2015-02-23 00:36:57 +01:00
|
|
|
/* global describe, it */
|
|
|
|
|
2014-12-05 05:07:30 +01:00
|
|
|
var assert = require('assert')
|
2014-12-09 01:52:01 +01:00
|
|
|
var async = require('async')
|
2014-12-05 05:07:30 +01:00
|
|
|
var bigi = require('bigi')
|
|
|
|
var bitcoin = require('../../')
|
2015-08-07 06:47:07 +02:00
|
|
|
var blockchain = require('./_blockchain')
|
2014-12-05 05:07:30 +01:00
|
|
|
var crypto = require('crypto')
|
|
|
|
|
2015-08-19 07:12:55 +02:00
|
|
|
var ecurve = require('ecurve')
|
|
|
|
var secp256k1 = ecurve.getCurveByName('secp256k1')
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
describe('bitcoinjs-lib (crypto)', function () {
|
|
|
|
it('can generate a single-key stealth address', function () {
|
2015-08-19 07:12:55 +02:00
|
|
|
var G = secp256k1.G
|
|
|
|
var n = secp256k1.n
|
2015-08-18 07:39:43 +02:00
|
|
|
|
2015-08-18 08:12:54 +02:00
|
|
|
function stealthSend (Q) {
|
|
|
|
var noncePair = bitcoin.ECPair.makeRandom()
|
2015-08-18 07:39:43 +02:00
|
|
|
var e = noncePair.d
|
2015-08-19 07:00:06 +02:00
|
|
|
var eQ = Q.multiply(e) // shared secret
|
2015-08-18 07:39:43 +02:00
|
|
|
var c = bigi.fromBuffer(bitcoin.crypto.sha256(eQ.getEncoded()))
|
|
|
|
var cG = G.multiply(c)
|
|
|
|
var Qprime = Q.add(cG)
|
|
|
|
|
|
|
|
return {
|
2015-08-25 05:59:19 +02:00
|
|
|
shared: new bitcoin.ECPair(null, Qprime),
|
2016-07-22 05:34:23 +02:00
|
|
|
nonce: noncePair.Q
|
2015-08-18 07:39:43 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function stealthReceive (d, P) {
|
2015-08-19 07:00:06 +02:00
|
|
|
var dP = P.multiply(d) // shared secret
|
2015-08-18 07:39:43 +02:00
|
|
|
var c = bigi.fromBuffer(bitcoin.crypto.sha256(dP.getEncoded()))
|
2016-07-22 05:31:34 +02:00
|
|
|
return new bitcoin.ECPair(d.add(c).mod(n))
|
2015-08-18 07:39:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// receiver private key
|
|
|
|
var receiver = bitcoin.ECPair.fromWIF('5KYZdUEo39z3FPrtuX2QbbwGnNP5zTd7yyr2SC1j299sBCnWjss')
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-08-18 08:12:54 +02:00
|
|
|
var stealthS = stealthSend(receiver.Q) // public, done by sender
|
2015-08-25 05:59:19 +02:00
|
|
|
// ... sender now reveals nonce to receiver
|
2015-08-18 08:12:54 +02:00
|
|
|
|
2016-07-22 05:34:23 +02:00
|
|
|
var stealthR = stealthReceive(receiver.d, stealthS.nonce) // private, done by receiver
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-08-18 07:39:43 +02:00
|
|
|
// and check that we derived both sides correctly
|
2015-08-25 05:59:19 +02:00
|
|
|
assert.equal(stealthS.shared.getAddress(), stealthR.getAddress())
|
2014-12-05 05:09:24 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
// TODO
|
2015-02-23 00:36:57 +01:00
|
|
|
it.skip('can generate a dual-key stealth address', function () {})
|
2014-12-05 05:09:24 +01:00
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
it("can recover a parent private key from the parent's public key and a derived non-hardened child private key", function () {
|
|
|
|
function recoverParent (master, child) {
|
2015-03-02 06:48:36 +01:00
|
|
|
assert(!master.keyPair.d, 'You already have the parent private key')
|
|
|
|
assert(child.keyPair.d, 'Missing child private key')
|
2014-12-05 05:07:30 +01:00
|
|
|
|
2015-08-19 07:12:55 +02:00
|
|
|
var curve = secp256k1
|
2015-03-02 06:48:36 +01:00
|
|
|
var QP = master.keyPair.Q
|
|
|
|
var serQP = master.keyPair.getPublicKeyBuffer()
|
|
|
|
|
|
|
|
var d1 = child.keyPair.d
|
2014-12-05 05:07:30 +01:00
|
|
|
var d2
|
2015-08-20 10:24:40 +02:00
|
|
|
var data = new Buffer(37)
|
|
|
|
serQP.copy(data, 0)
|
2014-12-05 05:07:30 +01:00
|
|
|
|
|
|
|
// search index space until we find it
|
2015-09-09 04:25:50 +02:00
|
|
|
for (var i = 0; i < bitcoin.HDNode.HIGHEST_BIT; ++i) {
|
2015-08-20 10:24:40 +02:00
|
|
|
data.writeUInt32BE(i, 33)
|
2014-12-05 05:07:30 +01:00
|
|
|
|
|
|
|
// calculate I
|
|
|
|
var I = crypto.createHmac('sha512', master.chainCode).update(data).digest()
|
|
|
|
var IL = I.slice(0, 32)
|
|
|
|
var pIL = bigi.fromBuffer(IL)
|
|
|
|
|
|
|
|
// See hdnode.js:273 to understand
|
|
|
|
d2 = d1.subtract(pIL).mod(curve.n)
|
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var Qp = new bitcoin.ECPair(d2).Q
|
|
|
|
if (Qp.equals(QP)) break
|
2014-12-05 05:07:30 +01:00
|
|
|
}
|
|
|
|
|
2015-03-02 06:48:36 +01:00
|
|
|
var node = new bitcoin.HDNode(new bitcoin.ECPair(d2), master.chainCode, master.network)
|
2014-12-05 05:07:30 +01:00
|
|
|
node.depth = master.depth
|
|
|
|
node.index = master.index
|
|
|
|
node.masterFingerprint = master.masterFingerprint
|
|
|
|
return node
|
|
|
|
}
|
|
|
|
|
|
|
|
var seed = crypto.randomBytes(32)
|
|
|
|
var master = bitcoin.HDNode.fromSeedBuffer(seed)
|
|
|
|
var child = master.derive(6) // m/6
|
|
|
|
|
|
|
|
// now for the recovery
|
|
|
|
var neuteredMaster = master.neutered()
|
|
|
|
var recovered = recoverParent(neuteredMaster, child)
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(recovered.toBase58(), master.toBase58())
|
2014-12-05 05:07:30 +01:00
|
|
|
})
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2015-08-07 12:52:07 +02:00
|
|
|
it('can recover a private key from duplicate R values', function (done) {
|
2015-08-07 06:47:07 +02:00
|
|
|
this.timeout(10000)
|
|
|
|
|
2014-12-09 01:52:01 +01:00
|
|
|
var inputs = [
|
|
|
|
{
|
2015-02-23 00:36:57 +01:00
|
|
|
txId: 'f4c16475f2a6e9c602e4a287f9db3040e319eb9ece74761a4b84bc820fbeef50',
|
2014-12-09 01:52:01 +01:00
|
|
|
vout: 0
|
|
|
|
},
|
|
|
|
{
|
2015-02-23 00:36:57 +01:00
|
|
|
txId: 'f4c16475f2a6e9c602e4a287f9db3040e319eb9ece74761a4b84bc820fbeef50',
|
2014-12-09 01:52:01 +01:00
|
|
|
vout: 1
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|
2015-08-07 12:52:07 +02:00
|
|
|
var txIds = inputs.map(function (x) { return x.txId })
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
// first retrieve the relevant transactions
|
2015-08-07 06:47:07 +02:00
|
|
|
blockchain.m.transactions.get(txIds, function (err, results) {
|
2014-12-09 01:52:01 +01:00
|
|
|
assert.ifError(err)
|
|
|
|
|
|
|
|
var transactions = {}
|
2015-02-23 00:36:57 +01:00
|
|
|
results.forEach(function (tx) {
|
2014-12-09 01:52:01 +01:00
|
|
|
transactions[tx.txId] = bitcoin.Transaction.fromHex(tx.txHex)
|
|
|
|
})
|
|
|
|
|
|
|
|
var tasks = []
|
|
|
|
|
|
|
|
// now we need to collect/transform a bit of data from the selected inputs
|
2015-02-23 00:36:57 +01:00
|
|
|
inputs.forEach(function (input) {
|
2014-12-09 01:52:01 +01:00
|
|
|
var transaction = transactions[input.txId]
|
|
|
|
var script = transaction.ins[input.vout].script
|
2015-08-20 05:31:29 +02:00
|
|
|
var scriptChunks = bitcoin.script.decompile(script)
|
2015-08-14 03:32:35 +02:00
|
|
|
|
2015-08-20 05:31:29 +02:00
|
|
|
assert(bitcoin.script.isPubKeyHashInput(scriptChunks), 'Expected pubKeyHash script')
|
2014-12-09 01:52:01 +01:00
|
|
|
|
2015-09-27 15:36:31 +02:00
|
|
|
var prevOutTxId = [].reverse.call(new Buffer(transaction.ins[input.vout].hash)).toString('hex')
|
2014-12-09 01:52:01 +01:00
|
|
|
var prevVout = transaction.ins[input.vout].index
|
|
|
|
|
2015-02-23 00:36:57 +01:00
|
|
|
tasks.push(function (callback) {
|
2015-08-07 06:47:07 +02:00
|
|
|
blockchain.m.transactions.get(prevOutTxId, function (err, result) {
|
2014-12-09 01:52:01 +01:00
|
|
|
if (err) return callback(err)
|
|
|
|
|
|
|
|
var prevOut = bitcoin.Transaction.fromHex(result.txHex)
|
|
|
|
var prevOutScript = prevOut.outs[prevVout].script
|
|
|
|
|
2015-08-14 03:32:35 +02:00
|
|
|
var scriptSignature = bitcoin.ECSignature.parseScriptSignature(scriptChunks[0])
|
|
|
|
var publicKey = bitcoin.ECPair.fromPublicKeyBuffer(scriptChunks[1])
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
var m = transaction.hashForSignature(input.vout, prevOutScript, scriptSignature.hashType)
|
|
|
|
assert(publicKey.verify(m, scriptSignature.signature), 'Invalid m')
|
|
|
|
|
|
|
|
// store the required information
|
|
|
|
input.signature = scriptSignature.signature
|
|
|
|
input.z = bigi.fromBuffer(m)
|
|
|
|
|
|
|
|
return callback()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
// finally, run the tasks, then on to the math
|
2015-02-23 00:36:57 +01:00
|
|
|
async.parallel(tasks, function (err) {
|
2015-05-20 16:46:36 +02:00
|
|
|
if (err) throw err
|
2015-03-02 06:48:36 +01:00
|
|
|
|
2015-08-19 07:12:55 +02:00
|
|
|
var n = secp256k1.n
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
for (var i = 0; i < inputs.length; ++i) {
|
|
|
|
for (var j = i + 1; j < inputs.length; ++j) {
|
|
|
|
var inputA = inputs[i]
|
|
|
|
var inputB = inputs[j]
|
|
|
|
|
|
|
|
// enforce matching r values
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(inputA.signature.r.toString(), inputB.signature.r.toString())
|
2014-12-09 01:52:01 +01:00
|
|
|
var r = inputA.signature.r
|
|
|
|
var rInv = r.modInverse(n)
|
|
|
|
|
|
|
|
var s1 = inputA.signature.s
|
|
|
|
var s2 = inputB.signature.s
|
|
|
|
var z1 = inputA.z
|
|
|
|
var z2 = inputB.z
|
|
|
|
|
|
|
|
var zz = z1.subtract(z2).mod(n)
|
|
|
|
var ss = s1.subtract(s2).mod(n)
|
|
|
|
|
|
|
|
// k = (z1 - z2) / (s1 - s2)
|
|
|
|
// d1 = (s1 * k - z1) / r
|
|
|
|
// d2 = (s2 * k - z2) / r
|
|
|
|
var k = zz.multiply(ss.modInverse(n)).mod(n)
|
2015-02-23 00:36:57 +01:00
|
|
|
var d1 = ((s1.multiply(k).mod(n)).subtract(z1).mod(n)).multiply(rInv).mod(n)
|
|
|
|
var d2 = ((s2.multiply(k).mod(n)).subtract(z2).mod(n)).multiply(rInv).mod(n)
|
2014-12-09 01:52:01 +01:00
|
|
|
|
|
|
|
// enforce matching private keys
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(d1.toString(), d2.toString())
|
2014-12-09 01:52:01 +01:00
|
|
|
}
|
|
|
|
}
|
2015-08-07 12:52:07 +02:00
|
|
|
|
|
|
|
done()
|
2014-12-09 01:52:01 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
2014-12-05 05:07:30 +01:00
|
|
|
})
|