3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2013 thomasv@gitorious
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
23 class Account(object):
24 def __init__(self, v):
25 self.addresses = v.get('0', [])
26 self.change = v.get('1', [])
27 self.name = v.get('name', 'unnamed')
30 return {'0':self.addresses, '1':self.change, 'name':self.name}
35 def get_addresses(self, for_change):
36 return self.change[:] if for_change else self.addresses[:]
38 def create_new_address(self, for_change):
39 addresses = self.change if for_change else self.addresses
41 address = self.get_address( for_change, n)
42 addresses.append(address)
46 def get_address(self, for_change, n):
52 class OldAccount(Account):
53 """ Privatekey(type,n) = Master_private_key + H(n|S|type) """
55 def __init__(self, mpk, mpk2 = None, mpk3 = None):
61 def mpk_from_seed(klass, seed):
63 secexp = klass.stretch_key(seed)
64 master_private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
65 master_public_key = master_private_key.get_verifying_key().to_string().encode('hex')
66 return master_public_key
69 def stretch_key(self,seed):
71 for i in range(100000):
72 seed = hashlib.sha256(seed + oldseed).digest()
73 return string_to_number( seed )
75 def get_sequence(self, sequence, mpk):
76 for_change, n = sequence
77 return string_to_number( Hash( "%d:%d:"%(n,for_change) + mpk.decode('hex') ) )
79 def get_address(self, sequence):
81 pubkey = self.get_pubkey(sequence)
82 address = public_key_to_bc_address( pubkey.decode('hex') )
84 pubkey1 = self.get_pubkey(sequence)
85 pubkey2 = self.get_pubkey(sequence, mpk = self.mpk2)
86 address = Transaction.multisig_script([pubkey1, pubkey2], 2)["address"]
88 pubkey1 = self.get_pubkey(sequence)
89 pubkey2 = self.get_pubkey(sequence, mpk = self.mpk2)
90 pubkey3 = self.get_pubkey(sequence, mpk = self.mpk3)
91 address = Transaction.multisig_script([pubkey1, pubkey2, pubkey3], 2)["address"]
94 def get_pubkey(self, sequence, mpk=None):
96 if mpk is None: mpk = self.mpk
97 z = self.get_sequence(sequence, mpk)
98 master_public_key = ecdsa.VerifyingKey.from_string( mpk.decode('hex'), curve = SECP256k1 )
99 pubkey_point = master_public_key.pubkey.point + z*curve.generator
100 public_key2 = ecdsa.VerifyingKey.from_public_point( pubkey_point, curve = SECP256k1 )
101 return '04' + public_key2.to_string().encode('hex')
103 def get_private_key_from_stretched_exponent(self, sequence, secexp):
104 order = generator_secp256k1.order()
105 secexp = ( secexp + self.get_sequence(sequence, self.mpk) ) % order
106 pk = number_to_string( secexp, generator_secp256k1.order() )
108 return SecretToASecret( pk, compressed )
110 def get_private_key(self, sequence, seed):
111 secexp = self.stretch_key(seed)
112 return self.get_private_key_from_stretched_exponent(sequence, secexp)
114 def get_private_keys(self, sequence_list, seed):
115 secexp = self.stretch_key(seed)
116 return [ self.get_private_key_from_stretched_exponent( sequence, secexp) for sequence in sequence_list]
118 def check_seed(self, seed):
120 secexp = self.stretch_key(seed)
121 master_private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
122 master_public_key = master_private_key.get_verifying_key().to_string().encode('hex')
123 if master_public_key != self.mpk:
124 print_error('invalid password (mpk)')
125 raise BaseException('Invalid password')
128 def get_input_info(self, sequence):
130 pk_addr = self.get_address(sequence)
133 pubkey1 = self.get_pubkey(sequence)
134 pubkey2 = self.get_pubkey(sequence,mpk=self.mpk2)
135 pk_addr = public_key_to_bc_address( pubkey1.decode('hex') ) # we need to return that address to get the right private key
136 redeemScript = Transaction.multisig_script([pubkey1, pubkey2], 2)['redeemScript']
138 pubkey1 = self.get_pubkey(sequence)
139 pubkey2 = self.get_pubkey(sequence, mpk=self.mpk2)
140 pubkey3 = self.get_pubkey(sequence, mpk=self.mpk3)
141 pk_addr = public_key_to_bc_address( pubkey1.decode('hex') ) # we need to return that address to get the right private key
142 redeemScript = Transaction.multisig_script([pubkey1, pubkey2, pubkey3], 2)['redeemScript']
143 return pk_addr, redeemScript
147 class BIP32_Account(Account):
149 def __init__(self, v):
150 Account.__init__(self, v)
151 self.c = v['c'].decode('hex')
152 self.K = v['K'].decode('hex')
153 self.cK = v['cK'].decode('hex')
156 d = Account.dump(self)
157 d['c'] = self.c.encode('hex')
158 d['K'] = self.K.encode('hex')
159 d['cK'] = self.cK.encode('hex')
162 def get_address(self, for_change, n):
163 pubkey = self.get_pubkey(for_change, n)
164 address = public_key_to_bc_address( pubkey.decode('hex') )
167 def get_pubkey(self, for_change, n):
170 for i in [for_change, n]:
171 K, K_compressed, chain = CKD_prime(K, chain, i)
172 return K_compressed.encode('hex')
175 def get_private_keys(self, sequence_list, seed):
176 return [ self.get_private_key( sequence, seed) for sequence in sequence_list]
178 def check_seed(self, seed):
179 master_secret, master_chain, master_public_key, master_public_key_compressed = bip32_init(seed)
180 assert self.mpk == (master_public_key.encode('hex'), master_chain.encode('hex'))
182 def get_input_info(self, sequence):
184 pk_addr = self.get_address(chain, i)
186 return pk_addr, redeemScript
190 class BIP32_Account_2of2(BIP32_Account):
192 def __init__(self, v):
193 BIP32_Account.__init__(self, v)
194 self.c2 = v['c2'].decode('hex')
195 self.K2 = v['K2'].decode('hex')
196 self.cK2 = v['cK2'].decode('hex')
199 d = BIP32_Account.dump(self)
200 d['c2'] = self.c2.encode('hex')
201 d['K2'] = self.K2.encode('hex')
202 d['cK2'] = self.cK2.encode('hex')
205 def get_pubkey2(self, for_change, n):
208 for i in [for_change, n]:
209 K, K_compressed, chain = CKD_prime(K, chain, i)
210 return K_compressed.encode('hex')
212 def redeem_script(self, sequence):
214 pubkey1 = self.get_pubkey(chain, i)
215 pubkey2 = self.get_pubkey2(chain, i)
216 return Transaction.multisig_script([pubkey1, pubkey2], 2)
218 def get_address(self, for_change, n):
219 address = hash_160_to_bc_address(hash_160(self.redeem_script((for_change, n)).decode('hex')), 5)
223 class BIP32_Account_2of3(BIP32_Account_2of2):
225 def __init__(self, v):
226 BIP32_Account_2of2.__init__(self, v)
227 self.c3 = v['c3'].decode('hex')
228 self.K3 = v['K3'].decode('hex')
229 self.cK3 = v['cK3'].decode('hex')
232 d = BIP32_Account_2of2.dump(self)
233 d['c3'] = self.c3.encode('hex')
234 d['K3'] = self.K3.encode('hex')
235 d['cK3'] = self.cK3.encode('hex')
238 def get_pubkey3(self, for_change, n):
241 for i in [for_change, n]:
242 K, K_compressed, chain = CKD_prime(K, chain, i)
243 return K_compressed.encode('hex')
245 def get_redeem_script(self, sequence):
247 pubkey1 = self.get_pubkey(chain, i)
248 pubkey2 = self.get_pubkey2(chain, i)
249 pubkey3 = self.get_pubkey3(chain, i)
250 return Transaction.multisig_script([pubkey1, pubkey2, pubkey3], 3)