diff --git a/lib/crypto/Cargo.toml b/lib/crypto/Cargo.toml index 52160523b6fa6006d1031b38ffa726bb34627e36..497a2849bb393f2fb3e0a0432747ae155351eee1 100644 --- a/lib/crypto/Cargo.toml +++ b/lib/crypto/Cargo.toml @@ -28,5 +28,6 @@ log = "0.4.*" [dev-dependencies] bincode = "1.2.0" +#hex = "0.3.1" [features] diff --git a/lib/crypto/src/keys/ed25519.rs b/lib/crypto/src/keys/ed25519.rs index 413c26d9d0f9291bcb2d2896b8334407c8e3ec83..e51c8304c7710e721a77ca31e7aac8acf2c71408 100644 --- a/lib/crypto/src/keys/ed25519.rs +++ b/lib/crypto/src/keys/ed25519.rs @@ -667,4 +667,20 @@ Timestamp: 0-E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855 .sign(message.as_bytes()); assert!(keypair.verify(message.as_bytes(), &sig).is_ok()); } + + /*#[test] + fn test_tmp() { + let message = "InnerHash: A9697A9954EA447BBDC88D1B22AA8B60B2D11986DE806319C1A5AAFEB348C213\nNonce: 10300000043648\n"; + + let pubkey = + PublicKey::from_base58("8kXygUHh1vLjmcRzXVM86t38EL8dfFJgfBeHmkaWLamu").unwrap(); + let sig: super::Signature = Signature::from_base64("XDIvgPbJK02ZfMwrhrtNFmMVGhqazDBhnxPBvMXLsDgPbnh28NbUbOYIRHrsZlo/frAv/Oh0OUOQZD3JpSf8DQ==").unwrap(); + + let pubkey_hex = hex::encode(&pubkey.0[..]); + println!("{}", pubkey_hex); + let sig_hex = hex::encode(&sig.0[..]); + println!("{}", sig_hex); + + assert!(pubkey.verify(message.as_bytes(), &sig).is_ok()); + }*/ } diff --git a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs index f79b90bc872769ea99d7511ea25c5a8e0fd8a5fe..6205fa614f3de5d97f347ea6fbe4c7903dedc73c 100644 --- a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs +++ b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs @@ -43,7 +43,7 @@ pub enum LocalVerifyBlockError { /// Not-genesis block specific rules LocalVerifyNotGenesisBlockError(LocalVerifyNotGenesisBlockError), /// Signature error - BlockSignatureError(DocumentSigsErr), + _BlockSignatureError(DocumentSigsErr), /// Identity signature error IdentitySignatureError(DocumentSigsErr), /// Joiner signature error @@ -123,9 +123,10 @@ pub fn verify_local_validity_block_v10( // As it has been checked that block.issuers.len() == 1 and as // block.issuers.len() == block.signatures.len() is check in block.verify_signatures() // there is no need to check that block.signatures.len() == 1 - block - .verify_signatures() - .map_err(LocalVerifyBlockError::BlockSignatureError)?; + // check bloc sig tmp disabled because #183 + /*block + .verify_signatures() + .map_err(LocalVerifyBlockError::BlockSignatureError)?;*/ for identity in &block.identities { identity .verify_signatures()