Skip to content
This repository was archived by the owner on Nov 15, 2023. It is now read-only.

Commit 093131b

Browse files
committed
PR feedback
- Spaces -> tabs - renamed two helper functions
1 parent 472e068 commit 093131b

File tree

2 files changed

+30
-29
lines changed

2 files changed

+30
-29
lines changed

primitives/core/src/ecdsa.rs

+28-19
Original file line numberDiff line numberDiff line change
@@ -392,8 +392,10 @@ impl From<(libsecp256k1::Signature, libsecp256k1::RecoveryId)> for Signature {
392392
#[cfg(feature = "full_crypto")]
393393
impl<'a> TryFrom<&'a Signature> for (libsecp256k1::Signature, libsecp256k1::RecoveryId) {
394394
type Error = ();
395-
fn try_from(x: &'a Signature) -> Result<(libsecp256k1::Signature, libsecp256k1::RecoveryId), Self::Error> {
396-
parse_signature(&x.0).map_err(|_| ())
395+
fn try_from(
396+
x: &'a Signature,
397+
) -> Result<(libsecp256k1::Signature, libsecp256k1::RecoveryId), Self::Error> {
398+
parse_signature_standard(&x.0).map_err(|_| ())
397399
}
398400
}
399401

@@ -507,7 +509,10 @@ impl TraitPair for Pair {
507509
/// Verify a signature on a message. Returns true if the signature is good.
508510
fn verify<M: AsRef<[u8]>>(sig: &Self::Signature, message: M, pubkey: &Self::Public) -> bool {
509511
let message = libsecp256k1::Message::parse(&blake2_256(message.as_ref()));
510-
let sig: (_, _) = match sig.try_into() { Ok(x) => x, _ => return false };
512+
let sig: (_, _) = match sig.try_into() {
513+
Ok(x) => x,
514+
_ => return false,
515+
};
511516
match libsecp256k1::recover(&message, &sig.0, &sig.1) {
512517
Ok(actual) => pubkey.0[..] == actual.serialize_compressed()[..],
513518
_ => false,
@@ -520,8 +525,10 @@ impl TraitPair for Pair {
520525
/// size. Use it only if you're coming from byte buffers and need the speed.
521526
fn verify_weak<P: AsRef<[u8]>, M: AsRef<[u8]>>(sig: &[u8], message: M, pubkey: P) -> bool {
522527
let message = libsecp256k1::Message::parse(&blake2_256(message.as_ref()));
523-
if sig.len() != 65 { return false }
524-
let (sig, ri) = match parse_signature(&sig) {
528+
if sig.len() != 65 {
529+
return false
530+
}
531+
let (sig, ri) = match parse_signature_standard(&sig) {
525532
Ok(sigri) => sigri,
526533
_ => return false,
527534
};
@@ -582,9 +589,9 @@ impl Pair {
582589
/// Parses Signature using parse_overflowing_slice
583590
pub fn verify_deprecated<M: AsRef<[u8]>>(sig: &Signature, message: M, pubkey: &Public) -> bool {
584591
let message = libsecp256k1::Message::parse(&blake2_256(message.as_ref()));
585-
let (sig, ri) = match parse_signature_deprecated(&sig.0) {
592+
let (sig, ri) = match parse_signature_overflowing(&sig.0) {
586593
Ok(sigri) => sigri,
587-
_ => return false
594+
_ => return false,
588595
};
589596
match libsecp256k1::recover(&message, &sig, &ri) {
590597
Ok(actual) => pubkey.0[..] == actual.serialize_compressed()[..],
@@ -594,21 +601,21 @@ impl Pair {
594601
}
595602

596603
#[cfg(feature = "full_crypto")]
597-
fn parse_signature(
598-
x: &[u8],
604+
fn parse_signature_standard(
605+
x: &[u8],
599606
) -> Result<(libsecp256k1::Signature, libsecp256k1::RecoveryId), libsecp256k1::Error> {
600-
let sig = libsecp256k1::Signature::parse_standard_slice(&x[0..64])?;
601-
let ri = libsecp256k1::RecoveryId::parse(x[64])?;
602-
Ok((sig, ri))
607+
let sig = libsecp256k1::Signature::parse_standard_slice(&x[0..64])?;
608+
let ri = libsecp256k1::RecoveryId::parse(x[64])?;
609+
Ok((sig, ri))
603610
}
604611

605612
#[cfg(feature = "full_crypto")]
606-
fn parse_signature_deprecated(
607-
x: &[u8],
613+
fn parse_signature_overflowing(
614+
x: &[u8],
608615
) -> Result<(libsecp256k1::Signature, libsecp256k1::RecoveryId), libsecp256k1::Error> {
609-
let sig = libsecp256k1::Signature::parse_overflowing_slice(&x[0..64])?;
610-
let ri = libsecp256k1::RecoveryId::parse(x[64])?;
611-
Ok((sig, ri))
616+
let sig = libsecp256k1::Signature::parse_overflowing_slice(&x[0..64])?;
617+
let ri = libsecp256k1::RecoveryId::parse(x[64])?;
618+
Ok((sig, ri))
612619
}
613620

614621
impl CryptoType for Public {
@@ -852,7 +859,8 @@ mod test {
852859
// `msg` shouldn't be mangled
853860
let msg = [0u8; 32];
854861
let sig1 = pair.sign_prehashed(&msg);
855-
let sig2: Signature = libsecp256k1::sign(&libsecp256k1::Message::parse(&msg), &pair.secret).into();
862+
let sig2: Signature =
863+
libsecp256k1::sign(&libsecp256k1::Message::parse(&msg), &pair.secret).into();
856864

857865
assert_eq!(sig1, sig2);
858866

@@ -864,7 +872,8 @@ mod test {
864872
// using pre-hashed `msg` works
865873
let msg = keccak_256(b"this should be hashed");
866874
let sig1 = pair.sign_prehashed(&msg);
867-
let sig2: Signature = libsecp256k1::sign(&libsecp256k1::Message::parse(&msg), &pair.secret).into();
875+
let sig2: Signature =
876+
libsecp256k1::sign(&libsecp256k1::Message::parse(&msg), &pair.secret).into();
868877

869878
assert_eq!(sig1, sig2);
870879
}

primitives/io/src/lib.rs

+2-10
Original file line numberDiff line numberDiff line change
@@ -717,23 +717,15 @@ pub trait Crypto {
717717
/// Verify `ecdsa` signature.
718718
///
719719
/// Returns `true` when the verification was successful.
720-
fn ecdsa_verify(
721-
sig: &ecdsa::Signature,
722-
msg: &[u8],
723-
pub_key: &ecdsa::Public,
724-
) -> bool {
720+
fn ecdsa_verify(sig: &ecdsa::Signature, msg: &[u8], pub_key: &ecdsa::Public) -> bool {
725721
ecdsa::Pair::verify_deprecated(sig, msg, pub_key)
726722
}
727723

728724
/// Verify `ecdsa` signature.
729725
///
730726
/// Returns `true` when the verification was successful.
731727
#[version(2)]
732-
fn ecdsa_verify(
733-
sig: &ecdsa::Signature,
734-
msg: &[u8],
735-
pub_key: &ecdsa::Public,
736-
) -> bool {
728+
fn ecdsa_verify(sig: &ecdsa::Signature, msg: &[u8], pub_key: &ecdsa::Public) -> bool {
737729
ecdsa::Pair::verify(sig, msg, pub_key)
738730
}
739731

0 commit comments

Comments
 (0)