Cleanup util::privkey in preparation for PublicKey
- Rename privkey::PrivKey to privkey::PrivateKey - Remove unnecessary methods for privkey::PrivateKey - Modify tests to work with above changes
This commit is contained in:
parent
1cd2782122
commit
60c93c387f
|
@ -76,6 +76,6 @@ pub use network::constants::Network;
|
||||||
pub use util::Error;
|
pub use util::Error;
|
||||||
pub use util::address::Address;
|
pub use util::address::Address;
|
||||||
pub use util::hash::BitcoinHash;
|
pub use util::hash::BitcoinHash;
|
||||||
pub use util::privkey::Privkey;
|
pub use util::privkey::PrivateKey;
|
||||||
pub use util::decimal::Decimal;
|
pub use util::decimal::Decimal;
|
||||||
pub use util::decimal::UDecimal;
|
pub use util::decimal::UDecimal;
|
||||||
|
|
|
@ -20,14 +20,13 @@ use std::fmt::{self, Write};
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
use secp256k1::{self, Secp256k1};
|
use secp256k1::{self, Secp256k1};
|
||||||
use secp256k1::key::{PublicKey, SecretKey};
|
use secp256k1::key::{PublicKey, SecretKey};
|
||||||
use util::address::Address;
|
|
||||||
use consensus::encode;
|
use consensus::encode;
|
||||||
use network::constants::Network;
|
use network::constants::Network;
|
||||||
use util::base58;
|
use util::base58;
|
||||||
|
|
||||||
#[derive(Clone, PartialEq, Eq)]
|
#[derive(Clone, PartialEq, Eq)]
|
||||||
/// A Bitcoin ECDSA private key
|
/// A Bitcoin ECDSA private key
|
||||||
pub struct Privkey {
|
pub struct PrivateKey {
|
||||||
/// Whether this private key represents a compressed address
|
/// Whether this private key represents a compressed address
|
||||||
pub compressed: bool,
|
pub compressed: bool,
|
||||||
/// The network on which this key should be used
|
/// The network on which this key should be used
|
||||||
|
@ -36,63 +35,12 @@ pub struct Privkey {
|
||||||
pub key: SecretKey
|
pub key: SecretKey
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Privkey {
|
impl PrivateKey {
|
||||||
/// Creates a `Privkey` from a raw secp256k1 secret key
|
|
||||||
#[inline]
|
|
||||||
pub fn from_secret_key(key: SecretKey, compressed: bool, network: Network) -> Privkey {
|
|
||||||
Privkey {
|
|
||||||
compressed: compressed,
|
|
||||||
network: network,
|
|
||||||
key: key,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Computes the public key as supposed to be used with this secret
|
/// Computes the public key as supposed to be used with this secret
|
||||||
pub fn public_key<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> PublicKey {
|
pub fn public_key<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> PublicKey {
|
||||||
PublicKey::from_secret_key(secp, &self.key)
|
PublicKey::from_secret_key(secp, &self.key)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Converts a private key to a segwit address
|
|
||||||
#[inline]
|
|
||||||
pub fn to_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
|
|
||||||
Address::p2wpkh(&self.public_key(secp), self.network)
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Converts a private key to a legacy (non-segwit) address
|
|
||||||
#[inline]
|
|
||||||
pub fn to_legacy_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
|
|
||||||
if self.compressed {
|
|
||||||
Address::p2pkh(&self.public_key(secp), self.network)
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Address::p2upkh(&self.public_key(secp), self.network)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Accessor for the underlying secp key
|
|
||||||
#[inline]
|
|
||||||
pub fn secret_key(&self) -> &SecretKey {
|
|
||||||
&self.key
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Accessor for the underlying secp key that consumes the privkey
|
|
||||||
#[inline]
|
|
||||||
pub fn into_secret_key(self) -> SecretKey {
|
|
||||||
self.key
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Accessor for the network type
|
|
||||||
#[inline]
|
|
||||||
pub fn network(&self) -> Network {
|
|
||||||
self.network
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Accessor for the compressed flag
|
|
||||||
#[inline]
|
|
||||||
pub fn is_compressed(&self) -> bool {
|
|
||||||
self.compressed
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Format the private key to WIF format.
|
/// Format the private key to WIF format.
|
||||||
pub fn fmt_wif(&self, fmt: &mut fmt::Write) -> fmt::Result {
|
pub fn fmt_wif(&self, fmt: &mut fmt::Write) -> fmt::Result {
|
||||||
let mut ret = [0; 34];
|
let mut ret = [0; 34];
|
||||||
|
@ -111,7 +59,6 @@ impl Privkey {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Get WIF encoding of this private key.
|
/// Get WIF encoding of this private key.
|
||||||
#[inline]
|
|
||||||
pub fn to_wif(&self) -> String {
|
pub fn to_wif(&self) -> String {
|
||||||
let mut buf = String::new();
|
let mut buf = String::new();
|
||||||
buf.write_fmt(format_args!("{}", self)).unwrap();
|
buf.write_fmt(format_args!("{}", self)).unwrap();
|
||||||
|
@ -120,7 +67,7 @@ impl Privkey {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Parse WIF encoded private key.
|
/// Parse WIF encoded private key.
|
||||||
pub fn from_wif(wif: &str) -> Result<Privkey, encode::Error> {
|
pub fn from_wif(wif: &str) -> Result<PrivateKey, encode::Error> {
|
||||||
let data = base58::from_check(wif)?;
|
let data = base58::from_check(wif)?;
|
||||||
|
|
||||||
let compressed = match data.len() {
|
let compressed = match data.len() {
|
||||||
|
@ -138,7 +85,7 @@ impl Privkey {
|
||||||
let key = SecretKey::from_slice(&data[1..33])
|
let key = SecretKey::from_slice(&data[1..33])
|
||||||
.map_err(|_| base58::Error::Other("Secret key out of range".to_owned()))?;
|
.map_err(|_| base58::Error::Other("Secret key out of range".to_owned()))?;
|
||||||
|
|
||||||
Ok(Privkey {
|
Ok(PrivateKey {
|
||||||
compressed: compressed,
|
compressed: compressed,
|
||||||
network: network,
|
network: network,
|
||||||
key: key
|
key: key
|
||||||
|
@ -146,59 +93,60 @@ impl Privkey {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl fmt::Display for Privkey {
|
impl fmt::Display for PrivateKey {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
self.fmt_wif(f)
|
self.fmt_wif(f)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl fmt::Debug for Privkey {
|
impl fmt::Debug for PrivateKey {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
write!(f, "[private key data]")
|
write!(f, "[private key data]")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl FromStr for Privkey {
|
impl FromStr for PrivateKey {
|
||||||
type Err = encode::Error;
|
type Err = encode::Error;
|
||||||
fn from_str(s: &str) -> Result<Privkey, encode::Error> {
|
fn from_str(s: &str) -> Result<PrivateKey, encode::Error> {
|
||||||
Privkey::from_wif(s)
|
PrivateKey::from_wif(s)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod tests {
|
mod tests {
|
||||||
use super::Privkey;
|
use super::PrivateKey;
|
||||||
use secp256k1::Secp256k1;
|
use secp256k1::Secp256k1;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
use network::constants::Network::Testnet;
|
use network::constants::Network::Testnet;
|
||||||
use network::constants::Network::Bitcoin;
|
use network::constants::Network::Bitcoin;
|
||||||
|
use util::address::Address;
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_key_derivation() {
|
fn test_key_derivation() {
|
||||||
// testnet compressed
|
// testnet compressed
|
||||||
let sk = Privkey::from_wif("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
|
let sk = PrivateKey::from_wif("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
|
||||||
assert_eq!(sk.network(), Testnet);
|
assert_eq!(sk.network, Testnet);
|
||||||
assert_eq!(sk.is_compressed(), true);
|
assert_eq!(sk.compressed, true);
|
||||||
assert_eq!(&sk.to_wif(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
|
assert_eq!(&sk.to_wif(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
|
||||||
|
|
||||||
let secp = Secp256k1::new();
|
let secp = Secp256k1::new();
|
||||||
let pk = sk.to_legacy_address(&secp);
|
let pk = Address::p2pkh(&sk.public_key(&secp), sk.network);
|
||||||
assert_eq!(&pk.to_string(), "mqwpxxvfv3QbM8PU8uBx2jaNt9btQqvQNx");
|
assert_eq!(&pk.to_string(), "mqwpxxvfv3QbM8PU8uBx2jaNt9btQqvQNx");
|
||||||
|
|
||||||
// test string conversion
|
// test string conversion
|
||||||
assert_eq!(&sk.to_string(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
|
assert_eq!(&sk.to_string(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
|
||||||
let sk_str =
|
let sk_str =
|
||||||
Privkey::from_str("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
|
PrivateKey::from_str("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
|
||||||
assert_eq!(&sk.to_wif(), &sk_str.to_wif());
|
assert_eq!(&sk.to_wif(), &sk_str.to_wif());
|
||||||
|
|
||||||
// mainnet uncompressed
|
// mainnet uncompressed
|
||||||
let sk = Privkey::from_wif("5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3").unwrap();
|
let sk = PrivateKey::from_wif("5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3").unwrap();
|
||||||
assert_eq!(sk.network(), Bitcoin);
|
assert_eq!(sk.network, Bitcoin);
|
||||||
assert_eq!(sk.is_compressed(), false);
|
assert_eq!(sk.compressed, false);
|
||||||
assert_eq!(&sk.to_wif(), "5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3");
|
assert_eq!(&sk.to_wif(), "5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3");
|
||||||
|
|
||||||
let secp = Secp256k1::new();
|
let secp = Secp256k1::new();
|
||||||
let pk = sk.to_legacy_address(&secp);
|
let pk = Address::p2upkh(&sk.public_key(&secp), sk.network);
|
||||||
assert_eq!(&pk.to_string(), "1GhQvF6dL8xa6wBxLnWmHcQsurx9RxiMc8");
|
assert_eq!(&pk.to_string(), "1GhQvF6dL8xa6wBxLnWmHcQsurx9RxiMc8");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue