vlib.crypto+other: fix mut args

pull/1506/head
joe-conigliaro 2019-08-07 21:37:07 +10:00 committed by Alexander Medvednikov
parent 818c4a14e5
commit 511a3d3901
15 changed files with 53 additions and 43 deletions

View File

@ -747,7 +747,7 @@ fn (v mut V) cc() {
}
$if windows {
if v.os == .msvc {
cc_msvc(v)
cc_msvc(mut v)
return
}
}

View File

@ -47,7 +47,8 @@ pub fn new_cbc(b AesCipher, iv []byte) AesCbc {
pub fn (x &AesCbc) block_size() int { return x.block_size }
pub fn (x &AesCbc) encrypt_blocks(dst, src []byte) {
pub fn (x mut AesCbc) encrypt_blocks(dst mut []byte, src_ []byte) {
mut src := src_
if src.len%x.block_size != 0 {
panic('crypto.cipher: input not full blocks')
}
@ -72,14 +73,14 @@ pub fn (x &AesCbc) encrypt_blocks(dst, src []byte) {
} else {
src = src.right(x.block_size)
}
dst = dst.right(x.block_size)
*dst = dst.right(x.block_size)
}
// Save the iv for the next crypt_blocks call.
copy(x.iv, iv)
}
pub fn (x &AesCbc) decrypt_blocks(dst mut []byte, src []byte) {
pub fn (x mut AesCbc) decrypt_blocks(dst mut []byte, src []byte) {
if src.len%x.block_size != 0 {
panic('crypto.cipher: input not full blocks')
}
@ -105,7 +106,7 @@ pub fn (x &AesCbc) decrypt_blocks(dst mut []byte, src []byte) {
// Loop over all but the first block.
for start > 0 {
x.b.decrypt(dst.slice(start, end), src.slice(start, end))
cipher.xor_bytes(dst.slice(start, end), dst.slice(start, end), src.slice(prev, start))
cipher.xor_bytes(mut dst.slice(start, end), dst.slice(start, end), src.slice(prev, start))
end = start
start = prev
@ -122,7 +123,7 @@ pub fn (x &AesCbc) decrypt_blocks(dst mut []byte, src []byte) {
x.tmp = x.iv
}
fn (x &AesCbc) set_iv(iv []byte) {
fn (x mut AesCbc) set_iv(iv []byte) {
if iv.len != x.iv.len {
panic('cipher: incorrect length IV')
}

View File

@ -21,7 +21,7 @@ fn test_crypto_aes() {
panic('ciphertext is not a multiple of the block size')
}
mode := aes.new_cbc(block, iv)
mode.encrypt_blocks(ciphertext, ciphertext)
mode.encrypt_blocks(mut ciphertext, ciphertext)
assert ciphertext.hex() == 'c210459b514668ddc44674885e4979215265a6c44431a248421254ef357a8c2a308a8bddf5623af9df91737562041cf1'
}

View File

@ -160,7 +160,7 @@ fn rotw(w u32) u32 { return u32(w<<u32(8)) | u32(w>>u32(24)) }
// Key expansion algorithm. See FIPS-197, Figure 11.
// Their rcon[i] is our powx[i-1] << 24.
fn expand_key_generic(key []byte, enc, dec []u32) {
fn expand_key_generic(key []byte, enc mut []u32, dec mut []u32) {
// Encryption key setup.
mut i := 0
nk := key.len / 4

View File

@ -13,10 +13,10 @@ import (
// this is the generiv v version, no arch optimisations
fn new_cipher_generic(key []byte) AesCipher {
n := key.len + 28
c := AesCipher{
mut c := AesCipher{
enc: [u32(0); n]
dec: [u32(0); n]
}
expand_key_generic(key, c.enc, c.dec)
expand_key_generic(key, mut c.enc, mut c.dec)
return c
}

View File

@ -31,6 +31,6 @@ pub fn safe_xor_bytes(dst mut []byte, a, b []byte, n int) {
// fast_xor_words XORs multiples of 4 or 8 bytes (depending on architecture.)
// The slice arguments a and b are assumed to be of equal length.
pub fn xor_words(dst, a, b []byte) {
pub fn xor_words(dst mut []byte, a, b []byte) {
safe_xor_bytes(mut dst, a, b, b.len)
}

View File

@ -55,14 +55,15 @@ pub fn new() *Digest {
return d
}
pub fn (d mut Digest) write(p mut []byte) ?int {
pub fn (d mut Digest) write(p_ []byte) ?int {
mut p := p_
nn := p.len
d.len += u64(nn)
if d.nx > 0 {
n := copy(d.x.right(d.nx), p)
d.nx += n
if d.nx == BlockSize {
block(d, d.x)
block(mut d, d.x)
d.nx = 0
}
if n >= p.len {
@ -73,7 +74,7 @@ pub fn (d mut Digest) write(p mut []byte) ?int {
}
if p.len >= BlockSize {
n := p.len &~ (BlockSize - 1)
block(d, p.left(n))
block(mut d, p.left(n))
if n >= p.len {
p = []byte
} else {
@ -107,7 +108,7 @@ pub fn (d mut Digest) checksum() []byte {
tmp[0] = 0x80
pad := (55 - int(d.len)) % 64 // calculate number of padding bytes
binary.little_endian_put_u64(mut tmp.right(1+pad), u64(d.len<<u64(3))) // append length in bits
d.write(mut tmp.left(1+pad+8))
d.write(tmp.left(1+pad+8))
// The previous write ensures that a whole number of
// blocks (i.e. a multiple of 64 bytes) have been hashed.
@ -127,7 +128,7 @@ pub fn (d mut Digest) checksum() []byte {
// sum returns the MD5 checksum of the data.
pub fn sum(data []byte) []byte {
mut d := new()
d.write(mut data)
d.write(data)
return d.checksum()
}

View File

@ -45,7 +45,7 @@ pub fn new_cipher(key []byte) ?Cipher {
return c
}
// reset zeros the key data and makes the Cipher unusable.
// reset zeros the key data and makes the Cipher unusable.good to com
//
// Deprecated: Reset can't guarantee that the key will be entirely removed from
// the process's memory.
@ -69,7 +69,7 @@ pub fn (c mut Cipher) xor_key_stream(dst mut []byte, src []byte) {
mut i := c.i
mut j := c.j
_ := dst[src.len-1]
dst = dst.left(src.len) // eliminate bounds check from loop
*dst = dst.left(src.len) // eliminate bounds check from loop
for k, v in src {
i += u8(1)
x := c.s[i]

View File

@ -7,7 +7,7 @@ import crypto.rc4
fn test_crypto_rc4() {
key := 'tthisisourrc4key'.bytes()
c := rc4.new_cipher(key) or {
mut c := rc4.new_cipher(key) or {
println(err)
return
}

View File

@ -58,7 +58,8 @@ pub fn new() &Digest {
return d
}
pub fn (d mut Digest) write(p mut []byte) ?int {
pub fn (d mut Digest) write(p_ []byte) ?int {
mut p := p_
nn := p.len
d.len += u64(nn)
@ -108,15 +109,15 @@ fn (d mut Digest) checksum() []byte {
tmp[0] = 0x80
if int(len)%64 < 56 {
d.write(mut tmp.left(56-int(len)%64))
d.write(tmp.left(56-int(len)%64))
} else {
d.write(mut tmp.left(64+56-int(len)%64))
d.write(tmp.left(64+56-int(len)%64))
}
// Length in bits.
len <<= u64(3)
binary.big_endian_put_u64(mut tmp, len)
d.write(mut tmp.left(8))
d.write(tmp.left(8))
mut digest := [byte(0); Size]
@ -132,14 +133,14 @@ fn (d mut Digest) checksum() []byte {
// Sum returns the SHA-1 checksum of the data.
pub fn sum(data []byte) []byte {
mut d := new()
d.write(mut data)
d.write(data)
return d.checksum()
}
fn block(dig &Digest, p []byte) {
// For now just use block_generic until we have specific
// architecture optimized versions
block_generic(dig, p)
block_generic(mut dig, p)
}
pub fn (d &Digest) size() int { return Size }

View File

@ -17,7 +17,8 @@ const (
_K3 = 0xCA62C1D6
)
fn block_generic(dig mut Digest, p []byte) {
fn block_generic(dig mut Digest, p_ []byte) {
mut p := p_
mut w := [u32(0); 16]
mut h0 := dig.h[0]
mut h1 := dig.h[1]

View File

@ -92,7 +92,8 @@ pub fn new224() *Digest {
return d
}
fn (d mut Digest) write(p mut []byte) ?int {
fn (d mut Digest) write(p_ []byte) ?int {
mut p := p_
nn := p.len
d.len += u64(nn)
if d.nx > 0 {
@ -145,15 +146,15 @@ fn (d mut Digest) checksum() []byte {
mut tmp := [byte(0); 64]
tmp[0] = 0x80
if int(len)%64 < 56 {
d.write(mut tmp.left(56-int(len)%64))
d.write(tmp.left(56-int(len)%64))
} else {
d.write(mut tmp.left(64+56-int(len)%64))
d.write(tmp.left(64+56-int(len)%64))
}
// Length in bits.
len <<= u64(3)
binary.big_endian_put_u64(mut tmp, len)
d.write(mut tmp.left(8))
d.write(tmp.left(8))
if d.nx != 0 {
panic('d.nx != 0')
@ -183,14 +184,14 @@ pub fn sum(data []byte) []byte {
// sum256 returns the SHA256 checksum of the data.
pub fn sum256(data []byte) []byte {
mut d := new()
d.write(mut data)
d.write(data)
return d.checksum()
}
// sum224 returns the SHA224 checksum of the data.
pub fn sum224(data []byte) []byte {
mut d := new224()
d.write(mut data)
d.write(data)
sum := d.checksum()
mut sum224 := [byte(0); Size224]
copy(sum224, sum.left(Size224))

View File

@ -80,7 +80,9 @@ const (
]
)
fn block_generic(dig mut Digest, p []byte) {
fn block_generic(dig mut Digest, p_ []byte) {
mut p := p_
mut w := [u32(0); 64]
mut h0 := dig.h[0]

View File

@ -146,7 +146,8 @@ fn new384() *Digest {
return _new(crypto.Hash.SHA384)
}
fn (d mut Digest) write(p mut []byte) ?int {
fn (d mut Digest) write(p_ []byte) ?int {
mut p := p_
nn := p.len
d.len += u64(nn)
if d.nx > 0 {
@ -209,9 +210,9 @@ fn (d mut Digest) checksum() []byte {
tmp[0] = 0x80
if int(len)%128 < 112 {
d.write(mut tmp.left(112-int(len)%128))
d.write(tmp.left(112-int(len)%128))
} else {
d.write(mut tmp.left(128+112-int(len)%128))
d.write(tmp.left(128+112-int(len)%128))
}
// Length in bits.
@ -219,7 +220,7 @@ fn (d mut Digest) checksum() []byte {
binary.big_endian_put_u64(mut tmp, u64(0)) // upper 64 bits are always zero, because len variable has type u64
binary.big_endian_put_u64(mut tmp.right(8), len)
d.write(mut tmp.left(16))
d.write(tmp.left(16))
if d.nx != 0 {
panic('d.nx != 0')
@ -244,14 +245,14 @@ fn (d mut Digest) checksum() []byte {
// sum512 returns the SHA512 checksum of the data.
pub fn sum512(data []byte) []byte {
mut d := _new(crypto.Hash.SHA512)
d.write(mut data)
d.write(data)
return d.checksum()
}
// sum384 returns the SHA384 checksum of the data.
pub fn sum384(data []byte) []byte {
mut d := _new(crypto.Hash.SHA384)
d.write(mut data)
d.write(data)
sum := d.checksum()
mut sum384 := [byte(0); Size384]
copy(sum384, sum.left(Size384))
@ -261,7 +262,7 @@ pub fn sum384(data []byte) []byte {
// sum512_224 returns the Sum512/224 checksum of the data.
pub fn sum512_224(data []byte) []byte {
mut d := _new(crypto.Hash.SHA512_224)
d.write(mut data)
d.write(data)
sum := d.checksum()
mut sum224 := [byte(0); Size224]
copy(sum224, sum.left(Size224))
@ -271,7 +272,7 @@ pub fn sum512_224(data []byte) []byte {
// Sum512_256 returns the Sum512/256 checksum of the data.
pub fn sum512_256(data []byte) []byte {
mut d := _new(crypto.Hash.SHA512_256)
d.write(mut data)
d.write(data)
sum := d.checksum()
mut sum256 := [byte(0); Size256]
copy(sum256, sum.left(Size256))
@ -281,7 +282,7 @@ pub fn sum512_256(data []byte) []byte {
fn block(dig mut Digest, p []byte) {
// For now just use block_generic until we have specific
// architecture optimized versions
block_generic(mut dig, mut p)
block_generic(mut dig, p)
}
pub fn (d &Digest) size() int {

View File

@ -94,7 +94,9 @@ const(
]
)
fn block_generic(dig mut Digest, p mut []byte) {
fn block_generic(dig mut Digest, p_ []byte) {
mut p := p_
mut w := [u64(0); 80]
mut h0 := dig.h[0]