mirror of
https://github.com/python/cpython.git
synced 2024-11-21 12:59:38 +01:00
c2627d6eea
This PR adds the ability to enable the GIL if it was disabled at interpreter startup, and modifies the multi-phase module initialization path to enable the GIL when loading a module, unless that module's spec includes a slot indicating it can run safely without the GIL. PEP 703 called the constant for the slot `Py_mod_gil_not_used`; I went with `Py_MOD_GIL_NOT_USED` for consistency with gh-104148. A warning will be issued up to once per interpreter for the first GIL-using module that is loaded. If `-v` is given, a shorter message will be printed to stderr every time a GIL-using module is loaded (including the first one that issues a warning).
889 lines
22 KiB
C
889 lines
22 KiB
C
/* SHA2 module */
|
|
|
|
/* This provides an interface to NIST's SHA2 224, 256, 384, & 512 Algorithms */
|
|
|
|
/* See below for information about the original code this module was
|
|
based upon. Additional work performed by:
|
|
|
|
Andrew Kuchling (amk@amk.ca)
|
|
Greg Stein (gstein@lyra.org)
|
|
Trevor Perrin (trevp@trevp.net)
|
|
Jonathan Protzenko (jonathan@protzenko.fr)
|
|
|
|
Copyright (C) 2005-2007 Gregory P. Smith (greg@krypto.org)
|
|
Licensed to PSF under a Contributor Agreement.
|
|
|
|
*/
|
|
|
|
/* SHA objects */
|
|
#ifndef Py_BUILD_CORE_BUILTIN
|
|
# define Py_BUILD_CORE_MODULE 1
|
|
#endif
|
|
|
|
#include "Python.h"
|
|
#include "pycore_bitutils.h" // _Py_bswap32()
|
|
#include "pycore_moduleobject.h" // _PyModule_GetState()
|
|
#include "pycore_typeobject.h" // _PyType_GetModuleState()
|
|
#include "pycore_strhex.h" // _Py_strhex()
|
|
|
|
#include "hashlib.h"
|
|
|
|
/*[clinic input]
|
|
module _sha2
|
|
class SHA256Type "SHA256object *" "&PyType_Type"
|
|
class SHA512Type "SHA512object *" "&PyType_Type"
|
|
[clinic start generated code]*/
|
|
/*[clinic end generated code: output=da39a3ee5e6b4b0d input=b5315a7b611c9afc]*/
|
|
|
|
|
|
/* The SHA block sizes and maximum message digest sizes, in bytes */
|
|
|
|
#define SHA256_BLOCKSIZE 64
|
|
#define SHA256_DIGESTSIZE 32
|
|
#define SHA512_BLOCKSIZE 128
|
|
#define SHA512_DIGESTSIZE 64
|
|
|
|
/* Our SHA2 implementations defer to the HACL* verified library. */
|
|
|
|
#include "_hacl/Hacl_Hash_SHA2.h"
|
|
|
|
// TODO: Get rid of int digestsize in favor of Hacl state info?
|
|
|
|
typedef struct {
|
|
PyObject_HEAD
|
|
int digestsize;
|
|
// Prevents undefined behavior via multiple threads entering the C API.
|
|
bool use_mutex;
|
|
PyMutex mutex;
|
|
Hacl_Hash_SHA2_state_t_256 *state;
|
|
} SHA256object;
|
|
|
|
typedef struct {
|
|
PyObject_HEAD
|
|
int digestsize;
|
|
// Prevents undefined behavior via multiple threads entering the C API.
|
|
bool use_mutex;
|
|
PyMutex mutex;
|
|
Hacl_Hash_SHA2_state_t_512 *state;
|
|
} SHA512object;
|
|
|
|
#include "clinic/sha2module.c.h"
|
|
|
|
/* We shall use run-time type information in the remainder of this module to
|
|
* tell apart SHA2-224 and SHA2-256 */
|
|
typedef struct {
|
|
PyTypeObject* sha224_type;
|
|
PyTypeObject* sha256_type;
|
|
PyTypeObject* sha384_type;
|
|
PyTypeObject* sha512_type;
|
|
} sha2_state;
|
|
|
|
static inline sha2_state*
|
|
sha2_get_state(PyObject *module)
|
|
{
|
|
void *state = _PyModule_GetState(module);
|
|
assert(state != NULL);
|
|
return (sha2_state *)state;
|
|
}
|
|
|
|
static void SHA256copy(SHA256object *src, SHA256object *dest)
|
|
{
|
|
dest->digestsize = src->digestsize;
|
|
dest->state = Hacl_Hash_SHA2_copy_256(src->state);
|
|
}
|
|
|
|
static void SHA512copy(SHA512object *src, SHA512object *dest)
|
|
{
|
|
dest->digestsize = src->digestsize;
|
|
dest->state = Hacl_Hash_SHA2_copy_512(src->state);
|
|
}
|
|
|
|
static SHA256object *
|
|
newSHA224object(sha2_state *state)
|
|
{
|
|
SHA256object *sha = (SHA256object *)PyObject_GC_New(
|
|
SHA256object, state->sha224_type);
|
|
if (!sha) {
|
|
return NULL;
|
|
}
|
|
HASHLIB_INIT_MUTEX(sha);
|
|
|
|
PyObject_GC_Track(sha);
|
|
return sha;
|
|
}
|
|
|
|
static SHA256object *
|
|
newSHA256object(sha2_state *state)
|
|
{
|
|
SHA256object *sha = (SHA256object *)PyObject_GC_New(
|
|
SHA256object, state->sha256_type);
|
|
if (!sha) {
|
|
return NULL;
|
|
}
|
|
HASHLIB_INIT_MUTEX(sha);
|
|
|
|
PyObject_GC_Track(sha);
|
|
return sha;
|
|
}
|
|
|
|
static SHA512object *
|
|
newSHA384object(sha2_state *state)
|
|
{
|
|
SHA512object *sha = (SHA512object *)PyObject_GC_New(
|
|
SHA512object, state->sha384_type);
|
|
if (!sha) {
|
|
return NULL;
|
|
}
|
|
HASHLIB_INIT_MUTEX(sha);
|
|
|
|
PyObject_GC_Track(sha);
|
|
return sha;
|
|
}
|
|
|
|
static SHA512object *
|
|
newSHA512object(sha2_state *state)
|
|
{
|
|
SHA512object *sha = (SHA512object *)PyObject_GC_New(
|
|
SHA512object, state->sha512_type);
|
|
if (!sha) {
|
|
return NULL;
|
|
}
|
|
HASHLIB_INIT_MUTEX(sha);
|
|
|
|
PyObject_GC_Track(sha);
|
|
return sha;
|
|
}
|
|
|
|
/* Internal methods for our hash objects. */
|
|
|
|
static int
|
|
SHA2_traverse(PyObject *ptr, visitproc visit, void *arg)
|
|
{
|
|
Py_VISIT(Py_TYPE(ptr));
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
SHA256_dealloc(SHA256object *ptr)
|
|
{
|
|
Hacl_Hash_SHA2_free_256(ptr->state);
|
|
PyTypeObject *tp = Py_TYPE(ptr);
|
|
PyObject_GC_UnTrack(ptr);
|
|
PyObject_GC_Del(ptr);
|
|
Py_DECREF(tp);
|
|
}
|
|
|
|
static void
|
|
SHA512_dealloc(SHA512object *ptr)
|
|
{
|
|
Hacl_Hash_SHA2_free_512(ptr->state);
|
|
PyTypeObject *tp = Py_TYPE(ptr);
|
|
PyObject_GC_UnTrack(ptr);
|
|
PyObject_GC_Del(ptr);
|
|
Py_DECREF(tp);
|
|
}
|
|
|
|
/* HACL* takes a uint32_t for the length of its parameter, but Py_ssize_t can be
|
|
* 64 bits so we loop in <4gig chunks when needed. */
|
|
|
|
static void update_256(Hacl_Hash_SHA2_state_t_256 *state, uint8_t *buf, Py_ssize_t len) {
|
|
/* Note: we explicitly ignore the error code on the basis that it would take >
|
|
* 1 billion years to overflow the maximum admissible length for SHA2-256
|
|
* (namely, 2^61-1 bytes). */
|
|
#if PY_SSIZE_T_MAX > UINT32_MAX
|
|
while (len > UINT32_MAX) {
|
|
Hacl_Hash_SHA2_update_256(state, buf, UINT32_MAX);
|
|
len -= UINT32_MAX;
|
|
buf += UINT32_MAX;
|
|
}
|
|
#endif
|
|
/* Cast to uint32_t is safe: len <= UINT32_MAX at this point. */
|
|
Hacl_Hash_SHA2_update_256(state, buf, (uint32_t) len);
|
|
}
|
|
|
|
static void update_512(Hacl_Hash_SHA2_state_t_512 *state, uint8_t *buf, Py_ssize_t len) {
|
|
/* Note: we explicitly ignore the error code on the basis that it would take >
|
|
* 1 billion years to overflow the maximum admissible length for this API
|
|
* (namely, 2^64-1 bytes). */
|
|
#if PY_SSIZE_T_MAX > UINT32_MAX
|
|
while (len > UINT32_MAX) {
|
|
Hacl_Hash_SHA2_update_512(state, buf, UINT32_MAX);
|
|
len -= UINT32_MAX;
|
|
buf += UINT32_MAX;
|
|
}
|
|
#endif
|
|
/* Cast to uint32_t is safe: len <= UINT32_MAX at this point. */
|
|
Hacl_Hash_SHA2_update_512(state, buf, (uint32_t) len);
|
|
}
|
|
|
|
|
|
/* External methods for our hash objects */
|
|
|
|
/*[clinic input]
|
|
SHA256Type.copy
|
|
|
|
cls:defining_class
|
|
|
|
Return a copy of the hash object.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA256Type_copy_impl(SHA256object *self, PyTypeObject *cls)
|
|
/*[clinic end generated code: output=fabd515577805cd3 input=3137146fcb88e212]*/
|
|
{
|
|
SHA256object *newobj;
|
|
sha2_state *state = _PyType_GetModuleState(cls);
|
|
if (Py_IS_TYPE(self, state->sha256_type)) {
|
|
if ((newobj = newSHA256object(state)) == NULL) {
|
|
return NULL;
|
|
}
|
|
} else {
|
|
if ((newobj = newSHA224object(state)) == NULL) {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
ENTER_HASHLIB(self);
|
|
SHA256copy(self, newobj);
|
|
LEAVE_HASHLIB(self);
|
|
return (PyObject *)newobj;
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA512Type.copy
|
|
|
|
cls: defining_class
|
|
|
|
Return a copy of the hash object.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA512Type_copy_impl(SHA512object *self, PyTypeObject *cls)
|
|
/*[clinic end generated code: output=66d2a8ef20de8302 input=f673a18f66527c90]*/
|
|
{
|
|
SHA512object *newobj;
|
|
sha2_state *state = _PyType_GetModuleState(cls);
|
|
|
|
if (Py_IS_TYPE((PyObject*)self, state->sha512_type)) {
|
|
if ((newobj = newSHA512object(state)) == NULL) {
|
|
return NULL;
|
|
}
|
|
}
|
|
else {
|
|
if ((newobj = newSHA384object(state)) == NULL) {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
ENTER_HASHLIB(self);
|
|
SHA512copy(self, newobj);
|
|
LEAVE_HASHLIB(self);
|
|
return (PyObject *)newobj;
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA256Type.digest
|
|
|
|
Return the digest value as a bytes object.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA256Type_digest_impl(SHA256object *self)
|
|
/*[clinic end generated code: output=3a2e3997a98ee792 input=f1f4cfea5cbde35c]*/
|
|
{
|
|
uint8_t digest[SHA256_DIGESTSIZE];
|
|
assert(self->digestsize <= SHA256_DIGESTSIZE);
|
|
ENTER_HASHLIB(self);
|
|
// HACL* performs copies under the hood so that self->state remains valid
|
|
// after this call.
|
|
Hacl_Hash_SHA2_digest_256(self->state, digest);
|
|
LEAVE_HASHLIB(self);
|
|
return PyBytes_FromStringAndSize((const char *)digest, self->digestsize);
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA512Type.digest
|
|
|
|
Return the digest value as a bytes object.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA512Type_digest_impl(SHA512object *self)
|
|
/*[clinic end generated code: output=dd8c6320070458e0 input=f6470dd359071f4b]*/
|
|
{
|
|
uint8_t digest[SHA512_DIGESTSIZE];
|
|
assert(self->digestsize <= SHA512_DIGESTSIZE);
|
|
ENTER_HASHLIB(self);
|
|
// HACL* performs copies under the hood so that self->state remains valid
|
|
// after this call.
|
|
Hacl_Hash_SHA2_digest_512(self->state, digest);
|
|
LEAVE_HASHLIB(self);
|
|
return PyBytes_FromStringAndSize((const char *)digest, self->digestsize);
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA256Type.hexdigest
|
|
|
|
Return the digest value as a string of hexadecimal digits.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA256Type_hexdigest_impl(SHA256object *self)
|
|
/*[clinic end generated code: output=96cb68996a780ab3 input=0cc4c714693010d1]*/
|
|
{
|
|
uint8_t digest[SHA256_DIGESTSIZE];
|
|
assert(self->digestsize <= SHA256_DIGESTSIZE);
|
|
ENTER_HASHLIB(self);
|
|
Hacl_Hash_SHA2_digest_256(self->state, digest);
|
|
LEAVE_HASHLIB(self);
|
|
return _Py_strhex((const char *)digest, self->digestsize);
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA512Type.hexdigest
|
|
|
|
Return the digest value as a string of hexadecimal digits.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA512Type_hexdigest_impl(SHA512object *self)
|
|
/*[clinic end generated code: output=cbd6f844aba1fe7c input=498b877b25cbe0a2]*/
|
|
{
|
|
uint8_t digest[SHA512_DIGESTSIZE];
|
|
assert(self->digestsize <= SHA512_DIGESTSIZE);
|
|
ENTER_HASHLIB(self);
|
|
Hacl_Hash_SHA2_digest_512(self->state, digest);
|
|
LEAVE_HASHLIB(self);
|
|
return _Py_strhex((const char *)digest, self->digestsize);
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA256Type.update
|
|
|
|
obj: object
|
|
/
|
|
|
|
Update this hash object's state with the provided string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA256Type_update(SHA256object *self, PyObject *obj)
|
|
/*[clinic end generated code: output=1b240f965ddbd8c6 input=b2d449d5b30f0f5a]*/
|
|
{
|
|
Py_buffer buf;
|
|
|
|
GET_BUFFER_VIEW_OR_ERROUT(obj, &buf);
|
|
|
|
if (!self->use_mutex && buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
self->use_mutex = true;
|
|
}
|
|
if (self->use_mutex) {
|
|
Py_BEGIN_ALLOW_THREADS
|
|
PyMutex_Lock(&self->mutex);
|
|
update_256(self->state, buf.buf, buf.len);
|
|
PyMutex_Unlock(&self->mutex);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_256(self->state, buf.buf, buf.len);
|
|
}
|
|
|
|
PyBuffer_Release(&buf);
|
|
Py_RETURN_NONE;
|
|
}
|
|
|
|
/*[clinic input]
|
|
SHA512Type.update
|
|
|
|
obj: object
|
|
/
|
|
|
|
Update this hash object's state with the provided string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
SHA512Type_update(SHA512object *self, PyObject *obj)
|
|
/*[clinic end generated code: output=745f51057a985884 input=ded2b46656566283]*/
|
|
{
|
|
Py_buffer buf;
|
|
|
|
GET_BUFFER_VIEW_OR_ERROUT(obj, &buf);
|
|
|
|
if (!self->use_mutex && buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
self->use_mutex = true;
|
|
}
|
|
if (self->use_mutex) {
|
|
Py_BEGIN_ALLOW_THREADS
|
|
PyMutex_Lock(&self->mutex);
|
|
update_512(self->state, buf.buf, buf.len);
|
|
PyMutex_Unlock(&self->mutex);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_512(self->state, buf.buf, buf.len);
|
|
}
|
|
|
|
PyBuffer_Release(&buf);
|
|
Py_RETURN_NONE;
|
|
}
|
|
|
|
static PyMethodDef SHA256_methods[] = {
|
|
SHA256TYPE_COPY_METHODDEF
|
|
SHA256TYPE_DIGEST_METHODDEF
|
|
SHA256TYPE_HEXDIGEST_METHODDEF
|
|
SHA256TYPE_UPDATE_METHODDEF
|
|
{NULL, NULL} /* sentinel */
|
|
};
|
|
|
|
static PyMethodDef SHA512_methods[] = {
|
|
SHA512TYPE_COPY_METHODDEF
|
|
SHA512TYPE_DIGEST_METHODDEF
|
|
SHA512TYPE_HEXDIGEST_METHODDEF
|
|
SHA512TYPE_UPDATE_METHODDEF
|
|
{NULL, NULL} /* sentinel */
|
|
};
|
|
|
|
static PyObject *
|
|
SHA256_get_block_size(PyObject *self, void *closure)
|
|
{
|
|
return PyLong_FromLong(SHA256_BLOCKSIZE);
|
|
}
|
|
|
|
static PyObject *
|
|
SHA512_get_block_size(PyObject *self, void *closure)
|
|
{
|
|
return PyLong_FromLong(SHA512_BLOCKSIZE);
|
|
}
|
|
|
|
static PyObject *
|
|
SHA256_get_digest_size(SHA256object *self, void *closure)
|
|
{
|
|
return PyLong_FromLong(self->digestsize);
|
|
}
|
|
|
|
static PyObject *
|
|
SHA512_get_digest_size(SHA512object *self, void *closure)
|
|
{
|
|
return PyLong_FromLong(self->digestsize);
|
|
}
|
|
|
|
static PyObject *
|
|
SHA256_get_name(SHA256object *self, void *closure)
|
|
{
|
|
if (self->digestsize == 28) {
|
|
return PyUnicode_FromStringAndSize("sha224", 6);
|
|
}
|
|
return PyUnicode_FromStringAndSize("sha256", 6);
|
|
}
|
|
|
|
static PyObject *
|
|
SHA512_get_name(SHA512object *self, void *closure)
|
|
{
|
|
if (self->digestsize == 64) {
|
|
return PyUnicode_FromStringAndSize("sha512", 6);
|
|
}
|
|
return PyUnicode_FromStringAndSize("sha384", 6);
|
|
}
|
|
|
|
static PyGetSetDef SHA256_getseters[] = {
|
|
{"block_size",
|
|
(getter)SHA256_get_block_size, NULL,
|
|
NULL,
|
|
NULL},
|
|
{"name",
|
|
(getter)SHA256_get_name, NULL,
|
|
NULL,
|
|
NULL},
|
|
{"digest_size",
|
|
(getter)SHA256_get_digest_size, NULL,
|
|
NULL,
|
|
NULL},
|
|
{NULL} /* Sentinel */
|
|
};
|
|
|
|
static PyGetSetDef SHA512_getseters[] = {
|
|
{"block_size",
|
|
(getter)SHA512_get_block_size, NULL,
|
|
NULL,
|
|
NULL},
|
|
{"name",
|
|
(getter)SHA512_get_name, NULL,
|
|
NULL,
|
|
NULL},
|
|
{"digest_size",
|
|
(getter)SHA512_get_digest_size, NULL,
|
|
NULL,
|
|
NULL},
|
|
{NULL} /* Sentinel */
|
|
};
|
|
|
|
static PyType_Slot sha256_types_slots[] = {
|
|
{Py_tp_dealloc, SHA256_dealloc},
|
|
{Py_tp_methods, SHA256_methods},
|
|
{Py_tp_getset, SHA256_getseters},
|
|
{Py_tp_traverse, SHA2_traverse},
|
|
{0,0}
|
|
};
|
|
|
|
static PyType_Slot sha512_type_slots[] = {
|
|
{Py_tp_dealloc, SHA512_dealloc},
|
|
{Py_tp_methods, SHA512_methods},
|
|
{Py_tp_getset, SHA512_getseters},
|
|
{Py_tp_traverse, SHA2_traverse},
|
|
{0,0}
|
|
};
|
|
|
|
// Using _PyType_GetModuleState() on these types is safe since they
|
|
// cannot be subclassed: they don't have the Py_TPFLAGS_BASETYPE flag.
|
|
static PyType_Spec sha224_type_spec = {
|
|
.name = "_sha2.SHA224Type",
|
|
.basicsize = sizeof(SHA256object),
|
|
.flags = (Py_TPFLAGS_DEFAULT | Py_TPFLAGS_DISALLOW_INSTANTIATION |
|
|
Py_TPFLAGS_IMMUTABLETYPE | Py_TPFLAGS_HAVE_GC),
|
|
.slots = sha256_types_slots
|
|
};
|
|
|
|
static PyType_Spec sha256_type_spec = {
|
|
.name = "_sha2.SHA256Type",
|
|
.basicsize = sizeof(SHA256object),
|
|
.flags = (Py_TPFLAGS_DEFAULT | Py_TPFLAGS_DISALLOW_INSTANTIATION |
|
|
Py_TPFLAGS_IMMUTABLETYPE | Py_TPFLAGS_HAVE_GC),
|
|
.slots = sha256_types_slots
|
|
};
|
|
|
|
static PyType_Spec sha384_type_spec = {
|
|
.name = "_sha2.SHA384Type",
|
|
.basicsize = sizeof(SHA512object),
|
|
.flags = (Py_TPFLAGS_DEFAULT | Py_TPFLAGS_DISALLOW_INSTANTIATION |
|
|
Py_TPFLAGS_IMMUTABLETYPE | Py_TPFLAGS_HAVE_GC),
|
|
.slots = sha512_type_slots
|
|
};
|
|
|
|
static PyType_Spec sha512_type_spec = {
|
|
.name = "_sha2.SHA512Type",
|
|
.basicsize = sizeof(SHA512object),
|
|
.flags = (Py_TPFLAGS_DEFAULT | Py_TPFLAGS_DISALLOW_INSTANTIATION |
|
|
Py_TPFLAGS_IMMUTABLETYPE | Py_TPFLAGS_HAVE_GC),
|
|
.slots = sha512_type_slots
|
|
};
|
|
|
|
/* The module-level constructors. */
|
|
|
|
/*[clinic input]
|
|
_sha2.sha256
|
|
|
|
string: object(c_default="NULL") = b''
|
|
*
|
|
usedforsecurity: bool = True
|
|
|
|
Return a new SHA-256 hash object; optionally initialized with a string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
_sha2_sha256_impl(PyObject *module, PyObject *string, int usedforsecurity)
|
|
/*[clinic end generated code: output=243c9dd289931f87 input=6249da1de607280a]*/
|
|
{
|
|
Py_buffer buf;
|
|
|
|
if (string) {
|
|
GET_BUFFER_VIEW_OR_ERROUT(string, &buf);
|
|
}
|
|
|
|
sha2_state *state = sha2_get_state(module);
|
|
|
|
SHA256object *new;
|
|
if ((new = newSHA256object(state)) == NULL) {
|
|
if (string) {
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
new->state = Hacl_Hash_SHA2_malloc_256();
|
|
new->digestsize = 32;
|
|
|
|
if (PyErr_Occurred()) {
|
|
Py_DECREF(new);
|
|
if (string) {
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
return NULL;
|
|
}
|
|
if (string) {
|
|
if (buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
/* We do not initialize self->lock here as this is the constructor
|
|
* where it is not yet possible to have concurrent access. */
|
|
Py_BEGIN_ALLOW_THREADS
|
|
update_256(new->state, buf.buf, buf.len);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_256(new->state, buf.buf, buf.len);
|
|
}
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
|
|
return (PyObject *)new;
|
|
}
|
|
|
|
/*[clinic input]
|
|
_sha2.sha224
|
|
|
|
string: object(c_default="NULL") = b''
|
|
*
|
|
usedforsecurity: bool = True
|
|
|
|
Return a new SHA-224 hash object; optionally initialized with a string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
_sha2_sha224_impl(PyObject *module, PyObject *string, int usedforsecurity)
|
|
/*[clinic end generated code: output=68191f232e4a3843 input=c42bcba47fd7d2b7]*/
|
|
{
|
|
Py_buffer buf;
|
|
if (string) {
|
|
GET_BUFFER_VIEW_OR_ERROUT(string, &buf);
|
|
}
|
|
|
|
sha2_state *state = sha2_get_state(module);
|
|
SHA256object *new;
|
|
if ((new = newSHA224object(state)) == NULL) {
|
|
if (string) {
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
new->state = Hacl_Hash_SHA2_malloc_224();
|
|
new->digestsize = 28;
|
|
|
|
if (PyErr_Occurred()) {
|
|
Py_DECREF(new);
|
|
if (string) {
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
return NULL;
|
|
}
|
|
if (string) {
|
|
if (buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
/* We do not initialize self->lock here as this is the constructor
|
|
* where it is not yet possible to have concurrent access. */
|
|
Py_BEGIN_ALLOW_THREADS
|
|
update_256(new->state, buf.buf, buf.len);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_256(new->state, buf.buf, buf.len);
|
|
}
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
|
|
return (PyObject *)new;
|
|
}
|
|
|
|
/*[clinic input]
|
|
_sha2.sha512
|
|
|
|
string: object(c_default="NULL") = b''
|
|
*
|
|
usedforsecurity: bool = True
|
|
|
|
Return a new SHA-512 hash object; optionally initialized with a string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
_sha2_sha512_impl(PyObject *module, PyObject *string, int usedforsecurity)
|
|
/*[clinic end generated code: output=d55c8996eca214d7 input=0576ae2a6ebfad25]*/
|
|
{
|
|
SHA512object *new;
|
|
Py_buffer buf;
|
|
|
|
sha2_state *state = sha2_get_state(module);
|
|
|
|
if (string)
|
|
GET_BUFFER_VIEW_OR_ERROUT(string, &buf);
|
|
|
|
if ((new = newSHA512object(state)) == NULL) {
|
|
if (string)
|
|
PyBuffer_Release(&buf);
|
|
return NULL;
|
|
}
|
|
|
|
new->state = Hacl_Hash_SHA2_malloc_512();
|
|
new->digestsize = 64;
|
|
|
|
if (PyErr_Occurred()) {
|
|
Py_DECREF(new);
|
|
if (string)
|
|
PyBuffer_Release(&buf);
|
|
return NULL;
|
|
}
|
|
if (string) {
|
|
if (buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
/* We do not initialize self->lock here as this is the constructor
|
|
* where it is not yet possible to have concurrent access. */
|
|
Py_BEGIN_ALLOW_THREADS
|
|
update_512(new->state, buf.buf, buf.len);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_512(new->state, buf.buf, buf.len);
|
|
}
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
|
|
return (PyObject *)new;
|
|
}
|
|
|
|
/*[clinic input]
|
|
_sha2.sha384
|
|
|
|
string: object(c_default="NULL") = b''
|
|
*
|
|
usedforsecurity: bool = True
|
|
|
|
Return a new SHA-384 hash object; optionally initialized with a string.
|
|
[clinic start generated code]*/
|
|
|
|
static PyObject *
|
|
_sha2_sha384_impl(PyObject *module, PyObject *string, int usedforsecurity)
|
|
/*[clinic end generated code: output=b29a0d81d51d1368 input=4e9199d8de0d2f9b]*/
|
|
{
|
|
SHA512object *new;
|
|
Py_buffer buf;
|
|
|
|
sha2_state *state = sha2_get_state(module);
|
|
|
|
if (string)
|
|
GET_BUFFER_VIEW_OR_ERROUT(string, &buf);
|
|
|
|
if ((new = newSHA384object(state)) == NULL) {
|
|
if (string)
|
|
PyBuffer_Release(&buf);
|
|
return NULL;
|
|
}
|
|
|
|
new->state = Hacl_Hash_SHA2_malloc_384();
|
|
new->digestsize = 48;
|
|
|
|
if (PyErr_Occurred()) {
|
|
Py_DECREF(new);
|
|
if (string)
|
|
PyBuffer_Release(&buf);
|
|
return NULL;
|
|
}
|
|
if (string) {
|
|
if (buf.len >= HASHLIB_GIL_MINSIZE) {
|
|
/* We do not initialize self->lock here as this is the constructor
|
|
* where it is not yet possible to have concurrent access. */
|
|
Py_BEGIN_ALLOW_THREADS
|
|
update_512(new->state, buf.buf, buf.len);
|
|
Py_END_ALLOW_THREADS
|
|
} else {
|
|
update_512(new->state, buf.buf, buf.len);
|
|
}
|
|
PyBuffer_Release(&buf);
|
|
}
|
|
|
|
return (PyObject *)new;
|
|
}
|
|
|
|
/* List of functions exported by this module */
|
|
|
|
static struct PyMethodDef SHA2_functions[] = {
|
|
_SHA2_SHA256_METHODDEF
|
|
_SHA2_SHA224_METHODDEF
|
|
_SHA2_SHA512_METHODDEF
|
|
_SHA2_SHA384_METHODDEF
|
|
{NULL, NULL} /* Sentinel */
|
|
};
|
|
|
|
static int
|
|
_sha2_traverse(PyObject *module, visitproc visit, void *arg)
|
|
{
|
|
sha2_state *state = sha2_get_state(module);
|
|
Py_VISIT(state->sha224_type);
|
|
Py_VISIT(state->sha256_type);
|
|
Py_VISIT(state->sha384_type);
|
|
Py_VISIT(state->sha512_type);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
_sha2_clear(PyObject *module)
|
|
{
|
|
sha2_state *state = sha2_get_state(module);
|
|
Py_CLEAR(state->sha224_type);
|
|
Py_CLEAR(state->sha256_type);
|
|
Py_CLEAR(state->sha384_type);
|
|
Py_CLEAR(state->sha512_type);
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
_sha2_free(void *module)
|
|
{
|
|
_sha2_clear((PyObject *)module);
|
|
}
|
|
|
|
/* Initialize this module. */
|
|
static int sha2_exec(PyObject *module)
|
|
{
|
|
sha2_state *state = sha2_get_state(module);
|
|
|
|
state->sha224_type = (PyTypeObject *)PyType_FromModuleAndSpec(
|
|
module, &sha224_type_spec, NULL);
|
|
if (state->sha224_type == NULL) {
|
|
return -1;
|
|
}
|
|
state->sha256_type = (PyTypeObject *)PyType_FromModuleAndSpec(
|
|
module, &sha256_type_spec, NULL);
|
|
if (state->sha256_type == NULL) {
|
|
return -1;
|
|
}
|
|
state->sha384_type = (PyTypeObject *)PyType_FromModuleAndSpec(
|
|
module, &sha384_type_spec, NULL);
|
|
if (state->sha384_type == NULL) {
|
|
return -1;
|
|
}
|
|
state->sha512_type = (PyTypeObject *)PyType_FromModuleAndSpec(
|
|
module, &sha512_type_spec, NULL);
|
|
if (state->sha512_type == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
if (PyModule_AddType(module, state->sha224_type) < 0) {
|
|
return -1;
|
|
}
|
|
if (PyModule_AddType(module, state->sha256_type) < 0) {
|
|
return -1;
|
|
}
|
|
if (PyModule_AddType(module, state->sha384_type) < 0) {
|
|
return -1;
|
|
}
|
|
if (PyModule_AddType(module, state->sha512_type) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static PyModuleDef_Slot _sha2_slots[] = {
|
|
{Py_mod_exec, sha2_exec},
|
|
{Py_mod_multiple_interpreters, Py_MOD_PER_INTERPRETER_GIL_SUPPORTED},
|
|
{Py_mod_gil, Py_MOD_GIL_NOT_USED},
|
|
{0, NULL}
|
|
};
|
|
|
|
static struct PyModuleDef _sha2module = {
|
|
PyModuleDef_HEAD_INIT,
|
|
.m_name = "_sha2",
|
|
.m_size = sizeof(sha2_state),
|
|
.m_methods = SHA2_functions,
|
|
.m_slots = _sha2_slots,
|
|
.m_traverse = _sha2_traverse,
|
|
.m_clear = _sha2_clear,
|
|
.m_free = _sha2_free
|
|
};
|
|
|
|
PyMODINIT_FUNC
|
|
PyInit__sha2(void)
|
|
{
|
|
return PyModuleDef_Init(&_sha2module);
|
|
}
|