32(0xe9b6c7aa), 20) +		a = b + bits.rotate_left_32((((b ^ c) & d) ^ c) + a + x5 + u32(0xd62f105d), 5) +		d = a + bits.rotate_left_32((((a ^ b) & c) ^ b) + d + xa + u32(0x02441453), 9) +		c = d + bits.rotate_left_32((((d ^ a) & b) ^ a) + c + xf + u32(0xd8a1e681), 14) +		b = c + bits.rotate_left_32((((c ^ d) & a) ^ d) + b + x4 + u32(0xe7d3fbc8), 20) +		a = b + bits.rotate_left_32((((b ^ c) & d) ^ c) + a + x9 + u32(0x21e1cde6), 5) +		d = a + bits.rotate_left_32((((a ^ b) & c) ^ b) + d + xe + u32(0xc33707d6), 9) +		c = d + bits.rotate_left_32((((d ^ a) & b) ^ a) + c + x3 + u32(0xf4d50d87), 14) +		b = c + bits.rotate_left_32((((c ^ d) & a) ^ d) + b + x8 + u32(0x455a14ed), 20) +		a = b + bits.rotate_left_32((((b ^ c) & d) ^ c) + a + xd + u32(0xa9e3e905), 5) +		d = a + bits.rotate_left_32((((a ^ b) & c) ^ b) + d + x2 + u32(0xfcefa3f8), 9) +		c = d + bits.rotate_left_32((((d ^ a) & b) ^ a) + c + x7 + u32(0x676f02d9), 14) +		b = c + bits.rotate_left_32((((c ^ d) & a) ^ d) + b + xc + u32(0x8d2a4c8a), 20) + +		// round 3 +		a = b + bits.rotate_left_32((b ^ c ^ d) + a + x5 + u32(0xfffa3942), 4) +		d = a + bits.rotate_left_32((a ^ b ^ c) + d + x8 + u32(0x8771f681), 11) +		c = d + bits.rotate_left_32((d ^ a ^ b) + c + xb + u32(0x6d9d6122), 16) +		b = c + bits.rotate_left_32((c ^ d ^ a) + b + xe + u32(0xfde5380c), 23) +		a = b + bits.rotate_left_32((b ^ c ^ d) + a + x1 + u32(0xa4beea44), 4) +		d = a + bits.rotate_left_32((a ^ b ^ c) + d + x4 + u32(0x4bdecfa9), 11) +		c = d + bits.rotate_left_32((d ^ a ^ b) + c + x7 + u32(0xf6bb4b60), 16) +		b = c + bits.rotate_left_32((c ^ d ^ a) + b + xa + u32(0xbebfbc70), 23) +		a = b + bits.rotate_left_32((b ^ c ^ d) + a + xd + u32(0x289b7ec6), 4) +		d = a + bits.rotate_left_32((a ^ b ^ c) + d + x0 + u32(0xeaa127fa), 11) +		c = d + bits.rotate_left_32((d ^ a ^ b) + c + x3 + u32(0xd4ef3085), 16) +		b = c + bits.rotate_left_32((c ^ d ^ a) + b + x6 + u32(0x04881d05), 23) +		a = b + bits.rotate_left_32((b ^ c ^ d) + a + x9 + u32(0xd9d4d039), 4) +		d = a + bits.rotate_left_32((a ^ b ^ c) + d + xc + u32(0xe6db99e5), 11) +		c = d + bits.rotate_left_32((d ^ a ^ b) + c + xf + u32(0x1fa27cf8), 16) +		b = c + bits.rotate_left_32((c ^ d ^ a) + b + x2 + u32(0xc4ac5665), 23) + +		// round 4 +		a = b + bits.rotate_left_32((c ^ (b | ~d)) + a + x0 + u32(0xf4292244), 6) +		d = a + bits.rotate_left_32((b ^ (a | ~c)) + d + x7 + u32(0x432aff97), 10) +		c = d + bits.rotate_left_32((a ^ (d | ~b)) + c + xe + u32(0xab9423a7), 15) +		b = c + bits.rotate_left_32((d ^ (c | ~a)) + b + x5 + u32(0xfc93a039), 21) +		a = b + bits.rotate_left_32((c ^ (b | ~d)) + a + xc + u32(0x655b59c3), 6) +		d = a + bits.rotate_left_32((b ^ (a | ~c)) + d + x3 + u32(0x8f0ccc92), 10) +		c = d + bits.rotate_left_32((a ^ (d | ~b)) + c + xa + u32(0xffeff47d), 15) +		b = c + bits.rotate_left_32((d ^ (c | ~a)) + b + x1 + u32(0x85845dd1), 21) +		a = b + bits.rotate_left_32((c ^ (b | ~d)) + a + x8 + u32(0x6fa87e4f), 6) +		d = a + bits.rotate_left_32((b ^ (a | ~c)) + d + xf + u32(0xfe2ce6e0), 10) +		c = d + bits.rotate_left_32((a ^ (d | ~b)) + c + x6 + u32(0xa3014314), 15) +		b = c + bits.rotate_left_32((d ^ (c | ~a)) + b + xd + u32(0x4e0811a1), 21) +		a = b + bits.rotate_left_32((c ^ (b | ~d)) + a + x4 + u32(0xf7537e82), 6) +		d = a + bits.rotate_left_32((b ^ (a | ~c)) + d + xb + u32(0xbd3af235), 10) +		c = d + bits.rotate_left_32((a ^ (d | ~b)) + c + x2 + u32(0x2ad7d2bb), 15) +		b = c + bits.rotate_left_32((d ^ (c | ~a)) + b + x9 + u32(0xeb86d391), 21) + +		// add saved state +		a += aa +		b += bb +		c += cc +		d += dd +	} + +	// save state +	dig.s[0] = a +	dig.s[1] = b +	dig.s[2] = c +	dig.s[3] = d +}  | 
