mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-10 05:17:59 +00:00
1e9fd23776
Introduces `CryptoBytes` type defined as: ```rust pub struct CryptoBytes<const N: usize, Tag = ()>(pub [u8; N], PhantomData<fn() -> Tag>); ``` The type implements a bunch of methods and traits which are typically expected from a byte array newtype (NOTE: some of the methods and trait implementations IMO are a bit redundant, but I decided to maintain them all to not change too much stuff in this PR) It also introduces two (generic) typical consumers of `CryptoBytes`: `PublicBytes` and `SignatureBytes`. ```rust pub struct PublicTag; pub PublicBytes<const N: usize, CryptoTag> = CryptoBytes<N, (PublicTag, CryptoTag)>; pub struct SignatureTag; pub SignatureBytes<const N: usize, CryptoTag> = CryptoBytes<N, (SignatureTag, CryptoTag)>; ``` Both of them use a tag to differentiate the two types at a higher level. Downstream specializations will further specialize using a dedicated crypto tag. For example in ECDSA: ```rust pub struct EcdsaTag; pub type Public = PublicBytes<PUBLIC_KEY_SERIALIZED_SIZE, EcdsaTag>; pub type Signature = PublicBytes<PUBLIC_KEY_SERIALIZED_SIZE, EcdsaTag>; ``` Overall we have a cleaner and most importantly **consistent** code for all the types involved All these details are opaque to the end user which can use `Public` and `Signature` for the cryptos as before
606 lines
16 KiB
Rust
606 lines
16 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Types that should only be used for testing!
|
|
|
|
use crate::{Error, Keystore, KeystorePtr};
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
use sp_core::bandersnatch;
|
|
#[cfg(feature = "bls-experimental")]
|
|
use sp_core::{bls377, bls381, ecdsa_bls377, KeccakHasher};
|
|
use sp_core::{
|
|
crypto::{ByteArray, KeyTypeId, Pair, VrfSecret},
|
|
ecdsa, ed25519, sr25519,
|
|
};
|
|
|
|
use parking_lot::RwLock;
|
|
use std::{collections::HashMap, sync::Arc};
|
|
|
|
/// A keystore implementation usable in tests.
|
|
#[derive(Default, Clone)]
|
|
pub struct MemoryKeystore {
|
|
/// `KeyTypeId` maps to public keys and public keys map to private keys.
|
|
keys: Arc<RwLock<HashMap<KeyTypeId, HashMap<Vec<u8>, String>>>>,
|
|
}
|
|
|
|
impl MemoryKeystore {
|
|
/// Creates a new instance of `Self`.
|
|
pub fn new() -> Self {
|
|
Self::default()
|
|
}
|
|
|
|
fn pair<T: Pair>(&self, key_type: KeyTypeId, public: &T::Public) -> Option<T> {
|
|
self.keys.read().get(&key_type).and_then(|inner| {
|
|
inner
|
|
.get(public.as_slice())
|
|
.map(|s| T::from_string(s, None).expect("seed slice is valid"))
|
|
})
|
|
}
|
|
|
|
fn public_keys<T: Pair>(&self, key_type: KeyTypeId) -> Vec<T::Public> {
|
|
self.keys
|
|
.read()
|
|
.get(&key_type)
|
|
.map(|keys| {
|
|
keys.values()
|
|
.map(|s| T::from_string(s, None).expect("seed slice is valid"))
|
|
.map(|p| p.public())
|
|
.collect()
|
|
})
|
|
.unwrap_or_default()
|
|
}
|
|
|
|
fn generate_new<T: Pair>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<T::Public, Error> {
|
|
match seed {
|
|
Some(seed) => {
|
|
let pair = T::from_string(seed, None)
|
|
.map_err(|_| Error::ValidationError("Generates a pair.".to_owned()))?;
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(pair.public().to_raw_vec(), seed.into());
|
|
Ok(pair.public())
|
|
},
|
|
None => {
|
|
let (pair, phrase, _) = T::generate_with_phrase(None);
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(pair.public().to_raw_vec(), phrase);
|
|
Ok(pair.public())
|
|
},
|
|
}
|
|
}
|
|
|
|
fn sign<T: Pair>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<T::Signature>, Error> {
|
|
let sig = self.pair::<T>(key_type, public).map(|pair| pair.sign(msg));
|
|
Ok(sig)
|
|
}
|
|
|
|
fn vrf_sign<T: Pair + VrfSecret>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
data: &T::VrfSignData,
|
|
) -> Result<Option<T::VrfSignature>, Error> {
|
|
let sig = self.pair::<T>(key_type, public).map(|pair| pair.vrf_sign(data));
|
|
Ok(sig)
|
|
}
|
|
|
|
fn vrf_pre_output<T: Pair + VrfSecret>(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &T::Public,
|
|
input: &T::VrfInput,
|
|
) -> Result<Option<T::VrfPreOutput>, Error> {
|
|
let pre_output = self.pair::<T>(key_type, public).map(|pair| pair.vrf_pre_output(input));
|
|
Ok(pre_output)
|
|
}
|
|
}
|
|
|
|
impl Keystore for MemoryKeystore {
|
|
fn sr25519_public_keys(&self, key_type: KeyTypeId) -> Vec<sr25519::Public> {
|
|
self.public_keys::<sr25519::Pair>(key_type)
|
|
}
|
|
|
|
fn sr25519_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<sr25519::Public, Error> {
|
|
self.generate_new::<sr25519::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn sr25519_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<sr25519::Signature>, Error> {
|
|
self.sign::<sr25519::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn sr25519_vrf_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
data: &sr25519::vrf::VrfSignData,
|
|
) -> Result<Option<sr25519::vrf::VrfSignature>, Error> {
|
|
self.vrf_sign::<sr25519::Pair>(key_type, public, data)
|
|
}
|
|
|
|
fn sr25519_vrf_pre_output(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &sr25519::Public,
|
|
input: &sr25519::vrf::VrfInput,
|
|
) -> Result<Option<sr25519::vrf::VrfPreOutput>, Error> {
|
|
self.vrf_pre_output::<sr25519::Pair>(key_type, public, input)
|
|
}
|
|
|
|
fn ed25519_public_keys(&self, key_type: KeyTypeId) -> Vec<ed25519::Public> {
|
|
self.public_keys::<ed25519::Pair>(key_type)
|
|
}
|
|
|
|
fn ed25519_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<ed25519::Public, Error> {
|
|
self.generate_new::<ed25519::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn ed25519_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ed25519::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ed25519::Signature>, Error> {
|
|
self.sign::<ed25519::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn ecdsa_public_keys(&self, key_type: KeyTypeId) -> Vec<ecdsa::Public> {
|
|
self.public_keys::<ecdsa::Pair>(key_type)
|
|
}
|
|
|
|
fn ecdsa_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<ecdsa::Public, Error> {
|
|
self.generate_new::<ecdsa::Pair>(key_type, seed)
|
|
}
|
|
|
|
fn ecdsa_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ecdsa::Signature>, Error> {
|
|
self.sign::<ecdsa::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
fn ecdsa_sign_prehashed(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa::Public,
|
|
msg: &[u8; 32],
|
|
) -> Result<Option<ecdsa::Signature>, Error> {
|
|
let sig = self.pair::<ecdsa::Pair>(key_type, public).map(|pair| pair.sign_prehashed(msg));
|
|
Ok(sig)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_public_keys(&self, key_type: KeyTypeId) -> Vec<bandersnatch::Public> {
|
|
self.public_keys::<bandersnatch::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<bandersnatch::Public, Error> {
|
|
self.generate_new::<bandersnatch::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bandersnatch::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<bandersnatch::Signature>, Error> {
|
|
self.sign::<bandersnatch::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_vrf_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bandersnatch::Public,
|
|
data: &bandersnatch::vrf::VrfSignData,
|
|
) -> Result<Option<bandersnatch::vrf::VrfSignature>, Error> {
|
|
self.vrf_sign::<bandersnatch::Pair>(key_type, public, data)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_ring_vrf_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bandersnatch::Public,
|
|
data: &bandersnatch::vrf::VrfSignData,
|
|
prover: &bandersnatch::ring_vrf::RingProver,
|
|
) -> Result<Option<bandersnatch::ring_vrf::RingVrfSignature>, Error> {
|
|
let sig = self
|
|
.pair::<bandersnatch::Pair>(key_type, public)
|
|
.map(|pair| pair.ring_vrf_sign(data, prover));
|
|
Ok(sig)
|
|
}
|
|
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_vrf_pre_output(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bandersnatch::Public,
|
|
input: &bandersnatch::vrf::VrfInput,
|
|
) -> Result<Option<bandersnatch::vrf::VrfPreOutput>, Error> {
|
|
self.vrf_pre_output::<bandersnatch::Pair>(key_type, public, input)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_public_keys(&self, key_type: KeyTypeId) -> Vec<bls381::Public> {
|
|
self.public_keys::<bls381::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<bls381::Public, Error> {
|
|
self.generate_new::<bls381::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls381_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bls381::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<bls381::Signature>, Error> {
|
|
self.sign::<bls381::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_public_keys(&self, key_type: KeyTypeId) -> Vec<bls377::Public> {
|
|
self.public_keys::<bls377::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<bls377::Public, Error> {
|
|
self.generate_new::<bls377::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn bls377_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &bls377::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<bls377::Signature>, Error> {
|
|
self.sign::<bls377::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn ecdsa_bls377_public_keys(&self, key_type: KeyTypeId) -> Vec<ecdsa_bls377::Public> {
|
|
self.public_keys::<ecdsa_bls377::Pair>(key_type)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn ecdsa_bls377_generate_new(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
seed: Option<&str>,
|
|
) -> Result<ecdsa_bls377::Public, Error> {
|
|
self.generate_new::<ecdsa_bls377::Pair>(key_type, seed)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn ecdsa_bls377_sign(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa_bls377::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ecdsa_bls377::Signature>, Error> {
|
|
self.sign::<ecdsa_bls377::Pair>(key_type, public, msg)
|
|
}
|
|
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn ecdsa_bls377_sign_with_keccak256(
|
|
&self,
|
|
key_type: KeyTypeId,
|
|
public: &ecdsa_bls377::Public,
|
|
msg: &[u8],
|
|
) -> Result<Option<ecdsa_bls377::Signature>, Error> {
|
|
let sig = self
|
|
.pair::<ecdsa_bls377::Pair>(key_type, public)
|
|
.map(|pair| pair.sign_with_hasher::<KeccakHasher>(msg));
|
|
Ok(sig)
|
|
}
|
|
|
|
fn insert(&self, key_type: KeyTypeId, suri: &str, public: &[u8]) -> Result<(), ()> {
|
|
self.keys
|
|
.write()
|
|
.entry(key_type)
|
|
.or_default()
|
|
.insert(public.to_owned(), suri.to_string());
|
|
Ok(())
|
|
}
|
|
|
|
fn keys(&self, key_type: KeyTypeId) -> Result<Vec<Vec<u8>>, Error> {
|
|
let keys = self
|
|
.keys
|
|
.read()
|
|
.get(&key_type)
|
|
.map(|map| map.keys().cloned().collect())
|
|
.unwrap_or_default();
|
|
Ok(keys)
|
|
}
|
|
|
|
fn has_keys(&self, public_keys: &[(Vec<u8>, KeyTypeId)]) -> bool {
|
|
public_keys
|
|
.iter()
|
|
.all(|(k, t)| self.keys.read().get(t).and_then(|s| s.get(k)).is_some())
|
|
}
|
|
}
|
|
|
|
impl Into<KeystorePtr> for MemoryKeystore {
|
|
fn into(self) -> KeystorePtr {
|
|
Arc::new(self)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use sp_core::{
|
|
sr25519,
|
|
testing::{ECDSA, ED25519, SR25519},
|
|
};
|
|
|
|
#[test]
|
|
fn store_key_and_extract() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let public = store.ed25519_generate_new(ED25519, None).expect("Generates key");
|
|
|
|
let public_keys = store.ed25519_public_keys(ED25519);
|
|
|
|
assert!(public_keys.contains(&public.into()));
|
|
}
|
|
|
|
#[test]
|
|
fn store_unknown_and_extract_it() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let key_pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, key_pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let public_keys = store.sr25519_public_keys(SR25519);
|
|
|
|
assert!(public_keys.contains(&key_pair.public().into()));
|
|
}
|
|
|
|
#[test]
|
|
fn sr25519_vrf_sign() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let key_pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
let data = sr25519::vrf::VrfInput::new(
|
|
b"Test",
|
|
&[
|
|
(b"one", &1_u64.to_le_bytes()),
|
|
(b"two", &2_u64.to_le_bytes()),
|
|
(b"three", "test".as_bytes()),
|
|
],
|
|
)
|
|
.into_sign_data();
|
|
|
|
let result = store.sr25519_vrf_sign(SR25519, &key_pair.public(), &data);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, key_pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let result = store.sr25519_vrf_sign(SR25519, &key_pair.public(), &data);
|
|
|
|
assert!(result.unwrap().is_some());
|
|
}
|
|
|
|
#[test]
|
|
fn sr25519_vrf_pre_output() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let pair = sr25519::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
let input = sr25519::vrf::VrfInput::new(
|
|
b"Test",
|
|
&[
|
|
(b"one", &1_u64.to_le_bytes()),
|
|
(b"two", &2_u64.to_le_bytes()),
|
|
(b"three", "test".as_bytes()),
|
|
],
|
|
);
|
|
|
|
let result = store.sr25519_vrf_pre_output(SR25519, &pair.public(), &input);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(SR25519, secret_uri, pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let pre_output =
|
|
store.sr25519_vrf_pre_output(SR25519, &pair.public(), &input).unwrap().unwrap();
|
|
|
|
let result = pre_output.make_bytes::<32>(b"rand", &input, &pair.public());
|
|
assert!(result.is_ok());
|
|
}
|
|
|
|
#[test]
|
|
fn ecdsa_sign_prehashed_works() {
|
|
let store = MemoryKeystore::new();
|
|
|
|
let suri = "//Alice";
|
|
let pair = ecdsa::Pair::from_string(suri, None).unwrap();
|
|
|
|
// Let's pretend this to be the hash output as content doesn't really matter here.
|
|
let hash = [0xff; 32];
|
|
|
|
// no key in key store
|
|
let res = store.ecdsa_sign_prehashed(ECDSA, &pair.public(), &hash).unwrap();
|
|
assert!(res.is_none());
|
|
|
|
// insert key, sign again
|
|
store.insert(ECDSA, suri, pair.public().as_ref()).unwrap();
|
|
|
|
let res = store.ecdsa_sign_prehashed(ECDSA, &pair.public(), &hash).unwrap();
|
|
assert!(res.is_some());
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(feature = "bls-experimental")]
|
|
fn ecdsa_bls377_sign_with_keccak_works() {
|
|
use sp_core::testing::ECDSA_BLS377;
|
|
|
|
let store = MemoryKeystore::new();
|
|
|
|
let suri = "//Alice";
|
|
let pair = ecdsa_bls377::Pair::from_string(suri, None).unwrap();
|
|
|
|
let msg = b"this should be a normal unhashed message not ";
|
|
|
|
// insert key, sign again
|
|
store.insert(ECDSA_BLS377, suri, pair.public().as_ref()).unwrap();
|
|
|
|
let res = store
|
|
.ecdsa_bls377_sign_with_keccak256(ECDSA_BLS377, &pair.public(), &msg[..])
|
|
.unwrap();
|
|
|
|
assert!(res.is_some());
|
|
|
|
// does not verify with default out-of-the-box verification
|
|
assert!(!ecdsa_bls377::Pair::verify(&res.unwrap(), &msg[..], &pair.public()));
|
|
|
|
// should verify using keccak256 as hasher
|
|
assert!(ecdsa_bls377::Pair::verify_with_hasher::<KeccakHasher>(
|
|
&res.unwrap(),
|
|
msg,
|
|
&pair.public()
|
|
));
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_vrf_sign() {
|
|
use sp_core::testing::BANDERSNATCH;
|
|
|
|
let store = MemoryKeystore::new();
|
|
|
|
let secret_uri = "//Alice";
|
|
let key_pair =
|
|
bandersnatch::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
|
|
let in1 = bandersnatch::vrf::VrfInput::new("in", "foo");
|
|
let sign_data =
|
|
bandersnatch::vrf::VrfSignData::new_unchecked(b"Test", Some("m1"), Some(in1));
|
|
|
|
let result = store.bandersnatch_vrf_sign(BANDERSNATCH, &key_pair.public(), &sign_data);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(BANDERSNATCH, secret_uri, key_pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let result = store.bandersnatch_vrf_sign(BANDERSNATCH, &key_pair.public(), &sign_data);
|
|
|
|
assert!(result.unwrap().is_some());
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(feature = "bandersnatch-experimental")]
|
|
fn bandersnatch_ring_vrf_sign() {
|
|
use sp_core::testing::BANDERSNATCH;
|
|
|
|
let store = MemoryKeystore::new();
|
|
|
|
let ring_ctx = bandersnatch::ring_vrf::RingContext::<1024>::new_testing();
|
|
|
|
let mut pks: Vec<_> = (0..16)
|
|
.map(|i| bandersnatch::Pair::from_seed(&[i as u8; 32]).public())
|
|
.collect();
|
|
|
|
let prover_idx = 3;
|
|
let prover = ring_ctx.prover(&pks, prover_idx).unwrap();
|
|
|
|
let secret_uri = "//Alice";
|
|
let pair = bandersnatch::Pair::from_string(secret_uri, None).expect("Generates key pair");
|
|
pks[prover_idx] = pair.public();
|
|
|
|
let in1 = bandersnatch::vrf::VrfInput::new("in1", "foo");
|
|
let sign_data =
|
|
bandersnatch::vrf::VrfSignData::new_unchecked(b"Test", &["m1", "m2"], [in1]);
|
|
|
|
let result =
|
|
store.bandersnatch_ring_vrf_sign(BANDERSNATCH, &pair.public(), &sign_data, &prover);
|
|
assert!(result.unwrap().is_none());
|
|
|
|
store
|
|
.insert(BANDERSNATCH, secret_uri, pair.public().as_ref())
|
|
.expect("Inserts unknown key");
|
|
|
|
let result =
|
|
store.bandersnatch_ring_vrf_sign(BANDERSNATCH, &pair.public(), &sign_data, &prover);
|
|
|
|
assert!(result.unwrap().is_some());
|
|
}
|
|
}
|