1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
use secp256k1::{PublicKey, SecretKey};
use secp256k1::Message;
use secp256k1::Error;
use sha2::{ Digest, Sha256 };
pub trait Combinable {
fn as_bytes(&self) -> Vec<u8>;
}
impl Combinable for PublicKey {
fn as_bytes(&self) -> Vec<u8> {
let b = self.serialize();
b.to_vec()
}
}
impl Combinable for [u8; 32] {
fn as_bytes(&self) -> Vec<u8> {
self.to_vec()
}
}
pub struct Challenge([u8; 32]);
#[allow(non_snake_case)]
impl Challenge {
pub fn new(keys: &[&Combinable]) -> Challenge {
let mut hasher = Sha256::new();
for &k in keys {
hasher.input(k.as_bytes().as_ref());
}
let hash = hasher.result();
assert!(hash.len() >= 32);
let mut h: [u8; 32] = [0u8; 32];
h.copy_from_slice(hash.as_slice());
Challenge(h)
}
pub fn as_scalar(&self) -> Result<SecretKey, Error> {
SecretKey::parse(&self.0)
}
}
impl Combinable for Challenge {
fn as_bytes(&self) -> Vec<u8> {
self.as_scalar().unwrap().serialize().to_vec()
}
}
impl Combinable for Message {
fn as_bytes(&self) -> Vec<u8> {
self.serialize().to_vec()
}
}