74f2d5819d4602dae17b5f08f229fd91a8a9348a
[electrum-nvc.git] / lib / transaction.py
1 #!/usr/bin/env python
2 #
3 # Electrum - lightweight Bitcoin client
4 # Copyright (C) 2011 thomasv@gitorious
5 #
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
10 #
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
15 #
16 # You should have received a copy of the GNU General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18
19
20 # Note: The deserialization code originally comes from ABE.
21
22
23 import bitcoin
24 from bitcoin import *
25 from util import print_error
26 import time
27 import struct
28
29 #
30 # Workalike python implementation of Bitcoin's CDataStream class.
31 #
32 import struct
33 import StringIO
34 import mmap
35
36 NO_SIGNATURE = 'ff'
37
38 class SerializationError(Exception):
39     """ Thrown when there's a problem deserializing or serializing """
40
41 class BCDataStream(object):
42     def __init__(self):
43         self.input = None
44         self.read_cursor = 0
45
46     def clear(self):
47         self.input = None
48         self.read_cursor = 0
49
50     def write(self, bytes):  # Initialize with string of bytes
51         if self.input is None:
52             self.input = bytes
53         else:
54             self.input += bytes
55
56     def map_file(self, file, start):  # Initialize with bytes from file
57         self.input = mmap.mmap(file.fileno(), 0, access=mmap.ACCESS_READ)
58         self.read_cursor = start
59
60     def seek_file(self, position):
61         self.read_cursor = position
62         
63     def close_file(self):
64         self.input.close()
65
66     def read_string(self):
67         # Strings are encoded depending on length:
68         # 0 to 252 :  1-byte-length followed by bytes (if any)
69         # 253 to 65,535 : byte'253' 2-byte-length followed by bytes
70         # 65,536 to 4,294,967,295 : byte '254' 4-byte-length followed by bytes
71         # ... and the Bitcoin client is coded to understand:
72         # greater than 4,294,967,295 : byte '255' 8-byte-length followed by bytes of string
73         # ... but I don't think it actually handles any strings that big.
74         if self.input is None:
75             raise SerializationError("call write(bytes) before trying to deserialize")
76
77         try:
78             length = self.read_compact_size()
79         except IndexError:
80             raise SerializationError("attempt to read past end of buffer")
81
82         return self.read_bytes(length)
83
84     def write_string(self, string):
85         # Length-encoded as with read-string
86         self.write_compact_size(len(string))
87         self.write(string)
88
89     def read_bytes(self, length):
90         try:
91             result = self.input[self.read_cursor:self.read_cursor+length]
92             self.read_cursor += length
93             return result
94         except IndexError:
95             raise SerializationError("attempt to read past end of buffer")
96
97         return ''
98
99     def read_boolean(self): return self.read_bytes(1)[0] != chr(0)
100     def read_int16(self): return self._read_num('<h')
101     def read_uint16(self): return self._read_num('<H')
102     def read_int32(self): return self._read_num('<i')
103     def read_uint32(self): return self._read_num('<I')
104     def read_int64(self): return self._read_num('<q')
105     def read_uint64(self): return self._read_num('<Q')
106
107     def write_boolean(self, val): return self.write(chr(1) if val else chr(0))
108     def write_int16(self, val): return self._write_num('<h', val)
109     def write_uint16(self, val): return self._write_num('<H', val)
110     def write_int32(self, val): return self._write_num('<i', val)
111     def write_uint32(self, val): return self._write_num('<I', val)
112     def write_int64(self, val): return self._write_num('<q', val)
113     def write_uint64(self, val): return self._write_num('<Q', val)
114
115     def read_compact_size(self):
116         size = ord(self.input[self.read_cursor])
117         self.read_cursor += 1
118         if size == 253:
119             size = self._read_num('<H')
120         elif size == 254:
121             size = self._read_num('<I')
122         elif size == 255:
123             size = self._read_num('<Q')
124         return size
125
126     def write_compact_size(self, size):
127         if size < 0:
128             raise SerializationError("attempt to write size < 0")
129         elif size < 253:
130             self.write(chr(size))
131         elif size < 2**16:
132             self.write('\xfd')
133             self._write_num('<H', size)
134         elif size < 2**32:
135             self.write('\xfe')
136             self._write_num('<I', size)
137         elif size < 2**64:
138             self.write('\xff')
139             self._write_num('<Q', size)
140
141     def _read_num(self, format):
142         (i,) = struct.unpack_from(format, self.input, self.read_cursor)
143         self.read_cursor += struct.calcsize(format)
144         return i
145
146     def _write_num(self, format, num):
147         s = struct.pack(format, num)
148         self.write(s)
149
150 #
151 # enum-like type
152 # From the Python Cookbook, downloaded from http://code.activestate.com/recipes/67107/
153 #
154 import types, string, exceptions
155
156 class EnumException(exceptions.Exception):
157     pass
158
159 class Enumeration:
160     def __init__(self, name, enumList):
161         self.__doc__ = name
162         lookup = { }
163         reverseLookup = { }
164         i = 0
165         uniqueNames = [ ]
166         uniqueValues = [ ]
167         for x in enumList:
168             if type(x) == types.TupleType:
169                 x, i = x
170             if type(x) != types.StringType:
171                 raise EnumException, "enum name is not a string: " + x
172             if type(i) != types.IntType:
173                 raise EnumException, "enum value is not an integer: " + i
174             if x in uniqueNames:
175                 raise EnumException, "enum name is not unique: " + x
176             if i in uniqueValues:
177                 raise EnumException, "enum value is not unique for " + x
178             uniqueNames.append(x)
179             uniqueValues.append(i)
180             lookup[x] = i
181             reverseLookup[i] = x
182             i = i + 1
183         self.lookup = lookup
184         self.reverseLookup = reverseLookup
185     def __getattr__(self, attr):
186         if not self.lookup.has_key(attr):
187             raise AttributeError
188         return self.lookup[attr]
189     def whatis(self, value):
190         return self.reverseLookup[value]
191
192
193 # This function comes from bitcointools, bct-LICENSE.txt.
194 def long_hex(bytes):
195     return bytes.encode('hex_codec')
196
197 # This function comes from bitcointools, bct-LICENSE.txt.
198 def short_hex(bytes):
199     t = bytes.encode('hex_codec')
200     if len(t) < 11:
201         return t
202     return t[0:4]+"..."+t[-4:]
203
204
205
206
207 def parse_redeemScript(bytes):
208     dec = [ x for x in script_GetOp(bytes.decode('hex')) ]
209
210     # 2 of 2
211     match = [ opcodes.OP_2, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_2, opcodes.OP_CHECKMULTISIG ]
212     if match_decoded(dec, match):
213         pubkeys = [ dec[1][1].encode('hex'), dec[2][1].encode('hex') ]
214         return 2, pubkeys
215
216     # 2 of 3
217     match = [ opcodes.OP_2, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_3, opcodes.OP_CHECKMULTISIG ]
218     if match_decoded(dec, match):
219         pubkeys = [ dec[1][1].encode('hex'), dec[2][1].encode('hex'), dec[3][1].encode('hex') ]
220         return 2, pubkeys
221
222
223
224 opcodes = Enumeration("Opcodes", [
225     ("OP_0", 0), ("OP_PUSHDATA1",76), "OP_PUSHDATA2", "OP_PUSHDATA4", "OP_1NEGATE", "OP_RESERVED",
226     "OP_1", "OP_2", "OP_3", "OP_4", "OP_5", "OP_6", "OP_7",
227     "OP_8", "OP_9", "OP_10", "OP_11", "OP_12", "OP_13", "OP_14", "OP_15", "OP_16",
228     "OP_NOP", "OP_VER", "OP_IF", "OP_NOTIF", "OP_VERIF", "OP_VERNOTIF", "OP_ELSE", "OP_ENDIF", "OP_VERIFY",
229     "OP_RETURN", "OP_TOALTSTACK", "OP_FROMALTSTACK", "OP_2DROP", "OP_2DUP", "OP_3DUP", "OP_2OVER", "OP_2ROT", "OP_2SWAP",
230     "OP_IFDUP", "OP_DEPTH", "OP_DROP", "OP_DUP", "OP_NIP", "OP_OVER", "OP_PICK", "OP_ROLL", "OP_ROT",
231     "OP_SWAP", "OP_TUCK", "OP_CAT", "OP_SUBSTR", "OP_LEFT", "OP_RIGHT", "OP_SIZE", "OP_INVERT", "OP_AND",
232     "OP_OR", "OP_XOR", "OP_EQUAL", "OP_EQUALVERIFY", "OP_RESERVED1", "OP_RESERVED2", "OP_1ADD", "OP_1SUB", "OP_2MUL",
233     "OP_2DIV", "OP_NEGATE", "OP_ABS", "OP_NOT", "OP_0NOTEQUAL", "OP_ADD", "OP_SUB", "OP_MUL", "OP_DIV",
234     "OP_MOD", "OP_LSHIFT", "OP_RSHIFT", "OP_BOOLAND", "OP_BOOLOR",
235     "OP_NUMEQUAL", "OP_NUMEQUALVERIFY", "OP_NUMNOTEQUAL", "OP_LESSTHAN",
236     "OP_GREATERTHAN", "OP_LESSTHANOREQUAL", "OP_GREATERTHANOREQUAL", "OP_MIN", "OP_MAX",
237     "OP_WITHIN", "OP_RIPEMD160", "OP_SHA1", "OP_SHA256", "OP_HASH160",
238     "OP_HASH256", "OP_CODESEPARATOR", "OP_CHECKSIG", "OP_CHECKSIGVERIFY", "OP_CHECKMULTISIG",
239     "OP_CHECKMULTISIGVERIFY",
240     ("OP_SINGLEBYTE_END", 0xF0),
241     ("OP_DOUBLEBYTE_BEGIN", 0xF000),
242     "OP_PUBKEY", "OP_PUBKEYHASH",
243     ("OP_INVALIDOPCODE", 0xFFFF),
244 ])
245
246
247 def script_GetOp(bytes):
248     i = 0
249     while i < len(bytes):
250         vch = None
251         opcode = ord(bytes[i])
252         i += 1
253         if opcode >= opcodes.OP_SINGLEBYTE_END:
254             opcode <<= 8
255             opcode |= ord(bytes[i])
256             i += 1
257
258         if opcode <= opcodes.OP_PUSHDATA4:
259             nSize = opcode
260             if opcode == opcodes.OP_PUSHDATA1:
261                 nSize = ord(bytes[i])
262                 i += 1
263             elif opcode == opcodes.OP_PUSHDATA2:
264                 (nSize,) = struct.unpack_from('<H', bytes, i)
265                 i += 2
266             elif opcode == opcodes.OP_PUSHDATA4:
267                 (nSize,) = struct.unpack_from('<I', bytes, i)
268                 i += 4
269             vch = bytes[i:i+nSize]
270             i += nSize
271
272         yield (opcode, vch, i)
273
274
275 def script_GetOpName(opcode):
276     return (opcodes.whatis(opcode)).replace("OP_", "")
277
278
279 def decode_script(bytes):
280     result = ''
281     for (opcode, vch, i) in script_GetOp(bytes):
282         if len(result) > 0: result += " "
283         if opcode <= opcodes.OP_PUSHDATA4:
284             result += "%d:"%(opcode,)
285             result += short_hex(vch)
286         else:
287             result += script_GetOpName(opcode)
288     return result
289
290
291 def match_decoded(decoded, to_match):
292     if len(decoded) != len(to_match):
293         return False;
294     for i in range(len(decoded)):
295         if to_match[i] == opcodes.OP_PUSHDATA4 and decoded[i][0] <= opcodes.OP_PUSHDATA4 and decoded[i][0]>0:
296             continue  # Opcodes below OP_PUSHDATA4 all just push data onto stack, and are equivalent.
297         if to_match[i] != decoded[i][0]:
298             return False
299     return True
300
301
302 def parse_sig(x_sig):
303     s = []
304     for sig in x_sig:
305         if sig[-2:] == '01':
306             s.append(sig[:-2])
307         else:
308             assert sig == NO_SIGNATURE
309             s.append(None)
310     return s
311
312 def is_extended_pubkey(x_pubkey):
313     return x_pubkey[0:2] in ['fe', 'ff']
314
315 def x_to_xpub(x_pubkey):
316     if x_pubkey[0:2] == 'ff':
317         from account import BIP32_Account
318         xpub, s = BIP32_Account.parse_xpubkey(x_pubkey)
319         return xpub
320
321         
322
323 def parse_xpub(x_pubkey):
324     if x_pubkey[0:2] == 'ff':
325         from account import BIP32_Account
326         xpub, s = BIP32_Account.parse_xpubkey(x_pubkey)
327         pubkey = BIP32_Account.derive_pubkey_from_xpub(xpub, s[0], s[1])
328     elif x_pubkey[0:2] == 'fe':
329         from account import OldAccount
330         mpk, s = OldAccount.parse_xpubkey(x_pubkey)
331         pubkey = OldAccount.get_pubkey_from_mpk(mpk.decode('hex'), s[0], s[1])
332     else:
333         pubkey = x_pubkey
334     return pubkey
335
336
337 def parse_scriptSig(d, bytes):
338     try:
339         decoded = [ x for x in script_GetOp(bytes) ]
340     except Exception:
341         # coinbase transactions raise an exception
342         print_error("cannot find address in input script", bytes.encode('hex'))
343         return
344
345     # payto_pubkey
346     match = [ opcodes.OP_PUSHDATA4 ]
347     if match_decoded(decoded, match):
348         sig = decoded[0][1].encode('hex')
349         d['address'] = "(pubkey)"
350         d['signatures'] = [sig]
351         d['num_sig'] = 1
352         d['x_pubkeys'] = ["(pubkey)"]
353         d['pubkeys'] = ["(pubkey)"]
354         return
355
356     # non-generated TxIn transactions push a signature
357     # (seventy-something bytes) and then their public key
358     # (65 bytes) onto the stack:
359     match = [ opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4 ]
360     if match_decoded(decoded, match):
361         sig = decoded[0][1].encode('hex')
362         x_pubkey = decoded[1][1].encode('hex')
363         try:
364             signatures = parse_sig([sig])
365             pubkey = parse_xpub(x_pubkey)
366         except:
367             import traceback
368             traceback.print_exc(file=sys.stdout)
369             print_error("cannot find address in input script", bytes.encode('hex'))
370             return
371         d['signatures'] = signatures
372         d['x_pubkeys'] = [x_pubkey]
373         d['num_sig'] = 1
374         d['pubkeys'] = [pubkey]
375         d['address'] = public_key_to_bc_address(pubkey.decode('hex'))
376         return
377
378     # p2sh transaction, 2 of n
379     match = [ opcodes.OP_0 ]
380     while len(match) < len(decoded):
381         match.append(opcodes.OP_PUSHDATA4)
382
383     if not match_decoded(decoded, match):
384         print_error("cannot find address in input script", bytes.encode('hex'))
385         return
386
387     x_sig = map(lambda x:x[1].encode('hex'), decoded[1:-1])
388     d['signatures'] = parse_sig(x_sig)
389     d['num_sig'] = 2
390
391     dec2 = [ x for x in script_GetOp(decoded[-1][1]) ]
392     match_2of2 = [ opcodes.OP_2, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_2, opcodes.OP_CHECKMULTISIG ]
393     match_2of3 = [ opcodes.OP_2, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_PUSHDATA4, opcodes.OP_3, opcodes.OP_CHECKMULTISIG ]
394     if match_decoded(dec2, match_2of2):
395         x_pubkeys = [ dec2[1][1].encode('hex'), dec2[2][1].encode('hex') ]
396     elif match_decoded(dec2, match_2of3):
397         x_pubkeys = [ dec2[1][1].encode('hex'), dec2[2][1].encode('hex'), dec2[3][1].encode('hex') ]
398     else:
399         print_error("cannot find address in input script", bytes.encode('hex'))
400         return
401
402     d['x_pubkeys'] = x_pubkeys
403     pubkeys = map(parse_xpub, x_pubkeys)
404     d['pubkeys'] = pubkeys
405     redeemScript = Transaction.multisig_script(pubkeys,2)
406     d['redeemScript'] = redeemScript
407     d['address'] = hash_160_to_bc_address(hash_160(redeemScript.decode('hex')), 5)
408
409
410
411
412 def get_address_from_output_script(bytes):
413     decoded = [ x for x in script_GetOp(bytes) ]
414
415     # The Genesis Block, self-payments, and pay-by-IP-address payments look like:
416     # 65 BYTES:... CHECKSIG
417     match = [ opcodes.OP_PUSHDATA4, opcodes.OP_CHECKSIG ]
418     if match_decoded(decoded, match):
419         return "pubkey:" + decoded[0][1].encode('hex')
420
421     # Pay-by-Bitcoin-address TxOuts look like:
422     # DUP HASH160 20 BYTES:... EQUALVERIFY CHECKSIG
423     match = [ opcodes.OP_DUP, opcodes.OP_HASH160, opcodes.OP_PUSHDATA4, opcodes.OP_EQUALVERIFY, opcodes.OP_CHECKSIG ]
424     if match_decoded(decoded, match):
425         return hash_160_to_bc_address(decoded[2][1])
426
427     # p2sh
428     match = [ opcodes.OP_HASH160, opcodes.OP_PUSHDATA4, opcodes.OP_EQUAL ]
429     if match_decoded(decoded, match):
430         return hash_160_to_bc_address(decoded[1][1],5)
431
432     return "(None)"
433
434
435
436 push_script = lambda x: op_push(len(x)/2) + x
437
438 class Transaction:
439
440     def __str__(self):
441         if self.raw is None:
442             self.raw = self.serialize(self.inputs, self.outputs, for_sig = None) # for_sig=-1 means do not sign
443         return self.raw
444
445     def __init__(self, inputs, outputs):
446         self.inputs = inputs
447         self.outputs = outputs
448         self.locktime = 0
449         self.raw = None
450         
451
452     @classmethod 
453     def sweep(klass, privkeys, network, to_address, fee):
454         inputs = []
455         for privkey in privkeys:
456             pubkey = public_key_from_private_key(privkey)
457             address = address_from_private_key(privkey)
458             u = network.synchronous_get([ ('blockchain.address.listunspent',[address])])[0]
459             pay_script = klass.pay_script(address)
460             for item in u:
461                 item['scriptPubKey'] = pay_script
462                 item['redeemPubkey'] = pubkey
463                 item['address'] = address
464                 item['prevout_hash'] = item['tx_hash']
465                 item['prevout_n'] = item['tx_pos']
466             inputs += u
467
468         if not inputs:
469             return
470
471         total = sum( map(lambda x:int(x.get('value')), inputs) ) - fee
472         outputs = [(to_address, total)]
473         self = klass(inputs, outputs)
474         self.sign({ pubkey:privkey })
475         return self
476
477     @classmethod
478     def multisig_script(klass, public_keys, num=None):
479         n = len(public_keys)
480         if num is None: num = n
481         # supports only "2 of 2", and "2 of 3" transactions
482         assert num <= n and n in [2,3]
483     
484         if num==2:
485             s = '52'
486         elif num == 3:
487             s = '53'
488         else:
489             raise
490     
491         for k in public_keys:
492             s += op_push(len(k)/2)
493             s += k
494         if n==2:
495             s += '52'
496         elif n==3:
497             s += '53'
498         else:
499             raise
500         s += 'ae'
501
502         return s
503
504
505     @classmethod
506     def pay_script(self, addr):
507         if addr.startswith('OP_RETURN:'):
508             h = addr[10:].encode('hex')
509             return '6a' + push_script(h)
510         addrtype, hash_160 = bc_address_to_hash_160(addr)
511         if addrtype == 0:
512             script = '76a9'                                      # op_dup, op_hash_160
513             script += push_script(hash_160.encode('hex'))
514             script += '88ac'                                     # op_equalverify, op_checksig
515         elif addrtype == 5:
516             script = 'a9'                                        # op_hash_160
517             script += push_script(hash_160.encode('hex'))
518             script += '87'                                       # op_equal
519         else:
520             raise
521         return script
522
523
524     @classmethod
525     def serialize(klass, inputs, outputs, for_sig = None ):
526
527         s  = int_to_hex(1,4)                                         # version
528         s += var_int( len(inputs) )                                  # number of inputs
529         for i in range(len(inputs)):
530             txin = inputs[i]
531
532             s += txin['prevout_hash'].decode('hex')[::-1].encode('hex')   # prev hash
533             s += int_to_hex(txin['prevout_n'],4)                          # prev index
534
535             p2sh = txin.get('redeemScript') is not None
536             num_sig = txin['num_sig']
537             address = txin['address']
538
539             x_signatures = txin['signatures']
540             signatures = filter(lambda x: x is not None, x_signatures)
541             is_complete = len(signatures) == num_sig
542
543             if for_sig is None:
544                 # if we have enough signatures, we use the actual pubkeys
545                 # use extended pubkeys (with bip32 derivation)
546                 sig_list = []
547                 if is_complete:
548                     pubkeys = txin['pubkeys']
549                     for signature in signatures:
550                         sig_list.append(signature + '01')
551                 else:
552                     pubkeys = txin['x_pubkeys']
553                     for signature in x_signatures:
554                         sig_list.append((signature + '01') if signature is not None else NO_SIGNATURE)
555
556                 sig_list = ''.join( map( lambda x: push_script(x), sig_list))
557                 if not p2sh:
558                     script = sig_list
559                     script += push_script(pubkeys[0])
560                 else:
561                     script = '00'                                    # op_0
562                     script += sig_list
563                     redeem_script = klass.multisig_script(pubkeys,2)
564                     script += push_script(redeem_script)
565
566             elif for_sig==i:
567                 script = txin['redeemScript'] if p2sh else klass.pay_script(address)
568             else:
569                 script = ''
570             s += var_int( len(script)/2 )                            # script length
571             s += script
572             s += "ffffffff"                                          # sequence
573
574         s += var_int( len(outputs) )                                 # number of outputs
575         for output in outputs:
576             addr, amount = output
577             s += int_to_hex( amount, 8)                              # amount
578             script = klass.pay_script(addr)
579             s += var_int( len(script)/2 )                           #  script length
580             s += script                                             #  script
581         s += int_to_hex(0,4)                                        #  lock time
582         if for_sig is not None and for_sig != -1:
583             s += int_to_hex(1, 4)                                   #  hash type
584         return s
585
586
587     def tx_for_sig(self,i):
588         return self.serialize(self.inputs, self.outputs, for_sig = i)
589
590
591     def hash(self):
592         return Hash(self.raw.decode('hex') )[::-1].encode('hex')
593
594     def add_signature(self, i, pubkey, sig):
595         print_error("adding signature for", pubkey)
596         txin = self.inputs[i]
597         pubkeys = txin['pubkeys']
598         ii = pubkeys.index(pubkey)
599         txin['signatures'][ii] = sig
600         txin['x_pubkeys'][ii] = pubkey
601         self.inputs[i] = txin
602         self.raw = self.serialize(self.inputs, self.outputs)
603
604
605     def signature_count(self):
606         r = 0
607         s = 0
608         for txin in self.inputs:
609             signatures = filter(lambda x: x is not None, txin['signatures'])
610             s += len(signatures)
611             r += txin['num_sig']
612         return s, r
613
614
615     def is_complete(self):
616         s, r = self.signature_count()
617         return r == s
618
619
620     def inputs_to_sign(self):
621         from account import BIP32_Account, OldAccount
622         xpub_list = []
623         addr_list = set()
624         for txin in self.inputs:
625             x_signatures = txin['signatures']
626             signatures = filter(lambda x: x is not None, x_signatures)
627
628             if len(signatures) == txin['num_sig']:
629                 # input is complete
630                 continue
631
632             for k, x_pubkey in enumerate(txin['x_pubkeys']):
633
634                 if x_signatures[k] is not None:
635                     # this pubkey already signed
636                     continue
637
638                 if x_pubkey[0:2] == 'ff':
639                     xpub, sequence = BIP32_Account.parse_xpubkey(x_pubkey)
640                     xpub_list.append((xpub,sequence))
641                 elif x_pubkey[0:2] == 'fe':
642                     xpub, sequence = OldAccount.parse_xpubkey(x_pubkey)
643                     xpub_list.append((xpub,sequence))
644                 else:
645                     addr_list.add(txin['address'])
646
647         return addr_list, xpub_list
648
649
650     def sign(self, keypairs):
651         print_error("tx.sign(), keypairs:", keypairs)
652
653         for i, txin in enumerate(self.inputs):
654
655             # continue if this txin is complete
656             signatures = filter(lambda x: x is not None, txin['signatures'])
657             num = txin['num_sig']
658             if len(signatures) == num:
659                 continue
660
661             redeem_pubkeys = txin['pubkeys']
662             for_sig = Hash(self.tx_for_sig(i).decode('hex'))
663             for pubkey in redeem_pubkeys:
664                 if pubkey in keypairs.keys():
665                     # add signature
666                     sec = keypairs[pubkey]
667                     pkey = regenerate_key(sec)
668                     secexp = pkey.secret
669                     private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
670                     public_key = private_key.get_verifying_key()
671                     sig = private_key.sign_digest_deterministic( for_sig, hashfunc=hashlib.sha256, sigencode = ecdsa.util.sigencode_der )
672                     assert public_key.verify_digest( sig, for_sig, sigdecode = ecdsa.util.sigdecode_der)
673                     self.add_signature(i, pubkey, sig.encode('hex'))
674
675
676         print_error("is_complete", self.is_complete())
677         self.raw = self.serialize( self.inputs, self.outputs )
678
679
680
681     @classmethod
682     def deserialize(klass, raw):
683         vds = BCDataStream()
684         vds.write(raw.decode('hex'))
685         d = {}
686         start = vds.read_cursor
687         d['version'] = vds.read_int32()
688         n_vin = vds.read_compact_size()
689         d['inputs'] = []
690         for i in xrange(n_vin):
691             d['inputs'].append(klass.parse_input(vds))
692         n_vout = vds.read_compact_size()
693         d['outputs'] = []
694         for i in xrange(n_vout):
695             d['outputs'].append(klass.parse_output(vds, i))
696         d['lockTime'] = vds.read_uint32()
697
698         inputs = d['inputs']
699         outputs = map(lambda x: (x['address'], x['value']), d['outputs'])
700
701         self = klass(inputs, outputs)
702         self.raw = raw
703         self.locktime = d['lockTime']
704         return self
705     
706     @classmethod
707     def parse_input(self, vds):
708         d = {}
709         prevout_hash = hash_encode(vds.read_bytes(32))
710         prevout_n = vds.read_uint32()
711         scriptSig = vds.read_bytes(vds.read_compact_size())
712         sequence = vds.read_uint32()
713
714         if prevout_hash == '00'*32:
715             d['is_coinbase'] = True
716         else:
717             d['is_coinbase'] = False
718             d['prevout_hash'] = prevout_hash
719             d['prevout_n'] = prevout_n
720             d['sequence'] = sequence
721             d['pubkeys'] = []
722             d['signatures'] = {}
723             d['address'] = None
724             if scriptSig:
725                 parse_scriptSig(d, scriptSig)
726         return d
727
728     @classmethod
729     def parse_output(self, vds, i):
730         d = {}
731         d['value'] = vds.read_int64()
732         scriptPubKey = vds.read_bytes(vds.read_compact_size())
733         address = get_address_from_output_script(scriptPubKey)
734         d['address'] = address
735         d['scriptPubKey'] = scriptPubKey.encode('hex')
736         d['prevout_n'] = i
737         return d
738
739
740     def add_pubkey_addresses(self, txlist):
741         for i in self.inputs:
742             if i.get("address") == "(pubkey)":
743                 prev_tx = txlist.get(i.get('prevout_hash'))
744                 if prev_tx:
745                     address, value = prev_tx.get_outputs()[i.get('prevout_n')]
746                     print_error("found pay-to-pubkey address:", address)
747                     i["address"] = address
748
749
750     def get_outputs(self):
751         """convert pubkeys to addresses"""
752         o = []
753         for x, v in self.outputs:
754             if bitcoin.is_address(x):
755                 addr = x
756             elif x.startswith('pubkey:'):
757                 addr = public_key_to_bc_address(x[7:].decode('hex'))
758             else:
759                 addr = "(None)"
760             o.append((addr,v))
761         return o
762
763     def get_output_addresses(self):
764         return map(lambda x:x[0], self.get_outputs())
765
766
767     def has_address(self, addr):
768         found = False
769         for txin in self.inputs:
770             if addr == txin.get('address'): 
771                 found = True
772                 break
773         if addr in self.get_output_addresses():
774             found = True
775
776         return found
777
778
779     def get_value(self, addresses, prevout_values):
780         # return the balance for that tx
781         is_relevant = False
782         is_send = False
783         is_pruned = False
784         is_partial = False
785         v_in = v_out = v_out_mine = 0
786
787         for item in self.inputs:
788             addr = item.get('address')
789             if addr in addresses:
790                 is_send = True
791                 is_relevant = True
792                 key = item['prevout_hash']  + ':%d'%item['prevout_n']
793                 value = prevout_values.get( key )
794                 if value is None:
795                     is_pruned = True
796                 else:
797                     v_in += value
798             else:
799                 is_partial = True
800
801         if not is_send: is_partial = False
802                     
803         for addr, value in self.get_outputs():
804             v_out += value
805             if addr in addresses:
806                 v_out_mine += value
807                 is_relevant = True
808
809         if is_pruned:
810             # some inputs are mine:
811             fee = None
812             if is_send:
813                 v = v_out_mine - v_out
814             else:
815                 # no input is mine
816                 v = v_out_mine
817
818         else:
819             v = v_out_mine - v_in
820
821             if is_partial:
822                 # some inputs are mine, but not all
823                 fee = None
824                 is_send = v < 0
825             else:
826                 # all inputs are mine
827                 fee = v_out - v_in
828
829         return is_relevant, is_send, v, fee
830
831
832     def as_dict(self):
833         import json
834         out = {
835             "hex":self.raw,
836             "complete":self.is_complete()
837             }
838         return out
839
840
841     def requires_fee(self, verifier):
842         # see https://en.bitcoin.it/wiki/Transaction_fees
843         threshold = 57600000
844         size = len(self.raw)/2
845         if size >= 10000: 
846             return True
847
848         for o in self.outputs:
849             value = o[1]
850             if value < 1000000:
851                 return True
852         sum = 0
853         for i in self.inputs:
854             age = verifier.get_confirmations(i["prevout_hash"])[0]
855             sum += i["value"] * age
856         priority = sum / size
857         print_error(priority, threshold)
858         return priority < threshold 
859
860
861