@bitgo-beta/sdk-core 8.2.1-beta.13 → 8.2.1-beta.130
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +432 -0
- package/dist/src/account-lib/baseCoin/enum.d.ts +6 -1
- package/dist/src/account-lib/baseCoin/enum.d.ts.map +1 -1
- package/dist/src/account-lib/baseCoin/enum.js +11 -1
- package/dist/src/account-lib/mpc/curves/ed25519.d.ts +4 -18
- package/dist/src/account-lib/mpc/curves/ed25519.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/curves/ed25519.js +6 -60
- package/dist/src/account-lib/mpc/index.d.ts +4 -4
- package/dist/src/account-lib/mpc/index.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/index.js +6 -6
- package/dist/src/account-lib/mpc/shamir.d.ts +5 -37
- package/dist/src/account-lib/mpc/shamir.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/shamir.js +6 -130
- package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.d.ts +57 -9
- package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.js +581 -57
- package/dist/src/account-lib/mpc/tss/ecdsa/types.d.ts +97 -55
- package/dist/src/account-lib/mpc/tss/ecdsa/types.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/tss/ecdsa/types.js +1 -1
- package/dist/src/account-lib/mpc/tss/eddsa/eddsa.d.ts +1 -1
- package/dist/src/account-lib/mpc/tss/eddsa/eddsa.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/tss/eddsa/eddsa.js +1 -1
- package/dist/src/account-lib/mpc/tss/eddsa/types.d.ts +0 -3
- package/dist/src/account-lib/mpc/tss/eddsa/types.d.ts.map +1 -1
- package/dist/src/account-lib/mpc/tss/eddsa/types.js +1 -1
- package/dist/src/bitgo/baseCoin/baseCoin.d.ts +16 -0
- package/dist/src/bitgo/baseCoin/baseCoin.d.ts.map +1 -1
- package/dist/src/bitgo/baseCoin/baseCoin.js +15 -1
- package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts +20 -4
- package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts.map +1 -1
- package/dist/src/bitgo/baseCoin/iBaseCoin.js +1 -1
- package/dist/src/bitgo/bitgoBase.d.ts +2 -1
- package/dist/src/bitgo/bitgoBase.d.ts.map +1 -1
- package/dist/src/bitgo/bitgoBase.js +1 -1
- package/dist/src/bitgo/enterprise/enterprise.d.ts +13 -1
- package/dist/src/bitgo/enterprise/enterprise.d.ts.map +1 -1
- package/dist/src/bitgo/enterprise/enterprise.js +29 -1
- package/dist/src/bitgo/enterprise/enterprises.d.ts +6 -0
- package/dist/src/bitgo/enterprise/enterprises.d.ts.map +1 -1
- package/dist/src/bitgo/enterprise/enterprises.js +26 -1
- package/dist/src/bitgo/enterprise/iEnterprise.d.ts +4 -1
- package/dist/src/bitgo/enterprise/iEnterprise.d.ts.map +1 -1
- package/dist/src/bitgo/enterprise/iEnterprise.js +1 -1
- package/dist/src/bitgo/enterprise/iEnterprises.d.ts +2 -0
- package/dist/src/bitgo/enterprise/iEnterprises.d.ts.map +1 -1
- package/dist/src/bitgo/enterprise/iEnterprises.js +1 -1
- package/dist/src/bitgo/environments.d.ts +7 -0
- package/dist/src/bitgo/environments.d.ts.map +1 -1
- package/dist/src/bitgo/environments.js +17 -3
- package/dist/src/bitgo/keychain/iKeychains.d.ts +6 -0
- package/dist/src/bitgo/keychain/iKeychains.d.ts.map +1 -1
- package/dist/src/bitgo/keychain/iKeychains.js +1 -1
- package/dist/src/bitgo/keychain/keychains.d.ts.map +1 -1
- package/dist/src/bitgo/keychain/keychains.js +30 -24
- package/dist/src/bitgo/keychain/ovcJsonCodec.d.ts +124 -89
- package/dist/src/bitgo/keychain/ovcJsonCodec.d.ts.map +1 -1
- package/dist/src/bitgo/keychain/ovcJsonCodec.js +31 -24
- package/dist/src/bitgo/pendingApproval/iPendingApproval.d.ts +2 -0
- package/dist/src/bitgo/pendingApproval/iPendingApproval.d.ts.map +1 -1
- package/dist/src/bitgo/pendingApproval/iPendingApproval.js +1 -1
- package/dist/src/bitgo/pendingApproval/pendingApproval.d.ts.map +1 -1
- package/dist/src/bitgo/pendingApproval/pendingApproval.js +13 -1
- package/dist/src/bitgo/recovery/initiate.d.ts +7 -1
- package/dist/src/bitgo/recovery/initiate.d.ts.map +1 -1
- package/dist/src/bitgo/recovery/initiate.js +1 -1
- package/dist/src/bitgo/staking/iStakingWallet.d.ts +11 -1
- package/dist/src/bitgo/staking/iStakingWallet.d.ts.map +1 -1
- package/dist/src/bitgo/staking/iStakingWallet.js +1 -1
- package/dist/src/bitgo/staking/stakingWallet.d.ts +7 -1
- package/dist/src/bitgo/staking/stakingWallet.d.ts.map +1 -1
- package/dist/src/bitgo/staking/stakingWallet.js +9 -1
- package/dist/src/bitgo/tss/common.d.ts +15 -4
- package/dist/src/bitgo/tss/common.d.ts.map +1 -1
- package/dist/src/bitgo/tss/common.js +26 -11
- package/dist/src/bitgo/tss/ecdsa/ecdsa.d.ts +11 -8
- package/dist/src/bitgo/tss/ecdsa/ecdsa.d.ts.map +1 -1
- package/dist/src/bitgo/tss/ecdsa/ecdsa.js +36 -33
- package/dist/src/bitgo/tss/ecdsa/types.d.ts +2 -2
- package/dist/src/bitgo/tss/ecdsa/types.d.ts.map +1 -1
- package/dist/src/bitgo/tss/ecdsa/types.js +1 -1
- package/dist/src/bitgo/tss/eddsa/eddsa.d.ts +6 -5
- package/dist/src/bitgo/tss/eddsa/eddsa.d.ts.map +1 -1
- package/dist/src/bitgo/tss/eddsa/eddsa.js +20 -9
- package/dist/src/bitgo/tss/types.d.ts +19 -0
- package/dist/src/bitgo/tss/types.d.ts.map +1 -1
- package/dist/src/bitgo/tss/types.js +1 -1
- package/dist/src/bitgo/utils/codecProps.d.ts +7 -0
- package/dist/src/bitgo/utils/codecProps.d.ts.map +1 -0
- package/dist/src/bitgo/utils/codecProps.js +41 -0
- package/dist/src/bitgo/utils/opengpgUtils.d.ts.map +1 -1
- package/dist/src/bitgo/utils/opengpgUtils.js +7 -10
- package/dist/src/bitgo/utils/postWithCodec.d.ts +18 -0
- package/dist/src/bitgo/utils/postWithCodec.d.ts.map +1 -0
- package/dist/src/bitgo/utils/postWithCodec.js +59 -0
- package/dist/src/bitgo/utils/tss/baseTSSUtils.d.ts +59 -12
- package/dist/src/bitgo/utils/tss/baseTSSUtils.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/baseTSSUtils.js +71 -9
- package/dist/src/bitgo/utils/tss/baseTypes.d.ts +174 -9
- package/dist/src/bitgo/utils/tss/baseTypes.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/baseTypes.js +27 -2
- package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.d.ts +47 -7
- package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.js +247 -119
- package/dist/src/bitgo/utils/tss/ecdsa/types.d.ts +9 -0
- package/dist/src/bitgo/utils/tss/ecdsa/types.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/ecdsa/types.js +1 -1
- package/dist/src/bitgo/utils/tss/eddsa/eddsa.d.ts +18 -5
- package/dist/src/bitgo/utils/tss/eddsa/eddsa.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/eddsa/eddsa.js +79 -25
- package/dist/src/bitgo/wallet/BuildParams.d.ts +112 -0
- package/dist/src/bitgo/wallet/BuildParams.d.ts.map +1 -0
- package/dist/src/bitgo/wallet/BuildParams.js +121 -0
- package/dist/src/bitgo/wallet/SendTransactionRequest.d.ts +93 -0
- package/dist/src/bitgo/wallet/SendTransactionRequest.d.ts.map +1 -0
- package/dist/src/bitgo/wallet/SendTransactionRequest.js +41 -0
- package/dist/src/bitgo/wallet/iWallet.d.ts +14 -1
- package/dist/src/bitgo/wallet/iWallet.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/iWallet.js +1 -1
- package/dist/src/bitgo/wallet/wallet.d.ts +11 -2
- package/dist/src/bitgo/wallet/wallet.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/wallet.js +140 -82
- package/dist/src/index.d.ts +4 -0
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +4 -2
- package/dist/src/openssl/index.d.ts +4 -1
- package/dist/src/openssl/index.d.ts.map +1 -1
- package/dist/src/openssl/index.js +7 -12
- package/dist/test/node.utils.d.ts +2 -0
- package/dist/test/node.utils.d.ts.map +1 -0
- package/dist/test/node.utils.js +5 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.d.ts +2 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.d.ts.map +1 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.js +185 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.d.ts +3 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.d.ts.map +1 -0
- package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.js +24 -0
- package/dist/test/unit/bitgo/utils/postWithCodec.d.ts +2 -0
- package/dist/test/unit/bitgo/utils/postWithCodec.d.ts.map +1 -0
- package/dist/test/unit/bitgo/utils/postWithCodec.js +79 -0
- package/dist/test/unit/bitgo/wallet/SendTransactionRequest.d.ts +2 -0
- package/dist/test/unit/bitgo/wallet/SendTransactionRequest.d.ts.map +1 -0
- package/dist/test/unit/bitgo/wallet/SendTransactionRequest.js +49 -0
- package/dist/test/unit/openssl.d.ts +2 -0
- package/dist/test/unit/openssl.d.ts.map +1 -0
- package/dist/test/unit/openssl.js +39 -0
- package/dist/test/unit/units.d.ts +2 -0
- package/dist/test/unit/units.d.ts.map +1 -0
- package/dist/test/unit/units.js +98 -0
- package/dist/tsconfig.tsbuildinfo +1 -8279
- package/package.json +14 -13
- package/dist/src/account-lib/mpc/hdTree.d.ts +0 -31
- package/dist/src/account-lib/mpc/hdTree.d.ts.map +0 -1
- package/dist/src/account-lib/mpc/hdTree.js +0 -141
- package/dist/src/account-lib/mpc/types.d.ts +0 -5
- package/dist/src/account-lib/mpc/types.d.ts.map +0 -1
- package/dist/src/account-lib/mpc/types.js +0 -3
- package/dist/src/openssl/openssl.d.ts +0 -12
- package/dist/src/openssl/openssl.d.ts.map +0 -1
- package/dist/src/openssl/openssl.js +0 -48
- package/dist/src/openssl/opensslbytes.d.ts +0 -4
- package/dist/src/openssl/opensslbytes.d.ts.map +0 -1
- package/dist/src/openssl/opensslbytes.js +0 -20
|
@@ -1,63 +1,9 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.Ed25519Curve = void 0;
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
await sodium.ready;
|
|
11
|
-
Ed25519Curve.initialized = true;
|
|
12
|
-
}
|
|
13
|
-
return new Ed25519Curve();
|
|
14
|
-
}
|
|
15
|
-
scalarRandom() {
|
|
16
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_reduce(util_1.bigIntFromBufferLE(crypto_1.randomBytes(64)))));
|
|
17
|
-
}
|
|
18
|
-
scalarReduce(s) {
|
|
19
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_reduce(util_1.bigIntToBufferLE(s, 64))));
|
|
20
|
-
}
|
|
21
|
-
scalarNegate(s) {
|
|
22
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_negate(util_1.bigIntToBufferLE(s, 32))));
|
|
23
|
-
}
|
|
24
|
-
scalarInvert(s) {
|
|
25
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_invert(util_1.bigIntToBufferLE(s, 32))));
|
|
26
|
-
}
|
|
27
|
-
scalarAdd(x, y) {
|
|
28
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_add(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
|
|
29
|
-
}
|
|
30
|
-
scalarSub(x, y) {
|
|
31
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_sub(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
|
|
32
|
-
}
|
|
33
|
-
scalarMult(x, y) {
|
|
34
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_mul(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
|
|
35
|
-
}
|
|
36
|
-
basePointMult(n) {
|
|
37
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_scalarmult_ed25519_base_noclamp(util_1.bigIntToBufferLE(n, 32))));
|
|
38
|
-
}
|
|
39
|
-
pointAdd(p, q) {
|
|
40
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_add(util_1.bigIntToBufferLE(p, 32), util_1.bigIntToBufferLE(q, 32))));
|
|
41
|
-
}
|
|
42
|
-
pointMultiply(p, s) {
|
|
43
|
-
return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_scalarmult_ed25519_noclamp(util_1.bigIntToBufferLE(s, 32), util_1.bigIntToBufferLE(p, 32))));
|
|
44
|
-
}
|
|
45
|
-
verify(message, signature, publicKey) {
|
|
46
|
-
const signedMessage = Buffer.concat([signature, message]);
|
|
47
|
-
try {
|
|
48
|
-
// Returns the message which was signed if the signature is valid
|
|
49
|
-
const result = Buffer.from(sodium.crypto_sign_open(signedMessage, util_1.bigIntToBufferLE(publicKey, 32)));
|
|
50
|
-
return Buffer.compare(message, result) === 0;
|
|
51
|
-
}
|
|
52
|
-
catch (error) {
|
|
53
|
-
// Invalid signature causes an exception
|
|
54
|
-
return false;
|
|
55
|
-
}
|
|
56
|
-
}
|
|
57
|
-
order() {
|
|
58
|
-
return BigInt('0x1000000000000000000000000000000014def9dea2f79cd65812631a5cf5d3ed') * BigInt('0x08');
|
|
59
|
-
}
|
|
60
|
-
}
|
|
61
|
-
exports.Ed25519Curve = Ed25519Curve;
|
|
62
|
-
Ed25519Curve.initialized = false;
|
|
63
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
4
|
+
/**
|
|
5
|
+
* @deprecated use Ed25519Curve from sdk-lib-mpc instead
|
|
6
|
+
*/
|
|
7
|
+
var sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
|
|
8
|
+
Object.defineProperty(exports, "Ed25519Curve", { enumerable: true, get: function () { return sdk_lib_mpc_1.Ed25519Curve; } });
|
|
9
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZWQyNTUxOS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9hY2NvdW50LWxpYi9tcGMvY3VydmVzL2VkMjU1MTkudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUE7O0dBRUc7QUFDSCx1REFBdUQ7QUFBOUMsMkdBQUEsWUFBWSxPQUFBIiwic291cmNlc0NvbnRlbnQiOlsiLyoqXG4gKiBAZGVwcmVjYXRlZCB1c2UgRWQyNTUxOUN1cnZlIGZyb20gc2RrLWxpYi1tcGMgaW5zdGVhZFxuICovXG5leHBvcnQgeyBFZDI1NTE5Q3VydmUgfSBmcm9tICdAYml0Z28tYmV0YS9zZGstbGliLW1wYyc7XG4iXX0=
|
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
import HDTree,
|
|
1
|
+
import { HDTree, Ed25519Bip32HdTree, Secp256k1Bip32HdTree } from '@bitgo-beta/sdk-lib-mpc';
|
|
2
2
|
import { EDDSA } from './tss';
|
|
3
3
|
import ShamirSecret from './shamir';
|
|
4
|
-
|
|
4
|
+
declare type KeyShare = EDDSA.KeyShare;
|
|
5
5
|
export * from './curves';
|
|
6
6
|
export * from './util';
|
|
7
|
-
|
|
8
|
-
export { Ed25519BIP32, HDTree, KeyShare, ShamirSecret, BIP32 };
|
|
7
|
+
export { Ecdsa, ECDSA, Eddsa, EDDSA, rangeProof } from './tss';
|
|
8
|
+
export { Ed25519Bip32HdTree as Ed25519BIP32, HDTree, KeyShare, ShamirSecret, Secp256k1Bip32HdTree as BIP32 };
|
|
9
9
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/index.ts"],"names":[],"mappings":"AAAA,OAAO,MAAM,EAAE,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,kBAAkB,EAAE,oBAAoB,EAAE,MAAM,yBAAyB,CAAC;AAC3F,OAAO,EAAE,KAAK,EAAE,MAAM,OAAO,CAAC;AAC9B,OAAO,YAAY,MAAM,UAAU,CAAC;AAEpC,aAAK,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC;AAE/B,cAAc,UAAU,CAAC;AACzB,cAAc,QAAQ,CAAC;AACvB,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,UAAU,EAAE,MAAM,OAAO,CAAC;AAC/D,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,EAAE,QAAQ,EAAE,YAAY,EAAE,oBAAoB,IAAI,KAAK,EAAE,CAAC"}
|
|
@@ -14,17 +14,17 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
14
14
|
};
|
|
15
15
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
16
|
exports.BIP32 = exports.ShamirSecret = exports.Ed25519BIP32 = exports.rangeProof = exports.EDDSA = exports.Eddsa = exports.ECDSA = exports.Ecdsa = void 0;
|
|
17
|
-
const
|
|
18
|
-
Object.defineProperty(exports, "Ed25519BIP32", { enumerable: true, get: function () { return
|
|
19
|
-
Object.defineProperty(exports, "BIP32", { enumerable: true, get: function () { return
|
|
17
|
+
const sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
|
|
18
|
+
Object.defineProperty(exports, "Ed25519BIP32", { enumerable: true, get: function () { return sdk_lib_mpc_1.Ed25519Bip32HdTree; } });
|
|
19
|
+
Object.defineProperty(exports, "BIP32", { enumerable: true, get: function () { return sdk_lib_mpc_1.Secp256k1Bip32HdTree; } });
|
|
20
20
|
const shamir_1 = __importDefault(require("./shamir"));
|
|
21
21
|
exports.ShamirSecret = shamir_1.default;
|
|
22
|
+
__exportStar(require("./curves"), exports);
|
|
23
|
+
__exportStar(require("./util"), exports);
|
|
22
24
|
var tss_1 = require("./tss");
|
|
23
25
|
Object.defineProperty(exports, "Ecdsa", { enumerable: true, get: function () { return tss_1.Ecdsa; } });
|
|
24
26
|
Object.defineProperty(exports, "ECDSA", { enumerable: true, get: function () { return tss_1.ECDSA; } });
|
|
25
27
|
Object.defineProperty(exports, "Eddsa", { enumerable: true, get: function () { return tss_1.Eddsa; } });
|
|
26
28
|
Object.defineProperty(exports, "EDDSA", { enumerable: true, get: function () { return tss_1.EDDSA; } });
|
|
27
29
|
Object.defineProperty(exports, "rangeProof", { enumerable: true, get: function () { return tss_1.rangeProof; } });
|
|
28
|
-
|
|
29
|
-
__exportStar(require("./util"), exports);
|
|
30
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
30
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,38 +1,6 @@
|
|
|
1
|
-
import
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
/**
|
|
7
|
-
* Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
|
|
8
|
-
* ways. The split secret requires `threshold` shares to be reconstructed.
|
|
9
|
-
*
|
|
10
|
-
* @param secret secret to split
|
|
11
|
-
* @param threshold share threshold required to reconstruct secret
|
|
12
|
-
* @param numShares total number of shares to split to split secret into
|
|
13
|
-
* @param indices optional indices which can be used while generating the shares
|
|
14
|
-
* @param salt optional salt which could be used while generating the shares
|
|
15
|
-
* @returns Dictionary containing `shares`, a dictionary where each key is an int
|
|
16
|
-
* in the range 1<=x<=numShares representing that share's free term, and `v`, an
|
|
17
|
-
* array of proofs to be shared with all participants.
|
|
18
|
-
*/
|
|
19
|
-
split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt?: bigint): SplitSecret;
|
|
20
|
-
/**
|
|
21
|
-
* Verify a VSS share.
|
|
22
|
-
*
|
|
23
|
-
* @param u Secret share received from other party.
|
|
24
|
-
* @param v Verification values received from other party.
|
|
25
|
-
* @param index Verifier's index.
|
|
26
|
-
* @returns True on success; otherwise throws Error.
|
|
27
|
-
*/
|
|
28
|
-
verify(u: bigint, v: Array<bigint>, index: number): boolean;
|
|
29
|
-
/**
|
|
30
|
-
* Reconstitute a secret from a dictionary of shares. The number of shares must
|
|
31
|
-
* be equal to `t` to reconstitute the original secret.
|
|
32
|
-
*
|
|
33
|
-
* @param shares dictionary of shares. each key is the free term of the share
|
|
34
|
-
* @returns secret
|
|
35
|
-
*/
|
|
36
|
-
combine(shares: Record<number, bigint>): bigint;
|
|
37
|
-
}
|
|
1
|
+
import { Shamir } from '@bitgo-beta/sdk-lib-mpc';
|
|
2
|
+
/**
|
|
3
|
+
* @deprecated use Shamir from sdk-lib-mpc instead
|
|
4
|
+
*/
|
|
5
|
+
export default Shamir;
|
|
38
6
|
//# sourceMappingURL=shamir.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjD;;GAEG;AACH,eAAe,MAAM,CAAC"}
|
|
@@ -1,132 +1,8 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
/**
|
|
10
|
-
* Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
|
|
11
|
-
* ways. The split secret requires `threshold` shares to be reconstructed.
|
|
12
|
-
*
|
|
13
|
-
* @param secret secret to split
|
|
14
|
-
* @param threshold share threshold required to reconstruct secret
|
|
15
|
-
* @param numShares total number of shares to split to split secret into
|
|
16
|
-
* @param indices optional indices which can be used while generating the shares
|
|
17
|
-
* @param salt optional salt which could be used while generating the shares
|
|
18
|
-
* @returns Dictionary containing `shares`, a dictionary where each key is an int
|
|
19
|
-
* in the range 1<=x<=numShares representing that share's free term, and `v`, an
|
|
20
|
-
* array of proofs to be shared with all participants.
|
|
21
|
-
*/
|
|
22
|
-
split(secret, threshold, numShares, indices, salt = BigInt(0)) {
|
|
23
|
-
let bigIndices;
|
|
24
|
-
if (indices) {
|
|
25
|
-
bigIndices = indices.map((i) => {
|
|
26
|
-
if (i < 1) {
|
|
27
|
-
throw new Error('Invalid value supplied for indices');
|
|
28
|
-
}
|
|
29
|
-
return BigInt(i);
|
|
30
|
-
});
|
|
31
|
-
}
|
|
32
|
-
else {
|
|
33
|
-
// make range(1, n + 1)
|
|
34
|
-
bigIndices = Array(numShares)
|
|
35
|
-
.fill(null)
|
|
36
|
-
.map((_, i) => BigInt(i + 1));
|
|
37
|
-
}
|
|
38
|
-
if (threshold < 2) {
|
|
39
|
-
throw new Error('Threshold cannot be less than two');
|
|
40
|
-
}
|
|
41
|
-
if (threshold > numShares) {
|
|
42
|
-
throw new Error('Threshold cannot be greater than the total number of shares');
|
|
43
|
-
}
|
|
44
|
-
const coefs = [];
|
|
45
|
-
const v = [];
|
|
46
|
-
for (let ind = 0; ind < threshold - 1; ind++) {
|
|
47
|
-
const coeff = util_1.clamp(util_1.bigIntFromBufferLE(crypto.createHmac('sha256', ind.toString(10)).update(util_1.bigIntToBufferLE(secret, 32)).digest()));
|
|
48
|
-
coefs.push(coeff);
|
|
49
|
-
v.unshift(this.curve.basePointMult(coeff));
|
|
50
|
-
}
|
|
51
|
-
coefs.push(secret);
|
|
52
|
-
const shares = {};
|
|
53
|
-
for (let ind = 0; ind < bigIndices.length; ind++) {
|
|
54
|
-
const x = bigIndices[ind];
|
|
55
|
-
let partial = coefs[0];
|
|
56
|
-
for (let other = 1; other < coefs.length; other++) {
|
|
57
|
-
partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));
|
|
58
|
-
}
|
|
59
|
-
shares[parseInt(x.toString(), 10)] = partial;
|
|
60
|
-
}
|
|
61
|
-
return { shares, v };
|
|
62
|
-
}
|
|
63
|
-
/**
|
|
64
|
-
* Verify a VSS share.
|
|
65
|
-
*
|
|
66
|
-
* @param u Secret share received from other party.
|
|
67
|
-
* @param v Verification values received from other party.
|
|
68
|
-
* @param index Verifier's index.
|
|
69
|
-
* @returns True on success; otherwise throws Error.
|
|
70
|
-
*/
|
|
71
|
-
verify(u, v, index) {
|
|
72
|
-
if (v.length < 2) {
|
|
73
|
-
throw new Error('Threshold cannot be less than two');
|
|
74
|
-
}
|
|
75
|
-
if (index < 1) {
|
|
76
|
-
throw new Error('Invalid value supplied for index');
|
|
77
|
-
}
|
|
78
|
-
const i = BigInt(index);
|
|
79
|
-
let x = v[0];
|
|
80
|
-
let t = BigInt(1);
|
|
81
|
-
for (const vsj of v.slice(1)) {
|
|
82
|
-
t = this.curve.scalarMult(t, i);
|
|
83
|
-
const vjt = this.curve.pointMultiply(vsj, t);
|
|
84
|
-
x = this.curve.pointAdd(x, vjt);
|
|
85
|
-
}
|
|
86
|
-
const sigmaG = this.curve.basePointMult(u);
|
|
87
|
-
if (x !== sigmaG) {
|
|
88
|
-
throw new Error('Could not verify share');
|
|
89
|
-
}
|
|
90
|
-
return true;
|
|
91
|
-
}
|
|
92
|
-
/**
|
|
93
|
-
* Reconstitute a secret from a dictionary of shares. The number of shares must
|
|
94
|
-
* be equal to `t` to reconstitute the original secret.
|
|
95
|
-
*
|
|
96
|
-
* @param shares dictionary of shares. each key is the free term of the share
|
|
97
|
-
* @returns secret
|
|
98
|
-
*/
|
|
99
|
-
combine(shares) {
|
|
100
|
-
try {
|
|
101
|
-
let s = BigInt(0);
|
|
102
|
-
for (const i in shares) {
|
|
103
|
-
const yi = shares[i];
|
|
104
|
-
const xi = BigInt(i);
|
|
105
|
-
let num = BigInt(1);
|
|
106
|
-
let denum = BigInt(1);
|
|
107
|
-
for (const j in shares) {
|
|
108
|
-
const xj = BigInt(j);
|
|
109
|
-
if (xi !== xj) {
|
|
110
|
-
num = this.curve.scalarMult(num, xj);
|
|
111
|
-
}
|
|
112
|
-
}
|
|
113
|
-
for (const j in shares) {
|
|
114
|
-
const xj = BigInt(j);
|
|
115
|
-
if (xi !== xj) {
|
|
116
|
-
denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));
|
|
117
|
-
}
|
|
118
|
-
}
|
|
119
|
-
const inverted = this.curve.scalarInvert(denum);
|
|
120
|
-
const innerMultiplied = this.curve.scalarMult(num, inverted);
|
|
121
|
-
const multiplied = this.curve.scalarMult(innerMultiplied, yi);
|
|
122
|
-
s = this.curve.scalarAdd(multiplied, s);
|
|
123
|
-
}
|
|
124
|
-
return s;
|
|
125
|
-
}
|
|
126
|
-
catch (error) {
|
|
127
|
-
throw new Error('Failed to combine Shamir shares , ' + error);
|
|
128
|
-
}
|
|
129
|
-
}
|
|
130
|
-
}
|
|
131
|
-
exports.default = Shamir;
|
|
132
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"shamir.js","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":";;AAAA,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;AAEjC,iCAAqE;AAGrE,MAAqB,MAAM;IAGzB,YAAY,KAAY;QACtB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAc,EAAE,SAAiB,EAAE,SAAiB,EAAE,OAAuB,EAAE,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC;QACnG,IAAI,UAAyB,CAAC;QAC9B,IAAI,OAAO,EAAE;YACX,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;gBAC7B,IAAI,CAAC,GAAG,CAAC,EAAE;oBACT,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;iBACvD;gBACD,OAAO,MAAM,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC,CAAC,CAAC;SACJ;aAAM;YACL,uBAAuB;YACvB,UAAU,GAAG,KAAK,CAAC,SAAS,CAAC;iBAC1B,IAAI,CAAC,IAAI,CAAC;iBACV,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;SACjC;QACD,IAAI,SAAS,GAAG,CAAC,EAAE;YACjB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QAED,IAAI,SAAS,GAAG,SAAS,EAAE;YACzB,MAAM,IAAI,KAAK,CAAC,6DAA6D,CAAC,CAAC;SAChF;QAED,MAAM,KAAK,GAAa,EAAE,CAAC;QAC3B,MAAM,CAAC,GAAkB,EAAE,CAAC;QAC5B,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,SAAS,GAAG,CAAC,EAAE,GAAG,EAAE,EAAE;YAC5C,MAAM,KAAK,GAAG,YAAK,CACjB,yBAAkB,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,uBAAgB,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAChH,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAClB,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC;SAC5C;QACD,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEnB,MAAM,MAAM,GAA2B,EAAE,CAAC;QAC1C,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,UAAU,CAAC,MAAM,EAAE,GAAG,EAAE,EAAE;YAChD,MAAM,CAAC,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC;YAC1B,IAAI,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACvB,KAAK,IAAI,KAAK,GAAG,CAAC,EAAE,KAAK,GAAG,KAAK,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;gBACjD,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC;aACjF;YACD,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,EAAE,CAAC,CAAC,GAAG,OAAO,CAAC;SAC9C;QACD,OAAO,EAAE,MAAM,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,CAAS,EAAE,CAAgB,EAAE,KAAa;QAC/C,IAAI,CAAC,CAAC,MAAM,GAAG,CAAC,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QACD,IAAI,KAAK,GAAG,CAAC,EAAE;YACb,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;SACrD;QACD,MAAM,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC;QACxB,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACb,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QAClB,KAAK,MAAM,GAAG,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;YAC5B,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAChC,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;YAC7C,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC;SACjC;QACD,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;QAC3C,IAAI,CAAC,KAAK,MAAM,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;SAC3C;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;OAMG;IACH,OAAO,CAAC,MAA8B;QACpC,IAAI;YACF,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;gBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,IAAI,GAAG,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACpB,IAAI,KAAK,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAEtB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;qBACtC;iBACF;gBACD,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC,CAAC;qBACpE;iBACF;gBACD,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;gBAChD,MAAM,eAAe,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;gBAC7D,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,eAAe,EAAE,EAAE,CAAC,CAAC;gBAC9D,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;aACzC;YACD,OAAO,CAAC,CAAC;SACV;QAAC,OAAO,KAAK,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,oCAAoC,GAAG,KAAK,CAAC,CAAC;SAC/D;IACH,CAAC;CACF;AAtID,yBAsIC","sourcesContent":["const crypto = require('crypto');\nimport Curve from './curves';\nimport { bigIntFromBufferLE, bigIntToBufferLE, clamp } from './util';\nimport { SplitSecret } from './types';\n\nexport default class Shamir {\n  curve: Curve;\n\n  constructor(curve: Curve) {\n    this.curve = curve;\n  }\n\n  /**\n   * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`\n   * ways. The split secret requires `threshold` shares to be reconstructed.\n   *\n   * @param secret secret to split\n   * @param threshold share threshold required to reconstruct secret\n   * @param numShares total number of shares to split to split secret into\n   * @param indices optional indices which can be used while generating the shares\n   * @param salt optional salt which could be used while generating the shares\n   * @returns Dictionary containing `shares`, a dictionary where each key is an int\n   * in the range 1<=x<=numShares representing that share's free term, and `v`, an\n   * array of proofs to be shared with all participants.\n   */\n  split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt = BigInt(0)): SplitSecret {\n    let bigIndices: Array<bigint>;\n    if (indices) {\n      bigIndices = indices.map((i) => {\n        if (i < 1) {\n          throw new Error('Invalid value supplied for indices');\n        }\n        return BigInt(i);\n      });\n    } else {\n      // make range(1, n + 1)\n      bigIndices = Array(numShares)\n        .fill(null)\n        .map((_, i) => BigInt(i + 1));\n    }\n    if (threshold < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n\n    if (threshold > numShares) {\n      throw new Error('Threshold cannot be greater than the total number of shares');\n    }\n\n    const coefs: bigint[] = [];\n    const v: Array<bigint> = [];\n    for (let ind = 0; ind < threshold - 1; ind++) {\n      const coeff = clamp(\n        bigIntFromBufferLE(crypto.createHmac('sha256', ind.toString(10)).update(bigIntToBufferLE(secret, 32)).digest())\n      );\n      coefs.push(coeff);\n      v.unshift(this.curve.basePointMult(coeff));\n    }\n    coefs.push(secret);\n\n    const shares: Record<number, bigint> = {};\n    for (let ind = 0; ind < bigIndices.length; ind++) {\n      const x = bigIndices[ind];\n      let partial = coefs[0];\n      for (let other = 1; other < coefs.length; other++) {\n        partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));\n      }\n      shares[parseInt(x.toString(), 10)] = partial;\n    }\n    return { shares, v };\n  }\n\n  /**\n   * Verify a VSS share.\n   *\n   * @param u Secret share received from other party.\n   * @param v Verification values received from other party.\n   * @param index Verifier's index.\n   * @returns True on success; otherwise throws Error.\n   */\n  verify(u: bigint, v: Array<bigint>, index: number): boolean {\n    if (v.length < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n    if (index < 1) {\n      throw new Error('Invalid value supplied for index');\n    }\n    const i = BigInt(index);\n    let x = v[0];\n    let t = BigInt(1);\n    for (const vsj of v.slice(1)) {\n      t = this.curve.scalarMult(t, i);\n      const vjt = this.curve.pointMultiply(vsj, t);\n      x = this.curve.pointAdd(x, vjt);\n    }\n    const sigmaG = this.curve.basePointMult(u);\n    if (x !== sigmaG) {\n      throw new Error('Could not verify share');\n    }\n    return true;\n  }\n\n  /**\n   * Reconstitute a secret from a dictionary of shares. The number of shares must\n   * be equal to `t` to reconstitute the original secret.\n   *\n   * @param shares dictionary of shares. each key is the free term of the share\n   * @returns secret\n   */\n  combine(shares: Record<number, bigint>): bigint {\n    try {\n      let s = BigInt(0);\n      for (const i in shares) {\n        const yi = shares[i];\n        const xi = BigInt(i);\n        let num = BigInt(1);\n        let denum = BigInt(1);\n\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            num = this.curve.scalarMult(num, xj);\n          }\n        }\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));\n          }\n        }\n        const inverted = this.curve.scalarInvert(denum);\n        const innerMultiplied = this.curve.scalarMult(num, inverted);\n        const multiplied = this.curve.scalarMult(innerMultiplied, yi);\n        s = this.curve.scalarAdd(multiplied, s);\n      }\n      return s;\n    } catch (error) {\n      throw new Error('Failed to combine Shamir shares , ' + error);\n    }\n  }\n}\n"]}
|
|
3
|
+
const sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
|
|
4
|
+
/**
|
|
5
|
+
* @deprecated use Shamir from sdk-lib-mpc instead
|
|
6
|
+
*/
|
|
7
|
+
exports.default = sdk_lib_mpc_1.Shamir;
|
|
8
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2hhbWlyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL2FjY291bnQtbGliL21wYy9zaGFtaXIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFBQSx5REFBaUQ7QUFDakQ7O0dBRUc7QUFDSCxrQkFBZSxvQkFBTSxDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgU2hhbWlyIH0gZnJvbSAnQGJpdGdvLWJldGEvc2RrLWxpYi1tcGMnO1xuLyoqXG4gKiBAZGVwcmVjYXRlZCB1c2UgU2hhbWlyIGZyb20gc2RrLWxpYi1tcGMgaW5zdGVhZFxuICovXG5leHBvcnQgZGVmYXVsdCBTaGFtaXI7XG4iXX0=
|
|
@@ -1,10 +1,9 @@
|
|
|
1
1
|
/// <reference types="node" />
|
|
2
|
-
import HDTree from '../../hdTree';
|
|
3
2
|
import { Hash } from 'crypto';
|
|
4
3
|
import { Secp256k1Curve } from '../../curves';
|
|
5
4
|
import Shamir from '../../shamir';
|
|
6
|
-
import { EcdsaTypes } from '@bitgo-beta/sdk-lib-mpc';
|
|
7
|
-
import { DShare, KeyCombined, KeyShare, NShare, OShare, PShare, Signature, SignCombine, SignCombineRT, SignConvert, SignConvertRT, SignShareRT, SShare, SubkeyShare,
|
|
5
|
+
import { EcdsaTypes, HDTree } from '@bitgo-beta/sdk-lib-mpc';
|
|
6
|
+
import { DShare, KeyCombined, KeyShare, NShare, OShare, PShare, PublicUTShare, Signature, SignCombine, SignCombineRT, SignConvert, SignConvertRT, SignConvertStep1, SignConvertStep1Response, SignConvertStep2, SignConvertStep2Response, SignConvertStep3, SignConvertStep3Response, SignShareRT, SShare, SubkeyShare, UTShare, VAShareWithProofs, VAShare, XShareWithChallenges, YShareWithChallenges, PublicVAShareWithProofs } from './types';
|
|
8
7
|
/**
|
|
9
8
|
* ECDSA TSS implementation supporting 2:n Threshold
|
|
10
9
|
*/
|
|
@@ -52,10 +51,11 @@ export default class Ecdsa {
|
|
|
52
51
|
* Appends a given range proof challenge to the shares previously created
|
|
53
52
|
* by #keyCombine. Generates a new challenge if not provided.
|
|
54
53
|
* @param {XShare | YShare} share Private xShare or yShare of the signing operation
|
|
55
|
-
* @param
|
|
54
|
+
* @param rangeProofChallenge - challenge generated via generateNtilde
|
|
55
|
+
* @param paillierProofChallenge
|
|
56
56
|
* @returns {KeyCombined} The share with amended challenge values
|
|
57
57
|
*/
|
|
58
|
-
appendChallenge<T
|
|
58
|
+
appendChallenge<T>(share: T, rangeProofChallenge: EcdsaTypes.SerializedNtilde, paillierProofChallenge: EcdsaTypes.SerializedPaillierChallenge): T & EcdsaTypes.SerializedEcdsaChallenges;
|
|
59
59
|
/**
|
|
60
60
|
* Create signing shares.
|
|
61
61
|
* @param {xShare} xShare Private xShare of current participant signer
|
|
@@ -63,11 +63,36 @@ export default class Ecdsa {
|
|
|
63
63
|
* @returns {SignShareRT} Returns the participant private w-share
|
|
64
64
|
* and k-share to be distributed to other participant signer
|
|
65
65
|
*/
|
|
66
|
-
signShare(xShare:
|
|
66
|
+
signShare(xShare: XShareWithChallenges, yShare: YShareWithChallenges): Promise<SignShareRT>;
|
|
67
|
+
/**
|
|
68
|
+
* Perform multiplicitive-to-additive (MtA) share conversion with another signer.
|
|
69
|
+
* Connection 1.2 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
|
|
70
|
+
* If signer A completed signShare initially (input to this fn), then this step is completed by signer B.
|
|
71
|
+
* @param {SignConvert} shares
|
|
72
|
+
* @returns {SignConvertRT}
|
|
73
|
+
*/
|
|
74
|
+
signConvertStep1(shares: SignConvertStep1): Promise<SignConvertStep1Response>;
|
|
67
75
|
/**
|
|
68
76
|
* Perform multiplicitive-to-additive (MtA) share conversion with another
|
|
69
77
|
* signer.
|
|
70
|
-
*
|
|
78
|
+
* Connection 2.1 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
|
|
79
|
+
* If signer B completed signConvertStep1, then this step is completed by signer A.
|
|
80
|
+
* @param {SignConvert} shares
|
|
81
|
+
* @returns {SignConvertRT}
|
|
82
|
+
*/
|
|
83
|
+
signConvertStep2(shares: SignConvertStep2): Promise<SignConvertStep2Response>;
|
|
84
|
+
/**
|
|
85
|
+
* Perform multiplicitive-to-additive (MtA) share conversion with another signer.
|
|
86
|
+
* Connection 2.2 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
|
|
87
|
+
* If signer A completed signConvertStep2, then this step is completed by signer B.
|
|
88
|
+
* @param {SignConvert} shares
|
|
89
|
+
* @returns {SignConvertRT}
|
|
90
|
+
*/
|
|
91
|
+
signConvertStep3(shares: SignConvertStep3): Promise<SignConvertStep3Response>;
|
|
92
|
+
/**
|
|
93
|
+
* Perform multiplicitive-to-additive (MtA) share conversion with another signer.
|
|
94
|
+
* @deprecated - use one of [signConvertStep1, signConvertStep2, signConvertStep3] instead
|
|
95
|
+
* @param {SignConvert} shares
|
|
71
96
|
* @returns {SignConvertRT}
|
|
72
97
|
*/
|
|
73
98
|
signConvert(shares: SignConvert): Promise<SignConvertRT>;
|
|
@@ -84,9 +109,32 @@ export default class Ecdsa {
|
|
|
84
109
|
* @param {DShare} dShare delta share received from the other participant
|
|
85
110
|
* @param {Hash} hash hashing algorithm implementing Node`s standard crypto hash interface
|
|
86
111
|
* @param {boolean} shouldHash if true, we hash the provided buffer before signing
|
|
87
|
-
* @returns {
|
|
112
|
+
* @returns {VAShare}
|
|
113
|
+
*/
|
|
114
|
+
sign(M: Buffer, oShare: OShare, dShare: DShare, hash?: Hash, shouldHash?: boolean): VAShare;
|
|
115
|
+
/**
|
|
116
|
+
* Generate proofs of V_i and A_i values.
|
|
117
|
+
* @param {Buffer} M Message to commit to as part of the context of the proof.
|
|
118
|
+
* This doesn't need to be the same message that was signed in the sign function above.
|
|
119
|
+
* But it should be the same for all participants for the purpose of providing proof context.
|
|
120
|
+
* @param {VAShare} vaShare The VAShare to prove.
|
|
121
|
+
* @returns {VAShareWithProofs}
|
|
122
|
+
*/
|
|
123
|
+
generateVAProofs(M: Buffer, vaShare: VAShare): VAShareWithProofs;
|
|
124
|
+
/**
|
|
125
|
+
* Verify V_i and A_i values of all other participants during signing phase 5 steps 5A and 5B.
|
|
126
|
+
* @param {VAShareWithProofs} vaShare V_i, A_i info including SShare values of the currenct participant
|
|
127
|
+
* @param {PublicVAShareWithProofs[]} publicVAShares public V_i, A_i info of all other participants
|
|
128
|
+
* @returns {UTShare} U_i, T_i info of the current participant if all verifications pass
|
|
129
|
+
*/
|
|
130
|
+
verifyVAShares(vaShare: VAShareWithProofs, publicVAShares: PublicVAShareWithProofs[]): UTShare;
|
|
131
|
+
/**
|
|
132
|
+
* Verify U_i and V_i values of all other participants during signing phase 5 steps 5C and 5D.
|
|
133
|
+
* @param {UTShare} utShare U_i, T_i info including SShare values of the currenct participant
|
|
134
|
+
* @param {PublicUTShare[]} publicUTShares public U_i, T_i info of all other participants
|
|
135
|
+
* @returns {SShare} SShare of the current participant if all verifications pass
|
|
88
136
|
*/
|
|
89
|
-
|
|
137
|
+
verifyUTShares(utShare: UTShare, publicUTShares: PublicUTShare[]): SShare;
|
|
90
138
|
/**
|
|
91
139
|
* Construct full signature by combining Sign Shares
|
|
92
140
|
* @param {SShare[]} shares
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ecdsa.d.ts","sourceRoot":"","sources":["../../../../../../src/account-lib/mpc/tss/ecdsa/ecdsa.ts"],"names":[],"mappings":";AAGA,OAAO,
|
|
1
|
+
{"version":3,"file":"ecdsa.d.ts","sourceRoot":"","sources":["../../../../../../src/account-lib/mpc/tss/ecdsa/ecdsa.ts"],"names":[],"mappings":";AAGA,OAAO,EAAc,IAAI,EAAe,MAAM,QAAQ,CAAC;AAGvD,OAAO,EAAE,cAAc,EAAE,MAAM,cAAc,CAAC;AAC9C,OAAO,MAAM,MAAM,cAAc,CAAC;AAClC,OAAO,EAGL,UAAU,EAOV,MAAM,EAGP,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAGL,MAAM,EAEN,WAAW,EACX,QAAQ,EAGR,MAAM,EACN,MAAM,EACN,MAAM,EACN,aAAa,EAEb,SAAS,EACT,WAAW,EACX,aAAa,EACb,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,wBAAwB,EACxB,gBAAgB,EAChB,wBAAwB,EACxB,gBAAgB,EAChB,wBAAwB,EACxB,WAAW,EACX,MAAM,EACN,WAAW,EACX,OAAO,EACP,iBAAiB,EACjB,OAAO,EAGP,oBAAoB,EACpB,oBAAoB,EACpB,uBAAuB,EACxB,MAAM,SAAS,CAAC;AAIjB;;GAEG;AACH,MAAM,CAAC,OAAO,OAAO,KAAK;IACxB,MAAM,CAAC,KAAK,EAAE,cAAc,CAAwB;IACpD,MAAM,CAAC,MAAM,EAAE,MAAM,CAA8B;IACnD,MAAM,CAAC,MAAM,EAAE,MAAM,CAA2B;IAChD;;;;;;;;;OASG;IACG,QAAQ,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM,EAAE,IAAI,UAAQ,GAAG,OAAO,CAAC,QAAQ,CAAC;IAkEnH;;;;;;OAMG;IACH,UAAU,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,WAAW;IAiD1D;;;;;;;OAOG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE,IAAI,EAAE,MAAM,GAAG,WAAW;IAkEvE;;;;;;OAMG;IACH,gBAAgB,CAAC,cAAc,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,MAAM;IAqB9D;;;;;;;OAOG;IACH,eAAe,CAAC,CAAC,EACf,KAAK,EAAE,CAAC,EACR,mBAAmB,EAAE,UAAU,CAAC,gBAAgB,EAChD,sBAAsB,EAAE,UAAU,CAAC,2BAA2B,GAC7D,CAAC,GAAG,UAAU,CAAC,yBAAyB;IAW3C;;;;;;OAMG;IACG,SAAS,CAAC,MAAM,EAAE,oBAAoB,EAAE,MAAM,EAAE,oBAAoB,GAAG,OAAO,CAAC,WAAW,CAAC;IAwFjG;;;;;;OAMG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IAwLnF;;;;;;;OAOG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IA4OnF;;;;;;OAMG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IAsGnF;;;;;OAKG;IACG,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,OAAO,CAAC,aAAa,CAAC;IA2S9D;;;;OAIG;IACH,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,aAAa;IAiC/C;;;;;;;;OAQG;IACH,IAAI,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,OAAO;IAwCxF;;;;;;;OAOG;IACH,gBAAgB,CAAC,CAAC,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,GAAG,iBAAiB;IAiBhE;;;;;OAKG;IACH,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE,cAAc,EAAE,uBAAuB,EAAE,GAAG,OAAO;IAgE9F;;;;;OAKG;IACH,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,GAAG,MAAM;IA4BzE;;;;OAIG;IACH,kBAAkB,CAAC,MAAM,EAAE,MAAM,EAAE,GAAG,SAAS;IAqB/C;;;;;;;OAOG;IACH,MAAM,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,OAAO;IAatF;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,SAAS,EAAE,UAAU,CAAC,gBAAgB,GAAG,UAAU,CAAC,kBAAkB;IAI/F;;;;OAIG;IACH,MAAM,CAAC,eAAe,CAAC,SAAS,EAAE,UAAU,CAAC,kBAAkB,GAAG,UAAU,CAAC,gBAAgB;CAG9F"}
|