mirror of https://github.com/vacp2p/zerokit.git
393 lines
15 KiB
Rust
393 lines
15 KiB
Rust
#[cfg(test)]
|
|
mod test {
|
|
use ark_ff::BigInt;
|
|
use rln::circuit::{
|
|
circom_from_folder, vk_from_folder, zkey_from_folder, Fr, TEST_RESOURCES_FOLDER,
|
|
TEST_TREE_HEIGHT,
|
|
};
|
|
use rln::hashers::{hash_to_field, poseidon_hash};
|
|
use rln::poseidon_tree::PoseidonTree;
|
|
use rln::protocol::*;
|
|
use rln::utils::str_to_fr;
|
|
use utils::{ZerokitMerkleProof, ZerokitMerkleTree};
|
|
|
|
type ConfigOf<T> = <T as ZerokitMerkleTree>::Config;
|
|
|
|
// Input generated with https://github.com/oskarth/zk-kit/commit/b6a872f7160c7c14e10a0ea40acab99cbb23c9a8
|
|
const WITNESS_JSON_20: &str = r#"
|
|
{
|
|
"externalNullifier": "21074405743803627666274838159589343934394162804826017440941339048886754734203",
|
|
"identityPathIndex": [
|
|
1,
|
|
1,
|
|
1,
|
|
0,
|
|
1,
|
|
0,
|
|
1,
|
|
0,
|
|
1,
|
|
0,
|
|
1,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
1,
|
|
1,
|
|
1,
|
|
0
|
|
],
|
|
"identitySecret": "2301650865650889795878889082892690584512243988708213561328369865554257051708",
|
|
"messageId": "1",
|
|
"pathElements": [
|
|
"14082964758224722211945379872337797638951236517417253447686770846170014042825",
|
|
"6628418579821163687428454604867534487917867918886059133241840211975892987309",
|
|
"12745863228198753394445659605634840709296716381893463421165313830643281758511",
|
|
"56118267389743063830320351452083247040583061493621478539311100137113963555",
|
|
"3648731943306935051357703221473866306053186513730785325303257057776816073765",
|
|
"10548621390442503192989374711060717107954536293658152583621924810330521179016",
|
|
"11741160669079729961275351458682156164905457324981803454515784688429276743441",
|
|
"17165464309215350864730477596846156251863702878546777829650812432906796008534",
|
|
"18947162586829418653666557598416458949428989734998924978331450666032720066913",
|
|
"8809427088917589399897132358419395928548406347152047718919154153577297139202",
|
|
"6261460226929242970747566981077801929281729646713842579109271945192964422300",
|
|
"13871468675790284383809887052382100311103716176061564908030808887079542722597",
|
|
"10413964486611723004584705484327518190402370933255450052832412709168190985805",
|
|
"3978387560092078849178760154060822400741873818692524912249877867958842934383",
|
|
"14014915591348694328771517896715085647041518432952027841088176673715002508448",
|
|
"17680675606519345547327984724173632294904524423937145835611954334756161077843",
|
|
"17107175244885276119916848057745382329169223109661217238296871427531065458152",
|
|
"18326186549441826262593357123467931475982067066825042001499291800252145875109",
|
|
"7043961192177345916232559778383741091053414803377017307095275172896944935996",
|
|
"2807630271073553218355393059254209097448243975722083008310815929736065268921"
|
|
],
|
|
"userMessageLimit": "100",
|
|
"x": "20645213238265527935869146898028115621427162613172918400241870500502509785943"
|
|
}
|
|
"#;
|
|
|
|
#[test]
|
|
// We test Merkle tree generation, proofs and verification
|
|
fn test_merkle_proof() {
|
|
let tree_height = TEST_TREE_HEIGHT;
|
|
let leaf_index = 3;
|
|
|
|
// generate identity
|
|
let identity_secret_hash = hash_to_field(b"test-merkle-proof");
|
|
let id_commitment = poseidon_hash(&[identity_secret_hash]);
|
|
let rate_commitment = poseidon_hash(&[id_commitment, 100.into()]);
|
|
|
|
// generate merkle tree
|
|
let default_leaf = Fr::from(0);
|
|
let mut tree = PoseidonTree::new(
|
|
tree_height,
|
|
default_leaf,
|
|
ConfigOf::<PoseidonTree>::default(),
|
|
)
|
|
.unwrap();
|
|
tree.set(leaf_index, rate_commitment.into()).unwrap();
|
|
|
|
// We check correct computation of the root
|
|
let root = tree.root();
|
|
|
|
if TEST_TREE_HEIGHT == 20 || TEST_TREE_HEIGHT == 32 {
|
|
assert_eq!(
|
|
root,
|
|
BigInt([
|
|
4939322235247991215,
|
|
5110804094006647505,
|
|
4427606543677101242,
|
|
910933464535675827
|
|
])
|
|
.into()
|
|
);
|
|
}
|
|
|
|
let merkle_proof = tree.proof(leaf_index).expect("proof should exist");
|
|
let path_elements = merkle_proof.get_path_elements();
|
|
let identity_path_index = merkle_proof.get_path_index();
|
|
|
|
// We check correct computation of the path and indexes
|
|
// These values refers to TEST_TREE_HEIGHT == 16
|
|
let mut expected_path_elements = vec![
|
|
str_to_fr(
|
|
"0x0000000000000000000000000000000000000000000000000000000000000000",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2098f5fb9e239eab3ceac3f27b81e481dc3124d55ffed523a839ee8446b64864",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x1069673dcdb12263df301a6ff584a7ec261a44cb9dc68df067a4774460b1f1e1",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x18f43331537ee2af2e3d758d50f72106467c6eea50371dd528d57eb2b856d238",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x07f9d837cb17b0d36320ffe93ba52345f1b728571a568265caac97559dbc952a",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2b94cf5e8746b3f5c9631f4c5df32907a699c58c94b2ad4d7b5cec1639183f55",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2dee93c5a666459646ea7d22cca9e1bcfed71e6951b953611d11dda32ea09d78",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x078295e5a22b84e982cf601eb639597b8b0515a88cb5ac7fa8a4aabe3c87349d",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2fa5e5f18f6027a6501bec864564472a616b2e274a41211a444cbe3a99f3cc61",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x0e884376d0d8fd21ecb780389e941f66e45e7acce3e228ab3e2156a614fcd747",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x1b7201da72494f1e28717ad1a52eb469f95892f957713533de6175e5da190af2",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x1f8d8822725e36385200c0b201249819a6e6e1e4650808b5bebc6bface7d7636",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2c5d82f66c914bafb9701589ba8cfcfb6162b0a12acf88a8d0879a0471b5f85a",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x14c54148a0940bb820957f5adf3fa1134ef5c4aaa113f4646458f270e0bfbfd0",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x190d33b12f986f961e10c0ee44d8b9af11be25588cad89d416118e4bf4ebe80c",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
];
|
|
|
|
let mut expected_identity_path_index: Vec<u8> =
|
|
vec![1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0];
|
|
|
|
// We add the remaining elements for the case TEST_TREE_HEIGHT = 20
|
|
if TEST_TREE_HEIGHT == 20 {
|
|
expected_path_elements.append(&mut vec![
|
|
str_to_fr(
|
|
"0x22f98aa9ce704152ac17354914ad73ed1167ae6596af510aa5b3649325e06c92",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2a7c7c9b6ce5880b9f6f228d72bf6a575a526f29c66ecceef8b753d38bba7323",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x2e8186e558698ec1c67af9c14d463ffc470043c9c2988b954d75dd643f36b992",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
str_to_fr(
|
|
"0x0f57c5571e9a4eab49e2c8cf050dae948aef6ead647392273546249d1c1ff10f",
|
|
16,
|
|
)
|
|
.unwrap(),
|
|
]);
|
|
expected_identity_path_index.append(&mut vec![0, 0, 0, 0]);
|
|
}
|
|
|
|
if TEST_TREE_HEIGHT == 20 {
|
|
expected_path_elements.append(&mut vec![str_to_fr(
|
|
"0x1830ee67b5fb554ad5f63d4388800e1cfe78e310697d46e43c9ce36134f72cca",
|
|
16,
|
|
)
|
|
.unwrap()]);
|
|
expected_identity_path_index.append(&mut vec![0]);
|
|
}
|
|
|
|
assert_eq!(path_elements, expected_path_elements);
|
|
assert_eq!(identity_path_index, expected_identity_path_index);
|
|
|
|
// We check correct verification of the proof
|
|
assert!(tree.verify(&rate_commitment, &merkle_proof).unwrap());
|
|
}
|
|
|
|
#[test]
|
|
// We test a RLN proof generation and verification
|
|
fn test_witness_from_json() {
|
|
// We generate all relevant keys
|
|
let proving_key = zkey_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
let verification_key = vk_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
let builder = circom_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
|
|
// We compute witness from the json input example
|
|
let witness_json = WITNESS_JSON_20;
|
|
let rln_witness = rln_witness_from_json(witness_json).unwrap();
|
|
|
|
// Let's generate a zkSNARK proof
|
|
let proof = generate_proof(builder, &proving_key, &rln_witness).unwrap();
|
|
let proof_values = proof_values_from_witness(&rln_witness).unwrap();
|
|
|
|
// Let's verify the proof
|
|
let verified = verify_proof(&verification_key, &proof, &proof_values);
|
|
|
|
assert!(verified.unwrap());
|
|
}
|
|
|
|
#[test]
|
|
// We test a RLN proof generation and verification
|
|
fn test_end_to_end() {
|
|
let tree_height = TEST_TREE_HEIGHT;
|
|
let leaf_index = 3;
|
|
|
|
// Generate identity pair
|
|
let (identity_secret_hash, id_commitment) = keygen();
|
|
let user_message_limit = Fr::from(100);
|
|
let rate_commitment = poseidon_hash(&[id_commitment, user_message_limit]);
|
|
|
|
//// generate merkle tree
|
|
let default_leaf = Fr::from(0);
|
|
let mut tree = PoseidonTree::new(
|
|
tree_height,
|
|
default_leaf,
|
|
ConfigOf::<PoseidonTree>::default(),
|
|
)
|
|
.unwrap();
|
|
tree.set(leaf_index, rate_commitment.into()).unwrap();
|
|
|
|
let merkle_proof = tree.proof(leaf_index).expect("proof should exist");
|
|
|
|
let signal = b"hey hey";
|
|
let x = hash_to_field(signal);
|
|
|
|
// We set the remaining values to random ones
|
|
let epoch = hash_to_field(b"test-epoch");
|
|
let rln_identifier = hash_to_field(b"test-rln-identifier");
|
|
let external_nullifier = poseidon_hash(&[epoch, rln_identifier]);
|
|
|
|
let rln_witness: RLNWitnessInput = rln_witness_from_values(
|
|
identity_secret_hash,
|
|
&merkle_proof,
|
|
x,
|
|
external_nullifier,
|
|
user_message_limit,
|
|
Fr::from(1),
|
|
)
|
|
.unwrap();
|
|
|
|
// We generate all relevant keys
|
|
let proving_key = zkey_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
let verification_key = vk_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
let builder = circom_from_folder(TEST_RESOURCES_FOLDER).unwrap();
|
|
|
|
// Let's generate a zkSNARK proof
|
|
let proof = generate_proof(builder, &proving_key, &rln_witness).unwrap();
|
|
|
|
let proof_values = proof_values_from_witness(&rln_witness).unwrap();
|
|
|
|
// Let's verify the proof
|
|
let success = verify_proof(&verification_key, &proof, &proof_values).unwrap();
|
|
|
|
assert!(success);
|
|
}
|
|
|
|
#[test]
|
|
fn test_witness_serialization() {
|
|
// We test witness serialization
|
|
let witness_json: &str = WITNESS_JSON_20;
|
|
|
|
let rln_witness = rln_witness_from_json(witness_json).unwrap();
|
|
|
|
let ser = serialize_witness(&rln_witness).unwrap();
|
|
let (deser, _) = deserialize_witness(&ser).unwrap();
|
|
assert_eq!(rln_witness, deser);
|
|
|
|
// We test Proof values serialization
|
|
let proof_values = proof_values_from_witness(&rln_witness).unwrap();
|
|
let ser = serialize_proof_values(&proof_values);
|
|
let (deser, _) = deserialize_proof_values(&ser);
|
|
assert_eq!(proof_values, deser);
|
|
}
|
|
|
|
#[test]
|
|
// Tests seeded keygen
|
|
// Note that hardcoded values are only valid for Bn254
|
|
fn test_seeded_keygen() {
|
|
// Generate identity pair using a seed phrase
|
|
let seed_phrase: &str = "A seed phrase example";
|
|
let (identity_secret_hash, id_commitment) = seeded_keygen(seed_phrase.as_bytes());
|
|
|
|
// We check against expected values
|
|
let expected_identity_secret_hash_seed_phrase = str_to_fr(
|
|
"0x20df38f3f00496f19fe7c6535492543b21798ed7cb91aebe4af8012db884eda3",
|
|
16,
|
|
)
|
|
.unwrap();
|
|
let expected_id_commitment_seed_phrase = str_to_fr(
|
|
"0x1223a78a5d66043a7f9863e14507dc80720a5602b2a894923e5b5147d5a9c325",
|
|
16,
|
|
)
|
|
.unwrap();
|
|
|
|
assert_eq!(
|
|
identity_secret_hash,
|
|
expected_identity_secret_hash_seed_phrase
|
|
);
|
|
assert_eq!(id_commitment, expected_id_commitment_seed_phrase);
|
|
|
|
// Generate identity pair using an byte array
|
|
let seed_bytes: &[u8] = &[0, 1, 2, 3, 4, 5, 6, 7, 8, 9];
|
|
let (identity_secret_hash, id_commitment) = seeded_keygen(seed_bytes);
|
|
|
|
// We check against expected values
|
|
let expected_identity_secret_hash_seed_bytes = str_to_fr(
|
|
"0x766ce6c7e7a01bdf5b3f257616f603918c30946fa23480f2859c597817e6716",
|
|
16,
|
|
)
|
|
.unwrap();
|
|
let expected_id_commitment_seed_bytes = str_to_fr(
|
|
"0xbf16d2b5c0d6f9d9d561e05bfca16a81b4b873bb063508fae360d8c74cef51f",
|
|
16,
|
|
)
|
|
.unwrap();
|
|
|
|
assert_eq!(
|
|
identity_secret_hash,
|
|
expected_identity_secret_hash_seed_bytes
|
|
);
|
|
assert_eq!(id_commitment, expected_id_commitment_seed_bytes);
|
|
|
|
// We check again if the identity pair generated with the same seed phrase corresponds to the previously generated one
|
|
let (identity_secret_hash, id_commitment) = seeded_keygen(seed_phrase.as_bytes());
|
|
|
|
assert_eq!(
|
|
identity_secret_hash,
|
|
expected_identity_secret_hash_seed_phrase
|
|
);
|
|
assert_eq!(id_commitment, expected_id_commitment_seed_phrase);
|
|
}
|
|
}
|