rwadurian/backend/mpc-system/pkg/tss/signing.go

436 lines
11 KiB
Go

package tss
import (
"context"
"encoding/json"
"errors"
"fmt"
"math/big"
"strings"
"sync"
"time"
"github.com/bnb-chain/tss-lib/v2/common"
"github.com/bnb-chain/tss-lib/v2/ecdsa/keygen"
"github.com/bnb-chain/tss-lib/v2/ecdsa/signing"
"github.com/bnb-chain/tss-lib/v2/tss"
)
var (
ErrSigningTimeout = errors.New("signing timeout")
ErrSigningFailed = errors.New("signing failed")
ErrInvalidSignerCount = errors.New("invalid signer count")
ErrInvalidShareData = errors.New("invalid share data")
)
// SigningResult contains the result of a signing operation
type SigningResult struct {
// Signature is the full ECDSA signature (R || S)
Signature []byte
// R is the R component of the signature
R *big.Int
// S is the S component of the signature
S *big.Int
// RecoveryID is the recovery ID for ecrecover
RecoveryID int
}
// SigningParty represents a party participating in signing
type SigningParty struct {
PartyID string
PartyIndex int
}
// SigningConfig contains configuration for signing
type SigningConfig struct {
Threshold int // t in t-of-n (number of signers required)
TotalSigners int // Number of parties participating in this signing
Timeout time.Duration // Signing timeout
}
// SigningSession manages a signing session for a single party
type SigningSession struct {
config SigningConfig
selfParty SigningParty
allParties []SigningParty
messageHash *big.Int
saveData *keygen.LocalPartySaveData
tssPartyIDs []*tss.PartyID
selfTSSID *tss.PartyID
params *tss.Parameters
localParty tss.Party
outCh chan tss.Message
endCh chan *common.SignatureData
errCh chan error
msgHandler MessageHandler
mu sync.Mutex
started bool
}
// NewSigningSession creates a new signing session
func NewSigningSession(
config SigningConfig,
selfParty SigningParty,
allParties []SigningParty,
messageHash []byte,
saveDataBytes []byte,
msgHandler MessageHandler,
) (*SigningSession, error) {
if config.TotalSigners < config.Threshold {
return nil, ErrInvalidSignerCount
}
if len(allParties) != config.TotalSigners {
return nil, ErrInvalidSignerCount
}
// Deserialize save data
var saveData keygen.LocalPartySaveData
if err := json.Unmarshal(saveDataBytes, &saveData); err != nil {
return nil, fmt.Errorf("%w: %v", ErrInvalidShareData, err)
}
// Create TSS party IDs for signers
tssPartyIDs := make([]*tss.PartyID, len(allParties))
var selfTSSID *tss.PartyID
for i, p := range allParties {
partyID := tss.NewPartyID(
p.PartyID,
fmt.Sprintf("party-%d", p.PartyIndex),
big.NewInt(int64(p.PartyIndex+1)),
)
tssPartyIDs[i] = partyID
if p.PartyID == selfParty.PartyID {
selfTSSID = partyID
}
}
if selfTSSID == nil {
return nil, errors.New("self party not found in all parties")
}
// Sort party IDs
sortedPartyIDs := tss.SortPartyIDs(tssPartyIDs)
// Create peer context and parameters
peerCtx := tss.NewPeerContext(sortedPartyIDs)
params := tss.NewParameters(tss.S256(), peerCtx, selfTSSID, len(sortedPartyIDs), config.Threshold)
// Convert message hash to big.Int
msgHash := new(big.Int).SetBytes(messageHash)
return &SigningSession{
config: config,
selfParty: selfParty,
allParties: allParties,
messageHash: msgHash,
saveData: &saveData,
tssPartyIDs: sortedPartyIDs,
selfTSSID: selfTSSID,
params: params,
outCh: make(chan tss.Message, config.TotalSigners*10),
endCh: make(chan *common.SignatureData, 1),
errCh: make(chan error, 1),
msgHandler: msgHandler,
}, nil
}
// Start begins the signing protocol
func (s *SigningSession) Start(ctx context.Context) (*SigningResult, error) {
s.mu.Lock()
if s.started {
s.mu.Unlock()
return nil, errors.New("session already started")
}
s.started = true
s.mu.Unlock()
// Create local party for signing
s.localParty = signing.NewLocalParty(s.messageHash, s.params, *s.saveData, s.outCh, s.endCh)
// Start the local party
go func() {
if err := s.localParty.Start(); err != nil {
s.errCh <- err
}
}()
// Handle outgoing messages
go s.handleOutgoingMessages(ctx)
// Handle incoming messages
go s.handleIncomingMessages(ctx)
// Wait for completion or timeout
timeout := s.config.Timeout
if timeout == 0 {
timeout = 5 * time.Minute
}
select {
case <-ctx.Done():
return nil, ctx.Err()
case <-time.After(timeout):
return nil, ErrSigningTimeout
case tssErr := <-s.errCh:
return nil, fmt.Errorf("%w: %v", ErrSigningFailed, tssErr)
case signData := <-s.endCh:
return s.buildResult(signData)
}
}
func (s *SigningSession) handleOutgoingMessages(ctx context.Context) {
for {
select {
case <-ctx.Done():
return
case msg := <-s.outCh:
if msg == nil {
return
}
msgBytes, _, err := msg.WireBytes()
if err != nil {
continue
}
var toParties []string
isBroadcast := msg.IsBroadcast()
if !isBroadcast {
for _, to := range msg.GetTo() {
toParties = append(toParties, to.Id)
}
}
if err := s.msgHandler.SendMessage(ctx, isBroadcast, toParties, msgBytes); err != nil {
continue
}
}
}
}
func (s *SigningSession) handleIncomingMessages(ctx context.Context) {
msgCh := s.msgHandler.ReceiveMessages()
for {
select {
case <-ctx.Done():
return
case msg, ok := <-msgCh:
if !ok {
return
}
// Parse the message
parsedMsg, err := tss.ParseWireMessage(msg.MsgBytes, s.tssPartyIDs[msg.FromPartyIndex], msg.IsBroadcast)
if err != nil {
continue
}
// Update the party
go func() {
ok, err := s.localParty.Update(parsedMsg)
if err != nil {
s.errCh <- err
}
_ = ok
}()
}
}
}
func (s *SigningSession) buildResult(signData *common.SignatureData) (*SigningResult, error) {
// Get R and S as big.Int
r := new(big.Int).SetBytes(signData.R)
rS := new(big.Int).SetBytes(signData.S)
// Build full signature (R || S)
signature := make([]byte, 64)
rBytes := signData.R
sBytes := signData.S
// Pad to 32 bytes each
copy(signature[32-len(rBytes):32], rBytes)
copy(signature[64-len(sBytes):64], sBytes)
// Calculate recovery ID
recoveryID := int(signData.SignatureRecovery[0])
return &SigningResult{
Signature: signature,
R: r,
S: rS,
RecoveryID: recoveryID,
}, nil
}
// LocalSigningResult contains local signing result for standalone testing
type LocalSigningResult struct {
Signature []byte
R *big.Int
S *big.Int
RecoveryID int
}
// RunLocalSigning runs signing locally with all parties in the same process (for testing)
func RunLocalSigning(
threshold int,
keygenResults []*LocalKeygenResult,
messageHash []byte,
) (*LocalSigningResult, error) {
signerCount := len(keygenResults)
if signerCount < threshold {
return nil, ErrInvalidSignerCount
}
// Create party IDs for signers using their ORIGINAL party indices from keygen
// This is critical for subset signing - party IDs must match the original keygen party IDs
partyIDs := make([]*tss.PartyID, signerCount)
for i, result := range keygenResults {
idx := result.PartyIndex
partyIDs[i] = tss.NewPartyID(
fmt.Sprintf("party-%d", idx),
fmt.Sprintf("party-%d", idx),
big.NewInt(int64(idx+1)),
)
}
sortedPartyIDs := tss.SortPartyIDs(partyIDs)
peerCtx := tss.NewPeerContext(sortedPartyIDs)
// Convert message hash to big.Int
msgHash := new(big.Int).SetBytes(messageHash)
// Create channels for each party
outChs := make([]chan tss.Message, signerCount)
endChs := make([]chan *common.SignatureData, signerCount)
parties := make([]tss.Party, signerCount)
// Map sorted party IDs back to keygen results
sortedKeygenResults := make([]*LocalKeygenResult, signerCount)
for i, pid := range sortedPartyIDs {
for _, result := range keygenResults {
expectedID := fmt.Sprintf("party-%d", result.PartyIndex)
if pid.Id == expectedID {
sortedKeygenResults[i] = result
break
}
}
}
for i := 0; i < signerCount; i++ {
outChs[i] = make(chan tss.Message, signerCount*10)
endChs[i] = make(chan *common.SignatureData, 1)
params := tss.NewParameters(tss.S256(), peerCtx, sortedPartyIDs[i], signerCount, threshold)
parties[i] = signing.NewLocalParty(msgHash, params, *sortedKeygenResults[i].SaveData, outChs[i], endChs[i])
}
// Start all parties
var wg sync.WaitGroup
errCh := make(chan error, signerCount)
for i := 0; i < signerCount; i++ {
wg.Add(1)
go func(idx int) {
defer wg.Done()
if err := parties[idx].Start(); err != nil {
errCh <- err
}
}(i)
}
// Route messages between parties
var routeWg sync.WaitGroup
doneCh := make(chan struct{})
for i := 0; i < signerCount; i++ {
routeWg.Add(1)
go func(idx int) {
defer routeWg.Done()
for {
select {
case <-doneCh:
return
case msg := <-outChs[idx]:
if msg == nil {
return
}
dest := msg.GetTo()
if msg.IsBroadcast() {
for j := 0; j < signerCount; j++ {
if j != idx {
go updateSignParty(parties[j], msg, errCh)
}
}
} else {
for _, d := range dest {
for j := 0; j < signerCount; j++ {
if sortedPartyIDs[j].Id == d.Id {
go updateSignParty(parties[j], msg, errCh)
break
}
}
}
}
}
}
}(i)
}
// Collect first result (all parties should produce same signature)
var result *LocalSigningResult
for i := 0; i < signerCount; i++ {
select {
case signData := <-endChs[i]:
if result == nil {
r := new(big.Int).SetBytes(signData.R)
rS := new(big.Int).SetBytes(signData.S)
signature := make([]byte, 64)
copy(signature[32-len(signData.R):32], signData.R)
copy(signature[64-len(signData.S):64], signData.S)
result = &LocalSigningResult{
Signature: signature,
R: r,
S: rS,
RecoveryID: int(signData.SignatureRecovery[0]),
}
}
case err := <-errCh:
close(doneCh)
return nil, err
case <-time.After(5 * time.Minute):
close(doneCh)
return nil, ErrSigningTimeout
}
}
close(doneCh)
return result, nil
}
func updateSignParty(party tss.Party, msg tss.Message, errCh chan error) {
bytes, routing, err := msg.WireBytes()
if err != nil {
errCh <- err
return
}
parsedMsg, err := tss.ParseWireMessage(bytes, msg.GetFrom(), routing.IsBroadcast)
if err != nil {
errCh <- err
return
}
if _, err := party.Update(parsedMsg); err != nil {
// Only send error if it's not a duplicate message error
if err.Error() != "" && !isSignDuplicateMessageError(err) {
errCh <- err
}
}
}
// isSignDuplicateMessageError checks if an error is a duplicate message error
func isSignDuplicateMessageError(err error) bool {
if err == nil {
return false
}
errStr := err.Error()
return strings.Contains(errStr, "duplicate") || strings.Contains(errStr, "already received")
}