1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
// Copyright (C) 2023 Entropy Cryptography Inc.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
use crate::SessionId;
use serde::{Deserialize, Serialize};
use sp_core::{sr25519, Pair};
use subxt::utils::AccountId32;
/// A message sent by a party when initiating a websocket connection to participate
/// in the signing or DKG protcol
#[derive(Debug, Clone, Serialize, Deserialize)]
#[cfg_attr(test, derive(PartialEq, Eq))]
pub struct SubscribeMessage {
/// Protocol session identifier
pub session_id: SessionId,
/// Public key of connecting party
pub public_key: sr25519::Public,
/// Signature to authenticate connecting party
pub signature: sr25519::Signature,
}
impl SubscribeMessage {
pub fn new(session_id: SessionId, pair: &sr25519::Pair) -> Result<Self, bincode::Error> {
let session_id_serialized = bincode::serialize(&session_id)?;
let signature = pair.sign(&session_id_serialized);
Ok(Self { session_id, public_key: pair.public(), signature })
}
pub fn account_id(&self) -> AccountId32 {
self.public_key.0.into()
}
pub fn verify(&self) -> Result<bool, bincode::Error> {
let session_id_serialized = bincode::serialize(&self.session_id)?;
Ok(sr25519::Pair::verify(&self.signature, session_id_serialized, &self.public_key))
}
}