secret.rs 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. //! Secret
  2. use std::fmt;
  3. use std::str::FromStr;
  4. use bitcoin::secp256k1::rand::{self, RngCore};
  5. use serde::{Deserialize, Serialize};
  6. use thiserror::Error;
  7. use zeroize::Zeroize;
  8. use crate::util::hex;
  9. /// The secret data that allows spending ecash
  10. #[derive(Debug, Clone, PartialEq, Eq, Hash, PartialOrd, Ord, Serialize, Deserialize)]
  11. #[serde(transparent)]
  12. pub struct Secret(String);
  13. /// Secret Errors
  14. #[derive(Debug, Error)]
  15. pub enum Error {
  16. /// Invalid Length
  17. #[error("Invalid secret length: `{0}`")]
  18. InvalidLength(u64),
  19. /// Hex Error
  20. #[error(transparent)]
  21. Hex(#[from] hex::Error),
  22. /// Serde Json error
  23. #[error(transparent)]
  24. SerdeJsonError(#[from] serde_json::Error),
  25. }
  26. impl Default for Secret {
  27. fn default() -> Self {
  28. Self::generate()
  29. }
  30. }
  31. impl Secret {
  32. /// Create new [`Secret`]
  33. #[inline]
  34. pub fn new<S>(secret: S) -> Self
  35. where
  36. S: Into<String>,
  37. {
  38. Self(secret.into())
  39. }
  40. /// Create secret value
  41. /// Generate a new random secret as the recommended 32 byte hex
  42. pub fn generate() -> Self {
  43. let mut rng = rand::thread_rng();
  44. let mut random_bytes = [0u8; 32];
  45. // Generate random bytes
  46. rng.fill_bytes(&mut random_bytes);
  47. // The secret string is hex encoded
  48. let secret = hex::encode(random_bytes);
  49. Self(secret)
  50. }
  51. /// [`Secret`] as bytes
  52. #[inline]
  53. pub fn as_bytes(&self) -> &[u8] {
  54. self.0.as_bytes()
  55. }
  56. /// [`Secret`] to bytes
  57. #[inline]
  58. pub fn to_bytes(&self) -> Vec<u8> {
  59. self.as_bytes().to_vec()
  60. }
  61. /// Check if secret is P2PK secret
  62. pub fn is_p2pk(&self) -> bool {
  63. use crate::nuts::Kind;
  64. let secret: Result<crate::nuts::nut10::Secret, serde_json::Error> =
  65. serde_json::from_str(&self.0);
  66. if let Ok(secret) = secret {
  67. if secret.kind().eq(&Kind::P2PK) {
  68. return true;
  69. }
  70. }
  71. false
  72. }
  73. }
  74. impl FromStr for Secret {
  75. type Err = Error;
  76. fn from_str(s: &str) -> Result<Self, Self::Err> {
  77. Ok(Self(s.to_string()))
  78. }
  79. }
  80. impl fmt::Display for Secret {
  81. fn fmt(&self, f: &mut fmt::Formatter<'_>) -> std::fmt::Result {
  82. write!(f, "{}", self.0)
  83. }
  84. }
  85. impl From<Secret> for Vec<u8> {
  86. fn from(value: Secret) -> Vec<u8> {
  87. value.to_bytes()
  88. }
  89. }
  90. impl From<&Secret> for Vec<u8> {
  91. fn from(value: &Secret) -> Vec<u8> {
  92. value.to_bytes()
  93. }
  94. }
  95. impl TryFrom<Secret> for crate::nuts::nut10::Secret {
  96. type Error = serde_json::Error;
  97. fn try_from(unchecked_secret: Secret) -> Result<crate::nuts::nut10::Secret, Self::Error> {
  98. serde_json::from_str(&unchecked_secret.0)
  99. }
  100. }
  101. impl Drop for Secret {
  102. fn drop(&mut self) {
  103. self.0.zeroize();
  104. }
  105. }
  106. impl TryFrom<&Secret> for crate::nuts::nut10::Secret {
  107. type Error = Error;
  108. fn try_from(unchecked_secret: &Secret) -> Result<crate::nuts::nut10::Secret, Self::Error> {
  109. Ok(serde_json::from_str(&unchecked_secret.0)?)
  110. }
  111. }
  112. #[cfg(test)]
  113. mod tests {
  114. use std::assert_eq;
  115. use std::str::FromStr;
  116. use super::*;
  117. #[test]
  118. fn test_secret_from_str() {
  119. let secret = Secret::generate();
  120. let secret_str = secret.to_string();
  121. assert_eq!(hex::decode(secret_str.clone()).unwrap().len(), 32);
  122. let secret_n = Secret::from_str(&secret_str).unwrap();
  123. assert_eq!(secret_n, secret)
  124. }
  125. }