1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
extern crate base64;
use chrono::{
DateTime,
offset::Utc
};
use libsodium_sys::{
crypto_sign_keypair,
crypto_generichash,
crypto_sign_PUBLICKEYBYTES as CRYPTO_SIGN_PUBLICKEYBYTES,
crypto_sign_SECRETKEYBYTES as CRYPTO_SIGN_SECRETKEYBYTES
};
use crate::Keypair;
pub struct Signature;
impl Signature {
pub fn derive(
method: String,
uri: String,
salt: Vec<u8>,
datetime:DateTime<Utc>,
payload: String,
version: Option<i8>
) -> String {
let hash = Self::get_signature_hash(payload, salt.clone(), version);
let b64s = base64::encode(salt);
let ts = datetime.to_rfc2822();
return format!("{}\n{}+{}\n{}\n{}", hash, method, uri, ts, b64s);
}
pub fn new() -> Keypair {
let mut sk: [u8; CRYPTO_SIGN_SECRETKEYBYTES as usize] = vec![0; CRYPTO_SIGN_SECRETKEYBYTES as usize].try_into().unwrap();
let mut pk: [u8; CRYPTO_SIGN_PUBLICKEYBYTES as usize] = vec![0; CRYPTO_SIGN_PUBLICKEYBYTES as usize].try_into().unwrap();
let _result = unsafe { crypto_sign_keypair(pk.as_mut_ptr(), sk.as_mut_ptr())};
return Keypair {
secret_key: sk.to_vec(),
public_key: pk.to_vec()
}
}
pub fn get_signature_hash(data: String, salt: Vec<u8>, version: Option<i8>) -> String {
match version {
Some(2) => {
let s: &[u8; 32] = &salt.try_into().unwrap();
let input = data.as_bytes();
let mut hash: [u8; 64] = vec![0; 64].try_into().unwrap();
let _result = unsafe { crypto_generichash(
hash.as_mut_ptr(),
64,
input.as_ptr(),
input.len() as u64,
s.as_ptr(),
32
) };
return base64::encode(&hash);
},
_ => {
return sha256::digest(data);
}
}
}
}