1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
use crate::error::Error::BlakeError;
use crate::error::{InvalidSizeError, Result};
use blake2::digest::{Update, VariableOutput};
use blake2::Blake2bVar;
use sha2::Sha256;
use sha3::{Digest, Keccak256};

pub struct Hash;

impl Hash {
    pub fn secure_hash(source: &[u8]) -> Result<Vec<u8>> {
        Ok(Self::keccak(&Self::blake(source)?))
    }

    pub fn keccak(source: &Vec<u8>) -> Vec<u8> {
        Keccak256::digest(source).to_vec()
    }

    pub fn blake(source: &[u8]) -> Result<Vec<u8>> {
        let mut blake =
            Blake2bVar::new(32).map_err(|e| BlakeError(InvalidSizeError::InvalidOutputSize(e)))?;
        blake.update(source);
        let mut buf = [0u8; 32];
        blake
            .finalize_variable(&mut buf)
            .map_err(|e| BlakeError(InvalidSizeError::InvalidBufferSize(e)))?;
        Ok(buf.to_vec())
    }

    pub fn sha256(source: &Vec<u8>) -> Vec<u8> {
        let hash_seed = Sha256::digest(source.as_slice());
        hash_seed.as_slice().to_vec()
    }
}

#[cfg(test)]
mod tests {
    use crate::error::Result;
    use crate::util::{Base58, Hash};

    #[test]
    fn test_secure_hash() -> Result<()> {
        let source = "test".as_bytes().to_vec();
        let expected_secure = Base58::decode("JDJkZrg24XwvBgBUi6PgpHzrAFgeefb7nU8LJPRR58ga")?;
        let secure_hash = Hash::secure_hash(&source)?;
        assert_eq!(secure_hash, expected_secure);
        Ok(())
    }

    #[test]
    fn test_sha256() {
        let source = "test".as_bytes().to_vec();
        let expected_sha = Base58::decode("Bjj4AWTNrjQVHqgWbP2XaxXz4DYH1WZMyERHxsad7b2w")
            .expect("failed to decode base58 string");

        assert_eq!(Hash::sha256(&source), expected_sha)
    }
}