addrfile.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. #!/usr/bin/env python3
  2. #
  3. # MMGen Wallet, a terminal-based cryptocurrency wallet
  4. # Copyright (C)2013-2025 The MMGen Project <mmgen@tuta.io>
  5. #
  6. # This program is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. """
  19. addrfile: Address and password file classes for the MMGen suite
  20. """
  21. from .cfg import gc
  22. from .util import msg, die, capfirst
  23. from .protocol import init_proto
  24. from .obj import MMGenObject, TwComment, WalletPassword, MMGenPWIDString
  25. from .seed import SeedID, is_seed_id
  26. from .key import PrivKey
  27. from .addr import ViewKey, AddrListID, MMGenAddrType, MMGenPasswordType, is_addr_idx
  28. from .addrlist import KeyList, AddrListData
  29. class AddrFile(MMGenObject):
  30. desc = 'addresses'
  31. ext = 'addrs'
  32. line_ctr = 0
  33. header = """
  34. # This file is editable.
  35. # Everything following a hash symbol '#' is a comment and ignored by {pnm}.
  36. """
  37. text_label_header = """
  38. # A text label of {n} screen cells or less may be added to the right of each
  39. # address, and it will be appended to the tracking wallet label upon import.
  40. # The label may contain any printable ASCII symbol.
  41. """
  42. def __init__(self, parent):
  43. self.parent = parent
  44. self.cfg = parent.cfg
  45. self.infile = None
  46. self.fmt_data = None
  47. def encrypt(self):
  48. from .crypto import Crypto
  49. self.fmt_data = Crypto(self.cfg).mmgen_encrypt(
  50. data = self.fmt_data.encode(),
  51. desc = f'new {self.parent.desc} list')
  52. self.ext += f'.{Crypto.mmenc_ext}'
  53. @property
  54. def filename(self):
  55. return '{}{}.{}'.format(
  56. self.parent.id_str,
  57. ('.' + self.parent.proto.network) if self.parent.proto.testnet else '',
  58. self.ext)
  59. def write(
  60. self,
  61. fn = None,
  62. *,
  63. binary = False,
  64. desc = None,
  65. ask_overwrite = True,
  66. outdir = None):
  67. from .fileutil import write_data_to_file
  68. write_data_to_file(
  69. cfg = self.cfg,
  70. outfile = fn or self.filename,
  71. data = self.fmt_data or self.format(),
  72. desc = desc or self.desc,
  73. ask_tty = self.parent.has_keys and not self.cfg.quiet,
  74. binary = binary,
  75. ask_overwrite = ask_overwrite,
  76. outdir = outdir)
  77. def make_label(self):
  78. proto = self.parent.proto
  79. coin = proto.coin
  80. mmtype = self.parent.al_id.mmtype
  81. lbl_p2 = ':'.join(
  82. ([] if coin == 'BTC' or (coin == 'BCH' and not self.cfg.cashaddr) else [coin])
  83. + ([] if mmtype == 'E' or (mmtype == 'L' and not proto.testnet) else [mmtype.name.upper()])
  84. + ([proto.network.upper()] if proto.testnet else [])
  85. )
  86. return self.parent.al_id.sid + (' ' if lbl_p2 else '') + lbl_p2
  87. def format(self, *, add_comments=False):
  88. p = self.parent
  89. if p.gen_passwds and p.pw_fmt in ('bip39', 'xmrseed'):
  90. desc_pfx = f'{p.pw_fmt.upper()} '
  91. hdr2 = ''
  92. else:
  93. desc_pfx = ''
  94. hdr2 = self.text_label_header
  95. out = [
  96. f'# {gc.proj_name} {desc_pfx}{p.desc} file\n#\n'
  97. + self.header.strip().format(pnm=gc.proj_name)
  98. + '\n'
  99. + hdr2.lstrip().format(n=TwComment.max_screen_width)
  100. + '#\n'
  101. ]
  102. if p.chksum:
  103. out.append(f'# {capfirst(p.desc)} data checksum for {p.id_str}: {p.chksum}')
  104. out.append('# Record this value to a secure location.\n')
  105. lbl = self.make_label()
  106. self.parent.dmsg_sc('lbl', lbl[9:])
  107. out.append(f'{lbl} {{')
  108. fs = ' {:<%s} {:<34}{}' % len(str(p.data[-1].idx))
  109. for e in p.data:
  110. c = ' ' + e.comment if add_comments and e.comment else ''
  111. if type(p) is KeyList:
  112. out.append(fs.format(e.idx, f'{p.al_id.mmtype.wif_label}: {e.sec.wif}', c))
  113. elif type(p).__name__ == 'PasswordList':
  114. out.append(fs.format(e.idx, e.passwd, c))
  115. else: # First line with idx
  116. out.append(fs.format(e.idx, e.addr.views[e.addr.view_pref], c))
  117. if p.has_keys:
  118. if self.cfg.b16:
  119. out.append(fs.format('', f'orig_hex: {e.sec.orig_bytes.hex()}', c))
  120. if type(self) is not ViewKeyAddrFile:
  121. out.append(fs.format('', f'{p.al_id.mmtype.wif_label}: {e.sec.wif}', c))
  122. for k in ('viewkey', 'wallet_passwd'):
  123. v = getattr(e, k)
  124. if v:
  125. out.append(fs.format('', f'{k}: {v}', c))
  126. out.append('}')
  127. self.fmt_data = '\n'.join([l.rstrip() for l in out]) + '\n'
  128. return self.fmt_data
  129. def get_line(self, lines):
  130. ret = lines.pop(0).split(None, 2)
  131. self.line_ctr += 1
  132. if ret[0] == 'orig_hex:': # hacky
  133. ret = lines.pop(0).split(None, 2)
  134. self.line_ctr += 1
  135. return ret if len(ret) == 3 else ret + ['']
  136. def parse_file_body(self, lines):
  137. p = self.parent
  138. ret = AddrListData()
  139. le = p.entry_type
  140. iifs = "{!r}: invalid identifier [expected '{}:']"
  141. while lines:
  142. idx, addr, comment = self.get_line(lines)
  143. assert is_addr_idx(idx), f'invalid address index {idx!r}'
  144. p.check_format(addr)
  145. a = le(**{'proto': p.proto, 'idx':int(idx), p.main_attr:addr, 'comment':comment})
  146. if p.has_keys: # order: wif, (orig_hex), viewkey, wallet_passwd
  147. if type(self) is not ViewKeyAddrFile:
  148. d = self.get_line(lines)
  149. assert d[0] == p.al_id.mmtype.wif_label+':', iifs.format(d[0], p.al_id.mmtype.wif_label)
  150. a.sec = PrivKey(proto=p.proto, wif=d[1])
  151. for k, dtype, add_proto in (
  152. ('viewkey', ViewKey, True),
  153. ('wallet_passwd', WalletPassword, False)):
  154. if k in p.al_id.mmtype.extra_attrs:
  155. d = self.get_line(lines)
  156. assert d[0] == k+':', iifs.format(d[0], k)
  157. setattr(a, k, dtype(*((p.proto, d[1]) if add_proto else (d[1],))))
  158. ret.append(a)
  159. if type(self) is not ViewKeyAddrFile and p.has_keys and p.ka_validity_chk is not False:
  160. def verify_keys():
  161. from .addrgen import KeyGenerator, AddrGenerator
  162. kg = KeyGenerator(self.cfg, p.proto, p.al_id.mmtype.pubkey_type)
  163. ag = AddrGenerator(self.cfg, p.proto, p.al_id.mmtype)
  164. llen = len(ret)
  165. qmsg_r = p.cfg._util.qmsg_r
  166. for n, e in enumerate(ret):
  167. qmsg_r(f'\rVerifying keys {n+1}/{llen}')
  168. assert e.addr == ag.to_addr(kg.gen_data(e.sec)), (
  169. f'Key doesn’t match address!\n {e.sec.wif}\n {e.addr}')
  170. p.cfg._util.qmsg(' - done')
  171. if self.cfg.yes or p.ka_validity_chk:
  172. verify_keys()
  173. else:
  174. from .ui import keypress_confirm
  175. if keypress_confirm(p.cfg, 'Check key-to-address validity?'):
  176. verify_keys()
  177. return ret
  178. def parse_file(self, fn, *, buf=[], exit_on_error=True):
  179. def parse_addrfile_label(lbl):
  180. """
  181. label examples:
  182. - Bitcoin legacy mainnet: no label
  183. - BCH legacy mainnet (no cashaddr): no label
  184. - BCH legacy mainnet (cashaddr): 'BCH'
  185. - Bitcoin legacy testnet: 'LEGACY:TESTNET'
  186. - Bitcoin Segwit: 'SEGWIT'
  187. - Bitcoin Segwit testnet: 'SEGWIT:TESTNET'
  188. - Bitcoin Bech32 regtest: 'BECH32:REGTEST'
  189. - Litecoin legacy mainnet: 'LTC'
  190. - Litecoin Bech32 mainnet: 'LTC:BECH32'
  191. - Litecoin legacy testnet: 'LTC:LEGACY:TESTNET'
  192. - Ethereum mainnet: 'ETH'
  193. - Ethereum Classic mainnet: 'ETC'
  194. - Ethereum regtest: 'ETH:REGTEST'
  195. """
  196. lbl = lbl.lower()
  197. # remove the network component:
  198. if lbl.endswith(':testnet'):
  199. network = 'testnet'
  200. lbl = lbl[:-8]
  201. elif lbl.endswith(':regtest'):
  202. network = 'regtest'
  203. lbl = lbl[:-8]
  204. else:
  205. network = 'mainnet'
  206. from .proto.btc.params import mainnet
  207. if lbl in [MMGenAddrType(mainnet, key).name for key in mainnet.mmtypes]:
  208. coin, mmtype_key = ('BTC', lbl)
  209. elif ':' in lbl: # first component is coin, second is mmtype_key
  210. coin, mmtype_key = lbl.split(':')
  211. else: # only component is coin
  212. coin, mmtype_key = (lbl, None)
  213. proto = init_proto(p.cfg, coin=coin, network=network)
  214. if mmtype_key is None:
  215. mmtype_key = proto.mmtypes[0]
  216. return (proto, proto.addr_type(mmtype_key))
  217. p = self.parent
  218. from .fileutil import get_lines_from_file
  219. lines = get_lines_from_file(p.cfg, fn, desc=f'{p.desc} data', trim_comments=True)
  220. try:
  221. assert len(lines) >= 3, f'Too few lines in address file ({len(lines)})'
  222. ls = lines[0].split()
  223. assert 1 < len(ls) < 5, f'Invalid first line for {p.gen_desc} file: {lines[0]!r}'
  224. assert ls[-1] == '{', f'{ls!r}: invalid first line'
  225. ls.pop()
  226. assert lines[-1] == '}', f'{lines[-1]!r}: invalid last line'
  227. sid = ls.pop(0)
  228. assert is_seed_id(sid), f'{sid!r}: invalid Seed ID'
  229. if type(p).__name__ == 'PasswordList' and len(ls) == 2:
  230. ss = ls.pop().split(':')
  231. assert len(ss) == 2, f'{ss!r}: invalid password length specifier (must contain colon)'
  232. p.set_pw_fmt(ss[0])
  233. p.set_pw_len(ss[1])
  234. p.pw_id_str = MMGenPWIDString(ls.pop())
  235. modname, funcname = p.pw_info[p.pw_fmt].chk_func.split('.')
  236. import importlib
  237. p.chk_func = getattr(importlib.import_module('mmgen.'+modname), funcname)
  238. proto = init_proto(p.cfg, 'btc') # FIXME: dummy protocol
  239. mmtype = MMGenPasswordType(proto, 'P')
  240. elif len(ls) == 1:
  241. proto, mmtype = parse_addrfile_label(ls[0])
  242. elif len(ls) == 0:
  243. proto = init_proto(p.cfg, 'btc')
  244. mmtype = proto.addr_type('L')
  245. else:
  246. raise ValueError(f'{lines[0]}: Invalid first line for {p.gen_desc} file {fn!r}')
  247. if type(p).__name__ != 'PasswordList':
  248. if proto.base_coin != p.proto.base_coin or proto.network != p.proto.network:
  249. # Having caller supply protocol and checking address file protocol against it here
  250. # allows us to catch all mismatches in one place. This behavior differs from that of
  251. # transaction files, which determine the protocol independently, requiring the caller
  252. # to check for protocol mismatches (e.g. mmgen.tx.completed.check_correct_chain())
  253. raise ValueError(
  254. f'{p.desc} file is '
  255. + f'{proto.base_coin} {proto.network} but protocol is '
  256. + f'{p.proto.base_coin} {p.proto.network}')
  257. p.base_coin = proto.base_coin
  258. p.network = proto.network
  259. p.al_id = AddrListID(sid=SeedID(sid=sid), mmtype=mmtype)
  260. data = self.parse_file_body(lines[1:-1])
  261. assert isinstance(data, list), 'Invalid file body data'
  262. except Exception as e:
  263. m = 'Invalid data in {} list file {!r}{} ({!s})'.format(
  264. p.desc,
  265. self.infile,
  266. (f', content line {self.line_ctr}' if self.line_ctr else ''),
  267. e)
  268. if exit_on_error:
  269. die(3, m)
  270. else:
  271. msg(m)
  272. return False
  273. return data
  274. class KeyAddrFile(AddrFile):
  275. desc = 'secret keys'
  276. ext = 'akeys'
  277. class ViewKeyAddrFile(KeyAddrFile):
  278. desc = 'view keys'
  279. ext = 'vkeys'
  280. class KeyFile(KeyAddrFile):
  281. ext = 'keys'
  282. header = """
  283. # This file is editable.
  284. # Everything following a hash symbol '#' is a comment and ignored by {pnm}.
  285. """
  286. text_label_header = ''
  287. class PasswordFile(AddrFile):
  288. desc = 'passwords'
  289. ext = 'pws'
  290. header = """
  291. # This file is editable.
  292. # Everything following a hash symbol '#' is a comment and ignored by {pnm}.
  293. """
  294. text_label_header = """
  295. # A text label of {n} screen cells or less may be added to the right of each
  296. # password. The label may contain any printable ASCII symbol.
  297. """
  298. def get_line(self, lines):
  299. self.line_ctr += 1
  300. p = self.parent
  301. if p.pw_fmt in ('bip39', 'xmrseed'):
  302. ret = lines.pop(0).split(None, p.pw_len+1)
  303. if len(ret) > p.pw_len+1:
  304. m1 = f'extraneous text {ret[p.pw_len+1]!r} found after password'
  305. m2 = '[bare comments not allowed in BIP39 password files]'
  306. m = m1+' '+m2
  307. elif len(ret) < p.pw_len+1:
  308. m = f'invalid password length {len(ret)-1}'
  309. else:
  310. return (ret[0], ' '.join(ret[1:p.pw_len+1]), '')
  311. raise ValueError(m)
  312. else:
  313. ret = lines.pop(0).split(None, 2)
  314. return ret if len(ret) == 3 else ret + ['']
  315. def make_label(self):
  316. p = self.parent
  317. return f'{p.al_id.sid} {p.pw_id_str} {p.pw_fmt_disp}:{p.pw_len}'