blob: 8095bb8dd49a4df63140ff74c5d476d2a08741db [file] [log] [blame] [edit]
// Copyright 2019 The BoringSSL Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <stdint.h>
#include <gtest/gtest.h>
#include <openssl/siphash.h>
#include "../test/file_test.h"
#include "../test/test_util.h"
TEST(SipHash, Basic) {
// This is the example from appendix A of the SipHash paper.
uint8_t key_bytes[16];
for (unsigned i = 0; i < 16; i++) {
key_bytes[i] = i;
}
uint64_t key[2];
memcpy(key, key_bytes, sizeof(key));
uint8_t input[15];
for (unsigned i = 0; i < sizeof(input); i++) {
input[i] = i;
}
EXPECT_EQ(UINT64_C(0xa129ca6149be45e5),
SIPHASH_24(key, input, sizeof(input)));
}
TEST(SipHash, Vectors) {
FileTestGTest("crypto/siphash/siphash_tests.txt", [](FileTest *t) {
std::vector<uint8_t> key, msg, hash;
ASSERT_TRUE(t->GetBytes(&key, "KEY"));
ASSERT_TRUE(t->GetBytes(&msg, "IN"));
ASSERT_TRUE(t->GetBytes(&hash, "HASH"));
ASSERT_EQ(16u, key.size());
ASSERT_EQ(8u, hash.size());
uint64_t key_words[2];
memcpy(key_words, key.data(), key.size());
uint64_t result = SIPHASH_24(key_words, msg.data(), msg.size());
EXPECT_EQ(Bytes(reinterpret_cast<uint8_t *>(&result), sizeof(result)),
Bytes(hash));
});
}