Update serai-processor tests to the new key gen

This commit is contained in:
Luke Parker
2024-08-02 00:41:39 -04:00
parent d3f0378f66
commit b5bf70bdb1
2 changed files with 127 additions and 85 deletions

View File

@@ -373,7 +373,7 @@ impl<N: Network, D: Db> KeyGen<N, D> {
} }
CoordinatorMessage::Participation { session, participant, participation } => { CoordinatorMessage::Participation { session, participant, participation } => {
info!("Received participation from {:?}", participant); info!("received participation from {:?} for {:?}", participant, session);
let (threshold, substrate_evrf_public_keys, network_evrf_public_keys) = let (threshold, substrate_evrf_public_keys, network_evrf_public_keys) =
ParamsDb::get(txn, &session).unwrap(); ParamsDb::get(txn, &session).unwrap();
@@ -386,16 +386,19 @@ impl<N: Network, D: Db> KeyGen<N, D> {
// Read these `Participation`s // Read these `Participation`s
// If they fail basic sanity checks, fail fast // If they fail basic sanity checks, fail fast
let (substrate_participation, network_participation) = { let (substrate_participation, network_participation) = {
let mid_point = { let network_participation_start_pos = {
let mut participation = participation.as_slice(); let mut participation = participation.as_slice();
let start_len = participation.len(); let start_len = participation.len();
let blame = vec![ProcessorMessage::Blame { session, participant }]; let blame = vec![ProcessorMessage::Blame { session, participant }];
if Participation::<Ristretto>::read(&mut participation, n).is_err() { let Ok(substrate_participation) =
Participation::<Ristretto>::read(&mut participation, n)
else {
return blame; return blame;
} };
let len_at_mid_point = participation.len(); let len_at_network_participation_start_pos = participation.len();
if Participation::<N::Curve>::read(&mut participation, n).is_err() { let Ok(network_participation) = Participation::<N::Curve>::read(&mut participation, n)
else {
return blame; return blame;
}; };
@@ -405,12 +408,59 @@ impl<N: Network, D: Db> KeyGen<N, D> {
return blame; return blame;
} }
start_len - len_at_mid_point // If we've already generated these keys, we don't actually need to save these
// participations and continue. We solely have to verify them, as to identify malicious
// participants and prevent DoSs, before returning
if GeneratedKeysDb::get(txn, &session).is_some() {
info!("already finished generating a key for {:?}", session);
match EvrfDkg::<Ristretto>::verify(
&mut OsRng,
generators(),
context::<N>(session, SUBSTRATE_KEY_CONTEXT),
threshold,
// Ignores the list of participants who were faulty, as they were prior blamed
&coerce_keys::<Ristretto>(&substrate_evrf_public_keys).0,
&HashMap::from([(participant, substrate_participation)]),
)
.unwrap()
{
VerifyResult::Valid(_) | VerifyResult::NotEnoughParticipants => {}
VerifyResult::Invalid(faulty) => {
assert_eq!(faulty, vec![participant]);
return vec![ProcessorMessage::Blame { session, participant }];
}
}
match EvrfDkg::<N::Curve>::verify(
&mut OsRng,
generators(),
context::<N>(session, NETWORK_KEY_CONTEXT),
threshold,
// Ignores the list of participants who were faulty, as they were prior blamed
&coerce_keys::<N::Curve>(&network_evrf_public_keys).0,
&HashMap::from([(participant, network_participation)]),
)
.unwrap()
{
VerifyResult::Valid(_) | VerifyResult::NotEnoughParticipants => return vec![],
VerifyResult::Invalid(faulty) => {
assert_eq!(faulty, vec![participant]);
return vec![ProcessorMessage::Blame { session, participant }];
}
}
}
// Return the position the network participation starts at
start_len - len_at_network_participation_start_pos
}; };
// Instead of re-serializing the `Participation`s we read, we just use the relevant // Instead of re-serializing the `Participation`s we read, we just use the relevant
// sections of the existing byte buffer // sections of the existing byte buffer
(participation[.. mid_point].to_vec(), participation[mid_point ..].to_vec()) (
participation[.. network_participation_start_pos].to_vec(),
participation[network_participation_start_pos ..].to_vec(),
)
}; };
// Since these are valid `Participation`s, save them // Since these are valid `Participation`s, save them

View File

@@ -2,10 +2,13 @@ use std::collections::HashMap;
use zeroize::Zeroizing; use zeroize::Zeroizing;
use rand_core::{RngCore, OsRng}; use rand_core::OsRng;
use ciphersuite::group::GroupEncoding; use ciphersuite::{
use frost::{Participant, ThresholdParams, tests::clone_without}; group::{ff::Field, GroupEncoding},
Ciphersuite, Ristretto,
};
use dkg::{Participant, ThresholdParams, evrf::*};
use serai_db::{DbTxn, Db, MemDb}; use serai_db::{DbTxn, Db, MemDb};
@@ -18,113 +21,102 @@ use crate::{
key_gen::{KeyConfirmed, KeyGen}, key_gen::{KeyConfirmed, KeyGen},
}; };
const ID: KeyGenId = KeyGenId { session: Session(1), attempt: 3 }; const SESSION: Session = Session(1);
pub fn test_key_gen<N: Network>() { pub fn test_key_gen<N: Network>() {
let mut entropies = HashMap::new();
let mut dbs = HashMap::new(); let mut dbs = HashMap::new();
let mut substrate_evrf_keys = HashMap::new();
let mut network_evrf_keys = HashMap::new();
let mut evrf_public_keys = vec![];
let mut key_gens = HashMap::new(); let mut key_gens = HashMap::new();
for i in 1 ..= 5 { for i in 1 ..= 5 {
let mut entropy = Zeroizing::new([0; 32]);
OsRng.fill_bytes(entropy.as_mut());
entropies.insert(i, entropy);
let db = MemDb::new(); let db = MemDb::new();
dbs.insert(i, db.clone()); dbs.insert(i, db.clone());
key_gens.insert(i, KeyGen::<N, MemDb>::new(db, entropies[&i].clone()));
let substrate_evrf_key = Zeroizing::new(
<<Ristretto as EvrfCurve>::EmbeddedCurve as Ciphersuite>::F::random(&mut OsRng),
);
substrate_evrf_keys.insert(i, substrate_evrf_key.clone());
let network_evrf_key = Zeroizing::new(
<<N::Curve as EvrfCurve>::EmbeddedCurve as Ciphersuite>::F::random(&mut OsRng),
);
network_evrf_keys.insert(i, network_evrf_key.clone());
evrf_public_keys.push((
(<<Ristretto as EvrfCurve>::EmbeddedCurve as Ciphersuite>::generator() * *substrate_evrf_key)
.to_bytes(),
(<<N::Curve as EvrfCurve>::EmbeddedCurve as Ciphersuite>::generator() * *network_evrf_key)
.to_bytes()
.as_ref()
.to_vec(),
));
key_gens
.insert(i, KeyGen::<N, MemDb>::new(db, substrate_evrf_key.clone(), network_evrf_key.clone()));
} }
let mut all_commitments = HashMap::new(); let mut participations = HashMap::new();
for i in 1 ..= 5 { for i in 1 ..= 5 {
let key_gen = key_gens.get_mut(&i).unwrap(); let key_gen = key_gens.get_mut(&i).unwrap();
let mut txn = dbs.get_mut(&i).unwrap().txn(); let mut txn = dbs.get_mut(&i).unwrap().txn();
if let ProcessorMessage::Commitments { id, mut commitments } = key_gen.handle( let mut msgs = key_gen.handle(
&mut txn, &mut txn,
CoordinatorMessage::GenerateKey { CoordinatorMessage::GenerateKey {
id: ID, session: SESSION,
params: ThresholdParams::new(3, 5, Participant::new(u16::try_from(i).unwrap()).unwrap()) threshold: 3,
.unwrap(), evrf_public_keys: evrf_public_keys.clone(),
shares: 1,
}, },
) { );
assert_eq!(id, ID); assert_eq!(msgs.len(), 1);
assert_eq!(commitments.len(), 1); let ProcessorMessage::Participation { session, participation } = msgs.swap_remove(0) else {
all_commitments panic!("didn't get a participation")
.insert(Participant::new(u16::try_from(i).unwrap()).unwrap(), commitments.swap_remove(0)); };
} else { assert_eq!(session, SESSION);
panic!("didn't get commitments back"); participations.insert(i, participation);
}
txn.commit(); txn.commit();
} }
// 1 is rebuilt on every step
// 2 is rebuilt here
// 3 ... are rebuilt once, one at each of the following steps
let rebuild = |key_gens: &mut HashMap<_, _>, dbs: &HashMap<_, MemDb>, i| {
key_gens.remove(&i);
key_gens.insert(i, KeyGen::<N, _>::new(dbs[&i].clone(), entropies[&i].clone()));
};
rebuild(&mut key_gens, &dbs, 1);
rebuild(&mut key_gens, &dbs, 2);
let mut all_shares = HashMap::new();
for i in 1 ..= 5 {
let key_gen = key_gens.get_mut(&i).unwrap();
let mut txn = dbs.get_mut(&i).unwrap().txn();
let i = Participant::new(u16::try_from(i).unwrap()).unwrap();
if let ProcessorMessage::Shares { id, mut shares } = key_gen.handle(
&mut txn,
CoordinatorMessage::Commitments { id: ID, commitments: clone_without(&all_commitments, &i) },
) {
assert_eq!(id, ID);
assert_eq!(shares.len(), 1);
all_shares.insert(i, shares.swap_remove(0));
} else {
panic!("didn't get shares back");
}
txn.commit();
}
// Rebuild 1 and 3
rebuild(&mut key_gens, &dbs, 1);
rebuild(&mut key_gens, &dbs, 3);
let mut res = None; let mut res = None;
for i in 1 ..= 5 { for i in 1 ..= 5 {
let key_gen = key_gens.get_mut(&i).unwrap(); let key_gen = key_gens.get_mut(&i).unwrap();
let mut txn = dbs.get_mut(&i).unwrap().txn(); let mut txn = dbs.get_mut(&i).unwrap().txn();
let i = Participant::new(u16::try_from(i).unwrap()).unwrap(); for j in 1 ..= 5 {
if let ProcessorMessage::GeneratedKeyPair { id, substrate_key, network_key } = key_gen.handle( let mut msgs = key_gen.handle(
&mut txn, &mut txn,
CoordinatorMessage::Shares { CoordinatorMessage::Participation {
id: ID, session: SESSION,
shares: vec![all_shares participant: Participant::new(u16::try_from(j).unwrap()).unwrap(),
.iter() participation: participations[&j].clone(),
.filter_map(|(l, shares)| if i == *l { None } else { Some((*l, shares[&i].clone())) }) },
.collect()], );
}, if j != 3 {
) { assert!(msgs.is_empty());
assert_eq!(id, ID); }
if res.is_none() { if j == 3 {
res = Some((substrate_key, network_key.clone())); assert_eq!(msgs.len(), 1);
let ProcessorMessage::GeneratedKeyPair { session, substrate_key, network_key } =
msgs.swap_remove(0)
else {
panic!("didn't get a generated key pair")
};
assert_eq!(session, SESSION);
if res.is_none() {
res = Some((substrate_key, network_key.clone()));
}
assert_eq!(res.as_ref().unwrap(), &(substrate_key, network_key));
} }
assert_eq!(res.as_ref().unwrap(), &(substrate_key, network_key));
} else {
panic!("didn't get key back");
} }
txn.commit(); txn.commit();
} }
let res = res.unwrap(); let res = res.unwrap();
// Rebuild 1 and 4
rebuild(&mut key_gens, &dbs, 1);
rebuild(&mut key_gens, &dbs, 4);
for i in 1 ..= 5 { for i in 1 ..= 5 {
let key_gen = key_gens.get_mut(&i).unwrap(); let key_gen = key_gens.get_mut(&i).unwrap();
let mut txn = dbs.get_mut(&i).unwrap().txn(); let mut txn = dbs.get_mut(&i).unwrap().txn();
let KeyConfirmed { mut substrate_keys, mut network_keys } = key_gen.confirm( let KeyConfirmed { mut substrate_keys, mut network_keys } = key_gen.confirm(
&mut txn, &mut txn,
ID.session, SESSION,
&KeyPair(sr25519::Public(res.0), res.1.clone().try_into().unwrap()), &KeyPair(sr25519::Public(res.0), res.1.clone().try_into().unwrap()),
); );
txn.commit(); txn.commit();