use crate::event::sections::key_config::SignatureError;
use self::error::Error;
use cesrox::primitives::codes::PrimitiveCode;
pub use cesrox::primitives::CesrPrimitive;
use core::str::FromStr;
use said::SelfAddressingIdentifier;
use serde::{Deserialize, Deserializer, Serialize, Serializer};
use std::fmt::Display;
pub mod attached_signature;
pub mod basic;
pub mod cesr_adapter;
pub mod error;
pub mod seed;
pub mod self_signing;
pub use attached_signature::IndexedSignature;
pub use basic::BasicPrefix;
pub use seed::SeedPrefix;
pub use self_signing::SelfSigningPrefix;
#[derive(Debug, PartialEq, Clone, Eq, Hash)]
pub enum IdentifierPrefix {
Basic(BasicPrefix),
SelfAddressing(SelfAddressingIdentifier),
SelfSigning(SelfSigningPrefix),
}
impl Display for IdentifierPrefix {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "{}", self.to_str())
}
}
impl FromStr for IdentifierPrefix {
type Err = Error;
fn from_str(s: &str) -> Result<Self, Self::Err> {
match BasicPrefix::from_str(s) {
Ok(bp) => Ok(Self::Basic(bp)),
Err(_) => match SelfAddressingIdentifier::from_str(s) {
Ok(sa) => Ok(Self::SelfAddressing(sa)),
Err(_) => Ok(Self::SelfSigning(SelfSigningPrefix::from_str(s)?)),
},
}
}
}
impl CesrPrimitive for IdentifierPrefix {
fn derivative(&self) -> Vec<u8> {
match self {
Self::Basic(bp) => bp.derivative(),
Self::SelfAddressing(sap) => sap.derivative(),
Self::SelfSigning(ssp) => ssp.derivative(),
}
}
fn derivation_code(&self) -> PrimitiveCode {
match self {
Self::Basic(bp) => bp.derivation_code(),
Self::SelfAddressing(sap) => sap.derivation_code(),
Self::SelfSigning(ssp) => ssp.derivation_code(),
}
}
}
impl Serialize for IdentifierPrefix {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
serializer.serialize_str(&self.to_str())
}
}
impl<'de> Deserialize<'de> for IdentifierPrefix {
fn deserialize<D>(deserializer: D) -> Result<IdentifierPrefix, D::Error>
where
D: Deserializer<'de>,
{
let s = String::deserialize(deserializer)?;
IdentifierPrefix::from_str(&s).map_err(serde::de::Error::custom)
}
}
impl Default for IdentifierPrefix {
fn default() -> Self {
IdentifierPrefix::SelfAddressing(SelfAddressingIdentifier::default())
}
}
pub fn verify(
data: &[u8],
key: &BasicPrefix,
signature: &SelfSigningPrefix,
) -> Result<bool, SignatureError> {
match key {
BasicPrefix::Ed25519(pk) | BasicPrefix::Ed25519NT(pk) => match signature {
SelfSigningPrefix::Ed25519Sha512(signature) => {
Ok(pk.verify_ed(data.as_ref(), signature))
}
_ => Err(SignatureError::WrongSignatureTypeError),
},
BasicPrefix::ECDSAsecp256k1(key) | BasicPrefix::ECDSAsecp256k1NT(key) => match signature {
SelfSigningPrefix::ECDSAsecp256k1Sha256(signature) => {
Ok(key.verify_ecdsa(data.as_ref(), signature))
}
_ => Err(SignatureError::WrongSignatureTypeError),
},
_ => Err(SignatureError::WrongKeyTypeError),
}
}
pub fn derive(seed: &SeedPrefix, transferable: bool) -> Result<BasicPrefix, Error> {
let (pk, _) = seed.derive_key_pair()?;
Ok(match seed {
SeedPrefix::RandomSeed256Ed25519(_) if transferable => BasicPrefix::Ed25519(pk),
SeedPrefix::RandomSeed256Ed25519(_) if !transferable => BasicPrefix::Ed25519NT(pk),
SeedPrefix::RandomSeed256ECDSAsecp256k1(_) if transferable => {
BasicPrefix::ECDSAsecp256k1(pk)
}
SeedPrefix::RandomSeed256ECDSAsecp256k1(_) if !transferable => {
BasicPrefix::ECDSAsecp256k1NT(pk)
}
_ => return Err(Error::WrongSeedTypeError),
})
}
#[cfg(test)]
mod tests {
use super::*;
use crate::keys::{PrivateKey, PublicKey};
use ed25519_dalek::Keypair;
use rand::rngs::OsRng;
use said::derivation::{HashFunction, HashFunctionCode};
#[test]
fn simple_deserialize() -> Result<(), Error> {
let pref: IdentifierPrefix = "BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".parse()?;
assert_eq!(pref.derivation_code().to_str(), "B");
assert_eq!(pref.derivative().len(), 32);
assert_eq!(pref.derivative().to_vec(), vec![0u8; 32]);
Ok(())
}
#[test]
fn length() -> Result<(), Error> {
assert!(IdentifierPrefix::from_str("BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA").is_ok());
assert!(IdentifierPrefix::from_str("CBBBBBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA").is_ok());
assert!(!IdentifierPrefix::from_str("BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA").is_ok());
assert!(
!IdentifierPrefix::from_str("BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA").is_ok()
);
assert!(
!IdentifierPrefix::from_str("ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA").is_ok()
);
assert!(
!IdentifierPrefix::from_str("BAAAAAAAAAAAAAAAAAAA/AAAAAAAAAAAAAAAAAAAAAAAA").is_ok()
);
Ok(())
}
#[test]
fn simple_serialize() -> Result<(), Error> {
let pref = BasicPrefix::Ed25519NT(PublicKey::new(
ed25519_dalek::PublicKey::from_bytes(&[0; 32])?
.to_bytes()
.to_vec(),
));
assert_eq!(
pref.to_str(),
"BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
);
Ok(())
}
#[test]
fn verify() -> Result<(), Error> {
let data_string = "hello there";
let kp = Keypair::generate(&mut OsRng);
let pub_key = PublicKey::new(kp.public.to_bytes().to_vec());
let priv_key = PrivateKey::new(kp.secret.to_bytes().to_vec());
let key_prefix = BasicPrefix::Ed25519NT(pub_key);
let sig = priv_key.sign_ed(&data_string.as_bytes()).unwrap();
let sig_prefix = SelfSigningPrefix::Ed25519Sha512(sig);
let check = key_prefix.verify(&data_string.as_bytes(), &sig_prefix);
assert!(check.is_ok());
assert!(check.unwrap());
Ok(())
}
#[test]
fn prefix_deserialization() -> Result<(), Error> {
fn all_codes<F>(codes: Vec<(&str, usize)>, pred: F) -> Result<(), Error>
where
F: Fn(IdentifierPrefix) -> bool,
{
for (code, length) in codes {
let pref: IdentifierPrefix =
[code.to_string(), "A".repeat(length)].join("").parse()?;
assert!(pred(pref.clone()));
assert_eq!(pref.derivation_code().to_str(), code);
}
Ok(())
}
let basic_codes = vec!["B", "C", "D", "L", "1AAA", "1AAB", "1AAC", "1AAD"].into_iter();
let allowed_lengths = vec![43, 43, 43, 75, 44, 44, 76, 76].into_iter();
let is_basic = |identifier| matches!(&identifier, IdentifierPrefix::Basic(_));
all_codes(basic_codes.zip(allowed_lengths).collect(), is_basic)?;
let self_adressing_codes =
vec!["E", "F", "G", "H", "I", "0D", "0E", "0F", "0G"].into_iter();
let allowed_lengths = vec![43, 43, 43, 43, 43, 86, 86, 86, 86].into_iter();
let is_self_addresing =
|identifier| matches!(&identifier, IdentifierPrefix::SelfAddressing(_));
all_codes(
self_adressing_codes.zip(allowed_lengths).collect(),
is_self_addresing,
)?;
let is_self_signing = |identifier| matches!(&identifier, IdentifierPrefix::SelfSigning(_));
let self_signing_codes = vec!["0B", "0C", "1AAE"].into_iter();
let allowed_lengths = vec![86, 86, 152].into_iter();
all_codes(
self_signing_codes.zip(allowed_lengths).collect(),
is_self_signing,
)?;
Ok(())
}
#[test]
fn prefix_serialization() -> Result<(), Error> {
assert_eq!(
BasicPrefix::Ed25519NT(PublicKey::new(
ed25519_dalek::PublicKey::from_bytes(&[0; 32])?
.to_bytes()
.to_vec()
))
.to_str(),
["B".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
BasicPrefix::X25519(PublicKey::new(
ed25519_dalek::PublicKey::from_bytes(&[0; 32])?
.to_bytes()
.to_vec()
))
.to_str(),
["C".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
BasicPrefix::Ed25519(PublicKey::new(
ed25519_dalek::PublicKey::from_bytes(&[0; 32])?
.to_bytes()
.to_vec()
))
.to_str(),
["D".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
BasicPrefix::X448(PublicKey::new([0; 56].to_vec())).to_str(),
["L".to_string(), "A".repeat(75)].join("")
);
assert_eq!(
BasicPrefix::ECDSAsecp256k1NT(PublicKey::new([0; 33].to_vec())).to_str(),
["1AAA".to_string(), "A".repeat(44)].join("")
);
assert_eq!(
BasicPrefix::ECDSAsecp256k1(PublicKey::new([0; 33].to_vec())).to_str(),
["1AAB".to_string(), "A".repeat(44)].join("")
);
assert_eq!(
BasicPrefix::Ed448NT(PublicKey::new([0; 57].to_vec())).to_str(),
["1AAC".to_string(), "A".repeat(76)].join("")
);
assert_eq!(
BasicPrefix::Ed448(PublicKey::new([0; 57].to_vec())).to_str(),
["1AAD".to_string(), "A".repeat(76)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::Blake3_256.into(), vec![0; 32])
.to_str(),
["E".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::Blake2B256(vec!()).into(), vec![0; 32])
.to_str(),
["F".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::Blake2S256(vec!()).into(), vec![0; 32])
.to_str(),
["G".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::SHA3_256.into(), vec![0; 32]).to_str(),
["H".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::SHA2_256.into(), vec![0; 32]).to_str(),
["I".to_string(), "A".repeat(43)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::Blake3_512.into(), vec![0; 64])
.to_str(),
["0D".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::SHA3_512.into(), vec![0; 64]).to_str(),
["0E".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::Blake2B512.into(), vec![0; 64])
.to_str(),
["0F".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfAddressingIdentifier::new(HashFunctionCode::SHA2_512.into(), vec![0; 64]).to_str(),
["0G".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfSigningPrefix::ECDSAsecp256k1Sha256(vec![0; 64]).to_str(),
["0C".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfSigningPrefix::Ed25519Sha512(vec![0; 64]).to_str(),
["0B".to_string(), "A".repeat(86)].join("")
);
assert_eq!(
SelfSigningPrefix::Ed448(vec![0; 114]).to_str(),
["1AAE".to_string(), "A".repeat(152)].join("")
);
Ok(())
}
#[test]
pub fn test_identifier_encoding() {
use crate::keys::PublicKey;
use sodiumoxide::hex;
let pub_key = "694e894769e6c3267e8b477c2590284cd647dd42ef6007d254fce1cd2e9be423";
let key = hex::decode(pub_key).unwrap();
let bp = BasicPrefix::Ed25519NT(PublicKey::new(key));
let hash_function: HashFunction = HashFunctionCode::Blake3_256.into();
let expected_identifier = "BGlOiUdp5sMmfotHfCWQKEzWR91C72AH0lT84c0um-Qj";
assert_eq!(bp.to_str(), expected_identifier);
let to_digest = "abcdefghijklmnopqrstuvwxyz0123456789";
let dig = hash_function.derive(to_digest.as_bytes());
dig.verify_binding(to_digest.as_bytes());
assert_eq!(dig.to_str(), "ELC5L3iBVD77d_MYbYGGCUQgqQBju1o4x1Ud-z2sL-ux");
let to_digest = "BDjXHlcskwOzNj8rYbV8IQ6ox2TW_KkbA1K3-n0EU0un";
let dig = hash_function.derive(to_digest.as_bytes());
assert_eq!(dig.to_str(), "EP9XvFnpQP4vnaTNDNAMU2T7nxDPe1EZLUaiABcLRfS4");
let self_signing_b64 =
"mdI8OSQkMJ9r-xigjEByEjIua7LHH3AOJ22PQKqljMhuhcgh9nGRcKnsz5KvKd7K_H9-1298F4Id1DxvIoEmCQ==";
let self_signing_raw = base64::decode_config(self_signing_b64, base64::URL_SAFE).unwrap();
let ssp = SelfSigningPrefix::Ed25519Sha512(self_signing_raw);
assert_eq!(
ssp.to_str(),
"0BCZ0jw5JCQwn2v7GKCMQHISMi5rsscfcA4nbY9AqqWMyG6FyCH2cZFwqezPkq8p3sr8f37Xb3wXgh3UPG8igSYJ"
);
}
}