@bitgo-beta/sdk-core 8.2.1-beta.833 → 8.2.1-beta.835
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/src/account-lib/baseCoin/iface.d.ts +1 -28
- package/dist/src/account-lib/baseCoin/iface.d.ts.map +1 -1
- package/dist/src/account-lib/baseCoin/iface.js +1 -18
- package/dist/src/account-lib/baseCoin/index.d.ts +0 -1
- package/dist/src/account-lib/baseCoin/index.d.ts.map +1 -1
- package/dist/src/account-lib/baseCoin/index.js +2 -4
- package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts +2 -2
- package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts.map +1 -1
- package/dist/src/bitgo/baseCoin/iBaseCoin.js +1 -1
- package/dist/src/bitgo/keychain/iKeychains.d.ts +1 -1
- package/dist/src/bitgo/keychain/iKeychains.d.ts.map +1 -1
- package/dist/src/bitgo/keychain/iKeychains.js +1 -1
- package/dist/src/bitgo/keychain/keychains.d.ts.map +1 -1
- package/dist/src/bitgo/keychain/keychains.js +1 -7
- package/dist/src/bitgo/utils/index.d.ts +0 -2
- package/dist/src/bitgo/utils/index.d.ts.map +1 -1
- package/dist/src/bitgo/utils/index.js +1 -3
- package/dist/src/bitgo/utils/tss/baseTypes.d.ts +2 -1
- package/dist/src/bitgo/utils/tss/baseTypes.d.ts.map +1 -1
- package/dist/src/bitgo/utils/tss/baseTypes.js +2 -1
- package/dist/src/bitgo/wallet/iWallet.d.ts +1 -0
- package/dist/src/bitgo/wallet/iWallet.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/iWallet.js +1 -1
- package/dist/src/bitgo/wallet/iWallets.d.ts +1 -1
- package/dist/src/bitgo/wallet/iWallets.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/iWallets.js +1 -1
- package/dist/src/bitgo/wallet/wallet.d.ts +1 -1
- package/dist/src/bitgo/wallet/wallet.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/wallet.js +26 -5
- package/dist/src/bitgo/wallet/wallets.d.ts.map +1 -1
- package/dist/src/bitgo/wallet/wallets.js +1 -16
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +8 -9
- package/dist/src/account-lib/baseCoin/blsKeyPair.d.ts +0 -76
- package/dist/src/account-lib/baseCoin/blsKeyPair.d.ts.map +0 -1
- package/dist/src/account-lib/baseCoin/blsKeyPair.js +0 -223
- package/dist/src/bitgo/utils/blsUtils.d.ts +0 -52
- package/dist/src/bitgo/utils/blsUtils.d.ts.map +0 -1
- package/dist/src/bitgo/utils/blsUtils.js +0 -237
- package/dist/src/bitgo/utils/iBlsUtils.d.ts +0 -14
- package/dist/src/bitgo/utils/iBlsUtils.d.ts.map +0 -1
- package/dist/src/bitgo/utils/iBlsUtils.js +0 -3
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@bitgo-beta/sdk-core",
|
|
3
|
-
"version": "8.2.1-beta.
|
|
3
|
+
"version": "8.2.1-beta.835",
|
|
4
4
|
"description": "core library functions for BitGoJS",
|
|
5
5
|
"main": "./dist/src/index.js",
|
|
6
6
|
"types": "./dist/src/index.d.ts",
|
|
@@ -37,12 +37,11 @@
|
|
|
37
37
|
]
|
|
38
38
|
},
|
|
39
39
|
"dependencies": {
|
|
40
|
-
"@bitgo-beta/
|
|
41
|
-
"@bitgo-beta/
|
|
42
|
-
"@bitgo-beta/
|
|
43
|
-
"@bitgo-beta/
|
|
44
|
-
"@bitgo-beta/
|
|
45
|
-
"@bitgo-beta/utxo-lib": "8.0.3-beta.834",
|
|
40
|
+
"@bitgo-beta/sdk-lib-mpc": "8.2.0-beta.827",
|
|
41
|
+
"@bitgo-beta/secp256k1": "1.0.2-beta.861",
|
|
42
|
+
"@bitgo-beta/sjcl": "1.0.2-beta.1073",
|
|
43
|
+
"@bitgo-beta/statics": "15.1.1-beta.838",
|
|
44
|
+
"@bitgo-beta/utxo-lib": "8.0.3-beta.836",
|
|
46
45
|
"@bitgo/public-types": "4.17.0",
|
|
47
46
|
"@noble/curves": "1.8.1",
|
|
48
47
|
"@stablelib/hex": "^1.0.0",
|
|
@@ -71,11 +70,11 @@
|
|
|
71
70
|
"uuid": "^8.3.2"
|
|
72
71
|
},
|
|
73
72
|
"devDependencies": {
|
|
74
|
-
"@bitgo-beta/sdk-opensslbytes": "1.0.0-beta.
|
|
73
|
+
"@bitgo-beta/sdk-opensslbytes": "1.0.0-beta.388",
|
|
75
74
|
"@openpgp/web-stream-tools": "0.0.14",
|
|
76
75
|
"@types/keccak": "^3.0.5",
|
|
77
76
|
"@types/lodash": "^4.14.151",
|
|
78
77
|
"nyc": "^15.0.0"
|
|
79
78
|
},
|
|
80
|
-
"gitHead": "
|
|
79
|
+
"gitHead": "da05b57c9c953bc8f2830945c0f59763e9819a43"
|
|
81
80
|
}
|
|
@@ -1,76 +0,0 @@
|
|
|
1
|
-
import { BaseKeyPair } from './baseKeyPair';
|
|
2
|
-
import { AddressFormat } from './enum';
|
|
3
|
-
import { BlsKeys, KeyPairOptions } from './iface';
|
|
4
|
-
/**
|
|
5
|
-
* Base class for BLS keypairs.
|
|
6
|
-
*/
|
|
7
|
-
export declare abstract class BlsKeyPair implements BaseKeyPair {
|
|
8
|
-
protected keyPair: BlsKeys;
|
|
9
|
-
/**
|
|
10
|
-
* Public constructor. By default, creates a key pair with a random polynomial.
|
|
11
|
-
*
|
|
12
|
-
* @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key
|
|
13
|
-
*/
|
|
14
|
-
protected constructor(source?: KeyPairOptions);
|
|
15
|
-
createShares(threshold: number, participants: number): void;
|
|
16
|
-
/**
|
|
17
|
-
* Note - this is not possible using BLS. BLS does not support prvkey derived key gen
|
|
18
|
-
*
|
|
19
|
-
* @param {string[]} prv a hexadecimal private key
|
|
20
|
-
*/
|
|
21
|
-
recordKeysFromPrivateKey(prv: string): void;
|
|
22
|
-
/**
|
|
23
|
-
* Note - this is not possible using BLS. BLS does not support pubkey derived key gen
|
|
24
|
-
*
|
|
25
|
-
* @param {string} pub - An extended, compressed, or uncompressed public key
|
|
26
|
-
*/
|
|
27
|
-
recordKeysFromPublicKey(pub: string): void;
|
|
28
|
-
getAddress(format?: AddressFormat): string;
|
|
29
|
-
getKeys(): any;
|
|
30
|
-
/**
|
|
31
|
-
* Signs bytes using the key pair
|
|
32
|
-
*
|
|
33
|
-
* @param msg The message bytes to sign
|
|
34
|
-
* @return signature of the bytes using this keypair
|
|
35
|
-
*/
|
|
36
|
-
sign(msg: Buffer): Promise<string>;
|
|
37
|
-
static keyDerive(seed: string, pk: string, chaincode: string, path: string): BlsKeys;
|
|
38
|
-
/**
|
|
39
|
-
* Aggregates the secret shares of different key pairs into one private key
|
|
40
|
-
*
|
|
41
|
-
* @param prvKeys an array of secret shares
|
|
42
|
-
* @returns a private key
|
|
43
|
-
*/
|
|
44
|
-
static aggregatePrvkeys(prvKeys: string[]): string;
|
|
45
|
-
/**
|
|
46
|
-
* Aggregates the public shares of different key pairs into a common public key
|
|
47
|
-
*
|
|
48
|
-
* @param pubKeys an array of public shares
|
|
49
|
-
* @returns a common public key
|
|
50
|
-
*/
|
|
51
|
-
static aggregatePubkeys(pubKeys: string[]): string;
|
|
52
|
-
static aggregateChaincodes(chaincodeContributions: string[]): string;
|
|
53
|
-
/**
|
|
54
|
-
* Aggregates the message signed by different key pairs into one sign
|
|
55
|
-
*
|
|
56
|
-
* @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.
|
|
57
|
-
* @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>
|
|
58
|
-
* {
|
|
59
|
-
* 1: BigInt(messageSignedWithUserPrv),
|
|
60
|
-
* 3: BigInt(messageSignedWithWalletPrv),
|
|
61
|
-
* }
|
|
62
|
-
* @returns a signature combining all the provided signed messages
|
|
63
|
-
*/
|
|
64
|
-
static aggregateSignatures(signatures: {
|
|
65
|
-
[n: number]: bigint;
|
|
66
|
-
}): string;
|
|
67
|
-
/**
|
|
68
|
-
* Verifies the signature for this key pair
|
|
69
|
-
* @param pub The public key with which to verify the signature
|
|
70
|
-
* @param msg The message to verify the signature with
|
|
71
|
-
* @param signature the signature to verify
|
|
72
|
-
* @return true if the signature is valid, else false
|
|
73
|
-
*/
|
|
74
|
-
static verifySignature(pub: string, msg: Buffer, signature: string): Promise<boolean>;
|
|
75
|
-
}
|
|
76
|
-
//# sourceMappingURL=blsKeyPair.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"blsKeyPair.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/baseCoin/blsKeyPair.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,WAAW,EAAE,MAAM,eAAe,CAAC;AAC5C,OAAO,EAAE,aAAa,EAAE,MAAM,QAAQ,CAAC;AAEvC,OAAO,EAAE,OAAO,EAAE,cAAc,EAAiC,MAAM,SAAS,CAAC;AAMjF;;GAEG;AACH,8BAAsB,UAAW,YAAW,WAAW;IACrD,SAAS,CAAC,OAAO,EAAE,OAAO,CAAC;IAE3B;;;;OAIG;IACH,SAAS,aAAa,MAAM,CAAC,EAAE,cAAc;IAsB7C,YAAY,CAAC,SAAS,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,GAAG,IAAI;IAe3D;;;;OAIG;IACH,wBAAwB,CAAC,GAAG,EAAE,MAAM,GAAG,IAAI;IAI3C;;;;OAIG;IACH,uBAAuB,CAAC,GAAG,EAAE,MAAM,GAAG,IAAI;IAI1C,UAAU,CAAC,MAAM,CAAC,EAAE,aAAa,GAAG,MAAM;IAI1C,OAAO,IAAI,GAAG;IAId;;;;;OAKG;IACG,IAAI,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;WAQ1B,SAAS,CAAC,IAAI,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO;IAiB3F;;;;;OAKG;WACW,gBAAgB,CAAC,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM;IAWzD;;;;;OAKG;WACW,gBAAgB,CAAC,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM;WAU3C,mBAAmB,CAAC,sBAAsB,EAAE,MAAM,EAAE,GAAG,MAAM;IAU3E;;;;;;;;;;OAUG;WACW,mBAAmB,CAAC,UAAU,EAAE;QAAE,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAA;KAAE,GAAG,MAAM;IAS9E;;;;;;OAMG;WACiB,eAAe,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;CAInG"}
|
|
@@ -1,223 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
-
var ownKeys = function(o) {
|
|
20
|
-
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
-
var ar = [];
|
|
22
|
-
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
-
return ar;
|
|
24
|
-
};
|
|
25
|
-
return ownKeys(o);
|
|
26
|
-
};
|
|
27
|
-
return function (mod) {
|
|
28
|
-
if (mod && mod.__esModule) return mod;
|
|
29
|
-
var result = {};
|
|
30
|
-
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
-
__setModuleDefault(result, mod);
|
|
32
|
-
return result;
|
|
33
|
-
};
|
|
34
|
-
})();
|
|
35
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
36
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
37
|
-
};
|
|
38
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
39
|
-
exports.BlsKeyPair = void 0;
|
|
40
|
-
const assert_1 = __importDefault(require("assert"));
|
|
41
|
-
const crypto_1 = require("crypto");
|
|
42
|
-
const BLS = __importStar(require("@bitgo-beta/bls-dkg"));
|
|
43
|
-
const errors_1 = require("./errors");
|
|
44
|
-
const iface_1 = require("./iface");
|
|
45
|
-
const crypto_2 = require("../util/crypto");
|
|
46
|
-
const DEFAULT_SIGNATURE_THRESHOLD = 2;
|
|
47
|
-
const DEFAULT_SIGNATURE_PARTICIPANTS = 3;
|
|
48
|
-
/**
|
|
49
|
-
* Base class for BLS keypairs.
|
|
50
|
-
*/
|
|
51
|
-
class BlsKeyPair {
|
|
52
|
-
/**
|
|
53
|
-
* Public constructor. By default, creates a key pair with a random polynomial.
|
|
54
|
-
*
|
|
55
|
-
* @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key
|
|
56
|
-
*/
|
|
57
|
-
constructor(source) {
|
|
58
|
-
if (!source) {
|
|
59
|
-
this.createShares(DEFAULT_SIGNATURE_THRESHOLD, DEFAULT_SIGNATURE_PARTICIPANTS);
|
|
60
|
-
}
|
|
61
|
-
else if ((0, iface_1.isDkg)(source)) {
|
|
62
|
-
this.createShares(source.threshold, source.participants);
|
|
63
|
-
}
|
|
64
|
-
else if ((0, iface_1.isBlsKey)(source)) {
|
|
65
|
-
(0, assert_1.default)(source.secretShares.every(crypto_2.isValidBLSPrivateKey), 'Invalid private keys');
|
|
66
|
-
(0, assert_1.default)((0, crypto_2.isValidBLSPublicKey)(source.publicShare), 'Invalid public key');
|
|
67
|
-
this.keyPair = source;
|
|
68
|
-
}
|
|
69
|
-
else if ((0, iface_1.isPrivateKey)(source)) {
|
|
70
|
-
this.keyPair = {
|
|
71
|
-
prv: source.prv,
|
|
72
|
-
publicShare: '',
|
|
73
|
-
secretShares: [],
|
|
74
|
-
seed: '',
|
|
75
|
-
chaincode: '',
|
|
76
|
-
};
|
|
77
|
-
}
|
|
78
|
-
else {
|
|
79
|
-
throw new Error('Invalid key pair options');
|
|
80
|
-
}
|
|
81
|
-
}
|
|
82
|
-
createShares(threshold, participants) {
|
|
83
|
-
if (participants < threshold) {
|
|
84
|
-
throw new Error('Participants should be greater than threshold');
|
|
85
|
-
}
|
|
86
|
-
const polynomial = BLS.generatePolynomial(threshold);
|
|
87
|
-
const keySecretShares = BLS.secretShares(polynomial, participants);
|
|
88
|
-
const keyPublicShare = BLS.publicShare(polynomial);
|
|
89
|
-
this.keyPair = {
|
|
90
|
-
seed: (0, crypto_2.bigIntToHex)(polynomial[0], 64),
|
|
91
|
-
chaincode: (0, crypto_1.randomBytes)(32).toString('hex'),
|
|
92
|
-
secretShares: keySecretShares.map((secretShare) => (0, crypto_2.bigIntToHex)(secretShare, 64)),
|
|
93
|
-
publicShare: (0, crypto_2.bigIntToHex)(keyPublicShare),
|
|
94
|
-
};
|
|
95
|
-
}
|
|
96
|
-
/**
|
|
97
|
-
* Note - this is not possible using BLS. BLS does not support prvkey derived key gen
|
|
98
|
-
*
|
|
99
|
-
* @param {string[]} prv a hexadecimal private key
|
|
100
|
-
*/
|
|
101
|
-
recordKeysFromPrivateKey(prv) {
|
|
102
|
-
throw new errors_1.NotImplementedError('Private key derivation is not supported in bls');
|
|
103
|
-
}
|
|
104
|
-
/**
|
|
105
|
-
* Note - this is not possible using BLS. BLS does not support pubkey derived key gen
|
|
106
|
-
*
|
|
107
|
-
* @param {string} pub - An extended, compressed, or uncompressed public key
|
|
108
|
-
*/
|
|
109
|
-
recordKeysFromPublicKey(pub) {
|
|
110
|
-
throw new errors_1.NotImplementedError('Public key derivation is not supported in bls');
|
|
111
|
-
}
|
|
112
|
-
getAddress(format) {
|
|
113
|
-
throw new errors_1.NotImplementedError('getAddress not implemented');
|
|
114
|
-
}
|
|
115
|
-
getKeys() {
|
|
116
|
-
throw new errors_1.NotImplementedError('getKeys not implemented');
|
|
117
|
-
}
|
|
118
|
-
/**
|
|
119
|
-
* Signs bytes using the key pair
|
|
120
|
-
*
|
|
121
|
-
* @param msg The message bytes to sign
|
|
122
|
-
* @return signature of the bytes using this keypair
|
|
123
|
-
*/
|
|
124
|
-
async sign(msg) {
|
|
125
|
-
if (this.keyPair.prv) {
|
|
126
|
-
const signedMessage = await BLS.sign(msg, BigInt('0x' + this.keyPair.prv));
|
|
127
|
-
return '0x' + (0, crypto_2.bigIntToHex)(signedMessage);
|
|
128
|
-
}
|
|
129
|
-
throw new Error('Missing private key');
|
|
130
|
-
}
|
|
131
|
-
static keyDerive(seed, pk, chaincode, path) {
|
|
132
|
-
const seedBI = BigInt('0x' + seed);
|
|
133
|
-
const pkBI = BigInt('0x' + pk);
|
|
134
|
-
const chaincodeBI = BigInt('0x' + chaincode);
|
|
135
|
-
const childKey = BLS.privateDerive(seedBI, pkBI, chaincodeBI, path);
|
|
136
|
-
const childChaincode = (0, crypto_2.bigIntToHex)(childKey.chaincode);
|
|
137
|
-
const entropy = BigInt('0x' + (0, crypto_1.randomBytes)(32).toString('hex'));
|
|
138
|
-
const secretShares = BLS.secretShares([childKey.sk, entropy], DEFAULT_SIGNATURE_PARTICIPANTS);
|
|
139
|
-
const publicShare = BLS.publicShare([childKey.sk]);
|
|
140
|
-
return {
|
|
141
|
-
seed,
|
|
142
|
-
chaincode: childChaincode,
|
|
143
|
-
secretShares: secretShares.map((secretShare) => (0, crypto_2.bigIntToHex)(secretShare)),
|
|
144
|
-
publicShare: (0, crypto_2.bigIntToHex)(publicShare),
|
|
145
|
-
};
|
|
146
|
-
}
|
|
147
|
-
/**
|
|
148
|
-
* Aggregates the secret shares of different key pairs into one private key
|
|
149
|
-
*
|
|
150
|
-
* @param prvKeys an array of secret shares
|
|
151
|
-
* @returns a private key
|
|
152
|
-
*/
|
|
153
|
-
static aggregatePrvkeys(prvKeys) {
|
|
154
|
-
(0, assert_1.default)(prvKeys.every(crypto_2.isValidBLSPrivateKey), 'Invalid private keys');
|
|
155
|
-
try {
|
|
156
|
-
const secretShares = prvKeys.map((secretShare) => BigInt('0x' + secretShare));
|
|
157
|
-
const prv = BLS.mergeSecretShares(secretShares);
|
|
158
|
-
return (0, crypto_2.bigIntToHex)(prv);
|
|
159
|
-
}
|
|
160
|
-
catch (e) {
|
|
161
|
-
throw new Error('Error aggregating prvkeys: ' + e);
|
|
162
|
-
}
|
|
163
|
-
}
|
|
164
|
-
/**
|
|
165
|
-
* Aggregates the public shares of different key pairs into a common public key
|
|
166
|
-
*
|
|
167
|
-
* @param pubKeys an array of public shares
|
|
168
|
-
* @returns a common public key
|
|
169
|
-
*/
|
|
170
|
-
static aggregatePubkeys(pubKeys) {
|
|
171
|
-
try {
|
|
172
|
-
const publicShares = pubKeys.map((publicShare) => BigInt('0x' + publicShare));
|
|
173
|
-
const commonPubKey = BLS.mergePublicShares(publicShares);
|
|
174
|
-
return (0, crypto_2.bigIntToHex)(commonPubKey);
|
|
175
|
-
}
|
|
176
|
-
catch (e) {
|
|
177
|
-
throw new Error('Error aggregating pubkeys: ' + e);
|
|
178
|
-
}
|
|
179
|
-
}
|
|
180
|
-
static aggregateChaincodes(chaincodeContributions) {
|
|
181
|
-
try {
|
|
182
|
-
const chaincodes = chaincodeContributions.map((chaincode) => BigInt('0x' + chaincode));
|
|
183
|
-
const commonChaincode = BLS.mergeChaincodes(chaincodes);
|
|
184
|
-
return (0, crypto_2.bigIntToHex)(commonChaincode, 64);
|
|
185
|
-
}
|
|
186
|
-
catch (e) {
|
|
187
|
-
throw new Error('Error aggregating chaincodes: ' + e);
|
|
188
|
-
}
|
|
189
|
-
}
|
|
190
|
-
/**
|
|
191
|
-
* Aggregates the message signed by different key pairs into one sign
|
|
192
|
-
*
|
|
193
|
-
* @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.
|
|
194
|
-
* @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>
|
|
195
|
-
* {
|
|
196
|
-
* 1: BigInt(messageSignedWithUserPrv),
|
|
197
|
-
* 3: BigInt(messageSignedWithWalletPrv),
|
|
198
|
-
* }
|
|
199
|
-
* @returns a signature combining all the provided signed messages
|
|
200
|
-
*/
|
|
201
|
-
static aggregateSignatures(signatures) {
|
|
202
|
-
try {
|
|
203
|
-
const signature = BLS.mergeSignatures(signatures);
|
|
204
|
-
return '0x' + (0, crypto_2.bigIntToHex)(signature);
|
|
205
|
-
}
|
|
206
|
-
catch (e) {
|
|
207
|
-
throw new Error('Error aggregating signatures: ' + e);
|
|
208
|
-
}
|
|
209
|
-
}
|
|
210
|
-
/**
|
|
211
|
-
* Verifies the signature for this key pair
|
|
212
|
-
* @param pub The public key with which to verify the signature
|
|
213
|
-
* @param msg The message to verify the signature with
|
|
214
|
-
* @param signature the signature to verify
|
|
215
|
-
* @return true if the signature is valid, else false
|
|
216
|
-
*/
|
|
217
|
-
static async verifySignature(pub, msg, signature) {
|
|
218
|
-
(0, assert_1.default)((0, crypto_2.isValidBLSPublicKey)(pub), `Invalid public key: ${pub}`);
|
|
219
|
-
return await BLS.verify(BigInt(signature), msg, BigInt('0x' + pub));
|
|
220
|
-
}
|
|
221
|
-
}
|
|
222
|
-
exports.BlsKeyPair = BlsKeyPair;
|
|
223
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"blsKeyPair.js","sourceRoot":"","sources":["../../../../src/account-lib/baseCoin/blsKeyPair.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,oDAA4B;AAC5B,mCAAqC;AACrC,yDAA2C;AAG3C,qCAA+C;AAC/C,mCAAiF;AACjF,2CAAwF;AAExF,MAAM,2BAA2B,GAAG,CAAC,CAAC;AACtC,MAAM,8BAA8B,GAAG,CAAC,CAAC;AAEzC;;GAEG;AACH,MAAsB,UAAU;IAG9B;;;;OAIG;IACH,YAAsB,MAAuB;QAC3C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,IAAI,CAAC,YAAY,CAAC,2BAA2B,EAAE,8BAA8B,CAAC,CAAC;QACjF,CAAC;aAAM,IAAI,IAAA,aAAK,EAAC,MAAM,CAAC,EAAE,CAAC;YACzB,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,CAAC,YAAY,CAAC,CAAC;QAC3D,CAAC;aAAM,IAAI,IAAA,gBAAQ,EAAC,MAAM,CAAC,EAAE,CAAC;YAC5B,IAAA,gBAAM,EAAC,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,6BAAoB,CAAC,EAAE,sBAAsB,CAAC,CAAC;YAChF,IAAA,gBAAM,EAAC,IAAA,4BAAmB,EAAC,MAAM,CAAC,WAAW,CAAC,EAAE,oBAAoB,CAAC,CAAC;YACtE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACxB,CAAC;aAAM,IAAI,IAAA,oBAAY,EAAC,MAAM,CAAC,EAAE,CAAC;YAChC,IAAI,CAAC,OAAO,GAAG;gBACb,GAAG,EAAE,MAAM,CAAC,GAAG;gBACf,WAAW,EAAE,EAAE;gBACf,YAAY,EAAE,EAAE;gBAChB,IAAI,EAAE,EAAE;gBACR,SAAS,EAAE,EAAE;aACd,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED,YAAY,CAAC,SAAiB,EAAE,YAAoB;QAClD,IAAI,YAAY,GAAG,SAAS,EAAE,CAAC;YAC7B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,MAAM,UAAU,GAAG,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;QACrD,MAAM,eAAe,GAAG,GAAG,CAAC,YAAY,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;QACnE,MAAM,cAAc,GAAG,GAAG,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;QACnD,IAAI,CAAC,OAAO,GAAG;YACb,IAAI,EAAE,IAAA,oBAAW,EAAC,UAAU,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC;YACpC,SAAS,EAAE,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;YAC1C,YAAY,EAAE,eAAe,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,IAAA,oBAAW,EAAC,WAAW,EAAE,EAAE,CAAC,CAAC;YAChF,WAAW,EAAE,IAAA,oBAAW,EAAC,cAAc,CAAC;SACzC,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,wBAAwB,CAAC,GAAW;QAClC,MAAM,IAAI,4BAAmB,CAAC,gDAAgD,CAAC,CAAC;IAClF,CAAC;IAED;;;;OAIG;IACH,uBAAuB,CAAC,GAAW;QACjC,MAAM,IAAI,4BAAmB,CAAC,+CAA+C,CAAC,CAAC;IACjF,CAAC;IAED,UAAU,CAAC,MAAsB;QAC/B,MAAM,IAAI,4BAAmB,CAAC,4BAA4B,CAAC,CAAC;IAC9D,CAAC;IAED,OAAO;QACL,MAAM,IAAI,4BAAmB,CAAC,yBAAyB,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAW;QACpB,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC;YACrB,MAAM,aAAa,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC;YAC3E,OAAO,IAAI,GAAG,IAAA,oBAAW,EAAC,aAAa,CAAC,CAAC;QAC3C,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAEM,MAAM,CAAC,SAAS,CAAC,IAAY,EAAE,EAAU,EAAE,SAAiB,EAAE,IAAY;QAC/E,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,CAAC;QACnC,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,GAAG,EAAE,CAAC,CAAC;QAC/B,MAAM,WAAW,GAAG,MAAM,CAAC,IAAI,GAAG,SAAS,CAAC,CAAC;QAC7C,MAAM,QAAQ,GAAG,GAAG,CAAC,aAAa,CAAC,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,CAAC,CAAC;QACpE,MAAM,cAAc,GAAG,IAAA,oBAAW,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QACvD,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,GAAG,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,GAAG,CAAC,YAAY,CAAC,CAAC,QAAQ,CAAC,EAAE,EAAE,OAAO,CAAC,EAAE,8BAA8B,CAAC,CAAC;QAC9F,MAAM,WAAW,GAAG,GAAG,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC;QACnD,OAAO;YACL,IAAI;YACJ,SAAS,EAAE,cAAc;YACzB,YAAY,EAAE,YAAY,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,IAAA,oBAAW,EAAC,WAAW,CAAC,CAAC;YACzE,WAAW,EAAE,IAAA,oBAAW,EAAC,WAAW,CAAC;SACtC,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,gBAAgB,CAAC,OAAiB;QAC9C,IAAA,gBAAM,EAAC,OAAO,CAAC,KAAK,CAAC,6BAAoB,CAAC,EAAE,sBAAsB,CAAC,CAAC;QACpE,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,WAAW,CAAC,CAAC,CAAC;YAC9E,MAAM,GAAG,GAAG,GAAG,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;YAChD,OAAO,IAAA,oBAAW,EAAC,GAAG,CAAC,CAAC;QAC1B,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,GAAG,CAAC,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,gBAAgB,CAAC,OAAiB;QAC9C,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,WAAW,CAAC,CAAC,CAAC;YAC9E,MAAM,YAAY,GAAG,GAAG,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;YACzD,OAAO,IAAA,oBAAW,EAAC,YAAY,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,GAAG,CAAC,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAEM,MAAM,CAAC,mBAAmB,CAAC,sBAAgC;QAChE,IAAI,CAAC;YACH,MAAM,UAAU,GAAG,sBAAsB,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,SAAS,CAAC,CAAC,CAAC;YACvF,MAAM,eAAe,GAAG,GAAG,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;YACxD,OAAO,IAAA,oBAAW,EAAC,eAAe,EAAE,EAAE,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,GAAG,CAAC,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,mBAAmB,CAAC,UAAmC;QACnE,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;YAClD,OAAO,IAAI,GAAG,IAAA,oBAAW,EAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,GAAG,CAAC,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,GAAW,EAAE,GAAW,EAAE,SAAiB;QAC7E,IAAA,gBAAM,EAAC,IAAA,4BAAmB,EAAC,GAAG,CAAC,EAAE,uBAAuB,GAAG,EAAE,CAAC,CAAC;QAC/D,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,MAAM,CAAC,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC;IACtE,CAAC;CACF;AAhLD,gCAgLC","sourcesContent":["import assert from 'assert';\nimport { randomBytes } from 'crypto';\nimport * as BLS from '@bitgo-beta/bls-dkg';\nimport { BaseKeyPair } from './baseKeyPair';\nimport { AddressFormat } from './enum';\nimport { NotImplementedError } from './errors';\nimport { BlsKeys, KeyPairOptions, isDkg, isBlsKey, isPrivateKey } from './iface';\nimport { isValidBLSPublicKey, isValidBLSPrivateKey, bigIntToHex } from '../util/crypto';\n\nconst DEFAULT_SIGNATURE_THRESHOLD = 2;\nconst DEFAULT_SIGNATURE_PARTICIPANTS = 3;\n\n/**\n * Base class for BLS keypairs.\n */\nexport abstract class BlsKeyPair implements BaseKeyPair {\n  protected keyPair: BlsKeys;\n\n  /**\n   * Public constructor. By default, creates a key pair with a random polynomial.\n   *\n   * @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key\n   */\n  protected constructor(source?: KeyPairOptions) {\n    if (!source) {\n      this.createShares(DEFAULT_SIGNATURE_THRESHOLD, DEFAULT_SIGNATURE_PARTICIPANTS);\n    } else if (isDkg(source)) {\n      this.createShares(source.threshold, source.participants);\n    } else if (isBlsKey(source)) {\n      assert(source.secretShares.every(isValidBLSPrivateKey), 'Invalid private keys');\n      assert(isValidBLSPublicKey(source.publicShare), 'Invalid public key');\n      this.keyPair = source;\n    } else if (isPrivateKey(source)) {\n      this.keyPair = {\n        prv: source.prv,\n        publicShare: '',\n        secretShares: [],\n        seed: '',\n        chaincode: '',\n      };\n    } else {\n      throw new Error('Invalid key pair options');\n    }\n  }\n\n  createShares(threshold: number, participants: number): void {\n    if (participants < threshold) {\n      throw new Error('Participants should be greater than threshold');\n    }\n    const polynomial = BLS.generatePolynomial(threshold);\n    const keySecretShares = BLS.secretShares(polynomial, participants);\n    const keyPublicShare = BLS.publicShare(polynomial);\n    this.keyPair = {\n      seed: bigIntToHex(polynomial[0], 64),\n      chaincode: randomBytes(32).toString('hex'),\n      secretShares: keySecretShares.map((secretShare) => bigIntToHex(secretShare, 64)),\n      publicShare: bigIntToHex(keyPublicShare),\n    };\n  }\n\n  /**\n   * Note - this is not possible using BLS. BLS does not support prvkey derived key gen\n   *\n   * @param {string[]} prv a hexadecimal private key\n   */\n  recordKeysFromPrivateKey(prv: string): void {\n    throw new NotImplementedError('Private key derivation is not supported in bls');\n  }\n\n  /**\n   * Note - this is not possible using BLS. BLS does not support pubkey derived key gen\n   *\n   * @param {string} pub - An extended, compressed, or uncompressed public key\n   */\n  recordKeysFromPublicKey(pub: string): void {\n    throw new NotImplementedError('Public key derivation is not supported in bls');\n  }\n\n  getAddress(format?: AddressFormat): string {\n    throw new NotImplementedError('getAddress not implemented');\n  }\n\n  getKeys(): any {\n    throw new NotImplementedError('getKeys not implemented');\n  }\n\n  /**\n   * Signs bytes using the key pair\n   *\n   * @param msg The message bytes to sign\n   * @return signature of the bytes using this keypair\n   */\n  async sign(msg: Buffer): Promise<string> {\n    if (this.keyPair.prv) {\n      const signedMessage = await BLS.sign(msg, BigInt('0x' + this.keyPair.prv));\n      return '0x' + bigIntToHex(signedMessage);\n    }\n    throw new Error('Missing private key');\n  }\n\n  public static keyDerive(seed: string, pk: string, chaincode: string, path: string): BlsKeys {\n    const seedBI = BigInt('0x' + seed);\n    const pkBI = BigInt('0x' + pk);\n    const chaincodeBI = BigInt('0x' + chaincode);\n    const childKey = BLS.privateDerive(seedBI, pkBI, chaincodeBI, path);\n    const childChaincode = bigIntToHex(childKey.chaincode);\n    const entropy = BigInt('0x' + randomBytes(32).toString('hex'));\n    const secretShares = BLS.secretShares([childKey.sk, entropy], DEFAULT_SIGNATURE_PARTICIPANTS);\n    const publicShare = BLS.publicShare([childKey.sk]);\n    return {\n      seed,\n      chaincode: childChaincode,\n      secretShares: secretShares.map((secretShare) => bigIntToHex(secretShare)),\n      publicShare: bigIntToHex(publicShare),\n    };\n  }\n\n  /**\n   * Aggregates the secret shares of different key pairs into one private key\n   *\n   * @param prvKeys an array of secret shares\n   * @returns a private key\n   */\n  public static aggregatePrvkeys(prvKeys: string[]): string {\n    assert(prvKeys.every(isValidBLSPrivateKey), 'Invalid private keys');\n    try {\n      const secretShares = prvKeys.map((secretShare) => BigInt('0x' + secretShare));\n      const prv = BLS.mergeSecretShares(secretShares);\n      return bigIntToHex(prv);\n    } catch (e) {\n      throw new Error('Error aggregating prvkeys: ' + e);\n    }\n  }\n\n  /**\n   * Aggregates the public shares of different key pairs into a common public key\n   *\n   * @param pubKeys an array of public shares\n   * @returns a common public key\n   */\n  public static aggregatePubkeys(pubKeys: string[]): string {\n    try {\n      const publicShares = pubKeys.map((publicShare) => BigInt('0x' + publicShare));\n      const commonPubKey = BLS.mergePublicShares(publicShares);\n      return bigIntToHex(commonPubKey);\n    } catch (e) {\n      throw new Error('Error aggregating pubkeys: ' + e);\n    }\n  }\n\n  public static aggregateChaincodes(chaincodeContributions: string[]): string {\n    try {\n      const chaincodes = chaincodeContributions.map((chaincode) => BigInt('0x' + chaincode));\n      const commonChaincode = BLS.mergeChaincodes(chaincodes);\n      return bigIntToHex(commonChaincode, 64);\n    } catch (e) {\n      throw new Error('Error aggregating chaincodes: ' + e);\n    }\n  }\n\n  /**\n   * Aggregates the message signed by different key pairs into one sign\n   *\n   * @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.\n   * @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>\n   * {\n   *   1: BigInt(messageSignedWithUserPrv),\n   *   3: BigInt(messageSignedWithWalletPrv),\n   * }\n   * @returns a signature combining all the provided signed messages\n   */\n  public static aggregateSignatures(signatures: { [n: number]: bigint }): string {\n    try {\n      const signature = BLS.mergeSignatures(signatures);\n      return '0x' + bigIntToHex(signature);\n    } catch (e) {\n      throw new Error('Error aggregating signatures: ' + e);\n    }\n  }\n\n  /**\n   * Verifies the signature for this key pair\n   * @param pub The public key with which to verify the signature\n   * @param msg The message to verify the signature with\n   * @param signature the signature to verify\n   * @return true if the signature is valid, else false\n   */\n  public static async verifySignature(pub: string, msg: Buffer, signature: string): Promise<boolean> {\n    assert(isValidBLSPublicKey(pub), `Invalid public key: ${pub}`);\n    return await BLS.verify(BigInt(signature), msg, BigInt('0x' + pub));\n  }\n}\n"]}
|
|
@@ -1,52 +0,0 @@
|
|
|
1
|
-
import { SerializedKeyPair } from 'openpgp';
|
|
2
|
-
import { IBaseCoin, IBlsKeyPair, KeychainsTriplet } from '../baseCoin';
|
|
3
|
-
import { BitGoBase } from '../bitgoBase';
|
|
4
|
-
import { Keychain } from '../keychain';
|
|
5
|
-
import { IBlsUtils } from './iBlsUtils';
|
|
6
|
-
import { MpcUtils } from './mpcUtils';
|
|
7
|
-
/**
|
|
8
|
-
* Utility functions for BLS-DKG work flows.
|
|
9
|
-
*/
|
|
10
|
-
export declare class BlsUtils extends MpcUtils implements IBlsUtils {
|
|
11
|
-
constructor(bitgo: BitGoBase, baseCoin: IBaseCoin);
|
|
12
|
-
/**
|
|
13
|
-
* Creates a Keychain containing the User's BLS-DKG signing materials.
|
|
14
|
-
*
|
|
15
|
-
* @param userGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between user and server
|
|
16
|
-
* @param userKeyShare - user's BLS-DKG key share
|
|
17
|
-
* @param backupKeyShare - backup's BLS-DKG key share
|
|
18
|
-
* @param bitgoKeychain - previously created BitGo keychain; must be compatible with user and backup key shares
|
|
19
|
-
* @param passphrase - wallet passphrase used to encrypt user's signing materials
|
|
20
|
-
*/
|
|
21
|
-
createUserKeychain(userGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, bitgoKeychain: Keychain, passphrase: string, originalPasscodeEncryptionCode?: string): Promise<Keychain>;
|
|
22
|
-
/**
|
|
23
|
-
* Creates a Keychain containing the Backup party's BLS-DKG signing materials.
|
|
24
|
-
*
|
|
25
|
-
* @param backupGpgKey - ephemeral GPG key to encrypt / decrypt sensitive data exchanged between backup and server
|
|
26
|
-
* @param userKeyShare - User's BLS-DKG Keyshare
|
|
27
|
-
* @param backupKeyShare - Backup's BLS-DKG Keyshare
|
|
28
|
-
* @param bitgoKeychain - previously created BitGo keychain; must be compatible with user and backup key shares
|
|
29
|
-
* @param passphrase - wallet passphrase used to encrypt user's signing materials
|
|
30
|
-
*/
|
|
31
|
-
createBackupKeychain(backupGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, bitgoKeychain: Keychain, passphrase: string): Promise<Keychain>;
|
|
32
|
-
/**
|
|
33
|
-
* Creates a Keychain containing BitGo's BLS-DKG signing materials.
|
|
34
|
-
*
|
|
35
|
-
* @param userGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between user and server
|
|
36
|
-
* @param backupGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between backup and server
|
|
37
|
-
* @param userKeyShare - user's BLS-DKG key share
|
|
38
|
-
* @param backupKeyShare - backup's BLS-DKG key share
|
|
39
|
-
*/
|
|
40
|
-
createBitgoKeychain(userGpgKey: SerializedKeyPair<string>, backupGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, enterprise?: string): Promise<Keychain>;
|
|
41
|
-
/**
|
|
42
|
-
* Creates User, Backup, and BitGo BLS-DKG Keychains.
|
|
43
|
-
*
|
|
44
|
-
* @param params.passphrase - passphrase used to encrypt signing materials created for User and Backup
|
|
45
|
-
*/
|
|
46
|
-
createKeychains(params: {
|
|
47
|
-
passphrase: string;
|
|
48
|
-
enterprise?: string;
|
|
49
|
-
originalPasscodeEncryptionCode?: string;
|
|
50
|
-
}): Promise<KeychainsTriplet>;
|
|
51
|
-
}
|
|
52
|
-
//# sourceMappingURL=blsUtils.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"blsUtils.d.ts","sourceRoot":"","sources":["../../../../src/bitgo/utils/blsUtils.ts"],"names":[],"mappings":"AAIA,OAAO,EAAe,iBAAiB,EAAE,MAAM,SAAS,CAAC;AAEzD,OAAO,EAAE,SAAS,EAAE,WAAW,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,cAAc,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,aAAa,CAAC;AAEvC,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AACxC,OAAO,EAAE,QAAQ,EAAE,MAAM,YAAY,CAAC;AAetC;;GAEG;AACH,qBAAa,QAAS,SAAQ,QAAS,YAAW,SAAS;gBAC7C,KAAK,EAAE,SAAS,EAAE,QAAQ,EAAE,SAAS;IAIjD;;;;;;;;OAQG;IACG,kBAAkB,CACtB,UAAU,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACrC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,aAAa,EAAE,QAAQ,EACvB,UAAU,EAAE,MAAM,EAClB,8BAA8B,CAAC,EAAE,MAAM,GACtC,OAAO,CAAC,QAAQ,CAAC;IAiEpB;;;;;;;;OAQG;IACG,oBAAoB,CACxB,YAAY,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACvC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,aAAa,EAAE,QAAQ,EACvB,UAAU,EAAE,MAAM,GACjB,OAAO,CAAC,QAAQ,CAAC;IAoEpB;;;;;;;OAOG;IACG,mBAAmB,CACvB,UAAU,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACrC,YAAY,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACvC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,QAAQ,CAAC;IA6CpB;;;;OAIG;IACG,eAAe,CAAC,MAAM,EAAE;QAC5B,UAAU,EAAE,MAAM,CAAC;QACnB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,8BAA8B,CAAC,EAAE,MAAM,CAAC;KACzC,GAAG,OAAO,CAAC,gBAAgB,CAAC;CA0D9B"}
|