mirror of
https://gitlab.com/pulsechaincom/staking-deposit-cli.git
synced 2024-12-23 11:57:19 +00:00
Fix key path
This commit is contained in:
parent
b3ab5cf0af
commit
72f0dd0852
@ -21,9 +21,17 @@ from eth2deposit.utils.ssz import (
|
||||
|
||||
class ValidatorCredentials:
|
||||
def __init__(self, *, mnemonic: str, index: int, amount: int):
|
||||
self.signing_key_path = 'm/12381/3600/%s/0' % index
|
||||
self.signing_sk = mnemonic_and_path_to_key(mnemonic=mnemonic, path=self.signing_key_path)
|
||||
self.withdrawal_sk = mnemonic_and_path_to_key(mnemonic=mnemonic, path=self.signing_key_path + '/0')
|
||||
# Set path as EIP-2334 format
|
||||
# https://eips.ethereum.org/EIPS/eip-2334
|
||||
purpose = '12381'
|
||||
coin_type = '3600'
|
||||
account = str(index)
|
||||
withdrawal_key_path = f'm/{purpose}/{coin_type}/{account}/0'
|
||||
self.signing_key_path = f'{withdrawal_key_path}/0'
|
||||
|
||||
# Do NOT use password for seed generation.
|
||||
self.withdrawal_sk = mnemonic_and_path_to_key(mnemonic=mnemonic, path=withdrawal_key_path, password='')
|
||||
self.signing_sk = mnemonic_and_path_to_key(mnemonic=mnemonic, path=self.signing_key_path, password='')
|
||||
self.amount = amount
|
||||
|
||||
@property
|
||||
|
@ -2,9 +2,9 @@ import os
|
||||
from unicodedata import normalize
|
||||
from secrets import randbits
|
||||
from typing import (
|
||||
List,
|
||||
Optional,
|
||||
Sequence,
|
||||
Tuple,
|
||||
)
|
||||
|
||||
from eth2deposit.utils.crypto import (
|
||||
@ -22,27 +22,29 @@ def _get_word(*, word_list: Sequence[str], index: int) -> str:
|
||||
return word_list[index][:-1]
|
||||
|
||||
|
||||
def get_seed(*, mnemonic: str, password: str='') -> bytes:
|
||||
def get_seed(*, mnemonic: str, password: str) -> bytes:
|
||||
"""
|
||||
Derives the seed for the pre-image root of the tree.
|
||||
Derive the seed for the pre-image root of the tree.
|
||||
|
||||
Ref: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki#from-mnemonic-to-seed
|
||||
"""
|
||||
mnemonic = normalize('NFKD', mnemonic)
|
||||
salt = normalize('NFKD', 'mnemonic' + password).encode('utf-8')
|
||||
return PBKDF2(password=mnemonic, salt=salt, dklen=64, c=2048, prf='sha512')
|
||||
|
||||
|
||||
def get_languages(path: str) -> List[str]:
|
||||
def get_languages(path: str) -> Tuple[str, ...]:
|
||||
"""
|
||||
Walk the `path` and list all the languages with word-lists available.
|
||||
"""
|
||||
(_, _, filenames) = next(os.walk(path))
|
||||
filenames = [name[:-4] for name in filenames]
|
||||
return filenames
|
||||
languages = tuple([name[:-4] for name in filenames])
|
||||
return languages
|
||||
|
||||
|
||||
def get_mnemonic(*, language: str, words_path: str, entropy: Optional[bytes]=None) -> str:
|
||||
"""
|
||||
Returns a mnemonic string in a given `language` based on `entropy`.
|
||||
Return a mnemonic string in a given `language` based on `entropy`.
|
||||
"""
|
||||
if entropy is None:
|
||||
entropy = randbits(256).to_bytes(32, 'big')
|
||||
|
@ -18,7 +18,7 @@ def path_to_nodes(path: str) -> List[int]:
|
||||
return [int(index) for index in indices]
|
||||
|
||||
|
||||
def mnemonic_and_path_to_key(*, mnemonic: str, path: str, password: str='') -> int:
|
||||
def mnemonic_and_path_to_key(*, mnemonic: str, path: str, password: str) -> int:
|
||||
"""
|
||||
Returns the SK at position `path` secures with `password` derived from `mnemonic`.
|
||||
"""
|
||||
|
@ -38,4 +38,5 @@ def HKDF(*, salt: bytes, IKM: bytes, L: int) -> bytes:
|
||||
|
||||
|
||||
def AES_128_CTR(*, key: bytes, iv: bytes) -> Any:
|
||||
assert len(key) == 16
|
||||
return _AES.new(key=key, mode=_AES.MODE_CTR, initial_value=iv, nonce=b'')
|
||||
|
Loading…
Reference in New Issue
Block a user