1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
use crate::types::{heap::BoxedBytes, MessageHashType};
use super::{HandleTypeInfo, ManagedTypeApi, ManagedTypeApiImpl};
pub const SHA256_RESULT_LEN: usize = 32;
pub const KECCAK256_RESULT_LEN: usize = 32;
pub const RIPEMD_RESULT_LEN: usize = 20;
pub const ED25519_KEY_BYTE_LEN: usize = 32;
pub const ED25519_SIGNATURE_BYTE_LEN: usize = 64;
pub trait CryptoApi: ManagedTypeApi {
type CryptoApiImpl: CryptoApiImpl
+ HandleTypeInfo<
ManagedBufferHandle = Self::ManagedBufferHandle,
BigIntHandle = Self::BigIntHandle,
BigFloatHandle = Self::BigFloatHandle,
EllipticCurveHandle = Self::EllipticCurveHandle,
>;
fn crypto_api_impl() -> Self::CryptoApiImpl;
}
pub trait CryptoApiImpl: ManagedTypeApiImpl {
fn sha256_legacy(&self, data: &[u8]) -> [u8; SHA256_RESULT_LEN];
fn sha256_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle,
);
fn keccak256_legacy(&self, data: &[u8]) -> [u8; KECCAK256_RESULT_LEN];
fn keccak256_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle,
);
fn ripemd160_legacy(&self, data: &[u8]) -> [u8; RIPEMD_RESULT_LEN];
fn ripemd160_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle,
);
fn verify_bls_legacy(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool;
fn verify_bls_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle,
) -> bool;
fn verify_ed25519_legacy(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool;
fn verify_ed25519_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle,
) -> bool;
fn verify_secp256k1_legacy(&self, key: &[u8], message: &[u8], signature: &[u8]) -> bool;
fn verify_secp256k1_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle,
) -> bool;
fn verify_custom_secp256k1_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8],
hash_type: MessageHashType,
) -> bool;
fn verify_custom_secp256k1_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle,
hash_type: MessageHashType,
) -> bool;
fn encode_secp256k1_der_signature_legacy(&self, r: &[u8], s: &[u8]) -> BoxedBytes;
fn encode_secp256k1_der_signature_managed(
&self,
r: Self::ManagedBufferHandle,
s: Self::ManagedBufferHandle,
dest: Self::ManagedBufferHandle,
);
}