Functional prd/pcd

This commit is contained in:
Sosthene 2024-09-23 16:11:46 +02:00 committed by Nicolas Cantu
parent 4801be3b2f
commit fbdcf1eb99
4 changed files with 227 additions and 133 deletions

View File

@ -3,7 +3,7 @@ use tsify::Tsify;
use uuid::Uuid;
use wasm_bindgen::prelude::*;
use sp_client::spclient::SpWallet;
use sp_client::{bitcoin::{hashes::Hash, OutPoint, Txid}, spclient::SpWallet};
use crate::pcd::Member;
@ -11,7 +11,7 @@ use crate::pcd::Member;
#[tsify(into_wasm_abi, from_wasm_abi)]
pub struct Device {
sp_wallet: SpWallet,
pairing_process_uuid: Option<String>,
pairing_process_commitment: Option<Txid>,
paired_member: Option<Member>,
}
@ -19,7 +19,7 @@ impl Device {
pub fn new(sp_wallet: SpWallet) -> Self {
Self {
sp_wallet,
pairing_process_uuid: None,
pairing_process_commitment: None,
paired_member: None,
}
}
@ -32,16 +32,26 @@ impl Device {
&mut self.sp_wallet
}
pub fn is_linking(&self) -> bool {
match self.pairing_process_commitment {
Some(ref value) => value.as_raw_hash().as_byte_array().iter().all(|&b| b == 0),
None => false,
}
}
pub fn is_linked(&self) -> bool {
self.pairing_process_uuid.is_some()
match self.pairing_process_commitment {
Some(ref value) => !value.as_raw_hash().as_byte_array().iter().all(|&b| b == 0),
None => false,
}
}
pub fn get_process_uuid(&self) -> Option<String> {
self.pairing_process_uuid.clone()
pub fn get_process_commitment(&self) -> Option<Txid> {
self.pairing_process_commitment.clone()
}
pub fn pair(&mut self, uuid: Uuid, member: Member) {
self.pairing_process_uuid = Some(uuid.to_string());
pub fn pair(&mut self, commitment_tx: Txid, member: Member) {
self.pairing_process_commitment = Some(commitment_tx);
self.paired_member = Some(member);
}

View File

@ -1,4 +1,4 @@
use std::{collections::{HashMap, HashSet}, str::FromStr};
use std::{collections::HashSet, str::FromStr};
use anyhow::{Result, Error};
use aes_gcm::{aead::{Aead, Payload}, AeadCore, Aes256Gcm, KeyInit};
@ -69,61 +69,68 @@ impl AnkPcdHash {
}
pub trait Pcd<'a>: Serialize + Deserialize<'a> {
fn hash(&self) -> AnkPcdHash {
fn tagged_hash(&self) -> AnkPcdHash {
AnkPcdHash::from_value(&self.to_value())
}
fn encrypt_fields(&self, fields2keys: &mut Map<String, Value>, fields2cipher: &mut Map<String, Value>) -> Result<()> {
let as_value = self.to_value();
let as_map = as_value.as_object().unwrap();
let as_map = as_value.as_object().ok_or_else(|| Error::msg("Expected object"))?;
let mut rng = thread_rng();
for (key, value) in as_map {
let aes_key: [u8; 32] = Aes256Gcm::generate_key(&mut rng).into();
let nonce: [u8; 12] = Aes256Gcm::generate_nonce(&mut rng).into();
fields2keys.insert(key.to_owned(), Value::String(aes_key.to_lower_hex_string()));
let encryption = Aes256Gcm::new(&aes_key.into());
for (field, value) in as_map {
let aes_key = Aes256Gcm::generate_key(&mut rng);
let nonce = Aes256Gcm::generate_nonce(&mut rng);
fields2keys.insert(field.to_owned(), Value::String(aes_key.to_lower_hex_string()));
let encrypt_eng = Aes256Gcm::new(&aes_key);
let value_string = value.to_string();
let payload = Payload {
msg: value_string.as_bytes(),
aad: AAD,
};
let cipher = encryption.encrypt(&nonce.into(), payload)
.map_err(|e| Error::msg(format!("{}", e)))?;
let cipher = encrypt_eng.encrypt(&nonce, payload)
.map_err(|e| Error::msg(format!("Encryption failed for field {}: {}", field, e)))?;
let mut res = Vec::with_capacity(nonce.len() + cipher.len());
res.extend_from_slice(&nonce);
res.extend_from_slice(&cipher);
fields2cipher.insert(key.to_owned(), Value::String(res.to_lower_hex_string()));
fields2cipher.insert(field.to_owned(), Value::String(res.to_lower_hex_string()));
}
Ok(())
}
fn decrypt_fields(&mut self, fields2keys: &Map<String, Value>) -> Result<()> {
let as_value = self.to_value();
let as_map = as_value.as_object().unwrap();
for (key, value) in as_map {
if let Some(aes_key) = fields2keys.get(key) {
let mut nonce = [0u8; 12];
let mut key_buf = [0u8; 32];
key_buf.copy_from_slice(&Vec::from_hex(&aes_key.to_string().trim_matches('\"'))?);
let decrypt = Aes256Gcm::new(&key_buf.into());
let raw_cipher = Vec::from_hex(&value.to_string().trim_matches('\"'))?;
nonce.copy_from_slice(&raw_cipher[..12]);
fn decrypt_fields(&self, fields2keys: &Map<String, Value>, fields2plain: &mut Map<String, Value>) -> Result<()> {
let value = self.to_value();
let map = value.as_object().unwrap();
for (field, encrypted_value) in map.iter() {
if let Some(aes_key) = fields2keys.get(field) {
let key_buf = Vec::from_hex(&aes_key.to_string().trim_matches('\"'))?;
let decrypt_eng = Aes256Gcm::new(key_buf.as_slice().into());
let raw_cipher = Vec::from_hex(&encrypted_value.as_str().ok_or_else(|| Error::msg("Expected string"))?.trim_matches('\"'))?;
if raw_cipher.len() < 28 {
return Err(Error::msg(format!("Invalid ciphertext length for field {}", field)));
}
let payload = Payload {
msg: &raw_cipher[12..],
aad: AAD,
};
let plain = decrypt.decrypt(&nonce.into(), payload)
.map_err(|_| Error::msg(format!("Failed to decrypt field {}", key)))?;
self.to_value()
.as_object_mut()
.unwrap()
.insert(key.to_owned(), Value::String(plain.to_lower_hex_string()));
let plain = decrypt_eng.decrypt(raw_cipher[..12].into(), payload)
.map_err(|_| Error::msg(format!("Failed to decrypt field {}", field)))?;
let decrypted_value: String = String::from_utf8(plain)?;
fields2plain.insert(field.to_owned(), Value::String(decrypted_value));
} else {
continue;
fields2plain.insert(field.to_owned(), Value::Null);
}
}
@ -176,8 +183,51 @@ pub struct RoleDefinition {
pub validation_rules: Vec<ValidationRule>,
}
// #[derive(Debug, Clone, Serialize, Deserialize, Tsify)]
// #[tsify(into_wasm_abi, from_wasm_abi)]
// pub struct Roles {
// pub roles: HashMap<String, RoleDefinition>
// }
pub fn compare_maps(map1: &Map<String, Value>, map2: &Map<String, Value>) -> bool {
// First, check if both maps have the same keys
if map1.keys().collect::<Vec<&String>>() != map2.keys().collect::<Vec<&String>>() {
return false;
}
// Then, check if the corresponding values have the same type
for key in map1.keys() {
let value1 = map1.get(key).unwrap();
let value2 = map2.get(key).unwrap();
if !compare_values(value1, value2) {
return false;
}
}
true
}
fn compare_values(value1: &Value, value2: &Value) -> bool {
if value1.is_null() && value2.is_null() {
return true;
} else if value1.is_boolean() && value2.is_boolean() {
return true;
} else if value1.is_number() && value2.is_number() {
return true;
} else if value1.is_string() && value2.is_string() {
return true;
} else if value1.is_array() && value2.is_array() {
return compare_arrays(value1.as_array().unwrap(), value2.as_array().unwrap());
} else if value1.is_object() && value2.is_object() {
// Recursive comparison for nested objects
return compare_maps(value1.as_object().unwrap(), value2.as_object().unwrap());
} else {
return false;
}
}
fn compare_arrays(array1: &Vec<Value>, array2: &Vec<Value>) -> bool {
// Compare the type of each element in the arrays
for (elem1, elem2) in array1.iter().zip(array2.iter()) {
if !compare_values(elem1, elem2) {
return false;
}
}
true
}

View File

@ -5,81 +5,29 @@ use anyhow::{Result, Error};
use serde::{Serialize, Deserialize};
use serde_json::{Map, Value};
use sp_client::bitcoin::hex::FromHex;
use sp_client::bitcoin::secp256k1::SecretKey;
use sp_client::bitcoin::XOnlyPublicKey;
use sp_client::bitcoin::{OutPoint, XOnlyPublicKey};
use sp_client::silentpayments::utils::SilentPaymentAddress;
use sp_client::spclient::SpWallet;
use sp_client::bitcoin::secp256k1::schnorr::Signature;
use sp_client::bitcoin::hashes::{sha256t_hash_newtype, Hash, HashEngine};
use tsify::Tsify;
use uuid::Uuid;
use crate::pcd::{AnkPcdHash, Member};
use crate::signature::{Proof};
use crate::pcd::{AnkPcdHash, Member, Pcd};
use crate::signature::{AnkHash, AnkMessageHash, Proof};
#[derive(Debug, Default, Clone, Serialize, Deserialize, Tsify)]
#[derive(Debug, Default, Clone, PartialEq, Serialize, Deserialize, Tsify)]
#[tsify(into_wasm_abi, from_wasm_abi)]
#[allow(non_camel_case_types)]
pub enum PrdType {
#[default]
None,
Message,
Init, // Create a new process
Update, // Update an existing process
List, // request a list of items
Response,
Confirm,
}
sha256t_hash_newtype! {
pub struct AnkValidationYesTag = hash_str("4nk/yes");
#[hash_newtype(forward)]
pub struct AnkValidationYesHash(_);
}
impl AnkValidationYesHash {
pub fn from_value(value: &Value) -> Self {
let mut eng = AnkValidationYesHash::engine();
eng.input(value.to_string().as_bytes());
AnkValidationYesHash::from_engine(eng)
}
pub fn from_map(map: &Map<String, Value>) -> Self {
let value = Value::Object(map.clone());
let mut eng = AnkValidationYesHash::engine();
eng.input(value.to_string().as_bytes());
AnkValidationYesHash::from_engine(eng)
}
}
sha256t_hash_newtype! {
pub struct AnkValidationNoTag = hash_str("4nk/no");
#[hash_newtype(forward)]
pub struct AnkValidationNoHash(_);
}
impl AnkValidationNoHash {
pub fn from_value(value: &Value) -> Self {
let mut eng = AnkValidationNoHash::engine();
eng.input(value.to_string().as_bytes());
AnkValidationNoHash::from_engine(eng)
}
pub fn from_map(map: &Map<String, Value>) -> Self {
let value = Value::Object(map.clone());
let mut eng = AnkValidationNoHash::engine();
eng.input(value.to_string().as_bytes());
AnkValidationNoHash::from_engine(eng)
}
}
#[derive(Debug, Clone, Serialize, Deserialize, Tsify)]
pub struct ValidationToken {
member: Member,
message: [u8; 32],
sigs: Vec<Signature>, // User must sign with the requested number of devices
TxProposal, // Send a psbt asking for recipient signature, used for login not sure about other use cases
}
sha256t_hash_newtype! {
@ -104,45 +52,78 @@ impl AnkPrdHash {
}
}
#[derive(Debug, Clone, Serialize, Deserialize, Tsify)]
#[derive(Debug, Clone, PartialEq, Serialize, Deserialize, Tsify)]
#[tsify(into_wasm_abi, from_wasm_abi)]
#[allow(non_camel_case_types)]
pub struct Prd {
pub prd_type: PrdType,
pub process_uuid: String, // stringification of Uuid
pub root_commitment: String,
pub sender: String,
pub keys: Map<String, Value>, // key is a key in pcd, value is the key to decrypt it
pub validation_tokens: Vec<ValidationToken>,
pub pcd_commitment: String,
pub validation_tokens: Vec<Proof>,
pub payload: String, // Payload depends on the actual type
pub proof: Option<Proof>, // This must be None up to the creation of the network message
}
impl Prd {
pub fn new(
prd_type: PrdType,
uuid: Uuid,
sender: String,
pub fn new_update(
root_commitment: OutPoint,
sender: String, // Should take Member as argument
encrypted_pcd: Map<String, Value>,
keys: Map<String, Value>
) -> Result<Self> {
let res = Self {
prd_type,
process_uuid: uuid.to_string(),
) -> Self {
Self {
prd_type: PrdType::Update,
root_commitment: root_commitment.to_string(),
sender,
validation_tokens: vec![],
keys,
pcd_commitment: AnkPcdHash::from_map(&encrypted_pcd).to_string(),
payload: Value::Object(encrypted_pcd).to_string(),
proof: None,
};
Ok(res)
}
}
pub fn extract_from_message(plain: &[u8], commitment: [u8; 32]) -> Result<Self> {
pub fn new_response(
root_commitment: OutPoint,
sender: String,
validation_token: Proof,
pcd_commitment: AnkPcdHash,
) -> Self {
Self {
prd_type: PrdType::Response,
root_commitment: root_commitment.to_string(),
sender,
validation_tokens: vec![validation_token],
keys: Map::new(),
payload: pcd_commitment.to_string(),
proof: None,
}
}
pub fn new_confirm(
root_commitment: OutPoint,
sender: Member,
pcd_commitment: AnkPcdHash,
) -> Self {
Self {
prd_type: PrdType::Confirm,
root_commitment: root_commitment.to_string(),
sender: serde_json::to_string(&sender).unwrap(),
validation_tokens: vec![],
keys: Map::new(),
payload: pcd_commitment.to_string(),
proof: None,
}
}
fn _extract_from_message(plain: &[u8], commitment: Option<&AnkPrdHash>) -> Result<Self> {
let prd: Prd = serde_json::from_slice(plain)?;
// check that the hash of the prd is consistent with what's commited in the op_return
if prd.create_commitment().to_byte_array() != commitment {
return Err(anyhow::Error::msg("Received prd is not what was commited in the transaction"));
if let Some(commitment) = commitment {
// check that the hash of the prd is consistent with what's commited in the op_return
if prd.create_commitment() != *commitment {
return Err(anyhow::Error::msg("Received prd is not what was commited in the transaction"));
}
}
// check that the proof is consistent
let sender: Member = serde_json::from_str(&prd.sender)?;
@ -167,15 +148,17 @@ impl Prd {
}
proof.verify()?;
}
// check that the commitment outpoint is valid, just in case
OutPoint::from_str(&prd.root_commitment)?;
Ok(prd)
}
pub fn add_validation_token(&mut self, validation_token: ValidationToken) -> Result<()> {
match self.prd_type {
PrdType::Confirm => self.validation_tokens.push(validation_token),
_ => return Err(Error::msg("This Prd type doesn't allow validation tokens"))
}
Ok(())
pub fn extract_from_message(plain: &[u8]) -> Result<Self> {
Self::_extract_from_message(plain, None)
}
pub fn extract_from_message_with_commitment(plain: &[u8], commitment: &AnkPrdHash) -> Result<Self> {
Self::_extract_from_message(plain, Some(commitment))
}
pub fn filter_keys(&mut self, to_keep: HashSet<String>) {
@ -193,14 +176,22 @@ impl Prd {
let mut to_commit = self.clone();
to_commit.keys = Map::new();
to_commit.proof = None;
if to_commit.payload.len() != 64 && Vec::from_hex(&to_commit.payload).is_err() {
to_commit.payload = Value::from_str(&to_commit.payload).unwrap().tagged_hash().to_string();
}
AnkPrdHash::from_value(&to_commit.to_value())
}
/// Generate the signed proof and serialize to send over the network
pub fn to_network_msg(&self, sp_wallet: &SpWallet) -> Result<String> {
let spend_sk: SecretKey = sp_wallet.get_client().get_spend_key().try_into()?;
let to_sign = self.to_string(); // we sign the whole prd, incl the keys, for each recipient
let proof = Proof::new(to_sign.as_bytes(), spend_sk);
let to_sign = self.clone(); // we sign the whole prd, incl the keys, for each recipient
let message_hash = AnkHash::Message(AnkMessageHash::from_message(to_sign.to_string().as_bytes()));
let proof = Proof::new(message_hash, spend_sk);
let mut res = self.clone();
res.proof = Some(proof);

View File

@ -6,11 +6,23 @@ use sp_client::bitcoin::secp256k1::schnorr::Signature;
use sp_client::bitcoin::secp256k1::{Keypair, Message, SecretKey, XOnlyPublicKey};
use sp_client::bitcoin::hashes::{sha256t_hash_newtype, Hash, HashEngine};
use crate::pcd::AnkPcdHash;
sha256t_hash_newtype! {
pub struct AnkMessageTag = hash_str("4nk/Message");
#[hash_newtype(forward)]
pub struct AnkMessageHash(_);
pub struct AnkValidationYesTag = hash_str("4nk/yes");
#[hash_newtype(forward)]
pub struct AnkValidationYesHash(_);
pub struct AnkValidationNoTag = hash_str("4nk/no");
#[hash_newtype(forward)]
pub struct AnkValidationNoHash(_);
}
impl AnkMessageHash {
@ -21,17 +33,48 @@ impl AnkMessageHash {
}
}
#[derive(Debug, Clone, Copy, Serialize, Deserialize)]
impl AnkValidationYesHash {
pub fn from_commitment(commitment: AnkPcdHash) -> Self {
let mut eng = AnkValidationYesHash::engine();
eng.input(&commitment.to_byte_array());
AnkValidationYesHash::from_engine(eng)
}
}
impl AnkValidationNoHash {
pub fn from_commitment(commitment: AnkPcdHash) -> Self {
let mut eng = AnkValidationNoHash::engine();
eng.input(&commitment.to_byte_array());
AnkValidationNoHash::from_engine(eng)
}
}
#[derive(Debug, Clone, Copy, PartialEq, Serialize, Deserialize)]
pub enum AnkHash {
Message(AnkMessageHash),
ValidationYes(AnkValidationYesHash),
ValidationNo(AnkValidationNoHash),
}
impl AnkHash {
pub fn to_byte_array(&self) -> [u8; 32] {
match self {
AnkHash::Message(hash) => hash.to_byte_array(),
AnkHash::ValidationYes(hash) => hash.to_byte_array(),
AnkHash::ValidationNo(hash) => hash.to_byte_array(),
}
}
}
#[derive(Debug, Clone, Copy, PartialEq, Serialize, Deserialize)]
pub struct Proof {
signature: Signature,
message: AnkMessageHash,
message: AnkHash,
key: XOnlyPublicKey
}
impl Proof {
pub fn new(message: &[u8], signing_key: SecretKey) -> Self {
let message_hash = AnkMessageHash::from_message(message);
pub fn new(message_hash: AnkHash, signing_key: SecretKey) -> Self {
let secp = Secp256k1::signing_only();
let keypair = Keypair::from_secret_key(&secp, &signing_key);