use blake3::Hasher;
pub(crate) const DOMAIN_CERT_SIG: &str = "a1::64796f6c6f::cert::sig::v2.8.0";
pub(crate) const DOMAIN_CERT_FP: &str = "a1::64796f6c6f::cert::fp::v2.8.0";
pub(crate) const DOMAIN_CHAIN_FP: &str = "a1::64796f6c6f::chain::fp::v2.8.0";
pub(crate) const DOMAIN_INTENT_LEAF: &str = "a1::64796f6c6f::intent::leaf::v2.8.0";
pub(crate) const DOMAIN_MERKLE_NODE: &str = "a1::64796f6c6f::merkle::node::v2.8.0";
pub(crate) const DOMAIN_SUBSCOPE: &str = "a1::64796f6c6f::subscope::commit::v2.8.0";
#[cfg(feature = "wire")]
pub(crate) const DOMAIN_CERT_EXT: &str = "a1::64796f6c6f::cert::ext::v2.8.0";
#[inline]
pub(crate) fn derive_key(domain: &str, version: u8) -> Hasher {
let mut h = Hasher::new_derive_key(domain);
h.update(&[version]);
h
}
#[inline]
pub(crate) fn hasher_cert_sig(version: u8) -> Hasher {
derive_key(DOMAIN_CERT_SIG, version)
}
#[inline]
pub(crate) fn hasher_cert_fp(version: u8) -> Hasher {
derive_key(DOMAIN_CERT_FP, version)
}
#[allow(dead_code)]
#[inline]
pub(crate) fn hasher_chain_fp(version: u8) -> Hasher {
derive_key(DOMAIN_CHAIN_FP, version)
}
#[inline]
pub(crate) fn hasher_intent_leaf(version: u8) -> Hasher {
derive_key(DOMAIN_INTENT_LEAF, version)
}
#[inline]
pub(crate) fn hasher_merkle_node(version: u8) -> Hasher {
derive_key(DOMAIN_MERKLE_NODE, version)
}
#[inline]
pub(crate) fn hasher_subscope(version: u8) -> Hasher {
derive_key(DOMAIN_SUBSCOPE, version)
}
#[cfg(feature = "wire")]
#[inline]
pub(crate) fn hasher_cert_ext(version: u8) -> Hasher {
derive_key(DOMAIN_CERT_EXT, version)
}
#[allow(dead_code)]
#[inline]
pub fn derive_subkey(seed: &[u8], info: &[u8]) -> [u8; 32] {
let mut h = blake3::Hasher::new_derive_key("a1::64796f6c6f::kdf::v2.8.0");
h.update(seed);
h.update(&(info.len() as u64).to_le_bytes());
h.update(info);
h.finalize().into()
}
#[inline]
pub(crate) fn merkle_node(left: &[u8; 32], right: &[u8; 32]) -> [u8; 32] {
let mut h = hasher_merkle_node(crate::cert::CERT_VERSION);
h.update(left);
h.update(right);
h.finalize().into()
}
#[cfg(feature = "async")]
#[async_trait::async_trait]
#[allow(dead_code)]
pub trait KmsSigner: Send + Sync {
fn public_key(&self) -> [u8; 32];
async fn sign(&self, payload: &[u8]) -> Result<[u8; 64], crate::error::A1Error>;
fn key_id(&self) -> &str;
fn provenance_tag(&self) -> &str {
"64796f6c6f"
}
}