From 2dde09935b80a8ef5293239801aaacbcc2151630 Mon Sep 17 00:00:00 2001 From: Nikita Strygin Date: Wed, 1 Nov 2023 13:53:05 +0300 Subject: [PATCH] [refactor] #3422: remove unused code from secp256k1 Signed-off-by: Nikita Strygin --- crypto/src/signature/secp256k1.rs | 41 +------------------------------ 1 file changed, 1 insertion(+), 40 deletions(-) diff --git a/crypto/src/signature/secp256k1.rs b/crypto/src/signature/secp256k1.rs index 09c962a6b4e..5f84b58f50e 100644 --- a/crypto/src/signature/secp256k1.rs +++ b/crypto/src/signature/secp256k1.rs @@ -1,5 +1,5 @@ // TODO: clean up & remove -#![allow(missing_docs, unused)] +#![allow(missing_docs)] use rand::rngs::OsRng; use sha2::digest::generic_array::typenum::U32; @@ -8,10 +8,7 @@ use crate::{Algorithm, Error, KeyGenOption, PrivateKey, PublicKey}; pub const PRIVATE_KEY_SIZE: usize = 32; pub const PUBLIC_KEY_SIZE: usize = 33; -pub const PUBLIC_UNCOMPRESSED_KEY_SIZE: usize = 65; -pub const SIGNATURE_POINT_SIZE: usize = 32; pub const SIGNATURE_SIZE: usize = 64; -pub const ALGORITHM_NAME: &str = "ECDSA_SECP256K1_SHA256"; const ALGORITHM: Algorithm = Algorithm::Secp256k1; @@ -47,24 +44,6 @@ impl EcdsaSecp256k1Sha256 { } } -impl EcdsaSecp256k1Sha256 { - /// Returns the compressed bytes - fn public_key_compressed(&self, pk: &PublicKey) -> Vec { - self.0.public_key_compressed(pk) - } - /// Returns the uncompressed bytes - fn public_key_uncompressed(&self, pk: &PublicKey) -> Vec { - self.0.public_key_uncompressed(pk) - } - /// Read raw bytes into key struct. Can be either compressed or uncompressed - fn parse(&self, data: &[u8]) -> Result { - self.0.parse(data) - } - fn public_key_uncompressed_size() -> usize { - PUBLIC_UNCOMPRESSED_KEY_SIZE - } -} - mod ecdsa_secp256k1 { use arrayref::array_ref; use iroha_primitives::const_vec::ConstVec; @@ -79,24 +58,6 @@ mod ecdsa_secp256k1 { pub struct EcdsaSecp256k1Impl(secp256k1::Secp256k1); impl EcdsaSecp256k1Impl { - pub fn public_key_compressed(&self, pk: &PublicKey) -> Vec { - assert_eq!(pk.digest_function, ALGORITHM); - let pk = secp256k1::PublicKey::from_slice(&pk.payload[..]).unwrap(); - pk.serialize().to_vec() - } - pub fn public_key_uncompressed(&self, pk: &PublicKey) -> Vec { - assert_eq!(pk.digest_function, ALGORITHM); - let pk = secp256k1::PublicKey::from_slice(&pk.payload[..]).unwrap(); - pk.serialize_uncompressed().to_vec() - } - pub fn parse(&self, data: &[u8]) -> Result { - let res = secp256k1::PublicKey::from_slice(data)?; - let pk = PublicKey { - digest_function: ALGORITHM, - payload: ConstVec::new(res.serialize().to_vec()), - }; - Ok(pk) - } pub fn new() -> Self { Self(secp256k1::Secp256k1::new()) }