Last active
January 21, 2018 14:49
-
-
Save ymgve/efc307e173ed9ea8cb2cac3c7462ed7b to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import hashlib, os, struct, sys, socket, time | |
N = 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2fL | |
R = 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141L | |
A = 0L | |
B = 7L | |
gx = 0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798L | |
gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8L | |
b58ab = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz" | |
def b58csum(s): | |
return hashlib.sha256(hashlib.sha256(s).digest()).digest()[0:4] | |
def b58decode(s, checksum=True): | |
idx = 0 | |
while s[idx] == "1": | |
idx += 1 | |
n = 0 | |
for c in s[idx:]: | |
n = n * 58 + b58ab.index(c) | |
res = long2byte(n) | |
res = idx * "\x00" + res | |
if checksum: | |
res, cs = res[:-4], res[-4:] | |
assert cs == b58csum(res), "base58 checksum failed" | |
return res | |
def b58encode(s, checksum=True): | |
if checksum: | |
s += b58csum(s) | |
idx = 0 | |
while s[idx] == "\x00": | |
idx += 1 | |
n = byte2long(s) | |
res = "" | |
while n > 0: | |
res = b58ab[n % 58] + res | |
n /= 58 | |
return "1" * idx + res | |
def byte2long(s): | |
res = 0 | |
for c in s: | |
res = (res << 8) | ord(c) | |
return res | |
def long2byte(n, sz=None): | |
res = "" | |
while n > 0: | |
res = chr(n & 0xff) + res | |
n >>= 8 | |
if sz is not None: | |
res = res.rjust(sz, "\x00") | |
return res | |
def modinv(x, n): | |
return pow(x, n-2, n) | |
class Point(object): | |
def __init__(self, x, y, inf=False): | |
self.x = x | |
self.y = y | |
self.inf = inf | |
def curve_add(p, q, N): | |
if p.inf: | |
return q | |
if q.inf: | |
return p | |
if p.x == q.x: | |
if p.y == q.y: | |
d1 = (3 * p.x * p.x) % N | |
d2 = (2 * p.y) % N | |
else: | |
return Point(-1, -1, True) | |
else: | |
d1 = (q.y - p.y) % N | |
d2 = (q.x - p.x) % N | |
d2i = modinv(d2, N) | |
d = (d1 * d2i) % N | |
resx = (d * d - p.x - q.x) % N | |
resy = (d * (p.x - resx) - p.y) % N | |
return Point(resx, resy) | |
def scalar_mul(scalar, p, N): | |
t = p | |
res = None | |
while scalar != 0: | |
if scalar & 1 == 1: | |
if res is None: | |
res = t | |
else: | |
res = curve_add(res, t, N) | |
t = curve_add(t, t, N) | |
scalar = scalar >> 1 | |
return res | |
def der_signature(r, s): | |
r = long2byte(r) | |
if ord(r[0]) >= 0x80: | |
r = "\x00" + r | |
s = long2byte(s) | |
if ord(s[0]) >= 0x80: | |
s = "\x00" + s | |
res = "\x02" + chr(len(r)) + r + "\x02" + chr(len(s)) + s | |
return "\x30" + chr(len(res)) + res | |
def signdata(privkey, data): | |
h = hashlib.sha256(hashlib.sha256(data).digest()).digest() | |
z = byte2long(h) | |
r, s = sign(privkey, z) | |
return der_signature(r, s) | |
def sign(privkey, z): | |
while True: | |
k = byte2long(os.urandom(256 / 8)) | |
if k >= 1 and k < R: | |
break | |
p = scalar_mul(k, Point(gx, gy), N) | |
r = p.x % R | |
assert r != 0 | |
ki = modinv(k, R) | |
s = (ki * (z + r * privkey)) % R | |
assert s != 0 | |
if s > (R / 2): | |
s = R - s | |
return r, s | |
def serializepubkey(p, compressed): | |
if compressed: | |
if p.y & 1 == 1: | |
return "\x03" + long2byte(p.x, 32) | |
else: | |
return "\x02" + long2byte(p.x, 32) | |
else: | |
return "\x04" + long2byte(p.x, 32) + long2byte(p.y, 32) | |
def pubkey2h160(p, compressed): | |
s = serializepubkey(p, compressed) | |
s = hashlib.sha256(s).digest() | |
h = hashlib.new("ripemd160") | |
h.update(s) | |
return h.digest() | |
def pubkey2addr(p, compressed): | |
s = pubkey2h160(p, compressed) | |
return b58encode("\x24" + s) | |
def wif2privkey(s): | |
s = b58decode(s) | |
assert s.startswith("\x80") | |
if len(s) == 34 and s[-1] == "\x01": | |
return byte2long(s[1:33]), 1 | |
assert len(s) == 33 | |
return byte2long(s[1:33]), 0 | |
def recv_all(s, length): | |
ret = "" | |
while len(ret) < length: | |
temp = s.recv(length - len(ret)) | |
if len(temp) == 0: | |
raise "Connection reset!" | |
ret += temp | |
return ret | |
class Client(object): | |
def __init__(self, address): | |
self.address = address | |
def connect(self): | |
self.sc = socket.create_connection(self.address) | |
print "connected" | |
def send(self, cmd, msg): | |
magic = struct.pack("<L", 0xe6d4e2fa) | |
wrapper = magic + cmd.ljust(12, "\x00") + struct.pack("<L", len(msg)) + hashlib.sha256(hashlib.sha256(msg).digest()).digest()[0:4] + msg | |
self.sc.sendall(wrapper) | |
print "sent", repr(cmd) | |
def recv_msg(self): | |
header = recv_all(self.sc, 24) | |
if len(header) != 24: | |
print "INVALID HEADER LENGTH", repr(head) | |
exit() | |
cmd = header[4:16].rstrip("\x00") | |
payloadlen = struct.unpack("<I", header[16:20])[0] | |
payload = recv_all(self.sc, payloadlen) | |
return cmd, payload | |
def maketx(sourcetx, sourceidx, wifkey, targetaddr, numsatoshi, originalsatoshi): | |
sourceprivkey, compressed = wif2privkey(wifkey) | |
sourcepubkey = scalar_mul(sourceprivkey, Point(gx, gy), N) | |
sourceh160 = pubkey2h160(sourcepubkey, compressed) | |
targeth160 = b58decode(targetaddr)[1:] | |
s = struct.pack("<I", 2) | |
s += chr(1) # one input | |
s += sourcetx.decode("hex")[::-1] # source TX is in little endian order | |
s += struct.pack("<I", sourceidx) # source ID too | |
s += "[[SCRIPT]]" # placeholder for script | |
s += "\xff\xff\xff\xff" # no locktime | |
s += chr(1) # one output | |
s += struct.pack("<Q", numsatoshi) # hope you got this number correctly! | |
s += "\x19\x76\xa9\x14" + targeth160 + "\x88\xac" # standard P2PKH script | |
s += "\x00\x00\x00\x00" # no locktime | |
to_sign = "" | |
to_sign += struct.pack("<I", 2) | |
to_sign += hashlib.sha256(hashlib.sha256(sourcetx.decode("hex")[::-1] + struct.pack("<I", sourceidx)).digest()).digest() | |
to_sign += hashlib.sha256(hashlib.sha256("\xff\xff\xff\xff" ).digest()).digest() | |
to_sign += sourcetx.decode("hex")[::-1] + struct.pack("<I", sourceidx) | |
to_sign += "\x19\x76\xa9\x14" + sourceh160 + "\x88\xac" | |
to_sign += struct.pack("<Q", originalsatoshi) | |
to_sign += "\xff\xff\xff\xff" | |
to_sign += hashlib.sha256(hashlib.sha256(struct.pack("<Q", numsatoshi) + "\x19\x76\xa9\x14" + targeth160 + "\x88\xac").digest()).digest() | |
to_sign += "\x00\x00\x00\x00" | |
to_sign += struct.pack("<I", 0x41 | (70 << 8)) | |
signature = signdata(sourceprivkey, to_sign) + "\x41" | |
serpubkey = serializepubkey(sourcepubkey, compressed) | |
script = chr(len(signature)) + signature + chr(len(serpubkey)) + serpubkey | |
script = chr(len(script)) + script | |
tx = s.replace("[[SCRIPT]]", script) | |
return tx, pubkey2addr(sourcepubkey, compressed) | |
if len(sys.argv) != 7: | |
print "Usage: b2x.py <source TXID> <source index> <source WIF private key> <target address> <number of satoshis to send> <number of satoshis at source output>" | |
print "example: b2x.py 4adc427d330497992710feaa32f85c389ef5106f74e7006878bd14b54500dfff 0 5K2YUVmWfxbmvsNxCsfvArXdGXm7d5DC9pn4yD75k2UaSYgkXTh 1aa5cmqmvQq8YQTEqcTmW7dfBNuFwgdCD 1853 3053" | |
else: | |
sourcetx = sys.argv[1] | |
sourceidx = int(sys.argv[2]) | |
wifkey = sys.argv[3] | |
targetaddr = sys.argv[4] | |
numsatoshi = int(sys.argv[5]) | |
originalsatoshi = int(sys.argv[6]) | |
tx, sourceaddr = maketx(sourcetx, sourceidx, wifkey, targetaddr, numsatoshi, originalsatoshi) | |
print "YOU ARE ABOUT TO SEND %.8f BTF FROM %s TO %s!" % (numsatoshi / 100000000.0, sourceaddr, targetaddr) | |
print "!!!EVERYTHING ELSE WILL BE EATEN UP AS FEES! CONTINUE AT YOUR OWN RISK!!!" | |
print "Write 'I understand' to continue" | |
answer = raw_input() | |
assert answer == "I understand" | |
txhash = hashlib.sha256(hashlib.sha256(tx).digest()).digest()[::-1] | |
print "generated transaction", txhash.encode("hex") | |
client = Client(("b.btf.hjy.cc", 8346)) | |
client.connect() | |
versionno = 70015 | |
services = 0 | |
localaddr = "\x00" * 8 + "00000000000000000000FFFF".decode("hex") + "\x00" * 6 | |
nonce = os.urandom(8) | |
user_agent = "Scraper" | |
msg = struct.pack("<IQQ", versionno, services, int(time.time())) + localaddr + localaddr + nonce + chr(len(user_agent)) + user_agent + struct.pack("<IB", 0, 0) | |
client.send("version", msg) | |
while True: | |
cmd, payload = client.recv_msg() | |
if cmd == "version": | |
print repr(payload) | |
client.send("verack", "") | |
elif cmd == "ping": | |
client.send("pong", payload) | |
client.send("inv", "\x01" + struct.pack("<I", 1) + txhash) | |
elif cmd == "getdata": | |
if payload == "\x01\x01\x00\x00\x00" + txhash: | |
print "sending txhash, if there is no error response everything probably went well" | |
client.send("tx", tx) | |
else: | |
print repr(cmd) | |
print repr(payload) | |
Do i need to install the bitcoin faith client while using that script or can it run alone?
This does not support sending from Segwit P2SH-P2WPKH addresses, correct?
Created another script that should work with Segwit P2SH-P2WPKH on BTF: https://gist.github.com/ymgve/84b7a6186310abb2204ad45b077ebc99
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Iam getting this error.
YOU ARE ABOUT TO SEND 0.54620597 BTF FROM FVqD1X723AT49kmWpzuuLrCw84C3Eu9Rm1 TO FYGieyWdeKeqerN5EXuTed5UTbquAFRr5d!
!!!EVERYTHING ELSE WILL BE EATEN UP AS FEES! CONTINUE AT YOUR OWN RISK!!!
Write 'I understand' to continue
02000000010b407a16ff98e52a4abf9bef20b1c3a8ffeccc07642fed00a39a5ea73d68864c000000008a47304402205c0d892a9a4e1dcad24f612263a2c3f313625e12a03f00c4a170f67185e3f82702204d6bb6dcfe923418a0ec0696c02dafb226a726c14f58081bd899c6e98a3a5e874141043d67092e3fa49692827d5904044c4f69a6c1d9e389a49705959b4130df6d88abdd0b9bcc927b93e08ee1df9cfd97faa2be1cb17da335c0de72f767876eb26eaeffffffff01b5714103000000001976a914220b0bf90850ffa0021e3ffb0dfbf79471d82f2888ac00000000
I understand
generated transaction d1ed621480f874cbb82a4e5cff4e764f7f64379761784b6a0df6f7f3a0067a59
connected
sent 'version'
Traceback (most recent call last):
File "C:\Users\chris\Downloads\btftest.py", line 291, in
cmd, payload = client.recv_msg()
File "C:\Users\chris\Downloads\btftest.py", line 207, in recv_msg
header = recv_all(self.sc, 24)
File "C:\Users\chris\Downloads\btftest.py", line 185, in recv_all
temp = s.recv(length - len(ret))
socket.error: [Errno 10054] An existing connection was forcibly closed by the remote host
I tried sending it several times. what could be the cause for it?