Ryan X. Charles
11 years ago
11 changed files with 517 additions and 0 deletions
@ -0,0 +1,42 @@ |
|||
var imports = require('soop').imports(); |
|||
var coinUtil = imports.coinUtil || require('../util'); |
|||
var cryptox = imports.cryptox || require('./cryptox'); |
|||
var crypto = require('crypto'); |
|||
var BIP39 = {}; |
|||
|
|||
BIP39.mnemonic = function(wordlist, bits) { |
|||
if (!bits) |
|||
bits = 128; |
|||
if (bits % 32 != 0) |
|||
throw new Error("bits must be multiple of 32"); |
|||
var bytes = crypto.randomBytes(bits / 8); |
|||
return BIP39.to_mnemonic(wordlist, bytes); |
|||
} |
|||
|
|||
BIP39.to_mnemonic = function(wordlist, bytes) { |
|||
var hash = coinUtil.sha256(new Buffer(bytes)); |
|||
var bin = ""; |
|||
var bits = bytes.length * 8; |
|||
for (var i = 0 ; i < bytes.length ; i++) { |
|||
bin = bin + ("00000000" + bytes[i].toString(2)).slice(-8); |
|||
} |
|||
var hashbits = hash[0].toString(2); |
|||
hashbits = ("00000000" + hashbits).slice(-8).slice(0, bits/32); |
|||
bin = bin + hashbits; |
|||
if (bin.length % 11 != 0) |
|||
throw new Error("interal error - entropy not an even multiple of 11 bits - " + bin.length); |
|||
var mnemonic = ""; |
|||
for (var i = 0 ; i < bin.length / 11 ; i++) { |
|||
if (mnemonic != "") |
|||
mnemonic = mnemonic + " "; |
|||
var wi = parseInt(bin.slice(i*11, (i+1)*11), 2); |
|||
mnemonic = mnemonic + wordlist[wi]; |
|||
} |
|||
return mnemonic; |
|||
} |
|||
|
|||
BIP39.mnemonic_to_seed = function(mnemonic, passphrase) { |
|||
return cryptox.pbkdf2Sync_sha512(mnemonic, "mnemonic" + passphrase, 2048, 64); |
|||
} |
|||
|
|||
module.exports = require('soop')(BIP39); |
File diff suppressed because one or more lines are too long
@ -0,0 +1,17 @@ |
|||
// Crypto extensions
|
|||
//
|
|||
// PBKDF2 with SHA512 - browser version
|
|||
|
|||
var sjcl = require('../sjcl'); |
|||
|
|||
var hmacSHA512 = function (key) { |
|||
var hasher = new sjcl.misc.hmac( key, sjcl.hash.sha512 ); |
|||
this.encrypt = function () { |
|||
return hasher.encrypt.apply( hasher, arguments ); |
|||
}; |
|||
}; |
|||
|
|||
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) { |
|||
var derivedKey = sjcl.misc.pbkdf2( password, salt, iterations, 512, hmacSHA512 ); |
|||
return sjcl.codec.hex.fromBits( derivedKey ) |
|||
}; |
@ -0,0 +1,5 @@ |
|||
if (process.versions) { |
|||
module.exports = require('./node/cryptox'); |
|||
return; |
|||
} |
|||
module.exports = require('./browser/cryptox'); |
@ -0,0 +1,49 @@ |
|||
// Crypto extensions
|
|||
//
|
|||
// PBKDF2 with SHA512
|
|||
|
|||
var binding = require('bindings')('cryptox'); |
|||
|
|||
exports.pbkdf2_sha512 = function(password, salt, iterations, keylen, callback) { |
|||
if (typeof callback !== 'function') |
|||
throw new Error('No callback provided to pbkdf2'); |
|||
|
|||
return pbkdf2_sha512(password, salt, iterations, keylen, callback); |
|||
}; |
|||
|
|||
|
|||
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) { |
|||
return pbkdf2_sha512(password, salt, iterations, keylen); |
|||
}; |
|||
|
|||
function toBuf(str, encoding) { |
|||
encoding = encoding || 'binary'; |
|||
if (typeof str === 'string') { |
|||
if (encoding === 'buffer') |
|||
encoding = 'binary'; |
|||
str = new Buffer(str, encoding); |
|||
} |
|||
return str; |
|||
} |
|||
|
|||
function pbkdf2_sha512(password, salt, iterations, keylen, callback) { |
|||
password = toBuf(password); |
|||
salt = toBuf(salt); |
|||
|
|||
if (exports.DEFAULT_ENCODING === 'buffer') |
|||
return binding.PBKDF2(password, salt, iterations, keylen, callback); |
|||
|
|||
// at this point, we need to handle encodings.
|
|||
var encoding = exports.DEFAULT_ENCODING; |
|||
if (callback) { |
|||
binding.PBKDF2_sha512(password, salt, iterations, keylen, function(er, ret) { |
|||
if (ret) |
|||
ret = ret.toString(encoding); |
|||
callback(er, ret); |
|||
}); |
|||
} else { |
|||
var ret = binding.PBKDF2_sha512(password, salt, iterations, keylen); |
|||
//return ret.toString(encoding);
|
|||
return ret; |
|||
} |
|||
} |
@ -0,0 +1,228 @@ |
|||
// Copyright Joyent, Inc. and other Node contributors.
|
|||
//
|
|||
// Permission is hereby granted, free of charge, to any person obtaining a
|
|||
// copy of this software and associated documentation files (the
|
|||
// "Software"), to deal in the Software without restriction, including
|
|||
// without limitation the rights to use, copy, modify, merge, publish,
|
|||
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|||
// persons to whom the Software is furnished to do so, subject to the
|
|||
// following conditions:
|
|||
//
|
|||
// The above copyright notice and this permission notice shall be included
|
|||
// in all copies or substantial portions of the Software.
|
|||
//
|
|||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|||
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|||
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|||
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|||
|
|||
#include "node_crypto.h" |
|||
#include "node_crypto_groups.h" |
|||
#include "v8.h" |
|||
|
|||
#include "node_internals.h" |
|||
#include "node.h" |
|||
#include "node_buffer.h" |
|||
#include "string_bytes.h" |
|||
|
|||
#include <string.h> |
|||
#ifdef _MSC_VER |
|||
#define strcasecmp _stricmp |
|||
#endif |
|||
|
|||
#include <stdlib.h> |
|||
#include <errno.h> |
|||
|
|||
#if OPENSSL_VERSION_NUMBER >= 0x10000000L |
|||
# define OPENSSL_CONST const |
|||
#else |
|||
# define OPENSSL_CONST |
|||
#endif |
|||
|
|||
#define ASSERT_IS_STRING_OR_BUFFER(val) \ |
|||
if (!Buffer::HasInstance(val) && !val->IsString()) { \ |
|||
return ThrowException(Exception::TypeError(String::New( \ |
|||
"Not a string or buffer"))); \ |
|||
} |
|||
|
|||
#define ASSERT_IS_BUFFER(val) \ |
|||
if (!Buffer::HasInstance(val)) { \ |
|||
return ThrowException(Exception::TypeError(String::New("Not a buffer"))); \ |
|||
} |
|||
|
|||
namespace node { |
|||
namespace cryptox { |
|||
|
|||
using namespace v8; |
|||
|
|||
struct pbkdf2_req { |
|||
uv_work_t work_req; |
|||
int err; |
|||
char* pass; |
|||
size_t passlen; |
|||
char* salt; |
|||
size_t saltlen; |
|||
size_t iter; |
|||
char* key; |
|||
size_t keylen; |
|||
Persistent<Object> obj; |
|||
}; |
|||
|
|||
|
|||
void EIO_PBKDF2_SHA512(pbkdf2_req* req) { |
|||
req->err = PKCS5_PBKDF2_HMAC( |
|||
req->pass, |
|||
req->passlen, |
|||
(unsigned char*)req->salt, |
|||
req->saltlen, |
|||
req->iter, |
|||
EVP_sha512(), |
|||
req->keylen, |
|||
(unsigned char*)req->key); |
|||
memset(req->pass, 0, req->passlen); |
|||
memset(req->salt, 0, req->saltlen); |
|||
} |
|||
|
|||
|
|||
void EIO_PBKDF2_SHA512(uv_work_t* work_req) { |
|||
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req); |
|||
EIO_PBKDF2_SHA512(req); |
|||
} |
|||
|
|||
|
|||
void EIO_PBKDF2After_SHA512(pbkdf2_req* req, Local<Value> argv[2]) { |
|||
if (req->err) { |
|||
argv[0] = Local<Value>::New(Undefined()); |
|||
argv[1] = Encode(req->key, req->keylen, BUFFER); |
|||
memset(req->key, 0, req->keylen); |
|||
} else { |
|||
argv[0] = Exception::Error(String::New("PBKDF2 error")); |
|||
argv[1] = Local<Value>::New(Undefined()); |
|||
} |
|||
|
|||
delete[] req->pass; |
|||
delete[] req->salt; |
|||
delete[] req->key; |
|||
delete req; |
|||
} |
|||
|
|||
|
|||
void EIO_PBKDF2After_SHA512(uv_work_t* work_req, int status) { |
|||
assert(status == 0); |
|||
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req); |
|||
HandleScope scope; |
|||
Local<Value> argv[2]; |
|||
Persistent<Object> obj = req->obj; |
|||
EIO_PBKDF2After_SHA512(req, argv); |
|||
MakeCallback(obj, "ondone", ARRAY_SIZE(argv), argv); |
|||
obj.Dispose(); |
|||
} |
|||
|
|||
|
|||
Handle<Value> PBKDF2_SHA512(const Arguments& args) { |
|||
HandleScope scope; |
|||
|
|||
const char* type_error = NULL; |
|||
char* pass = NULL; |
|||
char* salt = NULL; |
|||
ssize_t passlen = -1; |
|||
ssize_t saltlen = -1; |
|||
ssize_t keylen = -1; |
|||
ssize_t pass_written = -1; |
|||
ssize_t salt_written = -1; |
|||
ssize_t iter = -1; |
|||
pbkdf2_req* req = NULL; |
|||
|
|||
if (args.Length() != 4 && args.Length() != 5) { |
|||
type_error = "Bad parameter"; |
|||
goto err; |
|||
} |
|||
|
|||
ASSERT_IS_BUFFER(args[0]); |
|||
passlen = Buffer::Length(args[0]); |
|||
if (passlen < 0) { |
|||
type_error = "Bad password"; |
|||
goto err; |
|||
} |
|||
|
|||
pass = new char[passlen]; |
|||
pass_written = DecodeWrite(pass, passlen, args[0], BINARY); |
|||
assert(pass_written == passlen); |
|||
|
|||
ASSERT_IS_BUFFER(args[1]); |
|||
saltlen = Buffer::Length(args[1]); |
|||
if (saltlen < 0) { |
|||
type_error = "Bad salt"; |
|||
goto err; |
|||
} |
|||
|
|||
salt = new char[saltlen]; |
|||
salt_written = DecodeWrite(salt, saltlen, args[1], BINARY); |
|||
assert(salt_written == saltlen); |
|||
|
|||
if (!args[2]->IsNumber()) { |
|||
type_error = "Iterations not a number"; |
|||
goto err; |
|||
} |
|||
|
|||
iter = args[2]->Int32Value(); |
|||
if (iter < 0) { |
|||
type_error = "Bad iterations"; |
|||
goto err; |
|||
} |
|||
|
|||
if (!args[3]->IsNumber()) { |
|||
type_error = "Key length not a number"; |
|||
goto err; |
|||
} |
|||
|
|||
keylen = args[3]->Int32Value(); |
|||
if (keylen < 0) { |
|||
type_error = "Bad key length"; |
|||
goto err; |
|||
} |
|||
|
|||
req = new pbkdf2_req; |
|||
req->err = 0; |
|||
req->pass = pass; |
|||
req->passlen = passlen; |
|||
req->salt = salt; |
|||
req->saltlen = saltlen; |
|||
req->iter = iter; |
|||
req->key = new char[keylen]; |
|||
req->keylen = keylen; |
|||
|
|||
if (args[4]->IsFunction()) { |
|||
req->obj = Persistent<Object>::New(Object::New()); |
|||
req->obj->Set(String::New("ondone"), args[4]); |
|||
uv_queue_work(uv_default_loop(), |
|||
&req->work_req, |
|||
EIO_PBKDF2_SHA512, |
|||
EIO_PBKDF2After_SHA512); |
|||
return Undefined(); |
|||
} else { |
|||
Local<Value> argv[2]; |
|||
EIO_PBKDF2_SHA512(req); |
|||
EIO_PBKDF2After_SHA512(req, argv); |
|||
if (argv[0]->IsObject()) return ThrowException(argv[0]); |
|||
return scope.Close(argv[1]); |
|||
} |
|||
|
|||
err: |
|||
delete[] salt; |
|||
delete[] pass; |
|||
return ThrowException(Exception::TypeError(String::New(type_error))); |
|||
} |
|||
|
|||
void InitCryptox(Handle<Object> target) { |
|||
NODE_SET_METHOD(target, "PBKDF2_sha512", PBKDF2_SHA512); |
|||
} |
|||
|
|||
} |
|||
} |
|||
|
|||
NODE_MODULE(cryptox, node::cryptox::InitCryptox) |
|||
|
@ -0,0 +1,162 @@ |
|||
'use strict'; |
|||
|
|||
var chai = chai || require('chai'); |
|||
var should = chai.should(); |
|||
var bitcore = bitcore || require('../bitcore'); |
|||
var BIP39 = bitcore.BIP39; |
|||
var BIP39WordlistEn = bitcore.BIP39WordlistEn; |
|||
|
|||
describe('BIP39', function() { |
|||
// From python reference code, formatting unchanged
|
|||
var bip39_vectors = { |
|||
"english": [ |
|||
[ |
|||
"00000000000000000000000000000000", |
|||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about", |
|||
"c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04" |
|||
], |
|||
[ |
|||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
|||
"legal winner thank year wave sausage worth useful legal winner thank yellow", |
|||
"2e8905819b8723fe2c1d161860e5ee1830318dbf49a83bd451cfb8440c28bd6fa457fe1296106559a3c80937a1c1069be3a3a5bd381ee6260e8d9739fce1f607" |
|||
], |
|||
[ |
|||
"80808080808080808080808080808080", |
|||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage above", |
|||
"d71de856f81a8acc65e6fc851a38d4d7ec216fd0796d0a6827a3ad6ed5511a30fa280f12eb2e47ed2ac03b5c462a0358d18d69fe4f985ec81778c1b370b652a8" |
|||
], |
|||
[ |
|||
"ffffffffffffffffffffffffffffffff", |
|||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong", |
|||
"ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069" |
|||
], |
|||
[ |
|||
"000000000000000000000000000000000000000000000000", |
|||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent", |
|||
"035895f2f481b1b0f01fcf8c289c794660b289981a78f8106447707fdd9666ca06da5a9a565181599b79f53b844d8a71dd9f439c52a3d7b3e8a79c906ac845fa" |
|||
], |
|||
[ |
|||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
|||
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will", |
|||
"f2b94508732bcbacbcc020faefecfc89feafa6649a5491b8c952cede496c214a0c7b3c392d168748f2d4a612bada0753b52a1c7ac53c1e93abd5c6320b9e95dd" |
|||
], |
|||
[ |
|||
"808080808080808080808080808080808080808080808080", |
|||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always", |
|||
"107d7c02a5aa6f38c58083ff74f04c607c2d2c0ecc55501dadd72d025b751bc27fe913ffb796f841c49b1d33b610cf0e91d3aa239027f5e99fe4ce9e5088cd65" |
|||
], |
|||
[ |
|||
"ffffffffffffffffffffffffffffffffffffffffffffffff", |
|||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when", |
|||
"0cd6e5d827bb62eb8fc1e262254223817fd068a74b5b449cc2f667c3f1f985a76379b43348d952e2265b4cd129090758b3e3c2c49103b5051aac2eaeb890a528" |
|||
], |
|||
[ |
|||
"0000000000000000000000000000000000000000000000000000000000000000", |
|||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art", |
|||
"bda85446c68413707090a52022edd26a1c9462295029f2e60cd7c4f2bbd3097170af7a4d73245cafa9c3cca8d561a7c3de6f5d4a10be8ed2a5e608d68f92fcc8" |
|||
], |
|||
[ |
|||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
|||
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title", |
|||
"bc09fca1804f7e69da93c2f2028eb238c227f2e9dda30cd63699232578480a4021b146ad717fbb7e451ce9eb835f43620bf5c514db0f8add49f5d121449d3e87" |
|||
], |
|||
[ |
|||
"8080808080808080808080808080808080808080808080808080808080808080", |
|||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless", |
|||
"c0c519bd0e91a2ed54357d9d1ebef6f5af218a153624cf4f2da911a0ed8f7a09e2ef61af0aca007096df430022f7a2b6fb91661a9589097069720d015e4e982f" |
|||
], |
|||
[ |
|||
"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", |
|||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote", |
|||
"dd48c104698c30cfe2b6142103248622fb7bb0ff692eebb00089b32d22484e1613912f0a5b694407be899ffd31ed3992c456cdf60f5d4564b8ba3f05a69890ad" |
|||
], |
|||
[ |
|||
"77c2b00716cec7213839159e404db50d", |
|||
"jelly better achieve collect unaware mountain thought cargo oxygen act hood bridge", |
|||
"b5b6d0127db1a9d2226af0c3346031d77af31e918dba64287a1b44b8ebf63cdd52676f672a290aae502472cf2d602c051f3e6f18055e84e4c43897fc4e51a6ff" |
|||
], |
|||
[ |
|||
"b63a9c59a6e641f288ebc103017f1da9f8290b3da6bdef7b", |
|||
"renew stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap", |
|||
"9248d83e06f4cd98debf5b6f010542760df925ce46cf38a1bdb4e4de7d21f5c39366941c69e1bdbf2966e0f6e6dbece898a0e2f0a4c2b3e640953dfe8b7bbdc5" |
|||
], |
|||
[ |
|||
"3e141609b97933b66a060dcddc71fad1d91677db872031e85f4c015c5e7e8982", |
|||
"dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic", |
|||
"ff7f3184df8696d8bef94b6c03114dbee0ef89ff938712301d27ed8336ca89ef9635da20af07d4175f2bf5f3de130f39c9d9e8dd0472489c19b1a020a940da67" |
|||
], |
|||
[ |
|||
"0460ef47585604c5660618db2e6a7e7f", |
|||
"afford alter spike radar gate glance object seek swamp infant panel yellow", |
|||
"65f93a9f36b6c85cbe634ffc1f99f2b82cbb10b31edc7f087b4f6cb9e976e9faf76ff41f8f27c99afdf38f7a303ba1136ee48a4c1e7fcd3dba7aa876113a36e4" |
|||
], |
|||
[ |
|||
"72f60ebac5dd8add8d2a25a797102c3ce21bc029c200076f", |
|||
"indicate race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left", |
|||
"3bbf9daa0dfad8229786ace5ddb4e00fa98a044ae4c4975ffd5e094dba9e0bb289349dbe2091761f30f382d4e35c4a670ee8ab50758d2c55881be69e327117ba" |
|||
], |
|||
[ |
|||
"2c85efc7f24ee4573d2b81a6ec66cee209b2dcbd09d8eddc51e0215b0b68e416", |
|||
"clutch control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste", |
|||
"fe908f96f46668b2d5b37d82f558c77ed0d69dd0e7e043a5b0511c48c2f1064694a956f86360c93dd04052a8899497ce9e985ebe0c8c52b955e6ae86d4ff4449" |
|||
], |
|||
[ |
|||
"eaebabb2383351fd31d703840b32e9e2", |
|||
"turtle front uncle idea crush write shrug there lottery flower risk shell", |
|||
"bdfb76a0759f301b0b899a1e3985227e53b3f51e67e3f2a65363caedf3e32fde42a66c404f18d7b05818c95ef3ca1e5146646856c461c073169467511680876c" |
|||
], |
|||
[ |
|||
"7ac45cfe7722ee6c7ba84fbc2d5bd61b45cb2fe5eb65aa78", |
|||
"kiss carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment", |
|||
"ed56ff6c833c07982eb7119a8f48fd363c4a9b1601cd2de736b01045c5eb8ab4f57b079403485d1c4924f0790dc10a971763337cb9f9c62226f64fff26397c79" |
|||
], |
|||
[ |
|||
"4fa1a8bc3e6d80ee1316050e862c1812031493212b7ec3f3bb1b08f168cabeef", |
|||
"exile ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top", |
|||
"095ee6f817b4c2cb30a5a797360a81a40ab0f9a4e25ecd672a3f58a0b5ba0687c096a6b14d2c0deb3bdefce4f61d01ae07417d502429352e27695163f7447a8c" |
|||
], |
|||
[ |
|||
"18ab19a9f54a9274f03e5209a2ac8a91", |
|||
"board flee heavy tunnel powder denial science ski answer betray cargo cat", |
|||
"6eff1bb21562918509c73cb990260db07c0ce34ff0e3cc4a8cb3276129fbcb300bddfe005831350efd633909f476c45c88253276d9fd0df6ef48609e8bb7dca8" |
|||
], |
|||
[ |
|||
"18a2e1d81b8ecfb2a333adcb0c17a5b9eb76cc5d05db91a4", |
|||
"board blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief", |
|||
"f84521c777a13b61564234bf8f8b62b3afce27fc4062b51bb5e62bdfecb23864ee6ecf07c1d5a97c0834307c5c852d8ceb88e7c97923c0a3b496bedd4e5f88a9" |
|||
], |
|||
[ |
|||
"15da872c95a13dd738fbf50e427583ad61f18fd99f628c417a61cf8343c90419", |
|||
"beyond stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut", |
|||
"b15509eaa2d09d3efd3e006ef42151b30367dc6e3aa5e44caba3fe4d3e352e65101fbdb86a96776b91946ff06f8eac594dc6ee1d3e82a42dfe1b40fef6bcc3fd" |
|||
] |
|||
] |
|||
} |
|||
|
|||
it('should initialize the class', function() { |
|||
should.exist(BIP39); |
|||
}); |
|||
|
|||
describe('#BIP39', function() { |
|||
it('should have a wordlist of length 2048', function() { |
|||
BIP39WordlistEn.length.should.equal(2048); |
|||
}); |
|||
it('should generate a mnemonic phrase', function() { |
|||
var phrase = BIP39.mnemonic(BIP39WordlistEn, 128); |
|||
}); |
|||
it('should pass test vectors', function() { |
|||
var vectors = bip39_vectors['english']; |
|||
for (var v = 0 ; v < vectors.length ; v++) { |
|||
var vector = vectors[v]; |
|||
var code = vector[0]; |
|||
var mnemonic = vector[1]; |
|||
var seed = vector[2]; |
|||
var mnemonic1 = BIP39.to_mnemonic(BIP39WordlistEn, new Buffer(code, 'hex')); |
|||
var seed1 = BIP39.mnemonic_to_seed(mnemonic, 'TREZOR'); |
|||
mnemonic1.should.equal(mnemonic); |
|||
seed1.toString('hex').should.equal(seed) |
|||
} |
|||
}); |
|||
}); |
|||
|
|||
}); |
Loading…
Reference in new issue