public void testVectorV3() { byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }; byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c }; byte[] info = { (byte)0xf0, (byte)0xf1, (byte)0xf2, (byte)0xf3, (byte)0xf4, (byte)0xf5, (byte)0xf6, (byte)0xf7, (byte)0xf8, (byte)0xf9 }; byte[] okm = { (byte)0x3c, (byte)0xb2, (byte)0x5f, (byte)0x25, (byte)0xfa, (byte)0xac, (byte)0xd5, (byte)0x7a, (byte)0x90, (byte)0x43, (byte)0x4f, (byte)0x64, (byte)0xd0, (byte)0x36, (byte)0x2f, (byte)0x2a, (byte)0x2d, (byte)0x2d, (byte)0x0a, (byte)0x90, (byte)0xcf, (byte)0x1a, (byte)0x5a, (byte)0x4c, (byte)0x5d, (byte)0xb0, (byte)0x2d, (byte)0x56, (byte)0xec, (byte)0xc4, (byte)0xc5, (byte)0xbf, (byte)0x34, (byte)0x00, (byte)0x72, (byte)0x08, (byte)0xd5, (byte)0xb8, (byte)0x87, (byte)0x18, (byte)0x58, (byte)0x65 }; byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 42); Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(okm, actualOutput)); }
public void testChainKeyDerivationV3() { byte[] seed = { 0x8a, 0xb7, 0x2d, 0x6f, 0x4c, 0xc5, 0xac, 0x0d, 0x38, 0x7e, 0xaf, 0x46, 0x33, 0x78, 0xdd, 0xb2, 0x8e, 0xdd, 0x07, 0x38, 0x5b, 0x1c, 0xb0, 0x12, 0x50, 0xc7, 0x15, 0x98, 0x2e, 0x7a, 0xd4, 0x8f }; byte[] messageKey = { /* 0x02*/ 0xbf, 0x51, 0xe9, 0xd7, 0x5e, 0x0e, 0x31, 0x03, 0x10, 0x51, 0xf8, 0x2a, 0x24, 0x91, 0xff, 0xc0, 0x84, 0xfa, 0x29, 0x8b, 0x77, 0x93, 0xbd, 0x9d, 0xb6, 0x20, 0x05, 0x6f, 0xeb, 0xf4, 0x52, 0x17 }; byte[] macKey = { 0xc6, 0xc7, 0x7d, 0x6a, 0x73, 0xa3, 0x54, 0x33, 0x7a, 0x56, 0x43, 0x5e, 0x34, 0x60, 0x7d, 0xfe, 0x48, 0xe3, 0xac, 0xe1, 0x4e, 0x77, 0x31, 0x4d, 0xc6, 0xab, 0xc1, 0x72, 0xe7, 0xa7, 0x03, 0x0b }; byte[] nextChainKey = { 0x28, 0xe8, 0xf8, 0xfe, 0xe5, 0x4b, 0x80, 0x1e, 0xef, 0x7c, 0x5c, 0xfb, 0x2f, 0x17, 0xf3, 0x2c, 0x7b, 0x33, 0x44, 0x85, 0xbb, 0xb7, 0x0f, 0xac, 0x6e, 0xc1, 0x03, 0x42, 0xa2, 0x46, 0xd1, 0x5d }; ChainKey chainKey = new ChainKey(HKDF.createFor(3), seed, 0); CollectionAssert.AreEqual(seed, chainKey.getKey()); CollectionAssert.AreEqual(messageKey, chainKey.getMessageKeys().getCipherKey()); CollectionAssert.AreEqual(macKey, chainKey.getMessageKeys().getMacKey()); CollectionAssert.AreEqual(nextChainKey, chainKey.getNextChainKey().getKey()); Assert.AreEqual <uint>(0, chainKey.getIndex()); Assert.AreEqual <uint>(0, chainKey.getMessageKeys().getCounter()); Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getIndex()); Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getMessageKeys().getCounter()); }
public void testChainKeyDerivationV3() { byte[] seed = { (byte)0x8a, (byte)0xb7, (byte)0x2d, (byte)0x6f, (byte)0x4c, (byte)0xc5, (byte)0xac, (byte)0x0d, (byte)0x38, (byte)0x7e, (byte)0xaf, (byte)0x46, (byte)0x33, (byte)0x78, (byte)0xdd, (byte)0xb2, (byte)0x8e, (byte)0xdd, (byte)0x07, (byte)0x38, (byte)0x5b, (byte)0x1c, (byte)0xb0, (byte)0x12, (byte)0x50, (byte)0xc7, (byte)0x15, (byte)0x98, (byte)0x2e, (byte)0x7a, (byte)0xd4, (byte)0x8f }; byte[] messageKey = { /* (byte) 0x02*/ (byte)0xbf, (byte)0x51, (byte)0xe9, (byte)0xd7, (byte)0x5e, (byte)0x0e, (byte)0x31, (byte)0x03,(byte)0x10, (byte)0x51, (byte)0xf8, (byte)0x2a, (byte)0x24,(byte)0x91, (byte)0xff, (byte)0xc0, (byte)0x84, (byte)0xfa,(byte)0x29, (byte)0x8b, (byte)0x77, (byte)0x93, (byte)0xbd,(byte)0x9d, (byte)0xb6, (byte)0x20, (byte)0x05, (byte)0x6f,(byte)0xeb, (byte)0xf4, (byte)0x52, (byte)0x17 }; byte[] macKey = { (byte)0xc6, (byte)0xc7, (byte)0x7d, (byte)0x6a, (byte)0x73, (byte)0xa3, (byte)0x54, (byte)0x33, (byte)0x7a, (byte)0x56, (byte)0x43, (byte)0x5e, (byte)0x34, (byte)0x60, (byte)0x7d, (byte)0xfe, (byte)0x48, (byte)0xe3, (byte)0xac, (byte)0xe1, (byte)0x4e, (byte)0x77, (byte)0x31, (byte)0x4d, (byte)0xc6, (byte)0xab, (byte)0xc1, (byte)0x72, (byte)0xe7, (byte)0xa7, (byte)0x03, (byte)0x0b }; byte[] nextChainKey = { (byte)0x28, (byte)0xe8, (byte)0xf8, (byte)0xfe, (byte)0xe5, (byte)0x4b, (byte)0x80, (byte)0x1e, (byte)0xef, (byte)0x7c, (byte)0x5c, (byte)0xfb, (byte)0x2f, (byte)0x17, (byte)0xf3, (byte)0x2c, (byte)0x7b, (byte)0x33, (byte)0x44, (byte)0x85, (byte)0xbb, (byte)0xb7, (byte)0x0f, (byte)0xac, (byte)0x6e, (byte)0xc1, (byte)0x03, (byte)0x42, (byte)0xa2, (byte)0x46, (byte)0xd1, (byte)0x5d }; ChainKey chainKey = new ChainKey(HKDF.createFor(3), seed, 0); Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getKey(), seed)); Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getMessageKeys().getCipherKey(), messageKey)); Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getMessageKeys().getMacKey(), macKey)); Assert.IsTrue(StructuralComparisons.StructuralEqualityComparer.Equals(chainKey.getNextChainKey().getKey(), nextChainKey)); Assert.IsTrue(chainKey.getIndex() == 0); Assert.IsTrue(chainKey.getMessageKeys().getCounter() == 0); Assert.IsTrue(chainKey.getNextChainKey().getIndex() == 1); Assert.IsTrue(chainKey.getNextChainKey().getMessageKeys().getCounter() == 1); }
public void testChainKeyDerivationV2() { byte[] seed = { 0x8a, 0xb7, 0x2d, 0x6f, 0x4c, 0xc5, 0xac, 0x0d, 0x38, 0x7e, 0xaf, 0x46, 0x33, 0x78, 0xdd, 0xb2, 0x8e, 0xdd, 0x07, 0x38, 0x5b, 0x1c, 0xb0, 0x12, 0x50, 0xc7, 0x15, 0x98, 0x2e, 0x7a, 0xd4, 0x8f }; byte[] messageKey = { 0x02, 0xa9, 0xaa, 0x6c, 0x7d, 0xbd, 0x64, 0xf9, 0xd3, 0xaa, 0x92, 0xf9, 0x2a, 0x27, 0x7b, 0xf5, 0x46, 0x09, 0xda, 0xdf, 0x0b, 0x00, 0x82, 0x8a, 0xcf, 0xc6, 0x1e, 0x3c, 0x72, 0x4b, 0x84, 0xa7 }; byte[] macKey = { 0xbf, 0xbe, 0x5e, 0xfb, 0x60, 0x30, 0x30, 0x52, 0x67, 0x42, 0xe3, 0xee, 0x89, 0xc7, 0x02, 0x4e, 0x88, 0x4e, 0x44, 0x0f, 0x1f, 0xf3, 0x76, 0xbb, 0x23, 0x17, 0xb2, 0xd6, 0x4d, 0xeb, 0x7c, 0x83 }; byte[] nextChainKey = { 0x28, 0xe8, 0xf8, 0xfe, 0xe5, 0x4b, 0x80, 0x1e, 0xef, 0x7c, 0x5c, 0xfb, 0x2f, 0x17, 0xf3, 0x2c, 0x7b, 0x33, 0x44, 0x85, 0xbb, 0xb7, 0x0f, 0xac, 0x6e, 0xc1, 0x03, 0x42, 0xa2, 0x46, 0xd1, 0x5d }; ChainKey chainKey = new ChainKey(HKDF.createFor(2), seed, 0); Assert.AreEqual(seed, chainKey.getKey()); CollectionAssert.AreEqual(messageKey, chainKey.getMessageKeys().getCipherKey()); CollectionAssert.AreEqual(macKey, chainKey.getMessageKeys().getMacKey()); CollectionAssert.AreEqual(nextChainKey, chainKey.getNextChainKey().getKey()); Assert.AreEqual <uint>(0, chainKey.getIndex()); Assert.AreEqual <uint>(0, chainKey.getMessageKeys().getCounter()); Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getIndex()); Assert.AreEqual <uint>(1, chainKey.getNextChainKey().getMessageKeys().getCounter()); }
private static DerivedKeys calculateDerivedKeys(uint sessionVersion, byte[] masterSecret) { HKDF kdf = HKDF.createFor(sessionVersion); byte[] derivedSecretBytes = kdf.deriveSecrets(masterSecret, Encoding.UTF8.GetBytes("WhisperText"), 64); byte[][] derivedSecrets = ByteUtil.split(derivedSecretBytes, 32, 32); return(new DerivedKeys(new RootKey(kdf, derivedSecrets[0]), new ChainKey(kdf, derivedSecrets[1], 0))); }
public ChainKey getReceiverChainKey(ECPublicKey senderEphemeral) { Pair <Chain, uint> receiverChainAndIndex = getReceiverChain(senderEphemeral); Chain receiverChain = receiverChainAndIndex.first(); if (receiverChain == null) { return(null); } else { return(new ChainKey(HKDF.createFor(getSessionVersion()), receiverChain.ChainKey.Key.ToByteArray(), receiverChain.ChainKey.Index)); } }
public void testVectorV2() { byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }; byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c }; byte[] info = { 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9 }; byte[] okm = { 0x6e, 0xc2, 0x55, 0x6d, 0x5d, 0x7b, 0x1d, 0x81, 0xde, 0xe4, 0x22, 0x2a, 0xd7, 0x48, 0x36, 0x95, 0xdd, 0xc9, 0x8f, 0x4f, 0x5f, 0xab, 0xc0, 0xe0, 0x20, 0x5d, 0xc2, 0xef, 0x87, 0x52, 0xd4, 0x1e, 0x04, 0xe2, 0xe2, 0x11, 0x01, 0xc6, 0x8f, 0xf0, 0x93, 0x94, 0xb8, 0xad, 0x0b, 0xdc, 0xb9, 0x60, 0x9c, 0xd4, 0xee, 0x82, 0xac, 0x13, 0x19, 0x9b, 0x4a, 0xa9, 0xfd, 0xa8, 0x99, 0xda, 0xeb, 0xec }; byte[] actualOutput = HKDF.createFor(2).deriveSecrets(ikm, salt, info, 64); CollectionAssert.AreEqual(okm, actualOutput); }
public void testVectorV3() { byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }; byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c }; byte[] info = { 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9 }; byte[] okm = { 0x3c, 0xb2, 0x5f, 0x25, 0xfa, 0xac, 0xd5, 0x7a, 0x90, 0x43, 0x4f, 0x64, 0xd0, 0x36, 0x2f, 0x2a, 0x2d, 0x2d, 0x0a, 0x90, 0xcf, 0x1a, 0x5a, 0x4c, 0x5d, 0xb0, 0x2d, 0x56, 0xec, 0xc4, 0xc5, 0xbf, 0x34, 0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18, 0x58, 0x65 }; byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 42); CollectionAssert.AreEqual(okm, actualOutput); }
public void testVectorV2() { byte[] ikm = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }; byte[] salt = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c }; byte[] info = { (byte)0xf0, (byte)0xf1, (byte)0xf2, (byte)0xf3, (byte)0xf4, (byte)0xf5, (byte)0xf6, (byte)0xf7, (byte)0xf8, (byte)0xf9 }; byte[] okm = { (byte)0x6e, (byte)0xc2, (byte)0x55, (byte)0x6d, (byte)0x5d, (byte)0x7b, (byte)0x1d, (byte)0x81, (byte)0xde, (byte)0xe4, (byte)0x22, (byte)0x2a, (byte)0xd7, (byte)0x48, (byte)0x36, (byte)0x95, (byte)0xdd, (byte)0xc9, (byte)0x8f, (byte)0x4f, (byte)0x5f, (byte)0xab, (byte)0xc0, (byte)0xe0, (byte)0x20, (byte)0x5d, (byte)0xc2, (byte)0xef, (byte)0x87, (byte)0x52, (byte)0xd4, (byte)0x1e, (byte)0x04, (byte)0xe2, (byte)0xe2, (byte)0x11, (byte)0x01, (byte)0xc6, (byte)0x8f, (byte)0xf0, (byte)0x93, (byte)0x94, (byte)0xb8, (byte)0xad, (byte)0x0b, (byte)0xdc, (byte)0xb9, (byte)0x60, (byte)0x9c, (byte)0xd4, (byte)0xee, (byte)0x82, (byte)0xac, (byte)0x13, (byte)0x19, (byte)0x9b, (byte)0x4a, (byte)0xa9, (byte)0xfd, (byte)0xa8, (byte)0x99, (byte)0xda, (byte)0xeb, (byte)0xec }; try { byte[] actualOutput = HKDF.createFor(2).deriveSecrets(ikm, salt, info, 64); } catch (System.NotSupportedException) { } catch (System.Exception e) { Assert.Fail("Unexpected Exception received: {0}", e); } }
public ChainKey getSenderChainKey() { Chain.Types.ChainKey chainKeyStructure = sessionStructure.SenderChain.ChainKey; return(new ChainKey(HKDF.createFor(getSessionVersion()), chainKeyStructure.Key.ToByteArray(), chainKeyStructure.Index)); }
public RootKey getRootKey() { return(new RootKey(HKDF.createFor(getSessionVersion()), this.sessionStructure.RootKey.ToByteArray())); }
public void testVectorLongV3() { byte[] ikm = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f }; byte[] salt = { 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf }; byte[] info = { 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff }; byte[] okm = { 0xb1, 0x1e, 0x39, 0x8d, 0xc8, 0x03, 0x27, 0xa1, 0xc8, 0xe7, 0xf7, 0x8c, 0x59, 0x6a, 0x49, 0x34, 0x4f, 0x01, 0x2e, 0xda, 0x2d, 0x4e, 0xfa, 0xd8, 0xa0, 0x50, 0xcc, 0x4c, 0x19, 0xaf, 0xa9, 0x7c, 0x59, 0x04, 0x5a, 0x99, 0xca, 0xc7, 0x82, 0x72, 0x71, 0xcb, 0x41, 0xc6, 0x5e, 0x59, 0x0e, 0x09, 0xda, 0x32, 0x75, 0x60, 0x0c, 0x2f, 0x09, 0xb8, 0x36, 0x77, 0x93, 0xa9, 0xac, 0xa3, 0xdb, 0x71, 0xcc, 0x30, 0xc5, 0x81, 0x79, 0xec, 0x3e, 0x87, 0xc1, 0x4c, 0x01, 0xd5, 0xc1, 0xf3, 0x43, 0x4f, 0x1d, 0x87 }; byte[] actualOutput = HKDF.createFor(3).deriveSecrets(ikm, salt, info, 82); CollectionAssert.AreEqual(okm, actualOutput); }
public void testRootKeyDerivationV2() { byte[] rootKeySeed = { 0x7b, 0xa6, 0xde, 0xbc, 0x2b, 0xc1, 0xbb, 0xf9, 0x1a, 0xbb, 0xc1, 0x36, 0x74, 0x04, 0x17, 0x6c, 0xa6, 0x23, 0x09, 0x5b, 0x7e, 0xc6, 0x6b, 0x45, 0xf6, 0x02, 0xd9, 0x35, 0x38, 0x94, 0x2d, 0xcc }; byte[] alicePublic = { 0x05, 0xee, 0x4f, 0xa6, 0xcd, 0xc0, 0x30, 0xdf, 0x49, 0xec, 0xd0, 0xba, 0x6c, 0xfc, 0xff, 0xb2, 0x33, 0xd3, 0x65, 0xa2, 0x7f, 0xad, 0xbe, 0xff, 0x77, 0xe9, 0x63, 0xfc, 0xb1, 0x62, 0x22, 0xe1, 0x3a }; byte[] alicePrivate = { 0x21, 0x68, 0x22, 0xec, 0x67, 0xeb, 0x38, 0x04, 0x9e, 0xba, 0xe7, 0xb9, 0x39, 0xba, 0xea, 0xeb, 0xb1, 0x51, 0xbb, 0xb3, 0x2d, 0xb8, 0x0f, 0xd3, 0x89, 0x24, 0x5a, 0xc3, 0x7a, 0x94, 0x8e, 0x50 }; byte[] bobPublic = { 0x05, 0xab, 0xb8, 0xeb, 0x29, 0xcc, 0x80, 0xb4, 0x71, 0x09, 0xa2, 0x26, 0x5a, 0xbe, 0x97, 0x98, 0x48, 0x54, 0x06, 0xe3, 0x2d, 0xa2, 0x68, 0x93, 0x4a, 0x95, 0x55, 0xe8, 0x47, 0x57, 0x70, 0x8a, 0x30 }; byte[] nextRoot = { 0xb1, 0x14, 0xf5, 0xde, 0x28, 0x01, 0x19, 0x85, 0xe6, 0xeb, 0xa2, 0x5d, 0x50, 0xe7, 0xec, 0x41, 0xa9, 0xb0, 0x2f, 0x56, 0x93, 0xc5, 0xc7, 0x88, 0xa6, 0x3a, 0x06, 0xd2, 0x12, 0xa2, 0xf7, 0x31 }; byte[] nextChain = { 0x9d, 0x7d, 0x24, 0x69, 0xbc, 0x9a, 0xe5, 0x3e, 0xe9, 0x80, 0x5a, 0xa3, 0x26, 0x4d, 0x24, 0x99, 0xa3, 0xac, 0xe8, 0x0f, 0x4c, 0xca, 0xe2, 0xda, 0x13, 0x43, 0x0c, 0x5c, 0x55, 0xb5, 0xca, 0x5f }; ECPublicKey alicePublicKey = Curve.decodePoint(alicePublic, 0); ECPrivateKey alicePrivateKey = Curve.decodePrivatePoint(alicePrivate); ECKeyPair aliceKeyPair = new ECKeyPair(alicePublicKey, alicePrivateKey); ECPublicKey bobPublicKey = Curve.decodePoint(bobPublic, 0); RootKey rootKey = new RootKey(HKDF.createFor(2), rootKeySeed); Pair <RootKey, ChainKey> rootKeyChainKeyPair = rootKey.createChain(bobPublicKey, aliceKeyPair); RootKey nextRootKey = rootKeyChainKeyPair.first(); ChainKey nextChainKey = rootKeyChainKeyPair.second(); CollectionAssert.AreEqual(rootKey.getKeyBytes(), rootKeySeed); CollectionAssert.AreEqual(nextRootKey.getKeyBytes(), nextRoot); CollectionAssert.AreEqual(nextChainKey.getKey(), nextChain); }