1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
use blake2s_simd::Params as Blake2s;
use ff::PrimeField;
use paired::bls12_381::Fr;
use crate::fr32::bytes_into_fr_repr_safe;
pub fn kdf(data: &[u8], m: usize) -> Fr {
assert_eq!(
data.len(),
32 * (1 + m),
"invalid input length: data.len(): {} m: {}",
data.len(),
m
);
let hash = Blake2s::new()
.hash_length(32)
.to_state()
.update(data)
.finalize();
Fr::from_repr(bytes_into_fr_repr_safe(hash.as_ref())).unwrap()
}
#[cfg(test)]
mod tests {
use super::kdf;
use crate::fr32::bytes_into_fr;
use paired::bls12_381::Bls12;
#[test]
fn kdf_valid_block_len() {
let m = 1;
let size = 32 * (1 + m);
let data = vec![1u8; size];
let expected = bytes_into_fr::<Bls12>(
&mut vec![
220, 60, 76, 126, 119, 247, 67, 162, 98, 94, 119, 28, 247, 18, 71, 208, 167, 72,
33, 85, 59, 56, 96, 13, 9, 67, 49, 109, 95, 246, 152, 63,
]
.as_slice(),
)
.unwrap();
let res = kdf(&data, m);
assert_eq!(res, expected);
}
#[test]
#[should_panic]
fn kdf_invalid_block_len() {
let data = vec![2u8; 1234];
kdf(&data, 44);
}
}