|
@@ -3,10 +3,7 @@
|
3
|
3
|
//! Used Dalek cryptography, and implemented [`Borsh`](https://borsh.io/) serialization for them
|
4
|
4
|
|
5
|
5
|
use borsh::{BorshDeserialize, BorshSerialize};
|
6
|
|
-use ed25519_dalek::{
|
7
|
|
- ExpandedSecretKey, PublicKey, SecretKey, Signature, Verifier, PUBLIC_KEY_LENGTH,
|
8
|
|
- SECRET_KEY_LENGTH, SIGNATURE_LENGTH,
|
9
|
|
-};
|
|
6
|
+use ed25519_dalek::{ExpandedSecretKey, PublicKey, SecretKey, Signature, Verifier};
|
10
|
7
|
use itertools::Itertools;
|
11
|
8
|
use serde::{Deserialize, Serialize};
|
12
|
9
|
use std::{
|
|
@@ -17,6 +14,11 @@ use std::{
|
17
|
14
|
|
18
|
15
|
use super::{split_encoded_str, Error, Key, Result, ED25519};
|
19
|
16
|
|
|
17
|
+pub use ed25519_dalek::{
|
|
18
|
+ PUBLIC_KEY_LENGTH as ED25519_PUBLIC_KEY_LENGTH, SECRET_KEY_LENGTH as ED25519_SECRET_KEY_LENGTH,
|
|
19
|
+ SIGNATURE_LENGTH as ED25519_SIGNATURE_LENGTH,
|
|
20
|
+};
|
|
21
|
+
|
20
|
22
|
#[derive(Copy, Clone, Default, Eq, PartialEq)]
|
21
|
23
|
pub struct Ed25519PublicKey(PublicKey);
|
22
|
24
|
|
|
@@ -28,16 +30,16 @@ impl Ed25519PublicKey {
|
28
|
30
|
}
|
29
|
31
|
|
30
|
32
|
#[inline]
|
31
|
|
- pub fn as_bytes(&self) -> &[u8; PUBLIC_KEY_LENGTH] {
|
|
33
|
+ pub fn as_bytes(&self) -> &[u8; ED25519_PUBLIC_KEY_LENGTH] {
|
32
|
34
|
self.0.as_bytes()
|
33
|
35
|
}
|
34
|
36
|
}
|
35
|
37
|
|
36
|
|
-impl Key<PUBLIC_KEY_LENGTH> for Ed25519PublicKey {
|
|
38
|
+impl Key<ED25519_PUBLIC_KEY_LENGTH> for Ed25519PublicKey {
|
37
|
39
|
const KEY_TYPE: &'static str = ED25519;
|
38
|
40
|
|
39
|
41
|
#[inline]
|
40
|
|
- fn to_bytes(&self) -> [u8; PUBLIC_KEY_LENGTH] {
|
|
42
|
+ fn to_bytes(&self) -> [u8; ED25519_PUBLIC_KEY_LENGTH] {
|
41
|
43
|
self.0.to_bytes()
|
42
|
44
|
}
|
43
|
45
|
|
|
@@ -115,22 +117,22 @@ impl Ed25519SecretKey {
|
115
|
117
|
Error::from_string::<Ed25519SecretKey>(bs58_encoded.to_owned(), err.to_string())
|
116
|
118
|
})?
|
117
|
119
|
.into_iter()
|
118
|
|
- .take(SECRET_KEY_LENGTH)
|
|
120
|
+ .take(ED25519_SECRET_KEY_LENGTH)
|
119
|
121
|
.collect_vec();
|
120
|
122
|
Self::try_from_bytes(&expanded_key_bytes)
|
121
|
123
|
}
|
122
|
124
|
|
123
|
125
|
#[inline]
|
124
|
|
- pub fn as_bytes(&self) -> &[u8; PUBLIC_KEY_LENGTH] {
|
|
126
|
+ pub fn as_bytes(&self) -> &[u8; ED25519_PUBLIC_KEY_LENGTH] {
|
125
|
127
|
self.0.as_bytes()
|
126
|
128
|
}
|
127
|
129
|
}
|
128
|
130
|
|
129
|
|
-impl Key<SECRET_KEY_LENGTH> for Ed25519SecretKey {
|
|
131
|
+impl Key<ED25519_SECRET_KEY_LENGTH> for Ed25519SecretKey {
|
130
|
132
|
const KEY_TYPE: &'static str = ED25519;
|
131
|
133
|
|
132
|
134
|
#[inline]
|
133
|
|
- fn to_bytes(&self) -> [u8; SECRET_KEY_LENGTH] {
|
|
135
|
+ fn to_bytes(&self) -> [u8; ED25519_SECRET_KEY_LENGTH] {
|
134
|
136
|
self.0.to_bytes()
|
135
|
137
|
}
|
136
|
138
|
|
|
@@ -157,11 +159,11 @@ impl BorshSerialize for Ed25519SecretKey {
|
157
|
159
|
#[derive(Copy, Clone, Eq, PartialEq)]
|
158
|
160
|
pub struct Ed25519Signature(Signature);
|
159
|
161
|
|
160
|
|
-impl Key<SIGNATURE_LENGTH> for Ed25519Signature {
|
|
162
|
+impl Key<ED25519_SIGNATURE_LENGTH> for Ed25519Signature {
|
161
|
163
|
const KEY_TYPE: &'static str = ED25519;
|
162
|
164
|
|
163
|
165
|
#[inline]
|
164
|
|
- fn to_bytes(&self) -> [u8; SIGNATURE_LENGTH] {
|
|
166
|
+ fn to_bytes(&self) -> [u8; ED25519_SIGNATURE_LENGTH] {
|
165
|
167
|
self.0.to_bytes()
|
166
|
168
|
}
|
167
|
169
|
|