@bitgo-beta/sdk-lib-mpc 8.2.1-alpha.45 → 8.2.1-alpha.451
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/src/curves/ed25519.d.ts +0 -1
- package/dist/src/curves/ed25519.d.ts.map +1 -1
- package/dist/src/curves/ed25519.js +12 -12
- package/dist/src/curves/ed25519Bip32HdTree.js +14 -14
- package/dist/src/curves/index.js +6 -2
- package/dist/src/curves/secp256k1.d.ts +0 -1
- package/dist/src/curves/secp256k1.d.ts.map +1 -1
- package/dist/src/curves/secp256k1.js +22 -38
- package/dist/src/curves/secp256k1Bip32HdTree.js +10 -10
- package/dist/src/curves/types.d.ts +2 -3
- package/dist/src/curves/types.d.ts.map +1 -1
- package/dist/src/curves/util.d.ts +2 -0
- package/dist/src/curves/util.d.ts.map +1 -1
- package/dist/src/curves/util.js +34 -3
- package/dist/src/hashCommitment.d.ts +0 -1
- package/dist/src/hashCommitment.d.ts.map +1 -1
- package/dist/src/hashCommitment.js +7 -8
- package/dist/src/index.d.ts +1 -1
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +24 -10
- package/dist/src/openssl/index.js +6 -2
- package/dist/src/openssl/openssl.d.ts +1 -2
- package/dist/src/openssl/openssl.d.ts.map +1 -1
- package/dist/src/openssl/openssl.js +4 -12
- package/dist/src/safePrime.d.ts +3 -0
- package/dist/src/safePrime.d.ts.map +1 -0
- package/dist/src/safePrime.js +19 -0
- package/dist/src/schnorrProof.d.ts +0 -1
- package/dist/src/schnorrProof.d.ts.map +1 -1
- package/dist/src/schnorrProof.js +8 -9
- package/dist/src/shamir/index.js +6 -2
- package/dist/src/shamir/shamir.js +2 -2
- package/dist/src/shamir/types.d.ts +1 -1
- package/dist/src/shamir/types.d.ts.map +1 -1
- package/dist/src/tss/ecdsa/index.js +23 -9
- package/dist/src/tss/ecdsa/paillierproof.js +10 -10
- package/dist/src/tss/ecdsa/rangeproof.d.ts +1 -2
- package/dist/src/tss/ecdsa/rangeproof.d.ts.map +1 -1
- package/dist/src/tss/ecdsa/rangeproof.js +108 -118
- package/dist/src/tss/ecdsa/types.d.ts +28 -17
- package/dist/src/tss/ecdsa/types.d.ts.map +1 -1
- package/dist/src/tss/ecdsa/types.js +29 -31
- package/dist/src/tss/ecdsa/zkVProof.d.ts +0 -1
- package/dist/src/tss/ecdsa/zkVProof.d.ts.map +1 -1
- package/dist/src/tss/ecdsa/zkVProof.js +9 -10
- package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts +69 -0
- package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/commsLayer.js +268 -0
- package/dist/src/tss/ecdsa-dkls/dkg.d.ts +62 -0
- package/dist/src/tss/ecdsa-dkls/dkg.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/dkg.js +334 -0
- package/dist/src/tss/ecdsa-dkls/dsg.d.ts +47 -0
- package/dist/src/tss/ecdsa-dkls/dsg.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/dsg.js +271 -0
- package/dist/src/tss/ecdsa-dkls/index.d.ts +6 -0
- package/dist/src/tss/ecdsa-dkls/index.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/index.js +42 -0
- package/dist/src/tss/ecdsa-dkls/types.d.ts +128 -0
- package/dist/src/tss/ecdsa-dkls/types.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/types.js +175 -0
- package/dist/src/tss/ecdsa-dkls/util.d.ts +26 -0
- package/dist/src/tss/ecdsa-dkls/util.d.ts.map +1 -0
- package/dist/src/tss/ecdsa-dkls/util.js +276 -0
- package/dist/src/tss/eddsa-mps/commsLayer.d.ts +30 -0
- package/dist/src/tss/eddsa-mps/commsLayer.d.ts.map +1 -0
- package/dist/src/tss/eddsa-mps/commsLayer.js +96 -0
- package/dist/src/tss/eddsa-mps/dkg.d.ts +98 -0
- package/dist/src/tss/eddsa-mps/dkg.d.ts.map +1 -0
- package/dist/src/tss/eddsa-mps/dkg.js +228 -0
- package/dist/src/tss/eddsa-mps/index.d.ts +5 -0
- package/dist/src/tss/eddsa-mps/index.d.ts.map +1 -0
- package/dist/src/tss/eddsa-mps/index.js +41 -0
- package/dist/src/tss/eddsa-mps/types.d.ts +44 -0
- package/dist/src/tss/eddsa-mps/types.d.ts.map +1 -0
- package/dist/src/tss/eddsa-mps/types.js +85 -0
- package/dist/src/tss/eddsa-mps/util.d.ts +7 -0
- package/dist/src/tss/eddsa-mps/util.d.ts.map +1 -0
- package/dist/src/tss/eddsa-mps/util.js +13 -0
- package/dist/src/tss/index.d.ts +2 -0
- package/dist/src/tss/index.d.ts.map +1 -1
- package/dist/src/tss/index.js +8 -2
- package/dist/src/types.d.ts +0 -1
- package/dist/src/types.d.ts.map +1 -1
- package/dist/src/util.d.ts +0 -1
- package/dist/src/util.d.ts.map +1 -1
- package/dist/src/util.js +21 -22
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +28 -5
- package/.eslintignore +0 -5
- package/CHANGELOG.md +0 -180
- package/dist/src/openssl/opensslbytes.d.ts +0 -4
- package/dist/src/openssl/opensslbytes.d.ts.map +0 -1
- package/dist/src/openssl/opensslbytes.js +0 -20
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
+
var ownKeys = function(o) {
|
|
20
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
+
var ar = [];
|
|
22
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
+
return ar;
|
|
24
|
+
};
|
|
25
|
+
return ownKeys(o);
|
|
26
|
+
};
|
|
27
|
+
return function (mod) {
|
|
28
|
+
if (mod && mod.__esModule) return mod;
|
|
29
|
+
var result = {};
|
|
30
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
+
__setModuleDefault(result, mod);
|
|
32
|
+
return result;
|
|
33
|
+
};
|
|
34
|
+
})();
|
|
35
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
+
exports.detachSignMpsMessage = detachSignMpsMessage;
|
|
37
|
+
exports.verifyMpsMessage = verifyMpsMessage;
|
|
38
|
+
exports.extractEd25519PublicKey = extractEd25519PublicKey;
|
|
39
|
+
exports.extractEd25519KeyPair = extractEd25519KeyPair;
|
|
40
|
+
const pgp = __importStar(require("openpgp"));
|
|
41
|
+
/**
|
|
42
|
+
* PGP detached-signs raw WASM bytes with the given private key.
|
|
43
|
+
* Returns an MPSSignedMessage with the base64-encoded payload and armored signature.
|
|
44
|
+
*/
|
|
45
|
+
async function detachSignMpsMessage(rawBytes, signingKey) {
|
|
46
|
+
const signature = await pgp.sign({
|
|
47
|
+
message: await pgp.createMessage({ binary: rawBytes }),
|
|
48
|
+
signingKeys: signingKey,
|
|
49
|
+
detached: true,
|
|
50
|
+
});
|
|
51
|
+
return {
|
|
52
|
+
message: Buffer.from(rawBytes).toString('base64'),
|
|
53
|
+
signature: signature,
|
|
54
|
+
};
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Verifies a PGP detached signature on an MPSSignedMessage and returns the decoded raw bytes.
|
|
58
|
+
* Throws if the signature is invalid or not present.
|
|
59
|
+
*/
|
|
60
|
+
async function verifyMpsMessage(msg, verificationKey) {
|
|
61
|
+
const rawBytes = Buffer.from(msg.message, 'base64');
|
|
62
|
+
const result = await pgp.verify({
|
|
63
|
+
message: await pgp.createMessage({ binary: rawBytes }),
|
|
64
|
+
signature: await pgp.readSignature({ armoredSignature: msg.signature }),
|
|
65
|
+
verificationKeys: verificationKey,
|
|
66
|
+
expectSigned: true,
|
|
67
|
+
});
|
|
68
|
+
await result.signatures[0].verified;
|
|
69
|
+
return rawBytes;
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* Extracts the X25519 public key bytes from a GPG key's encryption subkey.
|
|
73
|
+
* Works for both public-only and private keys — use this for third-party keys (e.g. BitGo's).
|
|
74
|
+
*
|
|
75
|
+
* @param key - A GPG key with an X25519 encryption subkey.
|
|
76
|
+
* @returns 32-byte X25519 public key.
|
|
77
|
+
*/
|
|
78
|
+
async function extractEd25519PublicKey(key) {
|
|
79
|
+
const { keyPacket } = await key.getEncryptionKey();
|
|
80
|
+
return Buffer.from(keyPacket.publicParams.Q).subarray(1);
|
|
81
|
+
}
|
|
82
|
+
/**
|
|
83
|
+
* Extracts the X25519 public and private key bytes from a GPG ed25519 private key's
|
|
84
|
+
* encryption subkey. Encapsulates the keyPacket internals and the little-endian scalar
|
|
85
|
+
* reversal in one place so sdk-core only deals with plain Buffers.
|
|
86
|
+
*
|
|
87
|
+
* @param privateKey - An ed25519 GPG private key with an X25519 encryption subkey.
|
|
88
|
+
* @returns [pk, sk] — 32-byte X25519 public key and private scalar.
|
|
89
|
+
*/
|
|
90
|
+
async function extractEd25519KeyPair(privateKey) {
|
|
91
|
+
const encKey = await privateKey.getEncryptionKey();
|
|
92
|
+
const pk = Buffer.from(encKey.keyPacket.publicParams.Q).subarray(1);
|
|
93
|
+
const sk = Buffer.from(encKey.keyPacket.privateParams.d).reverse();
|
|
94
|
+
return [pk, sk];
|
|
95
|
+
}
|
|
96
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
import { DeserializedMessage, DeserializedMessages, DkgState } from './types';
|
|
2
|
+
/**
|
|
3
|
+
* EdDSA Distributed Key Generation (DKG) implementation using @bitgo/wasm-mps.
|
|
4
|
+
*
|
|
5
|
+
* State is explicit: each round function returns `{ msg, state }` bytes.
|
|
6
|
+
* The state bytes are stored between rounds and passed to the next round function,
|
|
7
|
+
* mirroring the server-side persistence pattern (state would be serialised to DB).
|
|
8
|
+
*
|
|
9
|
+
* @example
|
|
10
|
+
* ```typescript
|
|
11
|
+
* const dkg = new DKG(3, 2, 0);
|
|
12
|
+
* // X25519 keys come from GPG encryption subkeys (extracted by the orchestrator)
|
|
13
|
+
* dkg.initDkg(myX25519PrivKey, [otherParty1X25519PubKey, otherParty2X25519PubKey]);
|
|
14
|
+
* const msg1 = dkg.getFirstMessage();
|
|
15
|
+
* const msg2s = dkg.handleIncomingMessages(allThreeMsg1s);
|
|
16
|
+
* dkg.handleIncomingMessages(allThreeMsg2s); // completes DKG
|
|
17
|
+
* const keyShare = dkg.getKeyShare();
|
|
18
|
+
* ```
|
|
19
|
+
*/
|
|
20
|
+
export declare class DKG {
|
|
21
|
+
protected n: number;
|
|
22
|
+
protected t: number;
|
|
23
|
+
protected partyIdx: number;
|
|
24
|
+
/** Private X25519 key (from GPG encryption subkey) */
|
|
25
|
+
private decryptionKey;
|
|
26
|
+
/** Other parties' X25519 public keys (from their GPG encryption subkeys), sorted by party index */
|
|
27
|
+
private otherPubKeys;
|
|
28
|
+
/** Serialised round state bytes returned by the previous round function */
|
|
29
|
+
private dkgStateBytes;
|
|
30
|
+
/** Opaque bincode-serialised keyshare from round2 */
|
|
31
|
+
private keyShare;
|
|
32
|
+
/** 32-byte Ed25519 public key from round2 */
|
|
33
|
+
private sharePk;
|
|
34
|
+
/** 32-byte chain code from round2 */
|
|
35
|
+
private shareChaincode;
|
|
36
|
+
protected dkgState: DkgState;
|
|
37
|
+
constructor(n: number, t: number, partyIdx: number);
|
|
38
|
+
getState(): DkgState;
|
|
39
|
+
/**
|
|
40
|
+
* Initialises the DKG session with this party's X25519 private key and the other parties'
|
|
41
|
+
* X25519 public keys. Keys are extracted from GPG encryption subkeys by the orchestrator.
|
|
42
|
+
*
|
|
43
|
+
* @param decryptionKey - This party's 32-byte X25519 private key (GPG enc subkey private part).
|
|
44
|
+
* @param otherEncPublicKeys - Other parties' 32-byte X25519 public keys, sorted by ascending
|
|
45
|
+
* party index (excluding own). For a 3-party setup, this is [party_A_pub, party_B_pub].
|
|
46
|
+
*/
|
|
47
|
+
initDkg(decryptionKey: Buffer, otherEncPublicKeys: Buffer[]): void;
|
|
48
|
+
/**
|
|
49
|
+
* Runs round0 of the DKG protocol. Returns this party's broadcast message.
|
|
50
|
+
* Stores the round state bytes internally for the next round.
|
|
51
|
+
*
|
|
52
|
+
* @param dkgSeed - Optional 32-byte seed for deterministic DKG output (testing only).
|
|
53
|
+
*/
|
|
54
|
+
getFirstMessage(dkgSeed?: Buffer): DeserializedMessage;
|
|
55
|
+
/**
|
|
56
|
+
* Handles incoming messages from all parties and advances the protocol.
|
|
57
|
+
*
|
|
58
|
+
* - In WaitMsg1: runs round1, returns this party's round1 broadcast message.
|
|
59
|
+
* - In WaitMsg2: runs round2, completes DKG, returns [].
|
|
60
|
+
*
|
|
61
|
+
* The caller passes all n messages (including own); own message is filtered
|
|
62
|
+
* out internally. Other parties' messages are sorted by ascending party index,
|
|
63
|
+
* matching the ordering expected by @bitgo/wasm-mps.
|
|
64
|
+
*
|
|
65
|
+
* @param messagesForIthRound - All n messages for this round (including own).
|
|
66
|
+
*/
|
|
67
|
+
handleIncomingMessages(messagesForIthRound: DeserializedMessages): DeserializedMessages;
|
|
68
|
+
/**
|
|
69
|
+
* Returns the opaque bincode-serialised keyshare produced by round2.
|
|
70
|
+
* This is used as input to the signing protocol.
|
|
71
|
+
*/
|
|
72
|
+
getKeyShare(): Buffer;
|
|
73
|
+
/**
|
|
74
|
+
* Returns the 32-byte Ed25519 public key agreed by all parties during DKG.
|
|
75
|
+
*/
|
|
76
|
+
getSharePublicKey(): Buffer;
|
|
77
|
+
/**
|
|
78
|
+
* Returns the 128-char hex common keychain: 64-char public key + 64-char chain code.
|
|
79
|
+
* This matches the format expected by address derivation (Eddsa.deriveUnhardened).
|
|
80
|
+
*/
|
|
81
|
+
getCommonKeychain(): string;
|
|
82
|
+
/**
|
|
83
|
+
* Returns a CBOR-encoded reduced representation containing the public key.
|
|
84
|
+
*/
|
|
85
|
+
getReducedKeyShare(): Buffer;
|
|
86
|
+
/**
|
|
87
|
+
* Exports the current session state as a JSON string for persistence.
|
|
88
|
+
* Includes: round state bytes, current DKG round, decryption key, other parties' pub keys.
|
|
89
|
+
* This mirrors what a server would store in a database between API rounds.
|
|
90
|
+
*/
|
|
91
|
+
getSession(): string;
|
|
92
|
+
/**
|
|
93
|
+
* Restores a previously exported session. Allows the protocol to continue
|
|
94
|
+
* from where it left off, as if the round state was loaded from a database.
|
|
95
|
+
*/
|
|
96
|
+
restoreSession(session: string): void;
|
|
97
|
+
}
|
|
98
|
+
//# sourceMappingURL=dkg.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"dkg.d.ts","sourceRoot":"","sources":["../../../../src/tss/eddsa-mps/dkg.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,mBAAmB,EAAE,oBAAoB,EAAE,QAAQ,EAAwB,MAAM,SAAS,CAAC;AAEpG;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,GAAG;IACd,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,QAAQ,EAAE,MAAM,CAAC;IAE3B,sDAAsD;IACtD,OAAO,CAAC,aAAa,CAAuB;IAC5C,mGAAmG;IACnG,OAAO,CAAC,YAAY,CAAyB;IAC7C,2EAA2E;IAC3E,OAAO,CAAC,aAAa,CAAuB;IAC5C,qDAAqD;IACrD,OAAO,CAAC,QAAQ,CAAuB;IACvC,6CAA6C;IAC7C,OAAO,CAAC,OAAO,CAAuB;IACtC,qCAAqC;IACrC,OAAO,CAAC,cAAc,CAAuB;IAE7C,SAAS,CAAC,QAAQ,EAAE,QAAQ,CAA0B;gBAE1C,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM;IAMlD,QAAQ,IAAI,QAAQ;IAIpB;;;;;;;OAOG;IACH,OAAO,CAAC,aAAa,EAAE,MAAM,EAAE,kBAAkB,EAAE,MAAM,EAAE,GAAG,IAAI;IAgBlE;;;;;OAKG;IACH,eAAe,CAAC,OAAO,CAAC,EAAE,MAAM,GAAG,mBAAmB;IAkBtD;;;;;;;;;;;OAWG;IACH,sBAAsB,CAAC,mBAAmB,EAAE,oBAAoB,GAAG,oBAAoB;IAqDvF;;;OAGG;IACH,WAAW,IAAI,MAAM;IAOrB;;OAEG;IACH,iBAAiB,IAAI,MAAM;IAO3B;;;OAGG;IACH,iBAAiB,IAAI,MAAM;IAO3B;;OAEG;IACH,kBAAkB,IAAI,MAAM;IAU5B;;;;OAIG;IACH,UAAU,IAAI,MAAM;IAepB;;;OAGG;IACH,cAAc,CAAC,OAAO,EAAE,MAAM,GAAG,IAAI;CAOtC"}
|
|
@@ -0,0 +1,228 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.DKG = void 0;
|
|
7
|
+
const wasm_mps_1 = require("@bitgo/wasm-mps");
|
|
8
|
+
const cbor_x_1 = require("cbor-x");
|
|
9
|
+
const crypto_1 = __importDefault(require("crypto"));
|
|
10
|
+
const types_1 = require("./types");
|
|
11
|
+
/**
|
|
12
|
+
* EdDSA Distributed Key Generation (DKG) implementation using @bitgo/wasm-mps.
|
|
13
|
+
*
|
|
14
|
+
* State is explicit: each round function returns `{ msg, state }` bytes.
|
|
15
|
+
* The state bytes are stored between rounds and passed to the next round function,
|
|
16
|
+
* mirroring the server-side persistence pattern (state would be serialised to DB).
|
|
17
|
+
*
|
|
18
|
+
* @example
|
|
19
|
+
* ```typescript
|
|
20
|
+
* const dkg = new DKG(3, 2, 0);
|
|
21
|
+
* // X25519 keys come from GPG encryption subkeys (extracted by the orchestrator)
|
|
22
|
+
* dkg.initDkg(myX25519PrivKey, [otherParty1X25519PubKey, otherParty2X25519PubKey]);
|
|
23
|
+
* const msg1 = dkg.getFirstMessage();
|
|
24
|
+
* const msg2s = dkg.handleIncomingMessages(allThreeMsg1s);
|
|
25
|
+
* dkg.handleIncomingMessages(allThreeMsg2s); // completes DKG
|
|
26
|
+
* const keyShare = dkg.getKeyShare();
|
|
27
|
+
* ```
|
|
28
|
+
*/
|
|
29
|
+
class DKG {
|
|
30
|
+
constructor(n, t, partyIdx) {
|
|
31
|
+
/** Private X25519 key (from GPG encryption subkey) */
|
|
32
|
+
this.decryptionKey = null;
|
|
33
|
+
/** Other parties' X25519 public keys (from their GPG encryption subkeys), sorted by party index */
|
|
34
|
+
this.otherPubKeys = null;
|
|
35
|
+
/** Serialised round state bytes returned by the previous round function */
|
|
36
|
+
this.dkgStateBytes = null;
|
|
37
|
+
/** Opaque bincode-serialised keyshare from round2 */
|
|
38
|
+
this.keyShare = null;
|
|
39
|
+
/** 32-byte Ed25519 public key from round2 */
|
|
40
|
+
this.sharePk = null;
|
|
41
|
+
/** 32-byte chain code from round2 */
|
|
42
|
+
this.shareChaincode = null;
|
|
43
|
+
this.dkgState = types_1.DkgState.Uninitialized;
|
|
44
|
+
this.n = n;
|
|
45
|
+
this.t = t;
|
|
46
|
+
this.partyIdx = partyIdx;
|
|
47
|
+
}
|
|
48
|
+
getState() {
|
|
49
|
+
return this.dkgState;
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Initialises the DKG session with this party's X25519 private key and the other parties'
|
|
53
|
+
* X25519 public keys. Keys are extracted from GPG encryption subkeys by the orchestrator.
|
|
54
|
+
*
|
|
55
|
+
* @param decryptionKey - This party's 32-byte X25519 private key (GPG enc subkey private part).
|
|
56
|
+
* @param otherEncPublicKeys - Other parties' 32-byte X25519 public keys, sorted by ascending
|
|
57
|
+
* party index (excluding own). For a 3-party setup, this is [party_A_pub, party_B_pub].
|
|
58
|
+
*/
|
|
59
|
+
initDkg(decryptionKey, otherEncPublicKeys) {
|
|
60
|
+
if (!decryptionKey || decryptionKey.length !== 32) {
|
|
61
|
+
throw Error('Missing or invalid decryption key: must be 32 bytes');
|
|
62
|
+
}
|
|
63
|
+
if (!otherEncPublicKeys || otherEncPublicKeys.length !== this.n - 1) {
|
|
64
|
+
throw Error(`Expected ${this.n - 1} other parties' public keys`);
|
|
65
|
+
}
|
|
66
|
+
if (this.t > this.n || this.partyIdx >= this.n) {
|
|
67
|
+
throw Error('Invalid parameters for DKG');
|
|
68
|
+
}
|
|
69
|
+
this.decryptionKey = decryptionKey;
|
|
70
|
+
this.otherPubKeys = otherEncPublicKeys;
|
|
71
|
+
this.dkgState = types_1.DkgState.Init;
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Runs round0 of the DKG protocol. Returns this party's broadcast message.
|
|
75
|
+
* Stores the round state bytes internally for the next round.
|
|
76
|
+
*
|
|
77
|
+
* @param dkgSeed - Optional 32-byte seed for deterministic DKG output (testing only).
|
|
78
|
+
*/
|
|
79
|
+
getFirstMessage(dkgSeed) {
|
|
80
|
+
if (this.dkgState !== types_1.DkgState.Init) {
|
|
81
|
+
throw Error('DKG session not initialized');
|
|
82
|
+
}
|
|
83
|
+
const seed = dkgSeed ?? crypto_1.default.randomBytes(32);
|
|
84
|
+
let result;
|
|
85
|
+
try {
|
|
86
|
+
result = (0, wasm_mps_1.ed25519_dkg_round0_process)(this.partyIdx, this.decryptionKey, this.otherPubKeys, seed);
|
|
87
|
+
}
|
|
88
|
+
catch (err) {
|
|
89
|
+
throw new Error(`Error while creating the first message from party ${this.partyIdx}: ${err}`);
|
|
90
|
+
}
|
|
91
|
+
this.dkgStateBytes = Buffer.from(result.state);
|
|
92
|
+
this.dkgState = types_1.DkgState.WaitMsg1;
|
|
93
|
+
return { payload: new Uint8Array(result.msg), from: this.partyIdx };
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* Handles incoming messages from all parties and advances the protocol.
|
|
97
|
+
*
|
|
98
|
+
* - In WaitMsg1: runs round1, returns this party's round1 broadcast message.
|
|
99
|
+
* - In WaitMsg2: runs round2, completes DKG, returns [].
|
|
100
|
+
*
|
|
101
|
+
* The caller passes all n messages (including own); own message is filtered
|
|
102
|
+
* out internally. Other parties' messages are sorted by ascending party index,
|
|
103
|
+
* matching the ordering expected by @bitgo/wasm-mps.
|
|
104
|
+
*
|
|
105
|
+
* @param messagesForIthRound - All n messages for this round (including own).
|
|
106
|
+
*/
|
|
107
|
+
handleIncomingMessages(messagesForIthRound) {
|
|
108
|
+
if (this.dkgState === types_1.DkgState.Complete) {
|
|
109
|
+
throw Error('DKG session already completed');
|
|
110
|
+
}
|
|
111
|
+
if (this.dkgState === types_1.DkgState.Uninitialized) {
|
|
112
|
+
throw Error('DKG session not initialized');
|
|
113
|
+
}
|
|
114
|
+
if (this.dkgState === types_1.DkgState.Init) {
|
|
115
|
+
throw Error('DKG session must call getFirstMessage() before handling incoming messages. Call getFirstMessage() first.');
|
|
116
|
+
}
|
|
117
|
+
if (messagesForIthRound.length !== this.n) {
|
|
118
|
+
throw Error('Invalid number of messages for the round. Number of messages should be equal to N');
|
|
119
|
+
}
|
|
120
|
+
// Extract other parties' messages, sorted by party index (ascending)
|
|
121
|
+
const otherMsgs = messagesForIthRound
|
|
122
|
+
.filter((m) => m.from !== this.partyIdx)
|
|
123
|
+
.sort((a, b) => a.from - b.from)
|
|
124
|
+
.map((m) => m.payload);
|
|
125
|
+
if (this.dkgState === types_1.DkgState.WaitMsg1) {
|
|
126
|
+
let result;
|
|
127
|
+
try {
|
|
128
|
+
result = (0, wasm_mps_1.ed25519_dkg_round1_process)(otherMsgs, this.dkgStateBytes);
|
|
129
|
+
}
|
|
130
|
+
catch (err) {
|
|
131
|
+
throw new Error(`Error while creating messages from party ${this.partyIdx}, round ${this.dkgState}: ${err}`);
|
|
132
|
+
}
|
|
133
|
+
// Store new state; this is what would be persisted to DB between API rounds
|
|
134
|
+
this.dkgStateBytes = Buffer.from(result.state);
|
|
135
|
+
this.dkgState = types_1.DkgState.WaitMsg2;
|
|
136
|
+
return [{ payload: new Uint8Array(result.msg), from: this.partyIdx }];
|
|
137
|
+
}
|
|
138
|
+
if (this.dkgState === types_1.DkgState.WaitMsg2) {
|
|
139
|
+
let share;
|
|
140
|
+
try {
|
|
141
|
+
share = (0, wasm_mps_1.ed25519_dkg_round2_process)(otherMsgs, this.dkgStateBytes);
|
|
142
|
+
}
|
|
143
|
+
catch (err) {
|
|
144
|
+
throw new Error(`Error while creating messages from party ${this.partyIdx}, round ${this.dkgState}: ${err}`);
|
|
145
|
+
}
|
|
146
|
+
this.keyShare = Buffer.from(share.share);
|
|
147
|
+
this.sharePk = Buffer.from(share.pk);
|
|
148
|
+
this.shareChaincode = Buffer.from(share.chaincode);
|
|
149
|
+
this.dkgStateBytes = null;
|
|
150
|
+
this.dkgState = types_1.DkgState.Complete;
|
|
151
|
+
return [];
|
|
152
|
+
}
|
|
153
|
+
throw Error('Unexpected DKG state');
|
|
154
|
+
}
|
|
155
|
+
/**
|
|
156
|
+
* Returns the opaque bincode-serialised keyshare produced by round2.
|
|
157
|
+
* This is used as input to the signing protocol.
|
|
158
|
+
*/
|
|
159
|
+
getKeyShare() {
|
|
160
|
+
if (!this.keyShare) {
|
|
161
|
+
throw Error('DKG session not initialized');
|
|
162
|
+
}
|
|
163
|
+
return this.keyShare;
|
|
164
|
+
}
|
|
165
|
+
/**
|
|
166
|
+
* Returns the 32-byte Ed25519 public key agreed by all parties during DKG.
|
|
167
|
+
*/
|
|
168
|
+
getSharePublicKey() {
|
|
169
|
+
if (!this.sharePk) {
|
|
170
|
+
throw Error('DKG session not initialized');
|
|
171
|
+
}
|
|
172
|
+
return this.sharePk;
|
|
173
|
+
}
|
|
174
|
+
/**
|
|
175
|
+
* Returns the 128-char hex common keychain: 64-char public key + 64-char chain code.
|
|
176
|
+
* This matches the format expected by address derivation (Eddsa.deriveUnhardened).
|
|
177
|
+
*/
|
|
178
|
+
getCommonKeychain() {
|
|
179
|
+
if (!this.sharePk || !this.shareChaincode) {
|
|
180
|
+
throw Error('DKG session not initialized');
|
|
181
|
+
}
|
|
182
|
+
return this.sharePk.toString('hex') + this.shareChaincode.toString('hex');
|
|
183
|
+
}
|
|
184
|
+
/**
|
|
185
|
+
* Returns a CBOR-encoded reduced representation containing the public key.
|
|
186
|
+
*/
|
|
187
|
+
getReducedKeyShare() {
|
|
188
|
+
if (!this.sharePk) {
|
|
189
|
+
throw Error('DKG session not initialized');
|
|
190
|
+
}
|
|
191
|
+
const reducedKeyShare = {
|
|
192
|
+
pub: Array.from(this.sharePk),
|
|
193
|
+
};
|
|
194
|
+
return Buffer.from((0, cbor_x_1.encode)(reducedKeyShare));
|
|
195
|
+
}
|
|
196
|
+
/**
|
|
197
|
+
* Exports the current session state as a JSON string for persistence.
|
|
198
|
+
* Includes: round state bytes, current DKG round, decryption key, other parties' pub keys.
|
|
199
|
+
* This mirrors what a server would store in a database between API rounds.
|
|
200
|
+
*/
|
|
201
|
+
getSession() {
|
|
202
|
+
if (this.dkgState === types_1.DkgState.Complete) {
|
|
203
|
+
throw Error('DKG session is complete. Exporting the session is not allowed.');
|
|
204
|
+
}
|
|
205
|
+
if (this.dkgState === types_1.DkgState.Uninitialized) {
|
|
206
|
+
throw Error('DKG session not initialized');
|
|
207
|
+
}
|
|
208
|
+
return JSON.stringify({
|
|
209
|
+
dkgStateBytes: this.dkgStateBytes?.toString('base64') ?? null,
|
|
210
|
+
dkgRound: this.dkgState,
|
|
211
|
+
decryptionKey: this.decryptionKey?.toString('base64') ?? null,
|
|
212
|
+
otherPubKeys: this.otherPubKeys?.map((k) => k.toString('base64')) ?? null,
|
|
213
|
+
});
|
|
214
|
+
}
|
|
215
|
+
/**
|
|
216
|
+
* Restores a previously exported session. Allows the protocol to continue
|
|
217
|
+
* from where it left off, as if the round state was loaded from a database.
|
|
218
|
+
*/
|
|
219
|
+
restoreSession(session) {
|
|
220
|
+
const data = JSON.parse(session);
|
|
221
|
+
this.dkgStateBytes = data.dkgStateBytes ? Buffer.from(data.dkgStateBytes, 'base64') : null;
|
|
222
|
+
this.dkgState = data.dkgRound;
|
|
223
|
+
this.decryptionKey = data.decryptionKey ? Buffer.from(data.decryptionKey, 'base64') : null;
|
|
224
|
+
this.otherPubKeys = data.otherPubKeys ? data.otherPubKeys.map((k) => Buffer.from(k, 'base64')) : null;
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
exports.DKG = DKG;
|
|
228
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dkg.js","sourceRoot":"","sources":["../../../../src/tss/eddsa-mps/dkg.ts"],"names":[],"mappings":";;;;;;AAAA,8CAAqH;AACrH,mCAAgC;AAChC,oDAA4B;AAC5B,mCAAoG;AAEpG;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,GAAG;IAoBd,YAAY,CAAS,EAAE,CAAS,EAAE,QAAgB;QAflD,sDAAsD;QAC9C,kBAAa,GAAkB,IAAI,CAAC;QAC5C,mGAAmG;QAC3F,iBAAY,GAAoB,IAAI,CAAC;QAC7C,2EAA2E;QACnE,kBAAa,GAAkB,IAAI,CAAC;QAC5C,qDAAqD;QAC7C,aAAQ,GAAkB,IAAI,CAAC;QACvC,6CAA6C;QACrC,YAAO,GAAkB,IAAI,CAAC;QACtC,qCAAqC;QAC7B,mBAAc,GAAkB,IAAI,CAAC;QAEnC,aAAQ,GAAa,gBAAQ,CAAC,aAAa,CAAC;QAGpD,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC;QACX,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC;QACX,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,CAAC,QAAQ,CAAC;IACvB,CAAC;IAED;;;;;;;OAOG;IACH,OAAO,CAAC,aAAqB,EAAE,kBAA4B;QACzD,IAAI,CAAC,aAAa,IAAI,aAAa,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YAClD,MAAM,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACrE,CAAC;QACD,IAAI,CAAC,kBAAkB,IAAI,kBAAkB,CAAC,MAAM,KAAK,IAAI,CAAC,CAAC,GAAG,CAAC,EAAE,CAAC;YACpE,MAAM,KAAK,CAAC,YAAY,IAAI,CAAC,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,IAAI,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,CAAC,EAAE,CAAC;YAC/C,MAAM,KAAK,CAAC,4BAA4B,CAAC,CAAC;QAC5C,CAAC;QAED,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,YAAY,GAAG,kBAAkB,CAAC;QACvC,IAAI,CAAC,QAAQ,GAAG,gBAAQ,CAAC,IAAI,CAAC;IAChC,CAAC;IAED;;;;;OAKG;IACH,eAAe,CAAC,OAAgB;QAC9B,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,IAAI,EAAE,CAAC;YACpC,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,IAAI,GAAG,OAAO,IAAI,gBAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;QAC/C,IAAI,MAAM,CAAC;QACX,IAAI,CAAC;YACH,MAAM,GAAG,IAAA,qCAA0B,EAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,aAAc,EAAE,IAAI,CAAC,YAAa,EAAE,IAAI,CAAC,CAAC;QACpG,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,qDAAqD,IAAI,CAAC,QAAQ,KAAK,GAAG,EAAE,CAAC,CAAC;QAChG,CAAC;QAED,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QAC/C,IAAI,CAAC,QAAQ,GAAG,gBAAQ,CAAC,QAAQ,CAAC;QAClC,OAAO,EAAE,OAAO,EAAE,IAAI,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,IAAI,EAAE,IAAI,CAAC,QAAQ,EAAE,CAAC;IACtE,CAAC;IAED;;;;;;;;;;;OAWG;IACH,sBAAsB,CAAC,mBAAyC;QAC9D,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,QAAQ,EAAE,CAAC;YACxC,MAAM,KAAK,CAAC,+BAA+B,CAAC,CAAC;QAC/C,CAAC;QACD,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,aAAa,EAAE,CAAC;YAC7C,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,IAAI,EAAE,CAAC;YACpC,MAAM,KAAK,CACT,0GAA0G,CAC3G,CAAC;QACJ,CAAC;QACD,IAAI,mBAAmB,CAAC,MAAM,KAAK,IAAI,CAAC,CAAC,EAAE,CAAC;YAC1C,MAAM,KAAK,CAAC,mFAAmF,CAAC,CAAC;QACnG,CAAC;QAED,qEAAqE;QACrE,MAAM,SAAS,GAAG,mBAAmB;aAClC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,IAAI,CAAC,QAAQ,CAAC;aACvC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,GAAG,CAAC,CAAC,IAAI,CAAC;aAC/B,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC;QAEzB,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,QAAQ,EAAE,CAAC;YACxC,IAAI,MAAM,CAAC;YACX,IAAI,CAAC;gBACH,MAAM,GAAG,IAAA,qCAA0B,EAAC,SAAS,EAAE,IAAI,CAAC,aAAc,CAAC,CAAC;YACtE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,IAAI,KAAK,CAAC,4CAA4C,IAAI,CAAC,QAAQ,WAAW,IAAI,CAAC,QAAQ,KAAK,GAAG,EAAE,CAAC,CAAC;YAC/G,CAAC;YACD,4EAA4E;YAC5E,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAC/C,IAAI,CAAC,QAAQ,GAAG,gBAAQ,CAAC,QAAQ,CAAC;YAClC,OAAO,CAAC,EAAE,OAAO,EAAE,IAAI,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,IAAI,EAAE,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;QACxE,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,QAAQ,EAAE,CAAC;YACxC,IAAI,KAAK,CAAC;YACV,IAAI,CAAC;gBACH,KAAK,GAAG,IAAA,qCAA0B,EAAC,SAAS,EAAE,IAAI,CAAC,aAAc,CAAC,CAAC;YACrE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,IAAI,KAAK,CAAC,4CAA4C,IAAI,CAAC,QAAQ,WAAW,IAAI,CAAC,QAAQ,KAAK,GAAG,EAAE,CAAC,CAAC;YAC/G,CAAC;YACD,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YACzC,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACrC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;YACnD,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;YAC1B,IAAI,CAAC,QAAQ,GAAG,gBAAQ,CAAC,QAAQ,CAAC;YAClC,OAAO,EAAE,CAAC;QACZ,CAAC;QAED,MAAM,KAAK,CAAC,sBAAsB,CAAC,CAAC;IACtC,CAAC;IAED;;;OAGG;IACH,WAAW;QACT,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;YACnB,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,OAAO,IAAI,CAAC,QAAQ,CAAC;IACvB,CAAC;IAED;;OAEG;IACH,iBAAiB;QACf,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC;YAClB,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED;;;OAGG;IACH,iBAAiB;QACf,IAAI,CAAC,IAAI,CAAC,OAAO,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,CAAC;YAC1C,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,OAAO,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,kBAAkB;QAChB,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC;YAClB,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,MAAM,eAAe,GAAyB;YAC5C,GAAG,EAAE,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;SAC9B,CAAC;QACF,OAAO,MAAM,CAAC,IAAI,CAAC,IAAA,eAAM,EAAC,eAAe,CAAC,CAAC,CAAC;IAC9C,CAAC;IAED;;;;OAIG;IACH,UAAU;QACR,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,QAAQ,EAAE,CAAC;YACxC,MAAM,KAAK,CAAC,gEAAgE,CAAC,CAAC;QAChF,CAAC;QACD,IAAI,IAAI,CAAC,QAAQ,KAAK,gBAAQ,CAAC,aAAa,EAAE,CAAC;YAC7C,MAAM,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QACD,OAAO,IAAI,CAAC,SAAS,CAAC;YACpB,aAAa,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,IAAI;YAC7D,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,aAAa,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,IAAI;YAC7D,YAAY,EAAE,IAAI,CAAC,YAAY,EAAE,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,IAAI,IAAI;SAC1E,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACH,cAAc,CAAC,OAAe;QAC5B,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QACjC,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;QAC3F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC;QAC9B,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;QAC3F,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,CAAC,CAAE,IAAI,CAAC,YAAyB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;IACtH,CAAC;CACF;AA3ND,kBA2NC","sourcesContent":["import { ed25519_dkg_round0_process, ed25519_dkg_round1_process, ed25519_dkg_round2_process } from '@bitgo/wasm-mps';\nimport { encode } from 'cbor-x';\nimport crypto from 'crypto';\nimport { DeserializedMessage, DeserializedMessages, DkgState, EddsaReducedKeyShare } from './types';\n\n/**\n * EdDSA Distributed Key Generation (DKG) implementation using @bitgo/wasm-mps.\n *\n * State is explicit: each round function returns `{ msg, state }` bytes.\n * The state bytes are stored between rounds and passed to the next round function,\n * mirroring the server-side persistence pattern (state would be serialised to DB).\n *\n * @example\n * ```typescript\n * const dkg = new DKG(3, 2, 0);\n * // X25519 keys come from GPG encryption subkeys (extracted by the orchestrator)\n * dkg.initDkg(myX25519PrivKey, [otherParty1X25519PubKey, otherParty2X25519PubKey]);\n * const msg1 = dkg.getFirstMessage();\n * const msg2s = dkg.handleIncomingMessages(allThreeMsg1s);\n * dkg.handleIncomingMessages(allThreeMsg2s);  // completes DKG\n * const keyShare = dkg.getKeyShare();\n * ```\n */\nexport class DKG {\n  protected n: number;\n  protected t: number;\n  protected partyIdx: number;\n\n  /** Private X25519 key (from GPG encryption subkey) */\n  private decryptionKey: Buffer | null = null;\n  /** Other parties' X25519 public keys (from their GPG encryption subkeys), sorted by party index */\n  private otherPubKeys: Buffer[] | null = null;\n  /** Serialised round state bytes returned by the previous round function */\n  private dkgStateBytes: Buffer | null = null;\n  /** Opaque bincode-serialised keyshare from round2 */\n  private keyShare: Buffer | null = null;\n  /** 32-byte Ed25519 public key from round2 */\n  private sharePk: Buffer | null = null;\n  /** 32-byte chain code from round2 */\n  private shareChaincode: Buffer | null = null;\n\n  protected dkgState: DkgState = DkgState.Uninitialized;\n\n  constructor(n: number, t: number, partyIdx: number) {\n    this.n = n;\n    this.t = t;\n    this.partyIdx = partyIdx;\n  }\n\n  getState(): DkgState {\n    return this.dkgState;\n  }\n\n  /**\n   * Initialises the DKG session with this party's X25519 private key and the other parties'\n   * X25519 public keys. Keys are extracted from GPG encryption subkeys by the orchestrator.\n   *\n   * @param decryptionKey - This party's 32-byte X25519 private key (GPG enc subkey private part).\n   * @param otherEncPublicKeys - Other parties' 32-byte X25519 public keys, sorted by ascending\n   *   party index (excluding own). For a 3-party setup, this is [party_A_pub, party_B_pub].\n   */\n  initDkg(decryptionKey: Buffer, otherEncPublicKeys: Buffer[]): void {\n    if (!decryptionKey || decryptionKey.length !== 32) {\n      throw Error('Missing or invalid decryption key: must be 32 bytes');\n    }\n    if (!otherEncPublicKeys || otherEncPublicKeys.length !== this.n - 1) {\n      throw Error(`Expected ${this.n - 1} other parties' public keys`);\n    }\n    if (this.t > this.n || this.partyIdx >= this.n) {\n      throw Error('Invalid parameters for DKG');\n    }\n\n    this.decryptionKey = decryptionKey;\n    this.otherPubKeys = otherEncPublicKeys;\n    this.dkgState = DkgState.Init;\n  }\n\n  /**\n   * Runs round0 of the DKG protocol. Returns this party's broadcast message.\n   * Stores the round state bytes internally for the next round.\n   *\n   * @param dkgSeed - Optional 32-byte seed for deterministic DKG output (testing only).\n   */\n  getFirstMessage(dkgSeed?: Buffer): DeserializedMessage {\n    if (this.dkgState !== DkgState.Init) {\n      throw Error('DKG session not initialized');\n    }\n\n    const seed = dkgSeed ?? crypto.randomBytes(32);\n    let result;\n    try {\n      result = ed25519_dkg_round0_process(this.partyIdx, this.decryptionKey!, this.otherPubKeys!, seed);\n    } catch (err) {\n      throw new Error(`Error while creating the first message from party ${this.partyIdx}: ${err}`);\n    }\n\n    this.dkgStateBytes = Buffer.from(result.state);\n    this.dkgState = DkgState.WaitMsg1;\n    return { payload: new Uint8Array(result.msg), from: this.partyIdx };\n  }\n\n  /**\n   * Handles incoming messages from all parties and advances the protocol.\n   *\n   * - In WaitMsg1: runs round1, returns this party's round1 broadcast message.\n   * - In WaitMsg2: runs round2, completes DKG, returns [].\n   *\n   * The caller passes all n messages (including own); own message is filtered\n   * out internally. Other parties' messages are sorted by ascending party index,\n   * matching the ordering expected by @bitgo/wasm-mps.\n   *\n   * @param messagesForIthRound - All n messages for this round (including own).\n   */\n  handleIncomingMessages(messagesForIthRound: DeserializedMessages): DeserializedMessages {\n    if (this.dkgState === DkgState.Complete) {\n      throw Error('DKG session already completed');\n    }\n    if (this.dkgState === DkgState.Uninitialized) {\n      throw Error('DKG session not initialized');\n    }\n    if (this.dkgState === DkgState.Init) {\n      throw Error(\n        'DKG session must call getFirstMessage() before handling incoming messages. Call getFirstMessage() first.'\n      );\n    }\n    if (messagesForIthRound.length !== this.n) {\n      throw Error('Invalid number of messages for the round. Number of messages should be equal to N');\n    }\n\n    // Extract other parties' messages, sorted by party index (ascending)\n    const otherMsgs = messagesForIthRound\n      .filter((m) => m.from !== this.partyIdx)\n      .sort((a, b) => a.from - b.from)\n      .map((m) => m.payload);\n\n    if (this.dkgState === DkgState.WaitMsg1) {\n      let result;\n      try {\n        result = ed25519_dkg_round1_process(otherMsgs, this.dkgStateBytes!);\n      } catch (err) {\n        throw new Error(`Error while creating messages from party ${this.partyIdx}, round ${this.dkgState}: ${err}`);\n      }\n      // Store new state; this is what would be persisted to DB between API rounds\n      this.dkgStateBytes = Buffer.from(result.state);\n      this.dkgState = DkgState.WaitMsg2;\n      return [{ payload: new Uint8Array(result.msg), from: this.partyIdx }];\n    }\n\n    if (this.dkgState === DkgState.WaitMsg2) {\n      let share;\n      try {\n        share = ed25519_dkg_round2_process(otherMsgs, this.dkgStateBytes!);\n      } catch (err) {\n        throw new Error(`Error while creating messages from party ${this.partyIdx}, round ${this.dkgState}: ${err}`);\n      }\n      this.keyShare = Buffer.from(share.share);\n      this.sharePk = Buffer.from(share.pk);\n      this.shareChaincode = Buffer.from(share.chaincode);\n      this.dkgStateBytes = null;\n      this.dkgState = DkgState.Complete;\n      return [];\n    }\n\n    throw Error('Unexpected DKG state');\n  }\n\n  /**\n   * Returns the opaque bincode-serialised keyshare produced by round2.\n   * This is used as input to the signing protocol.\n   */\n  getKeyShare(): Buffer {\n    if (!this.keyShare) {\n      throw Error('DKG session not initialized');\n    }\n    return this.keyShare;\n  }\n\n  /**\n   * Returns the 32-byte Ed25519 public key agreed by all parties during DKG.\n   */\n  getSharePublicKey(): Buffer {\n    if (!this.sharePk) {\n      throw Error('DKG session not initialized');\n    }\n    return this.sharePk;\n  }\n\n  /**\n   * Returns the 128-char hex common keychain: 64-char public key + 64-char chain code.\n   * This matches the format expected by address derivation (Eddsa.deriveUnhardened).\n   */\n  getCommonKeychain(): string {\n    if (!this.sharePk || !this.shareChaincode) {\n      throw Error('DKG session not initialized');\n    }\n    return this.sharePk.toString('hex') + this.shareChaincode.toString('hex');\n  }\n\n  /**\n   * Returns a CBOR-encoded reduced representation containing the public key.\n   */\n  getReducedKeyShare(): Buffer {\n    if (!this.sharePk) {\n      throw Error('DKG session not initialized');\n    }\n    const reducedKeyShare: EddsaReducedKeyShare = {\n      pub: Array.from(this.sharePk),\n    };\n    return Buffer.from(encode(reducedKeyShare));\n  }\n\n  /**\n   * Exports the current session state as a JSON string for persistence.\n   * Includes: round state bytes, current DKG round, decryption key, other parties' pub keys.\n   * This mirrors what a server would store in a database between API rounds.\n   */\n  getSession(): string {\n    if (this.dkgState === DkgState.Complete) {\n      throw Error('DKG session is complete. Exporting the session is not allowed.');\n    }\n    if (this.dkgState === DkgState.Uninitialized) {\n      throw Error('DKG session not initialized');\n    }\n    return JSON.stringify({\n      dkgStateBytes: this.dkgStateBytes?.toString('base64') ?? null,\n      dkgRound: this.dkgState,\n      decryptionKey: this.decryptionKey?.toString('base64') ?? null,\n      otherPubKeys: this.otherPubKeys?.map((k) => k.toString('base64')) ?? null,\n    });\n  }\n\n  /**\n   * Restores a previously exported session. Allows the protocol to continue\n   * from where it left off, as if the round state was loaded from a database.\n   */\n  restoreSession(session: string): void {\n    const data = JSON.parse(session);\n    this.dkgStateBytes = data.dkgStateBytes ? Buffer.from(data.dkgStateBytes, 'base64') : null;\n    this.dkgState = data.dkgRound;\n    this.decryptionKey = data.decryptionKey ? Buffer.from(data.decryptionKey, 'base64') : null;\n    this.otherPubKeys = data.otherPubKeys ? (data.otherPubKeys as string[]).map((k) => Buffer.from(k, 'base64')) : null;\n  }\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/tss/eddsa-mps/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,WAAW,MAAM,OAAO,CAAC;AACrC,OAAO,KAAK,OAAO,MAAM,QAAQ,CAAC;AAClC,OAAO,KAAK,QAAQ,MAAM,SAAS,CAAC;AACpC,OAAO,KAAK,QAAQ,MAAM,cAAc,CAAC"}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
+
var ownKeys = function(o) {
|
|
20
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
+
var ar = [];
|
|
22
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
+
return ar;
|
|
24
|
+
};
|
|
25
|
+
return ownKeys(o);
|
|
26
|
+
};
|
|
27
|
+
return function (mod) {
|
|
28
|
+
if (mod && mod.__esModule) return mod;
|
|
29
|
+
var result = {};
|
|
30
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
+
__setModuleDefault(result, mod);
|
|
32
|
+
return result;
|
|
33
|
+
};
|
|
34
|
+
})();
|
|
35
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
+
exports.MPSComms = exports.MPSTypes = exports.MPSUtil = exports.EddsaMPSDkg = void 0;
|
|
37
|
+
exports.EddsaMPSDkg = __importStar(require("./dkg"));
|
|
38
|
+
exports.MPSUtil = __importStar(require("./util"));
|
|
39
|
+
exports.MPSTypes = __importStar(require("./types"));
|
|
40
|
+
exports.MPSComms = __importStar(require("./commsLayer"));
|
|
41
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
import * as t from 'io-ts';
|
|
2
|
+
export declare const ReducedKeyShareType: t.TypeC<{
|
|
3
|
+
pub: t.ArrayC<t.NumberC>;
|
|
4
|
+
}>;
|
|
5
|
+
export type EddsaReducedKeyShare = t.TypeOf<typeof ReducedKeyShareType>;
|
|
6
|
+
/**
|
|
7
|
+
* Represents the state of a DKG (Distributed Key Generation) session
|
|
8
|
+
*/
|
|
9
|
+
export declare enum DkgState {
|
|
10
|
+
/** DKG session has not been initialized */
|
|
11
|
+
Uninitialized = "Uninitialized",
|
|
12
|
+
/** DKG session has been initialized (Init state in WASM) */
|
|
13
|
+
Init = "Init",
|
|
14
|
+
/** DKG session is waiting for first message (WaitMsg1 state in WASM) */
|
|
15
|
+
WaitMsg1 = "WaitMsg1",
|
|
16
|
+
/** DKG session is waiting for second message (WaitMsg2 state in WASM) */
|
|
17
|
+
WaitMsg2 = "WaitMsg2",
|
|
18
|
+
/** DKG session has generated key shares (Share state in WASM) */
|
|
19
|
+
Share = "Share",
|
|
20
|
+
/** DKG session has completed successfully and key shares are available */
|
|
21
|
+
Complete = "Complete"
|
|
22
|
+
}
|
|
23
|
+
export interface Message<T> {
|
|
24
|
+
payload: T;
|
|
25
|
+
from: number;
|
|
26
|
+
}
|
|
27
|
+
export type SerializedMessage = Message<string>;
|
|
28
|
+
export type SerializedMessages = Message<string>[];
|
|
29
|
+
export type DeserializedMessage = Message<Uint8Array>;
|
|
30
|
+
export type DeserializedMessages = Message<Uint8Array>[];
|
|
31
|
+
export declare function serializeMessage(msg: DeserializedMessage): SerializedMessage;
|
|
32
|
+
export declare function deserializeMessage(msg: SerializedMessage): DeserializedMessage;
|
|
33
|
+
export declare function serializeMessages(msgs: DeserializedMessages): SerializedMessages;
|
|
34
|
+
export declare function deserializeMessages(msgs: SerializedMessages): DeserializedMessages;
|
|
35
|
+
/** A PGP detached-signed message by a party.
|
|
36
|
+
* `message` is the raw payload encoded as base64.
|
|
37
|
+
* `signature` is an armored PGP detached signature over those bytes.
|
|
38
|
+
*/
|
|
39
|
+
export interface MPSSignedMessage {
|
|
40
|
+
message: string;
|
|
41
|
+
signature: string;
|
|
42
|
+
}
|
|
43
|
+
export declare function getDecodedReducedKeyShare(reducedKeyShare: Buffer | Uint8Array): EddsaReducedKeyShare;
|
|
44
|
+
//# sourceMappingURL=types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/tss/eddsa-mps/types.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,CAAC,MAAM,OAAO,CAAC;AAE3B,eAAO,MAAM,mBAAmB;;EAE9B,CAAC;AAEH,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,MAAM,CAAC,OAAO,mBAAmB,CAAC,CAAC;AAExE;;GAEG;AACH,oBAAY,QAAQ;IAClB,2CAA2C;IAC3C,aAAa,kBAAkB;IAC/B,4DAA4D;IAC5D,IAAI,SAAS;IACb,wEAAwE;IACxE,QAAQ,aAAa;IACrB,yEAAyE;IACzE,QAAQ,aAAa;IACrB,iEAAiE;IACjE,KAAK,UAAU;IACf,0EAA0E;IAC1E,QAAQ,aAAa;CACtB;AAED,MAAM,WAAW,OAAO,CAAC,CAAC;IACxB,OAAO,EAAE,CAAC,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;CACd;AAED,MAAM,MAAM,iBAAiB,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;AAEhD,MAAM,MAAM,kBAAkB,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;AAEnD,MAAM,MAAM,mBAAmB,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC;AAEtD,MAAM,MAAM,oBAAoB,GAAG,OAAO,CAAC,UAAU,CAAC,EAAE,CAAC;AAEzD,wBAAgB,gBAAgB,CAAC,GAAG,EAAE,mBAAmB,GAAG,iBAAiB,CAE5E;AAED,wBAAgB,kBAAkB,CAAC,GAAG,EAAE,iBAAiB,GAAG,mBAAmB,CAE9E;AAED,wBAAgB,iBAAiB,CAAC,IAAI,EAAE,oBAAoB,GAAG,kBAAkB,CAEhF;AAED,wBAAgB,mBAAmB,CAAC,IAAI,EAAE,kBAAkB,GAAG,oBAAoB,CAElF;AAED;;;GAGG;AACH,MAAM,WAAW,gBAAgB;IAC/B,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,wBAAgB,yBAAyB,CAAC,eAAe,EAAE,MAAM,GAAG,UAAU,GAAG,oBAAoB,CAMpG"}
|