2019-07-24 05:38:16 +00:00
|
|
|
package types
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
|
|
|
|
2019-08-14 04:43:29 +00:00
|
|
|
bls "github.com/filecoin-project/go-bls-sigs"
|
2019-07-24 05:38:16 +00:00
|
|
|
"github.com/filecoin-project/go-lotus/chain/address"
|
|
|
|
"github.com/filecoin-project/go-lotus/lib/crypto"
|
|
|
|
cbor "github.com/ipfs/go-ipld-cbor"
|
|
|
|
"github.com/minio/blake2b-simd"
|
|
|
|
"github.com/polydawn/refmt/obj/atlas"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
KTSecp256k1 = "secp256k1"
|
|
|
|
KTBLS = "bls"
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
cbor.RegisterCborType(atlas.BuildEntry(Signature{}).Transform().
|
|
|
|
TransformMarshal(atlas.MakeMarshalTransformFunc(
|
|
|
|
func(s Signature) ([]byte, error) {
|
|
|
|
buf := make([]byte, 4)
|
|
|
|
n := binary.PutUvarint(buf, uint64(s.TypeCode()))
|
|
|
|
return append(buf[:n], s.Data...), nil
|
|
|
|
})).
|
|
|
|
TransformUnmarshal(atlas.MakeUnmarshalTransformFunc(
|
|
|
|
func(x []byte) (Signature, error) {
|
|
|
|
return SignatureFromBytes(x)
|
|
|
|
})).
|
|
|
|
Complete())
|
|
|
|
}
|
|
|
|
|
|
|
|
type Signature struct {
|
|
|
|
Type string
|
|
|
|
Data []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
func SignatureFromBytes(x []byte) (Signature, error) {
|
|
|
|
val, nr := binary.Uvarint(x)
|
|
|
|
if nr != 1 {
|
|
|
|
return Signature{}, fmt.Errorf("signatures with type field longer than one byte are invalid")
|
|
|
|
}
|
|
|
|
var ts string
|
|
|
|
switch val {
|
|
|
|
case 1:
|
|
|
|
ts = KTSecp256k1
|
2019-08-14 04:43:29 +00:00
|
|
|
case 2:
|
|
|
|
ts = KTBLS
|
2019-07-24 05:38:16 +00:00
|
|
|
default:
|
|
|
|
return Signature{}, fmt.Errorf("unsupported signature type: %d", val)
|
|
|
|
}
|
|
|
|
|
|
|
|
return Signature{
|
|
|
|
Type: ts,
|
|
|
|
Data: x[1:],
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Signature) Verify(addr address.Address, msg []byte) error {
|
2019-08-14 04:43:29 +00:00
|
|
|
if addr.Protocol() == address.ID {
|
|
|
|
return fmt.Errorf("must resolve ID addresses before using them to verify a signature")
|
|
|
|
}
|
2019-07-24 05:38:16 +00:00
|
|
|
b2sum := blake2b.Sum256(msg)
|
|
|
|
|
|
|
|
switch s.Type {
|
|
|
|
case KTSecp256k1:
|
|
|
|
pubk, err := crypto.EcRecover(b2sum[:], s.Data)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
maybeaddr, err := address.NewSecp256k1Address(pubk)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if addr != maybeaddr {
|
|
|
|
return fmt.Errorf("signature did not match")
|
|
|
|
}
|
|
|
|
|
2019-08-14 04:43:29 +00:00
|
|
|
return nil
|
|
|
|
case KTBLS:
|
|
|
|
digests := []bls.Digest{bls.Hash(bls.Message(msg))}
|
|
|
|
|
|
|
|
var pubk bls.PublicKey
|
|
|
|
copy(pubk[:], addr.Payload())
|
|
|
|
pubkeys := []bls.PublicKey{pubk}
|
|
|
|
|
|
|
|
var sig bls.Signature
|
|
|
|
copy(sig[:], s.Data)
|
|
|
|
|
|
|
|
if !bls.Verify(sig, digests, pubkeys) {
|
|
|
|
return fmt.Errorf("bls signature failed to verify")
|
|
|
|
}
|
|
|
|
|
2019-07-24 05:38:16 +00:00
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("cannot verify signature of unsupported type: %s", s.Type)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Signature) TypeCode() int {
|
|
|
|
switch s.Type {
|
|
|
|
case KTSecp256k1:
|
|
|
|
return 1
|
|
|
|
case KTBLS:
|
|
|
|
return 2
|
|
|
|
default:
|
|
|
|
panic("unsupported signature type")
|
|
|
|
}
|
|
|
|
}
|