1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
use super::{EnrKey, EnrPublicKey, SigningError};
use crate::digest;
use rlp::DecoderError;
use std::collections::BTreeMap;
pub const ENR_KEY: &str = "secp256k1";
impl EnrKey for c_secp256k1::SecretKey {
type PublicKey = c_secp256k1::PublicKey;
fn sign_v4(&self, msg: &[u8]) -> Result<Vec<u8>, SigningError> {
let hash = digest(msg);
let m = c_secp256k1::Message::from_slice(&hash)
.map_err(|_| SigningError::new("failed to parse secp256k1 digest"))?;
Ok(c_secp256k1::Secp256k1::new()
.sign(&m, self)
.serialize_compact()
.to_vec())
}
fn public(&self) -> Self::PublicKey {
Self::PublicKey::from_secret_key(&c_secp256k1::Secp256k1::new(), self)
}
fn enr_to_public(content: &BTreeMap<String, Vec<u8>>) -> Result<Self::PublicKey, DecoderError> {
if let Some(pubkey_bytes) = content.get(ENR_KEY) {
c_secp256k1::PublicKey::from_slice(pubkey_bytes)
.map_err(|_| DecoderError::Custom("Invalid Secp256k1 Signature"))
} else {
Err(DecoderError::Custom("Unknown signature"))
}
}
}
impl EnrPublicKey for c_secp256k1::PublicKey {
fn verify_v4(&self, msg: &[u8], sig: &[u8]) -> bool {
let msg = digest(msg);
c_secp256k1::Signature::from_compact(sig)
.and_then(|sig| {
c_secp256k1::Message::from_slice(&msg)
.map(|m| c_secp256k1::Secp256k1::new().verify(&m, &sig, self))
})
.is_ok()
}
fn encode(&self) -> Vec<u8> {
self.serialize().to_vec()
}
fn encode_uncompressed(&self) -> Vec<u8> {
self.serialize_uncompressed()[1..].to_vec()
}
fn enr_key(&self) -> String {
ENR_KEY.into()
}
}