mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-21 22:04:44 +00:00
#7864 The main breaking change in v0.8.0 is the `TrustedSetup` initialisation - it now requires a json string via `PeerDASTrustedSetup::from_json`.
174 lines
5.5 KiB
Rust
174 lines
5.5 KiB
Rust
use crate::{Error, PeerDASTrustedSetup};
|
|
use serde::{
|
|
de::{self, Deserializer, Visitor},
|
|
Deserialize, Serialize,
|
|
};
|
|
|
|
// Number of bytes per G1 point.
|
|
const BYTES_PER_G1_POINT: usize = 48;
|
|
// Number of bytes per G2 point.
|
|
const BYTES_PER_G2_POINT: usize = 96;
|
|
|
|
pub const TRUSTED_SETUP_BYTES: &[u8] = include_bytes!("../trusted_setup.json");
|
|
|
|
pub fn get_trusted_setup() -> Vec<u8> {
|
|
TRUSTED_SETUP_BYTES.into()
|
|
}
|
|
|
|
/// Wrapper over a BLS G1 point's byte representation.
|
|
#[derive(Debug, Clone, PartialEq)]
|
|
struct G1Point([u8; BYTES_PER_G1_POINT]);
|
|
|
|
/// Wrapper over a BLS G2 point's byte representation.
|
|
#[derive(Debug, Clone, PartialEq)]
|
|
struct G2Point([u8; BYTES_PER_G2_POINT]);
|
|
|
|
/// Contains the trusted setup parameters that are required to instantiate a
|
|
/// `c_kzg::KzgSettings` object.
|
|
///
|
|
/// The serialize/deserialize implementations are written according to
|
|
/// the format specified in the ethereum consensus specs trusted setup files.
|
|
///
|
|
/// See https://github.com/ethereum/consensus-specs/blob/dev/presets/mainnet/trusted_setups/trusted_setup_4096.json
|
|
#[derive(Debug, Clone, PartialEq, Serialize, Deserialize)]
|
|
pub struct TrustedSetup {
|
|
g1_monomial: Vec<G1Point>,
|
|
g1_lagrange: Vec<G1Point>,
|
|
g2_monomial: Vec<G2Point>,
|
|
}
|
|
|
|
impl TrustedSetup {
|
|
pub fn g1_monomial(&self) -> Vec<u8> {
|
|
self.g1_monomial.iter().flat_map(|p| p.0).collect()
|
|
}
|
|
|
|
pub fn g1_lagrange(&self) -> Vec<u8> {
|
|
self.g1_lagrange.iter().flat_map(|p| p.0).collect()
|
|
}
|
|
|
|
pub fn g2_monomial(&self) -> Vec<u8> {
|
|
self.g2_monomial.iter().flat_map(|p| p.0).collect()
|
|
}
|
|
|
|
pub fn g1_len(&self) -> usize {
|
|
self.g1_lagrange.len()
|
|
}
|
|
}
|
|
|
|
impl Serialize for G1Point {
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: serde::Serializer,
|
|
{
|
|
let point = hex::encode(self.0);
|
|
serializer.serialize_str(&point)
|
|
}
|
|
}
|
|
|
|
impl Serialize for G2Point {
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: serde::Serializer,
|
|
{
|
|
let point = hex::encode(self.0);
|
|
serializer.serialize_str(&point)
|
|
}
|
|
}
|
|
|
|
impl<'de> Deserialize<'de> for G1Point {
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
struct G1PointVisitor;
|
|
|
|
impl Visitor<'_> for G1PointVisitor {
|
|
type Value = G1Point;
|
|
fn expecting(&self, formatter: &mut std::fmt::Formatter) -> std::fmt::Result {
|
|
formatter.write_str("A 48 byte hex encoded string")
|
|
}
|
|
|
|
fn visit_str<E>(self, v: &str) -> Result<Self::Value, E>
|
|
where
|
|
E: de::Error,
|
|
{
|
|
let point = hex::decode(strip_prefix(v))
|
|
.map_err(|e| de::Error::custom(format!("Failed to decode G1 point: {}", e)))?;
|
|
if point.len() != BYTES_PER_G1_POINT {
|
|
return Err(de::Error::custom(format!(
|
|
"G1 point has invalid length. Expected {} got {}",
|
|
BYTES_PER_G1_POINT,
|
|
point.len()
|
|
)));
|
|
}
|
|
let mut res = [0; BYTES_PER_G1_POINT];
|
|
res.copy_from_slice(&point);
|
|
Ok(G1Point(res))
|
|
}
|
|
}
|
|
|
|
deserializer.deserialize_str(G1PointVisitor)
|
|
}
|
|
}
|
|
|
|
impl<'de> Deserialize<'de> for G2Point {
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
struct G2PointVisitor;
|
|
|
|
impl Visitor<'_> for G2PointVisitor {
|
|
type Value = G2Point;
|
|
fn expecting(&self, formatter: &mut std::fmt::Formatter) -> std::fmt::Result {
|
|
formatter.write_str("A 96 byte hex encoded string")
|
|
}
|
|
|
|
fn visit_str<E>(self, v: &str) -> Result<Self::Value, E>
|
|
where
|
|
E: de::Error,
|
|
{
|
|
let point = hex::decode(strip_prefix(v))
|
|
.map_err(|e| de::Error::custom(format!("Failed to decode G2 point: {}", e)))?;
|
|
if point.len() != BYTES_PER_G2_POINT {
|
|
return Err(de::Error::custom(format!(
|
|
"G2 point has invalid length. Expected {} got {}",
|
|
BYTES_PER_G2_POINT,
|
|
point.len()
|
|
)));
|
|
}
|
|
let mut res = [0; BYTES_PER_G2_POINT];
|
|
res.copy_from_slice(&point);
|
|
Ok(G2Point(res))
|
|
}
|
|
}
|
|
|
|
deserializer.deserialize_str(G2PointVisitor)
|
|
}
|
|
}
|
|
|
|
fn strip_prefix(s: &str) -> &str {
|
|
if let Some(stripped) = s.strip_prefix("0x") {
|
|
stripped
|
|
} else {
|
|
s
|
|
}
|
|
}
|
|
|
|
/// Loads the trusted setup from JSON.
|
|
///
|
|
/// ## Note:
|
|
/// Currently we load both c-kzg and rust-eth-kzg trusted setup structs, because c-kzg is still being
|
|
/// used for 4844. Longer term we're planning to switch all KZG operations to the rust-eth-kzg
|
|
/// crate, and we'll be able to maintain a single trusted setup struct.
|
|
pub(crate) fn load_trusted_setup(
|
|
trusted_setup: &[u8],
|
|
) -> Result<(TrustedSetup, PeerDASTrustedSetup), Error> {
|
|
let ckzg_trusted_setup: TrustedSetup = serde_json::from_slice(trusted_setup)
|
|
.map_err(|e| Error::TrustedSetupError(format!("{e:?}")))?;
|
|
let trusted_setup_json = std::str::from_utf8(trusted_setup)
|
|
.map_err(|e| Error::TrustedSetupError(format!("{e:?}")))?;
|
|
let rkzg_trusted_setup = PeerDASTrustedSetup::from_json(trusted_setup_json);
|
|
Ok((ckzg_trusted_setup, rkzg_trusted_setup))
|
|
}
|