1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
use byteorder::{BigEndian, ByteOrder};
use ed25519_dalek::{PublicKey, SecretKey};
use hmac::{Hmac, Mac};
use sha2::Sha512;
pub struct ExtendedPrivKey {
pub key_path: String,
pub private_key: SecretKey,
pub chain_code: [u8; 32],
}
impl ExtendedPrivKey {
pub fn new(
key_path: String,
private_key: SecretKey,
chain_code: [u8; 32],
) -> Result<Self, Slip0010Error> {
if Slip0010::is_valid_path(&key_path) {
Ok(Self {
key_path,
private_key,
chain_code,
})
} else {
Err(Slip0010Error::KeyPathError)
}
}
pub fn get_public(&self) -> PublicKey {
(&self.private_key).into()
}
fn child_key(&self, child_number: u32) -> Result<Self, Slip0010Error> {
let hardened_child_number = if child_number < Slip0010::HARDENED_START {
child_number + Slip0010::HARDENED_START
} else {
child_number
};
let mut hmac =
Hmac::<Sha512>::new_varkey(&self.chain_code).map_err(|_| Slip0010Error::MACKeyError)?;
let mut be_n = [0u8; 4];
BigEndian::write_u32(&mut be_n, hardened_child_number);
hmac.input(&[0u8]);
hmac.input(self.private_key.as_bytes());
hmac.input(&be_n);
let hmac_output = hmac.result_reset().code();
let mut chain_code_bits: [u8; 32] = [0u8; 32];
chain_code_bits.copy_from_slice(&hmac_output[32..]);
let mut new_child_path = self.key_path.to_owned();
new_child_path.push_str("/");
new_child_path.push_str(&*child_number.to_string());
let secret_key =
SecretKey::from_bytes(&hmac_output[..32]).map_err(|_| Slip0010Error::SecretKeyError)?;
ExtendedPrivKey::new(new_child_path, secret_key, chain_code_bits)
}
}
pub struct Slip0010 {}
impl Slip0010 {
const ED25519_CURVE: &'static [u8] = b"ed25519 seed";
const HARDENED_START: u32 = 2_147_483_648;
pub fn generate_master(seed: &[u8]) -> Result<ExtendedPrivKey, Slip0010Error> {
let mut hmac = Hmac::<Sha512>::new_varkey(&Slip0010::ED25519_CURVE)
.map_err(|_| Slip0010Error::MACKeyError)?;
hmac.input(seed);
let hmac_output = hmac.result_reset().code();
let mut chain_code_bits: [u8; 32] = [0u8; 32];
chain_code_bits.copy_from_slice(&hmac_output[32..]);
let secret_key =
SecretKey::from_bytes(&hmac_output[..32]).map_err(|_| Slip0010Error::SecretKeyError)?;
ExtendedPrivKey::new("m".to_string(), secret_key, chain_code_bits)
}
pub fn derive_child_key(
parent_key: ExtendedPrivKey,
child_number: u32,
) -> Result<ExtendedPrivKey, Slip0010Error> {
parent_key.child_key(child_number)
}
pub fn is_valid_path(path: &str) -> bool {
let mut segments = path.split('/');
if segments.next() != Some("m") {
return false;
}
segments.all(|s| {
if !s.starts_with('+') {
if let Ok(num) = s.parse::<u32>() {
num < 2_147_483_648
} else {
false
}
} else {
false
}
})
}
pub fn derive_from_path(path: &str, seed: &[u8]) -> Result<ExtendedPrivKey, Slip0010Error> {
if !Slip0010::is_valid_path(path) {
return Err(Slip0010Error::KeyPathError);
}
let mut key = Slip0010::generate_master(seed)?;
let segments: Vec<&str> = path.split('/').collect();
let segments = segments
.iter()
.skip(1)
.map(|s| s.replace("'", ""))
.map(|s| s.parse::<u32>().unwrap())
.collect::<Vec<_>>();
for segment in segments {
key = Slip0010::derive_child_key(key, segment)?;
}
Ok(key)
}
}
#[derive(Clone, Debug, PartialEq, Eq, failure::prelude::Fail)]
pub enum Slip0010Error {
#[fail(display = "SLIP-0010 invalid key path")]
KeyPathError,
#[fail(display = "SLIP-0010 - cannot generate key")]
SecretKeyError,
#[fail(display = "SLIP-0010 - HMAC key error")]
MACKeyError,
}