2019-03-29 00:47:22 +00:00
|
|
|
use super::{PublicKey, SecretKey, BLS_SIG_BYTE_SIZE};
|
2019-04-26 05:24:18 +00:00
|
|
|
use cached_tree_hash::cached_tree_hash_ssz_encoding_as_vector;
|
2019-03-21 23:08:40 +00:00
|
|
|
use hex::encode as hex_encode;
|
|
|
|
use serde::de::{Deserialize, Deserializer};
|
|
|
|
use serde::ser::{Serialize, Serializer};
|
2019-03-29 00:47:22 +00:00
|
|
|
use serde_hex::HexVisitor;
|
2019-05-06 09:50:05 +00:00
|
|
|
use ssz::{ssz_encode, Decodable, DecodeError, Encodable};
|
2019-04-17 01:57:57 +00:00
|
|
|
use tree_hash::tree_hash_ssz_encoding_as_vector;
|
2019-03-21 23:08:40 +00:00
|
|
|
|
|
|
|
/// A single BLS signature.
|
|
|
|
///
|
|
|
|
/// This struct is a wrapper upon a base type and provides helper functions (e.g., SSZ
|
|
|
|
/// serialization).
|
|
|
|
#[derive(Debug, PartialEq, Clone, Eq)]
|
|
|
|
pub struct FakeSignature {
|
|
|
|
bytes: Vec<u8>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl FakeSignature {
|
|
|
|
/// Creates a new all-zero's signature
|
|
|
|
pub fn new(_msg: &[u8], _domain: u64, _sk: &SecretKey) -> Self {
|
|
|
|
FakeSignature::zero()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Creates a new all-zero's signature
|
|
|
|
pub fn zero() -> Self {
|
|
|
|
Self {
|
2019-03-29 00:47:22 +00:00
|
|
|
bytes: vec![0; BLS_SIG_BYTE_SIZE],
|
2019-03-21 23:08:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Creates a new all-zero's signature
|
|
|
|
pub fn new_hashed(_x_real_hashed: &[u8], _x_imaginary_hashed: &[u8], _sk: &SecretKey) -> Self {
|
|
|
|
FakeSignature::zero()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// _Always_ returns `true`.
|
|
|
|
pub fn verify(&self, _msg: &[u8], _domain: u64, _pk: &PublicKey) -> bool {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
|
|
|
/// _Always_ returns true.
|
|
|
|
pub fn verify_hashed(
|
|
|
|
&self,
|
|
|
|
_x_real_hashed: &[u8],
|
|
|
|
_x_imaginary_hashed: &[u8],
|
|
|
|
_pk: &PublicKey,
|
|
|
|
) -> bool {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns a new empty signature.
|
|
|
|
pub fn empty_signature() -> Self {
|
|
|
|
FakeSignature::zero()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-06 05:03:20 +00:00
|
|
|
impl_ssz!(FakeSignature, BLS_SIG_BYTE_SIZE, "FakeSignature");
|
2019-03-21 23:08:40 +00:00
|
|
|
|
2019-04-17 01:57:57 +00:00
|
|
|
tree_hash_ssz_encoding_as_vector!(FakeSignature);
|
2019-04-26 05:24:18 +00:00
|
|
|
cached_tree_hash_ssz_encoding_as_vector!(FakeSignature, 96);
|
2019-03-21 23:08:40 +00:00
|
|
|
|
|
|
|
impl Serialize for FakeSignature {
|
|
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
|
|
where
|
|
|
|
S: Serializer,
|
|
|
|
{
|
|
|
|
serializer.serialize_str(&hex_encode(ssz_encode(self)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'de> Deserialize<'de> for FakeSignature {
|
|
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
|
|
where
|
|
|
|
D: Deserializer<'de>,
|
|
|
|
{
|
|
|
|
let bytes = deserializer.deserialize_str(HexVisitor)?;
|
|
|
|
let (pubkey, _) = <_>::ssz_decode(&bytes[..], 0)
|
|
|
|
.map_err(|e| serde::de::Error::custom(format!("invalid ssz ({:?})", e)))?;
|
|
|
|
Ok(pubkey)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::super::Keypair;
|
|
|
|
use super::*;
|
|
|
|
use ssz::ssz_encode;
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
pub fn test_ssz_round_trip() {
|
|
|
|
let keypair = Keypair::random();
|
|
|
|
|
|
|
|
let original = FakeSignature::new(&[42, 42], 0, &keypair.sk);
|
|
|
|
|
|
|
|
let bytes = ssz_encode(&original);
|
|
|
|
let (decoded, _) = FakeSignature::ssz_decode(&bytes, 0).unwrap();
|
|
|
|
|
|
|
|
assert_eq!(original, decoded);
|
|
|
|
}
|
|
|
|
}
|