1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
use std::ops::DerefMut;
use std::sync::{Arc, Mutex};
use rand_core::{CryptoRng, RngCore};
use crate::sign::Result;
use crate::{protocol::AttenuationKeyGenerator, sign::Error};
use super::{Ed25519PrivateKey, Ed25519PublicKey};
#[derive(Clone)]
pub struct EddsaKeyGen<RNG: RngCore + CryptoRng> {
rng: Arc<Mutex<RNG>>,
}
impl<RNG: RngCore + CryptoRng> EddsaKeyGen<RNG> {
pub fn new(rng: RNG) -> Self {
EddsaKeyGen {
rng: Arc::new(Mutex::new(rng)),
}
}
}
#[cfg(any(feature = "rng", test))]
impl EddsaKeyGen<rand::rngs::StdRng> {
pub fn new_with_std_rng() -> Self {
use rand::SeedableRng;
EddsaKeyGen {
rng: Arc::new(Mutex::new(rand::rngs::StdRng::from_entropy())),
}
}
}
impl<RNG: RngCore + CryptoRng> AttenuationKeyGenerator<Ed25519PublicKey, Ed25519PrivateKey>
for EddsaKeyGen<RNG>
{
fn generate_attenuation_key(&self) -> Result<(Ed25519PublicKey, Ed25519PrivateKey)> {
let mut rng = self.rng.lock().map_err(|_| Error::CryptoError)?;
let keypair = ed25519_dalek::Keypair::generate(rng.deref_mut());
let pub_key = Ed25519PublicKey::new(keypair.public);
let priv_key = Ed25519PrivateKey::new("aky".to_owned(), keypair);
Ok((pub_key, priv_key))
}
}