sp1-verifier 6.1.0

Verifier for SP1 Groth16 and Plonk proofs.
Documentation
use sha2::{Digest, Sha256};

use crate::error::Error;

/// Hashes the public inputs in the same format as the Plonk and Groth16 verifiers.
/// Uses `Sha256`.
pub fn hash_public_inputs(public_inputs: &[u8]) -> [u8; 32] {
    hash_public_inputs_with_fn(public_inputs, sha256_hash)
}

/// Hashes the public inputs in the same format as the Plonk and Groth16 verifiers,
/// using the provided hash function.
pub fn hash_public_inputs_with_fn<F>(public_inputs: &[u8], hasher: F) -> [u8; 32]
where
    F: Fn(&[u8]) -> [u8; 32],
{
    let mut result = hasher(public_inputs);

    // The Plonk and Groth16 verifiers operate over a 254 bit field, so we need to zero
    // out the first 3 bits. The same logic happens in the SP1 Ethereum verifier contract.
    result[0] &= 0x1F;

    result
}

/// Hashes the public input using `Sha256`.
pub fn sha256_hash(inputs: &[u8]) -> [u8; 32] {
    Sha256::digest(inputs).into()
}

/// Hash the input using `Blake3`.
pub fn blake3_hash(inputs: &[u8]) -> [u8; 32] {
    *blake3::hash(inputs).as_bytes()
}

/// Decodes the sp1 vkey hash from the string from a call to `vk.bytes32`.
pub fn decode_sp1_vkey_hash(sp1_vkey_hash: &str) -> Result<[u8; 32], Error> {
    if sp1_vkey_hash.len() < 2 {
        return Err(Error::InvalidProgramVkeyHash);
    }
    let bytes = hex::decode(&sp1_vkey_hash[2..]).map_err(|_| Error::InvalidProgramVkeyHash)?;
    bytes.try_into().map_err(|_| Error::InvalidProgramVkeyHash)
}