use bip39::{Language, Mnemonic, MnemonicType, Seed}; use bs58; use clap::{ crate_description, crate_name, value_t, values_t_or_exit, App, AppSettings, Arg, ArgMatches, SubCommand, }; use num_cpus; use solana_clap_utils::keypair::{ keypair_from_seed_phrase, prompt_passphrase, ASK_KEYWORD, SKIP_SEED_PHRASE_VALIDATION_ARG, }; use solana_sdk::{ pubkey::write_pubkey_file, signature::{ keypair_from_seed, read_keypair, read_keypair_file, write_keypair, write_keypair_file, Keypair, KeypairUtil, Signature, }, }; use std::{ collections::HashSet, error, path::Path, process::exit, sync::{ atomic::{AtomicU64, Ordering}, Arc, }, thread, time::Instant, }; const NO_PASSPHRASE: &str = ""; fn check_for_overwrite(outfile: &str, matches: &ArgMatches) { let force = matches.is_present("force"); if !force && Path::new(outfile).exists() { eprintln!("Refusing to overwrite {} without --force flag", outfile); exit(1); } } fn get_keypair_from_matches(matches: &ArgMatches) -> Result> { let mut path = dirs::home_dir().expect("home directory"); let infile = if matches.is_present("infile") { matches.value_of("infile").unwrap() } else { path.extend(&[".config", "solana", "id.json"]); path.to_str().unwrap() }; if infile == "-" { let mut stdin = std::io::stdin(); read_keypair(&mut stdin) } else if infile == ASK_KEYWORD { let skip_validation = matches.is_present(SKIP_SEED_PHRASE_VALIDATION_ARG.name); keypair_from_seed_phrase("pubkey recovery", skip_validation, false) } else { read_keypair_file(infile) } } fn output_keypair( keypair: &Keypair, outfile: &str, source: &str, ) -> Result<(), Box> { if outfile == "-" { let mut stdout = std::io::stdout(); write_keypair(&keypair, &mut stdout)?; } else { write_keypair_file(&keypair, outfile)?; eprintln!("Wrote {} keypair to {}", source, outfile); } Ok(()) } fn main() -> Result<(), Box> { let matches = App::new(crate_name!()) .about(crate_description!()) .version(solana_clap_utils::version!()) .setting(AppSettings::SubcommandRequiredElseHelp) .subcommand( SubCommand::with_name("verify") .about("Verify a keypair can sign and verify a message.") .arg( Arg::with_name("infile") .index(1) .value_name("PATH") .takes_value(true) .help("Path to keypair file"), ) .arg( Arg::with_name("pubkey") .index(2) .value_name("BASE58_PUBKEY") .takes_value(true) .help("Public key"), ) ) .subcommand( SubCommand::with_name("new") .about("Generate new keypair file from a passphrase and random seed phrase") .setting(AppSettings::DisableVersion) .arg( Arg::with_name("outfile") .short("o") .long("outfile") .value_name("PATH") .takes_value(true) .help("Path to generated file"), ) .arg( Arg::with_name("force") .short("f") .long("force") .help("Overwrite the output file if it exists"), ) .arg( Arg::with_name("word_count") .long("word-count") .possible_values(&["12", "15", "18", "21", "24"]) .default_value("12") .value_name("NUM") .takes_value(true) .help("Specify the number of words that will be present in the generated seed phrase"), ) .arg( Arg::with_name("no_passphrase") .long("no-passphrase") .help("Do not prompt for a passphrase"), ) .arg( Arg::with_name("no_outfile") .long("no-outfile") .conflicts_with_all(&["outfile", "silent"]) .help("Only print a seed phrase and pubkey. Do not output a keypair file"), ) .arg( Arg::with_name("silent") .short("s") .long("silent") .help("Do not display seed phrase. Useful when piping output to other programs that prompt for user input, like gpg"), ) ) .subcommand( SubCommand::with_name("grind") .about("Grind for vanity keypairs") .setting(AppSettings::DisableVersion) .arg( Arg::with_name("ignore_case") .long("ignore-case") .help("Perform case insensitive matches"), ) .arg( Arg::with_name("includes") .long("includes") .value_name("BASE58") .takes_value(true) .multiple(true) .validator(|value| { bs58::decode(&value).into_vec() .map(|_| ()) .map_err(|err| format!("{}: {:?}", value, err)) }) .help("Save keypair if its public key includes this string\n(may be specified multiple times)"), ) .arg( Arg::with_name("starts_with") .long("starts-with") .value_name("BASE58 PREFIX") .takes_value(true) .multiple(true) .validator(|value| { bs58::decode(&value).into_vec() .map(|_| ()) .map_err(|err| format!("{}: {:?}", value, err)) }) .help("Save keypair if its public key starts with this prefix\n(may be specified multiple times)"), ), ) .subcommand( SubCommand::with_name("pubkey") .about("Display the pubkey from a keypair file") .setting(AppSettings::DisableVersion) .arg( Arg::with_name("infile") .index(1) .value_name("PATH") .takes_value(true) .help("Path to keypair file"), ) .arg( Arg::with_name(SKIP_SEED_PHRASE_VALIDATION_ARG.name) .long(SKIP_SEED_PHRASE_VALIDATION_ARG.long) .help(SKIP_SEED_PHRASE_VALIDATION_ARG.help), ) .arg( Arg::with_name("outfile") .short("o") .long("outfile") .value_name("PATH") .takes_value(true) .help("Path to generated file"), ) .arg( Arg::with_name("force") .short("f") .long("force") .help("Overwrite the output file if it exists"), ), ) .subcommand( SubCommand::with_name("recover") .about("Recover keypair from seed phrase and passphrase") .setting(AppSettings::DisableVersion) .arg( Arg::with_name("outfile") .short("o") .long("outfile") .value_name("PATH") .takes_value(true) .help("Path to generated file"), ) .arg( Arg::with_name("force") .short("f") .long("force") .help("Overwrite the output file if it exists"), ) .arg( Arg::with_name(SKIP_SEED_PHRASE_VALIDATION_ARG.name) .long(SKIP_SEED_PHRASE_VALIDATION_ARG.long) .help(SKIP_SEED_PHRASE_VALIDATION_ARG.help), ), ) .get_matches(); match matches.subcommand() { ("pubkey", Some(matches)) => { let keypair = get_keypair_from_matches(matches)?; if matches.is_present("outfile") { let outfile = matches.value_of("outfile").unwrap(); check_for_overwrite(&outfile, &matches); write_pubkey_file(outfile, keypair.pubkey())?; } else { println!("{}", keypair.pubkey()); } } ("new", Some(matches)) => { let mut path = dirs::home_dir().expect("home directory"); let outfile = if matches.is_present("outfile") { matches.value_of("outfile") } else if matches.is_present("no_outfile") { None } else { path.extend(&[".config", "solana", "id.json"]); Some(path.to_str().unwrap()) }; match outfile { Some("-") => (), Some(outfile) => check_for_overwrite(&outfile, &matches), None => (), } let word_count = value_t!(matches.value_of("word_count"), usize).unwrap(); let mnemonic_type = MnemonicType::for_word_count(word_count)?; let mnemonic = Mnemonic::new(mnemonic_type, Language::English); let passphrase = if matches.is_present("no_passphrase") { NO_PASSPHRASE.to_string() } else { eprintln!("Generating a new keypair"); prompt_passphrase( "For added security, enter a passphrase (empty for no passphrase): ", )? }; let seed = Seed::new(&mnemonic, &passphrase); let keypair = keypair_from_seed(seed.as_bytes())?; if let Some(outfile) = outfile { output_keypair(&keypair, &outfile, "new")?; } let silent = matches.is_present("silent"); if !silent { let phrase: &str = mnemonic.phrase(); let divider = String::from_utf8(vec![b'='; phrase.len()]).unwrap(); eprintln!( "{}\npubkey: {}\n{}\nSave this seed phrase to recover your new keypair:\n{}\n{}", ÷r, keypair.pubkey(), ÷r, phrase, ÷r ); } } ("recover", Some(matches)) => { let mut path = dirs::home_dir().expect("home directory"); let outfile = if matches.is_present("outfile") { matches.value_of("outfile").unwrap() } else { path.extend(&[".config", "solana", "id.json"]); path.to_str().unwrap() }; if outfile != "-" { check_for_overwrite(&outfile, &matches); } let skip_validation = matches.is_present(SKIP_SEED_PHRASE_VALIDATION_ARG.name); let keypair = keypair_from_seed_phrase("recover", skip_validation, true)?; output_keypair(&keypair, &outfile, "recovered")?; } ("grind", Some(matches)) => { let ignore_case = matches.is_present("ignore_case"); let includes = if matches.is_present("includes") { values_t_or_exit!(matches, "includes", String) .into_iter() .map(|s| if ignore_case { s.to_lowercase() } else { s }) .collect() } else { HashSet::new() }; let starts_with = if matches.is_present("starts_with") { values_t_or_exit!(matches, "starts_with", String) .into_iter() .map(|s| if ignore_case { s.to_lowercase() } else { s }) .collect() } else { HashSet::new() }; if includes.is_empty() && starts_with.is_empty() { eprintln!( "Error: No keypair search criteria provided (--includes or --starts-with)" ); exit(1); } let attempts = Arc::new(AtomicU64::new(1)); let found = Arc::new(AtomicU64::new(0)); let start = Instant::now(); println!( "Searching with {} threads for a pubkey containing {:?} or starting with {:?}", num_cpus::get(), includes, starts_with ); let _threads = (0..num_cpus::get()) .map(|_| { let attempts = attempts.clone(); let found = found.clone(); let includes = includes.clone(); let starts_with = starts_with.clone(); thread::spawn(move || loop { let attempts = attempts.fetch_add(1, Ordering::Relaxed); if attempts % 5_000_000 == 0 { println!( "Searched {} keypairs in {}s. {} matches found", attempts, start.elapsed().as_secs(), found.load(Ordering::Relaxed), ); } let keypair = Keypair::new(); let mut pubkey = bs58::encode(keypair.pubkey()).into_string(); if ignore_case { pubkey = pubkey.to_lowercase(); } if starts_with.iter().any(|s| pubkey.starts_with(s)) || includes.iter().any(|s| pubkey.contains(s)) { let found = found.fetch_add(1, Ordering::Relaxed); output_keypair( &keypair, &format!("{}.json", keypair.pubkey()), &format!("{}", found), ) .unwrap(); } }); }) .collect::>(); thread::park(); } ("verify", Some(matches)) => { let keypair = get_keypair_from_matches(matches)?; let test_data = b"test"; let signature = Signature::new(&keypair.sign(test_data).to_bytes()); let pubkey_bs58 = matches.value_of("pubkey").unwrap(); let pubkey = bs58::decode(pubkey_bs58).into_vec().unwrap(); if signature.verify(&pubkey, test_data) { println!("Verification for public key: {}: Success", pubkey_bs58); } else { println!("Verification for public key: {}: Failed", pubkey_bs58); exit(1); } } _ => unreachable!(), } Ok(()) }