1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
use crate::constants::DID_SOL_PREFIX;
use crate::{id, DID_ACCOUNT_SEED};
use anchor_lang::prelude::{Error, ErrorCode};
use solana_program::keccak;
use solana_program::pubkey::Pubkey;
use solana_program::secp256k1_recover::{
secp256k1_recover, Secp256k1Pubkey, Secp256k1RecoverError,
};
pub fn convert_secp256k1pub_key_to_address(pubkey: &Secp256k1Pubkey) -> [u8; 20] {
let mut address = [0u8; 20];
address.copy_from_slice(&keccak::hash(pubkey.to_bytes().as_ref()).to_bytes()[12..]);
address
}
pub fn is_did_sol_prefix(did: &str) -> bool {
did.starts_with(DID_SOL_PREFIX)
}
pub fn check_other_controllers(controllers: &[String]) -> bool {
controllers.iter().all(|did| !is_did_sol_prefix(did))
}
pub fn eth_verify_message(
message: &[u8],
nonce: u64,
signature: [u8; 64],
recovery_id: u8,
) -> Result<Secp256k1Pubkey, Secp256k1RecoverError> {
let message_with_nonce = [message, nonce.to_le_bytes().as_ref()].concat();
let sign_message_input = [
"\x19Ethereum Signed Message:\n".as_bytes(),
message_with_nonce.len().to_string().as_bytes(),
message_with_nonce.as_ref(),
]
.concat();
let hash = keccak::hash(sign_message_input.as_ref());
let secp256k1_pubkey = secp256k1_recover(hash.as_ref(), recovery_id, signature.as_ref());
secp256k1_pubkey
}
pub fn derive_did_account(key: &[u8]) -> (Pubkey, u8) {
Pubkey::find_program_address(&[DID_ACCOUNT_SEED.as_bytes(), key], &id())
}
pub fn derive_did_account_with_bump(key: &[u8], bump_seed: u8) -> Result<Pubkey, Error> {
Pubkey::create_program_address(&[DID_ACCOUNT_SEED.as_bytes(), key, &[bump_seed]], &id())
.map_err(|_| Error::from(ErrorCode::ConstraintSeeds))
}