1#![cfg(feature = "full")]
3
4pub use crate::signer::{keypair::*, null_signer::*, presigner::*, *};
6use {
7 crate::pubkey::Pubkey,
8 generic_array::{typenum::U64, GenericArray},
9 std::{
10 borrow::{Borrow, Cow},
11 convert::TryInto,
12 fmt, mem,
13 str::FromStr,
14 },
15 thiserror::Error,
16};
17
18pub const SIGNATURE_BYTES: usize = 64;
20const MAX_BASE58_SIGNATURE_LEN: usize = 88;
22
23#[repr(transparent)]
24#[derive(
25 Serialize, Deserialize, Clone, Copy, Default, Eq, PartialEq, Ord, PartialOrd, Hash, AbiExample,
26)]
27pub struct Signature(GenericArray<u8, U64>);
28
29impl crate::sanitize::Sanitize for Signature {}
30
31impl Signature {
32 pub fn new(signature_slice: &[u8]) -> Self {
33 Self(GenericArray::clone_from_slice(signature_slice))
34 }
35
36 pub fn new_unique() -> Self {
37 let random_bytes: Vec<u8> = (0..64).map(|_| rand::random::<u8>()).collect();
38 Self::new(&random_bytes)
39 }
40
41 pub(self) fn verify_verbose(
42 &self,
43 pubkey_bytes: &[u8],
44 message_bytes: &[u8],
45 ) -> Result<(), ed25519_dalek::SignatureError> {
46 let publickey = ed25519_dalek::PublicKey::from_bytes(pubkey_bytes)?;
47 let signature = self.0.as_slice().try_into()?;
48 publickey.verify_strict(message_bytes, &signature)
49 }
50
51 pub fn verify(&self, pubkey_bytes: &[u8], message_bytes: &[u8]) -> bool {
52 self.verify_verbose(pubkey_bytes, message_bytes).is_ok()
53 }
54}
55
56pub trait Signable {
57 fn sign(&mut self, keypair: &Keypair) {
58 let signature = keypair.sign_message(self.signable_data().borrow());
59 self.set_signature(signature);
60 }
61 fn verify(&self) -> bool {
62 self.get_signature()
63 .verify(self.pubkey().as_ref(), self.signable_data().borrow())
64 }
65
66 fn pubkey(&self) -> Pubkey;
67 fn signable_data(&self) -> Cow<[u8]>;
68 fn get_signature(&self) -> Signature;
69 fn set_signature(&mut self, signature: Signature);
70}
71
72impl AsRef<[u8]> for Signature {
73 fn as_ref(&self) -> &[u8] {
74 &self.0[..]
75 }
76}
77
78impl fmt::Debug for Signature {
79 fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
80 write!(f, "{}", bs58::encode(self.0).into_string())
81 }
82}
83
84impl fmt::Display for Signature {
85 fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
86 write!(f, "{}", bs58::encode(self.0).into_string())
87 }
88}
89
90impl From<Signature> for [u8; 64] {
91 fn from(signature: Signature) -> Self {
92 signature.0.into()
93 }
94}
95
96#[derive(Debug, Clone, PartialEq, Eq, Error)]
97pub enum ParseSignatureError {
98 #[error("string decoded to wrong size for signature")]
99 WrongSize,
100 #[error("failed to decode string to signature")]
101 Invalid,
102}
103
104impl FromStr for Signature {
105 type Err = ParseSignatureError;
106
107 fn from_str(s: &str) -> Result<Self, Self::Err> {
108 if s.len() > MAX_BASE58_SIGNATURE_LEN {
109 return Err(ParseSignatureError::WrongSize);
110 }
111 let bytes = bs58::decode(s)
112 .into_vec()
113 .map_err(|_| ParseSignatureError::Invalid)?;
114 if bytes.len() != mem::size_of::<Signature>() {
115 Err(ParseSignatureError::WrongSize)
116 } else {
117 Ok(Signature::new(&bytes))
118 }
119 }
120}
121
122#[cfg(test)]
123mod tests {
124 use super::*;
125 #[test]
126 fn test_signature_fromstr() {
127 let signature = Keypair::new().sign_message(&[0u8]);
128
129 let mut signature_base58_str = bs58::encode(signature).into_string();
130
131 assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
132
133 signature_base58_str.push_str(&bs58::encode(signature.0).into_string());
134 assert_eq!(
135 signature_base58_str.parse::<Signature>(),
136 Err(ParseSignatureError::WrongSize)
137 );
138
139 signature_base58_str.truncate(signature_base58_str.len() / 2);
140 assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
141
142 signature_base58_str.truncate(signature_base58_str.len() / 2);
143 assert_eq!(
144 signature_base58_str.parse::<Signature>(),
145 Err(ParseSignatureError::WrongSize)
146 );
147
148 let mut signature_base58_str = bs58::encode(signature.0).into_string();
149 assert_eq!(signature_base58_str.parse::<Signature>(), Ok(signature));
150
151 signature_base58_str.replace_range(..1, "I");
153 assert_eq!(
154 signature_base58_str.parse::<Signature>(),
155 Err(ParseSignatureError::Invalid)
156 );
157
158 let mut too_long = bs58::encode(&[255u8; SIGNATURE_BYTES]).into_string();
161 too_long.push('1');
163 assert_eq!(
164 too_long.parse::<Signature>(),
165 Err(ParseSignatureError::WrongSize)
166 );
167 }
168
169 #[test]
170 fn test_off_curve_pubkey_verify_fails() {
171 let off_curve_bytes = bs58::decode("9z5nJyQar1FUxVJxpBXzon6kHehbomeYiDaLi9WAMhCq")
173 .into_vec()
174 .unwrap();
175
176 let mut off_curve_bits = [0u8; 32];
178 off_curve_bits.copy_from_slice(&off_curve_bytes);
179 let off_curve_point = curve25519_dalek::edwards::CompressedEdwardsY(off_curve_bits);
180 assert_eq!(off_curve_point.decompress(), None);
181
182 let pubkey = Pubkey::try_from(off_curve_bytes).unwrap();
183 let signature = Signature::default();
184 assert!(signature.verify_verbose(pubkey.as_ref(), &[0u8]).is_err());
188 }
189}