249 lines
9.3 KiB
JavaScript
249 lines
9.3 KiB
JavaScript
|
"use strict";
|
||
|
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
||
|
if (k2 === undefined) k2 = k;
|
||
|
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
||
|
}) : (function(o, m, k, k2) {
|
||
|
if (k2 === undefined) k2 = k;
|
||
|
o[k2] = m[k];
|
||
|
}));
|
||
|
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
||
|
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
||
|
}) : function(o, v) {
|
||
|
o["default"] = v;
|
||
|
});
|
||
|
var __importStar = (this && this.__importStar) || function (mod) {
|
||
|
if (mod && mod.__esModule) return mod;
|
||
|
var result = {};
|
||
|
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
||
|
__setModuleDefault(result, mod);
|
||
|
return result;
|
||
|
};
|
||
|
var __importDefault = (this && this.__importDefault) || function (mod) {
|
||
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
||
|
};
|
||
|
Object.defineProperty(exports, "__esModule", { value: true });
|
||
|
exports.fromQuorumWallet = exports.fromKryptoKit = exports.fromEtherCamp = exports.fromEtherWallet = void 0;
|
||
|
const crypto = __importStar(require("crypto"));
|
||
|
const ethereumjs_util_1 = require("ethereumjs-util");
|
||
|
const scrypt_js_1 = require("scrypt-js");
|
||
|
const index_1 = __importDefault(require("./index"));
|
||
|
const utf8 = require('utf8');
|
||
|
const aesjs = require('aes-js');
|
||
|
function runCipherBuffer(cipher, data) {
|
||
|
return Buffer.concat([cipher.update(data), cipher.final()]);
|
||
|
}
|
||
|
const evpKdfDefaults = {
|
||
|
count: 1,
|
||
|
keysize: 16,
|
||
|
ivsize: 16,
|
||
|
digest: 'md5',
|
||
|
};
|
||
|
function mergeEvpKdfOptsWithDefaults(opts) {
|
||
|
if (!opts) {
|
||
|
return evpKdfDefaults;
|
||
|
}
|
||
|
return {
|
||
|
count: opts.count || evpKdfDefaults.count,
|
||
|
keysize: opts.keysize || evpKdfDefaults.keysize,
|
||
|
ivsize: opts.ivsize || evpKdfDefaults.ivsize,
|
||
|
digest: opts.digest || evpKdfDefaults.digest,
|
||
|
};
|
||
|
}
|
||
|
/*
|
||
|
* opts:
|
||
|
* - digest - digest algorithm, defaults to md5
|
||
|
* - count - hash iterations
|
||
|
* - keysize - desired key size
|
||
|
* - ivsize - desired IV size
|
||
|
*
|
||
|
* Algorithm form https://www.openssl.org/docs/manmaster/crypto/EVP_BytesToKey.html
|
||
|
*
|
||
|
* FIXME: not optimised at all
|
||
|
*/
|
||
|
function evp_kdf(data, salt, opts) {
|
||
|
const params = mergeEvpKdfOptsWithDefaults(opts);
|
||
|
// A single EVP iteration, returns `D_i`, where block equlas to `D_(i-1)`
|
||
|
function iter(block) {
|
||
|
let hash = crypto.createHash(params.digest);
|
||
|
hash.update(block);
|
||
|
hash.update(data);
|
||
|
hash.update(salt);
|
||
|
block = hash.digest();
|
||
|
for (let i = 1, len = params.count; i < len; i++) {
|
||
|
hash = crypto.createHash(params.digest);
|
||
|
hash.update(block);
|
||
|
block = hash.digest();
|
||
|
}
|
||
|
return block;
|
||
|
}
|
||
|
const ret = [];
|
||
|
let i = 0;
|
||
|
while (Buffer.concat(ret).length < params.keysize + params.ivsize) {
|
||
|
ret[i] = iter(i === 0 ? Buffer.alloc(0) : ret[i - 1]);
|
||
|
i++;
|
||
|
}
|
||
|
const tmp = Buffer.concat(ret);
|
||
|
return {
|
||
|
key: tmp.slice(0, params.keysize),
|
||
|
iv: tmp.slice(params.keysize, params.keysize + params.ivsize),
|
||
|
};
|
||
|
}
|
||
|
// http://stackoverflow.com/questions/25288311/cryptojs-aes-pattern-always-ends-with
|
||
|
function decodeCryptojsSalt(input) {
|
||
|
const ciphertext = Buffer.from(input, 'base64');
|
||
|
if (ciphertext.slice(0, 8).toString() === 'Salted__') {
|
||
|
return {
|
||
|
salt: ciphertext.slice(8, 16),
|
||
|
ciphertext: ciphertext.slice(16),
|
||
|
};
|
||
|
}
|
||
|
return { ciphertext };
|
||
|
}
|
||
|
/*
|
||
|
* Third Party API: Import a wallet generated by EtherWallet
|
||
|
* This wallet format is created by https://github.com/SilentCicero/ethereumjs-accounts
|
||
|
* and used on https://www.myetherwallet.com/
|
||
|
*/
|
||
|
function fromEtherWallet(input, password) {
|
||
|
const json = typeof input === 'object' ? input : JSON.parse(input);
|
||
|
let privateKey;
|
||
|
if (!json.locked) {
|
||
|
if (json.private.length !== 64) {
|
||
|
throw new Error('Invalid private key length');
|
||
|
}
|
||
|
privateKey = Buffer.from(json.private, 'hex');
|
||
|
}
|
||
|
else {
|
||
|
if (typeof password !== 'string') {
|
||
|
throw new Error('Password required');
|
||
|
}
|
||
|
if (password.length < 7) {
|
||
|
throw new Error('Password must be at least 7 characters');
|
||
|
}
|
||
|
// the "encrypted" version has the low 4 bytes
|
||
|
// of the hash of the address appended
|
||
|
const hash = json.encrypted ? json.private.slice(0, 128) : json.private;
|
||
|
// decode openssl ciphertext + salt encoding
|
||
|
const cipher = decodeCryptojsSalt(hash);
|
||
|
if (!cipher.salt) {
|
||
|
throw new Error('Unsupported EtherWallet key format');
|
||
|
}
|
||
|
// derive key/iv using OpenSSL EVP as implemented in CryptoJS
|
||
|
const evp = evp_kdf(Buffer.from(password), cipher.salt, { keysize: 32, ivsize: 16 });
|
||
|
const decipher = crypto.createDecipheriv('aes-256-cbc', evp.key, evp.iv);
|
||
|
privateKey = runCipherBuffer(decipher, Buffer.from(cipher.ciphertext));
|
||
|
// NOTE: yes, they've run it through UTF8
|
||
|
privateKey = Buffer.from(utf8.decode(privateKey.toString()), 'hex');
|
||
|
}
|
||
|
const wallet = new index_1.default(privateKey);
|
||
|
if (wallet.getAddressString() !== json.address) {
|
||
|
throw new Error('Invalid private key or address');
|
||
|
}
|
||
|
return wallet;
|
||
|
}
|
||
|
exports.fromEtherWallet = fromEtherWallet;
|
||
|
/**
|
||
|
* Third Party API: Import a brain wallet used by Ether.Camp
|
||
|
*/
|
||
|
function fromEtherCamp(passphrase) {
|
||
|
return new index_1.default((0, ethereumjs_util_1.keccak256)(Buffer.from(passphrase)));
|
||
|
}
|
||
|
exports.fromEtherCamp = fromEtherCamp;
|
||
|
/**
|
||
|
* Third Party API: Import a wallet from a KryptoKit seed
|
||
|
*/
|
||
|
async function fromKryptoKit(entropy, password) {
|
||
|
function kryptoKitBrokenScryptSeed(buf) {
|
||
|
// js-scrypt calls `Buffer.from(String(salt), 'utf8')` on the seed even though it is a buffer
|
||
|
//
|
||
|
// The `buffer`` implementation used does the below transformation (doesn't matches the current version):
|
||
|
// https://github.com/feross/buffer/blob/67c61181b938b17d10dbfc0a545f713b8bd59de8/index.js
|
||
|
function decodeUtf8Char(str) {
|
||
|
try {
|
||
|
return decodeURIComponent(str);
|
||
|
}
|
||
|
catch (err) {
|
||
|
return String.fromCharCode(0xfffd); // UTF 8 invalid char
|
||
|
}
|
||
|
}
|
||
|
let res = '', tmp = '';
|
||
|
for (let i = 0; i < buf.length; i++) {
|
||
|
if (buf[i] <= 0x7f) {
|
||
|
res += decodeUtf8Char(tmp) + String.fromCharCode(buf[i]);
|
||
|
tmp = '';
|
||
|
}
|
||
|
else {
|
||
|
tmp += '%' + buf[i].toString(16);
|
||
|
}
|
||
|
}
|
||
|
return Buffer.from(res + decodeUtf8Char(tmp));
|
||
|
}
|
||
|
if (entropy[0] === '#') {
|
||
|
entropy = entropy.slice(1);
|
||
|
}
|
||
|
const type = entropy[0];
|
||
|
entropy = entropy.slice(1);
|
||
|
let privateKey;
|
||
|
if (type === 'd') {
|
||
|
privateKey = (0, ethereumjs_util_1.sha256)((0, ethereumjs_util_1.toBuffer)(entropy));
|
||
|
}
|
||
|
else if (type === 'q') {
|
||
|
if (typeof password !== 'string') {
|
||
|
throw new Error('Password required');
|
||
|
}
|
||
|
const encryptedSeed = (0, ethereumjs_util_1.sha256)(Buffer.from(entropy.slice(0, 30)));
|
||
|
const checksum = entropy.slice(30, 46);
|
||
|
const salt = kryptoKitBrokenScryptSeed(encryptedSeed);
|
||
|
const aesKey = await (0, scrypt_js_1.scrypt)(Buffer.from(password, 'utf8'), salt, 16384, 8, 1, 32);
|
||
|
/* FIXME: try to use `crypto` instead of `aesjs`
|
||
|
|
||
|
// NOTE: ECB doesn't use the IV, so it can be anything
|
||
|
var decipher = crypto.createDecipheriv("aes-256-ecb", aesKey, Buffer.from(0))
|
||
|
|
||
|
// FIXME: this is a clear abuse, but seems to match how ECB in aesjs works
|
||
|
privKey = Buffer.concat([
|
||
|
decipher.update(encryptedSeed).slice(0, 16),
|
||
|
decipher.update(encryptedSeed).slice(0, 16),
|
||
|
])
|
||
|
*/
|
||
|
const decipher = new aesjs.ModeOfOperation.ecb(aesKey);
|
||
|
/* decrypt returns an Uint8Array, perhaps there is a better way to concatenate */
|
||
|
privateKey = Buffer.concat([
|
||
|
Buffer.from(decipher.decrypt(encryptedSeed.slice(0, 16))),
|
||
|
Buffer.from(decipher.decrypt(encryptedSeed.slice(16, 32))),
|
||
|
]);
|
||
|
if (checksum.length > 0) {
|
||
|
if (checksum !== (0, ethereumjs_util_1.sha256)((0, ethereumjs_util_1.sha256)(privateKey)).slice(0, 8).toString('hex')) {
|
||
|
throw new Error('Failed to decrypt input - possibly invalid passphrase');
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
else {
|
||
|
throw new Error('Unsupported or invalid entropy type');
|
||
|
}
|
||
|
return new index_1.default(privateKey);
|
||
|
}
|
||
|
exports.fromKryptoKit = fromKryptoKit;
|
||
|
/**
|
||
|
* Third Party API: Import a brain wallet used by Quorum Wallet
|
||
|
*/
|
||
|
function fromQuorumWallet(passphrase, userid) {
|
||
|
if (passphrase.length < 10) {
|
||
|
throw new Error('Passphrase must be at least 10 characters');
|
||
|
}
|
||
|
if (userid.length < 10) {
|
||
|
throw new Error('User id must be at least 10 characters');
|
||
|
}
|
||
|
const merged = passphrase + userid;
|
||
|
const seed = crypto.pbkdf2Sync(merged, merged, 2000, 32, 'sha256');
|
||
|
return new index_1.default(seed);
|
||
|
}
|
||
|
exports.fromQuorumWallet = fromQuorumWallet;
|
||
|
const Thirdparty = {
|
||
|
fromEtherWallet,
|
||
|
fromEtherCamp,
|
||
|
fromKryptoKit,
|
||
|
fromQuorumWallet,
|
||
|
};
|
||
|
exports.default = Thirdparty;
|
||
|
//# sourceMappingURL=thirdparty.js.map
|