mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-21 22:04:44 +00:00
## Proposed Changes Split out several crates which now exist in separate repos under `sigp`. - [`ssz` and `ssz_derive`](https://github.com/sigp/ethereum_ssz) - [`tree_hash` and `tree_hash_derive`](https://github.com/sigp/tree_hash) - [`ethereum_hashing`](https://github.com/sigp/ethereum_hashing) - [`ethereum_serde_utils`](https://github.com/sigp/ethereum_serde_utils) - [`ssz_types`](https://github.com/sigp/ssz_types) For the published crates see: https://crates.io/teams/github:sigp:crates-io?sort=recent-updates. ## Additional Info - [x] Need to work out how to handle versioning. I was hoping to do 1.0 versions of several crates, but if they depend on `ethereum-types 0.x` that is not going to work. EDIT: decided to go with 0.5.x versions. - [x] Need to port several changes from `tree-states`, `capella`, `eip4844` branches to the external repos.
194 lines
5.9 KiB
Rust
194 lines
5.9 KiB
Rust
use crate::{
|
|
generic_public_key::{GenericPublicKey, TPublicKey},
|
|
Error, Hash256,
|
|
};
|
|
use serde::de::{Deserialize, Deserializer};
|
|
use serde::ser::{Serialize, Serializer};
|
|
use serde_utils::hex::encode as hex_encode;
|
|
use ssz::{Decode, Encode};
|
|
use std::fmt;
|
|
use std::hash::{Hash, Hasher};
|
|
use std::marker::PhantomData;
|
|
use tree_hash::TreeHash;
|
|
|
|
/// The byte-length of a BLS signature when serialized in compressed form.
|
|
pub const SIGNATURE_BYTES_LEN: usize = 96;
|
|
|
|
/// Represents the signature at infinity.
|
|
pub const INFINITY_SIGNATURE: [u8; SIGNATURE_BYTES_LEN] = [
|
|
0xc0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0,
|
|
];
|
|
|
|
/// The compressed bytes used to represent `GenericSignature::empty()`.
|
|
pub const NONE_SIGNATURE: [u8; SIGNATURE_BYTES_LEN] = [0; SIGNATURE_BYTES_LEN];
|
|
|
|
/// Implemented on some struct from a BLS library so it may be used as the `point` in an
|
|
/// `GenericSignature`.
|
|
pub trait TSignature<GenericPublicKey>: Sized + Clone {
|
|
/// Serialize `self` as compressed bytes.
|
|
fn serialize(&self) -> [u8; SIGNATURE_BYTES_LEN];
|
|
|
|
/// Deserialize `self` from compressed bytes.
|
|
fn deserialize(bytes: &[u8]) -> Result<Self, Error>;
|
|
|
|
/// Returns `true` if `self` is a signature across `msg` by `pubkey`.
|
|
fn verify(&self, pubkey: &GenericPublicKey, msg: Hash256) -> bool;
|
|
}
|
|
|
|
/// A BLS signature that is generic across:
|
|
///
|
|
/// - `Pub`: A BLS public key.
|
|
/// - `Sig`: A BLS signature.
|
|
///
|
|
/// Provides generic functionality whilst deferring all serious cryptographic operations to the
|
|
/// generics.
|
|
#[derive(Clone, PartialEq, Eq)]
|
|
pub struct GenericSignature<Pub, Sig> {
|
|
/// The underlying point which performs *actual* cryptographic operations.
|
|
point: Option<Sig>,
|
|
/// True if this point is equal to the `INFINITY_SIGNATURE`.
|
|
pub(crate) is_infinity: bool,
|
|
_phantom: PhantomData<Pub>,
|
|
}
|
|
|
|
impl<Pub, Sig> GenericSignature<Pub, Sig>
|
|
where
|
|
Sig: TSignature<Pub>,
|
|
{
|
|
/// Initialize self to the "empty" value. This value is serialized as all-zeros.
|
|
///
|
|
/// ## Notes
|
|
///
|
|
/// This function is not necessarily useful from a BLS cryptography perspective, it mostly
|
|
/// exists to satisfy the Eth2 specification which expects the all-zeros serialization to be
|
|
/// meaningful.
|
|
pub fn empty() -> Self {
|
|
Self {
|
|
point: None,
|
|
is_infinity: false,
|
|
_phantom: PhantomData,
|
|
}
|
|
}
|
|
|
|
/// Returns `true` if `self` is equal to the "empty" value.
|
|
///
|
|
/// E.g., `Self::empty().is_empty() == true`
|
|
pub fn is_empty(&self) -> bool {
|
|
self.point.is_none()
|
|
}
|
|
|
|
/// Initialize self to the point-at-infinity.
|
|
///
|
|
/// In general `AggregateSignature::infinity` should be used in favour of this function.
|
|
pub fn infinity() -> Result<Self, Error> {
|
|
Self::deserialize(&INFINITY_SIGNATURE)
|
|
}
|
|
|
|
/// Returns `true` if `self` is equal to the point at infinity.
|
|
pub fn is_infinity(&self) -> bool {
|
|
self.is_infinity
|
|
}
|
|
|
|
/// Returns a reference to the underlying BLS point.
|
|
pub(crate) fn point(&self) -> Option<&Sig> {
|
|
self.point.as_ref()
|
|
}
|
|
|
|
/// Instantiates `Self` from a `point`.
|
|
pub(crate) fn from_point(point: Sig, is_infinity: bool) -> Self {
|
|
Self {
|
|
point: Some(point),
|
|
is_infinity,
|
|
_phantom: PhantomData,
|
|
}
|
|
}
|
|
|
|
/// Serialize `self` as compressed bytes.
|
|
pub fn serialize(&self) -> [u8; SIGNATURE_BYTES_LEN] {
|
|
if let Some(point) = &self.point {
|
|
point.serialize()
|
|
} else {
|
|
NONE_SIGNATURE
|
|
}
|
|
}
|
|
|
|
/// Deserialize `self` from compressed bytes.
|
|
pub fn deserialize(bytes: &[u8]) -> Result<Self, Error> {
|
|
let point = if bytes == &NONE_SIGNATURE[..] {
|
|
None
|
|
} else {
|
|
Some(Sig::deserialize(bytes)?)
|
|
};
|
|
|
|
Ok(Self {
|
|
point,
|
|
is_infinity: bytes == &INFINITY_SIGNATURE[..],
|
|
_phantom: PhantomData,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl<Pub, Sig> GenericSignature<Pub, Sig>
|
|
where
|
|
Sig: TSignature<Pub>,
|
|
Pub: TPublicKey + Clone,
|
|
{
|
|
/// Returns `true` if `self` is a signature across `msg` by `pubkey`.
|
|
pub fn verify(&self, pubkey: &GenericPublicKey<Pub>, msg: Hash256) -> bool {
|
|
if let Some(point) = &self.point {
|
|
point.verify(pubkey.point(), msg)
|
|
} else {
|
|
false
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> Encode for GenericSignature<PublicKey, T> {
|
|
impl_ssz_encode!(SIGNATURE_BYTES_LEN);
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> Decode for GenericSignature<PublicKey, T> {
|
|
impl_ssz_decode!(SIGNATURE_BYTES_LEN);
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> TreeHash for GenericSignature<PublicKey, T> {
|
|
impl_tree_hash!(SIGNATURE_BYTES_LEN);
|
|
}
|
|
|
|
/// Hashes the `self.serialize()` bytes.
|
|
impl<PublicKey, T: TSignature<PublicKey>> Hash for GenericSignature<PublicKey, T> {
|
|
fn hash<H: Hasher>(&self, state: &mut H) {
|
|
self.serialize().hash(state);
|
|
}
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> fmt::Display for GenericSignature<PublicKey, T> {
|
|
impl_display!();
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> std::str::FromStr for GenericSignature<PublicKey, T> {
|
|
impl_from_str!();
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> Serialize for GenericSignature<PublicKey, T> {
|
|
impl_serde_serialize!();
|
|
}
|
|
|
|
impl<'de, PublicKey, T: TSignature<PublicKey>> Deserialize<'de> for GenericSignature<PublicKey, T> {
|
|
impl_serde_deserialize!();
|
|
}
|
|
|
|
impl<PublicKey, T: TSignature<PublicKey>> fmt::Debug for GenericSignature<PublicKey, T> {
|
|
impl_debug!();
|
|
}
|
|
|
|
#[cfg(feature = "arbitrary")]
|
|
impl<PublicKey: 'static, T: TSignature<PublicKey> + 'static> arbitrary::Arbitrary<'_>
|
|
for GenericSignature<PublicKey, T>
|
|
{
|
|
impl_arbitrary!(SIGNATURE_BYTES_LEN);
|
|
}
|