aboutsummaryrefslogtreecommitdiffstats
path: root/core/headerchain.go
diff options
context:
space:
mode:
authorJimmy Hu <jimmy.hu@dexon.org>2019-04-20 18:38:05 +0800
committerWei-Ning Huang <w@dexon.org>2019-04-20 18:38:05 +0800
commit50a172204b90673a1068395017fe4e54e969dd63 (patch)
tree7cdf01d87fe5d7f040035cc195ac26b3b37f7c04 /core/headerchain.go
parent6337bcdf014a7e37bdf0944fbfe09fa695faa128 (diff)
downloaddexon-50a172204b90673a1068395017fe4e54e969dd63.tar
dexon-50a172204b90673a1068395017fe4e54e969dd63.tar.gz
dexon-50a172204b90673a1068395017fe4e54e969dd63.tar.bz2
dexon-50a172204b90673a1068395017fe4e54e969dd63.tar.lz
dexon-50a172204b90673a1068395017fe4e54e969dd63.tar.xz
dexon-50a172204b90673a1068395017fe4e54e969dd63.tar.zst
dexon-50a172204b90673a1068395017fe4e54e969dd63.zip
core: only verify the last tsig of header chain (#380)
Diffstat (limited to 'core/headerchain.go')
-rw-r--r--core/headerchain.go19
1 files changed, 13 insertions, 6 deletions
diff --git a/core/headerchain.go b/core/headerchain.go
index aa6144fcf..cda1f6b13 100644
--- a/core/headerchain.go
+++ b/core/headerchain.go
@@ -411,6 +411,11 @@ func (hc *HeaderChain) ValidateDexonHeaderChain(chain []*types.HeaderWithGovStat
}
}
+ // If the last TSig pass the verification, we don't need to verify others.
+ verifyTSig := false
+ if err := hc.verifyDexonHeader(chain[len(chain)-1].Header, gov, verifierCache, true); err != nil {
+ verifyTSig = true
+ }
// Iterate over the headers and ensure they all check out
for i, header := range chain {
// If the chain is terminating, stop processing blocks
@@ -426,7 +431,7 @@ func (hc *HeaderChain) ValidateDexonHeaderChain(chain []*types.HeaderWithGovStat
}
}
- if err := hc.verifyDexonHeader(header.Header, gov, verifierCache); err != nil {
+ if err := hc.verifyDexonHeader(header.Header, gov, verifierCache, verifyTSig); err != nil {
return i, err
}
@@ -467,7 +472,7 @@ func (hc *HeaderChain) VerifyDexonHeader(header *types.Header,
return consensus.ErrUnknownAncestor
}
- if err := hc.verifyDexonHeader(header, gov, verifierCache); err != nil {
+ if err := hc.verifyDexonHeader(header, gov, verifierCache, true); err != nil {
return err
}
@@ -494,7 +499,7 @@ func (hc *HeaderChain) VerifyDexonHeader(header *types.Header,
func (hc *HeaderChain) verifyDexonHeader(header *types.Header,
gov dexcon.GovernanceStateFetcher,
- verifierCache *dexCore.TSigVerifierCache) error {
+ verifierCache *dexCore.TSigVerifierCache, verifyTSig bool) error {
// If the header is a banned one, straight out abort
if BadHashes[header.Hash()] {
@@ -513,9 +518,11 @@ func (hc *HeaderChain) verifyDexonHeader(header *types.Header,
header.Number.Uint64(), err)
}
- if err := hc.verifyTSig(&coreBlock, verifierCache); err != nil {
- log.Debug("verify header sig fail, number=%d, err=%v",
- header.Number.Uint64(), err)
+ if verifyTSig {
+ if err := hc.verifyTSig(&coreBlock, verifierCache); err != nil {
+ log.Debug("verify header sig fail, number=%d, err=%v",
+ header.Number.Uint64(), err)
+ }
}
gs := gov.GetStateForConfigAtRound(header.Round)