mirror of
https://github.com/zlib-ng/minizip-ng
synced 2025-03-28 21:13:18 +00:00
Remove SHA224 support for Windows.
This commit is contained in:
parent
217adc9363
commit
f9203e7a55
170
mz_crypt_win32.c
170
mz_crypt_win32.c
@ -34,152 +34,12 @@ int32_t mz_crypt_rand(uint8_t *buf, int32_t size) {
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
/* Adapted from RFC4634 and Igor Pavlov's 2010 public domain implementation */
|
||||
|
||||
typedef struct mz_crypt_sha224_s {
|
||||
uint8_t buffer[64];
|
||||
uint32_t state[8];
|
||||
uint64_t count;
|
||||
} mz_crypt_sha224;
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
#define rotl(x, n) (((x) << (n)) | ((x) >> ((8 * sizeof(x)) - (n))))
|
||||
#define rotr(x, n) (((x) >> (n)) | ((x) << ((8 * sizeof(x)) - (n))))
|
||||
|
||||
#define Ch(x,y,z) (z ^ (x & (y ^ z)))
|
||||
#define Maj(x,y,z) ((x & y) | (z & (x | y)))
|
||||
|
||||
#define S0_256(x) (rotr(x, 2) ^ rotr(x,13) ^ rotr(x, 22))
|
||||
#define S1_256(x) (rotr(x, 6) ^ rotr(x,11) ^ rotr(x, 25))
|
||||
#define s0_256(x) (rotr(x, 7) ^ rotr(x,18) ^ (x >> 3))
|
||||
#define s1_256(x) (rotr(x,17) ^ rotr(x,19) ^ (x >> 10))
|
||||
|
||||
#define blk0(i) (w[i] = buffer[i])
|
||||
#define blk2(i) (w[i&15] += s1_256(w[(i-2)&15]) + w[(i-7)&15] + s0_256(w[(i-15)&15]))
|
||||
|
||||
#define R(a,b,c,d,e,f,g,h,i) \
|
||||
h += S1_256(e) + Ch(e,f,g) + k256[i+j] + (j?blk2(i):blk0(i)); \
|
||||
d += h; h += S0_256(a) + Maj(a, b, c)
|
||||
|
||||
#define RX_8(i) \
|
||||
R(a,b,c,d,e,f,g,h, (i)); \
|
||||
R(h,a,b,c,d,e,f,g, (i+1)); \
|
||||
R(g,h,a,b,c,d,e,f, (i+2)); \
|
||||
R(f,g,h,a,b,c,d,e, (i+3)); \
|
||||
R(e,f,g,h,a,b,c,d, (i+4)); \
|
||||
R(d,e,f,g,h,a,b,c, (i+5)); \
|
||||
R(c,d,e,f,g,h,a,b, (i+6)); \
|
||||
R(b,c,d,e,f,g,h,a, (i+7))
|
||||
|
||||
static const uint32_t k256[64] = {
|
||||
0x428a2f98u, 0x71374491u, 0xb5c0fbcfu, 0xe9b5dba5u,
|
||||
0x3956c25bu, 0x59f111f1u, 0x923f82a4u, 0xab1c5ed5u,
|
||||
0xd807aa98u, 0x12835b01u, 0x243185beu, 0x550c7dc3u,
|
||||
0x72be5d74u, 0x80deb1feu, 0x9bdc06a7u, 0xc19bf174u,
|
||||
0xe49b69c1u, 0xefbe4786u, 0x0fc19dc6u, 0x240ca1ccu,
|
||||
0x2de92c6fu, 0x4a7484aau, 0x5cb0a9dcu, 0x76f988dau,
|
||||
0x983e5152u, 0xa831c66du, 0xb00327c8u, 0xbf597fc7u,
|
||||
0xc6e00bf3u, 0xd5a79147u, 0x06ca6351u, 0x14292967u,
|
||||
0x27b70a85u, 0x2e1b2138u, 0x4d2c6dfcu, 0x53380d13u,
|
||||
0x650a7354u, 0x766a0abbu, 0x81c2c92eu, 0x92722c85u,
|
||||
0xa2bfe8a1u, 0xa81a664bu, 0xc24b8b70u, 0xc76c51a3u,
|
||||
0xd192e819u, 0xd6990624u, 0xf40e3585u, 0x106aa070u,
|
||||
0x19a4c116u, 0x1e376c08u, 0x2748774cu, 0x34b0bcb5u,
|
||||
0x391c0cb3u, 0x4ed8aa4au, 0x5b9cca4fu, 0x682e6ff3u,
|
||||
0x748f82eeu, 0x78a5636fu, 0x84c87814u, 0x8cc70208u,
|
||||
0x90befffau, 0xa4506cebu, 0xbef9a3f7u, 0xc67178f2u
|
||||
};
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
static void mz_crypt_sha224_init(mz_crypt_sha224 *sha) {
|
||||
sha->state[0] = 0xc1059ed8u;
|
||||
sha->state[1] = 0x367cd507u;
|
||||
sha->state[2] = 0x3070dd17u;
|
||||
sha->state[3] = 0xf70e5939u;
|
||||
sha->state[4] = 0xffc00b31u;
|
||||
sha->state[5] = 0x68581511u;
|
||||
sha->state[6] = 0x64f98fa7u;
|
||||
sha->state[7] = 0xbefa4fa4u;
|
||||
sha->count = 0;
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_transform(uint32_t *state, const uint32_t *buffer) {
|
||||
uint32_t w[16];
|
||||
int32_t j = 0;
|
||||
uint32_t a = state[0], b = state[1], c = state[2], d = state[3];
|
||||
uint32_t e = state[4], f = state[5], g = state[6], h = state[7];
|
||||
|
||||
for (j = 0; j < 64; j += 16) {
|
||||
RX_8(0);
|
||||
RX_8(8);
|
||||
}
|
||||
|
||||
state[0] += a; state[1] += b; state[2] += c; state[3] += d;
|
||||
state[4] += e; state[5] += f; state[6] += g; state[7] += h;
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_write_byte_block(mz_crypt_sha224 *sha) {
|
||||
uint32_t data32[16];
|
||||
int32_t i = 0;
|
||||
for (i = 0; i < 16; i++) {
|
||||
data32[i] = ((uint32_t)(sha->buffer[i * 4 + 0]) << 24) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 1]) << 16) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 2]) << 8 ) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 3]));
|
||||
}
|
||||
mz_crypt_sha224_transform(sha->state, data32);
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_update(mz_crypt_sha224 *sha, const uint8_t *data, size_t size) {
|
||||
uint32_t pos = (uint32_t)sha->count & 0x3F;
|
||||
while (size > 0) {
|
||||
sha->buffer[pos++] = *data++;
|
||||
sha->count++;
|
||||
size--;
|
||||
if (pos == 64) {
|
||||
pos = 0;
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_end(mz_crypt_sha224 *sha, uint8_t *digest) {
|
||||
uint64_t bits = (sha->count << 3);
|
||||
uint32_t pos = (uint32_t)sha->count & 0x3F;
|
||||
int32_t i = 0;
|
||||
sha->buffer[pos++] = 0x80;
|
||||
while (pos != (64 - 8)) {
|
||||
pos &= 0x3F;
|
||||
if (pos == 0)
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
sha->buffer[pos++] = 0;
|
||||
}
|
||||
for (i = 0; i < 8; i++) {
|
||||
sha->buffer[pos++] = (uint8_t)(bits >> 56);
|
||||
bits <<= 8;
|
||||
}
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
|
||||
for (i = 0; i < 7; i++) {
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 24);
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 16);
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 8 );
|
||||
*digest++ = (uint8_t)(sha->state[i]);
|
||||
}
|
||||
mz_crypt_sha224_init(sha);
|
||||
}
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
typedef struct mz_crypt_sha_s {
|
||||
union {
|
||||
struct {
|
||||
HCRYPTPROV provider;
|
||||
HCRYPTHASH hash;
|
||||
};
|
||||
mz_crypt_sha224 *sha224;
|
||||
};
|
||||
int32_t error;
|
||||
uint16_t algorithm;
|
||||
@ -189,17 +49,12 @@ typedef struct mz_crypt_sha_s {
|
||||
|
||||
void mz_crypt_sha_reset(void *handle) {
|
||||
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
free(sha->sha224);
|
||||
sha->sha224 = NULL;
|
||||
} else {
|
||||
if (sha->hash)
|
||||
CryptDestroyHash(sha->hash);
|
||||
sha->hash = 0;
|
||||
if (sha->provider)
|
||||
CryptReleaseContext(sha->provider, 0);
|
||||
sha->provider = 0;
|
||||
}
|
||||
sha->error = 0;
|
||||
}
|
||||
|
||||
@ -212,13 +67,8 @@ int32_t mz_crypt_sha_begin(void *handle) {
|
||||
if (!sha)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
sha->sha224 = malloc(sizeof(mz_crypt_sha224));
|
||||
if (!sha->sha224)
|
||||
return MZ_MEM_ERROR;
|
||||
mz_crypt_sha224_init(sha->sha224);
|
||||
return MZ_OK;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
switch (sha->algorithm) {
|
||||
case MZ_HASH_SHA1:
|
||||
@ -259,12 +109,8 @@ int32_t mz_crypt_sha_update(void *handle, const void *buf, int32_t size) {
|
||||
if (!sha || !buf || size < 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
if (!sha->sha224)
|
||||
return MZ_PARAM_ERROR;
|
||||
mz_crypt_sha224_update(sha->sha224, buf, size);
|
||||
return size;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
if (sha->hash == 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
@ -285,12 +131,8 @@ int32_t mz_crypt_sha_end(void *handle, uint8_t *digest, int32_t digest_size) {
|
||||
if (!sha || !digest)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
if (!sha->sha224 || digest_size < 28)
|
||||
return MZ_PARAM_ERROR;
|
||||
mz_crypt_sha224_end(sha->sha224, digest);
|
||||
return MZ_OK;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
if (sha->hash == 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
170
mz_crypt_winrt.c
170
mz_crypt_winrt.c
@ -38,145 +38,6 @@ int32_t mz_crypt_rand(uint8_t *buf, int32_t size) {
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
/* Adapted from RFC4634 and Igor Pavlov's 2010 public domain implementation */
|
||||
|
||||
typedef struct mz_crypt_sha224_s {
|
||||
uint8_t buffer[64];
|
||||
uint32_t state[8];
|
||||
uint64_t count;
|
||||
} mz_crypt_sha224;
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
#define rotl(x, n) (((x) << (n)) | ((x) >> ((8 * sizeof(x)) - (n))))
|
||||
#define rotr(x, n) (((x) >> (n)) | ((x) << ((8 * sizeof(x)) - (n))))
|
||||
|
||||
#define Ch(x,y,z) (z ^ (x & (y ^ z)))
|
||||
#define Maj(x,y,z) ((x & y) | (z & (x | y)))
|
||||
|
||||
#define S0_256(x) (rotr(x, 2) ^ rotr(x,13) ^ rotr(x, 22))
|
||||
#define S1_256(x) (rotr(x, 6) ^ rotr(x,11) ^ rotr(x, 25))
|
||||
#define s0_256(x) (rotr(x, 7) ^ rotr(x,18) ^ (x >> 3))
|
||||
#define s1_256(x) (rotr(x,17) ^ rotr(x,19) ^ (x >> 10))
|
||||
|
||||
#define blk0(i) (w[i] = buffer[i])
|
||||
#define blk2(i) (w[i&15] += s1_256(w[(i-2)&15]) + w[(i-7)&15] + s0_256(w[(i-15)&15]))
|
||||
|
||||
#define R(a,b,c,d,e,f,g,h,i) \
|
||||
h += S1_256(e) + Ch(e,f,g) + k256[i+j] + (j?blk2(i):blk0(i)); \
|
||||
d += h; h += S0_256(a) + Maj(a, b, c)
|
||||
|
||||
#define RX_8(i) \
|
||||
R(a,b,c,d,e,f,g,h, (i)); \
|
||||
R(h,a,b,c,d,e,f,g, (i+1)); \
|
||||
R(g,h,a,b,c,d,e,f, (i+2)); \
|
||||
R(f,g,h,a,b,c,d,e, (i+3)); \
|
||||
R(e,f,g,h,a,b,c,d, (i+4)); \
|
||||
R(d,e,f,g,h,a,b,c, (i+5)); \
|
||||
R(c,d,e,f,g,h,a,b, (i+6)); \
|
||||
R(b,c,d,e,f,g,h,a, (i+7))
|
||||
|
||||
static const uint32_t k256[64] = {
|
||||
0x428a2f98u, 0x71374491u, 0xb5c0fbcfu, 0xe9b5dba5u,
|
||||
0x3956c25bu, 0x59f111f1u, 0x923f82a4u, 0xab1c5ed5u,
|
||||
0xd807aa98u, 0x12835b01u, 0x243185beu, 0x550c7dc3u,
|
||||
0x72be5d74u, 0x80deb1feu, 0x9bdc06a7u, 0xc19bf174u,
|
||||
0xe49b69c1u, 0xefbe4786u, 0x0fc19dc6u, 0x240ca1ccu,
|
||||
0x2de92c6fu, 0x4a7484aau, 0x5cb0a9dcu, 0x76f988dau,
|
||||
0x983e5152u, 0xa831c66du, 0xb00327c8u, 0xbf597fc7u,
|
||||
0xc6e00bf3u, 0xd5a79147u, 0x06ca6351u, 0x14292967u,
|
||||
0x27b70a85u, 0x2e1b2138u, 0x4d2c6dfcu, 0x53380d13u,
|
||||
0x650a7354u, 0x766a0abbu, 0x81c2c92eu, 0x92722c85u,
|
||||
0xa2bfe8a1u, 0xa81a664bu, 0xc24b8b70u, 0xc76c51a3u,
|
||||
0xd192e819u, 0xd6990624u, 0xf40e3585u, 0x106aa070u,
|
||||
0x19a4c116u, 0x1e376c08u, 0x2748774cu, 0x34b0bcb5u,
|
||||
0x391c0cb3u, 0x4ed8aa4au, 0x5b9cca4fu, 0x682e6ff3u,
|
||||
0x748f82eeu, 0x78a5636fu, 0x84c87814u, 0x8cc70208u,
|
||||
0x90befffau, 0xa4506cebu, 0xbef9a3f7u, 0xc67178f2u
|
||||
};
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
static void mz_crypt_sha224_init(mz_crypt_sha224 *sha) {
|
||||
sha->state[0] = 0xc1059ed8u;
|
||||
sha->state[1] = 0x367cd507u;
|
||||
sha->state[2] = 0x3070dd17u;
|
||||
sha->state[3] = 0xf70e5939u;
|
||||
sha->state[4] = 0xffc00b31u;
|
||||
sha->state[5] = 0x68581511u;
|
||||
sha->state[6] = 0x64f98fa7u;
|
||||
sha->state[7] = 0xbefa4fa4u;
|
||||
sha->count = 0;
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_transform(uint32_t *state, const uint32_t *buffer) {
|
||||
uint32_t w[16];
|
||||
int32_t j = 0;
|
||||
uint32_t a = state[0], b = state[1], c = state[2], d = state[3];
|
||||
uint32_t e = state[4], f = state[5], g = state[6], h = state[7];
|
||||
|
||||
for (j = 0; j < 64; j += 16) {
|
||||
RX_8(0);
|
||||
RX_8(8);
|
||||
}
|
||||
|
||||
state[0] += a; state[1] += b; state[2] += c; state[3] += d;
|
||||
state[4] += e; state[5] += f; state[6] += g; state[7] += h;
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_write_byte_block(mz_crypt_sha224 *sha) {
|
||||
uint32_t data32[16];
|
||||
int32_t i = 0;
|
||||
for (i = 0; i < 16; i++) {
|
||||
data32[i] = ((uint32_t)(sha->buffer[i * 4 + 0]) << 24) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 1]) << 16) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 2]) << 8 ) +
|
||||
((uint32_t)(sha->buffer[i * 4 + 3]));
|
||||
}
|
||||
mz_crypt_sha224_transform(sha->state, data32);
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_update(mz_crypt_sha224 *sha, const uint8_t *data, size_t size) {
|
||||
uint32_t pos = (uint32_t)sha->count & 0x3F;
|
||||
while (size > 0) {
|
||||
sha->buffer[pos++] = *data++;
|
||||
sha->count++;
|
||||
size--;
|
||||
if (pos == 64) {
|
||||
pos = 0;
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void mz_crypt_sha224_end(mz_crypt_sha224 *sha, uint8_t *digest) {
|
||||
uint64_t bits = (sha->count << 3);
|
||||
uint32_t pos = (uint32_t)sha->count & 0x3F;
|
||||
int32_t i = 0;
|
||||
sha->buffer[pos++] = 0x80;
|
||||
while (pos != (64 - 8)) {
|
||||
pos &= 0x3F;
|
||||
if (pos == 0)
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
sha->buffer[pos++] = 0;
|
||||
}
|
||||
for (i = 0; i < 8; i++) {
|
||||
sha->buffer[pos++] = (uint8_t)(bits >> 56);
|
||||
bits <<= 8;
|
||||
}
|
||||
mz_crypt_sha224_write_byte_block(sha);
|
||||
|
||||
for (i = 0; i < 7; i++) {
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 24);
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 16);
|
||||
*digest++ = (uint8_t)(sha->state[i] >> 8 );
|
||||
*digest++ = (uint8_t)(sha->state[i]);
|
||||
}
|
||||
mz_crypt_sha224_init(sha);
|
||||
}
|
||||
|
||||
/***************************************************************************/
|
||||
|
||||
typedef struct mz_crypt_sha_s {
|
||||
union {
|
||||
struct {
|
||||
@ -184,7 +45,6 @@ typedef struct mz_crypt_sha_s {
|
||||
BCRYPT_HASH_HANDLE hash;
|
||||
uint8_t *buffer;
|
||||
};
|
||||
mz_crypt_sha224 *sha224;
|
||||
};
|
||||
int32_t error;
|
||||
uint16_t algorithm;
|
||||
@ -194,10 +54,6 @@ typedef struct mz_crypt_sha_s {
|
||||
|
||||
void mz_crypt_sha_reset(void *handle) {
|
||||
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
free(sha->sha224);
|
||||
sha->sha224 = NULL;
|
||||
} else {
|
||||
if (sha->hash)
|
||||
BCryptDestroyHash(sha->hash);
|
||||
if (sha->provider)
|
||||
@ -206,7 +62,6 @@ void mz_crypt_sha_reset(void *handle) {
|
||||
sha->hash = NULL;
|
||||
sha->provider = NULL;
|
||||
sha->buffer = NULL;
|
||||
}
|
||||
sha->error = 0;
|
||||
}
|
||||
|
||||
@ -221,13 +76,8 @@ int32_t mz_crypt_sha_begin(void *handle) {
|
||||
if (!sha)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
sha->sha224 = malloc(sizeof(mz_crypt_sha224));
|
||||
if (!sha->sha224)
|
||||
return MZ_MEM_ERROR;
|
||||
mz_crypt_sha224_init(sha->sha224);
|
||||
return MZ_OK;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
switch (sha->algorithm) {
|
||||
case MZ_HASH_SHA1:
|
||||
@ -267,12 +117,8 @@ int32_t mz_crypt_sha_update(void *handle, const void *buf, int32_t size) {
|
||||
if (!sha || !buf || size < 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
if (!sha->sha224)
|
||||
return MZ_PARAM_ERROR;
|
||||
mz_crypt_sha224_update(sha->sha224, buf, size);
|
||||
return size;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
if (sha->hash == 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
@ -294,12 +140,8 @@ int32_t mz_crypt_sha_end(void *handle, uint8_t *digest, int32_t digest_size) {
|
||||
if (!sha || !digest)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
||||
if (sha->algorithm == MZ_HASH_SHA224) {
|
||||
if (!sha->sha224 || digest_size < 28)
|
||||
return MZ_PARAM_ERROR;
|
||||
mz_crypt_sha224_end(sha->sha224, digest);
|
||||
return MZ_OK;
|
||||
}
|
||||
if (sha->algorithm == MZ_HASH_SHA224)
|
||||
return MZ_SUPPORT_ERROR;
|
||||
|
||||
if (sha->hash == 0)
|
||||
return MZ_PARAM_ERROR;
|
||||
|
@ -64,6 +64,9 @@ TEST(crypt, sha1) {
|
||||
}
|
||||
|
||||
TEST(crypt, sha224) {
|
||||
#if GTEST_OS_WINDOWS
|
||||
GTEST_SKIP() << "SHA224 not supported on Windows";
|
||||
#else
|
||||
void *sha224 = NULL;
|
||||
uint8_t hash224[MZ_HASH_SHA224_SIZE];
|
||||
char computed_hash[256];
|
||||
@ -81,6 +84,7 @@ TEST(crypt, sha224) {
|
||||
convert_buffer_to_hex_string(hash224, sizeof(hash224), computed_hash, sizeof(computed_hash));
|
||||
|
||||
EXPECT_STREQ(computed_hash, "9e444f5f0b6582a923bd48696155f4a2f0d914e044cb64b8729a6600");
|
||||
#endif
|
||||
}
|
||||
|
||||
TEST(crypt, sha256) {
|
||||
|
Loading…
x
Reference in New Issue
Block a user