2018-11-16 08:04:46 -08:00
|
|
|
//! The `signature` module provides functionality for public, and private keys.
|
|
|
|
|
2018-12-14 20:39:10 -08:00
|
|
|
use crate::pubkey::Pubkey;
|
2018-11-16 08:04:46 -08:00
|
|
|
use bs58;
|
|
|
|
use generic_array::typenum::U64;
|
|
|
|
use generic_array::GenericArray;
|
2019-04-18 11:47:34 -06:00
|
|
|
use ring::signature::Ed25519KeyPair;
|
|
|
|
use ring::{rand, signature};
|
2018-11-16 08:04:46 -08:00
|
|
|
use serde_json;
|
|
|
|
use std::error;
|
|
|
|
use std::fmt;
|
2018-12-12 13:13:18 -08:00
|
|
|
use std::fs::{self, File};
|
|
|
|
use std::io::Write;
|
|
|
|
use std::path::Path;
|
2019-04-18 11:47:34 -06:00
|
|
|
use untrusted::Input;
|
2018-11-16 08:04:46 -08:00
|
|
|
|
2019-04-18 11:47:34 -06:00
|
|
|
pub type Keypair = Ed25519KeyPair;
|
2018-11-16 08:04:46 -08:00
|
|
|
|
|
|
|
#[derive(Serialize, Deserialize, Clone, Copy, Default, Eq, PartialEq, Ord, PartialOrd, Hash)]
|
|
|
|
pub struct Signature(GenericArray<u8, U64>);
|
|
|
|
|
|
|
|
impl Signature {
|
|
|
|
pub fn new(signature_slice: &[u8]) -> Self {
|
2019-03-17 19:48:12 -07:00
|
|
|
Self(GenericArray::clone_from_slice(&signature_slice))
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify(&self, pubkey_bytes: &[u8], message_bytes: &[u8]) -> bool {
|
2019-04-18 11:47:34 -06:00
|
|
|
let pubkey = Input::from(pubkey_bytes);
|
|
|
|
let message = Input::from(message_bytes);
|
|
|
|
let signature = Input::from(self.0.as_slice());
|
|
|
|
signature::verify(&signature::ED25519, pubkey, message, signature).is_ok()
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-01 12:00:30 -08:00
|
|
|
pub trait Signable {
|
|
|
|
fn sign(&mut self, keypair: &Keypair) {
|
|
|
|
let data = self.signable_data();
|
2019-01-25 23:41:20 -07:00
|
|
|
self.set_signature(keypair.sign_message(&data));
|
2018-12-01 12:00:30 -08:00
|
|
|
}
|
|
|
|
fn verify(&self) -> bool {
|
|
|
|
self.get_signature()
|
|
|
|
.verify(&self.pubkey().as_ref(), &self.signable_data())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn pubkey(&self) -> Pubkey;
|
|
|
|
fn signable_data(&self) -> Vec<u8>;
|
|
|
|
fn get_signature(&self) -> Signature;
|
|
|
|
fn set_signature(&mut self, signature: Signature);
|
|
|
|
}
|
|
|
|
|
2018-11-16 08:04:46 -08:00
|
|
|
impl AsRef<[u8]> for Signature {
|
|
|
|
fn as_ref(&self) -> &[u8] {
|
|
|
|
&self.0[..]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Debug for Signature {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
write!(f, "{}", bs58::encode(self.0).into_string())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Display for Signature {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
write!(f, "{}", bs58::encode(self.0).into_string())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub trait KeypairUtil {
|
|
|
|
fn new() -> Self;
|
|
|
|
fn pubkey(&self) -> Pubkey;
|
2019-01-25 23:41:20 -07:00
|
|
|
fn sign_message(&self, message: &[u8]) -> Signature;
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
2019-04-18 11:47:34 -06:00
|
|
|
impl KeypairUtil for Ed25519KeyPair {
|
2018-11-16 08:04:46 -08:00
|
|
|
/// Return a new ED25519 keypair
|
|
|
|
fn new() -> Self {
|
2019-04-18 11:47:34 -06:00
|
|
|
let rng = rand::SystemRandom::new();
|
|
|
|
let pkcs8_bytes = Ed25519KeyPair::generate_pkcs8(&rng).expect("generate_pkcs8");
|
|
|
|
Ed25519KeyPair::from_pkcs8(Input::from(&pkcs8_bytes)).expect("from_pcks8")
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Return the public key for the given keypair
|
|
|
|
fn pubkey(&self) -> Pubkey {
|
2019-04-18 11:47:34 -06:00
|
|
|
Pubkey::new(self.public_key_bytes())
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
2019-01-25 23:41:20 -07:00
|
|
|
|
|
|
|
fn sign_message(&self, message: &[u8]) -> Signature {
|
2019-04-18 11:47:34 -06:00
|
|
|
Signature::new(self.sign(message).as_ref())
|
2019-01-25 23:41:20 -07:00
|
|
|
}
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
2019-04-18 11:47:34 -06:00
|
|
|
pub fn read_pkcs8(path: &str) -> Result<Vec<u8>, Box<error::Error>> {
|
2019-04-18 10:38:32 -06:00
|
|
|
let file = File::open(path.to_string())?;
|
2019-04-18 11:47:34 -06:00
|
|
|
let pkcs8: Vec<u8> = serde_json::from_reader(file)?;
|
|
|
|
Ok(pkcs8)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn read_keypair(path: &str) -> Result<Keypair, Box<error::Error>> {
|
|
|
|
let pkcs8 = read_pkcs8(path)?;
|
|
|
|
let keypair = Ed25519KeyPair::from_pkcs8(Input::from(&pkcs8))?;
|
2018-11-16 08:04:46 -08:00
|
|
|
Ok(keypair)
|
|
|
|
}
|
2018-12-12 13:13:18 -08:00
|
|
|
|
2019-04-18 11:47:34 -06:00
|
|
|
pub fn gen_pkcs8() -> Result<Vec<u8>, Box<error::Error>> {
|
|
|
|
let rnd = rand::SystemRandom::new();
|
|
|
|
let pkcs8_bytes = Ed25519KeyPair::generate_pkcs8(&rnd)?;
|
|
|
|
Ok(pkcs8_bytes.to_vec())
|
|
|
|
}
|
|
|
|
|
|
|
|
//pub fn gen_keypair_file(outfile: String) -> Result<String, Box<dyn error::Error>> {
|
2018-12-12 13:13:18 -08:00
|
|
|
pub fn gen_keypair_file(outfile: String) -> Result<String, Box<error::Error>> {
|
2019-04-18 11:47:34 -06:00
|
|
|
let serialized = serde_json::to_string(&gen_pkcs8()?)?;
|
2018-12-12 13:13:18 -08:00
|
|
|
|
|
|
|
if outfile != "-" {
|
|
|
|
if let Some(outdir) = Path::new(&outfile).parent() {
|
|
|
|
fs::create_dir_all(outdir)?;
|
|
|
|
}
|
|
|
|
let mut f = File::create(outfile)?;
|
|
|
|
f.write_all(&serialized.clone().into_bytes())?;
|
|
|
|
}
|
|
|
|
Ok(serialized)
|
|
|
|
}
|