-
Notifications
You must be signed in to change notification settings - Fork 1.7k
/
solana_keyring.go
90 lines (74 loc) · 2.78 KB
/
solana_keyring.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
package ocr2key
import (
"bytes"
"crypto/ecdsa"
"crypto/sha256"
"io"
"github.com/ethereum/go-ethereum/crypto"
"github.com/pkg/errors"
"github.com/smartcontractkit/libocr/offchainreporting2/types"
"github.com/smartcontractkit/libocr/offchainreporting2plus/chains/evmutil"
ocrtypes "github.com/smartcontractkit/libocr/offchainreporting2plus/types"
)
var _ ocrtypes.OnchainKeyring = &solanaKeyring{}
type solanaKeyring struct {
privateKey ecdsa.PrivateKey
}
func newSolanaKeyring(material io.Reader) (*solanaKeyring, error) {
ecdsaKey, err := ecdsa.GenerateKey(curve, material)
if err != nil {
return nil, err
}
return &solanaKeyring{privateKey: *ecdsaKey}, nil
}
// XXX: PublicKey returns the evm-style address of the public key not the public key itself
func (skr *solanaKeyring) PublicKey() ocrtypes.OnchainPublicKey {
address := crypto.PubkeyToAddress(*(&skr.privateKey).Public().(*ecdsa.PublicKey))
return address[:]
}
func (skr *solanaKeyring) reportToSigData(reportCtx ocrtypes.ReportContext, report ocrtypes.Report) []byte {
rawReportContext := evmutil.RawReportContext(reportCtx)
h := sha256.New()
h.Write([]byte{uint8(len(report))})
h.Write(report)
h.Write(rawReportContext[0][:])
h.Write(rawReportContext[1][:])
h.Write(rawReportContext[2][:])
return h.Sum(nil)
}
func (skr *solanaKeyring) Sign(reportCtx ocrtypes.ReportContext, report ocrtypes.Report) ([]byte, error) {
return skr.signBlob(skr.reportToSigData(reportCtx, report))
}
func (skr *solanaKeyring) Sign3(digest types.ConfigDigest, seqNr uint64, r ocrtypes.Report) (signature []byte, err error) {
return nil, errors.New("not implemented")
}
func (skr *solanaKeyring) signBlob(b []byte) (sig []byte, err error) {
return crypto.Sign(b, &skr.privateKey)
}
func (skr *solanaKeyring) Verify(publicKey ocrtypes.OnchainPublicKey, reportCtx ocrtypes.ReportContext, report ocrtypes.Report, signature []byte) bool {
hash := skr.reportToSigData(reportCtx, report)
return skr.verifyBlob(publicKey, hash, signature)
}
func (skr *solanaKeyring) Verify3(publicKey ocrtypes.OnchainPublicKey, cd ocrtypes.ConfigDigest, seqNr uint64, r ocrtypes.Report, signature []byte) bool {
return false
}
func (skr *solanaKeyring) verifyBlob(pubkey types.OnchainPublicKey, b, sig []byte) bool {
authorPubkey, err := crypto.SigToPub(b, sig)
if err != nil {
return false
}
authorAddress := crypto.PubkeyToAddress(*authorPubkey)
// no need for constant time compare since neither arg is sensitive
return bytes.Equal(pubkey[:], authorAddress[:])
}
func (skr *solanaKeyring) MaxSignatureLength() int {
return 65
}
func (skr *solanaKeyring) Marshal() ([]byte, error) {
return crypto.FromECDSA(&skr.privateKey), nil
}
func (skr *solanaKeyring) Unmarshal(in []byte) error {
privateKey, err := crypto.ToECDSA(in)
skr.privateKey = *privateKey
return err
}