mirror of
https://github.com/XRPLF/rippled.git
synced 2025-12-06 17:27:55 +00:00
181 lines
5.5 KiB
C++
181 lines
5.5 KiB
C++
//------------------------------------------------------------------------------
|
|
/*
|
|
This file is part of rippled: https://github.com/ripple/rippled
|
|
Copyright (c) 2025 Ripple Labs Inc.
|
|
|
|
Permission to use, copy, modify, and/or distribute this software for any
|
|
purpose with or without fee is hereby granted, provided that the above
|
|
copyright notice and this permission notice appear in all copies.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
//==============================================================================
|
|
|
|
#ifndef RIPPLE_PROTOCOL_CONFIDENTIALTRANSFER_H_INCLUDED
|
|
#define RIPPLE_PROTOCOL_CONFIDENTIALTRANSFER_H_INCLUDED
|
|
|
|
#include <xrpl/basics/Slice.h>
|
|
#include <xrpl/protocol/Indexes.h>
|
|
#include <xrpl/protocol/MPTIssue.h>
|
|
#include <xrpl/protocol/Protocol.h>
|
|
#include <xrpl/protocol/Rate.h>
|
|
#include <xrpl/protocol/STLedgerEntry.h>
|
|
#include <xrpl/protocol/STObject.h>
|
|
#include <xrpl/protocol/Serializer.h>
|
|
#include <xrpl/protocol/TER.h>
|
|
#include <xrpl/protocol/detail/secp256k1.h>
|
|
|
|
#include <secp256k1.h>
|
|
|
|
namespace ripple {
|
|
|
|
/**
|
|
* @brief Generates a new secp256k1 key pair.
|
|
*/
|
|
SECP256K1_API int
|
|
secp256k1_elgamal_generate_keypair(
|
|
secp256k1_context const* ctx,
|
|
unsigned char* privkey,
|
|
secp256k1_pubkey* pubkey);
|
|
|
|
/**
|
|
* @brief Encrypts a 64-bit amount using ElGamal.
|
|
*/
|
|
SECP256K1_API int
|
|
secp256k1_elgamal_encrypt(
|
|
secp256k1_context const* ctx,
|
|
secp256k1_pubkey* c1,
|
|
secp256k1_pubkey* c2,
|
|
secp256k1_pubkey const* pubkey_Q,
|
|
uint64_t amount,
|
|
unsigned char const* blinding_factor);
|
|
|
|
/**
|
|
* @brief Decrypts an ElGamal ciphertext to recover the amount.
|
|
*/
|
|
SECP256K1_API int
|
|
secp256k1_elgamal_decrypt(
|
|
secp256k1_context const* ctx,
|
|
uint64_t* amount,
|
|
secp256k1_pubkey const* c1,
|
|
secp256k1_pubkey const* c2,
|
|
unsigned char const* privkey);
|
|
|
|
/**
|
|
* @brief Homomorphically adds two ElGamal ciphertexts.
|
|
*/
|
|
SECP256K1_API int
|
|
secp256k1_elgamal_add(
|
|
secp256k1_context const* ctx,
|
|
secp256k1_pubkey* sum_c1,
|
|
secp256k1_pubkey* sum_c2,
|
|
secp256k1_pubkey const* a_c1,
|
|
secp256k1_pubkey const* a_c2,
|
|
secp256k1_pubkey const* b_c1,
|
|
secp256k1_pubkey const* b_c2);
|
|
|
|
/**
|
|
* @brief Homomorphically subtracts two ElGamal ciphertexts.
|
|
*/
|
|
SECP256K1_API int
|
|
secp256k1_elgamal_subtract(
|
|
secp256k1_context const* ctx,
|
|
secp256k1_pubkey* diff_c1,
|
|
secp256k1_pubkey* diff_c2,
|
|
secp256k1_pubkey const* a_c1,
|
|
secp256k1_pubkey const* a_c2,
|
|
secp256k1_pubkey const* b_c1,
|
|
secp256k1_pubkey const* b_c2);
|
|
|
|
/**
|
|
* @brief Generates the canonical encrypted zero for a given MPT token instance.
|
|
*
|
|
* This ciphertext represents a zero balance for a specific account's holding
|
|
* of a token defined by its MPTokenIssuanceID.
|
|
*
|
|
* @param[in] ctx A pointer to a valid secp256k1 context.
|
|
* @param[out] enc_zero_c1 The C1 component of the canonical ciphertext.
|
|
* @param[out] enc_zero_c2 The C2 component of the canonical ciphertext.
|
|
* @param[in] pubkey The ElGamal public key of the account holder.
|
|
* @param[in] account_id A pointer to the 20-byte AccountID.
|
|
* @param[in] mpt_issuance_id A pointer to the 24-byte MPTokenIssuanceID.
|
|
*
|
|
* @return 1 on success, 0 on failure.
|
|
*/
|
|
SECP256K1_API int
|
|
generate_canonical_encrypted_zero(
|
|
secp256k1_context const* ctx,
|
|
secp256k1_pubkey* enc_zero_c1,
|
|
secp256k1_pubkey* enc_zero_c2,
|
|
secp256k1_pubkey const* pubkey,
|
|
unsigned char const* account_id, // 20 bytes
|
|
unsigned char const* mpt_issuance_id // 24 bytes
|
|
);
|
|
|
|
// breaks a 66-byte encrypted amount into two 33-byte components
|
|
// then parses each 33-byte component into 64-byte secp256k1_pubkey format
|
|
bool
|
|
makeEcPair(Slice const& buffer, secp256k1_pubkey& out1, secp256k1_pubkey& out2);
|
|
|
|
// serialize two secp256k1_pubkey components back into compressed 66-byte form
|
|
bool
|
|
serializeEcPair(
|
|
secp256k1_pubkey const& in1,
|
|
secp256k1_pubkey const& in2,
|
|
Buffer& buffer);
|
|
|
|
/**
|
|
* @brief Verifies that a buffer contains two valid, parsable EC public keys.
|
|
* @param buffer The input buffer containing two concatenated components.
|
|
* @return true if both components can be parsed successfully, false otherwise.
|
|
*/
|
|
bool
|
|
isValidCiphertext(Slice const& buffer);
|
|
|
|
TER
|
|
homomorphicAdd(Slice const& a, Slice const& b, Buffer& out);
|
|
|
|
TER
|
|
homomorphicSubtract(Slice const& a, Slice const& b, Buffer& out);
|
|
|
|
TER
|
|
proveEquality(
|
|
Slice const& proof,
|
|
Slice const& encAmt, // encrypted amount
|
|
Slice const& pubkey,
|
|
uint64_t const amount,
|
|
uint256 const& txHash, // Transaction context data
|
|
std::uint32_t const spendVersion);
|
|
|
|
Buffer
|
|
encryptAmount(uint64_t amt, Slice const& pubKeySlice);
|
|
|
|
Buffer
|
|
encryptCanonicalZeroAmount(
|
|
Slice const& pubKeySlice,
|
|
AccountID const& account,
|
|
MPTID const& mptId);
|
|
|
|
TER
|
|
verifyConfidentialSendProof(
|
|
Slice const& proof,
|
|
Slice const& encSenderBalance,
|
|
Slice const& encSenderAmt,
|
|
Slice const& encDestAmt,
|
|
Slice const& encIssuerAmt,
|
|
Slice const& senderPubKey,
|
|
Slice const& destPubKey,
|
|
Slice const& issuerPubKey,
|
|
std::uint32_t const version,
|
|
uint256 const& txHash);
|
|
|
|
} // namespace ripple
|
|
|
|
#endif
|