mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-06 12:38:04 +00:00
8de0e55778
* Cherry pick all crypto related changes from pull-request #13311 applied to master's head * Import some stuff just if 'full_crypto' is on * Remove copyright year * Cleanup * First generic BLS draft * Finalize generic implementation * Restore tests * Fix rust docs * Fix after master merge * Fix after master merge * Use double bls with G1 as signature group and verify individual signatures using DLEQ proof. * Fix inclusions and types used within substrate * Remove unused cruft * Restore usage of upstream crates * Fix test * Reduce the diff by aligning Cargo.lock to master * Application-crypto provides bls381 * Implement bls381 for local keystore * Use new generic keystore features * import DoublePublickey[Scheme] from the bls-like root to be less confusing. * fix compilation * Apply suggestions from code review Co-authored-by: Robert Hambrock <roberthambrock@gmail.com> * Clean leftovers * - update bls test vector after applying spec change recommendation. - send message as ref. * Different hard junction ids for different bls12 types * update to new bls-like * bls-like → w3f-bls * Make clippy happy * update test vector after replacing hash and crop with hash to field. * cargo fmt * account for #13972 * hide BLS behind "bls_non_production" feature flag * Remove Cargo.lock entries duplicated in merge * add bls377 to primitives/keystore and client/keystore add bls377 to primitives/application-crypto/ add bls_non_production to primitives/keystore and client/keystore bump up w3f-bls version * rename feature `bls_non_production` to `bls-experimental` --------- Co-authored-by: Davide Galassi <davxy@datawok.net> Co-authored-by: André Silva <andrerfosilva@gmail.com> Co-authored-by: Robert Hambrock <roberthambrock@gmail.com>
410 lines
10 KiB
Rust
410 lines
10 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Types that should only be used for testing!
|
|
|
|
use crate::{Error, Keystore, KeystorePtr};
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
use sp_core::{bls377, bls381};
|
|
use sp_core::{
|
|
crypto::{ByteArray, KeyTypeId, Pair, VrfSecret},
|
|
ecdsa, ed25519, sr25519,
|
|
};
|
|
|
|
use parking_lot::RwLock;
|
|
use std::{collections::HashMap, sync::Arc};
|
|
|
|
/// A keystore implementation usable in tests.
|
|
#[derive(Default)]
|
|
pub struct MemoryKeystore {
|
|
/// `KeyTypeId` maps to public keys and public keys map to private keys.
|
|
keys: Arc<RwLock<HashMap<KeyTypeId, HashMap<Vec<u8>, String>>>>,
|
|
}
|
|
|
|
impl MemoryKeystore {
|
|
/// Creates a new instance of `Self`.
|
|
pub fn new() -> Self {
|
|
Self::default()
|
|
}
|
|
|
|
fn pair<T: Pair>(&self, key_type: KeyTypeId, public: &T::Public) -> Option<T> {
|
|
self.keys.read().get(&key_type).and_then(|inner| {
|
|
inner
|
|
.get(public.as_slice())
|
|
.map(|s| T::from_string(s, None).expect("seed slice is valid"))
|
|
})
|
|
}
|
|
|
|
fn public_keys<T: Pair>(&self, key_type: KeyTypeId) -> Vec<T::Public> {
|
|
self.keys
|
|
.read()
|
|
.get(&key_type)
|
|
.map(|keys| {
|
|
keys.values()
|
|
.map(|s| T::from_string(s, None).expect("seed slice is valid"))
|
|
.map(|p| p.public())
|
|
.collect()
|
|
})
|
|
.unwrap_or_default()
|
|
}
|
|
|
|
fn generate_new<T: Pair>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<T::Public, Error> {
|
|
match seed {
|
|
Some(seed) => {
|
|
let pair = T::from_string(seed, None)
|
|
.map_err(|_| Error::ValidationError("Generates a pair.".to_owned()))?;
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(pair.public().to_raw_vec(), seed.into());
|
|
Ok(pair.public())
|
|
},
|
|
None => {
|
|
let (pair, phrase, _) = T::generate_with_phrase(None);
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(pair.public().to_raw_vec(), phrase);
|
|
Ok(pair.public())
|
|
},
|
|
}
|
|
}
|
|
|
|
fn sign<T: Pair>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<T::Signature>, Error> {
|
|
let sig = self.pair::<T>(key_type, public).map(|pair| pair.sign(msg));
|
|
Ok(sig)
|
|
}
|
|
|
|
fn vrf_sign<T: Pair + VrfSecret>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
data: &T::VrfSignData,
|
|
) -> Result<Option<T::VrfSignature>, Error> {
|
|
let sig = self.pair::<T>(key_type, public).map(|pair| pair.vrf_sign(data));
|
|
Ok(sig)
|
|
}
|
|
|
|
fn vrf_output<T: Pair + VrfSecret>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
input: &T::VrfInput,
|
|
) -> Result<Option<T::VrfOutput>, Error> {
|
|
let preout = self.pair::<T>(key_type, public).map(|pair| pair.vrf_output(input));
|
|
Ok(preout)
|
|
}
|
|
}
|
|
|
|
impl Keystore for MemoryKeystore {
|
|
fn sr25519_public_keys(&self, key_type: KeyTypeId) -> Vec<sr25519::Public> {
|
|
self.public_keys::<sr25519::Pair>(key_type)
|
|
}
|
|
|
|
fn sr25519_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<sr25519::Public, Error> {
|
|
self.generate_new::<sr25519::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn sr25519_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<sr25519::Signature>, Error> {
|
|
self.sign::<sr25519::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn sr25519_vrf_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
data: &sr25519::vrf::VrfSignData,
|
|
) -> Result<Option<sr25519::vrf::VrfSignature>, Error> {
|
|
self.vrf_sign::<sr25519::Pair>(key_type, public, data)
|
|
}
|
|
|
|
fn sr25519_vrf_output(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
input: &sr25519::vrf::VrfInput,
|
|
) -> Result<Option<sr25519::vrf::VrfOutput>, Error> {
|
|
self.vrf_output::<sr25519::Pair>(key_type, public, input)
|
|
}
|
|
|
|
fn ed25519_public_keys(&self, key_type: KeyTypeId) -> Vec<ed25519::Public> {
|
|
self.public_keys::<ed25519::Pair>(key_type)
|
|
}
|
|
|
|
fn ed25519_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<ed25519::Public, Error> {
|
|
self.generate_new::<ed25519::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn ed25519_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ed25519::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ed25519::Signature>, Error> {
|
|
self.sign::<ed25519::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn ecdsa_public_keys(&self, key_type: KeyTypeId) -> Vec<ecdsa::Public> {
|
|
self.public_keys::<ecdsa::Pair>(key_type)
|
|
}
|
|
|
|
fn ecdsa_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<ecdsa::Public, Error> {
|
|
self.generate_new::<ecdsa::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn ecdsa_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ecdsa::Signature>, Error> {
|
|
self.sign::<ecdsa::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn ecdsa_sign_prehashed(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa::Public,
|
|
msg: &[u8; 32],
|
|
) -> Result<Option<ecdsa::Signature>, Error> {
|
|
let sig = self.pair::<ecdsa::Pair>(key_type, public).map(|pair| pair.sign_prehashed(msg));
|
|
Ok(sig)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_public_keys(&self, key_type: KeyTypeId) -> Vec<bls381::Public> {
|
|
self.public_keys::<bls381::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<bls381::Public, Error> {
|
|
self.generate_new::<bls381::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bls381::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<bls381::Signature>, Error> {
|
|
self.sign::<bls381::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_public_keys(&self, key_type: KeyTypeId) -> Vec<bls377::Public> {
|
|
self.public_keys::<bls377::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<bls377::Public, Error> {
|
|
self.generate_new::<bls377::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bls377::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<bls377::Signature>, Error> {
|
|
self.sign::<bls377::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn insert(&self, key_type: KeyTypeId, suri: &str, public: &[u8]) -> Result<(), ()> {
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(public.to_owned(), suri.to_string());
|
|
Ok(())
|
|
}
|
|
|
|
fn keys(&self, key_type: KeyTypeId) -> Result<Vec<Vec<u8>>, Error> {
|
|
let keys = self
|
|
.keys
|
|
.read()
|
|
.get(&key_type)
|
|
.map(|map| map.keys().cloned().collect())
|
|
.unwrap_or_default();
|
|
Ok(keys)
|
|
}
|
|
|
|
fn has_keys(&self, public_keys: &[(Vec<u8>, KeyTypeId)]) -> bool {
|
|
public_keys
|
|
.iter()
|
|
.all(|(k, t)| self.keys.read().get(t).and_then(|s| s.get(k)).is_some())
|
|
}
|
|
}
|
|
|
|
impl Into<KeystorePtr> for MemoryKeystore {
|
|
fn into(self) -> KeystorePtr {
|
|
Arc::new(self)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use sp_core::{
|
|
sr25519,
|
|
testing::{ECDSA, ED25519, SR25519},
|
|
};
|
|
|
|
#[test]
|
|
fn store_key_and_extract() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let public = store.ed25519_generate_new(ED25519, None).expect("Generates key");
|
|
|
|
let public_keys = store.ed25519_public_keys(ED25519);
|
|
|
|
assert!(public_keys.contains(&public.into()));
|
|
}
|
|
|
|
#[test]
|
|
fn store_unknown_and_extract_it() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let key_pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, key_pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let public_keys = store.sr25519_public_keys(SR25519);
|
|
|
|
assert!(public_keys.contains(&key_pair.public().into()));
|
|
}
|
|
|
|
#[test]
|
|
fn vrf_sign() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let key_pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
let data = sr25519::vrf::VrfInput::new(
|
|
b"Test",
|
|
&[
|
|
(b"one", &1_u64.to_le_bytes()),
|
|
(b"two", &2_u64.to_le_bytes()),
|
|
(b"three", "test".as_bytes()),
|
|
],
|
|
)
|
|
.into_sign_data();
|
|
|
|
let result = store.sr25519_vrf_sign(SR25519, &key_pair.public(), &data);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, key_pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let result = store.sr25519_vrf_sign(SR25519, &key_pair.public(), &data);
|
|
|
|
assert!(result.unwrap().is_some());
|
|
}
|
|
|
|
#[test]
|
|
fn vrf_output() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
let input = sr25519::vrf::VrfInput::new(
|
|
b"Test",
|
|
&[
|
|
(b"one", &1_u64.to_le_bytes()),
|
|
(b"two", &2_u64.to_le_bytes()),
|
|
(b"three", "test".as_bytes()),
|
|
],
|
|
);
|
|
|
|
let result = store.sr25519_vrf_output(SR25519, &pair.public(), &input);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let preout = store.sr25519_vrf_output(SR25519, &pair.public(), &input).unwrap().unwrap();
|
|
|
|
let result = preout.make_bytes::<32>(b"rand", &input, &pair.public());
|
|
assert!(result.is_ok());
|
|
}
|
|
|
|
#[test]
|
|
fn ecdsa_sign_prehashed_works() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let suri = "//Alice";
|
|
let pair = ecdsa::Pair::from_string(suri, None).unwrap();
|
|
|
|
let msg = sp_core::keccak_256(b"this should be a hashed message");
|
|
|
|
// no key in key store
|
|
let res = store.ecdsa_sign_prehashed(ECDSA, &pair.public(), &msg).unwrap();
|
|
assert!(res.is_none());
|
|
|
|
// insert key, sign again
|
|
store.insert(ECDSA, suri, pair.public().as_ref()).unwrap();
|
|
|
|
let res = store.ecdsa_sign_prehashed(ECDSA, &pair.public(), &msg).unwrap();
|
|
assert!(res.is_some());
|
|
}
|
|
}
|