mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* refactor: update import paths in gateway handlers * refactor: remove obsolete devtools Makefile and README * build: optimize build process for improved efficiency * refactor: remove obsolete pkl files related to Matrix and Sonr network configurations * refactor: move embed code to x/dwn/types
180 lines
4.0 KiB
Go
180 lines
4.0 KiB
Go
package mpc
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/ecdsa"
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/onsonr/sonr/internal/crypto/core/curves"
|
|
"github.com/onsonr/sonr/internal/crypto/keys"
|
|
"golang.org/x/crypto/sha3"
|
|
)
|
|
|
|
// keyEnclave implements the Enclave interface
|
|
type keyEnclave struct {
|
|
// Serialized fields
|
|
Addr string `json:"address"`
|
|
PubPoint curves.Point `json:"-"`
|
|
PubBytes []byte `json:"pub_key"`
|
|
ValShare Message `json:"val_share"`
|
|
UserShare Message `json:"user_share"`
|
|
|
|
// Extra fields
|
|
nonce []byte
|
|
}
|
|
|
|
func newEnclave(valShare, userShare Message, nonce []byte) (Enclave, error) {
|
|
pubPoint, err := getAlicePubPoint(valShare)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
addr, err := computeSonrAddr(pubPoint)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &keyEnclave{
|
|
Addr: addr,
|
|
PubPoint: pubPoint,
|
|
ValShare: valShare,
|
|
UserShare: userShare,
|
|
nonce: nonce,
|
|
}, nil
|
|
}
|
|
|
|
// Address returns the Sonr address of the keyEnclave
|
|
func (k *keyEnclave) Address() string {
|
|
return k.Addr
|
|
}
|
|
|
|
// DID returns the DID of the keyEnclave
|
|
func (k *keyEnclave) DID() keys.DID {
|
|
return keys.NewFromPubKey(k.PubKey())
|
|
}
|
|
|
|
// Export returns encrypted enclave data
|
|
func (k *keyEnclave) Export(key []byte) ([]byte, error) {
|
|
data, err := k.Serialize()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to serialize enclave: %w", err)
|
|
}
|
|
|
|
hashedKey := hashKey(key)
|
|
block, err := aes.NewCipher(hashedKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
aesgcm, err := cipher.NewGCM(block)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return aesgcm.Seal(nil, k.nonce, data, nil), nil
|
|
}
|
|
|
|
// Import decrypts and loads enclave data
|
|
func (k *keyEnclave) Import(data []byte, key []byte) error {
|
|
hashedKey := hashKey(key)
|
|
block, err := aes.NewCipher(hashedKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
aesgcm, err := cipher.NewGCM(block)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
decrypted, err := aesgcm.Open(nil, k.nonce, data, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return k.Unmarshal(decrypted)
|
|
}
|
|
|
|
// IsValid returns true if the keyEnclave is valid
|
|
func (k *keyEnclave) IsValid() bool {
|
|
return k.PubPoint != nil && k.ValShare != nil && k.UserShare != nil && k.Addr != ""
|
|
}
|
|
|
|
// PubKey returns the public key of the keyEnclave
|
|
func (k *keyEnclave) PubKey() keys.PubKey {
|
|
return keys.NewPubKey(k.PubPoint)
|
|
}
|
|
|
|
// Refresh returns a new keyEnclave
|
|
func (k *keyEnclave) Refresh() (Enclave, error) {
|
|
refreshFuncVal, err := valRefreshFunc(k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
refreshFuncUser, err := userRefreshFunc(k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ExecuteRefresh(refreshFuncVal, refreshFuncUser, k.nonce)
|
|
}
|
|
|
|
// Sign returns the signature of the data
|
|
func (k *keyEnclave) Sign(data []byte) ([]byte, error) {
|
|
userSign, err := userSignFunc(k, data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
valSign, err := valSignFunc(k, data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ExecuteSigning(valSign, userSign)
|
|
}
|
|
|
|
// Verify returns true if the signature is valid
|
|
func (k *keyEnclave) Verify(data []byte, sig []byte) (bool, error) {
|
|
edSig, err := deserializeSignature(sig)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
ePub, err := getEcdsaPoint(k.PubPoint.ToAffineUncompressed())
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
pk := &ecdsa.PublicKey{
|
|
Curve: ePub.Curve,
|
|
X: ePub.X,
|
|
Y: ePub.Y,
|
|
}
|
|
|
|
// Hash the message using SHA3-256
|
|
hash := sha3.New256()
|
|
hash.Write(data)
|
|
digest := hash.Sum(nil)
|
|
|
|
return ecdsa.Verify(pk, digest, edSig.R, edSig.S), nil
|
|
}
|
|
|
|
// Marshal returns the JSON encoding of keyEnclave
|
|
func (k *keyEnclave) Serialize() ([]byte, error) {
|
|
// Store compressed public point bytes before marshaling
|
|
k.PubBytes = k.PubPoint.ToAffineCompressed()
|
|
return json.Marshal(k)
|
|
}
|
|
|
|
// Unmarshal parses the JSON-encoded data and stores the result
|
|
func (k *keyEnclave) Unmarshal(data []byte) error {
|
|
if err := json.Unmarshal(data, k); err != nil {
|
|
return err
|
|
}
|
|
// Reconstruct Point from bytes
|
|
curve := curves.K256()
|
|
point, err := curve.NewIdentityPoint().FromAffineCompressed(k.PubBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
k.PubPoint = point
|
|
return nil
|
|
}
|