UNPKG

19.1 kBJavaScriptView Raw
1'use strict';
2
3// Relax some linter options:
4// * quote marks so "m/0'/1/2'/" doesn't need to be scaped
5// * too many tests, maxstatements -> 100
6// * store test vectors at the end, latedef: false
7// * should call is never defined
8/* jshint quotmark: false */
9/* jshint latedef: false */
10/* jshint maxstatements: 100 */
11/* jshint unused: false */
12
13var _ = require('lodash');
14var should = require('chai').should();
15var expect = require('chai').expect;
16var sinon = require('sinon');
17var bitcore = require('..');
18var Networks = bitcore.Networks;
19var HDPrivateKey = bitcore.HDPrivateKey;
20var HDPublicKey = bitcore.HDPublicKey;
21
22describe('HDKeys building with static methods', function() {
23 var classes = [HDPublicKey, HDPrivateKey];
24 var clazz, index;
25
26 _.each(classes, function(clazz) {
27 var expectStaticMethodFail = function(staticMethod, argument, message) {
28 expect(clazz[staticMethod].bind(null, argument)).to.throw(message);
29 };
30 it(clazz.name + ' fromJSON checks that a valid JSON is provided', function() {
31 var errorMessage = 'Invalid Argument: No valid argument was provided';
32 var method = 'fromObject';
33 expectStaticMethodFail(method, undefined, errorMessage);
34 expectStaticMethodFail(method, null, errorMessage);
35 expectStaticMethodFail(method, 'invalid JSON', errorMessage);
36 expectStaticMethodFail(method, '{\'singlequotes\': true}', errorMessage);
37 });
38 it(clazz.name + ' fromString checks that a string is provided', function() {
39 var errorMessage = 'No valid string was provided';
40 var method = 'fromString';
41 expectStaticMethodFail(method, undefined, errorMessage);
42 expectStaticMethodFail(method, null, errorMessage);
43 expectStaticMethodFail(method, {}, errorMessage);
44 });
45 it(clazz.name + ' fromObject checks that an object is provided', function() {
46 var errorMessage = 'No valid argument was provided';
47 var method = 'fromObject';
48 expectStaticMethodFail(method, undefined, errorMessage);
49 expectStaticMethodFail(method, null, errorMessage);
50 expectStaticMethodFail(method, '', errorMessage);
51 });
52 });
53});
54
55describe('BIP32 compliance', function() {
56
57 it('should initialize test vector 1 from the extended public key', function() {
58 new HDPublicKey(vector1_m_public).xpubkey.should.equal(vector1_m_public);
59 });
60
61 it('should initialize test vector 1 from the extended private key', function() {
62 new HDPrivateKey(vector1_m_private).xprivkey.should.equal(vector1_m_private);
63 });
64
65 it('can initialize a public key from an extended private key', function() {
66 new HDPublicKey(vector1_m_private).xpubkey.should.equal(vector1_m_public);
67 });
68
69 it('toString should be equal to the `xpubkey` member', function() {
70 var privateKey = new HDPrivateKey(vector1_m_private);
71 privateKey.toString().should.equal(privateKey.xprivkey);
72 });
73
74 it('toString should be equal to the `xpubkey` member', function() {
75 var publicKey = new HDPublicKey(vector1_m_public);
76 publicKey.toString().should.equal(publicKey.xpubkey);
77 });
78
79 it('should get the extended public key from the extended private key for test vector 1', function() {
80 HDPrivateKey(vector1_m_private).xpubkey.should.equal(vector1_m_public);
81 });
82
83 it("should get m/0' ext. private key from test vector 1", function() {
84 var privateKey = new HDPrivateKey(vector1_m_private).derive("m/0'");
85 privateKey.xprivkey.should.equal(vector1_m0h_private);
86 });
87
88 it("should get m/0' ext. public key from test vector 1", function() {
89 HDPrivateKey(vector1_m_private).derive("m/0'")
90 .xpubkey.should.equal(vector1_m0h_public);
91 });
92
93 it("should get m/0'/1 ext. private key from test vector 1", function() {
94 HDPrivateKey(vector1_m_private).derive("m/0'/1")
95 .xprivkey.should.equal(vector1_m0h1_private);
96 });
97
98 it("should get m/0'/1 ext. public key from test vector 1", function() {
99 HDPrivateKey(vector1_m_private).derive("m/0'/1")
100 .xpubkey.should.equal(vector1_m0h1_public);
101 });
102
103 it("should get m/0'/1 ext. public key from m/0' public key from test vector 1", function() {
104 var derivedPublic = HDPrivateKey(vector1_m_private).derive("m/0'").hdPublicKey.derive("m/1");
105 derivedPublic.xpubkey.should.equal(vector1_m0h1_public);
106 });
107
108 it("should get m/0'/1/2' ext. private key from test vector 1", function() {
109 var privateKey = new HDPrivateKey(vector1_m_private);
110 var derived = privateKey.derive("m/0'/1/2'");
111 derived.xprivkey.should.equal(vector1_m0h12h_private);
112 });
113
114 it("should get m/0'/1/2' ext. public key from test vector 1", function() {
115 HDPrivateKey(vector1_m_private).derive("m/0'/1/2'")
116 .xpubkey.should.equal(vector1_m0h12h_public);
117 });
118
119 it("should get m/0'/1/2'/2 ext. private key from test vector 1", function() {
120 HDPrivateKey(vector1_m_private).derive("m/0'/1/2'/2")
121 .xprivkey.should.equal(vector1_m0h12h2_private);
122 });
123
124 it("should get m/0'/1/2'/2 ext. public key from m/0'/1/2' public key from test vector 1", function() {
125 var derived = HDPrivateKey(vector1_m_private).derive("m/0'/1/2'").hdPublicKey;
126 derived.derive("m/2").xpubkey.should.equal(vector1_m0h12h2_public);
127 });
128
129 it("should get m/0'/1/2h/2 ext. public key from test vector 1", function() {
130 HDPrivateKey(vector1_m_private).derive("m/0'/1/2'/2")
131 .xpubkey.should.equal(vector1_m0h12h2_public);
132 });
133
134 it("should get m/0'/1/2h/2/1000000000 ext. private key from test vector 1", function() {
135 HDPrivateKey(vector1_m_private).derive("m/0'/1/2'/2/1000000000")
136 .xprivkey.should.equal(vector1_m0h12h21000000000_private);
137 });
138
139 it("should get m/0'/1/2h/2/1000000000 ext. public key from test vector 1", function() {
140 HDPrivateKey(vector1_m_private).derive("m/0'/1/2'/2/1000000000")
141 .xpubkey.should.equal(vector1_m0h12h21000000000_public);
142 });
143
144 it("should get m/0'/1/2'/2/1000000000 ext. public key from m/0'/1/2'/2 public key from test vector 1", function() {
145 var derived = HDPrivateKey(vector1_m_private).derive("m/0'/1/2'/2").hdPublicKey;
146 derived.derive("m/1000000000").xpubkey.should.equal(vector1_m0h12h21000000000_public);
147 });
148
149 it('should initialize test vector 2 from the extended public key', function() {
150 HDPublicKey(vector2_m_public).xpubkey.should.equal(vector2_m_public);
151 });
152
153 it('should initialize test vector 2 from the extended private key', function() {
154 HDPrivateKey(vector2_m_private).xprivkey.should.equal(vector2_m_private);
155 });
156
157 it('should get the extended public key from the extended private key for test vector 2', function() {
158 HDPrivateKey(vector2_m_private).xpubkey.should.equal(vector2_m_public);
159 });
160
161 it("should get m/0 ext. private key from test vector 2", function() {
162 HDPrivateKey(vector2_m_private).derive(0).xprivkey.should.equal(vector2_m0_private);
163 });
164
165 it("should get m/0 ext. public key from test vector 2", function() {
166 HDPrivateKey(vector2_m_private).derive(0).xpubkey.should.equal(vector2_m0_public);
167 });
168
169 it("should get m/0 ext. public key from m public key from test vector 2", function() {
170 HDPrivateKey(vector2_m_private).hdPublicKey.derive(0).xpubkey.should.equal(vector2_m0_public);
171 });
172
173 it("should get m/0/2147483647h ext. private key from test vector 2", function() {
174 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'")
175 .xprivkey.should.equal(vector2_m02147483647h_private);
176 });
177
178 it("should get m/0/2147483647h ext. public key from test vector 2", function() {
179 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'")
180 .xpubkey.should.equal(vector2_m02147483647h_public);
181 });
182
183 it("should get m/0/2147483647h/1 ext. private key from test vector 2", function() {
184 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1")
185 .xprivkey.should.equal(vector2_m02147483647h1_private);
186 });
187
188 it("should get m/0/2147483647h/1 ext. public key from test vector 2", function() {
189 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1")
190 .xpubkey.should.equal(vector2_m02147483647h1_public);
191 });
192
193 it("should get m/0/2147483647h/1 ext. public key from m/0/2147483647h public key from test vector 2", function() {
194 var derived = HDPrivateKey(vector2_m_private).derive("m/0/2147483647'").hdPublicKey;
195 derived.derive(1).xpubkey.should.equal(vector2_m02147483647h1_public);
196 });
197
198 it("should get m/0/2147483647h/1/2147483646h ext. private key from test vector 2", function() {
199 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1/2147483646'")
200 .xprivkey.should.equal(vector2_m02147483647h12147483646h_private);
201 });
202
203 it("should get m/0/2147483647h/1/2147483646h ext. public key from test vector 2", function() {
204 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1/2147483646'")
205 .xpubkey.should.equal(vector2_m02147483647h12147483646h_public);
206 });
207
208 it("should get m/0/2147483647h/1/2147483646h/2 ext. private key from test vector 2", function() {
209 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1/2147483646'/2")
210 .xprivkey.should.equal(vector2_m02147483647h12147483646h2_private);
211 });
212
213 it("should get m/0/2147483647h/1/2147483646h/2 ext. public key from test vector 2", function() {
214 HDPrivateKey(vector2_m_private).derive("m/0/2147483647'/1/2147483646'/2")
215 .xpubkey.should.equal(vector2_m02147483647h12147483646h2_public);
216 });
217
218 it("should get m/0/2147483647h/1/2147483646h/2 ext. public key from m/0/2147483647h/2147483646h public key from test vector 2", function() {
219 var derivedPublic = HDPrivateKey(vector2_m_private)
220 .derive("m/0/2147483647'/1/2147483646'").hdPublicKey;
221 derivedPublic.derive("m/2")
222 .xpubkey.should.equal(vector2_m02147483647h12147483646h2_public);
223 });
224
225 it('should use full 32 bytes for private key data that is hashed (as per bip32)', function() {
226 // https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
227 var privateKeyBuffer = Buffer.from('00000055378cf5fafb56c711c674143f9b0ee82ab0ba2924f19b64f5ae7cdbfd', 'hex');
228 var chainCodeBuffer = Buffer.from('9c8a5c863e5941f3d99453e6ba66b328bb17cf0b8dec89ed4fc5ace397a1c089', 'hex');
229 var key = HDPrivateKey.fromObject({
230 network: 'testnet',
231 depth: 0,
232 parentFingerPrint: 0,
233 childIndex: 0,
234 privateKey: privateKeyBuffer,
235 chainCode: chainCodeBuffer
236 });
237 var derived = key.deriveChild("m/44'/0'/0'/0/0'");
238 derived.privateKey.toString().should.equal('3348069561d2a0fb925e74bf198762acc47dce7db27372257d2d959a9e6f8aeb');
239 });
240
241 it('should NOT use full 32 bytes for private key data that is hashed with nonCompliant flag', function() {
242 // This is to test that the previously implemented non-compliant to BIP32
243 var privateKeyBuffer = Buffer.from('00000055378cf5fafb56c711c674143f9b0ee82ab0ba2924f19b64f5ae7cdbfd', 'hex');
244 var chainCodeBuffer = Buffer.from('9c8a5c863e5941f3d99453e6ba66b328bb17cf0b8dec89ed4fc5ace397a1c089', 'hex');
245 var key = HDPrivateKey.fromObject({
246 network: 'testnet',
247 depth: 0,
248 parentFingerPrint: 0,
249 childIndex: 0,
250 privateKey: privateKeyBuffer,
251 chainCode: chainCodeBuffer
252 });
253 var derived = key.deriveNonCompliantChild("m/44'/0'/0'/0/0'");
254 derived.privateKey.toString().should.equal('4811a079bab267bfdca855b3bddff20231ff7044e648514fa099158472df2836');
255 });
256
257 it('should NOT use full 32 bytes for private key data that is hashed with the nonCompliant derive method', function() {
258 // This is to test that the previously implemented non-compliant to BIP32
259 var privateKeyBuffer = Buffer.from('00000055378cf5fafb56c711c674143f9b0ee82ab0ba2924f19b64f5ae7cdbfd', 'hex');
260 var chainCodeBuffer = Buffer.from('9c8a5c863e5941f3d99453e6ba66b328bb17cf0b8dec89ed4fc5ace397a1c089', 'hex');
261 var key = HDPrivateKey.fromObject({
262 network: 'testnet',
263 depth: 0,
264 parentFingerPrint: 0,
265 childIndex: 0,
266 privateKey: privateKeyBuffer,
267 chainCode: chainCodeBuffer
268 });
269 var derived = key.derive("m/44'/0'/0'/0/0'");
270 derived.privateKey.toString().should.equal('4811a079bab267bfdca855b3bddff20231ff7044e648514fa099158472df2836');
271 });
272
273 describe('edge cases', function() {
274 var sandbox = sinon.createSandbox();
275 afterEach(function() {
276 sandbox.restore();
277 });
278 it('will handle edge case that derived private key is invalid', function() {
279 var invalid = Buffer.from('0000000000000000000000000000000000000000000000000000000000000000', 'hex');
280 var privateKeyBuffer = Buffer.from('5f72914c48581fc7ddeb944a9616389200a9560177d24f458258e5b04527bcd1', 'hex');
281 var chainCodeBuffer = Buffer.from('39816057bba9d952fe87fe998b7fd4d690a1bb58c2ff69141469e4d1dffb4b91', 'hex');
282 var unstubbed = bitcore.crypto.BN.prototype.toBuffer;
283 var count = 0;
284 var stub = sandbox.stub(bitcore.crypto.BN.prototype, 'toBuffer').callsFake(function (args) {
285 // On the fourth call to the function give back an invalid private key
286 // otherwise use the normal behavior.
287 count++;
288 if (count === 4) {
289 return invalid;
290 }
291 var ret = unstubbed.apply(this, arguments);
292 return ret;
293 });
294 sandbox.spy(bitcore.PrivateKey, 'isValid');
295 var key = HDPrivateKey.fromObject({
296 network: 'testnet',
297 depth: 0,
298 parentFingerPrint: 0,
299 childIndex: 0,
300 privateKey: privateKeyBuffer,
301 chainCode: chainCodeBuffer
302 });
303 var derived = key.derive("m/44'");
304 derived.privateKey.toString().should.equal('b15bce3608d607ee3a49069197732c656bca942ee59f3e29b4d56914c1de6825');
305 bitcore.PrivateKey.isValid.callCount.should.equal(2);
306 });
307 it('will handle edge case that a derive public key is invalid', function() {
308 var publicKeyBuffer = Buffer.from('029e58b241790284ef56502667b15157b3fc58c567f044ddc35653860f9455d099', 'hex');
309 var chainCodeBuffer = Buffer.from('39816057bba9d952fe87fe998b7fd4d690a1bb58c2ff69141469e4d1dffb4b91', 'hex');
310 var key = new HDPublicKey({
311 network: 'testnet',
312 depth: 0,
313 parentFingerPrint: 0,
314 childIndex: 0,
315 chainCode: chainCodeBuffer,
316 publicKey: publicKeyBuffer
317 });
318 var unstubbed = bitcore.PublicKey.fromPoint;
319 bitcore.PublicKey.fromPoint = function() {
320 bitcore.PublicKey.fromPoint = unstubbed;
321 throw new Error('Point cannot be equal to Infinity');
322 };
323 sandbox.spy(key, '_deriveWithNumber');
324 var derived = key.derive("m/44");
325 key._deriveWithNumber.callCount.should.equal(2);
326 key.publicKey.toString().should.equal('029e58b241790284ef56502667b15157b3fc58c567f044ddc35653860f9455d099');
327 });
328 });
329
330 describe('seed', function() {
331
332 it('should initialize a new BIP32 correctly from test vector 1 seed', function() {
333 var seededKey = HDPrivateKey.fromSeed(vector1_master, Networks.livenet);
334 seededKey.xprivkey.should.equal(vector1_m_private);
335 seededKey.xpubkey.should.equal(vector1_m_public);
336 });
337
338 it('should initialize a new BIP32 correctly from test vector 2 seed', function() {
339 var seededKey = HDPrivateKey.fromSeed(vector2_master, Networks.livenet);
340 seededKey.xprivkey.should.equal(vector2_m_private);
341 seededKey.xpubkey.should.equal(vector2_m_public);
342 });
343 });
344});
345
346//test vectors: https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
347var vector1_master = '000102030405060708090a0b0c0d0e0f';
348var vector1_m_public = 'xpub661MyMwAqRbcFtXgS5sYJABqqG9YLmC4Q1Rdap9gSE8NqtwybGhePY2gZ29ESFjqJoCu1Rupje8YtGqsefD265TMg7usUDFdp6W1EGMcet8';
349var vector1_m_private = 'xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi';
350var vector1_m0h_public = 'xpub68Gmy5EdvgibQVfPdqkBBCHxA5htiqg55crXYuXoQRKfDBFA1WEjWgP6LHhwBZeNK1VTsfTFUHCdrfp1bgwQ9xv5ski8PX9rL2dZXvgGDnw';
351var vector1_m0h_private = 'xprv9uHRZZhk6KAJC1avXpDAp4MDc3sQKNxDiPvvkX8Br5ngLNv1TxvUxt4cV1rGL5hj6KCesnDYUhd7oWgT11eZG7XnxHrnYeSvkzY7d2bhkJ7';
352var vector1_m0h1_public = 'xpub6ASuArnXKPbfEwhqN6e3mwBcDTgzisQN1wXN9BJcM47sSikHjJf3UFHKkNAWbWMiGj7Wf5uMash7SyYq527Hqck2AxYysAA7xmALppuCkwQ';
353var vector1_m0h1_private = 'xprv9wTYmMFdV23N2TdNG573QoEsfRrWKQgWeibmLntzniatZvR9BmLnvSxqu53Kw1UmYPxLgboyZQaXwTCg8MSY3H2EU4pWcQDnRnrVA1xe8fs';
354var vector1_m0h12h_public = 'xpub6D4BDPcP2GT577Vvch3R8wDkScZWzQzMMUm3PWbmWvVJrZwQY4VUNgqFJPMM3No2dFDFGTsxxpG5uJh7n7epu4trkrX7x7DogT5Uv6fcLW5';
355var vector1_m0h12h_private = 'xprv9z4pot5VBttmtdRTWfWQmoH1taj2axGVzFqSb8C9xaxKymcFzXBDptWmT7FwuEzG3ryjH4ktypQSAewRiNMjANTtpgP4mLTj34bhnZX7UiM';
356var vector1_m0h12h2_public = 'xpub6FHa3pjLCk84BayeJxFW2SP4XRrFd1JYnxeLeU8EqN3vDfZmbqBqaGJAyiLjTAwm6ZLRQUMv1ZACTj37sR62cfN7fe5JnJ7dh8zL4fiyLHV';
357var vector1_m0h12h2_private = 'xprvA2JDeKCSNNZky6uBCviVfJSKyQ1mDYahRjijr5idH2WwLsEd4Hsb2Tyh8RfQMuPh7f7RtyzTtdrbdqqsunu5Mm3wDvUAKRHSC34sJ7in334';
358var vector1_m0h12h21000000000_public = 'xpub6H1LXWLaKsWFhvm6RVpEL9P4KfRZSW7abD2ttkWP3SSQvnyA8FSVqNTEcYFgJS2UaFcxupHiYkro49S8yGasTvXEYBVPamhGW6cFJodrTHy';
359var vector1_m0h12h21000000000_private = 'xprvA41z7zogVVwxVSgdKUHDy1SKmdb533PjDz7J6N6mV6uS3ze1ai8FHa8kmHScGpWmj4WggLyQjgPie1rFSruoUihUZREPSL39UNdE3BBDu76';
360var vector2_master = 'fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542';
361var vector2_m_public = 'xpub661MyMwAqRbcFW31YEwpkMuc5THy2PSt5bDMsktWQcFF8syAmRUapSCGu8ED9W6oDMSgv6Zz8idoc4a6mr8BDzTJY47LJhkJ8UB7WEGuduB';
362var vector2_m_private = 'xprv9s21ZrQH143K31xYSDQpPDxsXRTUcvj2iNHm5NUtrGiGG5e2DtALGdso3pGz6ssrdK4PFmM8NSpSBHNqPqm55Qn3LqFtT2emdEXVYsCzC2U';
363var vector2_m0_public = 'xpub69H7F5d8KSRgmmdJg2KhpAK8SR3DjMwAdkxj3ZuxV27CprR9LgpeyGmXUbC6wb7ERfvrnKZjXoUmmDznezpbZb7ap6r1D3tgFxHmwMkQTPH';
364var vector2_m0_private = 'xprv9vHkqa6EV4sPZHYqZznhT2NPtPCjKuDKGY38FBWLvgaDx45zo9WQRUT3dKYnjwih2yJD9mkrocEZXo1ex8G81dwSM1fwqWpWkeS3v86pgKt';
365var vector2_m02147483647h_public = 'xpub6ASAVgeehLbnwdqV6UKMHVzgqAG8Gr6riv3Fxxpj8ksbH9ebxaEyBLZ85ySDhKiLDBrQSARLq1uNRts8RuJiHjaDMBU4Zn9h8LZNnBC5y4a';
366var vector2_m02147483647h_private = 'xprv9wSp6B7kry3Vj9m1zSnLvN3xH8RdsPP1Mh7fAaR7aRLcQMKTR2vidYEeEg2mUCTAwCd6vnxVrcjfy2kRgVsFawNzmjuHc2YmYRmagcEPdU9';
367var vector2_m02147483647h1_public = 'xpub6DF8uhdarytz3FWdA8TvFSvvAh8dP3283MY7p2V4SeE2wyWmG5mg5EwVvmdMVCQcoNJxGoWaU9DCWh89LojfZ537wTfunKau47EL2dhHKon';
368var vector2_m02147483647h1_private = 'xprv9zFnWC6h2cLgpmSA46vutJzBcfJ8yaJGg8cX1e5StJh45BBciYTRXSd25UEPVuesF9yog62tGAQtHjXajPPdbRCHuWS6T8XA2ECKADdw4Ef';
369var vector2_m02147483647h12147483646h_public = 'xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL';
370var vector2_m02147483647h12147483646h_private = 'xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc';
371var vector2_m02147483647h12147483646h2_public = 'xpub6FnCn6nSzZAw5Tw7cgR9bi15UV96gLZhjDstkXXxvCLsUXBGXPdSnLFbdpq8p9HmGsApME5hQTZ3emM2rnY5agb9rXpVGyy3bdW6EEgAtqt';
372var vector2_m02147483647h12147483646h2_private = 'xprvA2nrNbFZABcdryreWet9Ea4LvTJcGsqrMzxHx98MMrotbir7yrKCEXw7nadnHM8Dq38EGfSh6dqA9QWTyefMLEcBYJUuekgW4BYPJcr9E7j';