2024-09-15 17:13:10 -04:00
|
|
|
#![cfg_attr(docsrs, feature(doc_auto_cfg))]
|
|
|
|
|
#![doc = include_str!("../README.md")]
|
|
|
|
|
#![deny(missing_docs)]
|
|
|
|
|
|
|
|
|
|
use group::ff::PrimeField;
|
2024-10-30 21:36:31 -04:00
|
|
|
use k256::Scalar;
|
2024-09-15 17:13:10 -04:00
|
|
|
|
2024-12-08 20:42:37 -05:00
|
|
|
use alloy_core::primitives::PrimitiveSignature;
|
2024-09-15 17:13:10 -04:00
|
|
|
use alloy_consensus::{SignableTransaction, Signed, TxLegacy};
|
|
|
|
|
|
|
|
|
|
/// The Keccak256 hash function.
|
|
|
|
|
pub fn keccak256(data: impl AsRef<[u8]>) -> [u8; 32] {
|
|
|
|
|
alloy_core::primitives::keccak256(data.as_ref()).into()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Deterministically sign a transaction.
|
|
|
|
|
///
|
2024-10-30 21:36:31 -04:00
|
|
|
/// This signs a transaction via setting `r = 1, s = 1`, and incrementing `r` until a signer is
|
|
|
|
|
/// recoverable from the signature for this transaction. The purpose of this is to be able to send
|
|
|
|
|
/// a transaction from a known account which no one knows the private key for.
|
|
|
|
|
///
|
|
|
|
|
/// This function panics if passed a transaction with a non-None chain ID. This is because the
|
|
|
|
|
/// signer for this transaction is only singular across any/all EVM instances if it isn't binding
|
|
|
|
|
/// to an instance.
|
2024-09-15 17:13:10 -04:00
|
|
|
pub fn deterministically_sign(tx: &TxLegacy) -> Signed<TxLegacy> {
|
|
|
|
|
assert!(
|
|
|
|
|
tx.chain_id.is_none(),
|
2024-10-30 21:36:31 -04:00
|
|
|
"chain ID was Some when deterministically signing a TX (causing a non-singular signer)"
|
2024-09-15 17:13:10 -04:00
|
|
|
);
|
|
|
|
|
|
2024-10-30 21:36:31 -04:00
|
|
|
let mut r = Scalar::ONE;
|
|
|
|
|
let s = Scalar::ONE;
|
2024-09-15 17:13:10 -04:00
|
|
|
loop {
|
|
|
|
|
// Create the signature
|
|
|
|
|
let r_bytes: [u8; 32] = r.to_repr().into();
|
|
|
|
|
let s_bytes: [u8; 32] = s.to_repr().into();
|
2024-12-08 20:42:37 -05:00
|
|
|
let signature =
|
|
|
|
|
PrimitiveSignature::from_scalars_and_parity(r_bytes.into(), s_bytes.into(), false);
|
2024-09-15 17:13:10 -04:00
|
|
|
|
|
|
|
|
// Check if this is a valid signature
|
|
|
|
|
let tx = tx.clone().into_signed(signature);
|
|
|
|
|
if tx.recover_signer().is_ok() {
|
|
|
|
|
return tx;
|
|
|
|
|
}
|
|
|
|
|
|
2024-10-30 21:36:31 -04:00
|
|
|
r += Scalar::ONE;
|
2024-09-15 17:13:10 -04:00
|
|
|
}
|
|
|
|
|
}
|