@aztec/key-store 0.66.0 → 0.67.1-devnet
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/key_store.d.ts +3 -3
- package/dest/key_store.d.ts.map +1 -1
- package/dest/key_store.js +30 -29
- package/package.json +9 -5
- package/src/key_store.ts +34 -36
package/dest/key_store.d.ts
CHANGED
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
import { type PublicKey } from '@aztec/circuit-types';
|
|
2
2
|
import { AztecAddress, CompleteAddress, Fr, GrumpkinScalar, type KeyPrefix, KeyValidationRequest, type PartialAddress } from '@aztec/circuits.js';
|
|
3
3
|
import { type Bufferable } from '@aztec/foundation/serialize';
|
|
4
|
-
import { type
|
|
4
|
+
import { type AztecAsyncKVStore } from '@aztec/kv-store';
|
|
5
5
|
/**
|
|
6
6
|
* Used for managing keys. Can hold keys of multiple accounts.
|
|
7
7
|
*/
|
|
8
8
|
export declare class KeyStore {
|
|
9
9
|
#private;
|
|
10
|
-
constructor(database:
|
|
10
|
+
constructor(database: AztecAsyncKVStore);
|
|
11
11
|
/**
|
|
12
12
|
* Creates a new account from a randomly generated secret key.
|
|
13
13
|
* @returns A promise that resolves to the newly created account's CompleteAddress.
|
|
@@ -90,6 +90,6 @@ export declare class KeyStore {
|
|
|
90
90
|
* @dev Note that this is quite inefficient but it should not matter because there should never be too many keys
|
|
91
91
|
* in the key store.
|
|
92
92
|
*/
|
|
93
|
-
getKeyPrefixAndAccount(value: Bufferable): [KeyPrefix, AztecAddress]
|
|
93
|
+
getKeyPrefixAndAccount(value: Bufferable): Promise<[KeyPrefix, AztecAddress]>;
|
|
94
94
|
}
|
|
95
95
|
//# sourceMappingURL=key_store.d.ts.map
|
package/dest/key_store.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"key_store.d.ts","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EAEF,cAAc,EAEd,KAAK,SAAS,EACd,oBAAoB,EACpB,KAAK,cAAc,EAKpB,MAAM,oBAAoB,CAAC;
|
|
1
|
+
{"version":3,"file":"key_store.d.ts","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EAEF,cAAc,EAEd,KAAK,SAAS,EACd,oBAAoB,EACpB,KAAK,cAAc,EAKpB,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAAE,KAAK,UAAU,EAAqB,MAAM,6BAA6B,CAAC;AACjF,OAAO,EAAE,KAAK,iBAAiB,EAAsB,MAAM,iBAAiB,CAAC;AAE7E;;GAEG;AACH,qBAAa,QAAQ;;gBAGP,QAAQ,EAAE,iBAAiB;IAIvC;;;OAGG;IACI,aAAa,IAAI,OAAO,CAAC,eAAe,CAAC;IAMhD;;;;;OAKG;IACU,UAAU,CAAC,EAAE,EAAE,EAAE,EAAE,cAAc,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC;IAwCzF;;;OAGG;IACU,WAAW,IAAI,OAAO,CAAC,YAAY,EAAE,CAAC;IAOnD;;;;;;OAMG;IACU,uBAAuB,CAAC,OAAO,EAAE,EAAE,EAAE,eAAe,EAAE,YAAY,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAsC/G;;;;;OAKG;IACU,2BAA2B,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUnF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,yBAAyB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUjF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,cAAc,CAAC;IAU9F;;;;;;OAMG;IACU,8BAA8B,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAelG;;;;;;OAMG;IACU,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,cAAc,CAAC;IAkBxE;;;;;OAKG;IACU,sBAAsB,CAAC,KAAK,EAAE,UAAU,GAAG,OAAO,CAAC,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;CAe3F"}
|
package/dest/key_store.js
CHANGED
|
@@ -2,6 +2,7 @@ var _KeyStore_keys;
|
|
|
2
2
|
import { __classPrivateFieldGet, __classPrivateFieldSet } from "tslib";
|
|
3
3
|
import { AztecAddress, CompleteAddress, Fr, GeneratorIndex, GrumpkinScalar, KEY_PREFIXES, KeyValidationRequest, Point, computeAppSecretKey, deriveKeys, derivePublicKeyFromSecretKey, } from '@aztec/circuits.js';
|
|
4
4
|
import { poseidon2HashWithSeparator } from '@aztec/foundation/crypto';
|
|
5
|
+
import { toArray } from '@aztec/foundation/iterable';
|
|
5
6
|
import { serializeToBuffer } from '@aztec/foundation/serialize';
|
|
6
7
|
/**
|
|
7
8
|
* Used for managing keys. Can hold keys of multiple accounts.
|
|
@@ -46,17 +47,17 @@ export class KeyStore {
|
|
|
46
47
|
await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ovpk_m_hash`, publicKeys.masterOutgoingViewingPublicKey.hash().toBuffer());
|
|
47
48
|
await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-tpk_m_hash`, publicKeys.masterTaggingPublicKey.hash().toBuffer());
|
|
48
49
|
// At last, we return the newly derived account address
|
|
49
|
-
return
|
|
50
|
+
return completeAddress;
|
|
50
51
|
}
|
|
51
52
|
/**
|
|
52
53
|
* Retrieves addresses of accounts stored in the key store.
|
|
53
54
|
* @returns A Promise that resolves to an array of account addresses.
|
|
54
55
|
*/
|
|
55
|
-
getAccounts() {
|
|
56
|
-
const allMapKeys =
|
|
56
|
+
async getAccounts() {
|
|
57
|
+
const allMapKeys = await toArray(__classPrivateFieldGet(this, _KeyStore_keys, "f").keysAsync());
|
|
57
58
|
// We return account addresses based on the map keys that end with '-ivsk_m'
|
|
58
59
|
const accounts = allMapKeys.filter(key => key.endsWith('-ivsk_m')).map(key => key.split('-')[0]);
|
|
59
|
-
return
|
|
60
|
+
return accounts.map(account => AztecAddress.fromString(account));
|
|
60
61
|
}
|
|
61
62
|
/**
|
|
62
63
|
* Gets the key validation request for a given master public key hash and contract address.
|
|
@@ -65,10 +66,10 @@ export class KeyStore {
|
|
|
65
66
|
* @param contractAddress - The contract address to silo the secret key in the key validation request with.
|
|
66
67
|
* @returns The key validation request.
|
|
67
68
|
*/
|
|
68
|
-
getKeyValidationRequest(pkMHash, contractAddress) {
|
|
69
|
-
const [keyPrefix, account] = this.getKeyPrefixAndAccount(pkMHash);
|
|
69
|
+
async getKeyValidationRequest(pkMHash, contractAddress) {
|
|
70
|
+
const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkMHash);
|
|
70
71
|
// Now we find the master public key for the account
|
|
71
|
-
const pkMBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
72
|
+
const pkMBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}pk_m`);
|
|
72
73
|
if (!pkMBuffer) {
|
|
73
74
|
throw new Error(`Could not find ${keyPrefix}pk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
|
|
74
75
|
}
|
|
@@ -77,7 +78,7 @@ export class KeyStore {
|
|
|
77
78
|
throw new Error(`Could not find ${keyPrefix}pkM for ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
|
|
78
79
|
}
|
|
79
80
|
// Now we find the secret key for the public key
|
|
80
|
-
const skMBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
81
|
+
const skMBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}sk_m`);
|
|
81
82
|
if (!skMBuffer) {
|
|
82
83
|
throw new Error(`Could not find ${keyPrefix}sk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
|
|
83
84
|
}
|
|
@@ -88,7 +89,7 @@ export class KeyStore {
|
|
|
88
89
|
}
|
|
89
90
|
// At last we silo the secret key and return the key validation request
|
|
90
91
|
const skApp = computeAppSecretKey(skM, contractAddress, keyPrefix);
|
|
91
|
-
return
|
|
92
|
+
return new KeyValidationRequest(pkM, skApp);
|
|
92
93
|
}
|
|
93
94
|
/**
|
|
94
95
|
* Gets the master nullifier public key for a given account.
|
|
@@ -97,11 +98,11 @@ export class KeyStore {
|
|
|
97
98
|
* @returns The master nullifier public key for the account.
|
|
98
99
|
*/
|
|
99
100
|
async getMasterNullifierPublicKey(account) {
|
|
100
|
-
const masterNullifierPublicKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
101
|
+
const masterNullifierPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-npk_m`);
|
|
101
102
|
if (!masterNullifierPublicKeyBuffer) {
|
|
102
103
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
103
104
|
}
|
|
104
|
-
return
|
|
105
|
+
return Point.fromBuffer(masterNullifierPublicKeyBuffer);
|
|
105
106
|
}
|
|
106
107
|
/**
|
|
107
108
|
* Gets the master incoming viewing public key for a given account.
|
|
@@ -110,11 +111,11 @@ export class KeyStore {
|
|
|
110
111
|
* @returns The master incoming viewing public key for the account.
|
|
111
112
|
*/
|
|
112
113
|
async getMasterIncomingViewingPublicKey(account) {
|
|
113
|
-
const masterIncomingViewingPublicKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
114
|
+
const masterIncomingViewingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ivpk_m`);
|
|
114
115
|
if (!masterIncomingViewingPublicKeyBuffer) {
|
|
115
116
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
116
117
|
}
|
|
117
|
-
return
|
|
118
|
+
return Point.fromBuffer(masterIncomingViewingPublicKeyBuffer);
|
|
118
119
|
}
|
|
119
120
|
/**
|
|
120
121
|
* Retrieves the master outgoing viewing public key.
|
|
@@ -123,11 +124,11 @@ export class KeyStore {
|
|
|
123
124
|
* @returns A Promise that resolves to the master outgoing viewing key.
|
|
124
125
|
*/
|
|
125
126
|
async getMasterOutgoingViewingPublicKey(account) {
|
|
126
|
-
const masterOutgoingViewingPublicKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
127
|
+
const masterOutgoingViewingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ovpk_m`);
|
|
127
128
|
if (!masterOutgoingViewingPublicKeyBuffer) {
|
|
128
129
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
129
130
|
}
|
|
130
|
-
return
|
|
131
|
+
return Point.fromBuffer(masterOutgoingViewingPublicKeyBuffer);
|
|
131
132
|
}
|
|
132
133
|
/**
|
|
133
134
|
* Retrieves the master tagging public key.
|
|
@@ -136,11 +137,11 @@ export class KeyStore {
|
|
|
136
137
|
* @returns A Promise that resolves to the master tagging key.
|
|
137
138
|
*/
|
|
138
139
|
async getMasterTaggingPublicKey(account) {
|
|
139
|
-
const masterTaggingPublicKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
140
|
+
const masterTaggingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-tpk_m`);
|
|
140
141
|
if (!masterTaggingPublicKeyBuffer) {
|
|
141
142
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
142
143
|
}
|
|
143
|
-
return
|
|
144
|
+
return Point.fromBuffer(masterTaggingPublicKeyBuffer);
|
|
144
145
|
}
|
|
145
146
|
/**
|
|
146
147
|
* Retrieves master incoming viewing secret key.
|
|
@@ -149,12 +150,11 @@ export class KeyStore {
|
|
|
149
150
|
* @returns A Promise that resolves to the master incoming viewing secret key.
|
|
150
151
|
*/
|
|
151
152
|
async getMasterIncomingViewingSecretKey(account) {
|
|
152
|
-
const masterIncomingViewingSecretKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
153
|
+
const masterIncomingViewingSecretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ivsk_m`);
|
|
153
154
|
if (!masterIncomingViewingSecretKeyBuffer) {
|
|
154
155
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
155
156
|
}
|
|
156
|
-
|
|
157
|
-
return Promise.resolve(masterIncomingViewingSecretKey);
|
|
157
|
+
return GrumpkinScalar.fromBuffer(masterIncomingViewingSecretKeyBuffer);
|
|
158
158
|
}
|
|
159
159
|
/**
|
|
160
160
|
* Retrieves application outgoing viewing secret key.
|
|
@@ -164,12 +164,12 @@ export class KeyStore {
|
|
|
164
164
|
* @returns A Promise that resolves to the application outgoing viewing secret key.
|
|
165
165
|
*/
|
|
166
166
|
async getAppOutgoingViewingSecretKey(account, app) {
|
|
167
|
-
const masterOutgoingViewingSecretKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
167
|
+
const masterOutgoingViewingSecretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ovsk_m`);
|
|
168
168
|
if (!masterOutgoingViewingSecretKeyBuffer) {
|
|
169
169
|
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
170
170
|
}
|
|
171
171
|
const masterOutgoingViewingSecretKey = GrumpkinScalar.fromBuffer(masterOutgoingViewingSecretKeyBuffer);
|
|
172
|
-
return
|
|
172
|
+
return poseidon2HashWithSeparator([masterOutgoingViewingSecretKey.hi, masterOutgoingViewingSecretKey.lo, app], GeneratorIndex.OVSK_M);
|
|
173
173
|
}
|
|
174
174
|
/**
|
|
175
175
|
* Retrieves the sk_m corresponding to the pk_m.
|
|
@@ -178,9 +178,9 @@ export class KeyStore {
|
|
|
178
178
|
* @returns A Promise that resolves to sk_m.
|
|
179
179
|
* @dev Used when feeding the sk_m to the kernel circuit for keys verification.
|
|
180
180
|
*/
|
|
181
|
-
getMasterSecretKey(pkM) {
|
|
182
|
-
const [keyPrefix, account] = this.getKeyPrefixAndAccount(pkM);
|
|
183
|
-
const secretKeyBuffer = __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
181
|
+
async getMasterSecretKey(pkM) {
|
|
182
|
+
const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkM);
|
|
183
|
+
const secretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}sk_m`);
|
|
184
184
|
if (!secretKeyBuffer) {
|
|
185
185
|
throw new Error(`Could not find ${keyPrefix}sk_m for ${keyPrefix}pk_m ${pkM.toString()}. This should not happen.`);
|
|
186
186
|
}
|
|
@@ -196,10 +196,11 @@ export class KeyStore {
|
|
|
196
196
|
* @dev Note that this is quite inefficient but it should not matter because there should never be too many keys
|
|
197
197
|
* in the key store.
|
|
198
198
|
*/
|
|
199
|
-
getKeyPrefixAndAccount(value) {
|
|
199
|
+
async getKeyPrefixAndAccount(value) {
|
|
200
200
|
const valueBuffer = serializeToBuffer(value);
|
|
201
|
-
for (const [key, val] of __classPrivateFieldGet(this, _KeyStore_keys, "f").
|
|
202
|
-
|
|
201
|
+
for await (const [key, val] of __classPrivateFieldGet(this, _KeyStore_keys, "f").entriesAsync()) {
|
|
202
|
+
// Browser returns Uint8Array, Node.js returns Buffer
|
|
203
|
+
if (Buffer.from(val).equals(valueBuffer)) {
|
|
203
204
|
for (const prefix of KEY_PREFIXES) {
|
|
204
205
|
if (key.includes(`-${prefix}`)) {
|
|
205
206
|
const account = AztecAddress.fromString(key.split('-')[0]);
|
|
@@ -212,4 +213,4 @@ export class KeyStore {
|
|
|
212
213
|
}
|
|
213
214
|
}
|
|
214
215
|
_KeyStore_keys = new WeakMap();
|
|
215
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key_store.js","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":";;AACA,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EACF,cAAc,EACd,cAAc,EACd,YAAY,EAEZ,oBAAoB,EAEpB,KAAK,EACL,mBAAmB,EACnB,UAAU,EACV,4BAA4B,GAC7B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,0BAA0B,EAAE,MAAM,0BAA0B,CAAC;AACtE,OAAO,EAAmB,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAGjF;;GAEG;AACH,MAAM,OAAO,QAAQ;IAGnB,YAAY,QAAsB;QAFlC,iCAAgC;QAG9B,uBAAA,IAAI,kBAAS,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,MAAA,CAAC;IAC7C,CAAC;IAED;;;OAGG;IACI,aAAa;QAClB,MAAM,EAAE,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACvB,MAAM,cAAc,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACnC,OAAO,IAAI,CAAC,UAAU,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,UAAU,CAAC,EAAM,EAAE,cAA8B;QAC5D,MAAM,EACJ,wBAAwB,EACxB,8BAA8B,EAC9B,8BAA8B,EAC9B,sBAAsB,EACtB,UAAU,GACX,GAAG,UAAU,CAAC,EAAE,CAAC,CAAC;QAEnB,MAAM,eAAe,GAAG,eAAe,CAAC,8BAA8B,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;QAC3F,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,eAAe,CAAC;QAE7C,iEAAiE;QACjE,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAEzF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACpG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAElG,0GAA0G;QAC1G,sDAAsD;QACtD,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,UAAU,CAAC,wBAAwB,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChH,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAClB,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EACnC,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAC5D,CAAC;QACF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAClB,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EACnC,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAC5D,CAAC;QACF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,UAAU,CAAC,sBAAsB,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;QAE9G,uDAAuD;QACvD,OAAO,OAAO,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC;IAC1C,CAAC;IAED;;;OAGG;IACI,WAAW;QAChB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,uBAAA,IAAI,sBAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QACjD,4EAA4E;QAC5E,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACjG,OAAO,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACpF,CAAC;IAED;;;;;;OAMG;IACI,uBAAuB,CAAC,OAAW,EAAE,eAA6B;QACvE,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC,sBAAsB,CAAC,OAAO,CAAC,CAAC;QAElE,oDAAoD;QACpD,MAAM,SAAS,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QAC3E,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,KAAK,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QAExC,IAAI,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,CAAC;YAChC,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC;QACrG,CAAC;QAED,gDAAgD;QAChD,MAAM,SAAS,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QAC3E,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QAEjD,kFAAkF;QAClF,IAAI,CAAC,4BAA4B,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CAAC,oBAAoB,SAAS,YAAY,SAAS,MAAM,CAAC,CAAC;QAC5E,CAAC;QAED,uEAAuE;QACvE,MAAM,KAAK,GAAG,mBAAmB,CAAC,GAAG,EAAE,eAAe,EAAE,SAAU,CAAC,CAAC;QAEpE,OAAO,OAAO,CAAC,OAAO,CAAC,IAAI,oBAAoB,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,CAAC;IAC/D,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,2BAA2B,CAAC,OAAqB;QAC5D,MAAM,8BAA8B,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QACrF,IAAI,CAAC,8BAA8B,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC,CAAC;IAC3E,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC,CAAC;IACjF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC,CAAC;IACjF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,yBAAyB,CAAC,OAAqB;QAC1D,MAAM,4BAA4B,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QACnF,IAAI,CAAC,4BAA4B,EAAE,CAAC;YAClC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,OAAO,CAAC,OAAO,CAAC,8BAA8B,CAAC,CAAC;IACzD,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,8BAA8B,CAAC,OAAqB,EAAE,GAAiB;QAClF,MAAM,oCAAoC,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,OAAO,CAAC,OAAO,CACpB,0BAA0B,CACxB,CAAC,8BAA8B,CAAC,EAAE,EAAE,8BAA8B,CAAC,EAAE,EAAE,GAAG,CAAC,EAC3E,cAAc,CAAC,MAAM,CACtB,CACF,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,kBAAkB,CAAC,GAAc;QACtC,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC;QAE9D,MAAM,eAAe,GAAG,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QACjF,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,YAAY,SAAS,QAAQ,GAAG,CAAC,QAAQ,EAAE,2BAA2B,CAClG,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC;QACvD,IAAI,CAAC,4BAA4B,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,OAAO,GAAG,CAAC,QAAQ,EAAE,yBAAyB,CAAC,CAAC;QACjH,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAED;;;;;OAKG;IACI,sBAAsB,CAAC,KAAiB;QAC7C,MAAM,WAAW,GAAG,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAC7C,KAAK,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,IAAI,uBAAA,IAAI,sBAAM,CAAC,OAAO,EAAE,EAAE,CAAC;YAC9C,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC5B,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;oBAClC,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC,EAAE,CAAC;wBAC/B,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3D,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;oBAC3B,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAC;IAChD,CAAC;CACF"}
|
|
216
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key_store.js","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":";;AACA,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EACF,cAAc,EACd,cAAc,EACd,YAAY,EAEZ,oBAAoB,EAEpB,KAAK,EACL,mBAAmB,EACnB,UAAU,EACV,4BAA4B,GAC7B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,0BAA0B,EAAE,MAAM,0BAA0B,CAAC;AACtE,OAAO,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AACrD,OAAO,EAAmB,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAGjF;;GAEG;AACH,MAAM,OAAO,QAAQ;IAGnB,YAAY,QAA2B;QAFvC,iCAAqC;QAGnC,uBAAA,IAAI,kBAAS,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,MAAA,CAAC;IAC7C,CAAC;IAED;;;OAGG;IACI,aAAa;QAClB,MAAM,EAAE,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACvB,MAAM,cAAc,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACnC,OAAO,IAAI,CAAC,UAAU,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,UAAU,CAAC,EAAM,EAAE,cAA8B;QAC5D,MAAM,EACJ,wBAAwB,EACxB,8BAA8B,EAC9B,8BAA8B,EAC9B,sBAAsB,EACtB,UAAU,GACX,GAAG,UAAU,CAAC,EAAE,CAAC,CAAC;QAEnB,MAAM,eAAe,GAAG,eAAe,CAAC,8BAA8B,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;QAC3F,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,eAAe,CAAC;QAE7C,iEAAiE;QACjE,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAEzF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACpG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAElG,0GAA0G;QAC1G,sDAAsD;QACtD,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,UAAU,CAAC,wBAAwB,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChH,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAClB,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EACnC,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAC5D,CAAC;QACF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAClB,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EACnC,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAC5D,CAAC;QACF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,UAAU,CAAC,sBAAsB,CAAC,IAAI,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;QAE9G,uDAAuD;QACvD,OAAO,eAAe,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,WAAW;QACtB,MAAM,UAAU,GAAG,MAAM,OAAO,CAAC,uBAAA,IAAI,sBAAM,CAAC,SAAS,EAAE,CAAC,CAAC;QACzD,4EAA4E;QAC5E,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACjG,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,uBAAuB,CAAC,OAAW,EAAE,eAA6B;QAC7E,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,OAAO,CAAC,CAAC;QAExE,oDAAoD;QACpD,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QACtF,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,KAAK,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QAExC,IAAI,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,CAAC;YAChC,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC;QACrG,CAAC;QAED,gDAAgD;QAChD,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QACtF,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QAEjD,kFAAkF;QAClF,IAAI,CAAC,4BAA4B,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CAAC,oBAAoB,SAAS,YAAY,SAAS,MAAM,CAAC,CAAC;QAC5E,CAAC;QAED,uEAAuE;QACvE,MAAM,KAAK,GAAG,mBAAmB,CAAC,GAAG,EAAE,eAAe,EAAE,SAAU,CAAC,CAAC;QAEpE,OAAO,IAAI,oBAAoB,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;IAC9C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,2BAA2B,CAAC,OAAqB;QAC5D,MAAM,8BAA8B,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QAChG,IAAI,CAAC,8BAA8B,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IAChE,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IAChE,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,yBAAyB,CAAC,OAAqB;QAC1D,MAAM,4BAA4B,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QAC9F,IAAI,CAAC,4BAA4B,EAAE,CAAC;YAClC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC;IACxD,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IACzE,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,8BAA8B,CAAC,OAAqB,EAAE,GAAiB;QAClF,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,0BAA0B,CAC/B,CAAC,8BAA8B,CAAC,EAAE,EAAE,8BAA8B,CAAC,EAAE,EAAE,GAAG,CAAC,EAC3E,cAAc,CAAC,MAAM,CACtB,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,kBAAkB,CAAC,GAAc;QAC5C,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC;QAEpE,MAAM,eAAe,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QAC5F,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,YAAY,SAAS,QAAQ,GAAG,CAAC,QAAQ,EAAE,2BAA2B,CAClG,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC;QACvD,IAAI,CAAC,4BAA4B,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,OAAO,GAAG,CAAC,QAAQ,EAAE,yBAAyB,CAAC,CAAC;QACjH,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,sBAAsB,CAAC,KAAiB;QACnD,MAAM,WAAW,GAAG,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAC7C,IAAI,KAAK,EAAE,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,IAAI,uBAAA,IAAI,sBAAM,CAAC,YAAY,EAAE,EAAE,CAAC;YACzD,qDAAqD;YACrD,IAAI,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;oBAClC,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC,EAAE,CAAC;wBAC/B,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3D,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;oBAC3B,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAC;IAChD,CAAC;CACF"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aztec/key-store",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.67.1-devnet",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"exports": "./dest/index.js",
|
|
6
6
|
"typedocOptions": {
|
|
@@ -53,13 +53,17 @@
|
|
|
53
53
|
"summaryThreshold": 9999
|
|
54
54
|
}
|
|
55
55
|
]
|
|
56
|
+
],
|
|
57
|
+
"testTimeout": 30000,
|
|
58
|
+
"setupFiles": [
|
|
59
|
+
"../../foundation/src/jest/setup.mjs"
|
|
56
60
|
]
|
|
57
61
|
},
|
|
58
62
|
"dependencies": {
|
|
59
|
-
"@aztec/circuit-types": "0.
|
|
60
|
-
"@aztec/circuits.js": "0.
|
|
61
|
-
"@aztec/foundation": "0.
|
|
62
|
-
"@aztec/kv-store": "0.
|
|
63
|
+
"@aztec/circuit-types": "0.67.1-devnet",
|
|
64
|
+
"@aztec/circuits.js": "0.67.1-devnet",
|
|
65
|
+
"@aztec/foundation": "0.67.1-devnet",
|
|
66
|
+
"@aztec/kv-store": "0.67.1-devnet",
|
|
63
67
|
"tslib": "^2.4.0"
|
|
64
68
|
},
|
|
65
69
|
"devDependencies": {
|
package/src/key_store.ts
CHANGED
|
@@ -15,16 +15,17 @@ import {
|
|
|
15
15
|
derivePublicKeyFromSecretKey,
|
|
16
16
|
} from '@aztec/circuits.js';
|
|
17
17
|
import { poseidon2HashWithSeparator } from '@aztec/foundation/crypto';
|
|
18
|
+
import { toArray } from '@aztec/foundation/iterable';
|
|
18
19
|
import { type Bufferable, serializeToBuffer } from '@aztec/foundation/serialize';
|
|
19
|
-
import { type
|
|
20
|
+
import { type AztecAsyncKVStore, type AztecAsyncMap } from '@aztec/kv-store';
|
|
20
21
|
|
|
21
22
|
/**
|
|
22
23
|
* Used for managing keys. Can hold keys of multiple accounts.
|
|
23
24
|
*/
|
|
24
25
|
export class KeyStore {
|
|
25
|
-
#keys:
|
|
26
|
+
#keys: AztecAsyncMap<string, Buffer>;
|
|
26
27
|
|
|
27
|
-
constructor(database:
|
|
28
|
+
constructor(database: AztecAsyncKVStore) {
|
|
28
29
|
this.#keys = database.openMap('key_store');
|
|
29
30
|
}
|
|
30
31
|
|
|
@@ -81,18 +82,18 @@ export class KeyStore {
|
|
|
81
82
|
await this.#keys.set(`${account.toString()}-tpk_m_hash`, publicKeys.masterTaggingPublicKey.hash().toBuffer());
|
|
82
83
|
|
|
83
84
|
// At last, we return the newly derived account address
|
|
84
|
-
return
|
|
85
|
+
return completeAddress;
|
|
85
86
|
}
|
|
86
87
|
|
|
87
88
|
/**
|
|
88
89
|
* Retrieves addresses of accounts stored in the key store.
|
|
89
90
|
* @returns A Promise that resolves to an array of account addresses.
|
|
90
91
|
*/
|
|
91
|
-
public getAccounts(): Promise<AztecAddress[]> {
|
|
92
|
-
const allMapKeys =
|
|
92
|
+
public async getAccounts(): Promise<AztecAddress[]> {
|
|
93
|
+
const allMapKeys = await toArray(this.#keys.keysAsync());
|
|
93
94
|
// We return account addresses based on the map keys that end with '-ivsk_m'
|
|
94
95
|
const accounts = allMapKeys.filter(key => key.endsWith('-ivsk_m')).map(key => key.split('-')[0]);
|
|
95
|
-
return
|
|
96
|
+
return accounts.map(account => AztecAddress.fromString(account));
|
|
96
97
|
}
|
|
97
98
|
|
|
98
99
|
/**
|
|
@@ -102,11 +103,11 @@ export class KeyStore {
|
|
|
102
103
|
* @param contractAddress - The contract address to silo the secret key in the key validation request with.
|
|
103
104
|
* @returns The key validation request.
|
|
104
105
|
*/
|
|
105
|
-
public getKeyValidationRequest(pkMHash: Fr, contractAddress: AztecAddress): Promise<KeyValidationRequest> {
|
|
106
|
-
const [keyPrefix, account] = this.getKeyPrefixAndAccount(pkMHash);
|
|
106
|
+
public async getKeyValidationRequest(pkMHash: Fr, contractAddress: AztecAddress): Promise<KeyValidationRequest> {
|
|
107
|
+
const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkMHash);
|
|
107
108
|
|
|
108
109
|
// Now we find the master public key for the account
|
|
109
|
-
const pkMBuffer = this.#keys.
|
|
110
|
+
const pkMBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}pk_m`);
|
|
110
111
|
if (!pkMBuffer) {
|
|
111
112
|
throw new Error(
|
|
112
113
|
`Could not find ${keyPrefix}pk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`,
|
|
@@ -120,7 +121,7 @@ export class KeyStore {
|
|
|
120
121
|
}
|
|
121
122
|
|
|
122
123
|
// Now we find the secret key for the public key
|
|
123
|
-
const skMBuffer = this.#keys.
|
|
124
|
+
const skMBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}sk_m`);
|
|
124
125
|
if (!skMBuffer) {
|
|
125
126
|
throw new Error(
|
|
126
127
|
`Could not find ${keyPrefix}sk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`,
|
|
@@ -137,7 +138,7 @@ export class KeyStore {
|
|
|
137
138
|
// At last we silo the secret key and return the key validation request
|
|
138
139
|
const skApp = computeAppSecretKey(skM, contractAddress, keyPrefix!);
|
|
139
140
|
|
|
140
|
-
return
|
|
141
|
+
return new KeyValidationRequest(pkM, skApp);
|
|
141
142
|
}
|
|
142
143
|
|
|
143
144
|
/**
|
|
@@ -147,13 +148,13 @@ export class KeyStore {
|
|
|
147
148
|
* @returns The master nullifier public key for the account.
|
|
148
149
|
*/
|
|
149
150
|
public async getMasterNullifierPublicKey(account: AztecAddress): Promise<PublicKey> {
|
|
150
|
-
const masterNullifierPublicKeyBuffer = this.#keys.
|
|
151
|
+
const masterNullifierPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-npk_m`);
|
|
151
152
|
if (!masterNullifierPublicKeyBuffer) {
|
|
152
153
|
throw new Error(
|
|
153
154
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
154
155
|
);
|
|
155
156
|
}
|
|
156
|
-
return
|
|
157
|
+
return Point.fromBuffer(masterNullifierPublicKeyBuffer);
|
|
157
158
|
}
|
|
158
159
|
|
|
159
160
|
/**
|
|
@@ -163,13 +164,13 @@ export class KeyStore {
|
|
|
163
164
|
* @returns The master incoming viewing public key for the account.
|
|
164
165
|
*/
|
|
165
166
|
public async getMasterIncomingViewingPublicKey(account: AztecAddress): Promise<PublicKey> {
|
|
166
|
-
const masterIncomingViewingPublicKeyBuffer = this.#keys.
|
|
167
|
+
const masterIncomingViewingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ivpk_m`);
|
|
167
168
|
if (!masterIncomingViewingPublicKeyBuffer) {
|
|
168
169
|
throw new Error(
|
|
169
170
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
170
171
|
);
|
|
171
172
|
}
|
|
172
|
-
return
|
|
173
|
+
return Point.fromBuffer(masterIncomingViewingPublicKeyBuffer);
|
|
173
174
|
}
|
|
174
175
|
|
|
175
176
|
/**
|
|
@@ -179,13 +180,13 @@ export class KeyStore {
|
|
|
179
180
|
* @returns A Promise that resolves to the master outgoing viewing key.
|
|
180
181
|
*/
|
|
181
182
|
public async getMasterOutgoingViewingPublicKey(account: AztecAddress): Promise<PublicKey> {
|
|
182
|
-
const masterOutgoingViewingPublicKeyBuffer = this.#keys.
|
|
183
|
+
const masterOutgoingViewingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ovpk_m`);
|
|
183
184
|
if (!masterOutgoingViewingPublicKeyBuffer) {
|
|
184
185
|
throw new Error(
|
|
185
186
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
186
187
|
);
|
|
187
188
|
}
|
|
188
|
-
return
|
|
189
|
+
return Point.fromBuffer(masterOutgoingViewingPublicKeyBuffer);
|
|
189
190
|
}
|
|
190
191
|
|
|
191
192
|
/**
|
|
@@ -195,13 +196,13 @@ export class KeyStore {
|
|
|
195
196
|
* @returns A Promise that resolves to the master tagging key.
|
|
196
197
|
*/
|
|
197
198
|
public async getMasterTaggingPublicKey(account: AztecAddress): Promise<PublicKey> {
|
|
198
|
-
const masterTaggingPublicKeyBuffer = this.#keys.
|
|
199
|
+
const masterTaggingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-tpk_m`);
|
|
199
200
|
if (!masterTaggingPublicKeyBuffer) {
|
|
200
201
|
throw new Error(
|
|
201
202
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
202
203
|
);
|
|
203
204
|
}
|
|
204
|
-
return
|
|
205
|
+
return Point.fromBuffer(masterTaggingPublicKeyBuffer);
|
|
205
206
|
}
|
|
206
207
|
|
|
207
208
|
/**
|
|
@@ -211,15 +212,13 @@ export class KeyStore {
|
|
|
211
212
|
* @returns A Promise that resolves to the master incoming viewing secret key.
|
|
212
213
|
*/
|
|
213
214
|
public async getMasterIncomingViewingSecretKey(account: AztecAddress): Promise<GrumpkinScalar> {
|
|
214
|
-
const masterIncomingViewingSecretKeyBuffer = this.#keys.
|
|
215
|
+
const masterIncomingViewingSecretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ivsk_m`);
|
|
215
216
|
if (!masterIncomingViewingSecretKeyBuffer) {
|
|
216
217
|
throw new Error(
|
|
217
218
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
218
219
|
);
|
|
219
220
|
}
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
return Promise.resolve(masterIncomingViewingSecretKey);
|
|
221
|
+
return GrumpkinScalar.fromBuffer(masterIncomingViewingSecretKeyBuffer);
|
|
223
222
|
}
|
|
224
223
|
|
|
225
224
|
/**
|
|
@@ -230,7 +229,7 @@ export class KeyStore {
|
|
|
230
229
|
* @returns A Promise that resolves to the application outgoing viewing secret key.
|
|
231
230
|
*/
|
|
232
231
|
public async getAppOutgoingViewingSecretKey(account: AztecAddress, app: AztecAddress): Promise<Fr> {
|
|
233
|
-
const masterOutgoingViewingSecretKeyBuffer = this.#keys.
|
|
232
|
+
const masterOutgoingViewingSecretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ovsk_m`);
|
|
234
233
|
if (!masterOutgoingViewingSecretKeyBuffer) {
|
|
235
234
|
throw new Error(
|
|
236
235
|
`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`,
|
|
@@ -238,11 +237,9 @@ export class KeyStore {
|
|
|
238
237
|
}
|
|
239
238
|
const masterOutgoingViewingSecretKey = GrumpkinScalar.fromBuffer(masterOutgoingViewingSecretKeyBuffer);
|
|
240
239
|
|
|
241
|
-
return
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
GeneratorIndex.OVSK_M,
|
|
245
|
-
),
|
|
240
|
+
return poseidon2HashWithSeparator(
|
|
241
|
+
[masterOutgoingViewingSecretKey.hi, masterOutgoingViewingSecretKey.lo, app],
|
|
242
|
+
GeneratorIndex.OVSK_M,
|
|
246
243
|
);
|
|
247
244
|
}
|
|
248
245
|
|
|
@@ -253,10 +250,10 @@ export class KeyStore {
|
|
|
253
250
|
* @returns A Promise that resolves to sk_m.
|
|
254
251
|
* @dev Used when feeding the sk_m to the kernel circuit for keys verification.
|
|
255
252
|
*/
|
|
256
|
-
public getMasterSecretKey(pkM: PublicKey): Promise<GrumpkinScalar> {
|
|
257
|
-
const [keyPrefix, account] = this.getKeyPrefixAndAccount(pkM);
|
|
253
|
+
public async getMasterSecretKey(pkM: PublicKey): Promise<GrumpkinScalar> {
|
|
254
|
+
const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkM);
|
|
258
255
|
|
|
259
|
-
const secretKeyBuffer = this.#keys.
|
|
256
|
+
const secretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}sk_m`);
|
|
260
257
|
if (!secretKeyBuffer) {
|
|
261
258
|
throw new Error(
|
|
262
259
|
`Could not find ${keyPrefix}sk_m for ${keyPrefix}pk_m ${pkM.toString()}. This should not happen.`,
|
|
@@ -277,10 +274,11 @@ export class KeyStore {
|
|
|
277
274
|
* @dev Note that this is quite inefficient but it should not matter because there should never be too many keys
|
|
278
275
|
* in the key store.
|
|
279
276
|
*/
|
|
280
|
-
public getKeyPrefixAndAccount(value: Bufferable): [KeyPrefix, AztecAddress] {
|
|
277
|
+
public async getKeyPrefixAndAccount(value: Bufferable): Promise<[KeyPrefix, AztecAddress]> {
|
|
281
278
|
const valueBuffer = serializeToBuffer(value);
|
|
282
|
-
for (const [key, val] of this.#keys.
|
|
283
|
-
|
|
279
|
+
for await (const [key, val] of this.#keys.entriesAsync()) {
|
|
280
|
+
// Browser returns Uint8Array, Node.js returns Buffer
|
|
281
|
+
if (Buffer.from(val).equals(valueBuffer)) {
|
|
284
282
|
for (const prefix of KEY_PREFIXES) {
|
|
285
283
|
if (key.includes(`-${prefix}`)) {
|
|
286
284
|
const account = AztecAddress.fromString(key.split('-')[0]);
|