mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-18 05:28:40 +00:00
3764 lines
195 KiB
C
3764 lines
195 KiB
C
/**
|
|
* Copyright (c) 2013-2014 Tomas Dzetkulic
|
|
* Copyright (c) 2013-2014 Pavol Rusnak
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the "Software"),
|
|
* to deal in the Software without restriction, including without limitation
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
* Software is furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included
|
|
* in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
* OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES
|
|
* OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
|
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
|
* OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <inttypes.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
|
|
#include <check.h>
|
|
#include "check_mem.h"
|
|
|
|
#include <valgrind/valgrind.h>
|
|
#include <valgrind/memcheck.h>
|
|
|
|
#include "options.h"
|
|
|
|
#include "aes.h"
|
|
#include "bignum.h"
|
|
#include "base32.h"
|
|
#include "base58.h"
|
|
#include "bip32.h"
|
|
#include "bip39.h"
|
|
#include "ecdsa.h"
|
|
#include "pbkdf2.h"
|
|
#include "rand.h"
|
|
#include "sha2.h"
|
|
#include "sha3.h"
|
|
#include "blake2b.h"
|
|
#include "blake2s.h"
|
|
#include "curves.h"
|
|
#include "secp256k1.h"
|
|
#include "nist256p1.h"
|
|
#include "ed25519.h"
|
|
#include "ed25519-keccak.h"
|
|
#include "script.h"
|
|
#include "rfc6979.h"
|
|
#include "address.h"
|
|
#include "rc4.h"
|
|
#include "nem.h"
|
|
|
|
/*
|
|
* This is a clever trick to make Valgrind's Memcheck verify code
|
|
* is constant-time with respect to secret data.
|
|
*/
|
|
|
|
/* Call after secret data is written, before first use */
|
|
#define MARK_SECRET_DATA(addr, len) VALGRIND_MAKE_MEM_UNDEFINED(addr, len)
|
|
/* Call before secret data is freed or to mark non-secret data (public keys or signatures) */
|
|
#define UNMARK_SECRET_DATA(addr, len) VALGRIND_MAKE_MEM_DEFINED (addr, len)
|
|
|
|
#define FROMHEX_MAXLEN 512
|
|
|
|
#define VERSION_PUBLIC 0x0488b21e
|
|
#define VERSION_PRIVATE 0x0488ade4
|
|
|
|
const uint8_t *fromhex(const char *str)
|
|
{
|
|
static uint8_t buf[FROMHEX_MAXLEN];
|
|
size_t len = strlen(str) / 2;
|
|
if (len > FROMHEX_MAXLEN) len = FROMHEX_MAXLEN;
|
|
for (size_t i = 0; i < len; i++) {
|
|
uint8_t c = 0;
|
|
if (str[i * 2] >= '0' && str[i*2] <= '9') c += (str[i * 2] - '0') << 4;
|
|
if ((str[i * 2] & ~0x20) >= 'A' && (str[i*2] & ~0x20) <= 'F') c += (10 + (str[i * 2] & ~0x20) - 'A') << 4;
|
|
if (str[i * 2 + 1] >= '0' && str[i * 2 + 1] <= '9') c += (str[i * 2 + 1] - '0');
|
|
if ((str[i * 2 + 1] & ~0x20) >= 'A' && (str[i * 2 + 1] & ~0x20) <= 'F') c += (10 + (str[i * 2 + 1] & ~0x20) - 'A');
|
|
buf[i] = c;
|
|
}
|
|
return buf;
|
|
}
|
|
|
|
void nem_private_key(const char *reversed_hex, ed25519_secret_key private_key) {
|
|
const uint8_t *reversed_key = fromhex(reversed_hex);
|
|
for (size_t j = 0; j < sizeof(ed25519_secret_key); j++) {
|
|
private_key[j] = reversed_key[sizeof(ed25519_secret_key) - j - 1];
|
|
}
|
|
}
|
|
|
|
START_TEST(test_bignum_read_be)
|
|
{
|
|
bignum256 a;
|
|
uint8_t input[32];
|
|
|
|
memcpy(input, fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), 32);
|
|
|
|
bn_read_be(input, &a);
|
|
|
|
bignum256 b = { { 0x286d8bd5, 0x380c7c17, 0x3c6a2ec1, 0x2d787ef5, 0x14437cd3, 0x25a043f8, 0x1dd5263f, 0x33a162c3, 0x0000c55e } };
|
|
|
|
for (int i = 0; i < 9; i++) {
|
|
ck_assert_int_eq(a.val[i], b.val[i]);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_write_be)
|
|
{
|
|
bignum256 a = { { 0x286d8bd5, 0x380c7c17, 0x3c6a2ec1, 0x2d787ef5, 0x14437cd3, 0x25a043f8, 0x1dd5263f, 0x33a162c3, 0x0000c55e } };
|
|
uint8_t tmp[32];
|
|
|
|
bn_write_be(&a, tmp);
|
|
|
|
ck_assert_mem_eq(tmp, fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), 32);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_is_equal)
|
|
{
|
|
bignum256 a = { { 0x286d8bd5, 0x380c7c17, 0x3c6a2ec1, 0x2d787ef5, 0x14437cd3, 0x25a043f8, 0x1dd5263f, 0x33a162c3, 0x0000c55e } };
|
|
bignum256 b = { { 0x286d8bd5, 0x380c7c17, 0x3c6a2ec1, 0x2d787ef5, 0x14437cd3, 0x25a043f8, 0x1dd5263f, 0x33a162c3, 0x0000c55e } };
|
|
bignum256 c = { { 0, } };
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
ck_assert_int_eq(bn_is_equal(&c, &c), 1);
|
|
ck_assert_int_eq(bn_is_equal(&a, &c), 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_zero)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
bn_zero(&b);
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_is_zero)
|
|
{
|
|
bignum256 a;
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
ck_assert_int_eq(bn_is_zero(&a), 1);
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000001"), &a);
|
|
ck_assert_int_eq(bn_is_zero(&a), 0);
|
|
|
|
bn_read_be(fromhex("1000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
ck_assert_int_eq(bn_is_zero(&a), 0);
|
|
|
|
bn_read_be(fromhex("f000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
ck_assert_int_eq(bn_is_zero(&a), 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_one)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000001"), &a);
|
|
bn_one(&b);
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_read_le)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), &a);
|
|
bn_read_le(fromhex("d58b6de8051f031eeca2c6d7fbe1b5d37c4314fe1068f96352dd0d8b85ce5ec5"), &b);
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_write_le)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
uint8_t tmp[32];
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), &a);
|
|
bn_write_le(&a, tmp);
|
|
|
|
bn_read_le(tmp, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
bn_read_be(fromhex("d58b6de8051f031eeca2c6d7fbe1b5d37c4314fe1068f96352dd0d8b85ce5ec5"), &a);
|
|
bn_read_be(tmp, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_read_uint32)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
// lowest 30 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000000000003fffffff"), &a);
|
|
bn_read_uint32(0x3fffffff, &b);
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
// bit 31 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000040000000"), &a);
|
|
bn_read_uint32(0x40000000, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_read_uint64)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
// lowest 30 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000000000003fffffff"), &a);
|
|
bn_read_uint64(0x3fffffff, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
// bit 31 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000040000000"), &a);
|
|
bn_read_uint64(0x40000000, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
// bit 33 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000100000000"), &a);
|
|
bn_read_uint64(0x100000000LL, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
// bit 61 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000002000000000000000"), &a);
|
|
bn_read_uint64(0x2000000000000000LL, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
|
|
// all 64 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000ffffffffffffffff"), &a);
|
|
bn_read_uint64(0xffffffffffffffffLL, &b);
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_write_uint32)
|
|
{
|
|
bignum256 a;
|
|
|
|
// lowest 30 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000000000003fffffff"), &a);
|
|
ck_assert_int_eq(bn_write_uint32(&a), 0x3fffffff);
|
|
|
|
// bit 31 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000040000000"), &a);
|
|
ck_assert_int_eq(bn_write_uint32(&a), 0x40000000);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_write_uint64)
|
|
{
|
|
bignum256 a;
|
|
|
|
// lowest 30 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000000000003fffffff"), &a);
|
|
ck_assert_int_eq(bn_write_uint64(&a), 0x3fffffff);
|
|
|
|
// bit 31 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000040000000"), &a);
|
|
ck_assert_int_eq(bn_write_uint64(&a), 0x40000000);
|
|
|
|
// bit 33 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000100000000"), &a);
|
|
ck_assert_int_eq(bn_write_uint64(&a), 0x100000000LL);
|
|
|
|
// bit 61 set
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000002000000000000000"), &a);
|
|
ck_assert_int_eq(bn_write_uint64(&a), 0x2000000000000000LL);
|
|
|
|
// all 64 bits set
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000ffffffffffffffff"), &a);
|
|
ck_assert_int_eq(bn_write_uint64(&a), 0xffffffffffffffffLL);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_copy)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), &a);
|
|
bn_copy(&a, &b);
|
|
|
|
ck_assert_int_eq(bn_is_equal(&a, &b), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_is_even)
|
|
{
|
|
bignum256 a;
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), &a);
|
|
ck_assert_int_eq(bn_is_even(&a), 0);
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd2"), &a);
|
|
ck_assert_int_eq(bn_is_even(&a), 1);
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd0"), &a);
|
|
ck_assert_int_eq(bn_is_even(&a), 1);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_is_odd)
|
|
{
|
|
bignum256 a;
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd5"), &a);
|
|
ck_assert_int_eq(bn_is_odd(&a), 1);
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd2"), &a);
|
|
ck_assert_int_eq(bn_is_odd(&a), 0);
|
|
|
|
bn_read_be(fromhex("c55ece858b0ddd5263f96810fe14437cd3b5e1fbd7c6a2ec1e031f05e86d8bd0"), &a);
|
|
ck_assert_int_eq(bn_is_odd(&a), 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_is_less)
|
|
{
|
|
bignum256 a;
|
|
bignum256 b;
|
|
|
|
bn_read_uint32(0x1234, &a);
|
|
bn_read_uint32(0x8765, &b);
|
|
|
|
ck_assert_int_eq(bn_is_less(&a, &b), 1);
|
|
ck_assert_int_eq(bn_is_less(&b, &a), 0);
|
|
|
|
bn_zero(&a);
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &b);
|
|
|
|
ck_assert_int_eq(bn_is_less(&a, &b), 1);
|
|
ck_assert_int_eq(bn_is_less(&b, &a), 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_bitcount)
|
|
{
|
|
bignum256 a, b;
|
|
|
|
bn_zero(&a);
|
|
ck_assert_int_eq(bn_bitcount(&a), 0);
|
|
|
|
bn_one(&a);
|
|
ck_assert_int_eq(bn_bitcount(&a), 1);
|
|
|
|
// test for 10000 and 11111 when i=5
|
|
for (int i = 2; i <= 256; i++) {
|
|
bn_one(&a);
|
|
bn_one(&b);
|
|
for (int j = 2; j <= i; j++) {
|
|
bn_lshift(&a);
|
|
bn_lshift(&b);
|
|
bn_addi(&b, 1);
|
|
}
|
|
ck_assert_int_eq(bn_bitcount(&a), i);
|
|
ck_assert_int_eq(bn_bitcount(&b), i);
|
|
}
|
|
|
|
bn_read_uint32(0x3fffffff, &a);
|
|
ck_assert_int_eq(bn_bitcount(&a), 30);
|
|
|
|
bn_read_uint32(0xffffffff, &a);
|
|
ck_assert_int_eq(bn_bitcount(&a), 32);
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
ck_assert_int_eq(bn_bitcount(&a), 256);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_digitcount)
|
|
{
|
|
bignum256 a;
|
|
|
|
bn_zero(&a);
|
|
ck_assert_int_eq(bn_digitcount(&a), 1);
|
|
|
|
// test for (10^i) and (10^i) - 1
|
|
uint64_t m = 1;
|
|
for (int i = 0; i <= 19; i++, m *= 10) {
|
|
bn_read_uint64(m, &a);
|
|
ck_assert_int_eq(bn_digitcount(&a), i + 1);
|
|
|
|
uint64_t n = m - 1;
|
|
bn_read_uint64(n, &a);
|
|
ck_assert_int_eq(bn_digitcount(&a), n == 0 ? 1 : i);
|
|
}
|
|
|
|
bn_read_uint32(0x3fffffff, &a);
|
|
ck_assert_int_eq(bn_digitcount(&a), 10);
|
|
|
|
bn_read_uint32(0xffffffff, &a);
|
|
ck_assert_int_eq(bn_digitcount(&a), 10);
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
ck_assert_int_eq(bn_digitcount(&a), 78);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_format_uint64) {
|
|
char buf[128], str[128];
|
|
int r;
|
|
// test for (10^i) and (10^i) - 1
|
|
uint64_t m = 1;
|
|
for (int i = 0; i <= 19; i++, m *= 10) {
|
|
sprintf(str, "%" PRIu64, m);
|
|
r = bn_format_uint64(m, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, strlen(str));
|
|
ck_assert_str_eq(buf, str);
|
|
|
|
uint64_t n = m - 1;
|
|
sprintf(str, "%" PRIu64, n);
|
|
r = bn_format_uint64(n, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, strlen(str));
|
|
ck_assert_str_eq(buf, str);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bignum_format) {
|
|
bignum256 a;
|
|
char buf[128];
|
|
int r;
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 20, 0, true, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 22);
|
|
ck_assert_str_eq(buf, "0.00000000000000000000");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 5, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, -5, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, "", "", 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, "SFFX", 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1 + 4);
|
|
ck_assert_str_eq(buf, "0SFFX");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, "PRFX", NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 4 + 1);
|
|
ck_assert_str_eq(buf, "PRFX0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, "PRFX", "SFFX", 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 4 + 1 + 4);
|
|
ck_assert_str_eq(buf, "PRFX0SFFX");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 18, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "0.0");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000001"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "1");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000001"), &a);
|
|
r = bn_format(&a, NULL, NULL, 6, 6, true, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 8);
|
|
ck_assert_str_eq(buf, "1.000000");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000002"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "2");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000005"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "5");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000009"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_str_eq(buf, "9");
|
|
|
|
bn_read_be(fromhex("000000000000000000000000000000000000000000000000000000000000000a"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 2);
|
|
ck_assert_str_eq(buf, "10");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000014"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 2);
|
|
ck_assert_str_eq(buf, "20");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000032"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 2);
|
|
ck_assert_str_eq(buf, "50");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000063"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 2);
|
|
ck_assert_str_eq(buf, "99");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000000064"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "100");
|
|
|
|
bn_read_be(fromhex("00000000000000000000000000000000000000000000000000000000000000c8"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "200");
|
|
|
|
bn_read_be(fromhex("00000000000000000000000000000000000000000000000000000000000001f4"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "500");
|
|
|
|
bn_read_be(fromhex("00000000000000000000000000000000000000000000000000000000000003e7"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "999");
|
|
|
|
bn_read_be(fromhex("00000000000000000000000000000000000000000000000000000000000003e8"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 4);
|
|
ck_assert_str_eq(buf, "1000");
|
|
|
|
bn_read_be(fromhex("0000000000000000000000000000000000000000000000000000000000989680"), &a);
|
|
r = bn_format(&a, NULL, NULL, 7, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 3);
|
|
ck_assert_str_eq(buf, "1.0");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 78);
|
|
ck_assert_str_eq(buf, "115792089237316195423570985008687907853269984665640564039457584007913129639935");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 1, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 79);
|
|
ck_assert_str_eq(buf, "11579208923731619542357098500868790785326998466564056403945758400791312963993.5");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 2, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 79);
|
|
ck_assert_str_eq(buf, "1157920892373161954235709850086879078532699846656405640394575840079131296399.35");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 8, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 79);
|
|
ck_assert_str_eq(buf, "1157920892373161954235709850086879078532699846656405640394575840079131.29639935");
|
|
|
|
bn_read_be(fromhex("fffffffffffffffffffffffffffffffffffffffffffffffffffffffffe3bbb00"), &a);
|
|
r = bn_format(&a, NULL, NULL, 8, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 72);
|
|
ck_assert_str_eq(buf, "1157920892373161954235709850086879078532699846656405640394575840079131.0");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 18, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 79);
|
|
ck_assert_str_eq(buf, "115792089237316195423570985008687907853269984665640564039457.584007913129639935");
|
|
|
|
bn_read_be(fromhex("fffffffffffffffffffffffffffffffffffffffffffffffff7e52fe5afe40000"), &a);
|
|
r = bn_format(&a, NULL, NULL, 18, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 62);
|
|
ck_assert_str_eq(buf, "115792089237316195423570985008687907853269984665640564039457.0");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 78, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 80);
|
|
ck_assert_str_eq(buf, "0.115792089237316195423570985008687907853269984665640564039457584007913129639935");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, NULL, NULL, 0, 10, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 88);
|
|
ck_assert_str_eq(buf, "1157920892373161954235709850086879078532699846656405640394575840079131296399350000000000");
|
|
|
|
bn_read_be(fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), &a);
|
|
r = bn_format(&a, "quite a long prefix", "even longer suffix", 60, 0, false, buf, sizeof(buf));
|
|
ck_assert_int_eq(r, 116);
|
|
ck_assert_str_eq(buf, "quite a long prefix115792089237316195.423570985008687907853269984665640564039457584007913129639935even longer suffix");
|
|
}
|
|
END_TEST
|
|
|
|
// https://tools.ietf.org/html/rfc4648#section-10
|
|
START_TEST(test_base32_rfc4648)
|
|
{
|
|
static const struct {
|
|
const char *decoded;
|
|
const char *encoded;
|
|
const char *encoded_lowercase;
|
|
} tests[] = {
|
|
{ "", "", ""},
|
|
{ "f", "MY", "my" },
|
|
{ "fo", "MZXQ", "mzxq" },
|
|
{ "foo", "MZXW6", "mzxw6" },
|
|
{ "foob", "MZXW6YQ", "mzxw6yq" },
|
|
{ "fooba", "MZXW6YTB", "mzxw6ytb" },
|
|
{ "foobar", "MZXW6YTBOI", "mzxw6ytboi" },
|
|
};
|
|
|
|
char buffer[64];
|
|
|
|
for (size_t i = 0; i < (sizeof(tests) / sizeof(*tests)); i++) {
|
|
const char *in = tests[i].decoded;
|
|
const char *out = tests[i].encoded;
|
|
const char *out_lowercase = tests[i].encoded_lowercase;
|
|
|
|
size_t inlen = strlen(in);
|
|
size_t outlen = strlen(out);
|
|
|
|
ck_assert_int_eq(outlen, base32_encoded_length(inlen));
|
|
ck_assert_int_eq(inlen, base32_decoded_length(outlen));
|
|
|
|
ck_assert(base32_encode((uint8_t *) in, inlen, buffer, sizeof(buffer), BASE32_ALPHABET_RFC4648) != NULL);
|
|
ck_assert_str_eq(buffer, out);
|
|
|
|
char *ret = (char *) base32_decode(out, outlen, (uint8_t *) buffer, sizeof(buffer), BASE32_ALPHABET_RFC4648);
|
|
ck_assert(ret != NULL);
|
|
*ret = '\0';
|
|
ck_assert_str_eq(buffer, in);
|
|
|
|
ret = (char *) base32_decode(out_lowercase, outlen, (uint8_t *) buffer, sizeof(buffer), BASE32_ALPHABET_RFC4648);
|
|
ck_assert(ret != NULL);
|
|
*ret = '\0';
|
|
ck_assert_str_eq(buffer, in);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// from https://github.com/bitcoin/bitcoin/blob/master/src/test/data/base58_keys_valid.json
|
|
START_TEST(test_base58)
|
|
{
|
|
static const char *base58_vector[] = {
|
|
"0065a16059864a2fdbc7c99a4723a8395bc6f188eb", "1AGNa15ZQXAZUgFiqJ2i7Z2DPU2J6hW62i",
|
|
"0574f209f6ea907e2ea48f74fae05782ae8a665257", "3CMNFxN1oHBc4R1EpboAL5yzHGgE611Xou",
|
|
"6f53c0307d6851aa0ce7825ba883c6bd9ad242b486", "mo9ncXisMeAoXwqcV5EWuyncbmCcQN4rVs",
|
|
"c46349a418fc4578d10a372b54b45c280cc8c4382f", "2N2JD6wb56AfK4tfmM6PwdVmoYk2dCKf4Br",
|
|
"80eddbdc1168f1daeadbd3e44c1e3f8f5a284c2029f78ad26af98583a499de5b19", "5Kd3NBUAdUnhyzenEwVLy9pBKxSwXvE9FMPyR4UKZvpe6E3AgLr",
|
|
"8055c9bccb9ed68446d1b75273bbce89d7fe013a8acd1625514420fb2aca1a21c401", "Kz6UJmQACJmLtaQj5A3JAge4kVTNQ8gbvXuwbmCj7bsaabudb3RD",
|
|
"ef36cb93b9ab1bdabf7fb9f2c04f1b9cc879933530ae7842398eef5a63a56800c2", "9213qJab2HNEpMpYNBa7wHGFKKbkDn24jpANDs2huN3yi4J11ko",
|
|
"efb9f4892c9e8282028fea1d2667c4dc5213564d41fc5783896a0d843fc15089f301", "cTpB4YiyKiBcPxnefsDpbnDxFDffjqJob8wGCEDXxgQ7zQoMXJdH",
|
|
"006d23156cbbdcc82a5a47eee4c2c7c583c18b6bf4", "1Ax4gZtb7gAit2TivwejZHYtNNLT18PUXJ",
|
|
"05fcc5460dd6e2487c7d75b1963625da0e8f4c5975", "3QjYXhTkvuj8qPaXHTTWb5wjXhdsLAAWVy",
|
|
"6ff1d470f9b02370fdec2e6b708b08ac431bf7a5f7", "n3ZddxzLvAY9o7184TB4c6FJasAybsw4HZ",
|
|
"c4c579342c2c4c9220205e2cdc285617040c924a0a", "2NBFNJTktNa7GZusGbDbGKRZTxdK9VVez3n",
|
|
"80a326b95ebae30164217d7a7f57d72ab2b54e3be64928a19da0210b9568d4015e", "5K494XZwps2bGyeL71pWid4noiSNA2cfCibrvRWqcHSptoFn7rc",
|
|
"807d998b45c219a1e38e99e7cbd312ef67f77a455a9b50c730c27f02c6f730dfb401", "L1RrrnXkcKut5DEMwtDthjwRcTTwED36thyL1DebVrKuwvohjMNi",
|
|
"efd6bca256b5abc5602ec2e1c121a08b0da2556587430bcf7e1898af2224885203", "93DVKyFYwSN6wEo3E2fCrFPUp17FtrtNi2Lf7n4G3garFb16CRj",
|
|
"efa81ca4e8f90181ec4b61b6a7eb998af17b2cb04de8a03b504b9e34c4c61db7d901", "cTDVKtMGVYWTHCb1AFjmVbEbWjvKpKqKgMaR3QJxToMSQAhmCeTN",
|
|
"007987ccaa53d02c8873487ef919677cd3db7a6912", "1C5bSj1iEGUgSTbziymG7Cn18ENQuT36vv",
|
|
"0563bcc565f9e68ee0189dd5cc67f1b0e5f02f45cb", "3AnNxabYGoTxYiTEZwFEnerUoeFXK2Zoks",
|
|
"6fef66444b5b17f14e8fae6e7e19b045a78c54fd79", "n3LnJXCqbPjghuVs8ph9CYsAe4Sh4j97wk",
|
|
"c4c3e55fceceaa4391ed2a9677f4a4d34eacd021a0", "2NB72XtkjpnATMggui83aEtPawyyKvnbX2o",
|
|
"80e75d936d56377f432f404aabb406601f892fd49da90eb6ac558a733c93b47252", "5KaBW9vNtWNhc3ZEDyNCiXLPdVPHCikRxSBWwV9NrpLLa4LsXi9",
|
|
"808248bd0375f2f75d7e274ae544fb920f51784480866b102384190b1addfbaa5c01", "L1axzbSyynNYA8mCAhzxkipKkfHtAXYF4YQnhSKcLV8YXA874fgT",
|
|
"ef44c4f6a096eac5238291a94cc24c01e3b19b8d8cef72874a079e00a242237a52", "927CnUkUbasYtDwYwVn2j8GdTuACNnKkjZ1rpZd2yBB1CLcnXpo",
|
|
"efd1de707020a9059d6d3abaf85e17967c6555151143db13dbb06db78df0f15c6901", "cUcfCMRjiQf85YMzzQEk9d1s5A4K7xL5SmBCLrezqXFuTVefyhY7",
|
|
"00adc1cc2081a27206fae25792f28bbc55b831549d", "1Gqk4Tv79P91Cc1STQtU3s1W6277M2CVWu",
|
|
"05188f91a931947eddd7432d6e614387e32b244709", "33vt8ViH5jsr115AGkW6cEmEz9MpvJSwDk",
|
|
"6f1694f5bc1a7295b600f40018a618a6ea48eeb498", "mhaMcBxNh5cqXm4aTQ6EcVbKtfL6LGyK2H",
|
|
"c43b9b3fd7a50d4f08d1a5b0f62f644fa7115ae2f3", "2MxgPqX1iThW3oZVk9KoFcE5M4JpiETssVN",
|
|
"80091035445ef105fa1bb125eccfb1882f3fe69592265956ade751fd095033d8d0", "5HtH6GdcwCJA4ggWEL1B3jzBBUB8HPiBi9SBc5h9i4Wk4PSeApR",
|
|
"80ab2b4bcdfc91d34dee0ae2a8c6b6668dadaeb3a88b9859743156f462325187af01", "L2xSYmMeVo3Zek3ZTsv9xUrXVAmrWxJ8Ua4cw8pkfbQhcEFhkXT8",
|
|
"efb4204389cef18bbe2b353623cbf93e8678fbc92a475b664ae98ed594e6cf0856", "92xFEve1Z9N8Z641KQQS7ByCSb8kGjsDzw6fAmjHN1LZGKQXyMq",
|
|
"efe7b230133f1b5489843260236b06edca25f66adb1be455fbd38d4010d48faeef01", "cVM65tdYu1YK37tNoAyGoJTR13VBYFva1vg9FLuPAsJijGvG6NEA",
|
|
"00c4c1b72491ede1eedaca00618407ee0b772cad0d", "1JwMWBVLtiqtscbaRHai4pqHokhFCbtoB4",
|
|
"05f6fe69bcb548a829cce4c57bf6fff8af3a5981f9", "3QCzvfL4ZRvmJFiWWBVwxfdaNBT8EtxB5y",
|
|
"6f261f83568a098a8638844bd7aeca039d5f2352c0", "mizXiucXRCsEriQCHUkCqef9ph9qtPbZZ6",
|
|
"c4e930e1834a4d234702773951d627cce82fbb5d2e", "2NEWDzHWwY5ZZp8CQWbB7ouNMLqCia6YRda",
|
|
"80d1fab7ab7385ad26872237f1eb9789aa25cc986bacc695e07ac571d6cdac8bc0", "5KQmDryMNDcisTzRp3zEq9e4awRmJrEVU1j5vFRTKpRNYPqYrMg",
|
|
"80b0bbede33ef254e8376aceb1510253fc3550efd0fcf84dcd0c9998b288f166b301", "L39Fy7AC2Hhj95gh3Yb2AU5YHh1mQSAHgpNixvm27poizcJyLtUi",
|
|
"ef037f4192c630f399d9271e26c575269b1d15be553ea1a7217f0cb8513cef41cb", "91cTVUcgydqyZLgaANpf1fvL55FH53QMm4BsnCADVNYuWuqdVys",
|
|
"ef6251e205e8ad508bab5596bee086ef16cd4b239e0cc0c5d7c4e6035441e7d5de01", "cQspfSzsgLeiJGB2u8vrAiWpCU4MxUT6JseWo2SjXy4Qbzn2fwDw",
|
|
"005eadaf9bb7121f0f192561a5a62f5e5f54210292", "19dcawoKcZdQz365WpXWMhX6QCUpR9SY4r",
|
|
"053f210e7277c899c3a155cc1c90f4106cbddeec6e", "37Sp6Rv3y4kVd1nQ1JV5pfqXccHNyZm1x3",
|
|
"6fc8a3c2a09a298592c3e180f02487cd91ba3400b5", "myoqcgYiehufrsnnkqdqbp69dddVDMopJu",
|
|
"c499b31df7c9068d1481b596578ddbb4d3bd90baeb", "2N7FuwuUuoTBrDFdrAZ9KxBmtqMLxce9i1C",
|
|
"80c7666842503db6dc6ea061f092cfb9c388448629a6fe868d068c42a488b478ae", "5KL6zEaMtPRXZKo1bbMq7JDjjo1bJuQcsgL33je3oY8uSJCR5b4",
|
|
"8007f0803fc5399e773555ab1e8939907e9badacc17ca129e67a2f5f2ff84351dd01", "KwV9KAfwbwt51veZWNscRTeZs9CKpojyu1MsPnaKTF5kz69H1UN2",
|
|
"efea577acfb5d1d14d3b7b195c321566f12f87d2b77ea3a53f68df7ebf8604a801", "93N87D6uxSBzwXvpokpzg8FFmfQPmvX4xHoWQe3pLdYpbiwT5YV",
|
|
"ef0b3b34f0958d8a268193a9814da92c3e8b58b4a4378a542863e34ac289cd830c01", "cMxXusSihaX58wpJ3tNuuUcZEQGt6DKJ1wEpxys88FFaQCYjku9h",
|
|
"001ed467017f043e91ed4c44b4e8dd674db211c4e6", "13p1ijLwsnrcuyqcTvJXkq2ASdXqcnEBLE",
|
|
"055ece0cadddc415b1980f001785947120acdb36fc", "3ALJH9Y951VCGcVZYAdpA3KchoP9McEj1G",
|
|
0, 0,
|
|
};
|
|
const char **raw = base58_vector;
|
|
const char **str = base58_vector + 1;
|
|
uint8_t rawn[34];
|
|
char strn[53];
|
|
int r;
|
|
while (*raw && *str) {
|
|
int len = strlen(*raw) / 2;
|
|
|
|
memcpy(rawn, fromhex(*raw), len);
|
|
r = base58_encode_check(rawn, len, strn, sizeof(strn));
|
|
ck_assert_int_eq((size_t)r, strlen(*str) + 1);
|
|
ck_assert_str_eq(strn, *str);
|
|
|
|
r = base58_decode_check(strn, rawn, len);
|
|
ck_assert_int_eq(r, len);
|
|
ck_assert_mem_eq(rawn, fromhex(*raw), len);
|
|
|
|
raw += 2; str += 2;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#if USE_GRAPHENE
|
|
|
|
// Graphene Base85CheckEncoding
|
|
START_TEST(test_base58gph)
|
|
{
|
|
static const char *base58_vector[] = {
|
|
"02e649f63f8e8121345fd7f47d0d185a3ccaa843115cd2e9392dcd9b82263bc680", "6dumtt9swxCqwdPZBGXh9YmHoEjFFnNfwHaTqRbQTghGAY2gRz",
|
|
"021c7359cd885c0e319924d97e3980206ad64387aff54908241125b3a88b55ca16", "5725vivYpuFWbeyTifZ5KevnHyqXCi5hwHbNU9cYz1FHbFXCxX",
|
|
"02f561e0b57a552df3fa1df2d87a906b7a9fc33a83d5d15fa68a644ecb0806b49a", "6kZKHSuxqAwdCYsMvwTcipoTsNE2jmEUNBQufGYywpniBKXWZK",
|
|
"03e7595c3e6b58f907bee951dc29796f3757307e700ecf3d09307a0cc4a564eba3", "8b82mpnH8YX1E9RHnU2a2YgLTZ8ooevEGP9N15c1yFqhoBvJur",
|
|
0, 0,
|
|
};
|
|
const char **raw = base58_vector;
|
|
const char **str = base58_vector + 1;
|
|
uint8_t rawn[34];
|
|
char strn[53];
|
|
int r;
|
|
while (*raw && *str) {
|
|
int len = strlen(*raw) / 2;
|
|
|
|
memcpy(rawn, fromhex(*raw), len);
|
|
r = base58gph_encode_check(rawn, len, strn, sizeof(strn));
|
|
ck_assert_int_eq((size_t)r, strlen(*str) + 1);
|
|
ck_assert_str_eq(strn, *str);
|
|
|
|
r = base58gph_decode_check(strn, rawn, len);
|
|
ck_assert_int_eq(r, len);
|
|
ck_assert_mem_eq(rawn, fromhex(*raw), len);
|
|
|
|
raw += 2; str += 2;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#endif
|
|
|
|
START_TEST(test_bignum_divmod)
|
|
{
|
|
uint32_t r;
|
|
int i;
|
|
|
|
bignum256 a = { { 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0xffff} };
|
|
uint32_t ar[] = { 15, 14, 55, 29, 44, 24, 53, 49, 18, 55, 2, 28, 5, 4, 12, 43, 18, 37, 28, 14, 30, 46, 12, 11, 17, 10, 10, 13, 24, 45, 4, 33, 44, 42, 2, 46, 34, 43, 45, 28, 21, 18, 13, 17 };
|
|
|
|
i = 0;
|
|
while (!bn_is_zero(&a) && i < 44) {
|
|
bn_divmod58(&a, &r);
|
|
ck_assert_int_eq(r, ar[i]);
|
|
i++;
|
|
}
|
|
ck_assert_int_eq(i, 44);
|
|
|
|
bignum256 b = { { 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0x3fffffff, 0xffff} };
|
|
uint32_t br[] = { 935, 639, 129, 913, 7, 584, 457, 39, 564, 640, 665, 984, 269, 853, 907, 687, 8, 985, 570, 423, 195, 316, 237, 89, 792, 115 };
|
|
|
|
i = 0;
|
|
while (!bn_is_zero(&b) && i < 26) {
|
|
bn_divmod1000(&b, &r);
|
|
ck_assert_int_eq(r, br[i]);
|
|
i++;
|
|
}
|
|
ck_assert_int_eq(i, 26);
|
|
|
|
}
|
|
END_TEST
|
|
|
|
// test vector 1 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
|
START_TEST(test_bip32_vector_1)
|
|
{
|
|
HDNode node, node2, node3;
|
|
uint32_t fingerprint;
|
|
char str[112];
|
|
int r;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, SECP256K1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
fingerprint = 0;
|
|
ck_assert_int_eq(fingerprint, 0x00000000);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("873dff81c02f525623fd1fe5167eac3a55a049de3d314bb42ee227ffed37d508"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("e8f32e723decf4051aefac8e2c93c9c5b214313817cdb01a1494b917c8436b35"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0339a36013301597daef41fbe593a02cc513d0b55527ec2df1050e2e8ff49c85c2"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub661MyMwAqRbcFtXgS5sYJABqqG9YLmC4Q1Rdap9gSE8NqtwybGhePY2gZ29ESFjqJoCu1Rupje8YtGqsefD265TMg7usUDFdp6W1EGMcet8");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd_prime(&node, 0);
|
|
ck_assert_int_eq(fingerprint, 0x3442193e);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("47fdacbd0f1097043b78c63c20c34ef4ed9a111d980047ad16282c7ae6236141"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("edb2e14f9ee77d26dd93b4ecede8d16ed408ce149b6cd80b0715a2d911a0afea"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("035a784662a4a20a65bf6aab9ae98a6c068a81c52e4b032c0fb5400c706cfccc56"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9uHRZZhk6KAJC1avXpDAp4MDc3sQKNxDiPvvkX8Br5ngLNv1TxvUxt4cV1rGL5hj6KCesnDYUhd7oWgT11eZG7XnxHrnYeSvkzY7d2bhkJ7");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub68Gmy5EdvgibQVfPdqkBBCHxA5htiqg55crXYuXoQRKfDBFA1WEjWgP6LHhwBZeNK1VTsfTFUHCdrfp1bgwQ9xv5ski8PX9rL2dZXvgGDnw");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0'/1]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 1);
|
|
ck_assert_int_eq(fingerprint, 0x5c1bd648);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("2a7857631386ba23dacac34180dd1983734e444fdbf774041578e9b6adb37c19"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("3c6cb8d0f6a264c91ea8b5030fadaa8e538b020f0a387421a12de9319dc93368"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03501e454bf00751f24b1b489aa925215d66af2234e3891c3b21a52bedb3cd711c"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9wTYmMFdV23N2TdNG573QoEsfRrWKQgWeibmLntzniatZvR9BmLnvSxqu53Kw1UmYPxLgboyZQaXwTCg8MSY3H2EU4pWcQDnRnrVA1xe8fs");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6ASuArnXKPbfEwhqN6e3mwBcDTgzisQN1wXN9BJcM47sSikHjJf3UFHKkNAWbWMiGj7Wf5uMash7SyYq527Hqck2AxYysAA7xmALppuCkwQ");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0'/1/2']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd_prime(&node, 2);
|
|
ck_assert_int_eq(fingerprint, 0xbef5a2f9);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("04466b9cc8e161e966409ca52986c584f07e9dc81f735db683c3ff6ec7b1503f"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("cbce0d719ecf7431d88e6a89fa1483e02e35092af60c042b1df2ff59fa424dca"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0357bfe1e341d01c69fe5654309956cbea516822fba8a601743a012a7896ee8dc2"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9z4pot5VBttmtdRTWfWQmoH1taj2axGVzFqSb8C9xaxKymcFzXBDptWmT7FwuEzG3ryjH4ktypQSAewRiNMjANTtpgP4mLTj34bhnZX7UiM");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6D4BDPcP2GT577Vvch3R8wDkScZWzQzMMUm3PWbmWvVJrZwQY4VUNgqFJPMM3No2dFDFGTsxxpG5uJh7n7epu4trkrX7x7DogT5Uv6fcLW5");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0'/1/2'/2]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 2);
|
|
ck_assert_int_eq(fingerprint, 0xee7ab90c);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("cfb71883f01676f587d023cc53a35bc7f88f724b1f8c2892ac1275ac822a3edd"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("0f479245fb19a38a1954c5c7c0ebab2f9bdfd96a17563ef28a6a4b1a2a764ef4"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02e8445082a72f29b75ca48748a914df60622a609cacfce8ed0e35804560741d29"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprvA2JDeKCSNNZky6uBCviVfJSKyQ1mDYahRjijr5idH2WwLsEd4Hsb2Tyh8RfQMuPh7f7RtyzTtdrbdqqsunu5Mm3wDvUAKRHSC34sJ7in334");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6FHa3pjLCk84BayeJxFW2SP4XRrFd1JYnxeLeU8EqN3vDfZmbqBqaGJAyiLjTAwm6ZLRQUMv1ZACTj37sR62cfN7fe5JnJ7dh8zL4fiyLHV");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0'/1/2'/2/1000000000]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 1000000000);
|
|
ck_assert_int_eq(fingerprint, 0xd880d7d8);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("c783e67b921d2beb8f6b389cc646d7263b4145701dadd2161548a8b078e65e9e"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("471b76e389e528d6de6d816857e012c5455051cad6660850e58372a6c3e6e7c8"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("022a471424da5e657499d1ff51cb43c47481a03b1e77f951fe64cec9f5a48f7011"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprvA41z7zogVVwxVSgdKUHDy1SKmdb533PjDz7J6N6mV6uS3ze1ai8FHa8kmHScGpWmj4WggLyQjgPie1rFSruoUihUZREPSL39UNdE3BBDu76");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6H1LXWLaKsWFhvm6RVpEL9P4KfRZSW7abD2ttkWP3SSQvnyA8FSVqNTEcYFgJS2UaFcxupHiYkro49S8yGasTvXEYBVPamhGW6cFJodrTHy");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
}
|
|
END_TEST
|
|
|
|
// test vector 2 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
|
START_TEST(test_bip32_vector_2)
|
|
{
|
|
HDNode node, node2, node3;
|
|
uint32_t fingerprint;
|
|
char str[112];
|
|
int r;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, SECP256K1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
fingerprint = 0;
|
|
ck_assert_int_eq(fingerprint, 0x00000000);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("60499f801b896d83179a4374aeb7822aaeaceaa0db1f85ee3e904c4defbd9689"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("4b03d6fc340455b363f51020ad3ecca4f0850280cf436c70c727923f6db46c3e"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03cbcaa9c98c877a26977d00825c956a238e8dddfbd322cce4f74b0b5bd6ace4a7"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9s21ZrQH143K31xYSDQpPDxsXRTUcvj2iNHm5NUtrGiGG5e2DtALGdso3pGz6ssrdK4PFmM8NSpSBHNqPqm55Qn3LqFtT2emdEXVYsCzC2U");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub661MyMwAqRbcFW31YEwpkMuc5THy2PSt5bDMsktWQcFF8syAmRUapSCGu8ED9W6oDMSgv6Zz8idoc4a6mr8BDzTJY47LJhkJ8UB7WEGuduB");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 0);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0xbd16bee5);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("f0909affaa7ee7abe5dd4e100598d4dc53cd709d5a5c2cac40e7412f232f7c9c"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("abe74a98f6c7eabee0428f53798f0ab8aa1bd37873999041703c742f15ac7e1e"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02fc9e5af0ac8d9b3cecfe2a888e2117ba3d089d8585886c9c826b6b22a98d12ea"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9vHkqa6EV4sPZHYqZznhT2NPtPCjKuDKGY38FBWLvgaDx45zo9WQRUT3dKYnjwih2yJD9mkrocEZXo1ex8G81dwSM1fwqWpWkeS3v86pgKt");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub69H7F5d8KSRgmmdJg2KhpAK8SR3DjMwAdkxj3ZuxV27CprR9LgpeyGmXUbC6wb7ERfvrnKZjXoUmmDznezpbZb7ap6r1D3tgFxHmwMkQTPH");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0/2147483647']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd_prime(&node, 2147483647);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x5a61ff8e);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("be17a268474a6bb9c61e1d720cf6215e2a88c5406c4aee7b38547f585c9a37d9"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("877c779ad9687164e9c2f4f0f4ff0340814392330693ce95a58fe18fd52e6e93"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03c01e7425647bdefa82b12d9bad5e3e6865bee0502694b94ca58b666abc0a5c3b"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9wSp6B7kry3Vj9m1zSnLvN3xH8RdsPP1Mh7fAaR7aRLcQMKTR2vidYEeEg2mUCTAwCd6vnxVrcjfy2kRgVsFawNzmjuHc2YmYRmagcEPdU9");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6ASAVgeehLbnwdqV6UKMHVzgqAG8Gr6riv3Fxxpj8ksbH9ebxaEyBLZ85ySDhKiLDBrQSARLq1uNRts8RuJiHjaDMBU4Zn9h8LZNnBC5y4a");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0/2147483647'/1]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 1);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0xd8ab4937);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("f366f48f1ea9f2d1d3fe958c95ca84ea18e4c4ddb9366c336c927eb246fb38cb"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("704addf544a06e5ee4bea37098463c23613da32020d604506da8c0518e1da4b7"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03a7d1d856deb74c508e05031f9895dab54626251b3806e16b4bd12e781a7df5b9"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprv9zFnWC6h2cLgpmSA46vutJzBcfJ8yaJGg8cX1e5StJh45BBciYTRXSd25UEPVuesF9yog62tGAQtHjXajPPdbRCHuWS6T8XA2ECKADdw4Ef");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6DF8uhdarytz3FWdA8TvFSvvAh8dP3283MY7p2V4SeE2wyWmG5mg5EwVvmdMVCQcoNJxGoWaU9DCWh89LojfZ537wTfunKau47EL2dhHKon");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd_prime(&node, 2147483646);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x78412e3a);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("637807030d55d01f9a0cb3a7839515d796bd07706386a6eddf06cc29a65a0e29"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("f1c7c871a54a804afe328b4c83a1c33b8e5ff48f5087273f04efa83b247d6a2d"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02d2b36900396c9282fa14628566582f206a5dd0bcc8d5e892611806cafb0301f0"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646'/2]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 2);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x31a507b8);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("9452b549be8cea3ecb7a84bec10dcfd94afe4d129ebfd3b3cb58eedf394ed271"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("bb7d39bdb83ecf58f2fd82b6d918341cbef428661ef01ab97c28a4842125ac23"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("024d902e1a2fc7a8755ab5b694c575fce742c48d9ff192e63df5193e4c7afe1f9c"), 33);
|
|
hdnode_serialize_private(&node, fingerprint, VERSION_PRIVATE, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xprvA2nrNbFZABcdryreWet9Ea4LvTJcGsqrMzxHx98MMrotbir7yrKCEXw7nadnHM8Dq38EGfSh6dqA9QWTyefMLEcBYJUuekgW4BYPJcr9E7j");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(&node, &node2, sizeof(HDNode));
|
|
hdnode_serialize_public(&node, fingerprint, VERSION_PUBLIC, str, sizeof(str));
|
|
ck_assert_str_eq(str, "xpub6FnCn6nSzZAw5Tw7cgR9bi15UV96gLZhjDstkXXxvCLsUXBGXPdSnLFbdpq8p9HmGsApME5hQTZ3emM2rnY5agb9rXpVGyy3bdW6EEgAtqt");
|
|
r = hdnode_deserialize(str, VERSION_PUBLIC, VERSION_PRIVATE, &node2, NULL); ck_assert_int_eq(r, 0);
|
|
memcpy(&node3, &node, sizeof(HDNode));
|
|
memset(&node3.private_key, 0, 32);
|
|
ck_assert_mem_eq(&node2, &node3, sizeof(HDNode));
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, SECP256K1_NAME, &node);
|
|
|
|
// test public derivation
|
|
// [Chain m/0]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_public_ckd(&node, 0);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0xbd16bee5);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("f0909affaa7ee7abe5dd4e100598d4dc53cd709d5a5c2cac40e7412f232f7c9c"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02fc9e5af0ac8d9b3cecfe2a888e2117ba3d089d8585886c9c826b6b22a98d12ea"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_compare)
|
|
{
|
|
HDNode node1, node2, node3;
|
|
int i, r;
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node1);
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node2);
|
|
hdnode_fill_public_key(&node2);
|
|
for (i = 0; i < 100; i++) {
|
|
memcpy(&node3, &node1, sizeof(HDNode));
|
|
hdnode_fill_public_key(&node3);
|
|
r = hdnode_private_ckd(&node1, i); ck_assert_int_eq(r, 1);
|
|
r = hdnode_public_ckd(&node2, i); ck_assert_int_eq(r, 1);
|
|
r = hdnode_public_ckd(&node3, i); ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(node1.depth, node2.depth);
|
|
ck_assert_int_eq(node1.depth, node3.depth);
|
|
ck_assert_int_eq(node1.child_num, node2.child_num);
|
|
ck_assert_int_eq(node1.child_num, node3.child_num);
|
|
ck_assert_mem_eq(node1.chain_code, node2.chain_code, 32);
|
|
ck_assert_mem_eq(node1.chain_code, node3.chain_code, 32);
|
|
ck_assert_mem_eq(node2.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
ck_assert_mem_eq(node3.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
hdnode_fill_public_key(&node1);
|
|
ck_assert_mem_eq(node1.public_key, node2.public_key, 33);
|
|
ck_assert_mem_eq(node1.public_key, node3.public_key, 33);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_optimized)
|
|
{
|
|
HDNode root;
|
|
hdnode_from_seed((uint8_t *)"NothingToSeeHere", 16, SECP256K1_NAME, &root);
|
|
hdnode_fill_public_key(&root);
|
|
|
|
curve_point pub;
|
|
ecdsa_read_pubkey(&secp256k1, root.public_key, &pub);
|
|
|
|
HDNode node;
|
|
char addr1[MAX_ADDR_SIZE], addr2[MAX_ADDR_SIZE];
|
|
|
|
for (int i = 0; i < 40; i++) {
|
|
// unoptimized
|
|
memcpy(&node, &root, sizeof(HDNode));
|
|
hdnode_public_ckd(&node, i);
|
|
hdnode_fill_public_key(&node);
|
|
ecdsa_get_address(node.public_key, 0, addr1, sizeof(addr1));
|
|
// optimized
|
|
hdnode_public_ckd_address_optimized(&pub, root.chain_code, i, 0, addr2, sizeof(addr2), 0);
|
|
// check
|
|
ck_assert_str_eq(addr1, addr2);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_cache_1)
|
|
{
|
|
HDNode node1, node2;
|
|
int i, r;
|
|
|
|
// test 1 .. 8
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node1);
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node2);
|
|
|
|
uint32_t ii[] = {0x80000001, 0x80000002, 0x80000003, 0x80000004, 0x80000005, 0x80000006, 0x80000007, 0x80000008};
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
r = hdnode_private_ckd(&node1, ii[i]); ck_assert_int_eq(r, 1);
|
|
}
|
|
r = hdnode_private_ckd_cached(&node2, ii, 8, NULL); ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(&node1, &node2, sizeof(HDNode));
|
|
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node1);
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node2);
|
|
|
|
// test 1 .. 7, 20
|
|
ii[7] = 20;
|
|
for (i = 0; i < 8; i++) {
|
|
r = hdnode_private_ckd(&node1, ii[i]); ck_assert_int_eq(r, 1);
|
|
}
|
|
r = hdnode_private_ckd_cached(&node2, ii, 8, NULL); ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(&node1, &node2, sizeof(HDNode));
|
|
|
|
// test different root node
|
|
hdnode_from_seed(fromhex("000000002ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node1);
|
|
hdnode_from_seed(fromhex("000000002ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &node2);
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
r = hdnode_private_ckd(&node1, ii[i]); ck_assert_int_eq(r, 1);
|
|
}
|
|
r = hdnode_private_ckd_cached(&node2, ii, 8, NULL); ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(&node1, &node2, sizeof(HDNode));
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_cache_2)
|
|
{
|
|
HDNode nodea[9], nodeb[9];
|
|
int i, j, r;
|
|
|
|
for (j = 0; j < 9; j++) {
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &(nodea[j]));
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, SECP256K1_NAME, &(nodeb[j]));
|
|
}
|
|
|
|
uint32_t ii[] = {0x80000001, 0x80000002, 0x80000003, 0x80000004, 0x80000005, 0x80000006, 0x80000007, 0x80000008};
|
|
for (j = 0; j < 9; j++) {
|
|
// non cached
|
|
for (i = 1; i <= j; i++) {
|
|
r = hdnode_private_ckd(&(nodea[j]), ii[i - 1]); ck_assert_int_eq(r, 1);
|
|
}
|
|
// cached
|
|
r = hdnode_private_ckd_cached(&(nodeb[j]), ii, j, NULL); ck_assert_int_eq(r, 1);
|
|
}
|
|
|
|
ck_assert_mem_eq(&(nodea[0]), &(nodeb[0]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[1]), &(nodeb[1]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[2]), &(nodeb[2]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[3]), &(nodeb[3]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[4]), &(nodeb[4]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[5]), &(nodeb[5]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[6]), &(nodeb[6]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[7]), &(nodeb[7]), sizeof(HDNode));
|
|
ck_assert_mem_eq(&(nodea[8]), &(nodeb[8]), sizeof(HDNode));
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_nist_seed)
|
|
{
|
|
HDNode node;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("a7305bc8df8d0951f0cb224c0e95d7707cbdf2c6ce7e8d481fec69c7ff5e9446"), 32, NIST256P1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
ck_assert_mem_eq(node.private_key, fromhex("3b8c18469a4634517d6d0b65448f8e6c62091b45540a1743c5846be55d47d88f"), 32);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("7762f9729fed06121fd13f326884c82f59aa95c57ac492ce8c9654e60efd130c"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0383619fadcde31063d8c5cb00dbfe1713f3e6fa169d8541a798752a1c1ca0cb20"), 33);
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("aa305bc8df8d0951f0cb29ad4568d7707cbdf2c6ce7e8d481fec69c7ff5e9446"), 32, NIST256P1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
ck_assert_mem_eq(node.chain_code, fromhex("a81d21f36f987fa0be3b065301bfb6aa9deefbf3dfef6744c37b9a4abc3c68f1"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("0e49dc46ce1d8c29d9b80a05e40f5d0cd68cbf02ae98572186f5343be18084bf"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03aaa4c89acd9a98935330773d3dae55122f3591bac4a40942681768de8df6ba63"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_nist_vector_1)
|
|
{
|
|
HDNode node;
|
|
uint32_t fingerprint;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, NIST256P1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
fingerprint = 0;
|
|
ck_assert_int_eq(fingerprint, 0x00000000);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("beeb672fe4621673f722f38529c07392fecaa61015c80c34f29ce8b41b3cb6ea"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("612091aaa12e22dd2abef664f8a01a82cae99ad7441b7ef8110424915c268bc2"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0266874dc6ade47b3ecd096745ca09bcd29638dd52c2c12117b11ed3e458cfa9e8"), 33);
|
|
|
|
// [Chain m/0']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd_prime(&node, 0);
|
|
ck_assert_int_eq(fingerprint, 0xbe6105b5);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("3460cea53e6a6bb5fb391eeef3237ffd8724bf0a40e94943c98b83825342ee11"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("6939694369114c67917a182c59ddb8cafc3004e63ca5d3b84403ba8613debc0c"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0384610f5ecffe8fda089363a41f56a5c7ffc1d81b59a612d0d649b2d22355590c"), 33);
|
|
|
|
// [Chain m/0'/1]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 1);
|
|
ck_assert_int_eq(fingerprint, 0x9b02312f);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("4187afff1aafa8445010097fb99d23aee9f599450c7bd140b6826ac22ba21d0c"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("284e9d38d07d21e4e281b645089a94f4cf5a5a81369acf151a1c3a57f18b2129"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03526c63f8d0b4bbbf9c80df553fe66742df4676b241dabefdef67733e070f6844"), 33);
|
|
|
|
// [Chain m/0'/1/2']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd_prime(&node, 2);
|
|
ck_assert_int_eq(fingerprint, 0xb98005c1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("98c7514f562e64e74170cc3cf304ee1ce54d6b6da4f880f313e8204c2a185318"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("694596e8a54f252c960eb771a3c41e7e32496d03b954aeb90f61635b8e092aa7"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0359cf160040778a4b14c5f4d7b76e327ccc8c4a6086dd9451b7482b5a4972dda0"), 33);
|
|
|
|
// [Chain m/0'/1/2'/2]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 2);
|
|
ck_assert_int_eq(fingerprint, 0x0e9f3274);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("ba96f776a5c3907d7fd48bde5620ee374d4acfd540378476019eab70790c63a0"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("5996c37fd3dd2679039b23ed6f70b506c6b56b3cb5e424681fb0fa64caf82aaa"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("029f871f4cb9e1c97f9f4de9ccd0d4a2f2a171110c61178f84430062230833ff20"), 33);
|
|
|
|
// [Chain m/0'/1/2'/2/1000000000]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
hdnode_private_ckd(&node, 1000000000);
|
|
ck_assert_int_eq(fingerprint, 0x8b2b5c4b);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("b9b7b82d326bb9cb5b5b121066feea4eb93d5241103c9e7a18aad40f1dde8059"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("21c4f269ef0a5fd1badf47eeacebeeaa3de22eb8e5b0adcd0f27dd99d34d0119"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02216cd26d31147f72427a453c443ed2cde8a1e53c9cc44e5ddf739725413fe3f4"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_nist_vector_2)
|
|
{
|
|
HDNode node;
|
|
uint32_t fingerprint;
|
|
int r;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, NIST256P1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
fingerprint = 0;
|
|
ck_assert_int_eq(fingerprint, 0x00000000);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("96cd4465a9644e31528eda3592aa35eb39a9527769ce1855beafc1b81055e75d"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("eaa31c2e46ca2962227cf21d73a7ef0ce8b31c756897521eb6c7b39796633357"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02c9e16154474b3ed5b38218bb0463e008f89ee03e62d22fdcc8014beab25b48fa"), 33);
|
|
|
|
// [Chain m/0]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 0);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x607f628f);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("84e9c258bb8557a40e0d041115b376dd55eda99c0042ce29e81ebe4efed9b86a"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("d7d065f63a62624888500cdb4f88b6d59c2927fee9e6d0cdff9cad555884df6e"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("039b6df4bece7b6c81e2adfeea4bcf5c8c8a6e40ea7ffa3cf6e8494c61a1fc82cc"), 33);
|
|
|
|
// [Chain m/0/2147483647']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd_prime(&node, 2147483647);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x946d2a54);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("f235b2bc5c04606ca9c30027a84f353acf4e4683edbd11f635d0dcc1cd106ea6"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("96d2ec9316746a75e7793684ed01e3d51194d81a42a3276858a5b7376d4b94b9"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02f89c5deb1cae4fedc9905f98ae6cbf6cbab120d8cb85d5bd9a91a72f4c068c76"), 33);
|
|
|
|
// [Chain m/0/2147483647'/1]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 1);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x218182d8);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("7c0b833106235e452eba79d2bdd58d4086e663bc8cc55e9773d2b5eeda313f3b"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("974f9096ea6873a915910e82b29d7c338542ccde39d2064d1cc228f371542bbc"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03abe0ad54c97c1d654c1852dfdc32d6d3e487e75fa16f0fd6304b9ceae4220c64"), 33);
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd_prime(&node, 2147483646);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x931223e4);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("5794e616eadaf33413aa309318a26ee0fd5163b70466de7a4512fd4b1a5c9e6a"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("da29649bbfaff095cd43819eda9a7be74236539a29094cd8336b07ed8d4eff63"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("03cb8cb067d248691808cd6b5a5a06b48e34ebac4d965cba33e6dc46fe13d9b933"), 33);
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646'/2]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node, 2);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x956c4629);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("3bfb29ee8ac4484f09db09c2079b520ea5616df7820f071a20320366fbe226a7"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("bb0a77ba01cc31d77205d51d08bd313b979a71ef4de9b062f8958297e746bd67"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("020ee02e18967237cf62672983b253ee62fa4dd431f8243bfeccdf39dbe181387f"), 33);
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, NIST256P1_NAME, &node);
|
|
|
|
// test public derivation
|
|
// [Chain m/0]
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_public_ckd(&node, 0);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x607f628f);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("84e9c258bb8557a40e0d041115b376dd55eda99c0042ce29e81ebe4efed9b86a"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
ck_assert_mem_eq(node.public_key, fromhex("039b6df4bece7b6c81e2adfeea4bcf5c8c8a6e40ea7ffa3cf6e8494c61a1fc82cc"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_nist_compare)
|
|
{
|
|
HDNode node1, node2, node3;
|
|
int i, r;
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, NIST256P1_NAME, &node1);
|
|
hdnode_from_seed(fromhex("301133282ad079cbeb59bc446ad39d333928f74c46997d3609cd3e2801ca69d62788f9f174429946ff4e9be89f67c22fae28cb296a9b37734f75e73d1477af19"), 64, NIST256P1_NAME, &node2);
|
|
hdnode_fill_public_key(&node2);
|
|
for (i = 0; i < 100; i++) {
|
|
memcpy(&node3, &node1, sizeof(HDNode));
|
|
hdnode_fill_public_key(&node3);
|
|
r = hdnode_private_ckd(&node1, i); ck_assert_int_eq(r, 1);
|
|
r = hdnode_public_ckd(&node2, i); ck_assert_int_eq(r, 1);
|
|
r = hdnode_public_ckd(&node3, i); ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(node1.depth, node2.depth);
|
|
ck_assert_int_eq(node1.depth, node3.depth);
|
|
ck_assert_int_eq(node1.child_num, node2.child_num);
|
|
ck_assert_int_eq(node1.child_num, node3.child_num);
|
|
ck_assert_mem_eq(node1.chain_code, node2.chain_code, 32);
|
|
ck_assert_mem_eq(node1.chain_code, node3.chain_code, 32);
|
|
ck_assert_mem_eq(node2.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
ck_assert_mem_eq(node3.private_key, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
hdnode_fill_public_key(&node1);
|
|
ck_assert_mem_eq(node1.public_key, node2.public_key, 33);
|
|
ck_assert_mem_eq(node1.public_key, node3.public_key, 33);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_nist_repeat)
|
|
{
|
|
HDNode node, node2;
|
|
uint32_t fingerprint;
|
|
int r;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, NIST256P1_NAME, &node);
|
|
|
|
// [Chain m/28578']
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd_prime(&node, 28578);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0xbe6105b5);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("e94c8ebe30c2250a14713212f6449b20f3329105ea15b652ca5bdfc68f6c65c2"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("06f0db126f023755d0b8d86d4591718a5210dd8d024e3e14b6159d63f53aa669"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("02519b5554a4872e8c9c1c847115363051ec43e93400e030ba3c36b52a3e70a5b7"), 33);
|
|
|
|
memcpy(&node2, &node, sizeof(HDNode));
|
|
fingerprint = hdnode_fingerprint(&node);
|
|
r = hdnode_private_ckd(&node2, 33941);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x3e2b7bc6);
|
|
ck_assert_mem_eq(node2.chain_code, fromhex("9e87fe95031f14736774cd82f25fd885065cb7c358c1edf813c72af535e83071"), 32);
|
|
ck_assert_mem_eq(node2.private_key, fromhex("092154eed4af83e078ff9b84322015aefe5769e31270f62c3f66c33888335f3a"), 32);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(node2.public_key, fromhex("0235bfee614c0d5b2cae260000bb1d0d84b270099ad790022c1ae0b2e782efe120"), 33);
|
|
|
|
memcpy(&node2, &node, sizeof(HDNode));
|
|
memset(&node2.private_key, 0, 32);
|
|
r = hdnode_public_ckd(&node2, 33941);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_int_eq(fingerprint, 0x3e2b7bc6);
|
|
ck_assert_mem_eq(node2.chain_code, fromhex("9e87fe95031f14736774cd82f25fd885065cb7c358c1edf813c72af535e83071"), 32);
|
|
hdnode_fill_public_key(&node2);
|
|
ck_assert_mem_eq(node2.public_key, fromhex("0235bfee614c0d5b2cae260000bb1d0d84b270099ad790022c1ae0b2e782efe120"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
// test vector 1 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
|
START_TEST(test_bip32_ed25519_vector_1)
|
|
{
|
|
HDNode node;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, ED25519_NAME, &node);
|
|
|
|
// [Chain m]
|
|
ck_assert_mem_eq(node.chain_code, fromhex("90046a93de5380a72b5e45010748567d5ea02bbf6522f979e05c0d8d8ca9fffb"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("2b4be7f19ee27bbf30c667b642d5f4aa69fd169872f8fc3059c08ebae2eb19e7"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("01a4b2856bfec510abab89753fac1ac0e1112364e7d250545963f135f2a33188ed"), 33);
|
|
|
|
// [Chain m/0']
|
|
hdnode_private_ckd_prime(&node, 0);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("8b59aa11380b624e81507a27fedda59fea6d0b779a778918a2fd3590e16e9c69"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("68e0fe46dfb67e368c75379acec591dad19df3cde26e63b93a8e704f1dade7a3"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("018c8a13df77a28f3445213a0f432fde644acaa215fc72dcdf300d5efaa85d350c"), 33);
|
|
|
|
// [Chain m/0'/1']
|
|
hdnode_private_ckd_prime(&node, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("a320425f77d1b5c2505a6b1b27382b37368ee640e3557c315416801243552f14"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("b1d0bad404bf35da785a64ca1ac54b2617211d2777696fbffaf208f746ae84f2"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("011932a5270f335bed617d5b935c80aedb1a35bd9fc1e31acafd5372c30f5c1187"), 33);
|
|
|
|
// [Chain m/0'/1'/2']
|
|
hdnode_private_ckd_prime(&node, 2);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("2e69929e00b5ab250f49c3fb1c12f252de4fed2c1db88387094a0f8c4c9ccd6c"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("92a5b23c0b8a99e37d07df3fb9966917f5d06e02ddbd909c7e184371463e9fc9"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("01ae98736566d30ed0e9d2f4486a64bc95740d89c7db33f52121f8ea8f76ff0fc1"), 33);
|
|
|
|
// [Chain m/0'/1'/2'/2']
|
|
hdnode_private_ckd_prime(&node, 2);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("8f6d87f93d750e0efccda017d662a1b31a266e4a6f5993b15f5c1f07f74dd5cc"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("30d1dc7e5fc04c31219ab25a27ae00b50f6fd66622f6e9c913253d6511d1e662"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("018abae2d66361c879b900d204ad2cc4984fa2aa344dd7ddc46007329ac76c429c"), 33);
|
|
|
|
// [Chain m/0'/1'/2'/2'/1000000000']
|
|
hdnode_private_ckd_prime(&node, 1000000000);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("68789923a0cac2cd5a29172a475fe9e0fb14cd6adb5ad98a3fa70333e7afa230"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("8f94d394a8e8fd6b1bc2f3f49f5c47e385281d5c17e65324b0f62483e37e8793"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("013c24da049451555d51a7014a37337aa4e12d41e485abccfa46b47dfb2af54b7a"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
// test vector 2 from https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
|
START_TEST(test_bip32_ed25519_vector_2)
|
|
{
|
|
HDNode node;
|
|
int r;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, ED25519_NAME, &node);
|
|
|
|
// [Chain m]
|
|
ck_assert_mem_eq(node.chain_code, fromhex("ef70a74db9c3a5af931b5fe73ed8e1a53464133654fd55e7a66f8570b8e33c3b"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("171cb88b1b3c1db25add599712e36245d75bc65a1a5c9e18d76f9f2b1eab4012"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("018fe9693f8fa62a4305a140b9764c5ee01e455963744fe18204b4fb948249308a"), 33);
|
|
|
|
// [Chain m/0']
|
|
r = hdnode_private_ckd_prime(&node, 0);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("0b78a3226f915c082bf118f83618a618ab6dec793752624cbeb622acb562862d"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("1559eb2bbec5790b0c65d8693e4d0875b1747f4970ae8b650486ed7470845635"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0186fab68dcb57aa196c77c5f264f215a112c22a912c10d123b0d03c3c28ef1037"), 33);
|
|
|
|
// [Chain m/0'/2147483647']
|
|
r = hdnode_private_ckd_prime(&node, 2147483647);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("138f0b2551bcafeca6ff2aa88ba8ed0ed8de070841f0c4ef0165df8181eaad7f"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("ea4f5bfe8694d8bb74b7b59404632fd5968b774ed545e810de9c32a4fb4192f4"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("015ba3b9ac6e90e83effcd25ac4e58a1365a9e35a3d3ae5eb07b9e4d90bcf7506d"), 33);
|
|
|
|
// [Chain m/0'/2147483647'/1']
|
|
r = hdnode_private_ckd_prime(&node, 1);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("73bd9fff1cfbde33a1b846c27085f711c0fe2d66fd32e139d3ebc28e5a4a6b90"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("3757c7577170179c7868353ada796c839135b3d30554bbb74a4b1e4a5a58505c"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("012e66aa57069c86cc18249aecf5cb5a9cebbfd6fadeab056254763874a9352b45"), 33);
|
|
|
|
// [Chain m/0'/2147483647'/1'/2147483646']
|
|
r = hdnode_private_ckd_prime(&node, 2147483646);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("0902fe8a29f9140480a00ef244bd183e8a13288e4412d8389d140aac1794825a"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("5837736c89570de861ebc173b1086da4f505d4adb387c6a1b1342d5e4ac9ec72"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("01e33c0f7d81d843c572275f287498e8d408654fdf0d1e065b84e2e6f157aab09b"), 33);
|
|
|
|
// [Chain m/0'/2147483647'/1'/2147483646'/2']
|
|
r = hdnode_private_ckd_prime(&node, 2);
|
|
ck_assert_int_eq(r, 1);
|
|
ck_assert_mem_eq(node.chain_code, fromhex("5d70af781f3a37b829f0d060924d5e960bdc02e85423494afc0b1a41bbe196d4"), 32);
|
|
ck_assert_mem_eq(node.private_key, fromhex("551d333177df541ad876a60ea71f00447931c0a9da16f227c11ea080d7391b8d"), 32);
|
|
hdnode_fill_public_key(&node);
|
|
ck_assert_mem_eq(node.public_key, fromhex("0147150c75db263559a70d5778bf36abbab30fb061ad69f69ece61a72b0cfa4fc0"), 33);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_ecdsa_signature)
|
|
{
|
|
int res;
|
|
uint8_t digest[32];
|
|
uint8_t pubkey[65];
|
|
const ecdsa_curve *curve = &secp256k1;
|
|
|
|
|
|
// sha2(sha2("\x18Bitcoin Signed Message:\n\x0cHello World!"))
|
|
memcpy(digest, fromhex("de4e9524586d6fce45667f9ff12f661e79870c4105fa0fb58af976619bb11432"), 32);
|
|
// r = 2: Four points should exist
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000020123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 0);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("043fc5bf5fec35b6ffe6fd246226d312742a8c296bfa57dd22da509a2e348529b7ddb9faf8afe1ecda3c05e7b2bda47ee1f5a87e952742b22afca560b29d972fcf"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000020123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 1);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("0456d8089137b1fd0d890f8c7d4a04d0fd4520a30b19518ee87bd168ea12ed8090329274c4c6c0d9df04515776f2741eeffc30235d596065d718c3973e19711ad0"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000020123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 2);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("04cee0e740f41aab39156844afef0182dea2a8026885b10454a2d539df6f6df9023abfcb0f01c50bef3c0fa8e59a998d07441e18b1c60583ef75cc8b912fb21a15"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000020123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 3);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("0490d2bd2e9a564d6e1d8324fc6ad00aa4ae597684ecf4abea58bdfe7287ea4fa72968c2e5b0b40999ede3d7898d94e82c3f8dc4536a567a4bd45998c826a4c4b2"), 65);
|
|
|
|
memcpy(digest, fromhex("0000000000000000000000000000000000000000000000000000000000000000"), 32);
|
|
// r = 7: No point P with P.x = 7, but P.x = (order + 7) exists
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000070123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 2);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("044d81bb47a31ffc6cf1f780ecb1e201ec47214b651650867c07f13ad06e12a1b040de78f8dbda700f4d3cd7ee21b3651a74c7661809699d2be7ea0992b0d39797"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000070123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 3);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("044d81bb47a31ffc6cf1f780ecb1e201ec47214b651650867c07f13ad06e12a1b0bf21870724258ff0b2c32811de4c9ae58b3899e7f69662d41815f66c4f2c6498"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000070123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 0);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(digest, fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), 32);
|
|
// r = 1: Two points P with P.x = 1, but P.x = (order + 7) doesn't exist
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000010123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 0);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("045d330b2f89dbfca149828277bae852dd4aebfe136982cb531a88e9e7a89463fe71519f34ea8feb9490c707f14bc38c9ece51762bfd034ea014719b7c85d2871b"), 65);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000010123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 1);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_mem_eq(pubkey, fromhex("049e609c3950e70d6f3e3f3c81a473b1d5ca72739d51debdd80230ae80cab05134a94285375c834a417e8115c546c41da83a263087b79ef1cae25c7b3c738daa2b"), 65);
|
|
|
|
// r = 0 is always invalid
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000010123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 2);
|
|
ck_assert_int_eq(res, 1);
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000000123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 0);
|
|
ck_assert_int_eq(res, 1);
|
|
// r >= order is always invalid
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd03641410123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 0);
|
|
ck_assert_int_eq(res, 1);
|
|
// check that overflow of r is handled
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("000000000000000000000000000000014551231950B75FC4402DA1722FC9BAEE0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"), digest, 2);
|
|
ck_assert_int_eq(res, 1);
|
|
// s = 0 is always invalid
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("00000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000"), digest, 0);
|
|
ck_assert_int_eq(res, 1);
|
|
// s >= order is always invalid
|
|
res = ecdsa_verify_digest_recover(curve, pubkey, fromhex("0000000000000000000000000000000000000000000000000000000000000002fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141"), digest, 0);
|
|
ck_assert_int_eq(res, 1);
|
|
}
|
|
END_TEST
|
|
|
|
#define test_deterministic(KEY, MSG, K) do { \
|
|
sha256_Raw((uint8_t *)MSG, strlen(MSG), buf); \
|
|
init_rfc6979(fromhex(KEY), buf, &rng); \
|
|
generate_k_rfc6979(&k, &rng); \
|
|
bn_write_be(&k, buf); \
|
|
ck_assert_mem_eq(buf, fromhex(K), 32); \
|
|
} while (0)
|
|
|
|
START_TEST(test_rfc6979)
|
|
{
|
|
bignum256 k;
|
|
uint8_t buf[32];
|
|
rfc6979_state rng;
|
|
|
|
test_deterministic("c9afa9d845ba75166b5c215767b1d6934e50c3db36e89b127b8a622b120f6721", "sample", "a6e3c57dd01abe90086538398355dd4c3b17aa873382b0f24d6129493d8aad60");
|
|
test_deterministic("cca9fbcc1b41e5a95d369eaa6ddcff73b61a4efaa279cfc6567e8daa39cbaf50", "sample", "2df40ca70e639d89528a6b670d9d48d9165fdc0febc0974056bdce192b8e16a3");
|
|
test_deterministic("0000000000000000000000000000000000000000000000000000000000000001", "Satoshi Nakamoto", "8f8a276c19f4149656b280621e358cce24f5f52542772691ee69063b74f15d15");
|
|
test_deterministic("fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140", "Satoshi Nakamoto", "33a19b60e25fb6f4435af53a3d42d493644827367e6453928554f43e49aa6f90");
|
|
test_deterministic("f8b8af8ce3c7cca5e300d33939540c10d45ce001b8f252bfbc57ba0342904181", "Alan Turing", "525a82b70e67874398067543fd84c83d30c175fdc45fdeee082fe13b1d7cfdf1");
|
|
test_deterministic("0000000000000000000000000000000000000000000000000000000000000001", "All those moments will be lost in time, like tears in rain. Time to die...", "38aa22d72376b4dbc472e06c3ba403ee0a394da63fc58d88686c611aba98d6b3");
|
|
test_deterministic("e91671c46231f833a6406ccbea0e3e392c76c167bac1cb013f6f1013980455c2", "There is a computer disease that anybody who works with computers knows about. It's a very serious disease and it interferes completely with the work. The trouble with computers is that you 'play' with them!", "1f4b84c23a86a221d233f2521be018d9318639d5b8bbd6374a8a59232d16ad3d");
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from http://www.inconteam.com/software-development/41-encryption/55-aes-test-vectors
|
|
START_TEST(test_aes)
|
|
{
|
|
aes_encrypt_ctx ctxe;
|
|
aes_decrypt_ctx ctxd;
|
|
uint8_t ibuf[16], obuf[16], iv[16], cbuf[16];
|
|
const char **ivp, **plainp, **cipherp;
|
|
|
|
// ECB
|
|
static const char *ecb_vector[] = {
|
|
// plain cipher
|
|
"6bc1bee22e409f96e93d7e117393172a", "f3eed1bdb5d2a03c064b5a7e3db181f8",
|
|
"ae2d8a571e03ac9c9eb76fac45af8e51", "591ccb10d410ed26dc5ba74a31362870",
|
|
"30c81c46a35ce411e5fbc1191a0a52ef", "b6ed21b99ca6f4f9f153e7b1beafed1d",
|
|
"f69f2445df4f9b17ad2b417be66c3710", "23304b7a39f9f3ff067d8d8f9e24ecc7",
|
|
0, 0,
|
|
};
|
|
plainp = ecb_vector;
|
|
cipherp = ecb_vector + 1;
|
|
while (*plainp && *cipherp) {
|
|
// encrypt
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(ibuf, fromhex(*plainp), 16);
|
|
aes_ecb_encrypt(ibuf, obuf, 16, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*cipherp), 16);
|
|
// decrypt
|
|
aes_decrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxd);
|
|
memcpy(ibuf, fromhex(*cipherp), 16);
|
|
aes_ecb_decrypt(ibuf, obuf, 16, &ctxd);
|
|
ck_assert_mem_eq(obuf, fromhex(*plainp), 16);
|
|
plainp += 2; cipherp += 2;
|
|
}
|
|
|
|
// CBC
|
|
static const char *cbc_vector[] = {
|
|
// iv plain cipher
|
|
"000102030405060708090A0B0C0D0E0F", "6bc1bee22e409f96e93d7e117393172a", "f58c4c04d6e5f1ba779eabfb5f7bfbd6",
|
|
"F58C4C04D6E5F1BA779EABFB5F7BFBD6", "ae2d8a571e03ac9c9eb76fac45af8e51", "9cfc4e967edb808d679f777bc6702c7d",
|
|
"9CFC4E967EDB808D679F777BC6702C7D", "30c81c46a35ce411e5fbc1191a0a52ef", "39f23369a9d9bacfa530e26304231461",
|
|
"39F23369A9D9BACFA530E26304231461", "f69f2445df4f9b17ad2b417be66c3710", "b2eb05e2c39be9fcda6c19078c6a9d1b",
|
|
0, 0, 0,
|
|
};
|
|
ivp = cbc_vector;
|
|
plainp = cbc_vector + 1;
|
|
cipherp = cbc_vector + 2;
|
|
while (*plainp && *cipherp) {
|
|
// encrypt
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*plainp), 16);
|
|
aes_cbc_encrypt(ibuf, obuf, 16, iv, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*cipherp), 16);
|
|
// decrypt
|
|
aes_decrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxd);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*cipherp), 16);
|
|
aes_cbc_decrypt(ibuf, obuf, 16, iv, &ctxd);
|
|
ck_assert_mem_eq(obuf, fromhex(*plainp), 16);
|
|
ivp += 3; plainp += 3; cipherp += 3;
|
|
}
|
|
|
|
// CFB
|
|
static const char *cfb_vector[] = {
|
|
"000102030405060708090A0B0C0D0E0F", "6bc1bee22e409f96e93d7e117393172a", "DC7E84BFDA79164B7ECD8486985D3860",
|
|
"DC7E84BFDA79164B7ECD8486985D3860", "ae2d8a571e03ac9c9eb76fac45af8e51", "39ffed143b28b1c832113c6331e5407b",
|
|
"39FFED143B28B1C832113C6331E5407B", "30c81c46a35ce411e5fbc1191a0a52ef", "df10132415e54b92a13ed0a8267ae2f9",
|
|
"DF10132415E54B92A13ED0A8267AE2F9", "f69f2445df4f9b17ad2b417be66c3710", "75a385741ab9cef82031623d55b1e471",
|
|
0, 0, 0,
|
|
};
|
|
ivp = cfb_vector;
|
|
plainp = cfb_vector + 1;
|
|
cipherp = cfb_vector + 2;
|
|
while (*plainp && *cipherp) {
|
|
// encrypt
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*plainp), 16);
|
|
aes_cfb_encrypt(ibuf, obuf, 16, iv, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*cipherp), 16);
|
|
// decrypt (uses encryption)
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*cipherp), 16);
|
|
aes_cfb_decrypt(ibuf, obuf, 16, iv, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*plainp), 16);
|
|
ivp += 3; plainp += 3; cipherp += 3;
|
|
}
|
|
|
|
// OFB
|
|
static const char *ofb_vector[] = {
|
|
"000102030405060708090A0B0C0D0E0F", "6bc1bee22e409f96e93d7e117393172a", "dc7e84bfda79164b7ecd8486985d3860",
|
|
"B7BF3A5DF43989DD97F0FA97EBCE2F4A", "ae2d8a571e03ac9c9eb76fac45af8e51", "4febdc6740d20b3ac88f6ad82a4fb08d",
|
|
"E1C656305ED1A7A6563805746FE03EDC", "30c81c46a35ce411e5fbc1191a0a52ef", "71ab47a086e86eedf39d1c5bba97c408",
|
|
"41635BE625B48AFC1666DD42A09D96E7", "f69f2445df4f9b17ad2b417be66c3710", "0126141d67f37be8538f5a8be740e484",
|
|
0, 0, 0,
|
|
};
|
|
ivp = ofb_vector;
|
|
plainp = ofb_vector + 1;
|
|
cipherp = ofb_vector + 2;
|
|
while (*plainp && *cipherp) {
|
|
// encrypt
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*plainp), 16);
|
|
aes_ofb_encrypt(ibuf, obuf, 16, iv, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*cipherp), 16);
|
|
// decrypt (uses encryption)
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
memcpy(iv, fromhex(*ivp), 16);
|
|
memcpy(ibuf, fromhex(*cipherp), 16);
|
|
aes_ofb_decrypt(ibuf, obuf, 16, iv, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*plainp), 16);
|
|
ivp += 3; plainp += 3; cipherp += 3;
|
|
}
|
|
|
|
// CTR
|
|
static const char *ctr_vector[] = {
|
|
// plain cipher
|
|
"6bc1bee22e409f96e93d7e117393172a", "601ec313775789a5b7a7f504bbf3d228",
|
|
"ae2d8a571e03ac9c9eb76fac45af8e51", "f443e3ca4d62b59aca84e990cacaf5c5",
|
|
"30c81c46a35ce411e5fbc1191a0a52ef", "2b0930daa23de94ce87017ba2d84988d",
|
|
"f69f2445df4f9b17ad2b417be66c3710", "dfc9c58db67aada613c2dd08457941a6",
|
|
0, 0,
|
|
};
|
|
// encrypt
|
|
plainp = ctr_vector;
|
|
cipherp = ctr_vector + 1;
|
|
memcpy(cbuf, fromhex("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"), 16);
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
while (*plainp && *cipherp) {
|
|
memcpy(ibuf, fromhex(*plainp), 16);
|
|
aes_ctr_encrypt(ibuf, obuf, 16, cbuf, aes_ctr_cbuf_inc, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*cipherp), 16);
|
|
plainp += 2; cipherp += 2;
|
|
}
|
|
// decrypt (uses encryption)
|
|
plainp = ctr_vector;
|
|
cipherp = ctr_vector + 1;
|
|
memcpy(cbuf, fromhex("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"), 16);
|
|
aes_encrypt_key256(fromhex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"), &ctxe);
|
|
while (*plainp && *cipherp) {
|
|
memcpy(ibuf, fromhex(*cipherp), 16);
|
|
aes_ctr_decrypt(ibuf, obuf, 16, cbuf, aes_ctr_cbuf_inc, &ctxe);
|
|
ck_assert_mem_eq(obuf, fromhex(*plainp), 16);
|
|
plainp += 2; cipherp += 2;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#define TEST1 "abc"
|
|
#define TEST2_1 \
|
|
"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"
|
|
#define TEST2_2a \
|
|
"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn"
|
|
#define TEST2_2b \
|
|
"hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu"
|
|
#define TEST2_2 TEST2_2a TEST2_2b
|
|
#define TEST3 "a" /* times 1000000 */
|
|
#define TEST4a "01234567012345670123456701234567"
|
|
#define TEST4b "01234567012345670123456701234567"
|
|
/* an exact multiple of 512 bits */
|
|
#define TEST4 TEST4a TEST4b /* times 10 */
|
|
|
|
#define TEST7_1 \
|
|
"\x49\xb2\xae\xc2\x59\x4b\xbe\x3a\x3b\x11\x75\x42\xd9\x4a\xc8"
|
|
#define TEST8_1 \
|
|
"\x9a\x7d\xfd\xf1\xec\xea\xd0\x6e\xd6\x46\xaa\x55\xfe\x75\x71\x46"
|
|
#define TEST9_1 \
|
|
"\x65\xf9\x32\x99\x5b\xa4\xce\x2c\xb1\xb4\xa2\xe7\x1a\xe7\x02\x20" \
|
|
"\xaa\xce\xc8\x96\x2d\xd4\x49\x9c\xbd\x7c\x88\x7a\x94\xea\xaa\x10" \
|
|
"\x1e\xa5\xaa\xbc\x52\x9b\x4e\x7e\x43\x66\x5a\x5a\xf2\xcd\x03\xfe" \
|
|
"\x67\x8e\xa6\xa5\x00\x5b\xba\x3b\x08\x22\x04\xc2\x8b\x91\x09\xf4" \
|
|
"\x69\xda\xc9\x2a\xaa\xb3\xaa\x7c\x11\xa1\xb3\x2a"
|
|
#define TEST10_1 \
|
|
"\xf7\x8f\x92\x14\x1b\xcd\x17\x0a\xe8\x9b\x4f\xba\x15\xa1\xd5\x9f" \
|
|
"\x3f\xd8\x4d\x22\x3c\x92\x51\xbd\xac\xbb\xae\x61\xd0\x5e\xd1\x15" \
|
|
"\xa0\x6a\x7c\xe1\x17\xb7\xbe\xea\xd2\x44\x21\xde\xd9\xc3\x25\x92" \
|
|
"\xbd\x57\xed\xea\xe3\x9c\x39\xfa\x1f\xe8\x94\x6a\x84\xd0\xcf\x1f" \
|
|
"\x7b\xee\xad\x17\x13\xe2\xe0\x95\x98\x97\x34\x7f\x67\xc8\x0b\x04" \
|
|
"\x00\xc2\x09\x81\x5d\x6b\x10\xa6\x83\x83\x6f\xd5\x56\x2a\x56\xca" \
|
|
"\xb1\xa2\x8e\x81\xb6\x57\x66\x54\x63\x1c\xf1\x65\x66\xb8\x6e\x3b" \
|
|
"\x33\xa1\x08\xb0\x53\x07\xc0\x0a\xff\x14\xa7\x68\xed\x73\x50\x60" \
|
|
"\x6a\x0f\x85\xe6\xa9\x1d\x39\x6f\x5b\x5c\xbe\x57\x7f\x9b\x38\x80" \
|
|
"\x7c\x7d\x52\x3d\x6d\x79\x2f\x6e\xbc\x24\xa4\xec\xf2\xb3\xa4\x27" \
|
|
"\xcd\xbb\xfb"
|
|
#define length(x) (sizeof(x)-1)
|
|
|
|
// test vectors from rfc-4634
|
|
START_TEST(test_sha1)
|
|
{
|
|
struct {
|
|
const char* test;
|
|
int length;
|
|
int repeatcount;
|
|
int extrabits;
|
|
int numberExtrabits;
|
|
const char* result;
|
|
} tests[] = {
|
|
/* 1 */ { TEST1, length(TEST1), 1, 0, 0,
|
|
"A9993E364706816ABA3E25717850C26C9CD0D89D" },
|
|
/* 2 */ { TEST2_1, length(TEST2_1), 1, 0, 0,
|
|
"84983E441C3BD26EBAAE4AA1F95129E5E54670F1" },
|
|
/* 3 */ { TEST3, length(TEST3), 1000000, 0, 0,
|
|
"34AA973CD4C4DAA4F61EEB2BDBAD27316534016F" },
|
|
/* 4 */ { TEST4, length(TEST4), 10, 0, 0,
|
|
"DEA356A2CDDD90C7A7ECEDC5EBB563934F460452" },
|
|
/* 5 */ { "", 0, 0, 0x98, 5,
|
|
"29826B003B906E660EFF4027CE98AF3531AC75BA" },
|
|
/* 6 */ { "\x5e", 1, 1, 0, 0,
|
|
"5E6F80A34A9798CAFC6A5DB96CC57BA4C4DB59C2" },
|
|
/* 7 */ { TEST7_1, length(TEST7_1), 1, 0x80, 3,
|
|
"6239781E03729919C01955B3FFA8ACB60B988340" },
|
|
/* 8 */ { TEST8_1, length(TEST8_1), 1, 0, 0,
|
|
"82ABFF6605DBE1C17DEF12A394FA22A82B544A35" },
|
|
/* 9 */ { TEST9_1, length(TEST9_1), 1, 0xE0, 3,
|
|
"8C5B2A5DDAE5A97FC7F9D85661C672ADBF7933D4" },
|
|
/* 10 */ { TEST10_1, length(TEST10_1), 1, 0, 0,
|
|
"CB0082C8F197D260991BA6A460E76E202BAD27B3" }
|
|
};
|
|
|
|
for (int i = 0; i < 10; i++) {
|
|
SHA1_CTX ctx;
|
|
uint8_t digest[SHA1_DIGEST_LENGTH];
|
|
sha1_Init(&ctx);
|
|
/* extra bits are not supported */
|
|
if (tests[i].numberExtrabits)
|
|
continue;
|
|
for (int j = 0; j < tests[i].repeatcount; j++) {
|
|
sha1_Update(&ctx, (const uint8_t*) tests[i].test, tests[i].length);
|
|
}
|
|
sha1_Final(&ctx, digest);
|
|
ck_assert_mem_eq(digest, fromhex(tests[i].result), SHA1_DIGEST_LENGTH);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#define TEST7_256 \
|
|
"\xbe\x27\x46\xc6\xdb\x52\x76\x5f\xdb\x2f\x88\x70\x0f\x9a\x73"
|
|
#define TEST8_256 \
|
|
"\xe3\xd7\x25\x70\xdc\xdd\x78\x7c\xe3\x88\x7a\xb2\xcd\x68\x46\x52"
|
|
#define TEST9_256 \
|
|
"\x3e\x74\x03\x71\xc8\x10\xc2\xb9\x9f\xc0\x4e\x80\x49\x07\xef\x7c" \
|
|
"\xf2\x6b\xe2\x8b\x57\xcb\x58\xa3\xe2\xf3\xc0\x07\x16\x6e\x49\xc1" \
|
|
"\x2e\x9b\xa3\x4c\x01\x04\x06\x91\x29\xea\x76\x15\x64\x25\x45\x70" \
|
|
"\x3a\x2b\xd9\x01\xe1\x6e\xb0\xe0\x5d\xeb\xa0\x14\xeb\xff\x64\x06" \
|
|
"\xa0\x7d\x54\x36\x4e\xff\x74\x2d\xa7\x79\xb0\xb3"
|
|
#define TEST10_256 \
|
|
"\x83\x26\x75\x4e\x22\x77\x37\x2f\x4f\xc1\x2b\x20\x52\x7a\xfe\xf0" \
|
|
"\x4d\x8a\x05\x69\x71\xb1\x1a\xd5\x71\x23\xa7\xc1\x37\x76\x00\x00" \
|
|
"\xd7\xbe\xf6\xf3\xc1\xf7\xa9\x08\x3a\xa3\x9d\x81\x0d\xb3\x10\x77" \
|
|
"\x7d\xab\x8b\x1e\x7f\x02\xb8\x4a\x26\xc7\x73\x32\x5f\x8b\x23\x74" \
|
|
"\xde\x7a\x4b\x5a\x58\xcb\x5c\x5c\xf3\x5b\xce\xe6\xfb\x94\x6e\x5b" \
|
|
"\xd6\x94\xfa\x59\x3a\x8b\xeb\x3f\x9d\x65\x92\xec\xed\xaa\x66\xca" \
|
|
"\x82\xa2\x9d\x0c\x51\xbc\xf9\x33\x62\x30\xe5\xd7\x84\xe4\xc0\xa4" \
|
|
"\x3f\x8d\x79\xa3\x0a\x16\x5c\xba\xbe\x45\x2b\x77\x4b\x9c\x71\x09" \
|
|
"\xa9\x7d\x13\x8f\x12\x92\x28\x96\x6f\x6c\x0a\xdc\x10\x6a\xad\x5a" \
|
|
"\x9f\xdd\x30\x82\x57\x69\xb2\xc6\x71\xaf\x67\x59\xdf\x28\xeb\x39" \
|
|
"\x3d\x54\xd6"
|
|
|
|
// test vectors from rfc-4634
|
|
START_TEST(test_sha256)
|
|
{
|
|
struct {
|
|
const char* test;
|
|
int length;
|
|
int repeatcount;
|
|
int extrabits;
|
|
int numberExtrabits;
|
|
const char* result;
|
|
} tests[] = {
|
|
/* 1 */ { TEST1, length(TEST1), 1, 0, 0, "BA7816BF8F01CFEA4141"
|
|
"40DE5DAE2223B00361A396177A9CB410FF61F20015AD" },
|
|
/* 2 */ { TEST2_1, length(TEST2_1), 1, 0, 0, "248D6A61D20638B8"
|
|
"E5C026930C3E6039A33CE45964FF2167F6ECEDD419DB06C1" },
|
|
/* 3 */ { TEST3, length(TEST3), 1000000, 0, 0, "CDC76E5C9914FB92"
|
|
"81A1C7E284D73E67F1809A48A497200E046D39CCC7112CD0" },
|
|
/* 4 */ { TEST4, length(TEST4), 10, 0, 0, "594847328451BDFA"
|
|
"85056225462CC1D867D877FB388DF0CE35F25AB5562BFBB5" },
|
|
/* 5 */ { "", 0, 0, 0x68, 5, "D6D3E02A31A84A8CAA9718ED6C2057BE"
|
|
"09DB45E7823EB5079CE7A573A3760F95" },
|
|
/* 6 */ { "\x19", 1, 1, 0, 0, "68AA2E2EE5DFF96E3355E6C7EE373E3D"
|
|
"6A4E17F75F9518D843709C0C9BC3E3D4" },
|
|
/* 7 */ { TEST7_256, length(TEST7_256), 1, 0x60, 3, "77EC1DC8"
|
|
"9C821FF2A1279089FA091B35B8CD960BCAF7DE01C6A7680756BEB972" },
|
|
/* 8 */ { TEST8_256, length(TEST8_256), 1, 0, 0, "175EE69B02BA"
|
|
"9B58E2B0A5FD13819CEA573F3940A94F825128CF4209BEABB4E8" },
|
|
/* 9 */ { TEST9_256, length(TEST9_256), 1, 0xA0, 3, "3E9AD646"
|
|
"8BBBAD2AC3C2CDC292E018BA5FD70B960CF1679777FCE708FDB066E9" },
|
|
/* 10 */ { TEST10_256, length(TEST10_256), 1, 0, 0, "97DBCA7D"
|
|
"F46D62C8A422C941DD7E835B8AD3361763F7E9B2D95F4F0DA6E1CCBC" },
|
|
};
|
|
|
|
for (int i = 0; i < 10; i++) {
|
|
SHA256_CTX ctx;
|
|
uint8_t digest[SHA256_DIGEST_LENGTH];
|
|
sha256_Init(&ctx);
|
|
/* extra bits are not supported */
|
|
if (tests[i].numberExtrabits)
|
|
continue;
|
|
for (int j = 0; j < tests[i].repeatcount; j++) {
|
|
sha256_Update(&ctx, (const uint8_t*) tests[i].test, tests[i].length);
|
|
}
|
|
sha256_Final(&ctx, digest);
|
|
ck_assert_mem_eq(digest, fromhex(tests[i].result), SHA256_DIGEST_LENGTH);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#define TEST7_512 \
|
|
"\x08\xec\xb5\x2e\xba\xe1\xf7\x42\x2d\xb6\x2b\xcd\x54\x26\x70"
|
|
#define TEST8_512 \
|
|
"\x8d\x4e\x3c\x0e\x38\x89\x19\x14\x91\x81\x6e\x9d\x98\xbf\xf0\xa0"
|
|
#define TEST9_512 \
|
|
"\x3a\xdd\xec\x85\x59\x32\x16\xd1\x61\x9a\xa0\x2d\x97\x56\x97\x0b" \
|
|
"\xfc\x70\xac\xe2\x74\x4f\x7c\x6b\x27\x88\x15\x10\x28\xf7\xb6\xa2" \
|
|
"\x55\x0f\xd7\x4a\x7e\x6e\x69\xc2\xc9\xb4\x5f\xc4\x54\x96\x6d\xc3" \
|
|
"\x1d\x2e\x10\xda\x1f\x95\xce\x02\xbe\xb4\xbf\x87\x65\x57\x4c\xbd" \
|
|
"\x6e\x83\x37\xef\x42\x0a\xdc\x98\xc1\x5c\xb6\xd5\xe4\xa0\x24\x1b" \
|
|
"\xa0\x04\x6d\x25\x0e\x51\x02\x31\xca\xc2\x04\x6c\x99\x16\x06\xab" \
|
|
"\x4e\xe4\x14\x5b\xee\x2f\xf4\xbb\x12\x3a\xab\x49\x8d\x9d\x44\x79" \
|
|
"\x4f\x99\xcc\xad\x89\xa9\xa1\x62\x12\x59\xed\xa7\x0a\x5b\x6d\xd4" \
|
|
"\xbd\xd8\x77\x78\xc9\x04\x3b\x93\x84\xf5\x49\x06"
|
|
#define TEST10_512 \
|
|
"\xa5\x5f\x20\xc4\x11\xaa\xd1\x32\x80\x7a\x50\x2d\x65\x82\x4e\x31" \
|
|
"\xa2\x30\x54\x32\xaa\x3d\x06\xd3\xe2\x82\xa8\xd8\x4e\x0d\xe1\xde" \
|
|
"\x69\x74\xbf\x49\x54\x69\xfc\x7f\x33\x8f\x80\x54\xd5\x8c\x26\xc4" \
|
|
"\x93\x60\xc3\xe8\x7a\xf5\x65\x23\xac\xf6\xd8\x9d\x03\xe5\x6f\xf2" \
|
|
"\xf8\x68\x00\x2b\xc3\xe4\x31\xed\xc4\x4d\xf2\xf0\x22\x3d\x4b\xb3" \
|
|
"\xb2\x43\x58\x6e\x1a\x7d\x92\x49\x36\x69\x4f\xcb\xba\xf8\x8d\x95" \
|
|
"\x19\xe4\xeb\x50\xa6\x44\xf8\xe4\xf9\x5e\xb0\xea\x95\xbc\x44\x65" \
|
|
"\xc8\x82\x1a\xac\xd2\xfe\x15\xab\x49\x81\x16\x4b\xbb\x6d\xc3\x2f" \
|
|
"\x96\x90\x87\xa1\x45\xb0\xd9\xcc\x9c\x67\xc2\x2b\x76\x32\x99\x41" \
|
|
"\x9c\xc4\x12\x8b\xe9\xa0\x77\xb3\xac\xe6\x34\x06\x4e\x6d\x99\x28" \
|
|
"\x35\x13\xdc\x06\xe7\x51\x5d\x0d\x73\x13\x2e\x9a\x0d\xc6\xd3\xb1" \
|
|
"\xf8\xb2\x46\xf1\xa9\x8a\x3f\xc7\x29\x41\xb1\xe3\xbb\x20\x98\xe8" \
|
|
"\xbf\x16\xf2\x68\xd6\x4f\x0b\x0f\x47\x07\xfe\x1e\xa1\xa1\x79\x1b" \
|
|
"\xa2\xf3\xc0\xc7\x58\xe5\xf5\x51\x86\x3a\x96\xc9\x49\xad\x47\xd7" \
|
|
"\xfb\x40\xd2"
|
|
|
|
// test vectors from rfc-4634
|
|
START_TEST(test_sha512)
|
|
{
|
|
struct {
|
|
const char* test;
|
|
int length;
|
|
int repeatcount;
|
|
int extrabits;
|
|
int numberExtrabits;
|
|
const char* result;
|
|
} tests[] = {
|
|
/* 1 */ { TEST1, length(TEST1), 1, 0, 0,
|
|
"DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA2"
|
|
"0A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD"
|
|
"454D4423643CE80E2A9AC94FA54CA49F" },
|
|
/* 2 */ { TEST2_2, length(TEST2_2), 1, 0, 0,
|
|
"8E959B75DAE313DA8CF4F72814FC143F8F7779C6EB9F7FA1"
|
|
"7299AEADB6889018501D289E4900F7E4331B99DEC4B5433A"
|
|
"C7D329EEB6DD26545E96E55B874BE909" },
|
|
/* 3 */ { TEST3, length(TEST3), 1000000, 0, 0,
|
|
"E718483D0CE769644E2E42C7BC15B4638E1F98B13B204428"
|
|
"5632A803AFA973EBDE0FF244877EA60A4CB0432CE577C31B"
|
|
"EB009C5C2C49AA2E4EADB217AD8CC09B" },
|
|
/* 4 */ { TEST4, length(TEST4), 10, 0, 0,
|
|
"89D05BA632C699C31231DED4FFC127D5A894DAD412C0E024"
|
|
"DB872D1ABD2BA8141A0F85072A9BE1E2AA04CF33C765CB51"
|
|
"0813A39CD5A84C4ACAA64D3F3FB7BAE9" },
|
|
/* 5 */ { "", 0, 0, 0xB0, 5,
|
|
"D4EE29A9E90985446B913CF1D1376C836F4BE2C1CF3CADA0"
|
|
"720A6BF4857D886A7ECB3C4E4C0FA8C7F95214E41DC1B0D2"
|
|
"1B22A84CC03BF8CE4845F34DD5BDBAD4" },
|
|
/* 6 */ { "\xD0", 1, 1, 0, 0,
|
|
"9992202938E882E73E20F6B69E68A0A7149090423D93C81B"
|
|
"AB3F21678D4ACEEEE50E4E8CAFADA4C85A54EA8306826C4A"
|
|
"D6E74CECE9631BFA8A549B4AB3FBBA15" },
|
|
/* 7 */ { TEST7_512, length(TEST7_512), 1, 0x80, 3,
|
|
"ED8DC78E8B01B69750053DBB7A0A9EDA0FB9E9D292B1ED71"
|
|
"5E80A7FE290A4E16664FD913E85854400C5AF05E6DAD316B"
|
|
"7359B43E64F8BEC3C1F237119986BBB6" },
|
|
/* 8 */ { TEST8_512, length(TEST8_512), 1, 0, 0,
|
|
"CB0B67A4B8712CD73C9AABC0B199E9269B20844AFB75ACBD"
|
|
"D1C153C9828924C3DDEDAAFE669C5FDD0BC66F630F677398"
|
|
"8213EB1B16F517AD0DE4B2F0C95C90F8" },
|
|
/* 9 */ { TEST9_512, length(TEST9_512), 1, 0x80, 3,
|
|
"32BA76FC30EAA0208AEB50FFB5AF1864FDBF17902A4DC0A6"
|
|
"82C61FCEA6D92B783267B21080301837F59DE79C6B337DB2"
|
|
"526F8A0A510E5E53CAFED4355FE7C2F1" },
|
|
/* 10 */ { TEST10_512, length(TEST10_512), 1, 0, 0,
|
|
"C665BEFB36DA189D78822D10528CBF3B12B3EEF726039909"
|
|
"C1A16A270D48719377966B957A878E720584779A62825C18"
|
|
"DA26415E49A7176A894E7510FD1451F5" }
|
|
};
|
|
|
|
for (int i = 0; i < 10; i++) {
|
|
SHA512_CTX ctx;
|
|
uint8_t digest[SHA512_DIGEST_LENGTH];
|
|
sha512_Init(&ctx);
|
|
/* extra bits are not supported */
|
|
if (tests[i].numberExtrabits)
|
|
continue;
|
|
for (int j = 0; j < tests[i].repeatcount; j++) {
|
|
sha512_Update(&ctx, (const uint8_t*) tests[i].test, tests[i].length);
|
|
}
|
|
sha512_Final(&ctx, digest);
|
|
ck_assert_mem_eq(digest, fromhex(tests[i].result), SHA512_DIGEST_LENGTH);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from http://www.di-mgt.com.au/sha_testvectors.html
|
|
START_TEST(test_sha3_256)
|
|
{
|
|
uint8_t digest[SHA3_256_DIGEST_LENGTH];
|
|
|
|
sha3_256((uint8_t *)"", 0, digest);
|
|
ck_assert_mem_eq(digest, fromhex("a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a"), SHA3_256_DIGEST_LENGTH);
|
|
|
|
sha3_256((uint8_t *)"abc", 3, digest);
|
|
ck_assert_mem_eq(digest, fromhex("3a985da74fe225b2045c172d6bd390bd855f086e3e9d525b46bfe24511431532"), SHA3_256_DIGEST_LENGTH);
|
|
|
|
sha3_256((uint8_t *)"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, digest);
|
|
ck_assert_mem_eq(digest, fromhex("41c0dba2a9d6240849100376a8235e2c82e1b9998a999e21db32dd97496d3376"), SHA3_256_DIGEST_LENGTH);
|
|
|
|
sha3_256((uint8_t *)"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, digest);
|
|
ck_assert_mem_eq(digest, fromhex("916f6061fe879741ca6469b43971dfdb28b1a32dc36cb3254e812be27aad1d18"), SHA3_256_DIGEST_LENGTH);
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from http://www.di-mgt.com.au/sha_testvectors.html
|
|
START_TEST(test_sha3_512)
|
|
{
|
|
uint8_t digest[SHA3_512_DIGEST_LENGTH];
|
|
|
|
sha3_512((uint8_t *)"", 0, digest);
|
|
ck_assert_mem_eq(digest, fromhex("a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26"), SHA3_512_DIGEST_LENGTH);
|
|
|
|
sha3_512((uint8_t *)"abc", 3, digest);
|
|
ck_assert_mem_eq(digest, fromhex("b751850b1a57168a5693cd924b6b096e08f621827444f70d884f5d0240d2712e10e116e9192af3c91a7ec57647e3934057340b4cf408d5a56592f8274eec53f0"), SHA3_512_DIGEST_LENGTH);
|
|
|
|
sha3_512((uint8_t *)"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, digest);
|
|
ck_assert_mem_eq(digest, fromhex("04a371e84ecfb5b8b77cb48610fca8182dd457ce6f326a0fd3d7ec2f1e91636dee691fbe0c985302ba1b0d8dc78c086346b533b49c030d99a27daf1139d6e75e"), SHA3_512_DIGEST_LENGTH);
|
|
|
|
sha3_512((uint8_t *)"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, digest);
|
|
ck_assert_mem_eq(digest, fromhex("afebb2ef542e6579c50cad06d2e578f9f8dd6881d7dc824d26360feebf18a4fa73e3261122948efcfd492e74e82e2189ed0fb440d187f382270cb455f21dd185"), SHA3_512_DIGEST_LENGTH);
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://raw.githubusercontent.com/NemProject/nem-test-vectors/master/0.test-sha3-256.dat
|
|
START_TEST(test_keccak_256)
|
|
{
|
|
static const struct {
|
|
const char *hash;
|
|
size_t length;
|
|
const char *data;
|
|
} tests[] = {
|
|
{ "4e9e79ab7434f6c7401fb3305d55052ee829b9e46d5d05d43b59fefb32e9a619", 293, "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", },
|
|
{ "c1268babc42d00c3463dc388222100f7e525a74a64665c39f112f788ddb5da42", 376, "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", },
|
|
{ "e83b50e8c83cb676a7dd64c055f53e5110d5a4c62245ceb8f683fd87b2b3ec77", 166, "c070a957550b7b34113ee6543a1918d96d241f27123425db7f7b9004e047ffbe05612e7fa8c54b23c83ea427e625e97b7a28b09a70bf6d91e478eeed01d7907931c29ea86e70f2cdcfb243ccf7f24a1619abf4b5b9e6f75cbf63fc02baf4a820a9790a6b053e50fd94e0ed57037cfc2bab4d95472b97d3c25f434f1cc0b1ede5ba7f15907a42a223933e5e2dfcb518c3531975268c326d60fa911fbb7997eee3ba87656c4fe7", },
|
|
{ "8ebd2c9d4ff00e285a9b6b140bfc3cef672016f0098100e1f6f250220af7ce1a", 224, "b502fbdce4045e49e147eff5463d4b3f37f43461518868368e2c78008c84c2db79d12b58107034f67e7d0abfee67add0342dd23dce623f26b9156def87b1d7ac15a6e07301f832610fe869ada13a2b0e3d60aa6bb81bc04487e2e800f5106b0402ee0331df745e021b5ea5e32faf1c7fc1322041d221a54191c0af19948b5f34411937182e30d5cd39b5a6c959d77d92d21bb1de51f1b3411cb6eec00600429916227fb62d2c88e69576f4ac8e5efcde8efa512cc80ce7fb0dfaa6c74d26e898cefe9d4f7dce232a69f2a6a9477aa08366efcdfca117c89cb79eba15a23755e0", },
|
|
{ "db3961fdddd0c314289efed5d57363459a6700a7bd015e7a03d3e1d03f046401", 262, "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", },
|
|
{ "25dd3acacd6bf688c0eace8d33eb7cc550271969142deb769a05b4012f7bb722", 122, "99e7f6e0ed46ec866c43a1ab494998d47e9309a79fde2a629eb63bb2160a5ffd0f2206de9c32dd20e9b23e57ab7422cf82971cc2873ec0e173fe93281c7b33e1c76ac79223a6f435f230bdd30260c00d00986c72a399d3ba70f6e783d834bbf8a6127844def559b8b6db742b2cfd715f7ff29e7b42bf7d567beb", },
|
|
{ "00d747c9045c093484290afc161437f11c2ddf5f8a9fc2acae9c7ef5fcf511e5", 440, "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", },
|
|
{ "dadcde7c3603ef419d319ba3d50cf00ad57f3e81566fd11b9b6f461cbb9dcb0f", 338, "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", },
|
|
{ "d184e84a2507fc0f187b640dd5b849a366c0383d9cbdbc6fa30904f054111255", 141, "13b8df9c1bcfddd0aa39b3055f52e2bc36562b6677535994b173f07041d141699db42589d6091ef0e71b645b41ab57577f58c98da966562d24823158f8e1d43b54edea4e61dd66fe8c59ad8405f5a0d9a3eb509a77ae3d8ae4adf926fd3d8d31c3dcccfc140814541010937024cc554e1daaee1b333a66316e7fbebb07ac8dfb134a918b9090b14168012c4824", },
|
|
{ "20c19635364a00b151d0168fe5ae03bac6dd7d06030475b40d2e8c577a192f53", 84, "e1e96da4b7d8dcc2b316006503a990ea26a5b200cb7a7edfc14f5ce827f06d8d232ec95b1acdc1422ffc16da11d258f0c7b378f026d64c74b2fb41df8bfd3cd30066caecdc6f76c8163de9309d9fd0cf33d54a29", },
|
|
{ "86cc2c428d469e43fb4ee8d38dffbf5128d20d1659dbc45edf4a855399ca730e", 319, "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", },
|
|
{ "e80eee72a76e6957f7cb7f68c41b92f0ad9aac6e58aa8fc272c1e7364af11c70", 108, "3c210ed15889ae938781d2cebd49d4a8007f163ffba1f7669bccdccf6ad5a1418299d5f4348f5cd03b0ba9e6999ab154e46836c3546feb395d17bcc60f23d7ba0e8efe6aa616c00b6bf552fe1cb5e28e3e7bc39dfc20c63ae3901035e91ddd110e43fe59ed744beeedb6bc1e", },
|
|
{ "f971bbae97dd8a034835269fb246867de358a889de6de13672e771d6fb4c89b7", 468, "64e9a3a99c021df8bea59368cfe1cd3b0a4aca33ffcd5cf6028d9307c0b904b8037d056a3c12803f196f74c4d360a3132452d365922b1157e5b0d76f91fb94bebfdcb4d50fa23ed5be3d3c5712219e8666debc8abcd5e6c69a542761a6cbbd1b3c0f0524875204b64d2788465f90cb19b6f6da9f8bec6d6e684196e713549ec83e47cbaeff77838ac4936b312562e2de17c970449d49d214ec2597c6d4f642e6c94a613a0c53285abccd7794a3d72241808594fb4e6e4d5d2c310ef1cdcbfd34805ca2408f554797a6cfd49d0f25ed8927f206acb127e6436e1234902489ec2e7f3058e26c0eba80341bc7ad0da8b8bd80bd1b43c9099269e3f8b68445c69b79d8cf5693d4a0d47a44f9e9114dbb33992d2ea9d3b5b86e4ea57a44a638848de4ac365bb6bb7855305ade62b07ebf0954d70b7c2fb5e6fcc154c7a36fb1756df5f20a84d35696627ebf22d44f40f805c0878ad110bc17dcd66821084ca87902e05bc0afa61161086956b85a6ea900d35c7784d4c361a43fe294e267d5762408be58962cdb4f45a9c0efd7d2335916df3acb98ccfbcf5ee39530540e5f3d3c5f3326a9a536d7bfa37aae2b143e2499b81bf0670e3a418c26c7dc82b293d9bd182dd6435670514237df88d8286e19ce93e0a0db2790", },
|
|
{ "b97fd51f4e4eaa40c7a2853010fc46be5be2f43b9520ea0c533b68f728c978a2", 214, "ced3a43193caceb269d2517f4ecb892bb7d57d7201869e28e669b0b17d1c44d286e02734e2210ea9009565832975cc6303b9b6008fe1165b99ae5f1b29962ef042ebad8b676d7433ed2fe0d0d6f4f32b2cb4c519da61552328c2caea799bb2fd907308173a1cd2b798fb0df7d2eaf2ff0be733af74f42889e211843fc80b09952ae7eb246725b91d31c1f7a5503fdf3bc9c269c76519cf2dc3225e862436b587bb74adbad88c773056cfea3bddb1f6533c01125eeae0986e5c817359912c9d0472bf8320b824ee097f82a8e05b9f53a5be7d153225de", },
|
|
{ "f0fecf766e4f7522568b3be71843cce3e5fcb10ea96b1a236c8c0a71c9ad55c9", 159, "8aca4de41275f5c4102f66266d70cff1a2d56f58df8d12061c64cb6cd8f616a5bf19c2bb3c91585c695326f561a2d0eb4eef2e202d82dcc9089e4bee82b62a199a11963cd08987d3abd5914def2cdd3c1e4748d46b654f338e3959121e869c18d5327e88090d0ba0ac6762a2b14514cc505af7499f1a22f421dbe978494f9ffe1e88f1c59228f21da5bc9fcc911d022300a443bca17258bdd6cfbbf52fde61", },
|
|
{ "5c4f16043c0084bf98499fc7dc4d674ce9c730b7135210acdbf5e41d3dcf317b", 87, "01bbc193d0ee2396a7d8267ad63f18149667b31d8f7f48c8bb0c634755febc9ef1a79e93c475f6cd137ee37d4dc243ea2fdcdc0d098844af2208337b7bbf6930e39e74e23952ac1a19b4d38b83810a10c3b069e4fafb06", },
|
|
{ "14b61fc981f7d9449b7b6a2d57eb48cc8f7896f4dced2005291b2a2f38cb4a63", 358, "cbc1709a531438d5ead32cea20a9e4ddc0101ec555ab42b2e378145013cc05a97b9e2c43c89bfa63ae5e9e9ce1fc022035c6b68f0a906ee1f53396d9dbe41cb2bc4bfeb144b005b0f40e0fec872d9c4aca9929ba3cbacd84c58ab43c26f10d345a24692bbd55a76506876768e8e32a461bf160cee953da88920d36ad4aff6eea7126aa6f44a7a6fce770ce43f0f90a20590bdaad3ffcda30ca8e3700f832c62caa5df030c16bcf74aff492466f781eb69863a80663535fc154abd7cfdd02eef1019221cf608b9780f807e507fbbf559b1dfe4e971b4d08fe45263a3c697ba90f9f71bec97e12438b4b12f6a84ab66872b888097089d76c9c2502d9ed2eece6bef8eee1d439782e218f5cc75d38f9886012cdcb4bbe6caf812e97c5a336bcceae38b1109e3243a291ce23d097aaee7d9a711de6886749a7a6d15d7e7cbc4a51b1b4da9fcf139e4a6fd7dc0bc017db624b17fc9b8f847592ed42467c25ad9fe96acbf20c0ffd18", },
|
|
{ "47ec7f3a362becbb110867995a0f066a66152603c4d433f11bf51870c67e2864", 354, "0636983353c9ea3f75256ed00b70e8b7cfc6f4e4c0ba3aa9a8da59b6e6ad9dfb5bc2c49f48cc0b4237f87dedf34b888e54ecebf1d435bcd4aab72eb4ce39e5262fb68c6f86423dac123bf59e903989eda7df4a982822d0831521403cedcfe9a5bbea648bb2e7ef8cd81442ea5abe468b3ee8b06376ef8099447255c2fdc1b73af37fe0e0b852ffbc9339868db756680db99e6e9837dbd28c39a69f229044ad7ec772524a6e01f679d25fdc2e736a2418e5dfd7c2ab1348d0f821b777c975244c6cfc2fca5c36ccae7cf1d07b190a9d17a088a1276bd096250b92f53b29b6ef88ef69d744b56fb2ec5078cc0b68a9106943ef242b466097b9e29df11eb5cb0c06c29d7917410ba1097215d6aa4dafd90adff0c3e7221b9e8832613bd9aca8bcc6b2aa7b43acedcbc11aee1b5ba56f77a210be7cf3485ee813e1126c3eeccd8419bbf22c412cad32cc0fc7a73aca4e379651caac3d13d6cf5ca05508fd2d96f3ad94e7", },
|
|
{ "73778e7f1943646a89d3c78909e0afbe584071ba5230546a39cd73e44e36d78a", 91, "6217504a26b3395855eab6ddeb79f2e3490d74b80eff343721150ee0c1c02b07186743589f93c22a03dc5ed29fb5bf592de0a089763e83e5b95f9dd524d66c8da3e04c1814e65e68b2810c1b517648aabc266ad62896c51864a7f4", },
|
|
{ "35ef6868e750cf0c1d5285992c231d93ec644670fb79cf85324067a9f77fde78", 185, "0118b7fb15f927a977e0b330b4fa351aeeec299d6ba090eb16e5114fc4a6749e5915434a123c112697390c96ea2c26dc613eb5c75f5ecfb6c419317426367e34da0ddc6d7b7612cefa70a22fea0025f5186593b22449dab71f90a49f7de7352e54e0c0bd8837e661ca2127c3313a7268cafdd5ccfbf3bdd7c974b0e7551a2d96766579ef8d2e1f376af74cd1ab62162fc2dc61a8b7ed4163c1caccf20ed73e284da2ed257ec974eee96b502acb2c60a04886465e44debb0317", },
|
|
};
|
|
|
|
uint8_t hash[SHA3_256_DIGEST_LENGTH];
|
|
|
|
for (size_t i = 0; i < (sizeof(tests) / sizeof(*tests)); i++) {
|
|
keccak_256(fromhex(tests[i].data), tests[i].length, hash);
|
|
ck_assert_mem_eq(hash, fromhex(tests[i].hash), SHA3_256_DIGEST_LENGTH);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://raw.githubusercontent.com/BLAKE2/BLAKE2/master/testvectors/blake2b-kat.txt
|
|
START_TEST(test_blake2b)
|
|
{
|
|
uint8_t key[BLAKE2B_KEY_LENGTH];
|
|
memcpy(key, fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f"), BLAKE2B_KEY_LENGTH);
|
|
|
|
uint8_t digest[BLAKE2B_DIGEST_LENGTH];
|
|
|
|
blake2b_Key((uint8_t *)"", 0, key, BLAKE2B_KEY_LENGTH, digest, BLAKE2B_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("10ebb67700b1868efb4417987acf4690ae9d972fb7a590c2f02871799aaa4786b5e996e8f0f4eb981fc214b005f42d2ff4233499391653df7aefcbc13fc51568"), BLAKE2B_DIGEST_LENGTH);
|
|
|
|
blake2b_Key(fromhex("000102"), 3, key, BLAKE2B_KEY_LENGTH, digest, BLAKE2B_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("33d0825dddf7ada99b0e7e307104ad07ca9cfd9692214f1561356315e784f3e5a17e364ae9dbb14cb2036df932b77f4b292761365fb328de7afdc6d8998f5fc1"), BLAKE2B_DIGEST_LENGTH);
|
|
|
|
blake2b_Key(fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637"), 56, key, BLAKE2B_KEY_LENGTH, digest, BLAKE2B_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("f8f3726ac5a26cc80132493a6fedcb0e60760c09cfc84cad178175986819665e76842d7b9fedf76dddebf5d3f56faaad4477587af21606d396ae570d8e719af2"), BLAKE2B_DIGEST_LENGTH);
|
|
|
|
blake2b_Key(fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f"), 112, key, BLAKE2B_KEY_LENGTH, digest, BLAKE2B_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("227e3aed8d2cb10b918fcb04f9de3e6d0a57e08476d93759cd7b2ed54a1cbf0239c528fb04bbf288253e601d3bc38b21794afef90b17094a182cac557745e75f"), BLAKE2B_DIGEST_LENGTH);
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://raw.githubusercontent.com/BLAKE2/BLAKE2/master/testvectors/blake2s-kat.txt
|
|
START_TEST(test_blake2s)
|
|
{
|
|
uint8_t key[BLAKE2S_KEY_LENGTH];
|
|
memcpy(key, fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"), BLAKE2S_KEY_LENGTH);
|
|
|
|
uint8_t digest[BLAKE2S_DIGEST_LENGTH];
|
|
|
|
blake2s_Key((uint8_t *)"", 0, key, BLAKE2S_KEY_LENGTH, digest, BLAKE2S_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("48a8997da407876b3d79c0d92325ad3b89cbb754d86ab71aee047ad345fd2c49"), BLAKE2S_DIGEST_LENGTH);
|
|
|
|
blake2s_Key(fromhex("000102"), 3, key, BLAKE2S_KEY_LENGTH, digest, BLAKE2S_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("1d220dbe2ee134661fdf6d9e74b41704710556f2f6e5a091b227697445dbea6b"), BLAKE2S_DIGEST_LENGTH);
|
|
|
|
blake2s_Key(fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637"), 56, key, BLAKE2S_KEY_LENGTH, digest, BLAKE2S_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("2966b3cfae1e44ea996dc5d686cf25fa053fb6f67201b9e46eade85d0ad6b806"), BLAKE2S_DIGEST_LENGTH);
|
|
|
|
blake2s_Key(fromhex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f"), 112, key, BLAKE2S_KEY_LENGTH, digest, BLAKE2S_DIGEST_LENGTH);
|
|
ck_assert_mem_eq(digest, fromhex("90a83585717b75f0e9b725e055eeeeb9e7a028ea7e6cbc07b20917ec0363e38c"), BLAKE2S_DIGEST_LENGTH);
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://stackoverflow.com/questions/5130513/pbkdf2-hmac-sha2-test-vectors
|
|
START_TEST(test_pbkdf2_hmac_sha256)
|
|
{
|
|
uint8_t k[40], s[40];
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha256((uint8_t *)"password", 8, s, 4, 1, k);
|
|
ck_assert_mem_eq(k, fromhex("120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b"), 32);
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha256((uint8_t *)"password", 8, s, 4, 2, k);
|
|
ck_assert_mem_eq(k, fromhex("ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43"), 32);
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha256((uint8_t *)"password", 8, s, 4, 4096, k);
|
|
ck_assert_mem_eq(k, fromhex("c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a"), 32);
|
|
|
|
strcpy((char *)s, "saltSALTsaltSALTsaltSALTsaltSALTsalt");
|
|
pbkdf2_hmac_sha256((uint8_t *)"passwordPASSWORDpassword", 3*8, s, 9*4, 4096, k);
|
|
ck_assert_mem_eq(k, fromhex("348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1"), 32);
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from http://stackoverflow.com/questions/15593184/pbkdf2-hmac-sha-512-test-vectors
|
|
START_TEST(test_pbkdf2_hmac_sha512)
|
|
{
|
|
uint8_t k[64], s[40];
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha512((uint8_t *)"password", 8, s, 4, 1, k);
|
|
ck_assert_mem_eq(k, fromhex("867f70cf1ade02cff3752599a3a53dc4af34c7a669815ae5d513554e1c8cf252c02d470a285a0501bad999bfe943c08f050235d7d68b1da55e63f73b60a57fce"), 64);
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha512((uint8_t *)"password", 8, s, 4, 2, k);
|
|
ck_assert_mem_eq(k, fromhex("e1d9c16aa681708a45f5c7c4e215ceb66e011a2e9f0040713f18aefdb866d53cf76cab2868a39b9f7840edce4fef5a82be67335c77a6068e04112754f27ccf4e"), 64);
|
|
|
|
strcpy((char *)s, "salt");
|
|
pbkdf2_hmac_sha512((uint8_t *)"password", 8, s, 4, 4096, k);
|
|
ck_assert_mem_eq(k, fromhex("d197b1b33db0143e018b12f3d1d1479e6cdebdcc97c5c0f87f6902e072f457b5143f30602641b3d55cd335988cb36b84376060ecd532e039b742a239434af2d5"), 64);
|
|
|
|
strcpy((char *)s, "saltSALTsaltSALTsaltSALTsaltSALTsalt");
|
|
pbkdf2_hmac_sha512((uint8_t *)"passwordPASSWORDpassword", 3*8, s, 9*4, 4096, k);
|
|
ck_assert_mem_eq(k, fromhex("8c0511f4c6e597c6ac6315d8f0362e225f3c501495ba23b868c005174dc4ee71115b59f9e60cd9532fa33e0f75aefe30225c583a186cd82bd4daea9724a3d3b8"), 64);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_mnemonic)
|
|
{
|
|
static const char *vectors[] = {
|
|
"00000000000000000000000000000000",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
|
"c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04",
|
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
|
"legal winner thank year wave sausage worth useful legal winner thank yellow",
|
|
"2e8905819b8723fe2c1d161860e5ee1830318dbf49a83bd451cfb8440c28bd6fa457fe1296106559a3c80937a1c1069be3a3a5bd381ee6260e8d9739fce1f607",
|
|
"80808080808080808080808080808080",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage above",
|
|
"d71de856f81a8acc65e6fc851a38d4d7ec216fd0796d0a6827a3ad6ed5511a30fa280f12eb2e47ed2ac03b5c462a0358d18d69fe4f985ec81778c1b370b652a8",
|
|
"ffffffffffffffffffffffffffffffff",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong",
|
|
"ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069",
|
|
"000000000000000000000000000000000000000000000000",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent",
|
|
"035895f2f481b1b0f01fcf8c289c794660b289981a78f8106447707fdd9666ca06da5a9a565181599b79f53b844d8a71dd9f439c52a3d7b3e8a79c906ac845fa",
|
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will",
|
|
"f2b94508732bcbacbcc020faefecfc89feafa6649a5491b8c952cede496c214a0c7b3c392d168748f2d4a612bada0753b52a1c7ac53c1e93abd5c6320b9e95dd",
|
|
"808080808080808080808080808080808080808080808080",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always",
|
|
"107d7c02a5aa6f38c58083ff74f04c607c2d2c0ecc55501dadd72d025b751bc27fe913ffb796f841c49b1d33b610cf0e91d3aa239027f5e99fe4ce9e5088cd65",
|
|
"ffffffffffffffffffffffffffffffffffffffffffffffff",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when",
|
|
"0cd6e5d827bb62eb8fc1e262254223817fd068a74b5b449cc2f667c3f1f985a76379b43348d952e2265b4cd129090758b3e3c2c49103b5051aac2eaeb890a528",
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art",
|
|
"bda85446c68413707090a52022edd26a1c9462295029f2e60cd7c4f2bbd3097170af7a4d73245cafa9c3cca8d561a7c3de6f5d4a10be8ed2a5e608d68f92fcc8",
|
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title",
|
|
"bc09fca1804f7e69da93c2f2028eb238c227f2e9dda30cd63699232578480a4021b146ad717fbb7e451ce9eb835f43620bf5c514db0f8add49f5d121449d3e87",
|
|
"8080808080808080808080808080808080808080808080808080808080808080",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless",
|
|
"c0c519bd0e91a2ed54357d9d1ebef6f5af218a153624cf4f2da911a0ed8f7a09e2ef61af0aca007096df430022f7a2b6fb91661a9589097069720d015e4e982f",
|
|
"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote",
|
|
"dd48c104698c30cfe2b6142103248622fb7bb0ff692eebb00089b32d22484e1613912f0a5b694407be899ffd31ed3992c456cdf60f5d4564b8ba3f05a69890ad",
|
|
"77c2b00716cec7213839159e404db50d",
|
|
"jelly better achieve collect unaware mountain thought cargo oxygen act hood bridge",
|
|
"b5b6d0127db1a9d2226af0c3346031d77af31e918dba64287a1b44b8ebf63cdd52676f672a290aae502472cf2d602c051f3e6f18055e84e4c43897fc4e51a6ff",
|
|
"b63a9c59a6e641f288ebc103017f1da9f8290b3da6bdef7b",
|
|
"renew stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap",
|
|
"9248d83e06f4cd98debf5b6f010542760df925ce46cf38a1bdb4e4de7d21f5c39366941c69e1bdbf2966e0f6e6dbece898a0e2f0a4c2b3e640953dfe8b7bbdc5",
|
|
"3e141609b97933b66a060dcddc71fad1d91677db872031e85f4c015c5e7e8982",
|
|
"dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic",
|
|
"ff7f3184df8696d8bef94b6c03114dbee0ef89ff938712301d27ed8336ca89ef9635da20af07d4175f2bf5f3de130f39c9d9e8dd0472489c19b1a020a940da67",
|
|
"0460ef47585604c5660618db2e6a7e7f",
|
|
"afford alter spike radar gate glance object seek swamp infant panel yellow",
|
|
"65f93a9f36b6c85cbe634ffc1f99f2b82cbb10b31edc7f087b4f6cb9e976e9faf76ff41f8f27c99afdf38f7a303ba1136ee48a4c1e7fcd3dba7aa876113a36e4",
|
|
"72f60ebac5dd8add8d2a25a797102c3ce21bc029c200076f",
|
|
"indicate race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left",
|
|
"3bbf9daa0dfad8229786ace5ddb4e00fa98a044ae4c4975ffd5e094dba9e0bb289349dbe2091761f30f382d4e35c4a670ee8ab50758d2c55881be69e327117ba",
|
|
"2c85efc7f24ee4573d2b81a6ec66cee209b2dcbd09d8eddc51e0215b0b68e416",
|
|
"clutch control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste",
|
|
"fe908f96f46668b2d5b37d82f558c77ed0d69dd0e7e043a5b0511c48c2f1064694a956f86360c93dd04052a8899497ce9e985ebe0c8c52b955e6ae86d4ff4449",
|
|
"eaebabb2383351fd31d703840b32e9e2",
|
|
"turtle front uncle idea crush write shrug there lottery flower risk shell",
|
|
"bdfb76a0759f301b0b899a1e3985227e53b3f51e67e3f2a65363caedf3e32fde42a66c404f18d7b05818c95ef3ca1e5146646856c461c073169467511680876c",
|
|
"7ac45cfe7722ee6c7ba84fbc2d5bd61b45cb2fe5eb65aa78",
|
|
"kiss carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment",
|
|
"ed56ff6c833c07982eb7119a8f48fd363c4a9b1601cd2de736b01045c5eb8ab4f57b079403485d1c4924f0790dc10a971763337cb9f9c62226f64fff26397c79",
|
|
"4fa1a8bc3e6d80ee1316050e862c1812031493212b7ec3f3bb1b08f168cabeef",
|
|
"exile ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top",
|
|
"095ee6f817b4c2cb30a5a797360a81a40ab0f9a4e25ecd672a3f58a0b5ba0687c096a6b14d2c0deb3bdefce4f61d01ae07417d502429352e27695163f7447a8c",
|
|
"18ab19a9f54a9274f03e5209a2ac8a91",
|
|
"board flee heavy tunnel powder denial science ski answer betray cargo cat",
|
|
"6eff1bb21562918509c73cb990260db07c0ce34ff0e3cc4a8cb3276129fbcb300bddfe005831350efd633909f476c45c88253276d9fd0df6ef48609e8bb7dca8",
|
|
"18a2e1d81b8ecfb2a333adcb0c17a5b9eb76cc5d05db91a4",
|
|
"board blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief",
|
|
"f84521c777a13b61564234bf8f8b62b3afce27fc4062b51bb5e62bdfecb23864ee6ecf07c1d5a97c0834307c5c852d8ceb88e7c97923c0a3b496bedd4e5f88a9",
|
|
"15da872c95a13dd738fbf50e427583ad61f18fd99f628c417a61cf8343c90419",
|
|
"beyond stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut",
|
|
"b15509eaa2d09d3efd3e006ef42151b30367dc6e3aa5e44caba3fe4d3e352e65101fbdb86a96776b91946ff06f8eac594dc6ee1d3e82a42dfe1b40fef6bcc3fd",
|
|
0,
|
|
0,
|
|
0,
|
|
};
|
|
|
|
const char **a, **b, **c, *m;
|
|
uint8_t seed[64];
|
|
|
|
a = vectors;
|
|
b = vectors + 1;
|
|
c = vectors + 2;
|
|
while (*a && *b && *c) {
|
|
m = mnemonic_from_data(fromhex(*a), strlen(*a) / 2);
|
|
ck_assert_str_eq(m, *b);
|
|
mnemonic_to_seed(m, "TREZOR", seed, 0);
|
|
ck_assert_mem_eq(seed, fromhex(*c), strlen(*c) / 2);
|
|
#if USE_BIP39_CACHE
|
|
// try second time to check whether caching results work
|
|
mnemonic_to_seed(m, "TREZOR", seed, 0);
|
|
ck_assert_mem_eq(seed, fromhex(*c), strlen(*c) / 2);
|
|
#endif
|
|
a += 3; b += 3; c += 3;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_mnemonic_check)
|
|
{
|
|
static const char *vectors_ok[] = {
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
|
"legal winner thank year wave sausage worth useful legal winner thank yellow",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage above",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent",
|
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art",
|
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title",
|
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote",
|
|
"jelly better achieve collect unaware mountain thought cargo oxygen act hood bridge",
|
|
"renew stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap",
|
|
"dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic",
|
|
"afford alter spike radar gate glance object seek swamp infant panel yellow",
|
|
"indicate race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left",
|
|
"clutch control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste",
|
|
"turtle front uncle idea crush write shrug there lottery flower risk shell",
|
|
"kiss carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment",
|
|
"exile ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top",
|
|
"board flee heavy tunnel powder denial science ski answer betray cargo cat",
|
|
"board blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief",
|
|
"beyond stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut",
|
|
0,
|
|
};
|
|
static const char *vectors_fail[] = {
|
|
"above abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
|
"above winner thank year wave sausage worth useful legal winner thank yellow",
|
|
"above advice cage absurd amount doctor acoustic avoid letter advice cage above",
|
|
"above zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong",
|
|
"above abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent",
|
|
"above winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will",
|
|
"above advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always",
|
|
"above zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when",
|
|
"above abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art",
|
|
"above winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title",
|
|
"above advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless",
|
|
"above zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote",
|
|
"above better achieve collect unaware mountain thought cargo oxygen act hood bridge",
|
|
"above stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap",
|
|
"above pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic",
|
|
"above alter spike radar gate glance object seek swamp infant panel yellow",
|
|
"above race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left",
|
|
"above control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste",
|
|
"above front uncle idea crush write shrug there lottery flower risk shell",
|
|
"above carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment",
|
|
"above ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top",
|
|
"above flee heavy tunnel powder denial science ski answer betray cargo cat",
|
|
"above blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief",
|
|
"above stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
|
"winner thank year wave sausage worth useful legal winner thank yellow",
|
|
"advice cage absurd amount doctor acoustic avoid letter advice cage above",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent",
|
|
"winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will",
|
|
"advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when",
|
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art",
|
|
"winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title",
|
|
"advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless",
|
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote",
|
|
"better achieve collect unaware mountain thought cargo oxygen act hood bridge",
|
|
"stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap",
|
|
"pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic",
|
|
"alter spike radar gate glance object seek swamp infant panel yellow",
|
|
"race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left",
|
|
"control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste",
|
|
"front uncle idea crush write shrug there lottery flower risk shell",
|
|
"carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment",
|
|
"ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top",
|
|
"flee heavy tunnel powder denial science ski answer betray cargo cat",
|
|
"blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief",
|
|
"stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut",
|
|
0,
|
|
};
|
|
|
|
const char **m;
|
|
int r;
|
|
m = vectors_ok;
|
|
while (*m) {
|
|
r = mnemonic_check(*m);
|
|
ck_assert_int_eq(r, 1);
|
|
m++;
|
|
}
|
|
m = vectors_fail;
|
|
while (*m) {
|
|
r = mnemonic_check(*m);
|
|
ck_assert_int_eq(r, 0);
|
|
m++;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_address)
|
|
{
|
|
char address[36];
|
|
uint8_t pub_key[65];
|
|
|
|
memcpy(pub_key, fromhex("0226659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37"), 33);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "139MaMHp3Vjo8o4x8N1ZLWEtovLGvBsg6s");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mhfJsQNnrXB3uuYZqvywARTDfuvyjg4RBh");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "MxiimznnxsqMfLKTQBL8Z2PoY9jKpjgkCu");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LMNJqZbe89yrPbm7JVzrcXJf28hZ1rKPaH");
|
|
ecdsa_get_address_segwit_p2sh(pub_key, 5, address, sizeof(address)); ck_assert_str_eq(address, "34PyTHn74syS796eTgsyoLfwoBC3cwLn6p");
|
|
|
|
memcpy(pub_key, fromhex("025b1654a0e78d28810094f6c5a96b8efb8a65668b578f170ac2b1f83bc63ba856"), 33);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "19Ywfm3witp6C1yBMy4NRYHY2347WCRBfQ");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mp4txp8vXvFLy8So5Y2kFTVrt2epN6YzdP");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "N58JsQYveGueiZDgdnNwe4SSkGTAToutAY");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LTmtvyMmoZ49SpfLY73fhZMJEFRPdyohKh");
|
|
ecdsa_get_address_segwit_p2sh(pub_key, 5, address, sizeof(address)); ck_assert_str_eq(address, "35trq6eeuHf6VL9L8pQv46x3vegHnHoTuB");
|
|
|
|
memcpy(pub_key, fromhex("03433f246a12e6486a51ff08802228c61cf895175a9b49ed4766ea9a9294a3c7fe"), 33);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "1FWE2bn3MWhc4QidcF6AvEWpK77sSi2cAP");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mv2BKes2AY8rqXCFKp4Yk9j9B6iaMfWRLN");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "NB5bEFH2GtoAawy8t4Qk8kfj3LWvQs3MhB");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LZjBHp5sSAwfKDQnnP5UCFaaXKV9YheGxQ");
|
|
ecdsa_get_address_segwit_p2sh(pub_key, 5, address, sizeof(address)); ck_assert_str_eq(address, "3456DYaKUWuY6RWWw8Hp5CftHLcQN29h9Y");
|
|
|
|
memcpy(pub_key, fromhex("03aeb03abeee0f0f8b4f7a5d65ce31f9570cef9f72c2dd8a19b4085a30ab033d48"), 33);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "1yrZb8dhdevoqpUEGi2tUccUEeiMKeLcs");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mgVoreDcWf6BaxJ5wqgQiPpwLEFRLSr8U8");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "MwZDmEdcd1kVLP4yW62c6zmXCU3mNbveDo");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LLCopoSTnHtz4eWdQQhLAVgNgT1zTi4QBK");
|
|
ecdsa_get_address_segwit_p2sh(pub_key, 5, address, sizeof(address)); ck_assert_str_eq(address, "3DBU4tJ9tkMR9fnmCtjW48kjvseoNLQZXd");
|
|
|
|
memcpy(pub_key, fromhex("0496e8f2093f018aff6c2e2da5201ee528e2c8accbf9cac51563d33a7bb74a016054201c025e2a5d96b1629b95194e806c63eb96facaedc733b1a4b70ab3b33e3a"), 65);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "194SZbL75xCCGBbKtMsyWLE5r9s2V6mhVM");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "moaPreR5tydT3J4wbvrMLFSQi9TjPCiZc6");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "N4domEq61LHkniqqABCYirNzaPG5NRU8GH");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LTHPpodwAcSFWzHV4VsGnMHr4NEJajMnKX");
|
|
|
|
memcpy(pub_key, fromhex("0498010f8a687439ff497d3074beb4519754e72c4b6220fb669224749591dde416f3961f8ece18f8689bb32235e436874d2174048b86118a00afbd5a4f33a24f0f"), 65);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "1A2WfBD4BJFwYHFPc5KgktqtbdJLBuVKc4");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mpYTxEJ2zKhCKPj1KeJ4ap4DTcu39T3uzD");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "N5bsrpi36gMW4pVtsteFyQzoKrhPE7nkxK");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LUFTvPWtFxVzo5wYnDJz2uueoqfcMYiuxH");
|
|
|
|
memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b826b8f40b92719086238e1bebf19b77a4d"), 65);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "19J81hrPnQxg9UGx45ibTieCkb2ttm8CLL");
|
|
ecdsa_get_address(pub_key, 111, address, sizeof(address)); ck_assert_str_eq(address, "mop5JkwNbSPvvakZmegyHdrXcadbjLazww");
|
|
ecdsa_get_address(pub_key, 52, address, sizeof(address)); ck_assert_str_eq(address, "N4sVDMMNho4Eg1XTKu3AgEo7UpRwq3aNbn");
|
|
ecdsa_get_address(pub_key, 48, address, sizeof(address)); ck_assert_str_eq(address, "LTX5GvADs5CjQGy7EDhtjjhxxoQB2Uhicd");
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_pubkey_validity)
|
|
{
|
|
uint8_t pub_key[65];
|
|
curve_point pub;
|
|
int res;
|
|
const ecdsa_curve *curve = &secp256k1;
|
|
|
|
memcpy(pub_key, fromhex("0226659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37"), 33);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("025b1654a0e78d28810094f6c5a96b8efb8a65668b578f170ac2b1f83bc63ba856"), 33);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("03433f246a12e6486a51ff08802228c61cf895175a9b49ed4766ea9a9294a3c7fe"), 33);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("03aeb03abeee0f0f8b4f7a5d65ce31f9570cef9f72c2dd8a19b4085a30ab033d48"), 33);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("0496e8f2093f018aff6c2e2da5201ee528e2c8accbf9cac51563d33a7bb74a016054201c025e2a5d96b1629b95194e806c63eb96facaedc733b1a4b70ab3b33e3a"), 65);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("0498010f8a687439ff497d3074beb4519754e72c4b6220fb669224749591dde416f3961f8ece18f8689bb32235e436874d2174048b86118a00afbd5a4f33a24f0f"), 65);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b826b8f40b92719086238e1bebf19b77a4d"), 65);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 1);
|
|
|
|
memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b826b8f40b92719086238e1bebf00000000"), 65);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b8211111111111111111111111111111111"), 65);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
memcpy(pub_key, fromhex("00"), 1);
|
|
res = ecdsa_read_pubkey(curve, pub_key, &pub);
|
|
ck_assert_int_eq(res, 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_pubkey_uncompress)
|
|
{
|
|
uint8_t pub_key[65];
|
|
uint8_t uncompressed[65];
|
|
int res;
|
|
const ecdsa_curve *curve = &secp256k1;
|
|
|
|
memcpy(pub_key, fromhex("0226659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37"), 33);
|
|
res = ecdsa_uncompress_pubkey(curve, pub_key, uncompressed);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(uncompressed, fromhex("0426659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37b3cfbad6b39a8ce8cb3a675f53b7b57e120fe067b8035d771fd99e3eba7cf4de"), 65);
|
|
|
|
memcpy(pub_key, fromhex("03433f246a12e6486a51ff08802228c61cf895175a9b49ed4766ea9a9294a3c7fe"), 33);
|
|
res = ecdsa_uncompress_pubkey(curve, pub_key, uncompressed);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(uncompressed, fromhex("04433f246a12e6486a51ff08802228c61cf895175a9b49ed4766ea9a9294a3c7feeb4c25bcb840f720a16e8857a011e6b91e0ab2d03dbb5f9762844bb21a7b8ca7"), 65);
|
|
|
|
memcpy(pub_key, fromhex("0496e8f2093f018aff6c2e2da5201ee528e2c8accbf9cac51563d33a7bb74a016054201c025e2a5d96b1629b95194e806c63eb96facaedc733b1a4b70ab3b33e3a"), 65);
|
|
res = ecdsa_uncompress_pubkey(curve, pub_key, uncompressed);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(uncompressed, fromhex("0496e8f2093f018aff6c2e2da5201ee528e2c8accbf9cac51563d33a7bb74a016054201c025e2a5d96b1629b95194e806c63eb96facaedc733b1a4b70ab3b33e3a"), 65);
|
|
|
|
memcpy(pub_key, fromhex("00"), 1);
|
|
res = ecdsa_uncompress_pubkey(curve, pub_key, uncompressed);
|
|
ck_assert_int_eq(res, 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_wif)
|
|
{
|
|
uint8_t priv_key[32];
|
|
char wif[53];
|
|
|
|
memcpy(priv_key, fromhex("1111111111111111111111111111111111111111111111111111111111111111"), 32);
|
|
ecdsa_get_wif(priv_key, 0x80, wif, sizeof(wif)); ck_assert_str_eq(wif, "KwntMbt59tTsj8xqpqYqRRWufyjGunvhSyeMo3NTYpFYzZbXJ5Hp");
|
|
ecdsa_get_wif(priv_key, 0xEF, wif, sizeof(wif)); ck_assert_str_eq(wif, "cN9spWsvaxA8taS7DFMxnk1yJD2gaF2PX1npuTpy3vuZFJdwavaw");
|
|
|
|
memcpy(priv_key, fromhex("dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd"), 32);
|
|
ecdsa_get_wif(priv_key, 0x80, wif, sizeof(wif)); ck_assert_str_eq(wif, "L4ezQvyC6QoBhxB4GVs9fAPhUKtbaXYUn8YTqoeXwbevQq4U92vN");
|
|
ecdsa_get_wif(priv_key, 0xEF, wif, sizeof(wif)); ck_assert_str_eq(wif, "cV1ysqy3XUVSsPeKeugH2Utm6ZC1EyeArAgvxE73SiJvfa6AJng7");
|
|
|
|
memcpy(priv_key, fromhex("47f7616ea6f9b923076625b4488115de1ef1187f760e65f89eb6f4f7ff04b012"), 32);
|
|
ecdsa_get_wif(priv_key, 0x80, wif, sizeof(wif)); ck_assert_str_eq(wif, "KydbzBtk6uc7M6dXwEgTEH2sphZxSPbmDSz6kUUHi4eUpSQuhEbq");
|
|
ecdsa_get_wif(priv_key, 0xEF, wif, sizeof(wif)); ck_assert_str_eq(wif, "cPzbT6tbXyJNWY6oKeVabbXwSvsN6qhTHV8ZrtvoDBJV5BRY1G5Q");
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_address_decode)
|
|
{
|
|
int res;
|
|
uint8_t decode[MAX_ADDR_RAW_SIZE];
|
|
|
|
res = ecdsa_address_decode("1JwSSubhmg6iPtRjtyqhUYYH7bZg3Lfy1T", 0, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("00c4c5d791fcb4654a1ef5e03fe0ad3d9c598f9827"), 21);
|
|
|
|
res = ecdsa_address_decode("myTPjxggahXyAzuMcYp5JTkbybANyLsYBW", 111, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("6fc4c5d791fcb4654a1ef5e03fe0ad3d9c598f9827"), 21);
|
|
|
|
res = ecdsa_address_decode("NEWoeZ6gh4CGvRgFAoAGh4hBqpxizGT6gZ", 52, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("34c4c5d791fcb4654a1ef5e03fe0ad3d9c598f9827"), 21);
|
|
|
|
res = ecdsa_address_decode("LdAPi7uXrLLmeh7u57pzkZc3KovxEDYRJq", 48, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("30c4c5d791fcb4654a1ef5e03fe0ad3d9c598f9827"), 21);
|
|
|
|
res = ecdsa_address_decode("1C7zdTfnkzmr13HfA2vNm5SJYRK6nEKyq8", 0, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("0079fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
|
|
res = ecdsa_address_decode("mrdwvWkma2D6n9mGsbtkazedQQuoksnqJV", 111, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("6f79fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
|
|
res = ecdsa_address_decode("N7hMq7AmgNsQXaYARrEwybbDGei9mcPNqr", 52, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("3479fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
|
|
res = ecdsa_address_decode("LWLwtfycqf1uFqypLAug36W4kdgNwrZdNs", 48, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("3079fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
|
|
// invalid char
|
|
res = ecdsa_address_decode("1JwSSubhmg6i000jtyqhUYYH7bZg3Lfy1T", 0, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
// invalid address
|
|
res = ecdsa_address_decode("1111Subhmg6iPtRjtyqhUYYH7bZg3Lfy1T", 0, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
// invalid version
|
|
res = ecdsa_address_decode("LWLwtfycqf1uFqypLAug36W4kdgNwrZdNs", 0, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_ecdsa_der)
|
|
{
|
|
uint8_t sig[64], der[72];
|
|
int res;
|
|
|
|
memcpy(sig, fromhex("9a0b7be0d4ed3146ee262b42202841834698bb3ee39c24e7437df208b8b70771"), 32);
|
|
memcpy(sig + 32, fromhex("2b79ab1e7736219387dffe8d615bbdba87e11477104b867ef47afed1a5ede781"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 71);
|
|
ck_assert_mem_eq(der, fromhex("30450221009a0b7be0d4ed3146ee262b42202841834698bb3ee39c24e7437df208b8b7077102202b79ab1e7736219387dffe8d615bbdba87e11477104b867ef47afed1a5ede781"), 71);
|
|
|
|
memcpy(sig, fromhex("6666666666666666666666666666666666666666666666666666666666666666"), 32);
|
|
memcpy(sig + 32, fromhex("7777777777777777777777777777777777777777777777777777777777777777"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 70);
|
|
ck_assert_mem_eq(der, fromhex("30440220666666666666666666666666666666666666666666666666666666666666666602207777777777777777777777777777777777777777777777777777777777777777"), 70);
|
|
|
|
memcpy(sig, fromhex("6666666666666666666666666666666666666666666666666666666666666666"), 32);
|
|
memcpy(sig + 32, fromhex("eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 71);
|
|
ck_assert_mem_eq(der, fromhex("304502206666666666666666666666666666666666666666666666666666666666666666022100eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee"), 71);
|
|
|
|
memcpy(sig, fromhex("eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee"), 32);
|
|
memcpy(sig + 32, fromhex("7777777777777777777777777777777777777777777777777777777777777777"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 71);
|
|
ck_assert_mem_eq(der, fromhex("3045022100eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee02207777777777777777777777777777777777777777777777777777777777777777"), 71);
|
|
|
|
memcpy(sig, fromhex("eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee"), 32);
|
|
memcpy(sig + 32, fromhex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 72);
|
|
ck_assert_mem_eq(der, fromhex("3046022100eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee022100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"), 72);
|
|
|
|
memcpy(sig, fromhex("0000000000000000000000000000000000000000000000000000000000000066"), 32);
|
|
memcpy(sig + 32, fromhex("0000000000000000000000000000000000000000000000000000000000000077"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 8);
|
|
ck_assert_mem_eq(der, fromhex("3006020166020177"), 8);
|
|
|
|
memcpy(sig, fromhex("0000000000000000000000000000000000000000000000000000000000000066"), 32);
|
|
memcpy(sig + 32, fromhex("00000000000000000000000000000000000000000000000000000000000000ee"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 9);
|
|
ck_assert_mem_eq(der, fromhex("3007020166020200ee"), 9);
|
|
|
|
memcpy(sig, fromhex("00000000000000000000000000000000000000000000000000000000000000ee"), 32);
|
|
memcpy(sig + 32, fromhex("0000000000000000000000000000000000000000000000000000000000000077"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 9);
|
|
ck_assert_mem_eq(der, fromhex("3007020200ee020177"), 9);
|
|
|
|
memcpy(sig, fromhex("00000000000000000000000000000000000000000000000000000000000000ee"), 32);
|
|
memcpy(sig + 32, fromhex("00000000000000000000000000000000000000000000000000000000000000ff"), 32);
|
|
res = ecdsa_sig_to_der(sig, der);
|
|
ck_assert_int_eq(res, 10);
|
|
ck_assert_mem_eq(der, fromhex("3008020200ee020200ff"), 10);
|
|
}
|
|
END_TEST
|
|
|
|
static void test_codepoints_curve(const ecdsa_curve *curve) {
|
|
int i, j;
|
|
bignum256 a;
|
|
curve_point p, p1;
|
|
for (i = 0; i < 64; i++) {
|
|
for (j = 0; j < 8; j++) {
|
|
bn_zero(&a);
|
|
a.val[(4*i)/30] = (2*j+1) << (4*i % 30);
|
|
bn_normalize(&a);
|
|
// note that this is not a trivial test. We add 64 curve
|
|
// points in the table to get that particular curve point.
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &curve->cp[i][j], sizeof(curve_point));
|
|
bn_zero(&p.y); // test that point_multiply curve, is not a noop
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &curve->cp[i][j], sizeof(curve_point));
|
|
// mul 2 test. this should catch bugs
|
|
bn_lshift(&a);
|
|
bn_mod(&a, &curve->order);
|
|
p1 = curve->cp[i][j];
|
|
point_double(curve, &p1);
|
|
// note that this is not a trivial test. We add 64 curve
|
|
// points in the table to get that particular curve point.
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &p1, sizeof(curve_point));
|
|
bn_zero(&p.y); // test that point_multiply curve, is not a noop
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &p1, sizeof(curve_point));
|
|
}
|
|
}
|
|
}
|
|
|
|
START_TEST(test_codepoints_secp256k1) { test_codepoints_curve(&secp256k1); } END_TEST
|
|
START_TEST(test_codepoints_nist256p1) { test_codepoints_curve(&nist256p1); } END_TEST
|
|
|
|
static void test_mult_border_cases_curve(const ecdsa_curve *curve) {
|
|
bignum256 a;
|
|
curve_point p;
|
|
curve_point expected;
|
|
bn_zero(&a); // a == 0
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert(point_is_infinity(&p));
|
|
point_multiply(curve, &a, &p, &p);
|
|
ck_assert(point_is_infinity(&p));
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert(point_is_infinity(&p));
|
|
|
|
bn_addi(&a, 1); // a == 1
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &curve->G, sizeof(curve_point));
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &curve->G, sizeof(curve_point));
|
|
|
|
bn_subtract(&curve->order, &a, &a); // a == -1
|
|
expected = curve->G;
|
|
bn_subtract(&curve->prime, &expected.y, &expected.y);
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
|
|
bn_subtract(&curve->order, &a, &a);
|
|
bn_addi(&a, 1); // a == 2
|
|
expected = curve->G;
|
|
point_add(curve, &expected, &expected);
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
|
|
bn_subtract(&curve->order, &a, &a); // a == -2
|
|
expected = curve->G;
|
|
point_add(curve, &expected, &expected);
|
|
bn_subtract(&curve->prime, &expected.y, &expected.y);
|
|
scalar_multiply(curve, &a, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
point_multiply(curve, &a, &curve->G, &p);
|
|
ck_assert_mem_eq(&p, &expected, sizeof(curve_point));
|
|
}
|
|
|
|
START_TEST(test_mult_border_cases_secp256k1) { test_mult_border_cases_curve(&secp256k1); } END_TEST
|
|
START_TEST(test_mult_border_cases_nist256p1) { test_mult_border_cases_curve(&nist256p1); } END_TEST
|
|
|
|
static void test_scalar_mult_curve(const ecdsa_curve *curve) {
|
|
int i;
|
|
// get two "random" numbers
|
|
bignum256 a = curve->G.x;
|
|
bignum256 b = curve->G.y;
|
|
curve_point p1, p2, p3;
|
|
for (i = 0; i < 1000; i++) {
|
|
/* test distributivity: (a + b)G = aG + bG */
|
|
bn_mod(&a, &curve->order);
|
|
bn_mod(&b, &curve->order);
|
|
scalar_multiply(curve, &a, &p1);
|
|
scalar_multiply(curve, &b, &p2);
|
|
bn_addmod(&a, &b, &curve->order);
|
|
bn_mod(&a, &curve->order);
|
|
scalar_multiply(curve, &a, &p3);
|
|
point_add(curve, &p1, &p2);
|
|
ck_assert_mem_eq(&p2, &p3, sizeof(curve_point));
|
|
// new "random" numbers
|
|
a = p3.x;
|
|
b = p3.y;
|
|
}
|
|
}
|
|
|
|
START_TEST(test_scalar_mult_secp256k1) { test_scalar_mult_curve(&secp256k1); } END_TEST
|
|
START_TEST(test_scalar_mult_nist256p1) { test_scalar_mult_curve(&nist256p1); } END_TEST
|
|
|
|
static void test_point_mult_curve(const ecdsa_curve *curve) {
|
|
int i;
|
|
// get two "random" numbers and a "random" point
|
|
bignum256 a = curve->G.x;
|
|
bignum256 b = curve->G.y;
|
|
curve_point p = curve->G;
|
|
curve_point p1, p2, p3;
|
|
for (i = 0; i < 200; i++) {
|
|
/* test distributivity: (a + b)P = aP + bP */
|
|
bn_mod(&a, &curve->order);
|
|
bn_mod(&b, &curve->order);
|
|
point_multiply(curve, &a, &p, &p1);
|
|
point_multiply(curve, &b, &p, &p2);
|
|
bn_addmod(&a, &b, &curve->order);
|
|
bn_mod(&a, &curve->order);
|
|
point_multiply(curve, &a, &p, &p3);
|
|
point_add(curve, &p1, &p2);
|
|
ck_assert_mem_eq(&p2, &p3, sizeof(curve_point));
|
|
// new "random" numbers and a "random" point
|
|
a = p1.x;
|
|
b = p1.y;
|
|
p = p3;
|
|
}
|
|
}
|
|
|
|
START_TEST(test_point_mult_secp256k1) { test_point_mult_curve(&secp256k1); } END_TEST
|
|
START_TEST(test_point_mult_nist256p1) { test_point_mult_curve(&nist256p1); } END_TEST
|
|
|
|
static void test_scalar_point_mult_curve(const ecdsa_curve *curve) {
|
|
int i;
|
|
// get two "random" numbers
|
|
bignum256 a = curve->G.x;
|
|
bignum256 b = curve->G.y;
|
|
curve_point p1, p2;
|
|
for (i = 0; i < 200; i++) {
|
|
/* test commutativity and associativity:
|
|
* a(bG) = (ab)G = b(aG)
|
|
*/
|
|
bn_mod(&a, &curve->order);
|
|
bn_mod(&b, &curve->order);
|
|
scalar_multiply(curve, &a, &p1);
|
|
point_multiply(curve, &b, &p1, &p1);
|
|
|
|
scalar_multiply(curve, &b, &p2);
|
|
point_multiply(curve, &a, &p2, &p2);
|
|
|
|
ck_assert_mem_eq(&p1, &p2, sizeof(curve_point));
|
|
|
|
bn_multiply(&a, &b, &curve->order);
|
|
bn_mod(&b, &curve->order);
|
|
scalar_multiply(curve, &b, &p2);
|
|
|
|
ck_assert_mem_eq(&p1, &p2, sizeof(curve_point));
|
|
|
|
// new "random" numbers
|
|
a = p1.x;
|
|
b = p1.y;
|
|
}
|
|
}
|
|
|
|
START_TEST(test_scalar_point_mult_secp256k1) { test_scalar_point_mult_curve(&secp256k1); } END_TEST
|
|
START_TEST(test_scalar_point_mult_nist256p1) { test_scalar_point_mult_curve(&nist256p1); } END_TEST
|
|
|
|
START_TEST(test_ed25519) {
|
|
// test vectors from https://github.com/torproject/tor/blob/master/src/test/ed25519_vectors.inc
|
|
static const char *vectors[] = {
|
|
"26c76712d89d906e6672dafa614c42e5cb1caac8c6568e4d2493087db51f0d36", // secret
|
|
"c2247870536a192d142d056abefca68d6193158e7c1a59c1654c954eccaff894", // public
|
|
"d23188eac3773a316d46006fa59c095060be8b1a23582a0dd99002a82a0662bd246d8449e172e04c5f46ac0d1404cebe4aabd8a75a1457aa06cae41f3334f104", // selfsig
|
|
"fba7a5366b5cb98c2667a18783f5cf8f4f8d1a2ce939ad22a6e685edde85128d",
|
|
"1519a3b15816a1aafab0b213892026ebf5c0dc232c58b21088d88cb90e9b940d",
|
|
"3a785ac1201c97ee5f6f0d99323960d5f264c7825e61aa7cc81262f15bef75eb4fa5723add9b9d45b12311b6d403eb3ac79ff8e4e631fc3cd51e4ad2185b200b",
|
|
"67e3aa7a14fac8445d15e45e38a523481a69ae35513c9e4143eb1c2196729a0e",
|
|
"081faa81992e360ea22c06af1aba096e7a73f1c665bc8b3e4e531c46455fd1dd",
|
|
"cf431fd0416bfbd20c9d95ef9b723e2acddffb33900edc72195dea95965d52d888d30b7b8a677c0bd8ae1417b1e1a0ec6700deadd5d8b54b6689275e04a04509",
|
|
"d51385942033a76dc17f089a59e6a5a7fe80d9c526ae8ddd8c3a506b99d3d0a6",
|
|
"73cfa1189a723aad7966137cbffa35140bb40d7e16eae4c40b79b5f0360dd65a",
|
|
"2375380cd72d1a6c642aeddff862be8a5804b916acb72c02d9ed052c1561881aa658a5af856fcd6d43113e42f698cd6687c99efeef7f2ce045824440d26c5d00",
|
|
"5c8eac469bb3f1b85bc7cd893f52dc42a9ab66f1b02b5ce6a68e9b175d3bb433",
|
|
"66c1a77104d86461b6f98f73acf3cd229c80624495d2d74d6fda1e940080a96b",
|
|
"2385a472f599ca965bbe4d610e391cdeabeba9c336694b0d6249e551458280be122c2441dd9746a81bbfb9cd619364bab0df37ff4ceb7aefd24469c39d3bc508",
|
|
"eda433d483059b6d1ff8b7cfbd0fe406bfb23722c8f3c8252629284573b61b86",
|
|
"d21c294db0e64cb2d8976625786ede1d9754186ae8197a64d72f68c792eecc19",
|
|
"e500cd0b8cfff35442f88008d894f3a2fa26ef7d3a0ca5714ae0d3e2d40caae58ba7cdf69dd126994dad6be536fcda846d89dd8138d1683cc144c8853dce7607",
|
|
"4377c40431c30883c5fbd9bc92ae48d1ed8a47b81d13806beac5351739b5533d",
|
|
"c4d58b4cf85a348ff3d410dd936fa460c4f18da962c01b1963792b9dcc8a6ea6",
|
|
"d187b9e334b0050154de10bf69b3e4208a584e1a65015ec28b14bcc252cf84b8baa9c94867daa60f2a82d09ba9652d41e8dde292b624afc8d2c26441b95e3c0e",
|
|
"c6bbcce615839756aed2cc78b1de13884dd3618f48367a17597a16c1cd7a290b",
|
|
"95126f14d86494020665face03f2d42ee2b312a85bc729903eb17522954a1c4a",
|
|
"815213640a643d198bd056e02bba74e1c8d2d931643e84497adf3347eb485079c9afe0afce9284cdc084946b561abbb214f1304ca11228ff82702185cf28f60d",
|
|
0,
|
|
0,
|
|
0,
|
|
};
|
|
const char **ssk, **spk, **ssig;
|
|
ssk = vectors;
|
|
spk = vectors + 1;
|
|
ssig = vectors + 2;
|
|
ed25519_public_key pk;
|
|
ed25519_secret_key sk;
|
|
ed25519_signature sig;
|
|
while (*ssk && *spk && *ssig) {
|
|
memcpy(sk, fromhex(*ssk), 32);
|
|
MARK_SECRET_DATA(sk, sizeof(sk));
|
|
|
|
ed25519_publickey(sk, pk);
|
|
UNMARK_SECRET_DATA(pk, sizeof(pk));
|
|
ck_assert_mem_eq(pk, fromhex(*spk), 32);
|
|
|
|
ed25519_sign(pk, 32, sk, pk, sig);
|
|
UNMARK_SECRET_DATA(sig, sizeof(sig));
|
|
ck_assert_mem_eq(sig, fromhex(*ssig), 64);
|
|
|
|
ssk += 3;
|
|
spk += 3;
|
|
ssig += 3;
|
|
|
|
UNMARK_SECRET_DATA(sk, sizeof(sk));
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://raw.githubusercontent.com/NemProject/nem-test-vectors/master/2.test-sign.dat
|
|
START_TEST(test_ed25519_keccak)
|
|
{
|
|
static const struct {
|
|
const char *private_key;
|
|
const char *public_key;
|
|
const char *signature;
|
|
size_t length;
|
|
const char *data;
|
|
} tests[] = {
|
|
{ "abf4cf55a2b3f742d7543d9cc17f50447b969e6e06f5ea9195d428ab12b7318d", "8a558c728c21c126181e5e654b404a45b4f0137ce88177435a69978cc6bec1f4", "d9cec0cc0e3465fab229f8e1d6db68ab9cc99a18cb0435f70deb6100948576cd5c0aa1feb550bdd8693ef81eb10a556a622db1f9301986827b96716a7134230c", 41, "8ce03cd60514233b86789729102ea09e867fc6d964dea8c2018ef7d0a2e0e24bf7e348e917116690b9", },
|
|
{ "6aa6dad25d3acb3385d5643293133936cdddd7f7e11818771db1ff2f9d3f9215", "bbc8cbb43dda3ecf70a555981a351a064493f09658fffe884c6fab2a69c845c6", "98bca58b075d1748f1c3a7ae18f9341bc18e90d1beb8499e8a654c65d8a0b4fbd2e084661088d1e5069187a2811996ae31f59463668ef0f8cb0ac46a726e7902", 49, "e4a92208a6fc52282b620699191ee6fb9cf04daf48b48fd542c5e43daa9897763a199aaa4b6f10546109f47ac3564fade0", },
|
|
{ "8e32bc030a4c53de782ec75ba7d5e25e64a2a072a56e5170b77a4924ef3c32a9", "72d0e65f1ede79c4af0ba7ec14204e10f0f7ea09f2bc43259cd60ea8c3a087e2", "ef257d6e73706bb04878875c58aa385385bf439f7040ea8297f7798a0ea30c1c5eff5ddc05443f801849c68e98111ae65d088e726d1d9b7eeca2eb93b677860c", 40, "13ed795344c4448a3b256f23665336645a853c5c44dbff6db1b9224b5303b6447fbf8240a2249c55", },
|
|
{ "c83ce30fcb5b81a51ba58ff827ccbc0142d61c13e2ed39e78e876605da16d8d7", "3ec8923f9ea5ea14f8aaa7e7c2784653ed8c7de44e352ef9fc1dee81fc3fa1a3", "0c684e71b35fed4d92b222fc60561db34e0d8afe44bdd958aaf4ee965911bef5991236f3e1bced59fc44030693bcac37f34d29e5ae946669dc326e706e81b804", 49, "a2704638434e9f7340f22d08019c4c8e3dbee0df8dd4454a1d70844de11694f4c8ca67fdcb08fed0cec9abb2112b5e5f89", },
|
|
{ "2da2a0aae0f37235957b51d15843edde348a559692d8fa87b94848459899fc27", "d73d0b14a9754eec825fcb25ef1cfa9ae3b1370074eda53fc64c22334a26c254", "6f17f7b21ef9d6907a7ab104559f77d5a2532b557d95edffd6d88c073d87ac00fc838fc0d05282a0280368092a4bd67e95c20f3e14580be28d8b351968c65e03", 40, "d2488e854dbcdfdb2c9d16c8c0b2fdbc0abb6bac991bfe2b14d359a6bc99d66c00fd60d731ae06d0", },
|
|
{ "0c066261fb1b18ebf2a9bcdeda81eb47d5a3745438b3d0b9d19b75885ad0a154", "2e5773f0e725024bc0359ce93a44e15d6507e7b160b6c592200385fee4a269cf", "13b5d2dd1b04f62cc2ec1544fed256423684f2dbca4538ceddda1d15c59dc7196c87840ea303ea30f4f6914a6ec9167841980c1d717f47fd641225068de88507", 41, "f15cb706e29fcfbcb324e38cbac62bb355deddb845c142e970f0c029ea4d05e59fd6adf85573cf1775", },
|
|
{ "ef3d8e22a592f04c3a31aa736e10901757a821d053f1a49a525b4ec91eacdee3", "72a2b4910a502b30e13a96aba643c59c79328c1ba1462be6f254e817ef157fee", "95f2437a0210d2d2f125a3c377ed666c0d596cd104185e70204924a182a11a6eb3bdba4395bbfc3f4e827d38805752657ee52d1ce0f17e70f59bfd4999282509", 50, "6c3e4387345740b8d62cf0c9dec48f98c292539431b2b54020d8072d9cb55f0197f7d99ff066afcf9e41ea8b7aea78eb082d", },
|
|
{ "f7fb79743e9ba957d2a4f1bd95ceb1299552abecaf758bf840d2dc2c09f3e3cb", "8b7d7531280f76a8abac8293d87508e3953894087112ae01b6ad32485d4e9b67", "c868ecf31cee783fe8799ac7e6a662431c822967351d8b79687f4ddf608f79a080c4ff9eed4fdee8c99fe1be905f734cae2a172f1cfdb00771625c0695a5260e", 42, "55d8e60c307ee533b1af9ff677a2de40a6eace722bcc9eb5d79907b420e533bc06db674dafbd9f43d672", },
|
|
{ "8cc9a2469a77fad18b44b871b2b6932cd354641d2d1e84403f746c4fff829791", "aed5da202d4983dac560faf6704dc76ac111616318570e244043e82ed1bbcd2b", "aee9616db4135150818eaffa3e4503c2d7e9e834847a4c7d0a8856e952761d361a657104d36950c9b75770ded00d56a96e06f383fa2406bc935dcf51f272300e", 42, "d9b8be2f71b83261304e333d6e35563dc3c36c2eb5a23e1461b6e95aa7c6f381f9c3bd39deaa1b6df2f9", },
|
|
{ "a247abbef0c1affbf021d1aff128888550532fc0edd77bc39f6ef5312317ec47", "98ededbad1e5ad7a0d5a0cf4fcd7a794eb5c6900a65e7e921884a636f19b131d", "f8cc02933851432f0c5df0b70f2067f740ccb72de7d6fa1e9a9b0d6de1402b9c6c525fd848e45aaaac1423b52880ec3474a2f64b38db6fc8e008d95a310e6e0c", 47, "4a5f07eb713932532fc3132c96efdc45862fe7a954c1d2ae4640afdf4728fb58c65e8a4ebfe0d53d5797d5146442b9", },
|
|
{ "163d69079ddad1f16695c47d81c3b72f869b2fdd50e6e47113db6c85051a6ede", "93fe602642ee5773f4aaf6a3bc21e98e354035225353f419e78e43c3ec36c88a", "da747fa2cb47aae1effc1e4cfde0e39fa79937948592a712a7665bf948b8311e7f3f80f966301679520d5c2afa3eadd60e061f0d264887500d8d03a17e10fd02", 41, "65fe5c1a0214a59644892e5ac4216f09fbb4e191b89bfb63d6540177d25ef9e3714850b8453bd6b2b6", },
|
|
{ "7b061bf90eb760971b9ec66a96fd6609635ca4b531f33e3c126b9ae6fdb3d491", "cb392ebb6912df4111efeeb1278160daf9da396e9291b83979a5ac479f7276d2", "f6eebe86f7ea672e0707ee518e1798d6fbd118c11b2aa30be07d10e3882e3721f2030f9f044b77c3a7a9a2f1feba7e7ce75d1f7f3807a96a764fded35d341d02", 45, "a17f5ce39b9ba7b7cf1147e515d6aa84b22fd0e2d8323a91367198fc6c3aff04ebb21fc2bdbe7bc0364e8040a9", },
|
|
{ "c9f8ccbf761cec00ab236c52651e76b5f46d90f8936d44d40561ed5c277104de", "a3192641e343b669ffd43677c2e5cd4efaed174e876141f1d773bd6cfe30d875", "d44f884ec9eae2e99e74194b5acc769b7aa369aaad359e92ba6ff0fe629af2a9a7156c19b720e7de8c7f03c039563f160948073cab6f99b26a56a8bb1023ba08", 47, "3d7e33b0ecead8269966e9dcd192b73eb8a12573fc8a5fdfbe5753541026ef2e49f5280cba9bc2515a049b3a1c1b49", },
|
|
{ "ebfa409ac6f987df476858dd35310879bf564eeb62984a52115d2e6c24590124", "7bb1601fe7215f3f4da9c8ab5e804dc58f57ba41b03223f57ec80d9c9a2dd0e1", "f3e7c1abfcc9f35556cb1e4c5a2b34445177ac188312d9148f1d1d8467ea8411fa3cda031d023034e45bbe407ef7d1b937bfb098266138857d35cb4efe407306", 52, "0c37564f718eda683aa6f3e9ab2487620b1a8b5c8f20adb3b2d7550af0d635371e531f27cebe76a2abcc96de0875bdae987a45ac", },
|
|
{ "f993f61902b7da332f2bb001baa7accaf764d824eb0cd073315f7ec43158b8fb", "55fc8e0da1b454cab6ddefb235311db2b01504bf9ac3f71c7e3f3d0d1f09f80b", "178bd147673c0ca330e45da63cbd1f1811906bd5284bb44e4bb00f7d7163d1f396975610b6f71c1ae4686466fad4c5e7bb9685099e21ca4f1a45bb3fcf56ae0c", 42, "b7dd613bc9c364d9eeb9a52636d72bc881dfc81a836b6537bbb928bff5b73831358947ea9edea1570550", },
|
|
{ "05188c09c31b4bb63f0d49b47ccc1654c2aba907b8c6c0a82ee403e950169167", "e096d808dfabe8e44eb74950199dadcd586f9de6b141a0ce85ab94b3d97866eb", "669491c8eb7cedbbc0252f3eafb048b39a2a37f60ac87837777c72c879ac8b726c39e10060750c2f539102999b71889746111bc5f71ec8c158cc81cf566aef03", 44, "bb8e22469d1c7f1d5418563e8781f69eccb56678bd36d8919f358c2778562ff6b50de916c12d44f1a778a7f3", },
|
|
{ "eabe57e1a916ebbffa4ba7abc7f23e83d4deb1338816cc1784d7495d92e98d0b", "3aad275642f48a46ed1032f3de9f4053e0fd35cf217e065d2e4579c3683932f7", "b2e9dac2c83942ca374f29c8eff5a30c377c3db3c1c645e593e524d17484e7705b11f79573e2d63495fc3ce3bf216a209f0cb7bea477ae0f8bd297f193af8805", 44, "3f2c2d6682ee597f2a92d7e560ac53d5623550311a4939d68adfb904045ed8d215a9fdb757a2368ea4d89f5f", },
|
|
{ "fef7b893b4b517fab68ca12d36b603bc00826bf3c9b31a05149642ae10bb3f55", "b3fb891868708dfa5da5b9b5234058767ab42c117f12c3228c02a1976d1c0f83", "6243e289314b7c7587802909a9be6173a916b36f9de1e164954dfe5d1ebd57c869a79552d770e13b51855502be6b15e7be42a3675298a81284df58e609b06503", 47, "38c69f884045cdbeebe4478fdbd1ccc6cf00a08d8a3120c74e7167d3a2e26a67a043b8e5bd198f7b0ce0358cef7cf9", },
|
|
{ "16228bec9b724300a37e88e535fc1c58548d34d7148b57c226f2b3af974c1822", "3c92423a8360c9a5d9a093730d72831bec4601dcadfe84de19fc8c8f91fc3d4b", "6aebfa9a4294ec888d54bcb517fcb6821e4c16d2708a2afe701f431a28149ff4f139f9d16a52a63f1f91baf4c8dea37710c73f25c263a8035a39cc118ad0280f", 44, "a3d7b122cd4431b396b20d8cc46cc73ed4a5253a44a76fc83db62cdc845a2bf7081d069a857955a161cccf84", },
|
|
{ "2dc3f5f0a0bc32c6632534e1e8f27e59cbe0bf7617d31aff98098e974c828be7", "b998a416edc28ded988dcacb1caf2bd96c87354b0d1eeccb6980e54a3104f21f", "76a2ddfc4bea48c47e0c82bcbfee28a37c61ec626af39a468e643e0ef9f6533056a5a0b44e64d614ba3c641a40e5b003a99463445ae2c3c8e1e9882092d74b07", 42, "bdae276d738b9758ea3d322b54fd12fe82b767e8d817d8ef3d41f78705748e28d15e9c506962a1b85901", },
|
|
};
|
|
|
|
ed25519_secret_key private_key;
|
|
ed25519_public_key public_key;
|
|
ed25519_signature signature;
|
|
|
|
for (size_t i = 0; i < (sizeof(tests) / sizeof(*tests)); i++) {
|
|
nem_private_key(tests[i].private_key, private_key);
|
|
MARK_SECRET_DATA(private_key, sizeof(private_key));
|
|
|
|
ed25519_publickey_keccak(private_key, public_key);
|
|
UNMARK_SECRET_DATA(public_key, sizeof(public_key));
|
|
ck_assert_mem_eq(public_key, fromhex(tests[i].public_key), 32);
|
|
|
|
ed25519_sign_keccak(fromhex(tests[i].data), tests[i].length, private_key, public_key, signature);
|
|
UNMARK_SECRET_DATA(signature, sizeof(signature));
|
|
ck_assert_mem_eq(signature, fromhex(tests[i].signature), 64);
|
|
|
|
UNMARK_SECRET_DATA(private_key, sizeof(private_key));
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_ed25519_cosi) {
|
|
const int MAXN = 10;
|
|
ed25519_secret_key keys[MAXN];
|
|
ed25519_public_key pubkeys[MAXN];
|
|
ed25519_secret_key nonces[MAXN];
|
|
ed25519_public_key Rs[MAXN];
|
|
ed25519_cosi_signature sigs[MAXN];
|
|
uint8_t msg[32];
|
|
rfc6979_state rng;
|
|
int res;
|
|
|
|
init_rfc6979(fromhex("26c76712d89d906e6672dafa614c42e5cb1caac8c6568e4d2493087db51f0d36"),
|
|
fromhex("26659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37"), &rng);
|
|
|
|
for (int N = 1; N < 11; N++) {
|
|
ed25519_public_key pk;
|
|
ed25519_public_key R;
|
|
ed25519_signature sig;
|
|
/* phase 0: create priv/pubkeys and combine pubkeys */
|
|
for (int j = 0; j < N; j++) {
|
|
generate_rfc6979(keys[j], &rng);
|
|
ed25519_publickey(keys[j], pubkeys[j]);
|
|
}
|
|
res = ed25519_cosi_combine_publickeys(pk, pubkeys, N);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
generate_rfc6979(msg, &rng);
|
|
|
|
/* phase 1: create nonces, commitments (R values) and combine commitments */
|
|
for (int j = 0; j < N; j++) {
|
|
generate_rfc6979(nonces[j], &rng);
|
|
ed25519_publickey(nonces[j], Rs[j]);
|
|
}
|
|
res = ed25519_cosi_combine_publickeys(R, Rs, N);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
MARK_SECRET_DATA(keys, sizeof(keys));
|
|
/* phase 2: sign and combine signatures */
|
|
for (int j = 0; j < N; j++) {
|
|
ed25519_cosi_sign(msg, sizeof(msg), keys[j], nonces[j], R, pk, sigs[j]);
|
|
}
|
|
UNMARK_SECRET_DATA(sigs, sizeof(sigs));
|
|
|
|
ed25519_cosi_combine_signatures(sig, R, sigs, N);
|
|
|
|
/* check signature */
|
|
res = ed25519_sign_open(msg, sizeof(msg), pk, sig);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
UNMARK_SECRET_DATA(keys, sizeof(keys));
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
static void test_bip32_ecdh_init_node(HDNode *node, const char *seed_str, const char *curve_name) {
|
|
hdnode_from_seed((const uint8_t *)seed_str, strlen(seed_str), curve_name, node);
|
|
hdnode_fill_public_key(node);
|
|
if (node->public_key[0] == 1) {
|
|
node->public_key[0] = 0x40; // Curve25519 public keys start with 0x40 byte
|
|
}
|
|
}
|
|
|
|
static void test_bip32_ecdh(const char *curve_name, int expected_key_size, const uint8_t *expected_key) {
|
|
int res, key_size;
|
|
HDNode alice, bob;
|
|
uint8_t session_key1[expected_key_size], session_key2[expected_key_size];
|
|
|
|
test_bip32_ecdh_init_node(&alice, "Alice", curve_name);
|
|
test_bip32_ecdh_init_node(&bob, "Bob", curve_name);
|
|
|
|
// Generate shared key from Alice's secret key and Bob's public key
|
|
res = hdnode_get_shared_key(&alice, bob.public_key, session_key1, &key_size);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_int_eq(key_size, expected_key_size);
|
|
ck_assert_mem_eq(session_key1, expected_key, key_size);
|
|
|
|
// Generate shared key from Bob's secret key and Alice's public key
|
|
res = hdnode_get_shared_key(&bob, alice.public_key, session_key2, &key_size);
|
|
ck_assert_int_eq(res, 0);
|
|
ck_assert_int_eq(key_size, expected_key_size);
|
|
ck_assert_mem_eq(session_key2, expected_key, key_size);
|
|
}
|
|
|
|
START_TEST(test_bip32_ecdh_nist256p1) {
|
|
test_bip32_ecdh(
|
|
NIST256P1_NAME, 65,
|
|
fromhex("044aa56f917323f071148cd29aa423f6bee96e7fe87f914d0b91a0f95388c6631646ea92e882773d7b0b1bec356b842c8559a1377673d3965fb931c8fe51e64873"));
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_ecdh_curve25519) {
|
|
test_bip32_ecdh(
|
|
CURVE25519_NAME, 33,
|
|
fromhex("04f34e35516325bb0d4a58507096c444a05ba13524ccf66910f11ce96c62224169"));
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_bip32_ecdh_errors) {
|
|
HDNode node;
|
|
const uint8_t peer_public_key[65] = {0}; // invalid public key
|
|
uint8_t session_key[65];
|
|
int res, key_size = 0;
|
|
|
|
test_bip32_ecdh_init_node(&node, "Seed", ED25519_NAME);
|
|
res = hdnode_get_shared_key(&node, peer_public_key, session_key, &key_size);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_int_eq(key_size, 0);
|
|
|
|
test_bip32_ecdh_init_node(&node, "Seed", CURVE25519_NAME);
|
|
res = hdnode_get_shared_key(&node, peer_public_key, session_key, &key_size);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_int_eq(key_size, 0);
|
|
|
|
test_bip32_ecdh_init_node(&node, "Seed", NIST256P1_NAME);
|
|
res = hdnode_get_shared_key(&node, peer_public_key, session_key, &key_size);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_int_eq(key_size, 0);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_output_script) {
|
|
static const char *vectors[] = {
|
|
"76A914010966776006953D5567439E5E39F86A0D273BEE88AC", "16UwLL9Risc3QfPqBUvKofHmBQ7wMtjvM",
|
|
"A914010966776006953D5567439E5E39F86A0D273BEE87", "31nVrspaydBz8aMpxH9WkS2DuhgqS1fCuG",
|
|
"0014010966776006953D5567439E5E39F86A0D273BEE", "p2xtZoXeX5X8BP8JfFhQK2nD3emtjch7UeFm",
|
|
"00200102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20", "7XhPD7te3C6CVKnJWUhrTJbFTwudhHqfrjpS59AS6sMzL4RYFiCNg",
|
|
0, 0,
|
|
};
|
|
const char **scr, **adr;
|
|
scr = vectors;
|
|
adr = vectors + 1;
|
|
char address[60];
|
|
while (*scr && *adr) {
|
|
int r = script_output_to_address(fromhex(*scr), strlen(*scr)/2, address, 60);
|
|
ck_assert_int_eq(r, (int)(strlen(*adr) + 1));
|
|
ck_assert_str_eq(address, *adr);
|
|
scr += 2;
|
|
adr += 2;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_ethereum_pubkeyhash)
|
|
{
|
|
uint8_t pubkeyhash[20];
|
|
int res;
|
|
HDNode node;
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("000102030405060708090a0b0c0d0e0f"), 16, SECP256K1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("056db290f8ba3250ca64a45d16284d04bc6f5fbf"), 20);
|
|
|
|
// [Chain m/0']
|
|
hdnode_private_ckd_prime(&node, 0);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("bf6e48966d0dcf553b53e7b56cb2e0e72dca9e19"), 20);
|
|
|
|
// [Chain m/0'/1]
|
|
hdnode_private_ckd(&node, 1);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("29379f45f515c494483298225d1b347f73d1babf"), 20);
|
|
|
|
// [Chain m/0'/1/2']
|
|
hdnode_private_ckd_prime(&node, 2);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("d8e85fbbb4b3b3c71c4e63a5580d0c12fb4d2f71"), 20);
|
|
|
|
// [Chain m/0'/1/2'/2]
|
|
hdnode_private_ckd(&node, 2);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("1d3462d2319ac0bfc1a52e177a9d372492752130"), 20);
|
|
|
|
// [Chain m/0'/1/2'/2/1000000000]
|
|
hdnode_private_ckd(&node, 1000000000);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("73659c60270d326c06ac204f1a9c63f889a3d14b"), 20);
|
|
|
|
// init m
|
|
hdnode_from_seed(fromhex("fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542"), 64, SECP256K1_NAME, &node);
|
|
|
|
// [Chain m]
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("6dd2a6f3b05fd15d901fbeec61b87a34bdcfb843"), 20);
|
|
|
|
// [Chain m/0]
|
|
hdnode_private_ckd(&node, 0);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("abbcd4471a0b6e76a2f6fdc44008fe53831e208e"), 20);
|
|
|
|
// [Chain m/0/2147483647']
|
|
hdnode_private_ckd_prime(&node, 2147483647);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("40ef2cef1b2588ae862e7a511162ec7ff33c30fd"), 20);
|
|
|
|
// [Chain m/0/2147483647'/1]
|
|
hdnode_private_ckd(&node, 1);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("3f2e8905488f795ebc84a39560d133971ccf9b50"), 20);
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646']
|
|
hdnode_private_ckd_prime(&node, 2147483646);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("a5016fdf975f767e4e6f355c7a82efa69bf42ea7"), 20);
|
|
|
|
// [Chain m/0/2147483647'/1/2147483646'/2]
|
|
hdnode_private_ckd(&node, 2);
|
|
res = hdnode_get_ethereum_pubkeyhash(&node, pubkeyhash);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(pubkeyhash, fromhex("8ff2a9f7e7917804e8c8ec150d931d9c5a6fbc50"), 20);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_ethereum_address)
|
|
{
|
|
static const char *vectors[] = {
|
|
"52908400098527886E0F7030069857D2E4169EE7",
|
|
"8617E340B3D01FA5F11F306F4090FD50E238070D",
|
|
"de709f2102306220921060314715629080e2fb77",
|
|
"27b1fdb04752bbc536007a920d24acb045561c26",
|
|
"5aAeb6053F3E94C9b9A09f33669435E7Ef1BeAed",
|
|
"fB6916095ca1df60bB79Ce92cE3Ea74c37c5d359",
|
|
"dbF03B407c01E7cD3CBea99509d93f8DDDC8C6FB",
|
|
"D1220A0cf47c7B9Be7A2E6BA89F429762e7b9aDb",
|
|
"5A4EAB120fB44eb6684E5e32785702FF45ea344D",
|
|
"5be4BDC48CeF65dbCbCaD5218B1A7D37F58A0741",
|
|
"a7dD84573f5ffF821baf2205745f768F8edCDD58",
|
|
"027a49d11d118c0060746F1990273FcB8c2fC196",
|
|
"CD2a3d9F938E13CD947Ec05AbC7FE734Df8DD826",
|
|
0
|
|
};
|
|
uint8_t addr[20];
|
|
char address[41];
|
|
const char **vec = vectors;
|
|
while (*vec) {
|
|
memcpy(addr, fromhex(*vec), 20);
|
|
ethereum_address_checksum(addr, address);
|
|
ck_assert_str_eq(address, *vec);
|
|
vec++;
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// test vectors from https://raw.githubusercontent.com/NemProject/nem-test-vectors/master/1.test-keys.dat
|
|
START_TEST(test_nem_address)
|
|
{
|
|
static const struct {
|
|
const char *private_key;
|
|
const char *public_key;
|
|
const char *address;
|
|
} tests[] = {
|
|
{ "575dbb3062267eff57c970a336ebbc8fbcfe12c5bd3ed7bc11eb0481d7704ced", "c5f54ba980fcbb657dbaaa42700539b207873e134d2375efeab5f1ab52f87844", "NDD2CT6LQLIYQ56KIXI3ENTM6EK3D44P5JFXJ4R4", },
|
|
{ "5b0e3fa5d3b49a79022d7c1e121ba1cbbf4db5821f47ab8c708ef88defc29bfe", "96eb2a145211b1b7ab5f0d4b14f8abc8d695c7aee31a3cfc2d4881313c68eea3", "NABHFGE5ORQD3LE4O6B7JUFN47ECOFBFASC3SCAC", },
|
|
{ "738ba9bb9110aea8f15caa353aca5653b4bdfca1db9f34d0efed2ce1325aeeda", "2d8425e4ca2d8926346c7a7ca39826acd881a8639e81bd68820409c6e30d142a", "NAVOZX4HDVOAR4W6K4WJHWPD3MOFU27DFHC7KZOZ", },
|
|
{ "e8bf9bc0f35c12d8c8bf94dd3a8b5b4034f1063948e3cc5304e55e31aa4b95a6", "4feed486777ed38e44c489c7c4e93a830e4c4a907fa19a174e630ef0f6ed0409", "NBZ6JK5YOCU6UPSSZ5D3G27UHAPHTY5HDQMGE6TT", },
|
|
{ "c325ea529674396db5675939e7988883d59a5fc17a28ca977e3ba85370232a83", "83ee32e4e145024d29bca54f71fa335a98b3e68283f1a3099c4d4ae113b53e54", "NCQW2P5DNZ5BBXQVGS367DQ4AHC3RXOEVGRCLY6V", },
|
|
{ "a811cb7a80a7227ae61f6da536534ee3c2744e3c7e4b85f3e0df3c6a9c5613df", "6d34c04f3a0e42f0c3c6f50e475ae018cfa2f56df58c481ad4300424a6270cbb", "NA5IG3XFXZHIPJ5QLKX2FBJPEZYPMBPPK2ZRC3EH", },
|
|
{ "9c66de1ec77f4dfaaebdf9c8bc599ca7e8e6f0bc71390ffee2c9dd3f3619242a", "a8fefd72a3b833dc7c7ed7d57ed86906dac22f88f1f4331873eb2da3152a3e77", "NAABHVFJDBM74XMJJ52R7QN2MTTG2ZUXPQS62QZ7", },
|
|
{ "c56bc16ecf727878c15e24f4ae68569600ac7b251218a44ef50ce54175776edc", "c92f761e6d83d20068fd46fe4bd5b97f4c6ba05d23180679b718d1f3e4fb066e", "NCLK3OLMHR3F2E3KSBUIZ4K5PNWUDN37MLSJBJZP", },
|
|
{ "9dd73599283882fa1561ddfc9be5830b5dd453c90465d3fe5eeb646a3606374e", "eaf16a4833e59370a04ccd5c63395058de34877b48c17174c71db5ed37b537ed", "ND3AHW4VTI5R5QE5V44KIGPRU5FBJ5AFUCJXOY5H", },
|
|
{ "d9639dc6f49dad02a42fd8c217f1b1b4f8ce31ccd770388b645e639c72ff24fa", "0f74a2f537cd9c986df018994dde75bdeee05e35eb9fe27adf506ca8475064f7", "NCTZ4YAP43ONK3UYTASQVNDMBO24ZHJE65F3QPYE", },
|
|
{ "efc1992cd50b70ca55ac12c07aa5d026a8b78ffe28a7dbffc9228b26e02c38c1", "2ebff201255f6cf948c78f528658b99a7c13ac791942fa22d59af610558111f5", "NDQ2TMCMXBSFPZQPE2YKH6XLC24HD6LUMN6Z4GIC", },
|
|
{ "143a815e92e43f3ed1a921ee48cd143931b88b7c3d8e1e981f743c2a5be3c5ba", "419ed11d48730e4ae2c93f0ea4df853b8d578713a36dab227517cf965861af4e", "NA32IDDW2C53BDSBJNFL3Z6UU3J5CJZJMCZDXCF4", },
|
|
{ "bc1a082f5ac6fdd3a83ade211e5986ac0551bad6c7da96727ec744e5df963e2a", "a160e6f9112233a7ce94202ed7a4443e1dac444b5095f9fecbb965fba3f92cac", "NADUCEQLC3FTGB25GTA5HOUTB53CBVQNVOIP7NTJ", },
|
|
{ "4e47b4c6f4c7886e49ec109c61f4af5cfbb1637283218941d55a7f9fe1053f72", "fbb91b16df828e21a9802980a44fc757c588bc1382a4cea429d6fa2ae0333f56", "NBAF3BFLLPWH33MYE6VUPP5T6DQBZBKIDEQKZQOE", },
|
|
{ "efc4389da48ce49f85365cfa578c746530e9eac42db1b64ec346119b1becd347", "2232f24dda0f2ded3ecd831210d4e8521a096b50cadd5a34f3f7083374e1ec12", "NBOGTK2I2ATOGGD7ZFJHROG5MWL7XCKAUKSWIVSA", },
|
|
{ "bdba57c78ca7da16a3360efd13f06276284db8c40351de7fcd38ba0c35ac754d", "c334c6c0dad5aaa2a0d0fb4c6032cb6a0edd96bf61125b5ea9062d5a00ee0eee", "NCLERTEFYXKLK7RA4MVACEFMXMK3P7QMWTM7FBW2", },
|
|
{ "20694c1ec3c4a311bcdb29ed2edc428f6d4f9a4c429ad6a5bf3222084e35695f", "518c4de412efa93de06a55947d11f697639443916ec8fcf04ebc3e6d17d0bd93", "NB5V4BPIJHXVONO7UGMJDPFARMFA73BOBNOOYCOV", },
|
|
{ "e0d4f3760ac107b33c22c2cac24ab2f520b282684f5f66a4212ff95d926323ce", "b3d16f4ead9de67c290144da535a0ed2504b03c05e5f1ceb8c7863762f786857", "NC4PBAO5TPCAVQKBVOC4F6DMZP3CFSQBU46PSKBD", },
|
|
{ "efa9afc617412093c9c7a7c211a5332dd556f941e1a88c494ec860608610eea2", "7e7716e4cebceb731d6f1fd28676f34888e9a0000fcfa1471db1c616c2ddf559", "NCFW2LPXIWLBWAQN2QVIWEOD7IVDO3HQBD2OU56K", },
|
|
{ "d98499b3db61944684ce06a91735af4e14105338473fcf6ebe2b0bcada3dfd21", "114171230ad6f8522a000cdc73fbc5c733b30bb71f2b146ccbdf34499f79a810", "NCUKWDY3J3THKQHAKOK5ALF6ANJQABZHCH7VN6DP", },
|
|
};
|
|
|
|
HDNode node;
|
|
ed25519_secret_key private_key;
|
|
uint8_t chain_code[32];
|
|
char address[41];
|
|
|
|
for (size_t i = 0; i < (sizeof(tests) / sizeof(*tests)); i++) {
|
|
nem_private_key(tests[i].private_key, private_key);
|
|
|
|
ck_assert(hdnode_from_xprv(0, 0, chain_code, private_key, ED25519_KECCAK_NAME, &node));
|
|
|
|
ck_assert(hdnode_get_nem_address(&node, NEM_NETWORK_MAINNET, address));
|
|
ck_assert_str_eq(address, tests[i].address);
|
|
|
|
ck_assert_mem_eq(&node.public_key[1], fromhex(tests[i].public_key), 32);
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_multibyte_address)
|
|
{
|
|
uint8_t priv_key[32];
|
|
char wif[57];
|
|
uint8_t pub_key[33];
|
|
char address[40];
|
|
uint8_t decode[24];
|
|
int res;
|
|
|
|
memcpy(priv_key, fromhex("47f7616ea6f9b923076625b4488115de1ef1187f760e65f89eb6f4f7ff04b012"), 32);
|
|
ecdsa_get_wif(priv_key, 0, wif, sizeof(wif)); ck_assert_str_eq(wif, "13QtoXmbhELWcrwD9YA9KzvXy5rTaptiNuFR8L8ArpBNn4xmQj4N");
|
|
ecdsa_get_wif(priv_key, 0x12, wif, sizeof(wif)); ck_assert_str_eq(wif, "3hrF6SFnqzpzABB36uGDf8dJSuUCcMmoJrTmCWMshRkBr2Vx86qJ");
|
|
ecdsa_get_wif(priv_key, 0x1234, wif, sizeof(wif)); ck_assert_str_eq(wif, "CtPTF9awbVbfDWGepGdVhB3nBhr4HktUGya8nf8dLxgC8tbqBreB9");
|
|
ecdsa_get_wif(priv_key, 0x123456, wif, sizeof(wif)); ck_assert_str_eq(wif, "uTrDevVQt5QZgoL3iJ1cPWHaCz7ZMBncM7QXZfCegtxiMHqBvWoYJa");
|
|
ecdsa_get_wif(priv_key, 0x12345678, wif, sizeof(wif)); ck_assert_str_eq(wif, "4zZWMzv1SVbs95pmLXWrXJVp9ntPEam1mfwb6CXBLn9MpWNxLg9huYgv");
|
|
ecdsa_get_wif(priv_key, 0xffffffff, wif, sizeof(wif)); ck_assert_str_eq(wif, "y9KVfV1RJXcTxpVjeuh6WYWh8tMwnAUeyUwDEiRviYdrJ61njTmnfUjE");
|
|
|
|
memcpy(pub_key, fromhex("0378d430274f8c5ec1321338151e9f27f4c676a008bdf8638d07c0b6be9ab35c71"), 33);
|
|
ecdsa_get_address(pub_key, 0, address, sizeof(address)); ck_assert_str_eq(address, "1C7zdTfnkzmr13HfA2vNm5SJYRK6nEKyq8");
|
|
ecdsa_get_address(pub_key, 0x12, address, sizeof(address)); ck_assert_str_eq(address, "8SCrMR2yYF7ciqoDbav7VLLTsVx5dTVPPq");
|
|
ecdsa_get_address(pub_key, 0x1234, address, sizeof(address)); ck_assert_str_eq(address, "ZLH8q1UgMPg8o2s1MD55YVMpPV7vqms9kiV");
|
|
ecdsa_get_address(pub_key, 0x123456, address, sizeof(address)); ck_assert_str_eq(address, "3ThqvsQVFnbiF66NwHtfe2j6AKn75DpLKpQSq");
|
|
ecdsa_get_address(pub_key, 0x12345678, address, sizeof(address)); ck_assert_str_eq(address, "BrsGxAHga3VbopvSnb3gmLvMBhJNCGuDxBZL44");
|
|
ecdsa_get_address(pub_key, 0xffffffff, address, sizeof(address)); ck_assert_str_eq(address, "3diW7paWGJyZRLGqMJZ55DMfPExob8QxQHkrfYT");
|
|
|
|
res = ecdsa_address_decode("1C7zdTfnkzmr13HfA2vNm5SJYRK6nEKyq8", 0, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("0079fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
res = ecdsa_address_decode("8SCrMR2yYF7ciqoDbav7VLLTsVx5dTVPPq", 0x12, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("1279fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
res = ecdsa_address_decode("ZLH8q1UgMPg8o2s1MD55YVMpPV7vqms9kiV", 0x1234, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("123479fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
res = ecdsa_address_decode("3ThqvsQVFnbiF66NwHtfe2j6AKn75DpLKpQSq", 0x123456, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("12345679fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
res = ecdsa_address_decode("BrsGxAHga3VbopvSnb3gmLvMBhJNCGuDxBZL44", 0x12345678, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("1234567879fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
res = ecdsa_address_decode("3diW7paWGJyZRLGqMJZ55DMfPExob8QxQHkrfYT", 0xffffffff, decode);
|
|
ck_assert_int_eq(res, 1);
|
|
ck_assert_mem_eq(decode, fromhex("ffffffff79fbfc3f34e7745860d76137da68f362380c606c"), 21);
|
|
|
|
// wrong length
|
|
res = ecdsa_address_decode("BrsGxAHga3VbopvSnb3gmLvMBhJNCGuDxBZL44", 0x123456, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
// wrong address prefix
|
|
res = ecdsa_address_decode("BrsGxAHga3VbopvSnb3gmLvMBhJNCGuDxBZL44", 0x22345678, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
|
|
// wrong checksum
|
|
res = ecdsa_address_decode("BrsGxAHga3VbopvSnb3gmLvMBhJNCGuDxBZL45", 0x12345678, decode);
|
|
ck_assert_int_eq(res, 0);
|
|
}
|
|
END_TEST
|
|
|
|
// https://tools.ietf.org/html/rfc6229#section-2
|
|
START_TEST(test_rc4_rfc6229)
|
|
{
|
|
static const size_t offsets[] = {
|
|
0x0,
|
|
0xf0,
|
|
0x1f0,
|
|
0x2f0,
|
|
0x3f0,
|
|
0x5f0,
|
|
0x7f0,
|
|
0xbf0,
|
|
0xff0,
|
|
};
|
|
|
|
static const struct {
|
|
char key[65];
|
|
char vectors[sizeof(offsets) / sizeof(*offsets)][65];
|
|
} tests[] = {
|
|
{
|
|
"0102030405",
|
|
{
|
|
"b2396305f03dc027ccc3524a0a1118a8" "6982944f18fc82d589c403a47a0d0919",
|
|
"28cb1132c96ce286421dcaadb8b69eae" "1cfcf62b03eddb641d77dfcf7f8d8c93",
|
|
"42b7d0cdd918a8a33dd51781c81f4041" "6459844432a7da923cfb3eb4980661f6",
|
|
"ec10327bde2beefd18f9277680457e22" "eb62638d4f0ba1fe9fca20e05bf8ff2b",
|
|
"45129048e6a0ed0b56b490338f078da5" "30abbcc7c20b01609f23ee2d5f6bb7df",
|
|
"3294f744d8f9790507e70f62e5bbceea" "d8729db41882259bee4f825325f5a130",
|
|
"1eb14a0c13b3bf47fa2a0ba93ad45b8b" "cc582f8ba9f265e2b1be9112e975d2d7",
|
|
"f2e30f9bd102ecbf75aaade9bc35c43c" "ec0e11c479dc329dc8da7968fe965681",
|
|
"068326a2118416d21f9d04b2cd1ca050" "ff25b58995996707e51fbdf08b34d875",
|
|
}
|
|
}, {
|
|
"01020304050607",
|
|
{
|
|
"293f02d47f37c9b633f2af5285feb46b" "e620f1390d19bd84e2e0fd752031afc1",
|
|
"914f02531c9218810df60f67e338154c" "d0fdb583073ce85ab83917740ec011d5",
|
|
"75f81411e871cffa70b90c74c592e454" "0bb87202938dad609e87a5a1b079e5e4",
|
|
"c2911246b612e7e7b903dfeda1dad866" "32828f91502b6291368de8081de36fc2",
|
|
"f3b9a7e3b297bf9ad804512f9063eff1" "8ecb67a9ba1f55a5a067e2b026a3676f",
|
|
"d2aa902bd42d0d7cfd340cd45810529f" "78b272c96e42eab4c60bd914e39d06e3",
|
|
"f4332fd31a079396ee3cee3f2a4ff049" "05459781d41fda7f30c1be7e1246c623",
|
|
"adfd3868b8e51485d5e610017e3dd609" "ad26581c0c5be45f4cea01db2f3805d5",
|
|
"f3172ceffc3b3d997c85ccd5af1a950c" "e74b0b9731227fd37c0ec08a47ddd8b8",
|
|
}
|
|
}, {
|
|
"0102030405060708",
|
|
{
|
|
"97ab8a1bf0afb96132f2f67258da15a8" "8263efdb45c4a18684ef87e6b19e5b09",
|
|
"9636ebc9841926f4f7d1f362bddf6e18" "d0a990ff2c05fef5b90373c9ff4b870a",
|
|
"73239f1db7f41d80b643c0c52518ec63" "163b319923a6bdb4527c626126703c0f",
|
|
"49d6c8af0f97144a87df21d91472f966" "44173a103b6616c5d5ad1cee40c863d0",
|
|
"273c9c4b27f322e4e716ef53a47de7a4" "c6d0e7b226259fa9023490b26167ad1d",
|
|
"1fe8986713f07c3d9ae1c163ff8cf9d3" "8369e1a965610be887fbd0c79162aafb",
|
|
"0a0127abb44484b9fbef5abcae1b579f" "c2cdadc6402e8ee866e1f37bdb47e42c",
|
|
"26b51ea37df8e1d6f76fc3b66a7429b3" "bc7683205d4f443dc1f29dda3315c87b",
|
|
"d5fa5a3469d29aaaf83d23589db8c85b" "3fb46e2c8f0f068edce8cdcd7dfc5862",
|
|
}
|
|
}, {
|
|
"0102030405060708090a",
|
|
{
|
|
"ede3b04643e586cc907dc21851709902" "03516ba78f413beb223aa5d4d2df6711",
|
|
"3cfd6cb58ee0fdde640176ad0000044d" "48532b21fb6079c9114c0ffd9c04a1ad",
|
|
"3e8cea98017109979084b1ef92f99d86" "e20fb49bdb337ee48b8d8dc0f4afeffe",
|
|
"5c2521eacd7966f15e056544bea0d315" "e067a7031931a246a6c3875d2f678acb",
|
|
"a64f70af88ae56b6f87581c0e23e6b08" "f449031de312814ec6f319291f4a0516",
|
|
"bdae85924b3cb1d0a2e33a30c6d79599" "8a0feddbac865a09bcd127fb562ed60a",
|
|
"b55a0a5b51a12a8be34899c3e047511a" "d9a09cea3ce75fe39698070317a71339",
|
|
"552225ed1177f44584ac8cfa6c4eb5fc" "7e82cbabfc95381b080998442129c2f8",
|
|
"1f135ed14ce60a91369d2322bef25e3c" "08b6be45124a43e2eb77953f84dc8553",
|
|
}
|
|
}, {
|
|
"0102030405060708090a0b0c0d0e0f10",
|
|
{
|
|
"9ac7cc9a609d1ef7b2932899cde41b97" "5248c4959014126a6e8a84f11d1a9e1c",
|
|
"065902e4b620f6cc36c8589f66432f2b" "d39d566bc6bce3010768151549f3873f",
|
|
"b6d1e6c4a5e4771cad79538df295fb11" "c68c1d5c559a974123df1dbc52a43b89",
|
|
"c5ecf88de897fd57fed301701b82a259" "eccbe13de1fcc91c11a0b26c0bc8fa4d",
|
|
"e7a72574f8782ae26aabcf9ebcd66065" "bdf0324e6083dcc6d3cedd3ca8c53c16",
|
|
"b40110c4190b5622a96116b0017ed297" "ffa0b514647ec04f6306b892ae661181",
|
|
"d03d1bc03cd33d70dff9fa5d71963ebd" "8a44126411eaa78bd51e8d87a8879bf5",
|
|
"fabeb76028ade2d0e48722e46c4615a3" "c05d88abd50357f935a63c59ee537623",
|
|
"ff38265c1642c1abe8d3c2fe5e572bf8" "a36a4c301ae8ac13610ccbc12256cacc",
|
|
}
|
|
}, {
|
|
"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f20",
|
|
{
|
|
"eaa6bd25880bf93d3f5d1e4ca2611d91" "cfa45c9f7e714b54bdfa80027cb14380",
|
|
"114ae344ded71b35f2e60febad727fd8" "02e1e7056b0f623900496422943e97b6",
|
|
"91cb93c787964e10d9527d999c6f936b" "49b18b42f8e8367cbeb5ef104ba1c7cd",
|
|
"87084b3ba700bade955610672745b374" "e7a7b9e9ec540d5ff43bdb12792d1b35",
|
|
"c799b596738f6b018c76c74b1759bd90" "7fec5bfd9f9b89ce6548309092d7e958",
|
|
"40f250b26d1f096a4afd4c340a588815" "3e34135c79db010200767651cf263073",
|
|
"f656abccf88dd827027b2ce917d464ec" "18b62503bfbc077fbabb98f20d98ab34",
|
|
"8aed95ee5b0dcbfbef4eb21d3a3f52f9" "625a1ab00ee39a5327346bddb01a9c18",
|
|
"a13a7c79c7e119b5ab0296ab28c300b9" "f3e4c0a2e02d1d01f7f0a74618af2b48",
|
|
}
|
|
}, {
|
|
"833222772a",
|
|
{
|
|
"80ad97bdc973df8a2e879e92a497efda" "20f060c2f2e5126501d3d4fea10d5fc0",
|
|
"faa148e99046181fec6b2085f3b20ed9" "f0daf5bab3d596839857846f73fbfe5a",
|
|
"1c7e2fc4639232fe297584b296996bc8" "3db9b249406cc8edffac55ccd322ba12",
|
|
"e4f9f7e0066154bbd125b745569bc897" "75d5ef262b44c41a9cf63ae14568e1b9",
|
|
"6da453dbf81e82334a3d8866cb50a1e3" "7828d074119cab5c22b294d7a9bfa0bb",
|
|
"adb89cea9a15fbe617295bd04b8ca05c" "6251d87fd4aaae9a7e4ad5c217d3f300",
|
|
"e7119bd6dd9b22afe8f89585432881e2" "785b60fd7ec4e9fcb6545f350d660fab",
|
|
"afecc037fdb7b0838eb3d70bcd268382" "dbc1a7b49d57358cc9fa6d61d73b7cf0",
|
|
"6349d126a37afcba89794f9804914fdc" "bf42c3018c2f7c66bfde524975768115",
|
|
}
|
|
}, {
|
|
"1910833222772a",
|
|
{
|
|
"bc9222dbd3274d8fc66d14ccbda6690b" "7ae627410c9a2be693df5bb7485a63e3",
|
|
"3f0931aa03defb300f060103826f2a64" "beaa9ec8d59bb68129f3027c96361181",
|
|
"74e04db46d28648d7dee8a0064b06cfe" "9b5e81c62fe023c55be42f87bbf932b8",
|
|
"ce178fc1826efecbc182f57999a46140" "8bdf55cd55061c06dba6be11de4a578a",
|
|
"626f5f4dce652501f3087d39c92cc349" "42daac6a8f9ab9a7fd137c6037825682",
|
|
"cc03fdb79192a207312f53f5d4dc33d9" "f70f14122a1c98a3155d28b8a0a8a41d",
|
|
"2a3a307ab2708a9c00fe0b42f9c2d6a1" "862617627d2261eab0b1246597ca0ae9",
|
|
"55f877ce4f2e1ddbbf8e13e2cde0fdc8" "1b1556cb935f173337705fbb5d501fc1",
|
|
"ecd0e96602be7f8d5092816cccf2c2e9" "027881fab4993a1c262024a94fff3f61",
|
|
}
|
|
}, {
|
|
"641910833222772a",
|
|
{
|
|
"bbf609de9413172d07660cb680716926" "46101a6dab43115d6c522b4fe93604a9",
|
|
"cbe1fff21c96f3eef61e8fe0542cbdf0" "347938bffa4009c512cfb4034b0dd1a7",
|
|
"7867a786d00a7147904d76ddf1e520e3" "8d3e9e1caefcccb3fbf8d18f64120b32",
|
|
"942337f8fd76f0fae8c52d7954810672" "b8548c10f51667f6e60e182fa19b30f7",
|
|
"0211c7c6190c9efd1237c34c8f2e06c4" "bda64f65276d2aacb8f90212203a808e",
|
|
"bd3820f732ffb53ec193e79d33e27c73" "d0168616861907d482e36cdac8cf5749",
|
|
"97b0f0f224b2d2317114808fb03af7a0" "e59616e469787939a063ceea9af956d1",
|
|
"c47e0dc1660919c11101208f9e69aa1f" "5ae4f12896b8379a2aad89b5b553d6b0",
|
|
"6b6b098d0c293bc2993d80bf0518b6d9" "8170cc3ccd92a698621b939dd38fe7b9",
|
|
}
|
|
}, {
|
|
"8b37641910833222772a",
|
|
{
|
|
"ab65c26eddb287600db2fda10d1e605c" "bb759010c29658f2c72d93a2d16d2930",
|
|
"b901e8036ed1c383cd3c4c4dd0a6ab05" "3d25ce4922924c55f064943353d78a6c",
|
|
"12c1aa44bbf87e75e611f69b2c38f49b" "28f2b3434b65c09877470044c6ea170d",
|
|
"bd9ef822de5288196134cf8af7839304" "67559c23f052158470a296f725735a32",
|
|
"8bab26fbc2c12b0f13e2ab185eabf241" "31185a6d696f0cfa9b42808b38e132a2",
|
|
"564d3dae183c5234c8af1e51061c44b5" "3c0778a7b5f72d3c23a3135c7d67b9f4",
|
|
"f34369890fcf16fb517dcaae4463b2dd" "02f31c81e8200731b899b028e791bfa7",
|
|
"72da646283228c14300853701795616f" "4e0a8c6f7934a788e2265e81d6d0c8f4",
|
|
"438dd5eafea0111b6f36b4b938da2a68" "5f6bfc73815874d97100f086979357d8",
|
|
}
|
|
}, {
|
|
"ebb46227c6cc8b37641910833222772a",
|
|
{
|
|
"720c94b63edf44e131d950ca211a5a30" "c366fdeacf9ca80436be7c358424d20b",
|
|
"b3394a40aabf75cba42282ef25a0059f" "4847d81da4942dbc249defc48c922b9f",
|
|
"08128c469f275342adda202b2b58da95" "970dacef40ad98723bac5d6955b81761",
|
|
"3cb89993b07b0ced93de13d2a11013ac" "ef2d676f1545c2c13dc680a02f4adbfe",
|
|
"b60595514f24bc9fe522a6cad7393644" "b515a8c5011754f59003058bdb81514e",
|
|
"3c70047e8cbc038e3b9820db601da495" "1175da6ee756de46a53e2b075660b770",
|
|
"00a542bba02111cc2c65b38ebdba587e" "5865fdbb5b48064104e830b380f2aede",
|
|
"34b21ad2ad44e999db2d7f0863f0d9b6" "84a9218fc36e8a5f2ccfbeae53a27d25",
|
|
"a2221a11b833ccb498a59540f0545f4a" "5bbeb4787d59e5373fdbea6c6f75c29b",
|
|
}
|
|
}, {
|
|
"c109163908ebe51debb46227c6cc8b37641910833222772a",
|
|
{
|
|
"54b64e6b5a20b5e2ec84593dc7989da7" "c135eee237a85465ff97dc03924f45ce",
|
|
"cfcc922fb4a14ab45d6175aabbf2d201" "837b87e2a446ad0ef798acd02b94124f",
|
|
"17a6dbd664926a0636b3f4c37a4f4694" "4a5f9f26aeeed4d4a25f632d305233d9",
|
|
"80a3d01ef00c8e9a4209c17f4eeb358c" "d15e7d5ffaaabc0207bf200a117793a2",
|
|
"349682bf588eaa52d0aa1560346aeafa" "f5854cdb76c889e3ad63354e5f7275e3",
|
|
"532c7ceccb39df3236318405a4b1279c" "baefe6d9ceb651842260e0d1e05e3b90",
|
|
"e82d8c6db54e3c633f581c952ba04207" "4b16e50abd381bd70900a9cd9a62cb23",
|
|
"3682ee33bd148bd9f58656cd8f30d9fb" "1e5a0b8475045d9b20b2628624edfd9e",
|
|
"63edd684fb826282fe528f9c0e9237bc" "e4dd2e98d6960fae0b43545456743391",
|
|
}
|
|
}, {
|
|
"1ada31d5cf688221c109163908ebe51debb46227c6cc8b37641910833222772a",
|
|
{
|
|
"dd5bcb0018e922d494759d7c395d02d3" "c8446f8f77abf737685353eb89a1c9eb",
|
|
"af3e30f9c095045938151575c3fb9098" "f8cb6274db99b80b1d2012a98ed48f0e",
|
|
"25c3005a1cb85de076259839ab7198ab" "9dcbc183e8cb994b727b75be3180769c",
|
|
"a1d3078dfa9169503ed9d4491dee4eb2" "8514a5495858096f596e4bcd66b10665",
|
|
"5f40d59ec1b03b33738efa60b2255d31" "3477c7f764a41baceff90bf14f92b7cc",
|
|
"ac4e95368d99b9eb78b8da8f81ffa795" "8c3c13f8c2388bb73f38576e65b7c446",
|
|
"13c4b9c1dfb66579eddd8a280b9f7316" "ddd27820550126698efaadc64b64f66e",
|
|
"f08f2e66d28ed143f3a237cf9de73559" "9ea36c525531b880ba124334f57b0b70",
|
|
"d5a39e3dfcc50280bac4a6b5aa0dca7d" "370b1c1fe655916d97fd0d47ca1d72b8",
|
|
}
|
|
}
|
|
};
|
|
|
|
RC4_CTX ctx;
|
|
uint8_t key[64];
|
|
uint8_t buffer[0x1010];
|
|
|
|
for (size_t i = 0; i < (sizeof(tests) / sizeof(*tests)); i++) {
|
|
size_t length = strlen(tests[i].key) / 2;
|
|
memcpy(key, fromhex(tests[i].key), length);
|
|
memset(buffer, 0, sizeof(buffer));
|
|
|
|
rc4_init(&ctx, key, length);
|
|
rc4_encrypt(&ctx, buffer, sizeof(buffer));
|
|
|
|
for (size_t j = 0; j < (sizeof(offsets) / sizeof(*offsets)); j++) {
|
|
size_t size = strlen(tests[i].vectors[j]) / 2;
|
|
ck_assert_mem_eq(&buffer[offsets[j]], fromhex(tests[i].vectors[j]), size);
|
|
}
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
// define test suite and cases
|
|
Suite *test_suite(void)
|
|
{
|
|
Suite *s = suite_create("trezor-crypto");
|
|
TCase *tc;
|
|
|
|
tc = tcase_create("bignum");
|
|
tcase_add_test(tc, test_bignum_read_be);
|
|
tcase_add_test(tc, test_bignum_write_be);
|
|
tcase_add_test(tc, test_bignum_is_equal);
|
|
tcase_add_test(tc, test_bignum_zero);
|
|
tcase_add_test(tc, test_bignum_is_zero);
|
|
tcase_add_test(tc, test_bignum_one);
|
|
tcase_add_test(tc, test_bignum_read_le);
|
|
tcase_add_test(tc, test_bignum_write_le);
|
|
tcase_add_test(tc, test_bignum_read_uint32);
|
|
tcase_add_test(tc, test_bignum_read_uint64);
|
|
tcase_add_test(tc, test_bignum_write_uint32);
|
|
tcase_add_test(tc, test_bignum_write_uint64);
|
|
tcase_add_test(tc, test_bignum_copy);
|
|
tcase_add_test(tc, test_bignum_is_even);
|
|
tcase_add_test(tc, test_bignum_is_odd);
|
|
tcase_add_test(tc, test_bignum_bitcount);
|
|
tcase_add_test(tc, test_bignum_digitcount);
|
|
tcase_add_test(tc, test_bignum_is_less);
|
|
tcase_add_test(tc, test_bignum_format);
|
|
tcase_add_test(tc, test_bignum_format_uint64);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("base32");
|
|
tcase_add_test(tc, test_base32_rfc4648);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("base58");
|
|
tcase_add_test(tc, test_base58);
|
|
suite_add_tcase(s, tc);
|
|
|
|
#if USE_GRAPHENE
|
|
tc = tcase_create("base58gph");
|
|
tcase_add_test(tc, test_base58gph);
|
|
suite_add_tcase(s, tc);
|
|
#endif
|
|
|
|
tc = tcase_create("bignum_divmod");
|
|
tcase_add_test(tc, test_bignum_divmod);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("bip32");
|
|
tcase_add_test(tc, test_bip32_vector_1);
|
|
tcase_add_test(tc, test_bip32_vector_2);
|
|
tcase_add_test(tc, test_bip32_compare);
|
|
tcase_add_test(tc, test_bip32_optimized);
|
|
tcase_add_test(tc, test_bip32_cache_1);
|
|
tcase_add_test(tc, test_bip32_cache_2);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("bip32-nist");
|
|
tcase_add_test(tc, test_bip32_nist_seed);
|
|
tcase_add_test(tc, test_bip32_nist_vector_1);
|
|
tcase_add_test(tc, test_bip32_nist_vector_2);
|
|
tcase_add_test(tc, test_bip32_nist_compare);
|
|
tcase_add_test(tc, test_bip32_nist_repeat);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("bip32-ed25519");
|
|
tcase_add_test(tc, test_bip32_ed25519_vector_1);
|
|
tcase_add_test(tc, test_bip32_ed25519_vector_2);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("bip32-ecdh");
|
|
tcase_add_test(tc, test_bip32_ecdh_nist256p1);
|
|
tcase_add_test(tc, test_bip32_ecdh_curve25519);
|
|
tcase_add_test(tc, test_bip32_ecdh_errors);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ecdsa");
|
|
tcase_add_test(tc, test_ecdsa_signature);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("rfc6979");
|
|
tcase_add_test(tc, test_rfc6979);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("address");
|
|
tcase_add_test(tc, test_address);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("address_decode");
|
|
tcase_add_test(tc, test_address_decode);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ethereum_address");
|
|
tcase_add_test(tc, test_ethereum_address);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("wif");
|
|
tcase_add_test(tc, test_wif);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ecdsa_der");
|
|
tcase_add_test(tc, test_ecdsa_der);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("aes");
|
|
tcase_add_test(tc, test_aes);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("sha2");
|
|
tcase_add_test(tc, test_sha1);
|
|
tcase_add_test(tc, test_sha256);
|
|
tcase_add_test(tc, test_sha512);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("sha3");
|
|
tcase_add_test(tc, test_sha3_256);
|
|
tcase_add_test(tc, test_sha3_512);
|
|
tcase_add_test(tc, test_keccak_256);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("blake2");
|
|
tcase_add_test(tc, test_blake2b);
|
|
tcase_add_test(tc, test_blake2s);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("pbkdf2");
|
|
tcase_add_test(tc, test_pbkdf2_hmac_sha256);
|
|
tcase_add_test(tc, test_pbkdf2_hmac_sha512);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("bip39");
|
|
tcase_add_test(tc, test_mnemonic);
|
|
tcase_add_test(tc, test_mnemonic_check);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("pubkey_validity");
|
|
tcase_add_test(tc, test_pubkey_validity);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("pubkey_uncompress");
|
|
tcase_add_test(tc, test_pubkey_uncompress);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("codepoints");
|
|
tcase_add_test(tc, test_codepoints_secp256k1);
|
|
tcase_add_test(tc, test_codepoints_nist256p1);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("mult_border_cases");
|
|
tcase_add_test(tc, test_mult_border_cases_secp256k1);
|
|
tcase_add_test(tc, test_mult_border_cases_nist256p1);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("scalar_mult");
|
|
tcase_add_test(tc, test_scalar_mult_secp256k1);
|
|
tcase_add_test(tc, test_scalar_mult_nist256p1);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("point_mult");
|
|
tcase_add_test(tc, test_point_mult_secp256k1);
|
|
tcase_add_test(tc, test_point_mult_nist256p1);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("scalar_point_mult");
|
|
tcase_add_test(tc, test_scalar_point_mult_secp256k1);
|
|
tcase_add_test(tc, test_scalar_point_mult_nist256p1);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ed25519");
|
|
tcase_add_test(tc, test_ed25519);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ed25519_keccak");
|
|
tcase_add_test(tc, test_ed25519_keccak);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ed25519_cosi");
|
|
tcase_add_test(tc, test_ed25519_cosi);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("script");
|
|
tcase_add_test(tc, test_output_script);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("ethereum_pubkeyhash");
|
|
tcase_add_test(tc, test_ethereum_pubkeyhash);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("nem_address");
|
|
tcase_add_test(tc, test_nem_address);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("multibyte_address");
|
|
tcase_add_test(tc, test_multibyte_address);
|
|
suite_add_tcase(s, tc);
|
|
|
|
tc = tcase_create("rc4");
|
|
tcase_add_test(tc, test_rc4_rfc6229);
|
|
suite_add_tcase(s, tc);
|
|
|
|
return s;
|
|
}
|
|
|
|
// run suite
|
|
int main(void)
|
|
{
|
|
int number_failed;
|
|
Suite *s = test_suite();
|
|
SRunner *sr = srunner_create(s);
|
|
srunner_run_all(sr, CK_VERBOSE);
|
|
number_failed = srunner_ntests_failed(sr);
|
|
srunner_free(sr);
|
|
if (number_failed == 0) {
|
|
printf("PASSED ALL TESTS\n");
|
|
}
|
|
return number_failed;
|
|
}
|