1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
use secp256k1::{PublicKey, SecretKey};
use secp256k1::Message;
use secp256k1::Error;
use sha2::{ Digest, Sha256 };
pub trait Combinable {
    fn as_bytes(&self) -> Vec<u8>;
}
impl Combinable for PublicKey {
    fn as_bytes(&self) -> Vec<u8> {
        let b = self.serialize();
        b.to_vec()
    }
}
impl Combinable for [u8; 32] {
    fn as_bytes(&self) -> Vec<u8> {
        self.to_vec()
    }
}
pub struct Challenge([u8; 32]);
#[allow(non_snake_case)]
impl Challenge {
    pub fn new(keys: &[&Combinable]) -> Challenge {
        let mut hasher = Sha256::new();
        for &k in keys {
            hasher.input(k.as_bytes().as_ref());
        }
        let hash = hasher.result();
        assert!(hash.len() >= 32);
        let mut h: [u8; 32] = [0u8; 32];
        h.copy_from_slice(hash.as_slice());
        Challenge(h)
    }
    pub fn as_scalar(&self) -> Result<SecretKey, Error> {
        SecretKey::parse(&self.0)
    }
}
impl Combinable for Challenge {
    fn as_bytes(&self) -> Vec<u8> {
        self.as_scalar().unwrap().serialize().to_vec()
    }
}
impl Combinable for Message {
    fn as_bytes(&self) -> Vec<u8> {
        self.serialize().to_vec()
    }
}