1cfg_if::cfg_if! {
2 if #[cfg(feature = "std")] {
3 use std::borrow::{Cow, ToOwned};
4 } else {
5 use alloc::borrow::{Cow, ToOwned};
6 }
7}
8use crate::PrivateKeyExt;
9use bytes::{Buf, BufMut};
10use commonware_codec::{Error as CodecError, FixedSize, Read, ReadExt, Write};
11use commonware_utils::{hex, union_unique, Array, Span};
12use core::{
13 fmt::{Debug, Display},
14 hash::{Hash, Hasher},
15 ops::Deref,
16};
17use p256::{
18 ecdsa::{
19 signature::{Signer, Verifier},
20 SigningKey, VerifyingKey,
21 },
22 elliptic_curve::scalar::IsHigh,
23};
24use rand_core::CryptoRngCore;
25use zeroize::{Zeroize, ZeroizeOnDrop};
26
27const CURVE_NAME: &str = "secp256r1";
28const PRIVATE_KEY_LENGTH: usize = 32;
29const PUBLIC_KEY_LENGTH: usize = 33; const SIGNATURE_LENGTH: usize = 64; #[derive(Clone, Eq, PartialEq, Zeroize, ZeroizeOnDrop)]
34pub struct PrivateKey {
35 raw: [u8; PRIVATE_KEY_LENGTH],
36 #[zeroize(skip)]
40 key: SigningKey,
41}
42
43impl crate::PrivateKey for PrivateKey {}
44
45impl crate::Signer for PrivateKey {
46 type Signature = Signature;
47 type PublicKey = PublicKey;
48
49 fn sign(&self, namespace: Option<&[u8]>, msg: &[u8]) -> Self::Signature {
50 let signature: p256::ecdsa::Signature = match namespace {
51 Some(namespace) => self.key.sign(&union_unique(namespace, msg)),
52 None => self.key.sign(msg),
53 };
54 let signature = match signature.normalize_s() {
55 Some(normalized) => normalized,
56 None => signature,
57 };
58 Signature::from(signature)
59 }
60
61 fn public_key(&self) -> Self::PublicKey {
62 let encoded = self.key.verifying_key().to_encoded_point(true);
63 let raw: [u8; PUBLIC_KEY_LENGTH] = encoded.as_bytes().try_into().unwrap();
64 Self::PublicKey {
65 raw,
66 key: self.key.verifying_key().to_owned(),
67 }
68 }
69}
70
71impl PrivateKeyExt for PrivateKey {
72 fn from_rng<R: CryptoRngCore>(rng: &mut R) -> Self {
73 let key = SigningKey::random(rng);
74 let raw = key.to_bytes().into();
75 Self { raw, key }
76 }
77}
78
79impl Write for PrivateKey {
80 fn write(&self, buf: &mut impl BufMut) {
81 self.raw.write(buf);
82 }
83}
84
85impl Read for PrivateKey {
86 type Cfg = ();
87
88 fn read_cfg(buf: &mut impl Buf, _: &()) -> Result<Self, CodecError> {
89 let raw = <[u8; Self::SIZE]>::read(buf)?;
90 let result = SigningKey::from_slice(&raw);
91 #[cfg(feature = "std")]
92 let key = result.map_err(|e| CodecError::Wrapped(CURVE_NAME, e.into()))?;
93 #[cfg(not(feature = "std"))]
94 let key = result
95 .map_err(|e| CodecError::Wrapped(CURVE_NAME, alloc::format!("{:?}", e).into()))?;
96 Ok(Self { raw, key })
97 }
98}
99
100impl FixedSize for PrivateKey {
101 const SIZE: usize = PRIVATE_KEY_LENGTH;
102}
103
104impl Span for PrivateKey {}
105
106impl Array for PrivateKey {}
107
108impl Hash for PrivateKey {
109 fn hash<H: Hasher>(&self, state: &mut H) {
110 self.raw.hash(state);
111 }
112}
113
114impl Ord for PrivateKey {
115 fn cmp(&self, other: &Self) -> core::cmp::Ordering {
116 self.raw.cmp(&other.raw)
117 }
118}
119
120impl PartialOrd for PrivateKey {
121 fn partial_cmp(&self, other: &Self) -> Option<core::cmp::Ordering> {
122 Some(self.cmp(other))
123 }
124}
125
126impl AsRef<[u8]> for PrivateKey {
127 fn as_ref(&self) -> &[u8] {
128 &self.raw
129 }
130}
131
132impl Deref for PrivateKey {
133 type Target = [u8];
134 fn deref(&self) -> &[u8] {
135 &self.raw
136 }
137}
138
139impl From<SigningKey> for PrivateKey {
140 fn from(signer: SigningKey) -> Self {
141 let raw = signer.to_bytes().into();
142 Self { raw, key: signer }
143 }
144}
145
146impl Debug for PrivateKey {
147 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
148 write!(f, "{}", hex(&self.raw))
149 }
150}
151
152impl Display for PrivateKey {
153 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
154 write!(f, "{}", hex(&self.raw))
155 }
156}
157
158#[derive(Clone, Eq, PartialEq, Ord, PartialOrd)]
160pub struct PublicKey {
161 raw: [u8; PUBLIC_KEY_LENGTH],
162 key: VerifyingKey,
163}
164
165impl From<PrivateKey> for PublicKey {
166 fn from(value: PrivateKey) -> Self {
167 let encoded = value.key.verifying_key().to_encoded_point(true);
168 let raw: [u8; PUBLIC_KEY_LENGTH] = encoded.as_bytes().try_into().unwrap();
169 Self {
170 raw,
171 key: *value.key.verifying_key(),
172 }
173 }
174}
175
176impl crate::PublicKey for PublicKey {}
177
178impl crate::Verifier for PublicKey {
179 type Signature = Signature;
180
181 fn verify(&self, namespace: Option<&[u8]>, msg: &[u8], sig: &Self::Signature) -> bool {
182 let payload = match namespace {
183 Some(namespace) => Cow::Owned(union_unique(namespace, msg)),
184 None => Cow::Borrowed(msg),
185 };
186 self.key.verify(&payload, &sig.signature).is_ok()
187 }
188}
189
190impl Write for PublicKey {
191 fn write(&self, buf: &mut impl BufMut) {
192 self.raw.write(buf);
193 }
194}
195
196impl Read for PublicKey {
197 type Cfg = ();
198
199 fn read_cfg(buf: &mut impl Buf, _: &()) -> Result<Self, CodecError> {
200 let raw = <[u8; PUBLIC_KEY_LENGTH]>::read(buf)?;
201 let key = VerifyingKey::from_sec1_bytes(&raw)
202 .map_err(|_| CodecError::Invalid(CURVE_NAME, "Invalid PublicKey"))?;
203 Ok(Self { raw, key })
204 }
205}
206
207impl FixedSize for PublicKey {
208 const SIZE: usize = PUBLIC_KEY_LENGTH;
209}
210
211impl Span for PublicKey {}
212
213impl Array for PublicKey {}
214
215impl Hash for PublicKey {
216 fn hash<H: Hasher>(&self, state: &mut H) {
217 self.raw.hash(state);
218 }
219}
220
221impl AsRef<[u8]> for PublicKey {
222 fn as_ref(&self) -> &[u8] {
223 &self.raw
224 }
225}
226
227impl Deref for PublicKey {
228 type Target = [u8];
229 fn deref(&self) -> &[u8] {
230 &self.raw
231 }
232}
233
234impl From<VerifyingKey> for PublicKey {
235 fn from(verifier: VerifyingKey) -> Self {
236 let encoded = verifier.to_encoded_point(true);
237 let raw: [u8; PUBLIC_KEY_LENGTH] = encoded.as_bytes().try_into().unwrap();
238 Self { raw, key: verifier }
239 }
240}
241
242impl Debug for PublicKey {
243 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
244 write!(f, "{}", hex(&self.raw))
245 }
246}
247
248impl Display for PublicKey {
249 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
250 write!(f, "{}", hex(&self.raw))
251 }
252}
253
254#[derive(Clone, Eq, PartialEq)]
256pub struct Signature {
257 raw: [u8; SIGNATURE_LENGTH],
258 signature: p256::ecdsa::Signature,
259}
260
261impl crate::Signature for Signature {}
262
263impl Write for Signature {
264 fn write(&self, buf: &mut impl BufMut) {
265 self.raw.write(buf);
266 }
267}
268
269impl Read for Signature {
270 type Cfg = ();
271
272 fn read_cfg(buf: &mut impl Buf, _: &()) -> Result<Self, CodecError> {
273 let raw = <[u8; Self::SIZE]>::read(buf)?;
274 let result = p256::ecdsa::Signature::from_slice(&raw);
275 #[cfg(feature = "std")]
276 let signature = result.map_err(|e| CodecError::Wrapped(CURVE_NAME, e.into()))?;
277 #[cfg(not(feature = "std"))]
278 let signature = result
279 .map_err(|e| CodecError::Wrapped(CURVE_NAME, alloc::format!("{:?}", e).into()))?;
280 if signature.s().is_high().into() {
281 return Err(CodecError::Invalid(CURVE_NAME, "Signature S is high"));
283 }
284 Ok(Self { raw, signature })
285 }
286}
287
288impl FixedSize for Signature {
289 const SIZE: usize = SIGNATURE_LENGTH;
290}
291
292impl Span for Signature {}
293
294impl Array for Signature {}
295
296impl Hash for Signature {
297 fn hash<H: Hasher>(&self, state: &mut H) {
298 self.raw.hash(state);
299 }
300}
301
302impl Ord for Signature {
303 fn cmp(&self, other: &Self) -> core::cmp::Ordering {
304 self.raw.cmp(&other.raw)
305 }
306}
307
308impl PartialOrd for Signature {
309 fn partial_cmp(&self, other: &Self) -> Option<core::cmp::Ordering> {
310 Some(self.cmp(other))
311 }
312}
313
314impl AsRef<[u8]> for Signature {
315 fn as_ref(&self) -> &[u8] {
316 &self.raw
317 }
318}
319
320impl Deref for Signature {
321 type Target = [u8];
322 fn deref(&self) -> &[u8] {
323 &self.raw
324 }
325}
326
327impl From<p256::ecdsa::Signature> for Signature {
328 fn from(signature: p256::ecdsa::Signature) -> Self {
329 let raw = signature.to_bytes().into();
330 Self { raw, signature }
331 }
332}
333
334impl Debug for Signature {
335 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
336 write!(f, "{}", hex(&self.raw))
337 }
338}
339
340impl Display for Signature {
341 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
342 write!(f, "{}", hex(&self.raw))
343 }
344}
345
346#[cfg(test)]
349mod tests {
350 use super::*;
351 use crate::{Signer as _, Verifier as _};
352 use bytes::Bytes;
353 use commonware_codec::{DecodeExt, Encode};
354
355 fn create_private_key() -> PrivateKey {
356 const HEX: &str = "519b423d715f8b581f4fa8ee59f4771a5b44c8130b4e3eacca54a56dda72b464";
357 PrivateKey::decode(commonware_utils::from_hex_formatted(HEX).unwrap().as_ref()).unwrap()
358 }
359
360 fn parse_vector_keypair(private_key: &str, qx: &str, qy: &str) -> (PrivateKey, PublicKey) {
361 let public_key = parse_public_key_as_compressed(qx, qy);
362 (
363 PrivateKey::decode(
364 commonware_utils::from_hex_formatted(private_key)
365 .unwrap()
366 .as_ref(),
367 )
368 .unwrap(),
369 public_key,
370 )
371 }
372
373 fn parse_vector_sig_verification(
374 qx: &str,
375 qy: &str,
376 r: &str,
377 s: &str,
378 m: &str,
379 ) -> (PublicKey, Vec<u8>, Vec<u8>) {
380 let public_key = parse_public_key_as_compressed(qx, qy);
381 let signature = parse_signature(r, s);
382 let message = commonware_utils::from_hex_formatted(m).unwrap();
383 (public_key, signature, message)
384 }
385
386 fn parse_signature(r: &str, s: &str) -> Vec<u8> {
387 let vec_r = commonware_utils::from_hex_formatted(r).unwrap();
388 let vec_s = commonware_utils::from_hex_formatted(s).unwrap();
389 let f1 = p256::FieldBytes::from_slice(&vec_r);
390 let f2 = p256::FieldBytes::from_slice(&vec_s);
391 let s = p256::ecdsa::Signature::from_scalars(*f1, *f2).unwrap();
392 s.to_vec()
393 }
394
395 fn parse_public_key_as_compressed(qx: &str, qy: &str) -> PublicKey {
396 PublicKey::decode(parse_public_key_as_compressed_vector(qx, qy).as_ref()).unwrap()
397 }
398
399 fn parse_public_key_as_compressed_vector(qx: &str, qy: &str) -> Vec<u8> {
400 let qx = commonware_utils::from_hex_formatted(&padding_odd_length_hex(qx)).unwrap();
401 let qy = commonware_utils::from_hex_formatted(&padding_odd_length_hex(qy)).unwrap();
402 let mut compressed = Vec::with_capacity(qx.len() + 1);
403 if qy.last().unwrap() % 2 == 0 {
404 compressed.push(0x02);
405 } else {
406 compressed.push(0x03);
407 }
408 compressed.extend_from_slice(&qx);
409 compressed
410 }
411
412 fn parse_public_key_as_uncompressed_vector(qx: &str, qy: &str) -> Vec<u8> {
413 let qx = commonware_utils::from_hex_formatted(qx).unwrap();
414 let qy = commonware_utils::from_hex_formatted(qy).unwrap();
415 let mut uncompressed_public_key = Vec::with_capacity(65);
416 uncompressed_public_key.push(0x04);
417 uncompressed_public_key.extend_from_slice(&qx);
418 uncompressed_public_key.extend_from_slice(&qy);
419 uncompressed_public_key
420 }
421
422 fn padding_odd_length_hex(value: &str) -> String {
423 if value.len() % 2 != 0 {
424 return format!("0{value}");
425 }
426 value.to_string()
427 }
428
429 #[test]
430 fn test_codec_private_key() {
431 let original: PrivateKey = create_private_key();
432 let encoded = original.encode();
433 assert_eq!(encoded.len(), PRIVATE_KEY_LENGTH);
434
435 let decoded = PrivateKey::decode(encoded).unwrap();
436 assert_eq!(original, decoded);
437 }
438
439 #[test]
440 fn test_codec_public_key() {
441 let private_key = create_private_key();
442 let original = PublicKey::from(private_key);
443
444 let encoded = original.encode();
445 assert_eq!(encoded.len(), PUBLIC_KEY_LENGTH);
446
447 let decoded = PublicKey::decode(encoded).unwrap();
448 assert_eq!(original, decoded);
449 }
450
451 #[test]
452 fn test_codec_signature() {
453 let private_key = create_private_key();
454 let original = private_key.sign(None, "Hello World".as_bytes());
455
456 let encoded = original.encode();
457 assert_eq!(encoded.len(), SIGNATURE_LENGTH);
458
459 let decoded = Signature::decode(encoded).unwrap();
460 assert_eq!(original, decoded);
461 }
462
463 #[test]
464 fn test_codec_signature_invalid() {
465 let (_, sig, ..) = vector_sig_verification_5();
466 let result = Signature::decode(Bytes::from(sig));
467 assert!(result.is_err());
468 }
469
470 #[test]
471 fn test_scheme_sign() {
472 let private_key: PrivateKey = PrivateKey::decode(
473 commonware_utils::from_hex_formatted(
474 "519b423d715f8b581f4fa8ee59f4771a5b44c8130b4e3eacca54a56dda72b464",
475 )
476 .unwrap()
477 .as_ref(),
478 )
479 .unwrap();
480 let public_key: PublicKey = private_key.clone().into();
481 let message = commonware_utils::from_hex_formatted(
482 "5905238877c77421f73e43ee3da6f2d9e2ccad5fc942dcec0cbd25482935faaf416983fe165b1a045e
483 e2bcd2e6dca3bdf46c4310a7461f9a37960ca672d3feb5473e253605fb1ddfd28065b53cb5858a8ad28175bf
484 9bd386a5e471ea7a65c17cc934a9d791e91491eb3754d03799790fe2d308d16146d5c9b0d0debd97d79ce8",
485 )
486 .unwrap();
487 let signature = private_key.sign(None, &message);
488 assert_eq!(SIGNATURE_LENGTH, signature.len());
489 assert!(public_key.verify(None, &message, &signature));
490 }
491
492 #[test]
493 fn test_decode_zero_signature_fails() {
494 let result = Signature::decode(vec![0u8; SIGNATURE_LENGTH].as_ref());
495 assert!(result.is_err());
496 }
497
498 #[test]
499 fn test_decode_high_s_signature_fails() {
500 let (private_key, _) = vector_keypair_1();
501 let message = b"edge";
502 let signature = private_key.sign(None, message);
503 let mut bad_signature = signature.to_vec();
504 bad_signature[32] |= 0x80; assert!(Signature::decode(bad_signature.as_ref()).is_err());
506 }
507
508 #[test]
509 fn test_decode_zero_r_signature_fails() {
510 let (private_key, _) = vector_keypair_1();
511 let message = b"edge";
512 let signature = private_key.sign(None, message);
513 let mut bad_signature = signature.to_vec();
514 for b in bad_signature.iter_mut().take(32) {
515 *b = 0x00;
516 }
517 bad_signature[32] = 1;
519 assert!(Signature::decode(bad_signature.as_ref()).is_err());
520 }
521
522 #[test]
524 fn test_rfc6979() {
525 let private_key: PrivateKey = PrivateKey::decode(
526 commonware_utils::from_hex_formatted(
527 "c9afa9d845ba75166b5c215767b1d6934e50c3db36e89b127b8a622b120f6721",
528 )
529 .unwrap()
530 .as_ref(),
531 )
532 .unwrap();
533
534 let (message, exp_sig) = (
535 b"sample",
536 p256::ecdsa::Signature::from_slice(
537 &commonware_utils::from_hex_formatted(
538 "efd48b2aacb6a8fd1140dd9cd45e81d69d2c877b56aaf991c34d0ea84eaf3716
539 f7cb1c942d657c41d436c7a1b6e29f65f3e900dbb9aff4064dc4ab2f843acda8",
540 )
541 .unwrap(),
542 )
543 .unwrap(),
544 );
545 let signature = private_key.sign(None, message);
546 assert_eq!(signature.to_vec(), exp_sig.normalize_s().unwrap().to_vec());
547
548 let (message, exp_sig) = (
549 b"test",
550 p256::ecdsa::Signature::from_slice(
551 &commonware_utils::from_hex_formatted(
552 "f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d38367
553 019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083",
554 )
555 .unwrap(),
556 )
557 .unwrap(),
558 );
559
560 let signature = private_key.sign(None, message);
561 assert_eq!(signature.to_vec(), exp_sig.to_vec());
562 }
563
564 #[test]
565 fn test_scheme_validate_public_key_too_long() {
566 let qx_hex = "d0720dc691aa80096ba32fed1cb97c2b620690d06de0317b8618d5ce65eb728f";
567 let qy_hex = "d0720dc691aa80096ba32fed1cb97c2b620690d06de0317b8618d5ce65eb728f";
568
569 let uncompressed_public_key = parse_public_key_as_uncompressed_vector(qx_hex, qy_hex);
571 let public_key = PublicKey::decode(uncompressed_public_key.as_ref());
572 assert!(matches!(public_key, Err(CodecError::Invalid(_, _))));
573
574 let mut compressed_public_key = parse_public_key_as_compressed_vector(qx_hex, qy_hex);
576 compressed_public_key.push(0u8);
577 let public_key = PublicKey::decode(compressed_public_key.as_ref());
578 assert!(matches!(public_key, Err(CodecError::ExtraData(1))));
579
580 let compressed_public_key = parse_public_key_as_compressed_vector(qx_hex, qy_hex);
582 let public_key = PublicKey::decode(compressed_public_key.as_ref());
583 assert!(public_key.is_ok());
584 }
585
586 #[test]
587 fn test_scheme_verify_signature_r0() {
588 let private_key: PrivateKey = PrivateKey::decode(
590 commonware_utils::from_hex_formatted(
591 "c9806898a0334916c860748880a541f093b579a9b1f32934d86c363c39800357",
592 )
593 .unwrap()
594 .as_ref(),
595 )
596 .unwrap();
597 let message = b"sample";
598 let signature = private_key.sign(None, message);
599 let (_, s) = signature.split_at(32);
600 let mut signature: Vec<u8> = vec![0x00; 32];
601 signature.extend_from_slice(s);
602
603 assert!(Signature::decode(signature.as_ref()).is_err());
605 }
606
607 #[test]
608 fn test_scheme_verify_signature_s0() {
609 let private_key: PrivateKey = PrivateKey::decode(
611 commonware_utils::from_hex_formatted(
612 "c9806898a0334916c860748880a541f093b579a9b1f32934d86c363c39800357",
613 )
614 .unwrap()
615 .as_ref(),
616 )
617 .unwrap();
618 let message = b"sample";
619 let signature = private_key.sign(None, message);
620 let (r, _) = signature.split_at(32);
621 let s: Vec<u8> = vec![0x00; 32];
622 let mut signature = r.to_vec();
623 signature.extend(s);
624
625 assert!(Signature::decode(signature.as_ref()).is_err());
627 }
628
629 #[test]
630 fn test_keypairs() {
631 let cases = [
632 vector_keypair_1(),
633 vector_keypair_2(),
634 vector_keypair_3(),
635 vector_keypair_4(),
636 vector_keypair_5(),
637 vector_keypair_6(),
638 vector_keypair_7(),
639 vector_keypair_8(),
640 vector_keypair_9(),
641 vector_keypair_10(),
642 ];
643
644 for (index, test) in cases.into_iter().enumerate() {
645 let (private_key, exp_public_key) = test;
646 let public_key = PublicKey::from(private_key.clone());
647 assert_eq!(exp_public_key, public_key, "vector_keypair_{}", index + 1);
648 assert!(public_key.len() == PUBLIC_KEY_LENGTH);
649 }
650 }
651
652 #[test]
653 fn test_public_key_validation() {
654 let cases = [
659 (1, vector_public_key_validation_1()),
660 (3, vector_public_key_validation_3()),
661 (4, vector_public_key_validation_4()),
662 (5, vector_public_key_validation_5()),
663 (6, vector_public_key_validation_6()),
664 (7, vector_public_key_validation_7()),
665 (8, vector_public_key_validation_8()),
666 (9, vector_public_key_validation_9()),
667 (10, vector_public_key_validation_10()),
668 (12, vector_public_key_validation_12()),
669 ];
670
671 for (n, test) in cases.iter() {
672 let (public_key, exp_valid) = test;
673 let res = PublicKey::decode(public_key.as_ref());
674 assert_eq!(*exp_valid, res.is_ok(), "vector_public_key_validation_{n}");
675 }
676 }
677
678 #[test]
679 fn test_signature_verification() {
680 let cases = [
681 vector_sig_verification_1(),
682 vector_sig_verification_2(),
683 vector_sig_verification_3(),
684 vector_sig_verification_4(),
685 vector_sig_verification_5(),
686 vector_sig_verification_6(),
687 vector_sig_verification_7(),
688 vector_sig_verification_8(),
689 vector_sig_verification_9(),
690 vector_sig_verification_10(),
691 vector_sig_verification_11(),
692 vector_sig_verification_12(),
693 vector_sig_verification_13(),
694 vector_sig_verification_14(),
695 vector_sig_verification_15(),
696 ];
697
698 for (index, test) in cases.into_iter().enumerate() {
699 let (public_key, sig, message, expected) = test;
700 let expected = if expected {
701 let mut ecdsa_signature = p256::ecdsa::Signature::from_slice(&sig).unwrap();
702 if ecdsa_signature.s().is_high().into() {
703 assert!(Signature::decode(sig.as_ref()).is_err());
705 assert!(Signature::decode(Bytes::from(sig)).is_err());
706
707 if let Some(normalized_sig) = ecdsa_signature.normalize_s() {
709 ecdsa_signature = normalized_sig;
710 }
711 }
712 let signature = Signature::from(ecdsa_signature);
713 public_key.verify(None, &message, &signature)
714 } else {
715 let tf_res = Signature::decode(sig.as_ref());
716 let dc_res = Signature::decode(Bytes::from(sig));
717 if tf_res.is_err() && dc_res.is_err() {
718 true
720 } else {
721 let f1 = !public_key.verify(None, &message, &tf_res.unwrap());
723 let f2 = !public_key.verify(None, &message, &dc_res.unwrap());
724 f1 && f2
725 }
726 };
727 assert!(expected, "vector_signature_verification_{}", index + 1);
728 }
729 }
730
731 fn vector_keypair_1() -> (PrivateKey, PublicKey) {
732 parse_vector_keypair(
733 "c9806898a0334916c860748880a541f093b579a9b1f32934d86c363c39800357",
734 "d0720dc691aa80096ba32fed1cb97c2b620690d06de0317b8618d5ce65eb728f",
735 "9681b517b1cda17d0d83d335d9c4a8a9a9b0b1b3c7106d8f3c72bc5093dc275f",
736 )
737 }
738
739 fn vector_keypair_2() -> (PrivateKey, PublicKey) {
740 parse_vector_keypair(
741 "710735c8388f48c684a97bd66751cc5f5a122d6b9a96a2dbe73662f78217446d",
742 "f6836a8add91cb182d8d258dda6680690eb724a66dc3bb60d2322565c39e4ab9",
743 "1f837aa32864870cb8e8d0ac2ff31f824e7beddc4bb7ad72c173ad974b289dc2",
744 )
745 }
746
747 fn vector_keypair_3() -> (PrivateKey, PublicKey) {
748 parse_vector_keypair(
749 "78d5d8b7b3e2c16b3e37e7e63becd8ceff61e2ce618757f514620ada8a11f6e4",
750 "76711126cbb2af4f6a5fe5665dad4c88d27b6cb018879e03e54f779f203a854e",
751 "a26df39960ab5248fd3620fd018398e788bd89a3cea509b352452b69811e6856",
752 )
753 }
754
755 fn vector_keypair_4() -> (PrivateKey, PublicKey) {
756 parse_vector_keypair(
757 "2a61a0703860585fe17420c244e1de5a6ac8c25146b208ef88ad51ae34c8cb8c",
758 "e1aa7196ceeac088aaddeeba037abb18f67e1b55c0a5c4e71ec70ad666fcddc8",
759 "d7d35bdce6dedc5de98a7ecb27a9cd066a08f586a733b59f5a2cdb54f971d5c8",
760 )
761 }
762
763 fn vector_keypair_5() -> (PrivateKey, PublicKey) {
764 parse_vector_keypair(
765 "01b965b45ff386f28c121c077f1d7b2710acc6b0cb58d8662d549391dcf5a883",
766 "1f038c5422e88eec9e88b815e8f6b3e50852333fc423134348fc7d79ef8e8a10",
767 "43a047cb20e94b4ffb361ef68952b004c0700b2962e0c0635a70269bc789b849",
768 )
769 }
770
771 fn vector_keypair_6() -> (PrivateKey, PublicKey) {
772 parse_vector_keypair(
773 "fac92c13d374c53a085376fe4101618e1e181b5a63816a84a0648f3bdc24e519",
774 "7258f2ab96fc84ef6ccb33e308cd392d8b568ea635730ceb4ebd72fa870583b9",
775 "489807ca55bdc29ca5c8fe69b94f227b0345cccdbe89975e75d385cc2f6bb1e2",
776 )
777 }
778
779 fn vector_keypair_7() -> (PrivateKey, PublicKey) {
780 parse_vector_keypair(
781 "f257a192dde44227b3568008ff73bcf599a5c45b32ab523b5b21ca582fef5a0a",
782 "d2e01411817b5512b79bbbe14d606040a4c90deb09e827d25b9f2fc068997872",
783 "503f138f8bab1df2c4507ff663a1fdf7f710e7adb8e7841eaa902703e314e793",
784 )
785 }
786
787 fn vector_keypair_8() -> (PrivateKey, PublicKey) {
788 parse_vector_keypair(
789 "add67e57c42a3d28708f0235eb86885a4ea68e0d8cfd76eb46134c596522abfd",
790 "55bed2d9c029b7f230bde934c7124ed52b1330856f13cbac65a746f9175f85d7",
791 "32805e311d583b4e007c40668185e85323948e21912b6b0d2cda8557389ae7b0",
792 )
793 }
794
795 fn vector_keypair_9() -> (PrivateKey, PublicKey) {
796 parse_vector_keypair(
797 "4494860fd2c805c5c0d277e58f802cff6d731f76314eb1554142a637a9bc5538",
798 "5190277a0c14d8a3d289292f8a544ce6ea9183200e51aec08440e0c1a463a4e4",
799 "ecd98514821bd5aaf3419ab79b71780569470e4fed3da3c1353b28fe137f36eb",
800 )
801 }
802
803 fn vector_keypair_10() -> (PrivateKey, PublicKey) {
804 parse_vector_keypair(
805 "d40b07b1ea7b86d4709ef9dc634c61229feb71abd63dc7fc85ef46711a87b210",
806 "fbcea7c2827e0e8085d7707b23a3728823ea6f4878b24747fb4fd2842d406c73",
807 "2393c85f1f710c5afc115a39ba7e18abe03f19c9d4bb3d47d19468b818efa535",
808 )
809 }
810
811 fn vector_public_key_validation_1() -> (Vec<u8>, bool) {
812 (
813 parse_public_key_as_compressed_vector(
814 "e0f7449c5588f24492c338f2bc8f7865f755b958d48edb0f2d0056e50c3fd5b7",
815 "86d7e9255d0f4b6f44fa2cd6f8ba3c0aa828321d6d8cc430ca6284ce1d5b43a0",
816 ),
817 true,
818 )
819 }
820
821 fn vector_public_key_validation_3() -> (Vec<u8>, bool) {
822 (
823 parse_public_key_as_compressed_vector(
824 "17875397ae87369365656d490e8ce956911bd97607f2aff41b56f6f3a61989826",
825 "980a3c4f61b9692633fbba5ef04c9cb546dd05cdec9fa8428b8849670e2fba92",
826 ),
827 false, )
829 }
830
831 fn vector_public_key_validation_4() -> (Vec<u8>, bool) {
832 (
833 parse_public_key_as_compressed_vector(
834 "f2d1c0dc0852c3d8a2a2500a23a44813ccce1ac4e58444175b440469ffc12273",
835 "32bfe992831b305d8c37b9672df5d29fcb5c29b4a40534683e3ace23d24647dd",
836 ),
837 false, )
839 }
840
841 fn vector_public_key_validation_5() -> (Vec<u8>, bool) {
842 (
843 parse_public_key_as_compressed_vector(
844 "10b0ca230fff7c04768f4b3d5c75fa9f6c539bea644dffbec5dc796a213061b58",
845 "f5edf37c11052b75f771b7f9fa050e353e464221fec916684ed45b6fead38205",
846 ),
847 false, )
849 }
850
851 fn vector_public_key_validation_6() -> (Vec<u8>, bool) {
852 (
853 parse_public_key_as_compressed_vector(
854 "2c1052f25360a15062d204a056274e93cbe8fc4c4e9b9561134ad5c15ce525da",
855 "ced9783713a8a2a09eff366987639c625753295d9a85d0f5325e32dedbcada0b",
856 ),
857 true,
858 )
859 }
860
861 fn vector_public_key_validation_7() -> (Vec<u8>, bool) {
862 (
863 parse_public_key_as_compressed_vector(
864 "a40d077a87dae157d93dcccf3fe3aca9c6479a75aa2669509d2ef05c7de6782f",
865 "503d86b87d743ba20804fd7e7884aa017414a7b5b5963e0d46e3a9611419ddf3",
866 ),
867 false, )
869 }
870
871 fn vector_public_key_validation_8() -> (Vec<u8>, bool) {
872 (
873 parse_public_key_as_compressed_vector(
874 "2633d398a3807b1895548adbb0ea2495ef4b930f91054891030817df87d4ac0a",
875 "d6b2f738e3873cc8364a2d364038ce7d0798bb092e3dd77cbdae7c263ba618d2",
876 ),
877 true,
878 )
879 }
880
881 fn vector_public_key_validation_9() -> (Vec<u8>, bool) {
882 (
883 parse_public_key_as_compressed_vector(
884 "14bf57f76c260b51ec6bbc72dbd49f02a56eaed070b774dc4bad75a54653c3d56",
885 "7a231a23bf8b3aa31d9600d888a0678677a30e573decd3dc56b33f365cc11236",
886 ),
887 false, )
889 }
890
891 fn vector_public_key_validation_10() -> (Vec<u8>, bool) {
892 (
893 parse_public_key_as_compressed_vector(
894 "2fa74931ae816b426f484180e517f5050c92decfc8daf756cd91f54d51b302f1",
895 "5b994346137988c58c14ae2152ac2f6ad96d97decb33099bd8a0210114cd1141",
896 ),
897 true,
898 )
899 }
900
901 fn vector_public_key_validation_12() -> (Vec<u8>, bool) {
902 (
903 parse_public_key_as_compressed_vector(
904 "7a81a7e0b015252928d8b36e4ca37e92fdc328eb25c774b4f872693028c4be38",
905 "08862f7335147261e7b1c3d055f9a316e4cab7daf99cc09d1c647f5dd6e7d5bb",
906 ),
907 false, )
909 }
910
911 fn vector_sig_verification_1() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
912 let (public_key, sig, message) = parse_vector_sig_verification(
913 "87f8f2b218f49845f6f10eec3877136269f5c1a54736dbdf69f89940cad41555",
914 "e15f369036f49842fac7a86c8a2b0557609776814448b8f5e84aa9f4395205e9",
915 "d19ff48b324915576416097d2544f7cbdf8768b1454ad20e0baac50e211f23b0",
916 "a3e81e59311cdfff2d4784949f7a2cb50ba6c3a91fa54710568e61aca3e847c6",
917 "e4796db5f785f207aa30d311693b3702821dff1168fd2e04c0836825aefd850d9aa60326d88cde1a23c7
918 745351392ca2288d632c264f197d05cd424a30336c19fd09bb229654f0222fcb881a4b35c290a093ac159ce1
919 3409111ff0358411133c24f5b8e2090d6db6558afc36f06ca1f6ef779785adba68db27a409859fc4c4a0",
920 );
921 (public_key, sig, message, false)
922 }
923
924 fn vector_sig_verification_2() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
925 let (public_key, sig, message) = parse_vector_sig_verification(
926 "5cf02a00d205bdfee2016f7421807fc38ae69e6b7ccd064ee689fc1a94a9f7d2",
927 "ec530ce3cc5c9d1af463f264d685afe2b4db4b5828d7e61b748930f3ce622a85",
928 "dc23d130c6117fb5751201455e99f36f59aba1a6a21cf2d0e7481a97451d6693",
929 "d6ce7708c18dbf35d4f8aa7240922dc6823f2e7058cbc1484fcad1599db5018c",
930 "069a6e6b93dfee6df6ef6997cd80dd2182c36653cef10c655d524585655462d683877f95ecc6d6c81623
931 d8fac4e900ed0019964094e7de91f1481989ae1873004565789cbf5dc56c62aedc63f62f3b894c9c6f7788c8
932 ecaadc9bd0e81ad91b2b3569ea12260e93924fdddd3972af5273198f5efda0746219475017557616170e",
933 );
934 (public_key, sig, message, false)
935 }
936
937 fn vector_sig_verification_3() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
938 let (public_key, sig, message) = parse_vector_sig_verification(
939 "2ddfd145767883ffbb0ac003ab4a44346d08fa2570b3120dcce94562422244cb",
940 "5f70c7d11ac2b7a435ccfbbae02c3df1ea6b532cc0e9db74f93fffca7c6f9a64",
941 "9913111cff6f20c5bf453a99cd2c2019a4e749a49724a08774d14e4c113edda8",
942 "9467cd4cd21ecb56b0cab0a9a453b43386845459127a952421f5c6382866c5cc",
943 "df04a346cf4d0e331a6db78cca2d456d31b0a000aa51441defdb97bbeb20b94d8d746429a393ba88840d
944 661615e07def615a342abedfa4ce912e562af714959896858af817317a840dcff85a057bb91a3c2bf9010550
945 0362754a6dd321cdd86128cfc5f04667b57aa78c112411e42da304f1012d48cd6a7052d7de44ebcc01de",
946 );
947 (public_key, sig, message, false)
948 }
949
950 fn vector_sig_verification_4() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
951 let (public_key, sig, message) = parse_vector_sig_verification(
952 "e424dc61d4bb3cb7ef4344a7f8957a0c5134e16f7a67c074f82e6e12f49abf3c",
953 "970eed7aa2bc48651545949de1dddaf0127e5965ac85d1243d6f60e7dfaee927",
954 "bf96b99aa49c705c910be33142017c642ff540c76349b9dab72f981fd9347f4f",
955 "17c55095819089c2e03b9cd415abdf12444e323075d98f31920b9e0f57ec871c",
956 "e1130af6a38ccb412a9c8d13e15dbfc9e69a16385af3c3f1e5da954fd5e7c45fd75e2b8c36699228e928
957 40c0562fbf3772f07e17f1add56588dd45f7450e1217ad239922dd9c32695dc71ff2424ca0dec1321aa47064
958 a044b7fe3c2b97d03ce470a592304c5ef21eed9f93da56bb232d1eeb0035f9bf0dfafdcc4606272b20a3",
959 );
960 (public_key, sig, message, true)
961 }
962
963 fn vector_sig_verification_5() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
964 let (public_key, sig, message) = parse_vector_sig_verification(
965 "e0fc6a6f50e1c57475673ee54e3a57f9a49f3328e743bf52f335e3eeaa3d2864",
966 "7f59d689c91e463607d9194d99faf316e25432870816dde63f5d4b373f12f22a",
967 "1d75830cd36f4c9aa181b2c4221e87f176b7f05b7c87824e82e396c88315c407",
968 "cb2acb01dac96efc53a32d4a0d85d0c2e48955214783ecf50a4f0414a319c05a",
969 "73c5f6a67456ae48209b5f85d1e7de7758bf235300c6ae2bdceb1dcb27a7730fb68c950b7fcada0ecc46
970 61d3578230f225a875e69aaa17f1e71c6be5c831f22663bac63d0c7a9635edb0043ff8c6f26470f02a7bc565
971 56f1437f06dfa27b487a6c4290d8bad38d4879b334e341ba092dde4e4ae694a9c09302e2dbf443581c08",
972 );
973 (public_key, sig, message, true)
975 }
976
977 fn vector_sig_verification_6() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
978 let (public_key, sig, message) = parse_vector_sig_verification(
979 "a849bef575cac3c6920fbce675c3b787136209f855de19ffe2e8d29b31a5ad86",
980 "bf5fe4f7858f9b805bd8dcc05ad5e7fb889de2f822f3d8b41694e6c55c16b471",
981 "25acc3aa9d9e84c7abf08f73fa4195acc506491d6fc37cb9074528a7db87b9d6",
982 "9b21d5b5259ed3f2ef07dfec6cc90d3a37855d1ce122a85ba6a333f307d31537",
983 "666036d9b4a2426ed6585a4e0fd931a8761451d29ab04bd7dc6d0c5b9e38e6c2b263ff6cb837bd04399d
984 e3d757c6c7005f6d7a987063cf6d7e8cb38a4bf0d74a282572bd01d0f41e3fd066e3021575f0fa04f27b700d
985 5b7ddddf50965993c3f9c7118ed78888da7cb221849b3260592b8e632d7c51e935a0ceae15207bedd548",
986 );
987 (public_key, sig, message, false)
988 }
989
990 fn vector_sig_verification_7() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
991 let (public_key, sig, message) = parse_vector_sig_verification(
992 "3dfb6f40f2471b29b77fdccba72d37c21bba019efa40c1c8f91ec405d7dcc5df",
993 "f22f953f1e395a52ead7f3ae3fc47451b438117b1e04d613bc8555b7d6e6d1bb",
994 "548886278e5ec26bed811dbb72db1e154b6f17be70deb1b210107decb1ec2a5a",
995 "e93bfebd2f14f3d827ca32b464be6e69187f5edbd52def4f96599c37d58eee75",
996 "7e80436bce57339ce8da1b5660149a20240b146d108deef3ec5da4ae256f8f894edcbbc57b34ce37089c
997 0daa17f0c46cd82b5a1599314fd79d2fd2f446bd5a25b8e32fcf05b76d644573a6df4ad1dfea707b479d9723
998 7a346f1ec632ea5660efb57e8717a8628d7f82af50a4e84b11f21bdff6839196a880ae20b2a0918d58cd",
999 );
1000 (public_key, sig, message, false)
1001 }
1002
1003 fn vector_sig_verification_8() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1004 let (public_key, sig, message) = parse_vector_sig_verification(
1005 "69b7667056e1e11d6caf6e45643f8b21e7a4bebda463c7fdbc13bc98efbd0214",
1006 "d3f9b12eb46c7c6fda0da3fc85bc1fd831557f9abc902a3be3cb3e8be7d1aa2f",
1007 "288f7a1cd391842cce21f00e6f15471c04dc182fe4b14d92dc18910879799790",
1008 "247b3c4e89a3bcadfea73c7bfd361def43715fa382b8c3edf4ae15d6e55e9979",
1009 "1669bfb657fdc62c3ddd63269787fc1c969f1850fb04c933dda063ef74a56ce13e3a649700820f0061ef
1010 abf849a85d474326c8a541d99830eea8131eaea584f22d88c353965dabcdc4bf6b55949fd529507dfb803ab6
1011 b480cd73ca0ba00ca19c438849e2cea262a1c57d8f81cd257fb58e19dec7904da97d8386e87b84948169",
1012 );
1013 (public_key, sig, message, false)
1014 }
1015
1016 fn vector_sig_verification_9() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1017 let (public_key, sig, message) = parse_vector_sig_verification(
1018 "bf02cbcf6d8cc26e91766d8af0b164fc5968535e84c158eb3bc4e2d79c3cc682",
1019 "069ba6cb06b49d60812066afa16ecf7b51352f2c03bd93ec220822b1f3dfba03",
1020 "f5acb06c59c2b4927fb852faa07faf4b1852bbb5d06840935e849c4d293d1bad",
1021 "049dab79c89cc02f1484c437f523e080a75f134917fda752f2d5ca397addfe5d",
1022 "3fe60dd9ad6caccf5a6f583b3ae65953563446c4510b70da115ffaa0ba04c076115c7043ab8733403cd6
1023 9c7d14c212c655c07b43a7c71b9a4cffe22c2684788ec6870dc2013f269172c822256f9e7cc674791bf2d848
1024 6c0f5684283e1649576efc982ede17c7b74b214754d70402fb4bb45ad086cf2cf76b3d63f7fce39ac970",
1025 );
1026 (public_key, sig, message, false)
1027 }
1028
1029 fn vector_sig_verification_10() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1030 let (public_key, sig, message) = parse_vector_sig_verification(
1031 "224a4d65b958f6d6afb2904863efd2a734b31798884801fcab5a590f4d6da9de",
1032 "178d51fddada62806f097aa615d33b8f2404e6b1479f5fd4859d595734d6d2b9",
1033 "87b93ee2fecfda54deb8dff8e426f3c72c8864991f8ec2b3205bb3b416de93d2",
1034 "4044a24df85be0cc76f21a4430b75b8e77b932a87f51e4eccbc45c263ebf8f66",
1035 "983a71b9994d95e876d84d28946a041f8f0a3f544cfcc055496580f1dfd4e312a2ad418fe69dbc61db23
1036 0cc0c0ed97e360abab7d6ff4b81ee970a7e97466acfd9644f828ffec538abc383d0e92326d1c88c55e1f46a6
1037 68a039beaa1be631a89129938c00a81a3ae46d4aecbf9707f764dbaccea3ef7665e4c4307fa0b0a3075c",
1038 );
1039 (public_key, sig, message, false)
1040 }
1041
1042 fn vector_sig_verification_11() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1043 let (public_key, sig, message) = parse_vector_sig_verification(
1044 "43691c7795a57ead8c5c68536fe934538d46f12889680a9cb6d055a066228369",
1045 "f8790110b3c3b281aa1eae037d4f1234aff587d903d93ba3af225c27ddc9ccac",
1046 "8acd62e8c262fa50dd9840480969f4ef70f218ebf8ef9584f199031132c6b1ce",
1047 "cfca7ed3d4347fb2a29e526b43c348ae1ce6c60d44f3191b6d8ea3a2d9c92154",
1048 "4a8c071ac4fd0d52faa407b0fe5dab759f7394a5832127f2a3498f34aac287339e043b4ffa79528faf19
1049 9dc917f7b066ad65505dab0e11e6948515052ce20cfdb892ffb8aa9bf3f1aa5be30a5bbe85823bddf70b39fd
1050 7ebd4a93a2f75472c1d4f606247a9821f1a8c45a6cb80545de2e0c6c0174e2392088c754e9c8443eb5af",
1051 );
1052 (public_key, sig, message, false)
1053 }
1054
1055 fn vector_sig_verification_12() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1056 let (public_key, sig, message) = parse_vector_sig_verification(
1057 "9157dbfcf8cf385f5bb1568ad5c6e2a8652ba6dfc63bc1753edf5268cb7eb596",
1058 "972570f4313d47fc96f7c02d5594d77d46f91e949808825b3d31f029e8296405",
1059 "dfaea6f297fa320b707866125c2a7d5d515b51a503bee817de9faa343cc48eeb",
1060 "8f780ad713f9c3e5a4f7fa4c519833dfefc6a7432389b1e4af463961f09764f2",
1061 "0a3a12c3084c865daf1d302c78215d39bfe0b8bf28272b3c0b74beb4b7409db0718239de700785581514
1062 321c6440a4bbaea4c76fa47401e151e68cb6c29017f0bce4631290af5ea5e2bf3ed742ae110b04ade83a5dbd
1063 7358f29a85938e23d87ac8233072b79c94670ff0959f9c7f4517862ff829452096c78f5f2e9a7e4e9216",
1064 );
1065 (public_key, sig, message, false)
1066 }
1067
1068 fn vector_sig_verification_13() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1069 let (public_key, sig, message) = parse_vector_sig_verification(
1070 "072b10c081a4c1713a294f248aef850e297991aca47fa96a7470abe3b8acfdda",
1071 "9581145cca04a0fb94cedce752c8f0370861916d2a94e7c647c5373ce6a4c8f5",
1072 "09f5483eccec80f9d104815a1be9cc1a8e5b12b6eb482a65c6907b7480cf4f19",
1073 "a4f90e560c5e4eb8696cb276e5165b6a9d486345dedfb094a76e8442d026378d",
1074 "785d07a3c54f63dca11f5d1a5f496ee2c2f9288e55007e666c78b007d95cc28581dce51f490b30fa73dc
1075 9e2d45d075d7e3a95fb8a9e1465ad191904124160b7c60fa720ef4ef1c5d2998f40570ae2a870ef3e894c2bc
1076 617d8a1dc85c3c55774928c38789b4e661349d3f84d2441a3b856a76949b9f1f80bc161648a1cad5588e",
1077 );
1078 (public_key, sig, message, false)
1079 }
1080
1081 fn vector_sig_verification_14() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1082 let (public_key, sig, message) = parse_vector_sig_verification(
1083 "09308ea5bfad6e5adf408634b3d5ce9240d35442f7fe116452aaec0d25be8c24",
1084 "f40c93e023ef494b1c3079b2d10ef67f3170740495ce2cc57f8ee4b0618b8ee5",
1085 "5cc8aa7c35743ec0c23dde88dabd5e4fcd0192d2116f6926fef788cddb754e73",
1086 "9c9c045ebaa1b828c32f82ace0d18daebf5e156eb7cbfdc1eff4399a8a900ae7",
1087 "76f987ec5448dd72219bd30bf6b66b0775c80b394851a43ff1f537f140a6e7229ef8cd72ad58b1d2d202
1088 98539d6347dd5598812bc65323aceaf05228f738b5ad3e8d9fe4100fd767c2f098c77cb99c2992843ba3eed9
1089 1d32444f3b6db6cd212dd4e5609548f4bb62812a920f6e2bf1581be1ebeebdd06ec4e971862cc42055ca",
1090 );
1091 (public_key, sig, message, false)
1092 }
1093
1094 fn vector_sig_verification_15() -> (PublicKey, Vec<u8>, Vec<u8>, bool) {
1095 let (public_key, sig, message) = parse_vector_sig_verification(
1096 "2d98ea01f754d34bbc3003df5050200abf445ec728556d7ed7d5c54c55552b6d",
1097 "9b52672742d637a32add056dfd6d8792f2a33c2e69dafabea09b960bc61e230a",
1098 "06108e525f845d0155bf60193222b3219c98e3d49424c2fb2a0987f825c17959",
1099 "62b5cdd591e5b507e560167ba8f6f7cda74673eb315680cb89ccbc4eec477dce",
1100 "60cd64b2cd2be6c33859b94875120361a24085f3765cb8b2bf11e026fa9d8855dbe435acf7882e84f3c7
1101 857f96e2baab4d9afe4588e4a82e17a78827bfdb5ddbd1c211fbc2e6d884cddd7cb9d90d5bf4a7311b83f352
1102 508033812c776a0e00c003c7e0d628e50736c7512df0acfa9f2320bd102229f46495ae6d0857cc452a84",
1103 );
1104 (public_key, sig, message, true)
1105 }
1106}