electrum

Electrum Bitcoin wallet
git clone https://git.parazyd.org/electrum
Log | Files | Refs | Submodules

commit 30bb7dd6f46070953f03abedb9ee692dd74e55ff
parent 1669dd97827951d330b87bb6d7f786d843504766
Author: SomberNight <somber.night@protonmail.com>
Date:   Wed, 18 Sep 2019 02:09:15 +0200

ecc: small clean-up

Diffstat:
Melectrum/ecc.py | 25+++++++++++++------------
1 file changed, 13 insertions(+), 12 deletions(-)

diff --git a/electrum/ecc.py b/electrum/ecc.py @@ -25,7 +25,7 @@ import base64 import hashlib -from typing import Union, Tuple +from typing import Union, Tuple, Optional import ecdsa from ecdsa.ecdsa import curve_secp256k1, generator_secp256k1 @@ -83,12 +83,12 @@ def sig_string_from_r_and_s(r: int, s: int, order=CURVE_ORDER) -> bytes: return ecdsa.util.sigencode_string_canonize(r, s, order) -def point_to_ser(P, compressed=True) -> bytes: - if isinstance(P, tuple): - assert len(P) == 2, 'unexpected point: %s' % P - x, y = P +def point_to_ser(point, compressed=True) -> Optional[bytes]: + if isinstance(point, tuple): + assert len(point) == 2, f'unexpected point: {point}' + x, y = point else: - x, y = P.x(), P.y() + x, y = point.x(), point.y() if x is None or y is None: # infinity return None if compressed: @@ -96,7 +96,7 @@ def point_to_ser(P, compressed=True) -> bytes: return bfh('04'+('%064x' % x)+('%064x' % y)) -def get_y_coord_from_x(x: int, odd: bool=True) -> int: +def get_y_coord_from_x(x: int, *, odd: bool) -> int: curve = curve_secp256k1 _p = curve.p() _a = curve.a() @@ -117,7 +117,8 @@ def ser_to_point(ser: bytes) -> Tuple[int, int]: if ser[0] == 0x04: return string_to_number(ser[1:33]), string_to_number(ser[33:]) x = string_to_number(ser[1:]) - return x, get_y_coord_from_x(x, ser[0] == 0x03) + odd = ser[0] == 0x03 + return x, get_y_coord_from_x(x, odd=odd) def _ser_to_python_ecdsa_point(ser: bytes) -> ecdsa.ellipticcurve.Point: @@ -182,7 +183,7 @@ class _PubkeyForPointAtInfinity: class ECPubkey(object): - def __init__(self, b: bytes): + def __init__(self, b: Optional[bytes]): if b is not None: assert_bytes(b) point = _ser_to_python_ecdsa_point(b) @@ -434,8 +435,8 @@ class ECPrivkey(ECPubkey): sig65, recid = bruteforce_recid(sig_string) return sig65 - def decrypt_message(self, encrypted: Tuple[str, bytes], magic: bytes=b'BIE1') -> bytes: - encrypted = base64.b64decode(encrypted) + def decrypt_message(self, encrypted: Union[str, bytes], magic: bytes=b'BIE1') -> bytes: + encrypted = base64.b64decode(encrypted) # type: bytes if len(encrypted) < 85: raise Exception('invalid ciphertext: length') magic_found = encrypted[:4] @@ -446,7 +447,7 @@ class ECPrivkey(ECPubkey): raise Exception('invalid ciphertext: invalid magic bytes') try: ecdsa_point = _ser_to_python_ecdsa_point(ephemeral_pubkey_bytes) - except AssertionError as e: + except InvalidECPointException as e: raise Exception('invalid ciphertext: invalid ephemeral pubkey') from e if not ecdsa.ecdsa.point_is_valid(generator_secp256k1, ecdsa_point.x(), ecdsa_point.y()): raise Exception('invalid ciphertext: invalid ephemeral pubkey')