Python

在 Python 中將 BIP-39 助記符轉換為乙太坊私鑰

  • July 13, 2019

如何在 Python 中將 BIP-39 助記符轉換為乙太坊私鑰(通過 BIP-44 密鑰派生)?我發現給我預期結果的所有庫都取決於two1包,它與現代版本的requests.

我找到了https://github.com/vergl4s/ethereum-mnemonic-utils/ ,它產生了一個私鑰,但它不正確(或者至少它與https://iancoleman.io/bip39/派生的內容不匹配和truffle-hdwallet-provider節點包)。

我意識到我的錯誤:https ://github.com/vergl4s/ethereum-mnemonic-utils有效,但我正在尋找的完整派生路徑是m/44'/60'/0'/0/0(注意額外/0選擇第一個帳戶)。這是一個完整的例子:

#!/usr/bin/env python3
'''
MIT License

Copyright (c) 2018 Luis Teixeira
Copyright (c) 2019 Niklas Baumstark

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
'''
import binascii, hashlib, hmac, struct
from ecdsa.curves import SECP256k1
from eth_utils import to_checksum_address, keccak as eth_utils_keccak

BIP39_PBKDF2_ROUNDS = 2048
BIP39_SALT_MODIFIER = "mnemonic"
BIP32_PRIVDEV = 0x80000000
BIP32_CURVE = SECP256k1
BIP32_SEED_MODIFIER = b'Bitcoin seed'
ETH_DERIVATION_PATH = "m/44'/60'/0'/0"

class PublicKey:
   def __init__(self, private_key):
       self.point = int.from_bytes(private_key, byteorder='big') * BIP32_CURVE.generator

   def __bytes__(self):
       xstr = self.point.x().to_bytes(32, byteorder='big')
       parity = self.point.y() & 1
       return (2 + parity).to_bytes(1, byteorder='big') + xstr

   def address(self):
       x = self.point.x()
       y = self.point.y()
       s = x.to_bytes(32, 'big') + y.to_bytes(32, 'big')
       return to_checksum_address(eth_utils_keccak(s)[12:])

def mnemonic_to_bip39seed(mnemonic, passphrase):
   mnemonic = bytes(mnemonic, 'utf8')
   salt = bytes(BIP39_SALT_MODIFIER + passphrase, 'utf8')
   return hashlib.pbkdf2_hmac('sha512', mnemonic, salt, BIP39_PBKDF2_ROUNDS)

def bip39seed_to_bip32masternode(seed):
   k = seed
   h = hmac.new(BIP32_SEED_MODIFIER, seed, hashlib.sha512).digest()
   key, chain_code = h[:32], h[32:]
   return key, chain_code

def derive_bip32childkey(parent_key, parent_chain_code, i):
   assert len(parent_key) == 32
   assert len(parent_chain_code) == 32
   k = parent_chain_code
   if (i & BIP32_PRIVDEV) != 0:
       key = b'\x00' + parent_key
   else:
       key = bytes(PublicKey(parent_key))
   d = key + struct.pack('>L', i)
   while True:
       h = hmac.new(k, d, hashlib.sha512).digest()
       key, chain_code = h[:32], h[32:]
       a = int.from_bytes(key, byteorder='big')
       b = int.from_bytes(parent_key, byteorder='big')
       key = (a + b) % BIP32_CURVE.order
       if a < BIP32_CURVE.order and key != 0:
           key = key.to_bytes(32, byteorder='big')
           break
       d = b'\x01' + h[32:] + struct.pack('>L', i)
   return key, chain_code

def parse_derivation_path(str_derivation_path):
   path = []
   if str_derivation_path[0:2] != 'm/':
       raise ValueError("Can't recognize derivation path. It should look like \"m/44'/60/0'/0\".")
   for i in str_derivation_path.lstrip('m/').split('/'):
       if "'" in i:
           path.append(BIP32_PRIVDEV + int(i[:-1]))
       else:
           path.append(int(i))
   return path

def mnemonic_to_private_key(mnemonic, str_derivation_path, passphrase=""):
   derivation_path = parse_derivation_path(str_derivation_path)
   bip39seed = mnemonic_to_bip39seed(mnemonic, passphrase)
   master_private_key, master_chain_code = bip39seed_to_bip32masternode(bip39seed)
   private_key, chain_code = master_private_key, master_chain_code
   for i in derivation_path:
       private_key, chain_code = derive_bip32childkey(private_key, chain_code, i)
   return private_key


if __name__ == '__main__':
   import sys
   with open(sys.argv[1], 'r') as f:
       mnemonic = ' '.join(f.read().split())

   private_key = mnemonic_to_private_key(mnemonic,
           str_derivation_path=f'{ETH_DERIVATION_PATH}/0')
   public_key = PublicKey(private_key)

   print(f'privkey: {binascii.hexlify(private_key).decode("utf-8")}')
   print(f'pubkey:  {binascii.hexlify(bytes(public_key)).decode("utf-8")}')
   print(f'address: {public_key.address()}')

引用自:https://ethereum.stackexchange.com/questions/72815