prysm-pulse/validator/keymanager/derived/eip_test.go
terence 5a66807989
Update to V5 (#13622)
* First take at updating everything to v5

* Patch gRPC gateway to use prysm v5

Fix patch

* Update go ssz

---------

Co-authored-by: Preston Van Loon <pvanloon@offchainlabs.com>
2024-02-15 05:46:47 +00:00

125 lines
4.1 KiB
Go

package derived
import (
"encoding/hex"
"fmt"
"math/big"
"testing"
"github.com/pkg/errors"
"github.com/prysmaticlabs/prysm/v5/crypto/bls"
"github.com/prysmaticlabs/prysm/v5/testing/assert"
"github.com/prysmaticlabs/prysm/v5/testing/require"
util "github.com/wealdtech/go-eth2-util"
)
func TestDerivationFromMnemonic(t *testing.T) {
mnemonic := "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about"
passphrase := "TREZOR"
lang := "english"
seed := "c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04"
masterSK := "6083874454709270928345386274498605044986640685124978867557563392430687146096"
childIndex := 0
childSK := "20397789859736650942317412262472558107875392172444076792671091975210932703118"
seedBytes, err := hex.DecodeString(seed)
require.NoError(t, err)
derivedSeed, err := seedFromMnemonic(mnemonic, lang, passphrase)
require.NoError(t, err)
assert.DeepEqual(t, seedBytes, derivedSeed)
// We derive keys, then check the master SK and the child SK.
withdrawalKey, err := util.PrivateKeyFromSeedAndPath(seedBytes, "m")
require.NoError(t, err)
validatingKey, err := util.PrivateKeyFromSeedAndPath(seedBytes, fmt.Sprintf("m/%d", childIndex))
require.NoError(t, err)
expectedMasterSK, err := secretKeyFromBigNum(masterSK)
require.NoError(t, err)
expectedChildSK, err := secretKeyFromBigNum(childSK)
require.NoError(t, err)
assert.DeepEqual(t, expectedMasterSK.Marshal(), withdrawalKey.Marshal())
assert.DeepEqual(t, expectedChildSK.Marshal(), validatingKey.Marshal())
}
func TestDerivationFromSeed(t *testing.T) {
type fields struct {
seed string
childIndex int
}
type want struct {
masterSK string
childSK string
}
tests := []struct {
name string
fields fields
want want
}{
{
name: "Case 1",
fields: fields{
seed: "3141592653589793238462643383279502884197169399375105820974944592",
childIndex: 3141592653,
},
want: want{
masterSK: "29757020647961307431480504535336562678282505419141012933316116377660817309383",
childSK: "25457201688850691947727629385191704516744796114925897962676248250929345014287",
},
},
{
name: "Case 2",
fields: fields{
seed: "0099FF991111002299DD7744EE3355BBDD8844115566CC55663355668888CC00",
childIndex: 4294967295,
},
want: want{
masterSK: "27580842291869792442942448775674722299803720648445448686099262467207037398656",
childSK: "29358610794459428860402234341874281240803786294062035874021252734817515685787",
},
},
{
name: "Case 3",
fields: fields{
seed: "d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3",
childIndex: 42,
},
want: want{
masterSK: "19022158461524446591288038168518313374041767046816487870552872741050760015818",
childSK: "31372231650479070279774297061823572166496564838472787488249775572789064611981",
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
seedBytes, err := hex.DecodeString(tt.fields.seed)
require.NoError(t, err)
// We derive keys, then check the master SK and the child SK.
masterSK, err := util.PrivateKeyFromSeedAndPath(seedBytes, "m")
require.NoError(t, err)
childSK, err := util.PrivateKeyFromSeedAndPath(seedBytes, fmt.Sprintf("m/%d", tt.fields.childIndex))
require.NoError(t, err)
expectedMasterSK, err := secretKeyFromBigNum(tt.want.masterSK)
require.NoError(t, err)
expectedChildSK, err := secretKeyFromBigNum(tt.want.childSK)
require.NoError(t, err)
assert.DeepEqual(t, expectedMasterSK.Marshal(), masterSK.Marshal())
assert.DeepEqual(t, expectedChildSK.Marshal(), childSK.Marshal())
})
}
}
func secretKeyFromBigNum(s string) (bls.SecretKey, error) {
num := new(big.Int)
num, ok := num.SetString(s, 10)
if !ok {
return nil, errors.New("could not set big int from string")
}
bts := num.Bytes()
if len(bts) != 32 {
return nil, errors.Errorf("provided big number string sets to a key unequal to 32 bytes: %d != 32", len(bts))
}
return bls.SecretKeyFromBytes(bts)
}