mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-11 13:29:12 +00:00
- **refactor: remove unused auth components** - **refactor: improve devbox configuration and deployment process** - **refactor: improve devnet and testnet setup** - **fix: update templ version to v0.2.778** - **refactor: rename pkl/net.matrix to pkl/matrix.net** - **refactor: migrate webapp components to nebula** - **refactor: protobuf types** - **chore: update dependencies for improved security and stability** - **feat: implement landing page and vault gateway servers** - **refactor: Migrate data models to new module structure and update related files** - **feature/1121-implement-ucan-validation** - **refactor: Replace hardcoded constants with model types in attns.go** - **feature/1121-implement-ucan-validation** - **chore: add origin Host struct and update main function to handle multiple hosts** - **build: remove unused static files from dwn module** - **build: remove unused static files from dwn module** - **refactor: Move DWN models to common package** - **refactor: move models to pkg/common** - **refactor: move vault web app assets to embed module** - **refactor: update session middleware import path** - **chore: configure port labels and auto-forwarding behavior** - **feat: enhance devcontainer configuration** - **feat: Add UCAN middleware for Echo with flexible token validation** - **feat: add JWT middleware for UCAN authentication** - **refactor: update package URI and versioning in PklProject files** - **fix: correct sonr.pkl import path** - **refactor: move JWT related code to auth package** - **feat: introduce vault configuration retrieval and management** - **refactor: Move vault components to gateway module and update file paths** - **refactor: remove Dexie and SQLite database implementations** - **feat: enhance frontend with PWA features and WASM integration** - **feat: add Devbox features and streamline Dockerfile** - **chore: update dependencies to include TigerBeetle** - **chore(deps): update go version to 1.23** - **feat: enhance devnet setup with PATH environment variable and updated PWA manifest** - **fix: upgrade tigerbeetle-go dependency and remove indirect dependency** - **feat: add PostgreSQL support to devnet and testnet deployments** - **refactor: rename keyshare cookie to token cookie** - **feat: upgrade Go version to 1.23.3 and update dependencies** - **refactor: update devnet and testnet configurations** - **feat: add IPFS configuration for devnet** - **I'll help you update the ipfs.config.pkl to include all the peers from the shell script. Here's the updated configuration:** - **refactor: move mpc package to crypto directory** - **feat: add BIP32 support for various cryptocurrencies** - **feat: enhance ATN.pkl with additional capabilities** - **refactor: simplify smart account and vault attenuation creation** - **feat: add new capabilities to the Attenuation type** - **refactor: Rename MPC files for clarity and consistency** - **feat: add DIDKey support for cryptographic operations** - **feat: add devnet and testnet deployment configurations** - **fix: correct key derivation in bip32 package** - **refactor: rename crypto/bip32 package to crypto/accaddr** - **fix: remove duplicate indirect dependency** - **refactor: move vault package to root directory** - **refactor: update routes for gateway and vault** - **refactor: remove obsolete web configuration file** - **refactor: remove unused TigerBeetle imports and update host configuration** - **refactor: adjust styles directory path** - **feat: add broadcastTx and simulateTx functions to gateway** - **feat: add PinVault handler**
108 lines
2.9 KiB
Go
Executable File
108 lines
2.9 KiB
Go
Executable File
package native
|
|
|
|
import (
|
|
"hash"
|
|
|
|
"golang.org/x/crypto/sha3"
|
|
)
|
|
|
|
// OversizeDstSalt is the salt used to hash a dst over MaxDstLen
|
|
var OversizeDstSalt = []byte("H2C-OVERSIZE-DST-")
|
|
|
|
// MaxDstLen the max size for dst in hash to curve
|
|
const MaxDstLen = 255
|
|
|
|
func getDomainXmd(h hash.Hash, domain []byte) []byte {
|
|
var out []byte
|
|
if len(domain) > MaxDstLen {
|
|
h.Reset()
|
|
_, _ = h.Write(OversizeDstSalt)
|
|
_, _ = h.Write(domain)
|
|
out = h.Sum(nil)
|
|
} else {
|
|
out = domain
|
|
}
|
|
return out
|
|
}
|
|
|
|
func getDomainXof(h sha3.ShakeHash, domain []byte) []byte {
|
|
var out []byte
|
|
if len(domain) > MaxDstLen {
|
|
h.Reset()
|
|
_, _ = h.Write(OversizeDstSalt)
|
|
_, _ = h.Write(domain)
|
|
var tv [64]byte
|
|
_, _ = h.Read(tv[:])
|
|
out = tv[:]
|
|
} else {
|
|
out = domain
|
|
}
|
|
return out
|
|
}
|
|
|
|
// ExpandMsgXmd expands the msg with the domain to output a byte array
|
|
// with outLen in size using a fixed size hash.
|
|
// See https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-hash-to-curve-13#section-5.4.1
|
|
func ExpandMsgXmd(h *EllipticPointHasher, msg, domain []byte, outLen int) []byte {
|
|
domain = getDomainXmd(h.xmd, domain)
|
|
domainLen := byte(len(domain))
|
|
h.xmd.Reset()
|
|
// DST_prime = DST || I2OSP(len(DST), 1)
|
|
// b_0 = H(Z_pad || msg || l_i_b_str || I2OSP(0, 1) || DST_prime)
|
|
_, _ = h.xmd.Write(make([]byte, h.xmd.BlockSize()))
|
|
_, _ = h.xmd.Write(msg)
|
|
_, _ = h.xmd.Write([]byte{uint8(outLen >> 8), uint8(outLen)})
|
|
_, _ = h.xmd.Write([]byte{0})
|
|
_, _ = h.xmd.Write(domain)
|
|
_, _ = h.xmd.Write([]byte{domainLen})
|
|
b0 := h.xmd.Sum(nil)
|
|
|
|
// b_1 = H(b_0 || I2OSP(1, 1) || DST_prime)
|
|
h.xmd.Reset()
|
|
_, _ = h.xmd.Write(b0)
|
|
_, _ = h.xmd.Write([]byte{1})
|
|
_, _ = h.xmd.Write(domain)
|
|
_, _ = h.xmd.Write([]byte{domainLen})
|
|
b1 := h.xmd.Sum(nil)
|
|
|
|
// b_i = H(strxor(b_0, b_(i - 1)) || I2OSP(i, 1) || DST_prime)
|
|
ell := (outLen + h.xmd.Size() - 1) / h.xmd.Size()
|
|
bi := b1
|
|
out := make([]byte, outLen)
|
|
for i := 1; i < ell; i++ {
|
|
h.xmd.Reset()
|
|
// b_i = H(strxor(b_0, b_(i - 1)) || I2OSP(i, 1) || DST_prime)
|
|
tmp := make([]byte, h.xmd.Size())
|
|
for j := 0; j < h.xmd.Size(); j++ {
|
|
tmp[j] = b0[j] ^ bi[j]
|
|
}
|
|
_, _ = h.xmd.Write(tmp)
|
|
_, _ = h.xmd.Write([]byte{1 + uint8(i)})
|
|
_, _ = h.xmd.Write(domain)
|
|
_, _ = h.xmd.Write([]byte{domainLen})
|
|
|
|
// b_1 || ... || b_(ell - 1)
|
|
copy(out[(i-1)*h.xmd.Size():i*h.xmd.Size()], bi[:])
|
|
bi = h.xmd.Sum(nil)
|
|
}
|
|
// b_ell
|
|
copy(out[(ell-1)*h.xmd.Size():], bi[:])
|
|
return out[:outLen]
|
|
}
|
|
|
|
// ExpandMsgXof expands the msg with the domain to output a byte array
|
|
// with outLen in size using a xof hash
|
|
// See https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-hash-to-curve-13#section-5.4.2
|
|
func ExpandMsgXof(h *EllipticPointHasher, msg, domain []byte, outLen int) []byte {
|
|
domain = getDomainXof(h.xof, domain)
|
|
domainLen := byte(len(domain))
|
|
h.xof.Reset()
|
|
_, _ = h.xof.Write(msg)
|
|
_, _ = h.xof.Write([]byte{uint8(outLen >> 8), uint8(outLen)})
|
|
_, _ = h.xof.Write(domain)
|
|
_, _ = h.xof.Write([]byte{domainLen})
|
|
out := make([]byte, outLen)
|
|
_, _ = h.xof.Read(out)
|
|
return out
|
|
}
|