1//! Digital signatures and collections of signatures.
23use ruma_common::{
4 serde::{base64::Standard, Base64},
5 AnyKeyName, IdParseError, OwnedSigningKeyId, SigningKeyAlgorithm, SigningKeyId,
6};
78/// A digital signature.
9#[derive(Clone, Debug, Eq, Hash, PartialEq)]
10pub struct Signature {
11/// The ID of the key used to generate this signature.
12pub(crate) key_id: OwnedSigningKeyId<AnyKeyName>,
1314/// The signature data.
15pub(crate) signature: Vec<u8>,
16}
1718impl Signature {
19/// Creates a signature from raw bytes.
20 ///
21 /// This constructor will ensure that the key ID has the correct `algorithm:key_name` format.
22 ///
23 /// # Parameters
24 ///
25 /// * `id`: A key identifier, e.g. `ed25519:1`.
26 /// * `bytes`: The digital signature, as a series of bytes.
27 ///
28 /// # Errors
29 ///
30 /// Returns an error if:
31 ///
32 /// * The key ID is malformed.
33pub fn new(id: &str, bytes: &[u8]) -> Result<Self, IdParseError> {
34let key_id = SigningKeyId::<AnyKeyName>::parse(id)?;
3536Ok(Self { key_id, signature: bytes.to_vec() })
37 }
3839/// The algorithm used to generate the signature.
40pub fn algorithm(&self) -> SigningKeyAlgorithm {
41self.key_id.algorithm()
42 }
4344/// The raw bytes of the signature.
45pub fn as_bytes(&self) -> &[u8] {
46self.signature.as_slice()
47 }
4849/// A base64 encoding of the signature.
50 ///
51 /// Uses the standard character set with no padding.
52pub fn base64(&self) -> String {
53 Base64::<Standard, _>::new(self.signature.as_slice()).encode()
54 }
5556/// The key identifier, a string containing the signature algorithm and the key "version"
57 /// separated by a colon, e.g. `ed25519:1`.
58pub fn id(&self) -> String {
59self.key_id.to_string()
60 }
6162/// The "version" of the key used for this signature.
63 ///
64 /// Versions are used as an identifier to distinguish signatures generated from different keys
65 /// but using the same algorithm on the same homeserver.
66pub fn version(&self) -> &str {
67self.key_id.key_name().as_ref()
68 }
69}
7071#[cfg(test)]
72mod tests {
73use ruma_common::SigningKeyAlgorithm;
7475use super::Signature;
7677#[test]
78fn valid_key_id() {
79let signature = Signature::new("ed25519:abcdef", &[]).unwrap();
80assert_eq!(signature.algorithm(), SigningKeyAlgorithm::Ed25519);
81assert_eq!(signature.version(), "abcdef");
82 }
8384#[test]
85fn unknown_key_id_algorithm() {
86let signature = Signature::new("foobar:abcdef", &[]).unwrap();
87assert_eq!(signature.algorithm().as_str(), "foobar");
88assert_eq!(signature.version(), "abcdef");
89 }
9091#[test]
92fn invalid_key_id_format() {
93 Signature::new("ed25519", &[]).unwrap_err();
94 }
95}