You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
718 lines
25 KiB
718 lines
25 KiB
13 years ago
|
#!/usr/bin/env python
|
||
|
#
|
||
|
# Electrum - lightweight Bitcoin client
|
||
|
# Copyright (C) 2011 thomasv@gitorious
|
||
|
#
|
||
|
# This program is free software: you can redistribute it and/or modify
|
||
|
# it under the terms of the GNU General Public License as published by
|
||
|
# the Free Software Foundation, either version 3 of the License, or
|
||
|
# (at your option) any later version.
|
||
|
#
|
||
|
# This program is distributed in the hope that it will be useful,
|
||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
# GNU General Public License for more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU General Public License
|
||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
|
||
|
|
||
|
import sys, base64, os, re, hashlib, socket, getpass, copy, operator, urllib2, ast
|
||
|
|
||
|
try:
|
||
|
import ecdsa
|
||
|
except:
|
||
|
print "python-ecdsa does not seem to be installed. Try 'sudo easy_install ecdsa'"
|
||
|
exit(1)
|
||
|
|
||
|
try:
|
||
|
import Crypto
|
||
|
has_encryption = True
|
||
|
except:
|
||
|
has_encryption = False
|
||
|
|
||
|
|
||
|
############ functions from pywallet #####################
|
||
|
|
||
|
addrtype = 0
|
||
|
|
||
|
def hash_160(public_key):
|
||
|
md = hashlib.new('ripemd160')
|
||
|
md.update(hashlib.sha256(public_key).digest())
|
||
|
return md.digest()
|
||
|
|
||
|
def public_key_to_bc_address(public_key):
|
||
|
h160 = hash_160(public_key)
|
||
|
return hash_160_to_bc_address(h160)
|
||
|
|
||
|
def hash_160_to_bc_address(h160):
|
||
|
vh160 = chr(addrtype) + h160
|
||
|
h = Hash(vh160)
|
||
|
addr = vh160 + h[0:4]
|
||
|
return b58encode(addr)
|
||
|
|
||
|
def bc_address_to_hash_160(addr):
|
||
|
bytes = b58decode(addr, 25)
|
||
|
return bytes[1:21]
|
||
|
|
||
|
__b58chars = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
|
||
|
__b58base = len(__b58chars)
|
||
|
|
||
|
def b58encode(v):
|
||
|
""" encode v, which is a string of bytes, to base58.
|
||
|
"""
|
||
|
|
||
|
long_value = 0L
|
||
|
for (i, c) in enumerate(v[::-1]):
|
||
|
long_value += (256**i) * ord(c)
|
||
|
|
||
|
result = ''
|
||
|
while long_value >= __b58base:
|
||
|
div, mod = divmod(long_value, __b58base)
|
||
|
result = __b58chars[mod] + result
|
||
|
long_value = div
|
||
|
result = __b58chars[long_value] + result
|
||
|
|
||
|
# Bitcoin does a little leading-zero-compression:
|
||
|
# leading 0-bytes in the input become leading-1s
|
||
|
nPad = 0
|
||
|
for c in v:
|
||
|
if c == '\0': nPad += 1
|
||
|
else: break
|
||
|
|
||
|
return (__b58chars[0]*nPad) + result
|
||
|
|
||
|
def b58decode(v, length):
|
||
|
""" decode v into a string of len bytes
|
||
|
"""
|
||
|
long_value = 0L
|
||
|
for (i, c) in enumerate(v[::-1]):
|
||
|
long_value += __b58chars.find(c) * (__b58base**i)
|
||
|
|
||
|
result = ''
|
||
|
while long_value >= 256:
|
||
|
div, mod = divmod(long_value, 256)
|
||
|
result = chr(mod) + result
|
||
|
long_value = div
|
||
|
result = chr(long_value) + result
|
||
|
|
||
|
nPad = 0
|
||
|
for c in v:
|
||
|
if c == __b58chars[0]: nPad += 1
|
||
|
else: break
|
||
|
|
||
|
result = chr(0)*nPad + result
|
||
|
if length is not None and len(result) != length:
|
||
|
return None
|
||
|
|
||
|
return result
|
||
|
|
||
|
|
||
|
def Hash(data):
|
||
|
return hashlib.sha256(hashlib.sha256(data).digest()).digest()
|
||
|
|
||
|
def EncodeBase58Check(vchIn):
|
||
|
hash = Hash(vchIn)
|
||
|
return b58encode(vchIn + hash[0:4])
|
||
|
|
||
|
def DecodeBase58Check(psz):
|
||
|
vchRet = b58decode(psz, None)
|
||
|
key = vchRet[0:-4]
|
||
|
csum = vchRet[-4:]
|
||
|
hash = Hash(key)
|
||
|
cs32 = hash[0:4]
|
||
|
if cs32 != csum:
|
||
|
return None
|
||
|
else:
|
||
|
return key
|
||
|
|
||
|
def PrivKeyToSecret(privkey):
|
||
|
return privkey[9:9+32]
|
||
|
|
||
|
def SecretToASecret(secret):
|
||
|
vchIn = chr(addrtype+128) + secret
|
||
|
return EncodeBase58Check(vchIn)
|
||
|
|
||
|
def ASecretToSecret(key):
|
||
|
vch = DecodeBase58Check(key)
|
||
|
if vch and vch[0] == chr(addrtype+128):
|
||
|
return vch[1:]
|
||
|
else:
|
||
|
return False
|
||
|
|
||
|
########### end pywallet functions #######################
|
||
|
|
||
|
|
||
|
def int_to_hex(i, length=1):
|
||
|
s = hex(i)[2:]
|
||
|
s = "0"*(2*length - len(s)) + s
|
||
|
return s.decode('hex')[::-1].encode('hex')
|
||
|
|
||
|
|
||
|
# password encryption
|
||
|
from Crypto.Cipher import AES
|
||
|
BLOCK_SIZE = 32
|
||
|
PADDING = '{'
|
||
|
pad = lambda s: s + (BLOCK_SIZE - len(s) % BLOCK_SIZE) * PADDING
|
||
|
EncodeAES = lambda c, s: base64.b64encode(c.encrypt(pad(s)))
|
||
|
DecodeAES = lambda c, e: c.decrypt(base64.b64decode(e)).rstrip(PADDING)
|
||
|
|
||
|
|
||
|
# secp256k1, http://www.oid-info.com/get/1.3.132.0.10
|
||
|
_p = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2FL
|
||
|
_r = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141L
|
||
|
_b = 0x0000000000000000000000000000000000000000000000000000000000000007L
|
||
|
_a = 0x0000000000000000000000000000000000000000000000000000000000000000L
|
||
|
_Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798L
|
||
|
_Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8L
|
||
|
curve_secp256k1 = ecdsa.ellipticcurve.CurveFp( _p, _a, _b )
|
||
|
generator_secp256k1 = ecdsa.ellipticcurve.Point( curve_secp256k1, _Gx, _Gy, _r )
|
||
|
oid_secp256k1 = (1,3,132,0,10)
|
||
|
SECP256k1 = ecdsa.curves.Curve("SECP256k1", curve_secp256k1, generator_secp256k1, oid_secp256k1 )
|
||
|
|
||
|
|
||
13 years ago
|
no_wallet_message = "Wallet file not found.\nPlease provide a seed and a password. The seed will be to generate Bitcoin addresses. It should be long and random, and nobody should be able to guess it. Memorize it, or write it down and keep it in a vault. The password will be used to encrypt your local wallet file. You will need to enter your password everytime you use your wallet. If you lose your password, you can still recover your wallet with the seed."
|
||
13 years ago
|
|
||
|
def filter(s):
|
||
|
out = re.sub('( [^\n]*|)\n','',s)
|
||
|
out = out.replace(' ','')
|
||
|
out = out.replace('\n','')
|
||
|
return out
|
||
|
|
||
|
def raw_tx( inputs, outputs, for_sig = None ):
|
||
|
s = int_to_hex(1,4) + ' version\n'
|
||
|
s += int_to_hex( len(inputs) ) + ' number of inputs\n'
|
||
|
for i in range(len(inputs)):
|
||
|
_, _, p_hash, p_index, p_script, pubkey, sig = inputs[i]
|
||
|
s += p_hash.decode('hex')[::-1].encode('hex') + ' prev hash\n'
|
||
|
s += int_to_hex(p_index,4) + ' prev index\n'
|
||
|
if for_sig is None:
|
||
|
sig = sig + chr(1) # hashtype
|
||
|
script = int_to_hex( len(sig)) + ' push %d bytes\n'%len(sig)
|
||
|
script += sig.encode('hex') + ' sig\n'
|
||
|
pubkey = chr(4) + pubkey
|
||
|
script += int_to_hex( len(pubkey)) + ' push %d bytes\n'%len(pubkey)
|
||
|
script += pubkey.encode('hex') + ' pubkey\n'
|
||
|
elif for_sig==i:
|
||
|
script = p_script + ' scriptsig \n'
|
||
|
else:
|
||
|
script=''
|
||
|
s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
|
||
|
s += script
|
||
|
s += "ffffffff" + ' sequence\n'
|
||
|
s += int_to_hex( len(outputs) ) + ' number of outputs\n'
|
||
|
for output in outputs:
|
||
|
addr, amount = output
|
||
|
s += int_to_hex( amount, 8) + ' amount: %d\n'%amount
|
||
|
script = '76a9' # op_dup, op_hash_160
|
||
|
script += '14' # push 0x14 bytes
|
||
|
script += bc_address_to_hash_160(addr).encode('hex')
|
||
|
script += '88ac' # op_equalverify, op_checksig
|
||
|
s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
|
||
|
s += script + ' script \n'
|
||
|
s += int_to_hex(0,4) # lock time
|
||
|
if for_sig is not None: s += int_to_hex(1, 4) # hash type
|
||
|
return s
|
||
|
|
||
|
class InvalidPassword(Exception):
|
||
|
pass
|
||
|
|
||
|
wallet_path = os.environ["HOME"] + '/.bitcoin/electrum.dat'
|
||
|
|
||
|
class Wallet:
|
||
|
def __init__(self):
|
||
|
self.gap_limit = 5 # configuration
|
||
|
self.host = 'ecdsa.org'
|
||
|
self.port = 50000
|
||
|
self.fee = 0.005
|
||
|
|
||
|
# saved fields
|
||
|
self.use_encryption = False
|
||
|
self.addresses = []
|
||
13 years ago
|
self.seed = '' # encrypted
|
||
13 years ago
|
self.private_keys = repr([]) # encrypted
|
||
|
self.change_addresses = [] # index of addresses used as change
|
||
|
self.status = {} # current status of addresses
|
||
|
self.history = {}
|
||
|
self.labels = {} # labels for addresses and transactions
|
||
|
self.addressbook = [] # outgoing addresses, for payments
|
||
|
self.blocks = 0
|
||
|
|
||
|
# not saved
|
||
|
self.message = ''
|
||
|
self.tx_history = {}
|
||
|
|
||
|
def is_mine(self, address):
|
||
|
return address in self.addresses
|
||
|
|
||
|
def is_change(self, address):
|
||
|
if not self.is_mine(address):
|
||
|
return False
|
||
|
k = self.addresses.index(address)
|
||
|
return k in self.change_addresses
|
||
|
|
||
|
def is_valid(self,addr):
|
||
|
ADDRESS_RE = re.compile('[1-9A-HJ-NP-Za-km-z]{26,}\\Z')
|
||
|
return ADDRESS_RE.match(addr)
|
||
|
|
||
|
def create_new_address(self, for_change, password):
|
||
13 years ago
|
seed = self.pw_decode( self.seed, password)
|
||
13 years ago
|
i = len( self.addresses ) - len(self.change_addresses) if not for_change else len(self.change_addresses)
|
||
13 years ago
|
seed = Hash( "%d:%d:"%(i,for_change) + seed )
|
||
13 years ago
|
order = generator_secp256k1.order()
|
||
|
secexp = ecdsa.util.randrange_from_seed__trytryagain( seed, order )
|
||
|
secret = SecretToASecret( ('%064x' % secexp).decode('hex') )
|
||
|
private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
|
||
|
public_key = private_key.get_verifying_key()
|
||
|
address = public_key_to_bc_address( '04'.decode('hex') + public_key.to_string() )
|
||
|
try:
|
||
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password) )
|
||
|
private_keys.append(secret)
|
||
|
except:
|
||
|
raise InvalidPassword("")
|
||
|
self.private_keys = self.pw_encode( repr(private_keys), password)
|
||
|
self.addresses.append(address)
|
||
|
if for_change: self.change_addresses.append( i )
|
||
|
h = self.retrieve_history(address)
|
||
|
self.history[address] = h
|
||
|
self.status[address] = h[-1]['blk_hash'] if h else None
|
||
|
return address
|
||
|
|
||
|
def recover(self, password):
|
||
13 years ago
|
seed = self.pw_decode( self.seed, password)
|
||
13 years ago
|
# todo: recover receiving addresses from tx
|
||
|
num_gap = 0
|
||
|
while True:
|
||
|
addr = self.create_new_address(True, password)
|
||
|
print "recovering", addr
|
||
|
if self.status[addr] is None: break
|
||
|
|
||
|
num_gap = 0
|
||
|
while True:
|
||
|
addr = self.create_new_address(False, password)
|
||
|
print "recovering", addr
|
||
|
if self.status[addr] is None:
|
||
|
num_gap += 1
|
||
|
if num_gap == self.gap_limit: break
|
||
|
else:
|
||
|
num_gap = 0
|
||
|
|
||
|
# remove limit-1 addresses. [ this is ok, because change addresses are at the beginning of the list]
|
||
|
n = self.gap_limit
|
||
|
self.addresses = self.addresses[:-n]
|
||
13 years ago
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password))
|
||
|
private_keys = private_keys[:-n]
|
||
|
self.private_keys = self.pw_encode( repr(private_keys), password)
|
||
13 years ago
|
|
||
|
# history and addressbook
|
||
|
self.update_tx_history()
|
||
|
for tx in self.tx_history.values():
|
||
|
if tx['value']<0:
|
||
|
for i in tx['outputs']:
|
||
|
if not self.is_mine(i) and i not in self.addressbook:
|
||
|
self.addressbook.append(i)
|
||
|
# redo labels
|
||
|
self.update_tx_labels()
|
||
|
|
||
|
def save(self):
|
||
|
s = repr( (self.use_encryption, self.fee, self.host, self.blocks,
|
||
13 years ago
|
self.seed, self.addresses, self.private_keys,
|
||
13 years ago
|
self.change_addresses, self.status, self.history,
|
||
|
self.labels, self.addressbook) )
|
||
|
f = open(wallet_path,"w")
|
||
|
f.write(s)
|
||
|
f.close()
|
||
|
|
||
|
def read(self):
|
||
|
try:
|
||
|
f = open(wallet_path,"r")
|
||
|
data = f.read()
|
||
|
f.close()
|
||
|
except:
|
||
|
return False
|
||
|
try:
|
||
|
(self.use_encryption, self.fee, self.host, self.blocks,
|
||
13 years ago
|
self.seed, self.addresses, self.private_keys,
|
||
13 years ago
|
self.change_addresses, self.status, self.history,
|
||
|
self.labels, self.addressbook) = ast.literal_eval( data )
|
||
|
except:
|
||
|
return False
|
||
|
self.update_tx_history()
|
||
|
return True
|
||
|
|
||
|
def get_new_address(self, password):
|
||
|
n = 0
|
||
|
for addr in self.addresses[-self.gap_limit:]:
|
||
|
if self.history[addr] == []:
|
||
|
n = n + 1
|
||
|
if n < self.gap_limit:
|
||
|
try:
|
||
|
new_address = self.create_new_address(False, password)
|
||
|
except InvalidPassword:
|
||
|
return False, "wrong password"
|
||
|
self.save()
|
||
|
return True, new_address
|
||
|
else:
|
||
|
return False, "The last %d addresses in your list have never been used. You should use them first, or increase the allowed gap size in your preferences. "%self.gap_limit
|
||
|
|
||
|
def get_addr_balance(self, addr):
|
||
|
h = self.history.get(addr)
|
||
|
c = u = 0
|
||
|
for item in h:
|
||
|
v = item['value']
|
||
|
if item['height']:
|
||
|
c += v
|
||
|
else:
|
||
|
u += v
|
||
|
return c, u
|
||
|
|
||
|
def get_balance(self):
|
||
|
conf = unconf = 0
|
||
|
for addr in self.addresses:
|
||
|
c, u = self.get_addr_balance(addr)
|
||
|
conf += c
|
||
|
unconf += u
|
||
|
return conf, unconf
|
||
|
|
||
|
def request(self, request ):
|
||
|
|
||
|
if self.port == 80:
|
||
|
try:
|
||
|
out = urllib2.urlopen('http://'+self.host+'/q/tw', request, timeout=5).read()
|
||
|
except:
|
||
|
out = ''
|
||
|
else:
|
||
|
s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
|
||
|
s.connect(( self.host, self.port))
|
||
|
s.send(request)
|
||
|
out = ''
|
||
|
while 1:
|
||
|
msg = s.recv(1024)
|
||
|
if msg: out += msg
|
||
|
else: break
|
||
|
s.close()
|
||
|
|
||
|
if re.match('[^:]\s*\(', out): out = ''
|
||
|
return out
|
||
|
|
||
|
def retrieve_message(self):
|
||
|
if not self.message:
|
||
|
self.message = self.request( repr ( ('msg', '')))
|
||
|
|
||
|
def send_tx(self, data):
|
||
|
return self.request( repr ( ('tx', data )))
|
||
|
|
||
|
def retrieve_history(self, address):
|
||
|
return ast.literal_eval( self.request( repr ( ('h', address ))) )
|
||
|
|
||
|
def poll(self):
|
||
|
return ast.literal_eval( self.request( repr ( ('poll', '' ))))
|
||
|
|
||
|
def new_session(self):
|
||
|
self.message = self.request( repr ( ('watch', repr(self.addresses) )))
|
||
|
|
||
|
def update(self):
|
||
|
blocks, changed_addresses = self.poll()
|
||
|
self.blocks = blocks
|
||
|
for addr, blk_hash in changed_addresses.items():
|
||
|
if self.status[addr] != blk_hash:
|
||
|
print "updating history for", addr
|
||
|
self.history[addr] = self.retrieve_history(addr)
|
||
|
self.status[addr] = blk_hash
|
||
|
self.update_tx_history()
|
||
|
if changed_addresses:
|
||
|
return True
|
||
|
else:
|
||
|
return False
|
||
|
|
||
|
def choose_inputs_outputs( self, to_addr, amount, fee, password):
|
||
|
""" todo: minimize tx size """
|
||
|
|
||
|
amount = int( 1e8*amount )
|
||
|
fee = int( 1e8*fee )
|
||
|
total = 0
|
||
|
inputs = []
|
||
|
for addr in self.addresses:
|
||
|
h = self.history.get(addr)
|
||
|
for item in h:
|
||
|
if item.get('raw_scriptPubKey'):
|
||
|
v = item.get('value')
|
||
|
total += v
|
||
|
inputs.append((addr, v, item['tx_hash'], item['pos'], item['raw_scriptPubKey'], None, None) )
|
||
|
if total >= amount + fee: break
|
||
|
if total >= amount + fee: break
|
||
|
else:
|
||
|
print "not enough funds: %d %d"%(total, fee)
|
||
|
return False, "not enough funds: %d %d"%(total, fee)
|
||
|
outputs = [ (to_addr, amount) ]
|
||
|
change_amount = total - ( amount + fee )
|
||
|
if change_amount != 0:
|
||
|
# first look for unused change addresses
|
||
|
for addr in self.addresses:
|
||
|
i = self.addresses.index(addr)
|
||
|
if i not in self.change_addresses: continue
|
||
|
if self.history.get(addr): continue
|
||
|
change_address = addr
|
||
|
break
|
||
|
else:
|
||
|
change_address = self.create_new_address(True, password)
|
||
|
print "new change address", change_address
|
||
|
outputs.append( (change_address, change_amount) )
|
||
|
return inputs, outputs
|
||
|
|
||
|
def sign_inputs( self, inputs, outputs, password ):
|
||
|
s_inputs = []
|
||
|
for i in range(len(inputs)):
|
||
|
addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
|
||
|
private_key = self.get_private_key(addr, password)
|
||
|
public_key = private_key.get_verifying_key()
|
||
|
pubkey = public_key.to_string()
|
||
|
tx = filter( raw_tx( inputs, outputs, for_sig = i ) )
|
||
|
sig = private_key.sign_digest( Hash( tx.decode('hex') ), sigencode = ecdsa.util.sigencode_der )
|
||
|
assert public_key.verify_digest( sig, Hash( tx.decode('hex') ), sigdecode = ecdsa.util.sigdecode_der)
|
||
|
s_inputs.append( (addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig) )
|
||
|
return s_inputs
|
||
|
|
||
|
def pw_encode(self, s, password):
|
||
|
if password:
|
||
|
secret = Hash(password)
|
||
|
cipher = AES.new(secret)
|
||
|
return EncodeAES(cipher, s)
|
||
|
else:
|
||
|
return s
|
||
|
|
||
|
def pw_decode(self, s, password):
|
||
|
if password:
|
||
|
secret = Hash(password)
|
||
|
cipher = AES.new(secret)
|
||
|
return DecodeAES(cipher, s)
|
||
|
else:
|
||
|
return s
|
||
|
|
||
|
def get_private_key( self, addr, password ):
|
||
|
try:
|
||
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password ) )
|
||
|
except:
|
||
|
raise InvalidPassword("")
|
||
|
k = self.addresses.index(addr)
|
||
|
secret = private_keys[k]
|
||
|
b = ASecretToSecret(secret)
|
||
|
secexp = int( b.encode('hex'), 16)
|
||
|
private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve=SECP256k1 )
|
||
|
public_key = private_key.get_verifying_key()
|
||
|
assert addr == public_key_to_bc_address( chr(4) + public_key.to_string() )
|
||
|
return private_key
|
||
|
|
||
|
def get_tx_history(self):
|
||
|
lines = self.tx_history.values()
|
||
|
lines = sorted(lines, key=operator.itemgetter("nTime"))
|
||
|
return lines
|
||
|
|
||
|
def update_tx_history(self):
|
||
|
self.tx_history= {}
|
||
|
for addr in self.addresses:
|
||
|
for tx in self.history[addr]:
|
||
|
tx_hash = tx['tx_hash']
|
||
|
line = self.tx_history.get(tx_hash)
|
||
|
if not line:
|
||
|
self.tx_history[tx_hash] = copy.copy(tx)
|
||
|
line = self.tx_history.get(tx_hash)
|
||
|
else:
|
||
|
line['value'] += tx['value']
|
||
|
if line['blk_hash'] == 'mempool':
|
||
|
line['nTime'] = 1e12
|
||
|
self.update_tx_labels()
|
||
|
|
||
|
def update_tx_labels(self):
|
||
|
for tx in self.tx_history.values():
|
||
|
default_label = ''
|
||
|
if tx['value']<0:
|
||
|
for o_addr in tx['outputs']:
|
||
|
if not self.is_change(o_addr):
|
||
|
dest_label = self.labels.get(o_addr)
|
||
|
if dest_label:
|
||
|
default_label = 'to: ' + dest_label
|
||
|
else:
|
||
|
default_label = 'to: ' + o_addr
|
||
|
else:
|
||
|
for o_addr in tx['outputs']:
|
||
|
if self.is_mine(o_addr) and not self.is_change(o_addr):
|
||
|
dest_label = self.labels.get(o_addr)
|
||
|
if dest_label:
|
||
|
default_label = 'at: ' + dest_label
|
||
|
else:
|
||
|
default_label = 'at: ' + o_addr
|
||
|
tx['default_label'] = default_label
|
||
|
|
||
|
|
||
|
|
||
|
def send(self, to_address, amount, label, password):
|
||
|
try:
|
||
|
inputs, outputs = wallet.choose_inputs_outputs( to_address, amount, self.fee, password )
|
||
|
except InvalidPassword: return False, "Wrong password"
|
||
|
if not inputs: return False, "Not enough funds"
|
||
|
try:
|
||
|
s_inputs = wallet.sign_inputs( inputs, outputs, password )
|
||
|
except InvalidPassword:
|
||
|
return False, "Wrong password"
|
||
|
tx = raw_tx( s_inputs, outputs )
|
||
|
tx = filter( tx )
|
||
|
tx_hash = Hash(tx.decode('hex') )[::-1].encode('hex')
|
||
|
out = self.send_tx(tx)
|
||
|
if out != tx_hash:
|
||
|
return False, "error: hash mismatch"
|
||
13 years ago
|
if to_address not in self.addressbook:
|
||
|
self.addressbook.append(to_address)
|
||
|
if label:
|
||
|
wallet.labels[tx_hash] = label
|
||
13 years ago
|
wallet.save()
|
||
|
return True, tx_hash
|
||
|
|
||
|
|
||
|
if __name__ == '__main__':
|
||
|
try:
|
||
|
cmd = sys.argv[1]
|
||
|
except:
|
||
|
cmd = "gui"
|
||
|
|
||
|
known_commands = ['balance', 'sendtoaddress', 'password', 'getnewaddress', 'addresses', 'history', 'label', 'gui', 'all_addresses']
|
||
|
if cmd not in known_commands:
|
||
|
print "Known commands:", ', '.join(known_commands)
|
||
|
exit(0)
|
||
|
|
||
|
wallet = Wallet()
|
||
|
if cmd=='gui':
|
||
|
import gui
|
||
|
gui.init_wallet(wallet)
|
||
|
gui = gui.BitcoinGUI(wallet)
|
||
|
gui.main()
|
||
|
|
||
|
if not wallet.read():
|
||
|
print no_wallet_message
|
||
13 years ago
|
seed = raw_input("Enter seed: ")
|
||
|
if len(seed)<20:
|
||
|
print "Seed too short. Please at least 20 characters"
|
||
13 years ago
|
exit(1)
|
||
|
if has_encryption:
|
||
|
password = getpass.getpass("Password (hit return if you do not wish to encrypt your wallet):")
|
||
|
if password:
|
||
|
password2 = getpass.getpass("Confirm password:")
|
||
|
if password != password2:
|
||
|
print "error"
|
||
|
exit(1)
|
||
|
else:
|
||
|
password = None
|
||
|
print "in order to use wallet encryption, please install pycrypto (sudo easy_install pycrypto)"
|
||
|
|
||
13 years ago
|
wallet.seed = wallet.pw_encode( seed, password)
|
||
13 years ago
|
|
||
|
print "server name and port number (default: ecdsa.org:50000)"
|
||
|
host = raw_input("server:")
|
||
|
if not host: host = 'ecdsa.org'
|
||
|
|
||
|
port = raw_input("port:")
|
||
|
if not port: port = 50000
|
||
|
else: port = int(port)
|
||
|
|
||
|
print "default fee for transactions (default 0.005)"
|
||
|
fee = raw_input("default fee:")
|
||
|
if not fee: fee = 0.005
|
||
|
|
||
|
wallet.fee = fee
|
||
|
wallet.gap_limit = 5
|
||
|
wallet.host = host
|
||
|
wallet.port = port
|
||
|
wallet.recover(password)
|
||
|
wallet.save()
|
||
|
|
||
|
wallet.new_session()
|
||
|
wallet.update()
|
||
|
wallet.save()
|
||
|
|
||
|
if cmd in ['sendtoaddress', 'password', 'getnewaddress']:
|
||
|
password = getpass.getpass('Password:') if wallet.use_encryption else None
|
||
|
|
||
|
if cmd == 'balance':
|
||
|
c, u = wallet.get_balance()
|
||
|
if u:
|
||
|
print c*1e-8, u*1e-8
|
||
|
else:
|
||
|
print c*1e-8
|
||
|
|
||
|
elif cmd in [ 'addresses', 'all_addresses']:
|
||
|
for addr in wallet.addresses:
|
||
|
if cmd == 'all_addresses' or not wallet.is_change(addr):
|
||
|
label = wallet.labels.get(addr) if not wallet.is_change(addr) else "[change]"
|
||
|
if label is None: label = ''
|
||
|
h = wallet.history.get(addr)
|
||
|
ni = no = 0
|
||
|
for item in h:
|
||
|
if item['is_in']: ni += 1
|
||
|
else: no += 1
|
||
|
print addr, no, ni, wallet.get_addr_balance(addr)[0]*1e-8, label
|
||
|
|
||
|
if cmd == 'history':
|
||
|
lines = wallet.get_tx_history()
|
||
|
b = 0
|
||
|
for line in lines:
|
||
|
import datetime
|
||
|
v = 1.*line['value']/1e8
|
||
|
b += v
|
||
|
v_str = "%f"%v if v<0 else "+%f"%v
|
||
|
try:
|
||
|
time_str = datetime.datetime.fromtimestamp( line['nTime'])
|
||
|
except:
|
||
|
print line['nTime']
|
||
|
time_str = 'pending'
|
||
|
label = line.get('label')
|
||
|
if not label: label = line['tx_hash']
|
||
|
else: label = label + ' '*(64 - len(label) )
|
||
|
|
||
|
print time_str, " ", label, " ", v_str, " ", "%f"%b
|
||
|
print "# balance: ", b
|
||
|
|
||
|
elif cmd == 'label':
|
||
|
try:
|
||
|
tx = sys.argv[2]
|
||
|
label = ' '.join(sys.argv[3:])
|
||
|
except:
|
||
|
print "syntax: label <tx_hash> <text>"
|
||
|
exit(1)
|
||
|
wallet.labels[tx] = label
|
||
|
wallet.save()
|
||
|
|
||
|
elif cmd == 'sendtoaddress':
|
||
|
try:
|
||
|
to_address = sys.argv[2]
|
||
|
amount = float(sys.argv[3])
|
||
|
label = ' '.join(sys.argv[4:])
|
||
|
except:
|
||
|
print "syntax: send <recipient> <amount> [label]"
|
||
|
exit(1)
|
||
|
r, h = wallet.send( to_address, amount, label, password )
|
||
|
print h
|
||
|
|
||
|
elif cmd == 'getnewaddress':
|
||
|
a = wallet.get_new_address()
|
||
|
if a:
|
||
|
print a
|
||
|
else:
|
||
|
print "Maximum gap reached. Increase gap in order to create more addresses."
|
||
|
|
||
|
elif cmd == 'password':
|
||
|
try:
|
||
13 years ago
|
seed = wallet.pw_decode( wallet.seed, password)
|
||
13 years ago
|
private_keys = ast.literal_eval( wallet.pw_decode( wallet.private_keys, password) )
|
||
|
except:
|
||
|
print "sorry"
|
||
|
exit(1)
|
||
|
new_password = getpass.getpass('New password:')
|
||
|
if new_password == getpass.getpass('Confirm new password:'):
|
||
|
wallet.use_encryption = (new_password != '')
|
||
13 years ago
|
wallet.seed = wallet.pw_encode( seed, new_password)
|
||
13 years ago
|
wallet.private_keys = wallet.pw_encode( repr( private_keys ), new_password)
|
||
|
wallet.save()
|
||
|
else:
|
||
|
print "error: mismatch"
|
||
|
|