99075ad22a
* whisper skeleton * basic message store * rallying and message logic * pass host info to network protocol handlers * choose who starts rally based on node key * module reshuffling * mining messages * prune messages by low PoW until below size target * associated error type for ethkey generators and `OsRng` generator * beginnings of RPC * generic message handler for whisper * reshuffle code order * standard payload encoding and decoding * basic crypto * minor restructuring of net code * implement shh_post * merge? * implement filters * rand trait for hash types * filter RPCs for whisper * symmetric encryption of payload * pub-sub * filter tests * use only secure random IDs * attach arbitrary protocols to network * basic integration of whisper into Parity * eagerly prune low PoW entries * broadcast messages with salted topics * node info RPC * fix import * fix leading zeros calculation * address minor grumbles
66 lines
1.7 KiB
Rust
66 lines
1.7 KiB
Rust
// Copyright 2015-2017 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use keccak::Keccak256;
|
|
use super::{KeyPair, Generator, Secret};
|
|
|
|
/// Simple brainwallet.
|
|
pub struct Brain(String);
|
|
|
|
impl Brain {
|
|
pub fn new(s: String) -> Self {
|
|
Brain(s)
|
|
}
|
|
}
|
|
|
|
impl Generator for Brain {
|
|
type Error = ::Void;
|
|
|
|
fn generate(self) -> Result<KeyPair, Self::Error> {
|
|
let seed = self.0;
|
|
let mut secret = seed.into_bytes().keccak256();
|
|
|
|
let mut i = 0;
|
|
loop {
|
|
secret = secret.keccak256();
|
|
|
|
match i > 16384 {
|
|
false => i += 1,
|
|
true => {
|
|
if let Ok(pair) = Secret::from_unsafe_slice(&secret)
|
|
.and_then(KeyPair::from_secret)
|
|
{
|
|
if pair.address()[0] == 0 { return Ok(pair) }
|
|
}
|
|
},
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use {Brain, Generator};
|
|
|
|
#[test]
|
|
fn test_brain() {
|
|
let words = "this is sparta!".to_owned();
|
|
let first_keypair = Brain::new(words.clone()).generate().unwrap();
|
|
let second_keypair = Brain::new(words.clone()).generate().unwrap();
|
|
assert_eq!(first_keypair.secret(), second_keypair.secret());
|
|
}
|
|
}
|