1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
3 /**
4 @param sha512_256.c
5 SHA512/256 hash included in sha512.c
6 */
7
8 #include "tomcrypt_private.h"
9
10 #if defined(LTC_SHA512_256) && defined(LTC_SHA512)
11
12 const struct ltc_hash_descriptor sha512_256_desc =
13 {
14 "sha512-256",
15 16,
16 32,
17 128,
18
19 /* OID */
20 { 2, 16, 840, 1, 101, 3, 4, 2, 6, },
21 9,
22
23 &sha512_256_init,
24 &sha512_process,
25 &sha512_256_done,
26 &sha512_256_test,
27 NULL
28 };
29
30 /**
31 Initialize the hash state
32 @param md The hash state you wish to initialize
33 @return CRYPT_OK if successful
34 */
sha512_256_init(hash_state * md)35 int sha512_256_init(hash_state * md)
36 {
37 LTC_ARGCHK(md != NULL);
38
39 md->sha512.curlen = 0;
40 md->sha512.length = 0;
41 md->sha512.state[0] = CONST64(0x22312194FC2BF72C);
42 md->sha512.state[1] = CONST64(0x9F555FA3C84C64C2);
43 md->sha512.state[2] = CONST64(0x2393B86B6F53B151);
44 md->sha512.state[3] = CONST64(0x963877195940EABD);
45 md->sha512.state[4] = CONST64(0x96283EE2A88EFFE3);
46 md->sha512.state[5] = CONST64(0xBE5E1E2553863992);
47 md->sha512.state[6] = CONST64(0x2B0199FC2C85B8AA);
48 md->sha512.state[7] = CONST64(0x0EB72DDC81C52CA2);
49 return CRYPT_OK;
50 }
51
52 /**
53 Terminate the hash to get the digest
54 @param md The hash state
55 @param out [out] The destination of the hash (48 bytes)
56 @return CRYPT_OK if successful
57 */
sha512_256_done(hash_state * md,unsigned char * out)58 int sha512_256_done(hash_state * md, unsigned char *out)
59 {
60 unsigned char buf[64];
61
62 LTC_ARGCHK(md != NULL);
63 LTC_ARGCHK(out != NULL);
64
65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) {
66 return CRYPT_INVALID_ARG;
67 }
68
69 sha512_done(md, buf);
70 XMEMCPY(out, buf, 32);
71 #ifdef LTC_CLEAN_STACK
72 zeromem(buf, sizeof(buf));
73 #endif
74 return CRYPT_OK;
75 }
76
77 /**
78 Self-test the hash
79 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled
80 */
sha512_256_test(void)81 int sha512_256_test(void)
82 {
83 #ifndef LTC_TEST
84 return CRYPT_NOP;
85 #else
86 static const struct {
87 const char *msg;
88 unsigned char hash[32];
89 } tests[] = {
90 { "abc",
91 { 0x53, 0x04, 0x8E, 0x26, 0x81, 0x94, 0x1E, 0xF9,
92 0x9B, 0x2E, 0x29, 0xB7, 0x6B, 0x4C, 0x7D, 0xAB,
93 0xE4, 0xC2, 0xD0, 0xC6, 0x34, 0xFC, 0x6D, 0x46,
94 0xE0, 0xE2, 0xF1, 0x31, 0x07, 0xE7, 0xAF, 0x23 }
95 },
96 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
97 { 0x39, 0x28, 0xE1, 0x84, 0xFB, 0x86, 0x90, 0xF8,
98 0x40, 0xDA, 0x39, 0x88, 0x12, 0x1D, 0x31, 0xBE,
99 0x65, 0xCB, 0x9D, 0x3E, 0xF8, 0x3E, 0xE6, 0x14,
100 0x6F, 0xEA, 0xC8, 0x61, 0xE1, 0x9B, 0x56, 0x3A }
101 },
102 };
103
104 int i;
105 unsigned char tmp[32];
106 hash_state md;
107
108 for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) {
109 sha512_256_init(&md);
110 sha512_256_process(&md, (unsigned char*)tests[i].msg, (unsigned long)XSTRLEN(tests[i].msg));
111 sha512_256_done(&md, tmp);
112 if (compare_testvector(tmp, sizeof(tmp), tests[i].hash, sizeof(tests[i].hash), "SHA512-265", i)) {
113 return CRYPT_FAIL_TESTVECTOR;
114 }
115 }
116 return CRYPT_OK;
117 #endif
118 }
119
120 #endif /* defined(LTC_SHA384) && defined(LTC_SHA512) */
121