mirror of https://github.com/certusone/dc4bc.git
136 lines
4.1 KiB
Go
136 lines
4.1 KiB
Go
package airgapped
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/corestario/kyber/pairing"
|
|
|
|
"github.com/corestario/kyber/sign/bls"
|
|
"github.com/corestario/kyber/sign/tbls"
|
|
client "github.com/depools/dc4bc/client/types"
|
|
"github.com/depools/dc4bc/fsm/state_machines/signing_proposal_fsm"
|
|
"github.com/depools/dc4bc/fsm/types/requests"
|
|
"github.com/depools/dc4bc/fsm/types/responses"
|
|
)
|
|
|
|
func (am *AirgappedMachine) handleStateSigningAwaitConfirmations(o *client.Operation) error {
|
|
var (
|
|
payload responses.SigningProposalParticipantInvitationsResponse
|
|
err error
|
|
)
|
|
|
|
if err = json.Unmarshal(o.Payload, &payload); err != nil {
|
|
return fmt.Errorf("failed to unmarshal payload: %w", err)
|
|
}
|
|
|
|
participantID, err := am.getParticipantID(o.DKGIdentifier)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get paricipant id: %w", err)
|
|
}
|
|
req := requests.SigningProposalParticipantRequest{
|
|
SigningId: payload.SigningId,
|
|
ParticipantId: participantID,
|
|
CreatedAt: o.CreatedAt,
|
|
}
|
|
reqBz, err := json.Marshal(req)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to generate fsm request: %w", err)
|
|
}
|
|
|
|
o.Event = signing_proposal_fsm.EventConfirmSigningConfirmation
|
|
o.ResultMsgs = append(o.ResultMsgs, createMessage(*o, reqBz))
|
|
return nil
|
|
}
|
|
|
|
func (am *AirgappedMachine) handleStateSigningAwaitPartialSigns(o *client.Operation) error {
|
|
var (
|
|
payload responses.SigningPartialSignsParticipantInvitationsResponse
|
|
err error
|
|
)
|
|
|
|
if err = json.Unmarshal(o.Payload, &payload); err != nil {
|
|
return fmt.Errorf("failed to unmarshal payload: %w", err)
|
|
}
|
|
|
|
partialSign, err := am.createPartialSign(payload.SrcPayload, o.DKGIdentifier)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create partialSign for msg: %w", err)
|
|
}
|
|
|
|
participantID, err := am.getParticipantID(o.DKGIdentifier)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get paricipant id: %w", err)
|
|
}
|
|
req := requests.SigningProposalPartialSignRequest{
|
|
SigningId: payload.SigningId,
|
|
ParticipantId: participantID,
|
|
PartialSign: partialSign,
|
|
CreatedAt: o.CreatedAt,
|
|
}
|
|
reqBz, err := json.Marshal(req)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to generate fsm request: %w", err)
|
|
}
|
|
|
|
o.Event = signing_proposal_fsm.EventSigningPartialSignReceived
|
|
o.ResultMsgs = append(o.ResultMsgs, createMessage(*o, reqBz))
|
|
return nil
|
|
}
|
|
|
|
func (am *AirgappedMachine) reconstructThresholdSignature(o *client.Operation) error {
|
|
var (
|
|
payload responses.SigningProcessParticipantResponse
|
|
err error
|
|
)
|
|
|
|
if err = json.Unmarshal(o.Payload, &payload); err != nil {
|
|
return fmt.Errorf("failed to unmarshal payload: %w", err)
|
|
}
|
|
|
|
partialSignatures := make([][]byte, 0, len(payload.Participants))
|
|
for _, participant := range payload.Participants {
|
|
partialSignatures = append(partialSignatures, participant.PartialSign)
|
|
}
|
|
|
|
dkgInstance, ok := am.dkgInstances[o.DKGIdentifier]
|
|
if !ok {
|
|
return fmt.Errorf("dkg instance with identifier %s does not exist", o.DKGIdentifier)
|
|
}
|
|
|
|
reconstructedSignature, err := am.recoverFullSign(payload.SrcPayload, partialSignatures, dkgInstance.Threshold,
|
|
dkgInstance.N, o.DKGIdentifier)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to reconsruct full signature for msg: %w", err)
|
|
}
|
|
fmt.Println(reconstructedSignature)
|
|
return nil
|
|
}
|
|
|
|
func (am *AirgappedMachine) createPartialSign(msg []byte, dkgIdentifier string) ([]byte, error) {
|
|
blsKeyring, err := am.loadBLSKeyring(dkgIdentifier)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to load blsKeyring: %w", err)
|
|
}
|
|
|
|
return tbls.Sign(am.suite.(pairing.Suite), blsKeyring.Share, msg)
|
|
}
|
|
|
|
func (am *AirgappedMachine) recoverFullSign(msg []byte, sigShares [][]byte, t, n int, dkgIdentifier string) ([]byte, error) {
|
|
blsKeyring, err := am.loadBLSKeyring(dkgIdentifier)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to load blsKeyring: %w", err)
|
|
}
|
|
|
|
return tbls.Recover(am.suite.(pairing.Suite), blsKeyring.PubPoly, msg, sigShares, t, n)
|
|
}
|
|
|
|
func (am *AirgappedMachine) verifySign(msg []byte, fullSignature []byte, dkgIdentifier string) error {
|
|
blsKeyring, err := am.loadBLSKeyring(dkgIdentifier)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to load blsKeyring: %w", err)
|
|
}
|
|
|
|
return bls.Verify(am.suite.(pairing.Suite), blsKeyring.PubPoly.Commit(), msg, fullSignature)
|
|
}
|