Skip to content

Commit

Permalink
Make ProofSuite object-safe
Browse files Browse the repository at this point in the history
  • Loading branch information
clehner committed Mar 30, 2021
1 parent fb67099 commit a48f106
Show file tree
Hide file tree
Showing 5 changed files with 185 additions and 103 deletions.
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
- Make `jws::sign_bytes` return bytes instead of string.
- Allow multiple proofs and multiple verification methods in a DID document
- Added `Source::KeyAndPattern` enum variant.
- Made `ProofSuite` object-safe.

### Fixed
- Fix `tz1` hashing.
Expand Down
11 changes: 4 additions & 7 deletions did-ethr/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -279,13 +279,10 @@ mod tests {
let mut vc_wrong_key = vc_no_proof.clone();
let other_key = JWK::generate_ed25519().unwrap();
use ssi::ldp::ProofSuite;
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021::sign(
&vc_no_proof,
&issue_options,
&other_key,
)
.await
.unwrap();
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021
.sign(&vc_no_proof, &issue_options, &other_key)
.await
.unwrap();
vc_wrong_key.add_proof(proof_bad);
vc_wrong_key.validate().unwrap();
assert!(vc_wrong_key.verify(None, &DIDEthr).await.errors.len() > 0);
Expand Down
11 changes: 4 additions & 7 deletions did-sol/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -261,13 +261,10 @@ mod tests {
let mut vc_wrong_key = vc_no_proof.clone();
let other_key = JWK::generate_ed25519().unwrap();
use ssi::ldp::ProofSuite;
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021::sign(
&vc_no_proof,
&issue_options,
&other_key,
)
.await
.unwrap();
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021
.sign(&vc_no_proof, &issue_options, &other_key)
.await
.unwrap();
vc_wrong_key.add_proof(proof_bad);
vc_wrong_key.validate().unwrap();
assert!(vc_wrong_key.verify(None, &DIDSol).await.errors.len() > 0);
Expand Down
33 changes: 12 additions & 21 deletions did-tezos/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -721,13 +721,10 @@ mod tests {
let mut vc_wrong_key = vc_no_proof.clone();
let other_key = JWK::generate_ed25519().unwrap();
use ssi::ldp::ProofSuite;
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021::sign(
&vc_no_proof,
&issue_options,
&other_key,
)
.await
.unwrap();
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021
.sign(&vc_no_proof, &issue_options, &other_key)
.await
.unwrap();
vc_wrong_key.add_proof(proof_bad);
vc_wrong_key.validate().unwrap();
assert!(vc_wrong_key.verify(None, &DIDTZ).await.errors.len() > 0);
Expand Down Expand Up @@ -891,13 +888,10 @@ mod tests {
let mut vc_wrong_key = vc_no_proof.clone();
let other_key = JWK::generate_ed25519().unwrap();
use ssi::ldp::ProofSuite;
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021::sign(
&vc_no_proof,
&issue_options,
&other_key,
)
.await
.unwrap();
let proof_bad = ssi::ldp::Ed25519BLAKE2BDigestSize20Base58CheckEncodedSignature2021
.sign(&vc_no_proof, &issue_options, &other_key)
.await
.unwrap();
vc_wrong_key.add_proof(proof_bad);
vc_wrong_key.validate().unwrap();
assert!(vc_wrong_key.verify(None, &DIDTZ).await.errors.len() > 0);
Expand Down Expand Up @@ -1282,13 +1276,10 @@ mod tests {
let mut vc_wrong_key = vc_no_proof.clone();
let other_key = JWK::generate_p256().unwrap();
use ssi::ldp::ProofSuite;
let proof_bad = ssi::ldp::P256BLAKE2BDigestSize20Base58CheckEncodedSignature2021::sign(
&vc_no_proof,
&issue_options,
&other_key,
)
.await
.unwrap();
let proof_bad = ssi::ldp::P256BLAKE2BDigestSize20Base58CheckEncodedSignature2021
.sign(&vc_no_proof, &issue_options, &other_key)
.await
.unwrap();
vc_wrong_key.add_proof(proof_bad);
vc_wrong_key.validate().unwrap();
assert!(vc_wrong_key.verify(None, &DIDTZ).await.errors.len() > 0);
Expand Down
Loading

0 comments on commit a48f106

Please sign in to comment.