1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
// Copyright (C) 2019-2023 Aleo Systems Inc.
// This file is part of the snarkVM library.
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at:
// http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
use super::*;
impl<N: Network> FromBytes for BatchCertificate<N> {
/// Reads the batch certificate from the buffer.
fn read_le<R: Read>(mut reader: R) -> IoResult<Self> {
// Read the version.
let version = u8::read_le(&mut reader)?;
// Ensure the version is valid.
if version != 1 && version != 2 {
return Err(error("Invalid batch certificate version"));
}
if version == 1 {
// Read the certificate ID.
let certificate_id = Field::read_le(&mut reader)?;
// Read the batch header.
let batch_header = BatchHeader::read_le(&mut reader)?;
// Read the number of signatures.
let num_signatures = u32::read_le(&mut reader)?;
// Read the signatures.
let mut signatures = IndexMap::with_capacity(num_signatures as usize);
for _ in 0..num_signatures {
// Read the signature.
let signature = Signature::read_le(&mut reader)?;
// Read the timestamp.
let timestamp = i64::read_le(&mut reader)?;
// Insert the signature and timestamp.
signatures.insert(signature, timestamp);
}
// Return the batch certificate.
Self::from_v1_deprecated(certificate_id, batch_header, signatures).map_err(error)
} else if version == 2 {
// Read the batch header.
let batch_header = BatchHeader::read_le(&mut reader)?;
// Read the number of signatures.
let num_signatures = u16::read_le(&mut reader)?;
// Read the signatures.
let mut signatures = IndexSet::with_capacity(num_signatures as usize);
for _ in 0..num_signatures {
// Read the signature.
let signature = Signature::read_le(&mut reader)?;
// Insert the signature.
signatures.insert(signature);
}
// Return the batch certificate.
Self::from(batch_header, signatures).map_err(error)
} else {
unreachable!("Invalid batch certificate version")
}
}
}
impl<N: Network> ToBytes for BatchCertificate<N> {
/// Writes the batch certificate to the buffer.
fn write_le<W: Write>(&self, mut writer: W) -> IoResult<()> {
match self {
Self::V1 { certificate_id, batch_header, signatures } => {
// Write the version.
1u8.write_le(&mut writer)?;
// Write the certificate ID.
certificate_id.write_le(&mut writer)?;
// Write the batch header.
batch_header.write_le(&mut writer)?;
// Write the number of signatures.
u32::try_from(signatures.len()).map_err(error)?.write_le(&mut writer)?;
// Write the signatures.
for (signature, timestamp) in signatures.iter() {
// Write the signature.
signature.write_le(&mut writer)?;
// Write the timestamp.
timestamp.write_le(&mut writer)?;
}
}
Self::V2 { batch_header, signatures } => {
// Write the version.
2u8.write_le(&mut writer)?;
// Write the batch header.
batch_header.write_le(&mut writer)?;
// Write the number of signatures.
u16::try_from(signatures.len()).map_err(error)?.write_le(&mut writer)?;
// Write the signatures.
for signature in signatures.iter() {
// Write the signature.
signature.write_le(&mut writer)?;
}
}
}
Ok(())
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_bytes() {
let rng = &mut TestRng::default();
for expected in crate::test_helpers::sample_batch_certificates(rng) {
// Check the byte representation.
let expected_bytes = expected.to_bytes_le().unwrap();
assert_eq!(expected, BatchCertificate::read_le(&expected_bytes[..]).unwrap());
}
}
}