|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
use super::error::DecodingError; |
|
|
use core::cmp; |
|
|
use core::fmt; |
|
|
use core::hash; |
|
|
use ed25519_dalek::{self as ed25519, Signer as _, Verifier as _}; |
|
|
use zeroize::Zeroize; |
|
|
|
|
|
|
|
|
#[derive(Clone)] |
|
|
pub struct Keypair(ed25519::SigningKey); |
|
|
|
|
|
impl Keypair { |
|
|
|
|
|
#[cfg(feature = "rand")] |
|
|
pub fn generate() -> Keypair { |
|
|
Keypair::from(SecretKey::generate()) |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
pub fn to_bytes(&self) -> [u8; 64] { |
|
|
self.0.to_keypair_bytes() |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
pub fn try_from_bytes(kp: &mut [u8]) -> Result<Keypair, DecodingError> { |
|
|
let bytes = <[u8; 64]>::try_from(&*kp) |
|
|
.map_err(|e| DecodingError::failed_to_parse("Ed25519 keypair", e))?; |
|
|
|
|
|
ed25519::SigningKey::from_keypair_bytes(&bytes) |
|
|
.map(|k| { |
|
|
kp.zeroize(); |
|
|
Keypair(k) |
|
|
}) |
|
|
.map_err(|e| DecodingError::failed_to_parse("Ed25519 keypair", e)) |
|
|
} |
|
|
|
|
|
|
|
|
pub fn sign(&self, msg: &[u8]) -> Vec<u8> { |
|
|
self.0.sign(msg).to_bytes().to_vec() |
|
|
} |
|
|
|
|
|
|
|
|
pub fn public(&self) -> PublicKey { |
|
|
PublicKey(self.0.verifying_key()) |
|
|
} |
|
|
|
|
|
|
|
|
pub fn secret(&self) -> SecretKey { |
|
|
SecretKey(self.0.to_bytes()) |
|
|
} |
|
|
} |
|
|
|
|
|
impl fmt::Debug for Keypair { |
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
|
|
f.debug_struct("Keypair") |
|
|
.field("public", &self.0.verifying_key()) |
|
|
.finish() |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
impl From<Keypair> for SecretKey { |
|
|
fn from(kp: Keypair) -> SecretKey { |
|
|
SecretKey(kp.0.to_bytes()) |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
impl From<SecretKey> for Keypair { |
|
|
fn from(sk: SecretKey) -> Keypair { |
|
|
let signing = ed25519::SigningKey::from_bytes(&sk.0); |
|
|
Keypair(signing) |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
#[derive(Eq, Clone)] |
|
|
pub struct PublicKey(ed25519::VerifyingKey); |
|
|
|
|
|
impl fmt::Debug for PublicKey { |
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
|
|
f.write_str("PublicKey(compressed): ")?; |
|
|
for byte in self.0.as_bytes() { |
|
|
write!(f, "{byte:x}")?; |
|
|
} |
|
|
Ok(()) |
|
|
} |
|
|
} |
|
|
|
|
|
impl cmp::PartialEq for PublicKey { |
|
|
fn eq(&self, other: &Self) -> bool { |
|
|
self.0.as_bytes().eq(other.0.as_bytes()) |
|
|
} |
|
|
} |
|
|
|
|
|
impl hash::Hash for PublicKey { |
|
|
fn hash<H: hash::Hasher>(&self, state: &mut H) { |
|
|
self.0.as_bytes().hash(state); |
|
|
} |
|
|
} |
|
|
|
|
|
impl cmp::PartialOrd for PublicKey { |
|
|
fn partial_cmp(&self, other: &Self) -> Option<cmp::Ordering> { |
|
|
Some(self.cmp(other)) |
|
|
} |
|
|
} |
|
|
|
|
|
impl cmp::Ord for PublicKey { |
|
|
fn cmp(&self, other: &Self) -> cmp::Ordering { |
|
|
self.0.as_bytes().cmp(other.0.as_bytes()) |
|
|
} |
|
|
} |
|
|
|
|
|
impl PublicKey { |
|
|
|
|
|
pub fn verify(&self, msg: &[u8], sig: &[u8]) -> bool { |
|
|
ed25519::Signature::try_from(sig) |
|
|
.and_then(|s| self.0.verify(msg, &s)) |
|
|
.is_ok() |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
pub fn to_bytes(&self) -> [u8; 32] { |
|
|
self.0.to_bytes() |
|
|
} |
|
|
|
|
|
|
|
|
pub fn try_from_bytes(k: &[u8]) -> Result<PublicKey, DecodingError> { |
|
|
let k = <[u8; 32]>::try_from(k) |
|
|
.map_err(|e| DecodingError::failed_to_parse("Ed25519 public key", e))?; |
|
|
ed25519::VerifyingKey::from_bytes(&k) |
|
|
.map_err(|e| DecodingError::failed_to_parse("Ed25519 public key", e)) |
|
|
.map(PublicKey) |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
#[derive(Clone)] |
|
|
pub struct SecretKey(ed25519::SecretKey); |
|
|
|
|
|
|
|
|
impl AsRef<[u8]> for SecretKey { |
|
|
fn as_ref(&self) -> &[u8] { |
|
|
&self.0[..] |
|
|
} |
|
|
} |
|
|
|
|
|
impl fmt::Debug for SecretKey { |
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
|
|
write!(f, "SecretKey") |
|
|
} |
|
|
} |
|
|
|
|
|
impl SecretKey { |
|
|
|
|
|
#[cfg(feature = "rand")] |
|
|
pub fn generate() -> SecretKey { |
|
|
let signing = ed25519::SigningKey::generate(&mut rand::rngs::OsRng); |
|
|
SecretKey(signing.to_bytes()) |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
pub fn try_from_bytes(mut sk_bytes: impl AsMut<[u8]>) -> Result<SecretKey, DecodingError> { |
|
|
let sk_bytes = sk_bytes.as_mut(); |
|
|
let secret = <[u8; 32]>::try_from(&*sk_bytes) |
|
|
.map_err(|e| DecodingError::failed_to_parse("Ed25519 secret key", e))?; |
|
|
sk_bytes.zeroize(); |
|
|
Ok(SecretKey(secret)) |
|
|
} |
|
|
|
|
|
pub(crate) fn to_bytes(&self) -> [u8; 32] { |
|
|
self.0 |
|
|
} |
|
|
} |
|
|
|
|
|
#[cfg(test)] |
|
|
mod tests { |
|
|
use super::*; |
|
|
use quickcheck::*; |
|
|
|
|
|
fn eq_keypairs(kp1: &Keypair, kp2: &Keypair) -> bool { |
|
|
kp1.public() == kp2.public() && kp1.0.to_bytes() == kp2.0.to_bytes() |
|
|
} |
|
|
|
|
|
#[test] |
|
|
#[cfg(feature = "rand")] |
|
|
fn ed25519_keypair_encode_decode() { |
|
|
fn prop() -> bool { |
|
|
let kp1 = Keypair::generate(); |
|
|
let mut kp1_enc = kp1.to_bytes(); |
|
|
let kp2 = Keypair::try_from_bytes(&mut kp1_enc).unwrap(); |
|
|
eq_keypairs(&kp1, &kp2) && kp1_enc.iter().all(|b| *b == 0) |
|
|
} |
|
|
QuickCheck::new().tests(10).quickcheck(prop as fn() -> _); |
|
|
} |
|
|
|
|
|
#[test] |
|
|
#[cfg(feature = "rand")] |
|
|
fn ed25519_keypair_from_secret() { |
|
|
fn prop() -> bool { |
|
|
let kp1 = Keypair::generate(); |
|
|
let mut sk = kp1.0.to_bytes(); |
|
|
let kp2 = Keypair::from(SecretKey::try_from_bytes(&mut sk).unwrap()); |
|
|
eq_keypairs(&kp1, &kp2) && sk == [0u8; 32] |
|
|
} |
|
|
QuickCheck::new().tests(10).quickcheck(prop as fn() -> _); |
|
|
} |
|
|
|
|
|
#[test] |
|
|
#[cfg(feature = "rand")] |
|
|
fn ed25519_signature() { |
|
|
let kp = Keypair::generate(); |
|
|
let pk = kp.public(); |
|
|
|
|
|
let msg = "hello world".as_bytes(); |
|
|
let sig = kp.sign(msg); |
|
|
assert!(pk.verify(msg, &sig)); |
|
|
|
|
|
let mut invalid_sig = sig.clone(); |
|
|
invalid_sig[3..6].copy_from_slice(&[10, 23, 42]); |
|
|
assert!(!pk.verify(msg, &invalid_sig)); |
|
|
|
|
|
let invalid_msg = "h3ll0 w0rld".as_bytes(); |
|
|
assert!(!pk.verify(invalid_msg, &sig)); |
|
|
} |
|
|
} |
|
|
|