2015-02-23 00:36:57 +01:00
|
|
|
/* global describe, it */
|
|
|
|
|
2014-12-05 05:07:30 +01:00
|
|
|
var assert = require('assert')
|
2014-12-09 01:52:01 +01:00
|
|
|
var async = require('async')
|
2014-12-05 05:07:30 +01:00
|
|
|
var bigi = require('bigi')
|
|
|
|
var bitcoin = require('../../')
|
2015-05-30 12:58:07 +02:00
|
|
|
var blockchain = new (require('cb-blockr'))('bitcoin')
|
2014-12-05 05:07:30 +01:00
|
|
|
var crypto = require('crypto')
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
describe('bitcoinjs-lib (crypto)', function () {
|
|
|
|
it('can generate a single-key stealth address', function () {
|
2015-03-02 06:48:36 +01:00
|
|
|
var receiver = bitcoin.ECPair.fromWIF('5KYZdUEo39z3FPrtuX2QbbwGnNP5zTd7yyr2SC1j299sBCnWjss')
|
2014-12-05 05:09:24 +01:00
|
|
|
|
|
|
|
// XXX: ephemeral, must be random (and secret to sender) to preserve privacy
|
2015-03-02 06:48:36 +01:00
|
|
|
var sender = bitcoin.ECPair.fromWIF('Kxr9tQED9H44gCmp6HAdmemAzU3n84H3dGkuWTKvE23JgHMW8gct')
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var G = bitcoin.ECPair.curve.G
|
2014-12-05 05:09:24 +01:00
|
|
|
var d = receiver.d // secret (receiver only)
|
2015-03-02 06:48:36 +01:00
|
|
|
var Q = receiver.Q // shared
|
2014-12-05 05:09:24 +01:00
|
|
|
|
|
|
|
var e = sender.d // secret (sender only)
|
2015-03-02 06:48:36 +01:00
|
|
|
var P = sender.Q // shared
|
2014-12-05 05:09:24 +01:00
|
|
|
|
|
|
|
// derived shared secret
|
|
|
|
var eQ = Q.multiply(e) // sender
|
|
|
|
var dP = P.multiply(d) // receiver
|
|
|
|
assert.deepEqual(eQ.getEncoded(), dP.getEncoded())
|
|
|
|
|
|
|
|
var c = bigi.fromBuffer(bitcoin.crypto.sha256(eQ.getEncoded()))
|
|
|
|
var cG = G.multiply(c)
|
|
|
|
|
|
|
|
// derived public key
|
|
|
|
var QprimeS = Q.add(cG)
|
|
|
|
var QprimeR = G.multiply(d.add(c))
|
|
|
|
assert.deepEqual(QprimeR.getEncoded(), QprimeS.getEncoded())
|
|
|
|
|
|
|
|
// derived shared-secret address
|
2015-03-02 06:48:36 +01:00
|
|
|
var address = new bitcoin.ECPair(null, QprimeS).getAddress().toString()
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(address, '1EwCNJNZM5q58YPPTnjR1H5BvYRNeyZi47')
|
2014-12-05 05:09:24 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
// TODO
|
2015-02-23 00:36:57 +01:00
|
|
|
it.skip('can generate a dual-key stealth address', function () {})
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
it("can recover a parent private key from the parent's public key and a derived non-hardened child private key", function () {
|
|
|
|
function recoverParent (master, child) {
|
2015-03-02 06:48:36 +01:00
|
|
|
assert(!master.keyPair.d, 'You already have the parent private key')
|
|
|
|
assert(child.keyPair.d, 'Missing child private key')
|
2014-12-05 05:07:30 +01:00
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var curve = bitcoin.ECPair.curve
|
|
|
|
var QP = master.keyPair.Q
|
|
|
|
var serQP = master.keyPair.getPublicKeyBuffer()
|
|
|
|
|
|
|
|
var d1 = child.keyPair.d
|
2014-12-05 05:07:30 +01:00
|
|
|
var d2
|
|
|
|
var indexBuffer = new Buffer(4)
|
|
|
|
|
|
|
|
// search index space until we find it
|
|
|
|
for (var i = 0; i < bitcoin.HDNode.HIGHEST_BIT; ++i) {
|
|
|
|
indexBuffer.writeUInt32BE(i, 0)
|
|
|
|
|
|
|
|
// calculate I
|
2015-03-02 06:48:36 +01:00
|
|
|
var data = Buffer.concat([serQP, indexBuffer])
|
2014-12-05 05:07:30 +01:00
|
|
|
var I = crypto.createHmac('sha512', master.chainCode).update(data).digest()
|
|
|
|
var IL = I.slice(0, 32)
|
|
|
|
var pIL = bigi.fromBuffer(IL)
|
|
|
|
|
|
|
|
// See hdnode.js:273 to understand
|
|
|
|
d2 = d1.subtract(pIL).mod(curve.n)
|
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var Qp = new bitcoin.ECPair(d2).Q
|
|
|
|
if (Qp.equals(QP)) break
|
2014-12-05 05:07:30 +01:00
|
|
|
}
|
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var node = new bitcoin.HDNode(new bitcoin.ECPair(d2), master.chainCode, master.network)
|
2014-12-05 05:07:30 +01:00
|
|
|
node.depth = master.depth
|
|
|
|
node.index = master.index
|
|
|
|
node.masterFingerprint = master.masterFingerprint
|
|
|
|
return node
|
|
|
|
}
|
|
|
|
|
|
|
|
var seed = crypto.randomBytes(32)
|
|
|
|
var master = bitcoin.HDNode.fromSeedBuffer(seed)
|
|
|
|
var child = master.derive(6) // m/6
|
|
|
|
|
|
|
|
// now for the recovery
|
|
|
|
var neuteredMaster = master.neutered()
|
|
|
|
var recovered = recoverParent(neuteredMaster, child)
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(recovered.toBase58(), master.toBase58())
|
2014-12-05 05:07:30 +01:00
|
|
|
})
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
it('can recover a private key from duplicate R values', function () {
|
2014-12-09 01:52:01 +01:00
|
|
|
var inputs = [
|
|
|
|
{
|
2015-02-23 00:36:57 +01:00
|
|
|
txId: 'f4c16475f2a6e9c602e4a287f9db3040e319eb9ece74761a4b84bc820fbeef50',
|
2014-12-09 01:52:01 +01:00
|
|
|
vout: 0
|
|
|
|
},
|
|
|
|
{
|
2015-02-23 00:36:57 +01:00
|
|
|
txId: 'f4c16475f2a6e9c602e4a287f9db3040e319eb9ece74761a4b84bc820fbeef50',
|
2014-12-09 01:52:01 +01:00
|
|
|
vout: 1
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
var txIds = inputs.map(function (x) {
|
|
|
|
return x.txId
|
|
|
|
})
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
// first retrieve the relevant transactions
|
2015-02-23 00:36:57 +01:00
|
|
|
blockchain.transactions.get(txIds, function (err, results) {
|
2014-12-09 01:52:01 +01:00
|
|
|
assert.ifError(err)
|
|
|
|
|
|
|
|
var transactions = {}
|
2015-02-23 00:36:57 +01:00
|
|
|
results.forEach(function (tx) {
|
2014-12-09 01:52:01 +01:00
|
|
|
transactions[tx.txId] = bitcoin.Transaction.fromHex(tx.txHex)
|
|
|
|
})
|
|
|
|
|
|
|
|
var tasks = []
|
|
|
|
|
|
|
|
// now we need to collect/transform a bit of data from the selected inputs
|
2015-02-23 00:36:57 +01:00
|
|
|
inputs.forEach(function (input) {
|
2014-12-09 01:52:01 +01:00
|
|
|
var transaction = transactions[input.txId]
|
|
|
|
var script = transaction.ins[input.vout].script
|
|
|
|
assert(bitcoin.scripts.isPubKeyHashInput(script), 'Expected pubKeyHash script')
|
|
|
|
|
|
|
|
var prevOutTxId = bitcoin.bufferutils.reverse(transaction.ins[input.vout].hash).toString('hex')
|
|
|
|
var prevVout = transaction.ins[input.vout].index
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
tasks.push(function (callback) {
|
|
|
|
blockchain.transactions.get(prevOutTxId, function (err, result) {
|
2014-12-09 01:52:01 +01:00
|
|
|
if (err) return callback(err)
|
|
|
|
|
|
|
|
var prevOut = bitcoin.Transaction.fromHex(result.txHex)
|
|
|
|
var prevOutScript = prevOut.outs[prevVout].script
|
|
|
|
|
|
|
|
var scriptSignature = bitcoin.ECSignature.parseScriptSignature(script.chunks[0])
|
2015-03-02 06:48:36 +01:00
|
|
|
var publicKey = bitcoin.ECPair.fromPublicKeyBuffer(script.chunks[1])
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
var m = transaction.hashForSignature(input.vout, prevOutScript, scriptSignature.hashType)
|
|
|
|
assert(publicKey.verify(m, scriptSignature.signature), 'Invalid m')
|
|
|
|
|
|
|
|
// store the required information
|
|
|
|
input.signature = scriptSignature.signature
|
|
|
|
input.z = bigi.fromBuffer(m)
|
|
|
|
|
|
|
|
return callback()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
// finally, run the tasks, then on to the math
|
2015-02-23 00:36:57 +01:00
|
|
|
async.parallel(tasks, function (err) {
|
2015-05-20 16:46:36 +02:00
|
|
|
if (err) throw err
|
2015-03-02 06:48:36 +01:00
|
|
|
|
|
|
|
var n = bitcoin.ECPair.curve.n
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
for (var i = 0; i < inputs.length; ++i) {
|
|
|
|
for (var j = i + 1; j < inputs.length; ++j) {
|
|
|
|
var inputA = inputs[i]
|
|
|
|
var inputB = inputs[j]
|
|
|
|
|
|
|
|
// enforce matching r values
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(inputA.signature.r.toString(), inputB.signature.r.toString())
|
2014-12-09 01:52:01 +01:00
|
|
|
var r = inputA.signature.r
|
|
|
|
var rInv = r.modInverse(n)
|
|
|
|
|
|
|
|
var s1 = inputA.signature.s
|
|
|
|
var s2 = inputB.signature.s
|
|
|
|
var z1 = inputA.z
|
|
|
|
var z2 = inputB.z
|
|
|
|
|
|
|
|
var zz = z1.subtract(z2).mod(n)
|
|
|
|
var ss = s1.subtract(s2).mod(n)
|
|
|
|
|
|
|
|
// k = (z1 - z2) / (s1 - s2)
|
|
|
|
// d1 = (s1 * k - z1) / r
|
|
|
|
// d2 = (s2 * k - z2) / r
|
|
|
|
var k = zz.multiply(ss.modInverse(n)).mod(n)
|
2015-02-23 00:36:57 +01:00
|
|
|
var d1 = ((s1.multiply(k).mod(n)).subtract(z1).mod(n)).multiply(rInv).mod(n)
|
|
|
|
var d2 = ((s2.multiply(k).mod(n)).subtract(z2).mod(n)).multiply(rInv).mod(n)
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
// enforce matching private keys
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(d1.toString(), d2.toString())
|
2014-12-09 01:52:01 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
2014-12-05 05:07:30 +01:00
|
|
|
})
|