![]()
Function called by the actual testers to ensure that specific strings
hash to specific published values.
Each item in the vector has a "source" and one or more additional keys.
If the item has a key matching the key argument passed to this
function, it is the expected value of the hash function.
Arguments:
|
code » | |||
![]()
No description.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
Check that the code throws an error for bad input
|
code » | |||
![]()
Simple sanity tests for hash functions.
|
code » | |||
![]()
Make sure that we correctly handle strings whose length is 110-113.
This is the area where we are likely to hit fencepost errors in the padding
code.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
No description.
|
code » | |||
![]()
Test that Sha512_256 returns the published values
|
code » | |||
![]()
Test that Sha384 returns the published values
|
code » | |||
![]()
Test that Sha512() returns the published values
|
code » | |||
![]()
Test one really large string using SHA512
|
code » | |||
![]()
Test that the opt_length works
|
code » |
![]()
No description.
|
Code » | |
![]()
No description.
|
Code » | |
![]()
For each integer key N, the value is the SHA-512 value of a string
consisting of N repetitions of the character 'a'.
|
Code » | |
![]()
Each object in the test vector array is a source text and one or more
hashes of that source text. The source text is either a string or a
byte array.
All hash values, except for the empty string, are from public sources: csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA384.pdf csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA512_256.pdf csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA2_Additional.pdf en.wikipedia.org/wiki/SHA-2#Examples_of_SHA-2_variants |
Code » |