1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
//! `secp256k1` wrapper

use ckb_fixed_hash::H256;
use lazy_static::lazy_static;

/// A (hashed) message input to an ECDSA signature
pub type Message = H256;

lazy_static! {
    /// The reference to lazily-initialized static secp256k1 engine, used to execute all signature operations
    pub static ref SECP256K1: secp256k1::Secp256k1<secp256k1::All> = secp256k1::Secp256k1::new();
}

mod error;
mod generator;
mod privkey;
mod pubkey;
mod signature;

pub use self::error::Error;
pub use self::generator::Generator;
pub use self::privkey::Privkey;
pub use self::pubkey::Pubkey;
pub use self::signature::Signature;

#[cfg(test)]
mod tests {
    use super::*;
    use rand::{self, Rng};

    fn random_message() -> Message {
        let mut message = Message::default();
        let mut rng = rand::thread_rng();
        rng.fill(message.as_mut());
        message
    }

    #[test]
    fn test_gen_keypair() {
        let (privkey, pubkey) = Generator::random_keypair();
        assert_eq!(privkey.pubkey().expect("pubkey"), pubkey);
    }

    #[test]
    fn test_sign_verify() {
        let (privkey, pubkey) = Generator::random_keypair();
        let message = random_message();
        let signature = privkey.sign_recoverable(&message).unwrap();
        assert!(signature.is_valid());
        assert!(pubkey.verify(&message, &signature).is_ok());
    }

    #[test]
    fn test_recover() {
        let (privkey, pubkey) = Generator::random_keypair();
        let message = random_message();
        let signature = privkey.sign_recoverable(&message).unwrap();
        assert_eq!(pubkey, signature.recover(&message).unwrap());
    }

    #[test]
    fn test_serialize() {
        let (privkey, pubkey) = Generator::random_keypair();
        let ser_pubkey = privkey.pubkey().expect("pubkey").serialize();
        assert_eq!(ser_pubkey.len(), 33);
        let deser_pubkey = Pubkey::from_slice(&ser_pubkey).expect("deserialize pubkey");
        assert_eq!(deser_pubkey, pubkey);

        let msg = random_message();
        let signature = privkey.sign_recoverable(&msg).expect("sign");
        let ser_signature = signature.serialize();
        assert_eq!(ser_signature.len(), 65);
        let deser_signature = Signature::from_slice(&ser_signature).expect("deserialize");
        assert!(deser_signature.is_valid());
        assert_eq!(ser_signature, deser_signature.serialize());
    }

    #[test]
    fn privkey_zeroize() {
        let (mut privkey, _) = Generator::random_keypair();
        privkey.zeroize();
        assert!(privkey == Privkey::from_slice([0u8; 32].as_ref()));
    }
}