You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A few months ago, EIP 2333 was updated so that hkdf_mod_r matched the KeyGen function update in the BLS specs. Prysm is still using the old version.
🔬 Minimal Reproduction
Try run the EIP's tests against your implementation.
The fix
Update hkdf_mod_r to the new version with the while loop as per EIP2333 and run it against the given test vectors:
1. salt = "BLS-SIG-KEYGEN-SALT-"
2. SK = 0
3. while SK == 0:
4. salt = H(salt)
5. PRK = HKDF-Extract(salt, IKM || I2OSP(0, 1))
6. OKM = HKDF-Expand(PRK, key_info || I2OSP(L, 2), L)
7. SK = OS2IP(OKM) mod r
8. return SK
The text was updated successfully, but these errors were encountered:
Hi @CarlBeek we just tested this out in #7783 and are compliant with the tests. The reason there might be a misunderstanding is because we vendored in an old dependency to support old users of the Medalla testnet
We have a tracking issue to remove this old dependency before Prysm's mainnet release here #7752, thanks for bringing this up as now we have included the tests into our repo
Outdated EIP2333 version
Description
A few months ago, EIP 2333 was updated so that
hkdf_mod_r
matched theKeyGen
function update in the BLS specs. Prysm is still using the old version.🔬 Minimal Reproduction
Try run the EIP's tests against your implementation.
The fix
Update
hkdf_mod_r
to the new version with the while loop as per EIP2333 and run it against the given test vectors:The text was updated successfully, but these errors were encountered: