Every user has a ed25519 keypair in oin, verifying signatures instead of username/password.
```rust use ed25519dalek::{Keypair, PublicKey, SecretKey, PUBLICKEY_LENGTH}; use oin::Identity;
fn main() { // sk is for client // id if for server let (mut id, sk) = Identity::new(); let client = Keypair { secret: SecretKey::frombytes(&sk).unwrap(), public: PublicKey::frombytes(&id.pkey).unwrap(), };
// 1. client send auth request
// 2. server receive the request and response a token
let token = Identity::token();
let sig = client.sign(&token).to_bytes();
// 3. client sign the token and send it back to the server
let dev = [0; PUBLIC_KEY_LENGTH];
assert!(id.auth(dev, token, sig).is_ok());
// 4. login successfully.
// more checks
let tk2 = Identity::token();
assert!(id.state(dev, token).is_ok());
assert!(id.update(dev, tk2).is_ok());
assert!(id.state(dev, tk2).is_ok());
} ```