use crate::{Amount, Error, Result};
pub fn check_amount(expected: Amount, actual: Amount) -> Result<()> {
if expected == actual {
Ok(())
} else {
Err(Error::AmountMismatch { expected, actual })
}
}
pub fn check_authority_format(authority: &str) -> Result<()> {
if authority.is_empty() {
return Err(Error::Config("authority is empty".into()));
}
if authority.len() > 128 {
return Err(Error::Config(format!(
"authority too long ({} bytes; max 128)",
authority.len()
)));
}
if !authority
.chars()
.all(|c| c.is_ascii() && !c.is_ascii_control())
{
return Err(Error::Config(
"authority contains non-printable or non-ASCII characters".into(),
));
}
Ok(())
}
#[must_use]
pub fn constant_time_eq(a: &[u8], b: &[u8]) -> bool {
if a.len() != b.len() {
return false;
}
let mut diff: u8 = 0;
for (x, y) in a.iter().zip(b.iter()) {
diff |= x ^ y;
}
diff == 0
}
pub fn verify_hmac_sha256(key: &[u8], body: &[u8], expected_hex: &str) -> Result<()> {
if expected_hex.len() != 64 {
return Err(Error::Config(format!(
"HMAC-SHA256 signature must be 64 hex chars (got {})",
expected_hex.len()
)));
}
let expected = hex_to_bytes(expected_hex)
.ok_or_else(|| Error::Config("HMAC signature is not valid hex".into()))?;
let actual = hmac_sha256(key, body);
if constant_time_eq(&expected, &actual) {
Ok(())
} else {
Err(Error::Config("HMAC signature mismatch".into()))
}
}
fn hmac_sha256(key: &[u8], message: &[u8]) -> [u8; 32] {
let mut k_buf = [0u8; 64];
if key.len() > 64 {
let h = sha256(key);
k_buf[..32].copy_from_slice(&h);
} else {
k_buf[..key.len()].copy_from_slice(key);
}
let mut ipad = [0x36u8; 64];
let mut opad = [0x5cu8; 64];
for i in 0..64 {
ipad[i] ^= k_buf[i];
opad[i] ^= k_buf[i];
}
let mut inner = Vec::with_capacity(64 + message.len());
inner.extend_from_slice(&ipad);
inner.extend_from_slice(message);
let inner_hash = sha256(&inner);
let mut outer = Vec::with_capacity(64 + 32);
outer.extend_from_slice(&opad);
outer.extend_from_slice(&inner_hash);
sha256(&outer)
}
fn hex_to_bytes(s: &str) -> Option<Vec<u8>> {
if s.len() % 2 != 0 {
return None;
}
let mut out = Vec::with_capacity(s.len() / 2);
let bytes = s.as_bytes();
let mut i = 0;
while i < bytes.len() {
let high = hex_nibble(bytes[i])?;
let low = hex_nibble(bytes[i + 1])?;
out.push((high << 4) | low);
i += 2;
}
Some(out)
}
fn hex_nibble(b: u8) -> Option<u8> {
match b {
b'0'..=b'9' => Some(b - b'0'),
b'a'..=b'f' => Some(b - b'a' + 10),
b'A'..=b'F' => Some(b - b'A' + 10),
_ => None,
}
}
const K: [u32; 64] = [
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
];
fn sha256(input: &[u8]) -> [u8; 32] {
let mut h: [u32; 8] = [
0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab,
0x5be0cd19,
];
let bit_len = (input.len() as u64).wrapping_mul(8);
let mut padded = input.to_vec();
padded.push(0x80);
while padded.len() % 64 != 56 {
padded.push(0);
}
padded.extend_from_slice(&bit_len.to_be_bytes());
for chunk in padded.chunks_exact(64) {
let mut w = [0u32; 64];
for i in 0..16 {
w[i] = u32::from_be_bytes([
chunk[i * 4],
chunk[i * 4 + 1],
chunk[i * 4 + 2],
chunk[i * 4 + 3],
]);
}
for i in 16..64 {
let s0 = w[i - 15].rotate_right(7) ^ w[i - 15].rotate_right(18) ^ (w[i - 15] >> 3);
let s1 = w[i - 2].rotate_right(17) ^ w[i - 2].rotate_right(19) ^ (w[i - 2] >> 10);
w[i] = w[i - 16]
.wrapping_add(s0)
.wrapping_add(w[i - 7])
.wrapping_add(s1);
}
let (mut a, mut b, mut c, mut d, mut e, mut f, mut g, mut hh) =
(h[0], h[1], h[2], h[3], h[4], h[5], h[6], h[7]);
for i in 0..64 {
let s1 = e.rotate_right(6) ^ e.rotate_right(11) ^ e.rotate_right(25);
let ch = (e & f) ^ (!e & g);
let temp1 = hh
.wrapping_add(s1)
.wrapping_add(ch)
.wrapping_add(K[i])
.wrapping_add(w[i]);
let s0 = a.rotate_right(2) ^ a.rotate_right(13) ^ a.rotate_right(22);
let maj = (a & b) ^ (a & c) ^ (b & c);
let temp2 = s0.wrapping_add(maj);
hh = g;
g = f;
f = e;
e = d.wrapping_add(temp1);
d = c;
c = b;
b = a;
a = temp1.wrapping_add(temp2);
}
h[0] = h[0].wrapping_add(a);
h[1] = h[1].wrapping_add(b);
h[2] = h[2].wrapping_add(c);
h[3] = h[3].wrapping_add(d);
h[4] = h[4].wrapping_add(e);
h[5] = h[5].wrapping_add(f);
h[6] = h[6].wrapping_add(g);
h[7] = h[7].wrapping_add(hh);
}
let mut out = [0u8; 32];
for (i, word) in h.iter().enumerate() {
out[i * 4..i * 4 + 4].copy_from_slice(&word.to_be_bytes());
}
out
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn check_amount_matches() {
assert!(check_amount(Amount::toman(1000), Amount::rial(10_000)).is_ok());
}
#[test]
fn check_amount_mismatch() {
let r = check_amount(Amount::toman(1000), Amount::toman(999));
assert!(matches!(r, Err(Error::AmountMismatch { .. })));
}
#[test]
fn authority_format_rejects_garbage() {
assert!(check_authority_format("").is_err());
assert!(check_authority_format("hi\u{0000}there").is_err());
assert!(check_authority_format(&"x".repeat(200)).is_err());
assert!(check_authority_format("سلام").is_err()); assert!(check_authority_format("A123-valid_token.42").is_ok());
}
#[test]
fn ct_eq_basic() {
assert!(constant_time_eq(b"abc", b"abc"));
assert!(!constant_time_eq(b"abc", b"abd"));
assert!(!constant_time_eq(b"abc", b"abcd"));
assert!(!constant_time_eq(b"", b"x"));
assert!(constant_time_eq(b"", b""));
}
#[test]
fn sha256_vectors() {
let h = sha256(b"abc");
assert_eq!(
hex_encode(&h),
"ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad"
);
let h = sha256(b"");
assert_eq!(
hex_encode(&h),
"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
);
let h = sha256(b"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
assert_eq!(
hex_encode(&h),
"248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1"
);
}
#[test]
fn hmac_sha256_rfc_test_vector() {
let key = [0x0bu8; 20];
let data = b"Hi There";
let mac = hmac_sha256(&key, data);
assert_eq!(
hex_encode(&mac),
"b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7"
);
}
#[test]
fn verify_hmac_round_trip() {
let key = b"shared-secret";
let body = b"hello world";
let mac = hmac_sha256(key, body);
let hex_sig = hex_encode(&mac);
assert!(verify_hmac_sha256(key, body, &hex_sig).is_ok());
assert!(verify_hmac_sha256(key, b"hello world!", &hex_sig).is_err());
}
#[test]
fn verify_hmac_rejects_bad_signature_format() {
assert!(verify_hmac_sha256(b"k", b"m", "tooshort").is_err());
assert!(verify_hmac_sha256(b"k", b"m", &"z".repeat(64)).is_err());
}
fn hex_encode(bytes: &[u8]) -> String {
let mut s = String::with_capacity(bytes.len() * 2);
for b in bytes {
s.push(nibble_to_hex(b >> 4));
s.push(nibble_to_hex(b & 0xf));
}
s
}
fn nibble_to_hex(n: u8) -> char {
match n {
0..=9 => (b'0' + n) as char,
_ => (b'a' + n - 10) as char,
}
}
}