131 lines
3.2 KiB
JavaScript
131 lines
3.2 KiB
JavaScript
// @flow
|
|
import {
|
|
randomBytes,
|
|
createCipheriv,
|
|
pbkdf2Sync,
|
|
createDecipheriv
|
|
} from 'crypto';
|
|
import { sha3 } from 'ethereumjs-util';
|
|
import scrypt from 'scryptsy';
|
|
import uuid from 'uuid';
|
|
|
|
export const scryptSettings = {
|
|
n: 1024
|
|
};
|
|
|
|
export const kdf = 'scrypt';
|
|
|
|
export function pkeyToKeystore(
|
|
pkey: Buffer,
|
|
address: string,
|
|
password: string
|
|
) {
|
|
const salt = randomBytes(32);
|
|
const iv = randomBytes(16);
|
|
let derivedKey;
|
|
const kdfparams: Object = {
|
|
dklen: 32,
|
|
salt: salt.toString('hex')
|
|
};
|
|
if (kdf === 'scrypt') {
|
|
// FIXME: support progress reporting callback
|
|
kdfparams.n = 1024;
|
|
kdfparams.r = 8;
|
|
kdfparams.p = 1;
|
|
derivedKey = scrypt(
|
|
new Buffer(password),
|
|
salt,
|
|
kdfparams.n,
|
|
kdfparams.r,
|
|
kdfparams.p,
|
|
kdfparams.dklen
|
|
);
|
|
} else {
|
|
throw new Error('Unsupported kdf');
|
|
}
|
|
const cipher = createCipheriv('aes-128-ctr', derivedKey.slice(0, 16), iv);
|
|
if (!cipher) {
|
|
throw new Error('Unsupported cipher');
|
|
}
|
|
const ciphertext = Buffer.concat([cipher.update(pkey), cipher.final()]);
|
|
const mac = sha3(
|
|
Buffer.concat([derivedKey.slice(16, 32), new Buffer(ciphertext, 'hex')])
|
|
);
|
|
return {
|
|
version: 3,
|
|
id: uuid.v4({
|
|
random: randomBytes(16)
|
|
}),
|
|
address,
|
|
Crypto: {
|
|
ciphertext: ciphertext.toString('hex'),
|
|
cipherparams: {
|
|
iv: iv.toString('hex')
|
|
},
|
|
cipher: 'aes-128-ctr',
|
|
kdf,
|
|
kdfparams,
|
|
mac: mac.toString('hex')
|
|
}
|
|
};
|
|
}
|
|
|
|
export function getV3Filename(address: string) {
|
|
const ts = new Date();
|
|
return ['UTC--', ts.toJSON().replace(/:/g, '-'), '--', address].join('');
|
|
}
|
|
|
|
export function fromV3KeystoreToPkey(input: string, password: string): Buffer {
|
|
let kstore = JSON.parse(input.toLowerCase());
|
|
if (kstore.version !== 3) {
|
|
throw new Error('Not a V3 wallet');
|
|
}
|
|
let derivedKey, kdfparams;
|
|
|
|
if (kstore.crypto.kdf === 'scrypt') {
|
|
kdfparams = kstore.crypto.kdfparams;
|
|
derivedKey = scrypt(
|
|
new Buffer(password),
|
|
new Buffer(kdfparams.salt, 'hex'),
|
|
kdfparams.n,
|
|
kdfparams.r,
|
|
kdfparams.p,
|
|
kdfparams.dklen
|
|
);
|
|
} else if (kstore.crypto.kdf === 'pbkdf2') {
|
|
kdfparams = kstore.crypto.kdfparams;
|
|
if (kdfparams.prf !== 'hmac-sha256') {
|
|
throw new Error('Unsupported parameters to PBKDF2');
|
|
}
|
|
derivedKey = pbkdf2Sync(
|
|
new Buffer(password),
|
|
new Buffer(kdfparams.salt, 'hex'),
|
|
kdfparams.c,
|
|
kdfparams.dklen,
|
|
'sha256'
|
|
);
|
|
} else {
|
|
throw new Error('Unsupported key derivation scheme');
|
|
}
|
|
let ciphertext = new Buffer(kstore.crypto.ciphertext, 'hex');
|
|
let mac = sha3(Buffer.concat([derivedKey.slice(16, 32), ciphertext]));
|
|
if (mac.toString('hex') !== kstore.crypto.mac) {
|
|
throw new Error('Key derivation failed - possibly wrong passphrase');
|
|
}
|
|
let decipher = createDecipheriv(
|
|
kstore.crypto.cipher,
|
|
derivedKey.slice(0, 16),
|
|
new Buffer(kstore.crypto.cipherparams.iv, 'hex')
|
|
);
|
|
let seed = decipherBuffer(decipher, ciphertext);
|
|
while (seed.length < 32) {
|
|
let nullBuff = new Buffer([0x00]);
|
|
seed = Buffer.concat([nullBuff, seed]);
|
|
}
|
|
return seed;
|
|
}
|
|
|
|
function decipherBuffer(decipher, data) {
|
|
return Buffer.concat([decipher.update(data), decipher.final()]);
|
|
}
|