curve = SECP256k1
secexp = self.stretch_key(seed)
master_private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
- master_public_key = master_private_key.get_verifying_key().to_string().encode('hex')
+ master_public_key = master_private_key.get_verifying_key().to_string()
if master_public_key != self.mpk:
print_error('invalid password (mpk)')
raise BaseException('Invalid password')
s = pw_decode(self.seed, password)
if self.seed_version == 4:
seed = s
+ self.accounts[0].check_seed(seed)
else:
seed = mnemonic_hash(s)
- #todo: #self.sequences[0].check_seed(seed)
return seed