chickadee » tiger-hash

tiger-hash

Documentation

Computes the Tiger cryptographic hash function at the 192 bit digest size.

See message-digest-primitive for more information.

Tiger API

Component export

Usage

(use tiger-hash-api)

Constants

name
algorithm name ; symbol
version
algorithm version ; string
context-size
context byte length ; fixnum
digest-length
final byte length ; fixnum
block-length
buffer byte length ; fixnum

Note that block-length is informational only.

init

init CTXprocedure

Initializes a 192-bit Tiger hash CTX, with at least context-size byte size.

update

update CTX OBJ LENprocedure

Accumulate LEN bytes from the Scheme OBJ into CTX.

raw-update

raw-update CTX PTR LENprocedure

Accumulate LEN bytes from the byte PTR into CTX.

final

final CTX OBJprocedure

Finalize the CTX into a Scheme OBJ with at least digest-length byte size. The target is usually a blob, u8vector, or string.

Tiger Primitive

Packaged export

Usage

(use tiger-hash-primitive)

tiger192-primitive

tiger192-primitiveprocedure

Returns the 192-bit Tiger hash primitive object.

Notes

Usage

(import tiger-hash)

Examples

(import tiger-hash message-digest-byte-vector)

(message-digest-string (tiger192-primitive) "abc")
;=> "2aab1484e8c158f2bfb8c5ff41b57a525129131c957b5f93"

Notes

Requirements

message-digest-primitive

Author

Tiger/192 by Ross Anderson and Eli Biham. Kon Lovett

Repository

This egg is hosted on the CHICKEN Subversion repository:

https://anonymous@code.call-cc.org/svn/chicken-eggs/release/5/tiger-hash

If you want to check out the source code repository of this egg and you are not familiar with Subversion, see this page.

Version history

4.1.0
Split into api & primitive modules.
4.0.0
CHICKEN 5 release.
3.2.0
Add raw-update. Kon Lovett
3.1.0
Add block-length. Kon Lovett
3.0.0
Remove deprecated procedures. Kon Lovett
2.0.2
a message-digest-primitive has no "state".
2.0.0
Initial release for Chicken 4

License

Copyright (C) 2009-2021 Kon Lovett. All rights reserved.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED ASIS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Contents »