From 3958d2226f5f9f06e5c246351237644110302aea Mon Sep 17 00:00:00 2001 From: librelois <elois@ifee.fr> Date: Tue, 26 Nov 2019 16:21:28 +0100 Subject: [PATCH] [fix] bc: temporary skip check block sig due to #183 --- lib/crypto/Cargo.toml | 1 + lib/crypto/src/keys/ed25519.rs | 16 ++++++++++++++++ .../blockchain/src/dubp/check/local.rs | 9 +++++---- 3 files changed, 22 insertions(+), 4 deletions(-) diff --git a/lib/crypto/Cargo.toml b/lib/crypto/Cargo.toml index 52160523..497a2849 100644 --- a/lib/crypto/Cargo.toml +++ b/lib/crypto/Cargo.toml @@ -28,5 +28,6 @@ log = "0.4.*" [dev-dependencies] bincode = "1.2.0" +#hex = "0.3.1" [features] diff --git a/lib/crypto/src/keys/ed25519.rs b/lib/crypto/src/keys/ed25519.rs index 413c26d9..e51c8304 100644 --- a/lib/crypto/src/keys/ed25519.rs +++ b/lib/crypto/src/keys/ed25519.rs @@ -667,4 +667,20 @@ Timestamp: 0-E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855 .sign(message.as_bytes()); assert!(keypair.verify(message.as_bytes(), &sig).is_ok()); } + + /*#[test] + fn test_tmp() { + let message = "InnerHash: A9697A9954EA447BBDC88D1B22AA8B60B2D11986DE806319C1A5AAFEB348C213\nNonce: 10300000043648\n"; + + let pubkey = + PublicKey::from_base58("8kXygUHh1vLjmcRzXVM86t38EL8dfFJgfBeHmkaWLamu").unwrap(); + let sig: super::Signature = Signature::from_base64("XDIvgPbJK02ZfMwrhrtNFmMVGhqazDBhnxPBvMXLsDgPbnh28NbUbOYIRHrsZlo/frAv/Oh0OUOQZD3JpSf8DQ==").unwrap(); + + let pubkey_hex = hex::encode(&pubkey.0[..]); + println!("{}", pubkey_hex); + let sig_hex = hex::encode(&sig.0[..]); + println!("{}", sig_hex); + + assert!(pubkey.verify(message.as_bytes(), &sig).is_ok()); + }*/ } diff --git a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs index f79b90bc..6205fa61 100644 --- a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs +++ b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs @@ -43,7 +43,7 @@ pub enum LocalVerifyBlockError { /// Not-genesis block specific rules LocalVerifyNotGenesisBlockError(LocalVerifyNotGenesisBlockError), /// Signature error - BlockSignatureError(DocumentSigsErr), + _BlockSignatureError(DocumentSigsErr), /// Identity signature error IdentitySignatureError(DocumentSigsErr), /// Joiner signature error @@ -123,9 +123,10 @@ pub fn verify_local_validity_block_v10( // As it has been checked that block.issuers.len() == 1 and as // block.issuers.len() == block.signatures.len() is check in block.verify_signatures() // there is no need to check that block.signatures.len() == 1 - block - .verify_signatures() - .map_err(LocalVerifyBlockError::BlockSignatureError)?; + // check bloc sig tmp disabled because #183 + /*block + .verify_signatures() + .map_err(LocalVerifyBlockError::BlockSignatureError)?;*/ for identity in &block.identities { identity .verify_signatures() -- GitLab