commit f0d0dc8acda51ce89fd966842cc44f7dc971ea52
parent 4d3159a74a78b4c972ced4d3a997d203bad4c825
Author: ThomasV <thomasv@gitorious>
Date: Sat, 5 Nov 2011 19:58:25 +0100
for freeze
Diffstat:
D | client/electrum | | | 718 | ------------------------------------------------------------------------------- |
A | client/electrum.py | | | 717 | +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ |
2 files changed, 717 insertions(+), 718 deletions(-)
diff --git a/client/electrum b/client/electrum
@@ -1,718 +0,0 @@
-#!/usr/bin/env python
-#
-# Electrum - lightweight Bitcoin client
-# Copyright (C) 2011 thomasv@gitorious
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-
-
-import sys, base64, os, re, hashlib, socket, getpass, copy, operator, urllib2, ast
-
-try:
- import ecdsa
-except:
- print "python-ecdsa does not seem to be installed. Try 'sudo easy_install ecdsa'"
- exit(1)
-
-try:
- import Crypto
- has_encryption = True
-except:
- has_encryption = False
-
-
-############ functions from pywallet #####################
-
-addrtype = 0
-
-def hash_160(public_key):
- md = hashlib.new('ripemd160')
- md.update(hashlib.sha256(public_key).digest())
- return md.digest()
-
-def public_key_to_bc_address(public_key):
- h160 = hash_160(public_key)
- return hash_160_to_bc_address(h160)
-
-def hash_160_to_bc_address(h160):
- vh160 = chr(addrtype) + h160
- h = Hash(vh160)
- addr = vh160 + h[0:4]
- return b58encode(addr)
-
-def bc_address_to_hash_160(addr):
- bytes = b58decode(addr, 25)
- return bytes[1:21]
-
-__b58chars = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
-__b58base = len(__b58chars)
-
-def b58encode(v):
- """ encode v, which is a string of bytes, to base58.
- """
-
- long_value = 0L
- for (i, c) in enumerate(v[::-1]):
- long_value += (256**i) * ord(c)
-
- result = ''
- while long_value >= __b58base:
- div, mod = divmod(long_value, __b58base)
- result = __b58chars[mod] + result
- long_value = div
- result = __b58chars[long_value] + result
-
- # Bitcoin does a little leading-zero-compression:
- # leading 0-bytes in the input become leading-1s
- nPad = 0
- for c in v:
- if c == '\0': nPad += 1
- else: break
-
- return (__b58chars[0]*nPad) + result
-
-def b58decode(v, length):
- """ decode v into a string of len bytes
- """
- long_value = 0L
- for (i, c) in enumerate(v[::-1]):
- long_value += __b58chars.find(c) * (__b58base**i)
-
- result = ''
- while long_value >= 256:
- div, mod = divmod(long_value, 256)
- result = chr(mod) + result
- long_value = div
- result = chr(long_value) + result
-
- nPad = 0
- for c in v:
- if c == __b58chars[0]: nPad += 1
- else: break
-
- result = chr(0)*nPad + result
- if length is not None and len(result) != length:
- return None
-
- return result
-
-
-def Hash(data):
- return hashlib.sha256(hashlib.sha256(data).digest()).digest()
-
-def EncodeBase58Check(vchIn):
- hash = Hash(vchIn)
- return b58encode(vchIn + hash[0:4])
-
-def DecodeBase58Check(psz):
- vchRet = b58decode(psz, None)
- key = vchRet[0:-4]
- csum = vchRet[-4:]
- hash = Hash(key)
- cs32 = hash[0:4]
- if cs32 != csum:
- return None
- else:
- return key
-
-def PrivKeyToSecret(privkey):
- return privkey[9:9+32]
-
-def SecretToASecret(secret):
- vchIn = chr(addrtype+128) + secret
- return EncodeBase58Check(vchIn)
-
-def ASecretToSecret(key):
- vch = DecodeBase58Check(key)
- if vch and vch[0] == chr(addrtype+128):
- return vch[1:]
- else:
- return False
-
-########### end pywallet functions #######################
-
-
-def int_to_hex(i, length=1):
- s = hex(i)[2:]
- s = "0"*(2*length - len(s)) + s
- return s.decode('hex')[::-1].encode('hex')
-
-
-# password encryption
-from Crypto.Cipher import AES
-BLOCK_SIZE = 32
-PADDING = '{'
-pad = lambda s: s + (BLOCK_SIZE - len(s) % BLOCK_SIZE) * PADDING
-EncodeAES = lambda c, s: base64.b64encode(c.encrypt(pad(s)))
-DecodeAES = lambda c, e: c.decrypt(base64.b64decode(e)).rstrip(PADDING)
-
-
-# secp256k1, http://www.oid-info.com/get/1.3.132.0.10
-_p = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2FL
-_r = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141L
-_b = 0x0000000000000000000000000000000000000000000000000000000000000007L
-_a = 0x0000000000000000000000000000000000000000000000000000000000000000L
-_Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798L
-_Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8L
-curve_secp256k1 = ecdsa.ellipticcurve.CurveFp( _p, _a, _b )
-generator_secp256k1 = ecdsa.ellipticcurve.Point( curve_secp256k1, _Gx, _Gy, _r )
-oid_secp256k1 = (1,3,132,0,10)
-SECP256k1 = ecdsa.curves.Curve("SECP256k1", curve_secp256k1, generator_secp256k1, oid_secp256k1 )
-
-
-no_wallet_message = "Wallet file not found.\nPlease provide a seed and a password. The seed will be to generate Bitcoin addresses. It should be long and random, and nobody should be able to guess it. Memorize it, or write it down and keep it in a vault. The password will be used to encrypt your local wallet file. You will need to enter your password everytime you use your wallet. If you lose your password, you can still recover your wallet with the seed."
-
-def filter(s):
- out = re.sub('( [^\n]*|)\n','',s)
- out = out.replace(' ','')
- out = out.replace('\n','')
- return out
-
-def raw_tx( inputs, outputs, for_sig = None ):
- s = int_to_hex(1,4) + ' version\n'
- s += int_to_hex( len(inputs) ) + ' number of inputs\n'
- for i in range(len(inputs)):
- _, _, p_hash, p_index, p_script, pubkey, sig = inputs[i]
- s += p_hash.decode('hex')[::-1].encode('hex') + ' prev hash\n'
- s += int_to_hex(p_index,4) + ' prev index\n'
- if for_sig is None:
- sig = sig + chr(1) # hashtype
- script = int_to_hex( len(sig)) + ' push %d bytes\n'%len(sig)
- script += sig.encode('hex') + ' sig\n'
- pubkey = chr(4) + pubkey
- script += int_to_hex( len(pubkey)) + ' push %d bytes\n'%len(pubkey)
- script += pubkey.encode('hex') + ' pubkey\n'
- elif for_sig==i:
- script = p_script + ' scriptsig \n'
- else:
- script=''
- s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
- s += script
- s += "ffffffff" + ' sequence\n'
- s += int_to_hex( len(outputs) ) + ' number of outputs\n'
- for output in outputs:
- addr, amount = output
- s += int_to_hex( amount, 8) + ' amount: %d\n'%amount
- script = '76a9' # op_dup, op_hash_160
- script += '14' # push 0x14 bytes
- script += bc_address_to_hash_160(addr).encode('hex')
- script += '88ac' # op_equalverify, op_checksig
- s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
- s += script + ' script \n'
- s += int_to_hex(0,4) # lock time
- if for_sig is not None: s += int_to_hex(1, 4) # hash type
- return s
-
-class InvalidPassword(Exception):
- pass
-
-wallet_path = os.environ["HOME"] + '/.bitcoin/electrum.dat'
-
-class Wallet:
- def __init__(self):
- self.gap_limit = 5 # configuration
- self.host = 'ecdsa.org'
- self.port = 50000
- self.fee = 0.005
-
- # saved fields
- self.use_encryption = False
- self.addresses = []
- self.seed = '' # encrypted
- self.private_keys = repr([]) # encrypted
- self.change_addresses = [] # index of addresses used as change
- self.status = {} # current status of addresses
- self.history = {}
- self.labels = {} # labels for addresses and transactions
- self.addressbook = [] # outgoing addresses, for payments
- self.blocks = 0
-
- # not saved
- self.message = ''
- self.tx_history = {}
-
- def is_mine(self, address):
- return address in self.addresses
-
- def is_change(self, address):
- if not self.is_mine(address):
- return False
- k = self.addresses.index(address)
- return k in self.change_addresses
-
- def is_valid(self,addr):
- ADDRESS_RE = re.compile('[1-9A-HJ-NP-Za-km-z]{26,}\\Z')
- return ADDRESS_RE.match(addr)
-
- def create_new_address(self, for_change, password):
- seed = self.pw_decode( self.seed, password)
- i = len( self.addresses ) - len(self.change_addresses) if not for_change else len(self.change_addresses)
- seed = Hash( "%d:%d:"%(i,for_change) + seed )
- order = generator_secp256k1.order()
- secexp = ecdsa.util.randrange_from_seed__trytryagain( seed, order )
- secret = SecretToASecret( ('%064x' % secexp).decode('hex') )
- private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
- public_key = private_key.get_verifying_key()
- address = public_key_to_bc_address( '04'.decode('hex') + public_key.to_string() )
- try:
- private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password) )
- private_keys.append(secret)
- except:
- raise InvalidPassword("")
- self.private_keys = self.pw_encode( repr(private_keys), password)
- self.addresses.append(address)
- if for_change: self.change_addresses.append( i )
- h = self.retrieve_history(address)
- self.history[address] = h
- self.status[address] = h[-1]['blk_hash'] if h else None
- return address
-
- def recover(self, password):
- seed = self.pw_decode( self.seed, password)
- # todo: recover receiving addresses from tx
- num_gap = 0
- while True:
- addr = self.create_new_address(True, password)
- print "recovering", addr
- if self.status[addr] is None: break
-
- num_gap = 0
- while True:
- addr = self.create_new_address(False, password)
- print "recovering", addr
- if self.status[addr] is None:
- num_gap += 1
- if num_gap == self.gap_limit: break
- else:
- num_gap = 0
-
- # remove limit-1 addresses. [ this is ok, because change addresses are at the beginning of the list]
- n = self.gap_limit
- self.addresses = self.addresses[:-n]
- private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password))
- private_keys = private_keys[:-n]
- self.private_keys = self.pw_encode( repr(private_keys), password)
-
- # history and addressbook
- self.update_tx_history()
- for tx in self.tx_history.values():
- if tx['value']<0:
- for i in tx['outputs']:
- if not self.is_mine(i) and i not in self.addressbook:
- self.addressbook.append(i)
- # redo labels
- self.update_tx_labels()
-
- def save(self):
- s = repr( (self.use_encryption, self.fee, self.host, self.blocks,
- self.seed, self.addresses, self.private_keys,
- self.change_addresses, self.status, self.history,
- self.labels, self.addressbook) )
- f = open(wallet_path,"w")
- f.write(s)
- f.close()
-
- def read(self):
- try:
- f = open(wallet_path,"r")
- data = f.read()
- f.close()
- except:
- return False
- try:
- (self.use_encryption, self.fee, self.host, self.blocks,
- self.seed, self.addresses, self.private_keys,
- self.change_addresses, self.status, self.history,
- self.labels, self.addressbook) = ast.literal_eval( data )
- except:
- return False
- self.update_tx_history()
- return True
-
- def get_new_address(self, password):
- n = 0
- for addr in self.addresses[-self.gap_limit:]:
- if self.history[addr] == []:
- n = n + 1
- if n < self.gap_limit:
- try:
- new_address = self.create_new_address(False, password)
- except InvalidPassword:
- return False, "wrong password"
- self.save()
- return True, new_address
- else:
- return False, "The last %d addresses in your list have never been used. You should use them first, or increase the allowed gap size in your preferences. "%self.gap_limit
-
- def get_addr_balance(self, addr):
- h = self.history.get(addr)
- c = u = 0
- for item in h:
- v = item['value']
- if item['height']:
- c += v
- else:
- u += v
- return c, u
-
- def get_balance(self):
- conf = unconf = 0
- for addr in self.addresses:
- c, u = self.get_addr_balance(addr)
- conf += c
- unconf += u
- return conf, unconf
-
- def request(self, request ):
-
- if self.port == 80:
- try:
- out = urllib2.urlopen('http://'+self.host+'/q/tw', request, timeout=5).read()
- except:
- out = ''
- else:
- s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
- s.connect(( self.host, self.port))
- s.send(request)
- out = ''
- while 1:
- msg = s.recv(1024)
- if msg: out += msg
- else: break
- s.close()
-
- if re.match('[^:]\s*\(', out): out = ''
- return out
-
- def retrieve_message(self):
- if not self.message:
- self.message = self.request( repr ( ('msg', '')))
-
- def send_tx(self, data):
- return self.request( repr ( ('tx', data )))
-
- def retrieve_history(self, address):
- return ast.literal_eval( self.request( repr ( ('h', address ))) )
-
- def poll(self):
- return ast.literal_eval( self.request( repr ( ('poll', '' ))))
-
- def new_session(self):
- self.message = self.request( repr ( ('watch', repr(self.addresses) )))
-
- def update(self):
- blocks, changed_addresses = self.poll()
- self.blocks = blocks
- for addr, blk_hash in changed_addresses.items():
- if self.status[addr] != blk_hash:
- print "updating history for", addr
- self.history[addr] = self.retrieve_history(addr)
- self.status[addr] = blk_hash
- self.update_tx_history()
- if changed_addresses:
- return True
- else:
- return False
-
- def choose_inputs_outputs( self, to_addr, amount, fee, password):
- """ todo: minimize tx size """
-
- amount = int( 1e8*amount )
- fee = int( 1e8*fee )
- total = 0
- inputs = []
- for addr in self.addresses:
- h = self.history.get(addr)
- for item in h:
- if item.get('raw_scriptPubKey'):
- v = item.get('value')
- total += v
- inputs.append((addr, v, item['tx_hash'], item['pos'], item['raw_scriptPubKey'], None, None) )
- if total >= amount + fee: break
- if total >= amount + fee: break
- else:
- print "not enough funds: %d %d"%(total, fee)
- return False, "not enough funds: %d %d"%(total, fee)
- outputs = [ (to_addr, amount) ]
- change_amount = total - ( amount + fee )
- if change_amount != 0:
- # first look for unused change addresses
- for addr in self.addresses:
- i = self.addresses.index(addr)
- if i not in self.change_addresses: continue
- if self.history.get(addr): continue
- change_address = addr
- break
- else:
- change_address = self.create_new_address(True, password)
- print "new change address", change_address
- outputs.append( (change_address, change_amount) )
- return inputs, outputs
-
- def sign_inputs( self, inputs, outputs, password ):
- s_inputs = []
- for i in range(len(inputs)):
- addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
- private_key = self.get_private_key(addr, password)
- public_key = private_key.get_verifying_key()
- pubkey = public_key.to_string()
- tx = filter( raw_tx( inputs, outputs, for_sig = i ) )
- sig = private_key.sign_digest( Hash( tx.decode('hex') ), sigencode = ecdsa.util.sigencode_der )
- assert public_key.verify_digest( sig, Hash( tx.decode('hex') ), sigdecode = ecdsa.util.sigdecode_der)
- s_inputs.append( (addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig) )
- return s_inputs
-
- def pw_encode(self, s, password):
- if password:
- secret = Hash(password)
- cipher = AES.new(secret)
- return EncodeAES(cipher, s)
- else:
- return s
-
- def pw_decode(self, s, password):
- if password:
- secret = Hash(password)
- cipher = AES.new(secret)
- return DecodeAES(cipher, s)
- else:
- return s
-
- def get_private_key( self, addr, password ):
- try:
- private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password ) )
- except:
- raise InvalidPassword("")
- k = self.addresses.index(addr)
- secret = private_keys[k]
- b = ASecretToSecret(secret)
- secexp = int( b.encode('hex'), 16)
- private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve=SECP256k1 )
- public_key = private_key.get_verifying_key()
- assert addr == public_key_to_bc_address( chr(4) + public_key.to_string() )
- return private_key
-
- def get_tx_history(self):
- lines = self.tx_history.values()
- lines = sorted(lines, key=operator.itemgetter("nTime"))
- return lines
-
- def update_tx_history(self):
- self.tx_history= {}
- for addr in self.addresses:
- for tx in self.history[addr]:
- tx_hash = tx['tx_hash']
- line = self.tx_history.get(tx_hash)
- if not line:
- self.tx_history[tx_hash] = copy.copy(tx)
- line = self.tx_history.get(tx_hash)
- else:
- line['value'] += tx['value']
- if line['blk_hash'] == 'mempool':
- line['nTime'] = 1e12
- self.update_tx_labels()
-
- def update_tx_labels(self):
- for tx in self.tx_history.values():
- default_label = ''
- if tx['value']<0:
- for o_addr in tx['outputs']:
- if not self.is_change(o_addr):
- dest_label = self.labels.get(o_addr)
- if dest_label:
- default_label = 'to: ' + dest_label
- else:
- default_label = 'to: ' + o_addr
- else:
- for o_addr in tx['outputs']:
- if self.is_mine(o_addr) and not self.is_change(o_addr):
- dest_label = self.labels.get(o_addr)
- if dest_label:
- default_label = 'at: ' + dest_label
- else:
- default_label = 'at: ' + o_addr
- tx['default_label'] = default_label
-
-
-
- def send(self, to_address, amount, label, password):
- try:
- inputs, outputs = wallet.choose_inputs_outputs( to_address, amount, self.fee, password )
- except InvalidPassword: return False, "Wrong password"
- if not inputs: return False, "Not enough funds"
- try:
- s_inputs = wallet.sign_inputs( inputs, outputs, password )
- except InvalidPassword:
- return False, "Wrong password"
- tx = raw_tx( s_inputs, outputs )
- tx = filter( tx )
- tx_hash = Hash(tx.decode('hex') )[::-1].encode('hex')
- out = self.send_tx(tx)
- if out != tx_hash:
- return False, "error: hash mismatch"
- if to_address not in self.addressbook:
- self.addressbook.append(to_address)
- if label:
- wallet.labels[tx_hash] = label
- wallet.save()
- return True, tx_hash
-
-
-if __name__ == '__main__':
- try:
- cmd = sys.argv[1]
- except:
- cmd = "gui"
-
- known_commands = ['balance', 'sendtoaddress', 'password', 'getnewaddress', 'addresses', 'history', 'label', 'gui', 'all_addresses']
- if cmd not in known_commands:
- print "Known commands:", ', '.join(known_commands)
- exit(0)
-
- wallet = Wallet()
- if cmd=='gui':
- import gui
- gui.init_wallet(wallet)
- gui = gui.BitcoinGUI(wallet)
- gui.main()
- exit(0)
-
- if not wallet.read():
- print no_wallet_message
- seed = raw_input("Enter seed: ")
- if len(seed)<20:
- print "Seed too short. Please at least 20 characters"
- exit(1)
- if has_encryption:
- password = getpass.getpass("Password (hit return if you do not wish to encrypt your wallet):")
- if password:
- password2 = getpass.getpass("Confirm password:")
- if password != password2:
- print "error"
- exit(1)
- else:
- password = None
- print "in order to use wallet encryption, please install pycrypto (sudo easy_install pycrypto)"
-
- wallet.seed = wallet.pw_encode( seed, password)
-
- print "server name and port number (default: ecdsa.org:50000)"
- host = raw_input("server:")
- if not host: host = 'ecdsa.org'
-
- port = raw_input("port:")
- if not port: port = 50000
- else: port = int(port)
-
- print "default fee for transactions (default 0.005)"
- fee = raw_input("default fee:")
- if not fee: fee = 0.005
-
- wallet.fee = fee
- wallet.gap_limit = 5
- wallet.host = host
- wallet.port = port
- wallet.recover(password)
- wallet.save()
-
- wallet.new_session()
- wallet.update()
- wallet.save()
-
- if cmd in ['sendtoaddress', 'password', 'getnewaddress']:
- password = getpass.getpass('Password:') if wallet.use_encryption else None
-
- if cmd == 'balance':
- c, u = wallet.get_balance()
- if u:
- print c*1e-8, u*1e-8
- else:
- print c*1e-8
-
- elif cmd in [ 'addresses', 'all_addresses']:
- for addr in wallet.addresses:
- if cmd == 'all_addresses' or not wallet.is_change(addr):
- label = wallet.labels.get(addr) if not wallet.is_change(addr) else "[change]"
- if label is None: label = ''
- h = wallet.history.get(addr)
- ni = no = 0
- for item in h:
- if item['is_in']: ni += 1
- else: no += 1
- print addr, no, ni, wallet.get_addr_balance(addr)[0]*1e-8, label
-
- if cmd == 'history':
- lines = wallet.get_tx_history()
- b = 0
- for line in lines:
- import datetime
- v = 1.*line['value']/1e8
- b += v
- v_str = "%f"%v if v<0 else "+%f"%v
- try:
- time_str = datetime.datetime.fromtimestamp( line['nTime'])
- except:
- print line['nTime']
- time_str = 'pending'
- label = line.get('label')
- if not label: label = line['tx_hash']
- else: label = label + ' '*(64 - len(label) )
-
- print time_str, " ", label, " ", v_str, " ", "%f"%b
- print "# balance: ", b
-
- elif cmd == 'label':
- try:
- tx = sys.argv[2]
- label = ' '.join(sys.argv[3:])
- except:
- print "syntax: label <tx_hash> <text>"
- exit(1)
- wallet.labels[tx] = label
- wallet.save()
-
- elif cmd == 'sendtoaddress':
- try:
- to_address = sys.argv[2]
- amount = float(sys.argv[3])
- label = ' '.join(sys.argv[4:])
- except:
- print "syntax: send <recipient> <amount> [label]"
- exit(1)
- r, h = wallet.send( to_address, amount, label, password )
- print h
-
- elif cmd == 'getnewaddress':
- a = wallet.get_new_address()
- if a:
- print a
- else:
- print "Maximum gap reached. Increase gap in order to create more addresses."
-
- elif cmd == 'password':
- try:
- seed = wallet.pw_decode( wallet.seed, password)
- private_keys = ast.literal_eval( wallet.pw_decode( wallet.private_keys, password) )
- except:
- print "sorry"
- exit(1)
- new_password = getpass.getpass('New password:')
- if new_password == getpass.getpass('Confirm new password:'):
- wallet.use_encryption = (new_password != '')
- wallet.seed = wallet.pw_encode( seed, new_password)
- wallet.private_keys = wallet.pw_encode( repr( private_keys ), new_password)
- wallet.save()
- else:
- print "error: mismatch"
-
diff --git a/client/electrum.py b/client/electrum.py
@@ -0,0 +1,717 @@
+#!/usr/bin/env python
+#
+# Electrum - lightweight Bitcoin client
+# Copyright (C) 2011 thomasv@gitorious
+#
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+
+import sys, base64, os, re, hashlib, socket, getpass, copy, operator, urllib2, ast
+
+try:
+ import ecdsa
+except:
+ print "python-ecdsa does not seem to be installed. Try 'sudo easy_install ecdsa'"
+ exit(1)
+
+try:
+ import Crypto
+ has_encryption = True
+except:
+ has_encryption = False
+
+
+############ functions from pywallet #####################
+
+addrtype = 0
+
+def hash_160(public_key):
+ md = hashlib.new('ripemd160')
+ md.update(hashlib.sha256(public_key).digest())
+ return md.digest()
+
+def public_key_to_bc_address(public_key):
+ h160 = hash_160(public_key)
+ return hash_160_to_bc_address(h160)
+
+def hash_160_to_bc_address(h160):
+ vh160 = chr(addrtype) + h160
+ h = Hash(vh160)
+ addr = vh160 + h[0:4]
+ return b58encode(addr)
+
+def bc_address_to_hash_160(addr):
+ bytes = b58decode(addr, 25)
+ return bytes[1:21]
+
+__b58chars = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
+__b58base = len(__b58chars)
+
+def b58encode(v):
+ """ encode v, which is a string of bytes, to base58.
+ """
+
+ long_value = 0L
+ for (i, c) in enumerate(v[::-1]):
+ long_value += (256**i) * ord(c)
+
+ result = ''
+ while long_value >= __b58base:
+ div, mod = divmod(long_value, __b58base)
+ result = __b58chars[mod] + result
+ long_value = div
+ result = __b58chars[long_value] + result
+
+ # Bitcoin does a little leading-zero-compression:
+ # leading 0-bytes in the input become leading-1s
+ nPad = 0
+ for c in v:
+ if c == '\0': nPad += 1
+ else: break
+
+ return (__b58chars[0]*nPad) + result
+
+def b58decode(v, length):
+ """ decode v into a string of len bytes
+ """
+ long_value = 0L
+ for (i, c) in enumerate(v[::-1]):
+ long_value += __b58chars.find(c) * (__b58base**i)
+
+ result = ''
+ while long_value >= 256:
+ div, mod = divmod(long_value, 256)
+ result = chr(mod) + result
+ long_value = div
+ result = chr(long_value) + result
+
+ nPad = 0
+ for c in v:
+ if c == __b58chars[0]: nPad += 1
+ else: break
+
+ result = chr(0)*nPad + result
+ if length is not None and len(result) != length:
+ return None
+
+ return result
+
+
+def Hash(data):
+ return hashlib.sha256(hashlib.sha256(data).digest()).digest()
+
+def EncodeBase58Check(vchIn):
+ hash = Hash(vchIn)
+ return b58encode(vchIn + hash[0:4])
+
+def DecodeBase58Check(psz):
+ vchRet = b58decode(psz, None)
+ key = vchRet[0:-4]
+ csum = vchRet[-4:]
+ hash = Hash(key)
+ cs32 = hash[0:4]
+ if cs32 != csum:
+ return None
+ else:
+ return key
+
+def PrivKeyToSecret(privkey):
+ return privkey[9:9+32]
+
+def SecretToASecret(secret):
+ vchIn = chr(addrtype+128) + secret
+ return EncodeBase58Check(vchIn)
+
+def ASecretToSecret(key):
+ vch = DecodeBase58Check(key)
+ if vch and vch[0] == chr(addrtype+128):
+ return vch[1:]
+ else:
+ return False
+
+########### end pywallet functions #######################
+
+
+def int_to_hex(i, length=1):
+ s = hex(i)[2:]
+ s = "0"*(2*length - len(s)) + s
+ return s.decode('hex')[::-1].encode('hex')
+
+
+# password encryption
+from Crypto.Cipher import AES
+BLOCK_SIZE = 32
+PADDING = '{'
+pad = lambda s: s + (BLOCK_SIZE - len(s) % BLOCK_SIZE) * PADDING
+EncodeAES = lambda c, s: base64.b64encode(c.encrypt(pad(s)))
+DecodeAES = lambda c, e: c.decrypt(base64.b64decode(e)).rstrip(PADDING)
+
+
+# secp256k1, http://www.oid-info.com/get/1.3.132.0.10
+_p = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2FL
+_r = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141L
+_b = 0x0000000000000000000000000000000000000000000000000000000000000007L
+_a = 0x0000000000000000000000000000000000000000000000000000000000000000L
+_Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798L
+_Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8L
+curve_secp256k1 = ecdsa.ellipticcurve.CurveFp( _p, _a, _b )
+generator_secp256k1 = ecdsa.ellipticcurve.Point( curve_secp256k1, _Gx, _Gy, _r )
+oid_secp256k1 = (1,3,132,0,10)
+SECP256k1 = ecdsa.curves.Curve("SECP256k1", curve_secp256k1, generator_secp256k1, oid_secp256k1 )
+
+
+no_wallet_message = "Wallet file not found.\nPlease provide a seed and a password. The seed will be to generate Bitcoin addresses. It should be long and random, and nobody should be able to guess it. Memorize it, or write it down and keep it in a vault. The password will be used to encrypt your local wallet file. You will need to enter your password everytime you use your wallet. If you lose your password, you can still recover your wallet with the seed."
+
+def filter(s):
+ out = re.sub('( [^\n]*|)\n','',s)
+ out = out.replace(' ','')
+ out = out.replace('\n','')
+ return out
+
+def raw_tx( inputs, outputs, for_sig = None ):
+ s = int_to_hex(1,4) + ' version\n'
+ s += int_to_hex( len(inputs) ) + ' number of inputs\n'
+ for i in range(len(inputs)):
+ _, _, p_hash, p_index, p_script, pubkey, sig = inputs[i]
+ s += p_hash.decode('hex')[::-1].encode('hex') + ' prev hash\n'
+ s += int_to_hex(p_index,4) + ' prev index\n'
+ if for_sig is None:
+ sig = sig + chr(1) # hashtype
+ script = int_to_hex( len(sig)) + ' push %d bytes\n'%len(sig)
+ script += sig.encode('hex') + ' sig\n'
+ pubkey = chr(4) + pubkey
+ script += int_to_hex( len(pubkey)) + ' push %d bytes\n'%len(pubkey)
+ script += pubkey.encode('hex') + ' pubkey\n'
+ elif for_sig==i:
+ script = p_script + ' scriptsig \n'
+ else:
+ script=''
+ s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
+ s += script
+ s += "ffffffff" + ' sequence\n'
+ s += int_to_hex( len(outputs) ) + ' number of outputs\n'
+ for output in outputs:
+ addr, amount = output
+ s += int_to_hex( amount, 8) + ' amount: %d\n'%amount
+ script = '76a9' # op_dup, op_hash_160
+ script += '14' # push 0x14 bytes
+ script += bc_address_to_hash_160(addr).encode('hex')
+ script += '88ac' # op_equalverify, op_checksig
+ s += int_to_hex( len(filter(script))/2 ) + ' script length \n'
+ s += script + ' script \n'
+ s += int_to_hex(0,4) # lock time
+ if for_sig is not None: s += int_to_hex(1, 4) # hash type
+ return s
+
+class InvalidPassword(Exception):
+ pass
+
+wallet_path = os.environ["HOME"] + '/.bitcoin/electrum.dat'
+
+class Wallet:
+ def __init__(self):
+ self.gap_limit = 5 # configuration
+ self.host = 'ecdsa.org'
+ self.port = 50000
+ self.fee = 0.005
+
+ # saved fields
+ self.use_encryption = False
+ self.addresses = []
+ self.seed = '' # encrypted
+ self.private_keys = repr([]) # encrypted
+ self.change_addresses = [] # index of addresses used as change
+ self.status = {} # current status of addresses
+ self.history = {}
+ self.labels = {} # labels for addresses and transactions
+ self.addressbook = [] # outgoing addresses, for payments
+ self.blocks = 0
+
+ # not saved
+ self.message = ''
+ self.tx_history = {}
+
+ def is_mine(self, address):
+ return address in self.addresses
+
+ def is_change(self, address):
+ if not self.is_mine(address):
+ return False
+ k = self.addresses.index(address)
+ return k in self.change_addresses
+
+ def is_valid(self,addr):
+ ADDRESS_RE = re.compile('[1-9A-HJ-NP-Za-km-z]{26,}\\Z')
+ return ADDRESS_RE.match(addr)
+
+ def create_new_address(self, for_change, password):
+ seed = self.pw_decode( self.seed, password)
+ i = len( self.addresses ) - len(self.change_addresses) if not for_change else len(self.change_addresses)
+ seed = Hash( "%d:%d:"%(i,for_change) + seed )
+ order = generator_secp256k1.order()
+ secexp = ecdsa.util.randrange_from_seed__trytryagain( seed, order )
+ secret = SecretToASecret( ('%064x' % secexp).decode('hex') )
+ private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve = SECP256k1 )
+ public_key = private_key.get_verifying_key()
+ address = public_key_to_bc_address( '04'.decode('hex') + public_key.to_string() )
+ try:
+ private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password) )
+ private_keys.append(secret)
+ except:
+ raise InvalidPassword("")
+ self.private_keys = self.pw_encode( repr(private_keys), password)
+ self.addresses.append(address)
+ if for_change: self.change_addresses.append( i )
+ h = self.retrieve_history(address)
+ self.history[address] = h
+ self.status[address] = h[-1]['blk_hash'] if h else None
+ return address
+
+ def recover(self, password):
+ seed = self.pw_decode( self.seed, password)
+ # todo: recover receiving addresses from tx
+ num_gap = 0
+ while True:
+ addr = self.create_new_address(True, password)
+ print "recovering", addr
+ if self.status[addr] is None: break
+
+ num_gap = 0
+ while True:
+ addr = self.create_new_address(False, password)
+ print "recovering", addr
+ if self.status[addr] is None:
+ num_gap += 1
+ if num_gap == self.gap_limit: break
+ else:
+ num_gap = 0
+
+ # remove limit-1 addresses. [ this is ok, because change addresses are at the beginning of the list]
+ n = self.gap_limit
+ self.addresses = self.addresses[:-n]
+ private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password))
+ private_keys = private_keys[:-n]
+ self.private_keys = self.pw_encode( repr(private_keys), password)
+
+ # history and addressbook
+ self.update_tx_history()
+ for tx in self.tx_history.values():
+ if tx['value']<0:
+ for i in tx['outputs']:
+ if not self.is_mine(i) and i not in self.addressbook:
+ self.addressbook.append(i)
+ # redo labels
+ self.update_tx_labels()
+
+ def save(self):
+ s = repr( (self.use_encryption, self.fee, self.host, self.blocks,
+ self.seed, self.addresses, self.private_keys,
+ self.change_addresses, self.status, self.history,
+ self.labels, self.addressbook) )
+ f = open(wallet_path,"w")
+ f.write(s)
+ f.close()
+
+ def read(self):
+ try:
+ f = open(wallet_path,"r")
+ data = f.read()
+ f.close()
+ except:
+ return False
+ try:
+ (self.use_encryption, self.fee, self.host, self.blocks,
+ self.seed, self.addresses, self.private_keys,
+ self.change_addresses, self.status, self.history,
+ self.labels, self.addressbook) = ast.literal_eval( data )
+ except:
+ return False
+ self.update_tx_history()
+ return True
+
+ def get_new_address(self, password):
+ n = 0
+ for addr in self.addresses[-self.gap_limit:]:
+ if self.history[addr] == []:
+ n = n + 1
+ if n < self.gap_limit:
+ try:
+ new_address = self.create_new_address(False, password)
+ except InvalidPassword:
+ return False, "wrong password"
+ self.save()
+ return True, new_address
+ else:
+ return False, "The last %d addresses in your list have never been used. You should use them first, or increase the allowed gap size in your preferences. "%self.gap_limit
+
+ def get_addr_balance(self, addr):
+ h = self.history.get(addr)
+ c = u = 0
+ for item in h:
+ v = item['value']
+ if item['height']:
+ c += v
+ else:
+ u += v
+ return c, u
+
+ def get_balance(self):
+ conf = unconf = 0
+ for addr in self.addresses:
+ c, u = self.get_addr_balance(addr)
+ conf += c
+ unconf += u
+ return conf, unconf
+
+ def request(self, request ):
+
+ if self.port == 80:
+ try:
+ out = urllib2.urlopen('http://'+self.host+'/q/tw', request, timeout=5).read()
+ except:
+ out = ''
+ else:
+ s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
+ s.connect(( self.host, self.port))
+ s.send(request)
+ out = ''
+ while 1:
+ msg = s.recv(1024)
+ if msg: out += msg
+ else: break
+ s.close()
+
+ if re.match('[^:]\s*\(', out): out = ''
+ return out
+
+ def retrieve_message(self):
+ if not self.message:
+ self.message = self.request( repr ( ('msg', '')))
+
+ def send_tx(self, data):
+ return self.request( repr ( ('tx', data )))
+
+ def retrieve_history(self, address):
+ return ast.literal_eval( self.request( repr ( ('h', address ))) )
+
+ def poll(self):
+ return ast.literal_eval( self.request( repr ( ('poll', '' ))))
+
+ def new_session(self):
+ self.message = self.request( repr ( ('watch', repr(self.addresses) )))
+
+ def update(self):
+ blocks, changed_addresses = self.poll()
+ self.blocks = blocks
+ for addr, blk_hash in changed_addresses.items():
+ if self.status[addr] != blk_hash:
+ print "updating history for", addr
+ self.history[addr] = self.retrieve_history(addr)
+ self.status[addr] = blk_hash
+ self.update_tx_history()
+ if changed_addresses:
+ return True
+ else:
+ return False
+
+ def choose_inputs_outputs( self, to_addr, amount, fee, password):
+ """ todo: minimize tx size """
+
+ amount = int( 1e8*amount )
+ fee = int( 1e8*fee )
+ total = 0
+ inputs = []
+ for addr in self.addresses:
+ h = self.history.get(addr)
+ for item in h:
+ if item.get('raw_scriptPubKey'):
+ v = item.get('value')
+ total += v
+ inputs.append((addr, v, item['tx_hash'], item['pos'], item['raw_scriptPubKey'], None, None) )
+ if total >= amount + fee: break
+ if total >= amount + fee: break
+ else:
+ print "not enough funds: %d %d"%(total, fee)
+ return False, "not enough funds: %d %d"%(total, fee)
+ outputs = [ (to_addr, amount) ]
+ change_amount = total - ( amount + fee )
+ if change_amount != 0:
+ # first look for unused change addresses
+ for addr in self.addresses:
+ i = self.addresses.index(addr)
+ if i not in self.change_addresses: continue
+ if self.history.get(addr): continue
+ change_address = addr
+ break
+ else:
+ change_address = self.create_new_address(True, password)
+ print "new change address", change_address
+ outputs.append( (change_address, change_amount) )
+ return inputs, outputs
+
+ def sign_inputs( self, inputs, outputs, password ):
+ s_inputs = []
+ for i in range(len(inputs)):
+ addr, v, p_hash, p_pos, p_scriptPubKey, _, _ = inputs[i]
+ private_key = self.get_private_key(addr, password)
+ public_key = private_key.get_verifying_key()
+ pubkey = public_key.to_string()
+ tx = filter( raw_tx( inputs, outputs, for_sig = i ) )
+ sig = private_key.sign_digest( Hash( tx.decode('hex') ), sigencode = ecdsa.util.sigencode_der )
+ assert public_key.verify_digest( sig, Hash( tx.decode('hex') ), sigdecode = ecdsa.util.sigdecode_der)
+ s_inputs.append( (addr, v, p_hash, p_pos, p_scriptPubKey, pubkey, sig) )
+ return s_inputs
+
+ def pw_encode(self, s, password):
+ if password:
+ secret = Hash(password)
+ cipher = AES.new(secret)
+ return EncodeAES(cipher, s)
+ else:
+ return s
+
+ def pw_decode(self, s, password):
+ if password:
+ secret = Hash(password)
+ cipher = AES.new(secret)
+ return DecodeAES(cipher, s)
+ else:
+ return s
+
+ def get_private_key( self, addr, password ):
+ try:
+ private_keys = ast.literal_eval( self.pw_decode( self.private_keys, password ) )
+ except:
+ raise InvalidPassword("")
+ k = self.addresses.index(addr)
+ secret = private_keys[k]
+ b = ASecretToSecret(secret)
+ secexp = int( b.encode('hex'), 16)
+ private_key = ecdsa.SigningKey.from_secret_exponent( secexp, curve=SECP256k1 )
+ public_key = private_key.get_verifying_key()
+ assert addr == public_key_to_bc_address( chr(4) + public_key.to_string() )
+ return private_key
+
+ def get_tx_history(self):
+ lines = self.tx_history.values()
+ lines = sorted(lines, key=operator.itemgetter("nTime"))
+ return lines
+
+ def update_tx_history(self):
+ self.tx_history= {}
+ for addr in self.addresses:
+ for tx in self.history[addr]:
+ tx_hash = tx['tx_hash']
+ line = self.tx_history.get(tx_hash)
+ if not line:
+ self.tx_history[tx_hash] = copy.copy(tx)
+ line = self.tx_history.get(tx_hash)
+ else:
+ line['value'] += tx['value']
+ if line['blk_hash'] == 'mempool':
+ line['nTime'] = 1e12
+ self.update_tx_labels()
+
+ def update_tx_labels(self):
+ for tx in self.tx_history.values():
+ default_label = ''
+ if tx['value']<0:
+ for o_addr in tx['outputs']:
+ if not self.is_change(o_addr):
+ dest_label = self.labels.get(o_addr)
+ if dest_label:
+ default_label = 'to: ' + dest_label
+ else:
+ default_label = 'to: ' + o_addr
+ else:
+ for o_addr in tx['outputs']:
+ if self.is_mine(o_addr) and not self.is_change(o_addr):
+ dest_label = self.labels.get(o_addr)
+ if dest_label:
+ default_label = 'at: ' + dest_label
+ else:
+ default_label = 'at: ' + o_addr
+ tx['default_label'] = default_label
+
+
+
+ def send(self, to_address, amount, label, password):
+ try:
+ inputs, outputs = wallet.choose_inputs_outputs( to_address, amount, self.fee, password )
+ except InvalidPassword: return False, "Wrong password"
+ if not inputs: return False, "Not enough funds"
+ try:
+ s_inputs = wallet.sign_inputs( inputs, outputs, password )
+ except InvalidPassword:
+ return False, "Wrong password"
+ tx = raw_tx( s_inputs, outputs )
+ tx = filter( tx )
+ tx_hash = Hash(tx.decode('hex') )[::-1].encode('hex')
+ out = self.send_tx(tx)
+ if out != tx_hash:
+ return False, "error: hash mismatch"
+ if to_address not in self.addressbook:
+ self.addressbook.append(to_address)
+ if label:
+ wallet.labels[tx_hash] = label
+ wallet.save()
+ return True, tx_hash
+
+
+if __name__ == '__main__':
+ try:
+ cmd = sys.argv[1]
+ except:
+ cmd = "gui"
+
+ known_commands = ['balance', 'sendtoaddress', 'password', 'getnewaddress', 'addresses', 'history', 'label', 'gui', 'all_addresses']
+ if cmd not in known_commands:
+ print "Known commands:", ', '.join(known_commands)
+ exit(0)
+
+ wallet = Wallet()
+ if cmd=='gui':
+ import gui
+ gui.init_wallet(wallet)
+ gui = gui.BitcoinGUI(wallet)
+ gui.main()
+
+ if not wallet.read():
+ print no_wallet_message
+ seed = raw_input("Enter seed: ")
+ if len(seed)<20:
+ print "Seed too short. Please at least 20 characters"
+ exit(1)
+ if has_encryption:
+ password = getpass.getpass("Password (hit return if you do not wish to encrypt your wallet):")
+ if password:
+ password2 = getpass.getpass("Confirm password:")
+ if password != password2:
+ print "error"
+ exit(1)
+ else:
+ password = None
+ print "in order to use wallet encryption, please install pycrypto (sudo easy_install pycrypto)"
+
+ wallet.seed = wallet.pw_encode( seed, password)
+
+ print "server name and port number (default: ecdsa.org:50000)"
+ host = raw_input("server:")
+ if not host: host = 'ecdsa.org'
+
+ port = raw_input("port:")
+ if not port: port = 50000
+ else: port = int(port)
+
+ print "default fee for transactions (default 0.005)"
+ fee = raw_input("default fee:")
+ if not fee: fee = 0.005
+
+ wallet.fee = fee
+ wallet.gap_limit = 5
+ wallet.host = host
+ wallet.port = port
+ wallet.recover(password)
+ wallet.save()
+
+ wallet.new_session()
+ wallet.update()
+ wallet.save()
+
+ if cmd in ['sendtoaddress', 'password', 'getnewaddress']:
+ password = getpass.getpass('Password:') if wallet.use_encryption else None
+
+ if cmd == 'balance':
+ c, u = wallet.get_balance()
+ if u:
+ print c*1e-8, u*1e-8
+ else:
+ print c*1e-8
+
+ elif cmd in [ 'addresses', 'all_addresses']:
+ for addr in wallet.addresses:
+ if cmd == 'all_addresses' or not wallet.is_change(addr):
+ label = wallet.labels.get(addr) if not wallet.is_change(addr) else "[change]"
+ if label is None: label = ''
+ h = wallet.history.get(addr)
+ ni = no = 0
+ for item in h:
+ if item['is_in']: ni += 1
+ else: no += 1
+ print addr, no, ni, wallet.get_addr_balance(addr)[0]*1e-8, label
+
+ if cmd == 'history':
+ lines = wallet.get_tx_history()
+ b = 0
+ for line in lines:
+ import datetime
+ v = 1.*line['value']/1e8
+ b += v
+ v_str = "%f"%v if v<0 else "+%f"%v
+ try:
+ time_str = datetime.datetime.fromtimestamp( line['nTime'])
+ except:
+ print line['nTime']
+ time_str = 'pending'
+ label = line.get('label')
+ if not label: label = line['tx_hash']
+ else: label = label + ' '*(64 - len(label) )
+
+ print time_str, " ", label, " ", v_str, " ", "%f"%b
+ print "# balance: ", b
+
+ elif cmd == 'label':
+ try:
+ tx = sys.argv[2]
+ label = ' '.join(sys.argv[3:])
+ except:
+ print "syntax: label <tx_hash> <text>"
+ exit(1)
+ wallet.labels[tx] = label
+ wallet.save()
+
+ elif cmd == 'sendtoaddress':
+ try:
+ to_address = sys.argv[2]
+ amount = float(sys.argv[3])
+ label = ' '.join(sys.argv[4:])
+ except:
+ print "syntax: send <recipient> <amount> [label]"
+ exit(1)
+ r, h = wallet.send( to_address, amount, label, password )
+ print h
+
+ elif cmd == 'getnewaddress':
+ a = wallet.get_new_address()
+ if a:
+ print a
+ else:
+ print "Maximum gap reached. Increase gap in order to create more addresses."
+
+ elif cmd == 'password':
+ try:
+ seed = wallet.pw_decode( wallet.seed, password)
+ private_keys = ast.literal_eval( wallet.pw_decode( wallet.private_keys, password) )
+ except:
+ print "sorry"
+ exit(1)
+ new_password = getpass.getpass('New password:')
+ if new_password == getpass.getpass('Confirm new password:'):
+ wallet.use_encryption = (new_password != '')
+ wallet.seed = wallet.pw_encode( seed, new_password)
+ wallet.private_keys = wallet.pw_encode( repr( private_keys ), new_password)
+ wallet.save()
+ else:
+ print "error: mismatch"
+