2015-01-02 18:52:46 +02:00
|
|
|
// Copyright (c) 2014-2015, The Monero Project
|
2014-07-23 16:03:52 +03:00
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
2014-03-04 00:07:58 +02:00
|
|
|
|
|
|
|
#include <boost/archive/binary_oarchive.hpp>
|
|
|
|
#include <boost/archive/binary_iarchive.hpp>
|
|
|
|
|
|
|
|
#include <boost/utility/value_init.hpp>
|
|
|
|
#include "include_base_utils.h"
|
|
|
|
using namespace epee;
|
|
|
|
|
2014-09-08 22:09:59 +03:00
|
|
|
#include "cryptonote_config.h"
|
2014-03-04 00:07:58 +02:00
|
|
|
#include "wallet2.h"
|
|
|
|
#include "cryptonote_core/cryptonote_format_utils.h"
|
|
|
|
#include "rpc/core_rpc_server_commands_defs.h"
|
|
|
|
#include "misc_language.h"
|
|
|
|
#include "cryptonote_core/cryptonote_basic_impl.h"
|
|
|
|
#include "common/boost_serialization_helper.h"
|
|
|
|
#include "profile_tools.h"
|
|
|
|
#include "crypto/crypto.h"
|
|
|
|
#include "serialization/binary_utils.h"
|
2014-06-02 01:22:42 +03:00
|
|
|
#include "cryptonote_protocol/blobdatatype.h"
|
2014-09-23 14:34:04 +03:00
|
|
|
#include "mnemonics/electrum-words.h"
|
2014-09-18 00:26:51 +03:00
|
|
|
#include "common/dns_utils.h"
|
2014-10-17 23:51:37 +03:00
|
|
|
#include "rapidjson/document.h"
|
|
|
|
#include "rapidjson/writer.h"
|
|
|
|
#include "rapidjson/stringbuffer.h"
|
2014-03-04 00:07:58 +02:00
|
|
|
|
2014-08-03 17:58:21 +03:00
|
|
|
extern "C"
|
|
|
|
{
|
|
|
|
#include "crypto/keccak.h"
|
|
|
|
#include "crypto/crypto-ops.h"
|
|
|
|
}
|
2014-03-04 00:07:58 +02:00
|
|
|
using namespace cryptonote;
|
|
|
|
|
2014-05-03 19:19:43 +03:00
|
|
|
namespace
|
|
|
|
{
|
|
|
|
void do_prepare_file_names(const std::string& file_path, std::string& keys_file, std::string& wallet_file)
|
|
|
|
{
|
|
|
|
keys_file = file_path;
|
|
|
|
wallet_file = file_path;
|
|
|
|
boost::system::error_code e;
|
|
|
|
if(string_tools::get_extension(keys_file) == "keys")
|
|
|
|
{//provided keys file name
|
|
|
|
wallet_file = string_tools::cut_off_extension(wallet_file);
|
|
|
|
}else
|
|
|
|
{//provided wallet file name
|
|
|
|
keys_file += ".keys";
|
|
|
|
}
|
|
|
|
}
|
2014-06-05 01:59:47 +03:00
|
|
|
|
2014-05-03 19:19:43 +03:00
|
|
|
} //namespace
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
namespace tools
|
|
|
|
{
|
2014-06-18 01:15:21 +03:00
|
|
|
// for now, limit to 30 attempts. TODO: discuss a good number to limit to.
|
|
|
|
const size_t MAX_SPLIT_ATTEMPTS = 30;
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::init(const std::string& daemon_address, uint64_t upper_transaction_size_limit)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
m_upper_transaction_size_limit = upper_transaction_size_limit;
|
|
|
|
m_daemon_address = daemon_address;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
bool wallet2::is_deterministic() const
|
2014-12-06 11:59:13 +02:00
|
|
|
{
|
|
|
|
crypto::secret_key second;
|
|
|
|
keccak((uint8_t *)&get_account().get_keys().m_spend_secret_key, sizeof(crypto::secret_key), (uint8_t *)&second, sizeof(crypto::secret_key));
|
|
|
|
sc_reduce32((uint8_t *)&second);
|
|
|
|
bool keys_deterministic = memcmp(second.data,get_account().get_keys().m_view_secret_key.data, sizeof(crypto::secret_key)) == 0;
|
|
|
|
return keys_deterministic;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
bool wallet2::get_seed(std::string& electrum_words) const
|
2014-08-03 17:58:21 +03:00
|
|
|
{
|
2014-12-06 11:59:13 +02:00
|
|
|
bool keys_deterministic = is_deterministic();
|
|
|
|
if (!keys_deterministic)
|
|
|
|
{
|
|
|
|
std::cout << "This is not a deterministic wallet" << std::endl;
|
|
|
|
return false;
|
|
|
|
}
|
2014-11-07 00:36:36 +02:00
|
|
|
if (seed_language.empty())
|
|
|
|
{
|
|
|
|
std::cout << "seed_language not set" << std::endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-10-02 15:45:18 +03:00
|
|
|
crypto::ElectrumWords::bytes_to_words(get_account().get_keys().m_spend_secret_key, electrum_words, seed_language);
|
2014-08-03 17:58:21 +03:00
|
|
|
|
2014-12-06 11:59:13 +02:00
|
|
|
return true;
|
2014-08-03 17:58:21 +03:00
|
|
|
}
|
2014-11-07 00:36:36 +02:00
|
|
|
/*!
|
|
|
|
* \brief Gets the seed language
|
|
|
|
*/
|
2015-05-27 21:00:57 +03:00
|
|
|
const std::string &wallet2::get_seed_language() const
|
2014-11-07 00:36:36 +02:00
|
|
|
{
|
|
|
|
return seed_language;
|
|
|
|
}
|
2014-10-02 15:45:18 +03:00
|
|
|
/*!
|
|
|
|
* \brief Sets the seed language
|
2014-10-18 20:41:05 +03:00
|
|
|
* \param language Seed language to set to
|
2014-10-02 15:45:18 +03:00
|
|
|
*/
|
|
|
|
void wallet2::set_seed_language(const std::string &language)
|
|
|
|
{
|
|
|
|
seed_language = language;
|
|
|
|
}
|
2014-10-17 23:51:37 +03:00
|
|
|
/*!
|
|
|
|
* \brief Tells if the wallet file is deprecated.
|
|
|
|
*/
|
|
|
|
bool wallet2::is_deprecated() const
|
|
|
|
{
|
|
|
|
return is_old_file_format;
|
|
|
|
}
|
2014-08-03 17:58:21 +03:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::process_new_transaction(const cryptonote::transaction& tx, uint64_t height)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
process_unconfirmed(tx);
|
2014-03-04 00:07:58 +02:00
|
|
|
std::vector<size_t> outs;
|
|
|
|
uint64_t tx_money_got_in_outs = 0;
|
2014-05-03 19:19:43 +03:00
|
|
|
|
|
|
|
std::vector<tx_extra_field> tx_extra_fields;
|
|
|
|
if(!parse_tx_extra(tx.extra, tx_extra_fields))
|
|
|
|
{
|
|
|
|
// Extra may only be partially parsed, it's OK if tx_extra_fields contains public key
|
|
|
|
LOG_PRINT_L0("Transaction extra has unsupported format: " << get_transaction_hash(tx));
|
|
|
|
}
|
|
|
|
|
2014-09-13 07:25:33 +03:00
|
|
|
// Don't try to extract tx public key if tx has no ouputs
|
|
|
|
if (!tx.vout.empty())
|
2014-05-03 19:19:43 +03:00
|
|
|
{
|
2014-09-13 07:25:33 +03:00
|
|
|
tx_extra_pub_key pub_key_field;
|
|
|
|
if(!find_tx_extra_field_by_type(tx_extra_fields, pub_key_field))
|
|
|
|
{
|
|
|
|
LOG_PRINT_L0("Public key wasn't found in the transaction extra. Skipping transaction " << get_transaction_hash(tx));
|
|
|
|
if(0 != m_callback)
|
|
|
|
m_callback->on_skip_transaction(height, tx);
|
|
|
|
return;
|
|
|
|
}
|
2014-05-03 19:19:43 +03:00
|
|
|
|
2014-09-13 07:25:33 +03:00
|
|
|
crypto::public_key tx_pub_key = pub_key_field.pub_key;
|
|
|
|
bool r = lookup_acc_outs(m_account.get_keys(), tx, tx_pub_key, outs, tx_money_got_in_outs);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::acc_outs_lookup_error, tx, tx_pub_key, m_account.get_keys());
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-09-13 07:25:33 +03:00
|
|
|
if(!outs.empty() && tx_money_got_in_outs)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-09-13 07:25:33 +03:00
|
|
|
//good news - got money! take care about it
|
|
|
|
//usually we have only one transfer for user in transaction
|
|
|
|
cryptonote::COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES::request req = AUTO_VAL_INIT(req);
|
|
|
|
cryptonote::COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES::response res = AUTO_VAL_INIT(res);
|
|
|
|
req.txid = get_transaction_hash(tx);
|
|
|
|
bool r = net_utils::invoke_http_bin_remote_command2(m_daemon_address + "/get_o_indexes.bin", req, res, m_http_client, WALLET_RCP_CONNECTION_TIMEOUT);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::no_connection_to_daemon, "get_o_indexes.bin");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(res.status == CORE_RPC_STATUS_BUSY, error::daemon_busy, "get_o_indexes.bin");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(res.status != CORE_RPC_STATUS_OK, error::get_out_indices_error, res.status);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(res.o_indexes.size() != tx.vout.size(), error::wallet_internal_error,
|
|
|
|
"transactions outputs size=" + std::to_string(tx.vout.size()) +
|
|
|
|
" not match with COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES response size=" + std::to_string(res.o_indexes.size()));
|
|
|
|
|
|
|
|
BOOST_FOREACH(size_t o, outs)
|
|
|
|
{
|
|
|
|
THROW_WALLET_EXCEPTION_IF(tx.vout.size() <= o, error::wallet_internal_error, "wrong out in transaction: internal index=" +
|
|
|
|
std::to_string(o) + ", total_outs=" + std::to_string(tx.vout.size()));
|
|
|
|
|
|
|
|
m_transfers.push_back(boost::value_initialized<transfer_details>());
|
|
|
|
transfer_details& td = m_transfers.back();
|
|
|
|
td.m_block_height = height;
|
|
|
|
td.m_internal_output_index = o;
|
|
|
|
td.m_global_output_index = res.o_indexes[o];
|
|
|
|
td.m_tx = tx;
|
|
|
|
td.m_spent = false;
|
|
|
|
cryptonote::keypair in_ephemeral;
|
|
|
|
cryptonote::generate_key_image_helper(m_account.get_keys(), tx_pub_key, o, in_ephemeral, td.m_key_image);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(in_ephemeral.pub != boost::get<cryptonote::txout_to_key>(tx.vout[o].target).key,
|
|
|
|
error::wallet_internal_error, "key_image generated ephemeral public key not matched with output_key");
|
|
|
|
|
|
|
|
m_key_images[td.m_key_image] = m_transfers.size()-1;
|
|
|
|
LOG_PRINT_L0("Received money: " << print_money(td.amount()) << ", with tx: " << get_transaction_hash(tx));
|
|
|
|
if (0 != m_callback)
|
|
|
|
m_callback->on_money_received(height, td.m_tx, td.m_internal_output_index);
|
|
|
|
}
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
}
|
2014-05-03 19:19:43 +03:00
|
|
|
|
|
|
|
uint64_t tx_money_spent_in_ins = 0;
|
2014-03-04 00:07:58 +02:00
|
|
|
// check all outputs for spending (compare key images)
|
|
|
|
BOOST_FOREACH(auto& in, tx.vin)
|
|
|
|
{
|
|
|
|
if(in.type() != typeid(cryptonote::txin_to_key))
|
|
|
|
continue;
|
|
|
|
auto it = m_key_images.find(boost::get<cryptonote::txin_to_key>(in).k_image);
|
|
|
|
if(it != m_key_images.end())
|
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
LOG_PRINT_L0("Spent money: " << print_money(boost::get<cryptonote::txin_to_key>(in).amount) << ", with tx: " << get_transaction_hash(tx));
|
2014-05-03 19:19:43 +03:00
|
|
|
tx_money_spent_in_ins += boost::get<cryptonote::txin_to_key>(in).amount;
|
2014-04-02 19:00:17 +03:00
|
|
|
transfer_details& td = m_transfers[it->second];
|
|
|
|
td.m_spent = true;
|
|
|
|
if (0 != m_callback)
|
|
|
|
m_callback->on_money_spent(height, td.m_tx, td.m_internal_output_index, tx);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
}
|
2014-05-03 19:19:43 +03:00
|
|
|
|
|
|
|
tx_extra_nonce extra_nonce;
|
2015-01-10 21:32:08 +02:00
|
|
|
crypto::hash payment_id = null_hash;
|
2014-05-03 19:19:43 +03:00
|
|
|
if (find_tx_extra_field_by_type(tx_extra_fields, extra_nonce))
|
|
|
|
{
|
|
|
|
if(get_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id))
|
|
|
|
{
|
2015-01-10 21:32:08 +02:00
|
|
|
// We got a payment ID to go with this tx
|
2014-05-03 19:19:43 +03:00
|
|
|
}
|
|
|
|
}
|
2015-01-10 21:32:08 +02:00
|
|
|
uint64_t received = (tx_money_spent_in_ins < tx_money_got_in_outs) ? tx_money_got_in_outs - tx_money_spent_in_ins : 0;
|
|
|
|
if (0 < received)
|
|
|
|
{
|
|
|
|
payment_details payment;
|
|
|
|
payment.m_tx_hash = cryptonote::get_transaction_hash(tx);
|
|
|
|
payment.m_amount = received;
|
|
|
|
payment.m_block_height = height;
|
|
|
|
payment.m_unlock_time = tx.unlock_time;
|
|
|
|
m_payments.emplace(payment_id, payment);
|
|
|
|
LOG_PRINT_L2("Payment found: " << payment_id << " / " << payment.m_tx_hash << " / " << payment.m_amount);
|
|
|
|
}
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::process_unconfirmed(const cryptonote::transaction& tx)
|
|
|
|
{
|
|
|
|
auto unconf_it = m_unconfirmed_txs.find(get_transaction_hash(tx));
|
|
|
|
if(unconf_it != m_unconfirmed_txs.end())
|
|
|
|
m_unconfirmed_txs.erase(unconf_it);
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
void wallet2::process_new_blockchain_entry(const cryptonote::block& b, cryptonote::block_complete_entry& bche, crypto::hash& bl_id, uint64_t height)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
//handle transactions from new block
|
2014-08-01 11:17:50 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
//optimization: seeking only for blocks that are not older then the wallet creation time plus 1 day. 1 day is for possible user incorrect time setup
|
|
|
|
if(b.timestamp + 60*60*24 > m_account.get_createtime())
|
|
|
|
{
|
|
|
|
TIME_MEASURE_START(miner_tx_handle_time);
|
2014-04-02 19:00:17 +03:00
|
|
|
process_new_transaction(b.miner_tx, height);
|
2014-03-04 00:07:58 +02:00
|
|
|
TIME_MEASURE_FINISH(miner_tx_handle_time);
|
|
|
|
|
|
|
|
TIME_MEASURE_START(txs_handle_time);
|
|
|
|
BOOST_FOREACH(auto& txblob, bche.txs)
|
|
|
|
{
|
|
|
|
cryptonote::transaction tx;
|
2014-04-02 19:00:17 +03:00
|
|
|
bool r = parse_and_validate_tx_from_blob(txblob, tx);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::tx_parse_error, txblob);
|
2014-04-02 19:00:17 +03:00
|
|
|
process_new_transaction(tx, height);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
TIME_MEASURE_FINISH(txs_handle_time);
|
|
|
|
LOG_PRINT_L2("Processed block: " << bl_id << ", height " << height << ", " << miner_tx_handle_time + txs_handle_time << "(" << miner_tx_handle_time << "/" << txs_handle_time <<")ms");
|
|
|
|
}else
|
|
|
|
{
|
|
|
|
LOG_PRINT_L2( "Skipped block by timestamp, height: " << height << ", block time " << b.timestamp << ", account time " << m_account.get_createtime());
|
|
|
|
}
|
|
|
|
m_blockchain.push_back(bl_id);
|
|
|
|
++m_local_bc_height;
|
2014-04-02 19:00:17 +03:00
|
|
|
|
|
|
|
if (0 != m_callback)
|
|
|
|
m_callback->on_new_block(height, b);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
void wallet2::get_short_chain_history(std::list<crypto::hash>& ids) const
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
size_t i = 0;
|
|
|
|
size_t current_multiplier = 1;
|
|
|
|
size_t sz = m_blockchain.size();
|
|
|
|
if(!sz)
|
2014-04-02 19:00:17 +03:00
|
|
|
return;
|
2014-03-04 00:07:58 +02:00
|
|
|
size_t current_back_offset = 1;
|
|
|
|
bool genesis_included = false;
|
|
|
|
while(current_back_offset < sz)
|
|
|
|
{
|
|
|
|
ids.push_back(m_blockchain[sz-current_back_offset]);
|
|
|
|
if(sz-current_back_offset == 0)
|
|
|
|
genesis_included = true;
|
|
|
|
if(i < 10)
|
|
|
|
{
|
|
|
|
++current_back_offset;
|
|
|
|
}else
|
|
|
|
{
|
|
|
|
current_back_offset += current_multiplier *= 2;
|
|
|
|
}
|
|
|
|
++i;
|
|
|
|
}
|
|
|
|
if(!genesis_included)
|
|
|
|
ids.push_back(m_blockchain[0]);
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-08-01 12:29:55 +03:00
|
|
|
void wallet2::pull_blocks(uint64_t start_height, size_t& blocks_added)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
blocks_added = 0;
|
|
|
|
cryptonote::COMMAND_RPC_GET_BLOCKS_FAST::request req = AUTO_VAL_INIT(req);
|
|
|
|
cryptonote::COMMAND_RPC_GET_BLOCKS_FAST::response res = AUTO_VAL_INIT(res);
|
|
|
|
get_short_chain_history(req.block_ids);
|
2014-08-01 12:29:55 +03:00
|
|
|
req.start_height = start_height;
|
2014-03-04 00:07:58 +02:00
|
|
|
bool r = net_utils::invoke_http_bin_remote_command2(m_daemon_address + "/getblocks.bin", req, res, m_http_client, WALLET_RCP_CONNECTION_TIMEOUT);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::no_connection_to_daemon, "getblocks.bin");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(res.status == CORE_RPC_STATUS_BUSY, error::daemon_busy, "getblocks.bin");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(res.status != CORE_RPC_STATUS_OK, error::get_blocks_error, res.status);
|
2014-03-04 00:07:58 +02:00
|
|
|
|
|
|
|
size_t current_index = res.start_height;
|
|
|
|
BOOST_FOREACH(auto& bl_entry, res.blocks)
|
|
|
|
{
|
|
|
|
cryptonote::block bl;
|
|
|
|
r = cryptonote::parse_and_validate_block_from_blob(bl_entry.block, bl);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::block_parse_error, bl_entry.block);
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
crypto::hash bl_id = get_block_hash(bl);
|
|
|
|
if(current_index >= m_blockchain.size())
|
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
process_new_blockchain_entry(bl, bl_entry, bl_id, current_index);
|
2014-03-04 00:07:58 +02:00
|
|
|
++blocks_added;
|
2014-04-02 19:00:17 +03:00
|
|
|
}
|
|
|
|
else if(bl_id != m_blockchain[current_index])
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
//split detected here !!!
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(current_index == res.start_height, error::wallet_internal_error,
|
2014-05-03 19:19:43 +03:00
|
|
|
"wrong daemon response: split starts from the first block in response " + string_tools::pod_to_hex(bl_id) +
|
2014-04-02 19:00:17 +03:00
|
|
|
" (height " + std::to_string(res.start_height) + "), local block id at this height: " +
|
|
|
|
string_tools::pod_to_hex(m_blockchain[current_index]));
|
|
|
|
|
|
|
|
detach_blockchain(current_index);
|
|
|
|
process_new_blockchain_entry(bl, bl_entry, bl_id, current_index);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-04-02 19:00:17 +03:00
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG_PRINT_L2("Block is already in blockchain: " << string_tools::pod_to_hex(bl_id));
|
|
|
|
}
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
++current_index;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::refresh()
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
size_t blocks_fetched = 0;
|
2014-08-01 11:17:50 +03:00
|
|
|
refresh(0, blocks_fetched);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-08-01 11:17:50 +03:00
|
|
|
void wallet2::refresh(uint64_t start_height, size_t & blocks_fetched)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
bool received_money = false;
|
2014-08-01 11:17:50 +03:00
|
|
|
refresh(start_height, blocks_fetched, received_money);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-08-01 11:17:50 +03:00
|
|
|
void wallet2::refresh(uint64_t start_height, size_t & blocks_fetched, bool& received_money)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
received_money = false;
|
|
|
|
blocks_fetched = 0;
|
|
|
|
size_t added_blocks = 0;
|
|
|
|
size_t try_count = 0;
|
|
|
|
crypto::hash last_tx_hash_id = m_transfers.size() ? get_transaction_hash(m_transfers.back().m_tx) : null_hash;
|
|
|
|
|
2014-03-20 13:46:11 +02:00
|
|
|
while(m_run.load(std::memory_order_relaxed))
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
try
|
|
|
|
{
|
2014-08-01 11:17:50 +03:00
|
|
|
pull_blocks(start_height, added_blocks);
|
2014-04-02 19:00:17 +03:00
|
|
|
blocks_fetched += added_blocks;
|
|
|
|
if(!added_blocks)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
catch (const std::exception&)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
blocks_fetched += added_blocks;
|
2014-03-04 00:07:58 +02:00
|
|
|
if(try_count < 3)
|
|
|
|
{
|
2014-03-20 13:46:11 +02:00
|
|
|
LOG_PRINT_L1("Another try pull_blocks (try_count=" << try_count << ")...");
|
2014-03-04 00:07:58 +02:00
|
|
|
++try_count;
|
2014-04-02 19:00:17 +03:00
|
|
|
}
|
|
|
|
else
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
LOG_ERROR("pull_blocks failed, try_count=" << try_count);
|
2014-06-30 13:45:20 +03:00
|
|
|
throw;
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(last_tx_hash_id != (m_transfers.size() ? get_transaction_hash(m_transfers.back().m_tx) : null_hash))
|
|
|
|
received_money = true;
|
|
|
|
|
2014-03-20 13:46:11 +02:00
|
|
|
LOG_PRINT_L1("Refresh done, blocks received: " << blocks_fetched << ", balance: " << print_money(balance()) << ", unlocked: " << print_money(unlocked_balance()));
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
bool wallet2::refresh(size_t & blocks_fetched, bool& received_money, bool& ok)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
2014-08-01 11:17:50 +03:00
|
|
|
refresh(0, blocks_fetched, received_money);
|
2014-04-02 19:00:17 +03:00
|
|
|
ok = true;
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
ok = false;
|
|
|
|
}
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
void wallet2::detach_blockchain(uint64_t height)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
LOG_PRINT_L0("Detaching blockchain on height " << height);
|
|
|
|
size_t transfers_detached = 0;
|
|
|
|
|
|
|
|
auto it = std::find_if(m_transfers.begin(), m_transfers.end(), [&](const transfer_details& td){return td.m_block_height >= height;});
|
|
|
|
size_t i_start = it - m_transfers.begin();
|
|
|
|
|
|
|
|
for(size_t i = i_start; i!= m_transfers.size();i++)
|
|
|
|
{
|
|
|
|
auto it_ki = m_key_images.find(m_transfers[i].m_key_image);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(it_ki == m_key_images.end(), error::wallet_internal_error, "key image not found");
|
2014-03-04 00:07:58 +02:00
|
|
|
m_key_images.erase(it_ki);
|
|
|
|
++transfers_detached;
|
|
|
|
}
|
|
|
|
m_transfers.erase(it, m_transfers.end());
|
|
|
|
|
|
|
|
size_t blocks_detached = m_blockchain.end() - (m_blockchain.begin()+height);
|
|
|
|
m_blockchain.erase(m_blockchain.begin()+height, m_blockchain.end());
|
|
|
|
m_local_bc_height -= blocks_detached;
|
|
|
|
|
2014-05-03 19:19:43 +03:00
|
|
|
for (auto it = m_payments.begin(); it != m_payments.end(); )
|
|
|
|
{
|
|
|
|
if(height <= it->second.m_block_height)
|
|
|
|
it = m_payments.erase(it);
|
|
|
|
else
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
LOG_PRINT_L0("Detached blockchain on height " << height << ", transfers detached " << transfers_detached << ", blocks detached " << blocks_detached);
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
bool wallet2::deinit()
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
bool wallet2::clear()
|
|
|
|
{
|
|
|
|
m_blockchain.clear();
|
|
|
|
m_transfers.clear();
|
|
|
|
m_local_bc_height = 1;
|
|
|
|
return true;
|
|
|
|
}
|
2014-10-18 20:41:05 +03:00
|
|
|
|
|
|
|
/*!
|
2014-10-18 22:38:21 +03:00
|
|
|
* \brief Stores wallet information to wallet file.
|
|
|
|
* \param keys_file_name Name of wallet file
|
|
|
|
* \param password Password of wallet file
|
2015-05-31 17:34:55 +03:00
|
|
|
* \param watch_only true to save only view key, false to save both spend and view keys
|
2014-10-18 22:38:21 +03:00
|
|
|
* \return Whether it was successful.
|
2014-10-18 20:41:05 +03:00
|
|
|
*/
|
2015-05-31 17:34:55 +03:00
|
|
|
bool wallet2::store_keys(const std::string& keys_file_name, const std::string& password, bool watch_only)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
std::string account_data;
|
2015-05-31 17:34:55 +03:00
|
|
|
cryptonote::account_base account = m_account;
|
|
|
|
|
|
|
|
if (watch_only)
|
|
|
|
account.forget_spend_key();
|
|
|
|
bool r = epee::serialization::store_t_to_binary(account, account_data);
|
2014-03-04 00:07:58 +02:00
|
|
|
CHECK_AND_ASSERT_MES(r, false, "failed to serialize wallet keys");
|
|
|
|
wallet2::keys_file_data keys_file_data = boost::value_initialized<wallet2::keys_file_data>();
|
|
|
|
|
2014-10-18 20:31:43 +03:00
|
|
|
// Create a JSON object with "key_data" and "seed_language" as keys.
|
2014-10-17 23:51:37 +03:00
|
|
|
rapidjson::Document json;
|
|
|
|
json.SetObject();
|
|
|
|
rapidjson::Value value(rapidjson::kStringType);
|
|
|
|
value.SetString(account_data.c_str(), account_data.length());
|
|
|
|
json.AddMember("key_data", value, json.GetAllocator());
|
2014-12-06 13:09:46 +02:00
|
|
|
if (!seed_language.empty())
|
|
|
|
{
|
|
|
|
value.SetString(seed_language.c_str(), seed_language.length());
|
|
|
|
json.AddMember("seed_language", value, json.GetAllocator());
|
|
|
|
}
|
2014-10-18 20:31:43 +03:00
|
|
|
|
2015-05-31 17:34:55 +03:00
|
|
|
rapidjson::Value value2(rapidjson::kNumberType);
|
|
|
|
value2.SetInt(watch_only ? 1 :0); // WTF ? JSON has different true and false types, and not boolean ??
|
|
|
|
json.AddMember("watch_only", value2, json.GetAllocator());
|
|
|
|
|
2015-07-19 00:03:35 +03:00
|
|
|
value2.SetInt(m_always_confirm_transfers ? 1 :0);
|
|
|
|
json.AddMember("always_confirm_transfers", value2, json.GetAllocator());
|
|
|
|
|
2014-10-18 20:31:43 +03:00
|
|
|
// Serialize the JSON object
|
2014-10-17 23:51:37 +03:00
|
|
|
rapidjson::StringBuffer buffer;
|
|
|
|
rapidjson::Writer<rapidjson::StringBuffer> writer(buffer);
|
|
|
|
json.Accept(writer);
|
|
|
|
account_data = buffer.GetString();
|
2014-10-18 20:31:43 +03:00
|
|
|
|
|
|
|
// Encrypt the entire JSON object.
|
2014-03-04 00:07:58 +02:00
|
|
|
crypto::chacha8_key key;
|
|
|
|
crypto::generate_chacha8_key(password, key);
|
|
|
|
std::string cipher;
|
|
|
|
cipher.resize(account_data.size());
|
|
|
|
keys_file_data.iv = crypto::rand<crypto::chacha8_iv>();
|
|
|
|
crypto::chacha8(account_data.data(), account_data.size(), key, keys_file_data.iv, &cipher[0]);
|
|
|
|
keys_file_data.account_data = cipher;
|
|
|
|
|
|
|
|
std::string buf;
|
|
|
|
r = ::serialization::dump_binary(keys_file_data, buf);
|
|
|
|
r = r && epee::file_io_utils::save_string_to_file(keys_file_name, buf); //and never touch wallet_keys_file again, only read
|
|
|
|
CHECK_AND_ASSERT_MES(r, false, "failed to generate wallet keys file " << keys_file_name);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
namespace
|
|
|
|
{
|
|
|
|
bool verify_keys(const crypto::secret_key& sec, const crypto::public_key& expected_pub)
|
|
|
|
{
|
|
|
|
crypto::public_key pub;
|
|
|
|
bool r = crypto::secret_key_to_public_key(sec, pub);
|
|
|
|
return r && expected_pub == pub;
|
|
|
|
}
|
|
|
|
}
|
2014-10-18 20:41:05 +03:00
|
|
|
|
|
|
|
/*!
|
2014-10-18 22:38:21 +03:00
|
|
|
* \brief Load wallet information from wallet file.
|
|
|
|
* \param keys_file_name Name of wallet file
|
|
|
|
* \param password Password of wallet file
|
2014-10-18 20:41:05 +03:00
|
|
|
*/
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::load_keys(const std::string& keys_file_name, const std::string& password)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
wallet2::keys_file_data keys_file_data;
|
|
|
|
std::string buf;
|
|
|
|
bool r = epee::file_io_utils::load_file_to_string(keys_file_name, buf);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_read_error, keys_file_name);
|
2014-10-17 23:51:37 +03:00
|
|
|
|
2014-10-18 20:31:43 +03:00
|
|
|
// Decrypt the contents
|
2014-04-02 19:00:17 +03:00
|
|
|
r = ::serialization::parse_binary(buf, keys_file_data);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "internal error: failed to deserialize \"" + keys_file_name + '\"');
|
2014-03-04 00:07:58 +02:00
|
|
|
crypto::chacha8_key key;
|
|
|
|
crypto::generate_chacha8_key(password, key);
|
|
|
|
std::string account_data;
|
|
|
|
account_data.resize(keys_file_data.account_data.size());
|
|
|
|
crypto::chacha8(keys_file_data.account_data.data(), keys_file_data.account_data.size(), key, keys_file_data.iv, &account_data[0]);
|
|
|
|
|
2014-10-18 20:31:43 +03:00
|
|
|
// The contents should be JSON if the wallet follows the new format.
|
2014-10-17 23:51:37 +03:00
|
|
|
rapidjson::Document json;
|
|
|
|
if (json.Parse(account_data.c_str(), keys_file_data.account_data.size()).HasParseError())
|
|
|
|
{
|
|
|
|
is_old_file_format = true;
|
2015-05-31 17:34:55 +03:00
|
|
|
m_watch_only = false;
|
2015-07-19 00:03:35 +03:00
|
|
|
m_always_confirm_transfers = false;
|
2014-10-17 23:51:37 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
account_data = std::string(json["key_data"].GetString(), json["key_data"].GetString() +
|
|
|
|
json["key_data"].GetStringLength());
|
2014-12-06 13:09:46 +02:00
|
|
|
if (json.HasMember("seed_language"))
|
|
|
|
{
|
|
|
|
set_seed_language(std::string(json["seed_language"].GetString(), json["seed_language"].GetString() +
|
|
|
|
json["seed_language"].GetStringLength()));
|
|
|
|
}
|
2015-05-31 17:34:55 +03:00
|
|
|
if (json.HasMember("watch_only"))
|
|
|
|
{
|
|
|
|
m_watch_only = json["watch_only"].GetInt() != 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
m_watch_only = false;
|
|
|
|
}
|
2015-07-19 00:03:35 +03:00
|
|
|
m_always_confirm_transfers = json.HasMember("always_confirm_transfers") && (json["always_confirm_transfers"].GetInt() != 0);
|
2014-10-17 23:51:37 +03:00
|
|
|
}
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
const cryptonote::account_keys& keys = m_account.get_keys();
|
|
|
|
r = epee::serialization::load_t_from_binary(m_account, account_data);
|
|
|
|
r = r && verify_keys(keys.m_view_secret_key, keys.m_account_address.m_view_public_key);
|
2015-05-31 17:34:55 +03:00
|
|
|
if(!m_watch_only)
|
|
|
|
r = r && verify_keys(keys.m_spend_secret_key, keys.m_account_address.m_spend_public_key);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::invalid_password);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-10-18 20:41:05 +03:00
|
|
|
|
2014-12-06 16:55:56 +02:00
|
|
|
/*!
|
|
|
|
* \brief verify password for default wallet keys file.
|
|
|
|
* \param password Password to verify
|
|
|
|
*
|
|
|
|
* for verification only
|
|
|
|
* should not mutate state, unlike load_keys()
|
|
|
|
* can be used prior to rewriting wallet keys file, to ensure user has entered the correct password
|
|
|
|
*
|
|
|
|
*/
|
2015-05-27 21:00:57 +03:00
|
|
|
bool wallet2::verify_password(const std::string& password) const
|
2014-12-06 16:55:56 +02:00
|
|
|
{
|
|
|
|
const std::string keys_file_name = m_keys_file;
|
|
|
|
wallet2::keys_file_data keys_file_data;
|
|
|
|
std::string buf;
|
|
|
|
bool r = epee::file_io_utils::load_file_to_string(keys_file_name, buf);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_read_error, keys_file_name);
|
|
|
|
|
|
|
|
// Decrypt the contents
|
|
|
|
r = ::serialization::parse_binary(buf, keys_file_data);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "internal error: failed to deserialize \"" + keys_file_name + '\"');
|
|
|
|
crypto::chacha8_key key;
|
|
|
|
crypto::generate_chacha8_key(password, key);
|
|
|
|
std::string account_data;
|
|
|
|
account_data.resize(keys_file_data.account_data.size());
|
|
|
|
crypto::chacha8(keys_file_data.account_data.data(), keys_file_data.account_data.size(), key, keys_file_data.iv, &account_data[0]);
|
|
|
|
|
|
|
|
// The contents should be JSON if the wallet follows the new format.
|
|
|
|
rapidjson::Document json;
|
|
|
|
if (json.Parse(account_data.c_str(), keys_file_data.account_data.size()).HasParseError())
|
|
|
|
{
|
|
|
|
// old format before JSON wallet key file format
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
account_data = std::string(json["key_data"].GetString(), json["key_data"].GetString() +
|
|
|
|
json["key_data"].GetStringLength());
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::account_base account_data_check;
|
|
|
|
|
|
|
|
r = epee::serialization::load_t_from_binary(account_data_check, account_data);
|
|
|
|
const cryptonote::account_keys& keys = account_data_check.get_keys();
|
|
|
|
|
|
|
|
r = r && verify_keys(keys.m_view_secret_key, keys.m_account_address.m_view_public_key);
|
|
|
|
r = r && verify_keys(keys.m_spend_secret_key, keys.m_account_address.m_spend_public_key);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-10-18 20:41:05 +03:00
|
|
|
/*!
|
2014-10-18 22:38:21 +03:00
|
|
|
* \brief Generates a wallet or restores one.
|
|
|
|
* \param wallet_ Name of wallet file
|
|
|
|
* \param password Password of wallet file
|
|
|
|
* \param recovery_param If it is a restore, the recovery key
|
|
|
|
* \param recover Whether it is a restore
|
|
|
|
* \param two_random Whether it is a non-deterministic wallet
|
|
|
|
* \return The secret key of the generated wallet
|
2014-10-18 20:41:05 +03:00
|
|
|
*/
|
2014-10-18 22:30:18 +03:00
|
|
|
crypto::secret_key wallet2::generate(const std::string& wallet_, const std::string& password,
|
|
|
|
const crypto::secret_key& recovery_param, bool recover, bool two_random)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
clear();
|
|
|
|
prepare_file_names(wallet_);
|
2014-04-02 19:00:17 +03:00
|
|
|
|
|
|
|
boost::system::error_code ignored_ec;
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(boost::filesystem::exists(m_wallet_file, ignored_ec), error::file_exists, m_wallet_file);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(boost::filesystem::exists(m_keys_file, ignored_ec), error::file_exists, m_keys_file);
|
2014-03-04 00:07:58 +02:00
|
|
|
|
2014-06-09 03:04:32 +03:00
|
|
|
crypto::secret_key retval = m_account.generate(recovery_param, recover, two_random);
|
2014-06-05 01:59:47 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
m_account_public_address = m_account.get_keys().m_account_address;
|
|
|
|
|
2015-05-31 17:34:55 +03:00
|
|
|
bool r = store_keys(m_keys_file, password, false);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_save_error, m_keys_file);
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-09-09 17:58:53 +03:00
|
|
|
r = file_io_utils::save_string_to_file(m_wallet_file + ".address.txt", m_account.get_public_address_str(m_testnet));
|
2014-03-04 00:07:58 +02:00
|
|
|
if(!r) LOG_PRINT_RED_L0("String with address text not saved");
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-07-16 20:30:15 +03:00
|
|
|
cryptonote::block b;
|
|
|
|
generate_genesis(b);
|
|
|
|
m_blockchain.push_back(get_block_hash(b));
|
|
|
|
|
2014-04-02 19:00:17 +03:00
|
|
|
store();
|
2014-06-06 21:18:11 +03:00
|
|
|
return retval;
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-10-18 22:30:18 +03:00
|
|
|
|
2015-06-20 14:31:53 +03:00
|
|
|
/*!
|
|
|
|
* \brief Creates a watch only wallet from a public address and a view secret key.
|
|
|
|
* \param wallet_ Name of wallet file
|
|
|
|
* \param password Password of wallet file
|
|
|
|
* \param viewkey view secret key
|
|
|
|
*/
|
|
|
|
void wallet2::generate(const std::string& wallet_, const std::string& password,
|
|
|
|
const cryptonote::account_public_address &account_public_address,
|
|
|
|
const crypto::secret_key& viewkey)
|
|
|
|
{
|
|
|
|
clear();
|
|
|
|
prepare_file_names(wallet_);
|
|
|
|
|
|
|
|
boost::system::error_code ignored_ec;
|
|
|
|
THROW_WALLET_EXCEPTION_IF(boost::filesystem::exists(m_wallet_file, ignored_ec), error::file_exists, m_wallet_file);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(boost::filesystem::exists(m_keys_file, ignored_ec), error::file_exists, m_keys_file);
|
|
|
|
|
|
|
|
m_account.create_from_viewkey(account_public_address, viewkey);
|
|
|
|
m_account_public_address = account_public_address;
|
|
|
|
m_watch_only = true;
|
|
|
|
|
|
|
|
bool r = store_keys(m_keys_file, password, true);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_save_error, m_keys_file);
|
|
|
|
|
|
|
|
r = file_io_utils::save_string_to_file(m_wallet_file + ".address.txt", m_account.get_public_address_str(m_testnet));
|
|
|
|
if(!r) LOG_PRINT_RED_L0("String with address text not saved");
|
|
|
|
|
|
|
|
cryptonote::block b;
|
|
|
|
generate_genesis(b);
|
|
|
|
m_blockchain.push_back(get_block_hash(b));
|
|
|
|
|
|
|
|
store();
|
|
|
|
}
|
|
|
|
|
2014-10-18 22:38:21 +03:00
|
|
|
/*!
|
|
|
|
* \brief Rewrites to the wallet file for wallet upgrade (doesn't generate key, assumes it's already there)
|
|
|
|
* \param wallet_name Name of wallet file (should exist)
|
|
|
|
* \param password Password for wallet file
|
|
|
|
*/
|
2014-10-18 22:30:18 +03:00
|
|
|
void wallet2::rewrite(const std::string& wallet_name, const std::string& password)
|
|
|
|
{
|
|
|
|
prepare_file_names(wallet_name);
|
|
|
|
boost::system::error_code ignored_ec;
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!boost::filesystem::exists(m_keys_file, ignored_ec), error::file_not_found, m_keys_file);
|
2015-05-31 17:34:55 +03:00
|
|
|
bool r = store_keys(m_keys_file, password, false);
|
2014-10-18 22:30:18 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_save_error, m_keys_file);
|
|
|
|
}
|
2015-05-31 17:34:55 +03:00
|
|
|
/*!
|
2015-06-20 14:30:11 +03:00
|
|
|
* \brief Writes to a file named based on the normal wallet (doesn't generate key, assumes it's already there)
|
|
|
|
* \param wallet_name Base name of wallet file
|
2015-05-31 17:34:55 +03:00
|
|
|
* \param password Password for wallet file
|
|
|
|
*/
|
|
|
|
void wallet2::write_watch_only_wallet(const std::string& wallet_name, const std::string& password)
|
|
|
|
{
|
|
|
|
prepare_file_names(wallet_name);
|
|
|
|
boost::system::error_code ignored_ec;
|
|
|
|
std::string filename = m_keys_file + "-watchonly";
|
|
|
|
bool watch_only_keys_file_exists = boost::filesystem::exists(filename, ignored_ec);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(watch_only_keys_file_exists, error::file_save_error, filename);
|
|
|
|
bool r = store_keys(filename, password, true);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_save_error, filename);
|
|
|
|
}
|
2014-03-04 00:07:58 +02:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-05-25 20:06:40 +03:00
|
|
|
void wallet2::wallet_exists(const std::string& file_path, bool& keys_file_exists, bool& wallet_file_exists)
|
2014-05-03 19:19:43 +03:00
|
|
|
{
|
|
|
|
std::string keys_file, wallet_file;
|
|
|
|
do_prepare_file_names(file_path, keys_file, wallet_file);
|
|
|
|
|
|
|
|
boost::system::error_code ignore;
|
|
|
|
keys_file_exists = boost::filesystem::exists(keys_file, ignore);
|
2014-05-25 20:06:40 +03:00
|
|
|
wallet_file_exists = boost::filesystem::exists(wallet_file, ignore);
|
2014-05-03 19:19:43 +03:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-12-11 12:47:24 +02:00
|
|
|
bool wallet2::wallet_valid_path_format(const std::string& file_path)
|
|
|
|
{
|
|
|
|
return !file_path.empty();
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-06-02 01:22:42 +03:00
|
|
|
bool wallet2::parse_payment_id(const std::string& payment_id_str, crypto::hash& payment_id)
|
|
|
|
{
|
|
|
|
cryptonote::blobdata payment_id_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(payment_id_str, payment_id_data))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(sizeof(crypto::hash) != payment_id_data.size())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
payment_id = *reinterpret_cast<const crypto::hash*>(payment_id_data.data());
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-03-04 00:07:58 +02:00
|
|
|
bool wallet2::prepare_file_names(const std::string& file_path)
|
|
|
|
{
|
2014-05-03 19:19:43 +03:00
|
|
|
do_prepare_file_names(file_path, m_keys_file, m_wallet_file);
|
2014-03-04 00:07:58 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
bool wallet2::check_connection()
|
|
|
|
{
|
|
|
|
if(m_http_client.is_connected())
|
|
|
|
return true;
|
|
|
|
|
|
|
|
net_utils::http::url_content u;
|
|
|
|
net_utils::parse_url(m_daemon_address, u);
|
2014-09-08 20:07:15 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
if(!u.port)
|
2014-09-08 20:07:15 +03:00
|
|
|
{
|
|
|
|
u.port = m_testnet ? config::testnet::RPC_DEFAULT_PORT : config::RPC_DEFAULT_PORT;
|
|
|
|
}
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
return m_http_client.connect(u.host, std::to_string(u.port), WALLET_RCP_CONNECTION_TIMEOUT);
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::load(const std::string& wallet_, const std::string& password)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
clear();
|
|
|
|
prepare_file_names(wallet_);
|
|
|
|
|
2014-04-02 19:00:17 +03:00
|
|
|
boost::system::error_code e;
|
|
|
|
bool exists = boost::filesystem::exists(m_keys_file, e);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(e || !exists, error::file_not_found, m_keys_file);
|
2014-03-04 00:07:58 +02:00
|
|
|
|
2014-04-02 19:00:17 +03:00
|
|
|
load_keys(m_keys_file, password);
|
2014-09-09 17:58:53 +03:00
|
|
|
LOG_PRINT_L0("Loaded wallet keys file, with public address: " << m_account.get_public_address_str(m_testnet));
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
//keys loaded ok!
|
|
|
|
//try to load wallet file. but even if we failed, it is not big problem
|
|
|
|
if(!boost::filesystem::exists(m_wallet_file, e) || e)
|
|
|
|
{
|
|
|
|
LOG_PRINT_L0("file not found: " << m_wallet_file << ", starting with empty blockchain");
|
|
|
|
m_account_public_address = m_account.get_keys().m_account_address;
|
|
|
|
}
|
2014-12-10 12:38:35 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
bool r = tools::unserialize_obj_from_file(*this, m_wallet_file);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_read_error, m_wallet_file);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(
|
|
|
|
m_account_public_address.m_spend_public_key != m_account.get_keys().m_account_address.m_spend_public_key ||
|
|
|
|
m_account_public_address.m_view_public_key != m_account.get_keys().m_account_address.m_view_public_key,
|
|
|
|
error::wallet_files_doesnt_correspond, m_keys_file, m_wallet_file);
|
|
|
|
}
|
2014-04-02 19:00:17 +03:00
|
|
|
|
2014-07-16 20:30:15 +03:00
|
|
|
cryptonote::block genesis;
|
|
|
|
generate_genesis(genesis);
|
|
|
|
crypto::hash genesis_hash = get_block_hash(genesis);
|
|
|
|
|
|
|
|
if (m_blockchain.empty())
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-07-16 20:30:15 +03:00
|
|
|
m_blockchain.push_back(genesis_hash);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
check_genesis(genesis_hash);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-07-16 20:30:15 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
m_local_bc_height = m_blockchain.size();
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
void wallet2::check_genesis(const crypto::hash& genesis_hash) const {
|
2014-07-16 20:30:15 +03:00
|
|
|
std::string what("Genesis block missmatch. You probably use wallet without testnet flag with blockchain from test network or vice versa");
|
|
|
|
|
|
|
|
THROW_WALLET_EXCEPTION_IF(genesis_hash != m_blockchain[0], error::wallet_internal_error, what);
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::store()
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
bool r = tools::serialize_obj_to_file(*this, m_wallet_file);
|
2014-04-07 18:02:15 +03:00
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::file_save_error, m_wallet_file);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
uint64_t wallet2::unlocked_balance() const
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
uint64_t amount = 0;
|
2015-05-27 21:00:57 +03:00
|
|
|
BOOST_FOREACH(const transfer_details& td, m_transfers)
|
2014-03-04 00:07:58 +02:00
|
|
|
if(!td.m_spent && is_transfer_unlocked(td))
|
|
|
|
amount += td.amount();
|
|
|
|
|
|
|
|
return amount;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-05-27 21:00:57 +03:00
|
|
|
uint64_t wallet2::balance() const
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
uint64_t amount = 0;
|
|
|
|
BOOST_FOREACH(auto& td, m_transfers)
|
|
|
|
if(!td.m_spent)
|
|
|
|
amount += td.amount();
|
|
|
|
|
2014-04-02 19:00:17 +03:00
|
|
|
|
|
|
|
BOOST_FOREACH(auto& utx, m_unconfirmed_txs)
|
|
|
|
amount+= utx.second.m_change;
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
return amount;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::get_transfers(wallet2::transfer_container& incoming_transfers) const
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
incoming_transfers = m_transfers;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-07-22 19:00:25 +03:00
|
|
|
void wallet2::get_payments(const crypto::hash& payment_id, std::list<wallet2::payment_details>& payments, uint64_t min_height) const
|
2014-05-03 19:19:43 +03:00
|
|
|
{
|
|
|
|
auto range = m_payments.equal_range(payment_id);
|
2014-07-22 19:00:25 +03:00
|
|
|
std::for_each(range.first, range.second, [&payments, &min_height](const payment_container::value_type& x) {
|
|
|
|
if (min_height < x.second.m_block_height)
|
|
|
|
{
|
|
|
|
payments.push_back(x.second);
|
|
|
|
}
|
2014-05-03 19:19:43 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2015-01-10 21:32:08 +02:00
|
|
|
void wallet2::get_payments(std::list<std::pair<crypto::hash,wallet2::payment_details>>& payments, uint64_t min_height) const
|
|
|
|
{
|
|
|
|
auto range = std::make_pair(m_payments.begin(), m_payments.end());
|
|
|
|
std::for_each(range.first, range.second, [&payments, &min_height](const payment_container::value_type& x) {
|
|
|
|
if (min_height < x.second.m_block_height)
|
|
|
|
{
|
|
|
|
payments.push_back(x);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-03-04 00:07:58 +02:00
|
|
|
bool wallet2::is_transfer_unlocked(const transfer_details& td) const
|
|
|
|
{
|
|
|
|
if(!is_tx_spendtime_unlocked(td.m_tx.unlock_time))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(td.m_block_height + DEFAULT_TX_SPENDABLE_AGE > m_blockchain.size())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
bool wallet2::is_tx_spendtime_unlocked(uint64_t unlock_time) const
|
|
|
|
{
|
|
|
|
if(unlock_time < CRYPTONOTE_MAX_BLOCK_NUMBER)
|
|
|
|
{
|
|
|
|
//interpret as block index
|
|
|
|
if(m_blockchain.size()-1 + CRYPTONOTE_LOCKED_TX_ALLOWED_DELTA_BLOCKS >= unlock_time)
|
|
|
|
return true;
|
|
|
|
else
|
|
|
|
return false;
|
|
|
|
}else
|
|
|
|
{
|
|
|
|
//interpret as time
|
|
|
|
uint64_t current_time = static_cast<uint64_t>(time(NULL));
|
|
|
|
if(current_time + CRYPTONOTE_LOCKED_TX_ALLOWED_DELTA_SECONDS >= unlock_time)
|
|
|
|
return true;
|
|
|
|
else
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
namespace
|
|
|
|
{
|
|
|
|
template<typename T>
|
|
|
|
T pop_random_value(std::vector<T>& vec)
|
|
|
|
{
|
|
|
|
CHECK_AND_ASSERT_MES(!vec.empty(), T(), "Vector must be non-empty");
|
|
|
|
|
|
|
|
size_t idx = crypto::rand<size_t>() % vec.size();
|
|
|
|
T res = vec[idx];
|
|
|
|
if (idx + 1 != vec.size())
|
|
|
|
{
|
|
|
|
vec[idx] = vec.back();
|
|
|
|
}
|
|
|
|
vec.resize(vec.size() - 1);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-06-13 21:05:15 +03:00
|
|
|
// Select random input sources for transaction.
|
|
|
|
// returns:
|
|
|
|
// direct return: amount of money found
|
|
|
|
// modified reference: selected_transfers, a list of iterators/indices of input sources
|
2014-03-20 13:46:11 +02:00
|
|
|
uint64_t wallet2::select_transfers(uint64_t needed_money, bool add_dust, uint64_t dust, std::list<transfer_container::iterator>& selected_transfers)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
std::vector<size_t> unused_transfers_indices;
|
|
|
|
std::vector<size_t> unused_dust_indices;
|
2014-06-13 21:05:15 +03:00
|
|
|
|
|
|
|
// aggregate sources available for transfers
|
|
|
|
// if dust needed, take dust from only one source (so require source has at least dust amount)
|
2014-03-04 00:07:58 +02:00
|
|
|
for (size_t i = 0; i < m_transfers.size(); ++i)
|
|
|
|
{
|
|
|
|
const transfer_details& td = m_transfers[i];
|
|
|
|
if (!td.m_spent && is_transfer_unlocked(td))
|
|
|
|
{
|
|
|
|
if (dust < td.amount())
|
|
|
|
unused_transfers_indices.push_back(i);
|
|
|
|
else
|
|
|
|
unused_dust_indices.push_back(i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-20 13:46:11 +02:00
|
|
|
bool select_one_dust = add_dust && !unused_dust_indices.empty();
|
2014-03-04 00:07:58 +02:00
|
|
|
uint64_t found_money = 0;
|
|
|
|
while (found_money < needed_money && (!unused_transfers_indices.empty() || !unused_dust_indices.empty()))
|
|
|
|
{
|
|
|
|
size_t idx;
|
2014-03-20 13:46:11 +02:00
|
|
|
if (select_one_dust)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-03-20 13:46:11 +02:00
|
|
|
idx = pop_random_value(unused_dust_indices);
|
|
|
|
select_one_dust = false;
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2014-03-20 13:46:11 +02:00
|
|
|
idx = !unused_transfers_indices.empty() ? pop_random_value(unused_transfers_indices) : pop_random_value(unused_dust_indices);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
transfer_container::iterator it = m_transfers.begin() + idx;
|
|
|
|
selected_transfers.push_back(it);
|
|
|
|
found_money += it->amount();
|
|
|
|
}
|
|
|
|
|
|
|
|
return found_money;
|
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::add_unconfirmed_tx(const cryptonote::transaction& tx, uint64_t change_amount)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-04-02 19:00:17 +03:00
|
|
|
unconfirmed_transfer_details& utd = m_unconfirmed_txs[cryptonote::get_transaction_hash(tx)];
|
|
|
|
utd.m_change = change_amount;
|
|
|
|
utd.m_sent_time = time(NULL);
|
|
|
|
utd.m_tx = tx;
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-09-18 00:26:51 +03:00
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::transfer(const std::vector<cryptonote::tx_destination_entry>& dsts, size_t fake_outputs_count,
|
2014-06-16 03:36:44 +03:00
|
|
|
uint64_t unlock_time, uint64_t fee, const std::vector<uint8_t>& extra, cryptonote::transaction& tx, pending_tx& ptx)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
2014-11-09 12:53:29 +02:00
|
|
|
transfer(dsts, fake_outputs_count, unlock_time, fee, extra, detail::digit_split_strategy, tx_dust_policy(::config::DEFAULT_DUST_THRESHOLD), tx, ptx);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-04-02 19:00:17 +03:00
|
|
|
void wallet2::transfer(const std::vector<cryptonote::tx_destination_entry>& dsts, size_t fake_outputs_count,
|
2014-05-03 19:19:43 +03:00
|
|
|
uint64_t unlock_time, uint64_t fee, const std::vector<uint8_t>& extra)
|
2014-03-04 00:07:58 +02:00
|
|
|
{
|
|
|
|
cryptonote::transaction tx;
|
2014-06-16 03:36:44 +03:00
|
|
|
pending_tx ptx;
|
|
|
|
transfer(dsts, fake_outputs_count, unlock_time, fee, extra, tx, ptx);
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|
2014-06-18 01:15:21 +03:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
// split_amounts(vector<cryptonote::tx_destination_entry> dsts, size_t num_splits)
|
|
|
|
//
|
|
|
|
// split amount for each dst in dsts into num_splits parts
|
|
|
|
// and make num_splits new vector<crypt...> instances to hold these new amounts
|
|
|
|
std::vector<std::vector<cryptonote::tx_destination_entry>> split_amounts(
|
|
|
|
std::vector<cryptonote::tx_destination_entry> dsts, size_t num_splits)
|
|
|
|
{
|
|
|
|
std::vector<std::vector<cryptonote::tx_destination_entry>> retVal;
|
|
|
|
|
|
|
|
if (num_splits <= 1)
|
|
|
|
{
|
|
|
|
retVal.push_back(dsts);
|
|
|
|
return retVal;
|
|
|
|
}
|
|
|
|
|
|
|
|
// for each split required
|
|
|
|
for (size_t i=0; i < num_splits; i++)
|
|
|
|
{
|
|
|
|
std::vector<cryptonote::tx_destination_entry> new_dsts;
|
|
|
|
|
|
|
|
// for each destination
|
|
|
|
for (size_t j=0; j < dsts.size(); j++)
|
|
|
|
{
|
|
|
|
cryptonote::tx_destination_entry de;
|
|
|
|
uint64_t amount;
|
|
|
|
|
|
|
|
amount = dsts[j].amount;
|
|
|
|
amount = amount / num_splits;
|
|
|
|
|
|
|
|
// if last split, add remainder
|
|
|
|
if (i + 1 == num_splits)
|
|
|
|
{
|
|
|
|
amount += dsts[j].amount % num_splits;
|
|
|
|
}
|
|
|
|
|
|
|
|
de.addr = dsts[j].addr;
|
|
|
|
de.amount = amount;
|
|
|
|
|
|
|
|
new_dsts.push_back(de);
|
|
|
|
}
|
|
|
|
|
|
|
|
retVal.push_back(new_dsts);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retVal;
|
|
|
|
}
|
|
|
|
} // anonymous namespace
|
|
|
|
|
2014-09-18 00:26:51 +03:00
|
|
|
/**
|
|
|
|
* @brief gets a monero address from the TXT record of a DNS entry
|
|
|
|
*
|
|
|
|
* gets the monero address from the TXT record of the DNS entry associated
|
|
|
|
* with <url>. If this lookup fails, or the TXT record does not contain an
|
|
|
|
* XMR address in the correct format, returns an empty string. <dnssec_valid>
|
|
|
|
* will be set true or false according to whether or not the DNS query passes
|
|
|
|
* DNSSEC validation.
|
|
|
|
*
|
|
|
|
* @param url the url to look up
|
|
|
|
* @param dnssec_valid return-by-reference for DNSSEC status of query
|
|
|
|
*
|
|
|
|
* @return a monero address (as a string) or an empty string
|
|
|
|
*/
|
2014-09-18 00:38:54 +03:00
|
|
|
std::vector<std::string> wallet2::addresses_from_url(const std::string& url, bool& dnssec_valid)
|
2014-09-18 00:26:51 +03:00
|
|
|
{
|
2014-09-18 00:38:54 +03:00
|
|
|
std::vector<std::string> addresses;
|
|
|
|
// get txt records
|
2014-09-25 07:14:22 +03:00
|
|
|
bool dnssec_available, dnssec_isvalid;
|
2015-05-19 12:33:30 +03:00
|
|
|
std::string oa_addr = tools::DNSResolver::instance().get_dns_format_from_oa_address(url);
|
|
|
|
auto records = tools::DNSResolver::instance().get_txt_record(oa_addr, dnssec_available, dnssec_isvalid);
|
2014-09-25 07:14:22 +03:00
|
|
|
|
|
|
|
// TODO: update this to allow for conveying that dnssec was not available
|
|
|
|
if (dnssec_available && dnssec_isvalid)
|
|
|
|
{
|
|
|
|
dnssec_valid = true;
|
|
|
|
}
|
|
|
|
else dnssec_valid = false;
|
2014-09-18 00:38:54 +03:00
|
|
|
|
|
|
|
// for each txt record, try to find a monero address in it.
|
|
|
|
for (auto& rec : records)
|
2014-09-18 00:26:51 +03:00
|
|
|
{
|
2014-09-18 00:38:54 +03:00
|
|
|
std::string addr = address_from_txt_record(rec);
|
|
|
|
if (addr.size())
|
|
|
|
{
|
|
|
|
addresses.push_back(addr);
|
|
|
|
}
|
2014-09-18 00:26:51 +03:00
|
|
|
}
|
2014-09-18 00:38:54 +03:00
|
|
|
|
|
|
|
return addresses;
|
2014-09-18 00:26:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-09-18 00:38:54 +03:00
|
|
|
// TODO: parse the string in a less stupid way, probably with regex
|
2014-09-18 00:26:51 +03:00
|
|
|
std::string wallet2::address_from_txt_record(const std::string& s)
|
|
|
|
{
|
|
|
|
// make sure the txt record has "oa1:xmr" and find it
|
|
|
|
auto pos = s.find("oa1:xmr");
|
|
|
|
|
|
|
|
// search from there to find "recipient_address="
|
|
|
|
pos = s.find("recipient_address=", pos);
|
|
|
|
|
|
|
|
pos += 18; // move past "recipient_address="
|
|
|
|
|
|
|
|
// find the next semicolon
|
|
|
|
auto pos2 = s.find(";", pos);
|
|
|
|
if (pos2 != std::string::npos)
|
|
|
|
{
|
|
|
|
// length of address == 95, we can at least validate that much here
|
|
|
|
if (pos2 - pos == 95)
|
|
|
|
{
|
|
|
|
return s.substr(pos, 95);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
2014-03-04 00:07:58 +02:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
2014-06-16 03:36:44 +03:00
|
|
|
// take a pending tx and actually send it to the daemon
|
|
|
|
void wallet2::commit_tx(pending_tx& ptx)
|
|
|
|
{
|
|
|
|
using namespace cryptonote;
|
|
|
|
COMMAND_RPC_SEND_RAW_TX::request req;
|
|
|
|
req.tx_as_hex = epee::string_tools::buff_to_hex_nodelimer(tx_to_blob(ptx.tx));
|
|
|
|
COMMAND_RPC_SEND_RAW_TX::response daemon_send_resp;
|
|
|
|
bool r = epee::net_utils::invoke_http_json_remote_command2(m_daemon_address + "/sendrawtransaction", req, daemon_send_resp, m_http_client, 200000);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::no_connection_to_daemon, "sendrawtransaction");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(daemon_send_resp.status == CORE_RPC_STATUS_BUSY, error::daemon_busy, "sendrawtransaction");
|
|
|
|
THROW_WALLET_EXCEPTION_IF(daemon_send_resp.status != CORE_RPC_STATUS_OK, error::tx_rejected, ptx.tx, daemon_send_resp.status);
|
|
|
|
|
|
|
|
add_unconfirmed_tx(ptx.tx, ptx.change_dts.amount);
|
|
|
|
|
|
|
|
LOG_PRINT_L2("transaction " << get_transaction_hash(ptx.tx) << " generated ok and sent to daemon, key_images: [" << ptx.key_images << "]");
|
|
|
|
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it, ptx.selected_transfers)
|
|
|
|
it->m_spent = true;
|
|
|
|
|
|
|
|
LOG_PRINT_L0("Transaction successfully sent. <" << get_transaction_hash(ptx.tx) << ">" << ENDL
|
2014-06-18 01:15:21 +03:00
|
|
|
<< "Commission: " << print_money(ptx.fee+ptx.dust) << " (dust: " << print_money(ptx.dust) << ")" << ENDL
|
|
|
|
<< "Balance: " << print_money(balance()) << ENDL
|
|
|
|
<< "Unlocked: " << print_money(unlocked_balance()) << ENDL
|
|
|
|
<< "Please, wait for confirmation for your balance to be unlocked.");
|
|
|
|
}
|
|
|
|
|
|
|
|
void wallet2::commit_tx(std::vector<pending_tx>& ptx_vector)
|
|
|
|
{
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
commit_tx(ptx);
|
|
|
|
}
|
2014-06-16 03:36:44 +03:00
|
|
|
}
|
|
|
|
|
2014-06-18 01:15:21 +03:00
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
// separated the call(s) to wallet2::transfer into their own function
|
|
|
|
//
|
|
|
|
// this function will make multiple calls to wallet2::transfer if multiple
|
|
|
|
// transactions will be required
|
2014-11-09 12:53:29 +02:00
|
|
|
std::vector<wallet2::pending_tx> wallet2::create_transactions(std::vector<cryptonote::tx_destination_entry> dsts, const size_t fake_outs_count, const uint64_t unlock_time, const uint64_t fee_UNUSED, const std::vector<uint8_t> extra)
|
2014-06-18 01:15:21 +03:00
|
|
|
{
|
|
|
|
|
|
|
|
// failsafe split attempt counter
|
|
|
|
size_t attempt_count = 0;
|
|
|
|
|
|
|
|
for(attempt_count = 1; ;attempt_count++)
|
|
|
|
{
|
2015-06-18 00:00:04 +03:00
|
|
|
size_t num_tx = 0.5 + pow(1.7,attempt_count-1);
|
|
|
|
|
|
|
|
auto split_values = split_amounts(dsts, num_tx);
|
2014-06-18 01:15:21 +03:00
|
|
|
|
|
|
|
// Throw if split_amounts comes back with a vector of size different than it should
|
2015-06-18 00:00:04 +03:00
|
|
|
if (split_values.size() != num_tx)
|
2014-06-18 01:15:21 +03:00
|
|
|
{
|
|
|
|
throw std::runtime_error("Splitting transactions returned a number of potential tx not equal to what was requested");
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<pending_tx> ptx_vector;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
// for each new destination vector (i.e. for each new tx)
|
|
|
|
for (auto & dst_vector : split_values)
|
|
|
|
{
|
|
|
|
cryptonote::transaction tx;
|
|
|
|
pending_tx ptx;
|
2014-10-02 23:44:55 +03:00
|
|
|
|
|
|
|
// loop until fee is met without increasing tx size to next KB boundary.
|
|
|
|
uint64_t needed_fee = 0;
|
|
|
|
do
|
|
|
|
{
|
2014-11-03 21:35:48 +02:00
|
|
|
transfer(dst_vector, fake_outs_count, unlock_time, needed_fee, extra, tx, ptx);
|
2014-10-02 23:44:55 +03:00
|
|
|
auto txBlob = t_serializable_object_to_blob(ptx.tx);
|
|
|
|
uint64_t txSize = txBlob.size();
|
|
|
|
uint64_t numKB = txSize / 1024;
|
|
|
|
if (txSize % 1024)
|
|
|
|
{
|
|
|
|
numKB++;
|
|
|
|
}
|
|
|
|
needed_fee = numKB * FEE_PER_KB;
|
|
|
|
} while (ptx.fee < needed_fee);
|
|
|
|
|
2014-06-18 01:15:21 +03:00
|
|
|
ptx_vector.push_back(ptx);
|
|
|
|
|
|
|
|
// mark transfers to be used as "spent"
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it, ptx.selected_transfers)
|
|
|
|
it->m_spent = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if we made it this far, we've selected our transactions. committing them will mark them spent,
|
|
|
|
// so this is a failsafe in case they don't go through
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// if we made it this far, we're OK to actually send the transactions
|
|
|
|
return ptx_vector;
|
|
|
|
|
|
|
|
}
|
|
|
|
// only catch this here, other exceptions need to pass through to the calling function
|
|
|
|
catch (const tools::error::tx_too_big& e)
|
|
|
|
{
|
|
|
|
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
2015-05-30 11:13:52 +03:00
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if (attempt_count >= MAX_SPLIT_ATTEMPTS)
|
|
|
|
{
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
// in case of some other exception, make sure any tx in queue are marked unspent again
|
|
|
|
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t wallet2::unlocked_dust_balance(const tx_dust_policy &dust_policy) const
|
|
|
|
{
|
|
|
|
uint64_t money = 0;
|
|
|
|
std::list<transfer_container::iterator> selected_transfers;
|
|
|
|
for (transfer_container::const_iterator i = m_transfers.begin(); i != m_transfers.end(); ++i)
|
|
|
|
{
|
|
|
|
const transfer_details& td = *i;
|
|
|
|
if (!td.m_spent && td.amount() < dust_policy.dust_threshold && is_transfer_unlocked(td))
|
|
|
|
{
|
|
|
|
money += td.amount();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return money;
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T>
|
|
|
|
void wallet2::transfer_dust(size_t num_outputs, uint64_t unlock_time, uint64_t needed_fee, T destination_split_strategy, const tx_dust_policy& dust_policy, const std::vector<uint8_t> &extra, cryptonote::transaction& tx, pending_tx &ptx)
|
|
|
|
{
|
|
|
|
using namespace cryptonote;
|
|
|
|
|
|
|
|
// select all dust inputs for transaction
|
|
|
|
// throw if there are none
|
|
|
|
uint64_t money = 0;
|
|
|
|
std::list<transfer_container::iterator> selected_transfers;
|
|
|
|
for (transfer_container::iterator i = m_transfers.begin(); i != m_transfers.end(); ++i)
|
|
|
|
{
|
|
|
|
const transfer_details& td = *i;
|
|
|
|
if (!td.m_spent && td.amount() < dust_policy.dust_threshold && is_transfer_unlocked(td))
|
|
|
|
{
|
|
|
|
selected_transfers.push_back (i);
|
|
|
|
money += td.amount();
|
|
|
|
if (selected_transfers.size() >= num_outputs)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// we don't allow no output to self, easier, but one may want to burn the dust if = fee
|
|
|
|
THROW_WALLET_EXCEPTION_IF(money <= needed_fee, error::not_enough_money, money, needed_fee, needed_fee);
|
|
|
|
|
|
|
|
typedef cryptonote::tx_source_entry::output_entry tx_output_entry;
|
|
|
|
|
|
|
|
//prepare inputs
|
|
|
|
size_t i = 0;
|
|
|
|
std::vector<cryptonote::tx_source_entry> sources;
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it, selected_transfers)
|
|
|
|
{
|
|
|
|
sources.resize(sources.size()+1);
|
|
|
|
cryptonote::tx_source_entry& src = sources.back();
|
|
|
|
transfer_details& td = *it;
|
|
|
|
src.amount = td.amount();
|
|
|
|
|
|
|
|
//paste real transaction to the random index
|
|
|
|
auto it_to_insert = std::find_if(src.outputs.begin(), src.outputs.end(), [&](const tx_output_entry& a)
|
|
|
|
{
|
|
|
|
return a.first >= td.m_global_output_index;
|
|
|
|
});
|
|
|
|
tx_output_entry real_oe;
|
|
|
|
real_oe.first = td.m_global_output_index;
|
|
|
|
real_oe.second = boost::get<txout_to_key>(td.m_tx.vout[td.m_internal_output_index].target).key;
|
|
|
|
auto interted_it = src.outputs.insert(it_to_insert, real_oe);
|
|
|
|
src.real_out_tx_key = get_tx_pub_key_from_extra(td.m_tx);
|
|
|
|
src.real_output = interted_it - src.outputs.begin();
|
|
|
|
src.real_output_in_tx_index = td.m_internal_output_index;
|
|
|
|
detail::print_source_entry(src);
|
|
|
|
++i;
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::tx_destination_entry change_dts = AUTO_VAL_INIT(change_dts);
|
|
|
|
|
|
|
|
std::vector<cryptonote::tx_destination_entry> dsts;
|
|
|
|
uint64_t money_back = money - needed_fee;
|
|
|
|
if (dust_policy.dust_threshold > 0)
|
|
|
|
money_back = money_back - money_back % dust_policy.dust_threshold;
|
|
|
|
dsts.push_back(cryptonote::tx_destination_entry(money_back, m_account_public_address));
|
|
|
|
uint64_t dust = 0;
|
|
|
|
std::vector<cryptonote::tx_destination_entry> splitted_dsts;
|
|
|
|
destination_split_strategy(dsts, change_dts, dust_policy.dust_threshold, splitted_dsts, dust);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(dust_policy.dust_threshold < dust, error::wallet_internal_error, "invalid dust value: dust = " +
|
|
|
|
std::to_string(dust) + ", dust_threshold = " + std::to_string(dust_policy.dust_threshold));
|
|
|
|
|
|
|
|
bool r = cryptonote::construct_tx(m_account.get_keys(), sources, splitted_dsts, extra, tx, unlock_time);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!r, error::tx_not_constructed, sources, splitted_dsts, unlock_time, m_testnet);
|
|
|
|
THROW_WALLET_EXCEPTION_IF(m_upper_transaction_size_limit <= get_object_blobsize(tx), error::tx_too_big, tx, m_upper_transaction_size_limit);
|
|
|
|
|
|
|
|
std::string key_images;
|
|
|
|
bool all_are_txin_to_key = std::all_of(tx.vin.begin(), tx.vin.end(), [&](const txin_v& s_e) -> bool
|
|
|
|
{
|
|
|
|
CHECKED_GET_SPECIFIC_VARIANT(s_e, const txin_to_key, in, false);
|
|
|
|
key_images += boost::to_string(in.k_image) + " ";
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
THROW_WALLET_EXCEPTION_IF(!all_are_txin_to_key, error::unexpected_txin_type, tx);
|
|
|
|
|
|
|
|
ptx.key_images = key_images;
|
|
|
|
ptx.fee = money - money_back;
|
|
|
|
ptx.dust = dust;
|
|
|
|
ptx.tx = tx;
|
|
|
|
ptx.change_dts = change_dts;
|
|
|
|
ptx.selected_transfers = selected_transfers;
|
|
|
|
}
|
|
|
|
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
std::vector<wallet2::pending_tx> wallet2::create_dust_sweep_transactions()
|
|
|
|
{
|
|
|
|
tx_dust_policy dust_policy(::config::DEFAULT_DUST_THRESHOLD);
|
|
|
|
|
|
|
|
size_t num_dust_outputs = 0;
|
|
|
|
for (transfer_container::const_iterator i = m_transfers.begin(); i != m_transfers.end(); ++i)
|
|
|
|
{
|
|
|
|
const transfer_details& td = *i;
|
|
|
|
if (!td.m_spent && td.amount() < dust_policy.dust_threshold && is_transfer_unlocked(td))
|
|
|
|
{
|
|
|
|
num_dust_outputs++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// failsafe split attempt counter
|
|
|
|
size_t attempt_count = 0;
|
|
|
|
|
|
|
|
for(attempt_count = 1; ;attempt_count++)
|
|
|
|
{
|
2015-06-17 23:31:16 +03:00
|
|
|
size_t num_tx = 0.5 + pow(1.7,attempt_count-1);
|
|
|
|
size_t num_outputs_per_tx = (num_dust_outputs + num_tx - 1) / num_tx;
|
2015-05-30 11:13:52 +03:00
|
|
|
|
|
|
|
std::vector<pending_tx> ptx_vector;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
// for each new tx
|
2015-06-17 23:31:16 +03:00
|
|
|
for (size_t i=0; i<num_tx;++i)
|
2015-05-30 11:13:52 +03:00
|
|
|
{
|
|
|
|
cryptonote::transaction tx;
|
|
|
|
pending_tx ptx;
|
|
|
|
std::vector<uint8_t> extra;
|
|
|
|
|
|
|
|
// loop until fee is met without increasing tx size to next KB boundary.
|
|
|
|
uint64_t needed_fee = 0;
|
|
|
|
if (1)
|
|
|
|
{
|
|
|
|
transfer_dust(num_outputs_per_tx, (uint64_t)0 /* unlock_time */, 0, detail::digit_split_strategy, dust_policy, extra, tx, ptx);
|
|
|
|
auto txBlob = t_serializable_object_to_blob(ptx.tx);
|
|
|
|
uint64_t txSize = txBlob.size();
|
|
|
|
uint64_t numKB = txSize / 1024;
|
|
|
|
if (txSize % 1024)
|
|
|
|
{
|
|
|
|
numKB++;
|
|
|
|
}
|
|
|
|
needed_fee = numKB * FEE_PER_KB;
|
|
|
|
|
|
|
|
// reroll the tx with the actual amount minus the fee
|
|
|
|
// if there's not enough for the fee, it'll throw
|
|
|
|
transfer_dust(num_outputs_per_tx, (uint64_t)0 /* unlock_time */, needed_fee, detail::digit_split_strategy, dust_policy, extra, tx, ptx);
|
|
|
|
txBlob = t_serializable_object_to_blob(ptx.tx);
|
|
|
|
}
|
|
|
|
|
|
|
|
ptx_vector.push_back(ptx);
|
|
|
|
|
|
|
|
// mark transfers to be used as "spent"
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it, ptx.selected_transfers)
|
|
|
|
it->m_spent = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if we made it this far, we've selected our transactions. committing them will mark them spent,
|
|
|
|
// so this is a failsafe in case they don't go through
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// if we made it this far, we're OK to actually send the transactions
|
|
|
|
return ptx_vector;
|
|
|
|
|
|
|
|
}
|
|
|
|
// only catch this here, other exceptions need to pass through to the calling function
|
|
|
|
catch (const tools::error::tx_too_big& e)
|
|
|
|
{
|
|
|
|
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
2014-06-18 01:15:21 +03:00
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if (attempt_count >= MAX_SPLIT_ATTEMPTS)
|
|
|
|
{
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
// in case of some other exception, make sure any tx in queue are marked unspent again
|
|
|
|
|
|
|
|
// unmark pending tx transfers as spent
|
|
|
|
for (auto & ptx : ptx_vector)
|
|
|
|
{
|
|
|
|
// mark transfers to be used as not spent
|
|
|
|
BOOST_FOREACH(transfer_container::iterator it2, ptx.selected_transfers)
|
|
|
|
it2->m_spent = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-07-16 20:30:15 +03:00
|
|
|
|
|
|
|
//----------------------------------------------------------------------------------------------------
|
|
|
|
void wallet2::generate_genesis(cryptonote::block& b) {
|
2014-09-08 22:09:59 +03:00
|
|
|
if (m_testnet)
|
|
|
|
{
|
|
|
|
cryptonote::generate_genesis_block(b, config::testnet::GENESIS_TX, config::testnet::GENESIS_NONCE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
cryptonote::generate_genesis_block(b, config::GENESIS_TX, config::GENESIS_NONCE);
|
2014-07-16 20:30:15 +03:00
|
|
|
}
|
|
|
|
}
|
2014-03-04 00:07:58 +02:00
|
|
|
}
|