Merge remote-tracking branch 'devrandom/bip39'
Conflicts: test/index.html
This commit is contained in:
commit
266759ff60
|
@ -3,6 +3,12 @@
|
|||
'node_shared_openssl%': 'true'
|
||||
},
|
||||
'targets': [
|
||||
{
|
||||
'target_name': 'cryptox',
|
||||
'sources': [
|
||||
'src/pbkdf2_sha512.cc'
|
||||
],
|
||||
},
|
||||
{
|
||||
'target_name': 'KeyModule',
|
||||
'sources': [
|
||||
|
|
|
@ -42,6 +42,8 @@ Object.defineProperty(module.exports, 'BIP32', {get: function() {
|
|||
console.log('BIP32 is deprecated. Use bitcore.HierarchicalKey instead.');
|
||||
return require('./lib/HierarchicalKey');
|
||||
}});
|
||||
requireWhenAccessed('BIP39', './lib/BIP39');
|
||||
requireWhenAccessed('BIP39WordlistEn', './lib/BIP39WordlistEn');
|
||||
requireWhenAccessed('Point', './lib/Point');
|
||||
requireWhenAccessed('Opcode', './lib/Opcode');
|
||||
requireWhenAccessed('Script', './lib/Script');
|
||||
|
|
|
@ -27,6 +27,9 @@ var modules = [
|
|||
'lib/Armory',
|
||||
'lib/Base58',
|
||||
'lib/HierarchicalKey',
|
||||
'lib/BIP39',
|
||||
'lib/BIP39WordlistEn',
|
||||
'lib/cryptox',
|
||||
'lib/Block',
|
||||
'lib/Bloom',
|
||||
'lib/Connection',
|
||||
|
|
|
@ -0,0 +1,42 @@
|
|||
var imports = require('soop').imports();
|
||||
var coinUtil = imports.coinUtil || require('../util');
|
||||
var cryptox = imports.cryptox || require('./cryptox');
|
||||
var crypto = require('crypto');
|
||||
var BIP39 = {};
|
||||
|
||||
BIP39.mnemonic = function(wordlist, bits) {
|
||||
if (!bits)
|
||||
bits = 128;
|
||||
if (bits % 32 != 0)
|
||||
throw new Error("bits must be multiple of 32");
|
||||
var bytes = crypto.randomBytes(bits / 8);
|
||||
return BIP39.to_mnemonic(wordlist, bytes);
|
||||
}
|
||||
|
||||
BIP39.to_mnemonic = function(wordlist, bytes) {
|
||||
var hash = coinUtil.sha256(new Buffer(bytes));
|
||||
var bin = "";
|
||||
var bits = bytes.length * 8;
|
||||
for (var i = 0 ; i < bytes.length ; i++) {
|
||||
bin = bin + ("00000000" + bytes[i].toString(2)).slice(-8);
|
||||
}
|
||||
var hashbits = hash[0].toString(2);
|
||||
hashbits = ("00000000" + hashbits).slice(-8).slice(0, bits/32);
|
||||
bin = bin + hashbits;
|
||||
if (bin.length % 11 != 0)
|
||||
throw new Error("interal error - entropy not an even multiple of 11 bits - " + bin.length);
|
||||
var mnemonic = "";
|
||||
for (var i = 0 ; i < bin.length / 11 ; i++) {
|
||||
if (mnemonic != "")
|
||||
mnemonic = mnemonic + " ";
|
||||
var wi = parseInt(bin.slice(i*11, (i+1)*11), 2);
|
||||
mnemonic = mnemonic + wordlist[wi];
|
||||
}
|
||||
return mnemonic;
|
||||
}
|
||||
|
||||
BIP39.mnemonic_to_seed = function(mnemonic, passphrase) {
|
||||
return cryptox.pbkdf2Sync_sha512(mnemonic, "mnemonic" + passphrase, 2048, 64);
|
||||
}
|
||||
|
||||
module.exports = require('soop')(BIP39);
|
File diff suppressed because one or more lines are too long
|
@ -0,0 +1,17 @@
|
|||
// Crypto extensions
|
||||
//
|
||||
// PBKDF2 with SHA512 - browser version
|
||||
|
||||
var sjcl = require('../sjcl');
|
||||
|
||||
var hmacSHA512 = function (key) {
|
||||
var hasher = new sjcl.misc.hmac( key, sjcl.hash.sha512 );
|
||||
this.encrypt = function () {
|
||||
return hasher.encrypt.apply( hasher, arguments );
|
||||
};
|
||||
};
|
||||
|
||||
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) {
|
||||
var derivedKey = sjcl.misc.pbkdf2( password, salt, iterations, 512, hmacSHA512 );
|
||||
return sjcl.codec.hex.fromBits( derivedKey )
|
||||
};
|
|
@ -0,0 +1,5 @@
|
|||
if (process.versions) {
|
||||
module.exports = require('./node/cryptox');
|
||||
return;
|
||||
}
|
||||
module.exports = require('./browser/cryptox');
|
|
@ -0,0 +1,49 @@
|
|||
// Crypto extensions
|
||||
//
|
||||
// PBKDF2 with SHA512
|
||||
|
||||
var binding = require('bindings')('cryptox');
|
||||
|
||||
exports.pbkdf2_sha512 = function(password, salt, iterations, keylen, callback) {
|
||||
if (typeof callback !== 'function')
|
||||
throw new Error('No callback provided to pbkdf2');
|
||||
|
||||
return pbkdf2_sha512(password, salt, iterations, keylen, callback);
|
||||
};
|
||||
|
||||
|
||||
exports.pbkdf2Sync_sha512 = function(password, salt, iterations, keylen) {
|
||||
return pbkdf2_sha512(password, salt, iterations, keylen);
|
||||
};
|
||||
|
||||
function toBuf(str, encoding) {
|
||||
encoding = encoding || 'binary';
|
||||
if (typeof str === 'string') {
|
||||
if (encoding === 'buffer')
|
||||
encoding = 'binary';
|
||||
str = new Buffer(str, encoding);
|
||||
}
|
||||
return str;
|
||||
}
|
||||
|
||||
function pbkdf2_sha512(password, salt, iterations, keylen, callback) {
|
||||
password = toBuf(password);
|
||||
salt = toBuf(salt);
|
||||
|
||||
if (exports.DEFAULT_ENCODING === 'buffer')
|
||||
return binding.PBKDF2(password, salt, iterations, keylen, callback);
|
||||
|
||||
// at this point, we need to handle encodings.
|
||||
var encoding = exports.DEFAULT_ENCODING;
|
||||
if (callback) {
|
||||
binding.PBKDF2_sha512(password, salt, iterations, keylen, function(er, ret) {
|
||||
if (ret)
|
||||
ret = ret.toString(encoding);
|
||||
callback(er, ret);
|
||||
});
|
||||
} else {
|
||||
var ret = binding.PBKDF2_sha512(password, salt, iterations, keylen);
|
||||
//return ret.toString(encoding);
|
||||
return ret;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,228 @@
|
|||
// Copyright Joyent, Inc. and other Node contributors.
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a
|
||||
// copy of this software and associated documentation files (the
|
||||
// "Software"), to deal in the Software without restriction, including
|
||||
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
||||
// persons to whom the Software is furnished to do so, subject to the
|
||||
// following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be included
|
||||
// in all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
||||
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
||||
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
||||
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
|
||||
#include "node_crypto.h"
|
||||
#include "node_crypto_groups.h"
|
||||
#include "v8.h"
|
||||
|
||||
#include "node_internals.h"
|
||||
#include "node.h"
|
||||
#include "node_buffer.h"
|
||||
#include "string_bytes.h"
|
||||
|
||||
#include <string.h>
|
||||
#ifdef _MSC_VER
|
||||
#define strcasecmp _stricmp
|
||||
#endif
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
|
||||
#if OPENSSL_VERSION_NUMBER >= 0x10000000L
|
||||
# define OPENSSL_CONST const
|
||||
#else
|
||||
# define OPENSSL_CONST
|
||||
#endif
|
||||
|
||||
#define ASSERT_IS_STRING_OR_BUFFER(val) \
|
||||
if (!Buffer::HasInstance(val) && !val->IsString()) { \
|
||||
return ThrowException(Exception::TypeError(String::New( \
|
||||
"Not a string or buffer"))); \
|
||||
}
|
||||
|
||||
#define ASSERT_IS_BUFFER(val) \
|
||||
if (!Buffer::HasInstance(val)) { \
|
||||
return ThrowException(Exception::TypeError(String::New("Not a buffer"))); \
|
||||
}
|
||||
|
||||
namespace node {
|
||||
namespace cryptox {
|
||||
|
||||
using namespace v8;
|
||||
|
||||
struct pbkdf2_req {
|
||||
uv_work_t work_req;
|
||||
int err;
|
||||
char* pass;
|
||||
size_t passlen;
|
||||
char* salt;
|
||||
size_t saltlen;
|
||||
size_t iter;
|
||||
char* key;
|
||||
size_t keylen;
|
||||
Persistent<Object> obj;
|
||||
};
|
||||
|
||||
|
||||
void EIO_PBKDF2_SHA512(pbkdf2_req* req) {
|
||||
req->err = PKCS5_PBKDF2_HMAC(
|
||||
req->pass,
|
||||
req->passlen,
|
||||
(unsigned char*)req->salt,
|
||||
req->saltlen,
|
||||
req->iter,
|
||||
EVP_sha512(),
|
||||
req->keylen,
|
||||
(unsigned char*)req->key);
|
||||
memset(req->pass, 0, req->passlen);
|
||||
memset(req->salt, 0, req->saltlen);
|
||||
}
|
||||
|
||||
|
||||
void EIO_PBKDF2_SHA512(uv_work_t* work_req) {
|
||||
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req);
|
||||
EIO_PBKDF2_SHA512(req);
|
||||
}
|
||||
|
||||
|
||||
void EIO_PBKDF2After_SHA512(pbkdf2_req* req, Local<Value> argv[2]) {
|
||||
if (req->err) {
|
||||
argv[0] = Local<Value>::New(Undefined());
|
||||
argv[1] = Encode(req->key, req->keylen, BUFFER);
|
||||
memset(req->key, 0, req->keylen);
|
||||
} else {
|
||||
argv[0] = Exception::Error(String::New("PBKDF2 error"));
|
||||
argv[1] = Local<Value>::New(Undefined());
|
||||
}
|
||||
|
||||
delete[] req->pass;
|
||||
delete[] req->salt;
|
||||
delete[] req->key;
|
||||
delete req;
|
||||
}
|
||||
|
||||
|
||||
void EIO_PBKDF2After_SHA512(uv_work_t* work_req, int status) {
|
||||
assert(status == 0);
|
||||
pbkdf2_req* req = container_of(work_req, pbkdf2_req, work_req);
|
||||
HandleScope scope;
|
||||
Local<Value> argv[2];
|
||||
Persistent<Object> obj = req->obj;
|
||||
EIO_PBKDF2After_SHA512(req, argv);
|
||||
MakeCallback(obj, "ondone", ARRAY_SIZE(argv), argv);
|
||||
obj.Dispose();
|
||||
}
|
||||
|
||||
|
||||
Handle<Value> PBKDF2_SHA512(const Arguments& args) {
|
||||
HandleScope scope;
|
||||
|
||||
const char* type_error = NULL;
|
||||
char* pass = NULL;
|
||||
char* salt = NULL;
|
||||
ssize_t passlen = -1;
|
||||
ssize_t saltlen = -1;
|
||||
ssize_t keylen = -1;
|
||||
ssize_t pass_written = -1;
|
||||
ssize_t salt_written = -1;
|
||||
ssize_t iter = -1;
|
||||
pbkdf2_req* req = NULL;
|
||||
|
||||
if (args.Length() != 4 && args.Length() != 5) {
|
||||
type_error = "Bad parameter";
|
||||
goto err;
|
||||
}
|
||||
|
||||
ASSERT_IS_BUFFER(args[0]);
|
||||
passlen = Buffer::Length(args[0]);
|
||||
if (passlen < 0) {
|
||||
type_error = "Bad password";
|
||||
goto err;
|
||||
}
|
||||
|
||||
pass = new char[passlen];
|
||||
pass_written = DecodeWrite(pass, passlen, args[0], BINARY);
|
||||
assert(pass_written == passlen);
|
||||
|
||||
ASSERT_IS_BUFFER(args[1]);
|
||||
saltlen = Buffer::Length(args[1]);
|
||||
if (saltlen < 0) {
|
||||
type_error = "Bad salt";
|
||||
goto err;
|
||||
}
|
||||
|
||||
salt = new char[saltlen];
|
||||
salt_written = DecodeWrite(salt, saltlen, args[1], BINARY);
|
||||
assert(salt_written == saltlen);
|
||||
|
||||
if (!args[2]->IsNumber()) {
|
||||
type_error = "Iterations not a number";
|
||||
goto err;
|
||||
}
|
||||
|
||||
iter = args[2]->Int32Value();
|
||||
if (iter < 0) {
|
||||
type_error = "Bad iterations";
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (!args[3]->IsNumber()) {
|
||||
type_error = "Key length not a number";
|
||||
goto err;
|
||||
}
|
||||
|
||||
keylen = args[3]->Int32Value();
|
||||
if (keylen < 0) {
|
||||
type_error = "Bad key length";
|
||||
goto err;
|
||||
}
|
||||
|
||||
req = new pbkdf2_req;
|
||||
req->err = 0;
|
||||
req->pass = pass;
|
||||
req->passlen = passlen;
|
||||
req->salt = salt;
|
||||
req->saltlen = saltlen;
|
||||
req->iter = iter;
|
||||
req->key = new char[keylen];
|
||||
req->keylen = keylen;
|
||||
|
||||
if (args[4]->IsFunction()) {
|
||||
req->obj = Persistent<Object>::New(Object::New());
|
||||
req->obj->Set(String::New("ondone"), args[4]);
|
||||
uv_queue_work(uv_default_loop(),
|
||||
&req->work_req,
|
||||
EIO_PBKDF2_SHA512,
|
||||
EIO_PBKDF2After_SHA512);
|
||||
return Undefined();
|
||||
} else {
|
||||
Local<Value> argv[2];
|
||||
EIO_PBKDF2_SHA512(req);
|
||||
EIO_PBKDF2After_SHA512(req, argv);
|
||||
if (argv[0]->IsObject()) return ThrowException(argv[0]);
|
||||
return scope.Close(argv[1]);
|
||||
}
|
||||
|
||||
err:
|
||||
delete[] salt;
|
||||
delete[] pass;
|
||||
return ThrowException(Exception::TypeError(String::New(type_error)));
|
||||
}
|
||||
|
||||
void InitCryptox(Handle<Object> target) {
|
||||
NODE_SET_METHOD(target, "PBKDF2_sha512", PBKDF2_SHA512);
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
NODE_MODULE(cryptox, node::cryptox::InitCryptox)
|
||||
|
|
@ -19,6 +19,7 @@
|
|||
<script src="test.Base58.js"></script>
|
||||
<script src="test.basic.js"></script>
|
||||
<script src="test.Bignum.browser.js"></script>
|
||||
<script src="test.BIP39.js"></script>
|
||||
<script src="test.Block.js"></script>
|
||||
<script src="test.Bloom.js"></script>
|
||||
<script src="test.Connection.js"></script>
|
||||
|
|
|
@ -0,0 +1,162 @@
|
|||
'use strict';
|
||||
|
||||
var chai = chai || require('chai');
|
||||
var should = chai.should();
|
||||
var bitcore = bitcore || require('../bitcore');
|
||||
var BIP39 = bitcore.BIP39;
|
||||
var BIP39WordlistEn = bitcore.BIP39WordlistEn;
|
||||
|
||||
describe('BIP39', function() {
|
||||
// From python reference code, formatting unchanged
|
||||
var bip39_vectors = {
|
||||
"english": [
|
||||
[
|
||||
"00000000000000000000000000000000",
|
||||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
||||
"c55257c360c07c72029aebc1b53c05ed0362ada38ead3e3e9efa3708e53495531f09a6987599d18264c1e1c92f2cf141630c7a3c4ab7c81b2f001698e7463b04"
|
||||
],
|
||||
[
|
||||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
||||
"legal winner thank year wave sausage worth useful legal winner thank yellow",
|
||||
"2e8905819b8723fe2c1d161860e5ee1830318dbf49a83bd451cfb8440c28bd6fa457fe1296106559a3c80937a1c1069be3a3a5bd381ee6260e8d9739fce1f607"
|
||||
],
|
||||
[
|
||||
"80808080808080808080808080808080",
|
||||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage above",
|
||||
"d71de856f81a8acc65e6fc851a38d4d7ec216fd0796d0a6827a3ad6ed5511a30fa280f12eb2e47ed2ac03b5c462a0358d18d69fe4f985ec81778c1b370b652a8"
|
||||
],
|
||||
[
|
||||
"ffffffffffffffffffffffffffffffff",
|
||||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong",
|
||||
"ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069"
|
||||
],
|
||||
[
|
||||
"000000000000000000000000000000000000000000000000",
|
||||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon agent",
|
||||
"035895f2f481b1b0f01fcf8c289c794660b289981a78f8106447707fdd9666ca06da5a9a565181599b79f53b844d8a71dd9f439c52a3d7b3e8a79c906ac845fa"
|
||||
],
|
||||
[
|
||||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
||||
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will",
|
||||
"f2b94508732bcbacbcc020faefecfc89feafa6649a5491b8c952cede496c214a0c7b3c392d168748f2d4a612bada0753b52a1c7ac53c1e93abd5c6320b9e95dd"
|
||||
],
|
||||
[
|
||||
"808080808080808080808080808080808080808080808080",
|
||||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter always",
|
||||
"107d7c02a5aa6f38c58083ff74f04c607c2d2c0ecc55501dadd72d025b751bc27fe913ffb796f841c49b1d33b610cf0e91d3aa239027f5e99fe4ce9e5088cd65"
|
||||
],
|
||||
[
|
||||
"ffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo when",
|
||||
"0cd6e5d827bb62eb8fc1e262254223817fd068a74b5b449cc2f667c3f1f985a76379b43348d952e2265b4cd129090758b3e3c2c49103b5051aac2eaeb890a528"
|
||||
],
|
||||
[
|
||||
"0000000000000000000000000000000000000000000000000000000000000000",
|
||||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art",
|
||||
"bda85446c68413707090a52022edd26a1c9462295029f2e60cd7c4f2bbd3097170af7a4d73245cafa9c3cca8d561a7c3de6f5d4a10be8ed2a5e608d68f92fcc8"
|
||||
],
|
||||
[
|
||||
"7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f",
|
||||
"legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth title",
|
||||
"bc09fca1804f7e69da93c2f2028eb238c227f2e9dda30cd63699232578480a4021b146ad717fbb7e451ce9eb835f43620bf5c514db0f8add49f5d121449d3e87"
|
||||
],
|
||||
[
|
||||
"8080808080808080808080808080808080808080808080808080808080808080",
|
||||
"letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic avoid letter advice cage absurd amount doctor acoustic bless",
|
||||
"c0c519bd0e91a2ed54357d9d1ebef6f5af218a153624cf4f2da911a0ed8f7a09e2ef61af0aca007096df430022f7a2b6fb91661a9589097069720d015e4e982f"
|
||||
],
|
||||
[
|
||||
"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
"zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo vote",
|
||||
"dd48c104698c30cfe2b6142103248622fb7bb0ff692eebb00089b32d22484e1613912f0a5b694407be899ffd31ed3992c456cdf60f5d4564b8ba3f05a69890ad"
|
||||
],
|
||||
[
|
||||
"77c2b00716cec7213839159e404db50d",
|
||||
"jelly better achieve collect unaware mountain thought cargo oxygen act hood bridge",
|
||||
"b5b6d0127db1a9d2226af0c3346031d77af31e918dba64287a1b44b8ebf63cdd52676f672a290aae502472cf2d602c051f3e6f18055e84e4c43897fc4e51a6ff"
|
||||
],
|
||||
[
|
||||
"b63a9c59a6e641f288ebc103017f1da9f8290b3da6bdef7b",
|
||||
"renew stay biology evidence goat welcome casual join adapt armor shuffle fault little machine walk stumble urge swap",
|
||||
"9248d83e06f4cd98debf5b6f010542760df925ce46cf38a1bdb4e4de7d21f5c39366941c69e1bdbf2966e0f6e6dbece898a0e2f0a4c2b3e640953dfe8b7bbdc5"
|
||||
],
|
||||
[
|
||||
"3e141609b97933b66a060dcddc71fad1d91677db872031e85f4c015c5e7e8982",
|
||||
"dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic",
|
||||
"ff7f3184df8696d8bef94b6c03114dbee0ef89ff938712301d27ed8336ca89ef9635da20af07d4175f2bf5f3de130f39c9d9e8dd0472489c19b1a020a940da67"
|
||||
],
|
||||
[
|
||||
"0460ef47585604c5660618db2e6a7e7f",
|
||||
"afford alter spike radar gate glance object seek swamp infant panel yellow",
|
||||
"65f93a9f36b6c85cbe634ffc1f99f2b82cbb10b31edc7f087b4f6cb9e976e9faf76ff41f8f27c99afdf38f7a303ba1136ee48a4c1e7fcd3dba7aa876113a36e4"
|
||||
],
|
||||
[
|
||||
"72f60ebac5dd8add8d2a25a797102c3ce21bc029c200076f",
|
||||
"indicate race push merry suffer human cruise dwarf pole review arch keep canvas theme poem divorce alter left",
|
||||
"3bbf9daa0dfad8229786ace5ddb4e00fa98a044ae4c4975ffd5e094dba9e0bb289349dbe2091761f30f382d4e35c4a670ee8ab50758d2c55881be69e327117ba"
|
||||
],
|
||||
[
|
||||
"2c85efc7f24ee4573d2b81a6ec66cee209b2dcbd09d8eddc51e0215b0b68e416",
|
||||
"clutch control vehicle tonight unusual clog visa ice plunge glimpse recipe series open hour vintage deposit universe tip job dress radar refuse motion taste",
|
||||
"fe908f96f46668b2d5b37d82f558c77ed0d69dd0e7e043a5b0511c48c2f1064694a956f86360c93dd04052a8899497ce9e985ebe0c8c52b955e6ae86d4ff4449"
|
||||
],
|
||||
[
|
||||
"eaebabb2383351fd31d703840b32e9e2",
|
||||
"turtle front uncle idea crush write shrug there lottery flower risk shell",
|
||||
"bdfb76a0759f301b0b899a1e3985227e53b3f51e67e3f2a65363caedf3e32fde42a66c404f18d7b05818c95ef3ca1e5146646856c461c073169467511680876c"
|
||||
],
|
||||
[
|
||||
"7ac45cfe7722ee6c7ba84fbc2d5bd61b45cb2fe5eb65aa78",
|
||||
"kiss carry display unusual confirm curtain upgrade antique rotate hello void custom frequent obey nut hole price segment",
|
||||
"ed56ff6c833c07982eb7119a8f48fd363c4a9b1601cd2de736b01045c5eb8ab4f57b079403485d1c4924f0790dc10a971763337cb9f9c62226f64fff26397c79"
|
||||
],
|
||||
[
|
||||
"4fa1a8bc3e6d80ee1316050e862c1812031493212b7ec3f3bb1b08f168cabeef",
|
||||
"exile ask congress lamp submit jacket era scheme attend cousin alcohol catch course end lucky hurt sentence oven short ball bird grab wing top",
|
||||
"095ee6f817b4c2cb30a5a797360a81a40ab0f9a4e25ecd672a3f58a0b5ba0687c096a6b14d2c0deb3bdefce4f61d01ae07417d502429352e27695163f7447a8c"
|
||||
],
|
||||
[
|
||||
"18ab19a9f54a9274f03e5209a2ac8a91",
|
||||
"board flee heavy tunnel powder denial science ski answer betray cargo cat",
|
||||
"6eff1bb21562918509c73cb990260db07c0ce34ff0e3cc4a8cb3276129fbcb300bddfe005831350efd633909f476c45c88253276d9fd0df6ef48609e8bb7dca8"
|
||||
],
|
||||
[
|
||||
"18a2e1d81b8ecfb2a333adcb0c17a5b9eb76cc5d05db91a4",
|
||||
"board blade invite damage undo sun mimic interest slam gaze truly inherit resist great inject rocket museum chief",
|
||||
"f84521c777a13b61564234bf8f8b62b3afce27fc4062b51bb5e62bdfecb23864ee6ecf07c1d5a97c0834307c5c852d8ceb88e7c97923c0a3b496bedd4e5f88a9"
|
||||
],
|
||||
[
|
||||
"15da872c95a13dd738fbf50e427583ad61f18fd99f628c417a61cf8343c90419",
|
||||
"beyond stage sleep clip because twist token leaf atom beauty genius food business side grid unable middle armed observe pair crouch tonight away coconut",
|
||||
"b15509eaa2d09d3efd3e006ef42151b30367dc6e3aa5e44caba3fe4d3e352e65101fbdb86a96776b91946ff06f8eac594dc6ee1d3e82a42dfe1b40fef6bcc3fd"
|
||||
]
|
||||
]
|
||||
}
|
||||
|
||||
it('should initialize the class', function() {
|
||||
should.exist(BIP39);
|
||||
});
|
||||
|
||||
describe('#BIP39', function() {
|
||||
it('should have a wordlist of length 2048', function() {
|
||||
BIP39WordlistEn.length.should.equal(2048);
|
||||
});
|
||||
it('should generate a mnemonic phrase', function() {
|
||||
var phrase = BIP39.mnemonic(BIP39WordlistEn, 128);
|
||||
});
|
||||
it('should pass test vectors', function() {
|
||||
var vectors = bip39_vectors['english'];
|
||||
for (var v = 0 ; v < vectors.length ; v++) {
|
||||
var vector = vectors[v];
|
||||
var code = vector[0];
|
||||
var mnemonic = vector[1];
|
||||
var seed = vector[2];
|
||||
var mnemonic1 = BIP39.to_mnemonic(BIP39WordlistEn, new Buffer(code, 'hex'));
|
||||
var seed1 = BIP39.mnemonic_to_seed(mnemonic, 'TREZOR');
|
||||
mnemonic1.should.equal(mnemonic);
|
||||
seed1.toString('hex').should.equal(seed)
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
});
|
Loading…
Reference in New Issue