2018-08-06 22:23:30 +03:00
|
|
|
:: bip32 implementation in hoon
|
|
|
|
::
|
|
|
|
:: to use, call one of the core initialization arms.
|
|
|
|
:: using the produced core, derive as needed and take out the data you want.
|
|
|
|
::
|
|
|
|
::NOTE tested to be correct against
|
|
|
|
:: https://en.bitcoin.it/wiki/BIP_0032_TestVectors
|
|
|
|
::
|
|
|
|
=, hmac:crypto
|
|
|
|
=, secp:crypto
|
|
|
|
=+ ecc=secp256k1
|
|
|
|
::
|
|
|
|
:: prv: private key
|
|
|
|
:: pub: public key
|
|
|
|
:: cad: chain code
|
|
|
|
:: dep: depth in chain
|
|
|
|
:: ind: index at depth
|
|
|
|
:: pif: parent fingerprint (4 bytes)
|
|
|
|
|_ [prv=@ pub=pont cad=@ dep=@ud ind=@ud pif=@]
|
|
|
|
::
|
|
|
|
+= keyc [key=@ cai=@] :: prv/pub key + chain code
|
|
|
|
::
|
|
|
|
:: elliptic curve operations and values
|
|
|
|
::
|
|
|
|
++ point priv-to-pub.ecc
|
|
|
|
::
|
|
|
|
++ ser-p compress-point.ecc
|
|
|
|
::
|
|
|
|
++ n ^n:ecc
|
|
|
|
::
|
|
|
|
:: core initialization
|
|
|
|
::
|
|
|
|
++ from-seed
|
|
|
|
|= byts
|
|
|
|
^+ +>
|
|
|
|
=+ der=(hmac-sha512l [12 'dees nioctiB'] [wid dat])
|
|
|
|
=+ pri=(cut 3 [32 32] der)
|
|
|
|
+>.$(prv pri, pub (point pri), cad (cut 3 [0 32] der))
|
|
|
|
::
|
|
|
|
++ from-private
|
|
|
|
|= keyc
|
|
|
|
+>(prv key, pub (point key), cad cai)
|
|
|
|
::
|
|
|
|
++ from-public
|
|
|
|
|= keyc
|
|
|
|
+>(pub (decompress-point.ecc key), cad cai)
|
|
|
|
::
|
|
|
|
++ from-public-point
|
|
|
|
|= [pon=pont cai=@]
|
|
|
|
+>(pub pon, cad cai)
|
|
|
|
::
|
|
|
|
++ from-extended
|
|
|
|
|= t=tape
|
|
|
|
=+ x=(de-base58check 4 t)
|
|
|
|
=> |%
|
|
|
|
++ take
|
|
|
|
|= b=@ud
|
|
|
|
^- [v=@ x=@]
|
|
|
|
:- (end 3 b x)
|
|
|
|
(rsh 3 b x)
|
|
|
|
--
|
|
|
|
=^ k x (take 33)
|
|
|
|
=^ c x (take 32)
|
|
|
|
=^ i x (take 4)
|
|
|
|
=^ p x (take 4)
|
|
|
|
=^ d x (take 1)
|
|
|
|
?> =(0 x) :: sanity check
|
|
|
|
%. [d i p]
|
|
|
|
=< set-metadata
|
|
|
|
=+ v=(scag 4 t)
|
|
|
|
?: =("xprv" v) (from-private k c)
|
|
|
|
?: =("xpub" v) (from-public k c)
|
|
|
|
!!
|
|
|
|
::
|
|
|
|
++ set-metadata
|
|
|
|
|= [d=@ud i=@ud p=@]
|
|
|
|
+>(dep d, ind i, pif p)
|
|
|
|
::
|
|
|
|
:: derivation
|
|
|
|
::
|
|
|
|
++ derivation-path
|
|
|
|
;~ pfix
|
|
|
|
;~(pose (jest 'm/') (easy ~))
|
2018-10-31 03:15:56 +03:00
|
|
|
%+ most net
|
2018-08-06 22:23:30 +03:00
|
|
|
;~ pose
|
|
|
|
%+ cook
|
|
|
|
|=(i=@ (add i (bex 31)))
|
2018-08-28 22:36:19 +03:00
|
|
|
;~(sfix dem say)
|
2018-08-06 22:23:30 +03:00
|
|
|
::
|
|
|
|
dem
|
|
|
|
== ==
|
|
|
|
::
|
|
|
|
++ derive-path
|
|
|
|
|= t=tape
|
|
|
|
%- derive-sequence
|
|
|
|
(scan t derivation-path)
|
|
|
|
::
|
|
|
|
++ derive-sequence
|
|
|
|
|= j=(list @u)
|
|
|
|
?~ j +>
|
|
|
|
=. +> (derive i.j)
|
|
|
|
$(j t.j)
|
|
|
|
::
|
|
|
|
++ derive
|
|
|
|
?: =(0 prv)
|
|
|
|
derive-public
|
|
|
|
derive-private
|
|
|
|
::
|
|
|
|
++ derive-private
|
|
|
|
|= i=@u
|
|
|
|
^+ +>
|
|
|
|
:: we must have a private key to derive the next one
|
|
|
|
?: =(0 prv)
|
|
|
|
~| %know-no-private-key
|
|
|
|
!!
|
|
|
|
:: derive child at i
|
2019-12-18 03:48:08 +03:00
|
|
|
=/ [left=@ right=@]
|
2018-08-06 22:23:30 +03:00
|
|
|
=- [(cut 3 [32 32] -) (cut 3 [0 32] -)]
|
|
|
|
%+ hmac-sha512l [32 cad]
|
|
|
|
:- 37
|
|
|
|
?: (gte i (bex 31))
|
|
|
|
:: hardened child
|
|
|
|
(can 3 ~[4^i 32^prv 1^0])
|
|
|
|
:: normal child
|
|
|
|
(can 3 ~[4^i 33^(ser-p (point prv))])
|
|
|
|
=+ key=(mod (add left prv) n)
|
|
|
|
:: rare exception, invalid key, go to the next one
|
|
|
|
?: |(=(0 key) (gte left n)) $(i +(i))
|
|
|
|
%_ +>.$
|
|
|
|
prv key
|
|
|
|
pub (point key)
|
|
|
|
cad right
|
|
|
|
dep +(dep)
|
|
|
|
ind i
|
|
|
|
pif fingerprint
|
|
|
|
==
|
|
|
|
::
|
|
|
|
++ derive-public
|
|
|
|
|= i=@u
|
|
|
|
^+ +>
|
|
|
|
:: public keys can't be hardened
|
|
|
|
?: (gte i (bex 31))
|
|
|
|
~| %cant-derive-hardened-public-key
|
|
|
|
!!
|
|
|
|
:: derive child at i
|
2019-12-18 03:48:08 +03:00
|
|
|
=/ [left=@ right=@]
|
2018-08-06 22:23:30 +03:00
|
|
|
=- [(cut 3 [32 32] -) (cut 3 [0 32] -)]
|
|
|
|
%+ hmac-sha512l [32 cad]
|
|
|
|
37^(can 3 ~[4^i 33^(ser-p pub)])
|
|
|
|
:: rare exception, invalid key, go to the next one
|
|
|
|
?: (gte left n) $(i +(i)) ::TODO or child key is "point at infinity"
|
|
|
|
%_ +>.$
|
|
|
|
pub (jc-add.ecc (point left) pub)
|
|
|
|
cad right
|
|
|
|
dep +(dep)
|
|
|
|
ind i
|
|
|
|
pif fingerprint
|
|
|
|
==
|
|
|
|
::
|
|
|
|
:: rendering
|
|
|
|
::
|
|
|
|
++ private-key ?.(=(0 prv) prv ~|(%know-no-private-key !!))
|
|
|
|
++ public-key (ser-p pub)
|
|
|
|
++ chain-code cad
|
|
|
|
++ private-chain [private-key cad]
|
|
|
|
++ public-chain [public-key cad]
|
|
|
|
::
|
|
|
|
++ identity (hash160 public-key)
|
|
|
|
++ fingerprint (cut 3 [16 4] identity)
|
|
|
|
::
|
|
|
|
++ prv-extended
|
|
|
|
%+ en-b58c-bip32 0x488.ade4
|
|
|
|
(build-extended private-key)
|
|
|
|
::
|
|
|
|
++ pub-extended
|
|
|
|
%+ en-b58c-bip32 0x488.b21e
|
|
|
|
(build-extended public-key)
|
|
|
|
::
|
|
|
|
++ build-extended
|
|
|
|
|= key=@
|
|
|
|
%+ can 3
|
|
|
|
:~ 33^key
|
|
|
|
32^cad
|
|
|
|
4^ind
|
|
|
|
4^pif
|
|
|
|
1^dep
|
|
|
|
==
|
|
|
|
::
|
|
|
|
++ en-b58c-bip32
|
|
|
|
|= [v=@ k=@]
|
|
|
|
(en-base58check [4 v] [74 k])
|
|
|
|
::
|
|
|
|
:: base58check
|
|
|
|
::
|
|
|
|
++ en-base58check
|
|
|
|
:: v: version bytes
|
|
|
|
:: d: data
|
|
|
|
|= [v=byts d=byts]
|
|
|
|
%- en-base58:mimes:html
|
|
|
|
=+ p=[(add wid.v wid.d) (can 3 ~[d v])]
|
|
|
|
=- (can 3 ~[4^- p])
|
|
|
|
%^ rsh 3 28
|
|
|
|
(sha-256l:sha 32 (sha-256l:sha p))
|
|
|
|
::
|
|
|
|
++ de-base58check
|
|
|
|
:: vw: amount of version bytes
|
|
|
|
|= [vw=@u t=tape]
|
|
|
|
=+ x=(de-base58:mimes:html t)
|
|
|
|
=+ hash=(sha-256l:sha 32 (sha-256:sha (rsh 3 4 x)))
|
|
|
|
?> =((end 3 4 x) (rsh 3 28 hash))
|
|
|
|
(cut 3 [vw (sub (met 3 x) (add 4 vw))] x)
|
|
|
|
::
|
|
|
|
++ hash160
|
|
|
|
|= d=@
|
|
|
|
(ripemd-160:ripemd:crypto 256 (sha-256:sha d))
|
|
|
|
--
|