mirror of
https://github.com/serai-dex/serai.git
synced 2025-12-08 20:29:23 +00:00
This helps identify where the various functionalities are used, or rather, not used. The `Ciphersuite` trait present in `patches/ciphersuite`, facilitating the entire FCMP++ tree, only requires the markers _and_ canonical point decoding. I've opened a PR to upstream such a trait into `group` (https://github.com/zkcrypto/group/pull/68). `WrappedGroup` is still justified for as long as `Group::generator` exists. Moving `::generator()` to its own trait, on an independent structure (upstream) would be massively appreciated. @tarcieri also wanted to update from `fn generator()` to `const GENERATOR`, which would encourage further discussion on https://github.com/zkcrypto/group/issues/32 and https://github.com/zkcrypto/group/issues/45, which have been stagnant. The `Id` trait is occasionally used yet really should be first off the chopping block. Finally, `WithPreferredHash` is only actually used around a third of the time, which more than justifies it being a separate trait. --- Updates `dalek_ff_group::Scalar` to directly re-export `curve25519_dalek::Scalar`, as without issue. `dalek_ff_group::RistrettoPoint` also could be replaced with an export of `curve25519_dalek::RistrettoPoint`, yet the coordinator relies on how we implemented `Hash` on it for the hell of it so it isn't worth it at this time. `dalek_ff_group::EdwardsPoint` can't be replaced for an re-export of `curve25519_dalek::SubgroupPoint` as it doesn't implement `zeroize`, `subtle` traits within a released, non-yanked version. Relevance to https://github.com/serai-dex/serai/issues/201 and https://github.com/dalek-cryptography/curve25519-dalek/issues/811#issuecomment-3247732746. Also updates the `Ristretto` ciphersuite to prefer `Blake2b-512` over `SHA2-512`. In order to maintain compliance with FROST's IETF standard, `modular-frost` defines its own ciphersuite for Ristretto which still uses `SHA2-512`.
123 lines
3.7 KiB
Rust
123 lines
3.7 KiB
Rust
use std::collections::HashMap;
|
|
|
|
use rand_core::{RngCore, OsRng};
|
|
use zeroize::Zeroizing;
|
|
|
|
use frost::curve::Ristretto;
|
|
use ciphersuite::{WrappedGroup, GroupIo};
|
|
use dkg_musig::musig;
|
|
use schnorrkel::Schnorrkel;
|
|
|
|
use sp_core::{sr25519::Signature, Pair as PairTrait};
|
|
|
|
use serai_abi::{
|
|
primitives::{
|
|
EXTERNAL_COINS, BlockHash, ExternalNetworkId, NetworkId, ExternalCoin, Amount, ExternalBalance,
|
|
SeraiAddress, insecure_pair_from_name,
|
|
},
|
|
validator_sets::primitives::{Session, ValidatorSet, musig_context},
|
|
genesis_liquidity::primitives::{Values, oraclize_values_message},
|
|
in_instructions::primitives::{InInstruction, InInstructionWithBalance, Batch},
|
|
};
|
|
|
|
use serai_client::{Serai, SeraiGenesisLiquidity};
|
|
|
|
use crate::common::{in_instructions::provide_batch, tx::publish_tx};
|
|
|
|
#[allow(dead_code)]
|
|
pub async fn set_up_genesis(
|
|
serai: &Serai,
|
|
values: &HashMap<ExternalCoin, u64>,
|
|
) -> (HashMap<ExternalCoin, Vec<(SeraiAddress, Amount)>>, HashMap<ExternalNetworkId, u32>) {
|
|
// make accounts with amounts
|
|
let mut accounts = HashMap::new();
|
|
for coin in EXTERNAL_COINS {
|
|
// make 5 accounts per coin
|
|
let mut values = vec![];
|
|
for _ in 0 .. 5 {
|
|
let mut address = SeraiAddress::new([0; 32]);
|
|
OsRng.fill_bytes(&mut address.0);
|
|
values.push((address, Amount(OsRng.next_u64() % 10u64.pow(coin.decimals()))));
|
|
}
|
|
accounts.insert(coin, values);
|
|
}
|
|
|
|
// send a batch per coin
|
|
let mut batch_ids: HashMap<ExternalNetworkId, u32> = HashMap::new();
|
|
for coin in EXTERNAL_COINS {
|
|
// set up instructions
|
|
let instructions = accounts[&coin]
|
|
.iter()
|
|
.map(|(addr, amount)| InInstructionWithBalance {
|
|
instruction: InInstruction::GenesisLiquidity(*addr),
|
|
balance: ExternalBalance { coin, amount: *amount },
|
|
})
|
|
.collect::<Vec<_>>();
|
|
|
|
// set up block hash
|
|
let mut block = BlockHash([0; 32]);
|
|
OsRng.fill_bytes(&mut block.0);
|
|
|
|
// set up batch id
|
|
batch_ids
|
|
.entry(coin.network())
|
|
.and_modify(|v| {
|
|
*v += 1;
|
|
})
|
|
.or_insert(0);
|
|
|
|
let batch = Batch {
|
|
network: coin.network(),
|
|
external_network_block_hash: block,
|
|
id: batch_ids[&coin.network()],
|
|
instructions,
|
|
};
|
|
provide_batch(serai, batch).await;
|
|
}
|
|
|
|
// set values relative to each other. We can do that without checking for genesis period blocks
|
|
// since we are running in test(fast-epoch) mode.
|
|
// TODO: Random values here
|
|
let values = Values {
|
|
monero: values[&ExternalCoin::Monero],
|
|
ether: values[&ExternalCoin::Ether],
|
|
dai: values[&ExternalCoin::Dai],
|
|
};
|
|
set_values(serai, &values).await;
|
|
|
|
(accounts, batch_ids)
|
|
}
|
|
|
|
#[allow(dead_code)]
|
|
async fn set_values(serai: &Serai, values: &Values) {
|
|
// prepare a Musig tx to oraclize the relative values
|
|
let pair = insecure_pair_from_name("Alice");
|
|
let public = pair.public();
|
|
// we publish the tx in set 1
|
|
let set = ValidatorSet { session: Session(1), network: NetworkId::Serai };
|
|
|
|
let public_key = <Ristretto as GroupIo>::read_G::<&[u8]>(&mut public.0.as_ref()).unwrap();
|
|
let secret_key =
|
|
<Ristretto as GroupIo>::read_F::<&[u8]>(&mut pair.as_ref().secret.to_bytes()[.. 32].as_ref())
|
|
.unwrap();
|
|
|
|
assert_eq!(Ristretto::generator() * secret_key, public_key);
|
|
let threshold_keys =
|
|
musig::<Ristretto>(musig_context(set), Zeroizing::new(secret_key), &[public_key]).unwrap();
|
|
|
|
let sig = frost::tests::sign_without_caching(
|
|
&mut OsRng,
|
|
frost::tests::algorithm_machines(
|
|
&mut OsRng,
|
|
&Schnorrkel::new(b"substrate"),
|
|
&HashMap::from([(threshold_keys.params().i(), threshold_keys)]),
|
|
),
|
|
&oraclize_values_message(&set, values),
|
|
);
|
|
|
|
// oraclize values
|
|
let _ =
|
|
publish_tx(serai, &SeraiGenesisLiquidity::oraclize_values(*values, Signature(sig.to_bytes())))
|
|
.await;
|
|
}
|