@@ -182,22 +182,31 @@ mod tests {
182182 use wedpr_l_crypto_ecies_secp256k1:: WedprSecp256k1Ecies ;
183183 use wedpr_l_crypto_hash_keccak256:: WedprKeccak256 ;
184184 use wedpr_l_crypto_signature_secp256k1:: WedprSecp256k1Recover ;
185- use wedpr_l_utils:: traits:: { Ecies , Hash , Signature } ;
185+ use wedpr_l_utils:: traits:: { Ecies , Hash , Signature , Coder } ;
186+ use wedpr_l_common_coder_base64:: WedprBase64 ;
186187
187188 #[ test]
188189 fn test_hdk_usage ( ) {
189190 // Create a master key.
190- let mnemonic = create_mnemonic_en ( 24 ) . unwrap ( ) ;
191- let password = "DO NOT USE REAL PASSWORD HERE" ;
191+ // let mnemonic = create_mnemonic_en(24).unwrap();
192+ let mnemonic = "engage wagon riot toe odor metal palm donor trumpet slight exercise taste burst sense smile curtain cheese sketch unable token suggest lab rain dolphin" ;
193+ // let password = "DO NOT USE REAL PASSWORD HERE";
194+ let password = "wi_wallet" ;
195+
192196 let master_key = create_master_key_en ( password, & mnemonic) . unwrap ( ) ;
197+ let coder = WedprBase64 :: default ( ) ;
198+ println ! ( "master_key = {:?}" , coder. encode( & master_key) ) ;
193199
194200 // Derive an extended key.
195- let key_derivation_path = create_key_derivation_path ( 44 , 1 , 1 , 1 , 0 ) ;
201+ let key_derivation_path = create_key_derivation_path ( 44 , 513866 , 1 , 0 , 1000 ) ;
196202 let extended_key =
197203 derive_extended_key ( & master_key, & key_derivation_path) . unwrap ( ) ;
198204 let private_key = extended_key. get_extended_private_key ( ) ;
199205 let public_key = extended_key. get_extended_public_key ( ) ;
200206
207+ println ! ( "private_key = {:?}" , hex:: encode( private_key) ) ;
208+ println ! ( "public_key = {:?}" , hex:: encode( public_key) ) ;
209+
201210 // Test the derived key pair for signature functions.
202211 let message = "WeDPR TEST" ;
203212 let hash = WedprKeccak256 :: default ( ) ;
0 commit comments