Skip to content

Commit 8eea261

Browse files
committed
Rename some alias to match updated types
1 parent d7ab9f7 commit 8eea261

File tree

2 files changed

+13
-10
lines changed

2 files changed

+13
-10
lines changed

mithril-common/src/crypto_helper/cardano/cold_key.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
use ed25519_dalek::SigningKey as ColdKeypair;
1+
use ed25519_dalek::SigningKey as ColdSecretKey;
22
use rand_chacha::ChaCha20Rng;
33
use rand_core::SeedableRng;
44

@@ -7,9 +7,9 @@ use rand_core::SeedableRng;
77
pub struct ColdKeyGenerator();
88

99
impl ColdKeyGenerator {
10-
pub(crate) fn create_deterministic_keypair(seed: [u8; 32]) -> ColdKeypair {
10+
pub(crate) fn create_deterministic_keypair(seed: [u8; 32]) -> ColdSecretKey {
1111
let mut rng = ChaCha20Rng::from_seed(seed);
12-
ColdKeypair::generate(&mut rng)
12+
ColdSecretKey::generate(&mut rng)
1313
}
1414
}
1515

mithril-common/src/crypto_helper/cardano/opcert.rs

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,10 @@ use crate::crypto_helper::ProtocolPartyId;
66

77
use bech32::{self, ToBase32, Variant};
88
use blake2::{digest::consts::U28, Blake2b, Digest};
9-
use ed25519_dalek::{Signature as EdSignature, Verifier, VerifyingKey as EdPublicKey};
10-
use ed25519_dalek::{Signer, SigningKey as EdKeypair};
9+
use ed25519_dalek::{
10+
Signature as EdSignature, Signer, SigningKey as EdSecretKey, Verifier,
11+
VerifyingKey as EdVerificationKey,
12+
};
1113
use kes_summed_ed25519::PublicKey as KesPublicKey;
1214
use nom::AsBytes;
1315
use serde::de::Error;
@@ -34,7 +36,7 @@ struct RawFields(
3436

3537
/// Raw Operational Certificate
3638
#[derive(Clone, Debug, Deserialize, PartialEq, Eq, Serialize)]
37-
struct RawOpCert(RawFields, EdPublicKey);
39+
struct RawOpCert(RawFields, EdVerificationKey);
3840

3941
/// Parsed Operational Certificate
4042
#[derive(Clone, Debug, PartialEq, Eq)]
@@ -44,7 +46,7 @@ pub struct OpCert {
4446
/// KES period at which KES key is initalized
4547
pub start_kes_period: u64,
4648
pub(crate) cert_sig: EdSignature,
47-
pub(crate) cold_vk: EdPublicKey,
49+
pub(crate) cold_vk: EdVerificationKey,
4850
}
4951

5052
impl SerDeShelleyFileFormat for OpCert {
@@ -58,14 +60,15 @@ impl OpCert {
5860
kes_vk: KesPublicKey,
5961
issue_number: u64,
6062
start_kes_period: u64,
61-
cold_keypair: EdKeypair,
63+
cold_secret_key: EdSecretKey,
6264
) -> Self {
63-
let cold_vk: EdPublicKey = cold_keypair.verifying_key();
64-
let cert_sig = cold_keypair.sign(&Self::compute_message_to_sign(
65+
let cold_vk: EdVerificationKey = cold_secret_key.verifying_key();
66+
let cert_sig = cold_secret_key.sign(&Self::compute_message_to_sign(
6567
&kes_vk,
6668
issue_number,
6769
start_kes_period,
6870
));
71+
6972
Self {
7073
kes_vk,
7174
issue_number,

0 commit comments

Comments
 (0)