2025-09-22 16:38:25 +03:00
|
|
|
use common::{ExecutionFailureKind, sequencer_client::json::SendTxResponse};
|
2025-10-03 08:08:54 -03:00
|
|
|
use key_protocol::key_management::ephemeral_key_holder::EphemeralKeyHolder;
|
2025-10-03 15:59:27 -03:00
|
|
|
use nssa::{
|
|
|
|
|
Account, Address, PrivacyPreservingTransaction,
|
|
|
|
|
privacy_preserving_transaction::{circuit, message::Message, witness_set::WitnessSet},
|
|
|
|
|
program::Program,
|
|
|
|
|
};
|
|
|
|
|
use nssa_core::{
|
2025-10-15 15:44:52 +03:00
|
|
|
MembershipProof, NullifierPublicKey, SharedSecretKey, account::AccountWithMetadata,
|
2025-10-03 15:59:27 -03:00
|
|
|
encryption::IncomingViewingPublicKey,
|
|
|
|
|
};
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 01:30:40 -03:00
|
|
|
use crate::{WalletCore, helperfunctions::produce_random_nonces};
|
2025-09-22 16:38:25 +03:00
|
|
|
|
|
|
|
|
impl WalletCore {
|
2025-10-15 15:44:52 +03:00
|
|
|
pub async fn send_shielded_native_token_transfer_already_initialized(
|
2025-09-22 16:38:25 +03:00
|
|
|
&self,
|
|
|
|
|
from: Address,
|
|
|
|
|
to: Address,
|
|
|
|
|
balance_to_move: u128,
|
2025-10-15 15:44:52 +03:00
|
|
|
to_proof: MembershipProof,
|
2025-10-03 15:59:27 -03:00
|
|
|
) -> Result<(SendTxResponse, SharedSecretKey), ExecutionFailureKind> {
|
|
|
|
|
let Ok(from_acc) = self.get_account_public(from).await else {
|
2025-09-22 16:38:25 +03:00
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
2025-10-03 08:08:54 -03:00
|
|
|
let Some((to_keys, to_acc)) = self.storage.user_data.get_private_account(&to).cloned()
|
2025-09-30 14:31:04 -03:00
|
|
|
else {
|
2025-09-22 16:38:25 +03:00
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let to_npk = to_keys.nullifer_public_key.clone();
|
|
|
|
|
let to_ipk = to_keys.incoming_viewing_public_key.clone();
|
|
|
|
|
|
|
|
|
|
if from_acc.balance >= balance_to_move {
|
2025-10-03 15:59:27 -03:00
|
|
|
let program = Program::authenticated_transfer_program();
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let sender_pre = AccountWithMetadata::new(from_acc.clone(), true, from);
|
|
|
|
|
let recipient_pre = AccountWithMetadata::new(to_acc.clone(), true, &to_npk);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-02 22:30:33 -03:00
|
|
|
let eph_holder = EphemeralKeyHolder::new(&to_npk);
|
|
|
|
|
let shared_secret = eph_holder.calculate_shared_secret_sender(&to_ipk);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let (output, proof) = circuit::execute_and_prove(
|
2025-09-22 16:38:25 +03:00
|
|
|
&[sender_pre, recipient_pre],
|
|
|
|
|
&nssa::program::Program::serialize_instruction(balance_to_move).unwrap(),
|
|
|
|
|
&[0, 1],
|
2025-10-03 01:30:40 -03:00
|
|
|
&produce_random_nonces(1),
|
2025-09-23 09:54:33 +03:00
|
|
|
&[(to_npk.clone(), shared_secret.clone())],
|
2025-10-15 15:44:52 +03:00
|
|
|
&[(to_keys.private_key_holder.nullifier_secret_key, to_proof)],
|
|
|
|
|
&program,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
let message = Message::try_from_circuit_output(
|
|
|
|
|
vec![from],
|
|
|
|
|
vec![from_acc.nonce],
|
|
|
|
|
vec![(
|
|
|
|
|
to_npk.clone(),
|
|
|
|
|
to_ipk.clone(),
|
|
|
|
|
eph_holder.generate_ephemeral_public_key(),
|
2025-09-22 16:38:25 +03:00
|
|
|
)],
|
2025-10-15 15:44:52 +03:00
|
|
|
output,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
let signing_key = self.storage.user_data.get_pub_account_signing_key(&from);
|
|
|
|
|
|
|
|
|
|
let Some(signing_key) = signing_key else {
|
|
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let witness_set = WitnessSet::for_message(&message, proof, &[signing_key]);
|
|
|
|
|
|
|
|
|
|
let tx = PrivacyPreservingTransaction::new(message, witness_set);
|
|
|
|
|
|
|
|
|
|
Ok((
|
|
|
|
|
self.sequencer_client.send_tx_private(tx).await?,
|
|
|
|
|
shared_secret,
|
|
|
|
|
))
|
|
|
|
|
} else {
|
|
|
|
|
Err(ExecutionFailureKind::InsufficientFundsError)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pub async fn send_shielded_native_token_transfer_not_initialized(
|
|
|
|
|
&self,
|
|
|
|
|
from: Address,
|
|
|
|
|
to: Address,
|
|
|
|
|
balance_to_move: u128,
|
|
|
|
|
) -> Result<(SendTxResponse, SharedSecretKey), ExecutionFailureKind> {
|
|
|
|
|
let Ok(from_acc) = self.get_account_public(from).await else {
|
|
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let Some((to_keys, to_acc)) = self.storage.user_data.get_private_account(&to).cloned()
|
|
|
|
|
else {
|
|
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let to_npk = to_keys.nullifer_public_key.clone();
|
|
|
|
|
let to_ipk = to_keys.incoming_viewing_public_key.clone();
|
|
|
|
|
|
|
|
|
|
if from_acc.balance >= balance_to_move {
|
|
|
|
|
let program = Program::authenticated_transfer_program();
|
|
|
|
|
|
|
|
|
|
let sender_pre = AccountWithMetadata::new(from_acc.clone(), true, from);
|
|
|
|
|
let recipient_pre = AccountWithMetadata::new(to_acc.clone(), false, &to_npk);
|
|
|
|
|
|
|
|
|
|
let eph_holder = EphemeralKeyHolder::new(&to_npk);
|
|
|
|
|
let shared_secret = eph_holder.calculate_shared_secret_sender(&to_ipk);
|
|
|
|
|
|
|
|
|
|
let (output, proof) = circuit::execute_and_prove(
|
|
|
|
|
&[sender_pre, recipient_pre],
|
|
|
|
|
&nssa::program::Program::serialize_instruction(balance_to_move).unwrap(),
|
|
|
|
|
&[0, 2],
|
|
|
|
|
&produce_random_nonces(1),
|
|
|
|
|
&[(to_npk.clone(), shared_secret.clone())],
|
|
|
|
|
&[],
|
2025-09-22 16:38:25 +03:00
|
|
|
&program,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let message = Message::try_from_circuit_output(
|
|
|
|
|
vec![from],
|
|
|
|
|
vec![from_acc.nonce],
|
|
|
|
|
vec![(
|
|
|
|
|
to_npk.clone(),
|
|
|
|
|
to_ipk.clone(),
|
|
|
|
|
eph_holder.generate_ephemeral_public_key(),
|
|
|
|
|
)],
|
|
|
|
|
output,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
2025-09-22 16:38:25 +03:00
|
|
|
|
|
|
|
|
let signing_key = self.storage.user_data.get_pub_account_signing_key(&from);
|
|
|
|
|
|
|
|
|
|
let Some(signing_key) = signing_key else {
|
|
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let witness_set = WitnessSet::for_message(&message, proof, &[signing_key]);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let tx = PrivacyPreservingTransaction::new(message, witness_set);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-09-23 09:54:33 +03:00
|
|
|
Ok((
|
|
|
|
|
self.sequencer_client.send_tx_private(tx).await?,
|
|
|
|
|
shared_secret,
|
|
|
|
|
))
|
2025-09-22 16:38:25 +03:00
|
|
|
} else {
|
|
|
|
|
Err(ExecutionFailureKind::InsufficientFundsError)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-30 14:44:43 -03:00
|
|
|
pub async fn send_shielded_native_token_transfer_outer_account(
|
2025-09-22 16:38:25 +03:00
|
|
|
&self,
|
|
|
|
|
from: Address,
|
2025-10-03 15:59:27 -03:00
|
|
|
to_npk: NullifierPublicKey,
|
|
|
|
|
to_ipk: IncomingViewingPublicKey,
|
2025-09-22 16:38:25 +03:00
|
|
|
balance_to_move: u128,
|
2025-10-03 15:59:27 -03:00
|
|
|
) -> Result<(SendTxResponse, SharedSecretKey), ExecutionFailureKind> {
|
|
|
|
|
let Ok(from_acc) = self.get_account_public(from).await else {
|
2025-09-22 16:38:25 +03:00
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let to_acc = Account::default();
|
2025-09-22 16:38:25 +03:00
|
|
|
|
|
|
|
|
if from_acc.balance >= balance_to_move {
|
2025-10-03 15:59:27 -03:00
|
|
|
let program = Program::authenticated_transfer_program();
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 08:44:15 -03:00
|
|
|
let sender_pre = AccountWithMetadata::new(from_acc.clone(), true, from);
|
|
|
|
|
let recipient_pre = AccountWithMetadata::new(to_acc.clone(), false, &to_npk);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-02 22:30:33 -03:00
|
|
|
let eph_holder = EphemeralKeyHolder::new(&to_npk);
|
|
|
|
|
let shared_secret = eph_holder.calculate_shared_secret_sender(&to_ipk);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let (output, proof) = circuit::execute_and_prove(
|
2025-09-22 16:38:25 +03:00
|
|
|
&[sender_pre, recipient_pre],
|
2025-10-03 15:59:27 -03:00
|
|
|
&Program::serialize_instruction(balance_to_move).unwrap(),
|
2025-09-22 16:38:25 +03:00
|
|
|
&[0, 2],
|
2025-10-03 01:30:40 -03:00
|
|
|
&produce_random_nonces(1),
|
2025-09-23 09:54:33 +03:00
|
|
|
&[(to_npk.clone(), shared_secret.clone())],
|
2025-09-22 16:38:25 +03:00
|
|
|
&[],
|
|
|
|
|
&program,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let message = Message::try_from_circuit_output(
|
|
|
|
|
vec![from],
|
|
|
|
|
vec![from_acc.nonce],
|
|
|
|
|
vec![(
|
|
|
|
|
to_npk.clone(),
|
|
|
|
|
to_ipk.clone(),
|
|
|
|
|
eph_holder.generate_ephemeral_public_key(),
|
|
|
|
|
)],
|
|
|
|
|
output,
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
2025-09-22 16:38:25 +03:00
|
|
|
|
|
|
|
|
let signing_key = self.storage.user_data.get_pub_account_signing_key(&from);
|
|
|
|
|
|
|
|
|
|
let Some(signing_key) = signing_key else {
|
|
|
|
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
|
|
|
|
};
|
|
|
|
|
|
2025-10-03 15:59:27 -03:00
|
|
|
let witness_set = WitnessSet::for_message(&message, proof, &[signing_key]);
|
|
|
|
|
let tx = PrivacyPreservingTransaction::new(message, witness_set);
|
2025-09-22 16:38:25 +03:00
|
|
|
|
2025-09-23 09:54:33 +03:00
|
|
|
Ok((
|
|
|
|
|
self.sequencer_client.send_tx_private(tx).await?,
|
|
|
|
|
shared_secret,
|
|
|
|
|
))
|
2025-09-22 16:38:25 +03:00
|
|
|
} else {
|
|
|
|
|
Err(ExecutionFailureKind::InsufficientFundsError)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|