|
| 1 | +// Copyright 2020 WeDPR Lab Project Authors. Licensed under Apache-2.0. |
| 2 | + |
| 3 | +//! Library of macros and functions for FFI of selective_disclosure solution, |
| 4 | +//! targeting C/C++ compatible architectures (including iOS). |
| 5 | +
|
| 6 | +// C/C++ FFI: C-style interfaces will be generated. |
| 7 | + |
| 8 | +use wedpr_protos::generated::selective_disclosure::{ |
| 9 | + CredentialInfo, CredentialSignature, CredentialTemplate, |
| 10 | + SelectiveDisclosureResult, VerificationRule, |
| 11 | +}; |
| 12 | + |
| 13 | +use wedpr_crypto::utils::{bytes_to_string, string_to_bytes}; |
| 14 | + |
| 15 | +use libc::c_char; |
| 16 | +use protobuf::{self, Message}; |
| 17 | +use std::{ffi::CString, panic, ptr}; |
| 18 | +use wedpr_ffi_common::utils::c_char_pointer_to_string; |
| 19 | + |
| 20 | +#[no_mangle] |
| 21 | +/// C interface for 'wedpr_sign_credential'. |
| 22 | +pub extern "C" fn wedpr_make_credential( |
| 23 | + credential_info_cstring: *mut c_char, |
| 24 | + credential_template_cstring: *mut c_char, |
| 25 | +) -> *mut c_char |
| 26 | +{ |
| 27 | + let result = panic::catch_unwind(|| { |
| 28 | + let credential_info_pb = c_safe_c_char_pointer_to_proto!( |
| 29 | + credential_info_cstring, |
| 30 | + CredentialInfo |
| 31 | + ); |
| 32 | + let credential_template_pb = c_safe_c_char_pointer_to_proto!( |
| 33 | + credential_template_cstring, |
| 34 | + CredentialTemplate |
| 35 | + ); |
| 36 | + |
| 37 | + let ( |
| 38 | + credential_signature_request, |
| 39 | + master_secret_str, |
| 40 | + credential_secrets_blinding_factors_str, |
| 41 | + nonce_credential_str, |
| 42 | + ) = match selective_disclosure::user::make_credential( |
| 43 | + &credential_info_pb, |
| 44 | + &credential_template_pb, |
| 45 | + ) { |
| 46 | + Ok(v) => v, |
| 47 | + Err(_) => return ptr::null_mut(), |
| 48 | + }; |
| 49 | + let mut sl_result = SelectiveDisclosureResult::new(); |
| 50 | + sl_result |
| 51 | + .set_credential_signature_request(credential_signature_request); |
| 52 | + sl_result.set_master_secret(master_secret_str); |
| 53 | + sl_result.set_credential_secrets_blinding_factors( |
| 54 | + credential_secrets_blinding_factors_str, |
| 55 | + ); |
| 56 | + sl_result.set_nonce_credential(nonce_credential_str); |
| 57 | + c_safe_proto_to_c_char_pointer!(sl_result) |
| 58 | + }); |
| 59 | + c_safe_return!(result) |
| 60 | +} |
| 61 | + |
| 62 | +#[no_mangle] |
| 63 | +/// C interface for 'wedpr_blind_credential_signature'. |
| 64 | +pub extern "C" fn wedpr_blind_credential_signature( |
| 65 | + credential_signature_cstring: *mut c_char, |
| 66 | + credential_info_cstring: *mut c_char, |
| 67 | + credential_template_cstring: *mut c_char, |
| 68 | + master_secret_cstring: *mut c_char, |
| 69 | + credential_secrets_blinding_factors_cstring: *mut c_char, |
| 70 | + nonce_credential_cstring: *mut c_char, |
| 71 | +) -> *mut c_char |
| 72 | +{ |
| 73 | + let result = panic::catch_unwind(|| { |
| 74 | + let credential_signature_pb = c_safe_c_char_pointer_to_proto!( |
| 75 | + credential_signature_cstring, |
| 76 | + CredentialSignature |
| 77 | + ); |
| 78 | + let credential_info_pb = c_safe_c_char_pointer_to_proto!( |
| 79 | + credential_info_cstring, |
| 80 | + CredentialInfo |
| 81 | + ); |
| 82 | + let credential_template_pb = c_safe_c_char_pointer_to_proto!( |
| 83 | + credential_template_cstring, |
| 84 | + CredentialTemplate |
| 85 | + ); |
| 86 | + let master_secret = |
| 87 | + c_safe_c_char_pointer_to_string!(master_secret_cstring); |
| 88 | + let credential_secrets_blinding_factors = c_safe_c_char_pointer_to_string!( |
| 89 | + credential_secrets_blinding_factors_cstring |
| 90 | + ); |
| 91 | + let nonce_credential = |
| 92 | + c_safe_c_char_pointer_to_string!(nonce_credential_cstring); |
| 93 | + |
| 94 | + let new_credential_signature = |
| 95 | + match selective_disclosure::user::blind_credential_signature( |
| 96 | + &credential_signature_pb, |
| 97 | + &credential_info_pb, |
| 98 | + &credential_template_pb, |
| 99 | + &master_secret, |
| 100 | + &credential_secrets_blinding_factors, |
| 101 | + &nonce_credential, |
| 102 | + ) { |
| 103 | + Ok(v) => v, |
| 104 | + Err(_) => return ptr::null_mut(), |
| 105 | + }; |
| 106 | + |
| 107 | + let mut sl_result = SelectiveDisclosureResult::new(); |
| 108 | + sl_result.set_credential_signature(new_credential_signature); |
| 109 | + c_safe_proto_to_c_char_pointer!(sl_result) |
| 110 | + }); |
| 111 | + c_safe_return!(result) |
| 112 | +} |
| 113 | + |
| 114 | +#[no_mangle] |
| 115 | +/// C interface for 'wedpr_prove_credential_info'. |
| 116 | +pub extern "C" fn wedpr_prove_credential_info( |
| 117 | + verification_predicate_rule_cstring: *mut c_char, |
| 118 | + credential_signature_cstring: *mut c_char, |
| 119 | + credential_info_cstring: *mut c_char, |
| 120 | + credential_template_cstring: *mut c_char, |
| 121 | + master_secret_cstring: *mut c_char, |
| 122 | +) -> *mut c_char |
| 123 | +{ |
| 124 | + let result = panic::catch_unwind(|| { |
| 125 | + let credential_signature_pb = c_safe_c_char_pointer_to_proto!( |
| 126 | + credential_signature_cstring, |
| 127 | + CredentialSignature |
| 128 | + ); |
| 129 | + let credential_info_pb = c_safe_c_char_pointer_to_proto!( |
| 130 | + credential_info_cstring, |
| 131 | + CredentialInfo |
| 132 | + ); |
| 133 | + let credential_template_pb = c_safe_c_char_pointer_to_proto!( |
| 134 | + credential_template_cstring, |
| 135 | + CredentialTemplate |
| 136 | + ); |
| 137 | + let verification_predicate_rule_pb = c_safe_c_char_pointer_to_proto!( |
| 138 | + verification_predicate_rule_cstring, |
| 139 | + VerificationRule |
| 140 | + ); |
| 141 | + let master_secret = |
| 142 | + c_safe_c_char_pointer_to_string!(master_secret_cstring); |
| 143 | + |
| 144 | + let request = |
| 145 | + match selective_disclosure::user::prove_selected_credential_info( |
| 146 | + &verification_predicate_rule_pb, |
| 147 | + &credential_signature_pb, |
| 148 | + &credential_info_pb, |
| 149 | + &credential_template_pb, |
| 150 | + &master_secret, |
| 151 | + ) { |
| 152 | + Ok(v) => v, |
| 153 | + Err(_) => return ptr::null_mut(), |
| 154 | + }; |
| 155 | + |
| 156 | + let mut sl_result = SelectiveDisclosureResult::new(); |
| 157 | + sl_result.set_verification_request(request); |
| 158 | + c_safe_proto_to_c_char_pointer!(sl_result) |
| 159 | + }); |
| 160 | + c_safe_return!(result) |
| 161 | +} |
0 commit comments