lighthouse/beacon_chain/utils/bls/src/lib.rs

39 lines
1.3 KiB
Rust
Raw Normal View History

2018-09-23 10:19:30 +00:00
extern crate bls_aggregates;
extern crate hashing;
2018-09-23 10:19:30 +00:00
pub use self::bls_aggregates::AggregatePublicKey;
pub use self::bls_aggregates::AggregateSignature;
2018-09-23 10:19:30 +00:00
pub use self::bls_aggregates::Keypair;
pub use self::bls_aggregates::PublicKey;
pub use self::bls_aggregates::SecretKey;
pub use self::bls_aggregates::Signature;
2018-09-23 10:19:30 +00:00
2018-12-13 05:52:02 +00:00
use std::iter;
2018-09-23 10:19:30 +00:00
pub const BLS_AGG_SIG_BYTE_SIZE: usize = 97;
use hashing::canonical_hash;
2018-12-13 05:52:02 +00:00
fn extend_if_needed(hash: &mut Vec<u8>) {
// NOTE: bls_aggregates crate demands 48 bytes, this may be removed as we get closer to production
let hash_len = hash.len();
if hash_len < 48 {
let missing_len = 48 - hash_len;
hash.extend(iter::repeat(0x00).take(missing_len));
}
}
/// For some signature and public key, ensure that the signature message was the public key and it
/// was signed by the secret key that corresponds to that public key.
pub fn verify_proof_of_possession(sig: &Signature, pubkey: &PublicKey) -> bool {
2018-12-13 05:52:02 +00:00
let mut hash = canonical_hash(&pubkey.as_bytes());
extend_if_needed(&mut hash);
sig.verify_hashed(&hash, &pubkey)
}
pub fn create_proof_of_possession(keypair: &Keypair) -> Signature {
2018-12-13 05:52:02 +00:00
let mut hash = canonical_hash(&keypair.pk.as_bytes());
extend_if_needed(&mut hash);
Signature::new_hashed(&hash, &keypair.sk)
}