From 3958d2226f5f9f06e5c246351237644110302aea Mon Sep 17 00:00:00 2001
From: librelois <elois@ifee.fr>
Date: Tue, 26 Nov 2019 16:21:28 +0100
Subject: [PATCH] [fix] bc: temporary skip check block sig due to #183
---
lib/crypto/Cargo.toml | 1 +
lib/crypto/src/keys/ed25519.rs | 16 ++++++++++++++++
.../blockchain/src/dubp/check/local.rs | 9 +++++----
3 files changed, 22 insertions(+), 4 deletions(-)
diff --git a/lib/crypto/Cargo.toml b/lib/crypto/Cargo.toml
index 52160523..497a2849 100644
--- a/lib/crypto/Cargo.toml
+++ b/lib/crypto/Cargo.toml
@@ -28,5 +28,6 @@ log = "0.4.*"
[dev-dependencies]
bincode = "1.2.0"
+#hex = "0.3.1"
[features]
diff --git a/lib/crypto/src/keys/ed25519.rs b/lib/crypto/src/keys/ed25519.rs
index 413c26d9..e51c8304 100644
--- a/lib/crypto/src/keys/ed25519.rs
+++ b/lib/crypto/src/keys/ed25519.rs
@@ -667,4 +667,20 @@ Timestamp: 0-E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855
.sign(message.as_bytes());
assert!(keypair.verify(message.as_bytes(), &sig).is_ok());
}
+
+ /*#[test]
+ fn test_tmp() {
+ let message = "InnerHash: A9697A9954EA447BBDC88D1B22AA8B60B2D11986DE806319C1A5AAFEB348C213\nNonce: 10300000043648\n";
+
+ let pubkey =
+ PublicKey::from_base58("8kXygUHh1vLjmcRzXVM86t38EL8dfFJgfBeHmkaWLamu").unwrap();
+ let sig: super::Signature = Signature::from_base64("XDIvgPbJK02ZfMwrhrtNFmMVGhqazDBhnxPBvMXLsDgPbnh28NbUbOYIRHrsZlo/frAv/Oh0OUOQZD3JpSf8DQ==").unwrap();
+
+ let pubkey_hex = hex::encode(&pubkey.0[..]);
+ println!("{}", pubkey_hex);
+ let sig_hex = hex::encode(&sig.0[..]);
+ println!("{}", sig_hex);
+
+ assert!(pubkey.verify(message.as_bytes(), &sig).is_ok());
+ }*/
}
diff --git a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
index f79b90bc..6205fa61 100644
--- a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
+++ b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
@@ -43,7 +43,7 @@ pub enum LocalVerifyBlockError {
/// Not-genesis block specific rules
LocalVerifyNotGenesisBlockError(LocalVerifyNotGenesisBlockError),
/// Signature error
- BlockSignatureError(DocumentSigsErr),
+ _BlockSignatureError(DocumentSigsErr),
/// Identity signature error
IdentitySignatureError(DocumentSigsErr),
/// Joiner signature error
@@ -123,9 +123,10 @@ pub fn verify_local_validity_block_v10(
// As it has been checked that block.issuers.len() == 1 and as
// block.issuers.len() == block.signatures.len() is check in block.verify_signatures()
// there is no need to check that block.signatures.len() == 1
- block
- .verify_signatures()
- .map_err(LocalVerifyBlockError::BlockSignatureError)?;
+ // check bloc sig tmp disabled because #183
+ /*block
+ .verify_signatures()
+ .map_err(LocalVerifyBlockError::BlockSignatureError)?;*/
for identity in &block.identities {
identity
.verify_signatures()
--
GitLab