line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Bitcoin::Crypto::Key::ExtPrivate; |
2
|
|
|
|
|
|
|
$Bitcoin::Crypto::Key::ExtPrivate::VERSION = '2.000_01'; # TRIAL |
3
|
|
|
|
|
|
|
$Bitcoin::Crypto::Key::ExtPrivate::VERSION = '2.00001'; |
4
|
8
|
|
|
8
|
|
74956
|
use v5.10; |
|
8
|
|
|
|
|
48
|
|
5
|
8
|
|
|
8
|
|
53
|
use strict; |
|
8
|
|
|
|
|
20
|
|
|
8
|
|
|
|
|
200
|
|
6
|
8
|
|
|
8
|
|
111
|
use warnings; |
|
8
|
|
|
|
|
63
|
|
|
8
|
|
|
|
|
201
|
|
7
|
8
|
|
|
8
|
|
1241
|
use Moo; |
|
8
|
|
|
|
|
15165
|
|
|
8
|
|
|
|
|
75
|
|
8
|
8
|
|
|
8
|
|
10136
|
use Crypt::Mac::HMAC qw(hmac); |
|
8
|
|
|
|
|
15395
|
|
|
8
|
|
|
|
|
501
|
|
9
|
8
|
|
|
8
|
|
1694
|
use Bitcoin::BIP39 qw(bip39_mnemonic_to_entropy); |
|
8
|
|
|
|
|
4848
|
|
|
8
|
|
|
|
|
474
|
|
10
|
8
|
|
|
8
|
|
1949
|
use Type::Params -sigs; |
|
8
|
|
|
|
|
265688
|
|
|
8
|
|
|
|
|
122
|
|
11
|
|
|
|
|
|
|
|
12
|
8
|
|
|
8
|
|
9090
|
use Bitcoin::Crypto::BIP44; |
|
8
|
|
|
|
|
40
|
|
|
8
|
|
|
|
|
317
|
|
13
|
8
|
|
|
8
|
|
4229
|
use Bitcoin::Crypto::Key::ExtPublic; |
|
8
|
|
|
|
|
40
|
|
|
8
|
|
|
|
|
403
|
|
14
|
8
|
|
|
8
|
|
67
|
use Bitcoin::Crypto::Constants; |
|
8
|
|
|
|
|
24
|
|
|
8
|
|
|
|
|
248
|
|
15
|
8
|
|
|
8
|
|
54
|
use Bitcoin::Crypto::Helpers qw(ensure_length carp_once); |
|
8
|
|
|
|
|
45
|
|
|
8
|
|
|
|
|
520
|
|
16
|
8
|
|
|
8
|
|
68
|
use Bitcoin::Crypto::Util qw(mnemonic_to_seed); |
|
8
|
|
|
|
|
37
|
|
|
8
|
|
|
|
|
678
|
|
17
|
8
|
|
|
8
|
|
91
|
use Bitcoin::Crypto::Types qw(Object Str ByteStr HashRef Maybe); |
|
8
|
|
|
|
|
32
|
|
|
8
|
|
|
|
|
101
|
|
18
|
8
|
|
|
8
|
|
26400
|
use Bitcoin::Crypto::Exception; |
|
8
|
|
|
|
|
28
|
|
|
8
|
|
|
|
|
189
|
|
19
|
|
|
|
|
|
|
|
20
|
8
|
|
|
8
|
|
49
|
use namespace::clean; |
|
8
|
|
|
|
|
42
|
|
|
8
|
|
|
|
|
124
|
|
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
with qw(Bitcoin::Crypto::Role::ExtendedKey); |
23
|
|
|
|
|
|
|
|
24
|
841
|
|
|
841
|
|
5720
|
sub _is_private { 1 } |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
sub generate_mnemonic |
27
|
|
|
|
|
|
|
{ |
28
|
0
|
|
|
0
|
1
|
0
|
shift; |
29
|
0
|
|
|
|
|
0
|
carp_once 'Bitcoin::Crypto::Key::ExtPrivate->generate_mnemonic is deprecated.' |
30
|
|
|
|
|
|
|
. ' Use generate_mnemonic function from Bitcoin::Crypto::Util instead.'; |
31
|
|
|
|
|
|
|
|
32
|
0
|
|
|
|
|
0
|
goto \&Bitcoin::Crypto::Util::generate_mnemonic; |
33
|
|
|
|
|
|
|
} |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
sub mnemonic_from_entropy |
36
|
|
|
|
|
|
|
{ |
37
|
0
|
|
|
0
|
1
|
0
|
shift; |
38
|
0
|
|
|
|
|
0
|
carp_once 'Bitcoin::Crypto::Key::ExtPrivate->mnemonic_from_entropy is deprecated.' |
39
|
|
|
|
|
|
|
. ' Use mnemonic_from_entropy function from Bitcoin::Crypto::Util instead.'; |
40
|
|
|
|
|
|
|
|
41
|
0
|
|
|
|
|
0
|
goto \&Bitcoin::Crypto::Util::mnemonic_from_entropy; |
42
|
|
|
|
|
|
|
} |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
signature_for from_mnemonic => ( |
45
|
|
|
|
|
|
|
method => Str, |
46
|
|
|
|
|
|
|
positional => [Str, Maybe [Str], {default => ''}, Maybe [Str], {default => undef}], |
47
|
|
|
|
|
|
|
); |
48
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
sub from_mnemonic |
50
|
|
|
|
|
|
|
{ |
51
|
|
|
|
|
|
|
my ($class, $mnemonic, $password, $lang) = @_; |
52
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
if (defined $lang) { |
54
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
# checks validity of seed in given language |
56
|
|
|
|
|
|
|
# requires Wordlist::LANG::BIP39 module for given LANG |
57
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception::MnemonicCheck->trap_into( |
58
|
|
|
|
|
|
|
sub { |
59
|
|
|
|
|
|
|
bip39_mnemonic_to_entropy( |
60
|
|
|
|
|
|
|
mnemonic => $mnemonic, |
61
|
|
|
|
|
|
|
language => $lang |
62
|
|
|
|
|
|
|
); |
63
|
|
|
|
|
|
|
} |
64
|
|
|
|
|
|
|
); |
65
|
|
|
|
|
|
|
} |
66
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
return $class->from_seed(mnemonic_to_seed($mnemonic, $password)); |
68
|
|
|
|
|
|
|
} |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
signature_for from_seed => ( |
71
|
|
|
|
|
|
|
method => Str, |
72
|
|
|
|
|
|
|
positional => [ByteStr], |
73
|
|
|
|
|
|
|
); |
74
|
|
|
|
|
|
|
|
75
|
|
|
|
|
|
|
sub from_seed |
76
|
|
|
|
|
|
|
{ |
77
|
|
|
|
|
|
|
my ($class, $seed) = @_; |
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
my $bytes = hmac('SHA512', 'Bitcoin seed', $seed); |
80
|
|
|
|
|
|
|
my $key = substr $bytes, 0, 32; |
81
|
|
|
|
|
|
|
my $cc = substr $bytes, 32, 32; |
82
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
return $class->new( |
84
|
|
|
|
|
|
|
key_instance => $key, |
85
|
|
|
|
|
|
|
chain_code => $cc, |
86
|
|
|
|
|
|
|
); |
87
|
|
|
|
|
|
|
} |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
signature_for get_public_key => ( |
90
|
|
|
|
|
|
|
method => Object, |
91
|
|
|
|
|
|
|
positional => [], |
92
|
|
|
|
|
|
|
); |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
sub get_public_key |
95
|
|
|
|
|
|
|
{ |
96
|
|
|
|
|
|
|
my ($self) = @_; |
97
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
my $public = Bitcoin::Crypto::Key::ExtPublic->new( |
99
|
|
|
|
|
|
|
key_instance => $self->raw_key('public'), |
100
|
|
|
|
|
|
|
chain_code => $self->chain_code, |
101
|
|
|
|
|
|
|
child_number => $self->child_number, |
102
|
|
|
|
|
|
|
parent_fingerprint => $self->parent_fingerprint, |
103
|
|
|
|
|
|
|
depth => $self->depth, |
104
|
|
|
|
|
|
|
network => $self->network, |
105
|
|
|
|
|
|
|
purpose => $self->purpose, |
106
|
|
|
|
|
|
|
); |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
return $public; |
109
|
|
|
|
|
|
|
} |
110
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
signature_for derive_key_bip44 => ( |
112
|
|
|
|
|
|
|
method => Object, |
113
|
|
|
|
|
|
|
positional => [HashRef, {slurpy => 1}], |
114
|
|
|
|
|
|
|
); |
115
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
sub derive_key_bip44 |
117
|
|
|
|
|
|
|
{ |
118
|
|
|
|
|
|
|
my ($self, $data) = @_; |
119
|
|
|
|
|
|
|
my $path = Bitcoin::Crypto::BIP44->new( |
120
|
|
|
|
|
|
|
%{$data}, |
121
|
|
|
|
|
|
|
coin_type => $self, |
122
|
|
|
|
|
|
|
); |
123
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
return $self->derive_key($path); |
125
|
|
|
|
|
|
|
} |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
sub _derive_key_partial |
128
|
|
|
|
|
|
|
{ |
129
|
185
|
|
|
185
|
|
496
|
my ($self, $child_num, $hardened) = @_; |
130
|
|
|
|
|
|
|
|
131
|
185
|
|
|
|
|
298
|
my $hmac_data; |
132
|
185
|
100
|
|
|
|
493
|
if ($hardened) { |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
# zero byte |
135
|
80
|
|
|
|
|
174
|
$hmac_data .= "\x00"; |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
# key data - 32 bytes |
138
|
80
|
|
|
|
|
270
|
$hmac_data .= ensure_length $self->raw_key, Bitcoin::Crypto::Constants::key_max_length; |
139
|
|
|
|
|
|
|
} |
140
|
|
|
|
|
|
|
else { |
141
|
|
|
|
|
|
|
# public key data - SEC compressed form |
142
|
105
|
|
|
|
|
343
|
$hmac_data .= $self->raw_key('public_compressed'); |
143
|
|
|
|
|
|
|
} |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
# child number - 4 bytes |
146
|
185
|
|
|
|
|
969
|
$hmac_data .= ensure_length pack('N', $child_num), 4; |
147
|
|
|
|
|
|
|
|
148
|
185
|
|
|
|
|
2339
|
my $data = hmac('SHA512', $self->chain_code, $hmac_data); |
149
|
185
|
|
|
|
|
557
|
my $chain_code = substr $data, 32, 32; |
150
|
|
|
|
|
|
|
|
151
|
185
|
|
|
|
|
995
|
my $number = Math::BigInt->from_bytes(substr $data, 0, 32); |
152
|
185
|
|
|
|
|
21621
|
my $key_num = Math::BigInt->from_bytes($self->raw_key); |
153
|
185
|
|
|
|
|
17281
|
my $n_order = $self->curve_order; |
154
|
|
|
|
|
|
|
|
155
|
185
|
50
|
|
|
|
49364
|
Bitcoin::Crypto::Exception::KeyDerive->raise( |
156
|
|
|
|
|
|
|
"key $child_num in sequence was found invalid" |
157
|
|
|
|
|
|
|
) if $number->bge($n_order); |
158
|
|
|
|
|
|
|
|
159
|
185
|
|
|
|
|
6314
|
$number->badd($key_num); |
160
|
185
|
|
|
|
|
12366
|
$number->bmod($n_order); |
161
|
|
|
|
|
|
|
|
162
|
185
|
50
|
|
|
|
15378
|
Bitcoin::Crypto::Exception::KeyDerive->raise( |
163
|
|
|
|
|
|
|
"key $child_num in sequence was found invalid" |
164
|
|
|
|
|
|
|
) if $number->beq(0); |
165
|
|
|
|
|
|
|
|
166
|
185
|
|
|
|
|
36346
|
return $self->new( |
167
|
|
|
|
|
|
|
key_instance => $number->as_bytes, |
168
|
|
|
|
|
|
|
chain_code => $chain_code, |
169
|
|
|
|
|
|
|
child_number => $child_num, |
170
|
|
|
|
|
|
|
parent_fingerprint => $self->get_fingerprint, |
171
|
|
|
|
|
|
|
depth => $self->depth + 1, |
172
|
|
|
|
|
|
|
); |
173
|
|
|
|
|
|
|
} |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
### DEPRECATED |
176
|
|
|
|
|
|
|
|
177
|
|
|
|
|
|
|
sub from_hex_seed |
178
|
|
|
|
|
|
|
{ |
179
|
0
|
|
|
0
|
1
|
|
my ($class, $seed) = @_; |
180
|
|
|
|
|
|
|
|
181
|
0
|
|
|
|
|
|
carp_once "$class->from_hex_seed(\$seed) is now deprecated. Use $class->from_seed([hex => \$seed]) instead"; |
182
|
|
|
|
|
|
|
|
183
|
0
|
|
|
|
|
|
return $class->from_seed([hex => $seed]); |
184
|
|
|
|
|
|
|
} |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
1; |
187
|
|
|
|
|
|
|
|
188
|
|
|
|
|
|
|
__END__ |
189
|
|
|
|
|
|
|
=head1 NAME |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
Bitcoin::Crypto::Key::ExtPrivate - Bitcoin extended private keys |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
=head1 SYNOPSIS |
194
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
use Bitcoin::Crypto qw(btc_extprv); |
196
|
|
|
|
|
|
|
use Bitcoin::Crypto::Util qw(generate_mnemonic to_format) |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
# generate mnemonic words first |
199
|
|
|
|
|
|
|
my $mnemonic = generate_mnemonic; |
200
|
|
|
|
|
|
|
print "Your mnemonic is: $mnemonic"; |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
# create ExtPrivateKey from mnemonic (without password) |
203
|
|
|
|
|
|
|
my $key = btc_extprv->from_mnemonic($mnemonic); |
204
|
|
|
|
|
|
|
my $ser_key = to_format [base58 => $key->to_serialized]; |
205
|
|
|
|
|
|
|
print "Your exported master key is: $ser_key"; |
206
|
|
|
|
|
|
|
|
207
|
|
|
|
|
|
|
# derive child private key |
208
|
|
|
|
|
|
|
my $path = "m/0'"; |
209
|
|
|
|
|
|
|
my $child_key = $key->derive_key($path); |
210
|
|
|
|
|
|
|
my $ser_child_key = to_format [base58 => $child_key->to_serialized]; |
211
|
|
|
|
|
|
|
print "Your exported $path child key is: $ser_child_key"; |
212
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
# create basic keypair |
214
|
|
|
|
|
|
|
my $basic_private = $child_key->get_basic_key; |
215
|
|
|
|
|
|
|
my $basic_public = $child_key->get_public_key->get_basic_key; |
216
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
=head1 DESCRIPTION |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
This class allows you to create an extended private key instance. |
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
You can use an extended private key to: |
222
|
|
|
|
|
|
|
|
223
|
|
|
|
|
|
|
=over 2 |
224
|
|
|
|
|
|
|
|
225
|
|
|
|
|
|
|
=item * generate extended public keys |
226
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
=item * derive extended keys using a path |
228
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
=item * restore keys from mnemonic codes, seeds and base58 format |
230
|
|
|
|
|
|
|
|
231
|
|
|
|
|
|
|
=back |
232
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
see L<Bitcoin::Crypto::Network> if you want to work with other networks than |
234
|
|
|
|
|
|
|
Bitcoin Mainnet. |
235
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
=head1 METHODS |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
=head2 new |
239
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
Constructor is reserved for internal and advanced use only. Use |
241
|
|
|
|
|
|
|
L</from_mnemonic>, L</from_seed> or L</from_serialized> instead. |
242
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
=head2 generate_mnemonic |
244
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
$mnemonic = $class->generate_mnemonic($len = 128, $lang = 'en') |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
Deprecated - see L<Bitcoin::Crypto::Util/generate_mnemonic>. |
248
|
|
|
|
|
|
|
|
249
|
|
|
|
|
|
|
=head2 mnemonic_from_entropy |
250
|
|
|
|
|
|
|
|
251
|
|
|
|
|
|
|
$mnemonic = $class->mnemonic_from_entropy($bytes, $lang = 'en') |
252
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
Deprecated - see L<Bitcoin::Crypto::Util/mnemonic_from_entropy>. |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
=head2 from_mnemonic |
256
|
|
|
|
|
|
|
|
257
|
|
|
|
|
|
|
$key_object = $class->from_mnemonic($mnemonic, $password = '', $lang = undef) |
258
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
Creates a new key from given mnemonic and password. |
260
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
Note that technically any password is correct and there's no way to tell if it |
262
|
|
|
|
|
|
|
was mistaken. |
263
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
If you need to validate if C<$mnemonic> is a valid mnemonic you should specify |
265
|
|
|
|
|
|
|
C<$lang>, e.g. 'en'. |
266
|
|
|
|
|
|
|
|
267
|
|
|
|
|
|
|
If no C<$lang> is given then any string passed as C<$mnemonic> will produce a |
268
|
|
|
|
|
|
|
valid key. |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
Returns a new instance of this class. |
271
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
B<Important note about unicode:> this function only accepts UTF8-decoded |
273
|
|
|
|
|
|
|
strings (both C<$mnemonic> and C<$password>), but can't detect whether it got |
274
|
|
|
|
|
|
|
it or not. This will only become a problem if you use non-ascii mnemonic and/or |
275
|
|
|
|
|
|
|
password. If there's a possibility of non-ascii, always use utf8 and set |
276
|
|
|
|
|
|
|
binmodes to get decoded (wide) characters to avoid problems recovering your |
277
|
|
|
|
|
|
|
wallet. |
278
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
=head2 from_seed |
280
|
|
|
|
|
|
|
|
281
|
|
|
|
|
|
|
$key_object = $class->from_seed($seed) |
282
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
Creates and returns a new key from seed, which can be any data of any length. |
284
|
|
|
|
|
|
|
C<$seed> is expected to be a byte string. |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
=head2 from_hex_seed |
287
|
|
|
|
|
|
|
|
288
|
|
|
|
|
|
|
Deprecated. Use C<< $class->from_seed([hex => $seed]) >> instead. |
289
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
=head2 to_serialized |
291
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
$serialized = $object->to_serialized() |
293
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
Returns the key serialized in format specified in BIP32 as byte string. |
295
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
=head2 to_serialized_base58 |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
Deprecated. Use C<< to_format [base58 => $key->to_serialized] >> instead. |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
=head2 from_serialized |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
$key_object = $class->from_serialized($serialized, $network = undef) |
303
|
|
|
|
|
|
|
|
304
|
|
|
|
|
|
|
Tries to unserialize byte string C<$serialized> with format specified in BIP32. |
305
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
Dies on errors. If multiple networks match serialized data specify C<$network> |
307
|
|
|
|
|
|
|
manually (id of the network) to avoid exception. |
308
|
|
|
|
|
|
|
|
309
|
|
|
|
|
|
|
=head2 from_serialized_base58 |
310
|
|
|
|
|
|
|
|
311
|
|
|
|
|
|
|
Deprecated. Use C<< $class->from_serialized([base58 => $base58]) >> instead. |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
=head2 set_network |
314
|
|
|
|
|
|
|
|
315
|
|
|
|
|
|
|
$key_object = $object->set_network($val) |
316
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
Change key's network state to C<$val>. It can be either network name present in |
318
|
|
|
|
|
|
|
L<Bitcoin::Crypto::Network> package or an instance of this class. |
319
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
Returns current key instance. |
321
|
|
|
|
|
|
|
|
322
|
|
|
|
|
|
|
=head2 get_public_key |
323
|
|
|
|
|
|
|
|
324
|
|
|
|
|
|
|
$public_key_object = $object->get_public_key() |
325
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
Returns instance of L<Bitcoin::Crypto::Key::ExtPublic> generated from the |
327
|
|
|
|
|
|
|
private key. |
328
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
=head2 get_basic_key |
330
|
|
|
|
|
|
|
|
331
|
|
|
|
|
|
|
$basic_key_object = $object->get_basic_key() |
332
|
|
|
|
|
|
|
|
333
|
|
|
|
|
|
|
Returns the key in basic format: L<Bitcoin::Crypto::Key::Private> |
334
|
|
|
|
|
|
|
|
335
|
|
|
|
|
|
|
=head2 derive_key |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
$derived_key_object = $object->derive_key($path) |
338
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
Performs extended key derivation as specified in BIP32 on the current key with |
340
|
|
|
|
|
|
|
C<$path>. Dies on error. |
341
|
|
|
|
|
|
|
|
342
|
|
|
|
|
|
|
See BIP32 document for details on derivation paths and methods. |
343
|
|
|
|
|
|
|
|
344
|
|
|
|
|
|
|
Returns a new extended key instance - result of a derivation. |
345
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
=head2 derive_key_bip44 |
347
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
$derived_key_object = $object->derive_key_bip44(%data) |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
A helper that constructs a L<Bitcoin::Crypto::BIP44> path from C<%data> and |
351
|
|
|
|
|
|
|
calls L</derive_key> with it. Refer to L<Bitcoin::Crypto::BIP44/Attributes> to |
352
|
|
|
|
|
|
|
see what you can include in C<%data>. |
353
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
Using this method instead of specifying BIP44 path yourself will make sure all |
355
|
|
|
|
|
|
|
features of BIP44 derivation will be enabled, like different prefixes for |
356
|
|
|
|
|
|
|
extended keys (C<xprv> / C<yprv> / C<zprv>) and address type generation |
357
|
|
|
|
|
|
|
checking. |
358
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
I<Note: coin_type parameter will be ignored, and the current network |
360
|
|
|
|
|
|
|
configuration set in the extended key will be used.> |
361
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
=head2 get_fingerprint |
363
|
|
|
|
|
|
|
|
364
|
|
|
|
|
|
|
$fingerprint = $object->get_fingerprint($len = 4) |
365
|
|
|
|
|
|
|
|
366
|
|
|
|
|
|
|
Returns a fingerprint of the extended key of C<$len> length (byte string) |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
=head1 EXCEPTIONS |
369
|
|
|
|
|
|
|
|
370
|
|
|
|
|
|
|
This module throws an instance of L<Bitcoin::Crypto::Exception> if it |
371
|
|
|
|
|
|
|
encounters an error. It can produce the following error types from the |
372
|
|
|
|
|
|
|
L<Bitcoin::Crypto::Exception> namespace: |
373
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
=over 2 |
375
|
|
|
|
|
|
|
|
376
|
|
|
|
|
|
|
=item * MnemonicGenerate - mnemonic couldn't be generated correctly |
377
|
|
|
|
|
|
|
|
378
|
|
|
|
|
|
|
=item * MnemonicCheck - mnemonic didn't pass the validity check |
379
|
|
|
|
|
|
|
|
380
|
|
|
|
|
|
|
=item * KeyDerive - key couldn't be derived correctly |
381
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
=item * KeyCreate - key couldn't be created correctly |
383
|
|
|
|
|
|
|
|
384
|
|
|
|
|
|
|
=item * NetworkConfig - incomplete or corrupted network configuration |
385
|
|
|
|
|
|
|
|
386
|
|
|
|
|
|
|
=back |
387
|
|
|
|
|
|
|
|
388
|
|
|
|
|
|
|
=head1 SEE ALSO |
389
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
=over 2 |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
=item L<Bitcoin::Crypto::Key::ExtPublic> |
393
|
|
|
|
|
|
|
|
394
|
|
|
|
|
|
|
=item L<Bitcoin::Crypto::Network> |
395
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
=back |
397
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
=cut |
399
|
|
|
|
|
|
|
|