Adds support for verifying ed25519 signatures, for secio
This commit is contained in:
parent
dbc35e8b9d
commit
b142964d31
29
libp2p/crypto/ed25519.py
Normal file
29
libp2p/crypto/ed25519.py
Normal file
|
@ -0,0 +1,29 @@
|
|||
from Crypto.Hash import SHA256
|
||||
|
||||
from libp2p.crypto.keys import KeyType, PublicKey
|
||||
from nacl.public import PublicKey as Ed255129PublicKeyImpl
|
||||
from nacl.signing import BadSignatureError, VerifyKey
|
||||
|
||||
|
||||
class Ed25519PublicKey(PublicKey):
|
||||
def __init__(self, impl: Ed255129PublicKeyImpl) -> None:
|
||||
self.impl = impl
|
||||
|
||||
def to_bytes(self) -> bytes:
|
||||
return bytes(self.impl)
|
||||
|
||||
@classmethod
|
||||
def from_bytes(cls, key_bytes: bytes) -> "Ed25519PublicKey":
|
||||
return cls(Ed255129PublicKeyImpl(key_bytes))
|
||||
|
||||
def get_type(self) -> KeyType:
|
||||
return KeyType.Ed25519
|
||||
|
||||
def verify(self, data: bytes, signature: bytes) -> bool:
|
||||
verify_key = VerifyKey(self.to_bytes())
|
||||
h = SHA256.new(data)
|
||||
try:
|
||||
verify_key.verify(h, signature)
|
||||
except BadSignatureError:
|
||||
return False
|
||||
return True
|
|
@ -1,3 +1,4 @@
|
|||
from libp2p.crypto.ed25519 import Ed25519PublicKey
|
||||
from libp2p.crypto.keys import KeyType, PrivateKey, PublicKey
|
||||
from libp2p.crypto.rsa import RSAPublicKey
|
||||
from libp2p.crypto.secp256k1 import Secp256k1PrivateKey, Secp256k1PublicKey
|
||||
|
@ -5,6 +6,7 @@ from libp2p.crypto.secp256k1 import Secp256k1PrivateKey, Secp256k1PublicKey
|
|||
key_type_to_public_key_deserializer = {
|
||||
KeyType.Secp256k1.value: Secp256k1PublicKey.from_bytes,
|
||||
KeyType.RSA.value: RSAPublicKey.from_bytes,
|
||||
KeyType.Ed25519.value: Ed25519PublicKey.from_bytes,
|
||||
}
|
||||
|
||||
key_type_to_private_key_deserializer = {
|
||||
|
|
Loading…
Reference in New Issue
Block a user