mirror of
https://github.com/serai-dex/serai.git
synced 2025-12-13 06:29:25 +00:00
Update serai-processor tests to the new key gen
This commit is contained in:
@@ -373,7 +373,7 @@ impl<N: Network, D: Db> KeyGen<N, D> {
|
||||
}
|
||||
|
||||
CoordinatorMessage::Participation { session, participant, participation } => {
|
||||
info!("Received participation from {:?}", participant);
|
||||
info!("received participation from {:?} for {:?}", participant, session);
|
||||
|
||||
let (threshold, substrate_evrf_public_keys, network_evrf_public_keys) =
|
||||
ParamsDb::get(txn, &session).unwrap();
|
||||
@@ -386,16 +386,19 @@ impl<N: Network, D: Db> KeyGen<N, D> {
|
||||
// Read these `Participation`s
|
||||
// If they fail basic sanity checks, fail fast
|
||||
let (substrate_participation, network_participation) = {
|
||||
let mid_point = {
|
||||
let network_participation_start_pos = {
|
||||
let mut participation = participation.as_slice();
|
||||
let start_len = participation.len();
|
||||
|
||||
let blame = vec![ProcessorMessage::Blame { session, participant }];
|
||||
if Participation::<Ristretto>::read(&mut participation, n).is_err() {
|
||||
let Ok(substrate_participation) =
|
||||
Participation::<Ristretto>::read(&mut participation, n)
|
||||
else {
|
||||
return blame;
|
||||
}
|
||||
let len_at_mid_point = participation.len();
|
||||
if Participation::<N::Curve>::read(&mut participation, n).is_err() {
|
||||
};
|
||||
let len_at_network_participation_start_pos = participation.len();
|
||||
let Ok(network_participation) = Participation::<N::Curve>::read(&mut participation, n)
|
||||
else {
|
||||
return blame;
|
||||
};
|
||||
|
||||
@@ -405,12 +408,59 @@ impl<N: Network, D: Db> KeyGen<N, D> {
|
||||
return blame;
|
||||
}
|
||||
|
||||
start_len - len_at_mid_point
|
||||
// If we've already generated these keys, we don't actually need to save these
|
||||
// participations and continue. We solely have to verify them, as to identify malicious
|
||||
// participants and prevent DoSs, before returning
|
||||
if GeneratedKeysDb::get(txn, &session).is_some() {
|
||||
info!("already finished generating a key for {:?}", session);
|
||||
|
||||
match EvrfDkg::<Ristretto>::verify(
|
||||
&mut OsRng,
|
||||
generators(),
|
||||
context::<N>(session, SUBSTRATE_KEY_CONTEXT),
|
||||
threshold,
|
||||
// Ignores the list of participants who were faulty, as they were prior blamed
|
||||
&coerce_keys::<Ristretto>(&substrate_evrf_public_keys).0,
|
||||
&HashMap::from([(participant, substrate_participation)]),
|
||||
)
|
||||
.unwrap()
|
||||
{
|
||||
VerifyResult::Valid(_) | VerifyResult::NotEnoughParticipants => {}
|
||||
VerifyResult::Invalid(faulty) => {
|
||||
assert_eq!(faulty, vec![participant]);
|
||||
return vec![ProcessorMessage::Blame { session, participant }];
|
||||
}
|
||||
}
|
||||
|
||||
match EvrfDkg::<N::Curve>::verify(
|
||||
&mut OsRng,
|
||||
generators(),
|
||||
context::<N>(session, NETWORK_KEY_CONTEXT),
|
||||
threshold,
|
||||
// Ignores the list of participants who were faulty, as they were prior blamed
|
||||
&coerce_keys::<N::Curve>(&network_evrf_public_keys).0,
|
||||
&HashMap::from([(participant, network_participation)]),
|
||||
)
|
||||
.unwrap()
|
||||
{
|
||||
VerifyResult::Valid(_) | VerifyResult::NotEnoughParticipants => return vec![],
|
||||
VerifyResult::Invalid(faulty) => {
|
||||
assert_eq!(faulty, vec![participant]);
|
||||
return vec![ProcessorMessage::Blame { session, participant }];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Return the position the network participation starts at
|
||||
start_len - len_at_network_participation_start_pos
|
||||
};
|
||||
|
||||
// Instead of re-serializing the `Participation`s we read, we just use the relevant
|
||||
// sections of the existing byte buffer
|
||||
(participation[.. mid_point].to_vec(), participation[mid_point ..].to_vec())
|
||||
(
|
||||
participation[.. network_participation_start_pos].to_vec(),
|
||||
participation[network_participation_start_pos ..].to_vec(),
|
||||
)
|
||||
};
|
||||
|
||||
// Since these are valid `Participation`s, save them
|
||||
|
||||
@@ -2,10 +2,13 @@ use std::collections::HashMap;
|
||||
|
||||
use zeroize::Zeroizing;
|
||||
|
||||
use rand_core::{RngCore, OsRng};
|
||||
use rand_core::OsRng;
|
||||
|
||||
use ciphersuite::group::GroupEncoding;
|
||||
use frost::{Participant, ThresholdParams, tests::clone_without};
|
||||
use ciphersuite::{
|
||||
group::{ff::Field, GroupEncoding},
|
||||
Ciphersuite, Ristretto,
|
||||
};
|
||||
use dkg::{Participant, ThresholdParams, evrf::*};
|
||||
|
||||
use serai_db::{DbTxn, Db, MemDb};
|
||||
|
||||
@@ -18,113 +21,102 @@ use crate::{
|
||||
key_gen::{KeyConfirmed, KeyGen},
|
||||
};
|
||||
|
||||
const ID: KeyGenId = KeyGenId { session: Session(1), attempt: 3 };
|
||||
const SESSION: Session = Session(1);
|
||||
|
||||
pub fn test_key_gen<N: Network>() {
|
||||
let mut entropies = HashMap::new();
|
||||
let mut dbs = HashMap::new();
|
||||
let mut substrate_evrf_keys = HashMap::new();
|
||||
let mut network_evrf_keys = HashMap::new();
|
||||
let mut evrf_public_keys = vec![];
|
||||
let mut key_gens = HashMap::new();
|
||||
for i in 1 ..= 5 {
|
||||
let mut entropy = Zeroizing::new([0; 32]);
|
||||
OsRng.fill_bytes(entropy.as_mut());
|
||||
entropies.insert(i, entropy);
|
||||
let db = MemDb::new();
|
||||
dbs.insert(i, db.clone());
|
||||
key_gens.insert(i, KeyGen::<N, MemDb>::new(db, entropies[&i].clone()));
|
||||
|
||||
let substrate_evrf_key = Zeroizing::new(
|
||||
<<Ristretto as EvrfCurve>::EmbeddedCurve as Ciphersuite>::F::random(&mut OsRng),
|
||||
);
|
||||
substrate_evrf_keys.insert(i, substrate_evrf_key.clone());
|
||||
let network_evrf_key = Zeroizing::new(
|
||||
<<N::Curve as EvrfCurve>::EmbeddedCurve as Ciphersuite>::F::random(&mut OsRng),
|
||||
);
|
||||
network_evrf_keys.insert(i, network_evrf_key.clone());
|
||||
|
||||
evrf_public_keys.push((
|
||||
(<<Ristretto as EvrfCurve>::EmbeddedCurve as Ciphersuite>::generator() * *substrate_evrf_key)
|
||||
.to_bytes(),
|
||||
(<<N::Curve as EvrfCurve>::EmbeddedCurve as Ciphersuite>::generator() * *network_evrf_key)
|
||||
.to_bytes()
|
||||
.as_ref()
|
||||
.to_vec(),
|
||||
));
|
||||
key_gens
|
||||
.insert(i, KeyGen::<N, MemDb>::new(db, substrate_evrf_key.clone(), network_evrf_key.clone()));
|
||||
}
|
||||
|
||||
let mut all_commitments = HashMap::new();
|
||||
let mut participations = HashMap::new();
|
||||
for i in 1 ..= 5 {
|
||||
let key_gen = key_gens.get_mut(&i).unwrap();
|
||||
let mut txn = dbs.get_mut(&i).unwrap().txn();
|
||||
if let ProcessorMessage::Commitments { id, mut commitments } = key_gen.handle(
|
||||
let mut msgs = key_gen.handle(
|
||||
&mut txn,
|
||||
CoordinatorMessage::GenerateKey {
|
||||
id: ID,
|
||||
params: ThresholdParams::new(3, 5, Participant::new(u16::try_from(i).unwrap()).unwrap())
|
||||
.unwrap(),
|
||||
shares: 1,
|
||||
session: SESSION,
|
||||
threshold: 3,
|
||||
evrf_public_keys: evrf_public_keys.clone(),
|
||||
},
|
||||
) {
|
||||
assert_eq!(id, ID);
|
||||
assert_eq!(commitments.len(), 1);
|
||||
all_commitments
|
||||
.insert(Participant::new(u16::try_from(i).unwrap()).unwrap(), commitments.swap_remove(0));
|
||||
} else {
|
||||
panic!("didn't get commitments back");
|
||||
}
|
||||
txn.commit();
|
||||
}
|
||||
|
||||
// 1 is rebuilt on every step
|
||||
// 2 is rebuilt here
|
||||
// 3 ... are rebuilt once, one at each of the following steps
|
||||
let rebuild = |key_gens: &mut HashMap<_, _>, dbs: &HashMap<_, MemDb>, i| {
|
||||
key_gens.remove(&i);
|
||||
key_gens.insert(i, KeyGen::<N, _>::new(dbs[&i].clone(), entropies[&i].clone()));
|
||||
);
|
||||
assert_eq!(msgs.len(), 1);
|
||||
let ProcessorMessage::Participation { session, participation } = msgs.swap_remove(0) else {
|
||||
panic!("didn't get a participation")
|
||||
};
|
||||
rebuild(&mut key_gens, &dbs, 1);
|
||||
rebuild(&mut key_gens, &dbs, 2);
|
||||
|
||||
let mut all_shares = HashMap::new();
|
||||
for i in 1 ..= 5 {
|
||||
let key_gen = key_gens.get_mut(&i).unwrap();
|
||||
let mut txn = dbs.get_mut(&i).unwrap().txn();
|
||||
let i = Participant::new(u16::try_from(i).unwrap()).unwrap();
|
||||
if let ProcessorMessage::Shares { id, mut shares } = key_gen.handle(
|
||||
&mut txn,
|
||||
CoordinatorMessage::Commitments { id: ID, commitments: clone_without(&all_commitments, &i) },
|
||||
) {
|
||||
assert_eq!(id, ID);
|
||||
assert_eq!(shares.len(), 1);
|
||||
all_shares.insert(i, shares.swap_remove(0));
|
||||
} else {
|
||||
panic!("didn't get shares back");
|
||||
}
|
||||
assert_eq!(session, SESSION);
|
||||
participations.insert(i, participation);
|
||||
txn.commit();
|
||||
}
|
||||
|
||||
// Rebuild 1 and 3
|
||||
rebuild(&mut key_gens, &dbs, 1);
|
||||
rebuild(&mut key_gens, &dbs, 3);
|
||||
|
||||
let mut res = None;
|
||||
for i in 1 ..= 5 {
|
||||
let key_gen = key_gens.get_mut(&i).unwrap();
|
||||
let mut txn = dbs.get_mut(&i).unwrap().txn();
|
||||
let i = Participant::new(u16::try_from(i).unwrap()).unwrap();
|
||||
if let ProcessorMessage::GeneratedKeyPair { id, substrate_key, network_key } = key_gen.handle(
|
||||
for j in 1 ..= 5 {
|
||||
let mut msgs = key_gen.handle(
|
||||
&mut txn,
|
||||
CoordinatorMessage::Shares {
|
||||
id: ID,
|
||||
shares: vec![all_shares
|
||||
.iter()
|
||||
.filter_map(|(l, shares)| if i == *l { None } else { Some((*l, shares[&i].clone())) })
|
||||
.collect()],
|
||||
CoordinatorMessage::Participation {
|
||||
session: SESSION,
|
||||
participant: Participant::new(u16::try_from(j).unwrap()).unwrap(),
|
||||
participation: participations[&j].clone(),
|
||||
},
|
||||
) {
|
||||
assert_eq!(id, ID);
|
||||
);
|
||||
if j != 3 {
|
||||
assert!(msgs.is_empty());
|
||||
}
|
||||
if j == 3 {
|
||||
assert_eq!(msgs.len(), 1);
|
||||
let ProcessorMessage::GeneratedKeyPair { session, substrate_key, network_key } =
|
||||
msgs.swap_remove(0)
|
||||
else {
|
||||
panic!("didn't get a generated key pair")
|
||||
};
|
||||
assert_eq!(session, SESSION);
|
||||
|
||||
if res.is_none() {
|
||||
res = Some((substrate_key, network_key.clone()));
|
||||
}
|
||||
assert_eq!(res.as_ref().unwrap(), &(substrate_key, network_key));
|
||||
} else {
|
||||
panic!("didn't get key back");
|
||||
}
|
||||
}
|
||||
|
||||
txn.commit();
|
||||
}
|
||||
let res = res.unwrap();
|
||||
|
||||
// Rebuild 1 and 4
|
||||
rebuild(&mut key_gens, &dbs, 1);
|
||||
rebuild(&mut key_gens, &dbs, 4);
|
||||
|
||||
for i in 1 ..= 5 {
|
||||
let key_gen = key_gens.get_mut(&i).unwrap();
|
||||
let mut txn = dbs.get_mut(&i).unwrap().txn();
|
||||
let KeyConfirmed { mut substrate_keys, mut network_keys } = key_gen.confirm(
|
||||
&mut txn,
|
||||
ID.session,
|
||||
SESSION,
|
||||
&KeyPair(sr25519::Public(res.0), res.1.clone().try_into().unwrap()),
|
||||
);
|
||||
txn.commit();
|
||||
|
||||
Reference in New Issue
Block a user