mmgen-walletchk 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. #!/usr/bin/env python
  2. #
  3. # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  4. # Copyright (C) 2013 by philemon <mmgen-py@yandex.com>
  5. #
  6. # This program is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. """
  19. mmgen-walletchk: Check integrity of a mmgen deterministic wallet, display
  20. information about it and export seed and mnemonic data
  21. """
  22. import sys
  23. from mmgen.Opts import *
  24. from mmgen.util import *
  25. help_data = {
  26. 'prog_name': sys.argv[0].split("/")[-1],
  27. 'desc': """Check integrity of a %s deterministic wallet, display
  28. its information and export seed and mnemonic data."""\
  29. % g.proj_name,
  30. 'usage': "[opts] [filename]",
  31. 'options': """
  32. -h, --help Print this help message
  33. -d, --outdir d Specify an alternate directory 'd' for output
  34. -e, --echo-passphrase Print passphrase to screen when typing it
  35. -P, --passwd-file f Get passphrase from file 'f'
  36. -q, --quiet Suppress warnings; overwrite files without prompting
  37. -S, --stdout Print seed or mnemonic data to standard output
  38. -v, --verbose Produce more verbose output
  39. -g, --export-incognito Export wallet to incognito format
  40. -G, --hide-incog-data f,o Hide incognito data in existing file 'f'
  41. at offset 'o' (comma-separated)
  42. -m, --export-mnemonic Export the wallet's mnemonic to file
  43. -s, --export-seed Export the wallet's seed to file
  44. """
  45. }
  46. short_opts = "hd:eP:qSvgG:ms"
  47. long_opts = "help","outdir=","echo_passphrase","passwd_file=","quiet",\
  48. "stdout","verbose",\
  49. "export_incognito","hide_incog_data=","export_mnemonic","export_seed"
  50. opts,cmd_args = process_opts(sys.argv,help_data,short_opts,long_opts)
  51. if 'quiet' in opts: g.quiet = True
  52. if 'verbose' in opts: g.verbose = True
  53. if 'hide_incog_data' in opts: opts['export_incognito'] = True
  54. # Argument sanity checks and processing:
  55. check_opts(opts,long_opts)
  56. if len(cmd_args) != 1: usage(help_data)
  57. check_infile(cmd_args[0])
  58. if 'export_mnemonic' in opts:
  59. qmsg("Exporting mnemonic data to file by user request")
  60. elif 'export_seed' in opts:
  61. qmsg("Exporting seed data to file by user request")
  62. elif 'export_incognito' in opts:
  63. qmsg("Exporting wallet to incognito format by user request")
  64. d = get_data_from_wallet(cmd_args[0],silent=True)
  65. seed_id,key_id,preset,salt,enc_seed = \
  66. d[1][0], d[1][1], d[2].split(":")[0], d[3], d[4]
  67. passwd = get_mmgen_passphrase("Enter mmgen passphrase: ",opts)
  68. key = make_key(passwd, salt, preset, "main key")
  69. # We don't need the seed; just do this to verify password.
  70. if decrypt_seed(enc_seed, key, seed_id, key_id) == False:
  71. sys.exit(2)
  72. from Crypto import Random
  73. iv = Random.new().read(g.aesctr_iv_len)
  74. iv_id = make_chksum_8(iv)
  75. qmsg("IV ID: %s" % iv_id)
  76. from binascii import hexlify
  77. from hashlib import sha256
  78. # IV is used BOTH to initialize counter and to salt password!
  79. key = make_key(passwd, iv, preset, "wrapper key")
  80. incog_enc = encrypt_seed(salt + enc_seed, key, iv=int(hexlify(iv),16))
  81. if "hide_incog_data" in opts:
  82. fname,offset = opts['hide_incog_data'].split(",") # Already sanity-checked
  83. offset = int(offset)
  84. check_data_fits_file_at_offset(fname,offset,len(iv + incog_enc),"write")
  85. if not g.quiet: confirm_or_exit("","alter file '%s'" % fname)
  86. f = os.open(fname,os.O_RDWR)
  87. os.lseek(f, offset, os.SEEK_SET)
  88. os.write(f, iv + incog_enc)
  89. os.close(f)
  90. qmsg("Data written to file '%s' at offset %s" % (fname,offset),
  91. "Data written to file")
  92. else:
  93. fn = "%s-%s-%s[%s,%s].%s" % (seed_id, key_id, iv_id,
  94. len(enc_seed)*8, preset, g.incog_ext)
  95. export_to_file(fn, iv + incog_enc, "incognito wallet data", opts)
  96. sys.exit()
  97. seed = get_seed_from_wallet(cmd_args[0], opts)
  98. if seed: qmsg("Wallet is OK")
  99. else:
  100. msg("Error opening wallet")
  101. sys.exit(2)
  102. if 'export_mnemonic' in opts:
  103. wl = get_default_wordlist()
  104. from mmgen.mnemonic import get_mnemonic_from_seed
  105. p = True if g.debug else False
  106. mn = get_mnemonic_from_seed(seed, wl, g.default_wl, print_info=p)
  107. fn = "%s.%s" % (make_chksum_8(seed).upper(), g.mn_ext)
  108. export_to_file(fn, " ".join(mn)+"\n", "mnemonic data", opts)
  109. elif 'export_seed' in opts:
  110. from mmgen.bitcoin import b58encode_pad
  111. data = col4(b58encode_pad(seed))
  112. chk = make_chksum_6(b58encode_pad(seed))
  113. fn = "%s.%s" % (make_chksum_8(seed).upper(), g.seed_ext)
  114. export_to_file(fn, "%s %s\n" % (chk,data), "seed data", opts)