cdf3812e40
Co-authored-by: Steven Allen <steven@stebalien.com> Co-authored-by: Raul Kripalani <raulk@users.noreply.github.com> Co-authored-by: Kevin Li <ychiaoli18@users.noreply.github.com> Co-authored-by: vyzo <vyzo@hackzen.org> Co-authored-by: Ian Davis <nospam@iandavis.com> Co-authored-by: Aayush Rajasekaran <arajasek94@gmail.com> Co-authored-by: Jiaying Wang <42981373+jennijuju@users.noreply.github.com> Co-authored-by: Jennifer Wang <jiayingw703@gmail.com> Co-authored-by: Geoff Stuart <geoff.vball@gmail.com> Co-authored-by: Shrenuj Bansal <shrenuj.bansal@protocol.ai> Co-authored-by: Shrenuj Bansal <108157875+shrenujbansal@users.noreply.github.com> Co-authored-by: Geoff Stuart <geoffrey.stuart@protocol.ai> Co-authored-by: Aayush Rajasekaran <aayushrajasekaran@Aayushs-MacBook-Pro.local> Co-authored-by: ZenGround0 <5515260+ZenGround0@users.noreply.github.com> Co-authored-by: zenground0 <ZenGround0@users.noreply.github.com>
54 lines
1.7 KiB
Go
54 lines
1.7 KiB
Go
package chain
|
|
|
|
import (
|
|
"golang.org/x/xerrors"
|
|
|
|
"github.com/filecoin-project/go-address"
|
|
"github.com/filecoin-project/go-state-types/crypto"
|
|
"github.com/filecoin-project/go-state-types/network"
|
|
|
|
"github.com/filecoin-project/lotus/chain/types"
|
|
"github.com/filecoin-project/lotus/chain/types/ethtypes"
|
|
"github.com/filecoin-project/lotus/lib/sigs"
|
|
)
|
|
|
|
// AuthenticateMessage authenticates the message by verifying that the supplied
|
|
// SignedMessage was signed by the indicated Address, computing the correct
|
|
// signature payload depending on the signature type. The supplied Address type
|
|
// must be recognized by the registered verifier for the signature type.
|
|
func AuthenticateMessage(msg *types.SignedMessage, signer address.Address) error {
|
|
var digest []byte
|
|
|
|
typ := msg.Signature.Type
|
|
switch typ {
|
|
case crypto.SigTypeDelegated:
|
|
txArgs, err := ethtypes.NewEthTxArgsFromMessage(&msg.Message)
|
|
if err != nil {
|
|
return xerrors.Errorf("failed to reconstruct eth transaction: %w", err)
|
|
}
|
|
msg, err := txArgs.ToRlpUnsignedMsg()
|
|
if err != nil {
|
|
return xerrors.Errorf("failed to repack eth rlp message: %w", err)
|
|
}
|
|
digest = msg
|
|
default:
|
|
digest = msg.Message.Cid().Bytes()
|
|
}
|
|
|
|
if err := sigs.Verify(&msg.Signature, signer, digest); err != nil {
|
|
return xerrors.Errorf("message %s has invalid signature (type %d): %w", msg.Cid(), typ, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// IsValidSecpkSigType checks that a signature type is valid for the network
|
|
// version, for a "secpk" message.
|
|
func IsValidSecpkSigType(nv network.Version, typ crypto.SigType) bool {
|
|
switch {
|
|
case nv < network.Version18:
|
|
return typ == crypto.SigTypeSecp256k1
|
|
default:
|
|
return typ == crypto.SigTypeSecp256k1 || typ == crypto.SigTypeDelegated
|
|
}
|
|
}
|