29 #include <emmintrin.h>
35 [[nodiscard]]
static constexpr uint32_t rol32(uint32_t value,
int bits)
37 return (value << bits) | (value >> (32 - bits));
44 [[nodiscard]] uint32_t next0(
int i)
49 [[nodiscard]] uint32_t next(
int i)
51 return data[i & 15] = rol32(
52 data[(i + 13) & 15] ^ data[(i + 8) & 15] ^
53 data[(i + 2) & 15] ^ data[ i & 15]
61 void r0(uint32_t v, uint32_t& w, uint32_t
x, uint32_t y, uint32_t& z,
int i)
63 z += ((w & (
x ^ y)) ^ y) + next0(i) + 0x5A827999 + rol32(v, 5);
66 void r1(uint32_t v, uint32_t& w, uint32_t
x, uint32_t y, uint32_t& z,
int i)
68 z += ((w & (
x ^ y)) ^ y) + next(i) + 0x5A827999 + rol32(v, 5);
71 void r2(uint32_t v, uint32_t& w, uint32_t
x, uint32_t y, uint32_t& z,
int i)
73 z += (w ^
x ^ y) + next(i) + 0x6ED9EBA1 + rol32(v, 5);
76 void r3(uint32_t v, uint32_t& w, uint32_t
x, uint32_t y, uint32_t& z,
int i)
78 z += (((w |
x) & y) | (w &
x)) + next(i) + 0x8F1BBCDC + rol32(v, 5);
81 void r4(uint32_t v, uint32_t& w, uint32_t
x, uint32_t y, uint32_t& z,
int i)
83 z += (w ^
x ^ y) + next(i) + 0xCA62C1D6 + rol32(v, 5);
90 memcpy(data, buffer,
sizeof(data));
103 if (hex.size() != 40) {
104 throw MSXException(
"Invalid sha1, should be exactly 40 digits long: ", hex);
111 [[nodiscard]]
static inline __m128i _mm_cmpge_epu8(__m128i a, __m128i b)
113 return _mm_cmpeq_epi8(_mm_max_epu8(a, b), a);
116 [[nodiscard]]
static inline __m128i _mm_cmple_epu8(__m128i a, __m128i b)
118 return _mm_cmpge_epu8(b, a);
122 [[nodiscard]]
static inline uint64_t loadSwap64(
const char* s)
129 [[nodiscard]]
static unsigned hex(
char x,
const char* str)
131 if ((
'0' <=
x) && (
x <=
'9'))
return x -
'0';
132 if ((
'a' <=
x) && (
x <=
'f'))
return x -
'a' + 10;
133 if ((
'A' <=
x) && (
x <=
'F'))
return x -
'A' + 10;
134 throw MSXException(
"Invalid sha1, digits should be 0-9, a-f: ",
135 std::string_view(str, 40));
145 __m128i s0 = _mm_set_epi64x(loadSwap64(str + 8), loadSwap64(str + 0));
146 __m128i s1 = _mm_set_epi64x(loadSwap64(str + 24), loadSwap64(str + 16));
147 __m128i s2 = _mm_set_epi64x(
'0' * 0x0101010101010101, loadSwap64(str + 32));
150 __m128i cc0 = _mm_set1_epi8(
char(-
'0'));
151 __m128i s0_0 = _mm_add_epi8(s0, cc0);
152 __m128i s1_0 = _mm_add_epi8(s1, cc0);
153 __m128i s2_0 = _mm_add_epi8(s2, cc0);
156 __m128i c32 = _mm_set1_epi8(32);
157 __m128i cca = _mm_set1_epi8(
char(-
'a'));
158 __m128i s0_a = _mm_add_epi8(_mm_or_si128(s0, c32), cca);
159 __m128i s1_a = _mm_add_epi8(_mm_or_si128(s1, c32), cca);
160 __m128i s2_a = _mm_add_epi8(_mm_or_si128(s2, c32), cca);
163 __m128i c9 = _mm_set1_epi8(9);
164 __m128i c0_0 = _mm_cmple_epu8(s0_0, c9);
165 __m128i c1_0 = _mm_cmple_epu8(s1_0, c9);
166 __m128i c2_0 = _mm_cmple_epu8(s2_0, c9);
169 __m128i c5 = _mm_set1_epi8(5);
170 __m128i c0_a = _mm_cmple_epu8(s0_a, c5);
171 __m128i c1_a = _mm_cmple_epu8(s1_a, c5);
172 __m128i c2_a = _mm_cmple_epu8(s2_a, c5);
175 __m128i ok0 = _mm_or_si128(c0_0, c0_a);
176 __m128i ok1 = _mm_or_si128(c1_0, c1_a);
177 __m128i ok2 = _mm_or_si128(c2_0, c2_a);
178 __m128i ok = _mm_and_si128(_mm_and_si128(ok0, ok1), ok2);
179 if (
unlikely(_mm_movemask_epi8(ok) != 0xffff)) {
180 throw MSXException(
"Invalid sha1, digits should be 0-9, a-f: ",
181 std::string_view(str, 40));
185 __m128i d0_0 = _mm_and_si128(s0_0, c0_0);
186 __m128i d1_0 = _mm_and_si128(s1_0, c1_0);
187 __m128i d2_0 = _mm_and_si128(s2_0, c2_0);
190 __m128i c10 = _mm_set1_epi8(10);
191 __m128i d0_a = _mm_and_si128(_mm_add_epi8(s0_a, c10), c0_a);
192 __m128i d1_a = _mm_and_si128(_mm_add_epi8(s1_a, c10), c1_a);
193 __m128i d2_a = _mm_and_si128(_mm_add_epi8(s2_a, c10), c2_a);
196 __m128i d0 = _mm_or_si128(d0_0, d0_a);
197 __m128i d1 = _mm_or_si128(d1_0, d1_a);
198 __m128i d2 = _mm_or_si128(d2_0, d2_a);
201 __m128i c00ff = _mm_set1_epi16(0x00ff);
202 __m128i e0 = _mm_and_si128(_mm_or_si128(d0, _mm_srli_epi16(d0, 4)), c00ff);
203 __m128i e1 = _mm_and_si128(_mm_or_si128(d1, _mm_srli_epi16(d1, 4)), c00ff);
204 __m128i e2 = _mm_and_si128(_mm_or_si128(d2, _mm_srli_epi16(d2, 4)), c00ff);
205 __m128i f0 = _mm_packus_epi16(e0, e0);
206 __m128i f1 = _mm_packus_epi16(e1, e1);
207 __m128i f2 = _mm_packus_epi16(e2, e2);
210 _mm_storeu_si128(
reinterpret_cast<__m128i*
>(a), _mm_unpacklo_epi64(f0, f1));
211 a[4] = _mm_cvtsi128_si32(f2);
226 [[nodiscard]]
static constexpr
char digit(
unsigned x)
228 return (
x < 10) ? (
x +
'0') : (
x - 10 +
'a');
234 for (
const auto& ai : a) {
235 for (
int j = 28; j >= 0; j -= 4) {
236 *p++ = digit((ai >> j) & 0xf);
259 m_state.a[0] = 0x67452301;
260 m_state.a[1] = 0xEFCDAB89;
261 m_state.a[2] = 0x98BADCFE;
262 m_state.a[3] = 0x10325476;
263 m_state.a[4] = 0xC3D2E1F0;
266 void SHA1::transform(
const uint8_t buffer[64])
271 uint32_t a = m_state.a[0];
272 uint32_t b = m_state.a[1];
273 uint32_t c = m_state.a[2];
274 uint32_t d = m_state.a[3];
275 uint32_t e = m_state.a[4];
278 block.r0(a,b,c,d,e, 0); block.r0(e,a,b,c,d, 1); block.r0(d,e,a,b,c, 2);
279 block.r0(c,d,e,a,b, 3); block.r0(b,c,d,e,a, 4); block.r0(a,b,c,d,e, 5);
280 block.r0(e,a,b,c,d, 6); block.r0(d,e,a,b,c, 7); block.r0(c,d,e,a,b, 8);
281 block.r0(b,c,d,e,a, 9); block.r0(a,b,c,d,e,10); block.r0(e,a,b,c,d,11);
282 block.r0(d,e,a,b,c,12); block.r0(c,d,e,a,b,13); block.r0(b,c,d,e,a,14);
283 block.r0(a,b,c,d,e,15); block.r1(e,a,b,c,d,16); block.r1(d,e,a,b,c,17);
284 block.r1(c,d,e,a,b,18); block.r1(b,c,d,e,a,19); block.r2(a,b,c,d,e,20);
285 block.r2(e,a,b,c,d,21); block.r2(d,e,a,b,c,22); block.r2(c,d,e,a,b,23);
286 block.r2(b,c,d,e,a,24); block.r2(a,b,c,d,e,25); block.r2(e,a,b,c,d,26);
287 block.r2(d,e,a,b,c,27); block.r2(c,d,e,a,b,28); block.r2(b,c,d,e,a,29);
288 block.r2(a,b,c,d,e,30); block.r2(e,a,b,c,d,31); block.r2(d,e,a,b,c,32);
289 block.r2(c,d,e,a,b,33); block.r2(b,c,d,e,a,34); block.r2(a,b,c,d,e,35);
290 block.r2(e,a,b,c,d,36); block.r2(d,e,a,b,c,37); block.r2(c,d,e,a,b,38);
291 block.r2(b,c,d,e,a,39); block.r3(a,b,c,d,e,40); block.r3(e,a,b,c,d,41);
292 block.r3(d,e,a,b,c,42); block.r3(c,d,e,a,b,43); block.r3(b,c,d,e,a,44);
293 block.r3(a,b,c,d,e,45); block.r3(e,a,b,c,d,46); block.r3(d,e,a,b,c,47);
294 block.r3(c,d,e,a,b,48); block.r3(b,c,d,e,a,49); block.r3(a,b,c,d,e,50);
295 block.r3(e,a,b,c,d,51); block.r3(d,e,a,b,c,52); block.r3(c,d,e,a,b,53);
296 block.r3(b,c,d,e,a,54); block.r3(a,b,c,d,e,55); block.r3(e,a,b,c,d,56);
297 block.r3(d,e,a,b,c,57); block.r3(c,d,e,a,b,58); block.r3(b,c,d,e,a,59);
298 block.r4(a,b,c,d,e,60); block.r4(e,a,b,c,d,61); block.r4(d,e,a,b,c,62);
299 block.r4(c,d,e,a,b,63); block.r4(b,c,d,e,a,64); block.r4(a,b,c,d,e,65);
300 block.r4(e,a,b,c,d,66); block.r4(d,e,a,b,c,67); block.r4(c,d,e,a,b,68);
301 block.r4(b,c,d,e,a,69); block.r4(a,b,c,d,e,70); block.r4(e,a,b,c,d,71);
302 block.r4(d,e,a,b,c,72); block.r4(c,d,e,a,b,73); block.r4(b,c,d,e,a,74);
303 block.r4(a,b,c,d,e,75); block.r4(e,a,b,c,d,76); block.r4(d,e,a,b,c,77);
304 block.r4(c,d,e,a,b,78); block.r4(b,c,d,e,a,79);
317 const uint8_t* data = data_.
data();
318 size_t len = data_.
size();
320 assert(!m_finalized);
321 uint32_t j = m_count & 63;
326 if ((j + len) > 63) {
327 memcpy(&m_buffer[j], data, (i = 64 - j));
329 for (; i + 63 < len; i += 64) {
336 memcpy(&m_buffer[j], &data[i], len - i);
339 void SHA1::finalize()
341 assert(!m_finalized);
343 uint32_t j = m_count & 63;
344 m_buffer[j++] = 0x80;
346 memset(&m_buffer[j], 0, 64 - j);
350 memset(&m_buffer[j], 0, 56 - j);
352 memcpy(&m_buffer[56], &finalCount, 8);
360 if (!m_finalized) finalize();
Helper class to perform a sha1 calculation.
Sha1Sum digest()
Get the final hash.
void update(span< const uint8_t > data)
Incrementally calculate the hash value.
static Sha1Sum calc(span< const uint8_t > data)
Easier to use interface, if you can pass all data in one go.
This class represents the result of a sha1 calculation (a 160-bit value).
void parse40(const char *str)
Parse from a 40-character long buffer.
std::string toString() const
void r1(uint32_t v, uint32_t &w, uint32_t x, uint32_t y, uint32_t &z, int i)
void r2(uint32_t v, uint32_t &w, uint32_t x, uint32_t y, uint32_t &z, int i)
WorkspaceBlock(const uint8_t buffer[64])
void r4(uint32_t v, uint32_t &w, uint32_t x, uint32_t y, uint32_t &z, int i)
void r0(uint32_t v, uint32_t &w, uint32_t x, uint32_t y, uint32_t &z, int i)
void r3(uint32_t v, uint32_t &w, uint32_t x, uint32_t y, uint32_t &z, int i)
constexpr pointer data() const noexcept
constexpr index_type size() const noexcept
ALWAYS_INLINE uint64_t read_UA_B64(const void *p)
uint32_t readB32(const void *p)
This file implemented 3 utility functions:
constexpr KeyMatrixPosition x
Keyboard bindings.
void fill(ForwardRange &&range, const T &value)
bool all_of(InputRange &&range, UnaryPredicate pred)
constexpr void repeat(T n, Op op)
Repeat the given operation 'op' 'n' times.