1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-14 03:30:02 +00:00
trezor-firmware/bip32.c

147 lines
4.1 KiB
C
Raw Normal View History

#include <string.h>
#include "bignum.h"
#include "hmac.h"
#include "ecdsa.h"
#include "bip32.h"
2014-01-14 14:29:46 +00:00
#include "sha2.h"
#include "ripemd160.h"
void hdnode_from_xpub(uint8_t version_byte, uint32_t version_private, uint32_t version_public, uint32_t depth, uint32_t fingerprint, uint32_t child_num, uint8_t *chain_code, uint8_t *public_key, HDNode *out)
{
out->version = version_public;
out->version_private = version_private;
out->version_public = version_public;
out->depth = depth;
out->fingerprint = fingerprint;
out->child_num = child_num;
memcpy(out->chain_code, chain_code, 32);
2014-01-21 17:38:44 +00:00
memset(out->private_key, 0, 32);
memcpy(out->public_key, public_key, 33);
2014-01-21 17:38:44 +00:00
out->version_byte = version_byte;
hdnode_fill_address(out);
}
void hdnode_from_xprv(uint8_t version_byte, uint32_t version_private, uint32_t version_public, uint32_t depth, uint32_t fingerprint, uint32_t child_num, uint8_t *chain_code, uint8_t *private_key, HDNode *out)
{
out->version = version_private;
out->version_private = version_private;
out->version_public = version_public;
2014-01-21 17:38:44 +00:00
out->depth = depth;
out->fingerprint = fingerprint;
out->child_num = child_num;
memcpy(out->chain_code, chain_code, 32);
memcpy(out->private_key, private_key, 32);
hdnode_fill_public_key(out);
out->version_byte = version_byte;
hdnode_fill_address(out);
}
void hdnode_from_seed(uint8_t version_byte, uint32_t version_private, uint32_t version_public, uint8_t *seed, int seed_len, HDNode *out)
2014-01-21 17:38:44 +00:00
{
uint8_t I[32 + 32];
out->version = version_private;
out->version_private = version_private;
out->version_public = version_public;
out->depth = 0;
out->fingerprint = 0x00000000;
out->child_num = 0;
2014-01-21 17:38:44 +00:00
hmac_sha512((uint8_t *)"Bitcoin seed", 12, seed, seed_len, I);
memcpy(out->chain_code, I + 32, 32);
memcpy(out->private_key, I, 32);
hdnode_fill_public_key(out);
2014-01-21 17:38:44 +00:00
out->version_byte = version_byte;
hdnode_fill_address(out);
}
2014-01-14 13:35:13 +00:00
int hdnode_private_ckd(HDNode *inout, uint32_t i)
{
uint8_t data[1 + 32 + 4];
2014-01-14 13:35:13 +00:00
uint8_t I[32 + 32];
2014-01-14 14:29:46 +00:00
uint8_t fingerprint[32];
bignum256 a, b;
inout->version = inout->version_private;
if (i & 0x80000000) { // private derivation
data[0] = 0;
memcpy(data + 1, inout->private_key, 32);
} else { // public derivation
memcpy(data, inout->public_key, 33);
}
write_be(data + 33, i);
2014-01-14 14:29:46 +00:00
SHA256_Raw(inout->public_key, 33, fingerprint);
ripemd160(fingerprint, 32, fingerprint);
inout->fingerprint = (fingerprint[0] << 24) + (fingerprint[1] << 16) + (fingerprint[2] << 8) + fingerprint[3];
bn_read_be(inout->private_key, &a);
2014-01-14 13:35:13 +00:00
hmac_sha512(inout->chain_code, 32, data, sizeof(data), I);
memcpy(inout->chain_code, I + 32, 32);
2014-01-21 17:38:44 +00:00
memcpy(inout->private_key, I, 32);
bn_read_be(inout->private_key, &b);
bn_addmod(&a, &b, &order256k1);
inout->depth++;
inout->child_num = i;
bn_write_be(&a, inout->private_key);
hdnode_fill_public_key(inout);
hdnode_fill_address(inout);
2014-01-14 13:35:13 +00:00
return 1;
}
int hdnode_public_ckd(HDNode *inout, uint32_t i)
{
uint8_t data[1 + 32 + 4];
uint8_t I[32 + 32];
2014-01-14 14:29:46 +00:00
uint8_t fingerprint[32];
2014-01-14 13:35:13 +00:00
curve_point a, b;
bignum256 c;
inout->version = inout->version_public;
2014-01-14 13:35:13 +00:00
if (i & 0x80000000) { // private derivation
return 0;
} else { // public derivation
memcpy(data, inout->public_key, 33);
}
write_be(data + 33, i);
2014-01-14 14:29:46 +00:00
SHA256_Raw(inout->public_key, 33, fingerprint);
ripemd160(fingerprint, 32, fingerprint);
inout->fingerprint = (fingerprint[0] << 24) + (fingerprint[1] << 16) + (fingerprint[2] << 8) + fingerprint[3];
2014-01-14 13:35:13 +00:00
memset(inout->private_key, 0, 32);
if (!ecdsa_read_pubkey(inout->public_key, &a)) {
return 0;
}
hmac_sha512(inout->chain_code, 32, data, sizeof(data), I);
memcpy(inout->chain_code, I + 32, 32);
bn_read_be(I, &c);
scalar_multiply(&c, &b); // b = c * G
point_add(&a, &b); // b = a + b
inout->public_key[0] = 0x02 | (b.y.val[0] & 0x01);
bn_write_be(&b.x, inout->public_key + 1);
inout->depth++;
inout->child_num = i;
hdnode_fill_address(inout);
return 1;
2013-11-08 15:02:48 +00:00
}
2014-01-21 17:38:44 +00:00
void hdnode_fill_public_key(HDNode *node)
2013-11-08 15:02:48 +00:00
{
2014-01-21 17:38:44 +00:00
ecdsa_get_public_key33(node->private_key, node->public_key);
}
2014-01-21 17:38:44 +00:00
void hdnode_fill_address(HDNode *node)
{
2014-01-21 17:38:44 +00:00
ecdsa_get_address(node->public_key, node->version_byte, node->address);
}