line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Bitcoin::Crypto::Util; |
2
|
|
|
|
|
|
|
$Bitcoin::Crypto::Util::VERSION = '2.000_01'; # TRIAL |
3
|
|
|
|
|
|
|
$Bitcoin::Crypto::Util::VERSION = '2.00001'; |
4
|
31
|
|
|
31
|
|
61906
|
use v5.10; |
|
31
|
|
|
|
|
124
|
|
5
|
31
|
|
|
31
|
|
174
|
use strict; |
|
31
|
|
|
|
|
71
|
|
|
31
|
|
|
|
|
684
|
|
6
|
31
|
|
|
31
|
|
229
|
use warnings; |
|
31
|
|
|
|
|
84
|
|
|
31
|
|
|
|
|
1044
|
|
7
|
31
|
|
|
31
|
|
173
|
use Exporter qw(import); |
|
31
|
|
|
|
|
73
|
|
|
31
|
|
|
|
|
1063
|
|
8
|
31
|
|
|
31
|
|
9319
|
use Crypt::PK::ECC; |
|
31
|
|
|
|
|
186866
|
|
|
31
|
|
|
|
|
1452
|
|
9
|
31
|
|
|
31
|
|
17706
|
use Unicode::Normalize; |
|
31
|
|
|
|
|
68444
|
|
|
31
|
|
|
|
|
2142
|
|
10
|
31
|
|
|
31
|
|
13520
|
use Crypt::KeyDerivation qw(pbkdf2); |
|
31
|
|
|
|
|
9801
|
|
|
31
|
|
|
|
|
1879
|
|
11
|
31
|
|
|
31
|
|
15822
|
use Encode qw(encode); |
|
31
|
|
|
|
|
294723
|
|
|
31
|
|
|
|
|
2219
|
|
12
|
31
|
|
|
31
|
|
12928
|
use Crypt::Digest::RIPEMD160 qw(ripemd160); |
|
31
|
|
|
|
|
19533
|
|
|
31
|
|
|
|
|
1894
|
|
13
|
31
|
|
|
31
|
|
7116
|
use Crypt::Digest::SHA256 qw(sha256); |
|
31
|
|
|
|
|
10199
|
|
|
31
|
|
|
|
|
1652
|
|
14
|
31
|
|
|
31
|
|
12639
|
use Bitcoin::BIP39 qw(gen_bip39_mnemonic entropy_to_bip39_mnemonic); |
|
31
|
|
|
|
|
39113
|
|
|
31
|
|
|
|
|
2058
|
|
15
|
31
|
|
|
31
|
|
6735
|
use Type::Params -sigs; |
|
31
|
|
|
|
|
1391617
|
|
|
31
|
|
|
|
|
324
|
|
16
|
|
|
|
|
|
|
|
17
|
31
|
|
|
31
|
|
20881
|
use Bitcoin::Crypto::Constants; |
|
31
|
|
|
|
|
126
|
|
|
31
|
|
|
|
|
1014
|
|
18
|
31
|
|
|
31
|
|
7276
|
use Bitcoin::Crypto::Types qw(Str ByteStr FormatStr InstanceOf Maybe PositiveInt Tuple); |
|
31
|
|
|
|
|
254
|
|
|
31
|
|
|
|
|
306
|
|
19
|
31
|
|
|
31
|
|
140534
|
use Bitcoin::Crypto::Exception; |
|
31
|
|
|
|
|
80
|
|
|
31
|
|
|
|
|
35557
|
|
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
our @EXPORT_OK = qw( |
22
|
|
|
|
|
|
|
validate_wif |
23
|
|
|
|
|
|
|
validate_segwit |
24
|
|
|
|
|
|
|
get_key_type |
25
|
|
|
|
|
|
|
get_public_key_compressed |
26
|
|
|
|
|
|
|
generate_mnemonic |
27
|
|
|
|
|
|
|
mnemonic_from_entropy |
28
|
|
|
|
|
|
|
mnemonic_to_seed |
29
|
|
|
|
|
|
|
get_path_info |
30
|
|
|
|
|
|
|
to_format |
31
|
|
|
|
|
|
|
hash160 |
32
|
|
|
|
|
|
|
hash256 |
33
|
|
|
|
|
|
|
); |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
our %EXPORT_TAGS = (all => [@EXPORT_OK]); |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
signature_for validate_wif => ( |
38
|
|
|
|
|
|
|
positional => [Str], |
39
|
|
|
|
|
|
|
); |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
sub validate_wif |
42
|
|
|
|
|
|
|
{ |
43
|
|
|
|
|
|
|
my ($wif) = @_; |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
require Bitcoin::Crypto::Base58; |
46
|
|
|
|
|
|
|
my $byte_wif = Bitcoin::Crypto::Base58::decode_base58check($wif); |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
my $last_byte = substr $byte_wif, -1; |
49
|
|
|
|
|
|
|
if (length $byte_wif == Bitcoin::Crypto::Constants::key_max_length + 2) { |
50
|
|
|
|
|
|
|
return $last_byte eq Bitcoin::Crypto::Constants::wif_compressed_byte; |
51
|
|
|
|
|
|
|
} |
52
|
|
|
|
|
|
|
else { |
53
|
|
|
|
|
|
|
return length $byte_wif == Bitcoin::Crypto::Constants::key_max_length + 1; |
54
|
|
|
|
|
|
|
} |
55
|
|
|
|
|
|
|
} |
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
signature_for validate_segwit => ( |
58
|
|
|
|
|
|
|
positional => [ByteStr], |
59
|
|
|
|
|
|
|
); |
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
sub validate_segwit |
62
|
|
|
|
|
|
|
{ |
63
|
|
|
|
|
|
|
my ($program) = @_; |
64
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
my $version = unpack 'C', $program; |
66
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception::SegwitProgram->raise( |
67
|
|
|
|
|
|
|
'incorrect witness program version ' . ($version // '[null]') |
68
|
|
|
|
|
|
|
) unless defined $version && $version >= 0 && $version <= Bitcoin::Crypto::Constants::max_witness_version; |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
$program = substr $program, 1; |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
# common validator |
73
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception::SegwitProgram->raise( |
74
|
|
|
|
|
|
|
'incorrect witness program length' |
75
|
|
|
|
|
|
|
) unless length $program >= 2 && length $program <= 40; |
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
if ($version == 0) { |
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
# SegWit validator |
80
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception::SegwitProgram->raise( |
81
|
|
|
|
|
|
|
'incorrect witness program length (segwit)' |
82
|
|
|
|
|
|
|
) unless length $program == 20 || length $program == 32; |
83
|
|
|
|
|
|
|
} |
84
|
|
|
|
|
|
|
elsif ($version == 1) { |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
# Taproot validator |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
# taproot outputs are 32 bytes, but other lengths "remain unencumbered" |
89
|
|
|
|
|
|
|
# do not throw this exception to make bip350 test suite pass (10-Bech32.t) |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
# Bitcoin::Crypto::Exception::SegwitProgram->raise( |
92
|
|
|
|
|
|
|
# 'incorrect witness program length (taproot)' |
93
|
|
|
|
|
|
|
# ) unless length $program == 32; |
94
|
|
|
|
|
|
|
} |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
return $version; |
97
|
|
|
|
|
|
|
} |
98
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
signature_for get_key_type => ( |
100
|
|
|
|
|
|
|
positional => [ByteStr], |
101
|
|
|
|
|
|
|
); |
102
|
|
|
|
|
|
|
|
103
|
|
|
|
|
|
|
sub get_key_type |
104
|
|
|
|
|
|
|
{ |
105
|
|
|
|
|
|
|
my ($entropy) = @_; |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
return 0 if defined get_public_key_compressed($entropy); |
108
|
|
|
|
|
|
|
return 1 |
109
|
|
|
|
|
|
|
if length $entropy <= Bitcoin::Crypto::Constants::key_max_length; |
110
|
|
|
|
|
|
|
return undef; |
111
|
|
|
|
|
|
|
} |
112
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
signature_for get_public_key_compressed => ( |
114
|
|
|
|
|
|
|
positional => [ByteStr], |
115
|
|
|
|
|
|
|
); |
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
sub get_public_key_compressed |
118
|
|
|
|
|
|
|
{ |
119
|
|
|
|
|
|
|
my ($entropy) = @_; |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
my $curve_size = Bitcoin::Crypto::Constants::key_max_length; |
122
|
|
|
|
|
|
|
my $octet = substr $entropy, 0, 1; |
123
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
my $has_unc_oc = $octet eq "\x04" || $octet eq "\x06" || $octet eq "\x07"; |
125
|
|
|
|
|
|
|
my $is_unc = $has_unc_oc && length $entropy == 2 * $curve_size + 1; |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
my $has_com_oc = $octet eq "\x02" || $octet eq "\x03"; |
128
|
|
|
|
|
|
|
my $is_com = $has_com_oc && length $entropy == $curve_size + 1; |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
return 1 if $is_com; |
131
|
|
|
|
|
|
|
return 0 if $is_unc; |
132
|
|
|
|
|
|
|
return undef; |
133
|
|
|
|
|
|
|
} |
134
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
signature_for mnemonic_to_seed => ( |
136
|
|
|
|
|
|
|
positional => [Str, Maybe [Str], {optional => 1}], |
137
|
|
|
|
|
|
|
); |
138
|
|
|
|
|
|
|
|
139
|
|
|
|
|
|
|
sub mnemonic_to_seed |
140
|
|
|
|
|
|
|
{ |
141
|
|
|
|
|
|
|
my ($mnemonic, $password) = @_; |
142
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
$mnemonic = encode('UTF-8', NFKD($mnemonic)); |
144
|
|
|
|
|
|
|
$password = encode('UTF-8', NFKD('mnemonic' . ($password // ''))); |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
return pbkdf2($mnemonic, $password, 2048, 'SHA512', 64); |
147
|
|
|
|
|
|
|
} |
148
|
|
|
|
|
|
|
|
149
|
|
|
|
|
|
|
signature_for generate_mnemonic => ( |
150
|
|
|
|
|
|
|
positional => [PositiveInt, {default => 128}, Str, {default => 'en'}], |
151
|
|
|
|
|
|
|
); |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
sub generate_mnemonic |
154
|
|
|
|
|
|
|
{ |
155
|
|
|
|
|
|
|
my ($len, $lang) = @_; |
156
|
|
|
|
|
|
|
my ($min_len, $len_div, $max_len) = (128, 32, 256); |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
# bip39 specification values |
159
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception::MnemonicGenerate->raise( |
160
|
|
|
|
|
|
|
"required entropy of between $min_len and $max_len bits, divisible by $len_div" |
161
|
|
|
|
|
|
|
) if $len < $min_len || $len > $max_len || $len % $len_div != 0; |
162
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
return Bitcoin::Crypto::Exception::MnemonicGenerate->trap_into( |
164
|
|
|
|
|
|
|
sub { |
165
|
|
|
|
|
|
|
my $ret = gen_bip39_mnemonic(bits => $len, language => $lang); |
166
|
|
|
|
|
|
|
$ret->{mnemonic}; |
167
|
|
|
|
|
|
|
} |
168
|
|
|
|
|
|
|
); |
169
|
|
|
|
|
|
|
} |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
signature_for mnemonic_from_entropy => ( |
172
|
|
|
|
|
|
|
positional => [ByteStr, Str, {default => 'en'}], |
173
|
|
|
|
|
|
|
); |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
sub mnemonic_from_entropy |
176
|
|
|
|
|
|
|
{ |
177
|
|
|
|
|
|
|
my ($entropy, $lang) = @_; |
178
|
|
|
|
|
|
|
|
179
|
|
|
|
|
|
|
return Bitcoin::Crypto::Exception::MnemonicGenerate->trap_into( |
180
|
|
|
|
|
|
|
sub { |
181
|
|
|
|
|
|
|
entropy_to_bip39_mnemonic( |
182
|
|
|
|
|
|
|
entropy => $entropy, |
183
|
|
|
|
|
|
|
language => $lang |
184
|
|
|
|
|
|
|
); |
185
|
|
|
|
|
|
|
} |
186
|
|
|
|
|
|
|
); |
187
|
|
|
|
|
|
|
} |
188
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
signature_for get_path_info => ( |
190
|
|
|
|
|
|
|
positional => [Str | InstanceOf ['Bitcoin::Crypto::BIP44']], |
191
|
|
|
|
|
|
|
); |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
sub get_path_info |
194
|
|
|
|
|
|
|
{ |
195
|
|
|
|
|
|
|
my ($path) = @_; |
196
|
|
|
|
|
|
|
if ($path =~ m{\A ([mM]) ((?: / \d+ '?)*) \z}x) { |
197
|
|
|
|
|
|
|
my ($head, $rest) = ($1, $2); |
198
|
|
|
|
|
|
|
my @path; |
199
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
if (defined $rest && length $rest > 0) { |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
# remove leading slash (after $head) |
203
|
|
|
|
|
|
|
substr $rest, 0, 1, ''; |
204
|
|
|
|
|
|
|
|
205
|
|
|
|
|
|
|
for my $part (split '/', $rest) { |
206
|
|
|
|
|
|
|
my $is_hardened = $part =~ tr/'//d; |
207
|
|
|
|
|
|
|
|
208
|
|
|
|
|
|
|
return undef if $part >= Bitcoin::Crypto::Constants::max_child_keys; |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
$part += Bitcoin::Crypto::Constants::max_child_keys if $is_hardened; |
211
|
|
|
|
|
|
|
push @path, $part; |
212
|
|
|
|
|
|
|
} |
213
|
|
|
|
|
|
|
} |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
return { |
216
|
|
|
|
|
|
|
private => $head eq 'm', |
217
|
|
|
|
|
|
|
path => \@path, |
218
|
|
|
|
|
|
|
}; |
219
|
|
|
|
|
|
|
} |
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
return undef; |
222
|
|
|
|
|
|
|
} |
223
|
|
|
|
|
|
|
|
224
|
|
|
|
|
|
|
# use signature, not signature_for, because of the prototype |
225
|
|
|
|
|
|
|
sub to_format ($) |
226
|
|
|
|
|
|
|
{ |
227
|
170
|
|
|
170
|
1
|
9669
|
state $sig = signature(positional => [Tuple [FormatStr, ByteStr]]); |
228
|
170
|
|
|
|
|
194977
|
my ($format, $data) = @{($sig->(@_))[0]}; |
|
170
|
|
|
|
|
626
|
|
229
|
|
|
|
|
|
|
|
230
|
170
|
100
|
|
|
|
42862
|
if ($format eq 'hex') { |
|
|
100
|
|
|
|
|
|
231
|
90
|
|
|
|
|
352
|
$data = unpack 'H*', $data; |
232
|
|
|
|
|
|
|
} |
233
|
|
|
|
|
|
|
elsif ($format eq 'base58') { |
234
|
79
|
|
|
|
|
500
|
require Bitcoin::Crypto::Base58; |
235
|
79
|
|
|
|
|
287
|
$data = Bitcoin::Crypto::Base58::encode_base58check($data); |
236
|
|
|
|
|
|
|
} |
237
|
|
|
|
|
|
|
|
238
|
170
|
|
|
|
|
18863
|
return $data; |
239
|
|
|
|
|
|
|
} |
240
|
|
|
|
|
|
|
|
241
|
|
|
|
|
|
|
signature_for hash160 => ( |
242
|
|
|
|
|
|
|
positional => [ByteStr], |
243
|
|
|
|
|
|
|
); |
244
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
sub hash160 |
246
|
|
|
|
|
|
|
{ |
247
|
|
|
|
|
|
|
my ($data) = @_; |
248
|
|
|
|
|
|
|
|
249
|
|
|
|
|
|
|
return ripemd160(sha256($data)); |
250
|
|
|
|
|
|
|
} |
251
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
signature_for hash256 => ( |
253
|
|
|
|
|
|
|
positional => [ByteStr], |
254
|
|
|
|
|
|
|
); |
255
|
|
|
|
|
|
|
|
256
|
|
|
|
|
|
|
sub hash256 |
257
|
|
|
|
|
|
|
{ |
258
|
|
|
|
|
|
|
my ($data) = @_; |
259
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
return sha256(sha256($data)); |
261
|
|
|
|
|
|
|
} |
262
|
|
|
|
|
|
|
|
263
|
|
|
|
|
|
|
1; |
264
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
__END__ |
266
|
|
|
|
|
|
|
=head1 NAME |
267
|
|
|
|
|
|
|
|
268
|
|
|
|
|
|
|
Bitcoin::Crypto::Util - Utilities for working with Bitcoin |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
=head1 SYNOPSIS |
271
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
use Bitcoin::Crypto::Util qw( |
273
|
|
|
|
|
|
|
validate_wif |
274
|
|
|
|
|
|
|
validate_segwit |
275
|
|
|
|
|
|
|
get_key_type |
276
|
|
|
|
|
|
|
get_public_key_compressed |
277
|
|
|
|
|
|
|
generate_mnemonic |
278
|
|
|
|
|
|
|
mnemonic_from_entropy |
279
|
|
|
|
|
|
|
mnemonic_to_seed |
280
|
|
|
|
|
|
|
get_path_info |
281
|
|
|
|
|
|
|
to_format |
282
|
|
|
|
|
|
|
hash160 |
283
|
|
|
|
|
|
|
hash256 |
284
|
|
|
|
|
|
|
); |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
=head1 DESCRIPTION |
287
|
|
|
|
|
|
|
|
288
|
|
|
|
|
|
|
These are basic utilities for working with Bitcoin. They do not fit well as a |
289
|
|
|
|
|
|
|
part of other, more specialized packages. |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
=head1 FUNCTIONS |
292
|
|
|
|
|
|
|
|
293
|
|
|
|
|
|
|
=head2 validate_wif |
294
|
|
|
|
|
|
|
|
295
|
|
|
|
|
|
|
$bool = validate_wif($str); |
296
|
|
|
|
|
|
|
|
297
|
|
|
|
|
|
|
Ensures Base58 encoded string looks like encoded private key in WIF format. |
298
|
|
|
|
|
|
|
Throws an exception if C<$str> is not valid base58. |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
=head2 validate_segwit |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
$segwit_version = validate_segwit($program) |
303
|
|
|
|
|
|
|
|
304
|
|
|
|
|
|
|
Performs a segwit program validation on C<$program>, which is expected to be a |
305
|
|
|
|
|
|
|
byte string in which the first byte is a segwit version. |
306
|
|
|
|
|
|
|
|
307
|
|
|
|
|
|
|
The function returns the detected segwit program version. Note that it does not |
308
|
|
|
|
|
|
|
perform any more checks than ensuring the byte string is in correct format. |
309
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
The current implementation is in line with validations for segwit versions C<0> |
311
|
|
|
|
|
|
|
and C<1>. Future segwit version addresses will work just fine, but no special |
312
|
|
|
|
|
|
|
validation will be performed until implemented. |
313
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
Raises an exception (C<Bitcoin::Crypto::Exception::SegwitProgram>) on error. |
315
|
|
|
|
|
|
|
Returns the detected segwit program version. |
316
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
=head2 get_key_type |
318
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
$is_private = get_key_type($bytestr); |
320
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
Checks if the C<$bytestr> looks like a valid ASN X9.62 format (compressed / |
322
|
|
|
|
|
|
|
uncompressed / hybrid public key or private key entropy up to curve size bits). |
323
|
|
|
|
|
|
|
|
324
|
|
|
|
|
|
|
Returns boolean which states whether the key is private. Returns |
325
|
|
|
|
|
|
|
undef if C<$bytestr> does not look like a valid key entropy. |
326
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
=head2 get_public_key_compressed |
328
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
$is_compressed = get_public_key_compressed($bytestr); |
330
|
|
|
|
|
|
|
|
331
|
|
|
|
|
|
|
Checks if the C<$bytestr> looks like a valid ASN X9.62 format (compressed / |
332
|
|
|
|
|
|
|
uncompressed / hybrid public key). |
333
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
Returns boolean which states whether the key is compressed. Returns |
335
|
|
|
|
|
|
|
undef if C<$bytestr> does not look like a valid public key. |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
=head2 generate_mnemonic |
338
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
$mnemonic = generate_mnemonic($len = 128, $lang = 'en') |
340
|
|
|
|
|
|
|
|
341
|
|
|
|
|
|
|
Generates a new mnemonic code using L<Bytes::Random::Secure>. Default entropy |
342
|
|
|
|
|
|
|
is C<128> bits. This can be increased up to C<256> bits (increasing by C<32> |
343
|
|
|
|
|
|
|
bits each step) with C<$len> argument. |
344
|
|
|
|
|
|
|
|
345
|
|
|
|
|
|
|
Other languages than english require installation of additional modules |
346
|
|
|
|
|
|
|
language-specific for L<Bitcoin::BIP39>. |
347
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
Returns newly generated BIP39 mnemonic string. Dies when C<$len> is invalid |
349
|
|
|
|
|
|
|
(less than C<128>, more than C<256> or not divisible by C<32>). |
350
|
|
|
|
|
|
|
|
351
|
|
|
|
|
|
|
In some environments a problem may be encountered that causes the secure random |
352
|
|
|
|
|
|
|
bytes generator to block the program execution (See |
353
|
|
|
|
|
|
|
L<Bytes::Random::Secure/"BLOCKING ENTROPY SOURCE">). In this case you can use |
354
|
|
|
|
|
|
|
L</mnemonic_from_entropy> and pass in entropy generated by |
355
|
|
|
|
|
|
|
L<Bytes::Random::Secure> in non-blocking mode (via the OO interface). |
356
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
=head2 mnemonic_from_entropy |
358
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
$mnemonic = mnemonic_from_entropy($bytes, $lang = 'en') |
360
|
|
|
|
|
|
|
|
361
|
|
|
|
|
|
|
Generates a new mnemonic code from custom entropy given in C<$bytes> (a |
362
|
|
|
|
|
|
|
bytestring). This entropy should be of the same bit size as in |
363
|
|
|
|
|
|
|
L</"generate_mnemonic">. Returns newly generated BIP39 mnemonic string. |
364
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
This can be useful to avoid relying on the underlying PRNG implementation used |
366
|
|
|
|
|
|
|
by L<Bitcoin::BIP39>. |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
Another use would be implementing one's own entropy source that can be truly |
369
|
|
|
|
|
|
|
random, not just cryptographically-secure. A popular example would be capturing |
370
|
|
|
|
|
|
|
user's mouse movements. |
371
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
Be aware that the method you use to generate a mnemonic will be a very |
373
|
|
|
|
|
|
|
important factor in your key's security. If possible, use real sources of |
374
|
|
|
|
|
|
|
randomness (not pseudo-random) or a cryptographically secure pseduo-random |
375
|
|
|
|
|
|
|
number generator like the one used by L<Bytes::Random::Secure>. |
376
|
|
|
|
|
|
|
|
377
|
|
|
|
|
|
|
=head2 mnemonic_to_seed |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
$seed = mnemonic_to_seed($mnemonic, $password); |
380
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
Transforms the given BIP39 C<$mnemonic> and C<$password> into a valid BIP32 |
382
|
|
|
|
|
|
|
C<$seed>, which can be fed into L<Bitcoin::Crypto::Key::ExtPrivate/from_seed>. |
383
|
|
|
|
|
|
|
|
384
|
|
|
|
|
|
|
C<$seed> is a C<512> bit bytestring (64 characters). C<$mnemonic> should be a |
385
|
|
|
|
|
|
|
BIP39 mnemonic, but will not be checked against a dictionary. |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
This function is only useful if you need a seed instead of mnemonic (for |
388
|
|
|
|
|
|
|
example, you use a wallet implementation which does not implement BIP39). If |
389
|
|
|
|
|
|
|
you only want to create a private key from mnemonic, you should consider using |
390
|
|
|
|
|
|
|
L<Bitcoin::Crypto::Key::ExtPrivate/from_mnemonic> instead. |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
B<Important note about unicode:> this function only accepts UTF8-decoded |
393
|
|
|
|
|
|
|
strings (both C<$mnemonic> and C<$password>), but can't detect whether it got |
394
|
|
|
|
|
|
|
it or not. This will only become a problem if you use non-ascii mnemonic and/or |
395
|
|
|
|
|
|
|
password. If there's a possibility of non-ascii, always use utf8 and set |
396
|
|
|
|
|
|
|
binmodes to get decoded (wide) characters to avoid problems recovering your |
397
|
|
|
|
|
|
|
wallet. |
398
|
|
|
|
|
|
|
|
399
|
|
|
|
|
|
|
=head2 get_path_info |
400
|
|
|
|
|
|
|
|
401
|
|
|
|
|
|
|
$path_data = get_path_info($path); |
402
|
|
|
|
|
|
|
|
403
|
|
|
|
|
|
|
Tries to get derivation path data from C<$path> (like C<"m/1/3'">). Returns |
404
|
|
|
|
|
|
|
undef if C<$path> is not a valid path, otherwise returns the structure: |
405
|
|
|
|
|
|
|
|
406
|
|
|
|
|
|
|
{ |
407
|
|
|
|
|
|
|
private => bool, # is path derivation private (lowercase m) |
408
|
|
|
|
|
|
|
path => [ |
409
|
|
|
|
|
|
|
# derivation path with 2^31 added to every hardened child number |
410
|
|
|
|
|
|
|
int, int, .. |
411
|
|
|
|
|
|
|
], |
412
|
|
|
|
|
|
|
} |
413
|
|
|
|
|
|
|
|
414
|
|
|
|
|
|
|
=head2 to_format |
415
|
|
|
|
|
|
|
|
416
|
|
|
|
|
|
|
$encoded = to_format [$format => $bytes]; |
417
|
|
|
|
|
|
|
|
418
|
|
|
|
|
|
|
Unpacks bytestring C<$bytes> into the given C<$format>. Use this to avoid |
419
|
|
|
|
|
|
|
manual unpacking. |
420
|
|
|
|
|
|
|
|
421
|
|
|
|
|
|
|
Supported C<$format> values are: |
422
|
|
|
|
|
|
|
|
423
|
|
|
|
|
|
|
C<bytes>, does nothing |
424
|
|
|
|
|
|
|
|
425
|
|
|
|
|
|
|
C<hex>, encodes as a hexadecimal string (no C<0x> prefix) |
426
|
|
|
|
|
|
|
|
427
|
|
|
|
|
|
|
C<base58>, uses base58 and includes the checksum (base58check) |
428
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
=head2 hash160 |
430
|
|
|
|
|
|
|
|
431
|
|
|
|
|
|
|
my $hash = hash160($data); |
432
|
|
|
|
|
|
|
|
433
|
|
|
|
|
|
|
This is hash160 used by Bitcoin (C<RIPEMD160> of C<SHA256>) |
434
|
|
|
|
|
|
|
|
435
|
|
|
|
|
|
|
=head2 hash256 |
436
|
|
|
|
|
|
|
|
437
|
|
|
|
|
|
|
my $hash = hash256($data); |
438
|
|
|
|
|
|
|
|
439
|
|
|
|
|
|
|
This is hash256 used by Bitcoin (C<SHA256> of C<SHA256>) |
440
|
|
|
|
|
|
|
|
441
|
|
|
|
|
|
|
=head1 SEE ALSO |
442
|
|
|
|
|
|
|
|
443
|
|
|
|
|
|
|
L<https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki> |
444
|
|
|
|
|
|
|
|
445
|
|
|
|
|
|
|
L<https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki> |
446
|
|
|
|
|
|
|
|