main_passgen.py 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. #!/usr/bin/env python3
  2. #
  3. # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  4. # Copyright (C)2013-2019 The MMGen Project <mmgen@tuta.io>
  5. #
  6. # This program is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. """
  19. mmgen-passgen: Generate a series or range of passwords from an MMGen
  20. deterministic wallet
  21. """
  22. from mmgen.common import *
  23. from mmgen.crypto import *
  24. from mmgen.addr import PasswordList,AddrIdxList
  25. from mmgen.seed import SeedSource
  26. from mmgen.obj import MMGenPWIDString
  27. pwi = PasswordList.pw_info
  28. pwi_fs = '{:5} {:1} {:26} {:<7} {:<7} {}'
  29. opts_data = {
  30. 'sets': [('print_checksum',True,'quiet',True)],
  31. 'text': {
  32. 'desc': """
  33. Generate a range or list of passwords from an {pnm} wallet,
  34. mnemonic, seed or brainwallet for the given ID string
  35. """.format(pnm=g.proj_name),
  36. 'usage':'[opts] [seed source] <ID string> <index list or range(s)>',
  37. 'options': """
  38. -h, --help Print this help message
  39. --, --longhelp Print help message for long options (common options)
  40. -d, --outdir= d Output files to directory 'd' instead of working dir
  41. -e, --echo-passphrase Echo passphrase or mnemonic to screen upon entry
  42. -f, --passwd-fmt= f Generate passwords of format 'f'. Default: {dpf}.
  43. See PASSWORD FORMATS below
  44. -i, --in-fmt= f Input is from wallet format 'f' (see FMT CODES below)
  45. -H, --hidden-incog-input-params=f,o Read hidden incognito data from file
  46. 'f' at offset 'o' (comma-separated)
  47. -O, --old-incog-fmt Specify old-format incognito input
  48. -L, --passwd-len= l Specify length of generated passwords. For defaults,
  49. see PASSWORD FORMATS below. An argument of 'h' will
  50. generate passwords of half the default length.
  51. -l, --seed-len= l Specify wallet seed length of 'l' bits. This option
  52. is required only for brainwallet and incognito inputs
  53. with non-standard (< {g.seed_len}-bit) seed lengths
  54. -p, --hash-preset= p Use the scrypt hash parameters defined by preset 'p'
  55. for password hashing (default: '{g.hash_preset}')
  56. -z, --show-hash-presets Show information on available hash presets
  57. -P, --passwd-file= f Get wallet passphrase from file 'f'
  58. -q, --quiet Produce quieter output; suppress some warnings
  59. -r, --usr-randchars=n Get 'n' characters of additional randomness from user
  60. (min={g.min_urandchars}, max={g.max_urandchars}, default={g.usr_randchars})
  61. -S, --stdout Print passwords to stdout
  62. -v, --verbose Produce more verbose output
  63. """,
  64. 'notes': """
  65. NOTES FOR THIS COMMAND
  66. ID string must be a valid UTF-8 string not longer than {ml} characters and
  67. not containing the symbols '{fs}'.
  68. Password indexes are given as a comma-separated list and/or hyphen-separated
  69. range(s).
  70. Changing either the password format (base32,base58) or length alters the seed
  71. and thus generates a completely new set of passwords.
  72. PASSWORD FORMATS:
  73. {pfi}
  74. EXAMPLES:
  75. Generate ten base58 passwords of length {i58.dfl_len} for Alice's email account:
  76. {g.prog_name} alice@nowhere.com 1-10
  77. Generate ten base58 passwords of length 16 for Alice's email account:
  78. {g.prog_name} -L16 alice@nowhere.com 1-10
  79. Generate ten base32 passwords of length {i32.dfl_len} for Alice's email account:
  80. {g.prog_name} -b alice@nowhere.com 1-10
  81. The three sets of passwords are completely unrelated to each other, so
  82. Alice doesn't need to worry about password reuse.
  83. NOTES FOR ALL GENERATOR COMMANDS
  84. {n_pw}
  85. {n_bw}
  86. FMT CODES:
  87. {n_fmt}
  88. """
  89. },
  90. 'code': {
  91. 'options': lambda s: s.format(
  92. seed_lens=', '.join(map(str,g.seed_lens)),
  93. g=g,pnm=g.proj_name,
  94. dpf=PasswordList.dfl_pw_fmt,
  95. kgs=' '.join(['{}:{}'.format(n,k) for n,k in enumerate(g.key_generators,1)])
  96. ),
  97. 'notes': lambda s: s.format(
  98. o=opts,g=g,i58=pwi['b58'],i32=pwi['b32'],
  99. ml=MMGenPWIDString.max_len,
  100. fs="', '".join(MMGenPWIDString.forbidden),
  101. n_pw=help_notes('passwd'),
  102. n_bw=help_notes('brainwallet'),
  103. pfi='\n '.join(
  104. [pwi_fs.format('Code','','Description','Min Len','Max Len','Default Len')] +
  105. [pwi_fs.format(k,'-',v.desc,v.min_len,v.max_len,v.dfl_len) for k,v in pwi.items()]),
  106. n_fmt='\n '.join(SeedSource.format_fmt_codes().splitlines())
  107. )
  108. }
  109. }
  110. cmd_args = opts.init(opts_data,add_opts=['b16'])
  111. if len(cmd_args) < 2: opts.usage()
  112. pw_idxs = AddrIdxList(fmt_str=cmd_args.pop())
  113. pw_id_str = cmd_args.pop()
  114. sf = get_seed_file(cmd_args,1)
  115. pw_fmt = opt.passwd_fmt or PasswordList.dfl_pw_fmt
  116. pw_len = pwi[pw_fmt].dfl_len // 2 if opt.passwd_len in ('h','H') else opt.passwd_len
  117. PasswordList(pw_id_str=pw_id_str,pw_len=pw_len,pw_fmt=pw_fmt,chk_params_only=True)
  118. do_license_msg()
  119. ss = SeedSource(sf)
  120. al = PasswordList(seed=ss.seed,pw_idxs=pw_idxs,pw_id_str=pw_id_str,pw_len=pw_len,pw_fmt=pw_fmt)
  121. al.format()
  122. if keypress_confirm('Encrypt password list?'):
  123. al.encrypt(desc='password list')
  124. al.write_to_file(binary=True,desc='encrypted password list')
  125. else:
  126. al.write_to_file(desc='password list')