• Top
    • Documentation
    • Books
    • Boolean-reasoning
    • Projects
    • Debugging
    • Community
    • Std
    • Proof-automation
    • Macro-libraries
    • ACL2
    • Interfacing-tools
    • Hardware-verification
    • Software-verification
      • Kestrel-books
        • Crypto-hdwallet
        • Apt
        • Error-checking
        • Fty-extensions
        • Isar
        • Kestrel-utilities
        • Set
        • C
        • Soft
        • Bv
        • Imp-language
        • Ethereum
        • Event-macros
        • Java
        • Riscv
        • Bitcoin
          • Bip32
            • Bip32-wallet-structure
            • Bip32-key-trees
              • Bip32-extend-tree
              • Bip32-valid-depths-p
              • Bip32-key-tree
              • Bip32-path-set-closedp
              • Bip32-valid-keys-p
                • Bip32-valid-keys-p-executable-attachment
                  • Bip32-valid-keys-p-exec
                  • Bip32-valid-keys-p-exec-correctness
                    • Bip32-valid-keys-p-exec-attach
                • Bip32-index-tree
                • Bip32-path-in-tree-p
                • Bip32-ckd*
                • Bip32-get-pub-key-at-path
                • Bip32-get-priv-key-at-path
                • Bip32-ckd-priv*
                • Bip32-ckd-pub*
                • Bip32-path
                • Bip32-key-tree-priv-p
                • Bip32-path-set
              • Bip32-key-serialization
              • Bip32-key-derivation
              • Bip32-executable-attachments
              • Bip32-extended-keys
              • Bip32-master-key-generation
            • Bech32
            • Bip39
            • Bip44
            • Base58
            • Bip43
            • Bytes
            • Base58check
            • Cryptography
            • Bip-350
            • Bip-173
          • Zcash
          • Yul
          • ACL2-programming-language
          • Prime-fields
          • Json
          • Syntheto
          • File-io-light
          • Cryptography
          • Number-theory
          • Axe
          • Lists-light
          • Builtins
          • Solidity
          • Helpers
          • Htclient
          • Typed-lists-light
          • Arithmetic-light
        • X86isa
        • Axe
        • Execloader
      • Math
      • Testing-utilities
    • Bip32-valid-keys-p-executable-attachment

    Bip32-valid-keys-p-exec-correctness

    Correctness of bip32-valid-keys-p-exec.

    We prove that bip32-valid-keys-p-exec is equivalent to bip32-valid-keys-p.

    We first prove that each one implies the other, and then the equality follows from the fact that these functions are boolean-valued.

    Definitions and Theorems

    Theorem: bip32-valid-keys-p-when-bip32-valid-keys-p-exec

    (defthm bip32-valid-keys-p-when-bip32-valid-keys-p-exec
      (implies (bip32-valid-keys-p-exec root paths)
               (bip32-valid-keys-p root paths)))

    Theorem: bip32-valid-keys-p-exec-when-bip32-valid-keys-p

    (defthm bip32-valid-keys-p-exec-when-bip32-valid-keys-p
      (implies (bip32-valid-keys-p root paths)
               (bip32-valid-keys-p-exec root paths)))

    Theorem: bip32-valid-keys-p-exec-is-bip32-valid-keys-p

    (defthm bip32-valid-keys-p-exec-is-bip32-valid-keys-p
      (equal (bip32-valid-keys-p-exec root paths)
             (bip32-valid-keys-p root paths)))