1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
#[derive(Clone)]
pub struct Sha3384([u64; 25], Vec<u8>);
mod impls {
use std::default::Default;
use std::hash::Hasher;
use std::io::prelude::*;
use std::io;
use bswap::leu64;
use super::Sha3384;
use utils::{Reset,
Digest,
DigestExt,
ReadPadBlocksExt,
StdPad};
impl Default for Sha3384 {
fn default() -> Sha3384 {
Sha3384([0u64; 25], Vec::new())
}
}
impl Reset for Sha3384 {
fn reset(&mut self) {
self.0 = [0u64; 25];
self.1.clear();
}
}
impl Write for Sha3384 {
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
Write::write(&mut self.1, buf)
}
fn flush(&mut self) -> io::Result<()> {
let ref buf = self.1;
for block in buf.pad_blocks(104, |_: usize| {
StdPad::with_prefix(0x06u8, vec![0x80u8], 104)
}) {
super::super::keccak::ops::digest_block(&mut self.0, block);
}
Ok(())
}
}
impl Read for Sha3384 {
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
let state_buf = &self.0[..buf.len()/8];
leu64::encode_slice(buf, state_buf);
Ok(buf.len())
}
}
impl Hasher for Sha3384 {
fn finish(&self) -> u64 {
let mut h = self.clone();
h.flush().unwrap();
h.0[0]
}
fn write(&mut self, buf: &[u8]) {
Write::write(self, buf).unwrap();
}
}
impl Digest for Sha3384 {}
impl DigestExt for Sha3384 {
fn default_len() -> usize {
return 48;
}
}
}
#[cfg(test)]
mod tests {
use std::default::Default;
use serialize::hex::ToHex;
use utils::{Digest, DigestExt};
use super::Sha3384;
fn digest_to_hex(msg: &str) -> String {
Sha3384::default().digest(msg.as_bytes()).to_hex()
}
#[test]
fn test_sha3384_empty() {
assert_eq!(digest_to_hex("").as_slice(),
concat!("0c63a75b845e4f7d01107d852e4c2485",
"c51a50aaaa94fc61995e71bbee983a2a",
"c3713831264adb47fb6bd1e058d5f004"));
}
}