2018-11-16 08:04:46 -08:00
|
|
|
//! The `signature` module provides functionality for public, and private keys.
|
|
|
|
|
2018-12-14 20:39:10 -08:00
|
|
|
use crate::pubkey::Pubkey;
|
2019-11-07 17:08:10 -08:00
|
|
|
use generic_array::{typenum::U64, GenericArray};
|
2019-11-22 10:20:40 -05:00
|
|
|
use hmac::Hmac;
|
2020-02-12 14:15:12 -07:00
|
|
|
use rand::{rngs::OsRng, CryptoRng, RngCore};
|
2019-11-07 17:08:10 -08:00
|
|
|
use std::{
|
|
|
|
borrow::{Borrow, Cow},
|
|
|
|
error, fmt,
|
2019-11-19 18:26:21 -07:00
|
|
|
fs::{self, File, OpenOptions},
|
2019-11-07 17:08:10 -08:00
|
|
|
io::{Read, Write},
|
|
|
|
mem,
|
|
|
|
path::Path,
|
|
|
|
str::FromStr,
|
|
|
|
};
|
2020-02-13 17:53:09 -07:00
|
|
|
use thiserror::Error;
|
2018-11-16 08:04:46 -08:00
|
|
|
|
2020-02-12 14:15:12 -07:00
|
|
|
#[derive(Debug, Default)]
|
|
|
|
pub struct Keypair(ed25519_dalek::Keypair);
|
|
|
|
|
|
|
|
impl Keypair {
|
|
|
|
pub fn generate<R>(csprng: &mut R) -> Self
|
|
|
|
where
|
|
|
|
R: CryptoRng + RngCore,
|
|
|
|
{
|
|
|
|
Self(ed25519_dalek::Keypair::generate(csprng))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Return a new ED25519 keypair
|
|
|
|
pub fn new() -> Self {
|
|
|
|
let mut rng = OsRng::new().unwrap();
|
|
|
|
Self::generate(&mut rng)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn from_bytes(bytes: &[u8]) -> Result<Self, ed25519_dalek::SignatureError> {
|
|
|
|
ed25519_dalek::Keypair::from_bytes(bytes).map(Self)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn to_bytes(&self) -> [u8; 64] {
|
|
|
|
self.0.to_bytes()
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn secret(&self) -> &ed25519_dalek::SecretKey {
|
|
|
|
&self.0.secret
|
|
|
|
}
|
|
|
|
}
|
2018-11-16 08:04:46 -08:00
|
|
|
|
2019-07-15 13:17:17 -06:00
|
|
|
#[repr(transparent)]
|
2018-11-16 08:04:46 -08:00
|
|
|
#[derive(Serialize, Deserialize, Clone, Copy, Default, Eq, PartialEq, Ord, PartialOrd, Hash)]
|
|
|
|
pub struct Signature(GenericArray<u8, U64>);
|
|
|
|
|
|
|
|
impl Signature {
|
|
|
|
pub fn new(signature_slice: &[u8]) -> Self {
|
2019-03-17 19:48:12 -07:00
|
|
|
Self(GenericArray::clone_from_slice(&signature_slice))
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify(&self, pubkey_bytes: &[u8], message_bytes: &[u8]) -> bool {
|
2019-04-18 14:37:20 -06:00
|
|
|
let pubkey = ed25519_dalek::PublicKey::from_bytes(pubkey_bytes);
|
|
|
|
let signature = ed25519_dalek::Signature::from_bytes(self.0.as_slice());
|
|
|
|
if pubkey.is_err() || signature.is_err() {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
pubkey
|
|
|
|
.unwrap()
|
|
|
|
.verify(message_bytes, &signature.unwrap())
|
|
|
|
.is_ok()
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-01 12:00:30 -08:00
|
|
|
pub trait Signable {
|
|
|
|
fn sign(&mut self, keypair: &Keypair) {
|
2019-06-12 16:43:05 -07:00
|
|
|
let signature = keypair.sign_message(self.signable_data().borrow());
|
|
|
|
self.set_signature(signature);
|
2018-12-01 12:00:30 -08:00
|
|
|
}
|
|
|
|
fn verify(&self) -> bool {
|
|
|
|
self.get_signature()
|
2019-06-12 16:43:05 -07:00
|
|
|
.verify(&self.pubkey().as_ref(), self.signable_data().borrow())
|
2018-12-01 12:00:30 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
fn pubkey(&self) -> Pubkey;
|
2019-06-12 16:43:05 -07:00
|
|
|
fn signable_data(&self) -> Cow<[u8]>;
|
2018-12-01 12:00:30 -08:00
|
|
|
fn get_signature(&self) -> Signature;
|
|
|
|
fn set_signature(&mut self, signature: Signature);
|
|
|
|
}
|
|
|
|
|
2018-11-16 08:04:46 -08:00
|
|
|
impl AsRef<[u8]> for Signature {
|
|
|
|
fn as_ref(&self) -> &[u8] {
|
|
|
|
&self.0[..]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Debug for Signature {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
write!(f, "{}", bs58::encode(self.0).into_string())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Display for Signature {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
write!(f, "{}", bs58::encode(self.0).into_string())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-15 13:17:17 -06:00
|
|
|
impl Into<[u8; 64]> for Signature {
|
|
|
|
fn into(self) -> [u8; 64] {
|
|
|
|
<GenericArray<u8, U64> as Into<[u8; 64]>>::into(self.0)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-16 14:54:31 -07:00
|
|
|
#[derive(Debug, Clone, PartialEq, Eq)]
|
|
|
|
pub enum ParseSignatureError {
|
|
|
|
WrongSize,
|
|
|
|
Invalid,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl FromStr for Signature {
|
|
|
|
type Err = ParseSignatureError;
|
|
|
|
|
|
|
|
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
|
|
|
let bytes = bs58::decode(s)
|
|
|
|
.into_vec()
|
|
|
|
.map_err(|_| ParseSignatureError::Invalid)?;
|
|
|
|
if bytes.len() != mem::size_of::<Signature>() {
|
|
|
|
Err(ParseSignatureError::WrongSize)
|
|
|
|
} else {
|
|
|
|
Ok(Signature::new(&bytes))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-16 08:04:46 -08:00
|
|
|
pub trait KeypairUtil {
|
2020-02-13 14:08:35 -07:00
|
|
|
fn pubkey(&self) -> Pubkey {
|
|
|
|
self.try_pubkey().unwrap_or_default()
|
|
|
|
}
|
|
|
|
fn try_pubkey(&self) -> Result<Pubkey, Box<dyn error::Error>>;
|
|
|
|
fn sign_message(&self, message: &[u8]) -> Signature {
|
|
|
|
self.try_sign_message(message).unwrap_or_default()
|
|
|
|
}
|
|
|
|
fn try_sign_message(&self, message: &[u8]) -> Result<Signature, Box<dyn error::Error>>;
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
2019-04-18 14:37:20 -06:00
|
|
|
impl KeypairUtil for Keypair {
|
2018-11-16 08:04:46 -08:00
|
|
|
/// Return the public key for the given keypair
|
|
|
|
fn pubkey(&self) -> Pubkey {
|
2020-02-12 14:15:12 -07:00
|
|
|
Pubkey::new(self.0.public.as_ref())
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
2019-01-25 23:41:20 -07:00
|
|
|
|
2020-02-13 14:08:35 -07:00
|
|
|
fn try_pubkey(&self) -> Result<Pubkey, Box<dyn error::Error>> {
|
|
|
|
Ok(self.pubkey())
|
|
|
|
}
|
|
|
|
|
2019-01-25 23:41:20 -07:00
|
|
|
fn sign_message(&self, message: &[u8]) -> Signature {
|
2020-02-12 14:15:12 -07:00
|
|
|
Signature::new(&self.0.sign(message).to_bytes())
|
2019-01-25 23:41:20 -07:00
|
|
|
}
|
2020-02-13 14:08:35 -07:00
|
|
|
|
|
|
|
fn try_sign_message(&self, message: &[u8]) -> Result<Signature, Box<dyn error::Error>> {
|
|
|
|
Ok(self.sign_message(message))
|
|
|
|
}
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
|
|
|
|
2020-02-13 17:53:09 -07:00
|
|
|
impl<T> PartialEq<T> for Keypair
|
|
|
|
where
|
|
|
|
T: KeypairUtil,
|
|
|
|
{
|
|
|
|
fn eq(&self, other: &T) -> bool {
|
|
|
|
self.pubkey() == other.pubkey()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Default)]
|
|
|
|
pub struct Presigner {
|
|
|
|
pubkey: Pubkey,
|
|
|
|
signature: Signature,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Presigner {
|
|
|
|
#[allow(dead_code)]
|
|
|
|
fn new(pubkey: &Pubkey, signature: &Signature) -> Self {
|
|
|
|
Self {
|
|
|
|
pubkey: *pubkey,
|
|
|
|
signature: *signature,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Error, PartialEq)]
|
|
|
|
enum PresignerError {
|
|
|
|
#[error("pre-generated signature cannot verify data")]
|
|
|
|
VerificationFailure,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl KeypairUtil for Presigner {
|
|
|
|
fn try_pubkey(&self) -> Result<Pubkey, Box<dyn error::Error>> {
|
|
|
|
Ok(self.pubkey)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn try_sign_message(&self, message: &[u8]) -> Result<Signature, Box<dyn error::Error>> {
|
|
|
|
if self.signature.verify(self.pubkey.as_ref(), message) {
|
|
|
|
Ok(self.signature)
|
|
|
|
} else {
|
|
|
|
Err(PresignerError::VerificationFailure.into())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T> PartialEq<T> for Presigner
|
|
|
|
where
|
|
|
|
T: KeypairUtil,
|
|
|
|
{
|
|
|
|
fn eq(&self, other: &T) -> bool {
|
|
|
|
self.pubkey() == other.pubkey()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-10 17:01:03 -06:00
|
|
|
pub fn read_keypair<R: Read>(reader: &mut R) -> Result<Keypair, Box<dyn error::Error>> {
|
|
|
|
let bytes: Vec<u8> = serde_json::from_reader(reader)?;
|
2020-02-12 14:15:12 -07:00
|
|
|
let dalek_keypair = ed25519_dalek::Keypair::from_bytes(&bytes)
|
2019-05-09 11:03:14 -07:00
|
|
|
.map_err(|e| std::io::Error::new(std::io::ErrorKind::Other, e.to_string()))?;
|
2020-02-12 14:15:12 -07:00
|
|
|
Ok(Keypair(dalek_keypair))
|
2018-11-16 08:04:46 -08:00
|
|
|
}
|
2018-12-12 13:13:18 -08:00
|
|
|
|
2019-10-10 17:01:03 -06:00
|
|
|
pub fn read_keypair_file(path: &str) -> Result<Keypair, Box<dyn error::Error>> {
|
|
|
|
assert!(path != "-");
|
|
|
|
let mut file = File::open(path.to_string())?;
|
|
|
|
read_keypair(&mut file)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn write_keypair<W: Write>(
|
|
|
|
keypair: &Keypair,
|
|
|
|
writer: &mut W,
|
|
|
|
) -> Result<String, Box<dyn error::Error>> {
|
2020-02-12 14:15:12 -07:00
|
|
|
let keypair_bytes = keypair.0.to_bytes();
|
2019-04-18 14:37:20 -06:00
|
|
|
let serialized = serde_json::to_string(&keypair_bytes.to_vec())?;
|
2019-10-10 17:01:03 -06:00
|
|
|
writer.write_all(&serialized.clone().into_bytes())?;
|
|
|
|
Ok(serialized)
|
|
|
|
}
|
2018-12-12 13:13:18 -08:00
|
|
|
|
2019-10-10 17:01:03 -06:00
|
|
|
pub fn write_keypair_file(
|
|
|
|
keypair: &Keypair,
|
|
|
|
outfile: &str,
|
|
|
|
) -> Result<String, Box<dyn error::Error>> {
|
|
|
|
assert!(outfile != "-");
|
|
|
|
if let Some(outdir) = Path::new(outfile).parent() {
|
|
|
|
fs::create_dir_all(outdir)?;
|
2018-12-12 13:13:18 -08:00
|
|
|
}
|
2019-11-19 18:26:21 -07:00
|
|
|
|
|
|
|
let mut f = {
|
|
|
|
#[cfg(not(unix))]
|
|
|
|
{
|
|
|
|
OpenOptions::new()
|
|
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
|
|
{
|
|
|
|
use std::os::unix::fs::OpenOptionsExt;
|
|
|
|
OpenOptions::new().mode(0o600)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
.write(true)
|
2019-11-21 11:02:04 -07:00
|
|
|
.truncate(true)
|
2019-11-20 13:46:16 -07:00
|
|
|
.create(true)
|
2019-11-19 18:26:21 -07:00
|
|
|
.open(outfile)?;
|
|
|
|
|
2019-10-10 17:01:03 -06:00
|
|
|
write_keypair(keypair, &mut f)
|
2018-12-12 13:13:18 -08:00
|
|
|
}
|
2019-04-18 14:37:20 -06:00
|
|
|
|
2019-09-12 18:37:29 -07:00
|
|
|
pub fn keypair_from_seed(seed: &[u8]) -> Result<Keypair, Box<dyn error::Error>> {
|
|
|
|
if seed.len() < ed25519_dalek::SECRET_KEY_LENGTH {
|
|
|
|
return Err("Seed is too short".into());
|
|
|
|
}
|
|
|
|
let secret = ed25519_dalek::SecretKey::from_bytes(&seed[..ed25519_dalek::SECRET_KEY_LENGTH])
|
|
|
|
.map_err(|e| e.to_string())?;
|
|
|
|
let public = ed25519_dalek::PublicKey::from(&secret);
|
2020-02-12 14:15:12 -07:00
|
|
|
let dalek_keypair = ed25519_dalek::Keypair { secret, public };
|
|
|
|
Ok(Keypair(dalek_keypair))
|
2019-09-12 18:37:29 -07:00
|
|
|
}
|
|
|
|
|
2019-11-22 10:20:40 -05:00
|
|
|
pub fn keypair_from_seed_phrase_and_passphrase(
|
|
|
|
seed_phrase: &str,
|
|
|
|
passphrase: &str,
|
|
|
|
) -> Result<Keypair, Box<dyn error::Error>> {
|
|
|
|
const PBKDF2_ROUNDS: usize = 2048;
|
|
|
|
const PBKDF2_BYTES: usize = 64;
|
|
|
|
|
|
|
|
let salt = format!("mnemonic{}", passphrase);
|
|
|
|
|
|
|
|
let mut seed = vec![0u8; PBKDF2_BYTES];
|
|
|
|
pbkdf2::pbkdf2::<Hmac<sha2::Sha512>>(
|
|
|
|
seed_phrase.as_bytes(),
|
|
|
|
salt.as_bytes(),
|
|
|
|
PBKDF2_ROUNDS,
|
|
|
|
&mut seed,
|
|
|
|
);
|
|
|
|
keypair_from_seed(&seed[..])
|
|
|
|
}
|
|
|
|
|
2019-04-18 14:37:20 -06:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2019-11-22 10:20:40 -05:00
|
|
|
use bip39::{Language, Mnemonic, MnemonicType, Seed};
|
2019-04-18 14:37:20 -06:00
|
|
|
use std::mem;
|
|
|
|
|
|
|
|
fn tmp_file_path(name: &str) -> String {
|
|
|
|
use std::env;
|
2019-07-17 14:27:58 -07:00
|
|
|
let out_dir = env::var("FARF_DIR").unwrap_or_else(|_| "farf".to_string());
|
2019-04-18 14:37:20 -06:00
|
|
|
let keypair = Keypair::new();
|
|
|
|
|
|
|
|
format!("{}/tmp/{}-{}", out_dir, name, keypair.pubkey()).to_string()
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2019-11-19 18:26:21 -07:00
|
|
|
fn test_write_keypair_file() {
|
2019-11-20 13:46:16 -07:00
|
|
|
let outfile = tmp_file_path("test_write_keypair_file.json");
|
2019-11-19 18:26:21 -07:00
|
|
|
let serialized_keypair = write_keypair_file(&Keypair::new(), &outfile).unwrap();
|
2019-04-18 14:37:20 -06:00
|
|
|
let keypair_vec: Vec<u8> = serde_json::from_str(&serialized_keypair).unwrap();
|
|
|
|
assert!(Path::new(&outfile).exists());
|
|
|
|
assert_eq!(
|
|
|
|
keypair_vec,
|
2020-02-12 14:15:12 -07:00
|
|
|
read_keypair_file(&outfile).unwrap().0.to_bytes().to_vec()
|
2019-04-18 14:37:20 -06:00
|
|
|
);
|
2019-11-19 18:26:21 -07:00
|
|
|
|
|
|
|
#[cfg(unix)]
|
|
|
|
{
|
|
|
|
use std::os::unix::fs::PermissionsExt;
|
|
|
|
assert_eq!(
|
|
|
|
File::open(&outfile)
|
|
|
|
.expect("open")
|
|
|
|
.metadata()
|
|
|
|
.expect("metadata")
|
|
|
|
.permissions()
|
|
|
|
.mode()
|
|
|
|
& 0o777,
|
|
|
|
0o600
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-04-18 14:37:20 -06:00
|
|
|
assert_eq!(
|
2019-10-10 17:01:03 -06:00
|
|
|
read_keypair_file(&outfile).unwrap().pubkey().as_ref().len(),
|
2019-04-18 14:37:20 -06:00
|
|
|
mem::size_of::<Pubkey>()
|
|
|
|
);
|
|
|
|
fs::remove_file(&outfile).unwrap();
|
|
|
|
assert!(!Path::new(&outfile).exists());
|
|
|
|
}
|
2019-05-16 14:54:31 -07:00
|
|
|
|
2019-11-20 13:46:16 -07:00
|
|
|
#[test]
|
|
|
|
fn test_write_keypair_file_overwrite_ok() {
|
|
|
|
let outfile = tmp_file_path("test_write_keypair_file_overwrite_ok.json");
|
2019-11-21 11:02:04 -07:00
|
|
|
|
|
|
|
write_keypair_file(&Keypair::new(), &outfile).unwrap();
|
|
|
|
write_keypair_file(&Keypair::new(), &outfile).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_write_keypair_file_truncate() {
|
|
|
|
let outfile = tmp_file_path("test_write_keypair_file_truncate.json");
|
|
|
|
|
2019-11-20 13:46:16 -07:00
|
|
|
write_keypair_file(&Keypair::new(), &outfile).unwrap();
|
2019-11-21 11:02:04 -07:00
|
|
|
read_keypair_file(&outfile).unwrap();
|
|
|
|
|
|
|
|
// Ensure outfile is truncated
|
|
|
|
{
|
|
|
|
let mut f = File::create(&outfile).unwrap();
|
|
|
|
f.write_all(String::from_utf8([b'a'; 2048].to_vec()).unwrap().as_bytes())
|
|
|
|
.unwrap();
|
|
|
|
}
|
2019-11-20 13:46:16 -07:00
|
|
|
write_keypair_file(&Keypair::new(), &outfile).unwrap();
|
2019-11-21 11:02:04 -07:00
|
|
|
read_keypair_file(&outfile).unwrap();
|
2019-11-20 13:46:16 -07:00
|
|
|
}
|
|
|
|
|
2019-09-12 18:37:29 -07:00
|
|
|
#[test]
|
|
|
|
fn test_keypair_from_seed() {
|
|
|
|
let good_seed = vec![0; 32];
|
|
|
|
assert!(keypair_from_seed(&good_seed).is_ok());
|
|
|
|
|
|
|
|
let too_short_seed = vec![0; 31];
|
|
|
|
assert!(keypair_from_seed(&too_short_seed).is_err());
|
|
|
|
}
|
|
|
|
|
2019-05-16 14:54:31 -07:00
|
|
|
#[test]
|
|
|
|
fn test_signature_fromstr() {
|
|
|
|
let signature = Keypair::new().sign_message(&[0u8]);
|
|
|
|
|
|
|
|
let mut signature_base58_str = bs58::encode(signature).into_string();
|
|
|
|
|
|
|
|
assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
|
|
|
|
|
|
|
|
signature_base58_str.push_str(&bs58::encode(signature.0).into_string());
|
|
|
|
assert_eq!(
|
|
|
|
signature_base58_str.parse::<Signature>(),
|
|
|
|
Err(ParseSignatureError::WrongSize)
|
|
|
|
);
|
|
|
|
|
|
|
|
signature_base58_str.truncate(signature_base58_str.len() / 2);
|
|
|
|
assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
|
|
|
|
|
|
|
|
signature_base58_str.truncate(signature_base58_str.len() / 2);
|
|
|
|
assert_eq!(
|
|
|
|
signature_base58_str.parse::<Signature>(),
|
|
|
|
Err(ParseSignatureError::WrongSize)
|
|
|
|
);
|
|
|
|
|
|
|
|
let mut signature_base58_str = bs58::encode(signature.0).into_string();
|
|
|
|
assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
|
|
|
|
|
|
|
|
// throw some non-base58 stuff in there
|
|
|
|
signature_base58_str.replace_range(..1, "I");
|
|
|
|
assert_eq!(
|
|
|
|
signature_base58_str.parse::<Signature>(),
|
|
|
|
Err(ParseSignatureError::Invalid)
|
|
|
|
);
|
|
|
|
}
|
2019-11-22 10:20:40 -05:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_keypair_from_seed_phrase_and_passphrase() {
|
|
|
|
let mnemonic = Mnemonic::new(MnemonicType::Words12, Language::English);
|
|
|
|
let passphrase = "42";
|
|
|
|
let seed = Seed::new(&mnemonic, passphrase);
|
|
|
|
let expected_keypair = keypair_from_seed(seed.as_bytes()).unwrap();
|
|
|
|
let keypair =
|
|
|
|
keypair_from_seed_phrase_and_passphrase(mnemonic.phrase(), passphrase).unwrap();
|
|
|
|
assert_eq!(keypair.pubkey(), expected_keypair.pubkey());
|
|
|
|
}
|
2020-02-13 17:53:09 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_keypair() {
|
|
|
|
let keypair = keypair_from_seed(&[0u8; 32]).unwrap();
|
|
|
|
let pubkey = keypair.pubkey();
|
|
|
|
let data = [1u8];
|
|
|
|
let sig = keypair.sign_message(&data);
|
|
|
|
|
|
|
|
// KeypairUtil
|
|
|
|
assert_eq!(keypair.try_pubkey().unwrap(), pubkey);
|
|
|
|
assert_eq!(keypair.pubkey(), pubkey);
|
|
|
|
assert_eq!(keypair.try_sign_message(&data).unwrap(), sig);
|
|
|
|
assert_eq!(keypair.sign_message(&data), sig);
|
|
|
|
|
|
|
|
// PartialEq
|
|
|
|
let keypair2 = keypair_from_seed(&[0u8; 32]).unwrap();
|
|
|
|
assert_eq!(keypair, keypair2);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_presigner() {
|
|
|
|
let keypair = keypair_from_seed(&[0u8; 32]).unwrap();
|
|
|
|
let pubkey = keypair.pubkey();
|
|
|
|
let data = [1u8];
|
|
|
|
let sig = keypair.sign_message(&data);
|
|
|
|
|
|
|
|
// KeypairUtil
|
|
|
|
let presigner = Presigner::new(&pubkey, &sig);
|
|
|
|
assert_eq!(presigner.try_pubkey().unwrap(), pubkey);
|
|
|
|
assert_eq!(presigner.pubkey(), pubkey);
|
|
|
|
assert_eq!(presigner.try_sign_message(&data).unwrap(), sig);
|
|
|
|
assert_eq!(presigner.sign_message(&data), sig);
|
|
|
|
let bad_data = [2u8];
|
|
|
|
assert!(presigner.try_sign_message(&bad_data).is_err());
|
|
|
|
assert_eq!(presigner.sign_message(&bad_data), Signature::default());
|
|
|
|
|
|
|
|
// PartialEq
|
|
|
|
assert_eq!(presigner, keypair);
|
|
|
|
assert_eq!(keypair, presigner);
|
|
|
|
let presigner2 = Presigner::new(&pubkey, &sig);
|
|
|
|
assert_eq!(presigner, presigner2);
|
|
|
|
}
|
2019-04-18 14:37:20 -06:00
|
|
|
}
|