1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
use core::{borrow::Borrow, marker::PhantomData};
use crate::{
api::{
CryptoApi, CryptoApiImpl, ED25519_KEY_BYTE_LEN, ED25519_SIGNATURE_BYTE_LEN,
SHA256_RESULT_LEN,
},
types::{BoxedBytes, ManagedBuffer, ManagedByteArray, ManagedType, MessageHashType, H256},
};
use alloc::boxed::Box;
#[derive(Default)]
pub struct CryptoWrapper<A>
where
A: CryptoApi,
{
_phantom: PhantomData<A>,
}
impl<A> CryptoWrapper<A>
where
A: CryptoApi,
{
pub(crate) fn new() -> Self {
CryptoWrapper {
_phantom: PhantomData,
}
}
pub fn sha256<B: Borrow<ManagedBuffer<A>>>(
&self,
data: B,
) -> ManagedByteArray<A, SHA256_RESULT_LEN> {
ManagedByteArray::from_raw_handle(
A::crypto_api_impl().sha256(data.borrow().get_raw_handle()),
)
}
pub fn sha256_legacy_alloc(&self, data: &[u8]) -> H256 {
H256::from(A::crypto_api_impl().sha256_legacy(data))
}
pub fn sha256_legacy_managed<const MAX_INPUT_LEN: usize>(
&self,
data: &ManagedBuffer<A>,
) -> ManagedByteArray<A, SHA256_RESULT_LEN> {
let mut data_buffer = [0u8; MAX_INPUT_LEN];
let data_buffer_slice = data.load_to_byte_array(&mut data_buffer);
ManagedByteArray::new_from_bytes(&A::crypto_api_impl().sha256_legacy(data_buffer_slice))
}
pub fn keccak256<B: Borrow<ManagedBuffer<A>>>(&self, data: B) -> ManagedByteArray<A, 32> {
ManagedByteArray::from_raw_handle(
A::crypto_api_impl().keccak256(data.borrow().get_raw_handle()),
)
}
pub fn keccak256_legacy_alloc(&self, data: &[u8]) -> H256 {
H256::from(A::crypto_api_impl().keccak256_legacy(data))
}
pub fn keccak256_legacy_managed<const MAX_INPUT_LEN: usize>(
&self,
data: &ManagedBuffer<A>,
) -> ManagedByteArray<A, SHA256_RESULT_LEN> {
let mut data_buffer = [0u8; MAX_INPUT_LEN];
let data_buffer_slice = data.load_to_byte_array(&mut data_buffer);
ManagedByteArray::new_from_bytes(&A::crypto_api_impl().keccak256_legacy(data_buffer_slice))
}
pub fn ripemd160(&self, data: &[u8]) -> Box<[u8; 20]> {
Box::new(A::crypto_api_impl().ripemd160(data))
}
pub fn verify_bls(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool {
A::crypto_api_impl().verify_bls(key, message, signature)
}
pub fn verify_ed25519(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool {
A::crypto_api_impl().verify_ed25519(key, message, signature)
}
pub fn verify_ed25519_managed<const MAX_MESSAGE_LEN: usize>(
&self,
key: &ManagedByteArray<A, ED25519_KEY_BYTE_LEN>,
message: &ManagedBuffer<A>,
signature: &ManagedByteArray<A, ED25519_SIGNATURE_BYTE_LEN>,
) -> bool {
let key_bytes = key.to_byte_array();
let mut message_byte_buffer = [0u8; MAX_MESSAGE_LEN];
let message_byte_slice = message.load_to_byte_array(&mut message_byte_buffer);
let sig_bytes = signature.to_byte_array();
A::crypto_api_impl().verify_ed25519(&key_bytes[..], message_byte_slice, &sig_bytes[..])
}
pub fn verify_secp256k1(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool {
A::crypto_api_impl().verify_secp256k1(key, message, signature)
}
pub fn verify_custom_secp256k1(
&self,
key: &[u8],
message: &[u8],
signature: &[u8],
hash_type: MessageHashType,
) -> bool {
A::crypto_api_impl().verify_custom_secp256k1(key, message, signature, hash_type)
}
pub fn encode_secp256k1_der_signature(&self, r: &[u8], s: &[u8]) -> BoxedBytes {
A::crypto_api_impl().encode_secp256k1_der_signature(r, s)
}
}