1
0
mirror of https://github.com/vlang/v.git synced 2023-08-10 21:13:21 +03:00

vfmt: change all '$expr' to '${expr}' (#16428)

This commit is contained in:
yuyi
2022-11-15 21:53:13 +08:00
committed by GitHub
parent 56239b4a23
commit 017ace6ea7
859 changed files with 7156 additions and 7135 deletions

View File

@@ -68,7 +68,7 @@ pub fn sign(privatekey PrivateKey, message []u8) ![]u8 {
fn sign_generic(mut signature []u8, privatekey []u8, message []u8) ! {
if privatekey.len != ed25519.private_key_size {
panic('ed25519: bad private key length: $privatekey.len')
panic('ed25519: bad private key length: ${privatekey.len}')
}
seed, publickey := privatekey[..ed25519.seed_size], privatekey[ed25519.seed_size..]
@@ -110,7 +110,7 @@ fn sign_generic(mut signature []u8, privatekey []u8, message []u8) ! {
// verify reports whether sig is a valid signature of message by publickey.
pub fn verify(publickey PublicKey, message []u8, sig []u8) !bool {
if publickey.len != ed25519.public_key_size {
return error('ed25519: bad public key length: $publickey.len')
return error('ed25519: bad public key length: ${publickey.len}')
}
if sig.len != ed25519.signature_size || sig[63] & 224 != 0 {
@@ -165,7 +165,7 @@ pub fn new_key_from_seed(seed []u8) PrivateKey {
fn new_key_from_seed_generic(mut privatekey []u8, seed []u8) {
if seed.len != ed25519.seed_size {
panic('ed25519: bad seed length: $seed.len')
panic('ed25519: bad seed length: ${seed.len}')
}
mut h := sha512.sum512(seed)

View File

@@ -15,14 +15,14 @@ fn main() {
sig := ed25519.sign(priv, m)!
println('=== Message ===')
println('Msg: $msg \nHash: $m')
println('Msg: ${msg} \nHash: ${m}')
println('=== Public key ===')
println('Public key (Hex): ${hex.encode(publ)}')
println(' Public key (Base64): ${base64.encode(publ)}')
println('=== Private key ===')
println('Private key: $priv.seed().hex()') // priv[0:32]
println('Private key: ${priv.seed().hex()}') // priv[0:32]
println(' Private key (Base64): ${base64.encode(priv.seed())}') // priv[0:32]
println(' Private key (Base64) Full key: ${base64.encode(priv)}')
println(' Private key (Full key in Hex): ${hex.encode(priv)}')
@@ -34,7 +34,7 @@ fn main() {
rtn := ed25519.verify(publ, m, sig)!
if rtn {
println('Signature verified :$rtn')
println('Signature verified :${rtn}')
} else {
println('signature does not verify :${!rtn}')
}