@bitgo-beta/sdk-lib-mpc 8.2.1-alpha.4 → 8.2.1-alpha.400

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (103) hide show
  1. package/dist/src/curves/constant.d.ts +2 -0
  2. package/dist/src/curves/constant.d.ts.map +1 -0
  3. package/dist/src/curves/constant.js +6 -0
  4. package/dist/src/curves/{baseCurve.d.ts → ed25519.d.ts} +9 -8
  5. package/dist/src/curves/ed25519.d.ts.map +1 -0
  6. package/dist/src/curves/ed25519.js +72 -0
  7. package/dist/src/curves/ed25519Bip32HdTree.d.ts +10 -0
  8. package/dist/src/curves/ed25519Bip32HdTree.d.ts.map +1 -0
  9. package/dist/src/curves/ed25519Bip32HdTree.js +85 -0
  10. package/dist/src/curves/index.d.ts +6 -1
  11. package/dist/src/curves/index.d.ts.map +1 -1
  12. package/dist/src/curves/index.js +12 -3
  13. package/dist/src/curves/secp256k1.d.ts +3 -2
  14. package/dist/src/curves/secp256k1.d.ts.map +1 -1
  15. package/dist/src/curves/secp256k1.js +29 -38
  16. package/dist/src/curves/secp256k1Bip32HdTree.d.ts +8 -0
  17. package/dist/src/curves/secp256k1Bip32HdTree.d.ts.map +1 -0
  18. package/dist/src/curves/secp256k1Bip32HdTree.js +54 -0
  19. package/dist/src/curves/types.d.ts +35 -0
  20. package/dist/src/curves/types.d.ts.map +1 -0
  21. package/dist/src/curves/types.js +3 -0
  22. package/dist/src/curves/util.d.ts +4 -0
  23. package/dist/src/curves/util.d.ts.map +1 -0
  24. package/dist/src/curves/util.js +42 -0
  25. package/dist/src/hashCommitment.d.ts +16 -0
  26. package/dist/src/hashCommitment.d.ts.map +1 -0
  27. package/dist/src/hashCommitment.js +44 -0
  28. package/dist/src/index.d.ts +6 -1
  29. package/dist/src/index.d.ts.map +1 -1
  30. package/dist/src/index.js +35 -3
  31. package/dist/src/openssl/index.js +6 -2
  32. package/dist/src/openssl/openssl.d.ts +1 -2
  33. package/dist/src/openssl/openssl.d.ts.map +1 -1
  34. package/dist/src/openssl/openssl.js +4 -12
  35. package/dist/src/safePrime.d.ts +3 -0
  36. package/dist/src/safePrime.d.ts.map +1 -0
  37. package/dist/src/safePrime.js +19 -0
  38. package/dist/src/schnorrProof.d.ts +21 -0
  39. package/dist/src/schnorrProof.d.ts.map +1 -0
  40. package/dist/src/schnorrProof.js +61 -0
  41. package/dist/src/shamir/index.d.ts +3 -0
  42. package/dist/src/shamir/index.d.ts.map +1 -0
  43. package/dist/src/shamir/index.js +19 -0
  44. package/dist/src/shamir/shamir.d.ts +38 -0
  45. package/dist/src/shamir/shamir.d.ts.map +1 -0
  46. package/dist/src/shamir/shamir.js +136 -0
  47. package/dist/src/shamir/types.d.ts +5 -0
  48. package/dist/src/shamir/types.d.ts.map +1 -0
  49. package/dist/src/shamir/types.js +3 -0
  50. package/dist/src/tss/ecdsa/index.d.ts +3 -0
  51. package/dist/src/tss/ecdsa/index.d.ts.map +1 -1
  52. package/dist/src/tss/ecdsa/index.js +27 -10
  53. package/dist/src/tss/ecdsa/paillierproof.d.ts +24 -0
  54. package/dist/src/tss/ecdsa/paillierproof.d.ts.map +1 -0
  55. package/dist/src/tss/ecdsa/paillierproof.js +86 -0
  56. package/dist/src/tss/ecdsa/primes.d.ts +2 -0
  57. package/dist/src/tss/ecdsa/primes.d.ts.map +1 -0
  58. package/dist/src/tss/ecdsa/primes.js +1846 -0
  59. package/dist/src/tss/ecdsa/rangeproof.d.ts +1 -2
  60. package/dist/src/tss/ecdsa/rangeproof.d.ts.map +1 -1
  61. package/dist/src/tss/ecdsa/rangeproof.js +124 -133
  62. package/dist/src/tss/ecdsa/types.d.ts +84 -15
  63. package/dist/src/tss/ecdsa/types.d.ts.map +1 -1
  64. package/dist/src/tss/ecdsa/types.js +89 -29
  65. package/dist/src/tss/ecdsa/zkVProof.d.ts +24 -0
  66. package/dist/src/tss/ecdsa/zkVProof.d.ts.map +1 -0
  67. package/dist/src/tss/ecdsa/zkVProof.js +70 -0
  68. package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts +42 -0
  69. package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts.map +1 -0
  70. package/dist/src/tss/ecdsa-dkls/commsLayer.js +235 -0
  71. package/dist/src/tss/ecdsa-dkls/dkg.d.ts +57 -0
  72. package/dist/src/tss/ecdsa-dkls/dkg.d.ts.map +1 -0
  73. package/dist/src/tss/ecdsa-dkls/dkg.js +321 -0
  74. package/dist/src/tss/ecdsa-dkls/dsg.d.ts +47 -0
  75. package/dist/src/tss/ecdsa-dkls/dsg.d.ts.map +1 -0
  76. package/dist/src/tss/ecdsa-dkls/dsg.js +266 -0
  77. package/dist/src/tss/ecdsa-dkls/index.d.ts +6 -0
  78. package/dist/src/tss/ecdsa-dkls/index.d.ts.map +1 -0
  79. package/dist/src/tss/ecdsa-dkls/index.js +42 -0
  80. package/dist/src/tss/ecdsa-dkls/types.d.ts +118 -0
  81. package/dist/src/tss/ecdsa-dkls/types.d.ts.map +1 -0
  82. package/dist/src/tss/ecdsa-dkls/types.js +165 -0
  83. package/dist/src/tss/ecdsa-dkls/util.d.ts +26 -0
  84. package/dist/src/tss/ecdsa-dkls/util.d.ts.map +1 -0
  85. package/dist/src/tss/ecdsa-dkls/util.js +276 -0
  86. package/dist/src/tss/index.d.ts +1 -0
  87. package/dist/src/tss/index.d.ts.map +1 -1
  88. package/dist/src/tss/index.js +7 -2
  89. package/dist/src/types.d.ts +13 -0
  90. package/dist/src/types.d.ts.map +1 -0
  91. package/dist/src/types.js +3 -0
  92. package/dist/src/util.d.ts +21 -7
  93. package/dist/src/util.d.ts.map +1 -1
  94. package/dist/src/util.js +70 -29
  95. package/dist/tsconfig.tsbuildinfo +1 -3621
  96. package/package.json +31 -8
  97. package/.eslintignore +0 -5
  98. package/CHANGELOG.md +0 -14
  99. package/dist/src/curves/baseCurve.d.ts.map +0 -1
  100. package/dist/src/curves/baseCurve.js +0 -6
  101. package/dist/src/openssl/opensslbytes.d.ts +0 -4
  102. package/dist/src/openssl/opensslbytes.d.ts.map +0 -1
  103. package/dist/src/openssl/opensslbytes.js +0 -20
@@ -0,0 +1,42 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.pathToIndices = pathToIndices;
4
+ exports.auditEddsaPrivateKey = auditEddsaPrivateKey;
5
+ exports.auditEcdsaPrivateKey = auditEcdsaPrivateKey;
6
+ function pathToIndices(path) {
7
+ return path
8
+ .replace(/^m?\//, '')
9
+ .split('/')
10
+ .map((index) => parseInt(index, 10));
11
+ }
12
+ function auditEddsaPrivateKey(privateKey, commonKeychain) {
13
+ // For TSS validation, we would need GPG private key for full implementation
14
+ // This is a simplified validation of key format
15
+ if (commonKeychain.length !== 128) {
16
+ throw new Error('Invalid common keychain');
17
+ }
18
+ const parsedKey = JSON.parse(privateKey);
19
+ if ('uShare' in parsedKey) {
20
+ // If the key is in JSON format, we need to check the private key length
21
+ const privateKeyLength = parsedKey.uShare.seed.length + parsedKey.uShare.chaincode.length;
22
+ if (privateKeyLength !== 128) {
23
+ throw new Error('Invalid private key');
24
+ }
25
+ }
26
+ else {
27
+ // If the key is not in JSON format, we need to check the length directly
28
+ if (privateKey.length !== 128) {
29
+ throw new Error('Invalid private key');
30
+ }
31
+ }
32
+ }
33
+ function auditEcdsaPrivateKey(privateKey, commonKeychain) {
34
+ if (commonKeychain.length !== 130 && commonKeychain.length !== 0) {
35
+ throw new Error('Invalid common keychain');
36
+ }
37
+ // DKLs key chains do not have a fixed length but we know for sure they are greater than 192 in length
38
+ if (privateKey.length !== 128 && privateKey.length !== 192 && privateKey.length <= 192) {
39
+ throw new Error('Invalid private key');
40
+ }
41
+ }
42
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXRpbC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9jdXJ2ZXMvdXRpbC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLHNDQUtDO0FBRUQsb0RBb0JDO0FBRUQsb0RBU0M7QUF0Q0QsU0FBZ0IsYUFBYSxDQUFDLElBQVk7SUFDeEMsT0FBTyxJQUFJO1NBQ1IsT0FBTyxDQUFDLE9BQU8sRUFBRSxFQUFFLENBQUM7U0FDcEIsS0FBSyxDQUFDLEdBQUcsQ0FBQztTQUNWLEdBQUcsQ0FBQyxDQUFDLEtBQUssRUFBRSxFQUFFLENBQUMsUUFBUSxDQUFDLEtBQUssRUFBRSxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBQ3pDLENBQUM7QUFFRCxTQUFnQixvQkFBb0IsQ0FBQyxVQUFrQixFQUFFLGNBQXNCO0lBQzdFLDRFQUE0RTtJQUM1RSxnREFBZ0Q7SUFDaEQsSUFBSSxjQUFjLENBQUMsTUFBTSxLQUFLLEdBQUcsRUFBRSxDQUFDO1FBQ2xDLE1BQU0sSUFBSSxLQUFLLENBQUMseUJBQXlCLENBQUMsQ0FBQztJQUM3QyxDQUFDO0lBRUQsTUFBTSxTQUFTLEdBQUcsSUFBSSxDQUFDLEtBQUssQ0FBQyxVQUFVLENBQUMsQ0FBQztJQUN6QyxJQUFJLFFBQVEsSUFBSSxTQUFTLEVBQUUsQ0FBQztRQUMxQix3RUFBd0U7UUFDeEUsTUFBTSxnQkFBZ0IsR0FBRyxTQUFTLENBQUMsTUFBTSxDQUFDLElBQUksQ0FBQyxNQUFNLEdBQUcsU0FBUyxDQUFDLE1BQU0sQ0FBQyxTQUFTLENBQUMsTUFBTSxDQUFDO1FBQzFGLElBQUksZ0JBQWdCLEtBQUssR0FBRyxFQUFFLENBQUM7WUFDN0IsTUFBTSxJQUFJLEtBQUssQ0FBQyxxQkFBcUIsQ0FBQyxDQUFDO1FBQ3pDLENBQUM7SUFDSCxDQUFDO1NBQU0sQ0FBQztRQUNOLHlFQUF5RTtRQUN6RSxJQUFJLFVBQVUsQ0FBQyxNQUFNLEtBQUssR0FBRyxFQUFFLENBQUM7WUFDOUIsTUFBTSxJQUFJLEtBQUssQ0FBQyxxQkFBcUIsQ0FBQyxDQUFDO1FBQ3pDLENBQUM7SUFDSCxDQUFDO0FBQ0gsQ0FBQztBQUVELFNBQWdCLG9CQUFvQixDQUFDLFVBQWtCLEVBQUUsY0FBc0I7SUFDN0UsSUFBSSxjQUFjLENBQUMsTUFBTSxLQUFLLEdBQUcsSUFBSSxjQUFjLENBQUMsTUFBTSxLQUFLLENBQUMsRUFBRSxDQUFDO1FBQ2pFLE1BQU0sSUFBSSxLQUFLLENBQUMseUJBQXlCLENBQUMsQ0FBQztJQUM3QyxDQUFDO0lBRUQsc0dBQXNHO0lBQ3RHLElBQUksVUFBVSxDQUFDLE1BQU0sS0FBSyxHQUFHLElBQUksVUFBVSxDQUFDLE1BQU0sS0FBSyxHQUFHLElBQUksVUFBVSxDQUFDLE1BQU0sSUFBSSxHQUFHLEVBQUUsQ0FBQztRQUN2RixNQUFNLElBQUksS0FBSyxDQUFDLHFCQUFxQixDQUFDLENBQUM7SUFDekMsQ0FBQztBQUNILENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgZnVuY3Rpb24gcGF0aFRvSW5kaWNlcyhwYXRoOiBzdHJpbmcpOiBudW1iZXJbXSB7XG4gIHJldHVybiBwYXRoXG4gICAgLnJlcGxhY2UoL15tP1xcLy8sICcnKVxuICAgIC5zcGxpdCgnLycpXG4gICAgLm1hcCgoaW5kZXgpID0+IHBhcnNlSW50KGluZGV4LCAxMCkpO1xufVxuXG5leHBvcnQgZnVuY3Rpb24gYXVkaXRFZGRzYVByaXZhdGVLZXkocHJpdmF0ZUtleTogc3RyaW5nLCBjb21tb25LZXljaGFpbjogc3RyaW5nKTogdm9pZCB7XG4gIC8vIEZvciBUU1MgdmFsaWRhdGlvbiwgd2Ugd291bGQgbmVlZCBHUEcgcHJpdmF0ZSBrZXkgZm9yIGZ1bGwgaW1wbGVtZW50YXRpb25cbiAgLy8gVGhpcyBpcyBhIHNpbXBsaWZpZWQgdmFsaWRhdGlvbiBvZiBrZXkgZm9ybWF0XG4gIGlmIChjb21tb25LZXljaGFpbi5sZW5ndGggIT09IDEyOCkge1xuICAgIHRocm93IG5ldyBFcnJvcignSW52YWxpZCBjb21tb24ga2V5Y2hhaW4nKTtcbiAgfVxuXG4gIGNvbnN0IHBhcnNlZEtleSA9IEpTT04ucGFyc2UocHJpdmF0ZUtleSk7XG4gIGlmICgndVNoYXJlJyBpbiBwYXJzZWRLZXkpIHtcbiAgICAvLyBJZiB0aGUga2V5IGlzIGluIEpTT04gZm9ybWF0LCB3ZSBuZWVkIHRvIGNoZWNrIHRoZSBwcml2YXRlIGtleSBsZW5ndGhcbiAgICBjb25zdCBwcml2YXRlS2V5TGVuZ3RoID0gcGFyc2VkS2V5LnVTaGFyZS5zZWVkLmxlbmd0aCArIHBhcnNlZEtleS51U2hhcmUuY2hhaW5jb2RlLmxlbmd0aDtcbiAgICBpZiAocHJpdmF0ZUtleUxlbmd0aCAhPT0gMTI4KSB7XG4gICAgICB0aHJvdyBuZXcgRXJyb3IoJ0ludmFsaWQgcHJpdmF0ZSBrZXknKTtcbiAgICB9XG4gIH0gZWxzZSB7XG4gICAgLy8gSWYgdGhlIGtleSBpcyBub3QgaW4gSlNPTiBmb3JtYXQsIHdlIG5lZWQgdG8gY2hlY2sgdGhlIGxlbmd0aCBkaXJlY3RseVxuICAgIGlmIChwcml2YXRlS2V5Lmxlbmd0aCAhPT0gMTI4KSB7XG4gICAgICB0aHJvdyBuZXcgRXJyb3IoJ0ludmFsaWQgcHJpdmF0ZSBrZXknKTtcbiAgICB9XG4gIH1cbn1cblxuZXhwb3J0IGZ1bmN0aW9uIGF1ZGl0RWNkc2FQcml2YXRlS2V5KHByaXZhdGVLZXk6IHN0cmluZywgY29tbW9uS2V5Y2hhaW46IHN0cmluZyk6IHZvaWQge1xuICBpZiAoY29tbW9uS2V5Y2hhaW4ubGVuZ3RoICE9PSAxMzAgJiYgY29tbW9uS2V5Y2hhaW4ubGVuZ3RoICE9PSAwKSB7XG4gICAgdGhyb3cgbmV3IEVycm9yKCdJbnZhbGlkIGNvbW1vbiBrZXljaGFpbicpO1xuICB9XG5cbiAgLy8gREtMcyBrZXkgY2hhaW5zIGRvIG5vdCBoYXZlIGEgZml4ZWQgbGVuZ3RoIGJ1dCB3ZSBrbm93IGZvciBzdXJlIHRoZXkgYXJlIGdyZWF0ZXIgdGhhbiAxOTIgaW4gbGVuZ3RoXG4gIGlmIChwcml2YXRlS2V5Lmxlbmd0aCAhPT0gMTI4ICYmIHByaXZhdGVLZXkubGVuZ3RoICE9PSAxOTIgJiYgcHJpdmF0ZUtleS5sZW5ndGggPD0gMTkyKSB7XG4gICAgdGhyb3cgbmV3IEVycm9yKCdJbnZhbGlkIHByaXZhdGUga2V5Jyk7XG4gIH1cbn1cbiJdfQ==
@@ -0,0 +1,16 @@
1
+ import { HashCommitDecommit, HashDecommitment } from './types';
2
+ /**
3
+ * Create hash commitment and decommietment of a secret value.
4
+ * @param secret The secret value/message.
5
+ * @param r The randomness/nonce to be added to the commmitment.
6
+ * @returns The created commitment and decommitment.
7
+ */
8
+ export declare function createCommitment(secret: Buffer, r?: Buffer): HashCommitDecommit;
9
+ /**
10
+ * Verify hash commitment and decommietment of a secret value.
11
+ * @param commitment The commitment.
12
+ * @param decommietment The decommitment.
13
+ * @returns True if verification succeeds.
14
+ */
15
+ export declare function verifyCommitment(commitment: Buffer, decommietment: HashDecommitment): boolean;
16
+ //# sourceMappingURL=hashCommitment.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"hashCommitment.d.ts","sourceRoot":"","sources":["../../src/hashCommitment.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,SAAS,CAAC;AAK/D;;;;;GAKG;AACH,wBAAgB,gBAAgB,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,GAAE,MAAyC,GAAG,kBAAkB,CAWjH;AAaD;;;;;GAKG;AACH,wBAAgB,gBAAgB,CAAC,UAAU,EAAE,MAAM,EAAE,aAAa,EAAE,gBAAgB,GAAG,OAAO,CAE7F"}
@@ -0,0 +1,44 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createCommitment = createCommitment;
4
+ exports.verifyCommitment = verifyCommitment;
5
+ const crypto_1 = require("crypto");
6
+ const util_1 = require("./util");
7
+ const minRandomnessLength = 32;
8
+ /**
9
+ * Create hash commitment and decommietment of a secret value.
10
+ * @param secret The secret value/message.
11
+ * @param r The randomness/nonce to be added to the commmitment.
12
+ * @returns The created commitment and decommitment.
13
+ */
14
+ function createCommitment(secret, r = (0, crypto_1.randomBytes)(minRandomnessLength)) {
15
+ if (r.length < minRandomnessLength) {
16
+ throw new Error(`randomness must be at least ${minRandomnessLength} bytes long`);
17
+ }
18
+ return {
19
+ commitment: hash(secret, r),
20
+ decommitment: {
21
+ blindingFactor: r,
22
+ secret: secret,
23
+ },
24
+ };
25
+ }
26
+ const bytesPerUint32 = 4;
27
+ function hash(secret, r) {
28
+ return (0, crypto_1.createHash)('sha256')
29
+ .update((0, util_1.bigIntToBufferBE)(BigInt(secret.length), bytesPerUint32))
30
+ .update(secret)
31
+ .update((0, util_1.bigIntToBufferBE)(BigInt(r.length), bytesPerUint32))
32
+ .update(r)
33
+ .digest();
34
+ }
35
+ /**
36
+ * Verify hash commitment and decommietment of a secret value.
37
+ * @param commitment The commitment.
38
+ * @param decommietment The decommitment.
39
+ * @returns True if verification succeeds.
40
+ */
41
+ function verifyCommitment(commitment, decommietment) {
42
+ return hash(decommietment.secret, decommietment.blindingFactor).compare(commitment) === 0;
43
+ }
44
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,4 +1,9 @@
1
- export * from './tss';
2
1
  export * from './curves';
2
+ export * from './safePrime';
3
+ export * from './shamir';
4
+ export * from './tss';
5
+ export * as HashCommitment from './hashCommitment';
6
+ export * as Schnorr from './schnorrProof';
7
+ export * from './types';
3
8
  export * from './util';
4
9
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAC;AACtB,cAAc,UAAU,CAAC;AACzB,cAAc,QAAQ,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,UAAU,CAAC;AACzB,cAAc,aAAa,CAAC;AAC5B,cAAc,UAAU,CAAC;AACzB,cAAc,OAAO,CAAC;AAEtB,OAAO,KAAK,cAAc,MAAM,kBAAkB,CAAC;AACnD,OAAO,KAAK,OAAO,MAAM,gBAAgB,CAAC;AAC1C,cAAc,SAAS,CAAC;AACxB,cAAc,QAAQ,CAAC"}
package/dist/src/index.js CHANGED
@@ -1,16 +1,48 @@
1
1
  "use strict";
2
2
  var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
3
  if (k2 === undefined) k2 = k;
4
- Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
5
9
  }) : (function(o, m, k, k2) {
6
10
  if (k2 === undefined) k2 = k;
7
11
  o[k2] = m[k];
8
12
  }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
9
18
  var __exportStar = (this && this.__exportStar) || function(m, exports) {
10
19
  for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
11
20
  };
21
+ var __importStar = (this && this.__importStar) || (function () {
22
+ var ownKeys = function(o) {
23
+ ownKeys = Object.getOwnPropertyNames || function (o) {
24
+ var ar = [];
25
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
26
+ return ar;
27
+ };
28
+ return ownKeys(o);
29
+ };
30
+ return function (mod) {
31
+ if (mod && mod.__esModule) return mod;
32
+ var result = {};
33
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
34
+ __setModuleDefault(result, mod);
35
+ return result;
36
+ };
37
+ })();
12
38
  Object.defineProperty(exports, "__esModule", { value: true });
13
- __exportStar(require("./tss"), exports);
39
+ exports.Schnorr = exports.HashCommitment = void 0;
14
40
  __exportStar(require("./curves"), exports);
41
+ __exportStar(require("./safePrime"), exports);
42
+ __exportStar(require("./shamir"), exports);
43
+ __exportStar(require("./tss"), exports);
44
+ exports.HashCommitment = __importStar(require("./hashCommitment"));
45
+ exports.Schnorr = __importStar(require("./schnorrProof"));
46
+ __exportStar(require("./types"), exports);
15
47
  __exportStar(require("./util"), exports);
16
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7O0FBQUEsd0NBQXNCO0FBQ3RCLDJDQUF5QjtBQUN6Qix5Q0FBdUIiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgKiBmcm9tICcuL3Rzcyc7XG5leHBvcnQgKiBmcm9tICcuL2N1cnZlcyc7XG5leHBvcnQgKiBmcm9tICcuL3V0aWwnO1xuIl19
48
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,7 +1,11 @@
1
1
  "use strict";
2
2
  var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
3
  if (k2 === undefined) k2 = k;
4
- Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
5
9
  }) : (function(o, m, k, k2) {
6
10
  if (k2 === undefined) k2 = k;
7
11
  o[k2] = m[k];
@@ -11,4 +15,4 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
11
15
  };
12
16
  Object.defineProperty(exports, "__esModule", { value: true });
13
17
  __exportStar(require("./openssl"), exports);
14
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvb3BlbnNzbC9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7QUFBQSw0Q0FBMEIiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgKiBmcm9tICcuL29wZW5zc2wnO1xuIl19
18
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvb3BlbnNzbC9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsNENBQTBCIiwic291cmNlc0NvbnRlbnQiOlsiZXhwb3J0ICogZnJvbSAnLi9vcGVuc3NsJztcbiJdfQ==
@@ -1,9 +1,8 @@
1
1
  export declare class OpenSSL {
2
2
  private waModule;
3
3
  private isInitialized;
4
- init(): Promise<void>;
4
+ init(openSSLBytes: Uint8Array): Promise<void>;
5
5
  generateSafePrime(bitLength: number): Promise<bigint>;
6
6
  private runCommand;
7
- private getWasmBytes;
8
7
  }
9
8
  //# sourceMappingURL=openssl.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"openssl.d.ts","sourceRoot":"","sources":["../../../src/openssl/openssl.ts"],"names":[],"mappings":"AAGA,qBAAa,OAAO;IAClB,OAAO,CAAC,QAAQ,CAAqB;IACrC,OAAO,CAAC,aAAa,CAAS;IAExB,IAAI,IAAI,OAAO,CAAC,IAAI,CAAC;IAMrB,iBAAiB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;YAI7C,UAAU;YAmBV,YAAY;CAO3B"}
1
+ {"version":3,"file":"openssl.d.ts","sourceRoot":"","sources":["../../../src/openssl/openssl.ts"],"names":[],"mappings":"AACA,qBAAa,OAAO;IAClB,OAAO,CAAC,QAAQ,CAAqB;IACrC,OAAO,CAAC,aAAa,CAAS;IAExB,IAAI,CAAC,YAAY,EAAE,UAAU,GAAG,OAAO,CAAC,IAAI,CAAC;IAM7C,iBAAiB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;YAI7C,UAAU;CAkBzB"}
@@ -2,14 +2,13 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.OpenSSL = void 0;
4
4
  const wasi_1 = require("@wasmer/wasi");
5
- const opensslbytes_1 = require("./opensslbytes");
6
5
  class OpenSSL {
7
6
  constructor() {
8
7
  this.isInitialized = false;
9
8
  }
10
- async init() {
11
- await wasi_1.init();
12
- this.waModule = await WebAssembly.compile(await this.getWasmBytes());
9
+ async init(openSSLBytes) {
10
+ await (0, wasi_1.init)();
11
+ this.waModule = await WebAssembly.compile(openSSLBytes);
13
12
  this.isInitialized = true;
14
13
  }
15
14
  async generateSafePrime(bitLength) {
@@ -33,13 +32,6 @@ class OpenSSL {
33
32
  wasi.start(instance);
34
33
  return wasi.getStdoutString();
35
34
  }
36
- async getWasmBytes() {
37
- const waBuffer = opensslbytes_1.loadWebAssembly();
38
- if (!waBuffer) {
39
- throw new Error('Cannot load openssl web-assembly!');
40
- }
41
- return waBuffer.buffer;
42
- }
43
35
  }
44
36
  exports.OpenSSL = OpenSSL;
45
- //# sourceMappingURL=data:application/json;base64,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
37
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,3 @@
1
+ export declare function generateSafePrime(bitlength: number, openSSLBytes: Uint8Array): Promise<bigint>;
2
+ export declare function generateSafePrimes(bitLengths: number[], openSSLBytes: Uint8Array): Promise<bigint[]>;
3
+ //# sourceMappingURL=safePrime.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"safePrime.d.ts","sourceRoot":"","sources":["../../src/safePrime.ts"],"names":[],"mappings":"AAEA,wBAAsB,iBAAiB,CAAC,SAAS,EAAE,MAAM,EAAE,YAAY,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAIpG;AAED,wBAAsB,kBAAkB,CAAC,UAAU,EAAE,MAAM,EAAE,EAAE,YAAY,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,EAAE,CAAC,CAO1G"}
@@ -0,0 +1,19 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.generateSafePrime = generateSafePrime;
4
+ exports.generateSafePrimes = generateSafePrimes;
5
+ const openssl_1 = require("./openssl");
6
+ async function generateSafePrime(bitlength, openSSLBytes) {
7
+ const openSSL = new openssl_1.OpenSSL();
8
+ await openSSL.init(openSSLBytes);
9
+ return openSSL.generateSafePrime(bitlength);
10
+ }
11
+ async function generateSafePrimes(bitLengths, openSSLBytes) {
12
+ const openSSL = new openssl_1.OpenSSL();
13
+ await openSSL.init(openSSLBytes);
14
+ const promises = bitLengths.map((bitlength) => {
15
+ return openSSL.generateSafePrime(bitlength);
16
+ });
17
+ return await Promise.all(promises);
18
+ }
19
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,21 @@
1
+ import { BaseCurve as Curve } from './curves';
2
+ import { SchnorrProof } from './types';
3
+ /**
4
+ * Create a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
5
+ * @param A The curve point.
6
+ * @param a The discrete log of the curve point.
7
+ * @param curve The elliptic curve.
8
+ * @param additionalCtx Additional contextual information to associate with the proof.
9
+ * @returns The created proof.
10
+ */
11
+ export declare function createSchnorrProof(A: bigint, a: bigint, curve: Curve, additionalCtx?: Buffer): SchnorrProof;
12
+ /**
13
+ * Verify a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
14
+ * @param A The curve point.
15
+ * @param proof The schnorr proof.
16
+ * @param curve The elliptic curve.
17
+ * @param additionalCtx Additional contextual information that is supposed to associate with the proof.
18
+ * @returns True if the proof checks out.
19
+ */
20
+ export declare function verifySchnorrProof(A: bigint, proof: SchnorrProof, curve: Curve, additionalCtx?: Buffer): boolean;
21
+ //# sourceMappingURL=schnorrProof.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"schnorrProof.d.ts","sourceRoot":"","sources":["../../src/schnorrProof.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,SAAS,IAAI,KAAK,EAAE,MAAM,UAAU,CAAC;AAC9C,OAAO,EAAE,YAAY,EAAE,MAAM,SAAS,CAAC;AAGvC;;;;;;;GAOG;AACH,wBAAgB,kBAAkB,CAChC,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,KAAK,EAAE,KAAK,EACZ,aAAa,GAAE,MAAwB,GACtC,YAAY,CAYd;AAuBD;;;;;;;GAOG;AACH,wBAAgB,kBAAkB,CAChC,CAAC,EAAE,MAAM,EACT,KAAK,EAAE,YAAY,EACnB,KAAK,EAAE,KAAK,EACZ,aAAa,GAAE,MAAwB,GACtC,OAAO,CAQT"}
@@ -0,0 +1,61 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createSchnorrProof = createSchnorrProof;
4
+ exports.verifySchnorrProof = verifySchnorrProof;
5
+ /**
6
+ * Implementation of Schnorr Non-interactive Zero-Knowledge Proof.
7
+ * @see {@link https://datatracker.ietf.org/doc/rfc8235/}
8
+ */
9
+ const crypto_1 = require("crypto");
10
+ const util_1 = require("./util");
11
+ /**
12
+ * Create a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
13
+ * @param A The curve point.
14
+ * @param a The discrete log of the curve point.
15
+ * @param curve The elliptic curve.
16
+ * @param additionalCtx Additional contextual information to associate with the proof.
17
+ * @returns The created proof.
18
+ */
19
+ function createSchnorrProof(A, a, curve, additionalCtx = Buffer.from('')) {
20
+ const v = curve.scalarRandom();
21
+ const V = curve.basePointMult(v);
22
+ const c = nonInteractiveChallenge(V, A, curve, additionalCtx);
23
+ const r = curve.scalarSub(v, curve.scalarMult(a, c));
24
+ return {
25
+ vPoint: V,
26
+ r: r,
27
+ };
28
+ }
29
+ /**
30
+ * Calculate challenge for NIZK schnorr proof using Fiat-Shamir transform.
31
+ *
32
+ * @param V The point/public value corresponding to the random scalar value v chosen by the prover.
33
+ * @param A The point to be proved.
34
+ * @param curve The elliptic curve.
35
+ * @param additionalCtx Additional contextual information to associate with the proof.
36
+ * @returns The calculated challenge.
37
+ */
38
+ function nonInteractiveChallenge(V, A, curve, additionalCtx) {
39
+ const G = curve.basePointMult(BigInt(1));
40
+ const hash = (0, crypto_1.createHash)('sha256');
41
+ hash.update((0, util_1.bigIntToBufferBE)(G, 32));
42
+ hash.update((0, util_1.bigIntToBufferBE)(V, 32));
43
+ hash.update((0, util_1.bigIntToBufferBE)(A, 32));
44
+ hash.update(additionalCtx);
45
+ return (0, util_1.bigIntFromBufferBE)(hash.digest());
46
+ }
47
+ /**
48
+ * Verify a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
49
+ * @param A The curve point.
50
+ * @param proof The schnorr proof.
51
+ * @param curve The elliptic curve.
52
+ * @param additionalCtx Additional contextual information that is supposed to associate with the proof.
53
+ * @returns True if the proof checks out.
54
+ */
55
+ function verifySchnorrProof(A, proof, curve, additionalCtx = Buffer.from('')) {
56
+ const c = nonInteractiveChallenge(proof.vPoint, A, curve, additionalCtx);
57
+ const rG = curve.basePointMult(proof.r);
58
+ const cA = curve.pointMultiply(A, curve.scalarReduce(c));
59
+ return proof.vPoint === curve.pointAdd(rG, cA);
60
+ }
61
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,3 @@
1
+ export * from './types';
2
+ export * from './shamir';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/shamir/index.ts"],"names":[],"mappings":"AAAA,cAAc,SAAS,CAAC;AACxB,cAAc,UAAU,CAAC"}
@@ -0,0 +1,19 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./types"), exports);
18
+ __exportStar(require("./shamir"), exports);
19
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvc2hhbWlyL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSwwQ0FBd0I7QUFDeEIsMkNBQXlCIiwic291cmNlc0NvbnRlbnQiOlsiZXhwb3J0ICogZnJvbSAnLi90eXBlcyc7XG5leHBvcnQgKiBmcm9tICcuL3NoYW1pcic7XG4iXX0=
@@ -0,0 +1,38 @@
1
+ import { BaseCurve } from '../curves';
2
+ import { SplitSecret } from './types';
3
+ export declare class Shamir {
4
+ curve: BaseCurve;
5
+ constructor(curve: BaseCurve);
6
+ /**
7
+ * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
8
+ * ways. The split secret requires `threshold` shares to be reconstructed.
9
+ *
10
+ * @param secret secret to split
11
+ * @param threshold share threshold required to reconstruct secret
12
+ * @param numShares total number of shares to split secret into
13
+ * @param indices optional indices which can be used while generating the shares
14
+ * @param salt optional salt which could be used while generating the shares
15
+ * @returns Dictionary containing `shares`, a dictionary where each key is an int
16
+ * in the range 1<=x<=numShares representing that share's free term, and `v`, an
17
+ * array of proofs to be shared with all participants.
18
+ */
19
+ split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt?: bigint): SplitSecret;
20
+ /**
21
+ * Verify a VSS share.
22
+ *
23
+ * @param u Secret share received from other party.
24
+ * @param v Verification values received from other party.
25
+ * @param index Verifier's index.
26
+ * @returns True on success; otherwise throws Error.
27
+ */
28
+ verify(u: bigint, v: Array<bigint>, index: number): boolean;
29
+ /**
30
+ * Reconstitute a secret from a dictionary of shares. The number of shares must
31
+ * be equal to `t` to reconstitute the original secret.
32
+ *
33
+ * @param shares dictionary of shares. each key is the free term of the share
34
+ * @returns secret
35
+ */
36
+ combine(shares: Record<number, bigint>): bigint;
37
+ }
38
+ //# sourceMappingURL=shamir.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../src/shamir/shamir.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AACtC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAGtC,qBAAa,MAAM;IACjB,KAAK,EAAE,SAAS,CAAC;gBAEL,KAAK,EAAE,SAAS;IAI5B;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,IAAI,SAAY,GAAG,WAAW;IA8CnH;;;;;;;OAOG;IACH,MAAM,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO;IAsB3D;;;;;;OAMG;IACH,OAAO,CAAC,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,GAAG,MAAM;CA+BhD"}