163 lines
6.0 KiB
Python
163 lines
6.0 KiB
Python
![]() |
###############################################################################
|
||
|
#
|
||
|
# The MIT License (MIT)
|
||
|
#
|
||
|
# Copyright (c) 2018 Luis Teixeira
|
||
|
# - copied & modified from https://github.com/vergl4s/ethereum-mnemonic-utils
|
||
|
#
|
||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||
|
# of this software and associated documentation files (the "Software"), to deal
|
||
|
# in the Software without restriction, including without limitation the rights
|
||
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||
|
# copies of the Software, and to permit persons to whom the Software is
|
||
|
# furnished to do so, subject to the following conditions:
|
||
|
#
|
||
|
# The above copyright notice and this permission notice shall be included in
|
||
|
# all copies or substantial portions of the Software.
|
||
|
#
|
||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||
|
# THE SOFTWARE.
|
||
|
#
|
||
|
###############################################################################
|
||
|
|
||
|
import hashlib
|
||
|
import hmac
|
||
|
import struct
|
||
|
|
||
|
from base58 import b58encode_check
|
||
|
from ecdsa.curves import SECP256k1
|
||
|
|
||
|
BIP39_PBKDF2_ROUNDS = 2048
|
||
|
BIP39_SALT_MODIFIER = "mnemonic"
|
||
|
BIP32_PRIVDEV = 0x80000000
|
||
|
BIP32_CURVE = SECP256k1
|
||
|
BIP32_SEED_MODIFIER = b'Bitcoin seed'
|
||
|
|
||
|
# https://github.com/ethereum/EIPs/issues/84#issuecomment-528213145
|
||
|
LEDGER_ETH_DERIVATION_PATH = "m/44'/60'/0'/0"
|
||
|
|
||
|
|
||
|
def mnemonic_to_bip39seed(mnemonic, passphrase):
|
||
|
""" BIP39 seed from a mnemonic key.
|
||
|
Logic adapted from https://github.com/trezor/python-mnemonic. """
|
||
|
mnemonic = bytes(mnemonic, 'utf8')
|
||
|
salt = bytes(BIP39_SALT_MODIFIER + passphrase, 'utf8')
|
||
|
return hashlib.pbkdf2_hmac('sha512', mnemonic, salt, BIP39_PBKDF2_ROUNDS)
|
||
|
|
||
|
|
||
|
def bip39seed_to_bip32masternode(seed):
|
||
|
""" BIP32 master node derivation from a bip39 seed.
|
||
|
Logic adapted from https://github.com/satoshilabs/slips/blob/master/slip-0010/testvectors.py. """
|
||
|
h = hmac.new(BIP32_SEED_MODIFIER, seed, hashlib.sha512).digest()
|
||
|
key, chain_code = h[:32], h[32:]
|
||
|
return key, chain_code
|
||
|
|
||
|
|
||
|
def derive_public_key(private_key):
|
||
|
""" Public key from a private key.
|
||
|
Logic adapted from https://github.com/satoshilabs/slips/blob/master/slip-0010/testvectors.py. """
|
||
|
|
||
|
Q = int.from_bytes(private_key, byteorder='big') * BIP32_CURVE.generator
|
||
|
xstr = Q.x().to_bytes(32, byteorder='big')
|
||
|
parity = Q.y() & 1
|
||
|
return (2 + parity).to_bytes(1, byteorder='big') + xstr
|
||
|
|
||
|
|
||
|
def derive_bip32childkey(parent_key, parent_chain_code, i):
|
||
|
""" Derives a child key from an existing key, i is current derivation parameter.
|
||
|
Logic adapted from https://github.com/satoshilabs/slips/blob/master/slip-0010/testvectors.py. """
|
||
|
|
||
|
assert len(parent_key) == 32
|
||
|
assert len(parent_chain_code) == 32
|
||
|
k = parent_chain_code
|
||
|
if (i & BIP32_PRIVDEV) != 0:
|
||
|
key = b'\x00' + parent_key
|
||
|
else:
|
||
|
key = derive_public_key(parent_key)
|
||
|
d = key + struct.pack('>L', i)
|
||
|
while True:
|
||
|
h = hmac.new(k, d, hashlib.sha512).digest()
|
||
|
key, chain_code = h[:32], h[32:]
|
||
|
a = int.from_bytes(key, byteorder='big')
|
||
|
b = int.from_bytes(parent_key, byteorder='big')
|
||
|
key = (a + b) % BIP32_CURVE.order
|
||
|
if a < BIP32_CURVE.order and key != 0:
|
||
|
key = key.to_bytes(32, byteorder='big')
|
||
|
break
|
||
|
d = b'\x01' + h[32:] + struct.pack('>L', i)
|
||
|
|
||
|
return key, chain_code
|
||
|
|
||
|
|
||
|
def fingerprint(public_key):
|
||
|
""" BIP32 fingerprint formula, used to get b58 serialized key. """
|
||
|
|
||
|
return hashlib.new('ripemd160', hashlib.sha256(public_key).digest()).digest()[:4]
|
||
|
|
||
|
|
||
|
def b58xprv(parent_fingerprint, private_key, chain, depth, childnr):
|
||
|
""" Private key b58 serialization format. """
|
||
|
|
||
|
raw = (b'\x04\x88\xad\xe4' + bytes(chr(depth), 'utf-8') + parent_fingerprint + childnr.to_bytes(
|
||
|
4, byteorder='big') + chain + b'\x00' + private_key)
|
||
|
|
||
|
return b58encode_check(raw)
|
||
|
|
||
|
|
||
|
def b58xpub(parent_fingerprint, public_key, chain, depth, childnr):
|
||
|
""" Public key b58 serialization format. """
|
||
|
|
||
|
raw = (b'\x04\x88\xb2\x1e' + bytes(chr(depth), 'utf-8') + parent_fingerprint + childnr.to_bytes(
|
||
|
4, byteorder='big') + chain + public_key)
|
||
|
|
||
|
return b58encode_check(raw)
|
||
|
|
||
|
|
||
|
def parse_derivation_path(str_derivation_path):
|
||
|
""" Parses a derivation path such as "m/44'/60/0'/0" and returns
|
||
|
list of integers for each element in path. """
|
||
|
|
||
|
path = []
|
||
|
if str_derivation_path[0:2] != 'm/':
|
||
|
raise ValueError("Can't recognize derivation path. It should look like \"m/44'/60/0'/0\".")
|
||
|
|
||
|
for i in str_derivation_path.lstrip('m/').split('/'):
|
||
|
if "'" in i:
|
||
|
path.append(BIP32_PRIVDEV + int(i[:-1]))
|
||
|
else:
|
||
|
path.append(int(i))
|
||
|
return path
|
||
|
|
||
|
|
||
|
def mnemonic_to_private_key(mnemonic, str_derivation_path=LEDGER_ETH_DERIVATION_PATH, passphrase=""):
|
||
|
""" Performs all convertions to get a private key from a mnemonic sentence, including:
|
||
|
|
||
|
BIP39 mnemonic to seed
|
||
|
BIP32 seed to master key
|
||
|
BIP32 child derivation of a path provided
|
||
|
|
||
|
Parameters:
|
||
|
mnemonic -- seed wordlist, usually with 24 words, that is used for ledger wallet backup
|
||
|
str_derivation_path -- string that directs BIP32 key derivation, defaults to path
|
||
|
used by ledger ETH wallet
|
||
|
|
||
|
"""
|
||
|
|
||
|
derivation_path = parse_derivation_path(str_derivation_path)
|
||
|
|
||
|
bip39seed = mnemonic_to_bip39seed(mnemonic, passphrase)
|
||
|
|
||
|
master_private_key, master_chain_code = bip39seed_to_bip32masternode(bip39seed)
|
||
|
|
||
|
private_key, chain_code = master_private_key, master_chain_code
|
||
|
|
||
|
for i in derivation_path:
|
||
|
private_key, chain_code = derive_bip32childkey(private_key, chain_code, i)
|
||
|
|
||
|
return private_key
|