/
signed_ssv_msg.go
125 lines (104 loc) · 3.13 KB
/
signed_ssv_msg.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
package testingutils
import (
"crypto"
"crypto/rand"
"crypto/rsa"
"crypto/sha256"
"github.com/bloxapp/ssv-spec/qbft"
"github.com/bloxapp/ssv-spec/types"
"github.com/herumi/bls-eth-go-binary/bls"
)
var TestingSignedSSVMessageSignature = [256]byte{1, 2, 3, 4}
var TestingMessageID = types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleAttester)
var TestingSignedSSVMessage = func(sk *bls.SecretKey, operatorID types.OperatorID, rsaSK *rsa.PrivateKey) *types.SignedSSVMessage {
// SignedPartialSigMessage
signedPartialSig := PreConsensusSelectionProofMsg(sk, sk, operatorID, operatorID)
signedPartialSigByts, err := signedPartialSig.Encode()
if err != nil {
panic(err.Error())
}
// SSVMessage
ssvMsg := types.SSVMessage{
MsgType: types.SSVPartialSignatureMsgType,
MsgID: TestingMessageID,
Data: signedPartialSigByts[:],
}
ssvMsgByts, err := ssvMsg.Encode()
if err != nil {
panic(err.Error())
}
// Sign message
hash := sha256.Sum256(ssvMsgByts)
signature, err := rsa.SignPKCS1v15(nil, rsaSK, crypto.SHA256, hash[:])
if err != nil {
panic(err.Error())
}
sig := [256]byte{}
copy(sig[:], signature)
//SignedSSVMessage
return &types.SignedSSVMessage{
OperatorID: operatorID,
Signature: sig,
Data: ssvMsgByts,
}
}
var SignedSSVMessageListF = func(ks *TestKeySet, ssvMessages []*types.SSVMessage) []*types.SignedSSVMessage {
ret := make([]*types.SignedSSVMessage, 0)
for _, msg := range ssvMessages {
ret = append(ret, SignedSSVMessageF(ks, msg))
}
return ret
}
var SignedSSVMessageF = func(ks *TestKeySet, msg *types.SSVMessage) *types.SignedSSVMessage {
// Discover message's signer
signer := types.OperatorID(1)
if msg.MsgType == types.SSVConsensusMsgType {
signedMsg := &qbft.SignedMessage{}
if err := signedMsg.Decode(msg.Data); err != nil {
panic(err)
}
signer = signedMsg.Signers[0]
} else if msg.MsgType == types.SSVPartialSignatureMsgType {
signedPartial := &types.SignedPartialSignatureMessage{}
if err := signedPartial.Decode(msg.Data); err != nil {
panic(err)
}
signer = signedPartial.Signer
} else {
panic("unknown type")
}
// Convert SSVMessage to SignedSSVMessage
return SignedSSVMessageWithSigner(signer, ks.OperatorKeys[signer], msg)
}
var SignedSSVMessageOnData = func(operatorID types.OperatorID, rsaSK *rsa.PrivateKey, data []byte) *types.SignedSSVMessage {
hash := sha256.Sum256(data)
signature, err := rsa.SignPKCS1v15(rand.Reader, rsaSK, crypto.SHA256, hash[:])
if err != nil {
panic(err)
}
sig := [256]byte{}
copy(sig[:], signature)
return &types.SignedSSVMessage{
OperatorID: operatorID,
Signature: sig,
Data: data,
}
}
var SignedSSVMessageWithSigner = func(operatorID types.OperatorID, rsaSK *rsa.PrivateKey, ssvMessage *types.SSVMessage) *types.SignedSSVMessage {
data, err := ssvMessage.Encode()
if err != nil {
panic(err)
}
hash := sha256.Sum256(data)
signature, err := rsa.SignPKCS1v15(rand.Reader, rsaSK, crypto.SHA256, hash[:])
if err != nil {
panic(err)
}
sig := [256]byte{}
copy(sig[:], signature)
return &types.SignedSSVMessage{
OperatorID: operatorID,
Signature: sig,
Data: data,
}
}