comparison libtomcrypt/src/hashes/sha2/sha384.c @ 399:a707e6148060

merge of '5fdf69ca60d1683cdd9f4c2595134bed26394834' and '6b61c50f4cf888bea302ac8fcf5dbb573b443251'
author Matt Johnston <matt@ucc.asn.au>
date Sat, 03 Feb 2007 08:20:34 +0000
parents 0cbe8f6dbf9e
children f849a5ca2efc
comparison
equal deleted inserted replaced
394:17d097fc111c 399:a707e6148060
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis
2 *
3 * LibTomCrypt is a library that provides various cryptographic
4 * algorithms in a highly modular and flexible manner.
5 *
6 * The library is free for all purposes without any express
7 * guarantee it works.
8 *
9 * Tom St Denis, [email protected], http://libtomcrypt.com
10 */
11 /**
12 @param sha384.c
13 SHA384 hash included in sha512.c, Tom St Denis
14 */
15
16 const struct ltc_hash_descriptor sha384_desc =
17 {
18 "sha384",
19 4,
20 48,
21 128,
22
23 /* OID */
24 { 2, 16, 840, 1, 101, 3, 4, 2, 2, },
25 9,
26
27 &sha384_init,
28 &sha512_process,
29 &sha384_done,
30 &sha384_test,
31 NULL
32 };
33
34 /**
35 Initialize the hash state
36 @param md The hash state you wish to initialize
37 @return CRYPT_OK if successful
38 */
39 int sha384_init(hash_state * md)
40 {
41 LTC_ARGCHK(md != NULL);
42
43 md->sha512.curlen = 0;
44 md->sha512.length = 0;
45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8);
46 md->sha512.state[1] = CONST64(0x629a292a367cd507);
47 md->sha512.state[2] = CONST64(0x9159015a3070dd17);
48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939);
49 md->sha512.state[4] = CONST64(0x67332667ffc00b31);
50 md->sha512.state[5] = CONST64(0x8eb44a8768581511);
51 md->sha512.state[6] = CONST64(0xdb0c2e0d64f98fa7);
52 md->sha512.state[7] = CONST64(0x47b5481dbefa4fa4);
53 return CRYPT_OK;
54 }
55
56 /**
57 Terminate the hash to get the digest
58 @param md The hash state
59 @param out [out] The destination of the hash (48 bytes)
60 @return CRYPT_OK if successful
61 */
62 int sha384_done(hash_state * md, unsigned char *out)
63 {
64 unsigned char buf[64];
65
66 LTC_ARGCHK(md != NULL);
67 LTC_ARGCHK(out != NULL);
68
69 if (md->sha512.curlen >= sizeof(md->sha512.buf)) {
70 return CRYPT_INVALID_ARG;
71 }
72
73 sha512_done(md, buf);
74 XMEMCPY(out, buf, 48);
75 #ifdef LTC_CLEAN_STACK
76 zeromem(buf, sizeof(buf));
77 #endif
78 return CRYPT_OK;
79 }
80
81 /**
82 Self-test the hash
83 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled
84 */
85 int sha384_test(void)
86 {
87 #ifndef LTC_TEST
88 return CRYPT_NOP;
89 #else
90 static const struct {
91 char *msg;
92 unsigned char hash[48];
93 } tests[] = {
94 { "abc",
95 { 0xcb, 0x00, 0x75, 0x3f, 0x45, 0xa3, 0x5e, 0x8b,
96 0xb5, 0xa0, 0x3d, 0x69, 0x9a, 0xc6, 0x50, 0x07,
97 0x27, 0x2c, 0x32, 0xab, 0x0e, 0xde, 0xd1, 0x63,
98 0x1a, 0x8b, 0x60, 0x5a, 0x43, 0xff, 0x5b, 0xed,
99 0x80, 0x86, 0x07, 0x2b, 0xa1, 0xe7, 0xcc, 0x23,
100 0x58, 0xba, 0xec, 0xa1, 0x34, 0xc8, 0x25, 0xa7 }
101 },
102 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
103 { 0x09, 0x33, 0x0c, 0x33, 0xf7, 0x11, 0x47, 0xe8,
104 0x3d, 0x19, 0x2f, 0xc7, 0x82, 0xcd, 0x1b, 0x47,
105 0x53, 0x11, 0x1b, 0x17, 0x3b, 0x3b, 0x05, 0xd2,
106 0x2f, 0xa0, 0x80, 0x86, 0xe3, 0xb0, 0xf7, 0x12,
107 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9,
108 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 }
109 },
110 };
111
112 int i;
113 unsigned char tmp[48];
114 hash_state md;
115
116 for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) {
117 sha384_init(&md);
118 sha384_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg));
119 sha384_done(&md, tmp);
120 if (XMEMCMP(tmp, tests[i].hash, 48) != 0) {
121 return CRYPT_FAIL_TESTVECTOR;
122 }
123 }
124 return CRYPT_OK;
125 #endif
126 }
127
128
129
130
131
132
133 /* $Source: /cvs/libtom/libtomcrypt/src/hashes/sha2/sha384.c,v $ */
134 /* $Revision: 1.8 $ */
135 /* $Date: 2006/11/01 09:28:17 $ */