3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2013 thomasv@gitorious
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
23 class Account(object):
24 def __init__(self, v):
25 self.addresses = v.get('0', [])
26 self.change = v.get('1', [])
29 return {'0':self.addresses, '1':self.change}
31 def get_addresses(self, for_change):
32 return self.change[:] if for_change else self.addresses[:]
34 def create_new_address(self, for_change):
35 addresses = self.change if for_change else self.addresses
37 address = self.get_address( for_change, n)
38 addresses.append(address)
42 def get_address(self, for_change, n):
48 class OldAccount(Account):
49 """ Privatekey(type,n) = Master_private_key + H(n|S|type) """
51 def __init__(self, v):
52 self.addresses = v.get(0, [])
53 self.change = v.get(1, [])
54 self.mpk = v['mpk'].decode('hex')
57 return {0:self.addresses, 1:self.change}
60 def mpk_from_seed(klass, seed):
62 secexp = klass.stretch_key(seed)
63 master_private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
64 master_public_key = master_private_key.get_verifying_key().to_string().encode('hex')
65 return master_public_key
68 def stretch_key(self,seed):
70 for i in range(100000):
71 seed = hashlib.sha256(seed + oldseed).digest()
72 return string_to_number( seed )
74 def get_sequence(self, for_change, n):
75 return string_to_number( Hash( "%d:%d:"%(n,for_change) + self.mpk ) )
77 def get_address(self, for_change, n):
78 pubkey = self.get_pubkey(for_change, n)
79 address = public_key_to_bc_address( pubkey.decode('hex') )
82 def get_pubkey(self, for_change, n):
85 z = self.get_sequence(for_change, n)
86 master_public_key = ecdsa.VerifyingKey.from_string( mpk, curve = SECP256k1 )
87 pubkey_point = master_public_key.pubkey.point + z*curve.generator
88 public_key2 = ecdsa.VerifyingKey.from_public_point( pubkey_point, curve = SECP256k1 )
89 return '04' + public_key2.to_string().encode('hex')
91 def get_private_key_from_stretched_exponent(self, for_change, n, secexp):
92 order = generator_secp256k1.order()
93 secexp = ( secexp + self.get_sequence(for_change, n) ) % order
94 pk = number_to_string( secexp, generator_secp256k1.order() )
96 return SecretToASecret( pk, compressed )
98 def get_private_key(self, for_change, n, seed):
99 secexp = self.stretch_key(seed)
100 return self.get_private_key_from_stretched_exponent(for_change, n, secexp)
102 def check_seed(self, seed):
104 secexp = self.stretch_key(seed)
105 master_private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
106 master_public_key = master_private_key.get_verifying_key().to_string().encode('hex')
107 if master_public_key != self.mpk:
108 print_error('invalid password (mpk)')
109 raise BaseException('Invalid password')
112 def redeem_script(self, sequence):
116 class BIP32_Account(Account):
118 def __init__(self, v):
119 Account.__init__(self, v)
120 self.c = v['c'].decode('hex')
121 self.K = v['K'].decode('hex')
122 self.cK = v['cK'].decode('hex')
125 d = Account.dump(self)
126 d['c'] = self.c.encode('hex')
127 d['K'] = self.K.encode('hex')
128 d['cK'] = self.cK.encode('hex')
131 def get_address(self, for_change, n):
132 pubkey = self.get_pubkey(for_change, n)
133 address = public_key_to_bc_address( pubkey.decode('hex') )
136 def first_address(self):
137 return self.get_address(0,0)
139 def get_pubkey(self, for_change, n):
142 for i in [for_change, n]:
143 K, K_compressed, chain = CKD_prime(K, chain, i)
144 return K_compressed.encode('hex')
146 def redeem_script(self, sequence):
152 class BIP32_Account_2of2(BIP32_Account):
154 def __init__(self, v):
155 BIP32_Account.__init__(self, v)
156 self.c2 = v['c2'].decode('hex')
157 self.K2 = v['K2'].decode('hex')
158 self.cK2 = v['cK2'].decode('hex')
161 d = BIP32_Account.dump(self)
162 d['c2'] = self.c2.encode('hex')
163 d['K2'] = self.K2.encode('hex')
164 d['cK2'] = self.cK2.encode('hex')
167 def get_pubkey2(self, for_change, n):
170 for i in [for_change, n]:
171 K, K_compressed, chain = CKD_prime(K, chain, i)
172 return K_compressed.encode('hex')
174 def redeem_script(self, sequence):
176 pubkey1 = self.get_pubkey(chain, i)
177 pubkey2 = self.get_pubkey2(chain, i)
178 return Transaction.multisig_script([pubkey1, pubkey2], 2)
180 def get_address(self, for_change, n):
181 address = hash_160_to_bc_address(hash_160(self.redeem_script((for_change, n)).decode('hex')), 5)
185 class BIP32_Account_2of3(BIP32_Account_2of2):
187 def __init__(self, v):
188 BIP32_Account_2of2.__init__(self, v)
189 self.c3 = v['c3'].decode('hex')
190 self.K3 = v['K3'].decode('hex')
191 self.cK3 = v['cK3'].decode('hex')
194 d = BIP32_Account_2of2.dump(self)
195 d['c3'] = self.c3.encode('hex')
196 d['K3'] = self.K3.encode('hex')
197 d['cK3'] = self.cK3.encode('hex')
200 def get_pubkey3(self, for_change, n):
203 for i in [for_change, n]:
204 K, K_compressed, chain = CKD_prime(K, chain, i)
205 return K_compressed.encode('hex')
207 def get_redeem_script(self, sequence):
209 pubkey1 = self.get_pubkey(chain, i)
210 pubkey2 = self.get_pubkey2(chain, i)
211 pubkey3 = self.get_pubkey3(chain, i)
212 return Transaction.multisig_script([pubkey1, pubkey2, pubkey3], 3)