1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
// Copyright 2023 Fondazione LINKS

// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at

//     http://www.apache.org/licenses/LICENSE-2.0

// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.



use std::{fmt, str::FromStr};

use serde::{Deserialize, Serialize};

#[derive(Clone, Copy, Debug, Hash, PartialEq, Eq, PartialOrd, Ord, Deserialize, Serialize)]
#[allow(non_camel_case_types)]
pub enum ProofAlgorithm {

  ///TODO: we need two algorithms (BLS12381_SHA256 and BLS12381_SHAKE256) 
  /// We should also distinguish between the BBS algorithm standard and the one extended
  #[serde(rename = "BBS-BLS12381-SHA256")]
  BLS12381_SHA256,
  #[serde(rename = "BBS-BLS12381-SHAKE256")]
  BLS12381_SHAKE256,

  #[serde(rename = "BBS-BLS12381-SHA256-PROOF")]
  BLS12381_SHA256_PROOF,
  #[serde(rename = "BBS-BLS12381-SHAKE256-PROOF")]
  BLS12381_SHAKE256_PROOF,

  #[serde(rename = "SU-ES256")]
  SU_ES256,
  #[serde(rename = "MAC-H256")]
  MAC_H256,
  #[serde(rename = "MAC-H384")]
  MAC_H384,
  #[serde(rename = "MAC-H512")]
  MAC_H512,
  #[serde(rename = "MAC-K25519")]
  MAC_K25519,
  #[serde(rename = "MAC-K448")]
  MAC_K448,
  #[serde(rename = "MAC-H256K")]
  MAC_H256K
}


impl fmt::Display for ProofAlgorithm {
  fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
      let variant_str = match self {
          ProofAlgorithm::BLS12381_SHA256 => "BBS-BLS12381-SHA256",
          ProofAlgorithm::BLS12381_SHAKE256 => "BBS-BLS12381-SHAKE256",
          ProofAlgorithm::BLS12381_SHA256_PROOF => "BBS-BLS12381-SHA256-PROOF",
          ProofAlgorithm::BLS12381_SHAKE256_PROOF => "BBS-BLS12381-SHAKE256-PROOF",
          ProofAlgorithm::SU_ES256 => "SU-ES256",
          ProofAlgorithm::MAC_H256 => "MAC-H256",
          ProofAlgorithm::MAC_H384 => "MAC-H384",
          ProofAlgorithm::MAC_H512 => "MAC-H512",
          ProofAlgorithm::MAC_K25519 => "MAC-K25519",
          ProofAlgorithm::MAC_K448 => "MAC-K448",
          ProofAlgorithm::MAC_H256K => "MAC-H256K",
      };
      write!(f, "{}", variant_str)
  }
}


impl FromStr for ProofAlgorithm {
  type Err = &'static str;

  fn from_str(s: &str) -> Result<Self, Self::Err> {
      match s {
          "BBS-BLS12381-SHA256" => Ok(ProofAlgorithm::BLS12381_SHA256),
          "BBS-BLS12381-SHAKE256" => Ok(ProofAlgorithm::BLS12381_SHAKE256),
          "BBS-BLS12381-SHA256-PROOF" => Ok(ProofAlgorithm::BLS12381_SHA256_PROOF),
          "BBS-BLS12381-SHAKE256-PROOF" => Ok(ProofAlgorithm::BLS12381_SHAKE256_PROOF),
          "SU-ES256" => Ok(ProofAlgorithm::SU_ES256),
          "MAC-H256" => Ok(ProofAlgorithm::MAC_H256),
          "MAC-H384" => Ok(ProofAlgorithm::MAC_H384),
          "MAC-H512" => Ok(ProofAlgorithm::MAC_H512),
          "MAC-K25519" => Ok(ProofAlgorithm::MAC_K25519),
          "MAC-K448" => Ok(ProofAlgorithm::MAC_K448),
          "MAC-H256K" => Ok(ProofAlgorithm::MAC_H256K),
          _ => Err("Invalid proof algorithm"),
      }
  }
}



// pub trait ProofGenerator {
//   fn generate_issuer_proof(&self) -> Option<Vec<u8>>;
//   fn generate_presentaiton_proof(&self) -> Option<Vec<u8>>;
// }