mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-23 06:48:16 +00:00
Test vectors for ed25519 + BIP-0032 / SLIP-0010
This commit is contained in:
parent
55edf71e27
commit
295a493846
113
tests.c
113
tests.c
@ -707,6 +707,114 @@ START_TEST(test_bip32_nist_repeat)
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
// test vector 1 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
||||||
|
START_TEST(test_bip32_ed25519_vector_1)
|
||||||
|
{
|
||||||
|
HDNode node;
|
||||||
|
|
||||||
|
// init m
|
||||||
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, ED25519_NAME, &node);
|
||||||
|
|
||||||
|
// [Chain m]
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x00000000);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("90046a93de5380a72b5e45010748567d5ea02bbf6522f979e05c0d8d8ca9fffb"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("2b4be7f19ee27bbf30c667b642d5f4aa69fd169872f8fc3059c08ebae2eb19e7"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("00a4b2856bfec510abab89753fac1ac0e1112364e7d250545963f135f2a33188ed"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0']
|
||||||
|
hdnode_private_ckd_prime(&node, 0);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0xddebc675);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("8b59aa11380b624e81507a27fedda59fea6d0b779a778918a2fd3590e16e9c69"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("68e0fe46dfb67e368c75379acec591dad19df3cde26e63b93a8e704f1dade7a3"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("008c8a13df77a28f3445213a0f432fde644acaa215fc72dcdf300d5efaa85d350c"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/1']
|
||||||
|
hdnode_private_ckd_prime(&node, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x13dab143);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("a320425f77d1b5c2505a6b1b27382b37368ee640e3557c315416801243552f14"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("b1d0bad404bf35da785a64ca1ac54b2617211d2777696fbffaf208f746ae84f2"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("001932a5270f335bed617d5b935c80aedb1a35bd9fc1e31acafd5372c30f5c1187"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/1'/2']
|
||||||
|
hdnode_private_ckd_prime(&node, 2);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0xebe4cb29);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("2e69929e00b5ab250f49c3fb1c12f252de4fed2c1db88387094a0f8c4c9ccd6c"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("92a5b23c0b8a99e37d07df3fb9966917f5d06e02ddbd909c7e184371463e9fc9"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("00ae98736566d30ed0e9d2f4486a64bc95740d89c7db33f52121f8ea8f76ff0fc1"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/1'/2'/2']
|
||||||
|
hdnode_private_ckd_prime(&node, 2);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x316ec1c6);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("8f6d87f93d750e0efccda017d662a1b31a266e4a6f5993b15f5c1f07f74dd5cc"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("30d1dc7e5fc04c31219ab25a27ae00b50f6fd66622f6e9c913253d6511d1e662"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("008abae2d66361c879b900d204ad2cc4984fa2aa344dd7ddc46007329ac76c429c"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/1'/2'/2'/1000000000']
|
||||||
|
hdnode_private_ckd_prime(&node, 1000000000);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0xd6322ccd);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("68789923a0cac2cd5a29172a475fe9e0fb14cd6adb5ad98a3fa70333e7afa230"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("8f94d394a8e8fd6b1bc2f3f49f5c47e385281d5c17e65324b0f62483e37e8793"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("003c24da049451555d51a7014a37337aa4e12d41e485abccfa46b47dfb2af54b7a"), 33);
|
||||||
|
}
|
||||||
|
END_TEST
|
||||||
|
|
||||||
|
// test vector 2 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
||||||
|
START_TEST(test_bip32_ed25519_vector_2)
|
||||||
|
{
|
||||||
|
HDNode node;
|
||||||
|
int r;
|
||||||
|
|
||||||
|
// init m
|
||||||
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, ED25519_NAME, &node);
|
||||||
|
|
||||||
|
// [Chain m]
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x00000000);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("ef70a74db9c3a5af931b5fe73ed8e1a53464133654fd55e7a66f8570b8e33c3b"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("171cb88b1b3c1db25add599712e36245d75bc65a1a5c9e18d76f9f2b1eab4012"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("008fe9693f8fa62a4305a140b9764c5ee01e455963744fe18204b4fb948249308a"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0']
|
||||||
|
r = hdnode_private_ckd_prime(&node, 0);
|
||||||
|
ck_assert_int_eq(r, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x31981b50);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("0b78a3226f915c082bf118f83618a618ab6dec793752624cbeb622acb562862d"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("1559eb2bbec5790b0c65d8693e4d0875b1747f4970ae8b650486ed7470845635"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("0086fab68dcb57aa196c77c5f264f215a112c22a912c10d123b0d03c3c28ef1037"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/2147483647']
|
||||||
|
r = hdnode_private_ckd_prime(&node, 2147483647);
|
||||||
|
ck_assert_int_eq(r, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x1e9411b1);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("138f0b2551bcafeca6ff2aa88ba8ed0ed8de070841f0c4ef0165df8181eaad7f"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("ea4f5bfe8694d8bb74b7b59404632fd5968b774ed545e810de9c32a4fb4192f4"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("005ba3b9ac6e90e83effcd25ac4e58a1365a9e35a3d3ae5eb07b9e4d90bcf7506d"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/2147483647'/1']
|
||||||
|
r = hdnode_private_ckd_prime(&node, 1);
|
||||||
|
ck_assert_int_eq(r, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0xfcadf38c);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("73bd9fff1cfbde33a1b846c27085f711c0fe2d66fd32e139d3ebc28e5a4a6b90"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("3757c7577170179c7868353ada796c839135b3d30554bbb74a4b1e4a5a58505c"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("002e66aa57069c86cc18249aecf5cb5a9cebbfd6fadeab056254763874a9352b45"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/2147483647'/1'/2147483646']
|
||||||
|
r = hdnode_private_ckd_prime(&node, 2147483646);
|
||||||
|
ck_assert_int_eq(r, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0xaca70953);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("0902fe8a29f9140480a00ef244bd183e8a13288e4412d8389d140aac1794825a"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("5837736c89570de861ebc173b1086da4f505d4adb387c6a1b1342d5e4ac9ec72"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("00e33c0f7d81d843c572275f287498e8d408654fdf0d1e065b84e2e6f157aab09b"), 33);
|
||||||
|
|
||||||
|
// [Chain m/0'/2147483647'/1'/2147483646'/2']
|
||||||
|
r = hdnode_private_ckd_prime(&node, 2);
|
||||||
|
ck_assert_int_eq(r, 1);
|
||||||
|
ck_assert_int_eq(node.fingerprint, 0x422c654b);
|
||||||
|
ck_assert_mem_eq(node.chain_code, fromhex("5d70af781f3a37b829f0d060924d5e960bdc02e85423494afc0b1a41bbe196d4"), 32);
|
||||||
|
ck_assert_mem_eq(node.private_key, fromhex("551d333177df541ad876a60ea71f00447931c0a9da16f227c11ea080d7391b8d"), 32);
|
||||||
|
ck_assert_mem_eq(node.public_key, fromhex("0047150c75db263559a70d5778bf36abbab30fb061ad69f69ece61a72b0cfa4fc0"), 33);
|
||||||
|
}
|
||||||
|
END_TEST
|
||||||
|
|
||||||
#define test_deterministic(KEY, MSG, K) do { \
|
#define test_deterministic(KEY, MSG, K) do { \
|
||||||
sha256_Raw((uint8_t *)MSG, strlen(MSG), buf); \
|
sha256_Raw((uint8_t *)MSG, strlen(MSG), buf); \
|
||||||
res = generate_k_rfc6979(curve, &k, fromhex(KEY), buf); \
|
res = generate_k_rfc6979(curve, &k, fromhex(KEY), buf); \
|
||||||
@ -1632,6 +1740,11 @@ Suite *test_suite(void)
|
|||||||
tcase_add_test(tc, test_bip32_nist_repeat);
|
tcase_add_test(tc, test_bip32_nist_repeat);
|
||||||
suite_add_tcase(s, tc);
|
suite_add_tcase(s, tc);
|
||||||
|
|
||||||
|
tc = tcase_create("bip32-ed25519");
|
||||||
|
tcase_add_test(tc, test_bip32_ed25519_vector_1);
|
||||||
|
tcase_add_test(tc, test_bip32_ed25519_vector_2);
|
||||||
|
suite_add_tcase(s, tc);
|
||||||
|
|
||||||
tc = tcase_create("rfc6979");
|
tc = tcase_create("rfc6979");
|
||||||
tcase_add_test(tc, test_rfc6979);
|
tcase_add_test(tc, test_rfc6979);
|
||||||
suite_add_tcase(s, tc);
|
suite_add_tcase(s, tc);
|
||||||
|
Loading…
Reference in New Issue
Block a user