mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-22 19:40:37 +00:00
5a66807989
* First take at updating everything to v5 * Patch gRPC gateway to use prysm v5 Fix patch * Update go ssz --------- Co-authored-by: Preston Van Loon <pvanloon@offchainlabs.com>
125 lines
4.1 KiB
Go
125 lines
4.1 KiB
Go
package derived
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"fmt"
|
|
"math/big"
|
|
"testing"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v5/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/v5/testing/require"
|
|
util "github.com/wealdtech/go-eth2-util"
|
|
)
|
|
|
|
func TestDerivationFromMnemonic(t *testing.T) {
|
|
mnemonic := "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about"
|
|
passphrase := "TREZOR"
|
|
lang := "english"
|
|
seed := "c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04"
|
|
masterSK := "6083874454709270928345386274498605044986640685124978867557563392430687146096"
|
|
childIndex := 0
|
|
childSK := "20397789859736650942317412262472558107875392172444076792671091975210932703118"
|
|
seedBytes, err := hex.DecodeString(seed)
|
|
require.NoError(t, err)
|
|
derivedSeed, err := seedFromMnemonic(mnemonic, lang, passphrase)
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, seedBytes, derivedSeed)
|
|
|
|
// We derive keys, then check the master SK and the child SK.
|
|
withdrawalKey, err := util.PrivateKeyFromSeedAndPath(seedBytes, "m")
|
|
require.NoError(t, err)
|
|
validatingKey, err := util.PrivateKeyFromSeedAndPath(seedBytes, fmt.Sprintf("m/%d", childIndex))
|
|
require.NoError(t, err)
|
|
|
|
expectedMasterSK, err := secretKeyFromBigNum(masterSK)
|
|
require.NoError(t, err)
|
|
expectedChildSK, err := secretKeyFromBigNum(childSK)
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, expectedMasterSK.Marshal(), withdrawalKey.Marshal())
|
|
assert.DeepEqual(t, expectedChildSK.Marshal(), validatingKey.Marshal())
|
|
}
|
|
|
|
func TestDerivationFromSeed(t *testing.T) {
|
|
type fields struct {
|
|
seed string
|
|
childIndex int
|
|
}
|
|
type want struct {
|
|
masterSK string
|
|
childSK string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
want want
|
|
}{
|
|
{
|
|
name: "Case 1",
|
|
fields: fields{
|
|
seed: "3141592653589793238462643383279502884197169399375105820974944592",
|
|
childIndex: 3141592653,
|
|
},
|
|
want: want{
|
|
masterSK: "29757020647961307431480504535336562678282505419141012933316116377660817309383",
|
|
childSK: "25457201688850691947727629385191704516744796114925897962676248250929345014287",
|
|
},
|
|
},
|
|
{
|
|
name: "Case 2",
|
|
fields: fields{
|
|
seed: "0099FF991111002299DD7744EE3355BBDD8844115566CC55663355668888CC00",
|
|
childIndex: 4294967295,
|
|
},
|
|
want: want{
|
|
masterSK: "27580842291869792442942448775674722299803720648445448686099262467207037398656",
|
|
childSK: "29358610794459428860402234341874281240803786294062035874021252734817515685787",
|
|
},
|
|
},
|
|
{
|
|
name: "Case 3",
|
|
fields: fields{
|
|
seed: "d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3",
|
|
childIndex: 42,
|
|
},
|
|
want: want{
|
|
masterSK: "19022158461524446591288038168518313374041767046816487870552872741050760015818",
|
|
childSK: "31372231650479070279774297061823572166496564838472787488249775572789064611981",
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
seedBytes, err := hex.DecodeString(tt.fields.seed)
|
|
require.NoError(t, err)
|
|
|
|
// We derive keys, then check the master SK and the child SK.
|
|
masterSK, err := util.PrivateKeyFromSeedAndPath(seedBytes, "m")
|
|
require.NoError(t, err)
|
|
childSK, err := util.PrivateKeyFromSeedAndPath(seedBytes, fmt.Sprintf("m/%d", tt.fields.childIndex))
|
|
require.NoError(t, err)
|
|
|
|
expectedMasterSK, err := secretKeyFromBigNum(tt.want.masterSK)
|
|
require.NoError(t, err)
|
|
expectedChildSK, err := secretKeyFromBigNum(tt.want.childSK)
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, expectedMasterSK.Marshal(), masterSK.Marshal())
|
|
assert.DeepEqual(t, expectedChildSK.Marshal(), childSK.Marshal())
|
|
})
|
|
}
|
|
}
|
|
|
|
func secretKeyFromBigNum(s string) (bls.SecretKey, error) {
|
|
num := new(big.Int)
|
|
num, ok := num.SetString(s, 10)
|
|
if !ok {
|
|
return nil, errors.New("could not set big int from string")
|
|
}
|
|
bts := num.Bytes()
|
|
if len(bts) != 32 {
|
|
return nil, errors.Errorf("provided big number string sets to a key unequal to 32 bytes: %d != 32", len(bts))
|
|
}
|
|
return bls.SecretKeyFromBytes(bts)
|
|
}
|