Lines Matching refs:of
5 While this is my "release" version, due to lack of additional
15 license which appears at the top of each source code file.
41 input data, but for ease of implementation this version will only
42 accept message data in multiples of bytes.
46 * Because of the use of 64-bit operations, many 32-bit architectures
53 the 128-bit type instead of simulating it with two 64-bit integers.
54 * This implementation was written in C in hopes of portability and for
55 the fun of it during my spare time. It is probably not the most
65 Each of the options described below may either be defined in the sha2.h
78 Here are the available options. Read on below for a description of
102 file according to the byte ordering conventions of your system.
106 operations, or bzero()/mcopy(). If you define neither of these, the
135 out the include of <sys/types.h> in sha2.h. With a bit more work
168 simple starts to grow more complex even in the span of
171 known test vectors. WARNING: Some of the test output
173 output of this implementation and so may be incorrect.
177 a temporary variable as this reduces the number of operations.
178 When data is fed in blocks of the right length, copying of
180 functions for ease of hashing a set of data. Added another
184 as well as made a few other minor changes to get rid of
189 because of the lack of test vectors against which to do such
202 would of course still use internal temporary storage
216 be more useful to me, and I got rid of the old C testing
218 of test data. It's a more flexible test system.
246 Here's an example of compiling and using the sha2 program (in this example
253 [most of the perl script output deleted for brevity]