1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168
//! This crate provides a basic implementation of BIP32, BIP49, and BIP84.
//! It can be easily adapted to support other networks, using the
//! paramaterizable encoder.
//!
//!
//! Typically, users will want to use the `MainnetEncoder`, `DerivedXPub`, `DerivedXPriv` types,
//! which are available at the crate root. If key derivations are unknown, use the `XPub` and
//! `XPriv` objects instead. These may be deserialized using a network-specific `Encoder` from the
//! `enc` module.
//!
//! Useful traits will need to be imported from the `enc` or `model` modules.
//! We also provide a `prelude` module with everything you need to get started.
//!
//! # Warnings:
//!
//! - This crate is NOT designed to be used in adversarial environments.
//! - This crate has NOT had a comprehensive security review.
//!
//! # Usage
//! ```
//! use coins_bip32::prelude::*;
//!
//! # fn main() -> Result<(), Bip32Error> {
//! let digest = coins_core::Hash256::default();
//!
//! let xpriv_str = "xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi".to_owned();
//!
//! let xpriv: XPriv = xpriv_str.parse().unwrap();
//!
//! let child_xpriv = xpriv.derive_child(33)?;
//! let sig: RecoverableSignature = child_xpriv.sign_digest(digest.clone());
//!
//! // Signing key types are associated with verifying key types. You can always derive a pubkey
//! let child_xpub = child_xpriv.verify_key();
//! child_xpub.verify_digest(digest.clone(), &sig);
//!
//! MainnetEncoder::xpub_to_base58(&child_xpub)?;
//! # Ok(())
//! # }
//! ```
#![forbid(unsafe_code)]
#![warn(missing_docs)]
#![warn(unused_extern_crates)]
pub use k256::ecdsa;
#[macro_use]
pub(crate) mod macros;
/// Network-differentiated encoders for extended keys.
pub mod enc;
/// `DerivationPath` type and tooling for parsing it from strings
pub mod path;
/// Low-level types
pub mod primitives;
/// Extended keys and related functionality
pub mod xkeys;
/// Provides keys that are coupled with their derivation path
pub mod derived;
#[doc(hidden)]
#[cfg(any(feature = "mainnet", feature = "testnet"))]
pub mod defaults;
/// Quickstart types and traits
pub mod prelude;
use thiserror::Error;
/// The hardened derivation flag. Keys at or above this index are hardened.
pub const BIP32_HARDEN: u32 = 0x8000_0000;
#[doc(hidden)]
pub const CURVE_ORDER: [u8; 32] = [
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe,
0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41,
];
/// Errors for this library
#[derive(Debug, Error)]
pub enum Bip32Error {
/// Error bubbled up from the backend
#[error("k256 error")]
BackendError(/*#[from]*/ ecdsa::Error),
/// Error bubbled up from the backend
#[error("elliptic curve error")]
EllipticCurveError(/*#[from]*/ k256::elliptic_curve::Error),
/// Error bubbled up froom std::io
#[error(transparent)]
IoError(#[from] std::io::Error),
/// Error bubbled up froom Ser
#[error(transparent)]
SerError(#[from] coins_core::ser::SerError),
/// Master key seed generation received <16 bytes
#[error("Master key seed generation received <16 bytes")]
SeedTooShort,
/// HMAC I_l was invalid during key generations.
#[error("HMAC left segment was 0 or greated than the curve order. How?")]
InvalidKey,
/// pted to derive the hardened child of an xpub
#[error("Attempted to derive the hardened child of an xpub")]
HardenedDerivationFailed,
/// Attempted to tweak an xpriv or xpub directly
#[error("Attempted to tweak an xpriv or xpub directly")]
BadTweak,
/// Unrecognized version when deserializing xpriv
#[error("Version bytes 0x{0:x?} don't match any network xpriv version bytes")]
BadXPrivVersionBytes([u8; 4]),
/// Unrecognized version when deserializing xpub
#[error("Version bytes 0x{0:x?} don't match any network xpub version bytes")]
BadXPubVersionBytes([u8; 4]),
/// Bad padding byte on serialized xprv
#[error("Expected 0 padding byte. Got {0}")]
BadPadding(u8),
/// Bad Checks on b58check
#[error("Checksum mismatch on b58 deserialization")]
BadB58Checksum,
/// Bubbled up error from bs58 library
#[error(transparent)]
B58Error(#[from] bs58::decode::Error),
/// Parsing an string derivation failed because an index string was malformatted
#[error("Malformatted index during derivation: {0}")]
MalformattedDerivation(String),
/// Attempted to deserialize a DER signature to a recoverable signature.
#[error("Attempted to deserialize a DER signature to a recoverable signature. Use deserialize_vrs instead")]
NoRecoveryId,
/// Attempted to deserialize a very long path
#[error("Invalid Bip32 Path.")]
InvalidBip32Path,
}
impl From<ecdsa::Error> for Bip32Error {
fn from(e: ecdsa::Error) -> Self {
Self::BackendError(e)
}
}
impl From<k256::elliptic_curve::Error> for Bip32Error {
fn from(e: k256::elliptic_curve::Error) -> Self {
Self::EllipticCurveError(e)
}
}
impl From<std::convert::Infallible> for Bip32Error {
fn from(_i: std::convert::Infallible) -> Self {
unimplemented!("unreachable, but required by type system")
}
}