Hi Zoran,

yes, I also think Anders solution is ok. Later we may consider including 
OpenSSL if needed.

/Regards HansN


On 02/24/2017 10:23 AM, Zoran Milinkovic wrote:
> Hi Hans,
>
> With one hash and one crypto function, I would rather go with our own 
> implementation. Both of them is not hard to implement.
> If there is a need for supporting more algorithms in the future, then I would 
> consider for using OpenSSL.
>
> As Anders has pointed out, adding OpenSSL means adding one more third party 
> library to OpenSAF.
>
> BR,
> Zoran
>
> -----Original Message-----
> From: Hans Nordebäck [mailto:hans.nordeb...@ericsson.com]
> Sent: den 24 februari 2017 07:29
> To: Anders Widell <anders.wid...@ericsson.com>; ramesh.bet...@oracle.com
> Cc: opensaf-devel@lists.sourceforge.net
> Subject: Re: [devel] [PATCH 1 of 1] base: Add a collision-resistant hash 
> function [#2266]
>
> Hi AndersW,
>
> A good alternative is to use OpenSSL and not have to maintain own crypto 
> functions. Then more algorithms will be available if needed.
> I add a small example below that can be used to create a message digest using 
> sha1 and base64, it is equal to this openssl command:
>
> echo -n "a very long DN"| openssl dgst -binary -sha1 | openssl base64
>
> compile with:
>
> $ g++ -g -std=c++11 -Wall -o test_openssl test_openssl.cc 
> -I$OPENSSL_DIR/openssl/include -L/$OPENSSL_DIR -lcrypto
>
> #include <iostream>
> #include <cstring>
> #include <openssl/evp.h>
> #include <openssl/bio.h>
>
> std::string base64(const unsigned char *input, int len) {
>
>    BIO *b64 = BIO_new(BIO_f_base64());
>    BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
>    
>    BIO *mem = BIO_new(BIO_s_mem());
>
>    b64 = BIO_push(b64, mem);
>    
>    int res = BIO_write(b64, input, len);
>    if (res < 1) std::cerr << "BIO_write failed\n";
>    
>    BIO_flush(b64);
>    char *result;
>    int res_len = BIO_get_mem_data(b64, &result);
>    std::string res_str(result, res_len);
>    BIO_free_all(b64);
>    return res_str;
> }
>       
> int main()
> {
>     char dn_log[] = "a very long DN";
>     EVP_MD_CTX *msg_digest_ctx {nullptr};
>     const EVP_MD *msg_digest;
>     unsigned int msg_digest_len;
>     
>     unsigned char msg_digest_result[EVP_MAX_MD_SIZE];
>
>     msg_digest = EVP_sha1();
>
>     msg_digest_ctx = EVP_MD_CTX_create();
>     EVP_DigestInit_ex(msg_digest_ctx, msg_digest, NULL);
>     EVP_DigestUpdate(msg_digest_ctx, dn_log, strlen(dn_log));
>     EVP_DigestFinal_ex(msg_digest_ctx, msg_digest_result, &msg_digest_len);
>     EVP_MD_CTX_destroy(msg_digest_ctx);
>
>     std::cout << "openssl sha1 digest: ";
>     for(unsigned int i = 0; i < msg_digest_len; ++i)
>       std::cout << std::hex << int{msg_digest_result[i]};
>   
>     std::cout << std::endl;
>
>     std::cout << "openssl base64: " << base64(msg_digest_result, 
> msg_digest_len) << std::endl;
>     
>     EVP_cleanup();
>     return 0;
> }
>
> /Regards HansN
>
> -----Original Message-----
> From: Anders Widell [mailto:anders.wid...@ericsson.com]
> Sent: den 21 februari 2017 11:45
> To: ramesh.bet...@oracle.com
> Cc: opensaf-devel@lists.sourceforge.net
> Subject: [devel] [PATCH 1 of 1] base: Add a collision-resistant hash function 
> [#2266]
>
>   src/base/Makefile.am        |   16 +-
>   src/base/hash.cc            |  239 
> ++++++++++++++++++++++++++++++++++++++++++++
>   src/base/hash.h             |   32 +++++
>   src/base/tests/hash_test.cc |  109 ++++++++++++++++++++
>   4 files changed, 390 insertions(+), 6 deletions(-)
>
>
> Add a function that returns a 32 character string which is generated by 
> computing the SHA-512/192 hash of the message parameter, and encoding the 
> result using Base64 with a URL and filename safe alphabet. For more 
> information about these algorithms, refer to the corresponding standards. 
> SHA-512/192 is defined in FIPS 180-4. Base64 is defined in RFC 4648.
>
> diff --git a/src/base/Makefile.am b/src/base/Makefile.am
> --- a/src/base/Makefile.am
> +++ b/src/base/Makefile.am
> @@ -35,6 +35,7 @@ lib_libopensaf_core_la_SOURCES += \
>       src/base/daemon.c \
>       src/base/file_notify.cc \
>       src/base/getenv.cc \
> +     src/base/hash.cc \
>       src/base/hj_dec.c \
>       src/base/hj_edp.c \
>       src/base/hj_edu.c \
> @@ -79,6 +80,7 @@ noinst_HEADERS += \
>       src/base/daemon.h \
>       src/base/file_notify.h \
>       src/base/getenv.h \
> +     src/base/hash.h \
>       src/base/log_message.h \
>       src/base/logtrace.h \
>       src/base/macros.h \
> @@ -176,16 +178,18 @@ bin_libbase_test_CPPFLAGS = \
>   
>   bin_libbase_test_LDFLAGS = \
>       $(AM_LDFLAGS) \
> -     src/base/lib_libopensaf_core_la-unix_socket.lo \
> -     src/base/lib_libopensaf_core_la-unix_server_socket.lo \
> +     src/base/lib_libopensaf_core_la-file_notify.lo \
>       src/base/lib_libopensaf_core_la-getenv.lo \
> +     src/base/lib_libopensaf_core_la-hash.lo \
>       src/base/lib_libopensaf_core_la-log_message.lo \
>       src/base/lib_libopensaf_core_la-process.lo \
> -     src/base/lib_libopensaf_core_la-file_notify.lo
> +     src/base/lib_libopensaf_core_la-unix_server_socket.lo \
> +     src/base/lib_libopensaf_core_la-unix_socket.lo
>   
>   bin_libbase_test_SOURCES = \
> -     src/base/tests/unix_socket_test.cc \
> +     src/base/tests/file_notify_test.cc \
>       src/base/tests/getenv_test.cc \
> +     src/base/tests/hash_test.cc \
>       src/base/tests/log_message_test.cc \
>       src/base/tests/mock_logtrace.cc \
>       src/base/tests/mock_osaf_abort.cc \
> @@ -193,8 +197,8 @@ bin_libbase_test_SOURCES = \
>       src/base/tests/time_add_test.cc \
>       src/base/tests/time_compare_test.cc \
>       src/base/tests/time_convert_test.cc \
> -     src/base/tests/file_notify_test.cc \
> -     src/base/tests/time_subtract_test.cc
> +     src/base/tests/time_subtract_test.cc \
> +     src/base/tests/unix_socket_test.cc
>   
>   bin_libbase_test_LDADD = \
>       $(GTEST_DIR)/lib/libgtest.la \
> diff --git a/src/base/hash.cc b/src/base/hash.cc new file mode 100644
> --- /dev/null
> +++ b/src/base/hash.cc
> @@ -0,0 +1,239 @@
> +/*      -*- OpenSAF  -*-
> + *
> + * Copyright Ericsson AB 2017 - All Rights Reserved.
> + *
> + * This program is distributed in the hope that it will be useful, but
> + * WITHOUT ANY WARRANTY; without even the implied warranty of
> +MERCHANTABILITY
> + * or FITNESS FOR A PARTICULAR PURPOSE. This file and program are
> +licensed
> + * under the GNU Lesser General Public License Version 2.1, February 1999.
> + * The complete license can be accessed from the following location:
> + * http://opensource.org/licenses/lgpl-license.php
> + * See the Copying file included with the OpenSAF distribution for full
> + * licensing terms.
> + *
> + */
> +
> +#include "base/hash.h"
> +#include <endian.h>
> +#include <cassert>
> +#include <cstdint>
> +
> +namespace base {
> +
> +namespace {
> +
> +constexpr uint64_t K[] = {
> +  UINT64_C(0x428a2f98d728ae22), UINT64_C(0x7137449123ef65cd),
> +  UINT64_C(0xb5c0fbcfec4d3b2f), UINT64_C(0xe9b5dba58189dbbc),
> +  UINT64_C(0x3956c25bf348b538), UINT64_C(0x59f111f1b605d019),
> +  UINT64_C(0x923f82a4af194f9b), UINT64_C(0xab1c5ed5da6d8118),
> +  UINT64_C(0xd807aa98a3030242), UINT64_C(0x12835b0145706fbe),
> +  UINT64_C(0x243185be4ee4b28c), UINT64_C(0x550c7dc3d5ffb4e2),
> +  UINT64_C(0x72be5d74f27b896f), UINT64_C(0x80deb1fe3b1696b1),
> +  UINT64_C(0x9bdc06a725c71235), UINT64_C(0xc19bf174cf692694),
> +  UINT64_C(0xe49b69c19ef14ad2), UINT64_C(0xefbe4786384f25e3),
> +  UINT64_C(0x0fc19dc68b8cd5b5), UINT64_C(0x240ca1cc77ac9c65),
> +  UINT64_C(0x2de92c6f592b0275), UINT64_C(0x4a7484aa6ea6e483),
> +  UINT64_C(0x5cb0a9dcbd41fbd4), UINT64_C(0x76f988da831153b5),
> +  UINT64_C(0x983e5152ee66dfab), UINT64_C(0xa831c66d2db43210),
> +  UINT64_C(0xb00327c898fb213f), UINT64_C(0xbf597fc7beef0ee4),
> +  UINT64_C(0xc6e00bf33da88fc2), UINT64_C(0xd5a79147930aa725),
> +  UINT64_C(0x06ca6351e003826f), UINT64_C(0x142929670a0e6e70),
> +  UINT64_C(0x27b70a8546d22ffc), UINT64_C(0x2e1b21385c26c926),
> +  UINT64_C(0x4d2c6dfc5ac42aed), UINT64_C(0x53380d139d95b3df),
> +  UINT64_C(0x650a73548baf63de), UINT64_C(0x766a0abb3c77b2a8),
> +  UINT64_C(0x81c2c92e47edaee6), UINT64_C(0x92722c851482353b),
> +  UINT64_C(0xa2bfe8a14cf10364), UINT64_C(0xa81a664bbc423001),
> +  UINT64_C(0xc24b8b70d0f89791), UINT64_C(0xc76c51a30654be30),
> +  UINT64_C(0xd192e819d6ef5218), UINT64_C(0xd69906245565a910),
> +  UINT64_C(0xf40e35855771202a), UINT64_C(0x106aa07032bbd1b8),
> +  UINT64_C(0x19a4c116b8d2d0c8), UINT64_C(0x1e376c085141ab53),
> +  UINT64_C(0x2748774cdf8eeb99), UINT64_C(0x34b0bcb5e19b48a8),
> +  UINT64_C(0x391c0cb3c5c95a63), UINT64_C(0x4ed8aa4ae3418acb),
> +  UINT64_C(0x5b9cca4f7763e373), UINT64_C(0x682e6ff3d6b2b8a3),
> +  UINT64_C(0x748f82ee5defb2fc), UINT64_C(0x78a5636f43172f60),
> +  UINT64_C(0x84c87814a1f0ab72), UINT64_C(0x8cc702081a6439ec),
> +  UINT64_C(0x90befffa23631e28), UINT64_C(0xa4506cebde82bde9),
> +  UINT64_C(0xbef9a3f7b2c67915), UINT64_C(0xc67178f2e372532b),
> +  UINT64_C(0xca273eceea26619c), UINT64_C(0xd186b8c721c0c207),
> +  UINT64_C(0xeada7dd6cde0eb1e), UINT64_C(0xf57d4f7fee6ed178),
> +  UINT64_C(0x06f067aa72176fba), UINT64_C(0x0a637dc5a2c898a6),
> +  UINT64_C(0x113f9804bef90dae), UINT64_C(0x1b710b35131c471b),
> +  UINT64_C(0x28db77f523047d84), UINT64_C(0x32caab7b40c72493),
> +  UINT64_C(0x3c9ebe0a15c9bebc), UINT64_C(0x431d67c49c100d4c),
> +  UINT64_C(0x4cc5d4becb3e42b6), UINT64_C(0x597f299cfc657e2a),
> +  UINT64_C(0x5fcb6fab3ad6faec), UINT64_C(0x6c44198c4a475817) };
> +
> +constexpr inline uint64_t ROTR(int n, uint64_t x) {
> +  return (x >> n) | (x << (64 - n));
> +}
> +
> +constexpr inline uint64_t Ch(uint64_t x, uint64_t y, uint64_t z) {
> +  return (x & y) ^ (~x & z);
> +}
> +
> +constexpr inline uint64_t Maj(uint64_t x, uint64_t y, uint64_t z) {
> +  return (x & y) ^ (x & z) ^ (y & z);
> +}
> +
> +constexpr inline uint64_t SIGMA_0(uint64_t x) {
> +  return ROTR(28, x) ^ ROTR(34, x) ^ ROTR(39, x); }
> +
> +constexpr inline uint64_t SIGMA_1(uint64_t x) {
> +  return ROTR(14, x) ^ ROTR(18, x) ^ ROTR(41, x); }
> +
> +constexpr inline uint64_t sigma_0(uint64_t x) {
> +  return ROTR(1, x) ^ ROTR(8, x) ^ (x >> 7); }
> +
> +constexpr inline uint64_t sigma_1(uint64_t x) {
> +  return ROTR(19, x) ^ ROTR(61, x) ^ (x >> 6); }
> +
> +std::string CreatePadding(uint64_t message_size_in_bytes) {
> +  assert(message_size_in_bytes < (uint64_t{1} << (64 - 3)));
> +  uint64_t l = 8 * message_size_in_bytes;
> +  uint64_t k =
> +      ((((l + 1) % 1024) <= 896) ? 896 : (1024 + 896)) - ((l + 1) %
> +1024);
> +  assert(((l + 1 + k + 128) % 1024) == 0);
> +  std::string padding;
> +  padding.reserve((1 + k + 128) / 8);
> +  padding.push_back(static_cast<char>(0x80));
> +  padding.resize((1 + k + 64) / 8, static_cast<char>(0));
> +  for (int i = 56; i >= 0; i = i - 8) {
> +    padding.push_back(static_cast<char>((l >> i) & 0xffu));
> +  }
> +  return padding;
> +}
> +
> +inline uint64_t MessageByte(const std::string& msg, const std::string& 
> padding,
> +                            uint64_t index) {
> +  assert(index < (msg.size() + padding.size()));
> +  return index < msg.size() ? static_cast<uint8_t>(msg[index]) :
> +      static_cast<uint8_t>(padding[index - msg.size()]); }
> +
> +inline uint64_t M(const std::string& msg, const std::string& padding,
> +                  uint64_t t, uint64_t i) {
> +  assert(t <= 15 && i != 0);
> +  uint64_t index = (i - 1) * 128 + t * 8;
> +  return ((index + 7) < msg.size()) ?
> +      be64toh(*reinterpret_cast<const uint64_t*>(msg.data() + index)) :
> +      ((MessageByte(msg, padding, index + 0) << 56) |
> +       (MessageByte(msg, padding, index + 1) << 48) |
> +       (MessageByte(msg, padding, index + 2) << 40) |
> +       (MessageByte(msg, padding, index + 3) << 32) |
> +       (MessageByte(msg, padding, index + 4) << 24) |
> +       (MessageByte(msg, padding, index + 5) << 16) |
> +       (MessageByte(msg, padding, index + 6) << 8) |
> +       (MessageByte(msg, padding, index + 7) << 0)); }
> +
> +class Base64 {
> + public:
> +  static std::string Encode(uint64_t H0, uint64_t H1, uint64_t H2) {
> +    Base64 encoder;
> +    encoder.encoded_.reserve(32);
> +    encoder.Append192Bits(H0, H1, H2);
> +    return encoder.encoded_;
> +  }
> +
> + private:
> +  static constexpr uint64_t kMask6Bits = (UINT64_C(1) << 6) - 1; static
> + constexpr uint64_t kMask8Bits = (UINT64_C(1) << 8) - 1;  static
> + constexpr uint64_t kMask16Bits = (UINT64_C(1) << 16) - 1;  static
> + constexpr uint64_t kMask24Bits = (UINT64_C(1) << 24) - 1;  static
> + constexpr char kAlphabet[64] = {
> +    'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 
> 'O',
> +    'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 
> 'd',
> +    'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 
> 's',
> +    't', 'u', 'v', 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', 
> '7',
> +    '8', '9', '-', '_'
> +  };
> +
> +  void Append6Bits(uint64_t a) {
> +    assert(a < (UINT64_C(1) << 6));
> +    encoded_.push_back(kAlphabet[a]);
> +  }
> +
> +  void Append24Bits(uint64_t a) {
> +    assert(a < (UINT64_C(1) << 24));
> +    Append6Bits(a >> 18);
> +    Append6Bits((a >> 12) & kMask6Bits);
> +    Append6Bits((a >> 6) & kMask6Bits);
> +    Append6Bits(a & kMask6Bits);
> +  }
> +
> +  void Append192Bits(uint64_t H0, uint64_t H1, uint64_t H2) {
> +    Append24Bits(H0 >> 40);
> +    Append24Bits((H0 >> 16) & kMask24Bits);
> +    Append24Bits(((H0 & kMask16Bits) << 8) | (H1 >> 56));
> +    Append24Bits((H1 >> 32) & kMask24Bits);
> +    Append24Bits((H1 >> 8) & kMask24Bits);
> +    Append24Bits(((H1 & kMask8Bits) << 16) | (H2 >> 48));
> +    Append24Bits((H2 >> 24) & kMask24Bits);
> +    Append24Bits(H2 & kMask24Bits);
> +  }
> +
> +  std::string encoded_{};
> +};
> +
> +constexpr char Base64::kAlphabet[64];
> +
> +}  // namespace
> +
> +std::string Hash(const std::string& message) {
> +  uint64_t H0 = UINT64_C(0x010176140648b233);
> +  uint64_t H1 = UINT64_C(0xdb92aeb1eebadd6f);
> +  uint64_t H2 = UINT64_C(0x83a9e27aa1d5ea62);
> +  uint64_t H3 = UINT64_C(0xec95f77eb609b4e1);
> +  uint64_t H4 = UINT64_C(0x71a99185c75caefa);
> +  uint64_t H5 = UINT64_C(0x006e8f08baf32e3c);
> +  uint64_t H6 = UINT64_C(0x6a2b21abd2db2aec);
> +  uint64_t H7 = UINT64_C(0x24926cdbd918a27f);
> +
> +  std::string padding = CreatePadding(message.size());
> +  uint64_t N = (message.size() + padding.size()) / 128;
> +  for (uint64_t i = 1; i <= N; ++i) {
> +    uint64_t W[80];
> +    uint64_t a = H0;
> +    uint64_t b = H1;
> +    uint64_t c = H2;
> +    uint64_t d = H3;
> +    uint64_t e = H4;
> +    uint64_t f = H5;
> +    uint64_t g = H6;
> +    uint64_t h = H7;
> +    for (uint64_t t = 0; t <= 79; ++t) {
> +      if (t <= 15) {
> +        W[t] = M(message, padding, t, i);
> +      } else {
> +        W[t] = sigma_1(W[t - 2]) + W[t - 7] + sigma_0(W[t - 15]) + W[t - 16];
> +      }
> +      uint64_t T1 = h + SIGMA_1(e) + Ch(e, f, g) + K[t] + W[t];
> +      uint64_t T2 = SIGMA_0(a) + Maj(a, b, c);
> +      h = g;
> +      g = f;
> +      f = e;
> +      e = d + T1;
> +      d = c;
> +      c = b;
> +      b = a;
> +      a = T1 + T2;
> +    }
> +    H0 += a;
> +    H1 += b;
> +    H2 += c;
> +    H3 += d;
> +    H4 += e;
> +    H5 += f;
> +    H6 += g;
> +    H7 += h;
> +  }
> +  return Base64::Encode(H0, H1, H2);
> +}
> +
> +}  // namespace base
> diff --git a/src/base/hash.h b/src/base/hash.h new file mode 100644
> --- /dev/null
> +++ b/src/base/hash.h
> @@ -0,0 +1,32 @@
> +/*      -*- OpenSAF  -*-
> + *
> + * Copyright Ericsson AB 2017 - All Rights Reserved.
> + *
> + * This program is distributed in the hope that it will be useful, but
> + * WITHOUT ANY WARRANTY; without even the implied warranty of
> +MERCHANTABILITY
> + * or FITNESS FOR A PARTICULAR PURPOSE. This file and program are
> +licensed
> + * under the GNU Lesser General Public License Version 2.1, February 1999.
> + * The complete license can be accessed from the following location:
> + * http://opensource.org/licenses/lgpl-license.php
> + * See the Copying file included with the OpenSAF distribution for full
> + * licensing terms.
> + *
> + */
> +
> +#ifndef BASE_HASH_H_
> +#define BASE_HASH_H_
> +
> +#include <string>
> +
> +namespace base {
> +
> +// Returns a 32 character string which is generated by computing the
> +SHA-512/192 // hash of the message parameter, and encoding the result
> +using Base64 with a // URL and filename safe alphabet. For more
> +information about these algorithms, // refer to the corresponding
> +standards. SHA-512/192 is defined in FIPS // 180-4. Base64 is defined in RFC 
> 4648.
> +std::string Hash(const std::string& message);
> +
> +}  // namespace base
> +
> +#endif  // BASE_HASH_H_
> diff --git a/src/base/tests/hash_test.cc b/src/base/tests/hash_test.cc new 
> file mode 100644
> --- /dev/null
> +++ b/src/base/tests/hash_test.cc
> @@ -0,0 +1,109 @@
> +/*      -*- OpenSAF  -*-
> + *
> + * Copyright Ericsson AB 2017 - All Rights Reserved.
> + *
> + * This program is distributed in the hope that it will be useful, but
> + * WITHOUT ANY WARRANTY; without even the implied warranty of
> +MERCHANTABILITY
> + * or FITNESS FOR A PARTICULAR PURPOSE. This file and program are
> +licensed
> + * under the GNU Lesser General Public License Version 2.1, February 1999.
> + * The complete license can be accessed from the following location:
> + * http://opensource.org/licenses/lgpl-license.php
> + * See the Copying file included with the OpenSAF distribution for full
> + * licensing terms.
> + *
> + */
> +
> +#include <endian.h>
> +#include <cstddef>
> +#include <random>
> +#include <string>
> +#include "base/hash.h"
> +#include "gtest/gtest.h"
> +
> +struct TestVector {
> +  const char* key_data;
> +  size_t key_size;
> +  const char* hash_value;
> +};
> +
> +#define TEST_VECTOR(key, hash) { key, sizeof(key) - 1, hash }
> +
> +static const TestVector test_vectors[] = {
> +  TEST_VECTOR("", "mJbyfHPNxOzI7KPhb27rY6_gS2wNOSds"),
> +  TEST_VECTOR("\000", "U-4lHisMY1zsvi2ry5wqlYKUMhhb_MX8"),
> +  TEST_VECTOR("\001", "7R0FXuGlh60oucbCoEIyp97oPDI34hNn"),
> +  TEST_VECTOR("\376", "X-7TtfTMWhw7T9CK1-yk8bRAlF_544MB"),
> +  TEST_VECTOR("\377", "OMGVy2Bhf3bPvd_yYKNVn8AK-EhkSJN4"),
> +  TEST_VECTOR(" ", "LOR-HJ8c_bFoH7LVc45B67zrxvqNp2ih"),
> +  TEST_VECTOR("\t", "jwSZSrsTHsB4kB2nUvpebPSpvDdt8d7V"),
> +  TEST_VECTOR("\n", "WlgTrOkNrltdky0QZv1B3jMG0D73h3YC"),
> +  TEST_VECTOR("\r\n", "pAv_qrHWSbOLxiJmXB2ETosp_FiE-G4H"),
> +  TEST_VECTOR("\\/:", "wyC3ktDwB4tvyzXBO5zx_iH76GKFmjxB"),
> +  TEST_VECTOR("$abc", "xSHQCvFJpVfx4ofdholD-mzgxyJJHjYg"),
> +  TEST_VECTOR("\000\000\000\000\000",
> +"mzklNJ6l6vWVe73PvthH61RRsl90ygC_"),
> +  TEST_VECTOR("123456", "E_7JXvueRDhde3Wq3W5jYSsts_LOWJNZ"),
> +  TEST_VECTOR("1234567", "0cAgD2NO2ASyz39axMrnBdV_VuHn2PhC"),
> +  TEST_VECTOR("12345678", "Uzmag7xvTQg40VBwOumXaugZxFZyRpB8"),
> +  TEST_VECTOR("123456789", "3YfQdE3kVpdmBEaBHM4uCj1feXvixjYA"),
> +  
> TEST_VECTOR("\200\201\202\203\204\205\206\207\210\211\212\213\214\215\216\217"
> +              
> "\220\221\222\223\224\225\226\227\230\231\232\233\234\235\236\237"
> +              
> "\240\241\242\243\244\245\246\247\250\251\252\253\254\255\256\257"
> +              
> "\260\261\262\263\264\265\266\267\270\271\272\273\274\275\276\277"
> +              
> "\300\301\302\303\304\305\306\307\310\311\312\313\314\315\316\317"
> +              
> "\320\321\322\323\324\325\326\327\330\331\332\333\334\335\336\337"
> +              "\340\341\342\343\344\345\346\347\350\351\352\353\354\355",
> +              "z2V3p2mUUigcBkYWSEw0yhz2f1v4M8Nb"),
> +  
> TEST_VECTOR("\200\201\202\203\204\205\206\207\210\211\212\213\214\215\216\217"
> +              
> "\220\221\222\223\224\225\226\227\230\231\232\233\234\235\236\237"
> +              
> "\240\241\242\243\244\245\246\247\250\251\252\253\254\255\256\257"
> +              
> "\260\261\262\263\264\265\266\267\270\271\272\273\274\275\276\277"
> +              
> "\300\301\302\303\304\305\306\307\310\311\312\313\314\315\316\317"
> +              
> "\320\321\322\323\324\325\326\327\330\331\332\333\334\335\336\337"
> +              "\340\341\342\343\344\345\346\347\350\351\352\353\354\355\356",
> +              "WprfN6xOSNY9RHaNCkR12yEEx5hGfwHj"),
> +  
> TEST_VECTOR("\200\201\202\203\204\205\206\207\210\211\212\213\214\215\216\217"
> +              
> "\220\221\222\223\224\225\226\227\230\231\232\233\234\235\236\237"
> +              
> "\240\241\242\243\244\245\246\247\250\251\252\253\254\255\256\257"
> +              
> "\260\261\262\263\264\265\266\267\270\271\272\273\274\275\276\277"
> +              
> "\300\301\302\303\304\305\306\307\310\311\312\313\314\315\316\317"
> +              
> "\320\321\322\323\324\325\326\327\330\331\332\333\334\335\336\337"
> +              "\340\341\342\343\344\345\346\347\350\351\352\353\354\355\356"
> +              "\357",
> +              "K3wQd-ZX5k7_AZ7p1qOwrehV5vkaJq9E"),
> +  
> TEST_VECTOR("\200\201\202\203\204\205\206\207\210\211\212\213\214\215\216\217"
> +              
> "\220\221\222\223\224\225\226\227\230\231\232\233\234\235\236\237"
> +              
> "\240\241\242\243\244\245\246\247\250\251\252\253\254\255\256\257"
> +              
> "\260\261\262\263\264\265\266\267\270\271\272\273\274\275\276\277"
> +              
> "\300\301\302\303\304\305\306\307\310\311\312\313\314\315\316\317"
> +              
> "\320\321\322\323\324\325\326\327\330\331\332\333\334\335\336\337"
> +              
> "\340\341\342\343\344\345\346\347\350\351\352\353\354\355\356\357"
> +              "\360",
> +              "O-ERJdo-W-iCV4b2QogLJmtR1gMIhlkx")
> +};
> +
> +TEST(BaseHash, TestVectors) {
> +  for (size_t i = 0; i < sizeof(test_vectors) / sizeof(test_vectors[0]); 
> ++i) {
> +    std::string key = std::string(test_vectors[i].key_data,
> +                                  test_vectors[i].key_size);
> +    std::string hash = std::string(test_vectors[i].hash_value);
> +    std::string computed_hash = base::Hash(key);
> +    EXPECT_EQ(hash, computed_hash);
> +  }
> +}
> +
> +TEST(BaseHash, LongRandomString) {
> +  std::string key;
> +  key.reserve(8000);
> +  std::mt19937_64 generator(4711);
> +  for (size_t i = 0; i != 1000; ++i) {
> +    union {
> +      char bytes[sizeof(uint64_t)];
> +      uint64_t word;
> +    };
> +    word = htobe64(generator());
> +    key.append(bytes, sizeof(uint64_t));
> +  }
> +  std::string hash = std::string("C_r2XVQjnVbnpQTMHO2OQJ2sn0YZi1py");
> +  std::string computed_hash = base::Hash(key);
> +  EXPECT_EQ(hash, computed_hash);
> +}
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most engaging tech 
> sites, SlashDot.org! http://sdm.link/slashdot 
> _______________________________________________
> Opensaf-devel mailing list
> Opensaf-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/opensaf-devel
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most engaging tech 
> sites, SlashDot.org! http://sdm.link/slashdot 
> _______________________________________________
> Opensaf-devel mailing list
> Opensaf-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/opensaf-devel


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel

Reply via email to