You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
742 lines
26 KiB
742 lines
26 KiB
#!/usr/bin/env python
|
|
#
|
|
# Electrum - lightweight Bitcoin client
|
|
# Copyright (C) 2011 thomasv@gitorious
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
import sys, base64, os, re, hashlib, socket, getpass, copy, operator, urllib2, ast
|
|
|
|
try:
|
|
import ecdsa
|
|
except:
|
|
print "python-ecdsa does not seem to be installed. Try 'sudo easy_install ecdsa'"
|
|
exit(1)
|
|
|
|
try:
|
|
import Crypto
|
|
has_encryption = True
|
|
except:
|
|
has_encryption = False
|
|
|
|
|
|
############ functions from pywallet #####################
|
|
|
|
addrtype = 0
|
|
|
|
def hash_160(public_key):
|
|
md = hashlib.new('ripemd160')
|
|
md.update(hashlib.sha256(public_key).digest())
|
|
return md.digest()
|
|
|
|
def public_key_to_bc_address(public_key):
|
|
h160 = hash_160(public_key)
|
|
return hash_160_to_bc_address(h160)
|
|
|
|
def hash_160_to_bc_address(h160):
|
|
vh160 = chr(addrtype) + h160
|
|
h = Hash(vh160)
|
|
addr = vh160 + h[0:4]
|
|
return b58encode(addr)
|
|
|
|
def bc_address_to_hash_160(addr):
|
|
bytes = b58decode(addr, 25)
|
|
return bytes[1:21]
|
|
|
|
__b58chars = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
|
|
__b58base = len(__b58chars)
|
|
|
|
def b58encode(v):
|
|
""" encode v, which is a string of bytes, to base58.
|
|
"""
|
|
|
|
long_value = 0L
|
|
for (i, c) in enumerate(v[::-1]):
|
|
long_value += (256**i) * ord(c)
|
|
|
|
result = ''
|
|
while long_value >= __b58base:
|
|
div, mod = divmod(long_value, __b58base)
|
|
result = __b58chars[mod] + result
|
|
long_value = div
|
|
result = __b58chars[long_value] + result
|
|
|
|
# Bitcoin does a little leading-zero-compression:
|
|
# leading 0-bytes in the input become leading-1s
|
|
nPad = 0
|
|
for c in v:
|
|
if c == '\0': nPad += 1
|
|
else: break
|
|
|
|
return (__b58chars[0]*nPad) + result
|
|
|
|
def b58decode(v, length):
|
|
""" decode v into a string of len bytes
|
|
"""
|
|
long_value = 0L
|
|
for (i, c) in enumerate(v[::-1]):
|
|
long_value += __b58chars.find(c) * (__b58base**i)
|
|
|
|
result = ''
|
|
while long_value >= 256:
|
|
div, mod = divmod(long_value, 256)
|
|
result = chr(mod) + result
|
|
long_value = div
|
|
result = chr(long_value) + result
|
|
|
|
nPad = 0
|
|
for c in v:
|
|
if c == __b58chars[0]: nPad += 1
|
|
else: break
|
|
|
|
result = chr(0)*nPad + result
|
|
if length is not None and len(result) != length:
|
|
return None
|
|
|
|
return result
|
|
|
|
|
|
def Hash(data):
|
|
return hashlib.sha256(hashlib.sha256(data).digest()).digest()
|
|
|
|
def EncodeBase58Check(vchIn):
|
|
hash = Hash(vchIn)
|
|
return b58encode(vchIn + hash[0:4])
|
|
|
|
def DecodeBase58Check(psz):
|
|
vchRet = b58decode(psz, None)
|
|
key = vchRet[0:-4]
|
|
csum = vchRet[-4:]
|
|
hash = Hash(key)
|
|
cs32 = hash[0:4]
|
|
if cs32 != csum:
|
|
return None
|
|
else:
|
|
return key
|
|
|
|
def PrivKeyToSecret(privkey):
|
|
return privkey[9:9+32]
|
|
|
|
def SecretToASecret(secret):
|
|
vchIn = chr(addrtype+128) + secret
|
|
return EncodeBase58Check(vchIn)
|
|
|
|
def ASecretToSecret(key):
|
|
vch = DecodeBase58Check(key)
|
|
if vch and vch[0] == chr(addrtype+128):
|
|
return vch[1:]
|
|
else:
|
|
return False
|
|
|
|
########### end pywallet functions #######################
|
|
|
|
|
|
def int_to_hex(i, length=1):
|
|
s = hex(i)[2:]
|
|
s = "0"*(2*length - len(s)) + s
|
|
return s.decode('hex')[::-1].encode('hex')
|
|
|
|
|
|
# password encryption
|
|
from Crypto.Cipher import AES
|
|
BLOCK_SIZE = 32
|
|
PADDING = '{'
|
|
pad = lambda s: s + (BLOCK_SIZE - len(s) % BLOCK_SIZE) * PADDING
|
|
EncodeAES = lambda c, s: base64.b64encode(c.encrypt(pad(s)))
|
|
DecodeAES = lambda c, e: c.decrypt(base64.b64decode(e)).rstrip(PADDING)
|
|
|
|
|
|
# secp256k1, http://www.oid-info.com/get/1.3.132.0.10
|
|
_p = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2FL
|
|
_r = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141L
|
|
_b = 0x0000000000000000000000000000000000000000000000000000000000000007L
|
|
_a = 0x0000000000000000000000000000000000000000000000000000000000000000L
|
|
_Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798L
|
|
_Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8L
|
|
curve_secp256k1 = ecdsa.ellipticcurve.CurveFp( _p, _a, _b )
|
|
generator_secp256k1 = ecdsa.ellipticcurve.Point( curve_secp256k1, _Gx, _Gy, _r )
|
|
oid_secp256k1 = (1,3,132,0,10)
|
|
SECP256k1 = ecdsa.curves.Curve("SECP256k1", curve_secp256k1, generator_secp256k1, oid_secp256k1 )
|
|
|
|
|
|
def filter(s):
|
|
out = re.sub('( [^\n]*|)\n','',s)
|
|
out = out.replace(' ','')
|
|
out = out.replace('\n','')
|
|
return out
|
|
|
|
def raw_tx( inputs, outputs, for_sig = None ):
|
|
s = int_to_hex(1,4) + ' version\n'
|
|
s += int_to_hex( len(inputs) ) + ' number of inputs\n'
|
|
for i in range(len(inputs)):
|
|
_, _, p_hash, p_index, p_script, pubkey, sig = inputs[i]
|
|
s += p_hash.decode('hex')[::-1].encode('hex') + ' prev hash\n'
|
|
s += int_to_hex(p_index,4) + ' prev index\n'
|
|
if for_sig is None:
|
|
sig = sig + chr(1) # hashtype
|
|
script = int_to_hex( len(sig)) + ' push %d bytes\n'%len(sig)
|
|
script += sig.encode('hex') + ' sig\n'
|
|
pubkey = chr(4) + pubkey
|
|
script += int_to_hex( len(pubkey)) + ' push %d bytes\n'%len(pubkey)
|
|
script += pubkey.encode('hex') + ' pubkey\n'
|
|
elif for_sig==i:
|
|
script = p_script + ' scriptsig \n'
|
|
else:
|
|
script=''
|
|
s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
|
|
s += script
|
|
s += "ffffffff" + ' sequence\n'
|
|
s += int_to_hex( len(outputs) ) + ' number of outputs\n'
|
|
for output in outputs:
|
|
addr, amount = output
|
|
s += int_to_hex( amount, 8) + ' amount: %d\n'%amount
|
|
script = '76a9' # op_dup, op_hash_160
|
|
script += '14' # push 0x14 bytes
|
|
script += bc_address_to_hash_160(addr).encode('hex')
|
|
script += '88ac' # op_equalverify, op_checksig
|
|
s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
|
|
s += script + ' script \n'
|
|
s += int_to_hex(0,4) # lock time
|
|
if for_sig is not None: s += int_to_hex(1, 4) # hash type
|
|
return s
|
|
|
|
class InvalidPassword(Exception):
|
|
pass
|
|
|
|
wallet_dir = os.environ["HOME"] + '/.bitcoin/'
|
|
if not os.path.exists( wallet_dir ):
|
|
os.mkdir( wallet_dir )
|
|
wallet_path = wallet_dir + '/electrum.dat'
|
|
|
|
class Wallet:
|
|
def __init__(self):
|
|
self.gap_limit = 5 # configuration
|
|
self.host = 'ecdsa.org'
|
|
self.port = 50000
|
|
self.fee = 0.005
|
|
self.version = 1
|
|
|
|
# saved fields
|
|
self.use_encryption = False
|
|
self.addresses = []
|
|
self.seed = '' # encrypted
|
|
self.private_keys = repr([]) # encrypted
|
|
self.change_addresses = [] # index of addresses used as change
|
|
self.status = {} # current status of addresses
|
|
self.history = {}
|
|
self.labels = {} # labels for addresses and transactions
|
|
self.addressbook = [] # outgoing addresses, for payments
|
|
self.blocks = 0
|
|
|
|
# not saved
|
|
self.message = ''
|
|
self.tx_history = {}
|
|
|
|
def new_seed(self, password):
|
|
seed = "%032x"%ecdsa.util.randrange( pow(2,128) )
|
|
self.seed = wallet.pw_encode( seed, password)
|
|
|
|
def is_mine(self, address):
|
|
return address in self.addresses
|
|
|
|
def is_change(self, address):
|
|
if not self.is_mine(address):
|
|
return False
|
|
k = self.addresses.index(address)
|
|
return k in self.change_addresses
|
|
|
|
def is_valid(self,addr):
|
|
ADDRESS_RE = re.compile('[1-9A-HJ-NP-Za-km-z]{26,}\\Z')
|
|
return ADDRESS_RE.match(addr)
|
|
|
|
def create_new_address(self, for_change, password):
|
|
seed = self.pw_decode( self.seed, password)
|
|
# strenghtening
|
|
for i in range(100000):
|
|
oldseed = seed
|
|
seed = hashlib.sha512(seed + oldseed).digest()
|
|
i = len( self.addresses ) - len(self.change_addresses) if not for_change else len(self.change_addresses)
|
|
seed = Hash( "%d:%d:"%(i,for_change) + seed )
|
|
order = generator_secp256k1.order()
|
|
secexp = ecdsa.util.randrange_from_seed__trytryagain( seed, order )
|
|
secret = SecretToASecret( ('%064x' % secexp).decode('hex') )
|
|
private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
|
|
public_key = private_key.get_verifying_key()
|
|
address = public_key_to_bc_address( '04'.decode('hex') + public_key.to_string() )
|
|
try:
|
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password) )
|
|
private_keys.append(secret)
|
|
except:
|
|
raise InvalidPassword("")
|
|
self.private_keys = self.pw_encode( repr(private_keys), password)
|
|
self.addresses.append(address)
|
|
if for_change: self.change_addresses.append( i )
|
|
h = self.retrieve_history(address)
|
|
self.history[address] = h
|
|
self.status[address] = h[-1]['blk_hash'] if h else None
|
|
return address
|
|
|
|
def recover(self, password):
|
|
seed = self.pw_decode( self.seed, password)
|
|
|
|
# todo: recover receiving addresses from tx
|
|
is_found = False
|
|
while True:
|
|
addr = self.create_new_address(True, password)
|
|
#print "recovering", addr
|
|
if self.status[addr] is not None:
|
|
is_found = True
|
|
else:
|
|
break
|
|
|
|
num_gap = 0
|
|
while True:
|
|
addr = self.create_new_address(False, password)
|
|
#print "recovering", addr
|
|
if self.status[addr] is None:
|
|
num_gap += 1
|
|
if num_gap == self.gap_limit: break
|
|
else:
|
|
is_found = True
|
|
num_gap = 0
|
|
|
|
if not is_found: return False
|
|
|
|
# remove limit-1 addresses. [ this is ok, because change addresses are at the beginning of the list]
|
|
n = self.gap_limit
|
|
self.addresses = self.addresses[:-n]
|
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password))
|
|
private_keys = private_keys[:-n]
|
|
self.private_keys = self.pw_encode( repr(private_keys), password)
|
|
|
|
# history and addressbook
|
|
self.update_tx_history()
|
|
for tx in self.tx_history.values():
|
|
if tx['value']<0:
|
|
for i in tx['outputs']:
|
|
if not self.is_mine(i) and i not in self.addressbook:
|
|
self.addressbook.append(i)
|
|
# redo labels
|
|
self.update_tx_labels()
|
|
return True
|
|
|
|
def save(self):
|
|
s = repr( (self.version, self.use_encryption, self.fee, self.host, self.blocks,
|
|
self.seed, self.addresses, self.private_keys,
|
|
self.change_addresses, self.status, self.history,
|
|
self.labels, self.addressbook) )
|
|
f = open(wallet_path,"w")
|
|
f.write(s)
|
|
f.close()
|
|
|
|
def read(self):
|
|
try:
|
|
f = open(wallet_path,"r")
|
|
data = f.read()
|
|
f.close()
|
|
except:
|
|
return False
|
|
try:
|
|
sequence = ast.literal_eval( data )
|
|
(self.version, self.use_encryption, self.fee, self.host, self.blocks,
|
|
self.seed, self.addresses, self.private_keys,
|
|
self.change_addresses, self.status, self.history,
|
|
self.labels, self.addressbook) = sequence
|
|
except:
|
|
if len(sequence) == 12: raise BaseException("version error.")
|
|
return False
|
|
self.update_tx_history()
|
|
return True
|
|
|
|
def get_new_address(self, password):
|
|
n = 0
|
|
for addr in self.addresses[-self.gap_limit:]:
|
|
if self.history[addr] == []:
|
|
n = n + 1
|
|
if n < self.gap_limit:
|
|
try:
|
|
new_address = self.create_new_address(False, password)
|
|
except InvalidPassword:
|
|
return False, "wrong password"
|
|
self.save()
|
|
return True, new_address
|
|
else:
|
|
return False, "The last %d addresses in your list have never been used. You should use them first, or increase the allowed gap size in your preferences. "%self.gap_limit
|
|
|
|
def get_addr_balance(self, addr):
|
|
h = self.history.get(addr)
|
|
c = u = 0
|
|
for item in h:
|
|
v = item['value']
|
|
if item['height']:
|
|
c += v
|
|
else:
|
|
u += v
|
|
return c, u
|
|
|
|
def get_balance(self):
|
|
conf = unconf = 0
|
|
for addr in self.addresses:
|
|
c, u = self.get_addr_balance(addr)
|
|
conf += c
|
|
unconf += u
|
|
return conf, unconf
|
|
|
|
def request(self, request ):
|
|
|
|
if self.port == 80:
|
|
try:
|
|
out = urllib2.urlopen('http://'+self.host+'/q/tw', request, timeout=5).read()
|
|
except:
|
|
out = ''
|
|
else:
|
|
s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect(( self.host, self.port))
|
|
s.send(request)
|
|
out = ''
|
|
while 1:
|
|
msg = s.recv(1024)
|
|
if msg: out += msg
|
|
else: break
|
|
s.close()
|
|
|
|
if re.match('[^:]\s*\(', out): out = ''
|
|
return out
|
|
|
|
def retrieve_message(self):
|
|
if not self.message:
|
|
self.message = self.request( repr ( ('msg', '')))
|
|
|
|
def send_tx(self, data):
|
|
return self.request( repr ( ('tx', data )))
|
|
|
|
def retrieve_history(self, address):
|
|
return ast.literal_eval( self.request( repr ( ('h', address ))) )
|
|
|
|
def poll(self):
|
|
return ast.literal_eval( self.request( repr ( ('poll', '' ))))
|
|
|
|
def new_session(self):
|
|
self.message = self.request( repr ( ('watch', repr(self.addresses) )))
|
|
|
|
def update(self):
|
|
blocks, changed_addresses = self.poll()
|
|
self.blocks = blocks
|
|
for addr, blk_hash in changed_addresses.items():
|
|
if self.status[addr] != blk_hash:
|
|
print "updating history for", addr
|
|
self.history[addr] = self.retrieve_history(addr)
|
|
self.status[addr] = blk_hash
|
|
self.update_tx_history()
|
|
if changed_addresses:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def choose_inputs_outputs( self, to_addr, amount, fee, password):
|
|
""" todo: minimize tx size """
|
|
|
|
amount = int( 1e8*amount )
|
|
fee = int( 1e8*fee )
|
|
total = 0
|
|
inputs = []
|
|
for addr in self.addresses:
|
|
h = self.history.get(addr)
|
|
for item in h:
|
|
if item.get('raw_scriptPubKey'):
|
|
v = item.get('value')
|
|
total += v
|
|
inputs.append((addr, v, item['tx_hash'], item['pos'], item['raw_scriptPubKey'], None, None) )
|
|
if total >= amount + fee: break
|
|
if total >= amount + fee: break
|
|
else:
|
|
print "not enough funds: %d %d"%(total, fee)
|
|
return False, "not enough funds: %d %d"%(total, fee)
|
|
outputs = [ (to_addr, amount) ]
|
|
change_amount = total - ( amount + fee )
|
|
if change_amount != 0:
|
|
# first look for unused change addresses
|
|
for addr in self.addresses:
|
|
i = self.addresses.index(addr)
|
|
if i not in self.change_addresses: continue
|
|
if self.history.get(addr): continue
|
|
change_address = addr
|
|
break
|
|
else:
|
|
change_address = self.create_new_address(True, password)
|
|
print "new change address", change_address
|
|
outputs.append( (change_address, change_amount) )
|
|
return inputs, outputs
|
|
|
|
def sign_inputs( self, inputs, outputs, password ):
|
|
s_inputs = []
|
|
for i in range(len(inputs)):
|
|
addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
|
|
private_key = self.get_private_key(addr, password)
|
|
public_key = private_key.get_verifying_key()
|
|
pubkey = public_key.to_string()
|
|
tx = filter( raw_tx( inputs, outputs, for_sig = i ) )
|
|
sig = private_key.sign_digest( Hash( tx.decode('hex') ), sigencode = ecdsa.util.sigencode_der )
|
|
assert public_key.verify_digest( sig, Hash( tx.decode('hex') ), sigdecode = ecdsa.util.sigdecode_der)
|
|
s_inputs.append( (addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig) )
|
|
return s_inputs
|
|
|
|
def pw_encode(self, s, password):
|
|
if password:
|
|
secret = Hash(password)
|
|
cipher = AES.new(secret)
|
|
return EncodeAES(cipher, s)
|
|
else:
|
|
return s
|
|
|
|
def pw_decode(self, s, password):
|
|
if password:
|
|
secret = Hash(password)
|
|
cipher = AES.new(secret)
|
|
return DecodeAES(cipher, s)
|
|
else:
|
|
return s
|
|
|
|
def get_private_key( self, addr, password ):
|
|
try:
|
|
private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password ) )
|
|
except:
|
|
raise InvalidPassword("")
|
|
k = self.addresses.index(addr)
|
|
secret = private_keys[k]
|
|
b = ASecretToSecret(secret)
|
|
secexp = int( b.encode('hex'), 16)
|
|
private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve=SECP256k1 )
|
|
public_key = private_key.get_verifying_key()
|
|
assert addr == public_key_to_bc_address( chr(4) + public_key.to_string() )
|
|
return private_key
|
|
|
|
def get_tx_history(self):
|
|
lines = self.tx_history.values()
|
|
lines = sorted(lines, key=operator.itemgetter("nTime"))
|
|
return lines
|
|
|
|
def update_tx_history(self):
|
|
self.tx_history= {}
|
|
for addr in self.addresses:
|
|
for tx in self.history[addr]:
|
|
tx_hash = tx['tx_hash']
|
|
line = self.tx_history.get(tx_hash)
|
|
if not line:
|
|
self.tx_history[tx_hash] = copy.copy(tx)
|
|
line = self.tx_history.get(tx_hash)
|
|
else:
|
|
line['value'] += tx['value']
|
|
if line['blk_hash'] == 'mempool':
|
|
line['nTime'] = 1e12
|
|
self.update_tx_labels()
|
|
|
|
def update_tx_labels(self):
|
|
for tx in self.tx_history.values():
|
|
default_label = ''
|
|
if tx['value']<0:
|
|
for o_addr in tx['outputs']:
|
|
if not self.is_change(o_addr):
|
|
dest_label = self.labels.get(o_addr)
|
|
if dest_label:
|
|
default_label = 'to: ' + dest_label
|
|
else:
|
|
default_label = 'to: ' + o_addr
|
|
else:
|
|
for o_addr in tx['outputs']:
|
|
if self.is_mine(o_addr) and not self.is_change(o_addr):
|
|
dest_label = self.labels.get(o_addr)
|
|
if dest_label:
|
|
default_label = 'at: ' + dest_label
|
|
else:
|
|
default_label = 'at: ' + o_addr
|
|
tx['default_label'] = default_label
|
|
|
|
|
|
|
|
def send(self, to_address, amount, label, password):
|
|
try:
|
|
inputs, outputs = wallet.choose_inputs_outputs( to_address, amount, self.fee, password )
|
|
except InvalidPassword: return False, "Wrong password"
|
|
if not inputs: return False, "Not enough funds"
|
|
try:
|
|
s_inputs = wallet.sign_inputs( inputs, outputs, password )
|
|
except InvalidPassword:
|
|
return False, "Wrong password"
|
|
tx = raw_tx( s_inputs, outputs )
|
|
tx = filter( tx )
|
|
tx_hash = Hash(tx.decode('hex') )[::-1].encode('hex')
|
|
out = self.send_tx(tx)
|
|
if out != tx_hash:
|
|
return False, "error: hash mismatch"
|
|
if to_address not in self.addressbook:
|
|
self.addressbook.append(to_address)
|
|
if label:
|
|
wallet.labels[tx_hash] = label
|
|
wallet.save()
|
|
return True, tx_hash
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
try:
|
|
cmd = sys.argv[1]
|
|
except:
|
|
cmd = "gui"
|
|
|
|
known_commands = ['balance', 'sendtoaddress', 'password', 'getnewaddress', 'addresses', 'history', 'label', 'gui', 'all_addresses']
|
|
if cmd not in known_commands:
|
|
print "Known commands:", ', '.join(known_commands)
|
|
exit(0)
|
|
|
|
wallet = Wallet()
|
|
if cmd=='gui':
|
|
import gui
|
|
gui.init_wallet(wallet)
|
|
gui = gui.BitcoinGUI(wallet)
|
|
gui.main()
|
|
|
|
if not wallet.read():
|
|
|
|
if has_encryption:
|
|
password = getpass.getpass("Password (hit return if you do not wish to encrypt your wallet):")
|
|
if password:
|
|
password2 = getpass.getpass("Confirm password:")
|
|
if password != password2:
|
|
print "error"
|
|
exit(1)
|
|
else:
|
|
password = None
|
|
print "in order to use wallet encryption, please install pycrypto (sudo easy_install pycrypto)"
|
|
|
|
host = raw_input("server (default:ecdsa.org):")
|
|
port = raw_input("port (default:50000):")
|
|
fee = raw_input("fee (default 0.005):")
|
|
if fee: wallet.fee = float(fee)
|
|
if host: wallet.host = host
|
|
if port: wallet.port = int(port)
|
|
seed = raw_input("if you are restoring an existing wallet, enter the seed. otherwise just press enter: ")
|
|
wallet.gap_limit = 5
|
|
if seed:
|
|
wallet.seed = seed
|
|
gap = raw_input("gap limit (default 5):")
|
|
if gap: wallet.gap_limit = int(gap)
|
|
print "recovering wallet..."
|
|
r = wallet.recover(password)
|
|
if r:
|
|
print "recovery successful"
|
|
wallet.save()
|
|
else:
|
|
print "no wallet found"
|
|
else:
|
|
wallet.new_seed(None)
|
|
print "Your seed is", wallet.seed
|
|
print "Please store it safely"
|
|
# generate first key
|
|
wallet.create_new_address(False, None)
|
|
|
|
wallet.new_session()
|
|
wallet.update()
|
|
wallet.save()
|
|
|
|
if cmd in ['sendtoaddress', 'password', 'getnewaddress']:
|
|
password = getpass.getpass('Password:') if wallet.use_encryption else None
|
|
|
|
if cmd == 'balance':
|
|
c, u = wallet.get_balance()
|
|
if u:
|
|
print c*1e-8, u*1e-8
|
|
else:
|
|
print c*1e-8
|
|
|
|
elif cmd in [ 'addresses', 'all_addresses']:
|
|
for addr in wallet.addresses:
|
|
if cmd == 'all_addresses' or not wallet.is_change(addr):
|
|
label = wallet.labels.get(addr) if not wallet.is_change(addr) else "[change]"
|
|
if label is None: label = ''
|
|
h = wallet.history.get(addr)
|
|
ni = no = 0
|
|
for item in h:
|
|
if item['is_in']: ni += 1
|
|
else: no += 1
|
|
print addr, no, ni, wallet.get_addr_balance(addr)[0]*1e-8, label
|
|
|
|
if cmd == 'history':
|
|
lines = wallet.get_tx_history()
|
|
b = 0
|
|
for line in lines:
|
|
import datetime
|
|
v = 1.*line['value']/1e8
|
|
b += v
|
|
v_str = "%f"%v if v<0 else "+%f"%v
|
|
try:
|
|
time_str = datetime.datetime.fromtimestamp( line['nTime'])
|
|
except:
|
|
print line['nTime']
|
|
time_str = 'pending'
|
|
label = line.get('label')
|
|
if not label: label = line['tx_hash']
|
|
else: label = label + ' '*(64 - len(label) )
|
|
|
|
print time_str, " ", label, " ", v_str, " ", "%f"%b
|
|
print "# balance: ", b
|
|
|
|
elif cmd == 'label':
|
|
try:
|
|
tx = sys.argv[2]
|
|
label = ' '.join(sys.argv[3:])
|
|
except:
|
|
print "syntax: label <tx_hash> <text>"
|
|
exit(1)
|
|
wallet.labels[tx] = label
|
|
wallet.save()
|
|
|
|
elif cmd == 'sendtoaddress':
|
|
try:
|
|
to_address = sys.argv[2]
|
|
amount = float(sys.argv[3])
|
|
label = ' '.join(sys.argv[4:])
|
|
except:
|
|
print "syntax: send <recipient> <amount> [label]"
|
|
exit(1)
|
|
r, h = wallet.send( to_address, amount, label, password )
|
|
print h
|
|
|
|
elif cmd == 'getnewaddress':
|
|
a = wallet.get_new_address()
|
|
if a:
|
|
print a
|
|
else:
|
|
print "Maximum gap reached. Increase gap in order to create more addresses."
|
|
|
|
elif cmd == 'password':
|
|
try:
|
|
seed = wallet.pw_decode( wallet.seed, password)
|
|
private_keys = ast.literal_eval( wallet.pw_decode( wallet.private_keys, password) )
|
|
except:
|
|
print "sorry"
|
|
exit(1)
|
|
new_password = getpass.getpass('New password:')
|
|
if new_password == getpass.getpass('Confirm new password:'):
|
|
wallet.use_encryption = (new_password != '')
|
|
wallet.seed = wallet.pw_encode( seed, new_password)
|
|
wallet.private_keys = wallet.pw_encode( repr( private_keys ), new_password)
|
|
wallet.save()
|
|
else:
|
|
print "error: mismatch"
|
|
|
|
|