@bitgo-beta/sdk-core 8.2.1-beta.833 → 8.2.1-beta.835

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/dist/src/account-lib/baseCoin/iface.d.ts +1 -28
  2. package/dist/src/account-lib/baseCoin/iface.d.ts.map +1 -1
  3. package/dist/src/account-lib/baseCoin/iface.js +1 -18
  4. package/dist/src/account-lib/baseCoin/index.d.ts +0 -1
  5. package/dist/src/account-lib/baseCoin/index.d.ts.map +1 -1
  6. package/dist/src/account-lib/baseCoin/index.js +2 -4
  7. package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts +2 -2
  8. package/dist/src/bitgo/baseCoin/iBaseCoin.d.ts.map +1 -1
  9. package/dist/src/bitgo/baseCoin/iBaseCoin.js +1 -1
  10. package/dist/src/bitgo/keychain/iKeychains.d.ts +1 -1
  11. package/dist/src/bitgo/keychain/iKeychains.d.ts.map +1 -1
  12. package/dist/src/bitgo/keychain/iKeychains.js +1 -1
  13. package/dist/src/bitgo/keychain/keychains.d.ts.map +1 -1
  14. package/dist/src/bitgo/keychain/keychains.js +1 -7
  15. package/dist/src/bitgo/utils/index.d.ts +0 -2
  16. package/dist/src/bitgo/utils/index.d.ts.map +1 -1
  17. package/dist/src/bitgo/utils/index.js +1 -3
  18. package/dist/src/bitgo/utils/tss/baseTypes.d.ts +2 -1
  19. package/dist/src/bitgo/utils/tss/baseTypes.d.ts.map +1 -1
  20. package/dist/src/bitgo/utils/tss/baseTypes.js +2 -1
  21. package/dist/src/bitgo/wallet/iWallet.d.ts +1 -0
  22. package/dist/src/bitgo/wallet/iWallet.d.ts.map +1 -1
  23. package/dist/src/bitgo/wallet/iWallet.js +1 -1
  24. package/dist/src/bitgo/wallet/iWallets.d.ts +1 -1
  25. package/dist/src/bitgo/wallet/iWallets.d.ts.map +1 -1
  26. package/dist/src/bitgo/wallet/iWallets.js +1 -1
  27. package/dist/src/bitgo/wallet/wallet.d.ts +1 -1
  28. package/dist/src/bitgo/wallet/wallet.d.ts.map +1 -1
  29. package/dist/src/bitgo/wallet/wallet.js +26 -5
  30. package/dist/src/bitgo/wallet/wallets.d.ts.map +1 -1
  31. package/dist/src/bitgo/wallet/wallets.js +1 -16
  32. package/dist/tsconfig.tsbuildinfo +1 -1
  33. package/package.json +8 -9
  34. package/dist/src/account-lib/baseCoin/blsKeyPair.d.ts +0 -76
  35. package/dist/src/account-lib/baseCoin/blsKeyPair.d.ts.map +0 -1
  36. package/dist/src/account-lib/baseCoin/blsKeyPair.js +0 -223
  37. package/dist/src/bitgo/utils/blsUtils.d.ts +0 -52
  38. package/dist/src/bitgo/utils/blsUtils.d.ts.map +0 -1
  39. package/dist/src/bitgo/utils/blsUtils.js +0 -237
  40. package/dist/src/bitgo/utils/iBlsUtils.d.ts +0 -14
  41. package/dist/src/bitgo/utils/iBlsUtils.d.ts.map +0 -1
  42. package/dist/src/bitgo/utils/iBlsUtils.js +0 -3
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitgo-beta/sdk-core",
3
- "version": "8.2.1-beta.833",
3
+ "version": "8.2.1-beta.835",
4
4
  "description": "core library functions for BitGoJS",
5
5
  "main": "./dist/src/index.js",
6
6
  "types": "./dist/src/index.d.ts",
@@ -37,12 +37,11 @@
37
37
  ]
38
38
  },
39
39
  "dependencies": {
40
- "@bitgo-beta/bls-dkg": "1.1.1-beta.1073",
41
- "@bitgo-beta/sdk-lib-mpc": "8.2.0-beta.825",
42
- "@bitgo-beta/secp256k1": "1.0.2-beta.859",
43
- "@bitgo-beta/sjcl": "1.0.2-beta.1071",
44
- "@bitgo-beta/statics": "15.1.1-beta.836",
45
- "@bitgo-beta/utxo-lib": "8.0.3-beta.834",
40
+ "@bitgo-beta/sdk-lib-mpc": "8.2.0-beta.827",
41
+ "@bitgo-beta/secp256k1": "1.0.2-beta.861",
42
+ "@bitgo-beta/sjcl": "1.0.2-beta.1073",
43
+ "@bitgo-beta/statics": "15.1.1-beta.838",
44
+ "@bitgo-beta/utxo-lib": "8.0.3-beta.836",
46
45
  "@bitgo/public-types": "4.17.0",
47
46
  "@noble/curves": "1.8.1",
48
47
  "@stablelib/hex": "^1.0.0",
@@ -71,11 +70,11 @@
71
70
  "uuid": "^8.3.2"
72
71
  },
73
72
  "devDependencies": {
74
- "@bitgo-beta/sdk-opensslbytes": "1.0.0-beta.386",
73
+ "@bitgo-beta/sdk-opensslbytes": "1.0.0-beta.388",
75
74
  "@openpgp/web-stream-tools": "0.0.14",
76
75
  "@types/keccak": "^3.0.5",
77
76
  "@types/lodash": "^4.14.151",
78
77
  "nyc": "^15.0.0"
79
78
  },
80
- "gitHead": "396ca4585e9612eb906f4f9898aa785719e3023d"
79
+ "gitHead": "da05b57c9c953bc8f2830945c0f59763e9819a43"
81
80
  }
@@ -1,76 +0,0 @@
1
- import { BaseKeyPair } from './baseKeyPair';
2
- import { AddressFormat } from './enum';
3
- import { BlsKeys, KeyPairOptions } from './iface';
4
- /**
5
- * Base class for BLS keypairs.
6
- */
7
- export declare abstract class BlsKeyPair implements BaseKeyPair {
8
- protected keyPair: BlsKeys;
9
- /**
10
- * Public constructor. By default, creates a key pair with a random polynomial.
11
- *
12
- * @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key
13
- */
14
- protected constructor(source?: KeyPairOptions);
15
- createShares(threshold: number, participants: number): void;
16
- /**
17
- * Note - this is not possible using BLS. BLS does not support prvkey derived key gen
18
- *
19
- * @param {string[]} prv a hexadecimal private key
20
- */
21
- recordKeysFromPrivateKey(prv: string): void;
22
- /**
23
- * Note - this is not possible using BLS. BLS does not support pubkey derived key gen
24
- *
25
- * @param {string} pub - An extended, compressed, or uncompressed public key
26
- */
27
- recordKeysFromPublicKey(pub: string): void;
28
- getAddress(format?: AddressFormat): string;
29
- getKeys(): any;
30
- /**
31
- * Signs bytes using the key pair
32
- *
33
- * @param msg The message bytes to sign
34
- * @return signature of the bytes using this keypair
35
- */
36
- sign(msg: Buffer): Promise<string>;
37
- static keyDerive(seed: string, pk: string, chaincode: string, path: string): BlsKeys;
38
- /**
39
- * Aggregates the secret shares of different key pairs into one private key
40
- *
41
- * @param prvKeys an array of secret shares
42
- * @returns a private key
43
- */
44
- static aggregatePrvkeys(prvKeys: string[]): string;
45
- /**
46
- * Aggregates the public shares of different key pairs into a common public key
47
- *
48
- * @param pubKeys an array of public shares
49
- * @returns a common public key
50
- */
51
- static aggregatePubkeys(pubKeys: string[]): string;
52
- static aggregateChaincodes(chaincodeContributions: string[]): string;
53
- /**
54
- * Aggregates the message signed by different key pairs into one sign
55
- *
56
- * @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.
57
- * @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>
58
- * {
59
- * 1: BigInt(messageSignedWithUserPrv),
60
- * 3: BigInt(messageSignedWithWalletPrv),
61
- * }
62
- * @returns a signature combining all the provided signed messages
63
- */
64
- static aggregateSignatures(signatures: {
65
- [n: number]: bigint;
66
- }): string;
67
- /**
68
- * Verifies the signature for this key pair
69
- * @param pub The public key with which to verify the signature
70
- * @param msg The message to verify the signature with
71
- * @param signature the signature to verify
72
- * @return true if the signature is valid, else false
73
- */
74
- static verifySignature(pub: string, msg: Buffer, signature: string): Promise<boolean>;
75
- }
76
- //# sourceMappingURL=blsKeyPair.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"blsKeyPair.d.ts","sourceRoot":"","sources":["../../../../src/account-lib/baseCoin/blsKeyPair.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,WAAW,EAAE,MAAM,eAAe,CAAC;AAC5C,OAAO,EAAE,aAAa,EAAE,MAAM,QAAQ,CAAC;AAEvC,OAAO,EAAE,OAAO,EAAE,cAAc,EAAiC,MAAM,SAAS,CAAC;AAMjF;;GAEG;AACH,8BAAsB,UAAW,YAAW,WAAW;IACrD,SAAS,CAAC,OAAO,EAAE,OAAO,CAAC;IAE3B;;;;OAIG;IACH,SAAS,aAAa,MAAM,CAAC,EAAE,cAAc;IAsB7C,YAAY,CAAC,SAAS,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,GAAG,IAAI;IAe3D;;;;OAIG;IACH,wBAAwB,CAAC,GAAG,EAAE,MAAM,GAAG,IAAI;IAI3C;;;;OAIG;IACH,uBAAuB,CAAC,GAAG,EAAE,MAAM,GAAG,IAAI;IAI1C,UAAU,CAAC,MAAM,CAAC,EAAE,aAAa,GAAG,MAAM;IAI1C,OAAO,IAAI,GAAG;IAId;;;;;OAKG;IACG,IAAI,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;WAQ1B,SAAS,CAAC,IAAI,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO;IAiB3F;;;;;OAKG;WACW,gBAAgB,CAAC,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM;IAWzD;;;;;OAKG;WACW,gBAAgB,CAAC,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM;WAU3C,mBAAmB,CAAC,sBAAsB,EAAE,MAAM,EAAE,GAAG,MAAM;IAU3E;;;;;;;;;;OAUG;WACW,mBAAmB,CAAC,UAAU,EAAE;QAAE,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAA;KAAE,GAAG,MAAM;IAS9E;;;;;;OAMG;WACiB,eAAe,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;CAInG"}
@@ -1,223 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || (function () {
19
- var ownKeys = function(o) {
20
- ownKeys = Object.getOwnPropertyNames || function (o) {
21
- var ar = [];
22
- for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
- return ar;
24
- };
25
- return ownKeys(o);
26
- };
27
- return function (mod) {
28
- if (mod && mod.__esModule) return mod;
29
- var result = {};
30
- if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
- __setModuleDefault(result, mod);
32
- return result;
33
- };
34
- })();
35
- var __importDefault = (this && this.__importDefault) || function (mod) {
36
- return (mod && mod.__esModule) ? mod : { "default": mod };
37
- };
38
- Object.defineProperty(exports, "__esModule", { value: true });
39
- exports.BlsKeyPair = void 0;
40
- const assert_1 = __importDefault(require("assert"));
41
- const crypto_1 = require("crypto");
42
- const BLS = __importStar(require("@bitgo-beta/bls-dkg"));
43
- const errors_1 = require("./errors");
44
- const iface_1 = require("./iface");
45
- const crypto_2 = require("../util/crypto");
46
- const DEFAULT_SIGNATURE_THRESHOLD = 2;
47
- const DEFAULT_SIGNATURE_PARTICIPANTS = 3;
48
- /**
49
- * Base class for BLS keypairs.
50
- */
51
- class BlsKeyPair {
52
- /**
53
- * Public constructor. By default, creates a key pair with a random polynomial.
54
- *
55
- * @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key
56
- */
57
- constructor(source) {
58
- if (!source) {
59
- this.createShares(DEFAULT_SIGNATURE_THRESHOLD, DEFAULT_SIGNATURE_PARTICIPANTS);
60
- }
61
- else if ((0, iface_1.isDkg)(source)) {
62
- this.createShares(source.threshold, source.participants);
63
- }
64
- else if ((0, iface_1.isBlsKey)(source)) {
65
- (0, assert_1.default)(source.secretShares.every(crypto_2.isValidBLSPrivateKey), 'Invalid private keys');
66
- (0, assert_1.default)((0, crypto_2.isValidBLSPublicKey)(source.publicShare), 'Invalid public key');
67
- this.keyPair = source;
68
- }
69
- else if ((0, iface_1.isPrivateKey)(source)) {
70
- this.keyPair = {
71
- prv: source.prv,
72
- publicShare: '',
73
- secretShares: [],
74
- seed: '',
75
- chaincode: '',
76
- };
77
- }
78
- else {
79
- throw new Error('Invalid key pair options');
80
- }
81
- }
82
- createShares(threshold, participants) {
83
- if (participants < threshold) {
84
- throw new Error('Participants should be greater than threshold');
85
- }
86
- const polynomial = BLS.generatePolynomial(threshold);
87
- const keySecretShares = BLS.secretShares(polynomial, participants);
88
- const keyPublicShare = BLS.publicShare(polynomial);
89
- this.keyPair = {
90
- seed: (0, crypto_2.bigIntToHex)(polynomial[0], 64),
91
- chaincode: (0, crypto_1.randomBytes)(32).toString('hex'),
92
- secretShares: keySecretShares.map((secretShare) => (0, crypto_2.bigIntToHex)(secretShare, 64)),
93
- publicShare: (0, crypto_2.bigIntToHex)(keyPublicShare),
94
- };
95
- }
96
- /**
97
- * Note - this is not possible using BLS. BLS does not support prvkey derived key gen
98
- *
99
- * @param {string[]} prv a hexadecimal private key
100
- */
101
- recordKeysFromPrivateKey(prv) {
102
- throw new errors_1.NotImplementedError('Private key derivation is not supported in bls');
103
- }
104
- /**
105
- * Note - this is not possible using BLS. BLS does not support pubkey derived key gen
106
- *
107
- * @param {string} pub - An extended, compressed, or uncompressed public key
108
- */
109
- recordKeysFromPublicKey(pub) {
110
- throw new errors_1.NotImplementedError('Public key derivation is not supported in bls');
111
- }
112
- getAddress(format) {
113
- throw new errors_1.NotImplementedError('getAddress not implemented');
114
- }
115
- getKeys() {
116
- throw new errors_1.NotImplementedError('getKeys not implemented');
117
- }
118
- /**
119
- * Signs bytes using the key pair
120
- *
121
- * @param msg The message bytes to sign
122
- * @return signature of the bytes using this keypair
123
- */
124
- async sign(msg) {
125
- if (this.keyPair.prv) {
126
- const signedMessage = await BLS.sign(msg, BigInt('0x' + this.keyPair.prv));
127
- return '0x' + (0, crypto_2.bigIntToHex)(signedMessage);
128
- }
129
- throw new Error('Missing private key');
130
- }
131
- static keyDerive(seed, pk, chaincode, path) {
132
- const seedBI = BigInt('0x' + seed);
133
- const pkBI = BigInt('0x' + pk);
134
- const chaincodeBI = BigInt('0x' + chaincode);
135
- const childKey = BLS.privateDerive(seedBI, pkBI, chaincodeBI, path);
136
- const childChaincode = (0, crypto_2.bigIntToHex)(childKey.chaincode);
137
- const entropy = BigInt('0x' + (0, crypto_1.randomBytes)(32).toString('hex'));
138
- const secretShares = BLS.secretShares([childKey.sk, entropy], DEFAULT_SIGNATURE_PARTICIPANTS);
139
- const publicShare = BLS.publicShare([childKey.sk]);
140
- return {
141
- seed,
142
- chaincode: childChaincode,
143
- secretShares: secretShares.map((secretShare) => (0, crypto_2.bigIntToHex)(secretShare)),
144
- publicShare: (0, crypto_2.bigIntToHex)(publicShare),
145
- };
146
- }
147
- /**
148
- * Aggregates the secret shares of different key pairs into one private key
149
- *
150
- * @param prvKeys an array of secret shares
151
- * @returns a private key
152
- */
153
- static aggregatePrvkeys(prvKeys) {
154
- (0, assert_1.default)(prvKeys.every(crypto_2.isValidBLSPrivateKey), 'Invalid private keys');
155
- try {
156
- const secretShares = prvKeys.map((secretShare) => BigInt('0x' + secretShare));
157
- const prv = BLS.mergeSecretShares(secretShares);
158
- return (0, crypto_2.bigIntToHex)(prv);
159
- }
160
- catch (e) {
161
- throw new Error('Error aggregating prvkeys: ' + e);
162
- }
163
- }
164
- /**
165
- * Aggregates the public shares of different key pairs into a common public key
166
- *
167
- * @param pubKeys an array of public shares
168
- * @returns a common public key
169
- */
170
- static aggregatePubkeys(pubKeys) {
171
- try {
172
- const publicShares = pubKeys.map((publicShare) => BigInt('0x' + publicShare));
173
- const commonPubKey = BLS.mergePublicShares(publicShares);
174
- return (0, crypto_2.bigIntToHex)(commonPubKey);
175
- }
176
- catch (e) {
177
- throw new Error('Error aggregating pubkeys: ' + e);
178
- }
179
- }
180
- static aggregateChaincodes(chaincodeContributions) {
181
- try {
182
- const chaincodes = chaincodeContributions.map((chaincode) => BigInt('0x' + chaincode));
183
- const commonChaincode = BLS.mergeChaincodes(chaincodes);
184
- return (0, crypto_2.bigIntToHex)(commonChaincode, 64);
185
- }
186
- catch (e) {
187
- throw new Error('Error aggregating chaincodes: ' + e);
188
- }
189
- }
190
- /**
191
- * Aggregates the message signed by different key pairs into one sign
192
- *
193
- * @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.
194
- * @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>
195
- * {
196
- * 1: BigInt(messageSignedWithUserPrv),
197
- * 3: BigInt(messageSignedWithWalletPrv),
198
- * }
199
- * @returns a signature combining all the provided signed messages
200
- */
201
- static aggregateSignatures(signatures) {
202
- try {
203
- const signature = BLS.mergeSignatures(signatures);
204
- return '0x' + (0, crypto_2.bigIntToHex)(signature);
205
- }
206
- catch (e) {
207
- throw new Error('Error aggregating signatures: ' + e);
208
- }
209
- }
210
- /**
211
- * Verifies the signature for this key pair
212
- * @param pub The public key with which to verify the signature
213
- * @param msg The message to verify the signature with
214
- * @param signature the signature to verify
215
- * @return true if the signature is valid, else false
216
- */
217
- static async verifySignature(pub, msg, signature) {
218
- (0, assert_1.default)((0, crypto_2.isValidBLSPublicKey)(pub), `Invalid public key: ${pub}`);
219
- return await BLS.verify(BigInt(signature), msg, BigInt('0x' + pub));
220
- }
221
- }
222
- exports.BlsKeyPair = BlsKeyPair;
223
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"blsKeyPair.js","sourceRoot":"","sources":["../../../../src/account-lib/baseCoin/blsKeyPair.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,oDAA4B;AAC5B,mCAAqC;AACrC,yDAA2C;AAG3C,qCAA+C;AAC/C,mCAAiF;AACjF,2CAAwF;AAExF,MAAM,2BAA2B,GAAG,CAAC,CAAC;AACtC,MAAM,8BAA8B,GAAG,CAAC,CAAC;AAEzC;;GAEG;AACH,MAAsB,UAAU;IAG9B;;;;OAIG;IACH,YAAsB,MAAuB;QAC3C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,IAAI,CAAC,YAAY,CAAC,2BAA2B,EAAE,8BAA8B,CAAC,CAAC;QACjF,CAAC;aAAM,IAAI,IAAA,aAAK,EAAC,MAAM,CAAC,EAAE,CAAC;YACzB,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,CAAC,YAAY,CAAC,CAAC;QAC3D,CAAC;aAAM,IAAI,IAAA,gBAAQ,EAAC,MAAM,CAAC,EAAE,CAAC;YAC5B,IAAA,gBAAM,EAAC,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,6BAAoB,CAAC,EAAE,sBAAsB,CAAC,CAAC;YAChF,IAAA,gBAAM,EAAC,IAAA,4BAAmB,EAAC,MAAM,CAAC,WAAW,CAAC,EAAE,oBAAoB,CAAC,CAAC;YACtE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACxB,CAAC;aAAM,IAAI,IAAA,oBAAY,EAAC,MAAM,CAAC,EAAE,CAAC;YAChC,IAAI,CAAC,OAAO,GAAG;gBACb,GAAG,EAAE,MAAM,CAAC,GAAG;gBACf,WAAW,EAAE,EAAE;gBACf,YAAY,EAAE,EAAE;gBAChB,IAAI,EAAE,EAAE;gBACR,SAAS,EAAE,EAAE;aACd,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED,YAAY,CAAC,SAAiB,EAAE,YAAoB;QAClD,IAAI,YAAY,GAAG,SAAS,EAAE,CAAC;YAC7B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,MAAM,UAAU,GAAG,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;QACrD,MAAM,eAAe,GAAG,GAAG,CAAC,YAAY,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;QACnE,MAAM,cAAc,GAAG,GAAG,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;QACnD,IAAI,CAAC,OAAO,GAAG;YACb,IAAI,EAAE,IAAA,oBAAW,EAAC,UAAU,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC;YACpC,SAAS,EAAE,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;YAC1C,YAAY,EAAE,eAAe,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,IAAA,oBAAW,EAAC,WAAW,EAAE,EAAE,CAAC,CAAC;YAChF,WAAW,EAAE,IAAA,oBAAW,EAAC,cAAc,CAAC;SACzC,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,wBAAwB,CAAC,GAAW;QAClC,MAAM,IAAI,4BAAmB,CAAC,gDAAgD,CAAC,CAAC;IAClF,CAAC;IAED;;;;OAIG;IACH,uBAAuB,CAAC,GAAW;QACjC,MAAM,IAAI,4BAAmB,CAAC,+CAA+C,CAAC,CAAC;IACjF,CAAC;IAED,UAAU,CAAC,MAAsB;QAC/B,MAAM,IAAI,4BAAmB,CAAC,4BAA4B,CAAC,CAAC;IAC9D,CAAC;IAED,OAAO;QACL,MAAM,IAAI,4BAAmB,CAAC,yBAAyB,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAW;QACpB,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC;YACrB,MAAM,aAAa,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC;YAC3E,OAAO,IAAI,GAAG,IAAA,oBAAW,EAAC,aAAa,CAAC,CAAC;QAC3C,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAEM,MAAM,CAAC,SAAS,CAAC,IAAY,EAAE,EAAU,EAAE,SAAiB,EAAE,IAAY;QAC/E,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,CAAC;QACnC,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,GAAG,EAAE,CAAC,CAAC;QAC/B,MAAM,WAAW,GAAG,MAAM,CAAC,IAAI,GAAG,SAAS,CAAC,CAAC;QAC7C,MAAM,QAAQ,GAAG,GAAG,CAAC,aAAa,CAAC,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,CAAC,CAAC;QACpE,MAAM,cAAc,GAAG,IAAA,oBAAW,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QACvD,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,GAAG,IAAA,oBAAW,EAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,GAAG,CAAC,YAAY,CAAC,CAAC,QAAQ,CAAC,EAAE,EAAE,OAAO,CAAC,EAAE,8BAA8B,CAAC,CAAC;QAC9F,MAAM,WAAW,GAAG,GAAG,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC;QACnD,OAAO;YACL,IAAI;YACJ,SAAS,EAAE,cAAc;YACzB,YAAY,EAAE,YAAY,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,IAAA,oBAAW,EAAC,WAAW,CAAC,CAAC;YACzE,WAAW,EAAE,IAAA,oBAAW,EAAC,WAAW,CAAC;SACtC,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,gBAAgB,CAAC,OAAiB;QAC9C,IAAA,gBAAM,EAAC,OAAO,CAAC,KAAK,CAAC,6BAAoB,CAAC,EAAE,sBAAsB,CAAC,CAAC;QACpE,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,WAAW,CAAC,CAAC,CAAC;YAC9E,MAAM,GAAG,GAAG,GAAG,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;YAChD,OAAO,IAAA,oBAAW,EAAC,GAAG,CAAC,CAAC;QAC1B,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,GAAG,CAAC,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,gBAAgB,CAAC,OAAiB;QAC9C,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,WAAW,CAAC,CAAC,CAAC;YAC9E,MAAM,YAAY,GAAG,GAAG,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;YACzD,OAAO,IAAA,oBAAW,EAAC,YAAY,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,GAAG,CAAC,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAEM,MAAM,CAAC,mBAAmB,CAAC,sBAAgC;QAChE,IAAI,CAAC;YACH,MAAM,UAAU,GAAG,sBAAsB,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,GAAG,SAAS,CAAC,CAAC,CAAC;YACvF,MAAM,eAAe,GAAG,GAAG,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;YACxD,OAAO,IAAA,oBAAW,EAAC,eAAe,EAAE,EAAE,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,GAAG,CAAC,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,mBAAmB,CAAC,UAAmC;QACnE,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;YAClD,OAAO,IAAI,GAAG,IAAA,oBAAW,EAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,GAAG,CAAC,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,GAAW,EAAE,GAAW,EAAE,SAAiB;QAC7E,IAAA,gBAAM,EAAC,IAAA,4BAAmB,EAAC,GAAG,CAAC,EAAE,uBAAuB,GAAG,EAAE,CAAC,CAAC;QAC/D,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,MAAM,CAAC,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC;IACtE,CAAC;CACF;AAhLD,gCAgLC","sourcesContent":["import assert from 'assert';\nimport { randomBytes } from 'crypto';\nimport * as BLS from '@bitgo-beta/bls-dkg';\nimport { BaseKeyPair } from './baseKeyPair';\nimport { AddressFormat } from './enum';\nimport { NotImplementedError } from './errors';\nimport { BlsKeys, KeyPairOptions, isDkg, isBlsKey, isPrivateKey } from './iface';\nimport { isValidBLSPublicKey, isValidBLSPrivateKey, bigIntToHex } from '../util/crypto';\n\nconst DEFAULT_SIGNATURE_THRESHOLD = 2;\nconst DEFAULT_SIGNATURE_PARTICIPANTS = 3;\n\n/**\n * Base class for BLS keypairs.\n */\nexport abstract class BlsKeyPair implements BaseKeyPair {\n  protected keyPair: BlsKeys;\n\n  /**\n   * Public constructor. By default, creates a key pair with a random polynomial.\n   *\n   * @param {KeyPairOptions} source Either a dkg options, a public and secret shares, or a private key\n   */\n  protected constructor(source?: KeyPairOptions) {\n    if (!source) {\n      this.createShares(DEFAULT_SIGNATURE_THRESHOLD, DEFAULT_SIGNATURE_PARTICIPANTS);\n    } else if (isDkg(source)) {\n      this.createShares(source.threshold, source.participants);\n    } else if (isBlsKey(source)) {\n      assert(source.secretShares.every(isValidBLSPrivateKey), 'Invalid private keys');\n      assert(isValidBLSPublicKey(source.publicShare), 'Invalid public key');\n      this.keyPair = source;\n    } else if (isPrivateKey(source)) {\n      this.keyPair = {\n        prv: source.prv,\n        publicShare: '',\n        secretShares: [],\n        seed: '',\n        chaincode: '',\n      };\n    } else {\n      throw new Error('Invalid key pair options');\n    }\n  }\n\n  createShares(threshold: number, participants: number): void {\n    if (participants < threshold) {\n      throw new Error('Participants should be greater than threshold');\n    }\n    const polynomial = BLS.generatePolynomial(threshold);\n    const keySecretShares = BLS.secretShares(polynomial, participants);\n    const keyPublicShare = BLS.publicShare(polynomial);\n    this.keyPair = {\n      seed: bigIntToHex(polynomial[0], 64),\n      chaincode: randomBytes(32).toString('hex'),\n      secretShares: keySecretShares.map((secretShare) => bigIntToHex(secretShare, 64)),\n      publicShare: bigIntToHex(keyPublicShare),\n    };\n  }\n\n  /**\n   * Note - this is not possible using BLS. BLS does not support prvkey derived key gen\n   *\n   * @param {string[]} prv a hexadecimal private key\n   */\n  recordKeysFromPrivateKey(prv: string): void {\n    throw new NotImplementedError('Private key derivation is not supported in bls');\n  }\n\n  /**\n   * Note - this is not possible using BLS. BLS does not support pubkey derived key gen\n   *\n   * @param {string} pub - An extended, compressed, or uncompressed public key\n   */\n  recordKeysFromPublicKey(pub: string): void {\n    throw new NotImplementedError('Public key derivation is not supported in bls');\n  }\n\n  getAddress(format?: AddressFormat): string {\n    throw new NotImplementedError('getAddress not implemented');\n  }\n\n  getKeys(): any {\n    throw new NotImplementedError('getKeys not implemented');\n  }\n\n  /**\n   * Signs bytes using the key pair\n   *\n   * @param msg The message bytes to sign\n   * @return signature of the bytes using this keypair\n   */\n  async sign(msg: Buffer): Promise<string> {\n    if (this.keyPair.prv) {\n      const signedMessage = await BLS.sign(msg, BigInt('0x' + this.keyPair.prv));\n      return '0x' + bigIntToHex(signedMessage);\n    }\n    throw new Error('Missing private key');\n  }\n\n  public static keyDerive(seed: string, pk: string, chaincode: string, path: string): BlsKeys {\n    const seedBI = BigInt('0x' + seed);\n    const pkBI = BigInt('0x' + pk);\n    const chaincodeBI = BigInt('0x' + chaincode);\n    const childKey = BLS.privateDerive(seedBI, pkBI, chaincodeBI, path);\n    const childChaincode = bigIntToHex(childKey.chaincode);\n    const entropy = BigInt('0x' + randomBytes(32).toString('hex'));\n    const secretShares = BLS.secretShares([childKey.sk, entropy], DEFAULT_SIGNATURE_PARTICIPANTS);\n    const publicShare = BLS.publicShare([childKey.sk]);\n    return {\n      seed,\n      chaincode: childChaincode,\n      secretShares: secretShares.map((secretShare) => bigIntToHex(secretShare)),\n      publicShare: bigIntToHex(publicShare),\n    };\n  }\n\n  /**\n   * Aggregates the secret shares of different key pairs into one private key\n   *\n   * @param prvKeys an array of secret shares\n   * @returns a private key\n   */\n  public static aggregatePrvkeys(prvKeys: string[]): string {\n    assert(prvKeys.every(isValidBLSPrivateKey), 'Invalid private keys');\n    try {\n      const secretShares = prvKeys.map((secretShare) => BigInt('0x' + secretShare));\n      const prv = BLS.mergeSecretShares(secretShares);\n      return bigIntToHex(prv);\n    } catch (e) {\n      throw new Error('Error aggregating prvkeys: ' + e);\n    }\n  }\n\n  /**\n   * Aggregates the public shares of different key pairs into a common public key\n   *\n   * @param pubKeys an array of public shares\n   * @returns a common public key\n   */\n  public static aggregatePubkeys(pubKeys: string[]): string {\n    try {\n      const publicShares = pubKeys.map((publicShare) => BigInt('0x' + publicShare));\n      const commonPubKey = BLS.mergePublicShares(publicShares);\n      return bigIntToHex(commonPubKey);\n    } catch (e) {\n      throw new Error('Error aggregating pubkeys: ' + e);\n    }\n  }\n\n  public static aggregateChaincodes(chaincodeContributions: string[]): string {\n    try {\n      const chaincodes = chaincodeContributions.map((chaincode) => BigInt('0x' + chaincode));\n      const commonChaincode = BLS.mergeChaincodes(chaincodes);\n      return bigIntToHex(commonChaincode, 64);\n    } catch (e) {\n      throw new Error('Error aggregating chaincodes: ' + e);\n    }\n  }\n\n  /**\n   * Aggregates the message signed by different key pairs into one sign\n   *\n   * @param signatures the message signed by different key pairs. The signer id is relevant to ensure a valid signature.\n   * @example <caption> E.g., the message is signed by user and wallet, then signatures would be:</caption>\n   * {\n   *   1: BigInt(messageSignedWithUserPrv),\n   *   3: BigInt(messageSignedWithWalletPrv),\n   * }\n   * @returns a signature combining all the provided signed messages\n   */\n  public static aggregateSignatures(signatures: { [n: number]: bigint }): string {\n    try {\n      const signature = BLS.mergeSignatures(signatures);\n      return '0x' + bigIntToHex(signature);\n    } catch (e) {\n      throw new Error('Error aggregating signatures: ' + e);\n    }\n  }\n\n  /**\n   * Verifies the signature for this key pair\n   * @param pub The public key with which to verify the signature\n   * @param msg The message to verify the signature with\n   * @param signature the signature to verify\n   * @return true if the signature is valid, else false\n   */\n  public static async verifySignature(pub: string, msg: Buffer, signature: string): Promise<boolean> {\n    assert(isValidBLSPublicKey(pub), `Invalid public key: ${pub}`);\n    return await BLS.verify(BigInt(signature), msg, BigInt('0x' + pub));\n  }\n}\n"]}
@@ -1,52 +0,0 @@
1
- import { SerializedKeyPair } from 'openpgp';
2
- import { IBaseCoin, IBlsKeyPair, KeychainsTriplet } from '../baseCoin';
3
- import { BitGoBase } from '../bitgoBase';
4
- import { Keychain } from '../keychain';
5
- import { IBlsUtils } from './iBlsUtils';
6
- import { MpcUtils } from './mpcUtils';
7
- /**
8
- * Utility functions for BLS-DKG work flows.
9
- */
10
- export declare class BlsUtils extends MpcUtils implements IBlsUtils {
11
- constructor(bitgo: BitGoBase, baseCoin: IBaseCoin);
12
- /**
13
- * Creates a Keychain containing the User's BLS-DKG signing materials.
14
- *
15
- * @param userGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between user and server
16
- * @param userKeyShare - user's BLS-DKG key share
17
- * @param backupKeyShare - backup's BLS-DKG key share
18
- * @param bitgoKeychain - previously created BitGo keychain; must be compatible with user and backup key shares
19
- * @param passphrase - wallet passphrase used to encrypt user's signing materials
20
- */
21
- createUserKeychain(userGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, bitgoKeychain: Keychain, passphrase: string, originalPasscodeEncryptionCode?: string): Promise<Keychain>;
22
- /**
23
- * Creates a Keychain containing the Backup party's BLS-DKG signing materials.
24
- *
25
- * @param backupGpgKey - ephemeral GPG key to encrypt / decrypt sensitive data exchanged between backup and server
26
- * @param userKeyShare - User's BLS-DKG Keyshare
27
- * @param backupKeyShare - Backup's BLS-DKG Keyshare
28
- * @param bitgoKeychain - previously created BitGo keychain; must be compatible with user and backup key shares
29
- * @param passphrase - wallet passphrase used to encrypt user's signing materials
30
- */
31
- createBackupKeychain(backupGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, bitgoKeychain: Keychain, passphrase: string): Promise<Keychain>;
32
- /**
33
- * Creates a Keychain containing BitGo's BLS-DKG signing materials.
34
- *
35
- * @param userGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between user and server
36
- * @param backupGpgKey - ephemeral GPG key to encrypt / decrypt sensitve data exchanged between backup and server
37
- * @param userKeyShare - user's BLS-DKG key share
38
- * @param backupKeyShare - backup's BLS-DKG key share
39
- */
40
- createBitgoKeychain(userGpgKey: SerializedKeyPair<string>, backupGpgKey: SerializedKeyPair<string>, userKeyShare: IBlsKeyPair, backupKeyShare: IBlsKeyPair, enterprise?: string): Promise<Keychain>;
41
- /**
42
- * Creates User, Backup, and BitGo BLS-DKG Keychains.
43
- *
44
- * @param params.passphrase - passphrase used to encrypt signing materials created for User and Backup
45
- */
46
- createKeychains(params: {
47
- passphrase: string;
48
- enterprise?: string;
49
- originalPasscodeEncryptionCode?: string;
50
- }): Promise<KeychainsTriplet>;
51
- }
52
- //# sourceMappingURL=blsUtils.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"blsUtils.d.ts","sourceRoot":"","sources":["../../../../src/bitgo/utils/blsUtils.ts"],"names":[],"mappings":"AAIA,OAAO,EAAe,iBAAiB,EAAE,MAAM,SAAS,CAAC;AAEzD,OAAO,EAAE,SAAS,EAAE,WAAW,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,cAAc,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,aAAa,CAAC;AAEvC,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AACxC,OAAO,EAAE,QAAQ,EAAE,MAAM,YAAY,CAAC;AAetC;;GAEG;AACH,qBAAa,QAAS,SAAQ,QAAS,YAAW,SAAS;gBAC7C,KAAK,EAAE,SAAS,EAAE,QAAQ,EAAE,SAAS;IAIjD;;;;;;;;OAQG;IACG,kBAAkB,CACtB,UAAU,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACrC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,aAAa,EAAE,QAAQ,EACvB,UAAU,EAAE,MAAM,EAClB,8BAA8B,CAAC,EAAE,MAAM,GACtC,OAAO,CAAC,QAAQ,CAAC;IAiEpB;;;;;;;;OAQG;IACG,oBAAoB,CACxB,YAAY,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACvC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,aAAa,EAAE,QAAQ,EACvB,UAAU,EAAE,MAAM,GACjB,OAAO,CAAC,QAAQ,CAAC;IAoEpB;;;;;;;OAOG;IACG,mBAAmB,CACvB,UAAU,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACrC,YAAY,EAAE,iBAAiB,CAAC,MAAM,CAAC,EACvC,YAAY,EAAE,WAAW,EACzB,cAAc,EAAE,WAAW,EAC3B,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,QAAQ,CAAC;IA6CpB;;;;OAIG;IACG,eAAe,CAAC,MAAM,EAAE;QAC5B,UAAU,EAAE,MAAM,CAAC;QACnB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,8BAA8B,CAAC,EAAE,MAAM,CAAC;KACzC,GAAG,OAAO,CAAC,gBAAgB,CAAC;CA0D9B"}