-
Notifications
You must be signed in to change notification settings - Fork 75
Expand file tree
/
Copy pathhd.py
More file actions
274 lines (227 loc) · 10.1 KB
/
hd.py
File metadata and controls
274 lines (227 loc) · 10.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
# Copyright (C) 2017 chainside srl
#
# This file is part of the btcpy package.
#
# It is subject to the license terms in the LICENSE.md file found in the top-level
# directory of this distribution.
#
# No part of btcpy, including this file, may be copied, modified,
# propagated, or distributed except according to the terms contained in the
# LICENSE.md file.
import hmac
from hashlib import sha512
from itertools import chain
from ..lib.base58 import b58decode_check, b58encode_check
from ecdsa import VerifyingKey
from ecdsa.ellipticcurve import INFINITY
from ecdsa.curves import SECP256k1
from ecdsa.ecdsa import generator_secp256k1
from abc import ABCMeta, abstractmethod
from ..lib.types import HexSerializable
from ..lib.parsing import Stream, Parser
from ..setup import is_mainnet
from .crypto import PrivateKey, PublicKey
from ..constants import Constants
from ..setup import strictness
class ExtendedKey(HexSerializable, metaclass=ABCMeta):
master_parent_fingerprint = bytearray([0] * 4)
first_hardened_index = 1 << 31
curve_order = SECP256k1.order
@classmethod
def master(cls, key, chaincode, version):
return cls(key, chaincode, 0, cls.master_parent_fingerprint, 0, version, hardened=True)
@classmethod
@strictness
def decode(cls, string, strict=None):
decoded = b58decode_check(string)
version = decoded[0:4]
try:
data = Constants.get('xkeys.prefixes')[version]
except KeyError:
raise ValueError('Encoded key not recognised: {}'.format(string))
mainnet = data['network'] == 'mainnet'
if strict and mainnet != is_mainnet():
raise ValueError('Trying to decode {}mainnet key '
'in {}mainnet environment'.format('' if mainnet else 'non-',
'non-' if mainnet else ''))
parser = Parser(bytearray(decoded))
parser >> 4
depth = int.from_bytes(parser >> 1, 'big')
fingerprint = parser >> 4
index = int.from_bytes(parser >> 4, 'big')
if index >= cls.first_hardened_index:
index -= cls.first_hardened_index
hardened = True
else:
hardened = False
chaincode = parser >> 32
keydata = parser >> 33
if data['type'] == 'prv':
subclass = ExtendedPrivateKey
elif data['type'] == 'pub':
subclass = ExtendedPublicKey
else:
raise ValueError('Encoded key not recognised: {}'.format(string))
if cls != ExtendedKey and cls != subclass:
raise ValueError('Trying to decode {} key on {} subclass'.format(data['type'], subclass))
key = subclass.decode_key(keydata)
return subclass(key, chaincode, depth, fingerprint, index, version, hardened)
@staticmethod
@abstractmethod
def decode_key(keydata):
raise NotImplemented
def __init__(self, key, chaincode, depth, pfing, index, version, hardened=False):
if not 0 <= depth <= 255:
raise ValueError('Depth must be between 0 and 255')
self.key = key
self.chaincode = chaincode
self.depth = depth
self.parent_fingerprint = pfing
self.index = index
self.hardened = hardened
self.version = version
def derive(self, path):
"""
:param path: a path like "m/44'/0'/1'/0/10" if deriving from a master key,
or a relative path like "./0/10"
:return: the derived ExtendedPublicKey if deriving from an ExtendedPublicKey,
the derived ExtendedPrivateKey if deriving from an ExtendedPrivateKey
"""
steps = path.split('/')
if steps[0] not in {'m', '.'}:
raise ValueError('Invalid derivation path: {}'.format(path))
if steps[0] == 'm' and not self.is_master():
raise ValueError('Trying to derive absolute path from non-master key')
current = self
for step in steps[1:]:
hardened = False
if step[-1] == "'":
hardened = True
step = step[:-1]
index = int(step)
current = current.get_child(index, hardened)
return current
@abstractmethod
def get_child(self, index, hardened=False):
raise NotImplemented
@abstractmethod
def _serialized_public(self):
raise NotImplemented
@abstractmethod
def _serialize_key(self):
raise NotImplemented
def get_hash(self, index, hardened=False):
cls = self.__class__
if hardened:
data = self._serialize_key() + (index + cls.first_hardened_index).to_bytes(4, 'big')
else:
data = self._serialized_public() + index.to_bytes(4, 'big')
h = bytearray(hmac.new(bytes(self.chaincode), bytes(data), sha512).digest())
left, right = int.from_bytes(h[:32], 'big'), h[32:]
if left > cls.curve_order:
raise ValueError('Left side of hmac generated number bigger than SECP256k1 curve order')
return left, right
def is_master(self):
return all([self.depth == 0,
self.parent_fingerprint == ExtendedKey.master_parent_fingerprint,
self.index == 0])
def encode(self, mainnet=None):
return b58encode_check(bytes(self.serialize(mainnet)))
def serialize(self, mainnet=None):
cls = self.__class__
result = Stream()
result << self.version
result << self.depth.to_bytes(1, 'big')
result << self.parent_fingerprint
if self.hardened:
result << (self.index + cls.first_hardened_index).to_bytes(4, 'big')
else:
result << self.index.to_bytes(4, 'big')
result << self.chaincode
result << self._serialize_key()
return result.serialize()
def __str__(self):
return 'version: {}\ndepth: {}\nparent fp: {}\n' \
'index: {}\nchaincode: {}\nkey: {}\nhardened: {}'.format(self.version,
self.depth,
self.parent_fingerprint,
self.index,
self.chaincode,
self.key,
self.hardened)
def __eq__(self, other):
return all([self.key == other.key,
self.chaincode == other.chaincode,
self.depth == other.depth,
self.parent_fingerprint == other.parent_fingerprint,
self.index == other.index,
self.version == other.version,
self.hardened == other.hardened])
class ExtendedPrivateKey(ExtendedKey):
@staticmethod
def decode_key(keydata):
return PrivateKey(keydata[1:])
def __init__(self, key, chaincode, depth, pfing, index, version, hardened=False):
if not isinstance(key, PrivateKey):
raise TypeError('ExtendedPrivateKey expects a PrivateKey')
super().__init__(key, chaincode, depth, pfing, index, version, hardened)
def __int__(self):
return int.from_bytes(self.key.key, 'big')
def get_child(self, index, hardened=False):
left, right = self.get_hash(index, hardened)
k = (int(self) + left) % self.__class__.curve_order
if k == 0:
raise ValueError('Got 0 as k')
return ExtendedPrivateKey(PrivateKey(k.to_bytes(32, 'big')),
right,
self.depth + 1,
self.get_fingerprint(),
index,
self.version,
hardened)
def get_fingerprint(self):
return self.pub().get_fingerprint()
def _serialize_key(self):
return bytearray([0]) + self.key.serialize()
def _serialized_public(self):
return self.pub()._serialize_key()
def pub(self):
key_type = Constants.get('xkeys.prefixes')[self.version]['prefix']
pub_version = Constants.get('xkeys.versions')['{}pub'.format(key_type)]
return ExtendedPublicKey(self.key.pub(),
self.chaincode,
self.depth,
self.parent_fingerprint,
self.index,
pub_version,
self.hardened)
class ExtendedPublicKey(ExtendedKey):
@staticmethod
def decode_key(keydata):
return PublicKey(keydata)
def __init__(self, key, chaincode, depth, pfing, index, version, hardened=False):
if not isinstance(key, PublicKey):
raise TypeError('ExtendedPublicKey expects a PublicKey')
super().__init__(key.compress(), chaincode, depth, pfing, index, version, hardened)
def __int__(self):
return int.from_bytes(self.key.key, 'big')
def get_fingerprint(self):
return self.key.hash()[:4]
def get_child(self, index, hardened=False):
left, right = self.get_hash(index, hardened)
point = ((left * generator_secp256k1)
+ VerifyingKey.from_string(self.key.uncompressed[1:], curve=SECP256k1).pubkey.point)
if point == INFINITY:
raise ValueError('Computed point equals INFINITY')
return ExtendedPublicKey(PublicKey.from_point(point), right, self.depth + 1, self.get_fingerprint(), index,
self.version, False)
def get_hash(self, index, hardened=False):
if hardened:
raise ValueError('Trying to generate hardened child from public key')
return super().get_hash(index, hardened)
def _serialized_public(self):
return self._serialize_key()
def _serialize_key(self):
return self.key.compressed
def __lt__(self, other):
return self.key < other.key