2020-05-19 17:30:28 +00:00
# beacon_chain
2024-01-06 06:18:28 +00:00
# Copyright (c) 2018-2024 Status Research & Development GmbH
2020-05-19 17:30:28 +00:00
# Licensed and distributed under either of
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
# at your option. This file may not be copied, modified, or distributed except according to those terms.
{. used . }
import
2021-04-28 16:41:02 +00:00
std / [ json , typetraits ] ,
unittest2 ,
2023-06-19 22:43:50 +00:00
stew / byteutils , blscurve , json_serialization ,
2020-08-20 13:01:08 +00:00
libp2p / crypto / crypto as lcrypto ,
2020-08-02 17:26:57 +00:00
.. / beacon_chain / spec / [ crypto , keystore ] ,
. / testutil
2020-05-19 17:30:28 +00:00
2024-01-06 06:18:28 +00:00
from std / strutils import replace
2020-05-19 17:30:28 +00:00
2021-08-18 13:58:43 +00:00
func isEqual ( a , b : ValidatorPrivKey ) : bool =
2020-08-15 17:33:58 +00:00
# `==` on secret keys is not allowed
let pa = cast [ ptr UncheckedArray [ byte ] ] ( a . unsafeAddr )
let pb = cast [ ptr UncheckedArray [ byte ] ] ( b . unsafeAddr )
result = true
for i in 0 .. < sizeof ( a ) :
result = result and pa [ i ] = = pb [ i ]
2020-06-08 14:56:56 +00:00
2020-05-19 17:30:28 +00:00
const
2022-08-19 10:30:07 +00:00
scryptVector = """
{
2020-05-19 17:30:28 +00:00
" crypto " : {
" kdf " : {
" function " : " scrypt " ,
" params " : {
" dklen " : 32 ,
" n " : 262144 ,
" p " : 1 ,
" r " : 8 ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : { } ,
2020-08-02 18:46:12 +00:00
" message " : " d2217fe5f3e9a1e34581ef8a78f7c9928e436d36dacc5e846690a5581e8ea484 "
2020-05-19 17:30:28 +00:00
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
2020-08-02 18:46:12 +00:00
" message " : " 06ae90d55fe0a6e9c5c3bc5b170827b2e5cce3929ed3f116c2811e6366dfe20f "
2020-05-19 17:30:28 +00:00
}
} ,
2020-08-02 17:54:48 +00:00
" description " : " This is a test keystore that uses scrypt to secure the secret. " ,
2020-05-19 17:30:28 +00:00
" pubkey " : " 9612d7a727c9d0a22e185a1c768478dfe919cada9266988cb32359c11f2b7b27f4ae4040902382ae2910c15e2b420d07 " ,
" path " : " m/12381/60/3141592653/589793238 " ,
" uuid " : " 1d85ae20-35c5-4611-98e8-aa14a633906f " ,
" version " : 4
2022-08-19 10:30:07 +00:00
} """
2020-05-19 17:30:28 +00:00
2022-08-19 10:30:07 +00:00
scryptVector2 = """
{
" crypto " : {
" kdf " : {
" function " : " scrypt " ,
" params " : {
" dklen " : 32 ,
" n " : 262144 ,
" p " : 1 ,
" r " : 8 ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : { } ,
" message " : " d2217fe5f3e9a1e34581ef8a78f7c9928e436d36dacc5e846690a5581e8ea484 "
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
" message " : " 06ae90d55fe0a6e9c5c3bc5b170827b2e5cce3929ed3f116c2811e6366dfe20f "
}
} ,
" pubkey " : " 9612d7a727c9d0a22e185a1c768478dfe919cada9266988cb32359c11f2b7b27f4ae4040902382ae2910c15e2b420d07 " ,
" path " : " m/12381/60/3141592653/589793238 " ,
" uuid " : " 1d85ae20-35c5-4611-98e8-aa14a633906f " ,
" version " : 4
} """
pbkdf2Vector = """
{
2020-05-19 17:30:28 +00:00
" crypto " : {
" kdf " : {
" function " : " pbkdf2 " ,
" params " : {
" dklen " : 32 ,
" c " : 262144 ,
" prf " : " hmac-sha256 " ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : { } ,
2020-08-02 18:46:12 +00:00
" message " : " 8a9f5d9912ed7e75ea794bc5a89bca5f193721d30868ade6f73043c6ea6febf1 "
2020-05-19 17:30:28 +00:00
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
2020-08-02 18:46:12 +00:00
" message " : " cee03fde2af33149775b7223e7845e4fb2c8ae1792e5f99fe9ecf474cc8c16ad "
2020-05-19 17:30:28 +00:00
}
} ,
2020-08-02 18:46:12 +00:00
" description " : " This is a test keystore that uses PBKDF2 to secure the secret. " ,
2020-05-19 17:30:28 +00:00
" pubkey " : " 9612d7a727c9d0a22e185a1c768478dfe919cada9266988cb32359c11f2b7b27f4ae4040902382ae2910c15e2b420d07 " ,
" path " : " m/12381/60/0/0 " ,
" uuid " : " 64625def-3331-4eea-ab6f-782f3ed16a83 " ,
" version " : 4
2022-08-19 10:30:07 +00:00
} """
pbkdf2Vector2 = """
{
" crypto " : {
" kdf " : {
" function " : " pbkdf2 " ,
" params " : {
" dklen " : 32 ,
" c " : 262144 ,
" prf " : " hmac-sha256 " ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : { } ,
" message " : " 8a9f5d9912ed7e75ea794bc5a89bca5f193721d30868ade6f73043c6ea6febf1 "
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
" message " : " cee03fde2af33149775b7223e7845e4fb2c8ae1792e5f99fe9ecf474cc8c16ad "
}
} ,
" pubkey " : " 9612d7a727c9d0a22e185a1c768478dfe919cada9266988cb32359c11f2b7b27f4ae4040902382ae2910c15e2b420d07 " ,
" path " : " m/12381/60/0/0 " ,
" uuid " : " 64625def-3331-4eea-ab6f-782f3ed16a83 " ,
" version " : 4
} """
2020-05-19 17:30:28 +00:00
2022-08-19 10:30:07 +00:00
pbkdf2NetVector = """
{
2020-08-20 13:01:08 +00:00
" crypto " : {
" kdf " : {
" function " : " pbkdf2 " ,
" params " : {
" dklen " : 32 ,
" c " : 262144 ,
" prf " : " hmac-sha256 " ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : {
} ,
" message " : " 3aaebceb5e81cce464d62287414befaa03522eb8f56cad4296c0dc9301e5f091 "
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
" message " : " c6e22dfed4aec458af6e46efff72937972a9360a8b4dc32c8c266de73a90b421d8892db3 "
}
} ,
" description " : " PBKDF2 Network private key storage " ,
" pubkey " : " 08021221031873e6f4e1bf837b93493d570653cb219743d4fab0ff468d4e005e1679730b0b " ,
" uuid " : " 7a053160-1cdf-4faf-a2bb-331e1bc2eb5f " ,
2020-09-30 11:04:54 +00:00
" version " : 1
2022-08-19 10:30:07 +00:00
} """
2020-08-20 13:01:08 +00:00
2022-08-19 10:30:07 +00:00
scryptNetVector = """
{
2020-08-20 13:01:08 +00:00
" crypto " : {
" kdf " : {
" function " : " scrypt " ,
" params " : {
" dklen " : 32 ,
" n " : 262144 ,
" p " : 1 ,
" r " : 8 ,
" salt " : " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
} ,
" message " : " "
} ,
" checksum " : {
" function " : " sha256 " ,
" params " : {
} ,
" message " : " 9a7d03a3f2107a11b6e34a081fb13d551012ff081efb81fc94ec114381fa707f "
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" params " : {
" iv " : " 264daa3f303d7259501c93d997d84fe6 "
} ,
" message " : " 0eac82f5a1bd53f81df688970ffeea8425ad7b8f877bcba5a74b87f090c340836cd52095 "
}
} ,
" description " : " SCRYPT Network private key storage " ,
" pubkey " : " 08021221031873e6f4e1bf837b93493d570653cb219743d4fab0ff468d4e005e1679730b0b " ,
" uuid " : " 83d77fa3-86cb-466a-af11-eeb338b0e258 " ,
2020-09-30 11:04:54 +00:00
" version " : 1
2022-08-19 10:30:07 +00:00
} """
prysmKeystore = """
{
" crypto " : {
" checksum " : {
" function " : " sha256 " ,
" message " : " 54fc80f6d0676bdae7c968e0d462f90a4e3a028fc7669ef8527e2f74386c9b36 " ,
" params " : { }
} ,
" cipher " : {
" function " : " aes-128-ctr " ,
" message " : " 3c2540f69cbe7e66c0c4a6e416e99bf0d1056399c21b4c45552561da920871fa " ,
" params " : {
" iv " : " 98a15bd46d258aceecaeeab25bddf5e2 "
}
} ,
" kdf " : {
" function " : " pbkdf2 " ,
" message " : " " ,
" params " : {
" c " : 262144 ,
" dklen " : 32 ,
" prf " : " hmac-sha256 " ,
" salt " : " c0abbbbda36e588824865a71b5b34d5a95335fe1077c286d4e9c844f7193c62b "
}
}
} ,
" uuid " : " 39796eb1-2e43-4353-9f13-5211c7ddc58c " ,
" pubkey " : " 8ed78a5495b54d5b6cc8bf170534ecb633b9694fba121ca680744fa9633f1b67cc77c045f88a6f97be781fe6c2867646 " ,
" version " : 4 ,
" name " : " keystore " ,
" path " : " "
}
"""
2020-08-02 18:46:12 +00:00
password = string . fromBytes hexToSeqByte ( " 7465737470617373776f7264f09f9491 " )
secretBytes = hexToSeqByte " 000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f "
2020-08-20 13:01:08 +00:00
secretNetBytes = hexToSeqByte " 08021220fe442379443d6e2d7d75d3a58f96fbb35f0a9c7217796825fc9040e3b89c5736 "
2020-08-02 18:46:12 +00:00
salt = hexToSeqByte " d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 "
iv = hexToSeqByte " 264daa3f303d7259501c93d997d84fe6 "
2020-08-02 17:54:48 +00:00
2020-07-07 15:51:02 +00:00
let
2023-06-19 22:43:50 +00:00
rng = HmacDrbgContext . new ( )
2020-07-07 15:51:02 +00:00
2021-04-28 16:41:02 +00:00
suite " KeyStorage testing suite " :
2020-06-01 19:48:20 +00:00
setup :
let secret = ValidatorPrivKey . fromRaw ( secretBytes ) . get
2020-08-20 13:01:08 +00:00
let nsecret = init ( lcrypto . PrivateKey , secretNetBytes ) . get
2020-06-01 19:48:20 +00:00
2022-08-19 10:30:07 +00:00
test " Load Prysm keystore " :
let keystore = parseKeystore ( prysmKeystore )
check keystore . uuid = = " 39796eb1-2e43-4353-9f13-5211c7ddc58c "
2021-04-28 16:41:02 +00:00
test " [PBKDF2] Keystore decryption " :
2020-08-02 17:26:57 +00:00
let
2022-08-19 10:30:07 +00:00
keystore = parseKeystore ( pbkdf2Vector )
decrypt = decryptKeystore ( keystore , KeystorePass . init password )
check decrypt . isOk
check secret . isEqual ( decrypt . get ( ) )
test " [PBKDF2] Keystore decryption (requireAllFields, allowUnknownFields) " :
let
keystore = parseKeystore ( pbkdf2Vector2 )
2020-10-02 15:46:05 +00:00
decrypt = decryptKeystore ( keystore , KeystorePass . init password )
2020-08-02 17:26:57 +00:00
2020-05-19 17:30:28 +00:00
check decrypt . isOk
2020-08-15 17:33:58 +00:00
check secret . isEqual ( decrypt . get ( ) )
2020-05-19 17:30:28 +00:00
2021-04-28 16:41:02 +00:00
test " [SCRYPT] Keystore decryption " :
2020-08-02 18:46:12 +00:00
let
2022-08-19 10:30:07 +00:00
keystore = parseKeystore ( scryptVector )
decrypt = decryptKeystore ( keystore , KeystorePass . init password )
check decrypt . isOk
check secret . isEqual ( decrypt . get ( ) )
test " [SCRYPT] Keystore decryption (requireAllFields, allowUnknownFields) " :
let
keystore = parseKeystore ( pbkdf2Vector2 )
2020-10-02 15:46:05 +00:00
decrypt = decryptKeystore ( keystore , KeystorePass . init password )
2020-08-02 18:46:12 +00:00
check decrypt . isOk
2020-08-15 17:33:58 +00:00
check secret . isEqual ( decrypt . get ( ) )
2020-08-02 18:46:12 +00:00
2021-04-28 16:41:02 +00:00
test " [PBKDF2] Network Keystore decryption " :
2020-08-20 13:01:08 +00:00
let
2022-08-19 10:30:07 +00:00
keystore = parseNetKeystore ( pbkdf2NetVector )
2020-10-02 15:46:05 +00:00
decrypt = decryptNetKeystore ( keystore , KeystorePass . init password )
2020-08-20 13:01:08 +00:00
check decrypt . isOk
check nsecret = = decrypt . get ( )
2021-04-28 16:41:02 +00:00
test " [SCRYPT] Network Keystore decryption " :
2020-08-20 13:01:08 +00:00
let
2022-08-19 10:30:07 +00:00
keystore = parseNetKeystore ( scryptNetVector )
2020-10-02 15:46:05 +00:00
decrypt = decryptNetKeystore ( keystore , KeystorePass . init password )
2020-08-20 13:01:08 +00:00
check decrypt . isOk
check nsecret = = decrypt . get ( )
2021-04-28 16:41:02 +00:00
test " [PBKDF2] Keystore encryption " :
2020-08-02 17:26:57 +00:00
let keystore = createKeystore ( kdfPbkdf2 , rng [ ] , secret ,
2020-10-02 15:46:05 +00:00
KeystorePass . init password ,
2020-06-01 19:48:20 +00:00
salt = salt , iv = iv ,
2020-08-02 18:46:12 +00:00
description = " This is a test keystore that uses PBKDF2 to secure the secret. " ,
2020-09-24 05:27:56 +00:00
path = validateKeyPath ( " m/12381/60/0/0 " ) . expect ( " Valid Keypath " ) )
2020-05-20 05:40:51 +00:00
var
2020-08-02 17:26:57 +00:00
encryptJson = parseJson Json . encode ( keystore )
2020-05-20 05:40:51 +00:00
pbkdf2Json = parseJson ( pbkdf2Vector )
encryptJson { " uuid " } = % " "
pbkdf2Json { " uuid " } = % " "
check encryptJson = = pbkdf2Json
2020-05-19 17:30:28 +00:00
2021-04-28 16:41:02 +00:00
test " [PBKDF2] Network Keystore encryption " :
2020-08-20 13:01:08 +00:00
let nkeystore = createNetKeystore ( kdfPbkdf2 , rng [ ] , nsecret ,
2020-10-02 15:46:05 +00:00
KeystorePass . init password ,
2020-08-20 13:01:08 +00:00
salt = salt , iv = iv ,
2020-09-30 11:04:54 +00:00
description =
" PBKDF2 Network private key storage " )
2020-08-20 13:01:08 +00:00
var
encryptJson = parseJson Json . encode ( nkeystore )
pbkdf2Json = parseJson ( pbkdf2NetVector )
encryptJson { " uuid " } = % " "
pbkdf2Json { " uuid " } = % " "
check encryptJson = = pbkdf2Json
2021-04-28 16:41:02 +00:00
test " [SCRYPT] Keystore encryption " :
2020-08-02 18:46:12 +00:00
let keystore = createKeystore ( kdfScrypt , rng [ ] , secret ,
2020-10-02 15:46:05 +00:00
KeystorePass . init password ,
2020-08-02 18:46:12 +00:00
salt = salt , iv = iv ,
description = " This is a test keystore that uses scrypt to secure the secret. " ,
2020-09-24 05:27:56 +00:00
path = validateKeyPath ( " m/12381/60/3141592653/589793238 " ) . expect ( " Valid keypath " ) )
2020-08-02 18:46:12 +00:00
var
encryptJson = parseJson Json . encode ( keystore )
scryptJson = parseJson ( scryptVector )
encryptJson { " uuid " } = % " "
scryptJson { " uuid " } = % " "
check encryptJson = = scryptJson
2021-04-28 16:41:02 +00:00
test " [SCRYPT] Network Keystore encryption " :
2020-08-20 13:01:08 +00:00
let nkeystore = createNetKeystore ( kdfScrypt , rng [ ] , nsecret ,
2020-10-02 15:46:05 +00:00
KeystorePass . init password ,
2020-08-20 13:01:08 +00:00
salt = salt , iv = iv ,
2020-09-30 11:04:54 +00:00
description =
" SCRYPT Network private key storage " )
2020-08-20 13:01:08 +00:00
var
encryptJson = parseJson Json . encode ( nkeystore )
pbkdf2Json = parseJson ( scryptNetVector )
encryptJson { " uuid " } = % " "
pbkdf2Json { " uuid " } = % " "
check encryptJson = = pbkdf2Json
2021-04-28 16:41:02 +00:00
test " Pbkdf2 errors " :
2020-06-01 19:48:20 +00:00
expect Defect :
2020-08-02 17:26:57 +00:00
echo createKeystore ( kdfPbkdf2 , rng [ ] , secret , salt = [ byte 1 ] )
2020-06-01 19:48:20 +00:00
expect Defect :
2020-08-02 17:26:57 +00:00
echo createKeystore ( kdfPbkdf2 , rng [ ] , secret , iv = [ byte 1 ] )
2020-06-01 19:48:20 +00:00
2020-08-02 17:26:57 +00:00
check decryptKeystore ( JsonString pbkdf2Vector ,
2020-10-02 15:46:05 +00:00
KeystorePass . init " wrong pass " ) . isErr
2020-06-01 19:48:20 +00:00
2020-08-02 17:26:57 +00:00
check decryptKeystore ( JsonString pbkdf2Vector ,
2020-10-02 15:46:05 +00:00
KeystorePass . init " " ) . isErr
2020-06-01 19:48:20 +00:00
2020-08-02 17:26:57 +00:00
check decryptKeystore ( JsonString " { \" a \" : 0} " ,
2020-10-02 15:46:05 +00:00
KeystorePass . init " " ) . isErr
2020-05-19 17:30:28 +00:00
2020-08-02 17:26:57 +00:00
check decryptKeystore ( JsonString " " ,
2020-10-02 15:46:05 +00:00
KeystorePass . init " " ) . isErr
2020-05-27 12:14:04 +00:00
2020-10-09 16:41:53 +00:00
check decryptKeystore ( JsonString " {} " ,
KeystorePass . init " " ) . isErr
2020-05-27 12:14:04 +00:00
template checkVariant ( remove ) : untyped =
2020-08-02 18:46:12 +00:00
check decryptKeystore ( JsonString pbkdf2Vector . replace ( remove , " 1234 " ) ,
2020-10-02 15:46:05 +00:00
KeystorePass . init password ) . isErr
2020-05-27 12:14:04 +00:00
2020-08-02 18:46:12 +00:00
checkVariant " f876 " # salt
checkVariant " 75ea " # checksum
checkVariant " b722 " # cipher
2020-05-27 12:14:04 +00:00
2022-02-20 20:13:06 +00:00
let badKdf = parseJson ( pbkdf2Vector )
2020-05-27 12:14:04 +00:00
badKdf { " crypto " , " kdf " , " function " } = % " invalid "
2020-08-02 17:26:57 +00:00
check decryptKeystore ( JsonString $ badKdf ,
2022-04-14 10:47:14 +00:00
KeystorePass . init password ) . isErr
2020-10-19 19:02:48 +00:00
suite " eth2.0-deposits-cli compatibility " :
test " restoring mnemonic without password " :
2022-02-20 20:13:06 +00:00
let mnemonic = Mnemonic " camera dad smile sail injury warfare grid kiwi report minute fold slot before stem firm wet vague shove version medal one alley vibrant mushroom "
2020-10-19 19:02:48 +00:00
let seed = getSeed ( mnemonic , KeystorePass . init " " )
check byteutils . toHex ( distinctBase seed ) = = " 60043d6e1efe0eea2ef1c8e7d4bb2d79cb27d3403e992b6058998c27c373cfb6fe047b11405360bb224803726fd6b0ee9e3335ae7d9032e6cb49baf08697cf2a "
let masterKey = deriveMasterKey ( seed )
check masterKey . toHex = = " 54aea900840c22ee821ca4f67ba57392d7c3e3d4fc54a6343940c12404226eb7 "
let
v1SK = deriveChildKey ( masterKey , makeKeyPath ( 0 , signingKeyKind ) )
v1WK = deriveChildKey ( masterKey , makeKeyPath ( 0 , withdrawalKeyKind ) )
v2SK = deriveChildKey ( masterKey , makeKeyPath ( 1 , signingKeyKind ) )
v2WK = deriveChildKey ( masterKey , makeKeyPath ( 1 , withdrawalKeyKind ) )
v3SK = deriveChildKey ( masterKey , makeKeyPath ( 2 , signingKeyKind ) )
v3WK = deriveChildKey ( masterKey , makeKeyPath ( 2 , withdrawalKeyKind ) )
check :
v1SK . toHex = = " 261610f7cb44fd17da74b1d0018db0bf311cfb0d30fd6bc7879d3db022a1ac7d "
v1WK . toHex = = " 0924b5928633a6712a392a8172bd0b3ce6b591491ed4b448d51b460d293258e1 "
v2SK . toHex = = " 3ee523f969f9e0eed10ec62a4b816d94e28947fc1c55ba791555b83baef23b43 "
v2WK . toHex = = " 4925c51f41cd275c70ec878a35a6640e69d1d9360f3dcf6400692a670bda27c2 "
v3SK . toHex = = " 05935491479f8ad8887c4bf64e69fddf9c2d42848bb8a98170a5fe41e94c4122 "
v3WK . toHex = = " 56b158b3b170e9c339b94b895afc28964a0b6d7a0809a39b558ca8b6688487cd "
test " restoring mnemonic with password " :
2022-02-20 20:13:06 +00:00
let mnemonic = Mnemonic " swear umbrella lesson couch void gentle rocket valley distance match floor rocket flag solve muscle common modify target city youth pottery predict flip ghost "
2020-10-19 19:02:48 +00:00
let seed = getSeed ( mnemonic , KeystorePass . init " abracadabra!@# $ %^7890 " )
check byteutils . toHex ( distinctBase seed ) = = " f129c3ac003a07e54974d8dbeb08d20c2343fc516e0e3704570c500a4b6ed98bad2e6fec6a3b9a88076c17feaa0d01163855578cb08bae53860d0ae2558cf03e "
let
masterKey = deriveMasterKey ( seed )
v1SK = deriveChildKey ( masterKey , makeKeyPath ( 0 , signingKeyKind ) )
v1WK = deriveChildKey ( masterKey , makeKeyPath ( 0 , withdrawalKeyKind ) )
v2SK = deriveChildKey ( masterKey , makeKeyPath ( 1 , signingKeyKind ) )
v2WK = deriveChildKey ( masterKey , makeKeyPath ( 1 , withdrawalKeyKind ) )
v3SK = deriveChildKey ( masterKey , makeKeyPath ( 2 , signingKeyKind ) )
v3WK = deriveChildKey ( masterKey , makeKeyPath ( 2 , withdrawalKeyKind ) )
check :
v1SK . toHex = = " 16059302897bc6ecdb9cdac9bb27f34cc996e04b75143c73742aa5975bfaeae7 "
v1WK . toHex = = " 1c28b8e41e5cb2f983780eabb77c927e804d1f7aaffcaaf5593538885a658e8a "
v2SK . toHex = = " 49a5fa9536ebb96253d420a4a9e9f054dc872d2a49884d46995b39b8147fd5e3 "
v2WK . toHex = = " 70068f12a854370d18284884df62d3911af2f85d0be29cb071ec78c6ec564695 "
v3SK . toHex = = " 1445cec3861d7cbf80e409d79aeee131622dcb0c815ff97ceab2515e14c41a1a "
v3WK . toHex = = " 1ccd5dce4c842bd3f65bbd59a382662e689fcf01ddc39aaaf2dcc7d073f11a93 "