1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
use core::convert::{AsRef, TryInto};
use sp_std::{prelude::*, vec, vec::Vec};
use crate::StellarSdkError;
use sodalite::{
sign_attached, sign_keypair_seed, SignPublicKey, SignSecretKey, SIGN_LEN, SIGN_PUBLIC_KEY_LEN,
SIGN_SECRET_KEY_LEN,
};
use crate::{
types::{Curve25519Secret, PublicKey},
utils::key_encoding::{
decode_stellar_key, encode_stellar_key, ED25519_SECRET_SEED_BYTE_LENGTH,
ED25519_SECRET_SEED_VERSION_BYTE,
},
};
pub use sodalite::Sign as Signature;
pub trait IntoSecretKey {
fn into_secret_key(self) -> Result<SecretKey, StellarSdkError>;
}
impl IntoSecretKey for SecretKey {
fn into_secret_key(self) -> Result<SecretKey, StellarSdkError> {
Ok(self)
}
}
impl<T: AsRef<[u8]>> IntoSecretKey for T {
fn into_secret_key(self) -> Result<SecretKey, StellarSdkError> {
SecretKey::from_encoding(self)
}
}
#[derive(Clone, Eq, PartialEq, Debug)]
pub struct SecretKey {
public: PublicKey,
secret_seed: Curve25519Secret,
signer_key: SignSecretKey,
}
impl SecretKey {
pub fn from_binary(seed: [u8; ED25519_SECRET_SEED_BYTE_LENGTH]) -> SecretKey {
let mut public_key: SignPublicKey = [0; SIGN_PUBLIC_KEY_LEN];
let mut secret_key: SignSecretKey = [0; SIGN_SECRET_KEY_LEN];
sign_keypair_seed(&mut public_key, &mut secret_key, &seed);
SecretKey {
public: PublicKey::from_binary(public_key),
secret_seed: Curve25519Secret { key: seed },
signer_key: secret_key,
}
}
pub fn as_binary(&self) -> &[u8; ED25519_SECRET_SEED_BYTE_LENGTH] {
&self.secret_seed.key
}
pub fn into_binary(self) -> [u8; ED25519_SECRET_SEED_BYTE_LENGTH] {
*self.as_binary()
}
pub fn from_encoding<T: AsRef<[u8]>>(encoded_key: T) -> Result<Self, StellarSdkError> {
let decoded_key = decode_stellar_key(encoded_key, ED25519_SECRET_SEED_VERSION_BYTE)?;
Ok(Self::from_binary(decoded_key))
}
pub fn to_encoding(&self) -> Vec<u8> {
let key = self.as_binary();
encode_stellar_key(key, ED25519_SECRET_SEED_VERSION_BYTE)
}
pub fn get_encoded_public(&self) -> Vec<u8> {
self.public.to_encoding()
}
pub fn get_public(&self) -> &PublicKey {
&self.public
}
pub fn create_signature<T: AsRef<[u8]>>(&self, message: T) -> Signature {
let message = message.as_ref();
let mut signed_message: Vec<u8> = vec![0; message.len() + SIGN_LEN];
sign_attached(&mut signed_message[..], message, &self.signer_key);
signed_message.truncate(SIGN_LEN);
signed_message.try_into().unwrap()
}
}
#[cfg(test)]
mod tests {
use crate::secret_key::{PublicKey, SecretKey};
#[test]
fn keypair() {
let secret = "SCDSVACTNFNSD5LQZ5LWUWEY3UIAML2J7ALPFCD6ZX4D3TVJV7X243N3";
let public = "GBIVKYSF6RP4U57KPZ524X47NGTQYYPZAZ4UX5ZFYAYBJWRFXHKHDQVL";
let keypair = SecretKey::from_encoding(secret);
assert!(keypair.is_ok());
let keypair = keypair.unwrap();
assert_eq!(&keypair.to_encoding().as_slice(), &secret.as_bytes());
assert_eq!(&keypair.get_encoded_public().as_slice(), &public.as_bytes());
}
#[test]
fn public_key() {
let public = "GBIVKYSF6RP4U57KPZ524X47NGTQYYPZAZ4UX5ZFYAYBJWRFXHKHDQVL";
let public_key = PublicKey::from_encoding(public);
assert!(public_key.is_ok());
let public_key = public_key.unwrap();
assert_eq!(&public_key.to_encoding().as_slice(), &public.as_bytes());
}
}