#!/usr/bin/env python3 # # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution # Copyright (C)2013-2019 The MMGen Project # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . """ mmgen-passgen: Generate a series or range of passwords from an MMGen deterministic wallet """ from mmgen.common import * from mmgen.crypto import * from mmgen.addr import PasswordList,AddrIdxList from mmgen.seed import SeedSource from mmgen.obj import MMGenPWIDString pwi = PasswordList.pw_info pwi_fs = '{:5} {:1} {:26} {:<7} {:<7} {}' opts_data = { 'sets': [('print_checksum',True,'quiet',True)], 'text': { 'desc': """ Generate a range or list of passwords from an {pnm} wallet, mnemonic, seed or brainwallet for the given ID string """.format(pnm=g.proj_name), 'usage':'[opts] [seed source] ', 'options': """ -h, --help Print this help message --, --longhelp Print help message for long options (common options) -d, --outdir= d Output files to directory 'd' instead of working dir -e, --echo-passphrase Echo passphrase or mnemonic to screen upon entry -f, --passwd-fmt= f Generate passwords of format 'f'. Default: {dpf}. See PASSWORD FORMATS below -i, --in-fmt= f Input is from wallet format 'f' (see FMT CODES below) -H, --hidden-incog-input-params=f,o Read hidden incognito data from file 'f' at offset 'o' (comma-separated) -O, --old-incog-fmt Specify old-format incognito input -L, --passwd-len= l Specify length of generated passwords. For defaults, see PASSWORD FORMATS below. An argument of 'h' will generate passwords of half the default length. -l, --seed-len= l Specify wallet seed length of 'l' bits. This option is required only for brainwallet and incognito inputs with non-standard (< {g.seed_len}-bit) seed lengths -p, --hash-preset= p Use the scrypt hash parameters defined by preset 'p' for password hashing (default: '{g.hash_preset}') -z, --show-hash-presets Show information on available hash presets -P, --passwd-file= f Get wallet passphrase from file 'f' -q, --quiet Produce quieter output; suppress some warnings -r, --usr-randchars=n Get 'n' characters of additional randomness from user (min={g.min_urandchars}, max={g.max_urandchars}, default={g.usr_randchars}) -S, --stdout Print passwords to stdout -v, --verbose Produce more verbose output """, 'notes': """ NOTES FOR THIS COMMAND ID string must be a valid UTF-8 string not longer than {ml} characters and not containing the symbols '{fs}'. Password indexes are given as a comma-separated list and/or hyphen-separated range(s). Changing either the password format (base32,base58) or length alters the seed and thus generates a completely new set of passwords. PASSWORD FORMATS: {pfi} EXAMPLES: Generate ten base58 passwords of length {i58.dfl_len} for Alice's email account: {g.prog_name} alice@nowhere.com 1-10 Generate ten base58 passwords of length 16 for Alice's email account: {g.prog_name} --passwd-len=16 alice@nowhere.com 1-10 Generate ten base32 passwords of length {i32.dfl_len} for Alice's email account: {g.prog_name} --passwd-fmt=b32 alice@nowhere.com 1-10 Generate three BIP39 mnemonic seed phrases of length {i39.dfl_len} for Alice's Trezor device: {g.prog_name} --passwd-fmt=bip39 mytrezor 1-3 All passwords are cryptographically unlinkable with each other, including passwords with the same format but different length, so Alice needn't worry about inadvertent reuse of private data. NOTES FOR ALL GENERATOR COMMANDS {n_pw} {n_bw} FMT CODES: {n_fmt} """ }, 'code': { 'options': lambda s: s.format( seed_lens=', '.join(map(str,g.seed_lens)), g=g,pnm=g.proj_name, dpf=PasswordList.dfl_pw_fmt, kgs=' '.join(['{}:{}'.format(n,k) for n,k in enumerate(g.key_generators,1)]) ), 'notes': lambda s: s.format( o=opts,g=g,i58=pwi['b58'],i32=pwi['b32'],i39=pwi['bip39'], ml=MMGenPWIDString.max_len, fs="', '".join(MMGenPWIDString.forbidden), n_pw=help_notes('passwd'), n_bw=help_notes('brainwallet'), pfi='\n '.join( [pwi_fs.format('Code','','Description','Min Len','Max Len','Default Len')] + [pwi_fs.format(k,'-',v.desc,v.min_len,v.max_len,v.dfl_len) for k,v in pwi.items()]), n_fmt='\n '.join(SeedSource.format_fmt_codes().splitlines()) ) } } cmd_args = opts.init(opts_data,add_opts=['b16']) if len(cmd_args) < 2: opts.usage() pw_idxs = AddrIdxList(fmt_str=cmd_args.pop()) pw_id_str = cmd_args.pop() sf = get_seed_file(cmd_args,1) pw_fmt = opt.passwd_fmt or PasswordList.dfl_pw_fmt pw_len = pwi[pw_fmt].dfl_len // 2 if opt.passwd_len in ('h','H') else opt.passwd_len PasswordList(pw_id_str=pw_id_str,pw_len=pw_len,pw_fmt=pw_fmt,chk_params_only=True) do_license_msg() ss = SeedSource(sf) al = PasswordList(seed=ss.seed,pw_idxs=pw_idxs,pw_id_str=pw_id_str,pw_len=pw_len,pw_fmt=pw_fmt) al.format() if keypress_confirm('Encrypt password list?'): al.encrypt(desc='password list') al.write_to_file(binary=True,desc='encrypted password list') else: if g.test_suite_popen_spawn and g.platform == 'win': time.sleep(0.1) al.write_to_file(desc='password list')