mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-17 03:42:46 +00:00
95 lines
2.6 KiB
Rust
95 lines
2.6 KiB
Rust
extern crate rand;
|
|
|
|
use super::BLS_SECRET_KEY_BYTE_SIZE;
|
|
use hex::encode as hex_encode;
|
|
use milagro_bls::SecretKey as RawSecretKey;
|
|
use serde::de::{Deserialize, Deserializer};
|
|
use serde::ser::{Serialize, Serializer};
|
|
use serde_hex::PrefixedHexVisitor;
|
|
use ssz::{ssz_encode, Decode, DecodeError, Encode};
|
|
|
|
/// A single BLS signature.
|
|
///
|
|
/// This struct is a wrapper upon a base type and provides helper functions (e.g., SSZ
|
|
/// serialization).
|
|
#[derive(Debug, PartialEq, Clone, Eq)]
|
|
pub struct SecretKey(RawSecretKey);
|
|
|
|
impl SecretKey {
|
|
pub fn random() -> Self {
|
|
SecretKey(RawSecretKey::random(&mut rand::thread_rng()))
|
|
}
|
|
|
|
pub fn from_raw(raw: RawSecretKey) -> Self {
|
|
Self(raw)
|
|
}
|
|
|
|
/// Returns the underlying point as compressed bytes.
|
|
fn as_bytes(&self) -> Vec<u8> {
|
|
self.as_raw().as_bytes()
|
|
}
|
|
|
|
/// Instantiate a SecretKey from existing bytes.
|
|
///
|
|
/// Note: this is _not_ SSZ decoding.
|
|
pub fn from_bytes(bytes: &[u8]) -> Result<SecretKey, DecodeError> {
|
|
Ok(SecretKey(RawSecretKey::from_bytes(bytes).map_err(|e| {
|
|
DecodeError::BytesInvalid(format!(
|
|
"Invalid SecretKey bytes: {:?} Error: {:?}",
|
|
bytes, e
|
|
))
|
|
})?))
|
|
}
|
|
|
|
/// Returns the underlying secret key.
|
|
pub fn as_raw(&self) -> &RawSecretKey {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
impl_ssz!(SecretKey, BLS_SECRET_KEY_BYTE_SIZE, "SecretKey");
|
|
|
|
impl_tree_hash!(SecretKey, BLS_SECRET_KEY_BYTE_SIZE);
|
|
|
|
impl Serialize for SecretKey {
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: Serializer,
|
|
{
|
|
serializer.serialize_str(&hex_encode(ssz_encode(self)))
|
|
}
|
|
}
|
|
|
|
impl<'de> Deserialize<'de> for SecretKey {
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
let bytes = deserializer.deserialize_str(PrefixedHexVisitor)?;
|
|
let secret_key = SecretKey::from_ssz_bytes(&bytes[..])
|
|
.map_err(|e| serde::de::Error::custom(format!("invalid ssz ({:?})", e)))?;
|
|
Ok(secret_key)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use ssz::ssz_encode;
|
|
|
|
#[test]
|
|
pub fn test_ssz_round_trip() {
|
|
let byte_key = [
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 70, 211, 210, 129, 231, 69, 162, 234,
|
|
16, 15, 244, 214, 126, 201, 0, 85, 28, 239, 82, 121, 208, 190, 223, 6, 169, 202, 86,
|
|
236, 197, 218, 3, 69,
|
|
];
|
|
let original = SecretKey::from_bytes(&byte_key).unwrap();
|
|
|
|
let bytes = ssz_encode(&original);
|
|
let decoded = SecretKey::from_ssz_bytes(&bytes).unwrap();
|
|
|
|
assert_eq!(original, decoded);
|
|
}
|
|
}
|