mirror of https://github.com/status-im/nim-eth.git
Discv5 readme (#278)
* Add discovery v5 readme + test_discv5 task * Move hkdf tests to test file and add to nimble task
This commit is contained in:
parent
0888667ac0
commit
f3de959261
|
@ -16,6 +16,7 @@ Ethereum-related utilities written in Nim. Includes things like Bloom filters, p
|
||||||
- [keyfile](doc/keyfile.md)
|
- [keyfile](doc/keyfile.md)
|
||||||
- [trie](doc/trie.md)
|
- [trie](doc/trie.md)
|
||||||
- [bloom](doc/bloom.md)
|
- [bloom](doc/bloom.md)
|
||||||
|
- [discv5](doc/discv5.md)
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,111 @@
|
||||||
|
# Discovery v5
|
||||||
|
## Introduction
|
||||||
|
This `eth/p2p/discoveryv5` directory holds a Nim implementation of the
|
||||||
|
discovery v5 protocol specified
|
||||||
|
[here](https://github.com/ethereum/devp2p/blob/master/discv5/discv5.md).
|
||||||
|
|
||||||
|
This specification is still in DRAFT and thus subject to change. In fact, it is
|
||||||
|
likely that the current packet format will change, see
|
||||||
|
https://github.com/ethereum/devp2p/issues/152.
|
||||||
|
|
||||||
|
This implementation does not support "Topic Advertisement" yet.
|
||||||
|
|
||||||
|
The implementation relies on other modules in the `eth` package, namely: `keys`,
|
||||||
|
`rlp`, `async_utils` and `trie/db`. The latter is likely to change, see
|
||||||
|
https://github.com/status-im/nim-eth/issues/242
|
||||||
|
|
||||||
|
## How to use
|
||||||
|
|
||||||
|
```Nim
|
||||||
|
let
|
||||||
|
rng = keys.newRng
|
||||||
|
privKey = PrivateKey.random(rng[])
|
||||||
|
(ip, tcpPort, udpPort) = setupNat(config) # Or fill in external IP/ports manually
|
||||||
|
ddb = DiscoveryDB.init(newMemoryDB())
|
||||||
|
d = newProtocol(privKey, ddb, ip, tcpPort, udpPort, rng = rng)
|
||||||
|
|
||||||
|
d.open() # Start listening
|
||||||
|
```
|
||||||
|
|
||||||
|
This will initialize the `Protocol` and start listening. However, as no
|
||||||
|
bootstrap nodes were passed in the `newProtocol` call, the created ENR will need
|
||||||
|
to be advertised somehow ("out of band"), so that the node can become known to
|
||||||
|
other nodes in the network.
|
||||||
|
|
||||||
|
To initialize with a bootnode or a set of bootnodes, the ENRs need to be passed
|
||||||
|
as parameter in `newProtocol`.
|
||||||
|
```Nim
|
||||||
|
d = newProtocol(privKey, ddb, ip, tcpPort, udpPort,
|
||||||
|
bootstrapRecords = bootnodes)
|
||||||
|
d.open() # Start listening and add bootstrap nodes to the routing table.
|
||||||
|
```
|
||||||
|
|
||||||
|
Now there are two ways to run the protocol.
|
||||||
|
|
||||||
|
One can call `d.start()` and two loops will be started:
|
||||||
|
1. Random lookup loop
|
||||||
|
2. Revalidation loop
|
||||||
|
|
||||||
|
The first loop will at specific interval do a lookup with a random `NodeId`.
|
||||||
|
This lookup will add discovered nodes to the routing table.
|
||||||
|
The second loop will at random ranged interval send a ping to the least recently
|
||||||
|
seen node in a random bucket. This is to keep the routing table cleared of
|
||||||
|
unreachable/dead nodes.
|
||||||
|
|
||||||
|
Or, one can decide to do this manually within its application by using the
|
||||||
|
available calls:
|
||||||
|
- `lookupRandom` and `lookup` for discovering more peers.
|
||||||
|
- `revalidateNode` or directly `ping` for revalidating nodes.
|
||||||
|
|
||||||
|
In the future, the random lookup loop might be altered to only run in case no
|
||||||
|
lookup was done in the last x minutes. This way `d.start()` could still be run
|
||||||
|
while maintaining control over the lookups.
|
||||||
|
|
||||||
|
Of course, in either scenario, lookups can still be done for actually finding a
|
||||||
|
specific node. There is a `resolve` call that can help with this, it will first
|
||||||
|
look in the local routing table and if it finds the node it will try to contact
|
||||||
|
the node directly to check if the ENR is up to date. If any of this fail a
|
||||||
|
`lookup` will be done.
|
||||||
|
|
||||||
|
## Test suite
|
||||||
|
To run the test suite specifically for discovery v5 related (discovery v5 + its
|
||||||
|
nim-eth dependencies) tests, one can run following command:
|
||||||
|
```sh
|
||||||
|
# Install required modules
|
||||||
|
nimble install
|
||||||
|
# Run only discovery v5 related test suite
|
||||||
|
nimble tests_discv5
|
||||||
|
```
|
||||||
|
|
||||||
|
## dcli
|
||||||
|
This is a small command line application that allows you to run a discovery
|
||||||
|
node. It also has the options to do a `ping` or `findNode` request to a specific
|
||||||
|
node, by providing its ENR.
|
||||||
|
|
||||||
|
### Example usage
|
||||||
|
```sh
|
||||||
|
# Build dcli
|
||||||
|
nim c -d:chronicles_log_level:trace -d:release eth/p2p/discoveryv5/dcli
|
||||||
|
# See all options
|
||||||
|
./eth/p2p/discoveryv5/dcli --help
|
||||||
|
# Ping another node
|
||||||
|
./eth/p2p/discoveryv5/dcli ping enr:<base64 encoding of ENR>
|
||||||
|
# Run discovery node
|
||||||
|
./eth/p2p/discoveryv5/dcli --log-level:debug --bootnode:enr:<base64 encoding of ENR>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Metrics
|
||||||
|
Metrics are available for `routing_table_nodes`, which holds the amount of nodes
|
||||||
|
in the routing table.
|
||||||
|
|
||||||
|
To compile in an HTTP endpoint for accessing the metrics add the `insecure`
|
||||||
|
compile time flag:
|
||||||
|
```sh
|
||||||
|
# Build dcli with metrics
|
||||||
|
nim c -d:insecure -d:chronicles_log_level:trace -d:release eth/p2p/discoveryv5/dcli
|
||||||
|
# Run dcli with metrics
|
||||||
|
./eth/p2p/discoveryv5/dcli --metrics --bootnode:enr:<base64 encoding of ENR>
|
||||||
|
```
|
||||||
|
|
||||||
|
You can now see the metrics at http://localhost:8008/metrics. Or use e.g.
|
||||||
|
Prometheus to grab the data.
|
17
eth.nimble
17
eth.nimble
|
@ -49,6 +49,7 @@ proc runP2pTests() =
|
||||||
"test_shh_connect",
|
"test_shh_connect",
|
||||||
"test_protocol_handlers",
|
"test_protocol_handlers",
|
||||||
"test_enr",
|
"test_enr",
|
||||||
|
"test_hkdf",
|
||||||
"test_discoveryv5",
|
"test_discoveryv5",
|
||||||
"test_discv5_encoding",
|
"test_discv5_encoding",
|
||||||
"test_routing_table"
|
"test_routing_table"
|
||||||
|
@ -88,3 +89,19 @@ task test, "run tests":
|
||||||
runRlpTests()
|
runRlpTests()
|
||||||
runTrieTests()
|
runTrieTests()
|
||||||
runDbTests()
|
runDbTests()
|
||||||
|
|
||||||
|
proc runDiscv5Tests() =
|
||||||
|
for filename in [
|
||||||
|
"test_enr",
|
||||||
|
"test_hkdf",
|
||||||
|
"test_discoveryv5",
|
||||||
|
"test_discv5_encoding",
|
||||||
|
"test_routing_table"
|
||||||
|
]:
|
||||||
|
runTest("tests/p2p/" & filename)
|
||||||
|
|
||||||
|
task test_discv5, "run tests of discovery v5 and its dependencies":
|
||||||
|
runKeysTests()
|
||||||
|
runRlpTests()
|
||||||
|
runTrieTests() # This probably tests a bit to much for what we use it for.
|
||||||
|
runDiscv5Tests()
|
||||||
|
|
|
@ -28,156 +28,3 @@ proc hkdf*(HashType: typedesc, ikm, salt, info: openarray[byte],
|
||||||
copyMem(addr output[iStart], addr t.data, sz)
|
copyMem(addr output[iStart], addr t.data, sz)
|
||||||
|
|
||||||
ctx.clear()
|
ctx.clear()
|
||||||
|
|
||||||
when isMainModule:
|
|
||||||
import stew/byteutils
|
|
||||||
|
|
||||||
proc hextToBytes(s: string): seq[byte] =
|
|
||||||
if s.len != 0: return hexToSeqByte(s)
|
|
||||||
|
|
||||||
template test(constants: untyped) =
|
|
||||||
block:
|
|
||||||
constants
|
|
||||||
|
|
||||||
let
|
|
||||||
bikm = hextToBytes(IKM)
|
|
||||||
bsalt = hextToBytes(salt)
|
|
||||||
binfo = hextToBytes(info)
|
|
||||||
bprk {.used.} = hextToBytes(PRK)
|
|
||||||
bokm = hextToBytes(OKM)
|
|
||||||
|
|
||||||
var output = newSeq[byte](L)
|
|
||||||
hkdf(HashType, bikm, bsalt, binfo, output)
|
|
||||||
doAssert(output == bokm)
|
|
||||||
|
|
||||||
test: # 1
|
|
||||||
type HashType = sha256
|
|
||||||
const
|
|
||||||
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
|
||||||
salt = "0x000102030405060708090a0b0c"
|
|
||||||
info = "0xf0f1f2f3f4f5f6f7f8f9"
|
|
||||||
L = 42
|
|
||||||
|
|
||||||
PRK = "0x077709362c2e32df0ddc3f0dc47bba63" &
|
|
||||||
"90b6c73bb50f9c3122ec844ad7c2b3e5"
|
|
||||||
OKM = "0x3cb25f25faacd57a90434f64d0362f2a" &
|
|
||||||
"2d2d0a90cf1a5a4c5db02d56ecc4c5bf" &
|
|
||||||
"34007208d5b887185865"
|
|
||||||
|
|
||||||
test: # 2
|
|
||||||
type HashType = sha256
|
|
||||||
const
|
|
||||||
IKM = "0x000102030405060708090a0b0c0d0e0f" &
|
|
||||||
"101112131415161718191a1b1c1d1e1f" &
|
|
||||||
"202122232425262728292a2b2c2d2e2f" &
|
|
||||||
"303132333435363738393a3b3c3d3e3f" &
|
|
||||||
"404142434445464748494a4b4c4d4e4f"
|
|
||||||
salt = "0x606162636465666768696a6b6c6d6e6f" &
|
|
||||||
"707172737475767778797a7b7c7d7e7f" &
|
|
||||||
"808182838485868788898a8b8c8d8e8f" &
|
|
||||||
"909192939495969798999a9b9c9d9e9f" &
|
|
||||||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf"
|
|
||||||
info = "0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebf" &
|
|
||||||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" &
|
|
||||||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" &
|
|
||||||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" &
|
|
||||||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"
|
|
||||||
L = 82
|
|
||||||
|
|
||||||
PRK = "0x06a6b88c5853361a06104c9ceb35b45c" &
|
|
||||||
"ef760014904671014a193f40c15fc244"
|
|
||||||
OKM = "0xb11e398dc80327a1c8e7f78c596a4934" &
|
|
||||||
"4f012eda2d4efad8a050cc4c19afa97c" &
|
|
||||||
"59045a99cac7827271cb41c65e590e09" &
|
|
||||||
"da3275600c2f09b8367793a9aca3db71" &
|
|
||||||
"cc30c58179ec3e87c14c01d5c1f3434f" &
|
|
||||||
"1d87"
|
|
||||||
|
|
||||||
test: # 3
|
|
||||||
type HashType = sha256
|
|
||||||
const
|
|
||||||
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
|
||||||
salt = ""
|
|
||||||
info = ""
|
|
||||||
L = 42
|
|
||||||
|
|
||||||
PRK = "0x19ef24a32c717b167f33a91d6f648bdf" &
|
|
||||||
"96596776afdb6377ac434c1c293ccb04"
|
|
||||||
OKM = "0x8da4e775a563c18f715f802a063c5a31" &
|
|
||||||
"b8a11f5c5ee1879ec3454e5f3c738d2d" &
|
|
||||||
"9d201395faa4b61a96c8"
|
|
||||||
|
|
||||||
test: # 4
|
|
||||||
type HashType = sha1
|
|
||||||
const
|
|
||||||
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b"
|
|
||||||
salt = "0x000102030405060708090a0b0c"
|
|
||||||
info = "0xf0f1f2f3f4f5f6f7f8f9"
|
|
||||||
L = 42
|
|
||||||
|
|
||||||
PRK = "0x9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243"
|
|
||||||
OKM = "0x085a01ea1b10f36933068b56efa5ad81" &
|
|
||||||
"a4f14b822f5b091568a9cdd4f155fda2" &
|
|
||||||
"c22e422478d305f3f896"
|
|
||||||
|
|
||||||
test: # 5
|
|
||||||
type HashType = sha1
|
|
||||||
const
|
|
||||||
IKM = "0x000102030405060708090a0b0c0d0e0f" &
|
|
||||||
"101112131415161718191a1b1c1d1e1f" &
|
|
||||||
"202122232425262728292a2b2c2d2e2f" &
|
|
||||||
"303132333435363738393a3b3c3d3e3f" &
|
|
||||||
"404142434445464748494a4b4c4d4e4f"
|
|
||||||
salt = "0x606162636465666768696a6b6c6d6e6f" &
|
|
||||||
"707172737475767778797a7b7c7d7e7f" &
|
|
||||||
"808182838485868788898a8b8c8d8e8f" &
|
|
||||||
"909192939495969798999a9b9c9d9e9f" &
|
|
||||||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf"
|
|
||||||
info = "0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebf" &
|
|
||||||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" &
|
|
||||||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" &
|
|
||||||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" &
|
|
||||||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"
|
|
||||||
L = 82
|
|
||||||
|
|
||||||
PRK = "0x8adae09a2a307059478d309b26c4115a224cfaf6"
|
|
||||||
OKM = "0x0bd770a74d1160f7c9f12cd5912a06eb" &
|
|
||||||
"ff6adcae899d92191fe4305673ba2ffe" &
|
|
||||||
"8fa3f1a4e5ad79f3f334b3b202b2173c" &
|
|
||||||
"486ea37ce3d397ed034c7f9dfeb15c5e" &
|
|
||||||
"927336d0441f4c4300e2cff0d0900b52" &
|
|
||||||
"d3b4"
|
|
||||||
|
|
||||||
test: # 6
|
|
||||||
type HashType = sha1
|
|
||||||
const
|
|
||||||
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
|
||||||
salt = ""
|
|
||||||
info = ""
|
|
||||||
L = 42
|
|
||||||
|
|
||||||
PRK = "0xda8c8a73c7fa77288ec6f5e7c297786aa0d32d01"
|
|
||||||
OKM = "0x0ac1af7002b3d761d1e55298da9d0506" &
|
|
||||||
"b9ae52057220a306e07b6b87e8df21d0" &
|
|
||||||
"ea00033de03984d34918"
|
|
||||||
|
|
||||||
test: # 7
|
|
||||||
type HashType = sha1
|
|
||||||
const
|
|
||||||
IKM = "0x0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c"
|
|
||||||
salt = ""
|
|
||||||
info = ""
|
|
||||||
L = 42
|
|
||||||
|
|
||||||
PRK = "0x2adccada18779e7c2077ad2eb19d3f3e731385dd"
|
|
||||||
OKM = "0x2c91117204d745f3500d636a62f64f0a" &
|
|
||||||
"b3bae548aa53d423b0d1f27ebba6f5e5" &
|
|
||||||
"673a081d70cce7acfc48"
|
|
||||||
|
|
||||||
block:
|
|
||||||
var output: array[5, byte]
|
|
||||||
var secret = [0x01.byte, 0x02, 0x03]
|
|
||||||
var salt = [0x04.byte, 0x05, 0x06]
|
|
||||||
var info = [0x07.byte, 0x08, 0x09]
|
|
||||||
hkdf(sha256, secret, salt, info, output)
|
|
||||||
doAssert(@output == "D5CF839F63".hextToBytes)
|
|
||||||
|
|
|
@ -0,0 +1,156 @@
|
||||||
|
import
|
||||||
|
std/unittest,
|
||||||
|
nimcrypto, stew/byteutils,
|
||||||
|
eth/p2p/discoveryv5/hkdf
|
||||||
|
|
||||||
|
proc hextToBytes(s: string): seq[byte] =
|
||||||
|
if s.len != 0: return hexToSeqByte(s)
|
||||||
|
|
||||||
|
template runTest(constants: untyped) =
|
||||||
|
block:
|
||||||
|
constants
|
||||||
|
|
||||||
|
let
|
||||||
|
bikm = hextToBytes(IKM)
|
||||||
|
bsalt = hextToBytes(salt)
|
||||||
|
binfo = hextToBytes(info)
|
||||||
|
bprk {.used.} = hextToBytes(PRK)
|
||||||
|
bokm = hextToBytes(OKM)
|
||||||
|
|
||||||
|
var output = newSeq[byte](L)
|
||||||
|
hkdf(HashType, bikm, bsalt, binfo, output)
|
||||||
|
check(output == bokm)
|
||||||
|
|
||||||
|
suite "hkdf":
|
||||||
|
test "Test Vectors":
|
||||||
|
runTest: # 1
|
||||||
|
type HashType = sha256
|
||||||
|
const
|
||||||
|
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
||||||
|
salt = "0x000102030405060708090a0b0c"
|
||||||
|
info = "0xf0f1f2f3f4f5f6f7f8f9"
|
||||||
|
L = 42
|
||||||
|
|
||||||
|
PRK = "0x077709362c2e32df0ddc3f0dc47bba63" &
|
||||||
|
"90b6c73bb50f9c3122ec844ad7c2b3e5"
|
||||||
|
OKM = "0x3cb25f25faacd57a90434f64d0362f2a" &
|
||||||
|
"2d2d0a90cf1a5a4c5db02d56ecc4c5bf" &
|
||||||
|
"34007208d5b887185865"
|
||||||
|
|
||||||
|
runTest: # 2
|
||||||
|
type HashType = sha256
|
||||||
|
const
|
||||||
|
IKM = "0x000102030405060708090a0b0c0d0e0f" &
|
||||||
|
"101112131415161718191a1b1c1d1e1f" &
|
||||||
|
"202122232425262728292a2b2c2d2e2f" &
|
||||||
|
"303132333435363738393a3b3c3d3e3f" &
|
||||||
|
"404142434445464748494a4b4c4d4e4f"
|
||||||
|
salt = "0x606162636465666768696a6b6c6d6e6f" &
|
||||||
|
"707172737475767778797a7b7c7d7e7f" &
|
||||||
|
"808182838485868788898a8b8c8d8e8f" &
|
||||||
|
"909192939495969798999a9b9c9d9e9f" &
|
||||||
|
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf"
|
||||||
|
info = "0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebf" &
|
||||||
|
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" &
|
||||||
|
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" &
|
||||||
|
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" &
|
||||||
|
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"
|
||||||
|
L = 82
|
||||||
|
|
||||||
|
PRK = "0x06a6b88c5853361a06104c9ceb35b45c" &
|
||||||
|
"ef760014904671014a193f40c15fc244"
|
||||||
|
OKM = "0xb11e398dc80327a1c8e7f78c596a4934" &
|
||||||
|
"4f012eda2d4efad8a050cc4c19afa97c" &
|
||||||
|
"59045a99cac7827271cb41c65e590e09" &
|
||||||
|
"da3275600c2f09b8367793a9aca3db71" &
|
||||||
|
"cc30c58179ec3e87c14c01d5c1f3434f" &
|
||||||
|
"1d87"
|
||||||
|
|
||||||
|
runTest: # 3
|
||||||
|
type HashType = sha256
|
||||||
|
const
|
||||||
|
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
||||||
|
salt = ""
|
||||||
|
info = ""
|
||||||
|
L = 42
|
||||||
|
|
||||||
|
PRK = "0x19ef24a32c717b167f33a91d6f648bdf" &
|
||||||
|
"96596776afdb6377ac434c1c293ccb04"
|
||||||
|
OKM = "0x8da4e775a563c18f715f802a063c5a31" &
|
||||||
|
"b8a11f5c5ee1879ec3454e5f3c738d2d" &
|
||||||
|
"9d201395faa4b61a96c8"
|
||||||
|
|
||||||
|
runTest: # 4
|
||||||
|
type HashType = sha1
|
||||||
|
const
|
||||||
|
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b"
|
||||||
|
salt = "0x000102030405060708090a0b0c"
|
||||||
|
info = "0xf0f1f2f3f4f5f6f7f8f9"
|
||||||
|
L = 42
|
||||||
|
|
||||||
|
PRK = "0x9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243"
|
||||||
|
OKM = "0x085a01ea1b10f36933068b56efa5ad81" &
|
||||||
|
"a4f14b822f5b091568a9cdd4f155fda2" &
|
||||||
|
"c22e422478d305f3f896"
|
||||||
|
|
||||||
|
runTest: # 5
|
||||||
|
type HashType = sha1
|
||||||
|
const
|
||||||
|
IKM = "0x000102030405060708090a0b0c0d0e0f" &
|
||||||
|
"101112131415161718191a1b1c1d1e1f" &
|
||||||
|
"202122232425262728292a2b2c2d2e2f" &
|
||||||
|
"303132333435363738393a3b3c3d3e3f" &
|
||||||
|
"404142434445464748494a4b4c4d4e4f"
|
||||||
|
salt = "0x606162636465666768696a6b6c6d6e6f" &
|
||||||
|
"707172737475767778797a7b7c7d7e7f" &
|
||||||
|
"808182838485868788898a8b8c8d8e8f" &
|
||||||
|
"909192939495969798999a9b9c9d9e9f" &
|
||||||
|
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf"
|
||||||
|
info = "0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebf" &
|
||||||
|
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" &
|
||||||
|
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" &
|
||||||
|
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" &
|
||||||
|
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"
|
||||||
|
L = 82
|
||||||
|
|
||||||
|
PRK = "0x8adae09a2a307059478d309b26c4115a224cfaf6"
|
||||||
|
OKM = "0x0bd770a74d1160f7c9f12cd5912a06eb" &
|
||||||
|
"ff6adcae899d92191fe4305673ba2ffe" &
|
||||||
|
"8fa3f1a4e5ad79f3f334b3b202b2173c" &
|
||||||
|
"486ea37ce3d397ed034c7f9dfeb15c5e" &
|
||||||
|
"927336d0441f4c4300e2cff0d0900b52" &
|
||||||
|
"d3b4"
|
||||||
|
|
||||||
|
runTest: # 6
|
||||||
|
type HashType = sha1
|
||||||
|
const
|
||||||
|
IKM = "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"
|
||||||
|
salt = ""
|
||||||
|
info = ""
|
||||||
|
L = 42
|
||||||
|
|
||||||
|
PRK = "0xda8c8a73c7fa77288ec6f5e7c297786aa0d32d01"
|
||||||
|
OKM = "0x0ac1af7002b3d761d1e55298da9d0506" &
|
||||||
|
"b9ae52057220a306e07b6b87e8df21d0" &
|
||||||
|
"ea00033de03984d34918"
|
||||||
|
|
||||||
|
runTest: # 7
|
||||||
|
type HashType = sha1
|
||||||
|
const
|
||||||
|
IKM = "0x0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c"
|
||||||
|
salt = ""
|
||||||
|
info = ""
|
||||||
|
L = 42
|
||||||
|
|
||||||
|
PRK = "0x2adccada18779e7c2077ad2eb19d3f3e731385dd"
|
||||||
|
OKM = "0x2c91117204d745f3500d636a62f64f0a" &
|
||||||
|
"b3bae548aa53d423b0d1f27ebba6f5e5" &
|
||||||
|
"673a081d70cce7acfc48"
|
||||||
|
|
||||||
|
block:
|
||||||
|
var output: array[5, byte]
|
||||||
|
var secret = [0x01.byte, 0x02, 0x03]
|
||||||
|
var salt = [0x04.byte, 0x05, 0x06]
|
||||||
|
var info = [0x07.byte, 0x08, 0x09]
|
||||||
|
hkdf(sha256, secret, salt, info, output)
|
||||||
|
check(@output == "D5CF839F63".hextToBytes)
|
Loading…
Reference in New Issue