Update secp256k1 to edition 2018 and fix imports
This commit is contained in:
parent
67c0922a46
commit
626835f540
|
@ -10,7 +10,7 @@ documentation = "https://docs.rs/secp256k1/"
|
|||
description = "Rust wrapper library for Pieter Wuille's `libsecp256k1`. Implements ECDSA and BIP 340 signatures for the SECG elliptic curve group secp256k1 and related utilities."
|
||||
keywords = [ "crypto", "ECDSA", "secp256k1", "libsecp256k1", "bitcoin" ]
|
||||
readme = "README.md"
|
||||
autoexamples = false # Remove when edition 2018 https://github.com/rust-lang/cargo/issues/5330
|
||||
edition = "2018"
|
||||
|
||||
# Should make docs.rs show all functions, even those behind non-default features
|
||||
[package.metadata.docs.rs]
|
||||
|
|
|
@ -1 +1 @@
|
|||
msrv = "1.29"
|
||||
msrv = "1.41.1"
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
use core::marker::PhantomData;
|
||||
use core::mem::ManuallyDrop;
|
||||
use ffi::{self, CPtr, types::AlignedType};
|
||||
use ffi::types::{c_uint, c_void};
|
||||
use Error;
|
||||
use Secp256k1;
|
||||
|
||||
use crate::{Error, Secp256k1};
|
||||
use crate::ffi::{self, CPtr, types::AlignedType};
|
||||
use crate::ffi::types::{c_uint, c_void};
|
||||
|
||||
#[cfg(any(feature = "std", feature = "alloc"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
||||
|
@ -13,12 +13,11 @@ pub use self::alloc_only::*;
|
|||
#[cfg_attr(docsrs, doc(cfg(all(feature = "global-context", feature = "std"))))]
|
||||
/// Module implementing a singleton pattern for a global `Secp256k1` context.
|
||||
pub mod global {
|
||||
#[cfg(feature = "rand-std")]
|
||||
use rand;
|
||||
|
||||
use std::ops::Deref;
|
||||
use std::sync::Once;
|
||||
use {Secp256k1, All};
|
||||
|
||||
use crate::{All, Secp256k1};
|
||||
|
||||
/// Proxy struct for global `SECP256K1` context.
|
||||
#[derive(Debug, Copy, Clone)]
|
||||
|
@ -107,10 +106,16 @@ mod private {
|
|||
#[cfg(any(feature = "std", feature = "alloc"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
||||
mod alloc_only {
|
||||
#[cfg(feature = "std")]
|
||||
use std::alloc;
|
||||
#[cfg(not(feature = "std"))]
|
||||
use alloc::alloc;
|
||||
#[cfg(feature = "std")]
|
||||
use std::alloc;
|
||||
|
||||
use core::marker::PhantomData;
|
||||
|
||||
use super::private;
|
||||
use crate::ffi::{self, types::{c_uint, c_void}};
|
||||
use crate::{Secp256k1, Signing, Verification, Context, AlignedType};
|
||||
|
||||
#[cfg(feature = "rand-std")]
|
||||
use rand;
|
||||
|
@ -119,8 +124,7 @@ mod alloc_only {
|
|||
impl private::Sealed for All {}
|
||||
impl private::Sealed for VerifyOnly {}
|
||||
|
||||
use super::*;
|
||||
const ALIGN_TO: usize = ::core::mem::align_of::<AlignedType>();
|
||||
const ALIGN_TO: usize = core::mem::align_of::<AlignedType>();
|
||||
|
||||
/// Represents the set of capabilities needed for signing.
|
||||
#[cfg_attr(docsrs, doc(cfg(any(feature = "std", feature = "alloc"))))]
|
||||
|
|
30
src/ecdh.rs
30
src/ecdh.rs
|
@ -15,14 +15,11 @@
|
|||
//! Support for shared secret computations.
|
||||
//!
|
||||
|
||||
use core::{ptr, str};
|
||||
use core::borrow::Borrow;
|
||||
use core::{borrow::Borrow, ptr, str};
|
||||
|
||||
use {Error, from_hex};
|
||||
use key::{SecretKey, PublicKey};
|
||||
use ffi::{self, CPtr};
|
||||
use secp256k1_sys::types::{c_int, c_uchar, c_void};
|
||||
use constants;
|
||||
|
||||
use crate::{constants, Error, ffi::{self, CPtr}, key::{PublicKey, SecretKey}};
|
||||
|
||||
// The logic for displaying shared secrets relies on this (see `secret.rs`).
|
||||
const SHARED_SECRET_SIZE: usize = constants::SECRET_KEY_SIZE;
|
||||
|
@ -97,7 +94,7 @@ impl str::FromStr for SharedSecret {
|
|||
type Err = Error;
|
||||
fn from_str(s: &str) -> Result<SharedSecret, Error> {
|
||||
let mut res = [0u8; SHARED_SECRET_SIZE];
|
||||
match from_hex(s, &mut res) {
|
||||
match crate::from_hex(s, &mut res) {
|
||||
Ok(SHARED_SECRET_SIZE) => Ok(SharedSecret::from_bytes(res)),
|
||||
_ => Err(Error::InvalidSharedSecret)
|
||||
}
|
||||
|
@ -177,7 +174,7 @@ impl ::serde::Serialize for SharedSecret {
|
|||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
let mut buf = [0u8; SHARED_SECRET_SIZE * 2];
|
||||
s.serialize_str(::to_hex(&self.0, &mut buf).expect("fixed-size hex serialization"))
|
||||
s.serialize_str(crate::to_hex(&self.0, &mut buf).expect("fixed-size hex serialization"))
|
||||
} else {
|
||||
s.serialize_bytes(&self.as_ref()[..])
|
||||
}
|
||||
|
@ -204,13 +201,13 @@ impl<'de> ::serde::Deserialize<'de> for SharedSecret {
|
|||
#[cfg(test)]
|
||||
#[allow(unused_imports)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
use rand::thread_rng;
|
||||
use super::super::Secp256k1;
|
||||
|
||||
#[cfg(target_arch = "wasm32")]
|
||||
use wasm_bindgen_test::wasm_bindgen_test as test;
|
||||
|
||||
use crate::Secp256k1;
|
||||
use super::SharedSecret;
|
||||
|
||||
#[test]
|
||||
#[cfg(all(feature="rand-std", any(feature = "alloc", feature = "std")))]
|
||||
fn ecdh() {
|
||||
|
@ -230,7 +227,7 @@ mod tests {
|
|||
let x = [5u8; 32];
|
||||
let y = [7u8; 32];
|
||||
let mut output = [0u8; 64];
|
||||
let res = unsafe { super::c_callback(output.as_mut_ptr(), x.as_ptr(), y.as_ptr(), ptr::null_mut()) };
|
||||
let res = unsafe { super::c_callback(output.as_mut_ptr(), x.as_ptr(), y.as_ptr(), core::ptr::null_mut()) };
|
||||
assert_eq!(res, 1);
|
||||
let mut new_x = [0u8; 32];
|
||||
let mut new_y = [0u8; 32];
|
||||
|
@ -244,7 +241,8 @@ mod tests {
|
|||
#[cfg(not(fuzzing))]
|
||||
#[cfg(all(feature="rand-std", feature = "std", feature = "bitcoin_hashes"))]
|
||||
fn bitcoin_hashes_and_sys_generate_same_secret() {
|
||||
use hashes::{sha256, Hash, HashEngine};
|
||||
use bitcoin_hashes::{sha256, Hash, HashEngine};
|
||||
use crate::ecdh::shared_secret_point;
|
||||
|
||||
let s = Secp256k1::signing_only();
|
||||
let (sk1, _) = s.generate_keypair(&mut thread_rng());
|
||||
|
@ -292,11 +290,13 @@ mod tests {
|
|||
|
||||
#[cfg(all(test, feature = "unstable"))]
|
||||
mod benches {
|
||||
use rand::thread_rng;
|
||||
use test::{Bencher, black_box};
|
||||
|
||||
use rand::thread_rng;
|
||||
|
||||
use crate::Secp256k1;
|
||||
|
||||
use super::SharedSecret;
|
||||
use super::super::Secp256k1;
|
||||
|
||||
#[bench]
|
||||
pub fn bench_ecdh(bh: &mut Bencher) {
|
||||
|
|
|
@ -2,8 +2,8 @@
|
|||
|
||||
use core::{fmt, str, ops, ptr, mem};
|
||||
|
||||
use {Signing, Verification, Message, PublicKey, Secp256k1, SecretKey, from_hex, Error, ffi};
|
||||
use ffi::CPtr;
|
||||
use crate::{Signing, Verification, Message, PublicKey, Secp256k1, SecretKey, from_hex, Error, ffi};
|
||||
use crate::ffi::CPtr;
|
||||
|
||||
#[cfg(feature = "recovery")]
|
||||
mod recovery;
|
||||
|
@ -13,7 +13,7 @@ mod recovery;
|
|||
pub use self::recovery::{RecoveryId, RecoverableSignature};
|
||||
|
||||
#[cfg(feature = "global-context")]
|
||||
use SECP256K1;
|
||||
use crate::SECP256K1;
|
||||
|
||||
/// An ECDSA signature
|
||||
#[derive(Copy, Clone, PartialEq, Eq)]
|
||||
|
@ -304,8 +304,8 @@ impl From<ffi::Signature> for Signature {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for Signature {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for Signature {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
s.collect_str(self)
|
||||
} else {
|
||||
|
@ -316,14 +316,14 @@ impl ::serde::Serialize for Signature {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for Signature {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for Signature {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(::serde_util::FromStrVisitor::new(
|
||||
d.deserialize_str(crate::serde_util::FromStrVisitor::new(
|
||||
"a hex string representing a DER encoded Signature"
|
||||
))
|
||||
} else {
|
||||
d.deserialize_bytes(::serde_util::BytesVisitor::new(
|
||||
d.deserialize_bytes(crate::serde_util::BytesVisitor::new(
|
||||
"raw byte stream, that represents a DER encoded Signature",
|
||||
Signature::from_der
|
||||
))
|
||||
|
|
|
@ -18,12 +18,10 @@
|
|||
//!
|
||||
|
||||
use core::ptr;
|
||||
use key;
|
||||
use crate::{key, Secp256k1, Message, Error, Verification, Signing, ecdsa::Signature};
|
||||
use super::ffi as super_ffi;
|
||||
use self::super_ffi::CPtr;
|
||||
use ffi::recovery as ffi;
|
||||
use super::*;
|
||||
use {Verification, Secp256k1, Signing, Message};
|
||||
use crate::ffi::recovery as ffi;
|
||||
|
||||
/// A tag used for recovering the public key from a compact signature.
|
||||
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
||||
|
@ -127,7 +125,7 @@ impl RecoverableSignature {
|
|||
#[cfg(feature = "global-context")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "global-context")))]
|
||||
pub fn recover(&self, msg: &Message) -> Result<key::PublicKey, Error> {
|
||||
SECP256K1.recover_ecdsa(msg, self)
|
||||
crate::SECP256K1.recover_ecdsa(msg, self)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -235,9 +233,10 @@ impl<C: Verification> Secp256k1<C> {
|
|||
#[cfg(test)]
|
||||
#[allow(unused_imports)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
use rand::{RngCore, thread_rng};
|
||||
use key::SecretKey;
|
||||
|
||||
use crate::{Error, SecretKey, Secp256k1, Message};
|
||||
use super::{RecoveryId, RecoverableSignature};
|
||||
|
||||
#[cfg(target_arch = "wasm32")]
|
||||
use wasm_bindgen_test::wasm_bindgen_test as test;
|
||||
|
|
101
src/key.rs
101
src/key.rs
|
@ -16,22 +16,18 @@
|
|||
//! Public and secret keys.
|
||||
//!
|
||||
|
||||
#[cfg(any(test, feature = "rand"))] use rand::Rng;
|
||||
|
||||
use core::{fmt, ptr, str};
|
||||
use core::ops::BitXor;
|
||||
|
||||
use super::{from_hex, Secp256k1};
|
||||
use super::Error::{self, InvalidPublicKey, InvalidPublicKeySum, InvalidSecretKey};
|
||||
use ::{Signing};
|
||||
use Verification;
|
||||
use constants;
|
||||
use ffi::{self, CPtr};
|
||||
use crate::{constants, from_hex, Secp256k1, Signing, Verification};
|
||||
use crate::Error::{self, InvalidPublicKey, InvalidPublicKeySum, InvalidSecretKey};
|
||||
use crate::ffi::{self, CPtr, impl_array_newtype};
|
||||
|
||||
#[cfg(feature = "global-context")]
|
||||
use {Message, ecdsa, SECP256K1};
|
||||
use crate::{Message, ecdsa, SECP256K1};
|
||||
#[cfg(all(feature = "global-context", feature = "rand-std"))]
|
||||
use schnorr;
|
||||
use crate::schnorr;
|
||||
|
||||
/// Secret 256-bit key used as `x` in an ECDSA signature.
|
||||
///
|
||||
|
@ -122,7 +118,7 @@ impl str::FromStr for PublicKey {
|
|||
}
|
||||
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
fn random_32_bytes<R: Rng + ?Sized>(rng: &mut R) -> [u8; 32] {
|
||||
fn random_32_bytes<R: rand::Rng + ?Sized>(rng: &mut R) -> [u8; 32] {
|
||||
let mut ret = [0u8; 32];
|
||||
rng.fill_bytes(&mut ret);
|
||||
ret
|
||||
|
@ -142,7 +138,7 @@ impl SecretKey {
|
|||
#[inline]
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub fn new<R: Rng + ?Sized>(rng: &mut R) -> SecretKey {
|
||||
pub fn new<R: rand::Rng + ?Sized>(rng: &mut R) -> SecretKey {
|
||||
let mut data = random_32_bytes(rng);
|
||||
unsafe {
|
||||
while ffi::secp256k1_ec_seckey_verify(
|
||||
|
@ -321,11 +317,11 @@ impl SecretKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for SecretKey {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for SecretKey {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
let mut buf = [0u8; constants::SECRET_KEY_SIZE * 2];
|
||||
s.serialize_str(::to_hex(&self.0, &mut buf).expect("fixed-size hex serialization"))
|
||||
s.serialize_str(crate::to_hex(&self.0, &mut buf).expect("fixed-size hex serialization"))
|
||||
} else {
|
||||
s.serialize_bytes(&self[..])
|
||||
}
|
||||
|
@ -334,8 +330,8 @@ impl ::serde::Serialize for SecretKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for SecretKey {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for SecretKey {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(super::serde_util::FromStrVisitor::new(
|
||||
"a hex string representing 32 byte SecretKey"
|
||||
|
@ -671,8 +667,8 @@ impl From<ffi::PublicKey> for PublicKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for PublicKey {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for PublicKey {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
s.collect_str(self)
|
||||
} else {
|
||||
|
@ -683,8 +679,8 @@ impl ::serde::Serialize for PublicKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for PublicKey {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<PublicKey, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for PublicKey {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<PublicKey, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(super::serde_util::FromStrVisitor::new(
|
||||
"an ASCII hex string representing a public key"
|
||||
|
@ -699,13 +695,13 @@ impl<'de> ::serde::Deserialize<'de> for PublicKey {
|
|||
}
|
||||
|
||||
impl PartialOrd for PublicKey {
|
||||
fn partial_cmp(&self, other: &PublicKey) -> Option<::core::cmp::Ordering> {
|
||||
fn partial_cmp(&self, other: &PublicKey) -> Option<core::cmp::Ordering> {
|
||||
self.serialize().partial_cmp(&other.serialize())
|
||||
}
|
||||
}
|
||||
|
||||
impl Ord for PublicKey {
|
||||
fn cmp(&self, other: &PublicKey) -> ::core::cmp::Ordering {
|
||||
fn cmp(&self, other: &PublicKey) -> core::cmp::Ordering {
|
||||
self.serialize().cmp(&other.serialize())
|
||||
}
|
||||
}
|
||||
|
@ -837,7 +833,7 @@ impl KeyPair {
|
|||
#[inline]
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub fn new<R: ::rand::Rng + ?Sized, C: Signing>(secp: &Secp256k1<C>, rng: &mut R) -> KeyPair {
|
||||
pub fn new<R: rand::Rng + ?Sized, C: Signing>(secp: &Secp256k1<C>, rng: &mut R) -> KeyPair {
|
||||
let mut random_32_bytes = || {
|
||||
let mut ret = [0u8; 32];
|
||||
rng.fill_bytes(&mut ret);
|
||||
|
@ -992,11 +988,11 @@ impl str::FromStr for KeyPair {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for KeyPair {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for KeyPair {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
let mut buf = [0u8; constants::SECRET_KEY_SIZE * 2];
|
||||
s.serialize_str(::to_hex(&self.secret_bytes(), &mut buf)
|
||||
s.serialize_str(crate::to_hex(&self.secret_bytes(), &mut buf)
|
||||
.expect("fixed-size hex serialization"))
|
||||
} else {
|
||||
s.serialize_bytes(&self.0[..])
|
||||
|
@ -1006,8 +1002,8 @@ impl ::serde::Serialize for KeyPair {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for KeyPair {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for KeyPair {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(super::serde_util::FromStrVisitor::new(
|
||||
"a hex string representing 32 byte KeyPair"
|
||||
|
@ -1360,7 +1356,7 @@ impl fmt::Display for InvalidParityValue {
|
|||
|
||||
#[cfg(feature = "std")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "std")))]
|
||||
impl ::std::error::Error for InvalidParityValue {}
|
||||
impl std::error::Error for InvalidParityValue {}
|
||||
|
||||
impl From<InvalidParityValue> for Error {
|
||||
fn from(error: InvalidParityValue) -> Self {
|
||||
|
@ -1371,8 +1367,8 @@ impl From<InvalidParityValue> for Error {
|
|||
/// The parity is serialized as `u8` - `0` for even, `1` for odd.
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for Parity {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for Parity {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
s.serialize_u8(self.to_u8())
|
||||
}
|
||||
}
|
||||
|
@ -1380,11 +1376,11 @@ impl ::serde::Serialize for Parity {
|
|||
/// The parity is deserialized as `u8` - `0` for even, `1` for odd.
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for Parity {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for Parity {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
struct Visitor;
|
||||
|
||||
impl<'de> ::serde::de::Visitor<'de> for Visitor
|
||||
impl<'de> serde::de::Visitor<'de> for Visitor
|
||||
{
|
||||
type Value = Parity;
|
||||
|
||||
|
@ -1393,7 +1389,7 @@ impl<'de> ::serde::Deserialize<'de> for Parity {
|
|||
}
|
||||
|
||||
fn visit_u8<E>(self, v: u8) -> Result<Self::Value, E>
|
||||
where E: ::serde::de::Error
|
||||
where E: serde::de::Error
|
||||
{
|
||||
use serde::de::Unexpected;
|
||||
|
||||
|
@ -1425,8 +1421,8 @@ impl From<ffi::XOnlyPublicKey> for XOnlyPublicKey {
|
|||
}
|
||||
}
|
||||
|
||||
impl From<::key::PublicKey> for XOnlyPublicKey {
|
||||
fn from(src: ::key::PublicKey) -> XOnlyPublicKey {
|
||||
impl From<PublicKey> for XOnlyPublicKey {
|
||||
fn from(src: PublicKey) -> XOnlyPublicKey {
|
||||
unsafe {
|
||||
let mut pk = ffi::XOnlyPublicKey::new();
|
||||
assert_eq!(
|
||||
|
@ -1445,8 +1441,8 @@ impl From<::key::PublicKey> for XOnlyPublicKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for XOnlyPublicKey {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for XOnlyPublicKey {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
s.collect_str(self)
|
||||
} else {
|
||||
|
@ -1457,8 +1453,8 @@ impl ::serde::Serialize for XOnlyPublicKey {
|
|||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for XOnlyPublicKey {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for XOnlyPublicKey {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(super::serde_util::FromStrVisitor::new(
|
||||
"a hex string representing 32 byte schnorr public key"
|
||||
|
@ -1486,8 +1482,7 @@ impl<'de> ::serde::Deserialize<'de> for XOnlyPublicKey {
|
|||
#[cfg(all(feature = "global-context", feature = "serde"))]
|
||||
pub mod serde_keypair {
|
||||
use serde::{Deserialize, Deserializer, Serialize, Serializer};
|
||||
use key::KeyPair;
|
||||
use key::SecretKey;
|
||||
use crate::key::{KeyPair, SecretKey};
|
||||
|
||||
#[allow(missing_docs)]
|
||||
pub fn serialize<S>(key: &KeyPair, serializer: S) -> Result<S::Ok, S::Error>
|
||||
|
@ -1505,7 +1500,7 @@ pub mod serde_keypair {
|
|||
let secret_key = SecretKey::deserialize(deserializer)?;
|
||||
|
||||
Ok(KeyPair::from_secret_key(
|
||||
&::SECP256K1,
|
||||
&crate::SECP256K1,
|
||||
&secret_key,
|
||||
))
|
||||
}
|
||||
|
@ -1514,23 +1509,21 @@ pub mod serde_keypair {
|
|||
#[cfg(test)]
|
||||
#[allow(unused_imports)]
|
||||
mod test {
|
||||
use super::*;
|
||||
|
||||
#[cfg(any(feature = "alloc", feature = "std"))]
|
||||
use core::iter;
|
||||
use core::str::FromStr;
|
||||
|
||||
#[cfg(any(feature = "alloc", feature = "std"))]
|
||||
use rand::{Error, ErrorKind, RngCore, thread_rng};
|
||||
|
||||
#[cfg(any(feature = "alloc", feature = "std"))]
|
||||
use rand_core::impls;
|
||||
|
||||
use constants;
|
||||
use Error::{InvalidPublicKey, InvalidSecretKey};
|
||||
|
||||
#[cfg(target_arch = "wasm32")]
|
||||
use wasm_bindgen_test::wasm_bindgen_test as test;
|
||||
|
||||
use super::{XOnlyPublicKey, PublicKey, Secp256k1, SecretKey, KeyPair, Parity};
|
||||
use crate::{constants, from_hex, to_hex};
|
||||
use crate::Error::{InvalidPublicKey, InvalidSecretKey};
|
||||
|
||||
macro_rules! hex {
|
||||
($hex:expr) => ({
|
||||
let mut result = vec![0; $hex.len() / 2];
|
||||
|
@ -1781,7 +1774,7 @@ mod test {
|
|||
assert!(PublicKey::from_str("0218845781f631c48f1c9709e23092067d06837f30aa0cd0544ac887fe91ddd1").is_err());
|
||||
assert!(PublicKey::from_str("xx0218845781f631c48f1c9709e23092067d06837f30aa0cd0544ac887fe91ddd1").is_err());
|
||||
|
||||
let long_str: String = iter::repeat('a').take(1024 * 1024).collect();
|
||||
let long_str: String = core::iter::repeat('a').take(1024 * 1024).collect();
|
||||
assert!(SecretKey::from_str(&long_str).is_err());
|
||||
assert!(PublicKey::from_str(&long_str).is_err());
|
||||
}
|
||||
|
@ -2095,7 +2088,7 @@ mod test {
|
|||
use serde::{Deserialize, Deserializer, Serialize, Serializer};
|
||||
use serde_test::{Configure, Token, assert_tokens};
|
||||
use super::serde_keypair;
|
||||
use key::KeyPair;
|
||||
use crate::key::KeyPair;
|
||||
|
||||
// Normally users would derive the serde traits, but we can't easily enable the serde macros
|
||||
// here, so they are implemented manually to be able to test the behaviour.
|
||||
|
@ -2125,7 +2118,7 @@ mod test {
|
|||
01010101010101010001020304050607ffff0000ffff00006363636363636363\
|
||||
";
|
||||
|
||||
let sk = KeyPairWrapper(KeyPair::from_seckey_slice(&::SECP256K1, &SK_BYTES).unwrap());
|
||||
let sk = KeyPairWrapper(KeyPair::from_seckey_slice(&crate::SECP256K1, &SK_BYTES).unwrap());
|
||||
|
||||
assert_tokens(&sk.compact(), &[Token::BorrowedBytes(&SK_BYTES[..])]);
|
||||
assert_tokens(&sk.compact(), &[Token::Bytes(&SK_BYTES)]);
|
||||
|
|
93
src/lib.rs
93
src/lib.rs
|
@ -150,47 +150,19 @@
|
|||
//! * `bitcoin_hashes` - enables interaction with the `bitcoin-hashes` crate (e.g. conversions).
|
||||
|
||||
// Coding conventions
|
||||
#![deny(non_upper_case_globals)]
|
||||
#![deny(non_camel_case_types)]
|
||||
#![deny(non_snake_case)]
|
||||
#![deny(unused_mut)]
|
||||
#![warn(missing_docs)]
|
||||
#![warn(missing_copy_implementations)]
|
||||
#![warn(missing_debug_implementations)]
|
||||
|
||||
#![deny(non_upper_case_globals, non_camel_case_types, non_snake_case)]
|
||||
#![warn(missing_docs, missing_copy_implementations, missing_debug_implementations)]
|
||||
|
||||
#![cfg_attr(all(not(test), not(feature = "std")), no_std)]
|
||||
#![cfg_attr(all(test, feature = "unstable"), feature(test))]
|
||||
#![cfg_attr(docsrs, feature(doc_cfg))]
|
||||
|
||||
#[macro_use]
|
||||
pub extern crate secp256k1_sys;
|
||||
pub use secp256k1_sys as ffi;
|
||||
|
||||
#[cfg(feature = "bitcoin_hashes")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "bitcoin_hashes")))]
|
||||
pub extern crate bitcoin_hashes as hashes;
|
||||
#[cfg(all(test, feature = "unstable"))]
|
||||
extern crate test;
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub extern crate rand;
|
||||
#[cfg(any(test))]
|
||||
extern crate rand_core;
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
pub extern crate serde;
|
||||
#[cfg(all(test, feature = "serde"))]
|
||||
extern crate serde_test;
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
use rand::Rng;
|
||||
#[cfg(any(test, feature = "std"))]
|
||||
extern crate core;
|
||||
#[cfg(all(test, target_arch = "wasm32"))]
|
||||
extern crate wasm_bindgen_test;
|
||||
#[cfg(feature = "alloc")]
|
||||
extern crate alloc;
|
||||
|
||||
#[cfg(any(test, feature = "std"))]
|
||||
extern crate core;
|
||||
#[cfg(all(test, feature = "unstable"))]
|
||||
extern crate test;
|
||||
|
||||
#[macro_use]
|
||||
mod macros;
|
||||
|
@ -206,18 +178,28 @@ pub mod schnorr;
|
|||
#[cfg(feature = "serde")]
|
||||
mod serde_util;
|
||||
|
||||
pub use key::*;
|
||||
pub use context::*;
|
||||
use core::marker::PhantomData;
|
||||
use core::{mem, fmt, str};
|
||||
use ffi::{CPtr, types::AlignedType};
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub use rand;
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
pub use serde;
|
||||
#[cfg(feature = "bitcoin_hashes")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "bitcoin_hashes")))]
|
||||
pub use bitcoin_hashes as hashes;
|
||||
pub use secp256k1_sys as ffi;
|
||||
pub use crate::key::{PublicKey, SecretKey};
|
||||
pub use crate::context::*;
|
||||
pub use crate::key::*;
|
||||
|
||||
#[cfg(feature = "global-context")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "global-context")))]
|
||||
pub use context::global::SECP256K1;
|
||||
|
||||
use core::{fmt, str, mem, marker::PhantomData};
|
||||
use crate::ffi::{CPtr, impl_array_newtype, types::AlignedType};
|
||||
#[cfg(feature = "bitcoin_hashes")]
|
||||
use hashes::Hash;
|
||||
use crate::hashes::Hash;
|
||||
|
||||
// Backwards compatible changes
|
||||
/// Schnorr Signature related methods.
|
||||
|
@ -225,13 +207,13 @@ use hashes::Hash;
|
|||
pub mod schnorrsig {
|
||||
#[deprecated(since = "0.21.0", note = "Use crate::XOnlyPublicKey instead.")]
|
||||
/// backwards compatible re-export of xonly key
|
||||
pub type PublicKey = super::XOnlyPublicKey;
|
||||
pub type PublicKey = crate::key::XOnlyPublicKey;
|
||||
/// backwards compatible re-export of keypair
|
||||
#[deprecated(since = "0.21.0", note = "Use crate::KeyPair instead.")]
|
||||
pub type KeyPair = super::KeyPair;
|
||||
pub type KeyPair = crate::key::KeyPair;
|
||||
/// backwards compatible re-export of schnorr signatures
|
||||
#[deprecated(since = "0.21.0", note = "Use schnorr::Signature instead.")]
|
||||
pub type Signature = super::schnorr::Signature;
|
||||
pub type Signature = crate::schnorr::Signature;
|
||||
}
|
||||
|
||||
#[deprecated(since = "0.21.0", note = "Use ecdsa::Signature instead.")]
|
||||
|
@ -470,7 +452,7 @@ impl<C: Context> Secp256k1<C> {
|
|||
/// [libsecp256k1](https://github.com/bitcoin-core/secp256k1/commit/d2275795ff22a6f4738869f5528fbbb61738aa48).
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub fn randomize<R: Rng + ?Sized>(&mut self, rng: &mut R) {
|
||||
pub fn randomize<R: rand::Rng + ?Sized>(&mut self, rng: &mut R) {
|
||||
let mut seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut seed);
|
||||
self.seeded_randomize(&seed);
|
||||
|
@ -501,7 +483,7 @@ impl<C: Signing> Secp256k1<C> {
|
|||
#[inline]
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand")))]
|
||||
pub fn generate_keypair<R: Rng + ?Sized>(&self, rng: &mut R)
|
||||
pub fn generate_keypair<R: rand::Rng + ?Sized>(&self, rng: &mut R)
|
||||
-> (key::SecretKey, key::PublicKey) {
|
||||
let sk = key::SecretKey::new(rng);
|
||||
let pk = key::PublicKey::from_secret_key(self, &sk);
|
||||
|
@ -513,7 +495,7 @@ impl<C: Signing> Secp256k1<C> {
|
|||
#[inline]
|
||||
#[cfg(all(feature = "global-context", feature = "rand"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(all(feature = "global-context", feature = "rand"))))]
|
||||
pub fn generate_keypair<R: Rng + ?Sized>(rng: &mut R) -> (key::SecretKey, key::PublicKey) {
|
||||
pub fn generate_keypair<R: rand::Rng + ?Sized>(rng: &mut R) -> (key::SecretKey, key::PublicKey) {
|
||||
SECP256K1.generate_keypair(rng)
|
||||
}
|
||||
|
||||
|
@ -569,14 +551,18 @@ fn to_hex<'a>(src: &[u8], target: &'a mut [u8]) -> Result<&'a str, ()> {
|
|||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
use std::marker::PhantomData;
|
||||
use std::str::FromStr;
|
||||
|
||||
use rand::{RngCore, thread_rng};
|
||||
use core::str::FromStr;
|
||||
use ffi::types::AlignedType;
|
||||
|
||||
#[cfg(target_arch = "wasm32")]
|
||||
use wasm_bindgen_test::wasm_bindgen_test as test;
|
||||
|
||||
use crate::{constants, ecdsa, from_hex, to_hex, Message, PublicKey, Secp256k1, SecretKey, Error};
|
||||
use crate::context::*;
|
||||
use crate::ffi::{self, types::AlignedType};
|
||||
|
||||
macro_rules! hex {
|
||||
($hex:expr) => ({
|
||||
let mut result = vec![0; $hex.len() / 2];
|
||||
|
@ -1038,6 +1024,7 @@ mod tests {
|
|||
#[cfg(feature = "global-context")]
|
||||
#[test]
|
||||
fn test_global_context() {
|
||||
use crate::SECP256K1;
|
||||
let sk_data = hex!("e6dd32f8761625f105c39a39f19370b3521d845a12456d60ce44debd0a362641");
|
||||
let sk = SecretKey::from_slice(&sk_data).unwrap();
|
||||
let msg_data = hex!("a4965ca63b7d8562736ceec36dfa5a11bf426eb65be8ea3f7a49ae363032da0d");
|
||||
|
@ -1054,8 +1041,7 @@ mod tests {
|
|||
#[cfg(feature = "bitcoin_hashes")]
|
||||
#[test]
|
||||
fn test_from_hash() {
|
||||
use hashes;
|
||||
use hashes::Hash;
|
||||
use crate::hashes::{self, Hash};
|
||||
|
||||
let test_bytes = "Hello world!".as_bytes();
|
||||
|
||||
|
@ -1079,10 +1065,11 @@ mod tests {
|
|||
|
||||
#[cfg(all(test, feature = "unstable"))]
|
||||
mod benches {
|
||||
use rand::{thread_rng, RngCore};
|
||||
use test::{Bencher, black_box};
|
||||
|
||||
use super::{Secp256k1, Message};
|
||||
use rand::{RngCore, thread_rng};
|
||||
|
||||
use super::{Message, Secp256k1};
|
||||
|
||||
#[bench]
|
||||
#[cfg(any(feature = "alloc", feature = "std"))]
|
||||
|
|
|
@ -15,8 +15,8 @@
|
|||
|
||||
macro_rules! impl_pretty_debug {
|
||||
($thing:ident) => {
|
||||
impl ::core::fmt::Debug for $thing {
|
||||
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
|
||||
impl core::fmt::Debug for $thing {
|
||||
fn fmt(&self, f: &mut core::fmt::Formatter) -> core::fmt::Result {
|
||||
write!(f, "{}(", stringify!($thing))?;
|
||||
for i in &self[..] {
|
||||
write!(f, "{:02x}", i)?;
|
||||
|
|
|
@ -2,19 +2,17 @@
|
|||
//! Support for Schnorr signatures.
|
||||
//!
|
||||
|
||||
#[cfg(any(test, feature = "rand-std"))]
|
||||
use rand::thread_rng;
|
||||
use core::{fmt, ptr, str};
|
||||
|
||||
#[cfg(any(test, feature = "rand"))]
|
||||
use rand::{CryptoRng, Rng};
|
||||
|
||||
use super::{from_hex, Error};
|
||||
use core::{fmt, ptr, str};
|
||||
use ffi::{self, CPtr};
|
||||
use {constants, Secp256k1};
|
||||
use {Message, Signing, Verification, KeyPair, XOnlyPublicKey};
|
||||
use crate::{constants, Error, from_hex, Message, Secp256k1, Signing, Verification};
|
||||
use crate::key::{KeyPair, XOnlyPublicKey};
|
||||
use crate::ffi::{self, CPtr, impl_array_newtype};
|
||||
|
||||
#[cfg(all(feature = "global-context", feature = "rand-std"))]
|
||||
use SECP256K1;
|
||||
use crate::SECP256K1;
|
||||
|
||||
/// Represents a Schnorr signature.
|
||||
pub struct Signature([u8; constants::SCHNORR_SIGNATURE_SIZE]);
|
||||
|
@ -22,9 +20,8 @@ impl_array_newtype!(Signature, u8, constants::SCHNORR_SIGNATURE_SIZE);
|
|||
impl_pretty_debug!(Signature);
|
||||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl ::serde::Serialize for Signature {
|
||||
fn serialize<S: ::serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
impl serde::Serialize for Signature {
|
||||
fn serialize<S: serde::Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||
if s.is_human_readable() {
|
||||
s.collect_str(self)
|
||||
} else {
|
||||
|
@ -34,9 +31,8 @@ impl ::serde::Serialize for Signature {
|
|||
}
|
||||
|
||||
#[cfg(feature = "serde")]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "serde")))]
|
||||
impl<'de> ::serde::Deserialize<'de> for Signature {
|
||||
fn deserialize<D: ::serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
impl<'de> serde::Deserialize<'de> for Signature {
|
||||
fn deserialize<D: serde::Deserializer<'de>>(d: D) -> Result<Self, D::Error> {
|
||||
if d.is_human_readable() {
|
||||
d.deserialize_str(super::serde_util::FromStrVisitor::new(
|
||||
"a hex string representing 64 byte schnorr signature"
|
||||
|
@ -139,8 +135,7 @@ impl<C: Signing> Secp256k1<C> {
|
|||
#[cfg(any(test, feature = "rand-std"))]
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "rand-std")))]
|
||||
pub fn sign_schnorr(&self, msg: &Message, keypair: &KeyPair) -> Signature {
|
||||
let mut rng = thread_rng();
|
||||
self.sign_schnorr_with_rng(msg, keypair, &mut rng)
|
||||
self.sign_schnorr_with_rng(msg, keypair, &mut rand::thread_rng())
|
||||
}
|
||||
|
||||
/// Create a schnorr signature without using any auxiliary random data.
|
||||
|
@ -276,21 +271,17 @@ impl <C: Signing> Secp256k1<C> {
|
|||
#[cfg(test)]
|
||||
#[allow(unused_imports)]
|
||||
mod tests {
|
||||
use std::iter;
|
||||
use std::str::FromStr;
|
||||
use core::str::FromStr;
|
||||
|
||||
use rand::rngs::ThreadRng;
|
||||
use rand::{Error, ErrorKind, RngCore, thread_rng};
|
||||
use rand::{Error, ErrorKind, RngCore, rngs::ThreadRng, thread_rng};
|
||||
use rand_core::impls;
|
||||
|
||||
use {constants, Error::InvalidPublicKey, from_hex, Message, Secp256k1, SecretKey};
|
||||
|
||||
#[cfg(any(feature = "std", feature = "alloc"))]
|
||||
use All;
|
||||
|
||||
#[cfg(target_arch = "wasm32")]
|
||||
use wasm_bindgen_test::wasm_bindgen_test as test;
|
||||
|
||||
use crate::{constants, from_hex, Message, Secp256k1, SecretKey};
|
||||
use crate::schnorr::{KeyPair, XOnlyPublicKey, Signature};
|
||||
use crate::Error::InvalidPublicKey;
|
||||
|
||||
use super::*;
|
||||
|
||||
#[cfg(all(not(fuzzing), any(feature = "alloc", feature = "std")))]
|
||||
|
@ -338,7 +329,7 @@ mod tests {
|
|||
|
||||
#[cfg(all(feature = "std", feature = "rand-std"))]
|
||||
fn sign_helper(
|
||||
sign: fn(&Secp256k1<All>, &Message, &KeyPair, &mut ThreadRng) -> Signature,
|
||||
sign: fn(&Secp256k1<crate::All>, &Message, &KeyPair, &mut ThreadRng) -> Signature,
|
||||
) {
|
||||
let secp = Secp256k1::new();
|
||||
|
||||
|
@ -429,8 +420,8 @@ mod tests {
|
|||
let keypair = KeyPair::from_seckey_str(&secp, sk_str).unwrap();
|
||||
let sk = SecretKey::from_keypair(&keypair);
|
||||
assert_eq!(SecretKey::from_str(sk_str).unwrap(), sk);
|
||||
let pk = ::key::PublicKey::from_keypair(&keypair);
|
||||
assert_eq!(::key::PublicKey::from_secret_key(&secp, &sk), pk);
|
||||
let pk = crate::key::PublicKey::from_keypair(&keypair);
|
||||
assert_eq!(crate::key::PublicKey::from_secret_key(&secp, &sk), pk);
|
||||
let (xpk, _parity) = keypair.x_only_public_key();
|
||||
assert_eq!(XOnlyPublicKey::from(pk), xpk);
|
||||
}
|
||||
|
@ -515,7 +506,7 @@ mod tests {
|
|||
)
|
||||
.is_err());
|
||||
|
||||
let long_str: String = iter::repeat('a').take(1024 * 1024).collect();
|
||||
let long_str: String = core::iter::repeat('a').take(1024 * 1024).collect();
|
||||
assert!(XOnlyPublicKey::from_str(&long_str).is_err());
|
||||
}
|
||||
|
||||
|
|
|
@ -14,25 +14,23 @@
|
|||
|
||||
//! Helpers for displaying secret values
|
||||
|
||||
use ::core::fmt;
|
||||
use ::{SecretKey, KeyPair, to_hex};
|
||||
use ecdh::SharedSecret;
|
||||
use constants::SECRET_KEY_SIZE;
|
||||
|
||||
use core::fmt;
|
||||
use crate::{to_hex, constants::SECRET_KEY_SIZE, key::{SecretKey, KeyPair}, ecdh::SharedSecret};
|
||||
macro_rules! impl_display_secret {
|
||||
// Default hasher exists only in standard library and not alloc
|
||||
($thing:ident) => {
|
||||
#[cfg(feature = "std")]
|
||||
impl ::core::fmt::Debug for $thing {
|
||||
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
|
||||
use ::core::hash::Hasher;
|
||||
#[cfg_attr(docsrs, doc(cfg(feature = "std")))]
|
||||
impl core::fmt::Debug for $thing {
|
||||
fn fmt(&self, f: &mut core::fmt::Formatter) -> core::fmt::Result {
|
||||
use core::hash::Hasher;
|
||||
const DEBUG_HASH_TAG: &[u8] = &[
|
||||
0x66, 0xa6, 0x77, 0x1b, 0x9b, 0x6d, 0xae, 0xa1, 0xb2, 0xee, 0x4e, 0x07, 0x49,
|
||||
0x4a, 0xac, 0x87, 0xa9, 0xb8, 0x5b, 0x4b, 0x35, 0x02, 0xaa, 0x6d, 0x0f, 0x79,
|
||||
0xcb, 0x63, 0xe6, 0xf8, 0x66, 0x22
|
||||
]; // =SHA256(b"rust-secp256k1DEBUG");
|
||||
|
||||
let mut hasher = ::std::collections::hash_map::DefaultHasher::new();
|
||||
let mut hasher = std::collections::hash_map::DefaultHasher::new();
|
||||
|
||||
hasher.write(DEBUG_HASH_TAG);
|
||||
hasher.write(DEBUG_HASH_TAG);
|
||||
|
@ -48,7 +46,7 @@ macro_rules! impl_display_secret {
|
|||
#[cfg(all(not(feature = "std"), feature = "bitcoin_hashes"))]
|
||||
impl ::core::fmt::Debug for $thing {
|
||||
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
|
||||
use hashes::{sha256, Hash, HashEngine};
|
||||
use crate::hashes::{sha256, Hash, HashEngine};
|
||||
|
||||
let tag = "rust-secp256k1DEBUG";
|
||||
|
||||
|
|
Loading…
Reference in New Issue