-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[move] fix MultiEd25519 PK validation small bug #5822
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
a91f460
to
c65dcd7
Compare
davidiw
approved these changes
Dec 11, 2022
zjma
reviewed
Dec 13, 2022
zjma
reviewed
Dec 13, 2022
zjma
reviewed
Dec 13, 2022
c65dcd7
to
e956b9b
Compare
zjma
approved these changes
Dec 19, 2022
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
✅ Forge suite
|
✅ Forge suite
|
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Our MultiEd25519 Move module allowed for some invalid MultiEd25519 PKs to be deserialized as
ValidatedPublicKey
structs. Such incorrectly-deserialized structs would've been caught later on during signature verification. Nonetheless, we will fix this bug to guarantee correct semantics of MultiEd25519 validated PKs.Details
Our native implementation of the
public_key_validate_internal
Move function did not check that a MultiEd25519 PK had >= 1 sub-PKs.Furthermore, this implementation did not minimize the gas costs charged to the user, when aborting early.
Fix
This PR introduces a new
public_key_validate_v2_internal
API that addresses these two issues. As a result, it deprecates two public functions that used the old version:new_validated_public_key_from_bytes
fornew_validated_public_key_from_bytes_v2
public_key_validate
forpublic_key_validate_v2
Our
public_key_validate_v2_internal
API uses a newMultiEd25519PublicKey::validate_bytes_and_count_checks
in theaptos_crypto
crate to check the well-formedness of a public key.Test Plan
validate_bytes_and_count_checks
againstMultiEd25519PublicKey::try_from