Cleanup util::privkey in preparation for PublicKey

- Rename privkey::PrivKey to privkey::PrivateKey
- Remove unnecessary methods for privkey::PrivateKey
- Modify tests to work with above changes
This commit is contained in:
Carl Dong 2018-11-15 13:28:37 -08:00
parent 1cd2782122
commit 60c93c387f
2 changed files with 21 additions and 73 deletions

View File

@ -76,6 +76,6 @@ pub use network::constants::Network;
pub use util::Error; pub use util::Error;
pub use util::address::Address; pub use util::address::Address;
pub use util::hash::BitcoinHash; pub use util::hash::BitcoinHash;
pub use util::privkey::Privkey; pub use util::privkey::PrivateKey;
pub use util::decimal::Decimal; pub use util::decimal::Decimal;
pub use util::decimal::UDecimal; pub use util::decimal::UDecimal;

View File

@ -20,14 +20,13 @@ use std::fmt::{self, Write};
use std::str::FromStr; use std::str::FromStr;
use secp256k1::{self, Secp256k1}; use secp256k1::{self, Secp256k1};
use secp256k1::key::{PublicKey, SecretKey}; use secp256k1::key::{PublicKey, SecretKey};
use util::address::Address;
use consensus::encode; use consensus::encode;
use network::constants::Network; use network::constants::Network;
use util::base58; use util::base58;
#[derive(Clone, PartialEq, Eq)] #[derive(Clone, PartialEq, Eq)]
/// A Bitcoin ECDSA private key /// A Bitcoin ECDSA private key
pub struct Privkey { pub struct PrivateKey {
/// Whether this private key represents a compressed address /// Whether this private key represents a compressed address
pub compressed: bool, pub compressed: bool,
/// The network on which this key should be used /// The network on which this key should be used
@ -36,63 +35,12 @@ pub struct Privkey {
pub key: SecretKey pub key: SecretKey
} }
impl Privkey { impl PrivateKey {
/// Creates a `Privkey` from a raw secp256k1 secret key
#[inline]
pub fn from_secret_key(key: SecretKey, compressed: bool, network: Network) -> Privkey {
Privkey {
compressed: compressed,
network: network,
key: key,
}
}
/// Computes the public key as supposed to be used with this secret /// Computes the public key as supposed to be used with this secret
pub fn public_key<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> PublicKey { pub fn public_key<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> PublicKey {
PublicKey::from_secret_key(secp, &self.key) PublicKey::from_secret_key(secp, &self.key)
} }
/// Converts a private key to a segwit address
#[inline]
pub fn to_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
Address::p2wpkh(&self.public_key(secp), self.network)
}
/// Converts a private key to a legacy (non-segwit) address
#[inline]
pub fn to_legacy_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
if self.compressed {
Address::p2pkh(&self.public_key(secp), self.network)
}
else {
Address::p2upkh(&self.public_key(secp), self.network)
}
}
/// Accessor for the underlying secp key
#[inline]
pub fn secret_key(&self) -> &SecretKey {
&self.key
}
/// Accessor for the underlying secp key that consumes the privkey
#[inline]
pub fn into_secret_key(self) -> SecretKey {
self.key
}
/// Accessor for the network type
#[inline]
pub fn network(&self) -> Network {
self.network
}
/// Accessor for the compressed flag
#[inline]
pub fn is_compressed(&self) -> bool {
self.compressed
}
/// Format the private key to WIF format. /// Format the private key to WIF format.
pub fn fmt_wif(&self, fmt: &mut fmt::Write) -> fmt::Result { pub fn fmt_wif(&self, fmt: &mut fmt::Write) -> fmt::Result {
let mut ret = [0; 34]; let mut ret = [0; 34];
@ -111,7 +59,6 @@ impl Privkey {
} }
/// Get WIF encoding of this private key. /// Get WIF encoding of this private key.
#[inline]
pub fn to_wif(&self) -> String { pub fn to_wif(&self) -> String {
let mut buf = String::new(); let mut buf = String::new();
buf.write_fmt(format_args!("{}", self)).unwrap(); buf.write_fmt(format_args!("{}", self)).unwrap();
@ -120,7 +67,7 @@ impl Privkey {
} }
/// Parse WIF encoded private key. /// Parse WIF encoded private key.
pub fn from_wif(wif: &str) -> Result<Privkey, encode::Error> { pub fn from_wif(wif: &str) -> Result<PrivateKey, encode::Error> {
let data = base58::from_check(wif)?; let data = base58::from_check(wif)?;
let compressed = match data.len() { let compressed = match data.len() {
@ -138,7 +85,7 @@ impl Privkey {
let key = SecretKey::from_slice(&data[1..33]) let key = SecretKey::from_slice(&data[1..33])
.map_err(|_| base58::Error::Other("Secret key out of range".to_owned()))?; .map_err(|_| base58::Error::Other("Secret key out of range".to_owned()))?;
Ok(Privkey { Ok(PrivateKey {
compressed: compressed, compressed: compressed,
network: network, network: network,
key: key key: key
@ -146,59 +93,60 @@ impl Privkey {
} }
} }
impl fmt::Display for Privkey { impl fmt::Display for PrivateKey {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
self.fmt_wif(f) self.fmt_wif(f)
} }
} }
impl fmt::Debug for Privkey { impl fmt::Debug for PrivateKey {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "[private key data]") write!(f, "[private key data]")
} }
} }
impl FromStr for Privkey { impl FromStr for PrivateKey {
type Err = encode::Error; type Err = encode::Error;
fn from_str(s: &str) -> Result<Privkey, encode::Error> { fn from_str(s: &str) -> Result<PrivateKey, encode::Error> {
Privkey::from_wif(s) PrivateKey::from_wif(s)
} }
} }
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::Privkey; use super::PrivateKey;
use secp256k1::Secp256k1; use secp256k1::Secp256k1;
use std::str::FromStr; use std::str::FromStr;
use network::constants::Network::Testnet; use network::constants::Network::Testnet;
use network::constants::Network::Bitcoin; use network::constants::Network::Bitcoin;
use util::address::Address;
#[test] #[test]
fn test_key_derivation() { fn test_key_derivation() {
// testnet compressed // testnet compressed
let sk = Privkey::from_wif("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap(); let sk = PrivateKey::from_wif("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
assert_eq!(sk.network(), Testnet); assert_eq!(sk.network, Testnet);
assert_eq!(sk.is_compressed(), true); assert_eq!(sk.compressed, true);
assert_eq!(&sk.to_wif(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy"); assert_eq!(&sk.to_wif(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
let secp = Secp256k1::new(); let secp = Secp256k1::new();
let pk = sk.to_legacy_address(&secp); let pk = Address::p2pkh(&sk.public_key(&secp), sk.network);
assert_eq!(&pk.to_string(), "mqwpxxvfv3QbM8PU8uBx2jaNt9btQqvQNx"); assert_eq!(&pk.to_string(), "mqwpxxvfv3QbM8PU8uBx2jaNt9btQqvQNx");
// test string conversion // test string conversion
assert_eq!(&sk.to_string(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy"); assert_eq!(&sk.to_string(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
let sk_str = let sk_str =
Privkey::from_str("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap(); PrivateKey::from_str("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
assert_eq!(&sk.to_wif(), &sk_str.to_wif()); assert_eq!(&sk.to_wif(), &sk_str.to_wif());
// mainnet uncompressed // mainnet uncompressed
let sk = Privkey::from_wif("5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3").unwrap(); let sk = PrivateKey::from_wif("5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3").unwrap();
assert_eq!(sk.network(), Bitcoin); assert_eq!(sk.network, Bitcoin);
assert_eq!(sk.is_compressed(), false); assert_eq!(sk.compressed, false);
assert_eq!(&sk.to_wif(), "5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3"); assert_eq!(&sk.to_wif(), "5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3");
let secp = Secp256k1::new(); let secp = Secp256k1::new();
let pk = sk.to_legacy_address(&secp); let pk = Address::p2upkh(&sk.public_key(&secp), sk.network);
assert_eq!(&pk.to_string(), "1GhQvF6dL8xa6wBxLnWmHcQsurx9RxiMc8"); assert_eq!(&pk.to_string(), "1GhQvF6dL8xa6wBxLnWmHcQsurx9RxiMc8");
} }
} }