mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
- **refactor: remove unused auth components** - **refactor: improve devbox configuration and deployment process** - **refactor: improve devnet and testnet setup** - **fix: update templ version to v0.2.778** - **refactor: rename pkl/net.matrix to pkl/matrix.net** - **refactor: migrate webapp components to nebula** - **refactor: protobuf types** - **chore: update dependencies for improved security and stability** - **feat: implement landing page and vault gateway servers** - **refactor: Migrate data models to new module structure and update related files** - **feature/1121-implement-ucan-validation** - **refactor: Replace hardcoded constants with model types in attns.go** - **feature/1121-implement-ucan-validation** - **chore: add origin Host struct and update main function to handle multiple hosts** - **build: remove unused static files from dwn module** - **build: remove unused static files from dwn module** - **refactor: Move DWN models to common package** - **refactor: move models to pkg/common** - **refactor: move vault web app assets to embed module** - **refactor: update session middleware import path** - **chore: configure port labels and auto-forwarding behavior** - **feat: enhance devcontainer configuration** - **feat: Add UCAN middleware for Echo with flexible token validation** - **feat: add JWT middleware for UCAN authentication** - **refactor: update package URI and versioning in PklProject files** - **fix: correct sonr.pkl import path** - **refactor: move JWT related code to auth package** - **feat: introduce vault configuration retrieval and management** - **refactor: Move vault components to gateway module and update file paths** - **refactor: remove Dexie and SQLite database implementations** - **feat: enhance frontend with PWA features and WASM integration** - **feat: add Devbox features and streamline Dockerfile** - **chore: update dependencies to include TigerBeetle** - **chore(deps): update go version to 1.23** - **feat: enhance devnet setup with PATH environment variable and updated PWA manifest** - **fix: upgrade tigerbeetle-go dependency and remove indirect dependency** - **feat: add PostgreSQL support to devnet and testnet deployments** - **refactor: rename keyshare cookie to token cookie** - **feat: upgrade Go version to 1.23.3 and update dependencies** - **refactor: update devnet and testnet configurations** - **feat: add IPFS configuration for devnet** - **I'll help you update the ipfs.config.pkl to include all the peers from the shell script. Here's the updated configuration:** - **refactor: move mpc package to crypto directory** - **feat: add BIP32 support for various cryptocurrencies** - **feat: enhance ATN.pkl with additional capabilities** - **refactor: simplify smart account and vault attenuation creation** - **feat: add new capabilities to the Attenuation type** - **refactor: Rename MPC files for clarity and consistency** - **feat: add DIDKey support for cryptographic operations** - **feat: add devnet and testnet deployment configurations** - **fix: correct key derivation in bip32 package** - **refactor: rename crypto/bip32 package to crypto/accaddr** - **fix: remove duplicate indirect dependency** - **refactor: move vault package to root directory** - **refactor: update routes for gateway and vault** - **refactor: remove obsolete web configuration file** - **refactor: remove unused TigerBeetle imports and update host configuration** - **refactor: adjust styles directory path** - **feat: add broadcastTx and simulateTx functions to gateway** - **feat: add PinVault handler**
178 lines
4.4 KiB
Go
Executable File
178 lines
4.4 KiB
Go
Executable File
//
|
|
// Copyright Coinbase, Inc. All Rights Reserved.
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
package bbs
|
|
|
|
import (
|
|
crand "crypto/rand"
|
|
"crypto/sha256"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
|
|
"golang.org/x/crypto/hkdf"
|
|
"golang.org/x/crypto/sha3"
|
|
|
|
"github.com/onsonr/sonr/crypto/core/curves"
|
|
)
|
|
|
|
// SecretKey is a BBS+ signing key
|
|
type SecretKey struct {
|
|
value curves.PairingScalar
|
|
}
|
|
|
|
func NewSecretKey(curve *curves.PairingCurve) (*SecretKey, error) {
|
|
// The salt used with generating secret keys
|
|
// See section 2.3 from https://tools.ietf.org/html/draft-irtf-cfrg-bls-signature-04
|
|
const hkdfKeyGenSalt = "BLS-SIG-KEYGEN-SALT-"
|
|
const Size = 33
|
|
var ikm [Size]byte
|
|
cnt, err := crand.Read(ikm[:32])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if cnt != Size-1 {
|
|
return nil, fmt.Errorf("unable to read sufficient random data")
|
|
}
|
|
|
|
// https://tools.ietf.org/html/draft-irtf-cfrg-bls-signature-04#section-2.3
|
|
h := sha256.New()
|
|
n, err := h.Write([]byte(hkdfKeyGenSalt))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if n != len(hkdfKeyGenSalt) {
|
|
return nil, fmt.Errorf("incorrect salt bytes written to be hashed")
|
|
}
|
|
salt := h.Sum(nil)
|
|
|
|
// Leaves key_info parameter as the default empty string
|
|
// and just adds parameter I2OSP(L, 2)
|
|
kdf := hkdf.New(sha256.New, ikm[:], salt, []byte{0, 48})
|
|
var okm [64]byte
|
|
read, err := kdf.Read(okm[:48])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if read != 48 {
|
|
return nil, fmt.Errorf("failed to create secret key")
|
|
}
|
|
v, err := curve.Scalar.SetBytesWide(okm[:])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
value, ok := v.(curves.PairingScalar)
|
|
if !ok {
|
|
return nil, fmt.Errorf("invalid scalar")
|
|
}
|
|
return &SecretKey{
|
|
value: value.SetPoint(curve.PointG2),
|
|
}, nil
|
|
}
|
|
|
|
func NewKeys(curve *curves.PairingCurve) (*PublicKey, *SecretKey, error) {
|
|
sk, err := NewSecretKey(curve)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
return sk.PublicKey(), sk, nil
|
|
}
|
|
|
|
func (sk *SecretKey) Init(curve *curves.PairingCurve) *SecretKey {
|
|
sk.value = curve.NewScalar()
|
|
return sk
|
|
}
|
|
|
|
func (sk SecretKey) MarshalBinary() ([]byte, error) {
|
|
return sk.value.Bytes(), nil
|
|
}
|
|
|
|
func (sk *SecretKey) UnmarshalBinary(in []byte) error {
|
|
value, err := sk.value.SetBytes(in)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var ok bool
|
|
sk.value, ok = value.(curves.PairingScalar)
|
|
if !ok {
|
|
return errors.New("incorrect type conversion")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Sign generates a new signature where all messages are known to the signer
|
|
func (sk *SecretKey) Sign(generators *MessageGenerators, msgs []curves.Scalar) (*Signature, error) {
|
|
if generators.length < len(msgs) {
|
|
return nil, fmt.Errorf("not enough message generators")
|
|
}
|
|
if len(msgs) < 1 {
|
|
return nil, fmt.Errorf("invalid messages")
|
|
}
|
|
if sk.value.IsZero() {
|
|
return nil, fmt.Errorf("invalid secret key")
|
|
}
|
|
|
|
drbg := sha3.NewShake256()
|
|
_, _ = drbg.Write(sk.value.Bytes())
|
|
addDeterministicNonceData(generators, msgs, drbg)
|
|
// Should yield non-zero values for `e` and `s`, very small likelihood of being zero
|
|
e := getNonZeroScalar(sk.value, drbg)
|
|
s := getNonZeroScalar(sk.value, drbg)
|
|
b := computeB(s, msgs, generators)
|
|
exp, err := e.Add(sk.value).Invert()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &Signature{
|
|
a: b.Mul(exp).(curves.PairingPoint),
|
|
e: e,
|
|
s: s,
|
|
}, nil
|
|
}
|
|
|
|
// PublicKey returns the corresponding public key
|
|
func (sk *SecretKey) PublicKey() *PublicKey {
|
|
return &PublicKey{
|
|
value: sk.value.Point().Generator().Mul(sk.value).(curves.PairingPoint),
|
|
}
|
|
}
|
|
|
|
// computes g1 + s * h0 + msgs[0] * h[0] + msgs[1] * h[1] ...
|
|
func computeB(s curves.Scalar, msgs []curves.Scalar, generators *MessageGenerators) curves.PairingPoint {
|
|
nMsgs := len(msgs)
|
|
points := make([]curves.Point, nMsgs+2)
|
|
points[1] = generators.Get(0)
|
|
points[0] = points[1].Generator()
|
|
|
|
scalars := make([]curves.Scalar, nMsgs+2)
|
|
scalars[0] = msgs[0].One()
|
|
scalars[1] = s
|
|
for i, m := range msgs {
|
|
points[i+2] = generators.Get(i + 1)
|
|
scalars[i+2] = m
|
|
}
|
|
pt := points[0].SumOfProducts(points, scalars)
|
|
return pt.(curves.PairingPoint)
|
|
}
|
|
|
|
func addDeterministicNonceData(generators *MessageGenerators, msgs []curves.Scalar, drbg io.Writer) {
|
|
for i := 0; i <= generators.length; i++ {
|
|
_, _ = drbg.Write(generators.Get(i).ToAffineUncompressed())
|
|
}
|
|
for _, m := range msgs {
|
|
_, _ = drbg.Write(m.Bytes())
|
|
}
|
|
}
|
|
|
|
func getNonZeroScalar(sc curves.Scalar, reader io.Reader) curves.Scalar {
|
|
// Should yield non-zero values for `e` and `s`, very small likelihood of being zero
|
|
e := sc.Random(reader)
|
|
for e.IsZero() {
|
|
e = sc.Random(reader)
|
|
}
|
|
return e
|
|
}
|