2020-09-22 14:53:52 +02:00
|
|
|
// Copyright 2015-2020 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of OpenEthereum.
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2020-09-22 14:53:52 +02:00
|
|
|
// OpenEthereum is free software: you can redistribute it and/or modify
|
2017-04-03 11:13:51 +02:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2020-09-22 14:53:52 +02:00
|
|
|
// OpenEthereum is distributed in the hope that it will be useful,
|
2017-04-03 11:13:51 +02:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2020-09-22 14:53:52 +02:00
|
|
|
// along with OpenEthereum. If not, see <http://www.gnu.org/licenses/>.
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2017-09-06 20:47:45 +02:00
|
|
|
use bytes::Bytes;
|
2018-03-19 06:42:40 +01:00
|
|
|
use ethereum_types::{H160, H256};
|
2017-04-03 11:13:51 +02:00
|
|
|
use ethkey::{Public, Secret, Signature};
|
2017-07-06 11:26:14 +02:00
|
|
|
use rustc_hex::{FromHex, ToHex};
|
2017-04-03 11:13:51 +02:00
|
|
|
use serde::{
|
|
|
|
de::{Error as SerdeError, Visitor},
|
|
|
|
Deserialize, Deserializer, Serialize, Serializer,
|
2020-08-05 06:08:03 +02:00
|
|
|
};
|
2017-04-03 11:13:51 +02:00
|
|
|
use std::{fmt, ops::Deref};
|
2018-05-01 15:02:14 +02:00
|
|
|
use types::Requester;
|
2017-04-08 11:26:16 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
macro_rules! impl_bytes_deserialize {
|
|
|
|
($name: ident, $value: expr, true) => {
|
|
|
|
$value[2..]
|
|
|
|
.from_hex()
|
|
|
|
.map($name)
|
|
|
|
.map_err(SerdeError::custom)
|
|
|
|
};
|
|
|
|
($name: ident, $value: expr, false) => {
|
|
|
|
$value[2..].parse().map($name).map_err(SerdeError::custom)
|
2017-04-08 11:26:16 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
macro_rules! impl_bytes {
|
|
|
|
($name: ident, $other: ident, $from_hex: ident, ($($trait: ident),*)) => {
|
|
|
|
#[derive(Clone, Debug, PartialEq, Eq, $($trait,)*)]
|
|
|
|
pub struct $name(pub $other);
|
2017-04-08 11:26:16 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl<T> From<T> for $name where $other: From<T> {
|
|
|
|
fn from(s: T) -> $name {
|
|
|
|
$name(s.into())
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
2018-03-19 06:42:40 +01:00
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl Into<$other> for $name {
|
|
|
|
fn into(self) -> $other {
|
|
|
|
self.0
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl Deref for $name {
|
|
|
|
type Target = $other;
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn deref(&self) -> &$other {
|
|
|
|
&self.0
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
2018-03-19 06:42:40 +01:00
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl Serialize for $name {
|
|
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: Serializer {
|
|
|
|
let mut serialized = "0x".to_owned();
|
|
|
|
serialized.push_str(self.0.to_hex().as_ref());
|
|
|
|
serializer.serialize_str(serialized.as_ref())
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl<'a> Deserialize<'a> for $name {
|
|
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: Deserializer<'a> {
|
|
|
|
struct HexBytesVisitor;
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl<'b> Visitor<'b> for HexBytesVisitor {
|
|
|
|
type Value = $name;
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn expecting(&self, formatter: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
write!(formatter, "a hex-encoded bytes string")
|
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn visit_str<E>(self, value: &str) -> Result<Self::Value, E> where E: SerdeError {
|
|
|
|
if value.len() >= 2 && &value[0..2] == "0x" && value.len() & 1 == 0 {
|
|
|
|
impl_bytes_deserialize!($name, value, $from_hex)
|
|
|
|
} else {
|
|
|
|
Err(SerdeError::custom("invalid format"))
|
|
|
|
}
|
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn visit_string<E>(self, value: String) -> Result<Self::Value, E> where E: SerdeError {
|
|
|
|
self.visit_str(value.as_ref())
|
|
|
|
}
|
2017-05-05 15:57:29 +02:00
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
deserializer.deserialize_any(HexBytesVisitor)
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
/// Serializable message hash.
|
|
|
|
pub type SerializableMessageHash = SerializableH256;
|
|
|
|
/// Serializable address;
|
|
|
|
pub type SerializableAddress = SerializableH160;
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable Bytes.
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(SerializableBytes, Bytes, true, (Default));
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable H256.
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(SerializableH256, H256, false, (Default, PartialOrd, Ord));
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable H160.
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(SerializableH160, H160, false, (Default));
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable H512 (aka Public).
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(
|
|
|
|
SerializablePublic,
|
|
|
|
Public,
|
|
|
|
false,
|
|
|
|
(Default, PartialOrd, Ord)
|
|
|
|
);
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable Secret.
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(SerializableSecret, Secret, false, ());
|
2020-07-29 11:06:34 +02:00
|
|
|
// Serializable Signature.
|
2018-03-19 06:42:40 +01:00
|
|
|
impl_bytes!(SerializableSignature, Signature, false, ());
|
2017-04-03 11:13:51 +02:00
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
/// Serializable shadow decryption result.
|
|
|
|
#[derive(Clone, Debug, Serialize, Deserialize)]
|
|
|
|
pub struct SerializableEncryptedDocumentKeyShadow {
|
2018-05-16 20:09:59 +02:00
|
|
|
/// Decrypted secret point. It is partially decrypted if shadow decryption was requested.
|
2018-03-19 06:42:40 +01:00
|
|
|
pub decrypted_secret: SerializablePublic,
|
|
|
|
/// Shared common point.
|
|
|
|
pub common_point: SerializablePublic,
|
|
|
|
/// If shadow decryption was requested: shadow decryption coefficients, encrypted with requestor public.
|
|
|
|
pub decrypt_shadows: Vec<SerializableBytes>,
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
/// Serializable requester identification data.
|
|
|
|
#[derive(Clone, Debug, Serialize, Deserialize)]
|
|
|
|
pub enum SerializableRequester {
|
|
|
|
/// Requested with server key id signature.
|
|
|
|
Signature(SerializableSignature),
|
|
|
|
/// Requested with public key.
|
|
|
|
Public(SerializablePublic),
|
|
|
|
/// Requested with verified address.
|
|
|
|
Address(SerializableAddress),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<SerializableRequester> for Requester {
|
|
|
|
fn from(requester: SerializableRequester) -> Requester {
|
|
|
|
match requester {
|
|
|
|
SerializableRequester::Signature(signature) => Requester::Signature(signature.into()),
|
|
|
|
SerializableRequester::Public(public) => Requester::Public(public.into()),
|
|
|
|
SerializableRequester::Address(address) => Requester::Address(address.into()),
|
|
|
|
}
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl From<Requester> for SerializableRequester {
|
|
|
|
fn from(requester: Requester) -> SerializableRequester {
|
|
|
|
match requester {
|
|
|
|
Requester::Signature(signature) => SerializableRequester::Signature(signature.into()),
|
|
|
|
Requester::Public(public) => SerializableRequester::Public(public.into()),
|
|
|
|
Requester::Address(address) => SerializableRequester::Address(address.into()),
|
2017-04-03 11:13:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-05-05 15:57:29 +02:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::{SerializableBytes, SerializablePublic};
|
|
|
|
use serde_json;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2017-05-05 15:57:29 +02:00
|
|
|
#[test]
|
|
|
|
fn serialize_and_deserialize_bytes() {
|
|
|
|
let bytes = SerializableBytes(vec![1, 2, 3, 4]);
|
|
|
|
let bytes_serialized = serde_json::to_string(&bytes).unwrap();
|
|
|
|
assert_eq!(&bytes_serialized, r#""0x01020304""#);
|
|
|
|
let bytes_deserialized: SerializableBytes =
|
|
|
|
serde_json::from_str(&bytes_serialized).unwrap();
|
|
|
|
assert_eq!(bytes_deserialized, bytes);
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2017-05-05 15:57:29 +02:00
|
|
|
#[test]
|
|
|
|
fn serialize_and_deserialize_public() {
|
|
|
|
let public = SerializablePublic("cac6c205eb06c8308d65156ff6c862c62b000b8ead121a4455a8ddeff7248128d895692136f240d5d1614dc7cc4147b1bd584bd617e30560bb872064d09ea325".parse().unwrap());
|
|
|
|
let public_serialized = serde_json::to_string(&public).unwrap();
|
|
|
|
assert_eq!(
|
|
|
|
&public_serialized,
|
|
|
|
r#""0xcac6c205eb06c8308d65156ff6c862c62b000b8ead121a4455a8ddeff7248128d895692136f240d5d1614dc7cc4147b1bd584bd617e30560bb872064d09ea325""#
|
|
|
|
);
|
|
|
|
let public_deserialized: SerializablePublic =
|
|
|
|
serde_json::from_str(&public_serialized).unwrap();
|
|
|
|
assert_eq!(public_deserialized, public);
|
|
|
|
}
|
|
|
|
}
|