• Top
    • Documentation
    • Books
    • Boolean-reasoning
    • Projects
    • Debugging
    • Community
    • Std
    • Proof-automation
    • Macro-libraries
    • ACL2
    • Interfacing-tools
    • Hardware-verification
    • Software-verification
      • Kestrel-books
        • Crypto-hdwallet
        • Apt
        • Error-checking
        • Fty-extensions
        • Isar
        • Kestrel-utilities
        • Set
        • C
        • Soft
        • Bv
        • Imp-language
        • Ethereum
        • Event-macros
        • Java
        • Riscv
        • Bitcoin
          • Bip32
            • Bip32-wallet-structure
            • Bip32-key-trees
            • Bip32-key-serialization
            • Bip32-key-derivation
            • Bip32-executable-attachments
              • Bip32-path-set-closedp-executable-attachment
              • Bip32-valid-keys-p-executable-attachment
                • Bip32-valid-keys-p-exec
                • Bip32-valid-keys-p-exec-correctness
                  • Bip32-valid-keys-p-exec-attach
                • Bip32-valid-depths-p-executable-attachment
              • Bip32-extended-keys
              • Bip32-master-key-generation
            • Bech32
            • Bip39
            • Bip44
            • Base58
            • Bip43
            • Bytes
            • Base58check
            • Cryptography
            • Bip-350
            • Bip-173
          • Zcash
          • Yul
          • ACL2-programming-language
          • Prime-fields
          • Json
          • Syntheto
          • File-io-light
          • Cryptography
          • Number-theory
          • Axe
          • Lists-light
          • Builtins
          • Solidity
          • Helpers
          • Htclient
          • Typed-lists-light
          • Arithmetic-light
        • X86isa
        • Axe
        • Execloader
      • Math
      • Testing-utilities
    • Bip32-valid-keys-p-executable-attachment

    Bip32-valid-keys-p-exec-correctness

    Correctness of bip32-valid-keys-p-exec.

    We prove that bip32-valid-keys-p-exec is equivalent to bip32-valid-keys-p.

    We first prove that each one implies the other, and then the equality follows from the fact that these functions are boolean-valued.

    Definitions and Theorems

    Theorem: bip32-valid-keys-p-when-bip32-valid-keys-p-exec

    (defthm bip32-valid-keys-p-when-bip32-valid-keys-p-exec
      (implies (bip32-valid-keys-p-exec root paths)
               (bip32-valid-keys-p root paths)))

    Theorem: bip32-valid-keys-p-exec-when-bip32-valid-keys-p

    (defthm bip32-valid-keys-p-exec-when-bip32-valid-keys-p
      (implies (bip32-valid-keys-p root paths)
               (bip32-valid-keys-p-exec root paths)))

    Theorem: bip32-valid-keys-p-exec-is-bip32-valid-keys-p

    (defthm bip32-valid-keys-p-exec-is-bip32-valid-keys-p
      (equal (bip32-valid-keys-p-exec root paths)
             (bip32-valid-keys-p root paths)))