forked from anza-xyz/agave
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[zk-sdk] Add
pod
module (anza-xyz#1169)
- Loading branch information
1 parent
fadfa61
commit e621336
Showing
9 changed files
with
592 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
//! Plain Old Data types for the AES128-GCM-SIV authenticated encryption scheme. | ||
#[cfg(not(target_os = "solana"))] | ||
use crate::{encryption::auth_encryption::AeCiphertext, errors::AuthenticatedEncryptionError}; | ||
use { | ||
crate::encryption::{pod::impl_from_str, AE_CIPHERTEXT_LEN}, | ||
base64::{prelude::BASE64_STANDARD, Engine}, | ||
bytemuck::{Pod, Zeroable}, | ||
std::fmt, | ||
}; | ||
|
||
/// Maximum length of a base64 encoded authenticated encryption ciphertext | ||
const AE_CIPHERTEXT_MAX_BASE64_LEN: usize = 48; | ||
|
||
/// The `AeCiphertext` type as a `Pod`. | ||
#[derive(Clone, Copy, PartialEq, Eq)] | ||
#[repr(transparent)] | ||
pub struct PodAeCiphertext(pub(crate) [u8; AE_CIPHERTEXT_LEN]); | ||
|
||
// `PodAeCiphertext` is a wrapper type for a byte array, which is both `Pod` and `Zeroable`. However, | ||
// the marker traits `bytemuck::Pod` and `bytemuck::Zeroable` can only be derived for power-of-two | ||
// length byte arrays. Directly implement these traits for `PodAeCiphertext`. | ||
unsafe impl Zeroable for PodAeCiphertext {} | ||
unsafe impl Pod for PodAeCiphertext {} | ||
|
||
impl fmt::Debug for PodAeCiphertext { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{:?}", self.0) | ||
} | ||
} | ||
|
||
impl fmt::Display for PodAeCiphertext { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{}", BASE64_STANDARD.encode(self.0)) | ||
} | ||
} | ||
|
||
impl_from_str!( | ||
TYPE = PodAeCiphertext, | ||
BYTES_LEN = AE_CIPHERTEXT_LEN, | ||
BASE64_LEN = AE_CIPHERTEXT_MAX_BASE64_LEN | ||
); | ||
|
||
impl Default for PodAeCiphertext { | ||
fn default() -> Self { | ||
Self::zeroed() | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl From<AeCiphertext> for PodAeCiphertext { | ||
fn from(decoded_ciphertext: AeCiphertext) -> Self { | ||
Self(decoded_ciphertext.to_bytes()) | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl TryFrom<PodAeCiphertext> for AeCiphertext { | ||
type Error = AuthenticatedEncryptionError; | ||
|
||
fn try_from(pod_ciphertext: PodAeCiphertext) -> Result<Self, Self::Error> { | ||
Self::from_bytes(&pod_ciphertext.0).ok_or(AuthenticatedEncryptionError::Deserialization) | ||
} | ||
} | ||
|
||
#[cfg(test)] | ||
mod tests { | ||
use {super::*, crate::encryption::auth_encryption::AeKey, std::str::FromStr}; | ||
|
||
#[test] | ||
fn ae_ciphertext_fromstr() { | ||
let ae_key = AeKey::new_rand(); | ||
let expected_ae_ciphertext: PodAeCiphertext = ae_key.encrypt(0_u64).into(); | ||
|
||
let ae_ciphertext_base64_str = format!("{}", expected_ae_ciphertext); | ||
let computed_ae_ciphertext = PodAeCiphertext::from_str(&ae_ciphertext_base64_str).unwrap(); | ||
|
||
assert_eq!(expected_ae_ciphertext, computed_ae_ciphertext); | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,173 @@ | ||
//! Plain Old Data types for the ElGamal encryption scheme. | ||
use { | ||
crate::encryption::{ | ||
pod::impl_from_str, DECRYPT_HANDLE_LEN, ELGAMAL_CIPHERTEXT_LEN, ELGAMAL_PUBKEY_LEN, | ||
}, | ||
base64::{prelude::BASE64_STANDARD, Engine}, | ||
bytemuck::{Pod, Zeroable}, | ||
std::fmt, | ||
}; | ||
#[cfg(not(target_os = "solana"))] | ||
use { | ||
crate::{ | ||
encryption::elgamal::{DecryptHandle, ElGamalCiphertext, ElGamalPubkey}, | ||
errors::ElGamalError, | ||
}, | ||
curve25519_dalek::ristretto::CompressedRistretto, | ||
}; | ||
|
||
/// Maximum length of a base64 encoded ElGamal public key | ||
const ELGAMAL_PUBKEY_MAX_BASE64_LEN: usize = 44; | ||
|
||
/// Maximum length of a base64 encoded ElGamal ciphertext | ||
const ELGAMAL_CIPHERTEXT_MAX_BASE64_LEN: usize = 88; | ||
|
||
/// The `ElGamalCiphertext` type as a `Pod`. | ||
#[derive(Clone, Copy, Pod, Zeroable, PartialEq, Eq)] | ||
#[repr(transparent)] | ||
pub struct PodElGamalCiphertext(pub(crate) [u8; ELGAMAL_CIPHERTEXT_LEN]); | ||
|
||
impl fmt::Debug for PodElGamalCiphertext { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{:?}", self.0) | ||
} | ||
} | ||
|
||
impl fmt::Display for PodElGamalCiphertext { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{}", BASE64_STANDARD.encode(self.0)) | ||
} | ||
} | ||
|
||
impl Default for PodElGamalCiphertext { | ||
fn default() -> Self { | ||
Self::zeroed() | ||
} | ||
} | ||
|
||
impl_from_str!( | ||
TYPE = PodElGamalCiphertext, | ||
BYTES_LEN = ELGAMAL_CIPHERTEXT_LEN, | ||
BASE64_LEN = ELGAMAL_CIPHERTEXT_MAX_BASE64_LEN | ||
); | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl From<ElGamalCiphertext> for PodElGamalCiphertext { | ||
fn from(decoded_ciphertext: ElGamalCiphertext) -> Self { | ||
Self(decoded_ciphertext.to_bytes()) | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl TryFrom<PodElGamalCiphertext> for ElGamalCiphertext { | ||
type Error = ElGamalError; | ||
|
||
fn try_from(pod_ciphertext: PodElGamalCiphertext) -> Result<Self, Self::Error> { | ||
Self::from_bytes(&pod_ciphertext.0).ok_or(ElGamalError::CiphertextDeserialization) | ||
} | ||
} | ||
|
||
/// The `ElGamalPubkey` type as a `Pod`. | ||
#[derive(Clone, Copy, Default, Pod, Zeroable, PartialEq, Eq)] | ||
#[repr(transparent)] | ||
pub struct PodElGamalPubkey(pub(crate) [u8; ELGAMAL_PUBKEY_LEN]); | ||
|
||
impl fmt::Debug for PodElGamalPubkey { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{:?}", self.0) | ||
} | ||
} | ||
|
||
impl fmt::Display for PodElGamalPubkey { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{}", BASE64_STANDARD.encode(self.0)) | ||
} | ||
} | ||
|
||
impl_from_str!( | ||
TYPE = PodElGamalPubkey, | ||
BYTES_LEN = ELGAMAL_PUBKEY_LEN, | ||
BASE64_LEN = ELGAMAL_PUBKEY_MAX_BASE64_LEN | ||
); | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl From<ElGamalPubkey> for PodElGamalPubkey { | ||
fn from(decoded_pubkey: ElGamalPubkey) -> Self { | ||
Self(decoded_pubkey.into()) | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl TryFrom<PodElGamalPubkey> for ElGamalPubkey { | ||
type Error = ElGamalError; | ||
|
||
fn try_from(pod_pubkey: PodElGamalPubkey) -> Result<Self, Self::Error> { | ||
Self::try_from(pod_pubkey.0.as_slice()) | ||
} | ||
} | ||
|
||
/// The `DecryptHandle` type as a `Pod`. | ||
#[derive(Clone, Copy, Default, Pod, Zeroable, PartialEq, Eq)] | ||
#[repr(transparent)] | ||
pub struct PodDecryptHandle(pub(crate) [u8; DECRYPT_HANDLE_LEN]); | ||
|
||
impl fmt::Debug for PodDecryptHandle { | ||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { | ||
write!(f, "{:?}", self.0) | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl From<DecryptHandle> for PodDecryptHandle { | ||
fn from(decoded_handle: DecryptHandle) -> Self { | ||
Self(decoded_handle.to_bytes()) | ||
} | ||
} | ||
|
||
// For proof verification, interpret pod::DecryptHandle as CompressedRistretto | ||
#[cfg(not(target_os = "solana"))] | ||
impl From<PodDecryptHandle> for CompressedRistretto { | ||
fn from(pod_handle: PodDecryptHandle) -> Self { | ||
Self(pod_handle.0) | ||
} | ||
} | ||
|
||
#[cfg(not(target_os = "solana"))] | ||
impl TryFrom<PodDecryptHandle> for DecryptHandle { | ||
type Error = ElGamalError; | ||
|
||
fn try_from(pod_handle: PodDecryptHandle) -> Result<Self, Self::Error> { | ||
Self::from_bytes(&pod_handle.0).ok_or(ElGamalError::CiphertextDeserialization) | ||
} | ||
} | ||
|
||
#[cfg(test)] | ||
mod tests { | ||
use {super::*, crate::encryption::elgamal::ElGamalKeypair, std::str::FromStr}; | ||
|
||
#[test] | ||
fn elgamal_pubkey_fromstr() { | ||
let elgamal_keypair = ElGamalKeypair::new_rand(); | ||
let expected_elgamal_pubkey: PodElGamalPubkey = (*elgamal_keypair.pubkey()).into(); | ||
|
||
let elgamal_pubkey_base64_str = format!("{}", expected_elgamal_pubkey); | ||
let computed_elgamal_pubkey = | ||
PodElGamalPubkey::from_str(&elgamal_pubkey_base64_str).unwrap(); | ||
|
||
assert_eq!(expected_elgamal_pubkey, computed_elgamal_pubkey); | ||
} | ||
|
||
#[test] | ||
fn elgamal_ciphertext_fromstr() { | ||
let elgamal_keypair = ElGamalKeypair::new_rand(); | ||
let expected_elgamal_ciphertext: PodElGamalCiphertext = | ||
elgamal_keypair.pubkey().encrypt(0_u64).into(); | ||
|
||
let elgamal_ciphertext_base64_str = format!("{}", expected_elgamal_ciphertext); | ||
let computed_elgamal_ciphertext = | ||
PodElGamalCiphertext::from_str(&elgamal_ciphertext_base64_str).unwrap(); | ||
|
||
assert_eq!(expected_elgamal_ciphertext, computed_elgamal_ciphertext); | ||
} | ||
} |
Oops, something went wrong.