mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* refactor: remove redundant branch trigger for scheduled releases * refactor: simplify process-compose commands and improve logging * refactor: remove redundant command * refactor: remove unused error variables and simplify database configuration * feat: introduce task runner for project automation * refactor: Remove hardcoded action and method from form components * refactor: move server setup to main.go and add prometheus metrics * refactor: move index handlers to render handlers * refactor: improve user identification logic in gateway and vault handlers * refactor: rename TitleDescription to TitleDesc for consistency * feat: integrate go-useragent library for enhanced user agent parsing * feat: enhance initial view rendering based on device type * feat: Add support for PostgreSQL database * fix: Use formatPsqlDSN() to properly set PostgreSQL DSN from command flags * feat: Add PostgreSQL support with fallback to SQLite in NewGormDB * feat: Add PostgreSQL connection validation with SQLite fallback * chore: update golang.org/x/crypto dependency to v0.31.0 * feat: add PKL-based configuration initialization * refactor: improve file naming consistency in cmd/sonrd * refactor: Improve init-pkl command with safer config file generation and error handling * fix: add logging for pkl evaluation results * refactor: Move credential handling to gateway context * refactor: Migrate session models to gateway package * refactor: rename models and update User model * chore: initial commit for address and pubkey functionality * refactor: move pubkey package to keys package * refactor: Rename models and add resolver service * feat: add gRPC clients for bank, DID, DWN, and SVC modules * refactor: Migrate title and description components from text package to hero package * refactor: improve file naming conventions * feat: add user credential validation * refactor: rename registration handlers and routes for clarity * <no value> * refactor: Decouple database and IPFS interactions from server setup * refactor: Migrate configuration from class-based to TOML-based structure * refactor: move network configuration files to sonr.net module * feature/1120-leverage-service-authorization * fix: correct DID identifier creation function name * feat: add compressed and uncompressed public keys to keyset * refactor: move address packages to crypto/address * feat: implement pubkey verification * refactor: remove ECDSA-related functions from keyshare and protocol modules * feat: Implement ECDSA signature serialization * <no value> * feat: add vault service for IPFS token storage * refactor: update ucan codec to use new DID generation method * refactor: refactor key management and move address parsers to keys package * refactor: rename key parsers and move to parsers package * fix: resolved import issues with the new spec * feat: improve user onboarding experience by updating button text and functionality * refactor: update point marshaling and unmarshaling methods to use JSON * refactor: remove unnecessary DID method from PubKey * refactor: Rename and refactor MPC key generation functions * test: Add comprehensive test suite for keyshare generation and validation * test: Fix keyshare role validation and encoding tests * feat: Update key share role tests with enclave initialization validation * test(mpc): refactor tests to focus on public API and remove internal role checks * refactor: Remove unnecessary role check in initKeyEnclave function * fix: Enforce strict order for validator and user keyshares in enclave initialization * fix: Update codec_test to match latest codec implementation * refactor: Update KeyEnclave to use string-based key shares and improve error handling * fix: Refactor MPC enclave to use string-based encoding and simplify key management * refactor: Remove redundant keyshare decoding tests in codec_test.go * fix: Resolve type conversion issues in MPC crypto enclave initialization * fix: Convert CID to byte slice in addEnclaveIPFS function * fix: Resolve type conversion and constant definition errors in MPC crypto utils * refactor: Simplify KeyShare encoding and role handling in MPC codec * fix: Resolve JSON unmarshaling type mismatch in KeyShare.Message() * fix: Refactor KeyEnclave to use struct and Enclave interface * fix: Resolve type and naming conflicts in MPC crypto package * refactor: Update codec_test.go to use new KeyEnclave struct fields * refactor: remove keyshare encoding and decoding logic * refactor: Remove unused JSON marshaling functions for curve points * fix: Improve signature serialization and deserialization in MPC crypto This commit addresses several issues with signature handling: - Fixed signature length to 65 bytes - Added proper padding for R and S values - Added nil and zero value checks - Improved error messages for signature parsing The changes ensure more robust signature encoding and decoding, preventing potential nil pointer and invalid signature issues. * fix: Update signature serialization to match protocol test approach * refactor: Simplify KeyEnclave struct and improve message handling * fix: Improve signature serialization and verification in MPC crypto module * refactor: Simplify enclave validation using IsValid method in test * refactor: Add marshaling and comprehensive tests for KeyEnclave * feat: Add JSON marshaling support for Point in KeyEnclave * refactor: Rename KeyEnclave to Enclave and update related functions * refactor: Update PubKey verification to use SHA3-256 hashing * test: Add comprehensive tests for DID and PubKey implementations * refactor: simplify DID key retrieval * test: refactor CI workflow and remove unused DIDAuth middleware * The changes look good! The updated workflows will now: 1. Run tests on push to master 2. Bump the version if the commit doesn't already start with 'bump:' 3. Trigger a release workflow automatically with the new version tag 4. Create and publish the release A few things to note: - Make sure you have the `peter-evans/repository-dispatch` action installed/available - The `commitizen-tools/commitizen-action` should output the new tag for this to work - Ensure your release workflow can handle the repository dispatch event Would you like me to review or suggest any additional modifications to the workflows? * ci(github actions): add build stage dependency for tests * fix(workflow): update workflow to trigger on PR edits * test: Update unit test dependencies * ci: Add GoReleaser dry-run check for merge group events * test: remove unnecessary dependencies between test jobs * ci: Make race and coverage tests depend on build tests
671 lines
13 KiB
Go
Executable File
671 lines
13 KiB
Go
Executable File
//
|
|
// Copyright Coinbase, Inc. All Rights Reserved.
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
package curves
|
|
|
|
import (
|
|
"crypto/elliptic"
|
|
"fmt"
|
|
"io"
|
|
"math/big"
|
|
"sync"
|
|
|
|
"github.com/btcsuite/btcd/btcec/v2"
|
|
|
|
"github.com/onsonr/sonr/crypto/core/curves/native"
|
|
secp256k1 "github.com/onsonr/sonr/crypto/core/curves/native/k256"
|
|
"github.com/onsonr/sonr/crypto/core/curves/native/k256/fp"
|
|
"github.com/onsonr/sonr/crypto/core/curves/native/k256/fq"
|
|
"github.com/onsonr/sonr/crypto/internal"
|
|
)
|
|
|
|
var (
|
|
oldK256Initonce sync.Once
|
|
oldK256 Koblitz256
|
|
)
|
|
|
|
type Koblitz256 struct {
|
|
*elliptic.CurveParams
|
|
}
|
|
|
|
func oldK256InitAll() {
|
|
curve := btcec.S256()
|
|
oldK256.CurveParams = new(elliptic.CurveParams)
|
|
oldK256.P = curve.P
|
|
oldK256.N = curve.N
|
|
oldK256.Gx = curve.Gx
|
|
oldK256.Gy = curve.Gy
|
|
oldK256.B = curve.B
|
|
oldK256.BitSize = curve.BitSize
|
|
oldK256.Name = K256Name
|
|
}
|
|
|
|
func K256Curve() *Koblitz256 {
|
|
oldK256Initonce.Do(oldK256InitAll)
|
|
return &oldK256
|
|
}
|
|
|
|
func (curve *Koblitz256) Params() *elliptic.CurveParams {
|
|
return curve.CurveParams
|
|
}
|
|
|
|
func (curve *Koblitz256) IsOnCurve(x, y *big.Int) bool {
|
|
_, err := secp256k1.K256PointNew().SetBigInt(x, y)
|
|
return err == nil
|
|
}
|
|
|
|
func (curve *Koblitz256) Add(x1, y1, x2, y2 *big.Int) (*big.Int, *big.Int) {
|
|
p1, err := secp256k1.K256PointNew().SetBigInt(x1, y1)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
p2, err := secp256k1.K256PointNew().SetBigInt(x2, y2)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
return p1.Add(p1, p2).BigInt()
|
|
}
|
|
|
|
func (curve *Koblitz256) Double(x1, y1 *big.Int) (*big.Int, *big.Int) {
|
|
p1, err := secp256k1.K256PointNew().SetBigInt(x1, y1)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
return p1.Double(p1).BigInt()
|
|
}
|
|
|
|
func (curve *Koblitz256) ScalarMult(Bx, By *big.Int, k []byte) (*big.Int, *big.Int) {
|
|
p1, err := secp256k1.K256PointNew().SetBigInt(Bx, By)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
var bytes [32]byte
|
|
copy(bytes[:], internal.ReverseScalarBytes(k))
|
|
s, err := fq.K256FqNew().SetBytes(&bytes)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
return p1.Mul(p1, s).BigInt()
|
|
}
|
|
|
|
func (curve *Koblitz256) ScalarBaseMult(k []byte) (*big.Int, *big.Int) {
|
|
var bytes [32]byte
|
|
copy(bytes[:], internal.ReverseScalarBytes(k))
|
|
s, err := fq.K256FqNew().SetBytes(&bytes)
|
|
if err != nil {
|
|
return nil, nil
|
|
}
|
|
p1 := secp256k1.K256PointNew().Generator()
|
|
return p1.Mul(p1, s).BigInt()
|
|
}
|
|
|
|
type ScalarK256 struct {
|
|
value *native.Field
|
|
}
|
|
|
|
type PointK256 struct {
|
|
value *native.EllipticPoint
|
|
}
|
|
|
|
func (s *ScalarK256) Random(reader io.Reader) Scalar {
|
|
if reader == nil {
|
|
return nil
|
|
}
|
|
var seed [64]byte
|
|
_, _ = reader.Read(seed[:])
|
|
return s.Hash(seed[:])
|
|
}
|
|
|
|
func (s *ScalarK256) Hash(bytes []byte) Scalar {
|
|
dst := []byte("secp256k1_XMD:SHA-256_SSWU_RO_")
|
|
xmd := native.ExpandMsgXmd(native.EllipticPointHasherSha256(), bytes, dst, 48)
|
|
var t [64]byte
|
|
copy(t[:48], internal.ReverseScalarBytes(xmd))
|
|
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().SetBytesWide(&t),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Zero() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().SetZero(),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) One() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().SetOne(),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) IsZero() bool {
|
|
return s.value.IsZero() == 1
|
|
}
|
|
|
|
func (s *ScalarK256) IsOne() bool {
|
|
return s.value.IsOne() == 1
|
|
}
|
|
|
|
func (s *ScalarK256) IsOdd() bool {
|
|
return s.value.Bytes()[0]&1 == 1
|
|
}
|
|
|
|
func (s *ScalarK256) IsEven() bool {
|
|
return s.value.Bytes()[0]&1 == 0
|
|
}
|
|
|
|
func (s *ScalarK256) New(value int) Scalar {
|
|
t := fq.K256FqNew()
|
|
v := big.NewInt(int64(value))
|
|
if value < 0 {
|
|
v.Mod(v, t.Params.BiModulus)
|
|
}
|
|
return &ScalarK256{
|
|
value: t.SetBigInt(v),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Cmp(rhs Scalar) int {
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
return s.value.Cmp(r.value)
|
|
} else {
|
|
return -2
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Square() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Square(s.value),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Double() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Double(s.value),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Invert() (Scalar, error) {
|
|
value, wasInverted := fq.K256FqNew().Invert(s.value)
|
|
if !wasInverted {
|
|
return nil, fmt.Errorf("inverse doesn't exist")
|
|
}
|
|
return &ScalarK256{
|
|
value,
|
|
}, nil
|
|
}
|
|
|
|
func (s *ScalarK256) Sqrt() (Scalar, error) {
|
|
value, wasSquare := fq.K256FqNew().Sqrt(s.value)
|
|
if !wasSquare {
|
|
return nil, fmt.Errorf("not a square")
|
|
}
|
|
return &ScalarK256{
|
|
value,
|
|
}, nil
|
|
}
|
|
|
|
func (s *ScalarK256) Cube() Scalar {
|
|
value := fq.K256FqNew().Mul(s.value, s.value)
|
|
value.Mul(value, s.value)
|
|
return &ScalarK256{
|
|
value,
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Add(rhs Scalar) Scalar {
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Add(s.value, r.value),
|
|
}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Sub(rhs Scalar) Scalar {
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Sub(s.value, r.value),
|
|
}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Mul(rhs Scalar) Scalar {
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Mul(s.value, r.value),
|
|
}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) MulAdd(y, z Scalar) Scalar {
|
|
return s.Mul(y).Add(z)
|
|
}
|
|
|
|
func (s *ScalarK256) Div(rhs Scalar) Scalar {
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
v, wasInverted := fq.K256FqNew().Invert(r.value)
|
|
if !wasInverted {
|
|
return nil
|
|
}
|
|
v.Mul(v, s.value)
|
|
return &ScalarK256{value: v}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) Neg() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Neg(s.value),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) SetBigInt(v *big.Int) (Scalar, error) {
|
|
if v == nil {
|
|
return nil, fmt.Errorf("'v' cannot be nil")
|
|
}
|
|
value := fq.K256FqNew().SetBigInt(v)
|
|
return &ScalarK256{
|
|
value,
|
|
}, nil
|
|
}
|
|
|
|
func (s *ScalarK256) BigInt() *big.Int {
|
|
return s.value.BigInt()
|
|
}
|
|
|
|
func (s *ScalarK256) Bytes() []byte {
|
|
t := s.value.Bytes()
|
|
return internal.ReverseScalarBytes(t[:])
|
|
}
|
|
|
|
func (s *ScalarK256) SetBytes(bytes []byte) (Scalar, error) {
|
|
if len(bytes) != 32 {
|
|
return nil, fmt.Errorf("invalid length")
|
|
}
|
|
var seq [32]byte
|
|
copy(seq[:], internal.ReverseScalarBytes(bytes))
|
|
value, err := fq.K256FqNew().SetBytes(&seq)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &ScalarK256{
|
|
value,
|
|
}, nil
|
|
}
|
|
|
|
func (s *ScalarK256) SetBytesWide(bytes []byte) (Scalar, error) {
|
|
if len(bytes) != 64 {
|
|
return nil, fmt.Errorf("invalid length")
|
|
}
|
|
var seq [64]byte
|
|
copy(seq[:], bytes)
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().SetBytesWide(&seq),
|
|
}, nil
|
|
}
|
|
|
|
func (s *ScalarK256) Point() Point {
|
|
return new(PointK256).Identity()
|
|
}
|
|
|
|
func (s *ScalarK256) Clone() Scalar {
|
|
return &ScalarK256{
|
|
value: fq.K256FqNew().Set(s.value),
|
|
}
|
|
}
|
|
|
|
func (s *ScalarK256) MarshalBinary() ([]byte, error) {
|
|
return scalarMarshalBinary(s)
|
|
}
|
|
|
|
func (s *ScalarK256) UnmarshalBinary(input []byte) error {
|
|
sc, err := scalarUnmarshalBinary(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ss, ok := sc.(*ScalarK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid scalar")
|
|
}
|
|
s.value = ss.value
|
|
return nil
|
|
}
|
|
|
|
func (s *ScalarK256) MarshalText() ([]byte, error) {
|
|
return scalarMarshalText(s)
|
|
}
|
|
|
|
func (s *ScalarK256) UnmarshalText(input []byte) error {
|
|
sc, err := scalarUnmarshalText(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ss, ok := sc.(*ScalarK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid scalar")
|
|
}
|
|
s.value = ss.value
|
|
return nil
|
|
}
|
|
|
|
func (s *ScalarK256) MarshalJSON() ([]byte, error) {
|
|
return scalarMarshalJson(s)
|
|
}
|
|
|
|
func (s *ScalarK256) UnmarshalJSON(input []byte) error {
|
|
sc, err := scalarUnmarshalJson(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
S, ok := sc.(*ScalarK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid type")
|
|
}
|
|
s.value = S.value
|
|
return nil
|
|
}
|
|
|
|
func (p *PointK256) Random(reader io.Reader) Point {
|
|
var seed [64]byte
|
|
_, _ = reader.Read(seed[:])
|
|
return p.Hash(seed[:])
|
|
}
|
|
|
|
func (p *PointK256) Hash(bytes []byte) Point {
|
|
value, err := secp256k1.K256PointNew().Hash(bytes, native.EllipticPointHasherSha256())
|
|
// TODO: change hash to return an error also
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
return &PointK256{value}
|
|
}
|
|
|
|
func (p *PointK256) Identity() Point {
|
|
return &PointK256{
|
|
value: secp256k1.K256PointNew().Identity(),
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) Generator() Point {
|
|
return &PointK256{
|
|
value: secp256k1.K256PointNew().Generator(),
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) IsIdentity() bool {
|
|
return p.value.IsIdentity()
|
|
}
|
|
|
|
func (p *PointK256) IsNegative() bool {
|
|
return p.value.GetY().Value[0]&1 == 1
|
|
}
|
|
|
|
func (p *PointK256) IsOnCurve() bool {
|
|
return p.value.IsOnCurve()
|
|
}
|
|
|
|
func (p *PointK256) Double() Point {
|
|
value := secp256k1.K256PointNew().Double(p.value)
|
|
return &PointK256{value}
|
|
}
|
|
|
|
func (p *PointK256) Scalar() Scalar {
|
|
return new(ScalarK256).Zero()
|
|
}
|
|
|
|
func (p *PointK256) Neg() Point {
|
|
value := secp256k1.K256PointNew().Neg(p.value)
|
|
return &PointK256{value}
|
|
}
|
|
|
|
func (p *PointK256) Add(rhs Point) Point {
|
|
if rhs == nil {
|
|
return nil
|
|
}
|
|
r, ok := rhs.(*PointK256)
|
|
if ok {
|
|
value := secp256k1.K256PointNew().Add(p.value, r.value)
|
|
return &PointK256{value}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) Sub(rhs Point) Point {
|
|
if rhs == nil {
|
|
return nil
|
|
}
|
|
r, ok := rhs.(*PointK256)
|
|
if ok {
|
|
value := secp256k1.K256PointNew().Sub(p.value, r.value)
|
|
return &PointK256{value}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) Mul(rhs Scalar) Point {
|
|
if rhs == nil {
|
|
return nil
|
|
}
|
|
r, ok := rhs.(*ScalarK256)
|
|
if ok {
|
|
value := secp256k1.K256PointNew().Mul(p.value, r.value)
|
|
return &PointK256{value}
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) Equal(rhs Point) bool {
|
|
r, ok := rhs.(*PointK256)
|
|
if ok {
|
|
return p.value.Equal(r.value) == 1
|
|
} else {
|
|
return false
|
|
}
|
|
}
|
|
|
|
func (p *PointK256) Set(x, y *big.Int) (Point, error) {
|
|
value, err := secp256k1.K256PointNew().SetBigInt(x, y)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &PointK256{value}, nil
|
|
}
|
|
|
|
func (p *PointK256) ToAffineCompressed() []byte {
|
|
var x [33]byte
|
|
x[0] = byte(2)
|
|
|
|
t := secp256k1.K256PointNew().ToAffine(p.value)
|
|
|
|
x[0] |= t.Y.Bytes()[0] & 1
|
|
|
|
xBytes := t.X.Bytes()
|
|
copy(x[1:], internal.ReverseScalarBytes(xBytes[:]))
|
|
return x[:]
|
|
}
|
|
|
|
func (p *PointK256) ToAffineUncompressed() []byte {
|
|
var out [65]byte
|
|
out[0] = byte(4)
|
|
t := secp256k1.K256PointNew().ToAffine(p.value)
|
|
arr := t.X.Bytes()
|
|
copy(out[1:33], internal.ReverseScalarBytes(arr[:]))
|
|
arr = t.Y.Bytes()
|
|
copy(out[33:], internal.ReverseScalarBytes(arr[:]))
|
|
return out[:]
|
|
}
|
|
|
|
func (p *PointK256) FromAffineCompressed(bytes []byte) (Point, error) {
|
|
var raw [native.FieldBytes]byte
|
|
if len(bytes) != 33 {
|
|
return nil, fmt.Errorf("invalid byte sequence")
|
|
}
|
|
sign := int(bytes[0])
|
|
if sign != 2 && sign != 3 {
|
|
return nil, fmt.Errorf("invalid sign byte")
|
|
}
|
|
sign &= 0x1
|
|
|
|
copy(raw[:], internal.ReverseScalarBytes(bytes[1:]))
|
|
x, err := fp.K256FpNew().SetBytes(&raw)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
value := secp256k1.K256PointNew().Identity()
|
|
rhs := fp.K256FpNew()
|
|
p.value.Arithmetic.RhsEq(rhs, x)
|
|
// test that rhs is quadratic residue
|
|
// if not, then this Point is at infinity
|
|
y, wasQr := fp.K256FpNew().Sqrt(rhs)
|
|
if wasQr {
|
|
// fix the sign
|
|
sigY := int(y.Bytes()[0] & 1)
|
|
if sigY != sign {
|
|
y.Neg(y)
|
|
}
|
|
value.X = x
|
|
value.Y = y
|
|
value.Z.SetOne()
|
|
}
|
|
return &PointK256{value}, nil
|
|
}
|
|
|
|
func (p *PointK256) FromAffineUncompressed(bytes []byte) (Point, error) {
|
|
var arr [native.FieldBytes]byte
|
|
if len(bytes) != 65 {
|
|
return nil, fmt.Errorf("invalid byte sequence")
|
|
}
|
|
if bytes[0] != 4 {
|
|
return nil, fmt.Errorf("invalid sign byte")
|
|
}
|
|
|
|
copy(arr[:], internal.ReverseScalarBytes(bytes[1:33]))
|
|
x, err := fp.K256FpNew().SetBytes(&arr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
copy(arr[:], internal.ReverseScalarBytes(bytes[33:]))
|
|
y, err := fp.K256FpNew().SetBytes(&arr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
value := secp256k1.K256PointNew()
|
|
value.X = x
|
|
value.Y = y
|
|
value.Z.SetOne()
|
|
return &PointK256{value}, nil
|
|
}
|
|
|
|
func (p *PointK256) CurveName() string {
|
|
return p.value.Params.Name
|
|
}
|
|
|
|
func (p *PointK256) SumOfProducts(points []Point, scalars []Scalar) Point {
|
|
nPoints := make([]*native.EllipticPoint, len(points))
|
|
nScalars := make([]*native.Field, len(scalars))
|
|
for i, pt := range points {
|
|
ptv, ok := pt.(*PointK256)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
nPoints[i] = ptv.value
|
|
}
|
|
for i, sc := range scalars {
|
|
s, ok := sc.(*ScalarK256)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
nScalars[i] = s.value
|
|
}
|
|
value := secp256k1.K256PointNew()
|
|
_, err := value.SumOfProducts(nPoints, nScalars)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return &PointK256{value}
|
|
}
|
|
|
|
func (p *PointK256) X() *native.Field {
|
|
return p.value.GetX()
|
|
}
|
|
|
|
func (p *PointK256) Y() *native.Field {
|
|
return p.value.GetY()
|
|
}
|
|
|
|
func (p *PointK256) Params() *elliptic.CurveParams {
|
|
return K256Curve().Params()
|
|
}
|
|
|
|
func (p *PointK256) MarshalBinary() ([]byte, error) {
|
|
return pointMarshalBinary(p)
|
|
}
|
|
|
|
func (p *PointK256) UnmarshalBinary(input []byte) error {
|
|
pt, err := pointUnmarshalBinary(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ppt, ok := pt.(*PointK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid point")
|
|
}
|
|
p.value = ppt.value
|
|
return nil
|
|
}
|
|
|
|
func (p *PointK256) MarshalText() ([]byte, error) {
|
|
return pointMarshalText(p)
|
|
}
|
|
|
|
func (p *PointK256) UnmarshalText(input []byte) error {
|
|
pt, err := pointUnmarshalText(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ppt, ok := pt.(*PointK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid point")
|
|
}
|
|
p.value = ppt.value
|
|
return nil
|
|
}
|
|
|
|
func (p *PointK256) MarshalJSON() ([]byte, error) {
|
|
return pointMarshalJSON(p)
|
|
}
|
|
|
|
func (p *PointK256) UnmarshalJSON(input []byte) error {
|
|
pt, err := pointUnmarshalJSON(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
P, ok := pt.(*PointK256)
|
|
if !ok {
|
|
return fmt.Errorf("invalid type")
|
|
}
|
|
p.value = P.value
|
|
return nil
|
|
}
|