2018-03-02 16:24:09 +01:00
|
|
|
package smartcontract
|
|
|
|
|
2018-03-25 12:45:54 +02:00
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"sort"
|
|
|
|
|
2020-08-14 13:50:52 +03:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/interopnames"
|
2020-03-03 17:21:42 +03:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/io"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/emit"
|
2018-03-25 12:45:54 +02:00
|
|
|
)
|
|
|
|
|
2020-08-10 18:58:11 +03:00
|
|
|
// CreateMultiSigRedeemScript creates an "m out of n" type verification script
|
|
|
|
// where n is the length of publicKeys.
|
2019-08-27 16:29:42 +03:00
|
|
|
func CreateMultiSigRedeemScript(m int, publicKeys keys.PublicKeys) ([]byte, error) {
|
2020-01-13 15:22:21 +03:00
|
|
|
if m < 1 {
|
2018-03-25 12:45:54 +02:00
|
|
|
return nil, fmt.Errorf("param m cannot be smaller or equal to 1 got %d", m)
|
|
|
|
}
|
|
|
|
if m > len(publicKeys) {
|
|
|
|
return nil, fmt.Errorf("length of the signatures (%d) is higher then the number of public keys", m)
|
|
|
|
}
|
|
|
|
if m > 1024 {
|
|
|
|
return nil, fmt.Errorf("public key count %d exceeds maximum of length 1024", len(publicKeys))
|
|
|
|
}
|
|
|
|
|
2020-02-03 17:46:51 +03:00
|
|
|
buf := io.NewBufBinWriter()
|
|
|
|
emit.Int(buf.BinWriter, int64(m))
|
2018-03-25 12:45:54 +02:00
|
|
|
sort.Sort(publicKeys)
|
|
|
|
for _, pubKey := range publicKeys {
|
2020-04-21 16:45:48 +03:00
|
|
|
emit.Bytes(buf.BinWriter, pubKey.Bytes())
|
2018-03-25 12:45:54 +02:00
|
|
|
}
|
2020-02-03 17:46:51 +03:00
|
|
|
emit.Int(buf.BinWriter, int64(len(publicKeys)))
|
2021-05-11 17:13:33 +03:00
|
|
|
emit.Syscall(buf.BinWriter, interopnames.SystemCryptoCheckMultisig)
|
2018-03-25 12:45:54 +02:00
|
|
|
|
|
|
|
return buf.Bytes(), nil
|
|
|
|
}
|
2020-08-10 18:58:11 +03:00
|
|
|
|
|
|
|
// CreateDefaultMultiSigRedeemScript creates an "m out of n" type verification script
|
|
|
|
// using publicKeys length with the default BFT assumptions of (n - (n-1)/3) for m.
|
|
|
|
func CreateDefaultMultiSigRedeemScript(publicKeys keys.PublicKeys) ([]byte, error) {
|
|
|
|
n := len(publicKeys)
|
2020-10-07 15:58:33 +03:00
|
|
|
m := GetDefaultHonestNodeCount(n)
|
2020-08-10 18:58:11 +03:00
|
|
|
return CreateMultiSigRedeemScript(m, publicKeys)
|
|
|
|
}
|
2020-08-21 09:30:07 +03:00
|
|
|
|
|
|
|
// CreateMajorityMultiSigRedeemScript creates an "m out of n" type verification script
|
|
|
|
// using publicKeys length with m set to majority.
|
|
|
|
func CreateMajorityMultiSigRedeemScript(publicKeys keys.PublicKeys) ([]byte, error) {
|
|
|
|
n := len(publicKeys)
|
2021-02-02 12:34:15 +03:00
|
|
|
m := GetMajorityHonestNodeCount(n)
|
2020-08-21 09:30:07 +03:00
|
|
|
return CreateMultiSigRedeemScript(m, publicKeys)
|
|
|
|
}
|
2020-10-07 15:58:33 +03:00
|
|
|
|
|
|
|
// GetDefaultHonestNodeCount returns minimum number of honest nodes
|
|
|
|
// required for network of size n.
|
|
|
|
func GetDefaultHonestNodeCount(n int) int {
|
|
|
|
return n - (n-1)/3
|
|
|
|
}
|
2021-02-02 12:34:15 +03:00
|
|
|
|
|
|
|
// GetMajorityHonestNodeCount returns minimum number of honest nodes
|
|
|
|
// required for majority-style agreement.
|
|
|
|
func GetMajorityHonestNodeCount(n int) int {
|
|
|
|
return n - (n-1)/2
|
|
|
|
}
|