1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
#![no_std]
#![deny(warnings, missing_docs, trivial_casts, trivial_numeric_casts)]
#![deny(unsafe_code, unused_import_braces, unused_qualifications)]
#![doc(
html_logo_url = "https://raw.githubusercontent.com/tendermint/signatory/master/img/signatory-rustacean.png",
html_root_url = "https://docs.rs/signatory-sodiumoxide/0.11.0"
)]
#[cfg(test)]
#[macro_use]
extern crate signatory;
use signatory::{
ed25519,
error::{Error, ErrorKind},
PublicKeyed, Signature, Signer, Verifier,
};
use sodiumoxide::crypto::sign::ed25519::{self as sodiumoxide_ed25519, SecretKey};
pub struct Ed25519Signer {
secret_key: SecretKey,
public_key: ed25519::PublicKey,
}
impl<'a> From<&'a ed25519::Seed> for Ed25519Signer {
fn from(seed: &'a ed25519::Seed) -> Self {
let sodiumoxide_seed =
sodiumoxide_ed25519::Seed::from_slice(seed.as_secret_slice()).unwrap();
let (public_key, secret_key) = sodiumoxide_ed25519::keypair_from_seed(&sodiumoxide_seed);
Self {
secret_key,
public_key: ed25519::PublicKey::from_bytes(&public_key.0).unwrap(),
}
}
}
impl PublicKeyed<ed25519::PublicKey> for Ed25519Signer {
fn public_key(&self) -> Result<ed25519::PublicKey, Error> {
Ok(self.public_key)
}
}
impl Signer<ed25519::Signature> for Ed25519Signer {
fn sign(&self, msg: &[u8]) -> Result<ed25519::Signature, Error> {
let signature = sodiumoxide_ed25519::sign_detached(msg, &self.secret_key);
Ok(Signature::from_bytes(&signature.0[..]).unwrap())
}
}
#[derive(Clone, Debug, Eq, PartialEq)]
pub struct Ed25519Verifier(sodiumoxide_ed25519::PublicKey);
impl<'a> From<&'a ed25519::PublicKey> for Ed25519Verifier {
fn from(public_key: &'a ed25519::PublicKey) -> Self {
Ed25519Verifier(sodiumoxide_ed25519::PublicKey::from_slice(public_key.as_bytes()).unwrap())
}
}
impl Verifier<ed25519::Signature> for Ed25519Verifier {
fn verify(&self, msg: &[u8], signature: &ed25519::Signature) -> Result<(), Error> {
let sig = sodiumoxide_ed25519::Signature::from_slice(signature.as_ref()).unwrap();
if sodiumoxide_ed25519::verify_detached(&sig, msg, &self.0) {
Ok(())
} else {
Err(ErrorKind::SignatureInvalid.into())
}
}
}
#[cfg(test)]
mod tests {
use super::{Ed25519Signer, Ed25519Verifier};
ed25519_tests!(Ed25519Signer, Ed25519Verifier);
}