mirror of
https://github.com/serai-dex/serai.git
synced 2024-12-23 03:59:22 +00:00
Extensively test transactions
This commit is contained in:
parent
402a7be966
commit
354ac856a5
7 changed files with 286 additions and 28 deletions
1
Cargo.lock
generated
1
Cargo.lock
generated
|
@ -10684,6 +10684,7 @@ dependencies = [
|
|||
"schnorr-signatures",
|
||||
"tendermint-machine",
|
||||
"thiserror",
|
||||
"zeroize",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
|
|
|
@ -10,6 +10,7 @@ edition = "2021"
|
|||
[dependencies]
|
||||
thiserror = "1"
|
||||
|
||||
zeroize = { version = "^1.5", optional = true }
|
||||
rand_core = { version = "0.6", optional = true }
|
||||
|
||||
blake2 = "0.10"
|
||||
|
@ -20,7 +21,8 @@ schnorr = { package = "schnorr-signatures", path = "../../crypto/schnorr" }
|
|||
tendermint = { package = "tendermint-machine", path = "./tendermint" }
|
||||
|
||||
[dev-dependencies]
|
||||
zeroize = "^1.5"
|
||||
rand_core = "0.6"
|
||||
|
||||
[features]
|
||||
tests = ["rand_core"]
|
||||
tests = ["zeroize", "rand_core"]
|
||||
|
|
|
@ -1,27 +0,0 @@
|
|||
use rand_core::RngCore;
|
||||
|
||||
use ciphersuite::{
|
||||
group::{ff::Field, Group},
|
||||
Ciphersuite, Ristretto,
|
||||
};
|
||||
use schnorr::SchnorrSignature;
|
||||
|
||||
use crate::Signed;
|
||||
|
||||
pub fn random_signed<R: RngCore>(rng: &mut R) -> Signed {
|
||||
Signed {
|
||||
signer: <Ristretto as Ciphersuite>::G::random(&mut *rng),
|
||||
nonce: u32::try_from(rng.next_u64() >> 32).unwrap(),
|
||||
signature: SchnorrSignature::<Ristretto> {
|
||||
R: <Ristretto as Ciphersuite>::G::random(&mut *rng),
|
||||
s: <Ristretto as Ciphersuite>::F::random(rng),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn serialize_signed() {
|
||||
use crate::ReadWrite;
|
||||
let signed = random_signed(&mut rand_core::OsRng);
|
||||
assert_eq!(Signed::read::<&[u8]>(&mut signed.serialize().as_ref()).unwrap(), signed);
|
||||
}
|
137
coordinator/tributary/src/tests/transaction/mod.rs
Normal file
137
coordinator/tributary/src/tests/transaction/mod.rs
Normal file
|
@ -0,0 +1,137 @@
|
|||
use std::{
|
||||
io,
|
||||
collections::{HashSet, HashMap},
|
||||
};
|
||||
|
||||
use rand_core::{RngCore, CryptoRng};
|
||||
|
||||
use blake2::{Digest, Blake2s256};
|
||||
|
||||
use ciphersuite::{
|
||||
group::{ff::Field, Group},
|
||||
Ciphersuite, Ristretto,
|
||||
};
|
||||
use schnorr::SchnorrSignature;
|
||||
|
||||
use crate::{ReadWrite, Signed, TransactionError, TransactionKind, Transaction, verify_transaction};
|
||||
|
||||
#[cfg(test)]
|
||||
mod signed;
|
||||
|
||||
#[cfg(test)]
|
||||
mod provided;
|
||||
|
||||
pub fn random_signed<R: RngCore + CryptoRng>(rng: &mut R) -> Signed {
|
||||
Signed {
|
||||
signer: <Ristretto as Ciphersuite>::G::random(&mut *rng),
|
||||
nonce: u32::try_from(rng.next_u64() >> 32).unwrap(),
|
||||
signature: SchnorrSignature::<Ristretto> {
|
||||
R: <Ristretto as Ciphersuite>::G::random(&mut *rng),
|
||||
s: <Ristretto as Ciphersuite>::F::random(rng),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone, PartialEq, Eq, Debug)]
|
||||
pub struct ProvidedTransaction(pub Vec<u8>);
|
||||
|
||||
impl ReadWrite for ProvidedTransaction {
|
||||
fn read<R: io::Read>(reader: &mut R) -> io::Result<Self> {
|
||||
let mut len = [0; 4];
|
||||
reader.read_exact(&mut len)?;
|
||||
let mut data = vec![0; usize::try_from(u32::from_le_bytes(len)).unwrap()];
|
||||
reader.read_exact(&mut data)?;
|
||||
Ok(ProvidedTransaction(data))
|
||||
}
|
||||
|
||||
fn write<W: io::Write>(&self, writer: &mut W) -> io::Result<()> {
|
||||
writer.write_all(&u32::try_from(self.0.len()).unwrap().to_le_bytes())?;
|
||||
writer.write_all(&self.0)
|
||||
}
|
||||
}
|
||||
|
||||
impl Transaction for ProvidedTransaction {
|
||||
fn kind(&self) -> TransactionKind {
|
||||
TransactionKind::Provided
|
||||
}
|
||||
|
||||
fn hash(&self) -> [u8; 32] {
|
||||
Blake2s256::digest(self.serialize()).into()
|
||||
}
|
||||
|
||||
fn verify(&self) -> Result<(), TransactionError> {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
pub fn random_provided_transaction<R: RngCore + CryptoRng>(rng: &mut R) -> ProvidedTransaction {
|
||||
let mut data = vec![0; 512];
|
||||
rng.fill_bytes(&mut data);
|
||||
ProvidedTransaction(data)
|
||||
}
|
||||
|
||||
#[derive(Clone, PartialEq, Eq, Debug)]
|
||||
pub struct SignedTransaction(pub Vec<u8>, pub Signed);
|
||||
|
||||
impl ReadWrite for SignedTransaction {
|
||||
fn read<R: io::Read>(reader: &mut R) -> io::Result<Self> {
|
||||
let mut len = [0; 4];
|
||||
reader.read_exact(&mut len)?;
|
||||
let mut data = vec![0; usize::try_from(u32::from_le_bytes(len)).unwrap()];
|
||||
reader.read_exact(&mut data)?;
|
||||
|
||||
Ok(SignedTransaction(data, Signed::read(reader)?))
|
||||
}
|
||||
|
||||
fn write<W: io::Write>(&self, writer: &mut W) -> io::Result<()> {
|
||||
writer.write_all(&u32::try_from(self.0.len()).unwrap().to_le_bytes())?;
|
||||
writer.write_all(&self.0)?;
|
||||
self.1.write(writer)
|
||||
}
|
||||
}
|
||||
|
||||
impl Transaction for SignedTransaction {
|
||||
fn kind(&self) -> TransactionKind {
|
||||
TransactionKind::Signed(self.1.clone())
|
||||
}
|
||||
|
||||
fn hash(&self) -> [u8; 32] {
|
||||
let serialized = self.serialize();
|
||||
Blake2s256::digest(&serialized[.. (serialized.len() - 64)]).into()
|
||||
}
|
||||
|
||||
fn verify(&self) -> Result<(), TransactionError> {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
pub fn random_signed_transaction<R: RngCore + CryptoRng>(
|
||||
rng: &mut R,
|
||||
) -> ([u8; 32], SignedTransaction) {
|
||||
use zeroize::Zeroizing;
|
||||
|
||||
let mut data = vec![0; 512];
|
||||
rng.fill_bytes(&mut data);
|
||||
|
||||
let key = <Ristretto as Ciphersuite>::F::random(&mut *rng);
|
||||
let signer = <Ristretto as Ciphersuite>::generator() * key;
|
||||
// Shift over an additional bit to ensure it won't overflow when incremented
|
||||
let nonce = u32::try_from(rng.next_u64() >> 32 >> 1).unwrap();
|
||||
|
||||
let mut tx =
|
||||
SignedTransaction(data, Signed { signer, nonce, signature: random_signed(rng).signature });
|
||||
|
||||
let mut genesis = [0; 32];
|
||||
rng.fill_bytes(&mut genesis);
|
||||
tx.1.signature = SchnorrSignature::sign(
|
||||
&Zeroizing::new(key),
|
||||
Zeroizing::new(<Ristretto as Ciphersuite>::F::random(rng)),
|
||||
tx.sig_hash(genesis),
|
||||
);
|
||||
|
||||
let mut nonces = HashMap::from([(tx.1.signer, tx.1.nonce)]);
|
||||
verify_transaction(&tx, genesis, &mut HashSet::new(), &mut nonces).unwrap();
|
||||
assert_eq!(nonces, HashMap::from([(tx.1.signer, tx.1.nonce.wrapping_add(1))]));
|
||||
|
||||
(genesis, tx)
|
||||
}
|
18
coordinator/tributary/src/tests/transaction/provided.rs
Normal file
18
coordinator/tributary/src/tests/transaction/provided.rs
Normal file
|
@ -0,0 +1,18 @@
|
|||
use std::collections::{HashSet, HashMap};
|
||||
|
||||
use rand_core::OsRng;
|
||||
|
||||
use crate::{Transaction, verify_transaction, tests::random_provided_transaction};
|
||||
|
||||
#[test]
|
||||
fn provided_transaction() {
|
||||
let tx = random_provided_transaction(&mut OsRng);
|
||||
|
||||
// Make sure this works when provided
|
||||
let mut provided = HashSet::from([tx.hash()]);
|
||||
verify_transaction(&tx, [0x88; 32], &mut provided, &mut HashMap::new()).unwrap();
|
||||
assert_eq!(provided.len(), 0);
|
||||
|
||||
// Make sure this fails when not provided
|
||||
assert!(verify_transaction(&tx, [0x88; 32], &mut HashSet::new(), &mut HashMap::new()).is_err());
|
||||
}
|
126
coordinator/tributary/src/tests/transaction/signed.rs
Normal file
126
coordinator/tributary/src/tests/transaction/signed.rs
Normal file
|
@ -0,0 +1,126 @@
|
|||
use std::collections::{HashSet, HashMap};
|
||||
|
||||
use rand_core::OsRng;
|
||||
|
||||
use blake2::{Digest, Blake2s256};
|
||||
|
||||
use ciphersuite::{group::ff::Field, Ciphersuite, Ristretto};
|
||||
|
||||
use crate::{
|
||||
ReadWrite, Signed, Transaction, verify_transaction,
|
||||
tests::{random_signed, random_signed_transaction},
|
||||
};
|
||||
|
||||
#[test]
|
||||
fn serialize_signed() {
|
||||
let signed = random_signed(&mut rand_core::OsRng);
|
||||
assert_eq!(Signed::read::<&[u8]>(&mut signed.serialize().as_ref()).unwrap(), signed);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn sig_hash() {
|
||||
let (genesis, tx1) = random_signed_transaction(&mut OsRng);
|
||||
assert!(tx1.sig_hash(genesis) != tx1.sig_hash(Blake2s256::digest(genesis).into()));
|
||||
|
||||
let (_, tx2) = random_signed_transaction(&mut OsRng);
|
||||
assert!(tx1.hash() != tx2.hash());
|
||||
assert!(tx1.sig_hash(genesis) != tx2.sig_hash(genesis));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn signed_transaction() {
|
||||
let (genesis, tx) = random_signed_transaction(&mut OsRng);
|
||||
|
||||
// Mutate various properties and verify it no longer works
|
||||
|
||||
// Different genesis
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
Blake2s256::digest(genesis).into(),
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
|
||||
// Different data
|
||||
{
|
||||
let mut tx = tx.clone();
|
||||
tx.0 = Blake2s256::digest(tx.0).to_vec();
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
||||
|
||||
// Different signer
|
||||
{
|
||||
let mut tx = tx.clone();
|
||||
tx.1.signer += Ristretto::generator();
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
||||
|
||||
// Different nonce
|
||||
{
|
||||
#[allow(clippy::redundant_clone)] // False positive?
|
||||
let mut tx = tx.clone();
|
||||
tx.1.nonce = tx.1.nonce.wrapping_add(1);
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
||||
|
||||
// Different signature
|
||||
{
|
||||
let mut tx = tx.clone();
|
||||
tx.1.signature.R += Ristretto::generator();
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
||||
{
|
||||
let mut tx = tx.clone();
|
||||
tx.1.signature.s += <Ristretto as Ciphersuite>::F::ONE;
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce)]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
||||
|
||||
// Sanity check the original TX was never mutated and is valid
|
||||
let mut nonces = HashMap::from([(tx.1.signer, tx.1.nonce)]);
|
||||
verify_transaction(&tx, genesis, &mut HashSet::new(), &mut nonces).unwrap();
|
||||
assert_eq!(nonces, HashMap::from([(tx.1.signer, tx.1.nonce.wrapping_add(1))]));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn invalid_nonce() {
|
||||
let (genesis, tx) = random_signed_transaction(&mut OsRng);
|
||||
|
||||
assert!(verify_transaction(
|
||||
&tx,
|
||||
genesis,
|
||||
&mut HashSet::new(),
|
||||
&mut HashMap::from([(tx.1.signer, tx.1.nonce.wrapping_add(1))]),
|
||||
)
|
||||
.is_err());
|
||||
}
|
|
@ -96,6 +96,7 @@ pub(crate) fn verify_transaction<T: Transaction>(
|
|||
}
|
||||
TransactionKind::Unsigned => {}
|
||||
TransactionKind::Signed(Signed { signer, nonce, signature }) => {
|
||||
// TODO: Use presence as a whitelist, erroring on lack of
|
||||
if next_nonces.get(&signer).cloned().unwrap_or(0) != nonce {
|
||||
Err(TransactionError::Temporal)?;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue