Commit 763845f95c

Marc Tiehuis <marctiehuis@gmail.com>
2018-08-31 08:45:45
std/crypto: zig fmt
1 parent 3839994
Changed files (2)
std/crypto/chacha20.zig
@@ -32,24 +32,28 @@ fn salsa20_wordtobyte(out: []u8, input: [16]u32) void {
         x[i] = input[i];
 
     const rounds = comptime []QuarterRound{
-        Rp( 0, 4, 8,12),
-        Rp( 1, 5, 9,13),
-        Rp( 2, 6,10,14),
-        Rp( 3, 7,11,15),
-        Rp( 0, 5,10,15),
-        Rp( 1, 6,11,12),
-        Rp( 2, 7, 8,13),
-        Rp( 3, 4, 9,14),
+        Rp(0, 4, 8, 12),
+        Rp(1, 5, 9, 13),
+        Rp(2, 6, 10, 14),
+        Rp(3, 7, 11, 15),
+        Rp(0, 5, 10, 15),
+        Rp(1, 6, 11, 12),
+        Rp(2, 7, 8, 13),
+        Rp(3, 4, 9, 14),
     };
 
     comptime var j: usize = 0;
     inline while (j < 20) : (j += 2) {
         // two-round cycles
         inline for (rounds) |r| {
-            x[r.a] +%= x[r.b]; x[r.d] = std.math.rotl(u32, x[r.d] ^ x[r.a], u32(16));
-            x[r.c] +%= x[r.d]; x[r.b] = std.math.rotl(u32, x[r.b] ^ x[r.c], u32(12));
-            x[r.a] +%= x[r.b]; x[r.d] = std.math.rotl(u32, x[r.d] ^ x[r.a],  u32(8));
-            x[r.c] +%= x[r.d]; x[r.b] = std.math.rotl(u32, x[r.b] ^ x[r.c],  u32(7));
+            x[r.a] +%= x[r.b];
+            x[r.d] = std.math.rotl(u32, x[r.d] ^ x[r.a], u32(16));
+            x[r.c] +%= x[r.d];
+            x[r.b] = std.math.rotl(u32, x[r.b] ^ x[r.c], u32(12));
+            x[r.a] +%= x[r.b];
+            x[r.d] = std.math.rotl(u32, x[r.d] ^ x[r.a], u32(8));
+            x[r.c] +%= x[r.d];
+            x[r.b] = std.math.rotl(u32, x[r.b] ^ x[r.c], u32(7));
         }
     }
 
@@ -166,9 +170,8 @@ pub fn chaCha20With64BitNonce(out: []u8, in: []const u8, counter: u64, key: [32]
             var remaining_blocks: u32 = @intCast(u32, (in.len / big_block));
             var i: u32 = 0;
             while (remaining_blocks > 0) : (remaining_blocks -= 1) {
-                chaCha20_internal(out[cursor..cursor + big_block], in[cursor..cursor + big_block], k, c);
-                c[1] += 1; // upper 32-bit of counter, generic chaCha20_internal() doesn't
-                           // know about this.
+                chaCha20_internal(out[cursor .. cursor + big_block], in[cursor .. cursor + big_block], k, c);
+                c[1] += 1; // upper 32-bit of counter, generic chaCha20_internal() doesn't know about this.
                 cursor += big_block;
             }
         }
@@ -199,16 +202,16 @@ test "crypto.chacha20 test vector sunscreen" {
     const input = "Ladies and Gentlemen of the class of '99: If I could offer you only one tip for the future, sunscreen would be it.";
     var result: [114]u8 = undefined;
     const key = []u8{
-         0, 1, 2, 3, 4, 5, 6, 7,
-         8, 9,10,11,12,13,14,15,
-        16,17,18,19,20,21,22,23,
-        24,25,26,27,28,29,30,31,
+        0, 1, 2, 3, 4, 5, 6, 7,
+        8, 9, 10, 11, 12, 13, 14, 15,
+        16, 17, 18, 19, 20, 21, 22, 23,
+        24, 25, 26, 27, 28, 29, 30, 31,
     };
     const nonce = []u8{
-         0, 0, 0, 0,
-         0, 0, 0, 0x4a,
-         0, 0, 0, 0,
-     };
+        0, 0, 0, 0,
+        0, 0, 0, 0x4a,
+        0, 0, 0, 0,
+    };
 
     chaCha20IETF(result[0..], input[0..], 1, key, nonce);
     assert(mem.eql(u8, expected_result, result));
@@ -248,7 +251,7 @@ test "crypto.chacha20 test vector 1" {
         0, 0, 0, 0, 0, 0, 0, 0,
         0, 0, 0, 0, 0, 0, 0, 0,
     };
-    const nonce = []u8{0, 0, 0, 0, 0, 0, 0, 0};
+    const nonce = []u8{ 0, 0, 0, 0, 0, 0, 0, 0 };
 
     chaCha20With64BitNonce(result[0..], input[0..], 0, key, nonce);
     assert(mem.eql(u8, expected_result, result));
@@ -282,7 +285,7 @@ test "crypto.chacha20 test vector 2" {
         0, 0, 0, 0, 0, 0, 0, 0,
         0, 0, 0, 0, 0, 0, 0, 1,
     };
-    const nonce = []u8{0, 0, 0, 0, 0, 0, 0, 0};
+    const nonce = []u8{ 0, 0, 0, 0, 0, 0, 0, 0 };
 
     chaCha20With64BitNonce(result[0..], input[0..], 0, key, nonce);
     assert(mem.eql(u8, expected_result, result));
@@ -316,7 +319,7 @@ test "crypto.chacha20 test vector 3" {
         0, 0, 0, 0, 0, 0, 0, 0,
         0, 0, 0, 0, 0, 0, 0, 0,
     };
-    const nonce = []u8{0, 0, 0, 0, 0, 0, 0, 1};
+    const nonce = []u8{ 0, 0, 0, 0, 0, 0, 0, 1 };
 
     chaCha20With64BitNonce(result[0..], input[0..], 0, key, nonce);
     assert(mem.eql(u8, expected_result, result));
@@ -350,7 +353,7 @@ test "crypto.chacha20 test vector 4" {
         0, 0, 0, 0, 0, 0, 0, 0,
         0, 0, 0, 0, 0, 0, 0, 0,
     };
-    const nonce = []u8{1, 0, 0, 0, 0, 0, 0, 0};
+    const nonce = []u8{ 1, 0, 0, 0, 0, 0, 0, 0 };
 
     chaCha20With64BitNonce(result[0..], input[0..], 0, key, nonce);
     assert(mem.eql(u8, expected_result, result));
std/crypto/sha3.zig
@@ -87,97 +87,24 @@ fn Keccak(comptime bits: usize, comptime delim: u8) type {
 }
 
 const RC = []const u64{
-    0x0000000000000001,
-    0x0000000000008082,
-    0x800000000000808a,
-    0x8000000080008000,
-    0x000000000000808b,
-    0x0000000080000001,
-    0x8000000080008081,
-    0x8000000000008009,
-    0x000000000000008a,
-    0x0000000000000088,
-    0x0000000080008009,
-    0x000000008000000a,
-    0x000000008000808b,
-    0x800000000000008b,
-    0x8000000000008089,
-    0x8000000000008003,
-    0x8000000000008002,
-    0x8000000000000080,
-    0x000000000000800a,
-    0x800000008000000a,
-    0x8000000080008081,
-    0x8000000000008080,
-    0x0000000080000001,
-    0x8000000080008008,
+    0x0000000000000001, 0x0000000000008082, 0x800000000000808a, 0x8000000080008000,
+    0x000000000000808b, 0x0000000080000001, 0x8000000080008081, 0x8000000000008009,
+    0x000000000000008a, 0x0000000000000088, 0x0000000080008009, 0x000000008000000a,
+    0x000000008000808b, 0x800000000000008b, 0x8000000000008089, 0x8000000000008003,
+    0x8000000000008002, 0x8000000000000080, 0x000000000000800a, 0x800000008000000a,
+    0x8000000080008081, 0x8000000000008080, 0x0000000080000001, 0x8000000080008008,
 };
 
 const ROTC = []const usize{
-    1,
-    3,
-    6,
-    10,
-    15,
-    21,
-    28,
-    36,
-    45,
-    55,
-    2,
-    14,
-    27,
-    41,
-    56,
-    8,
-    25,
-    43,
-    62,
-    18,
-    39,
-    61,
-    20,
-    44,
+    1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14, 27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44,
 };
 
 const PIL = []const usize{
-    10,
-    7,
-    11,
-    17,
-    18,
-    3,
-    5,
-    16,
-    8,
-    21,
-    24,
-    4,
-    15,
-    23,
-    19,
-    13,
-    12,
-    2,
-    20,
-    14,
-    22,
-    9,
-    6,
-    1,
+    10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4, 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1,
 };
 
 const M5 = []const usize{
-    0,
-    1,
-    2,
-    3,
-    4,
-    0,
-    1,
-    2,
-    3,
-    4,
+    0, 1, 2, 3, 4, 0, 1, 2, 3, 4,
 };
 
 fn keccak_f(comptime F: usize, d: []u8) void {