|
@@ -375,7 +375,6 @@ Removed {{}} duplicate WIF key{{}} from keylist (also in {pnm} key-address file
|
|
gen_keys = False
|
|
gen_keys = False
|
|
has_keys = False
|
|
has_keys = False
|
|
ext = 'addrs'
|
|
ext = 'addrs'
|
|
- scramble_hash_rounds = 10 # not too many rounds, so hand decoding can still be feasible
|
|
|
|
chksum_rec_f = lambda foo,e: (str(e.idx), e.addr)
|
|
chksum_rec_f = lambda foo,e: (str(e.idx), e.addr)
|
|
|
|
|
|
def __init__(self,addrfile='',al_id='',adata=[],seed='',addr_idxs='',src='',
|
|
def __init__(self,addrfile='',al_id='',adata=[],seed='',addr_idxs='',src='',
|
|
@@ -497,7 +496,7 @@ Removed {{}} duplicate WIF key{{}} from keylist (also in {pnm} key-address file
|
|
if g.proto.is_testnet():
|
|
if g.proto.is_testnet():
|
|
scramble_key += ':testnet'
|
|
scramble_key += ':testnet'
|
|
dmsg_sc('str',scramble_key)
|
|
dmsg_sc('str',scramble_key)
|
|
- return scramble_seed(seed,scramble_key.encode(),self.scramble_hash_rounds)
|
|
|
|
|
|
+ return scramble_seed(seed,scramble_key.encode(),g.scramble_hash_rounds)
|
|
|
|
|
|
def encrypt(self,desc='new key list'):
|
|
def encrypt(self,desc='new key list'):
|
|
from mmgen.crypto import mmgen_encrypt
|
|
from mmgen.crypto import mmgen_encrypt
|
|
@@ -886,7 +885,7 @@ Record this checksum: it will be used to verify the password file in the future
|
|
# NB: In original implementation, pw_id_str was 'baseN', not 'bN'
|
|
# NB: In original implementation, pw_id_str was 'baseN', not 'bN'
|
|
scramble_key = '{}:{}:{}'.format(self.pw_fmt,self.pw_len,self.pw_id_str)
|
|
scramble_key = '{}:{}:{}'.format(self.pw_fmt,self.pw_len,self.pw_id_str)
|
|
from mmgen.crypto import scramble_seed
|
|
from mmgen.crypto import scramble_seed
|
|
- return scramble_seed(seed,scramble_key.encode(),self.scramble_hash_rounds)
|
|
|
|
|
|
+ return scramble_seed(seed,scramble_key.encode(),g.scramble_hash_rounds)
|
|
|
|
|
|
class AddrData(MMGenObject):
|
|
class AddrData(MMGenObject):
|
|
msgs = {
|
|
msgs = {
|