2014-03-28 18:24:23 +01:00
|
|
|
var assert = require('assert')
|
2014-04-16 20:10:05 +02:00
|
|
|
var crypto = require('../').crypto
|
|
|
|
var ecdsa = require('..').ecdsa
|
2014-04-21 18:19:30 +02:00
|
|
|
var sec = require('..').sec
|
2014-04-17 06:33:35 +02:00
|
|
|
var ecparams = sec("secp256k1")
|
2014-04-16 20:10:05 +02:00
|
|
|
|
2014-05-03 04:04:54 +02:00
|
|
|
var BigInteger = require('bigi')
|
2014-04-16 20:10:05 +02:00
|
|
|
var ECKey = require('..').ECKey
|
|
|
|
var ECPubKey = require('..').ECPubKey
|
|
|
|
var Message = require('..').Message
|
2014-03-28 18:24:23 +01:00
|
|
|
|
2014-04-23 23:45:28 +02:00
|
|
|
var fixtures = require('./fixtures/ecdsa.js')
|
|
|
|
|
2014-03-28 18:24:23 +01:00
|
|
|
describe('ecdsa', function() {
|
2014-04-22 22:18:38 +02:00
|
|
|
describe('deterministicGenerateK', function() {
|
2014-04-23 23:45:28 +02:00
|
|
|
it('matches the test vectors', function() {
|
|
|
|
fixtures.forEach(function(f) {
|
|
|
|
var priv = BigInteger.fromHex(f.privateKey)
|
|
|
|
var h1 = crypto.sha256(f.message)
|
|
|
|
|
|
|
|
var k = ecdsa.deterministicGenerateK(h1, priv)
|
|
|
|
assert.deepEqual(k.toHex(), f.k)
|
|
|
|
})
|
2014-04-22 22:18:38 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2014-03-28 18:24:23 +01:00
|
|
|
describe('recoverPubKey', function() {
|
|
|
|
it('succesfully recovers a public key', function() {
|
|
|
|
var addr = 'mgQK8S6CfSXKjPmnujArSmVxafeJfrZsa3'
|
2014-04-16 20:13:51 +02:00
|
|
|
var signature = new Buffer('H0PG6+PUo96UPTJ/DVj8aBU5it+Nuli4YdsLuTMvfJxoHH9Jb7jYTQXCCOX2jrTChD5S1ic3vCrUQHdmB5/sEQY=', 'base64')
|
2014-03-28 18:24:23 +01:00
|
|
|
var obj = ecdsa.parseSigCompact(signature)
|
2014-03-31 04:08:25 +02:00
|
|
|
var pubKey = new ECPubKey(ecdsa.recoverPubKey(obj.r, obj.s, Message.magicHash('1111'), obj.i))
|
2014-03-28 18:24:23 +01:00
|
|
|
|
2014-04-21 18:11:25 +02:00
|
|
|
assert.equal(pubKey.toHex(), '02e8fcf4d749b35879bc1f3b14b49e67ab7301da3558c5a9b74a54f1e6339c334c')
|
2014-03-28 18:24:23 +01:00
|
|
|
})
|
|
|
|
})
|
2014-04-16 20:10:05 +02:00
|
|
|
|
2014-04-23 23:45:28 +02:00
|
|
|
describe('sign', function() {
|
|
|
|
it('matches the test vectors', function() {
|
|
|
|
fixtures.forEach(function(f) {
|
|
|
|
var priv = ECKey.fromHex(f.privateKey)
|
|
|
|
var hash = crypto.sha256(f.message)
|
|
|
|
var sig = ecdsa.parseSig(priv.sign(hash))
|
2014-04-16 20:10:05 +02:00
|
|
|
|
2014-04-23 23:45:28 +02:00
|
|
|
assert.equal(sig.r.toHex(), f.signature.slice(0, 64))
|
|
|
|
assert.equal(sig.s.toHex(), f.signature.slice(64))
|
|
|
|
})
|
2014-04-16 20:10:05 +02:00
|
|
|
})
|
2014-04-17 06:33:35 +02:00
|
|
|
|
|
|
|
it('should sign with low S value', function() {
|
2014-04-17 11:08:16 +02:00
|
|
|
var priv = ECKey.fromHex('ca48ec9783cf3ad0dfeff1fc254395a2e403cbbc666477b61b45e31d3b8ab458')
|
2014-04-23 23:45:28 +02:00
|
|
|
var hash = crypto.sha256('Vires in numeris')
|
|
|
|
var signature = priv.sign(hash)
|
|
|
|
var psig = ecdsa.parseSig(signature)
|
|
|
|
|
|
|
|
// See BIP62 for more information
|
|
|
|
assert(psig.s.compareTo(ecparams.getN().divide(BigInteger.valueOf(2))) <= 0)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('verifyRaw', function() {
|
|
|
|
it('matches the test vectors', function() {
|
|
|
|
fixtures.forEach(function(f) {
|
|
|
|
var priv = ECKey.fromHex(f.privateKey)
|
2014-04-17 06:33:35 +02:00
|
|
|
|
2014-04-23 23:45:28 +02:00
|
|
|
var r = BigInteger.fromHex(f.signature.slice(0, 64))
|
|
|
|
var s = BigInteger.fromHex(f.signature.slice(64))
|
|
|
|
var e = BigInteger.fromBuffer(crypto.sha256(f.message))
|
2014-04-17 06:33:35 +02:00
|
|
|
|
2014-04-23 23:45:28 +02:00
|
|
|
assert(ecdsa.verifyRaw(e, r, s, priv.pub.Q))
|
|
|
|
})
|
2014-04-17 06:33:35 +02:00
|
|
|
})
|
2014-04-16 20:10:05 +02:00
|
|
|
})
|
2014-03-28 18:24:23 +01:00
|
|
|
})
|