1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
#![no_std]
#![forbid(unsafe_code)]
#![warn(missing_docs, rust_2018_idioms, unused_qualifications)]
#![doc(
html_logo_url = "https://raw.githubusercontent.com/tendermint/signatory/develop/img/signatory-rustacean.png",
html_root_url = "https://docs.rs/signatory-dalek/0.14.0"
)]
#[cfg(test)]
#[macro_use]
extern crate signatory;
use signatory::{
ed25519,
generic_array::typenum::U64,
public_key::PublicKeyed,
signature::{digest::Digest, DigestSigner, DigestVerifier, Error, Signature, Signer, Verifier},
};
pub struct Ed25519Signer(ed25519_dalek::Keypair);
impl<'a> From<&'a ed25519::Seed> for Ed25519Signer {
fn from(seed: &'a ed25519::Seed) -> Self {
Ed25519Signer(keypair_from_seed(seed))
}
}
impl PublicKeyed<ed25519::PublicKey> for Ed25519Signer {
fn public_key(&self) -> Result<ed25519::PublicKey, Error> {
Ok(ed25519::PublicKey::from_bytes(self.0.public.as_bytes()).unwrap())
}
}
impl Signer<ed25519::Signature> for Ed25519Signer {
fn try_sign(&self, msg: &[u8]) -> Result<ed25519::Signature, Error> {
let signature = self.0.sign(msg).to_bytes();
Ok(ed25519::Signature::from_bytes(&signature[..]).unwrap())
}
}
impl<D> DigestSigner<D, ed25519::Signature> for Ed25519Signer
where
D: Digest<OutputSize = U64> + Default,
{
fn try_sign_digest(&self, digest: D) -> Result<ed25519::Signature, Error> {
let context: Option<&'static [u8]> = None;
let signature =
ed25519::Signature::from_bytes(&self.0.sign_prehashed(digest, context).to_bytes()[..])
.unwrap();
Ok(signature)
}
}
#[derive(Clone, Debug, Eq, PartialEq)]
pub struct Ed25519Verifier(ed25519_dalek::PublicKey);
impl<'a> From<&'a ed25519::PublicKey> for Ed25519Verifier {
fn from(public_key: &'a ed25519::PublicKey) -> Self {
Ed25519Verifier(ed25519_dalek::PublicKey::from_bytes(public_key.as_ref()).unwrap())
}
}
impl Verifier<ed25519::Signature> for Ed25519Verifier {
fn verify(&self, msg: &[u8], sig: &ed25519::Signature) -> Result<(), Error> {
let dalek_sig = ed25519_dalek::Signature::from_bytes(sig.as_ref()).unwrap();
self.0.verify(msg, &dalek_sig).map_err(|_| Error::new())
}
}
impl<D> DigestVerifier<D, ed25519::Signature> for Ed25519Verifier
where
D: Digest<OutputSize = U64> + Default,
{
fn verify_digest(&self, digest: D, sig: &ed25519::Signature) -> Result<(), Error> {
let context: Option<&'static [u8]> = None;
let dalek_sig = ed25519_dalek::Signature::from_bytes(sig.as_ref()).unwrap();
self.0
.verify_prehashed(digest, context, &dalek_sig)
.map_err(|_| Error::new())
}
}
fn keypair_from_seed(seed: &ed25519::Seed) -> ed25519_dalek::Keypair {
let secret = ed25519_dalek::SecretKey::from_bytes(seed.as_secret_slice()).unwrap();
let public = ed25519_dalek::PublicKey::from(&secret);
ed25519_dalek::Keypair { secret, public }
}
#[cfg(test)]
mod tests {
use super::{Ed25519Signer, Ed25519Verifier};
ed25519_tests!(Ed25519Signer, Ed25519Verifier);
}