1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-21 13:58:08 +00:00
trezor-firmware/tools/mnemonic_check.py

80 lines
2.3 KiB
Python
Raw Normal View History

#!/usr/bin/env python
2016-05-20 20:27:20 +00:00
from __future__ import print_function
2016-05-26 15:20:44 +00:00
import binascii
import hashlib
import mnemonic
2016-05-20 20:27:20 +00:00
2014-02-03 10:36:56 +00:00
__doc__ = '''
Use this script to cross-check that TREZOR generated valid
mnemonic sentence for given internal (TREZOR-generated)
and external (computer-generated) entropy.
Keep in mind that you're entering secret information to this script.
2014-02-03 10:36:56 +00:00
Leaking of these information may lead to stealing your bitcoins
from your wallet! We strongly recommend to run this script only on
2014-02-03 10:36:56 +00:00
highly secured computer (ideally live linux distribution
without an internet connection).
'''
2016-05-20 11:36:17 +00:00
# Python2 vs Python3
try:
input = raw_input
except NameError:
pass
2017-06-23 19:31:42 +00:00
def generate_entropy(strength, internal_entropy, external_entropy):
'''
strength - length of produced seed. One of 128, 192, 256
random - binary stream of random data from external HRNG
'''
if strength not in (128, 192, 256):
raise Exception("Invalid strength")
if not internal_entropy:
raise Exception("Internal entropy is not provided")
if len(internal_entropy) < 32:
raise Exception("Internal entropy too short")
if not external_entropy:
raise Exception("External entropy is not provided")
if len(external_entropy) < 32:
raise Exception("External entropy too short")
entropy = hashlib.sha256(internal_entropy + external_entropy).digest()
2016-05-20 20:27:20 +00:00
entropy_stripped = entropy[:strength // 8]
if len(entropy_stripped) * 8 != strength:
raise Exception("Entropy length mismatch")
return entropy_stripped
2017-06-23 19:31:42 +00:00
def main():
2016-05-20 11:36:17 +00:00
print(__doc__)
2014-02-03 10:36:56 +00:00
2016-05-20 11:36:17 +00:00
comp = binascii.unhexlify(input("Please enter computer-generated entropy (in hex): ").strip())
trzr = binascii.unhexlify(input("Please enter TREZOR-generated entropy (in hex): ").strip())
word_count = int(input("How many words your mnemonic has? "))
2016-05-20 20:27:20 +00:00
strength = word_count * 32 // 3
entropy = generate_entropy(strength, trzr, comp)
words = mnemonic.Mnemonic('english').to_mnemonic(entropy)
if not mnemonic.Mnemonic('english').check(words):
2016-05-20 11:36:17 +00:00
print("Mnemonic is invalid")
return
if len(words.split(' ')) != word_count:
2016-05-20 11:36:17 +00:00
print("Mnemonic length mismatch!")
return
2016-05-20 11:36:17 +00:00
print("Generated mnemonic is:", words)
2017-06-23 19:31:42 +00:00
if __name__ == '__main__':
main()