diff --git a/src/crypto/internal/boring/sha.go b/src/crypto/internal/boring/sha.go index cf82f3f64fcbd1bd7f8acc2231760232c0dbf469..b7843674a57a0a83e7136b11e226a9312e2409e2 100644 --- a/src/crypto/internal/boring/sha.go +++ b/src/crypto/internal/boring/sha.go @@ -263,6 +263,20 @@ func (h *sha256Hash) Write(p []byte) (int, error) { return len(p), nil } +func (h *sha256Hash) WriteString(s string) (int, error) { + if len(s) > 0 && C._goboringcrypto_SHA256_Update(h.noescapeCtx(), unsafe.Pointer(unsafe.StringData(s)), C.size_t(len(s))) == 0 { + panic("boringcrypto: SHA256_Update failed") + } + return len(s), nil +} + +func (h *sha256Hash) WriteByte(c byte) error { + if C._goboringcrypto_SHA256_Update(h.noescapeCtx(), unsafe.Pointer(&c), 1) == 0 { + panic("boringcrypto: SHA256_Update failed") + } + return nil +} + func (h0 *sha256Hash) sum(dst []byte) []byte { h := *h0 // make copy so future Write+Sum is valid if C._goboringcrypto_SHA256_Final((*C.uint8_t)(noescape(unsafe.Pointer(&h.out[0]))), h.noescapeCtx()) == 0 { diff --git a/src/crypto/sha256/sha256.go b/src/crypto/sha256/sha256.go index 2deafbc9fcd0f9e59a0e11e7a5bff0cb045befa2..56295452e208a5414a731ae11462550b20b96899 100644 --- a/src/crypto/sha256/sha256.go +++ b/src/crypto/sha256/sha256.go @@ -177,21 +177,35 @@ func (d *digest) Size() int { func (d *digest) BlockSize() int { return BlockSize } func (d *digest) Write(p []byte) (nn int, err error) { - boring.Unreachable() nn = len(p) d.len += uint64(nn) - if d.nx > 0 { - n := copy(d.x[d.nx:], p) - d.nx += n - if d.nx == chunk { - block(d, d.x[:]) - d.nx = 0 - } + n := fillChunk(d, p) + p = p[n:] + if len(p) >= chunk { + n := len(p) &^ (chunk - 1) + block(d, p[:n]) p = p[n:] } + if len(p) > 0 { + d.nx = copy(d.x[:], p) + } + return +} + +func (d *digest) WriteString(p string) (nn int, err error) { + nn = len(p) + d.len += uint64(nn) + n := fillChunk(d, p) + + // This duplicates the code in Write, except that it calls + // blockString rather than block. It would be nicer to pass + // in a func, but as of this writing (Go 1.20) that causes + // memory allocations that we want to avoid. + + p = p[n:] if len(p) >= chunk { n := len(p) &^ (chunk - 1) - block(d, p[:n]) + blockString(d, p[:n]) p = p[n:] } if len(p) > 0 { @@ -200,6 +214,33 @@ func (d *digest) Write(p []byte) (nn int, err error) { return } +// fillChunk fills the remainder of the current chunk, if any. +func fillChunk[S []byte | string](d *digest, p S) int { + boring.Unreachable() + if d.nx == 0 { + return 0 + } + n := copy(d.x[d.nx:], p) + d.nx += n + if d.nx == chunk { + block(d, d.x[:]) + d.nx = 0 + } + return n +} + +func (d *digest) WriteByte(c byte) error { + boring.Unreachable() + d.len++ + d.x[d.nx] = c + d.nx++ + if d.nx == chunk { + block(d, d.x[:]) + d.nx = 0 + } + return nil +} + func (d *digest) Sum(in []byte) []byte { boring.Unreachable() // Make a copy of d so that caller can keep writing and summing. diff --git a/src/crypto/sha256/sha256_test.go b/src/crypto/sha256/sha256_test.go index 7304678346b32e9ecc60197f3b911ef048c6bced..90353c467eaa8e5eedfa8ba4dc9513c829810213 100644 --- a/src/crypto/sha256/sha256_test.go +++ b/src/crypto/sha256/sha256_test.go @@ -113,6 +113,14 @@ func TestGolden(t *testing.T) { } c.Reset() } + bw := c.(io.ByteWriter) + for i := 0; i < len(g.in); i++ { + bw.WriteByte(g.in[i]) + } + s = fmt.Sprintf("%x", c.Sum(nil)) + if s != g.out { + t.Errorf("sha256[WriteByte](%s) = %s want %s", g.in, s, g.out) + } } for i := 0; i < len(golden224); i++ { g := golden224[i] @@ -297,7 +305,8 @@ func TestAllocations(t *testing.T) { if boring.Enabled { t.Skip("BoringCrypto doesn't allocate the same way as stdlib") } - in := []byte("hello, world!") + const ins = "hello, world!" + in := []byte(ins) out := make([]byte, 0, Size) h := New() n := int(testing.AllocsPerRun(10, func() { @@ -308,6 +317,28 @@ func TestAllocations(t *testing.T) { if n > 0 { t.Errorf("allocs = %d, want 0", n) } + + sw := h.(io.StringWriter) + n = int(testing.AllocsPerRun(10, func() { + h.Reset() + sw.WriteString(ins) + out = h.Sum(out[:0]) + })) + if n > 0 { + t.Errorf("string allocs = %d, want 0", n) + } + + bw := h.(io.ByteWriter) + n = int(testing.AllocsPerRun(10, func() { + h.Reset() + for _, b := range in { + bw.WriteByte(b) + } + out = h.Sum(out[:0]) + })) + if n > 0 { + t.Errorf("byte allocs = %d, want 0", n) + } } type cgoData struct { diff --git a/src/crypto/sha256/sha256block.go b/src/crypto/sha256/sha256block.go index bd2f9da93ce847880142bfae645584ee4e09c442..418bf0ce294339da09164b75648e28ec800df1a2 100644 --- a/src/crypto/sha256/sha256block.go +++ b/src/crypto/sha256/sha256block.go @@ -77,7 +77,7 @@ var _K = []uint32{ 0xc67178f2, } -func blockGeneric(dig *digest, p []byte) { +func blockGeneric[S []byte | string](dig *digest, p S) { var w [64]uint32 h0, h1, h2, h3, h4, h5, h6, h7 := dig.h[0], dig.h[1], dig.h[2], dig.h[3], dig.h[4], dig.h[5], dig.h[6], dig.h[7] for len(p) >= chunk { diff --git a/src/crypto/sha256/sha256block_386.s b/src/crypto/sha256/sha256block_386.s index 086a0ab25c88c68bcd819b9a68cccd51663a911e..ad23491d02d2b691bfe03a5d62580896f8ed92e3 100644 --- a/src/crypto/sha256/sha256block_386.s +++ b/src/crypto/sha256/sha256block_386.s @@ -141,9 +141,9 @@ MSGSCHEDULE1(index); \ SHA256ROUND(index, const, a, b, c, d, e, f, g, h) -TEXT ·block(SB),0,$296-16 - MOVL p_base+4(FP), SI - MOVL p_len+8(FP), DX +TEXT ·doBlock(SB),0,$296-12 + MOVL p+4(FP), SI + MOVL n+8(FP), DX SHRL $6, DX SHLL $6, DX diff --git a/src/crypto/sha256/sha256block_amd64.s b/src/crypto/sha256/sha256block_amd64.s index 03535fb51ca2cf4f1fc1261ad35e05c5334102c7..6a028c6f53abe295734242f4d98f166e41263a41 100644 --- a/src/crypto/sha256/sha256block_amd64.s +++ b/src/crypto/sha256/sha256block_amd64.s @@ -619,14 +619,14 @@ SHA256RNDS2 msg, state1, state0 \ sha256Msg1 (m,a) -TEXT ·block(SB), 0, $536-32 +TEXT ·doBlock(SB), 0, $536-24 CMPB ·useSHA(SB), $1 JE sha_ni CMPB ·useAVX2(SB), $1 JE avx2 - MOVQ p_base+8(FP), SI - MOVQ p_len+16(FP), DX + MOVQ p+8(FP), SI + MOVQ n+16(FP), DX SHRQ $6, DX SHLQ $6, DX @@ -741,8 +741,8 @@ end: avx2: MOVQ dig+0(FP), CTX // d.h[8] - MOVQ p_base+8(FP), INP - MOVQ p_len+16(FP), NUM_BYTES + MOVQ p+8(FP), INP + MOVQ n+16(FP), NUM_BYTES LEAQ -64(INP)(NUM_BYTES*1), NUM_BYTES // Pointer to the last block MOVQ NUM_BYTES, _INP_END(SP) @@ -935,8 +935,8 @@ done_hash: sha_ni: MOVQ dig+0(FP), digestPtr // init digest hash vector H0, H1,..., H7 pointer - MOVQ p_base+8(FP), dataPtr // init input data base pointer - MOVQ p_len+16(FP), numBytes // get number of input bytes to hash + MOVQ p+8(FP), dataPtr // init input data base pointer + MOVQ n+16(FP), numBytes // get number of input bytes to hash SHRQ $6, numBytes // force modulo 64 input buffer length SHLQ $6, numBytes CMPQ numBytes, $0 // exit early for zero-length input buffer diff --git a/src/crypto/sha256/sha256block_arm64.go b/src/crypto/sha256/sha256block_arm64.go index e5da5663631556e8cc36c2adb024c406705d40d4..a2f1a2ba76449fb75631883391ac3d2a5c00dc00 100644 --- a/src/crypto/sha256/sha256block_arm64.go +++ b/src/crypto/sha256/sha256block_arm64.go @@ -4,18 +4,30 @@ package sha256 -import "internal/cpu" +import ( + "internal/cpu" + "unsafe" +) var k = _K //go:noescape -func sha256block(h []uint32, p []byte, k []uint32) +func sha256block(h []uint32, p *byte, n int, k []uint32) func block(dig *digest, p []byte) { if !cpu.ARM64.HasSHA2 { blockGeneric(dig, p) } else { h := dig.h[:] - sha256block(h, p, k) + sha256block(h, unsafe.SliceData(p), len(p), k) + } +} + +func blockString(dig *digest, s string) { + if !cpu.ARM64.HasSHA2 { + blockGeneric(dig, s) + } else { + h := dig.h[:] + sha256block(h, unsafe.StringData(s), len(s), k) } } diff --git a/src/crypto/sha256/sha256block_arm64.s b/src/crypto/sha256/sha256block_arm64.s index d5c1eb0b2e15ac92045fb80e973f9bb7b5dac19f..040f162ac4bf6cb30126193d022322cc02d9ba53 100644 --- a/src/crypto/sha256/sha256block_arm64.s +++ b/src/crypto/sha256/sha256block_arm64.s @@ -9,12 +9,12 @@ SHA256H2 V9.S4, V8, V3 \ VMOV V2.B16, V8.B16 -// func sha256block(h []uint32, p []byte, k []uint32) +// func sha256block(h []uint32, p *byte, n int, k []uint32) TEXT ·sha256block(SB),NOSPLIT,$0 MOVD h_base+0(FP), R0 // Hash value first address - MOVD p_base+24(FP), R1 // message first address - MOVD k_base+48(FP), R2 // k constants first address - MOVD p_len+32(FP), R3 // message length + MOVD p+24(FP), R1 // message first address + MOVD k_base+40(FP), R2 // k constants first address + MOVD n+32(FP), R3 // message length VLD1 (R0), [V0.S4, V1.S4] // load h(a,b,c,d,e,f,g,h) VLD1.P 64(R2), [V16.S4, V17.S4, V18.S4, V19.S4] VLD1.P 64(R2), [V20.S4, V21.S4, V22.S4, V23.S4] diff --git a/src/crypto/sha256/sha256block_decl.go b/src/crypto/sha256/sha256block_decl.go index 7d68cd95fe440fb5834ae649e89879bb302368af..28834a2972ce52672440cc75de5c0f5f7c590eef 100644 --- a/src/crypto/sha256/sha256block_decl.go +++ b/src/crypto/sha256/sha256block_decl.go @@ -6,5 +6,15 @@ package sha256 +import "unsafe" + //go:noescape -func block(dig *digest, p []byte) +func doBlock(dig *digest, p *byte, n int) + +func block(dig *digest, p []byte) { + doBlock(dig, unsafe.SliceData(p), len(p)) +} + +func blockString(dig *digest, s string) { + doBlock(dig, unsafe.StringData(s), len(s)) +} diff --git a/src/crypto/sha256/sha256block_generic.go b/src/crypto/sha256/sha256block_generic.go index fd098bec894be5215b803627d39861984765391f..2240c0087e920861f4e89f1c35c29b38ed9439cb 100644 --- a/src/crypto/sha256/sha256block_generic.go +++ b/src/crypto/sha256/sha256block_generic.go @@ -9,3 +9,7 @@ package sha256 func block(dig *digest, p []byte) { blockGeneric(dig, p) } + +func blockString(dig *digest, s string) { + blockGeneric(dig, s) +} diff --git a/src/crypto/sha256/sha256block_ppc64x.s b/src/crypto/sha256/sha256block_ppc64x.s index b229ef619a35bcb729967492c31ed4c27b506a1e..b238b57cc3feb4bde62f13712709563a70b0ed32 100644 --- a/src/crypto/sha256/sha256block_ppc64x.s +++ b/src/crypto/sha256/sha256block_ppc64x.s @@ -284,11 +284,11 @@ GLOBL ·kcon(SB), RODATA, $1088 #define VPERMLE(va,vb,vc,vt) #endif -// func block(dig *digest, p []byte) -TEXT ·block(SB),0,$0-32 +// func doBlock(dig *digest, p []byte) +TEXT ·doBlock(SB),0,$0-24 MOVD dig+0(FP), CTX - MOVD p_base+8(FP), INP - MOVD p_len+16(FP), LEN + MOVD p+8(FP), INP + MOVD n+16(FP), LEN SRD $6, LEN SLD $6, LEN diff --git a/src/crypto/sha256/sha256block_s390x.go b/src/crypto/sha256/sha256block_s390x.go index 1a376c5f93531897c5b2f5c9a65855e16b5e3356..2887c12c504f1ee225aa2da856b3c4ffa7201af1 100644 --- a/src/crypto/sha256/sha256block_s390x.go +++ b/src/crypto/sha256/sha256block_s390x.go @@ -4,6 +4,13 @@ package sha256 -import "internal/cpu" +import ( + "internal/cpu" + "unsafe" +) var useAsm = cpu.S390X.HasSHA256 + +func doBlockGeneric(dig *digest, p *byte, n int) { + blockGeneric(dig, unsafe.String(p, n)) +} diff --git a/src/crypto/sha256/sha256block_s390x.s b/src/crypto/sha256/sha256block_s390x.s index 81b1b382c76a51a9569b353ee5e3eaf3a34b733c..8f83a9426b286b2d8a6903bd2bdf47aa3c51f143 100644 --- a/src/crypto/sha256/sha256block_s390x.s +++ b/src/crypto/sha256/sha256block_s390x.s @@ -4,10 +4,10 @@ #include "textflag.h" -// func block(dig *digest, p []byte) -TEXT ·block(SB), NOSPLIT|NOFRAME, $0-32 +// func doBlock(dig *digest, p *byte, n int) +TEXT ·doBlock(SB), NOSPLIT|NOFRAME, $0-24 MOVBZ ·useAsm(SB), R4 - LMG dig+0(FP), R1, R3 // R2 = &p[0], R3 = len(p) + LMG dig+0(FP), R1, R3 // R2 = p, R3 = n MOVBZ $2, R0 // SHA-256 function code CMPBEQ R4, $0, generic @@ -17,4 +17,4 @@ loop: RET generic: - BR ·blockGeneric(SB) + BR ·doBlockGeneric(SB)