1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-22 22:58:30 +00:00

Merge pull request #3336 from philsmd/p2wsh_segwit_bech32

Add -m 28503/28504 = Bitcoin WIF, P2WSH/bech32/segwit address
This commit is contained in:
Jens Steube 2022-06-23 13:44:54 +02:00 committed by GitHub
commit a7ab9f48c3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 1060 additions and 15 deletions

View File

@ -6,6 +6,7 @@
- Added hash-mode: Amazon AWS4-HMAC-SHA256
- Added hash-mode: Bitcoin WIF private key (P2PKH)
- Added hash-mode: Bitcoin WIF private key (P2WSH, Bech32)
- Added hash-mode: BLAKE2b-512($pass.$salt)
- Added hash-mode: BLAKE2b-512($salt.$pass)
- Added hash-mode: DPAPI masterkey file v1 (context 3)

View File

@ -404,6 +404,7 @@ NVIDIA GPUs require "NVIDIA Driver" (440.64 or later) and "CUDA Toolkit" (9.0 or
- BitShares v0.x - sha512(sha512_bin(pass))
- Bitcoin/Litecoin wallet.dat
- Bitcoin WIF private key (P2PKH)
- Bitcoin WIF private key (P2WSH, Bech32)
- Electrum Wallet (Salt-Type 1-3)
- Electrum Wallet (Salt-Type 4)
- Electrum Wallet (Salt-Type 5)

View File

@ -22,6 +22,8 @@ bool is_valid_base64c_string (const u8 *s, const size_t len);
bool is_valid_base64c_char (const u8 c);
bool is_valid_base58_string (const u8 *s, const size_t len);
bool is_valid_base58_char (const u8 c);
bool is_valid_bech32_string (const u8 *s, const size_t len);
bool is_valid_bech32_char (const u8 c);
bool is_valid_hex_string (const u8 *s, const size_t len);
bool is_valid_hex_char (const u8 c);
bool is_valid_digit_string (const u8 *s, const size_t len);

View File

@ -844,6 +844,7 @@ typedef enum token_attr
TOKEN_ATTR_VERIFY_BASE64B = 1 << 9,
TOKEN_ATTR_VERIFY_BASE64C = 1 << 10,
TOKEN_ATTR_VERIFY_BASE58 = 1 << 11,
TOKEN_ATTR_VERIFY_BECH32 = 1 << 12,
} token_attr_t;

View File

@ -338,6 +338,30 @@ bool is_valid_base58_char (const u8 c)
return false;
}
bool is_valid_bech32_string (const u8 *s, const size_t len)
{
for (size_t i = 0; i < len; i++)
{
const u8 c = s[i];
if (is_valid_bech32_char (c) == false) return false;
}
return true;
}
bool is_valid_bech32_char (const u8 c)
{
if ((c == '0')) return true;
if ((c >= '2') && (c <= '9')) return true;
if ((c == 'a')) return true;
if ((c >= 'c') && (c <= 'h')) return true;
if ((c >= 'j') && (c <= 'n')) return true;
if ((c >= 'p') && (c <= 'z')) return true;
return false;
}
bool is_valid_hex_string (const u8 *s, const size_t len)
{
for (size_t i = 0; i < len; i++)

390
src/modules/module_28503.c Normal file
View File

@ -0,0 +1,390 @@
/**
* Author......: See docs/credits.txt
* License.....: MIT
*/
#include "common.h"
#include "types.h"
#include "modules.h"
#include "bitops.h"
#include "convert.h"
#include "shared.h"
#include "memory.h"
static const u32 ATTACK_EXEC = ATTACK_EXEC_INSIDE_KERNEL;
static const u32 DGST_POS0 = 0;
static const u32 DGST_POS1 = 1;
static const u32 DGST_POS2 = 2;
static const u32 DGST_POS3 = 3;
static const u32 DGST_SIZE = DGST_SIZE_4_5;
static const u32 HASH_CATEGORY = HASH_CATEGORY_CRYPTOCURRENCY_WALLET;
static const char *HASH_NAME = "Bitcoin WIF private key (P2WSH, Bech32), compressed";
static const u64 KERN_TYPE = 28501;
static const u32 OPTI_TYPE = OPTI_TYPE_NOT_SALTED;
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
| OPTS_TYPE_PT_GENERATE_LE;
static const u32 SALT_TYPE = SALT_TYPE_NONE;
static const char *ST_PASS = "KyhashcatpL2CQmMUDVMVuEXqdLSvfQ6TBjkUuyttSvBa7GMiuLi";
static const char *ST_HASH = "bc1qxd76a5zamfyw0g2d2rxkdh0zt9m0uzmxmwjf0q";
static const char *BENCHMARK_MASK = "?b?b?b?b?b?b?batpL2CQmMUDVMVuEXqdLSvfQ6TBjkUuyttSvBa7GMiuLi";
static const u32 WIF_LEN = 52;
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
const char *module_benchmark_mask (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return BENCHMARK_MASK; }
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
return WIF_LEN;
}
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
return WIF_LEN;
}
static u32 polymod_checksum (const u8 *data, const u32 data_len)
{
const u32 CONST[5] = { 0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3 };
u32 c = 1;
for (u32 i = 0; i < data_len; i++) // data_len is always 44 for us
{
const u32 b = c >> 25;
c = ((c & 0x01ffffff) << 5) ^ data[i];
for (u32 j = 0; j < 5; j++)
{
const u32 bit_set = (b >> j) & 1;
if (bit_set == 0) continue;
c ^= CONST[j];
}
}
return c;
}
static const char *SIGNATURE_BITCOIN_BECH32 = "bc1"; // human readable part (HRP) + "1"
static const char *BECH32_BASE32_ALPHABET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
{
u32 *digest = (u32 *) digest_buf;
hc_token_t token;
token.token_cnt = 2;
token.signatures_cnt = 1;
token.signatures_buf[0] = SIGNATURE_BITCOIN_BECH32;
token.len[0] = 3;
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
| TOKEN_ATTR_VERIFY_SIGNATURE;
token.len[1] = 39; // 42 - 3 (SIGNATURE_BITCOIN_BECH32)
token.attr[1] = TOKEN_ATTR_FIXED_LENGTH
| TOKEN_ATTR_VERIFY_BECH32;
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
// Bech32 decode:
u8 t[64] = { 0 }; // only 42 - 3 = 39 needed
for (u32 i = 3; i < 42; i++) // skip first 3 bytes ("bc1")
{
// this is actually a search that we could do also with strstr ():
// note: we always have a hit, because we verified this with TOKEN_ATTR_VERIFY_BECH32
for (u32 j = 0; j < 32; j++)
{
if (BECH32_BASE32_ALPHABET[j] == line_buf[i])
{
t[i - 3] = j;
break;
}
}
}
if (t[0] != 0) // check if "version"/type is BECH32, we do NOT accept BECH32M
{
return (PARSER_HASH_ENCODING);
}
/*
* Check the checksum of the address:
*/
u32 checksum = t[33] << 25
| t[34] << 20
| t[35] << 15
| t[36] << 10
| t[37] << 5
| t[38] << 0;
u8 data[64] = { 0 }; // only 44 bytes actually needed
data[0] = 3; // HRP = Human Readable Part, 3 base32 chars => 5 bytes prefix
data[1] = 3; // these 5 bytes come from: hrp_expand ("bc"), human readable part
data[2] = 0;
data[3] = 2;
data[4] = 3;
for (u32 i = 0; i < 42 - 3 - 6; i++) // skip "bc1" (start) and checksum (end)
{
data[i + 5] = t[i];
}
data[38] = 0; // "clear" the 6 checksum bytes (for correct "polymod" checksum below)
data[39] = 0;
data[40] = 0;
data[41] = 0;
data[42] = 0;
data[43] = 0;
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
if (polymod != checksum) // or (polymod_checksum (data, 44) ^ checksum) != 1
{
return (PARSER_HASH_ENCODING);
}
/*
* transform/convert back to the ripemd hash (reverse translate_8to5 (), i.e. translate_5to8).
* We extend the 8 bit blocks here to 32 bit blocks (4 * 8 = 32 bits), therefore we convert
* 5 bit "blocks" to 32 bit blocks (from the base32 range: 0..31 to u32: 0..0xffffffff):
*/
// note: t[0] needs to be skipped (version info)
digest[0] = (t[ 1] << 27) | (t[ 2] << 22) | (t[ 3] << 17) | (t[ 4] << 12)
| (t[ 5] << 7) | (t[ 6] << 2) | (t[ 7] >> 3);
digest[1] = (t[ 7] << 29) | (t[ 8] << 24) | (t[ 9] << 19) | (t[10] << 14)
| (t[11] << 9) | (t[12] << 4) | (t[13] >> 1);
digest[2] = (t[13] << 31) | (t[14] << 26) | (t[15] << 21) | (t[16] << 16)
| (t[17] << 11) | (t[18] << 6) | (t[19] << 1) | (t[20] >> 4);
digest[3] = (t[20] << 28) | (t[21] << 23) | (t[22] << 18) | (t[23] << 13)
| (t[24] << 8) | (t[25] << 3) | (t[26] >> 2);
digest[4] = (t[26] << 30) | (t[27] << 25) | (t[28] << 20) | (t[29] << 15)
| (t[30] << 10) | (t[31] << 5) | (t[32] << 0);
// a final byte swap is needed for the kernel code:
for (u32 i = 0; i < 5; i++)
{
digest[i] = byte_swap_32 (digest[i]);
}
return (PARSER_OK);
}
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
{
// note: here we work mostly with char/u8 type because it's easier to base32 encode
// (at least conceptually), but this could be easily extended to u32 variable types:
u8 *digest = (u8 *) digest_buf;
u8 b[20] = { 0 };
for (u32 i = 0; i < 20; i++) // i < length (digest)
{
b[i] = digest[i];
}
/*
* convert 8 bit "blocks" to 5 bit blocks, translate_8to5 () (for base32, 0..31):
*/
u8 t[64] = { 0 }; // only 39 bytes actually needed
t[ 0] = 0; // set "version"/type to BECH32, we do NOT support BECH32M
t[ 1] = ( (b[ 0] >> 3)) & 31;
t[ 2] = ((b[ 0] << 2) | (b[ 1] >> 6)) & 31;
t[ 3] = ( (b[ 1] >> 1)) & 31;
t[ 4] = ((b[ 1] << 4) | (b[ 2] >> 4)) & 31;
t[ 5] = ((b[ 2] << 1) | (b[ 3] >> 7)) & 31;
t[ 6] = ( (b[ 3] >> 2)) & 31;
t[ 7] = ((b[ 3] << 3) | (b[ 4] >> 5)) & 31;
t[ 8] = ( (b[ 4] >> 0)) & 31;
t[ 9] = ( (b[ 5] >> 3)) & 31;
t[10] = ((b[ 5] << 2) | (b[ 6] >> 6)) & 31;
t[11] = ( (b[ 6] >> 1)) & 31;
t[12] = ((b[ 6] << 4) | (b[ 7] >> 4)) & 31;
t[13] = ((b[ 7] << 1) | (b[ 8] >> 7)) & 31;
t[14] = ( (b[ 8] >> 2)) & 31;
t[15] = ((b[ 8] << 3) | (b[ 9] >> 5)) & 31;
t[16] = ( (b[ 9] >> 0)) & 31;
t[17] = ( (b[10] >> 3)) & 31;
t[18] = ((b[10] << 2) | (b[11] >> 6)) & 31;
t[19] = ( (b[11] >> 1)) & 31;
t[20] = ((b[11] << 4) | (b[12] >> 4)) & 31;
t[21] = ((b[12] << 1) | (b[13] >> 7)) & 31;
t[22] = ( (b[13] >> 2)) & 31;
t[23] = ((b[13] << 3) | (b[14] >> 5)) & 31;
t[24] = ( (b[14] >> 0)) & 31;
t[25] = ( (b[15] >> 3)) & 31;
t[26] = ((b[15] << 2) | (b[16] >> 6)) & 31;
t[27] = ( (b[16] >> 1)) & 31;
t[28] = ((b[16] << 4) | (b[17] >> 4)) & 31;
t[29] = ((b[17] << 1) | (b[18] >> 7)) & 31;
t[30] = ( (b[18] >> 2)) & 31;
t[31] = ((b[18] << 3) | (b[19] >> 5)) & 31;
t[32] = ( (b[19] >> 0)) & 31;
// note: some further t[] array items will be set after we know the checksum of this part
/*
* Checksum:
*/
u8 data[64] = { 0 }; // only 44 bytes actually needed
data[0] = 3; // hrp_expand ("bc"), human readable part
data[1] = 3;
data[2] = 0;
data[3] = 2;
data[4] = 3;
for (u32 i = 0; i < 33; i++)
{
data[i + 5] = t[i];
}
// data[38] = data[39] = data[40] = data[41] = data[42] = data[43] = 0;
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
t[33] = (polymod >> 25) & 31;
t[34] = (polymod >> 20) & 31;
t[35] = (polymod >> 15) & 31;
t[36] = (polymod >> 10) & 31;
t[37] = (polymod >> 5) & 31;
t[38] = (polymod >> 0) & 31;
/*
* BASE32 encode:
*/
u8 bech32_address[64] = { 0 }; // only 39 bytes needed: 1 + 32 + 6
for (u32 i = 0; i < 39; i++)
{
const u32 idx = t[i];
bech32_address[i] = BECH32_BASE32_ALPHABET[idx];
}
bech32_address[39] = 0; // be extra safe, terminate the "C" string with NUL byte
return snprintf (line_buf, line_size, "%s%s", SIGNATURE_BITCOIN_BECH32, bech32_address);
}
void module_init (module_ctx_t *module_ctx)
{
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
module_ctx->module_attack_exec = module_attack_exec;
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
module_ctx->module_benchmark_mask = module_benchmark_mask;
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
module_ctx->module_dgst_pos0 = module_dgst_pos0;
module_ctx->module_dgst_pos1 = module_dgst_pos1;
module_ctx->module_dgst_pos2 = module_dgst_pos2;
module_ctx->module_dgst_pos3 = module_dgst_pos3;
module_ctx->module_dgst_size = module_dgst_size;
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
module_ctx->module_esalt_size = MODULE_DEFAULT;
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
module_ctx->module_hash_decode = module_hash_decode;
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_encode = module_hash_encode;
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
module_ctx->module_hash_mode = MODULE_DEFAULT;
module_ctx->module_hash_category = module_hash_category;
module_ctx->module_hash_name = module_hash_name;
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
module_ctx->module_hook12 = MODULE_DEFAULT;
module_ctx->module_hook23 = MODULE_DEFAULT;
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
module_ctx->module_hook_size = MODULE_DEFAULT;
module_ctx->module_jit_build_options = MODULE_DEFAULT;
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
module_ctx->module_kern_type = module_kern_type;
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
module_ctx->module_opti_type = module_opti_type;
module_ctx->module_opts_type = module_opts_type;
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
module_ctx->module_potfile_disable = MODULE_DEFAULT;
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
module_ctx->module_pwdump_column = MODULE_DEFAULT;
module_ctx->module_pw_max = module_pw_max;
module_ctx->module_pw_min = module_pw_min;
module_ctx->module_salt_max = MODULE_DEFAULT;
module_ctx->module_salt_min = MODULE_DEFAULT;
module_ctx->module_salt_type = module_salt_type;
module_ctx->module_separator = MODULE_DEFAULT;
module_ctx->module_st_hash = module_st_hash;
module_ctx->module_st_pass = module_st_pass;
module_ctx->module_tmp_size = MODULE_DEFAULT;
module_ctx->module_unstable_warning = MODULE_DEFAULT;
module_ctx->module_warmup_disable = MODULE_DEFAULT;
}

390
src/modules/module_28504.c Normal file
View File

@ -0,0 +1,390 @@
/**
* Author......: See docs/credits.txt
* License.....: MIT
*/
#include "common.h"
#include "types.h"
#include "modules.h"
#include "bitops.h"
#include "convert.h"
#include "shared.h"
#include "memory.h"
static const u32 ATTACK_EXEC = ATTACK_EXEC_INSIDE_KERNEL;
static const u32 DGST_POS0 = 0;
static const u32 DGST_POS1 = 1;
static const u32 DGST_POS2 = 2;
static const u32 DGST_POS3 = 3;
static const u32 DGST_SIZE = DGST_SIZE_4_5;
static const u32 HASH_CATEGORY = HASH_CATEGORY_CRYPTOCURRENCY_WALLET;
static const char *HASH_NAME = "Bitcoin WIF private key (P2WSH, Bech32), uncompressed";
static const u64 KERN_TYPE = 28502;
static const u32 OPTI_TYPE = OPTI_TYPE_NOT_SALTED;
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
| OPTS_TYPE_PT_GENERATE_LE;
static const u32 SALT_TYPE = SALT_TYPE_NONE;
static const char *ST_PASS = "5HzV19ffW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
static const char *ST_HASH = "bc1qv8e65p73gmp4w3z6fqnyu8t6ct69vetsda3snd";
static const char *BENCHMARK_MASK = "?b?b?b?b?b?b?bfW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
static const u32 WIF_LEN = 51;
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
const char *module_benchmark_mask (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return BENCHMARK_MASK; }
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
return WIF_LEN;
}
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
return WIF_LEN;
}
static u32 polymod_checksum (const u8 *data, const u32 data_len)
{
const u32 CONST[5] = { 0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3 };
u32 c = 1;
for (u32 i = 0; i < data_len; i++) // data_len is always 44 for us
{
const u32 b = c >> 25;
c = ((c & 0x01ffffff) << 5) ^ data[i];
for (u32 j = 0; j < 5; j++)
{
const u32 bit_set = (b >> j) & 1;
if (bit_set == 0) continue;
c ^= CONST[j];
}
}
return c;
}
static const char *SIGNATURE_BITCOIN_BECH32 = "bc1"; // human readable part (HRP) + "1"
static const char *BECH32_BASE32_ALPHABET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
{
u32 *digest = (u32 *) digest_buf;
hc_token_t token;
token.token_cnt = 2;
token.signatures_cnt = 1;
token.signatures_buf[0] = SIGNATURE_BITCOIN_BECH32;
token.len[0] = 3;
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
| TOKEN_ATTR_VERIFY_SIGNATURE;
token.len[1] = 39; // 42 - 3 (SIGNATURE_BITCOIN_BECH32)
token.attr[1] = TOKEN_ATTR_FIXED_LENGTH
| TOKEN_ATTR_VERIFY_BECH32;
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
// Bech32 decode:
u8 t[64] = { 0 }; // only 42 - 3 = 39 needed
for (u32 i = 3; i < 42; i++) // skip first 3 bytes ("bc1")
{
// this is actually a search that we could do also with strstr ():
// note: we always have a hit, because we verified this with TOKEN_ATTR_VERIFY_BECH32
for (u32 j = 0; j < 32; j++)
{
if (BECH32_BASE32_ALPHABET[j] == line_buf[i])
{
t[i - 3] = j;
break;
}
}
}
if (t[0] != 0) // check if "version"/type is BECH32, we do NOT accept BECH32M
{
return (PARSER_HASH_ENCODING);
}
/*
* Check the checksum of the address:
*/
u32 checksum = t[33] << 25
| t[34] << 20
| t[35] << 15
| t[36] << 10
| t[37] << 5
| t[38] << 0;
u8 data[64] = { 0 }; // only 44 bytes actually needed
data[0] = 3; // HRP = Human Readable Part, 3 base32 chars => 5 bytes prefix
data[1] = 3; // these 5 bytes come from: hrp_expand ("bc"), human readable part
data[2] = 0;
data[3] = 2;
data[4] = 3;
for (u32 i = 0; i < 42 - 3 - 6; i++) // skip "bc1" (start) and checksum (end)
{
data[i + 5] = t[i];
}
data[38] = 0; // "clear" the 6 checksum bytes (for correct "polymod" checksum below)
data[39] = 0;
data[40] = 0;
data[41] = 0;
data[42] = 0;
data[43] = 0;
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
if (polymod != checksum) // or (polymod_checksum (data, 44) ^ checksum) != 1
{
return (PARSER_HASH_ENCODING);
}
/*
* transform/convert back to the ripemd hash (reverse translate_8to5 (), i.e. translate_5to8).
* We extend the 8 bit blocks here to 32 bit blocks (4 * 8 = 32 bits), therefore we convert
* 5 bit "blocks" to 32 bit blocks (from the base32 range: 0..31 to u32: 0..0xffffffff):
*/
// note: t[0] needs to be skipped (version info)
digest[0] = (t[ 1] << 27) | (t[ 2] << 22) | (t[ 3] << 17) | (t[ 4] << 12)
| (t[ 5] << 7) | (t[ 6] << 2) | (t[ 7] >> 3);
digest[1] = (t[ 7] << 29) | (t[ 8] << 24) | (t[ 9] << 19) | (t[10] << 14)
| (t[11] << 9) | (t[12] << 4) | (t[13] >> 1);
digest[2] = (t[13] << 31) | (t[14] << 26) | (t[15] << 21) | (t[16] << 16)
| (t[17] << 11) | (t[18] << 6) | (t[19] << 1) | (t[20] >> 4);
digest[3] = (t[20] << 28) | (t[21] << 23) | (t[22] << 18) | (t[23] << 13)
| (t[24] << 8) | (t[25] << 3) | (t[26] >> 2);
digest[4] = (t[26] << 30) | (t[27] << 25) | (t[28] << 20) | (t[29] << 15)
| (t[30] << 10) | (t[31] << 5) | (t[32] << 0);
// a final byte swap is needed for the kernel code:
for (u32 i = 0; i < 5; i++)
{
digest[i] = byte_swap_32 (digest[i]);
}
return (PARSER_OK);
}
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
{
// note: here we work mostly with char/u8 type because it's easier to base32 encode
// (at least conceptually), but this could be easily extended to u32 variable types:
u8 *digest = (u8 *) digest_buf;
u8 b[20] = { 0 };
for (u32 i = 0; i < 20; i++) // i < length (digest)
{
b[i] = digest[i];
}
/*
* convert 8 bit "blocks" to 5 bit blocks, translate_8to5 () (for base32, 0..31):
*/
u8 t[64] = { 0 }; // only 39 bytes actually needed
t[ 0] = 0; // set "version"/type to BECH32, we do NOT support BECH32M
t[ 1] = ( (b[ 0] >> 3)) & 31;
t[ 2] = ((b[ 0] << 2) | (b[ 1] >> 6)) & 31;
t[ 3] = ( (b[ 1] >> 1)) & 31;
t[ 4] = ((b[ 1] << 4) | (b[ 2] >> 4)) & 31;
t[ 5] = ((b[ 2] << 1) | (b[ 3] >> 7)) & 31;
t[ 6] = ( (b[ 3] >> 2)) & 31;
t[ 7] = ((b[ 3] << 3) | (b[ 4] >> 5)) & 31;
t[ 8] = ( (b[ 4] >> 0)) & 31;
t[ 9] = ( (b[ 5] >> 3)) & 31;
t[10] = ((b[ 5] << 2) | (b[ 6] >> 6)) & 31;
t[11] = ( (b[ 6] >> 1)) & 31;
t[12] = ((b[ 6] << 4) | (b[ 7] >> 4)) & 31;
t[13] = ((b[ 7] << 1) | (b[ 8] >> 7)) & 31;
t[14] = ( (b[ 8] >> 2)) & 31;
t[15] = ((b[ 8] << 3) | (b[ 9] >> 5)) & 31;
t[16] = ( (b[ 9] >> 0)) & 31;
t[17] = ( (b[10] >> 3)) & 31;
t[18] = ((b[10] << 2) | (b[11] >> 6)) & 31;
t[19] = ( (b[11] >> 1)) & 31;
t[20] = ((b[11] << 4) | (b[12] >> 4)) & 31;
t[21] = ((b[12] << 1) | (b[13] >> 7)) & 31;
t[22] = ( (b[13] >> 2)) & 31;
t[23] = ((b[13] << 3) | (b[14] >> 5)) & 31;
t[24] = ( (b[14] >> 0)) & 31;
t[25] = ( (b[15] >> 3)) & 31;
t[26] = ((b[15] << 2) | (b[16] >> 6)) & 31;
t[27] = ( (b[16] >> 1)) & 31;
t[28] = ((b[16] << 4) | (b[17] >> 4)) & 31;
t[29] = ((b[17] << 1) | (b[18] >> 7)) & 31;
t[30] = ( (b[18] >> 2)) & 31;
t[31] = ((b[18] << 3) | (b[19] >> 5)) & 31;
t[32] = ( (b[19] >> 0)) & 31;
// note: some further t[] array items will be set after we know the checksum of this part
/*
* Checksum:
*/
u8 data[64] = { 0 }; // only 44 bytes actually needed
data[0] = 3; // hrp_expand ("bc"), human readable part
data[1] = 3;
data[2] = 0;
data[3] = 2;
data[4] = 3;
for (u32 i = 0; i < 33; i++)
{
data[i + 5] = t[i];
}
// data[38] = data[39] = data[40] = data[41] = data[42] = data[43] = 0;
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
t[33] = (polymod >> 25) & 31;
t[34] = (polymod >> 20) & 31;
t[35] = (polymod >> 15) & 31;
t[36] = (polymod >> 10) & 31;
t[37] = (polymod >> 5) & 31;
t[38] = (polymod >> 0) & 31;
/*
* BASE32 encode:
*/
u8 bech32_address[64] = { 0 }; // only 39 bytes needed: 1 + 32 + 6
for (u32 i = 0; i < 39; i++)
{
const u32 idx = t[i];
bech32_address[i] = BECH32_BASE32_ALPHABET[idx];
}
bech32_address[39] = 0; // be extra safe, terminate the "C" string with NUL byte
return snprintf (line_buf, line_size, "%s%s", SIGNATURE_BITCOIN_BECH32, bech32_address);
}
void module_init (module_ctx_t *module_ctx)
{
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
module_ctx->module_attack_exec = module_attack_exec;
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
module_ctx->module_benchmark_mask = module_benchmark_mask;
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
module_ctx->module_dgst_pos0 = module_dgst_pos0;
module_ctx->module_dgst_pos1 = module_dgst_pos1;
module_ctx->module_dgst_pos2 = module_dgst_pos2;
module_ctx->module_dgst_pos3 = module_dgst_pos3;
module_ctx->module_dgst_size = module_dgst_size;
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
module_ctx->module_esalt_size = MODULE_DEFAULT;
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
module_ctx->module_hash_decode = module_hash_decode;
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_encode = module_hash_encode;
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
module_ctx->module_hash_mode = MODULE_DEFAULT;
module_ctx->module_hash_category = module_hash_category;
module_ctx->module_hash_name = module_hash_name;
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
module_ctx->module_hook12 = MODULE_DEFAULT;
module_ctx->module_hook23 = MODULE_DEFAULT;
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
module_ctx->module_hook_size = MODULE_DEFAULT;
module_ctx->module_jit_build_options = MODULE_DEFAULT;
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
module_ctx->module_kern_type = module_kern_type;
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
module_ctx->module_opti_type = module_opti_type;
module_ctx->module_opts_type = module_opts_type;
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
module_ctx->module_potfile_disable = MODULE_DEFAULT;
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
module_ctx->module_pwdump_column = MODULE_DEFAULT;
module_ctx->module_pw_max = module_pw_max;
module_ctx->module_pw_min = module_pw_min;
module_ctx->module_salt_max = MODULE_DEFAULT;
module_ctx->module_salt_min = MODULE_DEFAULT;
module_ctx->module_salt_type = module_salt_type;
module_ctx->module_separator = MODULE_DEFAULT;
module_ctx->module_st_hash = module_st_hash;
module_ctx->module_st_pass = module_st_pass;
module_ctx->module_tmp_size = MODULE_DEFAULT;
module_ctx->module_unstable_warning = MODULE_DEFAULT;
module_ctx->module_warmup_disable = MODULE_DEFAULT;
}

View File

@ -1241,6 +1241,10 @@ int input_tokenizer (const u8 *input_buf, const int input_len, hc_token_t *token
{
if (is_valid_base58_string (token->buf[token_idx], token->len[token_idx]) == false) return (PARSER_TOKEN_ENCODING);
}
if (token->attr[token_idx] & TOKEN_ATTR_VERIFY_BECH32)
{
if (is_valid_bech32_string (token->buf[token_idx], token->len[token_idx]) == false) return (PARSER_TOKEN_ENCODING);
}
}
return PARSER_OK;

View File

@ -44,7 +44,7 @@ SLOW_ALGOS=$(grep -l ATTACK_EXEC_OUTSIDE_KERNEL "${TDIR}"/../src/modules/module_
# fake slow algos, due to specific password pattern (e.g. ?d from "mask_3" is invalid):
# ("only" drawback is that just -a 0 is tested with this workaround)
SLOW_ALGOS="${SLOW_ALGOS} 28501 28502"
SLOW_ALGOS="${SLOW_ALGOS} 28501 28502 28503 28504"
OUTD="test_$(date +%s)"

View File

@ -30,18 +30,23 @@ sub module_generate_hash
my @is_valid_base58 = eval
{
decode_base58check ($word); # or we could use from_wif () or validate_wif ()
decode_base58check ($word); # or we could use validate_wif ()
};
if (! @is_valid_base58)
{
# not valid so just return and do nothing
return;
}
return if (! @is_valid_base58);
# validate WIF (check password, "verify")
my $priv = btc_prv->from_wif ($word);
my $priv = "";
my @is_valid_wif = eval
{
$priv = btc_prv->from_wif ($word);
};
return if (! @is_valid_wif);
return if ($priv->compressed != 1);
my $pub = $priv->get_public_key ();
my $hash = $pub->get_legacy_address ();

View File

@ -30,18 +30,23 @@ sub module_generate_hash
my @is_valid_base58 = eval
{
decode_base58check ($word); # or we could use from_wif () or validate_wif ()
decode_base58check ($word); # or we could use validate_wif ()
};
if (! @is_valid_base58)
{
# not valid so just return and do nothing
return;
}
return if (! @is_valid_base58);
# validate WIF (check password, "verify")
my $priv = btc_prv->from_wif ($word);
my $priv = "";
my @is_valid_wif = eval
{
$priv = btc_prv->from_wif ($word);
};
return if (! @is_valid_wif);
return if ($priv->compressed != 0);
my $pub = $priv->get_public_key ();
my $hash = $pub->get_legacy_address ();

View File

@ -0,0 +1,112 @@
#!/usr/bin/env perl
##
## Author......: See docs/credits.txt
## License.....: MIT
##
use strict;
use warnings;
use Bitcoin::Crypto qw (btc_prv btc_extprv);
use Bitcoin::Crypto::Base58 qw (decode_base58check);
sub module_constraints { [[52, 52], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] }
# Note:
# We expect valid WIF format which for BTC private address is 51/52 base58 characters long.
# For compressed P2PKH the length of the WIF is always 52.
# Standard test.pl is generating random passwords consisting only from digits.
# That does not work for this mode.
# So we have introduced new function: module_get_random_password ()
# that will help to generate random valid password for the module from a given seed.
#
# It will be called from test.pl if it exists in the module, otherwise everything
# will work as in legacy code. Search test.pl for module_get_random_password ()
sub module_generate_hash
{
my $word = shift; # expecting valid WIF formated private key
my @is_valid_base58 = eval
{
decode_base58check ($word); # or we could use validate_wif ()
};
return if (! @is_valid_base58);
# validate WIF (check password, "verify")
my $priv = "";
my @is_valid_wif = eval
{
$priv = btc_prv->from_wif ($word);
};
return if (! @is_valid_wif);
return if ($priv->compressed != 1);
my $pub = $priv->get_public_key ();
my $hash = $pub->get_segwit_address ();
return $hash;
}
sub module_verify_hash
{
my $line = shift;
my $idx = rindex ($line, ':');
return unless $idx >= 0;
my $hash = substr ($line, 0, $idx);
my $word = substr ($line, $idx + 1);
return unless (defined ($hash));
return unless (defined ($word));
my @is_valid_base58 = eval
{
decode_base58check ($word);
};
return unless (@is_valid_base58);
return unless ($hash =~ m/^bc1[qpzry9x8gf2tvdw0s3jn54khce6mua7l]*$/); # bech32/base32 encoding
return unless (length ($word) == 52);
my $first_byte = substr ($word, 0, 1);
return unless (($first_byte eq "K") || ($first_byte eq "L"));
my $new_hash = module_generate_hash ($word);
return ($new_hash, $word);
}
sub module_get_random_password
{
# new function added to generate valid password for an algorithm
# from a given seed as a parameter
my $seed = shift;
my $master_key = btc_extprv->from_seed ($seed); # expecting random seed from test.pl
my $derived_key = $master_key->derive_key ("m/0'");
my $priv = $derived_key->get_basic_key ();
my $IS_COMPRESSED = 1;
$priv->set_compressed ($IS_COMPRESSED);
# return WIF format
return $priv->to_wif ();
}
1;

View File

@ -0,0 +1,110 @@
#!/usr/bin/env perl
##
## Author......: See docs/credits.txt
## License.....: MIT
##
use strict;
use warnings;
use Bitcoin::Crypto qw (btc_prv btc_extprv);
use Bitcoin::Crypto::Base58 qw (decode_base58check);
sub module_constraints { [[51, 51], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] }
# Note:
# We expect valid WIF format which for BTC private address is 51/52 base58 characters long.
# For uncompressed P2PKH the length of the WIF is always 51.
# Standard test.pl is generating random passwords consisting only from digits.
# That does not work for this mode.
# So we have introduced new function: module_get_random_password ()
# that will help to generate random valid password for the module from a given seed.
#
# It will be called from test.pl if it exists in the module, otherwise everything
# will work as in legacy code. Search test.pl for module_get_random_password ()
sub module_generate_hash
{
my $word = shift; # expecting valid WIF formated private key
my @is_valid_base58 = eval
{
decode_base58check ($word); # or we could use validate_wif ()
};
return if (! @is_valid_base58);
# validate WIF (check password, "verify")
my $priv = "";
my @is_valid_wif = eval
{
$priv = btc_prv->from_wif ($word);
};
return if (! @is_valid_wif);
return if ($priv->compressed != 0);
my $pub = $priv->get_public_key ();
my $hash = $pub->get_segwit_address ();
return $hash;
}
sub module_verify_hash
{
my $line = shift;
my $idx = rindex ($line, ':');
return unless $idx >= 0;
my $hash = substr ($line, 0, $idx);
my $word = substr ($line, $idx + 1);
return unless (defined ($hash));
return unless (defined ($word));
my @is_valid_base58 = eval
{
decode_base58check ($word);
};
return unless ($hash =~ m/^bc1[qpzry9x8gf2tvdw0s3jn54khce6mua7l]*$/); # bech32/base32 encoding
return unless (@is_valid_base58);
return unless (length ($word) == 51);
return unless (substr ($word, 0, 1) eq "5");
my $new_hash = module_generate_hash ($word);
return ($new_hash, $word);
}
sub module_get_random_password
{
# new function added to generate valid password for an algorithm
# from a given seed as a parameter
my $seed = shift;
my $master_key = btc_extprv->from_seed ($seed); # expecting random seed from test.pl
my $derived_key = $master_key->derive_key ("m/0'");
my $priv = $derived_key->get_basic_key ();
my $IS_COMPRESSED = 0;
$priv->set_compressed ($IS_COMPRESSED);
# return WIF format
return $priv->to_wif ();
}
1;