From 11278926bf2abef29e96d6da3e20bf766bb48db1 Mon Sep 17 00:00:00 2001 From: Hatter Jiang Date: Sat, 14 Oct 2023 00:30:18 +0800 Subject: [PATCH] feat: upate ed25519 verify --- __crypto/curve25519/src/main.rs | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/__crypto/curve25519/src/main.rs b/__crypto/curve25519/src/main.rs index 022bd6b..1229270 100644 --- a/__crypto/curve25519/src/main.rs +++ b/__crypto/curve25519/src/main.rs @@ -52,8 +52,10 @@ fn main() { println!("New&card shared secret: {}", hex::encode(new_card_shared_secret.as_bytes())); println!("{}", "-".repeat(88)); + // $ cargo r -- pgp-card-sign -2 1dc91001cb69b0dbfab0347d684d7551227484f57a5ac414680414b855051159 --algo eddsa + // [OK ] User sign pin verify success! + // [OK ] SHA256 signature HEX: 4b2355918b92ca8e5490a30775aa4603a76efe344e3eecfd888b10018a5cb86d3d7095c298b34b39c4e1d46841098dd2514101a9eba5b7a271cf9b5c9d078306 let public_key_bytes = hex::decode("d57a081448c6d3d6076b1cca0216f319e45cc2ad986541caf0d3d62f5b318263").unwrap(); - // let public_key_bytes: [u8; 32] = public_key_bytes.try_into().unwrap(); let public_key_card = EdPublicKey::from_bytes(&public_key_bytes).unwrap(); let message = hex::decode("1dc91001cb69b0dbfab0347d684d7551227484f57a5ac414680414b855051159").unwrap(); let signature = hex::decode("4b2355918b92ca8e5490a30775aa4603a76efe344e3eecfd888b10018a5cb86d3d7095c298b34b39c4e1d46841098dd2514101a9eba5b7a271cf9b5c9d078306").unwrap();