2022-04-22 01:36:18 +00:00
|
|
|
use lazy_static::lazy_static;
|
|
|
|
use rand_core::{RngCore, CryptoRng};
|
|
|
|
|
|
|
|
use tiny_keccak::{Hasher, Keccak};
|
|
|
|
|
|
|
|
use curve25519_dalek::{
|
|
|
|
constants::ED25519_BASEPOINT_TABLE,
|
|
|
|
scalar::Scalar,
|
|
|
|
edwards::{EdwardsPoint, EdwardsBasepointTable, CompressedEdwardsY}
|
|
|
|
};
|
|
|
|
|
|
|
|
#[cfg(feature = "multisig")]
|
|
|
|
pub mod frost;
|
|
|
|
|
2022-05-21 19:33:35 +00:00
|
|
|
mod serialize;
|
|
|
|
|
2022-04-28 07:31:09 +00:00
|
|
|
pub mod bulletproofs;
|
2022-04-22 01:36:18 +00:00
|
|
|
pub mod clsag;
|
|
|
|
|
2022-04-28 07:31:09 +00:00
|
|
|
pub mod rpc;
|
|
|
|
pub mod transaction;
|
2022-05-21 19:33:35 +00:00
|
|
|
pub mod wallet;
|
2022-04-28 07:31:09 +00:00
|
|
|
|
2022-05-21 19:33:35 +00:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests;
|
2022-04-22 01:36:18 +00:00
|
|
|
|
|
|
|
lazy_static! {
|
2022-05-21 19:33:35 +00:00
|
|
|
static ref H: EdwardsPoint = CompressedEdwardsY(
|
|
|
|
hex::decode("8b655970153799af2aeadc9ff1add0ea6c7251d54154cfa92c173a0dd39c1f94").unwrap().try_into().unwrap()
|
|
|
|
).decompress().unwrap();
|
|
|
|
static ref H_TABLE: EdwardsBasepointTable = EdwardsBasepointTable::create(&*H);
|
2022-04-22 01:36:18 +00:00
|
|
|
}
|
|
|
|
|
2022-04-28 07:31:09 +00:00
|
|
|
#[allow(non_snake_case)]
|
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
|
|
|
pub struct Commitment {
|
|
|
|
pub mask: Scalar,
|
|
|
|
pub amount: u64
|
2022-04-22 01:36:18 +00:00
|
|
|
}
|
|
|
|
|
2022-04-28 07:31:09 +00:00
|
|
|
impl Commitment {
|
|
|
|
pub fn zero() -> Commitment {
|
|
|
|
Commitment { mask: Scalar::one(), amount: 0}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn new(mask: Scalar, amount: u64) -> Commitment {
|
|
|
|
Commitment { mask, amount }
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn calculate(&self) -> EdwardsPoint {
|
|
|
|
(&self.mask * &ED25519_BASEPOINT_TABLE) + (&Scalar::from(self.amount) * &*H_TABLE)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-03 12:49:46 +00:00
|
|
|
// Allows using a modern rand as dalek's is notoriously dated
|
|
|
|
pub fn random_scalar<R: RngCore + CryptoRng>(rng: &mut R) -> Scalar {
|
|
|
|
let mut r = [0; 64];
|
|
|
|
rng.fill_bytes(&mut r);
|
|
|
|
Scalar::from_bytes_mod_order_wide(&r)
|
|
|
|
}
|
|
|
|
|
2022-04-28 07:31:09 +00:00
|
|
|
pub fn hash(data: &[u8]) -> [u8; 32] {
|
2022-04-22 01:36:18 +00:00
|
|
|
let mut keccak = Keccak::v256();
|
|
|
|
keccak.update(data);
|
|
|
|
let mut res = [0; 32];
|
|
|
|
keccak.finalize(&mut res);
|
2022-04-28 07:31:09 +00:00
|
|
|
res
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn hash_to_scalar(data: &[u8]) -> Scalar {
|
|
|
|
Scalar::from_bytes_mod_order(hash(&data))
|
2022-04-22 01:36:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn hash_to_point(point: &EdwardsPoint) -> EdwardsPoint {
|
|
|
|
let mut bytes = point.compress().to_bytes();
|
2022-05-21 19:33:35 +00:00
|
|
|
unsafe {
|
|
|
|
#[link(name = "wrapper")]
|
|
|
|
extern "C" {
|
|
|
|
fn c_hash_to_point(point: *const u8);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_hash_to_point(bytes.as_mut_ptr());
|
|
|
|
}
|
2022-04-22 01:36:18 +00:00
|
|
|
CompressedEdwardsY::from_slice(&bytes).decompress().unwrap()
|
|
|
|
}
|
2022-05-17 23:15:53 +00:00
|
|
|
|
|
|
|
pub fn generate_key_image(secret: &Scalar) -> EdwardsPoint {
|
|
|
|
secret * hash_to_point(&(secret * &ED25519_BASEPOINT_TABLE))
|
|
|
|
}
|