Press n or j to go to the next uncovered block, b, p or k for the previous block.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 | 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 1x 3x 3x 3x 3x 3x 3x 3x 1x 1x 1x 1x 1x 1x | import { keccak256 } from "../crypto/index.js"; import { MessagePrefix } from "../constants/index.js"; import { recoverAddress } from "../transaction/index.js"; import { concat, toUtf8Bytes } from "../utils/index.js"; import type { SignatureLike } from "../crypto/index.js"; /** * Computes the [[link-eip-191]] personal-sign message digest to sign. * * This prefixes the message with [[MessagePrefix]] and the decimal length * of %%message%% and computes the [[keccak256]] digest. * * If %%message%% is a string, it is converted to its UTF-8 bytes * first. To compute the digest of a [[DataHexString]], it must be converted * to [bytes](getBytes). * * @example: * hashMessage("Hello World") * //_result: * * // Hashes the SIX (6) string characters, i.e. * // [ "0", "x", "4", "2", "4", "3" ] * hashMessage("0x4243") * //_result: * * // Hashes the TWO (2) bytes [ 0x42, 0x43 ]... * hashMessage(getBytes("0x4243")) * //_result: * * // ...which is equal to using data * hashMessage(new Uint8Array([ 0x42, 0x43 ])) * //_result: * */ export function hashMessage(message: Uint8Array | string): string { if (typeof(message) === "string") { message = toUtf8Bytes(message); } return keccak256(concat([ toUtf8Bytes(MessagePrefix), toUtf8Bytes(String(message.length)), message ])); } /** * Return the address of the private key that produced * the signature %%sig%% during signing for %%message%%. */ export function verifyMessage(message: Uint8Array | string, sig: SignatureLike): string { const digest = hashMessage(message); return recoverAddress(digest, sig); } |