Commit Graph

75 Commits

Author SHA1 Message Date
Matias Alejo Garcia ddd1476a39 fix buffer 2014-05-25 22:25:12 -03:00
Matias Alejo Garcia 691fec5342 fix .fromScriptPubKey parsing in some strange Txs 2014-05-25 22:25:12 -03:00
Gordon Hall 92e89d307e fix #346 2014-05-13 13:26:48 -04:00
Ryan X. Charles c038abc8e7 rename BIP32 -> HierarchicalKey, deprecate BIP32
Sounds better.
2014-05-11 13:09:57 -04:00
Rich Apodaca 8489b50c32 Fixed TransactionBuilder docs 2014-05-08 14:53:18 -07:00
Manuel Aráoz 27b60c9e3f Merge pull request #338 from matiu/bug/snippet
fix snippet
2014-05-08 17:08:11 -03:00
Matias Alejo Garcia bd91d17f57 fix snippet 2014-05-08 16:39:56 -03:00
olalonde 0c6a0c61d3 Armory: removed unused buffertools dependency 2014-05-08 08:46:09 +08:00
olalonde e06e556ca3 Eckey: renamed multiply to multiplyUncompressed for consistency 2014-05-08 08:10:07 +08:00
olalonde 59ee476b96 Armory: use native multiplication in node and javascript implementation in browser 2014-05-08 07:54:12 +08:00
olalonde b5c1a7d387 Eckey: implemented point multiplication 2014-05-08 07:54:12 +08:00
olalonde af942f9b06 Armory: added tests 2014-05-08 07:54:12 +08:00
olalonde 7800128b9b Armory: from master public key 2014-05-08 07:54:11 +08:00
olalonde 708b59eb3e Armory: fixed bug.. extra lines considered as real input 2014-05-08 07:54:11 +08:00
olalonde f647af50b7 Fixed browser exception caused by lib/Curve.js 2014-05-08 07:54:11 +08:00
olalonde fa211f98bb Armory: cleaned up example 2014-05-08 07:54:11 +08:00
olalonde 468ebddc1e Implemented Armory initializing from seed 2014-05-08 07:54:11 +08:00
olalonde e2655f553d Added EC Point multiplication to browser/Point.js 2014-05-08 07:54:11 +08:00
olalonde 78ae388553 Replace process.versions tests by browserify's package.json browser field. Fixes #329 2014-05-07 14:14:10 +08:00
Ryan X. Charles 527c49a11d remove unused chai dependency 2014-05-05 11:04:24 -04:00
Ryan X. Charles d3a4cfa333 remove eval
eval is unsafe, and the way it was being used in Script and Script interpreter
was not a good enough reason. This commit removes both uses of eval, then
replaces all uses of OP_XXX with Opcode.map.OP_XXX since there's no reason for
those constants to be global.
2014-05-05 10:43:24 -04:00
Matias Alejo Garcia 536db27da3 add docs to Address class 2014-05-03 16:52:39 -03:00
Matias Alejo Garcia f0155a5297 docs in Txbuilder 2014-05-01 11:53:52 -03:00
Ryan X. Charles b1f34d4015 iterate array correctly so that random number is actually used in signing 2014-05-01 10:09:33 -04:00
Ryan X. Charles 405ea0bf6f fix bignum issue
In the browser, sometimes the config for bignum wasn't being set up if (somehow
... still not sure how this is possible) you use bitcore without using
require('bitcore'). This would by pass the code that set the config for bignum.
Solution is to put the config for bignum in bignum itself (in the browser).

This fixes, in particular, an issue with base58 where it was depending on
bignum having the proper config.

Also I add the base58 tests to run in the browser which they weren't
previously.

And finally I add a small test for Bignum in the browser that makes sure the
config is set properly.
2014-04-29 17:59:24 -04:00
Ryan X. Charles c7218ea2fc Merge pull request #305 from maraoz/refactor/improve-BIP32
Refactor/improve bip32 and add test
2014-04-29 15:00:39 -04:00
Manuel Araoz e9fa7e36ce remove alert 2014-04-29 14:45:08 -03:00
Manuel Araoz ac719345e8 add tests for BIP32 2014-04-29 14:37:37 -03:00
Manuel Araoz 6cf690afcc improve BIP32 error message 2014-04-29 12:43:29 -03:00
Manuel Araoz ce00b77de0 name change forKey -> fromKey 2014-04-29 11:49:42 -03:00
Manuel Araoz a1a844c1e6 add Address.forKey convenience method and example vanity address generator 2014-04-29 11:49:42 -03:00
Ryan X. Charles 1959ce953c Merge pull request #298 from ryanxcharles/feature/bignum
Move bignumber.js to internal
2014-04-29 10:47:55 -04:00
Matias Alejo Garcia ec2299362c docco documentation 2014-04-29 11:33:20 -03:00
Ryan X. Charles 0c8a582522 Merge pull request #301 from matiu/bug/firefox
fix firefox test
2014-04-29 10:22:15 -04:00
Matias Alejo Garcia 00c639d350 fix firefox test 2014-04-29 10:29:38 -03:00
Ryan X. Charles 7f348ca0bd Move BigNumber to internal
...no longer relies on Manuel's repo hostig a version of "bignum" that actually
contained bignumber.js. This moves bignumber.js internally and removes bignum
from the browser build process. Also adds a bitcore.Bignum that links to the
right thing. In node, browser.Bignum is require('bignum'). And in the browser,
bitcore.Bignum is is now Bignumber.js (same as before ... except bignumber.js
is now inside bitcore).
2014-04-28 18:00:59 -04:00
Gordon Hall bf1b4bdcc7 replace extend with underscore and use it's version of extend from within PeerManager 2014-04-28 12:23:56 -04:00
Ryan X. Charles c7b33eca9a update key signing to use new SecureRandom
...and throw an error if you try to use the old, non-secure random number
generator.
2014-04-25 15:00:51 -03:00
Ruben de Vries 4860b8f3c7 updated naming for getMultiSigInfo 2014-04-25 15:02:19 +02:00
Ruben de Vries e301a14657 added Script.getMultiSigInfo as easy helper to return information about a multisig script 2014-04-25 14:58:44 +02:00
Ryan X. Charles 10d164b292 add require('bignum') in key 2014-04-24 15:33:38 -03:00
Ryan X. Charles 9575929162 Merge branch 'feature/secure-random'
Conflicts:
	lib/browser/Key.js
2014-04-24 09:19:58 -03:00
Matias Alejo Garcia 64b5623d54 removes buffertools dependencies in browsers Key.js 2014-04-23 21:32:25 -03:00
Ryan X. Charles 350f6ae998 Key should make sure new privkey is less than N
...this involves adding a Curve class, and significant refactoring to make this
possible in a clean way.
2014-04-23 21:15:55 -03:00
Matias Alejo Garcia a83309eede rm log 2014-04-22 23:11:07 -03:00
Ryan X. Charles dbcf270826 use SecureRandom in Key in the browser
...to make sure random numbers are generated securely
2014-04-22 22:43:22 -03:00
Ryan X. Charles 75d2d0d390 fix issues with ConnectionTor example and Connection class 2014-04-22 22:28:31 -03:00
Ryan X. Charles ba692aaa20 add new SecureRandom class that does the right thing
Generating random numbers properly depends on the platform. The new
getRandomBuffer method does the right thing on the right platform. It will
sometimes fail due to insufficient entropy. The getPseudoRandomBuffer class is
also provided that will never fail, but it is not cryptographically secure and
should not be used for keys.
2014-04-22 22:18:59 -03:00
Matias Alejo Garcia 906378aac4 rm spaces 2014-04-22 21:10:39 -03:00
Matias Alejo Garcia 9951b55a4f signature sorting in .sign and .merge in transaction builder 2014-04-22 21:09:22 -03:00