summaryrefslogtreecommitdiff
path: root/sha256.c
diff options
context:
space:
mode:
authorNiels Möller <nisse@lysator.liu.se>2005-10-05 16:57:00 +0200
committerNiels Möller <nisse@lysator.liu.se>2005-10-05 16:57:00 +0200
commitc4b13a96e99bc2609c26a2af8ec517662c553afb (patch)
tree6cdbcc5df812e9c904e7555d87ef54eedcc0a79c /sha256.c
parent13e9055186c08bdbe655f9df9762772bbb5320b9 (diff)
downloadnettle-c4b13a96e99bc2609c26a2af8ec517662c553afb.tar.gz
Comment fixes.
Rev: src/nettle/sha256.c:1.4
Diffstat (limited to 'sha256.c')
-rw-r--r--sha256.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/sha256.c b/sha256.c
index 619cb721..fa32971b 100644
--- a/sha256.c
+++ b/sha256.c
@@ -1,6 +1,8 @@
/* sha256.h
*
* The sha256 hash function.
+ *
+ * See http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
*/
/* nettle, low-level cryptographics library
@@ -86,7 +88,7 @@ K[64] =
64-word expanded input array W, where the first 16 are copies of the input
data, and the remaining 64 are defined by
- W[ t ] = s1(W[t-2] + W[t-7] + s0(W[i-15] + W[i-16]
+ W[ t ] = s1(W[t-2]) + W[t-7] + s0(W[i-15]) + W[i-16]
This implementation generates these values on the fly in a circular
buffer - thanks to Colin Plumb, colin@nyx10.cs.du.edu for this