/ src / pyelliptic / tests / samples.py
samples.py
  1  """Testing samples"""
  2  
  3  from binascii import unhexlify
  4  
  5  
  6  # These keys are from addresses test script
  7  sample_pubsigningkey = (
  8      b'044a367f049ec16cb6b6118eb734a9962d10b8db59c890cd08f210c43ff08bdf09d'
  9      b'16f502ca26cd0713f38988a1237f1fc8fa07b15653c996dc4013af6d15505ce')
 10  sample_pubencryptionkey = (
 11      b'044597d59177fc1d89555d38915f581b5ff2286b39d022ca0283d2bdd5c36be5d3c'
 12      b'e7b9b97792327851a562752e4b79475d1f51f5a71352482b241227f45ed36a9')
 13  sample_privsigningkey = \
 14      b'93d0b61371a54b53df143b954035d612f8efa8a3ed1cf842c2186bfd8f876665'
 15  sample_privencryptionkey = \
 16      b'4b0b73a54e19b059dc274ab69df095fe699f43b17397bca26fdf40f4d7400a3a'
 17  
 18  # [chan] bitmessage
 19  sample_privsigningkey_wif = \
 20      b'5K42shDERM5g7Kbi3JT5vsAWpXMqRhWZpX835M2pdSoqQQpJMYm'
 21  sample_privencryptionkey_wif = \
 22      b'5HwugVWm31gnxtoYcvcK7oywH2ezYTh6Y4tzRxsndAeMi6NHqpA'
 23  sample_wif_privsigningkey = \
 24      b'a2e8b841a531c1c558ee0680c396789c7a2ea3ac4795ae3f000caf9fe367d144'
 25  sample_wif_privencryptionkey = \
 26      b'114ec0e2dca24a826a0eed064b0405b0ac148abc3b1d52729697f4d7b873fdc6'
 27  
 28  sample_factor = \
 29      66858749573256452658262553961707680376751171096153613379801854825275240965733
 30  # G * sample_factor
 31  sample_point = (
 32      33567437183004486938355437500683826356288335339807546987348409590129959362313,
 33      94730058721143827257669456336351159718085716196507891067256111928318063085006
 34  )
 35  
 36  sample_deterministic_addr3 = b'2DBPTgeSawWYZceFD69AbDT5q4iUWtj1ZN'
 37  sample_deterministic_addr4 = b'2cWzSnwjJ7yRP3nLEWUV5LisTZyREWSzUK'
 38  sample_daddr3_512 = 18875720106589866286514488037355423395410802084648916523381
 39  sample_daddr4_512 = 25152821841976547050350277460563089811513157529113201589004
 40  
 41  
 42  # pubkey K
 43  sample_pubkey = unhexlify(
 44      '0409d4e5c0ab3d25fe'
 45      '048c64c9da1a242c'
 46      '7f19417e9517cd26'
 47      '6950d72c75571358'
 48      '5c6178e97fe092fc'
 49      '897c9a1f1720d577'
 50      '0ae8eaad2fa8fcbd'
 51      '08e9324a5dde1857'
 52  )
 53  
 54  sample_iv = unhexlify(
 55      'bddb7c2829b08038'
 56      '753084a2f3991681'
 57  )
 58  
 59  # Private key r
 60  sample_ephem_privkey = unhexlify(
 61      '5be6facd941b76e9'
 62      'd3ead03029fbdb6b'
 63      '6e0809293f7fb197'
 64      'd0c51f84e96b8ba4'
 65  )
 66  # Public key R
 67  sample_ephem_pubkey = unhexlify(
 68      '040293213dcf1388b6'
 69      '1c2ae5cf80fee6ff'
 70      'ffc049a2f9fe7365'
 71      'fe3867813ca81292'
 72      'df94686c6afb565a'
 73      'c6149b153d61b3b2'
 74      '87ee2c7f997c1423'
 75      '8796c12b43a3865a'
 76  )
 77  
 78  # First 32 bytes of H called key_e
 79  sample_enkey = unhexlify(
 80      '1705438282678671'
 81      '05263d4828efff82'
 82      'd9d59cbf08743b69'
 83      '6bcc5d69fa1897b4'
 84  )
 85  
 86  # Last 32 bytes of H called key_m
 87  sample_mackey = unhexlify(
 88      'f83f1e9cc5d6b844'
 89      '8d39dc6a9d5f5b7f'
 90      '460e4a78e9286ee8'
 91      'd91ce1660a53eacd'
 92  )
 93  
 94  # No padding of input!
 95  sample_data = b'The quick brown fox jumps over the lazy dog.'
 96  
 97  sample_ciphertext = unhexlify(
 98      '64203d5b24688e25'
 99      '47bba345fa139a5a'
100      '1d962220d4d48a0c'
101      'f3b1572c0d95b616'
102      '43a6f9a0d75af7ea'
103      'cc1bd957147bf723'
104  )
105  
106  sample_mac = unhexlify(
107      'f2526d61b4851fb2'
108      '3409863826fd2061'
109      '65edc021368c7946'
110      '571cead69046e619'
111  )