-
Notifications
You must be signed in to change notification settings - Fork 125
/
Copy pathprivate_key.rs
67 lines (54 loc) · 2.22 KB
/
private_key.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
use super::Ed25519Signature;
use crate::internal_prelude::*;
use ed25519_dalek::{Keypair, PublicKey, SecretKey, Signer};
use zeroize::Zeroize;
#[derive(Zeroize)]
#[zeroize(drop)]
pub struct Ed25519PrivateKey(SecretKey);
impl Ed25519PrivateKey {
pub const LENGTH: usize = 32;
pub fn public_key(&self) -> Ed25519PublicKey {
Ed25519PublicKey(PublicKey::from(&self.0).to_bytes())
}
pub fn sign(&self, msg_hash: &impl IsHash) -> Ed25519Signature {
let keypair = Keypair {
secret: SecretKey::from_bytes(self.0.as_bytes()).expect("From a valid key bytes"),
public: PublicKey::from(&self.0),
};
// SHA512 is used here
Ed25519Signature(keypair.sign(msg_hash.as_ref()).to_bytes())
}
pub fn to_bytes(&self) -> Vec<u8> {
self.0.to_bytes().to_vec()
}
pub fn from_bytes(slice: &[u8]) -> Result<Self, ()> {
if slice.len() != Ed25519PrivateKey::LENGTH {
return Err(());
}
Ok(Self(SecretKey::from_bytes(slice).map_err(|_| ())?))
}
pub fn from_u64(n: u64) -> Result<Self, ()> {
let mut bytes = [0u8; Ed25519PrivateKey::LENGTH];
(&mut bytes[Ed25519PrivateKey::LENGTH - 8..Ed25519PrivateKey::LENGTH])
.copy_from_slice(&n.to_be_bytes());
Ok(Self(SecretKey::from_bytes(&bytes).map_err(|_| ())?))
}
}
#[cfg(test)]
mod tests {
use super::*;
use sbor::rust::str::FromStr;
#[test]
fn sign_and_verify() {
let test_sk = "0000000000000000000000000000000000000000000000000000000000000001";
let test_pk = "4cb5abf6ad79fbf5abbccafcc269d85cd2651ed4b885b5869f241aedf0a5ba29";
let test_message_hash = hash("Test");
let test_signature = "cf0ca64435609b85ab170da339d415bbac87d678dfd505969be20adc6b5971f4ee4b4620c602bcbc34fd347596546675099d696265f4a42a16df343da1af980e";
let sk = Ed25519PrivateKey::from_bytes(&hex::decode(test_sk).unwrap()).unwrap();
let pk = Ed25519PublicKey::from_str(test_pk).unwrap();
let sig = Ed25519Signature::from_str(test_signature).unwrap();
assert_eq!(sk.public_key(), pk);
assert_eq!(sk.sign(&test_message_hash), sig);
assert!(verify_ed25519(&test_message_hash, &pk, &sig));
}
}