samples.py
1 """Testing samples""" 2 3 from binascii import unhexlify 4 5 6 # These keys are from addresses test script 7 sample_pubsigningkey = ( 8 b'044a367f049ec16cb6b6118eb734a9962d10b8db59c890cd08f210c43ff08bdf09d' 9 b'16f502ca26cd0713f38988a1237f1fc8fa07b15653c996dc4013af6d15505ce') 10 sample_pubencryptionkey = ( 11 b'044597d59177fc1d89555d38915f581b5ff2286b39d022ca0283d2bdd5c36be5d3c' 12 b'e7b9b97792327851a562752e4b79475d1f51f5a71352482b241227f45ed36a9') 13 sample_privsigningkey = \ 14 b'93d0b61371a54b53df143b954035d612f8efa8a3ed1cf842c2186bfd8f876665' 15 sample_privencryptionkey = \ 16 b'4b0b73a54e19b059dc274ab69df095fe699f43b17397bca26fdf40f4d7400a3a' 17 18 # [chan] bitmessage 19 sample_privsigningkey_wif = \ 20 b'5K42shDERM5g7Kbi3JT5vsAWpXMqRhWZpX835M2pdSoqQQpJMYm' 21 sample_privencryptionkey_wif = \ 22 b'5HwugVWm31gnxtoYcvcK7oywH2ezYTh6Y4tzRxsndAeMi6NHqpA' 23 sample_wif_privsigningkey = \ 24 b'a2e8b841a531c1c558ee0680c396789c7a2ea3ac4795ae3f000caf9fe367d144' 25 sample_wif_privencryptionkey = \ 26 b'114ec0e2dca24a826a0eed064b0405b0ac148abc3b1d52729697f4d7b873fdc6' 27 28 sample_factor = \ 29 66858749573256452658262553961707680376751171096153613379801854825275240965733 30 # G * sample_factor 31 sample_point = ( 32 33567437183004486938355437500683826356288335339807546987348409590129959362313, 33 94730058721143827257669456336351159718085716196507891067256111928318063085006 34 ) 35 36 sample_deterministic_addr3 = b'2DBPTgeSawWYZceFD69AbDT5q4iUWtj1ZN' 37 sample_deterministic_addr4 = b'2cWzSnwjJ7yRP3nLEWUV5LisTZyREWSzUK' 38 sample_daddr3_512 = 18875720106589866286514488037355423395410802084648916523381 39 sample_daddr4_512 = 25152821841976547050350277460563089811513157529113201589004 40 41 42 # pubkey K 43 sample_pubkey = unhexlify( 44 '0409d4e5c0ab3d25fe' 45 '048c64c9da1a242c' 46 '7f19417e9517cd26' 47 '6950d72c75571358' 48 '5c6178e97fe092fc' 49 '897c9a1f1720d577' 50 '0ae8eaad2fa8fcbd' 51 '08e9324a5dde1857' 52 ) 53 54 sample_iv = unhexlify( 55 'bddb7c2829b08038' 56 '753084a2f3991681' 57 ) 58 59 # Private key r 60 sample_ephem_privkey = unhexlify( 61 '5be6facd941b76e9' 62 'd3ead03029fbdb6b' 63 '6e0809293f7fb197' 64 'd0c51f84e96b8ba4' 65 ) 66 # Public key R 67 sample_ephem_pubkey = unhexlify( 68 '040293213dcf1388b6' 69 '1c2ae5cf80fee6ff' 70 'ffc049a2f9fe7365' 71 'fe3867813ca81292' 72 'df94686c6afb565a' 73 'c6149b153d61b3b2' 74 '87ee2c7f997c1423' 75 '8796c12b43a3865a' 76 ) 77 78 # First 32 bytes of H called key_e 79 sample_enkey = unhexlify( 80 '1705438282678671' 81 '05263d4828efff82' 82 'd9d59cbf08743b69' 83 '6bcc5d69fa1897b4' 84 ) 85 86 # Last 32 bytes of H called key_m 87 sample_mackey = unhexlify( 88 'f83f1e9cc5d6b844' 89 '8d39dc6a9d5f5b7f' 90 '460e4a78e9286ee8' 91 'd91ce1660a53eacd' 92 ) 93 94 # No padding of input! 95 sample_data = b'The quick brown fox jumps over the lazy dog.' 96 97 sample_ciphertext = unhexlify( 98 '64203d5b24688e25' 99 '47bba345fa139a5a' 100 '1d962220d4d48a0c' 101 'f3b1572c0d95b616' 102 '43a6f9a0d75af7ea' 103 'cc1bd957147bf723' 104 ) 105 106 sample_mac = unhexlify( 107 'f2526d61b4851fb2' 108 '3409863826fd2061' 109 '65edc021368c7946' 110 '571cead69046e619' 111 )