Manuel Araoz
e9fa7e36ce
remove alert
2014-04-29 14:45:08 -03:00
Manuel Araoz
ac719345e8
add tests for BIP32
2014-04-29 14:37:37 -03:00
Ryan X. Charles
5d2ac520bd
Merge pull request #304 from maraoz/ignore/docs-folder
...
ignore doc folder
2014-04-29 11:44:06 -04:00
Ryan X. Charles
92271bceeb
Merge pull request #299 from maraoz/feature/address-forKey
...
add Address.forKey convenience method
2014-04-29 11:43:47 -04:00
Manuel Araoz
6cf690afcc
improve BIP32 error message
2014-04-29 12:43:29 -03:00
Manuel Araoz
d42f8065d4
ignore doc folder
2014-04-29 12:31:35 -03:00
Manuel Araoz
ce00b77de0
name change forKey -> fromKey
2014-04-29 11:49:42 -03:00
Manuel Araoz
a1a844c1e6
add Address.forKey convenience method and example vanity address generator
2014-04-29 11:49:42 -03:00
Ryan X. Charles
1959ce953c
Merge pull request #298 from ryanxcharles/feature/bignum
...
Move bignumber.js to internal
2014-04-29 10:47:55 -04:00
Ryan X. Charles
f3604fc470
Merge pull request #303 from matiu/feature/docco-docs1
...
docco documentation
2014-04-29 10:47:44 -04:00
Matias Alejo Garcia
ec2299362c
docco documentation
2014-04-29 11:33:20 -03:00
Ryan X. Charles
0c8a582522
Merge pull request #301 from matiu/bug/firefox
...
fix firefox test
2014-04-29 10:22:15 -04:00
Matias Alejo Garcia
00c639d350
fix firefox test
2014-04-29 10:29:38 -03:00
Ryan X. Charles
fff988da94
add deprecated bitcore.bignum and bitcore.base58
...
(the non-deprecated versions are bitcore.Bignum and bitcore.Base58)
2014-04-28 18:28:32 -04:00
Ryan X. Charles
7f348ca0bd
Move BigNumber to internal
...
...no longer relies on Manuel's repo hostig a version of "bignum" that actually
contained bignumber.js. This moves bignumber.js internally and removes bignum
from the browser build process. Also adds a bitcore.Bignum that links to the
right thing. In node, browser.Bignum is require('bignum'). And in the browser,
bitcore.Bignum is is now Bignumber.js (same as before ... except bignumber.js
is now inside bitcore).
2014-04-28 18:00:59 -04:00
Ryan X. Charles
177c1748d1
Merge pull request #294 from gordonwritescode/bug/extend
...
replace extend with underscore
2014-04-28 14:47:45 -04:00
Gordon Hall
602c94265b
add test for config extending properly
2014-04-28 12:33:34 -04:00
Gordon Hall
bf1b4bdcc7
replace extend with underscore and use it's version of extend from within PeerManager
2014-04-28 12:23:56 -04:00
Ryan X. Charles
3b2bda0745
Merge pull request #292 from manan19/patch-1
...
Update README.md
2014-04-28 07:17:07 -04:00
Ryan X. Charles
40a367993c
Merge pull request #293 from aalness/master
...
RPC not required.
2014-04-27 18:14:06 -04:00
Andy Alness
ec6400a5c1
RPC not required.
2014-04-26 17:46:31 -07:00
Manan Patel
e5d23547c0
Update README.md
...
Updated link to RpcClient.js
2014-04-26 16:54:12 -07:00
Ryan X. Charles
33415983be
up version to 0.1.16 ... to sync up npm and github
2014-04-25 15:18:31 -03:00
Ryan X. Charles
0cdb8941d7
Merge tag 'v0.1.15'
...
Conflicts:
package.json
2014-04-25 15:16:41 -03:00
Ryan X. Charles
9af3501f04
up version to 0.1.15
2014-04-25 15:07:38 -03:00
Ryan X. Charles
c7b33eca9a
update key signing to use new SecureRandom
...
...and throw an error if you try to use the old, non-secure random number
generator.
2014-04-25 15:00:51 -03:00
Manuel Aráoz
66b8b6d0ba
Merge pull request #290 from blocktrail/getMultiSigInfo
...
added Script.getMultiSigInfo
2014-04-25 10:14:22 -03:00
Ruben de Vries
4860b8f3c7
updated naming for getMultiSigInfo
2014-04-25 15:02:19 +02:00
Ruben de Vries
e301a14657
added Script.getMultiSigInfo as easy helper to return information about a multisig script
2014-04-25 14:58:44 +02:00
Ryan X. Charles
91abec72b2
version 0.1.14
2014-04-24 15:40:35 -03:00
Ryan X. Charles
90a09805cb
Merge pull request #288 from ryanxcharles/bug/bignum-in-key
...
add require('bignum') in key
2014-04-24 15:38:31 -03:00
Ryan X. Charles
10d164b292
add require('bignum') in key
2014-04-24 15:33:38 -03:00
Ryan X. Charles
0b7c52615f
up version to 0.1.13
...
New things:
* Statistical tests for RNG
* New SecureRandom class that does the right thing on all platforms
* Peer discovery
* Signature sorting in TransactionBuilder
* BIP32 speed improvements
* Electrum-style public key derivation
* Refactor node/browser code
* Message signing/verification the bitcoin way
* Address.fromScriptPubKey
2014-04-24 11:51:23 -03:00
Ryan X. Charles
9575929162
Merge branch 'feature/secure-random'
...
Conflicts:
lib/browser/Key.js
2014-04-24 09:19:58 -03:00
Ryan X. Charles
dc041db650
Merge pull request #285 from matiu/bug/firefox1
...
removes buffertools dependencies in browsers Key.js
2014-04-24 08:39:33 -03:00
Matias Alejo Garcia
64b5623d54
removes buffertools dependencies in browsers Key.js
2014-04-23 21:32:25 -03:00
Ryan X. Charles
350f6ae998
Key should make sure new privkey is less than N
...
...this involves adding a Curve class, and significant refactoring to make this
possible in a clean way.
2014-04-23 21:15:55 -03:00
Ryan X. Charles
96ba284e2f
Merge pull request #284 from maraoz/test/rng
...
Tests for RNG
2014-04-23 15:59:42 -03:00
Manuel Araoz
d8827cf9fd
skip statistically failing tests
2014-04-23 15:55:35 -03:00
Manuel Araoz
17d0eeeb00
skip pending tests:wq
2014-04-23 15:45:00 -03:00
Manuel Araoz
2a829c4525
reduce number of cases for browser
2014-04-23 15:06:11 -03:00
Manuel Araoz
34ac69616a
fix runs test
2014-04-23 15:01:04 -03:00
Manuel Araoz
532564461e
testing RNG
2014-04-23 11:32:37 -03:00
Manuel Araoz
0095f5c9d0
rng statistic testswq
2014-04-23 11:32:37 -03:00
Ryan X. Charles
11b54b4b3d
Merge pull request #281 from matiu/feature/signature-sorting
...
Feature/signature sorting
2014-04-22 23:17:41 -03:00
Matias Alejo Garcia
a83309eede
rm log
2014-04-22 23:11:07 -03:00
Ryan X. Charles
dbcf270826
use SecureRandom in Key in the browser
...
...to make sure random numbers are generated securely
2014-04-22 22:43:22 -03:00
Ryan X. Charles
4693d5bc41
remove unnecessary "change" console.log from Electrum test
2014-04-22 22:41:57 -03:00
Ryan X. Charles
75d2d0d390
fix issues with ConnectionTor example and Connection class
2014-04-22 22:28:31 -03:00
Ryan X. Charles
ba692aaa20
add new SecureRandom class that does the right thing
...
Generating random numbers properly depends on the platform. The new
getRandomBuffer method does the right thing on the right platform. It will
sometimes fail due to insufficient entropy. The getPseudoRandomBuffer class is
also provided that will never fail, but it is not cryptographically secure and
should not be used for keys.
2014-04-22 22:18:59 -03:00