Commit Graph

244 Commits

Author SHA1 Message Date
Ryan X. Charles 261a94d806 add ECIES example 2014-06-06 14:34:42 -07:00
Ryan X. Charles 80ccaa8396 rename "rand" to more explanatory "getRandomSeed" 2014-06-05 16:41:47 -07:00
Ryan X. Charles 5172b3160b add test to confirm correctness of sha512hmac 2014-06-04 18:57:26 -07:00
Ryan X. Charles af9fdff3a9 use SJCL AES to get ECIES working in the browser 2014-06-03 19:03:50 -07:00
Ryan X. Charles e963ff3c45 add ECIES support in node - not browser 2014-06-02 20:15:58 -07:00
Matias Alejo Garcia c9694c5768 rm console.log 2014-05-26 12:40:07 -03:00
Matias Alejo Garcia e60e389e43 add more strict checking, plus tests 2014-05-25 23:46:20 -03:00
Ryan X. Charles 9fb34f5033 print out string, not buffer 2014-05-23 16:51:32 -07:00
Ryan X. Charles c038abc8e7 rename BIP32 -> HierarchicalKey, deprecate BIP32
Sounds better.
2014-05-11 13:09:57 -04:00
olalonde af942f9b06 Armory: added tests 2014-05-08 07:54:12 +08:00
Ryan X. Charles d3a4cfa333 remove eval
eval is unsafe, and the way it was being used in Script and Script interpreter
was not a good enough reason. This commit removes both uses of eval, then
replaces all uses of OP_XXX with Opcode.map.OP_XXX since there's no reason for
those constants to be global.
2014-05-05 10:43:24 -04:00
Ryan X. Charles 46271de06e add some basic sanity tests for signatures and key generation
Signing a message with ECDSA involves using a random number, and this means
that two signatures should never be the same. This commit adds some basic tests
to Key.signSync and Message.sign to make sure this is the case. Also, a new
bitcore.Key should never have the same private key twice. This commit also adds
a basic test to make sure that is the case.
2014-05-01 12:27:55 -04:00
Ryan X. Charles b1f34d4015 iterate array correctly so that random number is actually used in signing 2014-05-01 10:09:33 -04:00
Ryan X. Charles 405ea0bf6f fix bignum issue
In the browser, sometimes the config for bignum wasn't being set up if (somehow
... still not sure how this is possible) you use bitcore without using
require('bitcore'). This would by pass the code that set the config for bignum.
Solution is to put the config for bignum in bignum itself (in the browser).

This fixes, in particular, an issue with base58 where it was depending on
bignum having the proper config.

Also I add the base58 tests to run in the browser which they weren't
previously.

And finally I add a small test for Bignum in the browser that makes sure the
config is set properly.
2014-04-29 17:59:24 -04:00
Ryan X. Charles c7218ea2fc Merge pull request #305 from maraoz/refactor/improve-BIP32
Refactor/improve bip32 and add test
2014-04-29 15:00:39 -04:00
Manuel Araoz ac719345e8 add tests for BIP32 2014-04-29 14:37:37 -03:00
Manuel Araoz ce00b77de0 name change forKey -> fromKey 2014-04-29 11:49:42 -03:00
Manuel Araoz a1a844c1e6 add Address.forKey convenience method and example vanity address generator 2014-04-29 11:49:42 -03:00
Ryan X. Charles 7f348ca0bd Move BigNumber to internal
...no longer relies on Manuel's repo hostig a version of "bignum" that actually
contained bignumber.js. This moves bignumber.js internally and removes bignum
from the browser build process. Also adds a bitcore.Bignum that links to the
right thing. In node, browser.Bignum is require('bignum'). And in the browser,
bitcore.Bignum is is now Bignumber.js (same as before ... except bignumber.js
is now inside bitcore).
2014-04-28 18:00:59 -04:00
Gordon Hall 602c94265b add test for config extending properly 2014-04-28 12:33:34 -04:00
Ruben de Vries 4860b8f3c7 updated naming for getMultiSigInfo 2014-04-25 15:02:19 +02:00
Ruben de Vries e301a14657 added Script.getMultiSigInfo as easy helper to return information about a multisig script 2014-04-25 14:58:44 +02:00
Ryan X. Charles 9575929162 Merge branch 'feature/secure-random'
Conflicts:
	lib/browser/Key.js
2014-04-24 09:19:58 -03:00
Ryan X. Charles 350f6ae998 Key should make sure new privkey is less than N
...this involves adding a Curve class, and significant refactoring to make this
possible in a clean way.
2014-04-23 21:15:55 -03:00
Manuel Araoz d8827cf9fd skip statistically failing tests 2014-04-23 15:55:35 -03:00
Manuel Araoz 17d0eeeb00 skip pending tests:wq 2014-04-23 15:45:00 -03:00
Manuel Araoz 2a829c4525 reduce number of cases for browser 2014-04-23 15:06:11 -03:00
Manuel Araoz 34ac69616a fix runs test 2014-04-23 15:01:04 -03:00
Manuel Araoz 532564461e testing RNG 2014-04-23 11:32:37 -03:00
Manuel Araoz 0095f5c9d0 rng statistic testswq 2014-04-23 11:32:37 -03:00
Ryan X. Charles 4693d5bc41 remove unnecessary "change" console.log from Electrum test 2014-04-22 22:41:57 -03:00
Ryan X. Charles ba692aaa20 add new SecureRandom class that does the right thing
Generating random numbers properly depends on the platform. The new
getRandomBuffer method does the right thing on the right platform. It will
sometimes fail due to insufficient entropy. The getPseudoRandomBuffer class is
also provided that will never fail, but it is not cryptographically secure and
should not be used for keys.
2014-04-22 22:18:59 -03:00
Matias Alejo Garcia 9951b55a4f signature sorting in .sign and .merge in transaction builder 2014-04-22 21:09:22 -03:00
Matias Alejo Garcia 56d81bc0df remove unused code from Script. Update it to do not use scriptSig placeholders 2014-04-22 21:09:22 -03:00
Matias Alejo Garcia e8ebd2e332 add tx validation to test 2014-04-22 21:09:22 -03:00
Ryan X. Charles a179251152 split Key node tests into separate file 2014-04-22 19:13:35 -03:00
Ryan X. Charles abc799f453 split up Point into separate node and browser versions 2014-04-22 19:13:35 -03:00
Ryan X. Charles e4e45c5245 add Electrum to browser build and tests 2014-04-20 17:49:43 -03:00
olalonde 2644dbb2db Electrum.js: wrote some tests 2014-04-21 04:21:33 +08:00
Ryan X. Charles 55061776ac add Message to browser build and tests 2014-04-19 11:41:00 -03:00
Ryan X. Charles 659dc10f96 add support for signing/verifying messages
This adds a new Message class with static methods for signing and verifying a
message the same way as bitcoind. (In a nutshell, messages a prepended with
"Bitcoin Signed Message:" before being hashed and signed).

There is one important piece missing ... verifying a signature with an address,
and not a public key. I have not yet implemented this because the cryptography
interface of bitcore does not allow me to derive the public key from a
signature. This will need to be added before verifying from an address is
possible.
2014-04-19 11:28:19 -03:00
Matias Alejo Garcia 5a1d572a8d add new constructor to Address (fromScriptPubKey) 2014-04-18 16:51:40 -03:00
Ryan X. Charles a1ef9c5220 make Connection test only run in node
...since it doesn't make sense for the browser
2014-04-17 15:07:19 -03:00
Ryan X. Charles da7fede2c0 Merge remote-tracking branch 'gordonwritescode/feature/tor' 2014-04-17 14:47:58 -03:00
Ryan X. Charles a749dc9d97 fix key tests for browser
Some tests that were intended for node only were running the browser. This
update removes those tests from the browser.
2014-04-16 21:37:46 -03:00
Ryan X. Charles 1a28683e4a Merge pull request #253 from matiu/feature/to-fromObj
add from-to Obj in Transaction Builder
2014-04-14 12:07:52 -03:00
Manuel Araoz bec26d80d6 fix TB test 2014-04-14 11:58:24 -03:00
Matias Alejo Garcia 9a25122b4f add merge options 2014-04-13 09:49:26 -03:00
Matias Alejo Garcia 233438f899 merge working! 2014-04-13 02:21:44 -03:00
Matias Alejo Garcia 52d47bf30e remove txobj from this! #merge WIP 2014-04-12 20:58:22 -03:00