avalanche_types/key/secp256k1/
mnemonic.rs1use crate::errors::{Error, Result};
2use bip32::{DerivationPath, Language, Mnemonic, XPrv};
3use rand_core::OsRng;
4
5pub const AVAX_ACCOUNT_DERIV_PATH: &str = "m/44'/9000'/0'";
7pub const AVAX_ACCOUNT_DERIV_PATH_0: &str = "m/44'/9000'/0'/0/0";
8
9pub const AVAX_ACCOUNT_EXT_PUB_KEY_DERIV_PATH: &str = "m/44'/9000'/0'";
11pub const ETH_ACCOUNT_EXT_PUB_KEY_DERIV_PATH: &str = "m/44'/60'/0'/0/0";
12
13pub fn gen_24() -> String {
19 let m = Mnemonic::random(OsRng, Language::English);
20 let s = m.phrase();
21 assert_eq!(s.split(' ').count(), 24);
22 String::from(s)
23}
24
25impl crate::key::secp256k1::private_key::Key {
26 pub fn from_mnemonic_phrase<S>(phrase: S, derive_path: S) -> Result<Self>
28 where
29 S: AsRef<str>,
30 {
31 let deriv: DerivationPath = derive_path.as_ref().parse().map_err(|e| Error::Other {
32 message: format!("failed to parse derive path ({})", e),
33 retryable: false,
34 })?;
35
36 let mnemonic = Mnemonic::new(phrase, Language::English).map_err(|e| Error::Other {
37 message: format!("failed to read mnemonic phrase ({})", e),
38 retryable: false,
39 })?;
40 let seed = mnemonic.to_seed("password");
41
42 let child_xprv = XPrv::derive_from_path(&seed, &deriv).map_err(|e| Error::Other {
44 message: format!("failed to derive AVAX account path ({})", e),
45 retryable: false,
46 })?;
47
48 let pk = child_xprv.private_key().to_bytes();
49 Self::from_bytes(&pk)
50 }
51}