Closed NickBrighten closed 4 months ago
Wow PHP ... I don't know what else I should say :D
The current code obviously doesn't support it, since it's a special PHP variant of that hash.
It looks like this could be added, one way would be to
struct tiger_state
tiger.c
by a new const struct ltc_hash_descriptor tiger4_desc
with an unused hash ID and no OIDtiger4_init()
that calls tiger_init()
and sets the flag[s]s_tiger_compress()
by the 4th pass if the flag is setthx for your comment... But is it really PHP only???
thx for your comment...
NP - feel free to open a PR once you've implemented it
But is it really PHP only???
There's https://crypto.stackexchange.com/a/28991 (and https://stackoverflow.com/a/33314933) which are the only online references I can find on it, so I'm pretty sure it's PHP specific.
TBH I'm not really certain whether we should even include it as an option, but since we're a cryptographic toolkit I wouldn't have a too big problem with it.
Hey sjaeckel - implementation of the Tiger2 (Tiger algorithm with 4 passes) are very simple - will push soon as possible to you :-)
I have a question about the tiger hash algorithm...
So, in this library the tiger hash algorithm is integrated as it is tiger128,3 / tiger160,3 and tiger192,3... Is it possible to adopt or integrate the tiger128,4 / tiger160,4 and tiger192,4 algorithm??? Or is any option to get the tigerXXX,4 from existing code???