mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 13:07:09 +00:00
* feat: add docs and CI workflow for publishing to onsonr.dev * (refactor): Move hway,motr executables to their own repos * feat: simplify devnet and testnet configurations * refactor: update import path for didcrypto package * docs(networks): Add README with project overview, architecture, and community links * refactor: Move network configurations to deploy directory * build: update golang version to 1.23 * refactor: move logger interface to appropriate package * refactor: Move devnet configuration to networks/devnet * chore: improve release process with date variable * (chore): Move Crypto Library * refactor: improve code structure and readability in DID module * feat: integrate Trunk CI checks * ci: optimize CI workflow by removing redundant build jobs --------- Co-authored-by: Darp Alakun <i@prad.nu>
88 lines
2.6 KiB
Go
Executable File
88 lines
2.6 KiB
Go
Executable File
package bulletproof
|
|
|
|
import (
|
|
crand "crypto/rand"
|
|
"testing"
|
|
|
|
"github.com/gtank/merlin"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/onsonr/sonr/crypto/core/curves"
|
|
)
|
|
|
|
func TestRangeVerifyHappyPath(t *testing.T) {
|
|
curve := curves.ED25519()
|
|
n := 256
|
|
prover, err := NewRangeProver(n, []byte("rangeDomain"), []byte("ippDomain"), *curve)
|
|
require.NoError(t, err)
|
|
v := curve.Scalar.Random(crand.Reader)
|
|
gamma := curve.Scalar.Random(crand.Reader)
|
|
g := curve.Point.Random(crand.Reader)
|
|
h := curve.Point.Random(crand.Reader)
|
|
u := curve.Point.Random(crand.Reader)
|
|
proofGenerators := RangeProofGenerators{
|
|
g: g,
|
|
h: h,
|
|
u: u,
|
|
}
|
|
transcript := merlin.NewTranscript("test")
|
|
proof, err := prover.Prove(v, gamma, n, proofGenerators, transcript)
|
|
require.NoError(t, err)
|
|
|
|
verifier, err := NewRangeVerifier(n, []byte("rangeDomain"), []byte("ippDomain"), *curve)
|
|
require.NoError(t, err)
|
|
transcriptVerifier := merlin.NewTranscript("test")
|
|
capV := getcapV(v, gamma, g, h)
|
|
verified, err := verifier.Verify(proof, capV, proofGenerators, n, transcriptVerifier)
|
|
require.NoError(t, err)
|
|
require.True(t, verified)
|
|
}
|
|
|
|
func TestRangeVerifyNotInRange(t *testing.T) {
|
|
curve := curves.ED25519()
|
|
n := 2
|
|
prover, err := NewRangeProver(n, []byte("rangeDomain"), []byte("ippDomain"), *curve)
|
|
require.NoError(t, err)
|
|
v := curve.Scalar.Random(crand.Reader)
|
|
gamma := curve.Scalar.Random(crand.Reader)
|
|
g := curve.Point.Random(crand.Reader)
|
|
h := curve.Point.Random(crand.Reader)
|
|
u := curve.Point.Random(crand.Reader)
|
|
proofGenerators := RangeProofGenerators{
|
|
g: g,
|
|
h: h,
|
|
u: u,
|
|
}
|
|
transcript := merlin.NewTranscript("test")
|
|
_, err = prover.Prove(v, gamma, n, proofGenerators, transcript)
|
|
require.Error(t, err)
|
|
}
|
|
|
|
func TestRangeVerifyNonRandom(t *testing.T) {
|
|
curve := curves.ED25519()
|
|
n := 2
|
|
prover, err := NewRangeProver(n, []byte("rangeDomain"), []byte("ippDomain"), *curve)
|
|
require.NoError(t, err)
|
|
v := curve.Scalar.One()
|
|
gamma := curve.Scalar.Random(crand.Reader)
|
|
g := curve.Point.Random(crand.Reader)
|
|
h := curve.Point.Random(crand.Reader)
|
|
u := curve.Point.Random(crand.Reader)
|
|
proofGenerators := RangeProofGenerators{
|
|
g: g,
|
|
h: h,
|
|
u: u,
|
|
}
|
|
transcript := merlin.NewTranscript("test")
|
|
proof, err := prover.Prove(v, gamma, n, proofGenerators, transcript)
|
|
require.NoError(t, err)
|
|
|
|
verifier, err := NewRangeVerifier(n, []byte("rangeDomain"), []byte("ippDomain"), *curve)
|
|
require.NoError(t, err)
|
|
transcriptVerifier := merlin.NewTranscript("test")
|
|
capV := getcapV(v, gamma, g, h)
|
|
verified, err := verifier.Verify(proof, capV, proofGenerators, n, transcriptVerifier)
|
|
require.NoError(t, err)
|
|
require.True(t, verified)
|
|
}
|