-
Notifications
You must be signed in to change notification settings - Fork 672
/
claimed_ip_port.go
44 lines (38 loc) · 1.26 KB
/
claimed_ip_port.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
// Copyright (C) 2019-2022, Ava Labs, Inc. All rights reserved.
// See the file LICENSE for licensing terms.
package ips
import (
"crypto/x509"
"github.com/ava-labs/avalanchego/ids"
)
// Can't import these from wrappers package due to circular import.
const (
intLen = 4
longLen = 8
ipLen = 18
idLen = 32
// Certificate length, signature length, IP, timestamp, tx ID
baseIPCertDescLen = 2*intLen + ipLen + longLen + idLen
)
// A self contained proof that a peer is claiming ownership of an IPPort at a
// given time.
type ClaimedIPPort struct {
// The peer's certificate.
Cert *x509.Certificate
// The peer's claimed IP and port.
IPPort IPPort
// The time the peer claimed to own this IP and port.
Timestamp uint64
// [Cert]'s signature over the IPPort and timestamp.
// This is used in the networking library to ensure that this IPPort was
// actually claimed by the peer in question, and not by a malicious peer
// trying to get us to dial bogus IPPorts.
Signature []byte
// The txID that added this peer into the validator set
TxID ids.ID
}
// Returns the length of the byte representation of this ClaimedIPPort.
func (i *ClaimedIPPort) BytesLen() int {
// See wrappers.PackPeerTrackInfo.
return baseIPCertDescLen + len(i.Cert.Raw) + len(i.Signature)
}