161 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			161 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2018 The go-ethereum Authors
 | |
| // This file is part of the go-ethereum library.
 | |
| //
 | |
| // The go-ethereum library is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Lesser General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // The go-ethereum library is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | |
| // GNU Lesser General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Lesser General Public License
 | |
| // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package enode
 | |
| 
 | |
| import (
 | |
| 	"crypto/ecdsa"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 
 | |
| 	"github.com/ethereum/go-ethereum/common/math"
 | |
| 	"github.com/ethereum/go-ethereum/crypto"
 | |
| 	"github.com/ethereum/go-ethereum/p2p/enr"
 | |
| 	"github.com/ethereum/go-ethereum/rlp"
 | |
| 	"golang.org/x/crypto/sha3"
 | |
| )
 | |
| 
 | |
| // List of known secure identity schemes.
 | |
| var ValidSchemes = enr.SchemeMap{
 | |
| 	"v4": V4ID{},
 | |
| }
 | |
| 
 | |
| var ValidSchemesForTesting = enr.SchemeMap{
 | |
| 	"v4":   V4ID{},
 | |
| 	"null": NullID{},
 | |
| }
 | |
| 
 | |
| // v4ID is the "v4" identity scheme.
 | |
| type V4ID struct{}
 | |
| 
 | |
| // SignV4 signs a record using the v4 scheme.
 | |
| func SignV4(r *enr.Record, privkey *ecdsa.PrivateKey) error {
 | |
| 	// Copy r to avoid modifying it if signing fails.
 | |
| 	cpy := *r
 | |
| 	cpy.Set(enr.ID("v4"))
 | |
| 	cpy.Set(Secp256k1(privkey.PublicKey))
 | |
| 
 | |
| 	h := sha3.NewLegacyKeccak256()
 | |
| 	rlp.Encode(h, cpy.AppendElements(nil))
 | |
| 	sig, err := crypto.Sign(h.Sum(nil), privkey)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	sig = sig[:len(sig)-1] // remove v
 | |
| 	if err = cpy.SetSig(V4ID{}, sig); err == nil {
 | |
| 		*r = cpy
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| func (V4ID) Verify(r *enr.Record, sig []byte) error {
 | |
| 	var entry s256raw
 | |
| 	if err := r.Load(&entry); err != nil {
 | |
| 		return err
 | |
| 	} else if len(entry) != 33 {
 | |
| 		return fmt.Errorf("invalid public key")
 | |
| 	}
 | |
| 
 | |
| 	h := sha3.NewLegacyKeccak256()
 | |
| 	rlp.Encode(h, r.AppendElements(nil))
 | |
| 	if !crypto.VerifySignature(entry, h.Sum(nil), sig) {
 | |
| 		return enr.ErrInvalidSig
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (V4ID) NodeAddr(r *enr.Record) []byte {
 | |
| 	var pubkey Secp256k1
 | |
| 	err := r.Load(&pubkey)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	buf := make([]byte, 64)
 | |
| 	math.ReadBits(pubkey.X, buf[:32])
 | |
| 	math.ReadBits(pubkey.Y, buf[32:])
 | |
| 	return crypto.Keccak256(buf)
 | |
| }
 | |
| 
 | |
| // Secp256k1 is the "secp256k1" key, which holds a public key.
 | |
| type Secp256k1 ecdsa.PublicKey
 | |
| 
 | |
| func (v Secp256k1) ENRKey() string { return "secp256k1" }
 | |
| 
 | |
| // EncodeRLP implements rlp.Encoder.
 | |
| func (v Secp256k1) EncodeRLP(w io.Writer) error {
 | |
| 	return rlp.Encode(w, crypto.CompressPubkey((*ecdsa.PublicKey)(&v)))
 | |
| }
 | |
| 
 | |
| // DecodeRLP implements rlp.Decoder.
 | |
| func (v *Secp256k1) DecodeRLP(s *rlp.Stream) error {
 | |
| 	buf, err := s.Bytes()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	pk, err := crypto.DecompressPubkey(buf)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	*v = (Secp256k1)(*pk)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // s256raw is an unparsed secp256k1 public key entry.
 | |
| type s256raw []byte
 | |
| 
 | |
| func (s256raw) ENRKey() string { return "secp256k1" }
 | |
| 
 | |
| // v4CompatID is a weaker and insecure version of the "v4" scheme which only checks for the
 | |
| // presence of a secp256k1 public key, but doesn't verify the signature.
 | |
| type v4CompatID struct {
 | |
| 	V4ID
 | |
| }
 | |
| 
 | |
| func (v4CompatID) Verify(r *enr.Record, sig []byte) error {
 | |
| 	var pubkey Secp256k1
 | |
| 	return r.Load(&pubkey)
 | |
| }
 | |
| 
 | |
| func signV4Compat(r *enr.Record, pubkey *ecdsa.PublicKey) {
 | |
| 	r.Set((*Secp256k1)(pubkey))
 | |
| 	if err := r.SetSig(v4CompatID{}, []byte{}); err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // NullID is the "null" ENR identity scheme. This scheme stores the node
 | |
| // ID in the record without any signature.
 | |
| type NullID struct{}
 | |
| 
 | |
| func (NullID) Verify(r *enr.Record, sig []byte) error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (NullID) NodeAddr(r *enr.Record) []byte {
 | |
| 	var id ID
 | |
| 	r.Load(enr.WithEntry("nulladdr", &id))
 | |
| 	return id[:]
 | |
| }
 | |
| 
 | |
| func SignNull(r *enr.Record, id ID) *Node {
 | |
| 	r.Set(enr.ID("null"))
 | |
| 	r.Set(enr.WithEntry("nulladdr", id))
 | |
| 	if err := r.SetSig(NullID{}, []byte{}); err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 	return &Node{r: *r, id: id}
 | |
| }
 |