1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
#[derive(Clone)]
pub struct Sha3256([u64; 25], Vec<u8>);
mod impls {
use std::default::Default;
use std::hash::Hasher;
use std::io::prelude::*;
use std::io;
use bswap::leu64;
use super::Sha3256;
use utils::{Reset,
Digest,
DigestExt,
ReadPadBlocksExt,
StdPad};
impl Default for Sha3256 {
fn default() -> Sha3256 {
Sha3256([0u64; 25], Vec::new())
}
}
impl Reset for Sha3256 {
fn reset(&mut self) {
self.0 = [0u64; 25];
self.1.clear();
}
}
impl Write for Sha3256 {
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
Write::write(&mut self.1, buf)
}
fn flush(&mut self) -> io::Result<()> {
let ref buf = self.1;
for block in buf.pad_blocks(136, |_: usize| {
StdPad::with_prefix(0x06u8, vec![0x80u8], 136)
}) {
super::super::keccak::ops::digest_block(&mut self.0, block);
}
Ok(())
}
}
impl Read for Sha3256 {
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
let state_buf = &self.0[..buf.len()/8];
leu64::encode_slice(buf, state_buf);
Ok(buf.len())
}
}
impl Hasher for Sha3256 {
fn finish(&self) -> u64 {
let mut h = self.clone();
h.flush().unwrap();
h.0[0]
}
fn write(&mut self, buf: &[u8]) {
Write::write(self, buf).unwrap();
}
}
impl Digest for Sha3256 {}
impl DigestExt for Sha3256 {
fn default_len() -> usize {
return 32;
}
}
}
#[cfg(test)]
mod tests {
use std::default::Default;
use serialize::hex::ToHex;
use utils::{Digest, DigestExt};
use super::Sha3256;
fn digest_to_hex(msg: &str) -> String {
Sha3256::default().digest(msg.as_bytes()).to_hex()
}
#[test]
fn test_sha3256_empty() {
assert_eq!(digest_to_hex("").as_slice(),
concat!("a7ffc6f8bf1ed766",
"51c14756a061d662",
"f580ff4de43b49fa",
"82d80a4b80f8434a"));
}
}