5530bb195f
* Add test to understand flow of key storage * First commit * Committing to save trait stuff * Working naive design * Add keystore struct * Move keystore files into their own module * Add serde (de)serialize_with magic * Add keystore test * Fix tests * Add comments and minor fixes * Pass optional params to `to_keystore` function * Add `path` field to keystore * Add function to read Keystore from file * Add test vectors and fix Version serialization * Checksum params is empty object * Add public key to Keystore * Add function for saving keystore into file * Deleted account_manager main.rs * Move keystore module to validator_client * Add save_keystore method to validator_directory * Add load_keystore function. Minor refactorings * Fixed dependencies * Address some review comments * Add Password newtype; derive Zeroize * Fix test * Move keystore into own crate * Remove padding * Add error enum, zeroize more things * Fix comment * Add keystore builder * Remove keystore stuff from val client * Add more tests, comments * Add more comments, test vectors * Progress on improving JSON validation * More JSON verification * Start moving JSON into own mod * Remove old code * Add more tests, reader/writers * Tidy * Move keystore into own file * Move more logic into keystore file * Tidy * Tidy * Allow for odd-character hex * Add more json missing field checks * Use scrypt by default * Tidy, address comments * Test path and uuid in vectors * Fix comment * Add checks for kdf params * Enforce empty kdf message * Expose json_keystore mod * Split out encrypt/decrypt * Replace some password usage with slice * Expose PlainText struct * First commits on path derivation * Progress with implementation * More progress * Passing intermediate test vectors * Tidy, add comments * Add DerivedKey structs * Move key derivation into own crate * Add zeroize structs * Return error for empty seed * Add tests * Tidy * Expose consts, remove Password * Expose SALT_SIZE * Move dbg assert statement * Ensure bigints are zeroized * Try fix Cargo.toml Co-authored-by: pawan <pawandhananjay@gmail.com>
103 lines
3.3 KiB
Rust
103 lines
3.3 KiB
Rust
#![cfg(test)]
|
|
|
|
use eth2_key_derivation::DerivedKey;
|
|
use num_bigint_dig::BigUint;
|
|
|
|
/// Contains the test vectors in a format that's easy for us to test against.
|
|
struct TestVector {
|
|
seed: Vec<u8>,
|
|
master_sk: Vec<u8>,
|
|
child_index: u32,
|
|
child_sk: Vec<u8>,
|
|
}
|
|
|
|
/// Struct to deal with easy copy-paste from specification test vectors.
|
|
struct RawTestVector {
|
|
seed: &'static str,
|
|
master_sk: &'static str,
|
|
child_index: u32,
|
|
child_sk: &'static str,
|
|
}
|
|
|
|
/// Converts from a format that's easy to copy-paste from the spec into a format that's easy to
|
|
/// test with.
|
|
impl From<RawTestVector> for TestVector {
|
|
fn from(raw: RawTestVector) -> TestVector {
|
|
TestVector {
|
|
seed: hex_to_vec(raw.seed),
|
|
master_sk: int_to_vec(raw.master_sk),
|
|
child_index: raw.child_index,
|
|
child_sk: int_to_vec(raw.child_sk),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Converts 0x-prefixed hex to bytes.
|
|
fn hex_to_vec(hex: &str) -> Vec<u8> {
|
|
hex::decode(&hex[2..]).expect("should decode hex as vec")
|
|
}
|
|
|
|
/// Converts an integer represented as a string to a big-endian byte array.
|
|
fn int_to_vec(int_str: &str) -> Vec<u8> {
|
|
BigUint::parse_bytes(int_str.as_bytes(), 10)
|
|
.expect("must be able to parse int")
|
|
.to_bytes_be()
|
|
}
|
|
|
|
/// Asserts that our code matches the given test vector.
|
|
fn assert_vector_passes(raw: RawTestVector) {
|
|
let vector: TestVector = raw.into();
|
|
|
|
let master = DerivedKey::from_seed(&vector.seed).unwrap();
|
|
assert_eq!(master.secret(), &vector.master_sk[..], "master");
|
|
|
|
let child = master.child(vector.child_index);
|
|
assert_eq!(child.secret(), &vector.child_sk[..], "child");
|
|
}
|
|
|
|
/*
|
|
* The following test vectors are obtained from:
|
|
*
|
|
* https://eips.ethereum.org/EIPS/eip-2333
|
|
*/
|
|
|
|
#[test]
|
|
fn eip2333_test_case_0() {
|
|
assert_vector_passes(RawTestVector {
|
|
seed: "0xc55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04",
|
|
master_sk: "12513733877922233913083619867448865075222526338446857121953625441395088009793",
|
|
child_index: 0,
|
|
child_sk: "7419543105316279183937430842449358701327973165530407166294956473095303972104"
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn eip2333_test_case_1() {
|
|
assert_vector_passes(RawTestVector {
|
|
seed: "0x3141592653589793238462643383279502884197169399375105820974944592",
|
|
master_sk: "46029459550803682895343812821003080589696405386150182061394330539196052371668",
|
|
child_index: 3141592653,
|
|
child_sk: "43469287647733616183478983885105537266268532274998688773496918571876759327260",
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn eip2333_test_case_2() {
|
|
assert_vector_passes(RawTestVector {
|
|
seed: "0x0099FF991111002299DD7744EE3355BBDD8844115566CC55663355668888CC00",
|
|
master_sk: "45379166311535261329029945990467475187325618028073620882733843918126031931161",
|
|
child_index: 4294967295,
|
|
child_sk: "46475244006136701976831062271444482037125148379128114617927607151318277762946",
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn eip2333_test_case_3() {
|
|
assert_vector_passes(RawTestVector {
|
|
seed: "0xd4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3",
|
|
master_sk: "31740500954810567003972734830331791822878290325762596213711963944729383643688",
|
|
child_index: 42,
|
|
child_sk: "51041472511529980987749393477251359993058329222191894694692317000136653813011",
|
|
})
|
|
}
|