mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
- **feat: add documentation and GitHub Actions workflow for publishing documentation** - **docs(concepts): add documentation for chain modules** - **refactor: Simplify session management with SQLite storage and remove deprecated code** - **refactor: Simplify database initialization and remove DatabaseContext** - **refactor: move connection handling logic to resolver package** - **feat: implement session management with database persistence** - **feat: Ensure config directory exists when creating database path** - **feat: Add SetUserHandle function to set user handle in session** - **feat: Add public methods to set session fields with database save** - **refactor: Remove unused session setter functions** - **feat: Add getter methods for all Session Model properties** - **feat: enhance Session model with user name details** - **feat: add Motr support and update UI elements** - **<no value>** - **feat: Add unique handle constraint and method to check handle existence** - **docs: update site URL to onsonr.dev** - **fix: correct import statement for database package** - **test: updated CI to run tests on pull requests and merge groups** - **docs: remove reference to develop branch in workflow** - **feat: add WebAuthn support for user registration** - **fix: correct smart account attenuation preset name** - **feat: add ComputeIssuerDID and ComputeSonrAddr functions to ucan package** - **test: add unit tests for MPC keyset and keyshare** - **feat: introduce new script to streamline GitHub issue creation**
151 lines
3.3 KiB
Go
151 lines
3.3 KiB
Go
package mpc
|
|
|
|
import (
|
|
"errors"
|
|
|
|
"github.com/cosmos/cosmos-sdk/types/bech32"
|
|
"github.com/onsonr/sonr/crypto/core/curves"
|
|
"github.com/onsonr/sonr/crypto/core/protocol"
|
|
"github.com/onsonr/sonr/crypto/tecdsa/dklsv1"
|
|
"golang.org/x/crypto/sha3"
|
|
)
|
|
|
|
var ErrInvalidKeyshareRole = errors.New("invalid keyshare role")
|
|
|
|
type Role int
|
|
|
|
const (
|
|
RoleUnknown Role = iota
|
|
RoleUser
|
|
RoleValidator
|
|
)
|
|
|
|
func (r Role) IsUser() bool {
|
|
return r == RoleUser
|
|
}
|
|
|
|
func (r Role) IsValidator() bool {
|
|
return r == RoleValidator
|
|
}
|
|
|
|
// Message is the protocol.Message that is used for MPC
|
|
type Message *protocol.Message
|
|
|
|
type Signature *curves.EcdsaSignature
|
|
|
|
// RefreshFunc is the type for the refresh function
|
|
type RefreshFunc interface {
|
|
protocol.Iterator
|
|
}
|
|
|
|
// SignFunc is the type for the sign function
|
|
type SignFunc interface {
|
|
protocol.Iterator
|
|
}
|
|
|
|
type ValKeyshare struct {
|
|
BaseKeyshare
|
|
encoded string
|
|
}
|
|
|
|
func computeSonrAddr(pk []byte) (string, error) {
|
|
sonrAddr, err := bech32.ConvertAndEncode("idx", pk)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return sonrAddr, nil
|
|
}
|
|
|
|
func NewValKeyshare(msg *protocol.Message) (*ValKeyshare, error) {
|
|
vks := new(ValKeyshare)
|
|
encoded, err := protocol.EncodeMessage(msg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
valShare, err := dklsv1.DecodeAliceDkgResult(msg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
vks.BaseKeyshare = initFromAlice(valShare, msg)
|
|
vks.encoded = encoded
|
|
return vks, nil
|
|
}
|
|
|
|
func (v *ValKeyshare) RefreshFunc() (RefreshFunc, error) {
|
|
curve := curves.K256()
|
|
return dklsv1.NewAliceRefresh(curve, v.ExtractMessage(), protocol.Version1)
|
|
}
|
|
|
|
func (v *ValKeyshare) SignFunc(msg []byte) (SignFunc, error) {
|
|
curve := curves.K256()
|
|
return dklsv1.NewAliceSign(curve, sha3.New256(), msg, v.ExtractMessage(), protocol.Version1)
|
|
}
|
|
|
|
func (v *ValKeyshare) String() string {
|
|
return v.encoded
|
|
}
|
|
|
|
// PublicKey returns the uncompressed public key (65 bytes)
|
|
func (v *ValKeyshare) PublicKey() []byte {
|
|
return v.UncompressedPubKey
|
|
}
|
|
|
|
// CompressedPublicKey returns the compressed public key (33 bytes)
|
|
func (v *ValKeyshare) CompressedPublicKey() []byte {
|
|
return v.CompressedPubKey
|
|
}
|
|
|
|
type UserKeyshare struct {
|
|
BaseKeyshare
|
|
encoded string
|
|
}
|
|
|
|
func NewUserKeyshare(msg *protocol.Message) (*UserKeyshare, error) {
|
|
uks := new(UserKeyshare)
|
|
encoded, err := protocol.EncodeMessage(msg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
out, err := dklsv1.DecodeBobDkgResult(msg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
uks.BaseKeyshare = initFromBob(out, msg)
|
|
uks.encoded = encoded
|
|
return uks, nil
|
|
}
|
|
|
|
func (u *UserKeyshare) RefreshFunc() (RefreshFunc, error) {
|
|
curve := curves.K256()
|
|
return dklsv1.NewBobRefresh(curve, u.ExtractMessage(), protocol.Version1)
|
|
}
|
|
|
|
func (u *UserKeyshare) SignFunc(msg []byte) (SignFunc, error) {
|
|
curve := curves.K256()
|
|
return dklsv1.NewBobSign(curve, sha3.New256(), msg, u.ExtractMessage(), protocol.Version1)
|
|
}
|
|
|
|
func (u *UserKeyshare) String() string {
|
|
return u.encoded
|
|
}
|
|
|
|
// PublicKey returns the uncompressed public key (65 bytes)
|
|
func (u *UserKeyshare) PublicKey() []byte {
|
|
return u.UncompressedPubKey
|
|
}
|
|
|
|
// CompressedPublicKey returns the compressed public key (33 bytes)
|
|
func (u *UserKeyshare) CompressedPublicKey() []byte {
|
|
return u.CompressedPubKey
|
|
}
|
|
|
|
func encodeMessage(m *protocol.Message) (string, error) {
|
|
return protocol.EncodeMessage(m)
|
|
}
|
|
|
|
func decodeMessage(s string) (*protocol.Message, error) {
|
|
return protocol.DecodeMessage(s)
|
|
}
|