@inco/js 0.6.9 → 0.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -26
- package/dist/cjs/advancedacl/session-key.js +53 -136
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -35
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +107 -108
- package/dist/cjs/attesteddecrypt/types.d.ts +4 -4
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -4
- package/dist/cjs/generated/lightning.d.ts +40 -0
- package/dist/cjs/generated/lightning.js +43 -1
- package/dist/cjs/generated/local-node.d.ts +11 -7
- package/dist/cjs/generated/local-node.js +28 -8
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/ecies.d.ts +2 -0
- package/dist/cjs/lite/ecies.js +5 -2
- package/dist/cjs/lite/index.d.ts +0 -1
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +110 -74
- package/dist/cjs/lite/lightning.js +272 -127
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +3 -0
- package/dist/cjs/test/mocks.js +19 -1
- package/dist/cjs/viem.d.ts +2 -4
- package/dist/cjs/viem.js +6 -2
- package/dist/esm/advancedacl/session-key.d.ts +39 -26
- package/dist/esm/advancedacl/session-key.js +44 -126
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -36
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/esm/attesteddecrypt/attested-decrypt.js +106 -108
- package/dist/esm/attesteddecrypt/types.d.ts +4 -4
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -3
- package/dist/esm/generated/lightning.d.ts +40 -0
- package/dist/esm/generated/lightning.js +43 -1
- package/dist/esm/generated/local-node.d.ts +11 -7
- package/dist/esm/generated/local-node.js +28 -8
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/ecies.d.ts +2 -0
- package/dist/esm/lite/ecies.js +4 -2
- package/dist/esm/lite/index.d.ts +0 -1
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +110 -74
- package/dist/esm/lite/lightning.js +276 -131
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +3 -0
- package/dist/esm/test/mocks.js +17 -1
- package/dist/esm/viem.d.ts +2 -4
- package/dist/esm/viem.js +6 -2
- package/dist/types/advancedacl/session-key.d.ts +39 -26
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/types/attesteddecrypt/types.d.ts +4 -4
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/types/generated/lightning.d.ts +40 -0
- package/dist/types/generated/local-node.d.ts +11 -7
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/ecies.d.ts +2 -0
- package/dist/types/lite/index.d.ts +0 -1
- package/dist/types/lite/lightning.d.ts +110 -74
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +3 -0
- package/dist/types/viem.d.ts +2 -4
- package/package.json +6 -3
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -69
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -21
- package/dist/cjs/lite/reencrypt.js +0 -141
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -66
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -21
- package/dist/esm/lite/reencrypt.js +0 -131
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -21
|
@@ -0,0 +1,378 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.KmsQuorumClient = void 0;
|
|
4
|
+
const binary_js_1 = require("../binary.js");
|
|
5
|
+
const encryption_js_1 = require("../encryption/encryption.js");
|
|
6
|
+
const handle_js_1 = require("../handle.js");
|
|
7
|
+
const retry_js_1 = require("../retry.js");
|
|
8
|
+
const client_js_1 = require("./client.js");
|
|
9
|
+
const thresholdPromises_js_1 = require("./thresholdPromises.js");
|
|
10
|
+
class KmsQuorumClient {
|
|
11
|
+
kmss;
|
|
12
|
+
threshold;
|
|
13
|
+
// Implementation
|
|
14
|
+
constructor(attestersOrClients, threshold) {
|
|
15
|
+
if (attestersOrClients.length === 0) {
|
|
16
|
+
throw new Error('At least one attester or KMS client is required');
|
|
17
|
+
}
|
|
18
|
+
if (threshold < 1 || threshold > attestersOrClients.length) {
|
|
19
|
+
throw new Error(`Threshold must be between 1 and ${attestersOrClients.length}`);
|
|
20
|
+
}
|
|
21
|
+
// Check if first element is a KmsClient (has attestedDecrypt method) or an attester object
|
|
22
|
+
if (attestersOrClients.length > 0 &&
|
|
23
|
+
'attestedDecrypt' in attestersOrClients[0]) {
|
|
24
|
+
// Handle KmsClient[] case
|
|
25
|
+
const kmsClients = attestersOrClients;
|
|
26
|
+
this.kmss = kmsClients.map((client) => ({
|
|
27
|
+
client,
|
|
28
|
+
signer: client.signerAddress,
|
|
29
|
+
}));
|
|
30
|
+
}
|
|
31
|
+
else {
|
|
32
|
+
// Handle { url: string; signer: Address }[] case
|
|
33
|
+
const attesters = attestersOrClients;
|
|
34
|
+
this.kmss = attesters.map((attester) => {
|
|
35
|
+
return {
|
|
36
|
+
client: (0, client_js_1.getKmsClient)(attester.url, attester.signer),
|
|
37
|
+
signer: attester.signer,
|
|
38
|
+
};
|
|
39
|
+
});
|
|
40
|
+
}
|
|
41
|
+
this.threshold = threshold;
|
|
42
|
+
}
|
|
43
|
+
/**
|
|
44
|
+
* Creates a KmsQuorumClient from an array of URLs.
|
|
45
|
+
* Requires signer addresses and threshold to be explicitly provided.
|
|
46
|
+
*
|
|
47
|
+
* @param urls - Array of KMS endpoint URLs
|
|
48
|
+
* @param signers - Array of signer addresses, must match the length of URLs
|
|
49
|
+
* @param threshold - Number of successful responses required (must be between 1 and urls.length)
|
|
50
|
+
* @throws {Error} If URLs array is empty, signers length doesn't match URLs length, or threshold is invalid
|
|
51
|
+
*/
|
|
52
|
+
static fromUrls(urls, signers, threshold) {
|
|
53
|
+
if (urls.length === 0) {
|
|
54
|
+
throw new Error('At least one URL is required');
|
|
55
|
+
}
|
|
56
|
+
if (signers.length !== urls.length) {
|
|
57
|
+
throw new Error(`Signers array length (${signers.length}) must match URLs array length (${urls.length})`);
|
|
58
|
+
}
|
|
59
|
+
if (threshold < 1 || threshold > urls.length) {
|
|
60
|
+
throw new Error(`Threshold must be between 1 and ${urls.length} (number of URLs)`);
|
|
61
|
+
}
|
|
62
|
+
const attesters = urls.map((url, index) => {
|
|
63
|
+
return { url, signer: signers[index] };
|
|
64
|
+
});
|
|
65
|
+
return new KmsQuorumClient(attesters, threshold);
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Creates a KmsQuorumClient from an array of KmsClient instances.
|
|
69
|
+
* Each KmsClient must have a signerAddress property.
|
|
70
|
+
*
|
|
71
|
+
* @param kmsClients - Array of KMS client instances
|
|
72
|
+
* @param threshold - Number of successful responses required (must be between 1 and kmsClients.length)
|
|
73
|
+
* @throws {Error} If KMS clients array is empty or threshold is invalid
|
|
74
|
+
*/
|
|
75
|
+
static fromKmsClients(kmsClients, threshold) {
|
|
76
|
+
if (kmsClients.length === 0) {
|
|
77
|
+
throw new Error('At least one KMS client is required');
|
|
78
|
+
}
|
|
79
|
+
if (threshold < 1 || threshold > kmsClients.length) {
|
|
80
|
+
throw new Error(`Threshold must be between 1 and ${kmsClients.length} (number of KMS clients)`);
|
|
81
|
+
}
|
|
82
|
+
return new KmsQuorumClient(kmsClients, threshold);
|
|
83
|
+
}
|
|
84
|
+
async attestedDecrypt(request, backoffConfig) {
|
|
85
|
+
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
86
|
+
return await kms.client.attestedDecrypt(request);
|
|
87
|
+
}, backoffConfig);
|
|
88
|
+
// Extract responses and signers
|
|
89
|
+
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
90
|
+
const signers = thresholdResults.map((r) => r.signer);
|
|
91
|
+
// Verify that responses are consistent across quorum (plaintext or ciphertext)
|
|
92
|
+
const reference = this.verifyResponseConsistency(thresholdResponses);
|
|
93
|
+
return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
|
|
94
|
+
}
|
|
95
|
+
async attestedCompute(request, backoffConfig) {
|
|
96
|
+
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
97
|
+
return await kms.client.attestedCompute(request);
|
|
98
|
+
}, backoffConfig);
|
|
99
|
+
// Extract responses and signers
|
|
100
|
+
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
101
|
+
const signers = thresholdResults.map((r) => r.signer);
|
|
102
|
+
// Verify that responses are consistent across quorum
|
|
103
|
+
const reference = this.verifyComputeResponseConsistency(thresholdResponses);
|
|
104
|
+
return this.buildAggregatedComputeAttestation(reference, thresholdResponses, signers);
|
|
105
|
+
}
|
|
106
|
+
async attestedReveal(request, backoffConfig) {
|
|
107
|
+
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
108
|
+
return await kms.client.attestedReveal(request);
|
|
109
|
+
}, backoffConfig);
|
|
110
|
+
// Extract responses and signers
|
|
111
|
+
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
112
|
+
const signers = thresholdResults.map((r) => r.signer);
|
|
113
|
+
// Verify that responses are consistent across quorum (plaintext or ciphertext)
|
|
114
|
+
const reference = this.verifyResponseConsistency(thresholdResponses);
|
|
115
|
+
return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
|
|
116
|
+
}
|
|
117
|
+
/**
|
|
118
|
+
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
119
|
+
* Returns results with both the response and signer address.
|
|
120
|
+
*/
|
|
121
|
+
async executeKmsOperationWithThreshold(operation, backoffConfig) {
|
|
122
|
+
// Create promises for all KMS clients, tracking signer addresses
|
|
123
|
+
// Each client call is wrapped with retry logic
|
|
124
|
+
const promises = this.kmss.map(async (kms, index) => {
|
|
125
|
+
try {
|
|
126
|
+
const response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
|
127
|
+
return await operation(kms);
|
|
128
|
+
}, backoffConfig);
|
|
129
|
+
return { response, signer: kms.signer };
|
|
130
|
+
}
|
|
131
|
+
catch (error) {
|
|
132
|
+
throw new Error(`KMS client ${index} failed: ${error}`);
|
|
133
|
+
}
|
|
134
|
+
});
|
|
135
|
+
return await (0, thresholdPromises_js_1.executeWithThreshold)(promises, this.threshold);
|
|
136
|
+
}
|
|
137
|
+
/**
|
|
138
|
+
* Collects signatures from responses and sorts them by signer address (ascending).
|
|
139
|
+
* This is required by SignatureVerifier.
|
|
140
|
+
*/
|
|
141
|
+
collectAndSortSignatures(signatures, signers) {
|
|
142
|
+
const signaturesWithSigners = signatures.map((signature, idx) => ({
|
|
143
|
+
signature,
|
|
144
|
+
signer: signers[idx],
|
|
145
|
+
}));
|
|
146
|
+
// Sort by signer address in ascending order (as required by SignatureVerifier)
|
|
147
|
+
signaturesWithSigners.sort((a, b) => {
|
|
148
|
+
const aBigInt = BigInt(a.signer);
|
|
149
|
+
const bBigInt = BigInt(b.signer);
|
|
150
|
+
if (aBigInt < bBigInt)
|
|
151
|
+
return -1;
|
|
152
|
+
if (aBigInt > bBigInt)
|
|
153
|
+
return 1;
|
|
154
|
+
return 0;
|
|
155
|
+
});
|
|
156
|
+
// Extract sorted signatures
|
|
157
|
+
return signaturesWithSigners.map((item) => item.signature);
|
|
158
|
+
}
|
|
159
|
+
/**
|
|
160
|
+
* Builds a plaintext attestation from a DecryptionAttestation proto message.
|
|
161
|
+
*/
|
|
162
|
+
buildPlaintextAttestation(decryptionAttestation, covalidatorSignatures) {
|
|
163
|
+
if (!decryptionAttestation.value ||
|
|
164
|
+
decryptionAttestation.value.case !== 'plaintext') {
|
|
165
|
+
throw new Error('Expected plaintext attestation');
|
|
166
|
+
}
|
|
167
|
+
const plaintextBytes = decryptionAttestation.value.value.value;
|
|
168
|
+
const handle = decryptionAttestation.handle;
|
|
169
|
+
const handleType = (0, handle_js_1.getHandleType)(handle);
|
|
170
|
+
const bigIntValue = (0, binary_js_1.bytesToBigInt)(plaintextBytes);
|
|
171
|
+
const plaintext = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue);
|
|
172
|
+
return {
|
|
173
|
+
handle,
|
|
174
|
+
plaintext,
|
|
175
|
+
covalidatorSignatures,
|
|
176
|
+
};
|
|
177
|
+
}
|
|
178
|
+
buildAggregatedAttestations(reference, thresholdResponses, signers) {
|
|
179
|
+
const attestationCount = reference.decryptionAttestations.length;
|
|
180
|
+
return new Array(attestationCount).fill(undefined).map((_, i) => {
|
|
181
|
+
const refAtt = reference.decryptionAttestations[i];
|
|
182
|
+
if (!refAtt.value) {
|
|
183
|
+
throw new Error('No value in attestation');
|
|
184
|
+
}
|
|
185
|
+
// Collect signatures and sort by signer address
|
|
186
|
+
const signatures = thresholdResponses.map((resp) => resp.decryptionAttestations[i].signature);
|
|
187
|
+
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
188
|
+
if (refAtt.value.case === 'plaintext') {
|
|
189
|
+
return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
|
|
190
|
+
}
|
|
191
|
+
else if (refAtt.value.case === 'reencryption') {
|
|
192
|
+
const reencryption = refAtt.value.value;
|
|
193
|
+
const ct = reencryption.userCiphertext;
|
|
194
|
+
const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(reencryption.handle));
|
|
195
|
+
return {
|
|
196
|
+
handle: refAtt.handle,
|
|
197
|
+
encryptedPlaintext: {
|
|
198
|
+
ciphertext: {
|
|
199
|
+
value: (0, binary_js_1.bytesToHex)(ct),
|
|
200
|
+
scheme: 1, // EciesScheme
|
|
201
|
+
type: fheType,
|
|
202
|
+
},
|
|
203
|
+
},
|
|
204
|
+
covalidatorSignatures,
|
|
205
|
+
};
|
|
206
|
+
}
|
|
207
|
+
else {
|
|
208
|
+
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
|
|
209
|
+
}
|
|
210
|
+
});
|
|
211
|
+
}
|
|
212
|
+
buildAggregatedComputeAttestation(reference, thresholdResponses, signers) {
|
|
213
|
+
const refAtt = reference.decryptionAttestation;
|
|
214
|
+
if (!refAtt) {
|
|
215
|
+
throw new Error('No decryption attestation in reference response');
|
|
216
|
+
}
|
|
217
|
+
if (!refAtt.value) {
|
|
218
|
+
throw new Error('No value in reference attestation');
|
|
219
|
+
}
|
|
220
|
+
if (refAtt.value.case !== 'plaintext') {
|
|
221
|
+
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext'`);
|
|
222
|
+
}
|
|
223
|
+
// Collect signatures and sort by signer address
|
|
224
|
+
// We know all responses have decryption attestations from verifyComputeResponseConsistency
|
|
225
|
+
const signatures = [];
|
|
226
|
+
for (const resp of thresholdResponses) {
|
|
227
|
+
const att = resp.decryptionAttestation;
|
|
228
|
+
if (att) {
|
|
229
|
+
signatures.push(att.signature);
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
233
|
+
return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
|
|
234
|
+
}
|
|
235
|
+
verifyResponseConsistency(thresholdResponses) {
|
|
236
|
+
if (thresholdResponses.length === 0) {
|
|
237
|
+
throw new Error('No responses collected to verify');
|
|
238
|
+
}
|
|
239
|
+
const reference = thresholdResponses[0];
|
|
240
|
+
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
241
|
+
if (thresholdResponses[r].decryptionAttestations.length !==
|
|
242
|
+
reference.decryptionAttestations.length) {
|
|
243
|
+
throw new Error('Inconsistent number of decryption attestations across KMS responses');
|
|
244
|
+
}
|
|
245
|
+
}
|
|
246
|
+
for (let i = 0; i < reference.decryptionAttestations.length; i++) {
|
|
247
|
+
const refAtt = reference.decryptionAttestations[i];
|
|
248
|
+
if (!refAtt.value) {
|
|
249
|
+
throw new Error('No value in reference attestation');
|
|
250
|
+
}
|
|
251
|
+
const refCase = refAtt.value.case;
|
|
252
|
+
// Verify that all responses have the same case (plaintext or reencryption)
|
|
253
|
+
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
254
|
+
const att = thresholdResponses[r].decryptionAttestations[i];
|
|
255
|
+
if (!att.value) {
|
|
256
|
+
throw new Error('No value in attestation');
|
|
257
|
+
}
|
|
258
|
+
if (att.value.case !== refCase) {
|
|
259
|
+
throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
// Verify consistency based on the case
|
|
263
|
+
if (refCase === 'plaintext') {
|
|
264
|
+
this.verifyPlaintextConsistency(i, reference, thresholdResponses);
|
|
265
|
+
}
|
|
266
|
+
else if (refCase === 'reencryption') {
|
|
267
|
+
this.verifyCiphertextConsistency(i, reference, thresholdResponses);
|
|
268
|
+
}
|
|
269
|
+
else {
|
|
270
|
+
throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
|
|
271
|
+
}
|
|
272
|
+
}
|
|
273
|
+
return reference;
|
|
274
|
+
}
|
|
275
|
+
verifyComputeResponseConsistency(thresholdResponses) {
|
|
276
|
+
if (thresholdResponses.length === 0) {
|
|
277
|
+
throw new Error('No responses collected to verify');
|
|
278
|
+
}
|
|
279
|
+
const reference = thresholdResponses[0];
|
|
280
|
+
const refAtt = reference.decryptionAttestation;
|
|
281
|
+
if (!refAtt) {
|
|
282
|
+
throw new Error('No decryption attestation in reference response');
|
|
283
|
+
}
|
|
284
|
+
if (!refAtt.value) {
|
|
285
|
+
throw new Error('No value in reference attestation');
|
|
286
|
+
}
|
|
287
|
+
if (refAtt.value.case !== 'plaintext') {
|
|
288
|
+
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext'`);
|
|
289
|
+
}
|
|
290
|
+
// Verify that all responses have a decryption attestation
|
|
291
|
+
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
292
|
+
const att = thresholdResponses[r].decryptionAttestation;
|
|
293
|
+
if (!att) {
|
|
294
|
+
throw new Error('No decryption attestation in response');
|
|
295
|
+
}
|
|
296
|
+
if (!att.value) {
|
|
297
|
+
throw new Error('No value in attestation');
|
|
298
|
+
}
|
|
299
|
+
if (att.value.case !== 'plaintext') {
|
|
300
|
+
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
301
|
+
}
|
|
302
|
+
// Verify handles match
|
|
303
|
+
if (att.handle !== refAtt.handle) {
|
|
304
|
+
throw new Error('Handles differ across KMS responses');
|
|
305
|
+
}
|
|
306
|
+
// Verify plaintext values match
|
|
307
|
+
this.verifyPlaintextBytesConsistency(refAtt.value.value.value, att.value.value.value);
|
|
308
|
+
}
|
|
309
|
+
return reference;
|
|
310
|
+
}
|
|
311
|
+
/**
|
|
312
|
+
* Verifies that two plaintext byte arrays are identical.
|
|
313
|
+
*/
|
|
314
|
+
verifyPlaintextBytesConsistency(refBytes, bytes) {
|
|
315
|
+
if (refBytes.length !== bytes.length) {
|
|
316
|
+
throw new Error('Plaintexts differ across KMS responses');
|
|
317
|
+
}
|
|
318
|
+
for (let b = 0; b < refBytes.length; b++) {
|
|
319
|
+
if (refBytes[b] !== bytes[b]) {
|
|
320
|
+
throw new Error('Plaintexts differ across KMS responses');
|
|
321
|
+
}
|
|
322
|
+
}
|
|
323
|
+
}
|
|
324
|
+
verifyPlaintextConsistency(index, reference, thresholdResponses) {
|
|
325
|
+
const refAtt = reference.decryptionAttestations[index];
|
|
326
|
+
if (refAtt.value?.case !== 'plaintext') {
|
|
327
|
+
throw new Error('Expected plaintext attestation');
|
|
328
|
+
}
|
|
329
|
+
const refBytes = refAtt.value.value.value;
|
|
330
|
+
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
331
|
+
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
332
|
+
if (att.value?.case !== 'plaintext') {
|
|
333
|
+
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
334
|
+
}
|
|
335
|
+
const bytes = att.value.value.value;
|
|
336
|
+
this.verifyPlaintextBytesConsistency(refBytes, bytes);
|
|
337
|
+
}
|
|
338
|
+
}
|
|
339
|
+
verifyCiphertextConsistency(index, reference, thresholdResponses) {
|
|
340
|
+
const refAtt = reference.decryptionAttestations[index];
|
|
341
|
+
if (refAtt.value?.case !== 'reencryption') {
|
|
342
|
+
throw new Error('Expected reencryption attestation');
|
|
343
|
+
}
|
|
344
|
+
const refReencryption = refAtt.value.value;
|
|
345
|
+
const refCt = refReencryption.userCiphertext;
|
|
346
|
+
if (!refCt) {
|
|
347
|
+
throw new Error('No ciphertext in reference reencryption');
|
|
348
|
+
}
|
|
349
|
+
const refFheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refReencryption.handle));
|
|
350
|
+
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
351
|
+
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
352
|
+
if (att.value?.case !== 'reencryption') {
|
|
353
|
+
throw new Error('Expected reencryption attestation but received non-reencryption');
|
|
354
|
+
}
|
|
355
|
+
const reencryption = att.value.value;
|
|
356
|
+
const ct = reencryption.userCiphertext;
|
|
357
|
+
if (!ct) {
|
|
358
|
+
throw new Error('No ciphertext in reencryption');
|
|
359
|
+
}
|
|
360
|
+
const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(reencryption.handle));
|
|
361
|
+
// Verify FHE type matches
|
|
362
|
+
if (fheType !== refFheType) {
|
|
363
|
+
throw new Error('FHE types differ across KMS responses');
|
|
364
|
+
}
|
|
365
|
+
// Verify ciphertext bytes match
|
|
366
|
+
if (refCt.length !== ct.length) {
|
|
367
|
+
throw new Error('Ciphertexts differ across KMS responses');
|
|
368
|
+
}
|
|
369
|
+
for (let b = 0; b < refCt.length; b++) {
|
|
370
|
+
if (refCt[b] !== ct[b]) {
|
|
371
|
+
throw new Error('Ciphertexts differ across KMS responses');
|
|
372
|
+
}
|
|
373
|
+
}
|
|
374
|
+
}
|
|
375
|
+
}
|
|
376
|
+
}
|
|
377
|
+
exports.KmsQuorumClient = KmsQuorumClient;
|
|
378
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":";;;AAKA,4CAKsB;AAMtB,+DAGqC;AAUrC,4CAA6C;AAE7C,0CAA+C;AAC/C,2CAA2D;AAC3D,iEAA8D;AAO9D,MAAa,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,IAAA,wBAAY,EAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAErE,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC;QAEtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,qDAAqD;QACrD,MAAM,SAAS,GAAG,IAAI,CAAC,gCAAgC,CAAC,kBAAkB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAkC,CAC5C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAErE,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,IAAA,2CAAoB,EAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAA,yBAAa,EAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACkC,CAAC;IAC5D,CAAC;IAEO,2BAA2B,CACjC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB;QAKlB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,OAAO,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9D,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;YACvE,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC7D,OAAO;oBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,CAAC,EAAE,cAAc;4BACzB,IAAI,EAAE,OAAO;yBACd;qBACgD;oBACnD,qBAAqB;iBAC2C,CAAC;YACrE,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,iCAAiC,CACvC,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB;QAElB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,wBAAwB,CAC1E,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,2FAA2F;QAC3F,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,GAAG,EAAE,CAAC;gBACR,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;IACvE,CAAC;IAEO,yBAAyB,CAC/B,kBAAwE;QAExE,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QAExC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,IACE,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,MAAM;gBACnD,SAAS,CAAC,sBAAsB,CAAC,MAAM,EACvC,CAAC;gBACD,MAAM,IAAI,KAAK,CACb,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YAEnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;YACvD,CAAC;YAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;YAElC,2EAA2E;YAC3E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;oBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;gBAC7C,CAAC;gBACD,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACpE,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,IAAI,CAAC,2BAA2B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACrE,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,gCAAgC,CACtC,kBAA6C;QAE7C,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAE/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,wBAAwB,CAC1E,CAAC;QACJ,CAAC;QAED,0DAA0D;QAC1D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,qBAAqB,CAAC;YACxD,IAAI,CAAC,GAAG,EAAE,CAAC;gBACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACnC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,gCAAgC;YAChC,IAAI,CAAC,+BAA+B,CAClC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CACtB,CAAC;QACJ,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;OAEG;IACK,+BAA+B,CACrC,QAAoB,EACpB,KAAiB;QAEjB,IAAI,QAAQ,CAAC,MAAM,KAAK,KAAK,CAAC,MAAM,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;QACD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,IAAI,QAAQ,CAAC,CAAC,CAAC,KAAK,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC7B,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;YAC5D,CAAC;QACH,CAAC;IACH,CAAC;IAEO,0BAA0B,CAChC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAEO,2BAA2B,CACjC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;QAC3C,MAAM,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;QAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,eAAe,CAAC,MAAM,CAAC,CAAC,CAAC;QAEnE,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YACD,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC;YAE7D,0BAA0B;YAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;gBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,gCAAgC;YAChC,IAAI,KAAK,CAAC,MAAM,KAAK,EAAE,CAAC,MAAM,EAAE,CAAC;gBAC/B,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;YAC7D,CAAC;YACD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACtC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;oBACvB,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;gBAC7D,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;CACF;AAlkBD,0CAkkBC"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Executes promises and returns results as soon as threshold is reached
|
|
3
|
+
* @param promises Array of promises to execute
|
|
4
|
+
* @param threshold Number of successful responses needed
|
|
5
|
+
* @returns Promise that resolves with threshold number of results
|
|
6
|
+
*/
|
|
7
|
+
export declare function executeWithThreshold<T>(promises: Promise<T>[], threshold: number): Promise<T[]>;
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.executeWithThreshold = executeWithThreshold;
|
|
4
|
+
/**
|
|
5
|
+
* Executes promises and returns results as soon as threshold is reached
|
|
6
|
+
* @param promises Array of promises to execute
|
|
7
|
+
* @param threshold Number of successful responses needed
|
|
8
|
+
* @returns Promise that resolves with threshold number of results
|
|
9
|
+
*/
|
|
10
|
+
async function executeWithThreshold(promises, threshold) {
|
|
11
|
+
if (threshold < 0) {
|
|
12
|
+
throw new Error('Threshold cannot be negative');
|
|
13
|
+
}
|
|
14
|
+
// If threshold is 0, resolve immediately.
|
|
15
|
+
if (threshold === 0) {
|
|
16
|
+
return [];
|
|
17
|
+
}
|
|
18
|
+
if (promises.length === 0 && threshold > 0) {
|
|
19
|
+
throw new Error('Cannot reach positive threshold with no promises');
|
|
20
|
+
}
|
|
21
|
+
if (threshold > promises.length) {
|
|
22
|
+
throw new Error(`Threshold ${threshold} exceeds number of promises ${promises.length}`);
|
|
23
|
+
}
|
|
24
|
+
const results = [];
|
|
25
|
+
let failures = 0;
|
|
26
|
+
return new Promise((resolve, reject) => {
|
|
27
|
+
promises.forEach((promise) => {
|
|
28
|
+
promise
|
|
29
|
+
.then((response) => {
|
|
30
|
+
if (results.length < threshold) {
|
|
31
|
+
results.push(response);
|
|
32
|
+
if (results.length === threshold) {
|
|
33
|
+
resolve(results);
|
|
34
|
+
}
|
|
35
|
+
}
|
|
36
|
+
})
|
|
37
|
+
.catch((error) => {
|
|
38
|
+
console.error(`Error executing promise: ${error}`);
|
|
39
|
+
failures++;
|
|
40
|
+
// Check if we can still reach the threshold
|
|
41
|
+
// We need (threshold - results.length) more successes
|
|
42
|
+
// from (promises.length - results.length - failures) remaining promises
|
|
43
|
+
const remainingPromises = promises.length - results.length - failures;
|
|
44
|
+
const neededSuccesses = threshold - results.length;
|
|
45
|
+
if (remainingPromises < neededSuccesses) {
|
|
46
|
+
reject(new Error(`Cannot reach threshold of ${threshold} responses. Failed clients exceed limit.`));
|
|
47
|
+
}
|
|
48
|
+
});
|
|
49
|
+
});
|
|
50
|
+
});
|
|
51
|
+
}
|
|
52
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/lite/ecies.d.ts
CHANGED
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
import * as ellipticPkg from 'elliptic';
|
|
2
2
|
import { Decryptor, EciesScheme, Encryptor } from '../encryption/encryption.js';
|
|
3
3
|
import { PubKeyEncodable } from '../reencryption/index.js';
|
|
4
|
+
export declare const TEST_ECIES_PUB_KEY = "0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb";
|
|
5
|
+
export declare const TEST_ECIES_PRIVATE_KEY = "0x384a707568ab63ad2ad9f10135faa0699801db3174f33f7846badc11affb8f57";
|
|
4
6
|
export interface Secp256k1Keypair extends PubKeyEncodable {
|
|
5
7
|
scheme: EciesScheme;
|
|
6
8
|
kp: ellipticPkg.ec.KeyPair;
|
package/dist/cjs/lite/ecies.js
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.TEST_ECIES_PRIVATE_KEY = exports.TEST_ECIES_PUB_KEY = void 0;
|
|
3
4
|
exports.toSecp256k1Keypair = toSecp256k1Keypair;
|
|
4
5
|
exports.generateSecp256k1Keypair = generateSecp256k1Keypair;
|
|
5
6
|
exports.encodeSecp256k1PublicKey = encodeSecp256k1PublicKey;
|
|
@@ -17,6 +18,8 @@ const handle_js_1 = require("../handle.js");
|
|
|
17
18
|
const schema_js_1 = require("../schema.js");
|
|
18
19
|
const hadu_js_1 = require("./hadu.js");
|
|
19
20
|
const secp256k1 = new ellipticPkg.ec('secp256k1');
|
|
21
|
+
exports.TEST_ECIES_PUB_KEY = '0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb';
|
|
22
|
+
exports.TEST_ECIES_PRIVATE_KEY = '0x384a707568ab63ad2ad9f10135faa0699801db3174f33f7846badc11affb8f57';
|
|
20
23
|
// Convert an ec.KeyPair from the 'elliptic' package (assumed to have geen generated
|
|
21
24
|
// with the secp256k1 curve) to our Secp256k1Keypair type.
|
|
22
25
|
function toSecp256k1Keypair(kp) {
|
|
@@ -120,7 +123,7 @@ async function decrypt(privKeyA, ciphertext) {
|
|
|
120
123
|
}
|
|
121
124
|
function getEciesDecryptor({ privKeyA, }) {
|
|
122
125
|
const privKeyABuffer = privKeyA.kp.getPrivate().toArrayLike(Buffer, 'be', 32);
|
|
123
|
-
return async ({ scheme,
|
|
126
|
+
return async ({ scheme, value, }) => {
|
|
124
127
|
if (scheme !== encryption_js_1.encryptionSchemes.ecies) {
|
|
125
128
|
throw new Error(`Ciphertext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(scheme)} cannot be decrypted with ECIES`);
|
|
126
129
|
}
|
|
@@ -143,4 +146,4 @@ function getEciesDecryptor({ privKeyA, }) {
|
|
|
143
146
|
return (0, encryption_js_1.bytesToPlaintext)(computable.value.value, encryption_js_1.encryptionSchemes.ecies, typ);
|
|
144
147
|
};
|
|
145
148
|
}
|
|
146
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
149
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/lite/index.d.ts
CHANGED
package/dist/cjs/lite/index.js
CHANGED
|
@@ -21,5 +21,4 @@ __exportStar(require("./deployments.js"), exports);
|
|
|
21
21
|
__exportStar(require("./ecies.js"), exports);
|
|
22
22
|
__exportStar(require("./hadu.js"), exports);
|
|
23
23
|
__exportStar(require("./lightning.js"), exports);
|
|
24
|
-
|
|
25
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbGl0ZS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsaUVBQStDO0FBTy9DLHdEQUFzQztBQUN0Qyx3REFBc0M7QUFDdEMsbURBQWlDO0FBQ2pDLDZDQUEyQjtBQUMzQiw0Q0FBMEI7QUFDMUIsaURBQStCO0FBQy9CLGlEQUErQiJ9
|
|
24
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbGl0ZS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsaUVBQStDO0FBTy9DLHdEQUFzQztBQUN0Qyx3REFBc0M7QUFDdEMsbURBQWlDO0FBQ2pDLDZDQUEyQjtBQUMzQiw0Q0FBMEI7QUFDMUIsaURBQStCIn0=
|