2021-12-19 22:07:01 +01:00
|
|
|
from asn1crypto.keys import PrivateKeyInfo, ECPrivateKey
|
|
|
|
from coincurve import PublicKey as cPublicKey, PrivateKey as cPrivateKey
|
|
|
|
from coincurve.utils import (
|
|
|
|
pem_to_der, lib as libsecp256k1, ffi as libsecp256k1_ffi
|
|
|
|
)
|
|
|
|
from coincurve.ecdsa import CDATA_SIG_LENGTH
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2019-12-31 20:52:57 +01:00
|
|
|
from lbry.crypto.hash import hmac_sha512, hash160, double_sha256
|
|
|
|
from lbry.crypto.base58 import Base58
|
2020-01-03 04:18:49 +01:00
|
|
|
from .util import cachedproperty
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
class KeyPath:
|
|
|
|
RECEIVE = 0
|
|
|
|
CHANGE = 1
|
|
|
|
CHANNEL = 2
|
|
|
|
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
class DerivationError(Exception):
|
|
|
|
""" Raised when an invalid derivation occurs. """
|
|
|
|
|
|
|
|
|
2018-07-29 02:52:54 +02:00
|
|
|
class _KeyBase:
|
2018-05-25 08:03:25 +02:00
|
|
|
""" A BIP32 Key, public or private. """
|
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
def __init__(self, ledger, chain_code, n, depth, parent):
|
2018-05-25 08:03:25 +02:00
|
|
|
if not isinstance(chain_code, (bytes, bytearray)):
|
|
|
|
raise TypeError('chain code must be raw bytes')
|
|
|
|
if len(chain_code) != 32:
|
|
|
|
raise ValueError('invalid chain code')
|
|
|
|
if not 0 <= n < 1 << 32:
|
|
|
|
raise ValueError('invalid child number')
|
|
|
|
if not 0 <= depth < 256:
|
|
|
|
raise ValueError('invalid depth')
|
|
|
|
if parent is not None:
|
|
|
|
if not isinstance(parent, type(self)):
|
|
|
|
raise TypeError('parent key has bad type')
|
2018-06-11 15:33:32 +02:00
|
|
|
self.ledger = ledger
|
2018-05-25 08:03:25 +02:00
|
|
|
self.chain_code = chain_code
|
|
|
|
self.n = n
|
|
|
|
self.depth = depth
|
|
|
|
self.parent = parent
|
|
|
|
|
|
|
|
def _hmac_sha512(self, msg):
|
|
|
|
""" Use SHA-512 to provide an HMAC, returned as a pair of 32-byte objects. """
|
|
|
|
hmac = hmac_sha512(self.chain_code, msg)
|
|
|
|
return hmac[:32], hmac[32:]
|
|
|
|
|
|
|
|
def _extended_key(self, ver_bytes, raw_serkey):
|
|
|
|
""" Return the 78-byte extended key given prefix version bytes and serialized key bytes. """
|
|
|
|
if not isinstance(ver_bytes, (bytes, bytearray)):
|
|
|
|
raise TypeError('ver_bytes must be raw bytes')
|
|
|
|
if len(ver_bytes) != 4:
|
|
|
|
raise ValueError('ver_bytes must have length 4')
|
|
|
|
if not isinstance(raw_serkey, (bytes, bytearray)):
|
|
|
|
raise TypeError('raw_serkey must be raw bytes')
|
|
|
|
if len(raw_serkey) != 33:
|
|
|
|
raise ValueError('raw_serkey must have length 33')
|
|
|
|
|
2021-08-21 04:36:35 +02:00
|
|
|
return (
|
|
|
|
ver_bytes + bytes((self.depth,))
|
|
|
|
+ self.parent_fingerprint() + self.n.to_bytes(4, 'big')
|
|
|
|
+ self.chain_code + raw_serkey
|
|
|
|
)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2018-07-29 02:52:54 +02:00
|
|
|
def identifier(self):
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def extended_key(self):
|
|
|
|
raise NotImplementedError
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
def fingerprint(self):
|
|
|
|
""" Return the key's fingerprint as 4 bytes. """
|
|
|
|
return self.identifier()[:4]
|
|
|
|
|
|
|
|
def parent_fingerprint(self):
|
|
|
|
""" Return the parent key's fingerprint as 4 bytes. """
|
2018-07-29 02:52:54 +02:00
|
|
|
return self.parent.fingerprint() if self.parent else bytes((0,)*4)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def extended_key_string(self):
|
|
|
|
""" Return an extended key as a base58 string. """
|
|
|
|
return Base58.encode_check(self.extended_key())
|
|
|
|
|
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
class PublicKey(_KeyBase):
|
2018-05-25 08:03:25 +02:00
|
|
|
""" A BIP32 public key. """
|
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
def __init__(self, ledger, pubkey, chain_code, n, depth, parent=None):
|
2018-07-29 02:52:54 +02:00
|
|
|
super().__init__(ledger, chain_code, n, depth, parent)
|
2021-12-19 22:07:01 +01:00
|
|
|
if isinstance(pubkey, cPublicKey):
|
2018-05-25 08:03:25 +02:00
|
|
|
self.verifying_key = pubkey
|
|
|
|
else:
|
|
|
|
self.verifying_key = self._verifying_key_from_pubkey(pubkey)
|
|
|
|
|
2022-01-01 19:13:03 +01:00
|
|
|
@classmethod
|
|
|
|
def from_compressed(cls, public_key_bytes, ledger=None) -> 'PublicKey':
|
|
|
|
return cls(ledger, public_key_bytes, bytes((0,)*32), 0, 0)
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
@classmethod
|
|
|
|
def _verifying_key_from_pubkey(cls, pubkey):
|
2021-12-19 22:07:01 +01:00
|
|
|
""" Converts a 33-byte compressed pubkey into an coincurve.PublicKey object. """
|
2018-05-25 08:03:25 +02:00
|
|
|
if not isinstance(pubkey, (bytes, bytearray)):
|
|
|
|
raise TypeError('pubkey must be raw bytes')
|
|
|
|
if len(pubkey) != 33:
|
|
|
|
raise ValueError('pubkey must be 33 bytes')
|
2018-07-29 02:52:54 +02:00
|
|
|
if pubkey[0] not in (2, 3):
|
2018-05-25 08:03:25 +02:00
|
|
|
raise ValueError('invalid pubkey prefix byte')
|
2021-12-19 22:07:01 +01:00
|
|
|
return cPublicKey(pubkey)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@cachedproperty
|
|
|
|
def pubkey_bytes(self):
|
|
|
|
""" Return the compressed public key as 33 bytes. """
|
2018-09-21 22:12:07 +02:00
|
|
|
return self.verifying_key.format(True)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@cachedproperty
|
|
|
|
def address(self):
|
|
|
|
""" The public key as a P2PKH address. """
|
2018-06-11 15:33:32 +02:00
|
|
|
return self.ledger.public_key_to_address(self.pubkey_bytes)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def ec_point(self):
|
2018-09-21 22:12:07 +02:00
|
|
|
return self.verifying_key.point()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
def child(self, n: int) -> 'PublicKey':
|
2018-05-25 08:03:25 +02:00
|
|
|
""" Return the derived child extended pubkey at index N. """
|
|
|
|
if not 0 <= n < (1 << 31):
|
|
|
|
raise ValueError('invalid BIP32 public key child number')
|
|
|
|
|
2018-09-21 22:12:07 +02:00
|
|
|
msg = self.pubkey_bytes + n.to_bytes(4, 'big')
|
|
|
|
L_b, R_b = self._hmac_sha512(msg) # pylint: disable=invalid-name
|
|
|
|
derived_key = self.verifying_key.add(L_b)
|
2021-12-19 22:07:01 +01:00
|
|
|
return PublicKey(self.ledger, derived_key, R_b, n, self.depth + 1, self)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def identifier(self):
|
|
|
|
""" Return the key's identifier as 20 bytes. """
|
|
|
|
return hash160(self.pubkey_bytes)
|
|
|
|
|
|
|
|
def extended_key(self):
|
|
|
|
""" Return a raw extended public key. """
|
|
|
|
return self._extended_key(
|
2018-06-11 15:33:32 +02:00
|
|
|
self.ledger.extended_public_key_prefix,
|
2018-05-25 08:03:25 +02:00
|
|
|
self.pubkey_bytes
|
|
|
|
)
|
|
|
|
|
2022-01-17 17:08:28 +01:00
|
|
|
def verify(self, signature, digest) -> bool:
|
|
|
|
""" Verify that a signature is valid for a 32 byte digest. """
|
2022-01-01 19:13:03 +01:00
|
|
|
|
|
|
|
if len(signature) != 64:
|
2022-01-17 17:08:28 +01:00
|
|
|
raise ValueError('Signature must be 64 bytes long.')
|
|
|
|
|
|
|
|
if len(digest) != 32:
|
|
|
|
raise ValueError('Digest must be 32 bytes long.')
|
2022-01-01 19:13:03 +01:00
|
|
|
|
|
|
|
key = self.verifying_key
|
|
|
|
|
|
|
|
raw_signature = libsecp256k1_ffi.new('secp256k1_ecdsa_signature *')
|
|
|
|
|
|
|
|
parsed = libsecp256k1.secp256k1_ecdsa_signature_parse_compact(
|
|
|
|
key.context.ctx, raw_signature, signature
|
|
|
|
)
|
|
|
|
assert parsed == 1
|
|
|
|
|
|
|
|
normalized_signature = libsecp256k1_ffi.new('secp256k1_ecdsa_signature *')
|
|
|
|
|
|
|
|
libsecp256k1.secp256k1_ecdsa_signature_normalize(
|
|
|
|
key.context.ctx, normalized_signature, raw_signature
|
|
|
|
)
|
|
|
|
|
|
|
|
verified = libsecp256k1.secp256k1_ecdsa_verify(
|
2022-01-17 17:08:28 +01:00
|
|
|
key.context.ctx, normalized_signature, digest, key.public_key
|
2022-01-01 19:13:03 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
return bool(verified)
|
2021-12-10 16:46:19 +01:00
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
class PrivateKey(_KeyBase):
|
|
|
|
"""A BIP32 private key."""
|
|
|
|
|
|
|
|
HARDENED = 1 << 31
|
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
def __init__(self, ledger, privkey, chain_code, n, depth, parent=None):
|
2018-07-29 02:52:54 +02:00
|
|
|
super().__init__(ledger, chain_code, n, depth, parent)
|
2021-12-19 22:07:01 +01:00
|
|
|
if isinstance(privkey, cPrivateKey):
|
2018-05-25 08:03:25 +02:00
|
|
|
self.signing_key = privkey
|
|
|
|
else:
|
|
|
|
self.signing_key = self._signing_key_from_privkey(privkey)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def _signing_key_from_privkey(cls, private_key):
|
2018-09-21 22:12:07 +02:00
|
|
|
""" Converts a 32-byte private key into an coincurve.PrivateKey object. """
|
2021-12-19 22:07:01 +01:00
|
|
|
return cPrivateKey.from_int(PrivateKey._private_key_secret_exponent(private_key))
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def _private_key_secret_exponent(cls, private_key):
|
|
|
|
""" Return the private key as a secret exponent if it is a valid private key. """
|
|
|
|
if not isinstance(private_key, (bytes, bytearray)):
|
|
|
|
raise TypeError('private key must be raw bytes')
|
|
|
|
if len(private_key) != 32:
|
|
|
|
raise ValueError('private key must be 32 bytes')
|
2018-09-21 22:12:07 +02:00
|
|
|
return int.from_bytes(private_key, 'big')
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@classmethod
|
2021-12-19 22:07:01 +01:00
|
|
|
def from_seed(cls, ledger, seed) -> 'PrivateKey':
|
2018-05-25 08:03:25 +02:00
|
|
|
# This hard-coded message string seems to be coin-independent...
|
|
|
|
hmac = hmac_sha512(b'Bitcoin seed', seed)
|
|
|
|
privkey, chain_code = hmac[:32], hmac[32:]
|
2018-06-11 15:33:32 +02:00
|
|
|
return cls(ledger, privkey, chain_code, 0, 0)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
@classmethod
|
|
|
|
def from_pem(cls, ledger, pem) -> 'PrivateKey':
|
|
|
|
der = pem_to_der(pem.encode())
|
|
|
|
try:
|
|
|
|
key_int = ECPrivateKey.load(der).native['private_key']
|
|
|
|
except ValueError:
|
|
|
|
key_int = PrivateKeyInfo.load(der).native['private_key']['private_key']
|
|
|
|
private_key = cPrivateKey.from_int(key_int)
|
|
|
|
return cls(ledger, private_key, bytes((0,)*32), 0, 0)
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
@cachedproperty
|
|
|
|
def private_key_bytes(self):
|
|
|
|
""" Return the serialized private key (no leading zero byte). """
|
2018-09-21 22:12:07 +02:00
|
|
|
return self.signing_key.secret
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@cachedproperty
|
2021-12-19 22:07:01 +01:00
|
|
|
def public_key(self) -> PublicKey:
|
2018-05-25 08:03:25 +02:00
|
|
|
""" Return the corresponding extended public key. """
|
2018-09-21 22:12:07 +02:00
|
|
|
verifying_key = self.signing_key.public_key
|
2018-05-25 08:03:25 +02:00
|
|
|
parent_pubkey = self.parent.public_key if self.parent else None
|
2021-12-19 22:07:01 +01:00
|
|
|
return PublicKey(
|
|
|
|
self.ledger, verifying_key, self.chain_code,
|
|
|
|
self.n, self.depth, parent_pubkey
|
|
|
|
)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def ec_point(self):
|
|
|
|
return self.public_key.ec_point()
|
|
|
|
|
|
|
|
def secret_exponent(self):
|
|
|
|
""" Return the private key as a secret exponent. """
|
2018-09-21 22:12:07 +02:00
|
|
|
return self.signing_key.to_int()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def wif(self):
|
|
|
|
""" Return the private key encoded in Wallet Import Format. """
|
2018-06-11 15:33:32 +02:00
|
|
|
return self.ledger.private_key_to_wif(self.private_key_bytes)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
@property
|
2018-05-25 08:03:25 +02:00
|
|
|
def address(self):
|
|
|
|
""" The public key as a P2PKH address. """
|
|
|
|
return self.public_key.address
|
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
def child(self, n) -> 'PrivateKey':
|
2018-05-25 08:03:25 +02:00
|
|
|
""" Return the derived child extended private key at index N."""
|
|
|
|
if not 0 <= n < (1 << 32):
|
|
|
|
raise ValueError('invalid BIP32 private key child number')
|
|
|
|
|
|
|
|
if n >= self.HARDENED:
|
|
|
|
serkey = b'\0' + self.private_key_bytes
|
|
|
|
else:
|
|
|
|
serkey = self.public_key.pubkey_bytes
|
|
|
|
|
2018-09-21 22:12:07 +02:00
|
|
|
msg = serkey + n.to_bytes(4, 'big')
|
|
|
|
L_b, R_b = self._hmac_sha512(msg) # pylint: disable=invalid-name
|
|
|
|
derived_key = self.signing_key.add(L_b)
|
|
|
|
return PrivateKey(self.ledger, derived_key, R_b, n, self.depth + 1, self)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
def sign(self, data):
|
|
|
|
""" Produce a signature for piece of data by double hashing it and signing the hash. """
|
2018-09-21 22:12:07 +02:00
|
|
|
return self.signing_key.sign(data, hasher=double_sha256)
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
def sign_compact(self, digest):
|
|
|
|
""" Produce a compact signature. """
|
|
|
|
key = self.signing_key
|
|
|
|
|
|
|
|
signature = libsecp256k1_ffi.new('secp256k1_ecdsa_signature *')
|
|
|
|
signed = libsecp256k1.secp256k1_ecdsa_sign(
|
|
|
|
key.context.ctx, signature, digest, key.secret,
|
|
|
|
libsecp256k1_ffi.NULL, libsecp256k1_ffi.NULL
|
|
|
|
)
|
|
|
|
|
|
|
|
if not signed:
|
|
|
|
raise ValueError('The private key was invalid.')
|
|
|
|
|
|
|
|
serialized = libsecp256k1_ffi.new('unsigned char[%d]' % CDATA_SIG_LENGTH)
|
|
|
|
compacted = libsecp256k1.secp256k1_ecdsa_signature_serialize_compact(
|
|
|
|
key.context.ctx, serialized, signature
|
|
|
|
)
|
|
|
|
if compacted != 1:
|
|
|
|
raise ValueError('The signature could not be compacted.')
|
|
|
|
|
|
|
|
return bytes(libsecp256k1_ffi.buffer(serialized, CDATA_SIG_LENGTH))
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
def identifier(self):
|
|
|
|
"""Return the key's identifier as 20 bytes."""
|
|
|
|
return self.public_key.identifier()
|
|
|
|
|
|
|
|
def extended_key(self):
|
|
|
|
"""Return a raw extended private key."""
|
|
|
|
return self._extended_key(
|
2018-06-11 15:33:32 +02:00
|
|
|
self.ledger.extended_private_key_prefix,
|
2018-05-25 08:03:25 +02:00
|
|
|
b'\0' + self.private_key_bytes
|
|
|
|
)
|
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
def to_pem(self):
|
|
|
|
return self.signing_key.to_pem()
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
def _from_extended_key(ledger, ekey):
|
2021-12-19 22:07:01 +01:00
|
|
|
"""Return a PublicKey or PrivateKey from an extended key raw bytes."""
|
2018-05-25 08:03:25 +02:00
|
|
|
if not isinstance(ekey, (bytes, bytearray)):
|
|
|
|
raise TypeError('extended key must be raw bytes')
|
|
|
|
if len(ekey) != 78:
|
|
|
|
raise ValueError('extended key must have length 78')
|
|
|
|
|
2018-07-29 02:52:54 +02:00
|
|
|
depth = ekey[4]
|
2018-09-21 22:12:07 +02:00
|
|
|
n = int.from_bytes(ekey[9:13], 'big')
|
2018-05-25 08:03:25 +02:00
|
|
|
chain_code = ekey[13:45]
|
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
if ekey[:4] == ledger.extended_public_key_prefix:
|
2018-05-25 08:03:25 +02:00
|
|
|
pubkey = ekey[45:]
|
2021-12-19 22:07:01 +01:00
|
|
|
key = PublicKey(ledger, pubkey, chain_code, n, depth)
|
2018-06-11 15:33:32 +02:00
|
|
|
elif ekey[:4] == ledger.extended_private_key_prefix:
|
2018-07-29 02:52:54 +02:00
|
|
|
if ekey[45] != 0:
|
2018-05-25 08:03:25 +02:00
|
|
|
raise ValueError('invalid extended private key prefix byte')
|
|
|
|
privkey = ekey[46:]
|
2018-06-11 15:33:32 +02:00
|
|
|
key = PrivateKey(ledger, privkey, chain_code, n, depth)
|
2018-05-25 08:03:25 +02:00
|
|
|
else:
|
|
|
|
raise ValueError('version bytes unrecognised')
|
|
|
|
|
|
|
|
return key
|
|
|
|
|
|
|
|
|
2018-06-11 15:33:32 +02:00
|
|
|
def from_extended_key_string(ledger, ekey_str):
|
2018-05-25 08:03:25 +02:00
|
|
|
"""Given an extended key string, such as
|
|
|
|
|
|
|
|
xpub6BsnM1W2Y7qLMiuhi7f7dbAwQZ5Cz5gYJCRzTNainXzQXYjFwtuQXHd
|
|
|
|
3qfi3t3KJtHxshXezfjft93w4UE7BGMtKwhqEHae3ZA7d823DVrL
|
|
|
|
|
2021-12-19 22:07:01 +01:00
|
|
|
return a PublicKey or PrivateKey.
|
2018-05-25 08:03:25 +02:00
|
|
|
"""
|
2018-06-11 15:33:32 +02:00
|
|
|
return _from_extended_key(ledger, Base58.decode_check(ekey_str))
|