You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1204 lines
36 KiB
1204 lines
36 KiB
/******************************************************************************
|
|
* Copyright © 2014-2015 The SuperNET Developers. *
|
|
* *
|
|
* See the AUTHORS, DEVELOPER-AGREEMENT and LICENSE files at *
|
|
* the top-level directory of this distribution for the individual copyright *
|
|
* holder information and the developer policies on copyright and licensing. *
|
|
* *
|
|
* Unless otherwise agreed in a custom licensing agreement, no part of the *
|
|
* SuperNET software, including this file may be copied, modified, propagated *
|
|
* or distributed except according to the terms contained in the LICENSE file *
|
|
* *
|
|
* Removal or modification of this copyright notice is prohibited. *
|
|
* *
|
|
******************************************************************************/
|
|
|
|
#include "iguana777.h"
|
|
#include <stdbool.h>
|
|
#include "../includes/openssl/ec.h"
|
|
#include "../includes/openssl/ecdsa.h"
|
|
#include "../includes/openssl/obj_mac.h"
|
|
//#include "../includes/openssl/ripemd.h"
|
|
//#include "../includes/openssl/sha.h"
|
|
|
|
#define SCRIPT_OP_IF 0x63
|
|
#define SCRIPT_OP_ELSE 0x67
|
|
#define SCRIPT_OP_DUP 0x76
|
|
#define SCRIPT_OP_ENDIF 0x68
|
|
#define SCRIPT_OP_TRUE 0x51
|
|
#define SCRIPT_OP_NOP 0x61
|
|
#define SCRIPT_OP_2 0x52
|
|
#define SCRIPT_OP_3 0x53
|
|
#define SCRIPT_OP_EQUALVERIFY 0x88
|
|
#define SCRIPT_OP_HASH160 0xa9
|
|
#define SCRIPT_OP_EQUAL 0x87
|
|
#define SCRIPT_OP_CHECKSIG 0xac
|
|
#define SCRIPT_OP_CHECKMULTISIG 0xae
|
|
#define SCRIPT_OP_CHECKMULTISIGVERIFY 0xaf
|
|
|
|
struct bp_key { EC_KEY *k; };
|
|
typedef struct cstring { char *str; size_t len,alloc; } cstring;
|
|
|
|
static const char base58_chars[] = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz";
|
|
|
|
static bool cstr_alloc_min_sz(cstring *s, size_t sz)
|
|
{
|
|
char *new_s; uint32_t al_sz,shift = 3;
|
|
sz++; // NUL overhead
|
|
if ( s->alloc && (s->alloc >= sz) )
|
|
return true;
|
|
while ( (al_sz = (1 << shift)) < sz )
|
|
shift++;
|
|
if ( (new_s= mycalloc('C',1,al_sz)) != 0 )
|
|
{
|
|
if ( s->str != 0 )
|
|
{
|
|
memcpy(new_s,s->str,s->len);
|
|
myfree(s->str,s->alloc);
|
|
}
|
|
s->str = new_s;
|
|
s->alloc = al_sz;
|
|
s->str[s->len] = 0;
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
cstring *cstr_new_sz(size_t sz)
|
|
{
|
|
cstring *s = mycalloc('C',1,sizeof(cstring));
|
|
if (!s)
|
|
return NULL;
|
|
if (!cstr_alloc_min_sz(s, sz))
|
|
{
|
|
myfree(s,sizeof(cstring));
|
|
return NULL;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
cstring *cstr_new_buf(const void *buf, size_t sz)
|
|
{
|
|
cstring *s = cstr_new_sz(sz);
|
|
if (!s)
|
|
return NULL;
|
|
memcpy(s->str, buf, sz);
|
|
s->len = sz;
|
|
s->str[s->len] = 0;
|
|
return s;
|
|
}
|
|
|
|
cstring *cstr_new(const char *init_str)
|
|
{
|
|
if ( !init_str || !*init_str )
|
|
return cstr_new_sz(0);
|
|
size_t slen = strlen(init_str);
|
|
return cstr_new_buf(init_str, slen);
|
|
}
|
|
|
|
void cstr_free(cstring *s, bool free_buf)
|
|
{
|
|
if (!s)
|
|
return;
|
|
if (free_buf)
|
|
myfree(s->str,s->alloc);
|
|
memset(s, 0, sizeof(*s));
|
|
myfree(s,sizeof(*s));
|
|
}
|
|
|
|
bool cstr_erase(cstring *s,size_t pos,ssize_t len)
|
|
{
|
|
if (pos == s->len && len == 0)
|
|
return true;
|
|
if (pos >= s->len)
|
|
return false;
|
|
size_t old_tail = s->len - pos;
|
|
if ((len >= 0) && (len > old_tail))
|
|
return false;
|
|
memmove(&s->str[pos], &s->str[pos + len], old_tail - len);
|
|
s->len -= len;
|
|
s->str[s->len] = 0;
|
|
return true;
|
|
}
|
|
|
|
bool cstr_resize(cstring *s, size_t new_sz)
|
|
{
|
|
// no change
|
|
if (new_sz == s->len)
|
|
return true;
|
|
// truncate string
|
|
if (new_sz <= s->len) {
|
|
s->len = new_sz;
|
|
s->str[s->len] = 0;
|
|
return true;
|
|
}
|
|
// increase string size
|
|
if (!cstr_alloc_min_sz(s, new_sz))
|
|
return false;
|
|
// contents of string tail undefined
|
|
s->len = new_sz;
|
|
s->str[s->len] = 0;
|
|
return true;
|
|
}
|
|
|
|
bool cstr_append_buf(cstring *s, const void *buf, size_t sz)
|
|
{
|
|
if (!cstr_alloc_min_sz(s, s->len + sz))
|
|
return false;
|
|
memcpy(s->str + s->len, buf, sz);
|
|
s->len += sz;
|
|
s->str[s->len] = 0;
|
|
return true;
|
|
}
|
|
static inline bool cstr_append_c(cstring *s,char ch) { return cstr_append_buf(s,&ch,1); }
|
|
|
|
void bu_reverse_copy(uint8_t *dst, const uint8_t *src, size_t len)
|
|
{
|
|
uint32_t i;
|
|
for (i=0; i<len; i++)
|
|
dst[len - i - 1] = src[i];
|
|
}
|
|
|
|
void bn_setvch(BIGNUM *vo,const void *data_,size_t data_len)
|
|
{
|
|
const uint8_t *data = data_;
|
|
uint32_t vch2_len = (int32_t)data_len + 4;
|
|
uint8_t vch2[vch2_len];
|
|
vch2[0] = (data_len >> 24) & 0xff;
|
|
vch2[1] = (data_len >> 16) & 0xff;
|
|
vch2[2] = (data_len >> 8) & 0xff;
|
|
vch2[3] = (data_len >> 0) & 0xff;
|
|
bu_reverse_copy(vch2 + 4, data, data_len);
|
|
BN_mpi2bn(vch2, vch2_len, vo);
|
|
}
|
|
|
|
cstring *bn_getvch(const BIGNUM *v)
|
|
{
|
|
cstring *s_be,*s_le; uint32_t le_sz,sz = BN_bn2mpi(v,NULL);
|
|
if ( sz <= 4 ) // get MPI format size
|
|
return cstr_new(NULL);
|
|
// store bignum as MPI
|
|
s_be = cstr_new_sz(sz);
|
|
cstr_resize(s_be, sz);
|
|
BN_bn2mpi(v,(uint8_t *) s_be->str);
|
|
// copy-swap MPI to little endian, sans 32-bit size prefix
|
|
le_sz = sz - 4;
|
|
s_le = cstr_new_sz(le_sz);
|
|
cstr_resize(s_le, le_sz);
|
|
bu_reverse_copy((uint8_t *)s_le->str,(uint8_t *)s_be->str + 4, le_sz);
|
|
cstr_free(s_be,true);
|
|
return s_le;
|
|
}
|
|
|
|
cstring *base58_encode(const void *data_, size_t data_len)
|
|
{
|
|
uint8_t swapbuf[data_len + 1]; uint32_t i,c; BN_CTX *ctx; BIGNUM bn58,bn0,bn,dv,rem;
|
|
cstring *rs,*rs_swap; const uint8_t *data = data_;
|
|
ctx = BN_CTX_new();
|
|
BN_init(&bn58), BN_init(&bn0), BN_init(&bn), BN_init(&dv), BN_init(&rem);
|
|
BN_set_word(&bn58,58), BN_set_word(&bn0,0);
|
|
bu_reverse_copy(swapbuf,data,data_len);
|
|
swapbuf[data_len] = 0;
|
|
bn_setvch(&bn,swapbuf,sizeof(swapbuf));
|
|
rs = cstr_new_sz(data_len * 138 / 100 + 1);
|
|
while ( BN_cmp(&bn,&bn0) > 0 )
|
|
{
|
|
if ( !BN_div(&dv,&rem,&bn,&bn58,ctx) )
|
|
{
|
|
cstr_free(rs,true);
|
|
rs = NULL;
|
|
goto out;
|
|
}
|
|
BN_copy(&bn, &dv);
|
|
c = (int32_t)BN_get_word(&rem);
|
|
cstr_append_c(rs,base58_chars[c]);
|
|
}
|
|
for (i=0; i<data_len; i++)
|
|
{
|
|
if ( data[i] == 0 )
|
|
cstr_append_c(rs,base58_chars[0]);
|
|
else break;
|
|
}
|
|
rs_swap = cstr_new_sz(rs->len);
|
|
cstr_resize(rs_swap, rs->len);
|
|
bu_reverse_copy((uint8_t *)rs_swap->str,(uint8_t *)rs->str,rs->len);
|
|
cstr_free(rs,true);
|
|
rs = rs_swap;
|
|
out:
|
|
BN_clear_free(&bn58);
|
|
BN_clear_free(&bn0);
|
|
BN_clear_free(&bn);
|
|
BN_clear_free(&dv);
|
|
BN_clear_free(&rem);
|
|
BN_CTX_free(ctx);
|
|
return rs;
|
|
}
|
|
|
|
/*void bu_Hash(unsigned char *md256, const void *data, size_t data_len)
|
|
{
|
|
unsigned char md1[32];
|
|
SHA256(data,data_len,md1);
|
|
SHA256(md1,32,md256);
|
|
}
|
|
|
|
void bu_Hash4(unsigned char *md32, const void *data, size_t data_len)
|
|
{
|
|
unsigned char md256[32];
|
|
bu_Hash(md256,data,data_len);
|
|
memcpy(md32,md256,4);
|
|
}*/
|
|
|
|
cstring *base58_encode_check(uint8_t addrtype,bool have_addrtype,const void *data,size_t data_len)
|
|
{
|
|
uint8_t i,buf[64]; bits256 hash; cstring *s_enc;//,*s = cstr_new_sz(data_len + 1 + 4);
|
|
buf[0] = addrtype;
|
|
memcpy(buf+1,data,data_len);
|
|
hash = bits256_doublesha256(0,buf,(int32_t)data_len+1);
|
|
//bu_Hash4(md32,buf,(int32_t)data_len+1);
|
|
for (i=0; i<4; i++)
|
|
{
|
|
buf[data_len+i+1] = hash.bytes[31-i];
|
|
//printf("(%02x %02x) ",hash.bytes[31-i],md32[i]);
|
|
}
|
|
//printf("hash4 cmp\n");
|
|
s_enc = base58_encode(buf,data_len+5);
|
|
/*if ( 0 )
|
|
{
|
|
if ( have_addrtype )
|
|
cstr_append_c(s,addrtype);
|
|
cstr_append_buf(s,data,data_len);
|
|
hash = bits256_doublesha256(0,(uint8_t *)s->str,(int32_t)s->len);
|
|
cstr_append_buf(s,hash.bytes,4);
|
|
//bu_Hash4(md32, s->str, s->len);
|
|
//cstr_append_buf(s, md32, 4);
|
|
s_enc = base58_encode(s->str, s->len);
|
|
cstr_free(s,true);
|
|
}*/
|
|
return s_enc;
|
|
}
|
|
|
|
cstring *base58_decode(const char *s_in)
|
|
{
|
|
uint32_t leading_zero,be_sz; const char *p,*p1; BIGNUM bn58,bn,bnChar; BN_CTX *ctx; cstring *tmp_be,*tmp,*ret = NULL;
|
|
ctx = BN_CTX_new();
|
|
BN_init(&bn58), BN_init(&bn), BN_init(&bnChar);
|
|
BN_set_word(&bn58,58), BN_set_word(&bn,0);
|
|
while ( isspace((uint32_t)*s_in) )
|
|
s_in++;
|
|
for (p=s_in; *p; p++)
|
|
{
|
|
p1 = strchr(base58_chars,*p);
|
|
if ( !p1 )
|
|
{
|
|
while (isspace((uint32_t)*p))
|
|
p++;
|
|
if ( *p != '\0' )
|
|
goto out;
|
|
break;
|
|
}
|
|
BN_set_word(&bnChar,(int32_t)(p1 - base58_chars));
|
|
if (!BN_mul(&bn, &bn, &bn58, ctx))
|
|
goto out;
|
|
if (!BN_add(&bn, &bn, &bnChar))
|
|
goto out;
|
|
}
|
|
tmp = bn_getvch(&bn);
|
|
if ( (tmp->len >= 2) && (tmp->str[tmp->len - 1] == 0) && ((uint8_t)tmp->str[tmp->len - 2] >= 0x80))
|
|
cstr_resize(tmp, tmp->len - 1);
|
|
leading_zero = 0;
|
|
for (p=s_in; *p==base58_chars[0]; p++)
|
|
leading_zero++;
|
|
be_sz = (uint32_t)tmp->len + (uint32_t)leading_zero;
|
|
tmp_be = cstr_new_sz(be_sz);
|
|
cstr_resize(tmp_be, be_sz);
|
|
memset(tmp_be->str, 0, be_sz);
|
|
bu_reverse_copy((uint8_t *)tmp_be->str + leading_zero,(uint8_t *)tmp->str,tmp->len);
|
|
cstr_free(tmp,true);
|
|
ret = tmp_be;
|
|
out:
|
|
BN_clear_free(&bn58);
|
|
BN_clear_free(&bn);
|
|
BN_clear_free(&bnChar);
|
|
BN_CTX_free(ctx);
|
|
return ret;
|
|
}
|
|
|
|
cstring *base58_decode_check(uint8_t *addrtype,const char *s_in)
|
|
{
|
|
bits256 hash; cstring *s = base58_decode(s_in);
|
|
if ( s != 0 )
|
|
{
|
|
if ( s->len >= 4 )
|
|
{
|
|
// validate with trailing hash, then remove hash
|
|
hash = bits256_doublesha256(0,(uint8_t *)s->str,(int32_t)s->len - 4);
|
|
//bu_Hash4(md32,s->str,s->len - 4);
|
|
if ( memcmp(hash.bytes,&s->str[s->len - 4],4) == 0 )
|
|
{
|
|
cstr_resize(s,s->len - 4);
|
|
if ( addrtype ) // if addrtype requested, remove from front of data string
|
|
{
|
|
*addrtype = (uint8_t)s->str[0];
|
|
cstr_erase(s,0,1);
|
|
}
|
|
return(s);
|
|
}
|
|
}
|
|
cstr_free(s,true);
|
|
}
|
|
return(NULL);
|
|
}
|
|
|
|
/* Generate a private key from just the secret parameter */
|
|
static int EC_KEY_regenerate_key(EC_KEY *eckey, BIGNUM *priv_key)
|
|
{
|
|
int ok = 0;
|
|
BN_CTX *ctx = NULL;
|
|
EC_POINT *pub_key = NULL;
|
|
|
|
if (!eckey) return 0;
|
|
|
|
const EC_GROUP *group = EC_KEY_get0_group(eckey);
|
|
|
|
if ((ctx = BN_CTX_new()) == NULL)
|
|
goto err;
|
|
|
|
pub_key = EC_POINT_new(group);
|
|
|
|
if (pub_key == NULL)
|
|
goto err;
|
|
|
|
if (!EC_POINT_mul(group, pub_key, priv_key, NULL, NULL, ctx))
|
|
goto err;
|
|
|
|
EC_KEY_set_private_key(eckey,priv_key);
|
|
EC_KEY_set_public_key(eckey,pub_key);
|
|
|
|
ok = 1;
|
|
|
|
err:
|
|
|
|
if (pub_key)
|
|
EC_POINT_free(pub_key);
|
|
if (ctx != NULL)
|
|
BN_CTX_free(ctx);
|
|
|
|
return(ok);
|
|
}
|
|
|
|
bool bp_key_init(struct bp_key *key)
|
|
{
|
|
memset(key, 0, sizeof(*key));
|
|
|
|
key->k = EC_KEY_new_by_curve_name(NID_secp256k1);
|
|
if (!key->k)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
void bp_key_free(struct bp_key *key)
|
|
{
|
|
if (key->k) {
|
|
EC_KEY_free(key->k);
|
|
key->k = NULL;
|
|
}
|
|
}
|
|
|
|
bool bp_key_generate(struct bp_key *key)
|
|
{
|
|
if (!key->k)
|
|
return false;
|
|
|
|
if (!EC_KEY_generate_key(key->k))
|
|
return false;
|
|
if (!EC_KEY_check_key(key->k))
|
|
return false;
|
|
|
|
EC_KEY_set_conv_form(key->k, POINT_CONVERSION_COMPRESSED);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_privkey_set(struct bp_key *key, const void *privkey_, size_t pk_len)
|
|
{
|
|
const unsigned char *privkey = privkey_;
|
|
if (!d2i_ECPrivateKey(&key->k, &privkey, pk_len))
|
|
return false;
|
|
if (!EC_KEY_check_key(key->k))
|
|
return false;
|
|
|
|
EC_KEY_set_conv_form(key->k, POINT_CONVERSION_COMPRESSED);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_pubkey_set(struct bp_key *key, const void *pubkey_, size_t pk_len)
|
|
{
|
|
const unsigned char *pubkey = pubkey_;
|
|
if (!o2i_ECPublicKey(&key->k, &pubkey, pk_len))
|
|
return false;
|
|
if (pk_len == 33)
|
|
EC_KEY_set_conv_form(key->k, POINT_CONVERSION_COMPRESSED);
|
|
return true;
|
|
}
|
|
|
|
bool bp_key_secret_set(struct bp_key *key, const void *privkey_, size_t pk_len)
|
|
{
|
|
bp_key_free(key);
|
|
|
|
if (!privkey_ || pk_len != 32)
|
|
return false;
|
|
|
|
const unsigned char *privkey = privkey_;
|
|
BIGNUM *bn = BN_bin2bn(privkey, 32, BN_new());
|
|
if (!bn)
|
|
return false;
|
|
|
|
key->k = EC_KEY_new_by_curve_name(NID_secp256k1);
|
|
if (!key->k)
|
|
goto err_out;
|
|
|
|
if (!EC_KEY_regenerate_key(key->k, bn))
|
|
goto err_out;
|
|
if (!EC_KEY_check_key(key->k))
|
|
return false;
|
|
|
|
EC_KEY_set_conv_form(key->k, POINT_CONVERSION_COMPRESSED);
|
|
|
|
BN_clear_free(bn);
|
|
return true;
|
|
|
|
err_out:
|
|
bp_key_free(key);
|
|
BN_clear_free(bn);
|
|
return false;
|
|
}
|
|
|
|
bool bp_privkey_get(const struct bp_key *key, void **privkey, size_t *pk_len)
|
|
{
|
|
if (!EC_KEY_check_key(key->k))
|
|
return false;
|
|
|
|
size_t sz = i2d_ECPrivateKey(key->k, 0);
|
|
unsigned char *orig_mem, *mem = mycalloc('b',1,sz);
|
|
orig_mem = mem;
|
|
i2d_ECPrivateKey(key->k, &mem);
|
|
|
|
*privkey = orig_mem;
|
|
*pk_len = sz;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_pubkey_get(const struct bp_key *key, void **pubkey, size_t *pk_len)
|
|
{
|
|
if (!EC_KEY_check_key(key->k))
|
|
return false;
|
|
|
|
size_t sz = i2o_ECPublicKey(key->k, 0);
|
|
unsigned char *orig_mem, *mem = mycalloc('b',1,sz);
|
|
orig_mem = mem;
|
|
i2o_ECPublicKey(key->k, &mem);
|
|
|
|
*pubkey = orig_mem;
|
|
*pk_len = sz;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_key_secret_get(void *p, size_t len, const struct bp_key *key)
|
|
{
|
|
if (!p || len < 32 || !key)
|
|
return false;
|
|
|
|
/* zero buffer */
|
|
memset(p, 0, len);
|
|
|
|
/* get bignum secret */
|
|
const BIGNUM *bn = EC_KEY_get0_private_key(key->k);
|
|
if (!bn)
|
|
return false;
|
|
int nBytes = BN_num_bytes(bn);
|
|
|
|
/* store secret at end of buffer */
|
|
int n = BN_bn2bin(bn, p + (len - nBytes));
|
|
if (n != nBytes)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_sign(const struct bp_key *key, const void *data, size_t data_len,void **sig_, size_t *sig_len_)
|
|
{
|
|
size_t sig_sz = ECDSA_size(key->k);
|
|
void *sig = mycalloc('b',1, sig_sz);
|
|
unsigned int sig_sz_out = (int32_t)sig_sz;
|
|
|
|
int src = ECDSA_sign(0, data, (int32_t)data_len, sig, &sig_sz_out, key->k);
|
|
if (src != 1) {
|
|
myfree(sig,sig_sz);
|
|
return false;
|
|
}
|
|
|
|
*sig_ = sig;
|
|
*sig_len_ = sig_sz_out;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool bp_verify(const struct bp_key *key, const void *data, size_t data_len,const void *sig_, size_t sig_len)
|
|
{
|
|
const unsigned char *sig = sig_;
|
|
ECDSA_SIG *esig;
|
|
bool b = false;
|
|
|
|
esig = ECDSA_SIG_new();
|
|
if (!esig)
|
|
goto out;
|
|
|
|
if (!d2i_ECDSA_SIG(&esig, &sig, sig_len))
|
|
goto out_free;
|
|
|
|
b = ECDSA_do_verify(data,(int32_t) data_len, esig, key->k) == 1;
|
|
|
|
out_free:
|
|
ECDSA_SIG_free(esig);
|
|
out:
|
|
return b;
|
|
}
|
|
|
|
int32_t btc_getpubkey(char pubkeystr[67],uint8_t pubkeybuf[33],struct bp_key *key)
|
|
{
|
|
void *pubkey = 0; size_t len = 0;
|
|
bp_pubkey_get(key,&pubkey,&len);
|
|
//printf("btc_getpubkey len.%ld %p\n",len,pubkey);
|
|
if ( pubkey != 0 )
|
|
{
|
|
if ( pubkeystr != 0 )
|
|
{
|
|
if ( len < 34 )
|
|
{
|
|
init_hexbytes_noT(pubkeystr,pubkey,(int32_t)len);
|
|
memcpy(pubkeybuf,pubkey,len);
|
|
}
|
|
else printf("btc_getpubkey error len.%d\n",(int32_t)len), len = -1;
|
|
}
|
|
} else len = -1;
|
|
return((int32_t)len);
|
|
}
|
|
|
|
int32_t btc_convrmd160(char *coinaddr,uint8_t addrtype,uint8_t rmd160[20])
|
|
{
|
|
cstring *btc_addr;
|
|
if ( (btc_addr= base58_encode_check(addrtype,true,rmd160,20)) != 0 )
|
|
{
|
|
strcpy(coinaddr,btc_addr->str);
|
|
cstr_free(btc_addr,true);
|
|
return(0);
|
|
}
|
|
return(-1);
|
|
}
|
|
|
|
int32_t btc_coinaddr(char *coinaddr,uint8_t addrtype,char *pubkeystr)
|
|
{
|
|
uint8_t rmd160[20]; char hashstr[41];
|
|
calc_OP_HASH160(hashstr,rmd160,pubkeystr);
|
|
return(btc_convrmd160(coinaddr,addrtype,rmd160));
|
|
}
|
|
|
|
int32_t btc_convaddr(char *hexaddr,char *addr58)
|
|
{
|
|
uint8_t addrtype; cstring *cstr;
|
|
if ( (cstr= base58_decode_check(&addrtype,(const char *)addr58)) != 0 )
|
|
{
|
|
sprintf(hexaddr,"%02x",addrtype);
|
|
init_hexbytes_noT(hexaddr+2,(void *)cstr->str,cstr->len);
|
|
cstr_free(cstr,true);
|
|
return(0);
|
|
}
|
|
return(-1);
|
|
}
|
|
|
|
int32_t btc_addr2univ(uint8_t *addrtypep,uint8_t rmd160[20],char *coinaddr)
|
|
{
|
|
char hexstr[512]; uint8_t hex[21];
|
|
if ( btc_convaddr(hexstr,coinaddr) == 0 )
|
|
{
|
|
decode_hex(hex,21,hexstr);
|
|
*addrtypep = hex[0];
|
|
memcpy(rmd160,hex+1,20);
|
|
return(0);
|
|
}
|
|
return(-1);
|
|
}
|
|
|
|
int32_t btc_priv2wip(char *wipstr,uint8_t privkey[32],uint8_t addrtype)
|
|
{
|
|
uint8_t tmp[128]; char hexstr[67]; cstring *btc_addr;
|
|
memcpy(tmp,privkey,32);
|
|
tmp[32] = 1;
|
|
init_hexbytes_noT(hexstr,tmp,32);
|
|
if ( (btc_addr= base58_encode_check(addrtype,true,tmp,33)) != 0 )
|
|
{
|
|
strcpy(wipstr,btc_addr->str);
|
|
cstr_free(btc_addr,true);
|
|
}
|
|
printf("-> (%s) -> wip.(%s) addrtype.%02x\n",hexstr,wipstr,addrtype);
|
|
return(0);
|
|
}
|
|
|
|
int32_t btc_wip2priv(uint8_t privkey[32],char *wipstr)
|
|
{
|
|
uint8_t addrtype; cstring *cstr; int32_t len = -1;
|
|
if ( (cstr= base58_decode_check(&addrtype,(const char *)wipstr)) != 0 )
|
|
{
|
|
init_hexbytes_noT((void *)privkey,(void *)cstr->str,cstr->len);
|
|
if ( cstr->str[cstr->len-1] == 0x01 )
|
|
cstr->len--;
|
|
memcpy(privkey,cstr->str,cstr->len);
|
|
len = (int32_t)cstr->len;
|
|
char tmp[138];
|
|
btc_priv2wip(tmp,privkey,addrtype);
|
|
printf("addrtype.%02x wipstr.(%llx) len.%d\n",addrtype,*(long long *)privkey,len);
|
|
cstr_free(cstr,true);
|
|
}
|
|
return(len);
|
|
}
|
|
|
|
int32_t btc_setprivkey(struct bp_key *key,char *wipstr)
|
|
{
|
|
uint8_t privkey[512]; int32_t len;
|
|
len = btc_wip2priv(privkey,wipstr);
|
|
if ( len < 0 || bp_key_init(key) == 0 || bp_key_secret_set(key,privkey,len) == 0 )
|
|
{
|
|
printf("error setting privkey\n");
|
|
return(-1);
|
|
}
|
|
return(0);
|
|
}
|
|
|
|
void btc_freekey(void *key)
|
|
{
|
|
bp_key_free(key);
|
|
myfree(key,sizeof(struct bp_key));
|
|
}
|
|
|
|
int32_t btc_priv2pub(uint8_t pubkey[33],uint8_t privkey[32])
|
|
{
|
|
size_t len; void *pub = 0;
|
|
struct bp_key key;
|
|
if ( bp_key_init(&key) != 0 && bp_key_secret_set(&key,privkey,32) != 0 )
|
|
{
|
|
bp_pubkey_get(&key,&pub,&len);
|
|
bp_key_free(&key);
|
|
if ( len == 33 )
|
|
memcpy(pubkey,pub,33);
|
|
if ( pub != 0 )
|
|
myfree(pub,len);
|
|
return(0);
|
|
}
|
|
bp_key_free(&key);
|
|
return(-1);
|
|
}
|
|
|
|
int32_t btc_pub2rmd(uint8_t rmd160[20],uint8_t pubkey[33])
|
|
{
|
|
char pubkeystr[67],hashstr[41];
|
|
init_hexbytes_noT(pubkeystr,pubkey,33);
|
|
calc_OP_HASH160(hashstr,rmd160,pubkeystr);
|
|
return(0);
|
|
}
|
|
|
|
int32_t create_MofN(uint8_t addrtype,char *redeemScript,char *scriptPubKey,char *p2shaddr,char *pubkeys[],int32_t M,int32_t N)
|
|
{
|
|
cstring *btc_addr; uint8_t pubkey[33],tmpbuf[24],hex[4096]; int32_t i,n = 0;
|
|
hex[n++] = 0x50 + M;
|
|
for (i=0; i<N; i++)
|
|
{
|
|
decode_hex(pubkey,33,pubkeys[i]);
|
|
hex[n++] = 33;
|
|
memcpy(&hex[n],pubkey,33);
|
|
n += 33;
|
|
}
|
|
hex[n++] = 0x50 + N;
|
|
hex[n++] = SCRIPT_OP_CHECKMULTISIG;
|
|
for (i=0; i<n; i++)
|
|
{
|
|
redeemScript[i*2] = hexbyte((hex[i]>>4) & 0xf);
|
|
redeemScript[i*2 + 1] = hexbyte(hex[i] & 0xf);
|
|
//fprintf(stderr,"%02x",hex[i]);
|
|
}
|
|
//fprintf(stderr," n.%d\n",n);
|
|
redeemScript[n*2] = 0;
|
|
calc_OP_HASH160(0,tmpbuf+2,redeemScript);
|
|
//printf("op160.(%s)\n",redeemScript);
|
|
tmpbuf[0] = SCRIPT_OP_HASH160;
|
|
tmpbuf[1] = 20;
|
|
tmpbuf[22] = SCRIPT_OP_EQUAL;
|
|
init_hexbytes_noT(scriptPubKey,tmpbuf,23);
|
|
p2shaddr[0] = 0;
|
|
if ( (btc_addr= base58_encode_check(addrtype,true,tmpbuf+2,20)) != 0 )
|
|
{
|
|
if ( strlen(btc_addr->str) < 36 )
|
|
strcpy(p2shaddr,btc_addr->str);
|
|
cstr_free(btc_addr,true);
|
|
}
|
|
return(n);
|
|
}
|
|
|
|
int32_t btc_pub65toaddr(char *coinaddr,uint8_t addrtype,char pubkey[131],uint8_t *pk)
|
|
{
|
|
int32_t retval = -1; char pubkeystr[67]; uint8_t *ptr; size_t len;
|
|
EC_KEY *key;
|
|
key = EC_KEY_new_by_curve_name(NID_secp256k1);
|
|
if ( key != 0 )
|
|
{
|
|
if (!EC_KEY_generate_key(key))
|
|
{
|
|
printf("generate error\n");
|
|
return(-1);
|
|
}
|
|
if (!EC_KEY_check_key(key))
|
|
{
|
|
printf("key check error0\n");
|
|
return(-1);
|
|
}
|
|
pubkeystr[0] = 0;
|
|
const EC_GROUP *group = EC_KEY_get0_group(key);
|
|
EC_POINT *pkey = EC_POINT_new(group);
|
|
EC_POINT_hex2point(group,pubkey,pkey,NULL);
|
|
if (!EC_KEY_check_key(key))
|
|
{
|
|
printf("key check error\n");
|
|
return(-1);
|
|
}
|
|
retval = EC_KEY_set_public_key(key,pkey);
|
|
if (!EC_KEY_check_key(key))
|
|
{
|
|
printf("key check error2\n");
|
|
return(-1);
|
|
}
|
|
len = i2o_ECPublicKey(key,0);
|
|
ptr = mycalloc('b',1,len);
|
|
i2o_ECPublicKey(key,&ptr);
|
|
printf("btc_getpubkey len.%ld %p\n",(long)len,ptr);
|
|
EC_KEY_set_conv_form(key,POINT_CONVERSION_COMPRESSED);
|
|
EC_KEY_free(key);
|
|
}
|
|
return(retval);
|
|
}
|
|
|
|
/*char *iguana_txsign(struct iguana_info *coin,struct cointx_info *refT,int32_t redeemi,char *redeemscript,char sigs[][256],int32_t n,uint8_t privkey[32],int32_t privkeyind)
|
|
{
|
|
char hexstr[16384]; bits256 hash2; uint8_t data[4096],sigbuf[512]; struct bp_key key;
|
|
struct cointx_info *T; int32_t i,len; void *sig = NULL; size_t siglen = 0; struct cointx_input *vin;
|
|
if ( bp_key_init(&key) != 0 && bp_key_secret_set(&key,privkey,32) != 0 )
|
|
{
|
|
if ( (T= calloc(1,sizeof(*T))) == 0 )
|
|
return(0);
|
|
*T = *refT; vin = &T->inputs[redeemi];
|
|
for (i=0; i<T->numinputs; i++)
|
|
strcpy(T->inputs[i].sigs,"00");
|
|
strcpy(vin->sigs,redeemscript);
|
|
vin->sequence = (uint32_t)-1;
|
|
T->nlocktime = 0;
|
|
//disp_cointx(&T);
|
|
emit_cointx(&hash2,data,sizeof(data),T,oldtx_format,SIGHASH_ALL);
|
|
//printf("HASH2.(%llx)\n",(long long)hash2.txid);
|
|
if ( bp_sign(&key,hash2.bytes,sizeof(hash2),&sig,&siglen) != 0 )
|
|
{
|
|
memcpy(sigbuf,sig,siglen);
|
|
sigbuf[siglen++] = SIGHASH_ALL;
|
|
init_hexbytes_noT(sigs[privkeyind],sigbuf,(int32_t)siglen);
|
|
strcpy(vin->sigs,"00");
|
|
for (i=0; i<n; i++)
|
|
{
|
|
if ( sigs[i][0] != 0 )
|
|
{
|
|
sprintf(vin->sigs + strlen(vin->sigs),"%02x%s",(int32_t)strlen(sigs[i])>>1,sigs[i]);
|
|
//printf("(%s).%ld ",sigs[i],strlen(sigs[i]));
|
|
}
|
|
}
|
|
len = (int32_t)(strlen(redeemscript)/2);
|
|
if ( len >= 0xfd )
|
|
sprintf(&vin->sigs[strlen(vin->sigs)],"4d%02x%02x",len & 0xff,(len >> 8) & 0xff);
|
|
else sprintf(&vin->sigs[strlen(vin->sigs)],"4c%02x",len);
|
|
sprintf(&vin->sigs[strlen(vin->sigs)],"%s",redeemscript);
|
|
//printf("after A.(%s) othersig.(%s) siglen.%02lx -> (%s)\n",hexstr,othersig != 0 ? othersig : "",siglen,vin->sigs);
|
|
//printf("vinsigs.(%s) %ld\n",vin->sigs,strlen(vin->sigs));
|
|
_emit_cointx(hexstr,sizeof(hexstr),T,oldtx_format);
|
|
//disp_cointx(&T);
|
|
free(T);
|
|
return(clonestr(hexstr));
|
|
}
|
|
else printf("error signing\n");
|
|
free(T);
|
|
}
|
|
return(0);
|
|
}*/
|
|
|
|
#define IGUANA_SCRIPT_NULL 0
|
|
#define IGUANA_SCRIPT_76AC 1
|
|
#define IGUANA_SCRIPT_7688AC 2
|
|
#define IGUANA_SCRIPT_P2SH 3
|
|
#define IGUANA_SCRIPT_OPRETURN 4
|
|
#define IGUANA_SCRIPT_3of3 5
|
|
#define IGUANA_SCRIPT_2of3 6
|
|
#define IGUANA_SCRIPT_1of3 7
|
|
#define IGUANA_SCRIPT_2of2 8
|
|
#define IGUANA_SCRIPT_1of2 9
|
|
#define IGUANA_SCRIPT_MSIG 10
|
|
#define IGUANA_SCRIPT_DATA 11
|
|
#define IGUANA_SCRIPT_STRANGE 15
|
|
|
|
int32_t iguana_calcrmd160(struct iguana_info *coin,uint8_t rmd160[20],uint8_t msigs160[16][20],int32_t *Mp,int32_t *nump,uint8_t *pk_script,int32_t pk_scriptlen,bits256 debugtxid)
|
|
{
|
|
static uint8_t zero_rmd160[20];
|
|
char hexstr[8192]; uint8_t sha256[32],*script,type; int32_t i,n,m,plen;
|
|
if ( nump != 0 )
|
|
*nump = 0;
|
|
type = IGUANA_SCRIPT_STRANGE;
|
|
if ( pk_scriptlen == 0 )
|
|
{
|
|
if ( zero_rmd160[0] == 0 )
|
|
{
|
|
vcalc_sha256(0,sha256,pk_script,pk_scriptlen); // e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
|
calc_rmd160(0,zero_rmd160,sha256,sizeof(sha256)); // b472a266d0bd89c13706a4132ccfb16f7c3b9fcb
|
|
init_hexbytes_noT(hexstr,zero_rmd160,20);
|
|
char str[65]; printf("iguana_calcrmd160 zero len %s -> %s\n",bits256_str(str,*(bits256 *)sha256),hexstr);
|
|
}
|
|
memcpy(rmd160,zero_rmd160,sizeof(zero_rmd160));
|
|
return(IGUANA_SCRIPT_NULL);
|
|
}
|
|
else if ( pk_script[0] == 0x6a )
|
|
type = IGUANA_SCRIPT_OPRETURN;
|
|
else if ( pk_script[0] == 0x76 && pk_script[1] == 0xa9 && pk_script[pk_script[2]+3] == 0x88 && pk_script[pk_script[2]+4] == 0xac )
|
|
{
|
|
vcalc_sha256(0,sha256,&pk_script[3],pk_script[2]);
|
|
calc_rmd160(0,rmd160,sha256,sizeof(sha256));
|
|
if ( (plen= pk_script[2]+4) < pk_scriptlen )
|
|
{
|
|
while ( plen < pk_scriptlen )
|
|
if ( pk_script[plen++] != 0x61 ) // nop
|
|
return(IGUANA_SCRIPT_STRANGE);
|
|
}
|
|
return(IGUANA_SCRIPT_7688AC);
|
|
}
|
|
else if ( pk_script[0] > 0 && pk_script[0] < 76 && pk_script[pk_scriptlen-1] == 0xac && pk_script[0] == pk_scriptlen-2 )
|
|
{
|
|
//printf("minus2\n");
|
|
vcalc_sha256(0,sha256,&pk_script[1],pk_script[0]);
|
|
calc_rmd160(0,rmd160,sha256,sizeof(sha256));
|
|
return(IGUANA_SCRIPT_76AC);
|
|
}
|
|
else if ( pk_script[0] == 0xa9 && pk_script[1] == 0x14 && pk_scriptlen == 23 && pk_script[22] == 0x87 )
|
|
{
|
|
memcpy(rmd160,pk_script+2,20);
|
|
return(IGUANA_SCRIPT_P2SH);
|
|
}
|
|
else if ( pk_scriptlen > 34 && pk_script[pk_scriptlen-1] == 0xae && (n= pk_script[pk_scriptlen-2]) >= 0x51 && n <= 0x60 && (m= pk_script[0]) >= 0x51 && m <= n ) // m of n multisig
|
|
{
|
|
m -= 0x50, n -= 0x50;
|
|
if ( msigs160 != 0 && nump != 0 && *Mp != 0 )
|
|
{
|
|
script = pk_script+1;
|
|
for (i=0; i<n; i++,script += plen)
|
|
{
|
|
plen = *script++;
|
|
vcalc_sha256(0,sha256,script,plen);
|
|
calc_rmd160(0,msigs160[i],sha256,sizeof(sha256));
|
|
}
|
|
if ( (int32_t)((long)script - (long)pk_script) == pk_scriptlen-2 )
|
|
{
|
|
*nump = n;
|
|
*Mp = m;
|
|
//printf("M.%d N.%d\n",m,n);
|
|
}
|
|
}
|
|
vcalc_sha256(0,sha256,pk_script,pk_scriptlen);
|
|
calc_rmd160(0,rmd160,sha256,sizeof(sha256));
|
|
if ( n == 3 )
|
|
{
|
|
if ( m == 3 )
|
|
return(IGUANA_SCRIPT_3of3);
|
|
else if ( m == 2 )
|
|
return(IGUANA_SCRIPT_2of3);
|
|
else if ( m == 1 )
|
|
return(IGUANA_SCRIPT_1of3);
|
|
}
|
|
else if ( n == 2 )
|
|
{
|
|
if ( m == 2 )
|
|
return(IGUANA_SCRIPT_2of2);
|
|
else if ( m == 1 )
|
|
return(IGUANA_SCRIPT_1of2);
|
|
}
|
|
printf("strange msig M.%d of N.%d\n",m,n);
|
|
return(IGUANA_SCRIPT_MSIG);
|
|
}
|
|
else if ( pk_scriptlen == pk_script[0]+1 )
|
|
{
|
|
//printf("just data.%d\n",pk_scriptlen);
|
|
memcpy(rmd160,zero_rmd160,sizeof(zero_rmd160));
|
|
return(IGUANA_SCRIPT_DATA);
|
|
}
|
|
if ( type != IGUANA_SCRIPT_OPRETURN )
|
|
{
|
|
if ( pk_scriptlen < sizeof(hexstr)/2-1)
|
|
{
|
|
static FILE *fp;
|
|
init_hexbytes_noT(hexstr,pk_script,pk_scriptlen);
|
|
char str[65]; printf("unparsed script.(%s).%d in %s len.%d\n",hexstr,pk_scriptlen,bits256_str(str,debugtxid),pk_scriptlen);
|
|
if ( 1 && fp == 0 )
|
|
fp = fopen("unparsed.txt","w");
|
|
if ( fp != 0 )
|
|
fprintf(fp,"%s\n",hexstr), fflush(fp);
|
|
} else sprintf(hexstr,"pkscript overflowed %ld\n",(long)sizeof(hexstr));
|
|
}
|
|
vcalc_sha256(0,sha256,pk_script,pk_scriptlen);
|
|
calc_rmd160(0,rmd160,sha256,sizeof(sha256));
|
|
return(type);
|
|
}
|
|
|
|
int32_t iguana_scriptgen(struct iguana_info *coin,uint8_t *script,char *asmstr,struct iguana_bundle *bp,struct iguana_pkhash *p,uint8_t type)
|
|
{
|
|
char coinaddr[65]; uint8_t addrtype; int32_t scriptlen = 0;
|
|
if ( type == IGUANA_SCRIPT_7688AC || type == IGUANA_SCRIPT_76AC )
|
|
addrtype = coin->chain->pubval;
|
|
else addrtype = coin->chain->p2shval;
|
|
btc_convrmd160(coinaddr,addrtype,p->rmd160);
|
|
switch ( type )
|
|
{
|
|
case IGUANA_SCRIPT_NULL: strcpy(asmstr,"coinbase"); break;
|
|
case IGUANA_SCRIPT_76AC:
|
|
sprintf(asmstr,"OP_DUP %s OP_CHECKSIG",coinaddr);
|
|
break;
|
|
case IGUANA_SCRIPT_7688AC:
|
|
sprintf(asmstr,"OP_DUP %s OP_EQUALVERIFY OP_CHECKSIG",coinaddr);
|
|
break;
|
|
case IGUANA_SCRIPT_P2SH:
|
|
script[0] = 0xa9, script[1] = 0x14;
|
|
memcpy(&script[2],p->rmd160,20);
|
|
script[22] = 0x87;
|
|
sprintf(asmstr,"OP_HASH160 %s OP_EQUAL",coinaddr);
|
|
scriptlen = 23;
|
|
break;
|
|
case IGUANA_SCRIPT_OPRETURN: strcpy(asmstr,"OP_RETURN"); break;
|
|
case IGUANA_SCRIPT_3of3: strcpy(asmstr,"3 of 3 MSIG"); break;
|
|
case IGUANA_SCRIPT_2of3: strcpy(asmstr,"2 of 3 MSIG"); break;
|
|
case IGUANA_SCRIPT_1of3: strcpy(asmstr,"1 of 3 MSIG"); break;
|
|
case IGUANA_SCRIPT_2of2: strcpy(asmstr,"2 of 2 MSIG"); break;
|
|
case IGUANA_SCRIPT_1of2: strcpy(asmstr,"1 of 2 MSIG"); break;
|
|
case IGUANA_SCRIPT_MSIG: strcpy(asmstr,"NON-STANDARD MSIG"); break;
|
|
case IGUANA_SCRIPT_DATA: strcpy(asmstr,"DATA ONLY"); break;
|
|
case IGUANA_SCRIPT_STRANGE: strcpy(asmstr,"STRANGE SCRIPT"); break;
|
|
default: printf("unexpected script type\n"); break;
|
|
}
|
|
return(0);
|
|
}
|
|
|
|
char *iguana_txcreate(struct iguana_info *coin,uint8_t *space,int32_t maxlen,char *jsonstr)
|
|
{
|
|
struct iguana_txid T; struct iguana_msgvin *vins,*vin; struct iguana_msgvout *vouts,*vout;
|
|
char *redeemstr;
|
|
cJSON *array,*json,*item,*retjson = 0; bits256 scriptPubKey; int32_t i,numvins,numvouts,len = 0;
|
|
if ( (json= cJSON_Parse(jsonstr)) != 0 )
|
|
{
|
|
memset(&T,0,sizeof(T));
|
|
if ( (T.version= juint(json,"version")) == 0 )
|
|
T.version = 1;
|
|
if ( (T.locktime= juint(json,"locktime")) == 0 )
|
|
T.locktime = 0xffffffff;
|
|
vins = (struct iguana_msgvin *)&space[len];
|
|
if ( (array= jarray(&numvins,json,"vins")) != 0 )
|
|
{
|
|
len += sizeof(*vins) * numvins;
|
|
memset(vins,0,sizeof(*vins) * numvins);
|
|
//struct iguana_msgvin { bits256 prev_hash; uint8_t *script; uint32_t prev_vout,scriptlen,sequence; };
|
|
for (i=0; i<numvins; i++)
|
|
{
|
|
vin = &vins[i];
|
|
item = jitem(array,i);
|
|
vin->prev_hash = jbits256(item,"txid");
|
|
vin->prev_vout = juint(item,"vout");
|
|
vin->sequence = juint(item,"sequence");
|
|
scriptPubKey = jbits256(item,"scriptPubKey");
|
|
if ( bits256_nonz(scriptPubKey) > 0 )
|
|
{
|
|
if ( (redeemstr= jstr(item,"redeemScript")) == 0 )
|
|
{
|
|
vin->scriptlen = (int32_t)strlen(redeemstr);
|
|
if ( (vin->scriptlen & 1) != 0 )
|
|
{
|
|
free_json(json);
|
|
return(clonestr("{\"error\":\"odd redeemScript length\"}"));
|
|
}
|
|
vin->scriptlen >>= 1;
|
|
vin->script = &space[len], len += vin->scriptlen;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
vouts = (struct iguana_msgvout *)&space[len];
|
|
if ( (array= jarray(&numvouts,json,"vouts")) != 0 )
|
|
{
|
|
len += sizeof(*vouts) * numvouts;
|
|
memset(vouts,0,sizeof(*vouts) * numvouts);
|
|
//struct iguana_msgvout { uint64_t value; uint32_t pk_scriptlen; uint8_t *pk_script; };
|
|
for (i=0; i<numvouts; i++)
|
|
{
|
|
vout = &vouts[i];
|
|
item = jitem(array,i);
|
|
printf("create vout\n");
|
|
}
|
|
}
|
|
T.numvins = numvins, T.numvouts = numvouts;
|
|
T.timestamp = (uint32_t)time(NULL);
|
|
if ( (len= iguana_txbytes(coin,space,maxlen-len,&T.txid,&T,-1,vins,vouts)) > 0 )
|
|
{
|
|
|
|
}
|
|
free_json(json);
|
|
}
|
|
if ( retjson == 0 )
|
|
retjson = cJSON_Parse("{\"error\":\"couldnt create transaction\"}");
|
|
return(jprint(retjson,1));
|
|
}
|
|
|
|
/*
|
|
if ( bp_key_init(&key) != 0 && bp_key_secret_set(&key,privkey,32) != 0 )
|
|
{
|
|
if ( (T= calloc(1,sizeof(*T))) == 0 )
|
|
return(0);
|
|
*T = *refT; vin = &T->inputs[redeemi];
|
|
for (i=0; i<T->numinputs; i++)
|
|
strcpy(T->inputs[i].sigs,"00");
|
|
strcpy(vin->sigs,redeemscript);
|
|
vin->sequence = (uint32_t)-1;
|
|
T->nlocktime = 0;
|
|
//disp_cointx(&T);
|
|
emit_cointx(&hash2,data,sizeof(data),T,oldtx_format,SIGHASH_ALL);
|
|
//printf("HASH2.(%llx)\n",(long long)hash2.txid);
|
|
if ( bp_sign(&key,hash2.bytes,sizeof(hash2),&sig,&siglen) != 0 )
|
|
{
|
|
memcpy(sigbuf,sig,siglen);
|
|
sigbuf[siglen++] = SIGHASH_ALL;
|
|
init_hexbytes_noT(sigs[privkeyind],sigbuf,(int32_t)siglen);
|
|
strcpy(vin->sigs,"00");
|
|
for (i=0; i<n; i++)
|
|
{
|
|
if ( sigs[i][0] != 0 )
|
|
{
|
|
sprintf(vin->sigs + strlen(vin->sigs),"%02x%s",(int32_t)strlen(sigs[i])>>1,sigs[i]);
|
|
//printf("(%s).%ld ",sigs[i],strlen(sigs[i]));
|
|
}
|
|
}
|
|
len = (int32_t)(strlen(redeemscript)/2);
|
|
if ( len >= 0xfd )
|
|
sprintf(&vin->sigs[strlen(vin->sigs)],"4d%02x%02x",len & 0xff,(len >> 8) & 0xff);
|
|
else sprintf(&vin->sigs[strlen(vin->sigs)],"4c%02x",len);
|
|
sprintf(&vin->sigs[strlen(vin->sigs)],"%s",redeemscript);
|
|
//printf("after A.(%s) othersig.(%s) siglen.%02lx -> (%s)\n",hexstr,othersig != 0 ? othersig : "",siglen,vin->sigs);
|
|
//printf("vinsigs.(%s) %ld\n",vin->sigs,strlen(vin->sigs));
|
|
_emit_cointx(hexstr,sizeof(hexstr),T,oldtx_format);
|
|
//disp_cointx(&T);
|
|
free(T);
|
|
return(clonestr(hexstr));
|
|
}
|
|
*/
|
|
struct iguana_waddress *iguana_waddresscalc(struct iguana_info *coin,struct iguana_waddress *addr,bits256 privkey)
|
|
{
|
|
memset(addr,0,sizeof(*addr));
|
|
addr->privkey = privkey;
|
|
if ( btc_priv2pub(addr->pubkey,addr->privkey.bytes) == 0 && btc_priv2wip(addr->wipstr,addr->privkey.bytes,coin->chain->wipval) == 0 && btc_pub2rmd(addr->rmd160,addr->pubkey) == 0 && btc_convrmd160(addr->coinaddr,coin->chain->pubval,addr->rmd160) == 0 )
|
|
{
|
|
addr->wiptype = coin->chain->wipval;
|
|
addr->type = coin->chain->pubval;
|
|
return(addr);
|
|
}
|
|
return(0);
|
|
}
|
|
|
|
/*static char *validateretstr(struct iguana_info *coin,char *coinaddr)
|
|
{
|
|
char *retstr,buf[512]; cJSON *json;
|
|
if ( iguana_addressvalidate(coin,coinaddr) < 0 )
|
|
return(clonestr("{\"error\":\"invalid coin address\"}"));
|
|
sprintf(buf,"{\"agent\":\"ramchain\",\"coin\":\"%s\",\"method\":\"validate\",\"address\":\"%s\"}",coin->symbol,coinaddr);
|
|
if ( (json= cJSON_Parse(buf)) != 0 )
|
|
retstr = ramchain_coinparser(coin,"validate",json);
|
|
else return(clonestr("{\"error\":\"internal error, couldnt parse validate\"}"));
|
|
free_json(json);
|
|
return(retstr);
|
|
}
|
|
|
|
static char *validatepubkey(RPCARGS)
|
|
{
|
|
char *pubkeystr,coinaddr[128]; cJSON *retjson;
|
|
retjson = cJSON_CreateObject();
|
|
if ( params[0] != 0 && (pubkeystr= jstr(params[0],0)) != 0 )
|
|
{
|
|
if ( btc_coinaddr(coinaddr,coin->chain->pubval,pubkeystr) == 0 )
|
|
return(validateretstr(coin,coinaddr));
|
|
return(clonestr("{\"error\":\"cant convert pubkey\"}"));
|
|
}
|
|
return(clonestr("{\"error\":\"need pubkey\"}"));
|
|
}*/
|
|
|
|
char *makekeypair(struct iguana_info *coin)
|
|
{
|
|
struct iguana_waddress addr; char str[67]; cJSON *retjson = cJSON_CreateObject();
|
|
if ( iguana_waddresscalc(coin,&addr,rand256(1)) == 0 )
|
|
{
|
|
init_hexbytes_noT(str,addr.pubkey,33);
|
|
jaddstr(retjson,"result",str);
|
|
jaddstr(retjson,"privkey",bits256_str(str,addr.privkey));
|
|
} else jaddstr(retjson,"error","cant create address");
|
|
return(jprint(retjson,1));
|
|
}
|
|
|
|
cJSON *iguana_pubkeyjson(struct iguana_info *coin,char *pubkeystr)
|
|
{
|
|
cJSON *json = cJSON_CreateObject();
|
|
return(json);
|
|
}
|
|
|
|
char *iguana_signmessage(struct supernet_info *myinfo,struct iguana_info *coin,char *address,char *message)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
char *iguana_verifymessage(struct supernet_info *myinfo,struct iguana_info *coin,char *address,char *sig,char *message)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
char *iguana_getnewaddress(struct supernet_info *myinfo,struct iguana_info *coin,char *account)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
char *iguana_makekeypair(struct supernet_info *myinfo,struct iguana_info *coin)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
char *iguana_vanitygen(struct supernet_info *myinfo,struct iguana_info *coin,char *vanity)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
char *iguana_createmultisig(struct supernet_info *myinfo,struct iguana_info *coin,int32_t M,cJSON *pubkeys,char *account)
|
|
{
|
|
return(clonestr("{\"error\":\"notyet\"}"));
|
|
}
|
|
|
|
|
|
|
|
|
|
|