mithril_common/crypto_helper/cardano/
opcert.rsuse super::SerDeShelleyFileFormat;
use crate::crypto_helper::cardano::ProtocolRegistrationErrorWrapper;
use crate::crypto_helper::{encode_bech32, ProtocolPartyId};
use blake2::{digest::consts::U28, Blake2b, Digest};
use ed25519_dalek::{
Signature as EdSignature, Signer, SigningKey as EdSecretKey, Verifier,
VerifyingKey as EdVerificationKey,
};
use kes_summed_ed25519::PublicKey as KesPublicKey;
use nom::AsBytes;
use serde::de::Error;
use serde::{Deserialize, Deserializer, Serialize, Serializer};
use sha2::Sha256;
use thiserror::Error;
#[derive(Error, Debug, PartialEq, Eq)]
pub enum OpCertError {
#[error("pool address encoding error")]
PoolAddressEncoding,
}
#[derive(Clone, Debug, Deserialize, PartialEq, Eq, Serialize)]
struct RawFields(
#[serde(with = "serde_bytes")] Vec<u8>,
u64,
u64,
#[serde(with = "serde_bytes")] Vec<u8>,
);
#[derive(Clone, Debug, Deserialize, PartialEq, Eq, Serialize)]
struct RawOpCert(RawFields, EdVerificationKey);
#[derive(Clone, Debug, PartialEq, Eq)]
pub struct OpCert {
pub(crate) kes_vk: KesPublicKey,
pub(crate) issue_number: u64,
pub start_kes_period: u64,
pub(crate) cert_sig: EdSignature,
pub(crate) cold_vk: EdVerificationKey,
}
impl SerDeShelleyFileFormat for OpCert {
const TYPE: &'static str = "NodeOperationalCertificate";
const DESCRIPTION: &'static str = "";
}
impl OpCert {
pub fn new(
kes_vk: KesPublicKey,
issue_number: u64,
start_kes_period: u64,
cold_secret_key: EdSecretKey,
) -> Self {
let cold_vk: EdVerificationKey = cold_secret_key.verifying_key();
let cert_sig = cold_secret_key.sign(&Self::compute_message_to_sign(
&kes_vk,
issue_number,
start_kes_period,
));
Self {
kes_vk,
issue_number,
start_kes_period,
cert_sig,
cold_vk,
}
}
pub(crate) fn compute_message_to_sign(
kes_vk: &KesPublicKey,
issue_number: u64,
start_kes_period: u64,
) -> [u8; 48] {
let mut msg = [0u8; 48];
msg[..32].copy_from_slice(kes_vk.as_bytes());
msg[32..40].copy_from_slice(&issue_number.to_be_bytes());
msg[40..48].copy_from_slice(&start_kes_period.to_be_bytes());
msg
}
pub fn validate(&self) -> Result<(), ProtocolRegistrationErrorWrapper> {
if self
.cold_vk
.verify(
&Self::compute_message_to_sign(
&self.kes_vk,
self.issue_number,
self.start_kes_period,
),
&self.cert_sig,
)
.is_ok()
{
return Ok(());
}
Err(ProtocolRegistrationErrorWrapper::OpCertInvalid)
}
pub fn compute_protocol_party_id(&self) -> Result<ProtocolPartyId, OpCertError> {
let mut hasher = Blake2b::<U28>::new();
hasher.update(self.cold_vk.as_bytes());
let mut pool_id = [0u8; 28];
pool_id.copy_from_slice(hasher.finalize().as_bytes());
encode_bech32("pool", &pool_id).map_err(|_| OpCertError::PoolAddressEncoding)
}
pub fn compute_protocol_party_id_as_hash(&self) -> String {
let mut hasher = Blake2b::<U28>::new();
hasher.update(self.cold_vk.as_bytes());
hex::encode(hasher.finalize())
}
pub fn compute_hash(&self) -> String {
let mut hasher = Sha256::new();
hasher.update(self.kes_vk.as_bytes());
hasher.update(self.issue_number.to_be_bytes());
hasher.update(self.start_kes_period.to_be_bytes());
hasher.update(self.cert_sig.to_bytes());
hasher.update(self.cold_vk.as_bytes());
hex::encode(hasher.finalize())
}
}
impl Serialize for OpCert {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
let raw_cert = RawOpCert(
RawFields(
self.kes_vk.as_bytes().to_vec(),
self.issue_number,
self.start_kes_period,
self.cert_sig.to_bytes().to_vec(),
),
self.cold_vk,
);
raw_cert.serialize(serializer)
}
}
impl<'de> Deserialize<'de> for OpCert {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: Deserializer<'de>,
{
let raw_cert = RawOpCert::deserialize(deserializer)?;
Ok(Self {
kes_vk: KesPublicKey::from_bytes(&raw_cert.0 .0)
.map_err(|_| Error::custom("KES vk serialisation error"))?,
issue_number: raw_cert.0 .1,
start_kes_period: raw_cert.0 .2,
cert_sig: EdSignature::from_slice(&raw_cert.0 .3)
.map_err(|_| Error::custom("ed25519 signature serialisation error"))?,
cold_vk: raw_cert.1,
})
}
}
#[cfg(test)]
mod tests {
use super::*;
use crate::crypto_helper::cardano::ColdKeyGenerator;
use crate::test_utils::TempDir;
use kes_summed_ed25519::{kes::Sum6Kes, traits::KesSk};
use std::path::PathBuf;
fn setup_temp_directory(test_name: &str) -> PathBuf {
TempDir::create("mithril_cardano_opcert", test_name)
}
#[test]
fn test_vector_opcert() {
let temp_dir = setup_temp_directory("test_vector_opcert");
let keypair = ColdKeyGenerator::create_deterministic_keypair([0u8; 32]);
let mut dummy_key_buffer = [0u8; Sum6Kes::SIZE + 4];
let mut dummy_seed = [0u8; 32];
let (_, kes_verification_key) = Sum6Kes::keygen(&mut dummy_key_buffer, &mut dummy_seed);
let operational_certificate = OpCert::new(kes_verification_key, 0, 0, keypair);
assert!(operational_certificate.validate().is_ok());
let operation_certificate_file = temp_dir.join("node.cert");
operational_certificate
.to_file(&operation_certificate_file)
.expect("operational certificate file export should not fail");
let operational_certificate: OpCert = OpCert::from_file(&operation_certificate_file)
.expect("operational certificate file import should not fail");
assert!(operational_certificate.validate().is_ok());
let party_id = operational_certificate
.compute_protocol_party_id()
.expect("compute protocol party_id should not fail");
assert_eq!(
"pool1mxyec46067n3querj9cxkk0g0zlag93pf3ya9vuyr3wgkq2e6t7".to_string(),
party_id
);
let party_id_as_hash = operational_certificate.compute_protocol_party_id_as_hash();
assert_eq!(
"d9899c574fd7a710732391706b59e878bfd416214c49d2b3841c5c8b".to_string(),
party_id_as_hash
);
}
}