electrum

Electrum Bitcoin wallet
git clone https://git.parazyd.org/electrum
Log | Files | Refs | Submodules

commit f004dff9ef8d0c6b3c6a29cb79a78a1bd56a5ff4
parent 7f67b36a19736ade7d1bc3dd6e142fcf95a9fb20
Author: ThomasV <thomasv@gitorious>
Date:   Mon,  5 May 2014 17:31:39 +0200

adding initial bip70 script (wozz)

Diffstat:
Alib/paymentrequest.proto | 46++++++++++++++++++++++++++++++++++++++++++++++
Alib/paymentrequest.py | 208+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 254 insertions(+), 0 deletions(-)

diff --git a/lib/paymentrequest.proto b/lib/paymentrequest.proto @@ -0,0 +1,46 @@ +// +// Simple Bitcoin Payment Protocol messages +// +// Use fields 1000+ for extensions; +// to avoid conflicts, register extensions via pull-req at +// https://github.com/bitcoin/bips/bip-0070/extensions.mediawiki +// + +package payments; +option java_package = "org.bitcoin.protocols.payments"; +option java_outer_classname = "Protos"; + +// Generalized form of "send payment to this/these bitcoin addresses" +message Output { + optional uint64 amount = 1 [default = 0]; // amount is integer-number-of-satoshis + required bytes script = 2; // usually one of the standard Script forms +} +message PaymentDetails { + optional string network = 1 [default = "main"]; // "main" or "test" + repeated Output outputs = 2; // Where payment should be sent + required uint64 time = 3; // Timestamp; when payment request created + optional uint64 expires = 4; // Timestamp; when this request should be considered invalid + optional string memo = 5; // Human-readable description of request for the customer + optional string payment_url = 6; // URL to send Payment and get PaymentACK + optional bytes merchant_data = 7; // Arbitrary data to include in the Payment message +} +message PaymentRequest { + optional uint32 payment_details_version = 1 [default = 1]; + optional string pki_type = 2 [default = "none"]; // none / x509+sha256 / x509+sha1 + optional bytes pki_data = 3; // depends on pki_type + required bytes serialized_payment_details = 4; // PaymentDetails + optional bytes signature = 5; // pki-dependent signature +} +message X509Certificates { + repeated bytes certificate = 1; // DER-encoded X.509 certificate chain +} +message Payment { + optional bytes merchant_data = 1; // From PaymentDetails.merchant_data + repeated bytes transactions = 2; // Signed transactions that satisfy PaymentDetails.outputs + repeated Output refund_to = 3; // Where to send refunds, if a refund is necessary + optional string memo = 4; // Human-readable message for the merchant +} +message PaymentACK { + required Payment payment = 1; // Payment message that triggered this ACK + optional string memo = 2; // human-readable message for customer +} diff --git a/lib/paymentrequest.py b/lib/paymentrequest.py @@ -0,0 +1,208 @@ +import hashlib +import httplib +import os.path +import re +import sys +import threading +import time +import traceback +import urllib2 + +try: + import paymentrequest_pb2 +except: + print "protoc --proto_path=lib/ --python_out=lib/ lib/paymentrequest.proto" + sys.exit(1) + +import urlparse +import requests +from M2Crypto import X509 + +from bitcoin import is_valid +import urlparse + +import transaction + +REQUEST_HEADERS = {'Accept': 'application/bitcoin-paymentrequest', 'User-Agent': 'Electrum'} +ACK_HEADERS = {'Content-Type':'application/bitcoin-payment','Accept':'application/bitcoin-paymentack','User-Agent':'Electrum'} + +class PaymentRequest: + + def __init__(self): + self.ca_path = os.path.expanduser("~/.electrum/ca/ca-bundle.crt") + self.ca_list = {} + try: + with open(self.ca_path, 'r') as ca_f: + c = "" + for line in ca_f: + if line == "-----BEGIN CERTIFICATE-----\n": + c = line + else: + c += line + if line == "-----END CERTIFICATE-----\n": + x = X509.load_cert_string(c) + self.ca_list[x.get_fingerprint()] = x + except Exception: + print "ERROR: Could not open %s"%self.ca_path + print "ca-bundle.crt file should be placed in ~/.electrum/ca/ca-bundle.crt" + print "Documentation on how to download or create the file here: http://curl.haxx.se/docs/caextract.html" + print "Payment will continue with manual verification." + + + + def verify(self, url): + + u = urlparse.urlparse(urllib2.unquote(url)) + self.domain = u.netloc + + connection = httplib.HTTPConnection(u.netloc) if u.scheme == 'http' else httplib.HTTPSConnection(u.netloc) + connection.request("GET",u.geturl(), headers=REQUEST_HEADERS) + resp = connection.getresponse() + + r = resp.read() + paymntreq = paymentrequest_pb2.PaymentRequest() + paymntreq.ParseFromString(r) + + sig = paymntreq.signature + + cert = paymentrequest_pb2.X509Certificates() + cert.ParseFromString(paymntreq.pki_data) + cert_num = len(cert.certificate) + + x509_1 = X509.load_cert_der_string(cert.certificate[0]) + if self.domain != x509_1.get_subject().CN: + ###TODO: check for subject alt names + ### check for wildcards + print "ERROR: Certificate Subject Domain Mismatch" + print self.domain, x509_1.get_subject().CN + #return + + x509 = [] + CA_OU = '' + + if cert_num > 1: + for i in range(cert_num - 1): + x509.append(X509.load_cert_der_string(cert.certificate[i+1])) + if x509[i].check_ca() == 0: + print "ERROR: Supplied CA Certificate Error" + return + for i in range(cert_num - 1): + if i == 0: + if x509_1.verify(x509[i].get_pubkey()) != 1: + print "ERROR: Certificate not Signed by Provided CA Certificate Chain" + return + else: + if x509[i-1].verify(x509[i].get_pubkey()) != 1: + print "ERROR: CA Certificate not Signed by Provided CA Certificate Chain" + return + + supplied_CA_fingerprint = x509[cert_num-2].get_fingerprint() + supplied_CA_CN = x509[cert_num-2].get_subject().CN + CA_match = False + + x = self.ca_list.get(supplied_CA_fingerprint) + if x: + CA_OU = x.get_subject().OU + CA_match = True + if x.get_subject().CN != supplied_CA_CN: + print "ERROR: Trusted CA CN Mismatch; however CA has trusted fingerprint" + print "Payment will continue with manual verification." + else: + print "ERROR: Supplied CA Not Found in Trusted CA Store." + print "Payment will continue with manual verification." + else: + print "ERROR: CA Certificate Chain Not Provided by Payment Processor" + return False + + paymntreq.signature = '' + s = paymntreq.SerializeToString() + pubkey_1 = x509_1.get_pubkey() + + if paymntreq.pki_type == "x509+sha256": + pubkey_1.reset_context(md="sha256") + elif paymntreq.pki_type == "x509+sha1": + pubkey_1.reset_context(md="sha1") + else: + print "ERROR: Unsupported PKI Type for Message Signature" + return False + + pubkey_1.verify_init() + pubkey_1.verify_update(s) + if pubkey_1.verify_final(sig) != 1: + print "ERROR: Invalid Signature for Payment Request Data" + return False + + ### SIG Verified + + self.payment_details = pay_det = paymentrequest_pb2.PaymentDetails() + pay_det.ParseFromString(paymntreq.serialized_payment_details) + + if pay_det.expires and pay_det.expires < int(time.time()): + print "ERROR: Payment Request has Expired." + return False + + self.outputs = [] + for o in pay_det.outputs: + addr = transaction.get_address_from_output_script(o.script)[1] + self.outputs.append( (addr, o.amount) ) + + if CA_match: + print 'Signed By Trusted CA: ', CA_OU + + return True + + + + def send_ack(self, raw_tx, refund_addr): + + pay_det = self.payment_details + if pay_det.payment_url: + paymnt = paymentrequest_pb2.Payment() + + paymnt.merchant_data = pay_det.merchant_data + paymnt.transactions.append(raw_tx) + + ref_out = paymnt.refund_to.add() + ref_out.script = transaction.Transaction.pay_script(refund_addr) + paymnt.memo = "Paid using Electrum" + pm = paymnt.SerializeToString() + + payurl = urlparse.urlparse(pay_det.payment_url) + try: + r = requests.post(payurl.geturl(), data=pm, headers=ACK_HEADERS, verify=self.ca_path) + except requests.exceptions.SSLError: + print "Payment Message/PaymentACK verify Failed" + try: + r = requests.post(payurl.geturl(), data=pm, headers=ACK_HEADERS, verify=False) + except Exception as e: + print "Payment Message/PaymentACK Failed" + print e + return + try: + paymntack = paymentrequest_pb2.PaymentACK() + paymntack.ParseFromString(r.content) + print "PaymentACK message received: %s" % paymntack.memo + except Exception: + print "PaymentACK could not be processed. Payment was sent; please manually verify that payment was received." + + +uri = "bitcoin:mpu3yTLdqA1BgGtFUwkVJmhnU3q5afaFkf?r=https%3A%2F%2Fbitcoincore.org%2F%7Egavin%2Ff.php%3Fh%3D26c19879d44c3891214e7897797b9160&amount=1" +url = "https%3A%2F%2Fbitcoincore.org%2F%7Egavin%2Ff.php%3Fh%3D26c19879d44c3891214e7897797b9160" + +#uri = "bitcoin:1m9Lw2pFCe6Hs7xUuo9fMJCzEwQNdCo5e?amount=0.0012&r=https%3A%2F%2Fbitpay.com%2Fi%2F8XNDiQU92H2whNG4j8hZ5M" +#url = "https%3A%2F%2Fbitpay.com%2Fi%2F8XNDiQU92H2whNG4j8hZ5M" + + +if __name__ == "__main__": + + pr = PaymentRequest() + if not pr.verify(url): + sys.exit(1) + + print 'Payment Request Verified Domain: ', pr.domain + print 'outputs', pr.outputs + print 'Payment Memo: ', pr.payment_details.memo + + tx = "blah" + pr.send_ack(tx, "1vXAXUnGitimzinpXrqDWVU4tyAAQ34RA") +