package hd
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/tyler-smith/go-bip39"
|
|
|
|
"github.com/tendermint/go-crypto"
|
|
)
|
|
|
|
type addrData struct {
|
|
Mnemonic string
|
|
Master string
|
|
Seed string
|
|
Priv string
|
|
Pub string
|
|
Addr string
|
|
}
|
|
|
|
// NOTE: atom fundraiser address
|
|
// var hdPath string = "m/44'/118'/0'/0/0"
|
|
var hdToAddrTable []addrData
|
|
|
|
func init() {
|
|
|
|
b, err := ioutil.ReadFile("test.json")
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
err = json.Unmarshal(b, &hdToAddrTable)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
func TestHDToAddr(t *testing.T) {
|
|
|
|
for i, d := range hdToAddrTable {
|
|
privB, _ := hex.DecodeString(d.Priv)
|
|
pubB, _ := hex.DecodeString(d.Pub)
|
|
addrB, _ := hex.DecodeString(d.Addr)
|
|
seedB, _ := hex.DecodeString(d.Seed)
|
|
masterB, _ := hex.DecodeString(d.Master)
|
|
|
|
seed := bip39.NewSeed(d.Mnemonic, "")
|
|
|
|
fmt.Println("================================")
|
|
fmt.Println("ROUND:", i, "MNEMONIC:", d.Mnemonic)
|
|
|
|
// master, priv, pub := tylerSmith(seed)
|
|
// master, priv, pub := btcsuite(seed)
|
|
master, priv, pub := gocrypto(seed)
|
|
|
|
fmt.Printf("\tNODEJS GOLANG\n")
|
|
fmt.Printf("SEED \t%X %X\n", seedB, seed)
|
|
fmt.Printf("MSTR \t%X %X\n", masterB, master)
|
|
fmt.Printf("PRIV \t%X %X\n", privB, priv)
|
|
fmt.Printf("PUB \t%X %X\n", pubB, pub)
|
|
_, _ = priv, privB
|
|
|
|
assert.Equal(t, master, masterB, fmt.Sprintf("Expected masters to match for %d", i))
|
|
assert.Equal(t, priv, privB, "Expected priv keys to match")
|
|
assert.Equal(t, pub, pubB, fmt.Sprintf("Expected pub keys to match for %d", i))
|
|
|
|
var pubT crypto.PubKeySecp256k1
|
|
copy(pubT[:], pub)
|
|
addr := pubT.Address()
|
|
fmt.Printf("ADDR \t%X %X\n", addrB, addr)
|
|
assert.Equal(t, addr, crypto.Address(addrB), fmt.Sprintf("Expected addresses to match %d", i))
|
|
|
|
}
|
|
}
|
|
|
|
func TestReverseBytes(t *testing.T) {
|
|
tests := [...]struct {
|
|
v []byte
|
|
want []byte
|
|
}{
|
|
{[]byte(""), []byte("")},
|
|
{nil, nil},
|
|
{[]byte("Tendermint"), []byte("tnimredneT")},
|
|
{[]byte("T"), []byte("T")},
|
|
{[]byte("Te"), []byte("eT")},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
got := ReverseBytes(tt.v)
|
|
if !bytes.Equal(got, tt.want) {
|
|
t.Errorf("#%d:\ngot= (%x)\nwant=(%x)", i, got, tt.want)
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
func ifExit(err error, n int) {
|
|
if err != nil {
|
|
fmt.Println(n, err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
*/
|
|
|
|
func gocrypto(seed []byte) ([]byte, []byte, []byte) {
|
|
|
|
_, priv, ch := ComputeMastersFromSeed(string(seed))
|
|
|
|
privBytes := DerivePrivateKeyForPath(
|
|
HexDecode(priv),
|
|
HexDecode(ch),
|
|
"44'/118'/0'/0/0",
|
|
)
|
|
|
|
pubBytes := PubKeyBytesFromPrivKeyBytes(privBytes, true)
|
|
|
|
return HexDecode(priv), privBytes, pubBytes
|
|
}
|
|
|
|
/*
|
|
func btcsuite(seed []byte) ([]byte, []byte, []byte) {
|
|
fmt.Println("HD")
|
|
masterKey, err := hdkeychain.NewMaster(seed, &chaincfg.MainNetParams)
|
|
if err != nil {
|
|
hmac := hmac.New(sha512.New, []byte("Bitcoin seed"))
|
|
hmac.Write([]byte(seed))
|
|
intermediary := hmac.Sum(nil)
|
|
|
|
curve := btcutil.Secp256k1()
|
|
curveParams := curve.Params()
|
|
|
|
// Split it into our key and chain code
|
|
keyBytes := intermediary[:32]
|
|
fmt.Printf("\t%X\n", keyBytes)
|
|
fmt.Printf("\t%X\n", curveParams.N.Bytes())
|
|
keyInt, _ := binary.ReadVarint(bytes.NewBuffer(keyBytes))
|
|
fmt.Printf("\t%d\n", keyInt)
|
|
}
|
|
fh := hdkeychain.HardenedKeyStart
|
|
k, err := masterKey.Child(uint32(fh + 44))
|
|
ifExit(err, 44)
|
|
k, err = k.Child(uint32(fh + 118))
|
|
ifExit(err, 118)
|
|
k, err = k.Child(uint32(fh + 0))
|
|
ifExit(err, 1)
|
|
k, err = k.Child(uint32(0))
|
|
ifExit(err, 2)
|
|
k, err = k.Child(uint32(0))
|
|
ifExit(err, 3)
|
|
ecpriv, err := k.ECPrivKey()
|
|
ifExit(err, 10)
|
|
ecpub, err := k.ECPubKey()
|
|
ifExit(err, 11)
|
|
|
|
priv := ecpriv.Serialize()
|
|
pub := ecpub.SerializeCompressed()
|
|
mkey, _ := masterKey.ECPrivKey()
|
|
return mkey.Serialize(), priv, pub
|
|
}
|
|
|
|
// return priv and pub
|
|
func tylerSmith(seed []byte) ([]byte, []byte, []byte) {
|
|
masterKey, err := bip32.NewMasterKey(seed)
|
|
if err != nil {
|
|
hmac := hmac.New(sha512.New, []byte("Bitcoin seed"))
|
|
hmac.Write([]byte(seed))
|
|
intermediary := hmac.Sum(nil)
|
|
|
|
curve := btcutil.Secp256k1()
|
|
curveParams := curve.Params()
|
|
|
|
// Split it into our key and chain code
|
|
keyBytes := intermediary[:32]
|
|
fmt.Printf("\t%X\n", keyBytes)
|
|
fmt.Printf("\t%X\n", curveParams.N.Bytes())
|
|
keyInt, _ := binary.ReadVarint(bytes.NewBuffer(keyBytes))
|
|
fmt.Printf("\t%d\n", keyInt)
|
|
|
|
}
|
|
ifExit(err, 0)
|
|
fh := bip32.FirstHardenedChild
|
|
k, err := masterKey.NewChildKey(fh + 44)
|
|
ifExit(err, 44)
|
|
k, err = k.NewChildKey(fh + 118)
|
|
ifExit(err, 118)
|
|
k, err = k.NewChildKey(fh + 0)
|
|
ifExit(err, 1)
|
|
k, err = k.NewChildKey(0)
|
|
ifExit(err, 2)
|
|
k, err = k.NewChildKey(0)
|
|
ifExit(err, 3)
|
|
|
|
priv := k.Key
|
|
pub := k.PublicKey().Key
|
|
return masterKey.Key, priv, pub
|
|
}
|
|
*/
|
|
|
|
// Benchmarks
|
|
var revBytesCases = [][]byte{
|
|
nil,
|
|
[]byte(""),
|
|
|
|
[]byte("12"),
|
|
|
|
// 16byte case
|
|
[]byte("abcdefghijklmnop"),
|
|
|
|
// 32byte case
|
|
[]byte("abcdefghijklmnopqrstuvwxyz123456"),
|
|
|
|
// 64byte case
|
|
[]byte("abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456"),
|
|
}
|
|
|
|
func BenchmarkReverseBytes(b *testing.B) {
|
|
var sink []byte
|
|
for i := 0; i < b.N; i++ {
|
|
for _, tt := range revBytesCases {
|
|
sink = ReverseBytes(tt)
|
|
}
|
|
}
|
|
b.ReportAllocs()
|
|
|
|
// sink is necessary to ensure if the compiler tries
|
|
// to smart, that it won't optimize away the benchmarks.
|
|
if sink != nil {
|
|
_ = sink
|
|
}
|
|
}
|