1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
use crate::error::Error::BlakeError;
use crate::error::{InvalidSizeError, Result};
use blake2::digest::{Update, VariableOutput};
use blake2::Blake2bVar;
use sha2::Sha256;
use sha3::{Digest, Keccak256};
pub struct Hash;
impl Hash {
pub fn secure_hash(source: &[u8]) -> Result<Vec<u8>> {
Ok(Self::keccak(&Self::blake(source)?))
}
pub fn keccak(source: &Vec<u8>) -> Vec<u8> {
Keccak256::digest(source).to_vec()
}
pub fn blake(source: &[u8]) -> Result<Vec<u8>> {
let mut blake =
Blake2bVar::new(32).map_err(|e| BlakeError(InvalidSizeError::InvalidOutputSize(e)))?;
blake.update(source);
let mut buf = [0u8; 32];
blake
.finalize_variable(&mut buf)
.map_err(|e| BlakeError(InvalidSizeError::InvalidBufferSize(e)))?;
Ok(buf.to_vec())
}
pub fn sha256(source: &Vec<u8>) -> Vec<u8> {
let hash_seed = Sha256::digest(source.as_slice());
hash_seed.as_slice().to_vec()
}
}
#[cfg(test)]
mod tests {
use crate::error::Result;
use crate::util::{Base58, Hash};
#[test]
fn test_secure_hash() -> Result<()> {
let source = "test".as_bytes().to_vec();
let expected_secure = Base58::decode("JDJkZrg24XwvBgBUi6PgpHzrAFgeefb7nU8LJPRR58ga")?;
let secure_hash = Hash::secure_hash(&source)?;
assert_eq!(secure_hash, expected_secure);
Ok(())
}
#[test]
fn test_sha256() {
let source = "test".as_bytes().to_vec();
let expected_sha = Base58::decode("Bjj4AWTNrjQVHqgWbP2XaxXz4DYH1WZMyERHxsad7b2w")
.expect("failed to decode base58 string");
assert_eq!(Hash::sha256(&source), expected_sha)
}
}