Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upstream KEVM hook code #115

Merged
merged 9 commits into from
Sep 14, 2020
Merged
19 changes: 17 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -20,12 +20,27 @@ CPPFLAGS += --std=c++14 $(INCLUDES)
.PHONY: build libcryptopp libff libsecp256k1
build: client-c/json.o client-c/main.o plugin-c/blake2.o plugin-c/blockchain.o plugin-c/crypto.o plugin-c/plugin_util.o plugin-c/world.o

plugin-c/blockchain.o: plugin/proto/msg.pb.h
plugin-c/blockchain.o: plugin-c/proto/msg.pb.h

%.pb.h: %.proto
protoc --cpp_out=. $<

.PHONY: clean
.PHONY: install clean

DESTDIR ?=
INSTALL_PREFIX ?= /usr/local
INSTALL_DIR := $(DESTDIR)$(INSTALL_PREFIX)
INSTALL_INCLUDE := $(INSTALL_DIR)/include/kframework

PLUGIN_NAMESPACE := blockchain-k-plugin
K_SOURCES := krypto.md

install: $(patsubst %, $(INSTALL_INCLUDE)/$(PLUGIN_NAMESPACE)/%, $(K_SOURCES))

$(INSTALL_INCLUDE)/$(PLUGIN_NAMESPACE)/%.md: plugin/%.md
@mkdir -p $(dir $@)
cp $< $@

clean:
rm -rf */*.o */*/*.o plugin/proto/*.pb.* build deps/libff/build
cd deps/secp256k1 && $(MAKE) clean
Expand Down
File renamed without changes.
File renamed without changes.
110 changes: 110 additions & 0 deletions plugin/krypto.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
Cryptographic Primitives
========================

Here we implement the various cryptographic primitives needed for various blockchain systems.

```k
module KRYPTO
imports STRING-SYNTAX
imports INT-SYNTAX
imports LIST
```

Hash Functions
--------------

In hooked hash functions, `String` inputs are interpreted as byte arrays, i.e. they are NOT hex-encoded.
`String` outputs are interpreted differently depending on which class of hooked hash functions they belong to:

- hex-encoded - return binary data as hex-encoded strings
- raw - return binary data as raw strings (i.e. NO hex-encoding)

### Hooked Hash Functions with Hex Encoded Outputs

- `Keccak256` takes a string and returns a 64-character hex-encoded string of the 32-byte keccak256 hash of the string.
- `Sha256` takes a string and returns a 64-character hex-encoded string of the 32-byte SHA2-256 hash of the string.
- `Sha512` takes a string and returns a 128-character hex-encoded string of the 64-byte SHA2-512 hash of the string.
- `Sha3_256` takes a string and returns 64-character hex-encoded string of the 32-byte SHA3-256 hash of the string.
- `RipEmd160` takes a string and returns a 40-character hex-encoded string of the 20-byte RIPEMD160 hash of the string.
- `Blake2Compress` takes a raw string containing a packed encoding of the arguments to the Blake2b compression
function F and returns a 128-character hex-encoded string of the 64-byte result from the compression function.

```k
syntax String ::= Keccak256 ( String ) [function, hook(KRYPTO.keccak256)]
| Sha256 ( String ) [function, hook(KRYPTO.sha256)]
| Sha512 ( String ) [function, hook(KRYPTO.sha512)]
| "Sha3_256" "(" String ")" [function, hook(KRYPTO.sha3)]
| RipEmd160 ( String ) [function, hook(KRYPTO.ripemd160)]
| Blake2Compress ( String ) [function, hook(KRYPTO.blake2compress)]
// ---------------------------------------------------------------------------------------------------------
```

### Hooked Hash Functions with Raw Outputs

These functions compute the same hash function as those named above except that they return a raw string.

```k
syntax String ::= Keccak256raw ( String ) [function, hook(KRYPTO.keccak256raw)]
| Sha256raw ( String ) [function, hook(KRYPTO.sha256raw)]
| Sha512raw ( String ) [function, hook(KRYPTO.sha512raw)]
| "Sha3_256raw" "(" String ")" [function, hook(KRYPTO.sha3raw)]
| RipEmd160raw ( String ) [function, hook(KRYPTO.ripemd160raw)]
// -------------------------------------------------------------------------------------------------------
```

### Other Hooked Hash Functions

These hooked hash functions are broken on default Ubuntu installations because of a bug in `libcrypto++` package.
As such, we we hide them behind a separate tangle tag to avoid breaking projects that do not use them.

- `Blake2b256` takes a string and returns a 64-character hex-encoded string of the 32-byte Blake2b256 hash of the string.
- `Blake2b256raw` takes a string and returns the 32-byte Blake2b256 hash of the string.

```libcrypto-extra
syntax String ::= Blake2b256 ( String ) [function, hook(KRYPTO.blake2b256)]
| Blake2b256raw ( String ) [function, hook(KRYPTO.blake2b256raw)]
// --------------------------------------------------------------------------------------------------------
```

ECDSA Functions
---------------

For hooked ECDSA functions, `String` inputs are interpreted as byte arrays, i.e. they are NOT hex-encoded.

- `ECDSARecover` takes a 32-character byte string of a message, v, r, s of the signed message and returns the 64-character public key used to sign the message.
- `ECDSASign` takes a 32-character byte string of a message hash, a 32-character byte string of a private key, and returns the 65 byte hex-encoded signature in [r,s,v] form
- `ECDSAPubKey` takes a 32-character byte string of a private key, and returns the 64 byte hex-encoded public key
See [this StackOverflow post](https://ethereum.stackexchange.com/questions/15766/what-does-v-r-s-in-eth-gettransactionbyhash-mean) for some information about v, r, and s.

```k
syntax String ::= ECDSARecover ( String , Int , String , String ) [function, hook(KRYPTO.ecdsaRecover)]
| ECDSASign ( String, String ) [function, hook(KRYPTO.ecdsaSign)]
| ECDSAPubKey ( String ) [function, hook(KRYPTO.ecdsaPubKey)]
// ---------------------------------------------------------------------------------------------------------
```

BN128 Curve Functions
---------------------

The BN128 elliptic curve is defined over 2-dimensional points over the fields of zero- and first-degree polynomials modulo a large prime. (x, y) is a point on G1, whereas (x1 x x2, y1 x y2) is a point on G2, in which x1 and y1 are zero-degree coefficients and x2 and y2 are first-degree coefficients. In each case, (0, 0) is used to represent the point at infinity.

- `BN128Add` adds two points in G1 together,
- `BN128Mul` multiplies a point in G1 by a scalar.
- `BN128AtePairing` accepts a list of points in G1 and a list of points in G2 and returns whether the sum of the product of the discrete logarithm of the G1 points multiplied by the discrete logarithm of the G2 points is equal to zero.
- `isValidPoint` takes a point in either G1 or G2 and validates that it actually falls on the respective elliptic curve.

```k
syntax G1Point ::= "(" Int "," Int ")" [prefer]
syntax G2Point ::= "(" Int "x" Int "," Int "x" Int ")"
syntax G1Point ::= BN128Add(G1Point, G1Point) [function, hook(KRYPTO.bn128add)]
| BN128Mul(G1Point, Int) [function, hook(KRYPTO.bn128mul)]
// -------------------------------------------------------------------------------

syntax Bool ::= BN128AtePairing(List, List) [function, hook(KRYPTO.bn128ate)]
// -----------------------------------------------------------------------------

syntax Bool ::= isValidPoint(G1Point) [function, hook(KRYPTO.bn128valid)]
| isValidPoint(G2Point) [function, klabel(isValidG2Point), hook(KRYPTO.bn128g2valid)]
// ---------------------------------------------------------------------------------------------------
endmodule
```