@bitgo-beta/sdk-core 8.2.1-beta.13 → 8.2.1-beta.131

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (162) hide show
  1. package/CHANGELOG.md +432 -0
  2. package/dist/src/account-lib/baseCoin/enum.d.ts +6 -1
  3. package/dist/src/account-lib/baseCoin/enum.d.ts.map +1 -1
  4. package/dist/src/account-lib/baseCoin/enum.js +11 -1
  5. package/dist/src/account-lib/mpc/curves/ed25519.d.ts +4 -18
  6. package/dist/src/account-lib/mpc/curves/ed25519.d.ts.map +1 -1
  7. package/dist/src/account-lib/mpc/curves/ed25519.js +6 -60
  8. package/dist/src/account-lib/mpc/index.d.ts +4 -4
  9. package/dist/src/account-lib/mpc/index.d.ts.map +1 -1
  10. package/dist/src/account-lib/mpc/index.js +6 -6
  11. package/dist/src/account-lib/mpc/shamir.d.ts +5 -37
  12. package/dist/src/account-lib/mpc/shamir.d.ts.map +1 -1
  13. package/dist/src/account-lib/mpc/shamir.js +6 -130
  14. package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.d.ts +57 -9
  15. package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.d.ts.map +1 -1
  16. package/dist/src/account-lib/mpc/tss/ecdsa/ecdsa.js +581 -57
  17. package/dist/src/account-lib/mpc/tss/ecdsa/types.d.ts +97 -55
  18. package/dist/src/account-lib/mpc/tss/ecdsa/types.d.ts.map +1 -1
  19. package/dist/src/account-lib/mpc/tss/ecdsa/types.js +1 -1
  20. package/dist/src/account-lib/mpc/tss/eddsa/eddsa.d.ts +1 -1
  21. package/dist/src/account-lib/mpc/tss/eddsa/eddsa.d.ts.map +1 -1
  22. package/dist/src/account-lib/mpc/tss/eddsa/eddsa.js +1 -1
  23. package/dist/src/account-lib/mpc/tss/eddsa/types.d.ts +0 -3
  24. package/dist/src/account-lib/mpc/tss/eddsa/types.d.ts.map +1 -1
  25. package/dist/src/account-lib/mpc/tss/eddsa/types.js +1 -1
  26. package/dist/src/bitgo/baseCoin/baseCoin.d.ts +16 -0
  27. package/dist/src/bitgo/baseCoin/baseCoin.d.ts.map +1 -1
  28. package/dist/src/bitgo/baseCoin/baseCoin.js +15 -1
  29. package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts +20 -4
  30. package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts.map +1 -1
  31. package/dist/src/bitgo/baseCoin/iBaseCoin.js +1 -1
  32. package/dist/src/bitgo/bitgoBase.d.ts +2 -1
  33. package/dist/src/bitgo/bitgoBase.d.ts.map +1 -1
  34. package/dist/src/bitgo/bitgoBase.js +1 -1
  35. package/dist/src/bitgo/enterprise/enterprise.d.ts +13 -1
  36. package/dist/src/bitgo/enterprise/enterprise.d.ts.map +1 -1
  37. package/dist/src/bitgo/enterprise/enterprise.js +29 -1
  38. package/dist/src/bitgo/enterprise/enterprises.d.ts +6 -0
  39. package/dist/src/bitgo/enterprise/enterprises.d.ts.map +1 -1
  40. package/dist/src/bitgo/enterprise/enterprises.js +26 -1
  41. package/dist/src/bitgo/enterprise/iEnterprise.d.ts +4 -1
  42. package/dist/src/bitgo/enterprise/iEnterprise.d.ts.map +1 -1
  43. package/dist/src/bitgo/enterprise/iEnterprise.js +1 -1
  44. package/dist/src/bitgo/enterprise/iEnterprises.d.ts +2 -0
  45. package/dist/src/bitgo/enterprise/iEnterprises.d.ts.map +1 -1
  46. package/dist/src/bitgo/enterprise/iEnterprises.js +1 -1
  47. package/dist/src/bitgo/environments.d.ts +7 -0
  48. package/dist/src/bitgo/environments.d.ts.map +1 -1
  49. package/dist/src/bitgo/environments.js +17 -3
  50. package/dist/src/bitgo/keychain/iKeychains.d.ts +6 -0
  51. package/dist/src/bitgo/keychain/iKeychains.d.ts.map +1 -1
  52. package/dist/src/bitgo/keychain/iKeychains.js +1 -1
  53. package/dist/src/bitgo/keychain/keychains.d.ts.map +1 -1
  54. package/dist/src/bitgo/keychain/keychains.js +30 -24
  55. package/dist/src/bitgo/keychain/ovcJsonCodec.d.ts +124 -89
  56. package/dist/src/bitgo/keychain/ovcJsonCodec.d.ts.map +1 -1
  57. package/dist/src/bitgo/keychain/ovcJsonCodec.js +31 -24
  58. package/dist/src/bitgo/pendingApproval/iPendingApproval.d.ts +2 -0
  59. package/dist/src/bitgo/pendingApproval/iPendingApproval.d.ts.map +1 -1
  60. package/dist/src/bitgo/pendingApproval/iPendingApproval.js +1 -1
  61. package/dist/src/bitgo/pendingApproval/pendingApproval.d.ts.map +1 -1
  62. package/dist/src/bitgo/pendingApproval/pendingApproval.js +13 -1
  63. package/dist/src/bitgo/recovery/initiate.d.ts +7 -1
  64. package/dist/src/bitgo/recovery/initiate.d.ts.map +1 -1
  65. package/dist/src/bitgo/recovery/initiate.js +1 -1
  66. package/dist/src/bitgo/staking/iStakingWallet.d.ts +11 -1
  67. package/dist/src/bitgo/staking/iStakingWallet.d.ts.map +1 -1
  68. package/dist/src/bitgo/staking/iStakingWallet.js +1 -1
  69. package/dist/src/bitgo/staking/stakingWallet.d.ts +7 -1
  70. package/dist/src/bitgo/staking/stakingWallet.d.ts.map +1 -1
  71. package/dist/src/bitgo/staking/stakingWallet.js +9 -1
  72. package/dist/src/bitgo/tss/common.d.ts +15 -4
  73. package/dist/src/bitgo/tss/common.d.ts.map +1 -1
  74. package/dist/src/bitgo/tss/common.js +26 -11
  75. package/dist/src/bitgo/tss/ecdsa/ecdsa.d.ts +11 -8
  76. package/dist/src/bitgo/tss/ecdsa/ecdsa.d.ts.map +1 -1
  77. package/dist/src/bitgo/tss/ecdsa/ecdsa.js +36 -33
  78. package/dist/src/bitgo/tss/ecdsa/types.d.ts +2 -2
  79. package/dist/src/bitgo/tss/ecdsa/types.d.ts.map +1 -1
  80. package/dist/src/bitgo/tss/ecdsa/types.js +1 -1
  81. package/dist/src/bitgo/tss/eddsa/eddsa.d.ts +6 -5
  82. package/dist/src/bitgo/tss/eddsa/eddsa.d.ts.map +1 -1
  83. package/dist/src/bitgo/tss/eddsa/eddsa.js +20 -9
  84. package/dist/src/bitgo/tss/types.d.ts +19 -0
  85. package/dist/src/bitgo/tss/types.d.ts.map +1 -1
  86. package/dist/src/bitgo/tss/types.js +1 -1
  87. package/dist/src/bitgo/utils/codecProps.d.ts +7 -0
  88. package/dist/src/bitgo/utils/codecProps.d.ts.map +1 -0
  89. package/dist/src/bitgo/utils/codecProps.js +41 -0
  90. package/dist/src/bitgo/utils/opengpgUtils.d.ts.map +1 -1
  91. package/dist/src/bitgo/utils/opengpgUtils.js +7 -10
  92. package/dist/src/bitgo/utils/postWithCodec.d.ts +18 -0
  93. package/dist/src/bitgo/utils/postWithCodec.d.ts.map +1 -0
  94. package/dist/src/bitgo/utils/postWithCodec.js +59 -0
  95. package/dist/src/bitgo/utils/tss/baseTSSUtils.d.ts +59 -12
  96. package/dist/src/bitgo/utils/tss/baseTSSUtils.d.ts.map +1 -1
  97. package/dist/src/bitgo/utils/tss/baseTSSUtils.js +71 -9
  98. package/dist/src/bitgo/utils/tss/baseTypes.d.ts +174 -9
  99. package/dist/src/bitgo/utils/tss/baseTypes.d.ts.map +1 -1
  100. package/dist/src/bitgo/utils/tss/baseTypes.js +27 -2
  101. package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.d.ts +47 -7
  102. package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.d.ts.map +1 -1
  103. package/dist/src/bitgo/utils/tss/ecdsa/ecdsa.js +247 -119
  104. package/dist/src/bitgo/utils/tss/ecdsa/types.d.ts +9 -0
  105. package/dist/src/bitgo/utils/tss/ecdsa/types.d.ts.map +1 -1
  106. package/dist/src/bitgo/utils/tss/ecdsa/types.js +1 -1
  107. package/dist/src/bitgo/utils/tss/eddsa/eddsa.d.ts +18 -5
  108. package/dist/src/bitgo/utils/tss/eddsa/eddsa.d.ts.map +1 -1
  109. package/dist/src/bitgo/utils/tss/eddsa/eddsa.js +79 -25
  110. package/dist/src/bitgo/wallet/BuildParams.d.ts +112 -0
  111. package/dist/src/bitgo/wallet/BuildParams.d.ts.map +1 -0
  112. package/dist/src/bitgo/wallet/BuildParams.js +121 -0
  113. package/dist/src/bitgo/wallet/SendTransactionRequest.d.ts +93 -0
  114. package/dist/src/bitgo/wallet/SendTransactionRequest.d.ts.map +1 -0
  115. package/dist/src/bitgo/wallet/SendTransactionRequest.js +41 -0
  116. package/dist/src/bitgo/wallet/iWallet.d.ts +14 -1
  117. package/dist/src/bitgo/wallet/iWallet.d.ts.map +1 -1
  118. package/dist/src/bitgo/wallet/iWallet.js +1 -1
  119. package/dist/src/bitgo/wallet/wallet.d.ts +11 -2
  120. package/dist/src/bitgo/wallet/wallet.d.ts.map +1 -1
  121. package/dist/src/bitgo/wallet/wallet.js +140 -82
  122. package/dist/src/index.d.ts +4 -0
  123. package/dist/src/index.d.ts.map +1 -1
  124. package/dist/src/index.js +4 -2
  125. package/dist/src/openssl/index.d.ts +4 -1
  126. package/dist/src/openssl/index.d.ts.map +1 -1
  127. package/dist/src/openssl/index.js +7 -12
  128. package/dist/test/node.utils.d.ts +2 -0
  129. package/dist/test/node.utils.d.ts.map +1 -0
  130. package/dist/test/node.utils.js +5 -0
  131. package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.d.ts +2 -0
  132. package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.d.ts.map +1 -0
  133. package/dist/test/unit/account-lib/mpc/tss/ecdsa/ecdsa.js +185 -0
  134. package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.d.ts +3 -0
  135. package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.d.ts.map +1 -0
  136. package/dist/test/unit/account-lib/mpc/tss/ecdsa/fixtures.js +24 -0
  137. package/dist/test/unit/bitgo/utils/postWithCodec.d.ts +2 -0
  138. package/dist/test/unit/bitgo/utils/postWithCodec.d.ts.map +1 -0
  139. package/dist/test/unit/bitgo/utils/postWithCodec.js +79 -0
  140. package/dist/test/unit/bitgo/wallet/SendTransactionRequest.d.ts +2 -0
  141. package/dist/test/unit/bitgo/wallet/SendTransactionRequest.d.ts.map +1 -0
  142. package/dist/test/unit/bitgo/wallet/SendTransactionRequest.js +49 -0
  143. package/dist/test/unit/openssl.d.ts +2 -0
  144. package/dist/test/unit/openssl.d.ts.map +1 -0
  145. package/dist/test/unit/openssl.js +39 -0
  146. package/dist/test/unit/units.d.ts +2 -0
  147. package/dist/test/unit/units.d.ts.map +1 -0
  148. package/dist/test/unit/units.js +98 -0
  149. package/dist/tsconfig.tsbuildinfo +1 -8279
  150. package/package.json +14 -13
  151. package/dist/src/account-lib/mpc/hdTree.d.ts +0 -31
  152. package/dist/src/account-lib/mpc/hdTree.d.ts.map +0 -1
  153. package/dist/src/account-lib/mpc/hdTree.js +0 -141
  154. package/dist/src/account-lib/mpc/types.d.ts +0 -5
  155. package/dist/src/account-lib/mpc/types.d.ts.map +0 -1
  156. package/dist/src/account-lib/mpc/types.js +0 -3
  157. package/dist/src/openssl/openssl.d.ts +0 -12
  158. package/dist/src/openssl/openssl.d.ts.map +0 -1
  159. package/dist/src/openssl/openssl.js +0 -48
  160. package/dist/src/openssl/opensslbytes.d.ts +0 -4
  161. package/dist/src/openssl/opensslbytes.d.ts.map +0 -1
  162. package/dist/src/openssl/opensslbytes.js +0 -20
@@ -1,63 +1,9 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.Ed25519Curve = void 0;
4
- const sodium = require('libsodium-wrappers-sumo');
5
- const crypto_1 = require("crypto");
6
- const util_1 = require("../util");
7
- class Ed25519Curve {
8
- static async initialize() {
9
- if (!Ed25519Curve.initialized) {
10
- await sodium.ready;
11
- Ed25519Curve.initialized = true;
12
- }
13
- return new Ed25519Curve();
14
- }
15
- scalarRandom() {
16
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_reduce(util_1.bigIntFromBufferLE(crypto_1.randomBytes(64)))));
17
- }
18
- scalarReduce(s) {
19
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_reduce(util_1.bigIntToBufferLE(s, 64))));
20
- }
21
- scalarNegate(s) {
22
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_negate(util_1.bigIntToBufferLE(s, 32))));
23
- }
24
- scalarInvert(s) {
25
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_invert(util_1.bigIntToBufferLE(s, 32))));
26
- }
27
- scalarAdd(x, y) {
28
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_add(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
29
- }
30
- scalarSub(x, y) {
31
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_sub(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
32
- }
33
- scalarMult(x, y) {
34
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_scalar_mul(util_1.bigIntToBufferLE(x, 32), util_1.bigIntToBufferLE(y, 32))));
35
- }
36
- basePointMult(n) {
37
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_scalarmult_ed25519_base_noclamp(util_1.bigIntToBufferLE(n, 32))));
38
- }
39
- pointAdd(p, q) {
40
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_core_ed25519_add(util_1.bigIntToBufferLE(p, 32), util_1.bigIntToBufferLE(q, 32))));
41
- }
42
- pointMultiply(p, s) {
43
- return util_1.bigIntFromBufferLE(Buffer.from(sodium.crypto_scalarmult_ed25519_noclamp(util_1.bigIntToBufferLE(s, 32), util_1.bigIntToBufferLE(p, 32))));
44
- }
45
- verify(message, signature, publicKey) {
46
- const signedMessage = Buffer.concat([signature, message]);
47
- try {
48
- // Returns the message which was signed if the signature is valid
49
- const result = Buffer.from(sodium.crypto_sign_open(signedMessage, util_1.bigIntToBufferLE(publicKey, 32)));
50
- return Buffer.compare(message, result) === 0;
51
- }
52
- catch (error) {
53
- // Invalid signature causes an exception
54
- return false;
55
- }
56
- }
57
- order() {
58
- return BigInt('0x1000000000000000000000000000000014def9dea2f79cd65812631a5cf5d3ed') * BigInt('0x08');
59
- }
60
- }
61
- exports.Ed25519Curve = Ed25519Curve;
62
- Ed25519Curve.initialized = false;
63
- //# sourceMappingURL=data:application/json;base64,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
4
+ /**
5
+ * @deprecated use Ed25519Curve from sdk-lib-mpc instead
6
+ */
7
+ var sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
8
+ Object.defineProperty(exports, "Ed25519Curve", { enumerable: true, get: function () { return sdk_lib_mpc_1.Ed25519Curve; } });
9
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZWQyNTUxOS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9hY2NvdW50LWxpYi9tcGMvY3VydmVzL2VkMjU1MTkudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUE7O0dBRUc7QUFDSCx1REFBdUQ7QUFBOUMsMkdBQUEsWUFBWSxPQUFBIiwic291cmNlc0NvbnRlbnQiOlsiLyoqXG4gKiBAZGVwcmVjYXRlZCB1c2UgRWQyNTUxOUN1cnZlIGZyb20gc2RrLWxpYi1tcGMgaW5zdGVhZFxuICovXG5leHBvcnQgeyBFZDI1NTE5Q3VydmUgfSBmcm9tICdAYml0Z28tYmV0YS9zZGstbGliLW1wYyc7XG4iXX0=
@@ -1,9 +1,9 @@
1
- import HDTree, { Ed25519BIP32, BIP32 } from './hdTree';
1
+ import { HDTree, Ed25519Bip32HdTree, Secp256k1Bip32HdTree } from '@bitgo-beta/sdk-lib-mpc';
2
2
  import { EDDSA } from './tss';
3
3
  import ShamirSecret from './shamir';
4
- export { Ecdsa, ECDSA, Eddsa, EDDSA, rangeProof } from './tss';
4
+ declare type KeyShare = EDDSA.KeyShare;
5
5
  export * from './curves';
6
6
  export * from './util';
7
- declare type KeyShare = EDDSA.KeyShare;
8
- export { Ed25519BIP32, HDTree, KeyShare, ShamirSecret, BIP32 };
7
+ export { Ecdsa, ECDSA, Eddsa, EDDSA, rangeProof } from './tss';
8
+ export { Ed25519Bip32HdTree as Ed25519BIP32, HDTree, KeyShare, ShamirSecret, Secp256k1Bip32HdTree as BIP32 };
9
9
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/index.ts"],"names":[],"mappings":"AAAA,OAAO,MAAM,EAAE,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,UAAU,CAAC;AACvD,OAAO,EAAE,KAAK,EAAE,MAAM,OAAO,CAAC;AAC9B,OAAO,YAAY,MAAM,UAAU,CAAC;AAEpC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,UAAU,EAAE,MAAM,OAAO,CAAC;AAE/D,cAAc,UAAU,CAAC;AACzB,cAAc,QAAQ,CAAC;AAEvB,aAAK,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC;AAE/B,OAAO,EAAE,YAAY,EAAE,MAAM,EAAE,QAAQ,EAAE,YAAY,EAAE,KAAK,EAAE,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,kBAAkB,EAAE,oBAAoB,EAAE,MAAM,yBAAyB,CAAC;AAC3F,OAAO,EAAE,KAAK,EAAE,MAAM,OAAO,CAAC;AAC9B,OAAO,YAAY,MAAM,UAAU,CAAC;AAEpC,aAAK,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC;AAE/B,cAAc,UAAU,CAAC;AACzB,cAAc,QAAQ,CAAC;AACvB,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,UAAU,EAAE,MAAM,OAAO,CAAC;AAC/D,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,EAAE,QAAQ,EAAE,YAAY,EAAE,oBAAoB,IAAI,KAAK,EAAE,CAAC"}
@@ -14,17 +14,17 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
14
14
  };
15
15
  Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.BIP32 = exports.ShamirSecret = exports.Ed25519BIP32 = exports.rangeProof = exports.EDDSA = exports.Eddsa = exports.ECDSA = exports.Ecdsa = void 0;
17
- const hdTree_1 = require("./hdTree");
18
- Object.defineProperty(exports, "Ed25519BIP32", { enumerable: true, get: function () { return hdTree_1.Ed25519BIP32; } });
19
- Object.defineProperty(exports, "BIP32", { enumerable: true, get: function () { return hdTree_1.BIP32; } });
17
+ const sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
18
+ Object.defineProperty(exports, "Ed25519BIP32", { enumerable: true, get: function () { return sdk_lib_mpc_1.Ed25519Bip32HdTree; } });
19
+ Object.defineProperty(exports, "BIP32", { enumerable: true, get: function () { return sdk_lib_mpc_1.Secp256k1Bip32HdTree; } });
20
20
  const shamir_1 = __importDefault(require("./shamir"));
21
21
  exports.ShamirSecret = shamir_1.default;
22
+ __exportStar(require("./curves"), exports);
23
+ __exportStar(require("./util"), exports);
22
24
  var tss_1 = require("./tss");
23
25
  Object.defineProperty(exports, "Ecdsa", { enumerable: true, get: function () { return tss_1.Ecdsa; } });
24
26
  Object.defineProperty(exports, "ECDSA", { enumerable: true, get: function () { return tss_1.ECDSA; } });
25
27
  Object.defineProperty(exports, "Eddsa", { enumerable: true, get: function () { return tss_1.Eddsa; } });
26
28
  Object.defineProperty(exports, "EDDSA", { enumerable: true, get: function () { return tss_1.EDDSA; } });
27
29
  Object.defineProperty(exports, "rangeProof", { enumerable: true, get: function () { return tss_1.rangeProof; } });
28
- __exportStar(require("./curves"), exports);
29
- __exportStar(require("./util"), exports);
30
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvYWNjb3VudC1saWIvbXBjL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxxQ0FBdUQ7QUFXOUMsNkZBWFEscUJBQVksT0FXUjtBQUFrQyxzRkFYeEIsY0FBSyxPQVd3QjtBQVQ1RCxzREFBb0M7QUFTSyx1QkFUbEMsZ0JBQVksQ0FTa0M7QUFQckQsNkJBQStEO0FBQXRELDRGQUFBLEtBQUssT0FBQTtBQUFFLDRGQUFBLEtBQUssT0FBQTtBQUFFLDRGQUFBLEtBQUssT0FBQTtBQUFFLDRGQUFBLEtBQUssT0FBQTtBQUFFLGlHQUFBLFVBQVUsT0FBQTtBQUUvQywyQ0FBeUI7QUFDekIseUNBQXVCIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IEhEVHJlZSwgeyBFZDI1NTE5QklQMzIsIEJJUDMyIH0gZnJvbSAnLi9oZFRyZWUnO1xuaW1wb3J0IHsgRUREU0EgfSBmcm9tICcuL3Rzcyc7XG5pbXBvcnQgU2hhbWlyU2VjcmV0IGZyb20gJy4vc2hhbWlyJztcblxuZXhwb3J0IHsgRWNkc2EsIEVDRFNBLCBFZGRzYSwgRUREU0EsIHJhbmdlUHJvb2YgfSBmcm9tICcuL3Rzcyc7XG5cbmV4cG9ydCAqIGZyb20gJy4vY3VydmVzJztcbmV4cG9ydCAqIGZyb20gJy4vdXRpbCc7XG5cbnR5cGUgS2V5U2hhcmUgPSBFRERTQS5LZXlTaGFyZTtcblxuZXhwb3J0IHsgRWQyNTUxOUJJUDMyLCBIRFRyZWUsIEtleVNoYXJlLCBTaGFtaXJTZWNyZXQsIEJJUDMyIH07XG4iXX0=
30
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,38 +1,6 @@
1
- import Curve from './curves';
2
- import { SplitSecret } from './types';
3
- export default class Shamir {
4
- curve: Curve;
5
- constructor(curve: Curve);
6
- /**
7
- * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
8
- * ways. The split secret requires `threshold` shares to be reconstructed.
9
- *
10
- * @param secret secret to split
11
- * @param threshold share threshold required to reconstruct secret
12
- * @param numShares total number of shares to split to split secret into
13
- * @param indices optional indices which can be used while generating the shares
14
- * @param salt optional salt which could be used while generating the shares
15
- * @returns Dictionary containing `shares`, a dictionary where each key is an int
16
- * in the range 1<=x<=numShares representing that share's free term, and `v`, an
17
- * array of proofs to be shared with all participants.
18
- */
19
- split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt?: bigint): SplitSecret;
20
- /**
21
- * Verify a VSS share.
22
- *
23
- * @param u Secret share received from other party.
24
- * @param v Verification values received from other party.
25
- * @param index Verifier's index.
26
- * @returns True on success; otherwise throws Error.
27
- */
28
- verify(u: bigint, v: Array<bigint>, index: number): boolean;
29
- /**
30
- * Reconstitute a secret from a dictionary of shares. The number of shares must
31
- * be equal to `t` to reconstitute the original secret.
32
- *
33
- * @param shares dictionary of shares. each key is the free term of the share
34
- * @returns secret
35
- */
36
- combine(shares: Record<number, bigint>): bigint;
37
- }
1
+ import { Shamir } from '@bitgo-beta/sdk-lib-mpc';
2
+ /**
3
+ * @deprecated use Shamir from sdk-lib-mpc instead
4
+ */
5
+ export default Shamir;
38
6
  //# sourceMappingURL=shamir.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,MAAM,UAAU,CAAC;AAE7B,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAEtC,MAAM,CAAC,OAAO,OAAO,MAAM;IACzB,KAAK,EAAE,KAAK,CAAC;gBAED,KAAK,EAAE,KAAK;IAIxB;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,IAAI,SAAY,GAAG,WAAW;IA8CnH;;;;;;;OAOG;IACH,MAAM,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO;IAsB3D;;;;;;OAMG;IACH,OAAO,CAAC,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,GAAG,MAAM;CA+BhD"}
1
+ {"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjD;;GAEG;AACH,eAAe,MAAM,CAAC"}
@@ -1,132 +1,8 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- const crypto = require('crypto');
4
- const util_1 = require("./util");
5
- class Shamir {
6
- constructor(curve) {
7
- this.curve = curve;
8
- }
9
- /**
10
- * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
11
- * ways. The split secret requires `threshold` shares to be reconstructed.
12
- *
13
- * @param secret secret to split
14
- * @param threshold share threshold required to reconstruct secret
15
- * @param numShares total number of shares to split to split secret into
16
- * @param indices optional indices which can be used while generating the shares
17
- * @param salt optional salt which could be used while generating the shares
18
- * @returns Dictionary containing `shares`, a dictionary where each key is an int
19
- * in the range 1<=x<=numShares representing that share's free term, and `v`, an
20
- * array of proofs to be shared with all participants.
21
- */
22
- split(secret, threshold, numShares, indices, salt = BigInt(0)) {
23
- let bigIndices;
24
- if (indices) {
25
- bigIndices = indices.map((i) => {
26
- if (i < 1) {
27
- throw new Error('Invalid value supplied for indices');
28
- }
29
- return BigInt(i);
30
- });
31
- }
32
- else {
33
- // make range(1, n + 1)
34
- bigIndices = Array(numShares)
35
- .fill(null)
36
- .map((_, i) => BigInt(i + 1));
37
- }
38
- if (threshold < 2) {
39
- throw new Error('Threshold cannot be less than two');
40
- }
41
- if (threshold > numShares) {
42
- throw new Error('Threshold cannot be greater than the total number of shares');
43
- }
44
- const coefs = [];
45
- const v = [];
46
- for (let ind = 0; ind < threshold - 1; ind++) {
47
- const coeff = util_1.clamp(util_1.bigIntFromBufferLE(crypto.createHmac('sha256', ind.toString(10)).update(util_1.bigIntToBufferLE(secret, 32)).digest()));
48
- coefs.push(coeff);
49
- v.unshift(this.curve.basePointMult(coeff));
50
- }
51
- coefs.push(secret);
52
- const shares = {};
53
- for (let ind = 0; ind < bigIndices.length; ind++) {
54
- const x = bigIndices[ind];
55
- let partial = coefs[0];
56
- for (let other = 1; other < coefs.length; other++) {
57
- partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));
58
- }
59
- shares[parseInt(x.toString(), 10)] = partial;
60
- }
61
- return { shares, v };
62
- }
63
- /**
64
- * Verify a VSS share.
65
- *
66
- * @param u Secret share received from other party.
67
- * @param v Verification values received from other party.
68
- * @param index Verifier's index.
69
- * @returns True on success; otherwise throws Error.
70
- */
71
- verify(u, v, index) {
72
- if (v.length < 2) {
73
- throw new Error('Threshold cannot be less than two');
74
- }
75
- if (index < 1) {
76
- throw new Error('Invalid value supplied for index');
77
- }
78
- const i = BigInt(index);
79
- let x = v[0];
80
- let t = BigInt(1);
81
- for (const vsj of v.slice(1)) {
82
- t = this.curve.scalarMult(t, i);
83
- const vjt = this.curve.pointMultiply(vsj, t);
84
- x = this.curve.pointAdd(x, vjt);
85
- }
86
- const sigmaG = this.curve.basePointMult(u);
87
- if (x !== sigmaG) {
88
- throw new Error('Could not verify share');
89
- }
90
- return true;
91
- }
92
- /**
93
- * Reconstitute a secret from a dictionary of shares. The number of shares must
94
- * be equal to `t` to reconstitute the original secret.
95
- *
96
- * @param shares dictionary of shares. each key is the free term of the share
97
- * @returns secret
98
- */
99
- combine(shares) {
100
- try {
101
- let s = BigInt(0);
102
- for (const i in shares) {
103
- const yi = shares[i];
104
- const xi = BigInt(i);
105
- let num = BigInt(1);
106
- let denum = BigInt(1);
107
- for (const j in shares) {
108
- const xj = BigInt(j);
109
- if (xi !== xj) {
110
- num = this.curve.scalarMult(num, xj);
111
- }
112
- }
113
- for (const j in shares) {
114
- const xj = BigInt(j);
115
- if (xi !== xj) {
116
- denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));
117
- }
118
- }
119
- const inverted = this.curve.scalarInvert(denum);
120
- const innerMultiplied = this.curve.scalarMult(num, inverted);
121
- const multiplied = this.curve.scalarMult(innerMultiplied, yi);
122
- s = this.curve.scalarAdd(multiplied, s);
123
- }
124
- return s;
125
- }
126
- catch (error) {
127
- throw new Error('Failed to combine Shamir shares , ' + error);
128
- }
129
- }
130
- }
131
- exports.default = Shamir;
132
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"shamir.js","sourceRoot":"","sources":["../../../../src/account-lib/mpc/shamir.ts"],"names":[],"mappings":";;AAAA,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;AAEjC,iCAAqE;AAGrE,MAAqB,MAAM;IAGzB,YAAY,KAAY;QACtB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAc,EAAE,SAAiB,EAAE,SAAiB,EAAE,OAAuB,EAAE,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC;QACnG,IAAI,UAAyB,CAAC;QAC9B,IAAI,OAAO,EAAE;YACX,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;gBAC7B,IAAI,CAAC,GAAG,CAAC,EAAE;oBACT,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;iBACvD;gBACD,OAAO,MAAM,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC,CAAC,CAAC;SACJ;aAAM;YACL,uBAAuB;YACvB,UAAU,GAAG,KAAK,CAAC,SAAS,CAAC;iBAC1B,IAAI,CAAC,IAAI,CAAC;iBACV,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;SACjC;QACD,IAAI,SAAS,GAAG,CAAC,EAAE;YACjB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QAED,IAAI,SAAS,GAAG,SAAS,EAAE;YACzB,MAAM,IAAI,KAAK,CAAC,6DAA6D,CAAC,CAAC;SAChF;QAED,MAAM,KAAK,GAAa,EAAE,CAAC;QAC3B,MAAM,CAAC,GAAkB,EAAE,CAAC;QAC5B,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,SAAS,GAAG,CAAC,EAAE,GAAG,EAAE,EAAE;YAC5C,MAAM,KAAK,GAAG,YAAK,CACjB,yBAAkB,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,uBAAgB,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAChH,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAClB,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC;SAC5C;QACD,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEnB,MAAM,MAAM,GAA2B,EAAE,CAAC;QAC1C,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,UAAU,CAAC,MAAM,EAAE,GAAG,EAAE,EAAE;YAChD,MAAM,CAAC,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC;YAC1B,IAAI,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACvB,KAAK,IAAI,KAAK,GAAG,CAAC,EAAE,KAAK,GAAG,KAAK,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;gBACjD,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC;aACjF;YACD,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,EAAE,CAAC,CAAC,GAAG,OAAO,CAAC;SAC9C;QACD,OAAO,EAAE,MAAM,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,CAAS,EAAE,CAAgB,EAAE,KAAa;QAC/C,IAAI,CAAC,CAAC,MAAM,GAAG,CAAC,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QACD,IAAI,KAAK,GAAG,CAAC,EAAE;YACb,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;SACrD;QACD,MAAM,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC;QACxB,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACb,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QAClB,KAAK,MAAM,GAAG,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;YAC5B,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAChC,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;YAC7C,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC;SACjC;QACD,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;QAC3C,IAAI,CAAC,KAAK,MAAM,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;SAC3C;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;OAMG;IACH,OAAO,CAAC,MAA8B;QACpC,IAAI;YACF,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;gBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,IAAI,GAAG,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACpB,IAAI,KAAK,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAEtB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;qBACtC;iBACF;gBACD,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC,CAAC;qBACpE;iBACF;gBACD,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;gBAChD,MAAM,eAAe,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;gBAC7D,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,eAAe,EAAE,EAAE,CAAC,CAAC;gBAC9D,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;aACzC;YACD,OAAO,CAAC,CAAC;SACV;QAAC,OAAO,KAAK,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,oCAAoC,GAAG,KAAK,CAAC,CAAC;SAC/D;IACH,CAAC;CACF;AAtID,yBAsIC","sourcesContent":["const crypto = require('crypto');\nimport Curve from './curves';\nimport { bigIntFromBufferLE, bigIntToBufferLE, clamp } from './util';\nimport { SplitSecret } from './types';\n\nexport default class Shamir {\n  curve: Curve;\n\n  constructor(curve: Curve) {\n    this.curve = curve;\n  }\n\n  /**\n   * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`\n   * ways. The split secret requires `threshold` shares to be reconstructed.\n   *\n   * @param secret secret to split\n   * @param threshold share threshold required to reconstruct secret\n   * @param numShares total number of shares to split to split secret into\n   * @param indices optional indices which can be used while generating the shares\n   * @param salt optional salt which could be used while generating the shares\n   * @returns Dictionary containing `shares`, a dictionary where each key is an int\n   * in the range 1<=x<=numShares representing that share's free term, and `v`, an\n   * array of proofs to be shared with all participants.\n   */\n  split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt = BigInt(0)): SplitSecret {\n    let bigIndices: Array<bigint>;\n    if (indices) {\n      bigIndices = indices.map((i) => {\n        if (i < 1) {\n          throw new Error('Invalid value supplied for indices');\n        }\n        return BigInt(i);\n      });\n    } else {\n      // make range(1, n + 1)\n      bigIndices = Array(numShares)\n        .fill(null)\n        .map((_, i) => BigInt(i + 1));\n    }\n    if (threshold < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n\n    if (threshold > numShares) {\n      throw new Error('Threshold cannot be greater than the total number of shares');\n    }\n\n    const coefs: bigint[] = [];\n    const v: Array<bigint> = [];\n    for (let ind = 0; ind < threshold - 1; ind++) {\n      const coeff = clamp(\n        bigIntFromBufferLE(crypto.createHmac('sha256', ind.toString(10)).update(bigIntToBufferLE(secret, 32)).digest())\n      );\n      coefs.push(coeff);\n      v.unshift(this.curve.basePointMult(coeff));\n    }\n    coefs.push(secret);\n\n    const shares: Record<number, bigint> = {};\n    for (let ind = 0; ind < bigIndices.length; ind++) {\n      const x = bigIndices[ind];\n      let partial = coefs[0];\n      for (let other = 1; other < coefs.length; other++) {\n        partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));\n      }\n      shares[parseInt(x.toString(), 10)] = partial;\n    }\n    return { shares, v };\n  }\n\n  /**\n   * Verify a VSS share.\n   *\n   * @param u Secret share received from other party.\n   * @param v Verification values received from other party.\n   * @param index Verifier's index.\n   * @returns True on success; otherwise throws Error.\n   */\n  verify(u: bigint, v: Array<bigint>, index: number): boolean {\n    if (v.length < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n    if (index < 1) {\n      throw new Error('Invalid value supplied for index');\n    }\n    const i = BigInt(index);\n    let x = v[0];\n    let t = BigInt(1);\n    for (const vsj of v.slice(1)) {\n      t = this.curve.scalarMult(t, i);\n      const vjt = this.curve.pointMultiply(vsj, t);\n      x = this.curve.pointAdd(x, vjt);\n    }\n    const sigmaG = this.curve.basePointMult(u);\n    if (x !== sigmaG) {\n      throw new Error('Could not verify share');\n    }\n    return true;\n  }\n\n  /**\n   * Reconstitute a secret from a dictionary of shares. The number of shares must\n   * be equal to `t` to reconstitute the original secret.\n   *\n   * @param shares dictionary of shares. each key is the free term of the share\n   * @returns secret\n   */\n  combine(shares: Record<number, bigint>): bigint {\n    try {\n      let s = BigInt(0);\n      for (const i in shares) {\n        const yi = shares[i];\n        const xi = BigInt(i);\n        let num = BigInt(1);\n        let denum = BigInt(1);\n\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            num = this.curve.scalarMult(num, xj);\n          }\n        }\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));\n          }\n        }\n        const inverted = this.curve.scalarInvert(denum);\n        const innerMultiplied = this.curve.scalarMult(num, inverted);\n        const multiplied = this.curve.scalarMult(innerMultiplied, yi);\n        s = this.curve.scalarAdd(multiplied, s);\n      }\n      return s;\n    } catch (error) {\n      throw new Error('Failed to combine Shamir shares , ' + error);\n    }\n  }\n}\n"]}
3
+ const sdk_lib_mpc_1 = require("@bitgo-beta/sdk-lib-mpc");
4
+ /**
5
+ * @deprecated use Shamir from sdk-lib-mpc instead
6
+ */
7
+ exports.default = sdk_lib_mpc_1.Shamir;
8
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2hhbWlyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL2FjY291bnQtbGliL21wYy9zaGFtaXIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFBQSx5REFBaUQ7QUFDakQ7O0dBRUc7QUFDSCxrQkFBZSxvQkFBTSxDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgU2hhbWlyIH0gZnJvbSAnQGJpdGdvLWJldGEvc2RrLWxpYi1tcGMnO1xuLyoqXG4gKiBAZGVwcmVjYXRlZCB1c2UgU2hhbWlyIGZyb20gc2RrLWxpYi1tcGMgaW5zdGVhZFxuICovXG5leHBvcnQgZGVmYXVsdCBTaGFtaXI7XG4iXX0=
@@ -1,10 +1,9 @@
1
1
  /// <reference types="node" />
2
- import HDTree from '../../hdTree';
3
2
  import { Hash } from 'crypto';
4
3
  import { Secp256k1Curve } from '../../curves';
5
4
  import Shamir from '../../shamir';
6
- import { EcdsaTypes } from '@bitgo-beta/sdk-lib-mpc';
7
- import { DShare, KeyCombined, KeyShare, NShare, OShare, PShare, Signature, SignCombine, SignCombineRT, SignConvert, SignConvertRT, SignShareRT, SShare, SubkeyShare, XShare, XShareWithNtilde, YShare, YShareWithNtilde } from './types';
5
+ import { EcdsaTypes, HDTree } from '@bitgo-beta/sdk-lib-mpc';
6
+ import { DShare, KeyCombined, KeyShare, NShare, OShare, PShare, PublicUTShare, Signature, SignCombine, SignCombineRT, SignConvert, SignConvertRT, SignConvertStep1, SignConvertStep1Response, SignConvertStep2, SignConvertStep2Response, SignConvertStep3, SignConvertStep3Response, SignShareRT, SShare, SubkeyShare, UTShare, VAShareWithProofs, VAShare, XShareWithChallenges, YShareWithChallenges, PublicVAShareWithProofs } from './types';
8
7
  /**
9
8
  * ECDSA TSS implementation supporting 2:n Threshold
10
9
  */
@@ -52,10 +51,11 @@ export default class Ecdsa {
52
51
  * Appends a given range proof challenge to the shares previously created
53
52
  * by #keyCombine. Generates a new challenge if not provided.
54
53
  * @param {XShare | YShare} share Private xShare or yShare of the signing operation
55
- * @param {EcdsaTypes.SerializedNtilde} challenge
54
+ * @param rangeProofChallenge - challenge generated via generateNtilde
55
+ * @param paillierProofChallenge
56
56
  * @returns {KeyCombined} The share with amended challenge values
57
57
  */
58
- appendChallenge<T extends XShare | YShare>(share: T, challenge?: EcdsaTypes.SerializedNtilde): Promise<T & EcdsaTypes.SerializedNtilde>;
58
+ appendChallenge<T>(share: T, rangeProofChallenge: EcdsaTypes.SerializedNtilde, paillierProofChallenge: EcdsaTypes.SerializedPaillierChallenge): T & EcdsaTypes.SerializedEcdsaChallenges;
59
59
  /**
60
60
  * Create signing shares.
61
61
  * @param {xShare} xShare Private xShare of current participant signer
@@ -63,11 +63,36 @@ export default class Ecdsa {
63
63
  * @returns {SignShareRT} Returns the participant private w-share
64
64
  * and k-share to be distributed to other participant signer
65
65
  */
66
- signShare(xShare: XShare | XShareWithNtilde, yShare: YShareWithNtilde): Promise<SignShareRT>;
66
+ signShare(xShare: XShareWithChallenges, yShare: YShareWithChallenges): Promise<SignShareRT>;
67
+ /**
68
+ * Perform multiplicitive-to-additive (MtA) share conversion with another signer.
69
+ * Connection 1.2 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
70
+ * If signer A completed signShare initially (input to this fn), then this step is completed by signer B.
71
+ * @param {SignConvert} shares
72
+ * @returns {SignConvertRT}
73
+ */
74
+ signConvertStep1(shares: SignConvertStep1): Promise<SignConvertStep1Response>;
67
75
  /**
68
76
  * Perform multiplicitive-to-additive (MtA) share conversion with another
69
77
  * signer.
70
- * @param {SignConvert}
78
+ * Connection 2.1 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
79
+ * If signer B completed signConvertStep1, then this step is completed by signer A.
80
+ * @param {SignConvert} shares
81
+ * @returns {SignConvertRT}
82
+ */
83
+ signConvertStep2(shares: SignConvertStep2): Promise<SignConvertStep2Response>;
84
+ /**
85
+ * Perform multiplicitive-to-additive (MtA) share conversion with another signer.
86
+ * Connection 2.2 in https://lucid.app/lucidchart/7061785b-bc5c-4002-b546-3f4a3612fc62/edit?page=IAVmvYO4FvKc#
87
+ * If signer A completed signConvertStep2, then this step is completed by signer B.
88
+ * @param {SignConvert} shares
89
+ * @returns {SignConvertRT}
90
+ */
91
+ signConvertStep3(shares: SignConvertStep3): Promise<SignConvertStep3Response>;
92
+ /**
93
+ * Perform multiplicitive-to-additive (MtA) share conversion with another signer.
94
+ * @deprecated - use one of [signConvertStep1, signConvertStep2, signConvertStep3] instead
95
+ * @param {SignConvert} shares
71
96
  * @returns {SignConvertRT}
72
97
  */
73
98
  signConvert(shares: SignConvert): Promise<SignConvertRT>;
@@ -84,9 +109,32 @@ export default class Ecdsa {
84
109
  * @param {DShare} dShare delta share received from the other participant
85
110
  * @param {Hash} hash hashing algorithm implementing Node`s standard crypto hash interface
86
111
  * @param {boolean} shouldHash if true, we hash the provided buffer before signing
87
- * @returns {SShare}
112
+ * @returns {VAShare}
113
+ */
114
+ sign(M: Buffer, oShare: OShare, dShare: DShare, hash?: Hash, shouldHash?: boolean): VAShare;
115
+ /**
116
+ * Generate proofs of V_i and A_i values.
117
+ * @param {Buffer} M Message to commit to as part of the context of the proof.
118
+ * This doesn't need to be the same message that was signed in the sign function above.
119
+ * But it should be the same for all participants for the purpose of providing proof context.
120
+ * @param {VAShare} vaShare The VAShare to prove.
121
+ * @returns {VAShareWithProofs}
122
+ */
123
+ generateVAProofs(M: Buffer, vaShare: VAShare): VAShareWithProofs;
124
+ /**
125
+ * Verify V_i and A_i values of all other participants during signing phase 5 steps 5A and 5B.
126
+ * @param {VAShareWithProofs} vaShare V_i, A_i info including SShare values of the currenct participant
127
+ * @param {PublicVAShareWithProofs[]} publicVAShares public V_i, A_i info of all other participants
128
+ * @returns {UTShare} U_i, T_i info of the current participant if all verifications pass
129
+ */
130
+ verifyVAShares(vaShare: VAShareWithProofs, publicVAShares: PublicVAShareWithProofs[]): UTShare;
131
+ /**
132
+ * Verify U_i and V_i values of all other participants during signing phase 5 steps 5C and 5D.
133
+ * @param {UTShare} utShare U_i, T_i info including SShare values of the currenct participant
134
+ * @param {PublicUTShare[]} publicUTShares public U_i, T_i info of all other participants
135
+ * @returns {SShare} SShare of the current participant if all verifications pass
88
136
  */
89
- sign(M: Buffer, oShare: OShare, dShare: DShare, hash?: Hash, shouldHash?: boolean): SShare;
137
+ verifyUTShares(utShare: UTShare, publicUTShares: PublicUTShare[]): SShare;
90
138
  /**
91
139
  * Construct full signature by combining Sign Shares
92
140
  * @param {SShare[]} shares
@@ -1 +1 @@
1
- {"version":3,"file":"ecdsa.d.ts","sourceRoot":"","sources":["../../../../../../src/account-lib/mpc/tss/ecdsa/ecdsa.ts"],"names":[],"mappings":";AAGA,OAAO,MAAgC,MAAM,cAAc,CAAC;AAC5D,OAAO,EAAc,IAAI,EAAe,MAAM,QAAQ,CAAC;AAGvD,OAAO,EAAE,cAAc,EAAE,MAAM,cAAc,CAAC;AAC9C,OAAO,MAAM,MAAM,cAAc,CAAC;AAClC,OAAO,EAAmB,UAAU,EAAwC,MAAM,yBAAyB,CAAC;AAC5G,OAAO,EAGL,MAAM,EAEN,WAAW,EACX,QAAQ,EAGR,MAAM,EACN,MAAM,EACN,MAAM,EACN,SAAS,EACT,WAAW,EACX,aAAa,EACb,WAAW,EACX,aAAa,EACb,WAAW,EACX,MAAM,EACN,WAAW,EACX,MAAM,EACN,gBAAgB,EAChB,MAAM,EACN,gBAAgB,EACjB,MAAM,SAAS,CAAC;AAQjB;;GAEG;AACH,MAAM,CAAC,OAAO,OAAO,KAAK;IACxB,MAAM,CAAC,KAAK,EAAE,cAAc,CAAwB;IACpD,MAAM,CAAC,MAAM,EAAE,MAAM,CAAe;IACpC,MAAM,CAAC,MAAM,EAAE,MAAM,CAA2B;IAChD;;;;;;;;;OASG;IACG,QAAQ,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM,EAAE,IAAI,UAAQ,GAAG,OAAO,CAAC,QAAQ,CAAC;IAkEnH;;;;;;OAMG;IACH,UAAU,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,WAAW;IAiD1D;;;;;;;OAOG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE,IAAI,EAAE,MAAM,GAAG,WAAW;IAkEvE;;;;;;OAMG;IACH,gBAAgB,CAAC,cAAc,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,MAAM;IAqB9D;;;;;;OAMG;IACG,eAAe,CAAC,CAAC,SAAS,MAAM,GAAG,MAAM,EAC7C,KAAK,EAAE,CAAC,EACR,SAAS,CAAC,EAAE,UAAU,CAAC,gBAAgB,GACtC,OAAO,CAAC,CAAC,GAAG,UAAU,CAAC,gBAAgB,CAAC;IAa3C;;;;;;OAMG;IACG,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,gBAAgB,EAAE,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,WAAW,CAAC;IA8ElG;;;;;OAKG;IACG,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,OAAO,CAAC,aAAa,CAAC;IAoS9D;;;;OAIG;IACH,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,aAAa;IAiC/C;;;;;;;;OAQG;IACH,IAAI,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,MAAM;IAwBvF;;;;OAIG;IACH,kBAAkB,CAAC,MAAM,EAAE,MAAM,EAAE,GAAG,SAAS;IAqB/C;;;;;;;OAOG;IACH,MAAM,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,OAAO;IAatF;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,SAAS,EAAE,UAAU,CAAC,gBAAgB,GAAG,UAAU,CAAC,kBAAkB;IAI/F;;;;OAIG;IACH,MAAM,CAAC,eAAe,CAAC,SAAS,EAAE,UAAU,CAAC,kBAAkB,GAAG,UAAU,CAAC,gBAAgB;CAG9F"}
1
+ {"version":3,"file":"ecdsa.d.ts","sourceRoot":"","sources":["../../../../../../src/account-lib/mpc/tss/ecdsa/ecdsa.ts"],"names":[],"mappings":";AAGA,OAAO,EAAc,IAAI,EAAe,MAAM,QAAQ,CAAC;AAGvD,OAAO,EAAE,cAAc,EAAE,MAAM,cAAc,CAAC;AAC9C,OAAO,MAAM,MAAM,cAAc,CAAC;AAClC,OAAO,EAGL,UAAU,EAOV,MAAM,EAGP,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAGL,MAAM,EAEN,WAAW,EACX,QAAQ,EAGR,MAAM,EACN,MAAM,EACN,MAAM,EACN,aAAa,EAEb,SAAS,EACT,WAAW,EACX,aAAa,EACb,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,wBAAwB,EACxB,gBAAgB,EAChB,wBAAwB,EACxB,gBAAgB,EAChB,wBAAwB,EACxB,WAAW,EACX,MAAM,EACN,WAAW,EACX,OAAO,EACP,iBAAiB,EACjB,OAAO,EAGP,oBAAoB,EACpB,oBAAoB,EACpB,uBAAuB,EACxB,MAAM,SAAS,CAAC;AAIjB;;GAEG;AACH,MAAM,CAAC,OAAO,OAAO,KAAK;IACxB,MAAM,CAAC,KAAK,EAAE,cAAc,CAAwB;IACpD,MAAM,CAAC,MAAM,EAAE,MAAM,CAA8B;IACnD,MAAM,CAAC,MAAM,EAAE,MAAM,CAA2B;IAChD;;;;;;;;;OASG;IACG,QAAQ,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM,EAAE,IAAI,UAAQ,GAAG,OAAO,CAAC,QAAQ,CAAC;IAkEnH;;;;;;OAMG;IACH,UAAU,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,WAAW;IAiD1D;;;;;;;OAOG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE,IAAI,EAAE,MAAM,GAAG,WAAW;IAkEvE;;;;;;OAMG;IACH,gBAAgB,CAAC,cAAc,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,MAAM;IAqB9D;;;;;;;OAOG;IACH,eAAe,CAAC,CAAC,EACf,KAAK,EAAE,CAAC,EACR,mBAAmB,EAAE,UAAU,CAAC,gBAAgB,EAChD,sBAAsB,EAAE,UAAU,CAAC,2BAA2B,GAC7D,CAAC,GAAG,UAAU,CAAC,yBAAyB;IAW3C;;;;;;OAMG;IACG,SAAS,CAAC,MAAM,EAAE,oBAAoB,EAAE,MAAM,EAAE,oBAAoB,GAAG,OAAO,CAAC,WAAW,CAAC;IAwFjG;;;;;;OAMG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IAwLnF;;;;;;;OAOG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IA4OnF;;;;;;OAMG;IACG,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,wBAAwB,CAAC;IAsGnF;;;;;OAKG;IACG,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,OAAO,CAAC,aAAa,CAAC;IA2S9D;;;;OAIG;IACH,WAAW,CAAC,MAAM,EAAE,WAAW,GAAG,aAAa;IAiC/C;;;;;;;;OAQG;IACH,IAAI,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,OAAO;IAwCxF;;;;;;;OAOG;IACH,gBAAgB,CAAC,CAAC,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,GAAG,iBAAiB;IAiBhE;;;;;OAKG;IACH,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE,cAAc,EAAE,uBAAuB,EAAE,GAAG,OAAO;IAgE9F;;;;;OAKG;IACH,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,GAAG,MAAM;IA4BzE;;;;OAIG;IACH,kBAAkB,CAAC,MAAM,EAAE,MAAM,EAAE,GAAG,SAAS;IAqB/C;;;;;;;OAOG;IACH,MAAM,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,UAAU,UAAO,GAAG,OAAO;IAatF;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,SAAS,EAAE,UAAU,CAAC,gBAAgB,GAAG,UAAU,CAAC,kBAAkB;IAI/F;;;;OAIG;IACH,MAAM,CAAC,eAAe,CAAC,SAAS,EAAE,UAAU,CAAC,kBAAkB,GAAG,UAAU,CAAC,gBAAgB;CAG9F"}