2015-02-23 00:36:57 +01:00
|
|
|
/* global describe, it */
|
|
|
|
|
2014-12-05 05:07:30 +01:00
|
|
|
var assert = require('assert')
|
|
|
|
var bigi = require('bigi')
|
|
|
|
var bitcoin = require('../../')
|
2017-08-09 08:03:12 +02:00
|
|
|
var crypto = require('crypto')
|
2014-12-05 05:07:30 +01:00
|
|
|
|
2015-08-19 07:12:55 +02:00
|
|
|
var ecurve = require('ecurve')
|
|
|
|
var secp256k1 = ecurve.getCurveByName('secp256k1')
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
describe('bitcoinjs-lib (crypto)', function () {
|
2018-01-31 02:46:35 +01:00
|
|
|
it('can recover a private key from duplicate R values', function () {
|
2016-10-07 02:37:44 +02:00
|
|
|
this.timeout(30000)
|
2015-08-07 06:47:07 +02:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// https://blockchain.info/tx/f4c16475f2a6e9c602e4a287f9db3040e319eb9ece74761a4b84bc820fbeef50
|
|
|
|
var tx = bitcoin.Transaction.fromHex('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')
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
tx.ins.forEach(function (input, vin) {
|
|
|
|
var script = input.script
|
|
|
|
var scriptChunks = bitcoin.script.decompile(script)
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
assert(bitcoin.script.pubKeyHash.input.check(scriptChunks), 'Expected pubKeyHash script')
|
|
|
|
var prevOutScript = bitcoin.address.toOutputScript('1ArJ9vRaQcoQ29mTWZH768AmRwzb6Zif1z')
|
|
|
|
var scriptSignature = bitcoin.ECSignature.parseScriptSignature(scriptChunks[0])
|
|
|
|
var publicKey = bitcoin.ECPair.fromPublicKeyBuffer(scriptChunks[1])
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
var m = tx.hashForSignature(vin, prevOutScript, scriptSignature.hashType)
|
|
|
|
assert(publicKey.verify(m, scriptSignature.signature), 'Invalid m')
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// store the required information
|
|
|
|
input.signature = scriptSignature.signature
|
|
|
|
input.z = bigi.fromBuffer(m)
|
|
|
|
})
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// finally, run the tasks, then on to the math
|
|
|
|
var n = secp256k1.n
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
for (var i = 0; i < tx.ins.length; ++i) {
|
|
|
|
for (var j = i + 1; j < tx.ins.length; ++j) {
|
|
|
|
var inputA = tx.ins[i]
|
|
|
|
var inputB = tx.ins[j]
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// enforce matching r values
|
|
|
|
assert.strictEqual(inputA.signature.r.toString(), inputB.signature.r.toString())
|
|
|
|
var r = inputA.signature.r
|
|
|
|
var rInv = r.modInverse(n)
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
var s1 = inputA.signature.s
|
|
|
|
var s2 = inputB.signature.s
|
|
|
|
var z1 = inputA.z
|
|
|
|
var z2 = inputB.z
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
var zz = z1.subtract(z2).mod(n)
|
|
|
|
var ss = s1.subtract(s2).mod(n)
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// k = (z1 - z2) / (s1 - s2)
|
|
|
|
// d1 = (s1 * k - z1) / r
|
|
|
|
// d2 = (s2 * k - z2) / r
|
|
|
|
var k = zz.multiply(ss.modInverse(n)).mod(n)
|
|
|
|
var d1 = ((s1.multiply(k).mod(n)).subtract(z1).mod(n)).multiply(rInv).mod(n)
|
|
|
|
var d2 = ((s2.multiply(k).mod(n)).subtract(z2).mod(n)).multiply(rInv).mod(n)
|
2015-08-07 12:52:07 +02:00
|
|
|
|
2018-01-31 02:46:35 +01:00
|
|
|
// enforce matching private keys
|
|
|
|
assert.strictEqual(d1.toString(), d2.toString())
|
|
|
|
}
|
|
|
|
}
|
2014-12-09 01:52:01 +01:00
|
|
|
})
|
2017-08-09 08:03:12 +02:00
|
|
|
|
|
|
|
it('can recover a BIP32 parent private key from the parent public key, and a derived, non-hardened child private key', function () {
|
|
|
|
function recoverParent (master, child) {
|
|
|
|
assert(!master.keyPair.d, 'You already have the parent private key')
|
|
|
|
assert(child.keyPair.d, 'Missing child private key')
|
|
|
|
|
|
|
|
var curve = secp256k1
|
|
|
|
var QP = master.keyPair.Q
|
|
|
|
var serQP = master.keyPair.getPublicKeyBuffer()
|
|
|
|
|
|
|
|
var d1 = child.keyPair.d
|
|
|
|
var d2
|
|
|
|
var data = Buffer.alloc(37)
|
|
|
|
serQP.copy(data, 0)
|
|
|
|
|
|
|
|
// search index space until we find it
|
|
|
|
for (var i = 0; i < bitcoin.HDNode.HIGHEST_BIT; ++i) {
|
|
|
|
data.writeUInt32BE(i, 33)
|
|
|
|
|
|
|
|
// calculate I
|
|
|
|
var I = crypto.createHmac('sha512', master.chainCode).update(data).digest()
|
|
|
|
var IL = I.slice(0, 32)
|
|
|
|
var pIL = bigi.fromBuffer(IL)
|
|
|
|
|
|
|
|
// See hdnode.js:273 to understand
|
|
|
|
d2 = d1.subtract(pIL).mod(curve.n)
|
|
|
|
|
|
|
|
var Qp = new bitcoin.ECPair(d2).Q
|
|
|
|
if (Qp.equals(QP)) break
|
|
|
|
}
|
|
|
|
|
|
|
|
var node = new bitcoin.HDNode(new bitcoin.ECPair(d2), master.chainCode, master.network)
|
|
|
|
node.depth = master.depth
|
|
|
|
node.index = master.index
|
|
|
|
node.masterFingerprint = master.masterFingerprint
|
|
|
|
return node
|
|
|
|
}
|
|
|
|
|
|
|
|
var seed = crypto.randomBytes(32)
|
|
|
|
var master = bitcoin.HDNode.fromSeedBuffer(seed)
|
|
|
|
var child = master.derive(6) // m/6
|
|
|
|
|
|
|
|
// now for the recovery
|
|
|
|
var neuteredMaster = master.neutered()
|
|
|
|
var recovered = recoverParent(neuteredMaster, child)
|
|
|
|
assert.strictEqual(recovered.toBase58(), master.toBase58())
|
|
|
|
})
|
2014-12-05 05:07:30 +01:00
|
|
|
})
|