0d03f2fbb5
* Send bandwidth alloc from satellite to storage node * Remove unecessary nil checks * set Renter field * fix tests * goimports * Update README.md * Update README.md * Update README.md * Update README.md (#550) * Skip flaky TestPing (#552)
80 lines
2.1 KiB
Go
80 lines
2.1 KiB
Go
// Copyright (C) 2018 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package auth
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
|
|
"github.com/gtank/cryptopasta"
|
|
|
|
"storj.io/storj/pkg/pb"
|
|
"storj.io/storj/pkg/peertls"
|
|
"storj.io/storj/pkg/provider"
|
|
)
|
|
|
|
// GenerateSignature creates signature from identity id
|
|
func GenerateSignature(data []byte, identity *provider.FullIdentity) ([]byte, error) {
|
|
if len(data) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
k, ok := identity.Key.(*ecdsa.PrivateKey)
|
|
if !ok {
|
|
return nil, peertls.ErrUnsupportedKey.New("%T", identity.Key)
|
|
}
|
|
signature, err := cryptopasta.Sign(data, k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return signature, nil
|
|
}
|
|
|
|
// NewSignedMessage creates instance of signed message
|
|
func NewSignedMessage(signature []byte, identity *provider.PeerIdentity) (*pb.SignedMessage, error) {
|
|
k, ok := identity.Leaf.PublicKey.(*ecdsa.PublicKey)
|
|
if !ok {
|
|
return nil, peertls.ErrUnsupportedKey.New("%T", identity.Leaf.PublicKey)
|
|
}
|
|
|
|
encodedKey, err := cryptopasta.EncodePublicKey(k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &pb.SignedMessage{
|
|
Data: identity.ID.Bytes(),
|
|
Signature: signature,
|
|
PublicKey: encodedKey,
|
|
}, nil
|
|
}
|
|
|
|
// SignedMessageVerifier checks if provided signed message can be verified
|
|
type SignedMessageVerifier func(signature *pb.SignedMessage) error
|
|
|
|
// NewSignedMessageVerifier creates default implementation of SignedMessageVerifier
|
|
func NewSignedMessageVerifier() SignedMessageVerifier {
|
|
return func(signedMessage *pb.SignedMessage) error {
|
|
if signedMessage == nil {
|
|
return Error.New("no message to verify")
|
|
}
|
|
if signedMessage.Signature == nil {
|
|
return Error.New("missing signature for verification")
|
|
}
|
|
if signedMessage.Data == nil {
|
|
return Error.New("missing data for verification")
|
|
}
|
|
if signedMessage.PublicKey == nil {
|
|
return Error.New("missing public key for verification")
|
|
}
|
|
|
|
k, err := cryptopasta.DecodePublicKey(signedMessage.GetPublicKey())
|
|
if err != nil {
|
|
return Error.Wrap(err)
|
|
}
|
|
if ok := cryptopasta.Verify(signedMessage.GetData(), signedMessage.GetSignature(), k); !ok {
|
|
return Error.New("failed to verify message")
|
|
}
|
|
return nil
|
|
}
|
|
}
|