Ryan X. Charles
11 years ago
11 changed files with 517 additions and 0 deletions
@ -0,0 +1,42 @@ |
|||||
|
var imports = require('soop').imports(); |
||||
|
var coinUtil = imports.coinUtil || require('../util'); |
||||
|
var cryptox = imports.cryptox || require('./cryptox'); |
||||
|
var crypto = require('crypto'); |
||||
|
var BIP39 = {}; |
||||
|
|
||||
|
BIP39.mnemonic = function(wordlist, bits) { |
||||
|
if (!bits) |
||||
|
bits = 128; |
||||
|
if (bits % 32 != 0) |
||||
|
throw new Error("bits must be multiple of 32"); |
||||
|
var bytes = crypto.randomBytes(bits / 8); |
||||
|
return BIP39.to_mnemonic(wordlist, bytes); |
||||
|
} |
||||
|
|
||||
|
BIP39.to_mnemonic = function(wordlist, bytes) { |
||||
|
var hash = coinUtil.sha256(new Buffer(bytes)); |
||||
|
var bin = ""; |
||||
|
var bits = bytes.length * 8; |
||||
|
for (var i = 0 ; i < bytes.length ; i++) { |
||||
|
bin = bin + ("00000000" + bytes[i].toString(2)).slice(-8); |
||||
|
} |
||||
|
var hashbits = hash[0].toString(2); |
||||
|
hashbits = ("00000000" + hashbits).slice(-8).slice(0, bits/32); |
||||
|
bin = bin + hashbits; |
||||
|
if (bin.length % 11 != 0) |
||||
|
throw new Error("interal error - entropy not an even multiple of 11 bits - " + bin.length); |
||||
|
var mnemonic = ""; |
||||
|
for (var i = 0 ; i < bin.length / 11 ; i++) { |
||||
|
if (mnemonic != "") |
||||
|
mnemonic = mnemonic + " "; |
||||
|
var wi = parseInt(bin.slice(i*11, (i+1)*11), 2); |
||||
|
mnemonic = mnemonic + wordlist[wi]; |
||||
|
} |
||||
|
return mnemonic; |
||||
|
} |
||||
|
|
||||
|
BIP39.mnemonic_to_seed = function(mnemonic, passphrase) { |
||||
|
return cryptox.pbkdf2Sync_sha512(mnemonic, "mnemonic" + passphrase, 2048, 64); |
||||
|
} |
||||
|
|
||||
|
module.exports = require('soop')(BIP39); |
File diff suppressed because one or more lines are too long
@ -0,0 +1,17 @@ |
|||||
|
// Crypto extensions
|
||||
|
//
|
||||
|
// PBKDF2 with SHA512 - browser version
|
||||
|
|
||||
|
var sjcl = require('../sjcl'); |
||||
|
|
||||
|
var hmacSHA512 = function (key) { |
||||
|
var hasher = new sjcl.misc.hmac( key, sjcl.hash.sha512 ); |
||||
|
this.encrypt = function () { |
||||
|
return hasher.encrypt.apply( hasher, arguments ); |
||||
|
}; |
||||
|
}; |
||||
|
|
||||
|
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) { |
||||
|
var derivedKey = sjcl.misc.pbkdf2( password, salt, iterations, 512, hmacSHA512 ); |
||||
|
return sjcl.codec.hex.fromBits( derivedKey ) |
||||
|
}; |
@ -0,0 +1,5 @@ |
|||||
|
if (process.versions) { |
||||
|
module.exports = require('./node/cryptox'); |
||||
|
return; |
||||
|
} |
||||
|
module.exports = require('./browser/cryptox'); |
@ -0,0 +1,49 @@ |
|||||
|
// Crypto extensions
|
||||
|
//
|
||||
|
// PBKDF2 with SHA512
|
||||
|
|
||||
|
var binding = require('bindings')('cryptox'); |
||||
|
|
||||
|
exports.pbkdf2_sha512 = function(password, salt, iterations, keylen, callback) { |
||||
|
if (typeof callback !== 'function') |
||||
|
throw new Error('No callback provided to pbkdf2'); |
||||
|
|
||||
|
return pbkdf2_sha512(password, salt, iterations, keylen, callback); |
||||
|
}; |
||||
|
|
||||
|
|
||||
|
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) { |
||||
|
return pbkdf2_sha512(password, salt, iterations, keylen); |
||||
|
}; |
||||
|
|
||||
|
function toBuf(str, encoding) { |
||||
|
encoding = encoding || 'binary'; |
||||
|
if (typeof str === 'string') { |
||||
|
if (encoding === 'buffer') |
||||
|
encoding = 'binary'; |
||||
|
str = new Buffer(str, encoding); |
||||
|
} |
||||
|
return str; |
||||
|
} |
||||
|
|
||||
|
function pbkdf2_sha512(password, salt, iterations, keylen, callback) { |
||||
|
password = toBuf(password); |
||||
|
salt = toBuf(salt); |
||||
|
|
||||
|
if (exports.DEFAULT_ENCODING === 'buffer') |
||||
|
return binding.PBKDF2(password, salt, iterations, keylen, callback); |
||||
|
|
||||
|
// at this point, we need to handle encodings.
|
||||
|
var encoding = exports.DEFAULT_ENCODING; |
||||
|
if (callback) { |
||||
|
binding.PBKDF2_sha512(password, salt, iterations, keylen, function(er, ret) { |
||||
|
if (ret) |
||||
|
ret = ret.toString(encoding); |
||||
|
callback(er, ret); |
||||
|
}); |
||||
|
} else { |
||||
|
var ret = binding.PBKDF2_sha512(password, salt, iterations, keylen); |
||||
|
//return ret.toString(encoding);
|
||||
|
return ret; |
||||
|
} |
||||
|
} |
@ -0,0 +1,228 @@ |
|||||
|
// Copyright Joyent, Inc. and other Node contributors.
|
||||
|
//
|
||||
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
||||
|
// copy of this software and associated documentation files (the
|
||||
|
// "Software"), to deal in the Software without restriction, including
|
||||
|
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
||||
|
// persons to whom the Software is furnished to do so, subject to the
|
||||
|
// following conditions:
|
||||
|
//
|
||||
|
// The above copyright notice and this permission notice shall be included
|
||||
|
// in all copies or substantial portions of the Software.
|
||||
|
//
|
||||
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
||||
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
||||
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
||||
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
||||
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
|
|
||||
|
#include "node_crypto.h" |
||||
|
#include "node_crypto_groups.h" |
||||
|
#include "v8.h" |
||||
|
|
||||
|
#include "node_internals.h" |
||||
|
#include "node.h" |
||||
|
#include "node_buffer.h" |
||||
|
#include "string_bytes.h" |
||||
|
|
||||
|
#include <string.h> |
||||
|
#ifdef _MSC_VER |
||||
|
#define strcasecmp _stricmp |
||||
|
#endif |
||||
|
|
||||
|
#include <stdlib.h> |
||||
|
#include <errno.h> |
||||
|
|
||||
|
#if OPENSSL_VERSION_NUMBER >= 0x10000000L |
||||
|
# define OPENSSL_CONST const |
||||
|
#else |
||||
|
# define OPENSSL_CONST |
||||
|
#endif |
||||
|
|
||||
|
#define ASSERT_IS_STRING_OR_BUFFER(val) \ |
||||
|
if (!Buffer::HasInstance(val) && !val->IsString()) { \ |
||||
|
return ThrowException(Exception::TypeError(String::New( \ |
||||
|
"Not a string or buffer"))); \ |
||||
|
} |
||||
|
|
||||
|
#define ASSERT_IS_BUFFER(val) \ |
||||
|
if (!Buffer::HasInstance(val)) { \ |
||||
|
return ThrowException(Exception::TypeError(String::New("Not a buffer"))); \ |
||||
|
} |
||||
|
|
||||
|
namespace node { |
||||
|
namespace cryptox { |
||||
|
|
||||
|
using namespace v8; |
||||
|
|
||||
|
struct pbkdf2_req { |
||||
|
uv_work_t work_req; |
||||
|
int err; |
||||
|
char* pass; |
||||
|
size_t passlen; |
||||
|
char* salt; |
||||
|
size_t saltlen; |
||||
|
size_t iter; |
||||
|
char* key; |
||||
|
size_t keylen; |
||||
|
Persistent<Object> obj; |
||||
|
}; |
||||
|
|
||||
|
|
||||
|
void EIO_PBKDF2_SHA512(pbkdf2_req* req) { |
||||
|
req->err = PKCS5_PBKDF2_HMAC( |
||||
|
req->pass, |
||||
|
req->passlen, |
||||
|
(unsigned char*)req->salt, |
||||
|
req->saltlen, |
||||
|
req->iter, |
||||
|
EVP_sha512(), |
||||
|
req->keylen, |
||||
|
(unsigned char*)req->key); |
||||
|
memset(req->pass, 0, req->passlen); |
||||
|
memset(req->salt, 0, req->saltlen); |
||||
|
} |
||||
|
|
||||
|
|
||||
|
void EIO_PBKDF2_SHA512(uv_work_t* work_req) { |
||||
|
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req); |
||||
|
EIO_PBKDF2_SHA512(req); |
||||
|
} |
||||
|
|
||||
|
|
||||
|
void EIO_PBKDF2After_SHA512(pbkdf2_req* req, Local<Value> argv[2]) { |
||||
|
if (req->err) { |
||||
|
argv[0] = Local<Value>::New(Undefined()); |
||||
|
argv[1] = Encode(req->key, req->keylen, BUFFER); |
||||
|
memset(req->key, 0, req->keylen); |
||||
|
} else { |
||||
|
argv[0] = Exception::Error(String::New("PBKDF2 error")); |
||||
|
argv[1] = Local<Value>::New(Undefined()); |
||||
|
} |
||||
|
|
||||
|
delete[] req->pass; |
||||
|
delete[] req->salt; |
||||
|
delete[] req->key; |
||||
|
delete req; |
||||
|
} |
||||
|
|
||||
|
|
||||
|
void EIO_PBKDF2After_SHA512(uv_work_t* work_req, int status) { |
||||
|
assert(status == 0); |
||||
|
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req); |
||||
|
HandleScope scope; |
||||
|
Local<Value> argv[2]; |
||||
|
Persistent<Object> obj = req->obj; |
||||
|
EIO_PBKDF2After_SHA512(req, argv); |
||||
|
MakeCallback(obj, "ondone", ARRAY_SIZE(argv), argv); |
||||
|
obj.Dispose(); |
||||
|
} |
||||
|
|
||||
|
|
||||
|
Handle<Value> PBKDF2_SHA512(const Arguments& args) { |
||||
|
HandleScope scope; |
||||
|
|
||||
|
const char* type_error = NULL; |
||||
|
char* pass = NULL; |
||||
|
char* salt = NULL; |
||||
|
ssize_t passlen = -1; |
||||
|
ssize_t saltlen = -1; |
||||
|
ssize_t keylen = -1; |
||||
|
ssize_t pass_written = -1; |
||||
|
ssize_t salt_written = -1; |
||||
|
ssize_t iter = -1; |
||||
|
pbkdf2_req* req = NULL; |
||||
|
|
||||
|
if (args.Length() != 4 && args.Length() != 5) { |
||||
|
type_error = "Bad parameter"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
ASSERT_IS_BUFFER(args[0]); |
||||
|
passlen = Buffer::Length(args[0]); |
||||
|
if (passlen < 0) { |
||||
|
type_error = "Bad password"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
pass = new char[passlen]; |
||||
|
pass_written = DecodeWrite(pass, passlen, args[0], BINARY); |
||||
|
assert(pass_written == passlen); |
||||
|
|
||||
|
ASSERT_IS_BUFFER(args[1]); |
||||
|
saltlen = Buffer::Length(args[1]); |
||||
|
if (saltlen < 0) { |
||||
|
type_error = "Bad salt"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
salt = new char[saltlen]; |
||||
|
salt_written = DecodeWrite(salt, saltlen, args[1], BINARY); |
||||
|
assert(salt_written == saltlen); |
||||
|
|
||||
|
if (!args[2]->IsNumber()) { |
||||
|
type_error = "Iterations not a number"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
iter = args[2]->Int32Value(); |
||||
|
if (iter < 0) { |
||||
|
type_error = "Bad iterations"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
if (!args[3]->IsNumber()) { |
||||
|
type_error = "Key length not a number"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
keylen = args[3]->Int32Value(); |
||||
|
if (keylen < 0) { |
||||
|
type_error = "Bad key length"; |
||||
|
goto err; |
||||
|
} |
||||
|
|
||||
|
req = new pbkdf2_req; |
||||
|
req->err = 0; |
||||
|
req->pass = pass; |
||||
|
req->passlen = passlen; |
||||
|
req->salt = salt; |
||||
|
req->saltlen = saltlen; |
||||
|
req->iter = iter; |
||||
|
req->key = new char[keylen]; |
||||
|
req->keylen = keylen; |
||||
|
|
||||
|
if (args[4]->IsFunction()) { |
||||
|
req->obj = Persistent<Object>::New(Object::New()); |
||||
|
req->obj->Set(String::New("ondone"), args[4]); |
||||
|
uv_queue_work(uv_default_loop(), |
||||
|
&req->work_req, |
||||
|
EIO_PBKDF2_SHA512, |
||||
|
EIO_PBKDF2After_SHA512); |
||||
|
return Undefined(); |
||||
|
} else { |
||||
|
Local<Value> argv[2]; |
||||
|
EIO_PBKDF2_SHA512(req); |
||||
|
EIO_PBKDF2After_SHA512(req, argv); |
||||
|
if (argv[0]->IsObject()) return ThrowException(argv[0]); |
||||
|
return scope.Close(argv[1]); |
||||
|
} |
||||
|
|
||||
|
err: |
||||
|
delete[] salt; |
||||
|
delete[] pass; |
||||
|
return ThrowException(Exception::TypeError(String::New(type_error))); |
||||
|
} |
||||
|
|
||||
|
void InitCryptox(Handle<Object> target) { |
||||
|
NODE_SET_METHOD(target, "PBKDF2_sha512", PBKDF2_SHA512); |
||||
|
} |
||||
|
|
||||
|
} |
||||
|
} |
||||
|
|
||||
|
NODE_MODULE(cryptox, node::cryptox::InitCryptox) |
||||
|
|
@ -0,0 +1,162 @@ |
|||||
|
'use strict'; |
||||
|
|
||||
|
var chai = chai || require('chai'); |
||||
|
var should = chai.should(); |
||||
|
var bitcore = bitcore || require('../bitcore'); |
||||
|
var BIP39 = bitcore.BIP39; |
||||
|
var BIP39WordlistEn = bitcore.BIP39WordlistEn; |
||||
|
|
||||
|
describe('BIP39', function() { |
||||
|
// From python reference code, formatting unchanged
|
||||
|
var bip39_vectors = { |
||||
|
"english": [ |
||||
|
[ |
||||
|
"00000000000000000000000000000000", |
||||
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about", |
||||
|
"c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04" |
||||
|
], |
||||
|
[ |
||||
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
||||
|
"legal winner thank year wave sausage worth useful legal winner thank yellow", |
||||
|
"2e8905819b8723fe2c1d161860e5ee1830318dbf49a83bd451cfb8440c28bd6fa457fe1296106559a3c80937a1c1069be3a3a5bd381ee6260e8d9739fce1f607" |
||||
|
], |
||||
|
[ |
||||
|
"80808080808080808080808080808080", |
||||
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage above", |
||||
|
"d71de856f81a8acc65e6fc851a38d4d7ec216fd0796d0a6827a3ad6ed5511a30fa280f12eb2e47ed2ac03b5c462a0358d18d69fe4f985ec81778c1b370b652a8" |
||||
|
], |
||||
|
[ |
||||
|
"ffffffffffffffffffffffffffffffff", |
||||
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong", |
||||
|
"ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069" |
||||
|
], |
||||
|
[ |
||||
|
"000000000000000000000000000000000000000000000000", |
||||
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent", |
||||
|
"035895f2f481b1b0f01fcf8c289c794660b289981a78f8106447707fdd9666ca06da5a9a565181599b79f53b844d8a71dd9f439c52a3d7b3e8a79c906ac845fa" |
||||
|
], |
||||
|
[ |
||||
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
||||
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will", |
||||
|
"f2b94508732bcbacbcc020faefecfc89feafa6649a5491b8c952cede496c214a0c7b3c392d168748f2d4a612bada0753b52a1c7ac53c1e93abd5c6320b9e95dd" |
||||
|
], |
||||
|
[ |
||||
|
"808080808080808080808080808080808080808080808080", |
||||
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always", |
||||
|
"107d7c02a5aa6f38c58083ff74f04c607c2d2c0ecc55501dadd72d025b751bc27fe913ffb796f841c49b1d33b610cf0e91d3aa239027f5e99fe4ce9e5088cd65" |
||||
|
], |
||||
|
[ |
||||
|
"ffffffffffffffffffffffffffffffffffffffffffffffff", |
||||
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when", |
||||
|
"0cd6e5d827bb62eb8fc1e262254223817fd068a74b5b449cc2f667c3f1f985a76379b43348d952e2265b4cd129090758b3e3c2c49103b5051aac2eaeb890a528" |
||||
|
], |
||||
|
[ |
||||
|
"0000000000000000000000000000000000000000000000000000000000000000", |
||||
|
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art", |
||||
|
"bda85446c68413707090a52022edd26a1c9462295029f2e60cd7c4f2bbd3097170af7a4d73245cafa9c3cca8d561a7c3de6f5d4a10be8ed2a5e608d68f92fcc8" |
||||
|
], |
||||
|
[ |
||||
|
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f", |
||||
|
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title", |
||||
|
"bc09fca1804f7e69da93c2f2028eb238c227f2e9dda30cd63699232578480a4021b146ad717fbb7e451ce9eb835f43620bf5c514db0f8add49f5d121449d3e87" |
||||
|
], |
||||
|
[ |
||||
|
"8080808080808080808080808080808080808080808080808080808080808080", |
||||
|
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless", |
||||
|
"c0c519bd0e91a2ed54357d9d1ebef6f5af218a153624cf4f2da911a0ed8f7a09e2ef61af0aca007096df430022f7a2b6fb91661a9589097069720d015e4e982f" |
||||
|
], |
||||
|
[ |
||||
|
"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", |
||||
|
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote", |
||||
|
"dd48c104698c30cfe2b6142103248622fb7bb0ff692eebb00089b32d22484e1613912f0a5b694407be899ffd31ed3992c456cdf60f5d4564b8ba3f05a69890ad" |
||||
|
], |
||||
|
[ |
||||
|
"77c2b00716cec7213839159e404db50d", |
||||
|
"jelly better achieve collect unaware mountain thought cargo oxygen act hood bridge", |
||||
|
"b5b6d0127db1a9d2226af0c3346031d77af31e918dba64287a1b44b8ebf63cdd52676f672a290aae502472cf2d602c051f3e6f18055e84e4c43897fc4e51a6ff" |
||||
|
], |
||||
|
[ |
||||
|
"b63a9c59a6e641f288ebc103017f1da9f8290b3da6bdef7b", |
||||
|
"renew stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap", |
||||
|
"9248d83e06f4cd98debf5b6f010542760df925ce46cf38a1bdb4e4de7d21f5c39366941c69e1bdbf2966e0f6e6dbece898a0e2f0a4c2b3e640953dfe8b7bbdc5" |
||||
|
], |
||||
|
[ |
||||
|
"3e141609b97933b66a060dcddc71fad1d91677db872031e85f4c015c5e7e8982", |
||||
|
"dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic", |
||||
|
"ff7f3184df8696d8bef94b6c03114dbee0ef89ff938712301d27ed8336ca89ef9635da20af07d4175f2bf5f3de130f39c9d9e8dd0472489c19b1a020a940da67" |
||||
|
], |
||||
|
[ |
||||
|
"0460ef47585604c5660618db2e6a7e7f", |
||||
|
"afford alter spike radar gate glance object seek swamp infant panel yellow", |
||||
|
"65f93a9f36b6c85cbe634ffc1f99f2b82cbb10b31edc7f087b4f6cb9e976e9faf76ff41f8f27c99afdf38f7a303ba1136ee48a4c1e7fcd3dba7aa876113a36e4" |
||||
|
], |
||||
|
[ |
||||
|
"72f60ebac5dd8add8d2a25a797102c3ce21bc029c200076f", |
||||
|
"indicate race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left", |
||||
|
"3bbf9daa0dfad8229786ace5ddb4e00fa98a044ae4c4975ffd5e094dba9e0bb289349dbe2091761f30f382d4e35c4a670ee8ab50758d2c55881be69e327117ba" |
||||
|
], |
||||
|
[ |
||||
|
"2c85efc7f24ee4573d2b81a6ec66cee209b2dcbd09d8eddc51e0215b0b68e416", |
||||
|
"clutch control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste", |
||||
|
"fe908f96f46668b2d5b37d82f558c77ed0d69dd0e7e043a5b0511c48c2f1064694a956f86360c93dd04052a8899497ce9e985ebe0c8c52b955e6ae86d4ff4449" |
||||
|
], |
||||
|
[ |
||||
|
"eaebabb2383351fd31d703840b32e9e2", |
||||
|
"turtle front uncle idea crush write shrug there lottery flower risk shell", |
||||
|
"bdfb76a0759f301b0b899a1e3985227e53b3f51e67e3f2a65363caedf3e32fde42a66c404f18d7b05818c95ef3ca1e5146646856c461c073169467511680876c" |
||||
|
], |
||||
|
[ |
||||
|
"7ac45cfe7722ee6c7ba84fbc2d5bd61b45cb2fe5eb65aa78", |
||||
|
"kiss carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment", |
||||
|
"ed56ff6c833c07982eb7119a8f48fd363c4a9b1601cd2de736b01045c5eb8ab4f57b079403485d1c4924f0790dc10a971763337cb9f9c62226f64fff26397c79" |
||||
|
], |
||||
|
[ |
||||
|
"4fa1a8bc3e6d80ee1316050e862c1812031493212b7ec3f3bb1b08f168cabeef", |
||||
|
"exile ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top", |
||||
|
"095ee6f817b4c2cb30a5a797360a81a40ab0f9a4e25ecd672a3f58a0b5ba0687c096a6b14d2c0deb3bdefce4f61d01ae07417d502429352e27695163f7447a8c" |
||||
|
], |
||||
|
[ |
||||
|
"18ab19a9f54a9274f03e5209a2ac8a91", |
||||
|
"board flee heavy tunnel powder denial science ski answer betray cargo cat", |
||||
|
"6eff1bb21562918509c73cb990260db07c0ce34ff0e3cc4a8cb3276129fbcb300bddfe005831350efd633909f476c45c88253276d9fd0df6ef48609e8bb7dca8" |
||||
|
], |
||||
|
[ |
||||
|
"18a2e1d81b8ecfb2a333adcb0c17a5b9eb76cc5d05db91a4", |
||||
|
"board blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief", |
||||
|
"f84521c777a13b61564234bf8f8b62b3afce27fc4062b51bb5e62bdfecb23864ee6ecf07c1d5a97c0834307c5c852d8ceb88e7c97923c0a3b496bedd4e5f88a9" |
||||
|
], |
||||
|
[ |
||||
|
"15da872c95a13dd738fbf50e427583ad61f18fd99f628c417a61cf8343c90419", |
||||
|
"beyond stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut", |
||||
|
"b15509eaa2d09d3efd3e006ef42151b30367dc6e3aa5e44caba3fe4d3e352e65101fbdb86a96776b91946ff06f8eac594dc6ee1d3e82a42dfe1b40fef6bcc3fd" |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
|
||||
|
it('should initialize the class', function() { |
||||
|
should.exist(BIP39); |
||||
|
}); |
||||
|
|
||||
|
describe('#BIP39', function() { |
||||
|
it('should have a wordlist of length 2048', function() { |
||||
|
BIP39WordlistEn.length.should.equal(2048); |
||||
|
}); |
||||
|
it('should generate a mnemonic phrase', function() { |
||||
|
var phrase = BIP39.mnemonic(BIP39WordlistEn, 128); |
||||
|
}); |
||||
|
it('should pass test vectors', function() { |
||||
|
var vectors = bip39_vectors['english']; |
||||
|
for (var v = 0 ; v < vectors.length ; v++) { |
||||
|
var vector = vectors[v]; |
||||
|
var code = vector[0]; |
||||
|
var mnemonic = vector[1]; |
||||
|
var seed = vector[2]; |
||||
|
var mnemonic1 = BIP39.to_mnemonic(BIP39WordlistEn, new Buffer(code, 'hex')); |
||||
|
var seed1 = BIP39.mnemonic_to_seed(mnemonic, 'TREZOR'); |
||||
|
mnemonic1.should.equal(mnemonic); |
||||
|
seed1.toString('hex').should.equal(seed) |
||||
|
} |
||||
|
}); |
||||
|
}); |
||||
|
|
||||
|
}); |
Loading…
Reference in new issue