Permalink
Cannot retrieve contributors at this time
177 lines (147 sloc)
4.8 KB
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
nl-covid19-coronacheck-idemix/common/common.go /
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package common | |
| import ( | |
| "crypto/rand" | |
| "crypto/sha256" | |
| "encoding/asn1" | |
| "encoding/json" | |
| "fmt" | |
| gobig "math/big" | |
| "strconv" | |
| "github.com/go-errors/errors" | |
| "github.com/privacybydesign/gabi" | |
| "github.com/privacybydesign/gabi/big" | |
| ) | |
| var BigOne = big.NewInt(1) | |
| var GabiSystemParameters = gabi.DefaultSystemParameters[2048] | |
| var ProofVersionByteV2 byte = '2' | |
| var ProofVersionByteV3 byte = '3' | |
| var AttributeTypes = map[int][]string{ | |
| 2: { | |
| "isSpecimen", | |
| "isPaperProof", | |
| "validFrom", | |
| "validForHours", | |
| "firstNameInitial", | |
| "lastNameInitial", | |
| "birthDay", | |
| "birthMonth", | |
| }, | |
| 3: { | |
| "isSpecimen", | |
| "isPaperProof", | |
| "validFrom", | |
| "validForHours", | |
| "firstNameInitial", | |
| "lastNameInitial", | |
| "birthDay", | |
| "birthMonth", | |
| "category", | |
| }, | |
| } | |
| type CredentialMetadataSerialization struct { | |
| // CredentialVersion identifies the credential version, and is always a single byte | |
| CredentialVersion []byte | |
| // IssuerPkId identifies the public key to use for verification | |
| IssuerPkId string | |
| } | |
| type ProofSerializationV2 struct { | |
| DisclosureTimeSeconds int64 | |
| C *gobig.Int | |
| A *gobig.Int | |
| EResponse *gobig.Int | |
| VResponse *gobig.Int | |
| AResponse *gobig.Int | |
| ADisclosed []*gobig.Int | |
| } | |
| type ProofSerializationV3 struct { | |
| DisclosureTimeSeconds int64 | |
| C *gobig.Int | |
| A *gobig.Int | |
| EResponse *gobig.Int | |
| VResponse *gobig.Int | |
| AResponses []*gobig.Int | |
| ADisclosed []*gobig.Int | |
| } | |
| type FindIssuerPkFunc func(kid string) (pk *gabi.PublicKey, err error) | |
| type IssueSpecificationMessage struct { | |
| IssuerPkId string `json:"issuerPkId"` | |
| IssuerNonce *big.Int `json:"issuerNonce"` | |
| CredentialAmount int `json:"credentialAmount"` | |
| } | |
| type CreateCredentialMessage struct { | |
| IssueSignatureMessage *gabi.IssueSignatureMessage `json:"issueSignatureMessage"` | |
| Attributes [][]byte `json:"attributes"` | |
| } | |
| // RandomBigInt returns a random big integer value in the range | |
| // [0,(2^numBits)-1], inclusive. | |
| func RandomBigInt(numBits uint) *big.Int { | |
| t := new(big.Int).Lsh(BigOne, numBits) | |
| r, err := big.RandInt(rand.Reader, t) | |
| if err != nil { | |
| panic(fmt.Sprintf("big.RandInt failed: %v", err)) | |
| } | |
| return r | |
| } | |
| func GenerateNonce() *big.Int { | |
| return RandomBigInt(GabiSystemParameters.Lstatzk) | |
| } | |
| func ComputeAttributeInts(attributeTypes []string, attributes [][]byte) ([]*big.Int, error) { | |
| attributeAmount := len(attributes) | |
| if attributeAmount != len(attributeTypes)+1 { | |
| return nil, errors.New("Amount of attribute values don't match amount of attribute types") | |
| } | |
| // Compute attributes | |
| attrs := make([]*big.Int, attributeAmount) | |
| for i, val := range attributes { | |
| attrs[i] = new(big.Int) | |
| attrs[i].SetBytes(val) | |
| // The last bit distinguishes empty vs. optional attributes | |
| // Set it, to signify that these attributes are non-optional | |
| attrs[i].Lsh(attrs[i], 1) | |
| attrs[i].Add(attrs[i], big.NewInt(1)) | |
| } | |
| return attrs, nil | |
| } | |
| func DecodeAttributeInt(a *big.Int) []byte { | |
| attributeInt := new(big.Int).Set(a) | |
| // The last bit distinguishes empty vs. optional attributes | |
| if attributeInt.Bit(0) == 0 { | |
| // Optional attribute | |
| return []byte{} | |
| } else { | |
| // Empty attribute, right shift to get the actual value | |
| attributeInt.Rsh(attributeInt, 1) | |
| return attributeInt.Bytes() | |
| } | |
| } | |
| func CalculateTimeBasedChallenge(unixTimeSeconds int64) *big.Int { | |
| // Calculate the challenge as the sha256sum of the decimal string representation | |
| // of the given unix timestamp in seconds. Cut off to appropriate amount of bits | |
| timeBytes := []byte(strconv.FormatInt(unixTimeSeconds, 10)) | |
| timeHash := sha256.Sum256(timeBytes) | |
| challengeByteSize := GabiSystemParameters.Lstatzk / 8 | |
| return new(big.Int).SetBytes(timeHash[:challengeByteSize]) | |
| } | |
| func DecodeMetadataAttribute(metadataAttribute *big.Int) (credentialVersion int, issuerPkId string, attributeTypes []string, err error) { | |
| credentialMetadata := &CredentialMetadataSerialization{} | |
| attributeBytes := DecodeAttributeInt(metadataAttribute) | |
| _, err = asn1.Unmarshal(attributeBytes, credentialMetadata) | |
| if err != nil { | |
| return 0, "", nil, errors.WrapPrefix(err, "Could not unmarshal metadata attribute", 0) | |
| } | |
| credentialVersion = int(credentialMetadata.CredentialVersion[0]) | |
| attributeTypes, ok := AttributeTypes[credentialVersion] | |
| if !ok { | |
| return 0, "", nil, errors.WrapPrefix(err, "Credential version is not supported", 0) | |
| } | |
| return credentialVersion, credentialMetadata.IssuerPkId, attributeTypes, nil | |
| } | |
| // CalculateProofIdentifier calculates the sha256 digest of ProofD.C, truncated to 128 bits | |
| func CalculateProofIdentifier(proof *gabi.ProofD) []byte { | |
| proofDigest := sha256.Sum256(proof.C.Bytes()) | |
| return proofDigest[:16] | |
| } | |
| func DebugSerializableStruct(s interface{}) { | |
| str, _ := json.MarshalIndent(s, "", " ") | |
| fmt.Println(string(str)) | |
| } |