Skip to content

Commit a422f77

Browse files
committed
Update KES
1 parent b864146 commit a422f77

File tree

8 files changed

+51
-18
lines changed

8 files changed

+51
-18
lines changed

Cargo.lock

Lines changed: 3 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

mithril-common/Cargo.toml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ glob = "0.3"
2727
hex = "0.4.3"
2828
http = "0.2.6"
2929
jsonschema = "0.16.0"
30-
kes-summed-ed25519 = { version = "0.1.1", features = ["serde_enabled"] }
30+
kes-summed-ed25519 = { version = "0.2.0", features = ["serde_enabled", "sk_clone_enabled"]}
3131
lazy_static = "1.4.0"
3232
mockall = "0.11.0"
3333
nom = "7.1"
@@ -39,6 +39,7 @@ serde = { version = "1.0", features = ["derive"] }
3939
serde_bytes = "0.11.7"
4040
serde_cbor = "0.11.2"
4141
serde_json = "1.0"
42+
serde_with = "2.2.0"
4243
serde_yaml = "0.9.10"
4344
sha2 = "0.10.2"
4445
slog = { version = "2.7.0", features = ["max_level_trace", "release_max_level_debug"] }

mithril-common/src/chain_observer/cli_observer.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -635,7 +635,9 @@ pool1qz2vzszautc2c8mljnqre2857dpmheq7kgt6vav0s38tvvhxm6w 1.051e-6
635635
#[tokio::test]
636636
async fn test_get_current_kes_period() {
637637
let keypair = ColdKeyGenerator::create_deterministic_keypair([0u8; 32]);
638-
let (_, kes_verification_key) = Sum6Kes::keygen(&mut [0u8; 32]);
638+
let mut dummy_key_buffer = [0u8; Sum6Kes::SIZE + 4];
639+
let mut dummy_seed = [0u8; 32];
640+
let (_, kes_verification_key) = Sum6Kes::keygen(&mut dummy_key_buffer, &mut dummy_seed);
639641
let operational_certificate = OpCert::new(kes_verification_key, 0, 0, keypair);
640642
let observer = CardanoCliChainObserver::new(Box::new(TestCliRunner {}));
641643
let kes_period = observer

mithril-common/src/crypto_helper/cardano/codec.rs

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,24 @@
1313
1414
use hex::FromHex;
1515
use kes_summed_ed25519::kes::Sum6Kes;
16+
use kes_summed_ed25519::traits::KesSk;
1617
use serde::de::DeserializeOwned;
1718
use serde::{Deserialize, Serialize};
19+
use serde_with::{As, Bytes};
1820
use std::fs;
1921
use std::io::Write;
2022
use std::path::Path;
2123
use thiserror::Error;
2224

25+
/// We need to create this struct because the design of Sum6Kes takes
26+
/// a reference to a mutable pointer. It is therefore not possible to
27+
/// implement Ser/Deser using serde.
28+
// We need this helper structure, because we are currently getting the key
29+
// from a file, instead of directly consuming a buffer.
30+
// todo: create the KES key directly from a buffer instead of deserialising from disk
31+
#[derive(Clone, Serialize, Deserialize)]
32+
pub struct Sum6KesBytes(#[serde(with = "As::<Bytes>")] pub [u8; 612]);
33+
2334
/// Parse error
2435
#[derive(Error, Debug)]
2536
pub enum ParseError {
@@ -85,7 +96,7 @@ pub trait SerDeShelleyFileFormat: Serialize + DeserializeOwned {
8596
}
8697
}
8798

88-
impl SerDeShelleyFileFormat for Sum6Kes {
99+
impl SerDeShelleyFileFormat for Sum6KesBytes {
89100
const TYPE: &'static str = "KesSigningKey_ed25519_kes_2^6";
90101
const DESCRIPTION: &'static str = "KES Signing Key";
91102

@@ -110,6 +121,12 @@ impl SerDeShelleyFileFormat for Sum6Kes {
110121
}
111122
}
112123

124+
impl<'a> From<&'a mut Sum6KesBytes> for Sum6Kes<'a> {
125+
fn from(value: &'a mut Sum6KesBytes) -> Self {
126+
Self::from_bytes(&mut value.0).expect("Invalid data format")
127+
}
128+
}
129+
113130
#[cfg(all(test))]
114131
mod test {
115132
use super::*;
@@ -122,8 +139,8 @@ mod test {
122139
let cbor_string = "590260fe77acdfa56281e4b05198f5136018057a65f425411f0990cac4aca0f2917aa00a3d51e191f6f425d870aca3c6a2a41833621f5729d7bc0e3dfc3ae77d057e5e1253b71def7a54157b9f98973ca3c49edd9f311e5f4b23ac268b56a6ac040c14c6d2217925492e42f00dc89a2a01ff363571df0ca0db5ba37001cee56790cc01cd69c6aa760fca55a65a110305ea3c11da0a27be345a589329a584ebfc499c43c55e8c6db5d9c0b014692533ee78abd7ac1e79f7ec9335c7551d31668369b4d5111db78072f010043e35e5ca7f11acc3c05b26b9c7fe56f02aa41544f00cb7685e87f34c73b617260ade3c7b8d8c4df46693694998f85ad80d2cbab0b575b6ccd65d90574e84368169578bff57f751bc94f7eec5c0d7055ec88891a69545eedbfbd3c5f1b1c1fe09c14099f6b052aa215efdc5cb6cdc84aa810db41dbe8cb7d28f7c4beb75cc53915d3ac75fc9d0bf1c734a46e401e15150c147d013a938b7e07cc4f25a582b914e94783d15896530409b8acbe31ef471de8a1988ac78dfb7510729eff008084885f07df870b65e4f382ca15908e1dcda77384b5c724350de90cec22b1dcbb1cdaed88da08bb4772a82266ec154f5887f89860d0920dba705c45957ef6d93e42f6c9509c966277d368dd0eefa67c8147aa15d40a222f7953a4f34616500b310d00aa1b5b73eb237dc4f76c0c16813d321b2fc5ac97039be25b22509d1201d61f4ccc11cd4ff40fffe39f0e937b4722074d8e073a775d7283b715d46f79ce128e3f1362f35615fa72364d20b6db841193d96e58d9d8e86b516bbd1f05e45b39823a93f6e9f29d9e01acf2c12c072d1c64e0afbbabf6903ef542e".to_string();
123140

124141
let file_format = ShelleyFileFormat {
125-
file_type: Sum6Kes::TYPE.to_string(),
126-
description: Sum6Kes::DESCRIPTION.to_string(),
142+
file_type: Sum6KesBytes::TYPE.to_string(),
143+
description: Sum6KesBytes::DESCRIPTION.to_string(),
127144
cbor_hex: cbor_string,
128145
};
129146

@@ -134,8 +151,9 @@ mod test {
134151

135152
write!(file, "{json_str}").expect("Unexpected error writing to file.");
136153

137-
let kes_sk = Sum6Kes::from_file(&sk_dir);
154+
let mut kes_sk_bytes =
155+
Sum6KesBytes::from_file(&sk_dir).expect("Failure parsing Shelley file format.");
138156

139-
assert!(kes_sk.is_ok(), "Failure parsing Shelley file format.");
157+
let _kes_sk = Sum6Kes::from(&mut kes_sk_bytes); // Panics if data is incorrect
140158
}
141159
}

mithril-common/src/crypto_helper/cardano/key_certification.rs

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ use mithril_stm::key_reg::{ClosedKeyReg, KeyReg};
1515
use mithril_stm::stm::{Stake, StmInitializer, StmParameters, StmSigner, StmVerificationKeyPoP};
1616
use mithril_stm::RegisterError;
1717

18+
use crate::crypto_helper::cardano::Sum6KesBytes;
1819
use blake2::{
1920
digest::{consts::U32, FixedOutput},
2021
Blake2b, Digest,
@@ -123,8 +124,8 @@ impl StmInitializerWrapper {
123124
) -> Result<Self, ProtocolInitializerErrorWrapper> {
124125
let stm_initializer = StmInitializer::setup(params, stake, rng);
125126
let kes_signature = if let Some(kes_sk_path) = kes_sk_path {
126-
let mut kes_sk: Sum6Kes = Sum6Kes::from_file(kes_sk_path)?;
127-
127+
let mut kes_sk_bytes = Sum6KesBytes::from_file(kes_sk_path)?;
128+
let mut kes_sk = Sum6Kes::from(&mut kes_sk_bytes);
128129
let kes_sk_period = kes_sk.get_period();
129130
let provided_period = kes_period.unwrap_or_default();
130131
if kes_sk_period > provided_period {
@@ -308,10 +309,15 @@ mod test {
308309
fn create_cryptographic_material(party_idx: u64) -> (ProtocolPartyId, PathBuf, PathBuf) {
309310
let temp_dir = setup_temp_directory();
310311
let keypair = ColdKeyGenerator::create_deterministic_keypair([party_idx as u8; 32]);
311-
let (kes_secret_key, kes_verification_key) = Sum6Kes::keygen(&mut [party_idx as u8; 32]);
312+
let mut dummy_buffer = [0u8; Sum6Kes::SIZE + 4];
313+
let mut dummy_seed = [party_idx as u8; 32];
314+
let (kes_secret_key, kes_verification_key) =
315+
Sum6Kes::keygen(&mut dummy_buffer, &mut dummy_seed);
316+
let mut kes_bytes = Sum6KesBytes([0u8; Sum6Kes::SIZE + 4]);
317+
kes_bytes.0.copy_from_slice(&kes_secret_key.clone_sk());
312318
let operational_certificate = OpCert::new(kes_verification_key, 0, 0, keypair);
313319
let kes_secret_key_file = temp_dir.join(format!("kes{party_idx}.skey"));
314-
kes_secret_key
320+
kes_bytes
315321
.to_file(&kes_secret_key_file)
316322
.expect("KES secret key file export should not fail");
317323
let operational_certificate_file = temp_dir.join(format!("pool{party_idx}.cert"));

mithril-common/src/crypto_helper/cardano/opcert.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,9 @@ mod tests {
187187
fn test_vector_opcert() {
188188
let temp_dir = setup_temp_directory();
189189
let keypair = ColdKeyGenerator::create_deterministic_keypair([0u8; 32]);
190-
let (_, kes_verification_key) = Sum6Kes::keygen(&mut [0u8; 32]);
190+
let mut dummy_key_buffer = [0u8; Sum6Kes::SIZE + 4];
191+
let mut dummy_seed = [0u8; 32];
192+
let (_, kes_verification_key) = Sum6Kes::keygen(&mut dummy_key_buffer, &mut dummy_seed);
191193
let operational_certificate = OpCert::new(kes_verification_key, 0, 0, keypair);
192194
assert!(operational_certificate.validate().is_ok());
193195

mithril-common/src/crypto_helper/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ mod types;
1111

1212
#[cfg(any(test, feature = "test_only"))]
1313
pub use cardano::ColdKeyGenerator;
14-
pub use cardano::{KESPeriod, OpCert, SerDeShelleyFileFormat};
14+
pub use cardano::{KESPeriod, OpCert, SerDeShelleyFileFormat, Sum6KesBytes};
1515
pub use codec::*;
1616
pub use era::{
1717
EraMarkersSigner, EraMarkersVerifier, EraMarkersVerifierError, EraMarkersVerifierSecretKey,

mithril-common/src/test_utils/fixture_builder.rs

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ use rand_core::{RngCore, SeedableRng};
55
use crate::{
66
crypto_helper::{
77
tests_setup, tests_setup::setup_temp_directory_for_signer, ColdKeyGenerator, OpCert,
8-
ProtocolStakeDistribution, SerDeShelleyFileFormat,
8+
ProtocolStakeDistribution, SerDeShelleyFileFormat, Sum6KesBytes,
99
},
1010
entities::{PartyId, ProtocolParameters, StakeDistribution},
1111
test_utils::{fake_data, mithril_fixture::MithrilFixture},
@@ -121,15 +121,18 @@ fn build_party_with_operational_certificate(
121121
kes_key_seed: &mut [u8],
122122
) -> PartyId {
123123
let keypair = ColdKeyGenerator::create_deterministic_keypair([party_index as u8; 32]);
124-
let (kes_secret_key, kes_verification_key) = Sum6Kes::keygen(kes_key_seed);
124+
let mut dummy_buffer = [0u8; Sum6Kes::SIZE + 4];
125+
let (kes_secret_key, kes_verification_key) = Sum6Kes::keygen(&mut dummy_buffer, kes_key_seed);
126+
let mut kes_bytes = Sum6KesBytes([0u8; Sum6Kes::SIZE + 4]);
127+
kes_bytes.0.copy_from_slice(&kes_secret_key.clone_sk());
125128
let operational_certificate = OpCert::new(kes_verification_key, 0, 0, keypair);
126129
let party_id = operational_certificate
127130
.compute_protocol_party_id()
128131
.expect("compute protocol party id should not fail");
129132
let temp_dir = setup_temp_directory_for_signer(&party_id, true)
130133
.expect("setup temp directory should return a value");
131134
if !temp_dir.join("kes.sk").exists() {
132-
kes_secret_key
135+
kes_bytes
133136
.to_file(temp_dir.join("kes.sk"))
134137
.expect("KES secret key file export should not fail");
135138
}

0 commit comments

Comments
 (0)