mirror of
https://github.com/zama-ai/concrete.git
synced 2026-02-08 19:44:57 -05:00
Co-authored-by: Mayeul@Zama <mayeul.debellabre@zama.ai> Co-authored-by: Quentin Bourgerie <bourgerie.quentin@gmail.com>
307 lines
10 KiB
C++
307 lines
10 KiB
C++
// Part of the Concrete Compiler Project, under the BSD3 License with Zama
|
|
// Exceptions. See
|
|
// https://github.com/zama-ai/concrete-compiler-internal/blob/main/LICENSE.txt
|
|
// for license information.
|
|
|
|
#include "boost/outcome.h"
|
|
|
|
#include "concretelang/ClientLib/EvaluationKeys.h"
|
|
#include "concretelang/ClientLib/KeySetCache.h"
|
|
#include "llvm/ADT/ScopeExit.h"
|
|
#include "llvm/Support/FileSystem.h"
|
|
#include "llvm/Support/Path.h"
|
|
|
|
#include <fstream>
|
|
#include <sstream>
|
|
#include <string>
|
|
#include <utime.h>
|
|
|
|
#include "concrete-core-ffi.h"
|
|
|
|
namespace concretelang {
|
|
namespace clientlib {
|
|
|
|
using StringError = concretelang::error::StringError;
|
|
|
|
template <class Engine, class Key>
|
|
outcome::checked<Key *, StringError>
|
|
load(llvm::SmallString<0> &path,
|
|
int (*deser)(Engine *, BufferView buffer, Key **), Engine *engine) {
|
|
std::ifstream in((std::string)path, std::ofstream::binary);
|
|
if (in.fail()) {
|
|
return StringError("Cannot access " + (std::string)path);
|
|
}
|
|
std::stringstream sbuffer;
|
|
sbuffer << in.rdbuf();
|
|
if (in.fail()) {
|
|
return StringError("Cannot read " + (std::string)path);
|
|
}
|
|
auto content = sbuffer.str();
|
|
BufferView buffer = {(const uint8_t *)content.c_str(), content.length()};
|
|
Key *result = nullptr;
|
|
|
|
int error_code = deser(engine, buffer, &result);
|
|
|
|
if (result == nullptr || error_code != 0) {
|
|
return StringError("Cannot deserialize " + (std::string)path);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static void writeFile(llvm::SmallString<0> &path, Buffer content) {
|
|
std::ofstream out((std::string)path, std::ofstream::binary);
|
|
out.write((const char *)content.pointer, content.length);
|
|
out.close();
|
|
}
|
|
|
|
outcome::checked<LweSecretKey64 *, StringError>
|
|
loadSecretKey(llvm::SmallString<0> &path) {
|
|
DefaultSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_default_serialization_engine(&engine));
|
|
|
|
return load(path, default_serialization_engine_deserialize_lwe_secret_key_u64,
|
|
engine);
|
|
}
|
|
|
|
outcome::checked<LweKeyswitchKey64 *, StringError>
|
|
loadKeyswitchKey(llvm::SmallString<0> &path) {
|
|
DefaultSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_default_serialization_engine(&engine));
|
|
|
|
return load(path,
|
|
default_serialization_engine_deserialize_lwe_keyswitch_key_u64,
|
|
engine);
|
|
}
|
|
|
|
outcome::checked<FftwFourierLweBootstrapKey64 *, StringError>
|
|
loadBootstrapKey(llvm::SmallString<0> &path) {
|
|
|
|
FftwSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_fftw_serialization_engine(&engine));
|
|
|
|
return load(
|
|
path,
|
|
fftw_serialization_engine_deserialize_fftw_fourier_lwe_bootstrap_key_u64,
|
|
engine);
|
|
}
|
|
|
|
void saveSecretKey(llvm::SmallString<0> &path, LweSecretKey64 *key) {
|
|
|
|
DefaultSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_default_serialization_engine(&engine));
|
|
|
|
Buffer buffer;
|
|
|
|
CAPI_ASSERT_ERROR(default_serialization_engine_serialize_lwe_secret_key_u64(
|
|
engine, key, &buffer));
|
|
|
|
writeFile(path, buffer);
|
|
free(buffer.pointer);
|
|
}
|
|
|
|
void saveBootstrapKey(llvm::SmallString<0> &path,
|
|
FftwFourierLweBootstrapKey64 *key) {
|
|
FftwSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_fftw_serialization_engine(&engine));
|
|
|
|
Buffer buffer;
|
|
|
|
CAPI_ASSERT_ERROR(
|
|
fftw_serialization_engine_serialize_fftw_fourier_lwe_bootstrap_key_u64(
|
|
engine, key, &buffer));
|
|
|
|
writeFile(path, buffer);
|
|
free(buffer.pointer);
|
|
}
|
|
|
|
void saveKeyswitchKey(llvm::SmallString<0> &path, LweKeyswitchKey64 *key) {
|
|
|
|
DefaultSerializationEngine *engine;
|
|
|
|
CAPI_ASSERT_ERROR(new_default_serialization_engine(&engine));
|
|
|
|
Buffer buffer;
|
|
CAPI_ASSERT_ERROR(
|
|
default_serialization_engine_serialize_lwe_keyswitch_key_u64(engine, key,
|
|
&buffer));
|
|
writeFile(path, buffer);
|
|
free(buffer.pointer);
|
|
}
|
|
|
|
outcome::checked<std::unique_ptr<KeySet>, StringError>
|
|
KeySetCache::loadKeys(ClientParameters ¶ms, uint64_t seed_msb,
|
|
uint64_t seed_lsb, std::string folderPath) {
|
|
// TODO: text dump of all parameter in /hash
|
|
auto key_set = std::make_unique<KeySet>();
|
|
// Mark the folder as recently use.
|
|
// e.g. so the CI can do some cleanup of unused keys.
|
|
utime(folderPath.c_str(), nullptr);
|
|
|
|
std::map<LweSecretKeyID, std::pair<LweSecretKeyParam, LweSecretKey64 *>>
|
|
secretKeys;
|
|
std::map<LweSecretKeyID,
|
|
std::pair<BootstrapKeyParam, std::shared_ptr<LweBootstrapKey>>>
|
|
bootstrapKeys;
|
|
std::map<LweSecretKeyID,
|
|
std::pair<KeyswitchKeyParam, std::shared_ptr<LweKeyswitchKey>>>
|
|
keyswitchKeys;
|
|
|
|
// Load LWE secret keys
|
|
for (auto secretKeyParam : params.secretKeys) {
|
|
auto id = secretKeyParam.first;
|
|
auto param = secretKeyParam.second;
|
|
llvm::SmallString<0> path(folderPath);
|
|
llvm::sys::path::append(path, "secretKey_" + id);
|
|
OUTCOME_TRY(LweSecretKey64 * sk, loadSecretKey(path));
|
|
secretKeys[id] = {param, sk};
|
|
}
|
|
// Load bootstrap keys
|
|
for (auto bootstrapKeyParam : params.bootstrapKeys) {
|
|
auto id = bootstrapKeyParam.first;
|
|
auto param = bootstrapKeyParam.second;
|
|
llvm::SmallString<0> path(folderPath);
|
|
llvm::sys::path::append(path, "pbsKey_" + id);
|
|
OUTCOME_TRY(FftwFourierLweBootstrapKey64 * bsk, loadBootstrapKey(path));
|
|
bootstrapKeys[id] = {param, std::make_shared<LweBootstrapKey>(bsk)};
|
|
}
|
|
// Load keyswitch keys
|
|
for (auto keyswitchParam : params.keyswitchKeys) {
|
|
auto id = keyswitchParam.first;
|
|
auto param = keyswitchParam.second;
|
|
llvm::SmallString<0> path(folderPath);
|
|
llvm::sys::path::append(path, "ksKey_" + id);
|
|
OUTCOME_TRY(LweKeyswitchKey64 * ksk, loadKeyswitchKey(path));
|
|
keyswitchKeys[id] = {param, std::make_shared<LweKeyswitchKey>(ksk)};
|
|
}
|
|
|
|
key_set->setKeys(secretKeys, bootstrapKeys, keyswitchKeys);
|
|
|
|
OUTCOME_TRYV(key_set->setupEncryptionMaterial(params, seed_msb, seed_lsb));
|
|
|
|
return std::move(key_set);
|
|
}
|
|
|
|
outcome::checked<void, StringError> saveKeys(KeySet &key_set,
|
|
llvm::SmallString<0> &folderPath) {
|
|
llvm::SmallString<0> folderIncompletePath = folderPath;
|
|
|
|
folderIncompletePath.append(".incomplete");
|
|
|
|
auto err = llvm::sys::fs::create_directories(folderIncompletePath);
|
|
if (err) {
|
|
return StringError("Cannot create directory \"")
|
|
<< std::string(folderIncompletePath) << "\": " << err.message();
|
|
}
|
|
|
|
// Save LWE secret keys
|
|
for (auto secretKeyParam : key_set.getSecretKeys()) {
|
|
auto id = secretKeyParam.first;
|
|
auto key = secretKeyParam.second.second;
|
|
llvm::SmallString<0> path = folderIncompletePath;
|
|
llvm::sys::path::append(path, "secretKey_" + id);
|
|
saveSecretKey(path, key);
|
|
}
|
|
// Save bootstrap keys
|
|
for (auto bootstrapKeyParam : key_set.getBootstrapKeys()) {
|
|
auto id = bootstrapKeyParam.first;
|
|
auto key = bootstrapKeyParam.second.second;
|
|
llvm::SmallString<0> path = folderIncompletePath;
|
|
llvm::sys::path::append(path, "pbsKey_" + id);
|
|
saveBootstrapKey(path, key->get());
|
|
}
|
|
// Save keyswitch keys
|
|
for (auto keyswitchParam : key_set.getKeyswitchKeys()) {
|
|
auto id = keyswitchParam.first;
|
|
auto key = keyswitchParam.second.second;
|
|
llvm::SmallString<0> path = folderIncompletePath;
|
|
llvm::sys::path::append(path, "ksKey_" + id);
|
|
saveKeyswitchKey(path, key->get());
|
|
}
|
|
|
|
err = llvm::sys::fs::rename(folderIncompletePath, folderPath);
|
|
if (err) {
|
|
llvm::sys::fs::remove_directories(folderIncompletePath);
|
|
}
|
|
if (!llvm::sys::fs::exists(folderPath)) {
|
|
return StringError("Cannot save directory \"")
|
|
<< std::string(folderPath) << "\"";
|
|
}
|
|
|
|
return outcome::success();
|
|
}
|
|
|
|
outcome::checked<std::unique_ptr<KeySet>, StringError>
|
|
KeySetCache::loadOrGenerateSave(ClientParameters ¶ms, uint64_t seed_msb,
|
|
uint64_t seed_lsb) {
|
|
|
|
llvm::SmallString<0> folderPath =
|
|
llvm::SmallString<0>(this->backingDirectoryPath);
|
|
|
|
llvm::sys::path::append(folderPath, std::to_string(params.hash()));
|
|
|
|
llvm::sys::path::append(folderPath, std::to_string(seed_msb) + "_" +
|
|
std::to_string(seed_lsb));
|
|
|
|
// Creating a lock for concurrent generation
|
|
llvm::SmallString<0> lockPath(folderPath);
|
|
lockPath.append("lock");
|
|
int FD_lock;
|
|
llvm::sys::fs::create_directories(llvm::sys::path::parent_path(lockPath));
|
|
// Open or create the lock file
|
|
auto err = llvm::sys::fs::openFile(
|
|
lockPath, FD_lock, llvm::sys::fs::CreationDisposition::CD_OpenAlways,
|
|
llvm::sys::fs::FileAccess::FA_Write, llvm::sys::fs::OpenFlags::OF_None);
|
|
|
|
if (err) {
|
|
// parent does not exists OR right issue (creation or write)
|
|
return StringError("Cannot access \"")
|
|
<< std::string(lockPath) << "\": " << err.message();
|
|
}
|
|
|
|
// The lock is released when the function returns.
|
|
// => any intermediate state in the function is not visible to others.
|
|
auto unlockAtReturn = llvm::make_scope_exit([&]() {
|
|
llvm::sys::fs::unlockFile(FD_lock);
|
|
llvm::sys::fs::remove(lockPath);
|
|
});
|
|
llvm::sys::fs::lockFile(FD_lock);
|
|
|
|
if (llvm::sys::fs::exists(folderPath)) {
|
|
// Once it has been generated by another process (or was alread here)
|
|
auto keys = loadKeys(params, seed_msb, seed_lsb, std::string(folderPath));
|
|
if (keys.has_value()) {
|
|
return keys;
|
|
} else {
|
|
std::cerr << std::string(keys.error().mesg) << "\n";
|
|
std::cerr << "Invalid KeySetCache entry " << std::string(folderPath)
|
|
<< "\n";
|
|
llvm::sys::fs::remove_directories(folderPath);
|
|
// Then we can continue as it didn't exist
|
|
}
|
|
}
|
|
|
|
std::cerr << "KeySetCache: miss, regenerating " << std::string(folderPath)
|
|
<< "\n";
|
|
OUTCOME_TRY(auto key_set, KeySet::generate(params, seed_msb, seed_lsb));
|
|
|
|
OUTCOME_TRYV(saveKeys(*key_set, folderPath));
|
|
|
|
return std::move(key_set);
|
|
}
|
|
|
|
outcome::checked<std::unique_ptr<KeySet>, StringError>
|
|
KeySetCache::generate(std::shared_ptr<KeySetCache> cache,
|
|
ClientParameters ¶ms, uint64_t seed_msb,
|
|
uint64_t seed_lsb) {
|
|
return cache ? cache->loadOrGenerateSave(params, seed_msb, seed_lsb)
|
|
: KeySet::generate(params, seed_msb, seed_lsb);
|
|
}
|
|
|
|
} // namespace clientlib
|
|
} // namespace concretelang
|