From 18e2854a42e829319490d929f95349a0922492cf Mon Sep 17 00:00:00 2001 From: junderw Date: Sun, 27 Aug 2023 17:02:58 -0700 Subject: [PATCH] Update base64 usage to 0.21.3 --- Cargo-minimal.lock | 4 +-- Cargo-recent.lock | 4 +-- bitcoin/Cargo.toml | 2 +- bitcoin/src/psbt/mod.rs | 5 +-- bitcoin/src/sign_message.rs | 65 +++++++++++++++++++------------------ 5 files changed, 42 insertions(+), 38 deletions(-) diff --git a/Cargo-minimal.lock b/Cargo-minimal.lock index 2994ad2f..cbf61238 100644 --- a/Cargo-minimal.lock +++ b/Cargo-minimal.lock @@ -10,9 +10,9 @@ checksum = "08f9b8508dccb7687a1d6c4ce66b2b0ecef467c94667de27d8d7fe1f8d2a9cdc" [[package]] name = "base64" -version = "0.13.0" +version = "0.21.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "904dfeac50f3cdaba28fc6f57fdcddb75f49ed61346676a78c4ffe55877802fd" +checksum = "414dcefbc63d77c526a76b3afcf6fbb9b5e2791c19c3aa2297733208750c6e53" [[package]] name = "bech32" diff --git a/Cargo-recent.lock b/Cargo-recent.lock index 8cced221..35a7086a 100644 --- a/Cargo-recent.lock +++ b/Cargo-recent.lock @@ -10,9 +10,9 @@ checksum = "9c7d0618f0e0b7e8ff11427422b64564d5fb0be1940354bfe2e0529b18a9d9b8" [[package]] name = "base64" -version = "0.13.1" +version = "0.21.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8" +checksum = "414dcefbc63d77c526a76b3afcf6fbb9b5e2791c19c3aa2297733208750c6e53" [[package]] name = "bech32" diff --git a/bitcoin/Cargo.toml b/bitcoin/Cargo.toml index c928b6b0..b54524e8 100644 --- a/bitcoin/Cargo.toml +++ b/bitcoin/Cargo.toml @@ -41,7 +41,7 @@ hashes = { package = "bitcoin_hashes", version = "0.13.0", default-features = fa secp256k1 = { version = "0.27.0", default-features = false, features = ["bitcoin_hashes"] } hex_lit = "0.1.1" -base64 = { version = "0.13.0", optional = true } +base64 = { version = "0.21.3", optional = true } # Only use this feature for no-std builds, otherwise use bitcoinconsensus-std. bitcoinconsensus = { version = "0.20.2-0.5.0", default-features = false, optional = true } diff --git a/bitcoin/src/psbt/mod.rs b/bitcoin/src/psbt/mod.rs index 4683dc5a..0dcd4b51 100644 --- a/bitcoin/src/psbt/mod.rs +++ b/bitcoin/src/psbt/mod.rs @@ -818,6 +818,7 @@ mod display_from_str { use core::str::FromStr; use base64::display::Base64Display; + use base64::prelude::{Engine as _, BASE64_STANDARD}; use internals::write_err; use super::{Error, Psbt}; @@ -857,7 +858,7 @@ mod display_from_str { impl Display for Psbt { fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result { - write!(f, "{}", Base64Display::with_config(&self.serialize(), base64::STANDARD)) + write!(f, "{}", Base64Display::new(&self.serialize(), &BASE64_STANDARD)) } } @@ -865,7 +866,7 @@ mod display_from_str { type Err = PsbtParseError; fn from_str(s: &str) -> Result { - let data = base64::decode(s).map_err(PsbtParseError::Base64Encoding)?; + let data = BASE64_STANDARD.decode(s).map_err(PsbtParseError::Base64Encoding)?; Psbt::deserialize(&data).map_err(PsbtParseError::PsbtEncoding) } } diff --git a/bitcoin/src/sign_message.rs b/bitcoin/src/sign_message.rs index bb9d47b7..80cdb7a6 100644 --- a/bitcoin/src/sign_message.rs +++ b/bitcoin/src/sign_message.rs @@ -26,8 +26,6 @@ mod message_signing { use crate::address::{Address, AddressType}; use crate::crypto::key::PublicKey; - #[cfg(feature = "base64")] - use crate::prelude::*; /// An error used for dealing with Bitcoin Signed Messages. #[derive(Debug, Clone, PartialEq, Eq)] @@ -159,37 +157,40 @@ mod message_signing { None => Ok(false), } } - - /// Convert a signature from base64 encoding. - #[cfg(feature = "base64")] - pub fn from_base64(s: &str) -> Result { - let bytes = base64::decode(s).map_err(|_| MessageSignatureError::InvalidBase64)?; - MessageSignature::from_slice(&bytes) - } - - /// Convert to base64 encoding. - #[cfg(feature = "base64")] - pub fn to_base64(self) -> String { base64::encode(&self.serialize()[..]) } } #[cfg(feature = "base64")] - impl fmt::Display for MessageSignature { - fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { - let bytes = self.serialize(); - // This avoids the allocation of a String. - write!( - f, - "{}", - base64::display::Base64Display::with_config(&bytes[..], base64::STANDARD) - ) - } - } + mod base64_impls { + use base64::prelude::{Engine as _, BASE64_STANDARD}; - #[cfg(feature = "base64")] - impl core::str::FromStr for MessageSignature { - type Err = MessageSignatureError; - fn from_str(s: &str) -> Result { - MessageSignature::from_base64(s) + use super::*; + use crate::prelude::String; + + impl MessageSignature { + /// Convert a signature from base64 encoding. + pub fn from_base64(s: &str) -> Result { + let bytes = + BASE64_STANDARD.decode(s).map_err(|_| MessageSignatureError::InvalidBase64)?; + MessageSignature::from_slice(&bytes) + } + + /// Convert to base64 encoding. + pub fn to_base64(self) -> String { BASE64_STANDARD.encode(self.serialize()) } + } + + impl fmt::Display for MessageSignature { + fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { + let bytes = self.serialize(); + // This avoids the allocation of a String. + write!(f, "{}", base64::display::Base64Display::new(&bytes, &BASE64_STANDARD)) + } + } + + impl core::str::FromStr for MessageSignature { + type Err = MessageSignatureError; + fn from_str(s: &str) -> Result { + MessageSignature::from_base64(s) + } } } } @@ -260,6 +261,7 @@ mod tests { #[test] #[cfg(all(feature = "secp-recovery", feature = "base64"))] fn test_incorrect_message_signature() { + use base64::prelude::{Engine as _, BASE64_STANDARD}; use secp256k1; use crate::crypto::key::PublicKey; @@ -276,8 +278,9 @@ mod tests { let signature = super::MessageSignature::from_base64(signature_base64).expect("message signature"); - let pubkey = PublicKey::from_slice(&base64::decode(pubkey_base64).expect("base64 string")) - .expect("pubkey slice"); + let pubkey = + PublicKey::from_slice(&BASE64_STANDARD.decode(pubkey_base64).expect("base64 string")) + .expect("pubkey slice"); let p2pkh = Address::p2pkh(&pubkey, Network::Bitcoin); assert_eq!(signature.is_signed_by_address(&secp, &p2pkh, msg_hash), Ok(false));