text
stringlengths
1
2.05k
EvmTranscript<_, _, _, _>, EvmTranscript<_, _, _, _>, >( circuit, vec![public_inputs], &params, &pk, CheckMode::UNSAFE, crate::Commitments::KZG, TranscriptType::EVM, proof_split_commits, None, ) } Commitments::IPA => { let params: ParamsIPA<_> = halo2_proofs::poly::commitment::Params::<'_, G1Affine>::read(&mut reader) .map_err(|e| JsError::new(&format!("Failed to deserialize srs: {}", e)))?; create_proof_circuit::< IPACommitmentScheme<G1Affine>, _, ProverIPA<_>, VerifierIPA<_>, IPASingleStrategy<_>, _, EvmTranscript<_, _, _, _>, EvmTranscript<_, _, _, _>, >( circuit, vec![public_inputs], &params, &pk, CheckMode::UNSAFE, crate::Commitments::IPA, TranscriptType::EVM, proof_split_commits, None, ) } } .map_err(|e| JsError::new(&format!("{}", e)))?; Ok(serde_json::to_string(&proof) .map_err(|e| JsError::new(&format!("{}", e)))? .into_bytes()) } pub fn witnessValidation(witness: wasm_bindgen::Clamped<Vec<u8>>) -> Result<bool, JsError> { let _: crate::graph::GraphWitness = serde_json::from_slice(&witness[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize witness: {}", e)))?; Ok(true) } pub fn compiledCircuitValidation( compiled_circuit: wasm_bindgen::Clamped<Vec<u8>>, ) -> Result<bool, JsError> { let _: crate::graph::GraphCircuit = bincode::deserialize(&compiled_circuit[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize compiled circuit: {}", e)))?; Ok(tr
ue) } pub fn inputValidation(input: wasm_bindgen::Clamped<Vec<u8>>) -> Result<bool, JsError> { let _: crate::graph::input::GraphData = serde_json::from_slice(&input[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize input: {}", e)))?; Ok(true) } pub fn proofValidation(proof: wasm_bindgen::Clamped<Vec<u8>>) -> Result<bool, JsError> { let _: crate::pfsys::Snark<Fr, G1Affine> = serde_json::from_slice(&proof[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize proof: {}", e)))?; Ok(true) } pub fn vkValidation( vk: wasm_bindgen::Clamped<Vec<u8>>, settings: wasm_bindgen::Clamped<Vec<u8>>, ) -> Result<bool, JsError> { let circuit_settings: GraphSettings = serde_json::from_slice(&settings[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize settings: {}", e)))?; let mut reader = std::io::BufReader::new(&vk[..]); let _ = VerifyingKey::<G1Affine>::read::<_, GraphCircuit>( &mut reader, halo2_proofs::SerdeFormat::RawBytes, circuit_settings, ) .map_err(|e| JsError::new(&format!("Failed to deserialize vk: {}", e)))?; Ok(true) } pub fn pkValidation( pk: wasm_bindgen::Clamped<Vec<u8>>, settings: wasm_bindgen::Clamped<Vec<u8>>, ) -> Result<bool, JsError> { let circuit_settings: GraphSettings = serde_json::from_slice(&settings[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize settings: {}", e)))?; let mut reader = std::io::BufReader::new(&pk[..]); let _ = ProvingKey::<G1Affine>::read::<_, GraphCircuit>( &mut reader, halo2_proofs::SerdeFormat::RawBytes, circuit_settings, ) .map_err(|e| JsError::new(&format!("Failed to deserialize proving key: {}", e)))?; Ok(true) } pub fn settingsValidation(settings: wasm_bindgen::Clamped<Vec<u8>>) -> Result<bool, JsError> { let _: GraphSettings = serde_json::from_slice(&settings[..]) .map_err(|e| JsError::new(&format!("Failed to deserialize settings: {}", e)))?;
Ok(true) } pub fn srsValidation(srs: wasm_bindgen::Clamped<Vec<u8>>) -> Result<bool, JsError> { let mut reader = std::io::BufReader::new(&srs[..]); let _: ParamsKZG<Bn256> = halo2_proofs::poly::commitment::Params::<'_, G1Affine>::read(&mut reader) .map_err(|e| JsError::new(&format!("Failed to deserialize params: {}", e)))?; Ok(true) } pub fn create_vk_wasm<Scheme: CommitmentScheme, F: PrimeField + TensorType, C: Circuit<F>>( circuit: &C, params: &'_ Scheme::ParamsProver, compress_selectors: bool, ) -> Result<VerifyingKey<Scheme::Curve>, halo2_proofs::plonk::Error> where C: Circuit<Scheme::Scalar>, <Scheme as CommitmentScheme>::Scalar: FromUniformBytes<64>, { let empty_circuit = <C as Circuit<F>>::without_witnesses(circuit); let vk = keygen_vk_custom(params, &empty_circuit, compress_selectors)?; Ok(vk) } pub fn create_pk_wasm<Scheme: CommitmentScheme, F: PrimeField + TensorType, C: Circuit<F>>( vk: VerifyingKey<Scheme::Curve>, circuit: &C, params: &'_ Scheme::ParamsProver, ) -> Result<ProvingKey<Scheme::Curve>, halo2_proofs::plonk::Error> where C: Circuit<Scheme::Scalar>, <Scheme as CommitmentScheme>::Scalar: FromUniformBytes<64>, { let empty_circuit = <C as Circuit<F>>::without_witnesses(circuit); let pk = keygen_pk(params, vk, &empty_circuit)?; Ok(pk) } pub fn u8_array_to_u128_le(arr: [u8; 16]) -> u128 { let mut n: u128 = 0; for &b in arr.iter().rev() { n <<= 8; n |= b as u128; } n }
mod native_tests { use ezkl::circuit::Tolerance; use ezkl::fieldutils::{felt_to_i128, i128_to_felt}; use ezkl::graph::input::{FileSource, FileSourceInner, GraphData}; use ezkl::graph::{DataSource, GraphSettings, GraphWitness}; use ezkl::Commitments; use lazy_static::lazy_static; use rand::Rng; use std::env::var; use std::io::{Read, Write}; use std::process::{Child, Command}; use std::sync::Once; static COMPILE: Once = Once::new(); static COMPILE_WASM: Once = Once::new(); static ENV_SETUP: Once = Once::new(); enum Hardfork { London, ArrowGlacier, GrayGlacier, Paris, Shanghai, Latest, } lazy_static! { static ref CARGO_TARGET_DIR: String = var("CARGO_TARGET_DIR").unwrap_or_else(|_| "./target".to_string()); static ref ANVIL_URL: String = "http: static ref LIMITLESS_ANVIL_URL: String = "http: static ref ANVIL_DEFAULT_PRIVATE_KEY: String = "ac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80".to_string(); } fn start_anvil(limitless: bool, hardfork: Hardfork) -> Child { let mut args = vec!["-p"]; if limitless { args.push("8545"); args.push("--code-size-limit=41943040"); args.push("--disable-block-gas-limit"); } else { args.push("3030"); } match hardfork { Hardfork::Paris => args.push("--hardfork=paris"), Hardfork::London => args.push("--hardfork=london"), Hardfork::Latest => {} Hardfork::Shanghai => args.push("--hardfork=shanghai"), Hardfork::ArrowGlacier => args.push("--hardfork=arrowGlacier"), Hardfork::GrayGlacier => args.push("--hardfork=grayGlacier"), } let child = Command::new("anvil") .args(args) .spawn() .expect("failed to start anvil process"); std::thread::sleep(std::time::Dura
tion::from_secs(3)); child }
fn init_binary() { COMPILE.call_once(|| { println!("using cargo target dir: {}", *CARGO_TARGET_DIR); build_ezkl(); }); } pub
fn init_wasm() { COMPILE_WASM.call_once(|| { build_wasm_ezkl(); }); }
fn setup_py_env() { ENV_SETUP.call_once(|| { let status = Command::new("pip") .args(["install", "numpy", "onnxruntime", "onnx"]) .stdout(std::process::Stdio::null()) .status() .expect("failed to execute process"); assert!(status.success()); }); }
fn download_srs(logrows: u32, commitment: Commitments) { let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "get-srs", "--logrows", &format!("{}", logrows), "--commitment", &commitment.to_string(), ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn init_params(settings_path: std::path::PathBuf) { println!("using settings path: {}", settings_path.to_str().unwrap()); let settings = std::fs::read_to_string(settings_path).expect("failed to read settings file"); let settings: GraphSettings = serde_json::from_str(&settings).unwrap(); let logrows = settings.run_args.logrows; download_srs(logrows, settings.run_args.commitment.into()); }
fn mv_test_(test_dir: &str, test: &str) { let path: std::path::PathBuf = format!("{}/{}", test_dir, test).into(); if !path.exists() { let status = Command::new("cp") .args([ "-R", &format!("./examples/onnx/{}", test), &format!("{}/{}", test_dir, test), ]) .status() .expect("failed to execute process"); assert!(status.success()); } }
fn mk_data_batches_(test_dir: &str, test: &str, output_dir: &str, num_batches: usize) { let path: std::path::PathBuf = format!("{}/{}", test_dir, test).into(); if !path.exists() { panic!("test_dir does not exist") } else { let status = Command::new("cp") .args([ "-R", &format!("{}/{}", test_dir, test), &format!("{}/{}", test_dir, output_dir), ]) .status() .expect("failed to execute process"); assert!(status.success()); let data = GraphData::from_path(format!("{}/{}/input.json", test_dir, test).into()) .expect("failed to load input data"); let input_data = match data.input_data { DataSource::File(data) => data, _ => panic!("Only File data sources support batching"), }; let duplicated_input_data: FileSource = input_data .iter() .map(|data| (0..num_batches).flat_map(|_| data.clone()).collect()) .collect(); let duplicated_data = GraphData::new(DataSource::File(duplicated_input_data)); let res = duplicated_data.save(format!("{}/{}/input.json", test_dir, output_dir).into()); assert!(res.is_ok()); } } const PF_FAILURE: &str = "examples/test_failure_proof.json"; const PF_FAILURE_AGGR: &str = "examples/test_failure_aggr_proof.json"; const LARGE_TESTS: [&str; 5] = [ "self_attention", "nanoGPT", "multihead_attention", "mobilenet", "mnist_gan", ]; const ACCURACY_CAL_TESTS: [&str; 6] = [ "accuracy", "1l_mlp", "4l_relu_conv_fc", "1l_elu", "1l_prelu", "1l_tiny_div", ]; const TESTS: [&str; 92] = [ "1l_mlp", "1l_slice", "1l_concat", "1l_flatten", "1l_div",
"1l_pad", "1l_reshape", "1l_eltwise_div", "1l_sigmoid", "1l_sqrt", "1l_softmax", "1l_batch_norm", "1l_prelu", "1l_leakyrelu", "1l_gelu_noappx", "1l_relu", "1l_downsample", "1l_tanh", "2l_relu_sigmoid_small", "2l_relu_fc", "2l_relu_small", "2l_relu_sigmoid", "1l_conv", "2l_sigmoid_small", "2l_relu_sigmoid_conv", "3l_relu_conv_fc", "4l_relu_conv_fc", "1l_erf", "1l_var", "1l_elu", "min", "max", "1l_max_pool", "1l_conv_transpose", "1l_upsample", "1l_identity", "idolmodel", "trig", "prelu_gmm", "lstm", "rnn", "quantize_dequantize", "1l_where", "boolean", "boolean_identity", "decision_tree", "random_forest", "gradient_boosted_trees", "1l_topk", "xgboost", "lightgbm", "hummingbird_decision_tree", "oh_decision_tree", "linear_svc", "gather_elements", "less", "xgboost_reg", "1l_powf", "scatter_elements", "1l_linear", "linear_regression", "sklearn_mlp", "1l_mean", "rounding_ops", "arange", "layernorm", "bitwise_ops", "blackman_window", "softsign", "softplus", "selu", "hard_sigmoid", "log_softmax", "eye", "ltsf", "remainder", "bitshift", "gather_nd", "scatter_nd", "celu", "gru", "hard_swish", "hard_max", "tril", "triu", "logsumexp", "clip", "mish", "reducel1", "reducel2", "1l_lppool", "lstm_large", ]; const WASM_TESTS: [&str; 46] = [ "1l_mlp", "1l_slice
", "1l_concat", "1l_flatten", "1l_div", "1l_pad", "1l_reshape", "1l_eltwise_div", "1l_sigmoid", "1l_sqrt", "1l_softmax", "1l_batch_norm", "1l_prelu", "1l_leakyrelu", "1l_gelu_noappx", "1l_relu", "1l_downsample", "1l_tanh", "2l_relu_sigmoid_small", "2l_relu_fc", "2l_relu_small", "2l_relu_sigmoid", "1l_conv", "2l_sigmoid_small", "2l_relu_sigmoid_conv", "3l_relu_conv_fc", "4l_relu_conv_fc", "1l_erf", "1l_var", "1l_elu", "min", "max", "1l_max_pool", "1l_conv_transpose", "1l_upsample", "1l_identity", "trig", "prelu_gmm", "lstm", "rnn", "quantize_dequantize", "1l_where", "boolean", "boolean_identity", "gradient_boosted_trees", "1l_topk", ]; const TESTS_AGGR: [&str; 21] = [ "1l_mlp", "1l_flatten", "1l_average", "1l_reshape", "1l_div", "1l_pad", "1l_sigmoid", "1l_gelu_noappx", "1l_sqrt", "1l_prelu", "1l_var", "1l_leakyrelu", "1l_relu", "1l_tanh", "2l_relu_fc", "2l_relu_sigmoid_small", "2l_relu_small", "1l_conv", "min", "max", "1l_max_pool", ]; const TESTS_AGGR: [&str; 3] = ["1l_mlp", "1l_flatten", "1l_average"]; const TESTS_EVM: [&str; 23] = [ "1l_mlp", "1l_flatten", "1l_average", "1l_reshape", "1l_sigmoid", "1l_div", "1l_sqrt", "1l_prelu", "1l_var", "1l_leakyrelu", "1l_gelu_noappx", "1l_relu", "1l_tanh", "2l_relu_sigmoid_small", "2l_relu_small", "min", "max", "1l_max_pool",
"idolmodel", "1l_identity", "lstm", "rnn", "quantize_dequantize", ]; const TESTS_EVM_AGGR: [&str; 18] = [ "1l_mlp", "1l_reshape", "1l_sigmoid", "1l_div", "1l_sqrt", "1l_prelu", "1l_var", "1l_leakyrelu", "1l_gelu_noappx", "1l_relu", "1l_tanh", "2l_relu_sigmoid_small", "2l_relu_small", "2l_relu_fc", "min", "max", "idolmodel", "1l_identity", ]; const EXAMPLES: [&str; 2] = ["mlp_4d_einsum", "conv2d_mnist"]; macro_rules! test_func_aggr { () => { mod tests_aggr { use seq_macro::seq; use crate::native_tests::TESTS_AGGR; use test_case::test_case; use crate::native_tests::aggr_prove_and_verify; use crate::native_tests::kzg_aggr_mock_prove_and_verify; use tempdir::TempDir; use ezkl::Commitments; seq!(N in 0..=20 {
fn kzg_aggr_mock_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); kzg_aggr_mock_prove_and_verify(path, test.to_string()); test_dir.close().unwrap(); }
fn kzg_aggr_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); aggr_prove_and_verify(path, test.to_string(), "private", "private", "public", Commitments::KZG); test_dir.close().unwrap(); }
fn ipa_aggr_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); aggr_prove_and_verify(path, test.to_string(), "private", "private", "public", Commitments::IPA); test_dir.close().unwrap(); } }); seq!(N in 0..=2 {
fn aggr_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(test_dir.path().to_str().unwrap(), test); aggr_prove_and_verify(path, test.to_string(), "private", "private", "public", Commitments::KZG); test_dir.close().unwrap(); } }); } }; } macro_rules! test_func { () => { mod tests { use seq_macro::seq; use crate::native_tests::TESTS; use crate::native_tests::WASM_TESTS; use crate::native_tests::ACCURACY_CAL_TESTS; use crate::native_tests::LARGE_TESTS; use test_case::test_case; use crate::native_tests::mock; use crate::native_tests::accuracy_measurement; use crate::native_tests::prove_and_verify; use crate::native_tests::run_js_tests; use crate::native_tests::render_circuit; use crate::native_tests::model_serialization_different_binaries; use rand::Rng; use tempdir::TempDir; use ezkl::Commitments;
fn model_serialization_different_binaries_() { let test = "1l_mlp"; let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); model_serialization_different_binaries(path, test.to_string()); test_dir.close().unwrap(); } seq!(N in 0..=5 {
fn mock_accuracy_cal_tests(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "fixed", "public", 1, "accuracy", None, 0.0); test_dir.close().unwrap(); } }); seq!(N in 0..=91 {
fn render_circuit_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); render_circuit(path, test.to_string()); test_dir.close().unwrap(); }
fn accuracy_measurement_div_rebase_(test: &str) { crate::native_tests::init_binary(); crate::native_tests::setup_py_env(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); accuracy_measurement(path, test.to_string(), "private", "private", "public", 1, "accuracy", 2.6, true); test_dir.close().unwrap(); }
fn accuracy_measurement_public_outputs_(test: &str) { crate::native_tests::init_binary(); crate::native_tests::setup_py_env(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); accuracy_measurement(path, test.to_string(), "private", "private", "public", 1, "accuracy", 2.6, false); test_dir.close().unwrap(); }
fn accuracy_measurement_fixed_params_(test: &str) { crate::native_tests::init_binary(); crate::native_tests::setup_py_env(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); accuracy_measurement(path, test.to_string(), "private", "fixed", "private", 1, "accuracy", 2.6 , false); test_dir.close().unwrap(); }
fn accuracy_measurement_public_inputs_(test: &str) { crate::native_tests::init_binary(); crate::native_tests::setup_py_env(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); accuracy_measurement(path, test.to_string(), "public", "private", "private", 1, "accuracy", 2.6, false); test_dir.close().unwrap(); }
fn resources_accuracy_measurement_public_outputs_(test: &str) { crate::native_tests::init_binary(); crate::native_tests::setup_py_env(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); accuracy_measurement(path, test.to_string(), "private", "private", "public", 1, "resources", 3.1, false); test_dir.close().unwrap(); }
fn mock_public_outputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "private", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_tolerance_public_outputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let tolerance = rand::thread_rng().gen_range(0.0..1.0) * 100.0; mock(path, test.to_string(), "private", "private", "public", 1, "resources", None, tolerance); test_dir.close().unwrap(); }
fn mock_large_batch_public_outputs_(test: &str) { if test != "gather_nd" && test != "lstm_large" { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let large_batch_dir = &format!("large_batches_{}", test); crate::native_tests::mk_data_batches_(path, test, &large_batch_dir, 10); mock(path, large_batch_dir.to_string(), "private", "private", "public", 10, "resources", None, 0.0); test_dir.close().unwrap(); } }
fn mock_public_inputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "private", "private", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_fixed_inputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "fixed", "private", "private", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_fixed_outputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "private", "fixed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_fixed_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "fixed", "private", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_input_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "hashed", "private", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_kzg_input_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "polycommit", "private", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "hashed", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_kzg_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "polycommit", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_output_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "private", "hashed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_kzg_output_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "private", "polycommit", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_output_fixed_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "fixed", "hashed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_output_kzg_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "public", "polycommit", "hashed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_kzg_all_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "polycommit", "polycommit", "polycommit", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_input_output_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "hashed", "private", "hashed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_input_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(),"hashed", "hashed", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn mock_hashed_all_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(),"hashed", "hashed", "hashed", 1, "resources", None, 0.0); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_single_col(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_triple_col(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 3, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_quadruple_col(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 4, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_octuple_col(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 8, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_tight_lookup_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 1, None, false, "single", Commitments::KZG, 1); test_dir.close().unwrap(); }
fn ipa_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 1, None, false, "single", Commitments::IPA, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_public_input_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "public", "private", "public", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_fixed_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "fixed", "public", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_hashed_output(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "hashed", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn kzg_prove_and_verify_kzg_output(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "polycommit", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn ipa_prove_and_verify_ipa_output(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "polycommit", 1, None, false, "single", Commitments::IPA, 2); test_dir.close().unwrap(); } }); seq!(N in 0..=45 {
fn kzg_prove_and_verify_with_overflow_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); env_logger::init(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "private", "public", 1, None, true, "single", Commitments::KZG, 2); run_js_tests(path, test.to_string(), "testWasm", false); }
fn kzg_prove_and_verify_with_overflow_hashed_inputs_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); env_logger::init(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "hashed", "private", "public", 1, None, true, "single", Commitments::KZG, 2); run_js_tests(path, test.to_string(), "testWasm", false); }
fn kzg_prove_and_verify_with_overflow_fixed_params_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); env_logger::init(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "safe", "private", "fixed", "public", 1, None, true, "single", Commitments::KZG, 2); run_js_tests(path, test.to_string(), "testWasm", false); test_dir.close().unwrap(); } }); seq!(N in 0..=4 {
fn large_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); prove_and_verify(path, test.to_string(), "unsafe", "private", "fixed", "public", 1, None, false, "single", Commitments::KZG, 2); test_dir.close().unwrap(); }
fn large_mock_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); mock(path, test.to_string(), "private", "fixed", "public", 1, "resources", None, 0.0); test_dir.close().unwrap(); } }); } }; } macro_rules! test_func_evm { () => { mod tests_evm { use seq_macro::seq; use crate::native_tests::TESTS_EVM; use crate::native_tests::TESTS_EVM_AGGR; use test_case::test_case; use crate::native_tests::kzg_evm_prove_and_verify; use crate::native_tests::kzg_evm_prove_and_verify_render_seperately; use crate::native_tests::kzg_evm_on_chain_input_prove_and_verify; use crate::native_tests::kzg_evm_aggr_prove_and_verify; use tempdir::TempDir; use crate::native_tests::Hardfork; use crate::native_tests::run_js_tests; const TESTS_ON_CHAIN_INPUT: [&str; 17] = [ "1l_mlp", "1l_average", "1l_reshape", "1l_sigmoid", "1l_div", "1l_sqrt", "1l_prelu", "1l_var", "1l_leakyrelu", "1l_gelu_noappx", "1l_relu", "1l_tanh", "2l_relu_sigmoid_small", "2l_relu_small", "2l_relu_fc", "min", "max" ]; seq!(N in 0..=16 { fn kzg_evm_on_chain_input_prove_and_verify_(test: (&str,Hardfork)) { let (test,hardfork) = test; crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap();
let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(true, hardfork); kzg_evm_on_chain_input_prove_and_verify(path, test.to_string(), "on-chain", "file", "public", "private"); }
fn kzg_evm_on_chain_output_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(true, Hardfork::Latest); kzg_evm_on_chain_input_prove_and_verify(path, test.to_string(), "file", "on-chain", "private", "public"); }
fn kzg_evm_on_chain_input_output_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(true, Hardfork::Latest); kzg_evm_on_chain_input_prove_and_verify(path, test.to_string(), "on-chain", "on-chain", "public", "public"); test_dir.close().unwrap(); }
fn kzg_evm_on_chain_input_output_hashed_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(true, Hardfork::Latest); kzg_evm_on_chain_input_prove_and_verify(path, test.to_string(), "on-chain", "on-chain", "hashed", "hashed"); test_dir.close().unwrap(); } }); seq!(N in 0..=17 {
fn kzg_evm_aggr_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_aggr_prove_and_verify(path, test.to_string(), "private", "private", "public"); test_dir.close().unwrap(); } }); seq!(N in 0..=22 {
fn kzg_evm_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "private", "private", "public"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_prove_and_verify_render_seperately_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify_render_seperately(2, path, test.to_string(), "private", "private", "public"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", true); test_dir.close().unwrap(); }
fn kzg_evm_hashed_input_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let mut _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "hashed", "private", "private"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); } fn kzg_evm_kzg_input_prove_and_verify_(test: (&str, Hardfork)) { let (test,hardfork) = test; crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let mut _anvil_child = crate::native_tests::start_anvil(false, hardfork); kzg_evm_prove_and_verify(2, path, test.to_string(), "polycommit", "private", "public"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_hashed_params_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "private", "hashed", "public"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_hashed_output_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "private", "private", "hashed"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_kzg_params_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "private", "polycommit", "public"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_kzg_output_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "private", "private", "polycommit"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); }
fn kzg_evm_kzg_all_prove_and_verify_(test: &str) { crate::native_tests::init_binary(); let test_dir = TempDir::new(test).unwrap(); let path = test_dir.path().to_str().unwrap(); crate::native_tests::mv_test_(path, test); let _anvil_child = crate::native_tests::start_anvil(false, Hardfork::Latest); kzg_evm_prove_and_verify(2, path, test.to_string(), "polycommit", "polycommit", "polycommit"); run_js_tests(path, test.to_string(), "testBrowserEvmVerify", false); test_dir.close().unwrap(); } }); } }; } macro_rules! test_func_examples { () => { mod tests_examples { use seq_macro::seq; use crate::native_tests::EXAMPLES; use test_case::test_case; use crate::native_tests::run_example as run; seq!(N in 0..=1 {
fn example_(test: &str) { run(test.to_string()); } }); } }; } test_func!(); test_func_aggr!(); test_func_evm!(); test_func_examples!();
fn model_serialization_different_binaries(test_dir: &str, example_name: String) { let status = Command::new("cargo") .args([ "run", "--bin", "ezkl", "--", "gen-settings", "-M", format!("{}/{}/network.onnx", test_dir, example_name).as_str(), &format!( "--settings-path={}/{}/settings.json", test_dir, example_name ), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new("cargo") .args([ "run", "--bin", "ezkl", "--", "compile-circuit", "-M", format!("{}/{}/network.onnx", test_dir, example_name).as_str(), "--compiled-circuit", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), &format!( "--settings-path={}/{}/settings.json", test_dir, example_name ), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new("cp") .args(["Cargo.toml", "Cargo.toml.bak"]) .status() .expect("failed to execute process"); assert!(status.success()); let mut cargo_toml = std::fs::File::open("Cargo.toml").unwrap(); let mut cargo_toml_contents = String::new(); cargo_toml.read_to_string(&mut cargo_toml_contents).unwrap(); let mut cargo_toml_contents = cargo_toml_contents.split('\n').collect::<Vec<_>>(); let mut rng = rand::thread_rng(); let version = &format!( "version = \"0.{}.{}-test\"", rng.gen_range(0..100), rng.gen_range(0..100) );
let cargo_toml_contents = cargo_toml_contents .iter_mut() .map(|line| { if line.starts_with("version") { *line = version; } *line }) .collect::<Vec<_>>(); let mut cargo_toml = std::fs::File::create("Cargo.toml").unwrap(); cargo_toml .write_all(cargo_toml_contents.join("\n").as_bytes()) .unwrap(); let status = Command::new("cargo") .args([ "run", "--bin", "ezkl", "--", "gen-witness", "-D", &format!("{}/{}/input.json", test_dir, example_name), "-M", &format!("{}/{}/network.compiled", test_dir, example_name), "-O", &format!("{}/{}/witness.json", test_dir, example_name), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new("rm") .args(["Cargo.toml"]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new("mv") .args(["Cargo.toml.bak", "Cargo.toml"]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn run_example(example_name: String) { let status = Command::new("cargo") .args(["run", "--release", "--example", example_name.as_str()]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn mock( test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, batch_size: usize, cal_target: &str, scales_to_use: Option<Vec<u32>>, tolerance: f32, ) { let mut tolerance = tolerance; gen_circuit_settings_and_witness( test_dir, example_name.clone(), input_visibility, param_visibility, output_visibility, batch_size, cal_target, scales_to_use, 2, false, &mut tolerance, Commitments::KZG, 2, ); if tolerance > 0.0 { let witness = GraphWitness::from_path( format!("{}/{}/witness.json", test_dir, example_name).into(), ) .unwrap(); let witness = witness.clone(); let outputs = witness.outputs.clone(); let output_perturbed_safe: Vec<Vec<halo2curves::bn256::Fr>> = outputs .iter() .map(|sv| { sv.iter() .map(|v| { let perturbation = if v == &halo2curves::bn256::Fr::zero() { halo2curves::bn256::Fr::zero() } else { i128_to_felt( (felt_to_i128(*v) as f32 * (rand::thread_rng().gen_range(-0.01..0.01) * tolerance)) as i128, ) }; *v + perturbation }) .collect::<Vec<_>>() }) .collect::<Vec<_>>(); let output_perturbed_bad: Vec<Vec<halo2curves::bn256::Fr>> = outputs
.iter() .map(|sv| { sv.iter() .map(|v| { let perturbation = if v == &halo2curves::bn256::Fr::zero() { halo2curves::bn256::Fr::from(2) } else { i128_to_felt( (felt_to_i128(*v) as f32 * (rand::thread_rng().gen_range(0.02..0.1) * tolerance)) as i128, ) }; *v + perturbation }) .collect::<Vec<_>>() }) .collect::<Vec<_>>(); let good_witness = GraphWitness { outputs: output_perturbed_safe, ..witness.clone() }; good_witness .save(format!("{}/{}/witness_ok.json", test_dir, example_name).into()) .unwrap(); let bad_witness = GraphWitness { outputs: output_perturbed_bad, ..witness.clone() }; bad_witness .save(format!("{}/{}/witness_bad.json", test_dir, example_name).into()) .unwrap(); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "mock", "-W", format!("{}/{}/witness.json", test_dir, example_name).as_str(), "-M", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "mock",
"-W", format!("{}/{}/witness_ok.json", test_dir, example_name).as_str(), "-M", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "mock", "-W", format!("{}/{}/witness_bad.json", test_dir, example_name).as_str(), "-M", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), ]) .status() .expect("failed to execute process"); assert!(!status.success()); } else { let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "mock", "-W", format!("{}/{}/witness.json", test_dir, example_name).as_str(), "-M", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), ]) .status() .expect("failed to execute process"); assert!(status.success()); } }
fn gen_circuit_settings_and_witness( test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, batch_size: usize, cal_target: &str, scales_to_use: Option<Vec<u32>>, num_inner_columns: usize, div_rebasing: bool, tolerance: &mut f32, commitment: Commitments, lookup_safety_margin: usize, ) { let mut args = vec![ "gen-settings".to_string(), "-M".to_string(), format!("{}/{}/network.onnx", test_dir, example_name), format!( "--settings-path={}/{}/settings.json", test_dir, example_name ), format!("--variables=batch_size->{}", batch_size), format!("--input-visibility={}", input_visibility), format!("--param-visibility={}", param_visibility), format!("--output-visibility={}", output_visibility), format!("--num-inner-cols={}", num_inner_columns), format!("--tolerance={}", tolerance), format!("--commitment={}", commitment), ]; if div_rebasing { args.push("--div-rebasing".to_string()); }; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(args) .stdout(std::process::Stdio::null()) .status() .expect("failed to execute process"); assert!(status.success()); let mut calibrate_args = vec![ "calibrate-settings".to_string(), "--data".to_string(), format!("{}/{}/input.json", test_dir, example_name), "-M".to_string(), format!("{}/{}/network.onnx", test_dir, example_name), format!( "--settings-path={}/{}/settings.json", test_dir, example_name ), format!("--target={}", cal_target), format!("--lookup-safety-margin={}", lookup
_safety_margin), ]; if let Some(scales) = scales_to_use { let scales = scales .iter() .map(|s| s.to_string()) .collect::<Vec<_>>() .join(","); calibrate_args.push("--scales".to_string()); calibrate_args.push(scales); } let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(calibrate_args) .status() .expect("failed to execute process"); assert!(status.success()); let mut settings = GraphSettings::load(&format!("{}/{}/settings.json", test_dir, example_name).into()) .unwrap(); let any_output_scales_smol = settings.model_output_scales.iter().any(|s| *s <= 0); if any_output_scales_smol { settings.run_args.tolerance = Tolerance { val: 0.0, scale: 0.0.into(), }; settings .save(&format!("{}/{}/settings.json", test_dir, example_name).into()) .unwrap(); *tolerance = 0.0; } let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "compile-circuit", "-M", format!("{}/{}/network.onnx", test_dir, example_name).as_str(), "--compiled-circuit", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), &format!( "--settings-path={}/{}/settings.json", test_dir, example_name ), ]) .stdout(std::process::Stdio::null()) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "gen-witness", "-D", &format!("{}/{}/input.json", test_
dir, example_name), "-M", &format!("{}/{}/network.compiled", test_dir, example_name), "-O", &format!("{}/{}/witness.json", test_dir, example_name), ]) .stdout(std::process::Stdio::null()) .status() .expect("failed to execute process"); assert!(status.success()); }
fn accuracy_measurement( test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, batch_size: usize, cal_target: &str, target_perc: f32, div_rebasing: bool, ) { gen_circuit_settings_and_witness( test_dir, example_name.clone(), input_visibility, param_visibility, output_visibility, batch_size, cal_target, None, 2, div_rebasing, &mut 0.0, Commitments::KZG, 2, ); println!( " ------------ running accuracy measurement for {}", example_name ); let status = Command::new("python") .args([ "tests/output_comparison.py", &format!("{}/{}/network.onnx", test_dir, example_name), &format!("{}/{}/input.json", test_dir, example_name), &format!("{}/{}/witness.json", test_dir, example_name), &format!("{}/{}/settings.json", test_dir, example_name), &format!("{}", target_perc), ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn render_circuit(test_dir: &str, example_name: String) { let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "render-circuit", "-M", format!("{}/{}/network.onnx", test_dir, example_name).as_str(), "-O", format!("{}/{}/render.png", test_dir, example_name).as_str(), "--lookup-range=-32768->32768", "-K=17", ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn kzg_aggr_mock_prove_and_verify(test_dir: &str, example_name: String) { prove_and_verify( test_dir, example_name.clone(), "safe", "private", "private", "public", 2, None, false, "for-aggr", Commitments::KZG, 2, ); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "mock-aggregate", "--logrows=23", "--aggregation-snarks", &format!("{}/{}/proof.pf", test_dir, example_name), ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn aggr_prove_and_verify( test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, commitment: Commitments, ) { prove_and_verify( test_dir, example_name.clone(), "safe", input_visibility, param_visibility, output_visibility, 2, None, false, "for-aggr", Commitments::KZG, 2, ); download_srs(23, commitment); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "setup-aggregate", "--sample-snarks", &format!("{}/{}/proof.pf", test_dir, example_name), "--logrows=23", "--vk-path", &format!("{}/{}/aggr.vk", test_dir, example_name), "--pk-path", &format!("{}/{}/aggr.pk", test_dir, example_name), &format!("--commitment={}", commitment), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "aggregate", "--logrows=23", "--aggregation-snarks", &format!("{}/{}/proof.pf", test_dir, example_name), "--proof-path", &format!("{}/{}/aggr.pf", test_dir, example_name), "--pk-path", &format!("{}/{}/aggr.pk", test_dir, example_name), &format!("--commitment={}", commitment), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "verify-aggr", "--logrows=23",
"--proof-path", &format!("{}/{}/aggr.pf", test_dir, example_name), "--vk-path", &format!("{}/{}/aggr.vk", test_dir, example_name), ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn kzg_evm_aggr_prove_and_verify( test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, ) { aggr_prove_and_verify( test_dir, example_name.clone(), input_visibility, param_visibility, output_visibility, Commitments::KZG, ); download_srs(23, Commitments::KZG); let vk_arg = &format!("{}/{}/aggr.vk", test_dir, example_name); fn build_args<'a>(base_args: Vec<&'a str>, sol_arg: &'a str) -> Vec<&'a str> { let mut args = base_args; args.push("--sol-code-path"); args.push(sol_arg); args } let sol_arg = format!("{}/{}/kzg_aggr.sol", test_dir, example_name); let addr_path_arg = format!("--addr-path={}/{}/addr.txt", test_dir, example_name); let rpc_arg = format!("--rpc-url={}", *ANVIL_URL); let settings_arg = format!("{}/{}/settings.json", test_dir, example_name); let private_key = format!("--private-key={}", *ANVIL_DEFAULT_PRIVATE_KEY); let base_args = vec![ "create-evm-verifier-aggr", "--vk-path", vk_arg.as_str(), "--aggregation-settings", settings_arg.as_str(), "--logrows=23", ]; let args = build_args(base_args, &sol_arg); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(args) .status() .expect("failed to execute process"); assert!(status.success()); let args = vec![ "deploy-evm-verifier", rpc_arg.as_str(), addr_path_arg.as_str(), "--sol-code-path", sol_arg.as_str(), private_key.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("f
ailed to execute process"); assert!(status.success()); let addr = std::fs::read_to_string(format!("{}/{}/addr.txt", test_dir, example_name)) .expect("failed to read address file"); let deployed_addr_arg = format!("--addr-verifier={}", addr); let pf_arg = format!("{}/{}/aggr.pf", test_dir, example_name); let mut base_args = vec![ "verify-evm", "--proof-path", pf_arg.as_str(), deployed_addr_arg.as_str(), rpc_arg.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&base_args) .status() .expect("failed to execute process"); assert!(status.success()); base_args[2] = PF_FAILURE_AGGR; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(base_args) .status() .expect("failed to execute process"); assert!(!status.success()); }
fn prove_and_verify( test_dir: &str, example_name: String, checkmode: &str, input_visibility: &str, param_visibility: &str, output_visibility: &str, num_inner_columns: usize, scales_to_use: Option<Vec<u32>>, overflow: bool, proof_type: &str, commitment: Commitments, lookup_safety_margin: usize, ) { let target_str = if overflow { "resources/col-overflow" } else { "resources" }; gen_circuit_settings_and_witness( test_dir, example_name.clone(), input_visibility, param_visibility, output_visibility, 1, target_str, scales_to_use, num_inner_columns, false, &mut 0.0, commitment, lookup_safety_margin, ); let settings_path = format!("{}/{}/settings.json", test_dir, example_name); init_params(settings_path.clone().into()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "setup", "-M", &format!("{}/{}/network.compiled", test_dir, example_name), "--pk-path", &format!("{}/{}/key.pk", test_dir, example_name), "--vk-path", &format!("{}/{}/key.vk", test_dir, example_name), "--disable-selector-compression", ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "prove", "-W", format!("{}/{}/witness.json", test_dir, example_name).as_str(), "-M", format!("{}/{}/network.compiled", test_dir, example_name).as_str(), "--proof-path", &format!("{}/{}/
proof.pf", test_dir, example_name), "--pk-path", &format!("{}/{}/key.pk", test_dir, example_name), &format!("--check-mode={}", checkmode), &format!("--proof-type={}", proof_type), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "swap-proof-commitments", "--proof-path", &format!("{}/{}/proof.pf", test_dir, example_name), "--witness-path", format!("{}/{}/witness.json", test_dir, example_name).as_str(), ]) .status() .expect("failed to execute process"); assert!(status.success()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "verify", format!("--settings-path={}", settings_path).as_str(), "--proof-path", &format!("{}/{}/proof.pf", test_dir, example_name), "--vk-path", &format!("{}/{}/key.vk", test_dir, example_name), ]) .status() .expect("failed to execute process"); assert!(status.success()); let settings = std::fs::read_to_string(settings_path.clone()).expect("failed to read settings file"); let graph_settings = serde_json::from_str::<GraphSettings>(&settings) .expect("failed to parse settings file"); download_srs(1, graph_settings.run_args.commitment.into()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args([ "verify", format!("--settings-path={}", settings_path).as_str(), "--proof-path", &format!("{}/{}/proof.pf", test_dir, example_name), "--vk-path",
&format!("{}/{}/key.vk", test_dir, example_name), "--reduced-srs", ]) .status() .expect("failed to execute process"); assert!(status.success()); }
fn kzg_evm_prove_and_verify( num_inner_columns: usize, test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, ) { let anvil_url = ANVIL_URL.as_str(); prove_and_verify( test_dir, example_name.clone(), "safe", input_visibility, param_visibility, output_visibility, num_inner_columns, None, false, "single", Commitments::KZG, 2, ); let settings_path = format!("{}/{}/settings.json", test_dir, example_name); init_params(settings_path.clone().into()); let vk_arg = format!("{}/{}/key.vk", test_dir, example_name); let rpc_arg = format!("--rpc-url={}", anvil_url); let addr_path_arg = format!("--addr-path={}/{}/addr.txt", test_dir, example_name); let settings_arg = format!("--settings-path={}", settings_path); let mut args = vec!["create-evm-verifier", "--vk-path", &vk_arg, &settings_arg]; let sol_arg = format!("{}/{}/kzg.sol", test_dir, example_name); args.push("--sol-code-path"); args.push(sol_arg.as_str()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); let mut args = vec![ "deploy-evm-verifier", rpc_arg.as_str(), addr_path_arg.as_str(), ]; args.push("--sol-code-path"); args.push(sol_arg.as_str()); let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); let addr = std::fs::read_to_string(format!("{}/{}/addr.txt", test_dir, example_name
)) .expect("failed to read address file"); let deployed_addr_arg = format!("--addr-verifier={}", addr); let pf_arg = format!("{}/{}/proof.pf", test_dir, example_name); let mut args = vec![ "verify-evm", "--proof-path", pf_arg.as_str(), rpc_arg.as_str(), deployed_addr_arg.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); args[2] = PF_FAILURE; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(args) .status() .expect("failed to execute process"); assert!(!status.success()); }
fn kzg_evm_prove_and_verify_render_seperately( num_inner_columns: usize, test_dir: &str, example_name: String, input_visibility: &str, param_visibility: &str, output_visibility: &str, ) { let anvil_url = ANVIL_URL.as_str(); prove_and_verify( test_dir, example_name.clone(), "safe", input_visibility, param_visibility, output_visibility, num_inner_columns, None, false, "single", Commitments::KZG, 2, ); let settings_path = format!("{}/{}/settings.json", test_dir, example_name); init_params(settings_path.clone().into()); let vk_arg = format!("{}/{}/key.vk", test_dir, example_name); let rpc_arg = format!("--rpc-url={}", anvil_url); let addr_path_arg = format!("--addr-path={}/{}/addr.txt", test_dir, example_name); let settings_arg = format!("--settings-path={}", settings_path); let sol_arg = format!("--sol-code-path={}/{}/kzg.sol", test_dir, example_name); let args = vec![ "create-evm-verifier", "--vk-path", &vk_arg, &settings_arg, &sol_arg, "--render-vk-seperately", ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); let addr_path_arg_vk = format!("--addr-path={}/{}/addr_vk.txt", test_dir, example_name); let sol_arg_vk = format!("--sol-code-path={}/{}/vk.sol", test_dir, example_name); let args = vec![ "create-evm-vk", "--vk-path", &vk_arg, &settings_arg, &sol_arg_vk, ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args)
.status() .expect("failed to execute process"); assert!(status.success()); let args = vec![ "deploy-evm-verifier", rpc_arg.as_str(), addr_path_arg.as_str(), sol_arg.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); let addr = std::fs::read_to_string(format!("{}/{}/addr.txt", test_dir, example_name)) .expect("failed to read address file"); let deployed_addr_arg = format!("--addr-verifier={}", addr); let args = vec![ "deploy-evm-vk", rpc_arg.as_str(), addr_path_arg_vk.as_str(), sol_arg_vk.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); let addr_vk = std::fs::read_to_string(format!("{}/{}/addr_vk.txt", test_dir, example_name)) .expect("failed to read address file"); let deployed_addr_arg_vk = format!("--addr-vk={}", addr_vk); let pf_arg = format!("{}/{}/proof.pf", test_dir, example_name); let mut args = vec![ "verify-evm", "--proof-path", pf_arg.as_str(), rpc_arg.as_str(), deployed_addr_arg.as_str(), deployed_addr_arg_vk.as_str(), ]; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(&args) .status() .expect("failed to execute process"); assert!(status.success()); args[2] = PF_FAILURE; let status = Command::new(format!("{}/release/ezkl", *CARGO_TARGET_DIR)) .args(args) .status() .ex