// Copyright (c) 2014-2022, The Monero Project // // All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, are // permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this list of // conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, this list // of conditions and the following disclaimer in the documentation and/or other // materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors may be // used to endorse or promote products derived from this software without specific // prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // // Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers #pragma once #include #include #include #if BOOST_VERSION >= 107400 #include #endif #include #include #include #include #include #include #include "include_base_utils.h" #include "cryptonote_basic/account.h" #include "cryptonote_basic/account_boost_serialization.h" #include "cryptonote_basic/cryptonote_basic_impl.h" #include "net/http.h" #include "storages/http_abstract_invoke.h" #include "rpc/core_rpc_server_commands_defs.h" #include "cryptonote_basic/cryptonote_format_utils.h" #include "cryptonote_core/cryptonote_tx_utils.h" #include "common/unordered_containers_boost_serialization.h" #include "common/util.h" #include "crypto/chacha.h" #include "crypto/hash.h" #include "ringct/rctTypes.h" #include "ringct/rctOps.h" #include "checkpoints/checkpoints.h" #include "serialization/crypto.h" #include "serialization/string.h" #include "serialization/pair.h" #include "serialization/tuple.h" #include "serialization/containers.h" #include "wallet_errors.h" #include "common/password.h" #include "node_rpc_proxy.h" #include "message_store.h" #include "wallet_light_rpc.h" #include "wallet_rpc_helpers.h" #undef MONERO_DEFAULT_LOG_CATEGORY #define MONERO_DEFAULT_LOG_CATEGORY "wallet.wallet2" #define THROW_ON_RPC_RESPONSE_ERROR(r, error, res, method, ...) \ do { \ handle_payment_changes(res, std::integral_constant::Has>()); \ throw_on_rpc_response_error(r, error, res.status, method); \ THROW_WALLET_EXCEPTION_IF(res.status != CORE_RPC_STATUS_OK, ## __VA_ARGS__); \ } while(0) #define THROW_ON_RPC_RESPONSE_ERROR_GENERIC(r, err, res, method) \ THROW_ON_RPC_RESPONSE_ERROR(r, err, res, method, tools::error::wallet_generic_rpc_error, method, res.status) class Serialization_portability_wallet_Test; class wallet_accessor_test; namespace tools { class ringdb; class wallet2; class Notify; class gamma_picker { public: uint64_t pick(); gamma_picker(const std::vector &rct_offsets); gamma_picker(const std::vector &rct_offsets, double shape, double scale); uint64_t get_num_rct_outs() const { return num_rct_outputs; } private: struct gamma_engine { typedef uint64_t result_type; static constexpr result_type min() { return 0; } static constexpr result_type max() { return std::numeric_limits::max(); } result_type operator()() { return crypto::rand(); } } engine; private: std::gamma_distribution gamma; const std::vector &rct_offsets; const uint64_t *begin, *end; uint64_t num_rct_outputs; double average_output_time; }; class wallet_keys_unlocker { public: wallet_keys_unlocker(wallet2 &w, const boost::optional &password); wallet_keys_unlocker(wallet2 &w, bool locked, const epee::wipeable_string &password); ~wallet_keys_unlocker(); private: wallet2 &w; bool locked; crypto::chacha_key key; static boost::mutex lockers_lock; static unsigned int lockers; }; class i_wallet2_callback { public: // Full wallet callbacks virtual void on_new_block(uint64_t height, const cryptonote::block& block) {} virtual void on_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, uint64_t burnt, const cryptonote::subaddress_index& subaddr_index, bool is_change, uint64_t unlock_time) {} virtual void on_unconfirmed_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, const cryptonote::subaddress_index& subaddr_index) {} virtual void on_money_spent(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& in_tx, uint64_t amount, const cryptonote::transaction& spend_tx, const cryptonote::subaddress_index& subaddr_index) {} virtual void on_skip_transaction(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx) {} virtual boost::optional on_get_password(const char *reason) { return boost::none; } // Light wallet callbacks virtual void on_lw_new_block(uint64_t height) {} virtual void on_lw_money_received(uint64_t height, const crypto::hash &txid, uint64_t amount) {} virtual void on_lw_unconfirmed_money_received(uint64_t height, const crypto::hash &txid, uint64_t amount) {} virtual void on_lw_money_spent(uint64_t height, const crypto::hash &txid, uint64_t amount) {} // Device callbacks virtual void on_device_button_request(uint64_t code) {} virtual void on_device_button_pressed() {} virtual boost::optional on_device_pin_request() { return boost::none; } virtual boost::optional on_device_passphrase_request(bool & on_device) { on_device = true; return boost::none; } virtual void on_device_progress(const hw::device_progress& event) {}; // Common callbacks virtual void on_pool_tx_removed(const crypto::hash &txid) {} virtual ~i_wallet2_callback() {} }; class wallet_device_callback : public hw::i_device_callback { public: wallet_device_callback(wallet2 * wallet): wallet(wallet) {}; void on_button_request(uint64_t code=0) override; void on_button_pressed() override; boost::optional on_pin_request() override; boost::optional on_passphrase_request(bool & on_device) override; void on_progress(const hw::device_progress& event) override; private: wallet2 * wallet; }; struct tx_dust_policy { uint64_t dust_threshold; bool add_to_fee; cryptonote::account_public_address addr_for_dust; tx_dust_policy(uint64_t a_dust_threshold = 0, bool an_add_to_fee = true, cryptonote::account_public_address an_addr_for_dust = cryptonote::account_public_address()) : dust_threshold(a_dust_threshold) , add_to_fee(an_add_to_fee) , addr_for_dust(an_addr_for_dust) { } }; class hashchain { public: hashchain(): m_genesis(crypto::null_hash), m_offset(0) {} size_t size() const { return m_blockchain.size() + m_offset; } size_t offset() const { return m_offset; } const crypto::hash &genesis() const { return m_genesis; } void push_back(const crypto::hash &hash) { if (m_offset == 0 && m_blockchain.empty()) m_genesis = hash; m_blockchain.push_back(hash); } bool is_in_bounds(size_t idx) const { return idx >= m_offset && idx < size(); } const crypto::hash &operator[](size_t idx) const { return m_blockchain[idx - m_offset]; } crypto::hash &operator[](size_t idx) { return m_blockchain[idx - m_offset]; } void crop(size_t height) { m_blockchain.resize(height - m_offset); } void clear() { m_offset = 0; m_blockchain.clear(); } bool empty() const { return m_blockchain.empty() && m_offset == 0; } void trim(size_t height) { while (height > m_offset && m_blockchain.size() > 1) { m_blockchain.pop_front(); ++m_offset; } m_blockchain.shrink_to_fit(); } void refill(const crypto::hash &hash) { m_blockchain.push_back(hash); --m_offset; } template inline void serialize(t_archive &a, const unsigned int ver) { a & m_offset; a & m_genesis; a & m_blockchain; } BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) VARINT_FIELD(m_offset) FIELD(m_genesis) FIELD(m_blockchain) END_SERIALIZE() private: size_t m_offset; crypto::hash m_genesis; std::deque m_blockchain; }; class wallet_keys_unlocker; class wallet2 { friend class ::Serialization_portability_wallet_Test; friend class ::wallet_accessor_test; friend class wallet_keys_unlocker; friend class wallet_device_callback; public: static constexpr const std::chrono::seconds rpc_timeout = std::chrono::minutes(3) + std::chrono::seconds(30); enum RefreshType { RefreshFull, RefreshOptimizeCoinbase, RefreshNoCoinbase, RefreshDefault = RefreshOptimizeCoinbase, }; enum AskPasswordType { AskPasswordNever = 0, AskPasswordOnAction = 1, AskPasswordToDecrypt = 2, }; enum BackgroundMiningSetupType { BackgroundMiningMaybe = 0, BackgroundMiningYes = 1, BackgroundMiningNo = 2, }; enum ExportFormat { Binary = 0, Ascii, }; static const char* tr(const char* str); static bool has_testnet_option(const boost::program_options::variables_map& vm); static bool has_stagenet_option(const boost::program_options::variables_map& vm); static std::string device_name_option(const boost::program_options::variables_map& vm); static std::string device_derivation_path_option(const boost::program_options::variables_map &vm); static void init_options(boost::program_options::options_description& desc_params); //! Uses stdin and stdout. Returns a wallet2 if no errors. static std::pair, password_container> make_from_json(const boost::program_options::variables_map& vm, bool unattended, const std::string& json_file, const std::function(const char *, bool)> &password_prompter); //! Uses stdin and stdout. Returns a wallet2 and password for `wallet_file` if no errors. static std::pair, password_container> make_from_file(const boost::program_options::variables_map& vm, bool unattended, const std::string& wallet_file, const std::function(const char *, bool)> &password_prompter); //! Uses stdin and stdout. Returns a wallet2 and password for wallet with no file if no errors. static std::pair, password_container> make_new(const boost::program_options::variables_map& vm, bool unattended, const std::function(const char *, bool)> &password_prompter); //! Just parses variables. static std::unique_ptr make_dummy(const boost::program_options::variables_map& vm, bool unattended, const std::function(const char *, bool)> &password_prompter); static bool verify_password(const std::string& keys_file_name, const epee::wipeable_string& password, bool no_spend_key, hw::device &hwdev, uint64_t kdf_rounds); static bool query_device(hw::device::device_type& device_type, const std::string& keys_file_name, const epee::wipeable_string& password, uint64_t kdf_rounds = 1); wallet2(cryptonote::network_type nettype = cryptonote::MAINNET, uint64_t kdf_rounds = 1, bool unattended = false, std::unique_ptr http_client_factory = std::unique_ptr(new net::http::client_factory())); ~wallet2(); struct multisig_info { struct LR { rct::key m_L; rct::key m_R; BEGIN_SERIALIZE_OBJECT() FIELD(m_L) FIELD(m_R) END_SERIALIZE() }; crypto::public_key m_signer; std::vector m_LR; std::vector m_partial_key_images; // one per key the participant has BEGIN_SERIALIZE_OBJECT() FIELD(m_signer) FIELD(m_LR) FIELD(m_partial_key_images) END_SERIALIZE() }; struct tx_scan_info_t { cryptonote::keypair in_ephemeral; crypto::key_image ki; rct::key mask; uint64_t amount; uint64_t money_transfered; bool error; boost::optional received; tx_scan_info_t(): amount(0), money_transfered(0), error(true) {} }; struct transfer_details { uint64_t m_block_height; cryptonote::transaction_prefix m_tx; crypto::hash m_txid; uint64_t m_internal_output_index; uint64_t m_global_output_index; bool m_spent; bool m_frozen; uint64_t m_spent_height; crypto::key_image m_key_image; //TODO: key_image stored twice :( rct::key m_mask; uint64_t m_amount; bool m_rct; bool m_key_image_known; bool m_key_image_request; // view wallets: we want to request it; cold wallets: it was requested uint64_t m_pk_index; cryptonote::subaddress_index m_subaddr_index; bool m_key_image_partial; std::vector m_multisig_k; std::vector m_multisig_info; // one per other participant std::vector> m_uses; bool is_rct() const { return m_rct; } uint64_t amount() const { return m_amount; } const crypto::public_key get_public_key() const { crypto::public_key output_public_key; THROW_WALLET_EXCEPTION_IF(m_tx.vout.size() <= m_internal_output_index, error::wallet_internal_error, "Too few outputs, outputs may be corrupted"); THROW_WALLET_EXCEPTION_IF(!get_output_public_key(m_tx.vout[m_internal_output_index], output_public_key), error::wallet_internal_error, "Unable to get output public key from output"); return output_public_key; }; BEGIN_SERIALIZE_OBJECT() FIELD(m_block_height) FIELD(m_tx) FIELD(m_txid) FIELD(m_internal_output_index) FIELD(m_global_output_index) FIELD(m_spent) FIELD(m_frozen) FIELD(m_spent_height) FIELD(m_key_image) FIELD(m_mask) FIELD(m_amount) FIELD(m_rct) FIELD(m_key_image_known) FIELD(m_key_image_request) FIELD(m_pk_index) FIELD(m_subaddr_index) FIELD(m_key_image_partial) FIELD(m_multisig_k) FIELD(m_multisig_info) FIELD(m_uses) END_SERIALIZE() }; struct exported_transfer_details { crypto::public_key m_pubkey; uint64_t m_internal_output_index; uint64_t m_global_output_index; crypto::public_key m_tx_pubkey; union { struct { uint8_t m_spent: 1; uint8_t m_frozen: 1; uint8_t m_rct: 1; uint8_t m_key_image_known: 1; uint8_t m_key_image_request: 1; // view wallets: we want to request it; cold wallets: it was requested uint8_t m_key_image_partial: 1; }; uint8_t flags; } m_flags; uint64_t m_amount; std::vector m_additional_tx_keys; uint32_t m_subaddr_index_major; uint32_t m_subaddr_index_minor; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(1) if (version < 1) return false; FIELD(m_pubkey) VARINT_FIELD(m_internal_output_index) VARINT_FIELD(m_global_output_index) FIELD(m_tx_pubkey) FIELD(m_flags.flags) VARINT_FIELD(m_amount) FIELD(m_additional_tx_keys) VARINT_FIELD(m_subaddr_index_major) VARINT_FIELD(m_subaddr_index_minor) END_SERIALIZE() }; typedef std::vector amounts_container; struct payment_details { crypto::hash m_tx_hash; uint64_t m_amount; amounts_container m_amounts; uint64_t m_fee; uint64_t m_block_height; uint64_t m_unlock_time; uint64_t m_timestamp; bool m_coinbase; cryptonote::subaddress_index m_subaddr_index; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) FIELD(m_tx_hash) VARINT_FIELD(m_amount) FIELD(m_amounts) VARINT_FIELD(m_fee) VARINT_FIELD(m_block_height) VARINT_FIELD(m_unlock_time) VARINT_FIELD(m_timestamp) FIELD(m_coinbase) FIELD(m_subaddr_index) END_SERIALIZE() }; struct address_tx : payment_details { bool m_mempool; bool m_incoming; }; struct pool_payment_details { payment_details m_pd; bool m_double_spend_seen; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) FIELD(m_pd) FIELD(m_double_spend_seen) END_SERIALIZE() }; struct unconfirmed_transfer_details { cryptonote::transaction_prefix m_tx; uint64_t m_amount_in; uint64_t m_amount_out; uint64_t m_change; time_t m_sent_time; std::vector m_dests; crypto::hash m_payment_id; enum { pending, pending_in_pool, failed } m_state; uint64_t m_timestamp; uint32_t m_subaddr_account; // subaddress account of your wallet to be used in this transfer std::set m_subaddr_indices; // set of address indices used as inputs in this transfer std::vector>> m_rings; // relative BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(1) FIELD(m_tx) VARINT_FIELD(m_amount_in) VARINT_FIELD(m_amount_out) VARINT_FIELD(m_change) VARINT_FIELD(m_sent_time) FIELD(m_dests) FIELD(m_payment_id) if (version >= 1) VARINT_FIELD(m_state) VARINT_FIELD(m_timestamp) VARINT_FIELD(m_subaddr_account) FIELD(m_subaddr_indices) FIELD(m_rings) END_SERIALIZE() }; struct confirmed_transfer_details { cryptonote::transaction_prefix m_tx; uint64_t m_amount_in; uint64_t m_amount_out; uint64_t m_change; uint64_t m_block_height; std::vector m_dests; crypto::hash m_payment_id; uint64_t m_timestamp; uint64_t m_unlock_time; uint32_t m_subaddr_account; // subaddress account of your wallet to be used in this transfer std::set m_subaddr_indices; // set of address indices used as inputs in this transfer std::vector>> m_rings; // relative confirmed_transfer_details(): m_amount_in(0), m_amount_out(0), m_change((uint64_t)-1), m_block_height(0), m_payment_id(crypto::null_hash), m_timestamp(0), m_unlock_time(0), m_subaddr_account((uint32_t)-1) {} confirmed_transfer_details(const unconfirmed_transfer_details &utd, uint64_t height): m_tx(utd.m_tx), m_amount_in(utd.m_amount_in), m_amount_out(utd.m_amount_out), m_change(utd.m_change), m_block_height(height), m_dests(utd.m_dests), m_payment_id(utd.m_payment_id), m_timestamp(utd.m_timestamp), m_unlock_time(utd.m_tx.unlock_time), m_subaddr_account(utd.m_subaddr_account), m_subaddr_indices(utd.m_subaddr_indices), m_rings(utd.m_rings) {} BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(1) if (version >= 1) FIELD(m_tx) VARINT_FIELD(m_amount_in) VARINT_FIELD(m_amount_out) VARINT_FIELD(m_change) VARINT_FIELD(m_block_height) FIELD(m_dests) FIELD(m_payment_id) VARINT_FIELD(m_timestamp) VARINT_FIELD(m_unlock_time) VARINT_FIELD(m_subaddr_account) FIELD(m_subaddr_indices) FIELD(m_rings) END_SERIALIZE() }; struct tx_construction_data { std::vector sources; cryptonote::tx_destination_entry change_dts; std::vector splitted_dsts; // split, includes change std::vector selected_transfers; std::vector extra; uint64_t unlock_time; bool use_rct; rct::RCTConfig rct_config; bool use_view_tags; std::vector dests; // original setup, does not include change uint32_t subaddr_account; // subaddress account of your wallet to be used in this transfer std::set subaddr_indices; // set of address indices used as inputs in this transfer enum construction_flags_ : uint8_t { _use_rct = 1 << 0, // 00000001 _use_view_tags = 1 << 1 // 00000010 // next flag = 1 << 2 // 00000100 // ... // final flag = 1 << 7 // 10000000 }; uint8_t construction_flags; BEGIN_SERIALIZE_OBJECT() FIELD(sources) FIELD(change_dts) FIELD(splitted_dsts) FIELD(selected_transfers) FIELD(extra) FIELD(unlock_time) // converted `use_rct` field into construction_flags when view tags // were introduced to maintain backwards compatibility if (!typename Archive::is_saving()) { FIELD_N("use_rct", construction_flags) use_rct = (construction_flags & _use_rct) > 0; use_view_tags = (construction_flags & _use_view_tags) > 0; } else { construction_flags = 0; if (use_rct) construction_flags ^= _use_rct; if (use_view_tags) construction_flags ^= _use_view_tags; FIELD_N("use_rct", construction_flags) } FIELD(rct_config) FIELD(dests) FIELD(subaddr_account) FIELD(subaddr_indices) END_SERIALIZE() }; typedef std::vector transfer_container; typedef serializable_unordered_multimap payment_container; struct multisig_sig { rct::rctSig sigs; std::unordered_set ignore; std::unordered_set used_L; std::unordered_set signing_keys; rct::multisig_out msout; rct::keyM total_alpha_G; rct::keyM total_alpha_H; rct::keyV c_0; rct::keyV s; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(1) if (version < 1) return false; FIELD(sigs) FIELD(ignore) FIELD(used_L) FIELD(signing_keys) FIELD(msout) FIELD(total_alpha_G) FIELD(total_alpha_H) FIELD(c_0) FIELD(s) END_SERIALIZE() }; // The convention for destinations is: // dests does not include change // splitted_dsts (in construction_data) does struct pending_tx { cryptonote::transaction tx; uint64_t dust, fee; bool dust_added_to_fee; cryptonote::tx_destination_entry change_dts; std::vector selected_transfers; std::string key_images; crypto::secret_key tx_key; std::vector additional_tx_keys; std::vector dests; std::vector multisig_sigs; crypto::secret_key multisig_tx_key_entropy; tx_construction_data construction_data; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(1) FIELD(tx) FIELD(dust) FIELD(fee) FIELD(dust_added_to_fee) FIELD(change_dts) FIELD(selected_transfers) FIELD(key_images) FIELD(tx_key) FIELD(additional_tx_keys) FIELD(dests) FIELD(construction_data) FIELD(multisig_sigs) if (version < 1) { multisig_tx_key_entropy = crypto::null_skey; return true; } FIELD(multisig_tx_key_entropy) END_SERIALIZE() }; // The term "Unsigned tx" is not really a tx since it's not signed yet. // It doesnt have tx hash, key and the integrated address is not separated into addr + payment id. struct unsigned_tx_set { std::vector txes; std::tuple transfers; std::tuple> new_transfers; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(2) FIELD(txes) if (version == 0) { std::pair v0_transfers; FIELD(v0_transfers); std::get<0>(transfers) = std::get<0>(v0_transfers); std::get<1>(transfers) = std::get<0>(v0_transfers) + std::get<1>(v0_transfers).size(); std::get<2>(transfers) = std::get<1>(v0_transfers); return true; } if (version == 1) { std::pair> v1_transfers; FIELD(v1_transfers); std::get<0>(new_transfers) = std::get<0>(v1_transfers); std::get<1>(new_transfers) = std::get<0>(v1_transfers) + std::get<1>(v1_transfers).size(); std::get<2>(new_transfers) = std::get<1>(v1_transfers); return true; } FIELD(new_transfers) END_SERIALIZE() }; struct signed_tx_set { std::vector ptx; std::vector key_images; serializable_unordered_map tx_key_images; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) FIELD(ptx) FIELD(key_images) FIELD(tx_key_images) END_SERIALIZE() }; struct multisig_tx_set { std::vector m_ptx; std::unordered_set m_signers; BEGIN_SERIALIZE_OBJECT() FIELD(m_ptx) FIELD(m_signers) END_SERIALIZE() }; struct keys_file_data { crypto::chacha_iv iv; std::string account_data; BEGIN_SERIALIZE_OBJECT() FIELD(iv) FIELD(account_data) END_SERIALIZE() }; struct cache_file_data { crypto::chacha_iv iv; std::string cache_data; BEGIN_SERIALIZE_OBJECT() FIELD(iv) FIELD(cache_data) END_SERIALIZE() }; // GUI Address book struct address_book_row { cryptonote::account_public_address m_address; crypto::hash8 m_payment_id; std::string m_description; bool m_is_subaddress; bool m_has_payment_id; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) FIELD(m_address) FIELD(m_payment_id) FIELD(m_description) FIELD(m_is_subaddress) FIELD(m_has_payment_id) END_SERIALIZE() }; struct reserve_proof_entry { crypto::hash txid; uint64_t index_in_tx; crypto::public_key shared_secret; crypto::key_image key_image; crypto::signature shared_secret_sig; crypto::signature key_image_sig; BEGIN_SERIALIZE_OBJECT() VERSION_FIELD(0) FIELD(txid) VARINT_FIELD(index_in_tx) FIELD(shared_secret) FIELD(key_image) FIELD(shared_secret_sig) FIELD(key_image_sig) END_SERIALIZE() }; typedef std::tuple get_outs_entry; struct parsed_block { crypto::hash hash; cryptonote::block block; std::vector txes; cryptonote::COMMAND_RPC_GET_BLOCKS_FAST::block_output_indices o_indices; bool error; }; struct is_out_data { crypto::public_key pkey; crypto::key_derivation derivation; std::vector> received; }; struct tx_cache_data { std::vector tx_extra_fields; std::vector primary; std::vector additional; bool empty() const { return tx_extra_fields.empty() && primary.empty() && additional.empty(); } }; struct detached_blockchain_data { hashchain detached_blockchain; size_t original_chain_size; std::unordered_set detached_tx_hashes; std::unordered_map> detached_confirmed_txs_dests; }; struct process_tx_entry_t { cryptonote::COMMAND_RPC_GET_TRANSACTIONS::entry tx_entry; cryptonote::transaction tx; crypto::hash tx_hash; }; struct tx_entry_data { std::vector tx_entries; uint64_t lowest_height; uint64_t highest_height; tx_entry_data(): lowest_height((uint64_t)-1), highest_height(0) {} }; /*! * \brief Generates a wallet or restores one. Assumes the multisig setup * has already completed for the provided multisig info. * \param wallet_ Name of wallet file * \param password Password of wallet file * \param multisig_data The multisig restore info and keys * \param create_address_file Whether to create an address file */ void generate(const std::string& wallet_, const epee::wipeable_string& password, const epee::wipeable_string& multisig_data, bool create_address_file = false); /*! * \brief Generates a wallet or restores one. * \param wallet_ Name of wallet file * \param password Password of wallet file * \param recovery_param If it is a restore, the recovery key * \param recover Whether it is a restore * \param two_random Whether it is a non-deterministic wallet * \param create_address_file Whether to create an address file * \return The secret key of the generated wallet */ crypto::secret_key generate(const std::string& wallet, const epee::wipeable_string& password, const crypto::secret_key& recovery_param = crypto::secret_key(), bool recover = false, bool two_random = false, bool create_address_file = false); /*! * \brief Creates a wallet from a public address and a spend/view secret key pair. * \param wallet_ Name of wallet file * \param password Password of wallet file * \param account_public_address The account's public address * \param spendkey spend secret key * \param viewkey view secret key * \param create_address_file Whether to create an address file */ void generate(const std::string& wallet, const epee::wipeable_string& password, const cryptonote::account_public_address &account_public_address, const crypto::secret_key& spendkey, const crypto::secret_key& viewkey, bool create_address_file = false); /*! * \brief Creates a watch only wallet from a public address and a view secret key. * \param wallet_ Name of wallet file * \param password Password of wallet file * \param account_public_address The account's public address * \param viewkey view secret key * \param create_address_file Whether to create an address file */ void generate(const std::string& wallet, const epee::wipeable_string& password, const cryptonote::account_public_address &account_public_address, const crypto::secret_key& viewkey = crypto::secret_key(), bool create_address_file = false); /*! * \brief Restore a wallet hold by an HW. * \param wallet_ Name of wallet file * \param password Password of wallet file * \param device_name name of HW to use * \param create_address_file Whether to create an address file */ void restore(const std::string& wallet_, const epee::wipeable_string& password, const std::string &device_name, bool create_address_file = false); /*! * \brief Creates a multisig wallet * \return empty if done, non empty if we need to send another string * to other participants */ std::string make_multisig(const epee::wipeable_string &password, const std::vector &kex_messages, const std::uint32_t threshold); /*! * \brief Increment the multisig key exchange round * \return empty if done, non empty if we need to send another string * to other participants */ std::string exchange_multisig_keys(const epee::wipeable_string &password, const std::vector &kex_messages, const bool force_update_use_with_caution = false); /*! * \brief Get initial message to start multisig key exchange (before 'make_multisig()' is called) * \return string to send to other participants */ std::string get_multisig_first_kex_msg() const; /*! * Export multisig info * This will generate and remember new k values */ cryptonote::blobdata export_multisig(); /*! * Import a set of multisig info from multisig partners * \return the number of inputs which were imported */ size_t import_multisig(std::vector info); /*! * \brief Rewrites to the wallet file for wallet upgrade (doesn't generate key, assumes it's already there) * \param wallet_name Name of wallet file (should exist) * \param password Password for wallet file */ void rewrite(const std::string& wallet_name, const epee::wipeable_string& password); void write_watch_only_wallet(const std::string& wallet_name, const epee::wipeable_string& password, std::string &new_keys_filename); void load(const std::string& wallet, const epee::wipeable_string& password, const std::string& keys_buf = "", const std::string& cache_buf = ""); void store(); /*! * \brief store_to Stores wallet to another file(s), deleting old ones * \param path Path to the wallet file (keys and address filenames will be generated based on this filename) * \param password Password that currently locks the wallet * \param force_rewrite_keys if true, always rewrite keys file * * Leave both "path" and "password" blank to restore the cache file to the current position in the disk * (which is the same as calling `store()`). If you want to store the wallet with a new password, * use the method `change_password()`. * * Normally the keys file is not overwritten when storing, except when force_rewrite_keys is true * or when `path` is a new wallet file. * * \throw error::invalid_password If storing keys file and old password is incorrect */ void store_to(const std::string &path, const epee::wipeable_string &password, bool force_rewrite_keys = false); /*! * \brief get_keys_file_data Get wallet keys data which can be stored to a wallet file. * \param password Password that currently locks the wallet * \param watch_only true to include only view key, false to include both spend and view keys * \return Encrypted wallet keys data which can be stored to a wallet file * \throw error::invalid_password if password does not match current wallet */ boost::optional get_keys_file_data(const epee::wipeable_string& password, bool watch_only); /*! * \brief get_cache_file_data Get wallet cache data which can be stored to a wallet file. * \return Encrypted wallet cache data which can be stored to a wallet file (using current password) */ boost::optional get_cache_file_data(); std::string path() const; /*! * \brief verifies given password is correct for default wallet keys file */ bool verify_password(const epee::wipeable_string& password); cryptonote::account_base& get_account(){return m_account;} const cryptonote::account_base& get_account()const{return m_account;} void encrypt_keys(const crypto::chacha_key &key); void encrypt_keys(const epee::wipeable_string &password); void decrypt_keys(const crypto::chacha_key &key); void decrypt_keys(const epee::wipeable_string &password); void set_refresh_from_block_height(uint64_t height) {m_refresh_from_block_height = height;} uint64_t get_refresh_from_block_height() const {return m_refresh_from_block_height;} void explicit_refresh_from_block_height(bool expl) {m_explicit_refresh_from_block_height = expl;} bool explicit_refresh_from_block_height() const {return m_explicit_refresh_from_block_height;} void max_reorg_depth(uint64_t depth) {m_max_reorg_depth = depth;} uint64_t max_reorg_depth() const {return m_max_reorg_depth;} bool deinit(); bool init(std::string daemon_address = "http://localhost:8080", boost::optional daemon_login = boost::none, const std::string &proxy = "", uint64_t upper_transaction_weight_limit = 0, bool trusted_daemon = true, epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect); bool set_daemon(std::string daemon_address = "http://localhost:8080", boost::optional daemon_login = boost::none, bool trusted_daemon = true, epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect); bool set_proxy(const std::string &address); void stop() { m_run.store(false, std::memory_order_relaxed); m_message_store.stop(); } i_wallet2_callback* callback() const { return m_callback; } void callback(i_wallet2_callback* callback) { m_callback = callback; } bool is_trusted_daemon() const { return m_trusted_daemon; } void set_trusted_daemon(bool trusted) { m_trusted_daemon = trusted; } /*! * \brief Checks if deterministic wallet */ bool is_deterministic() const; bool get_seed(epee::wipeable_string& electrum_words, const epee::wipeable_string &passphrase = epee::wipeable_string()) const; /*! * \brief Checks if light wallet. A light wallet sends view key to a server where the blockchain is scanned. */ bool light_wallet() const { return m_light_wallet; } void set_light_wallet(bool light_wallet) { m_light_wallet = light_wallet; } uint64_t get_light_wallet_scanned_block_height() const { return m_light_wallet_scanned_block_height; } uint64_t get_light_wallet_blockchain_height() const { return m_light_wallet_blockchain_height; } /*! * \brief Gets the seed language */ const std::string &get_seed_language() const; /*! * \brief Sets the seed language */ void set_seed_language(const std::string &language); // Subaddress scheme cryptonote::account_public_address get_subaddress(const cryptonote::subaddress_index& index) const; cryptonote::account_public_address get_address() const { return get_subaddress({0,0}); } boost::optional get_subaddress_index(const cryptonote::account_public_address& address) const; crypto::public_key get_subaddress_spend_public_key(const cryptonote::subaddress_index& index) const; std::vector get_subaddress_spend_public_keys(uint32_t account, uint32_t begin, uint32_t end) const; std::string get_subaddress_as_str(const cryptonote::subaddress_index& index) const; std::string get_address_as_str() const { return get_subaddress_as_str({0, 0}); } std::string get_integrated_address_as_str(const crypto::hash8& payment_id) const; void add_subaddress_account(const std::string& label); size_t get_num_subaddress_accounts() const { return m_subaddress_labels.size(); } size_t get_num_subaddresses(uint32_t index_major) const { return index_major < m_subaddress_labels.size() ? m_subaddress_labels[index_major].size() : 0; } void add_subaddress(uint32_t index_major, const std::string& label); // throws when index is out of bound void expand_subaddresses(const cryptonote::subaddress_index& index); void create_one_off_subaddress(const cryptonote::subaddress_index& index); std::string get_subaddress_label(const cryptonote::subaddress_index& index) const; void set_subaddress_label(const cryptonote::subaddress_index &index, const std::string &label); void set_subaddress_lookahead(size_t major, size_t minor); std::pair get_subaddress_lookahead() const { return {m_subaddress_lookahead_major, m_subaddress_lookahead_minor}; } /*! * \brief Tells if the wallet file is deprecated. */ bool is_deprecated() const; void refresh(bool trusted_daemon); void refresh(bool trusted_daemon, uint64_t start_height, uint64_t & blocks_fetched); void refresh(bool trusted_daemon, uint64_t start_height, uint64_t & blocks_fetched, bool& received_money, bool check_pool = true, uint64_t max_blocks = std::numeric_limits::max(), bool try_incremental = true); bool refresh(bool trusted_daemon, uint64_t & blocks_fetched, bool& received_money, bool& ok); void set_refresh_type(RefreshType refresh_type) { m_refresh_type = refresh_type; } RefreshType get_refresh_type() const { return m_refresh_type; } cryptonote::network_type nettype() const { return m_nettype; } bool watch_only() const { return m_watch_only; } bool multisig(bool *ready = NULL, uint32_t *threshold = NULL, uint32_t *total = NULL) const; bool has_multisig_partial_key_images() const; bool has_unknown_key_images() const; bool get_multisig_seed(epee::wipeable_string& seed, const epee::wipeable_string &passphrase = std::string()) const; bool key_on_device() const { return get_device_type() != hw::device::device_type::SOFTWARE; } hw::device::device_type get_device_type() const { return m_key_device_type; } bool reconnect_device(); // locked & unlocked balance of given or current subaddress account uint64_t balance(uint32_t subaddr_index_major, bool strict) const; uint64_t unlocked_balance(uint32_t subaddr_index_major, bool strict, uint64_t *blocks_to_unlock = NULL, uint64_t *time_to_unlock = NULL); // locked & unlocked balance per subaddress of given or current subaddress account std::map balance_per_subaddress(uint32_t subaddr_index_major, bool strict) const; std::map>> unlocked_balance_per_subaddress(uint32_t subaddr_index_major, bool strict); // all locked & unlocked balances of all subaddress accounts uint64_t balance_all(bool strict) const; uint64_t unlocked_balance_all(bool strict, uint64_t *blocks_to_unlock = NULL, uint64_t *time_to_unlock = NULL); template void transfer_selected(const std::vector& dsts, const std::vector& selected_transfers, size_t fake_outputs_count, std::vector> &outs, std::unordered_set &valid_public_keys_cache, uint64_t unlock_time, uint64_t fee, const std::vector& extra, T destination_split_strategy, const tx_dust_policy& dust_policy, cryptonote::transaction& tx, pending_tx &ptx, const bool use_view_tags); void transfer_selected_rct(std::vector dsts, const std::vector& selected_transfers, size_t fake_outputs_count, std::vector> &outs, std::unordered_set &valid_public_keys_cache, uint64_t unlock_time, uint64_t fee, const std::vector& extra, cryptonote::transaction& tx, pending_tx &ptx, const rct::RCTConfig &rct_config, const bool use_view_tags); void commit_tx(pending_tx& ptx_vector); void commit_tx(std::vector& ptx_vector); bool save_tx(const std::vector& ptx_vector, const std::string &filename) const; std::string dump_tx_to_str(const std::vector &ptx_vector) const; std::string save_multisig_tx(multisig_tx_set txs); bool save_multisig_tx(const multisig_tx_set &txs, const std::string &filename); std::string save_multisig_tx(const std::vector& ptx_vector); bool save_multisig_tx(const std::vector& ptx_vector, const std::string &filename); multisig_tx_set make_multisig_tx_set(const std::vector& ptx_vector) const; // load unsigned tx from file and sign it. Takes confirmation callback as argument. Used by the cli wallet bool sign_tx(const std::string &unsigned_filename, const std::string &signed_filename, std::vector &ptx, std::function accept_func = NULL, bool export_raw = false); // sign unsigned tx. Takes unsigned_tx_set as argument. Used by GUI bool sign_tx(unsigned_tx_set &exported_txs, const std::string &signed_filename, std::vector &ptx, bool export_raw = false); bool sign_tx(unsigned_tx_set &exported_txs, std::vector &ptx, signed_tx_set &signed_txs); std::string sign_tx_dump_to_str(unsigned_tx_set &exported_txs, std::vector &ptx, signed_tx_set &signed_txes); // load unsigned_tx_set from file. bool load_unsigned_tx(const std::string &unsigned_filename, unsigned_tx_set &exported_txs) const; bool parse_unsigned_tx_from_str(const std::string &unsigned_tx_st, unsigned_tx_set &exported_txs) const; bool load_tx(const std::string &signed_filename, std::vector &ptx, std::function accept_func = NULL); bool parse_tx_from_str(const std::string &signed_tx_st, std::vector &ptx, std::function accept_func); std::vector create_transactions_2(std::vector dsts, const size_t fake_outs_count, const uint64_t unlock_time, uint32_t priority, const std::vector& extra, uint32_t subaddr_account, std::set subaddr_indices); // pass subaddr_indices by value on purpose std::vector create_transactions_all(uint64_t below, const cryptonote::account_public_address &address, bool is_subaddress, const size_t outputs, const size_t fake_outs_count, const uint64_t unlock_time, uint32_t priority, const std::vector& extra, uint32_t subaddr_account, std::set subaddr_indices); std::vector create_transactions_single(const crypto::key_image &ki, const cryptonote::account_public_address &address, bool is_subaddress, const size_t outputs, const size_t fake_outs_count, const uint64_t unlock_time, uint32_t priority, const std::vector& extra); std::vector create_transactions_from(const cryptonote::account_public_address &address, bool is_subaddress, const size_t outputs, std::vector unused_transfers_indices, std::vector unused_dust_indices, const size_t fake_outs_count, const uint64_t unlock_time, uint32_t priority, const std::vector& extra); bool sanity_check(const std::vector &ptx_vector, std::vector dsts) const; void cold_tx_aux_import(const std::vector& ptx, const std::vector& tx_device_aux); void cold_sign_tx(const std::vector& ptx_vector, signed_tx_set &exported_txs, std::vector &dsts_info, std::vector & tx_device_aux); uint64_t cold_key_image_sync(uint64_t &spent, uint64_t &unspent); void device_show_address(uint32_t account_index, uint32_t address_index, const boost::optional &payment_id); bool parse_multisig_tx_from_str(std::string multisig_tx_st, multisig_tx_set &exported_txs) const; bool load_multisig_tx(cryptonote::blobdata blob, multisig_tx_set &exported_txs, std::function accept_func = NULL); bool load_multisig_tx_from_file(const std::string &filename, multisig_tx_set &exported_txs, std::function accept_func = NULL); bool sign_multisig_tx_from_file(const std::string &filename, std::vector &txids, std::function accept_func); bool sign_multisig_tx(multisig_tx_set &exported_txs, std::vector &txids); bool sign_multisig_tx_to_file(multisig_tx_set &exported_txs, const std::string &filename, std::vector &txids); std::vector create_unmixable_sweep_transactions(); void discard_unmixable_outputs(); bool check_connection(uint32_t *version = NULL, bool *ssl = NULL, uint32_t timeout = 200000, bool *wallet_is_outdated = NULL, bool *daemon_is_outdated = NULL); bool check_version(uint32_t *version, bool *wallet_is_outdated, bool *daemon_is_outdated); bool check_hard_fork_version(cryptonote::network_type nettype, const std::vector> &daemon_hard_forks, const uint64_t height, const uint64_t target_height, bool *wallet_is_outdated, bool *daemon_is_outdated); void get_transfers(wallet2::transfer_container& incoming_transfers) const; void get_payments(const crypto::hash& payment_id, std::list& payments, uint64_t min_height = 0, const boost::optional& subaddr_account = boost::none, const std::set& subaddr_indices = {}) const; void get_payments(std::list>& payments, uint64_t min_height, uint64_t max_height = (uint64_t)-1, const boost::optional& subaddr_account = boost::none, const std::set& subaddr_indices = {}) const; void get_payments_out(std::list>& confirmed_payments, uint64_t min_height, uint64_t max_height = (uint64_t)-1, const boost::optional& subaddr_account = boost::none, const std::set& subaddr_indices = {}) const; void get_unconfirmed_payments_out(std::list>& unconfirmed_payments, const boost::optional& subaddr_account = boost::none, const std::set& subaddr_indices = {}) const; void get_unconfirmed_payments(std::list>& unconfirmed_payments, const boost::optional& subaddr_account = boost::none, const std::set& subaddr_indices = {}) const; uint64_t get_blockchain_current_height() const { return m_light_wallet_blockchain_height ? m_light_wallet_blockchain_height : m_blockchain.size(); } void rescan_spent(); void rescan_blockchain(bool hard, bool refresh = true, bool keep_key_images = false); bool is_transfer_unlocked(const transfer_details& td); bool is_transfer_unlocked(uint64_t unlock_time, uint64_t block_height); uint64_t get_last_block_reward() const { return m_last_block_reward; } uint64_t get_device_last_key_image_sync() const { return m_device_last_key_image_sync; } std::vector get_public_nodes(bool white_only = true); template inline void serialize(t_archive &a, const unsigned int ver) { uint64_t dummy_refresh_height = 0; // moved to keys file if(ver < 5) return; if (ver < 19) { std::vector blockchain; a & blockchain; m_blockchain.clear(); for (const auto &b: blockchain) { m_blockchain.push_back(b); } } else { a & m_blockchain; } a & m_transfers; a & m_account_public_address; a & m_key_images.parent(); if(ver < 6) return; a & m_unconfirmed_txs.parent(); if(ver < 7) return; a & m_payments.parent(); if(ver < 8) return; a & m_tx_keys.parent(); if(ver < 9) return; a & m_confirmed_txs.parent(); if(ver < 11) return; a & dummy_refresh_height; if(ver < 12) return; a & m_tx_notes.parent(); if(ver < 13) return; if (ver < 17) { // we're loading an old version, where m_unconfirmed_payments was a std::map std::unordered_map m; a & m; m_unconfirmed_payments.clear(); for (std::unordered_map::const_iterator i = m.begin(); i != m.end(); ++i) m_unconfirmed_payments.insert(std::make_pair(i->first, pool_payment_details{i->second, false})); } if(ver < 14) return; if(ver < 15) { // we're loading an older wallet without a pubkey map, rebuild it m_pub_keys.clear(); for (size_t i = 0; i < m_transfers.size(); ++i) { const transfer_details &td = m_transfers[i]; m_pub_keys.emplace(td.get_public_key(), i); } return; } a & m_pub_keys.parent(); if(ver < 16) return; a & m_address_book; if(ver < 17) return; if (ver < 22) { // we're loading an old version, where m_unconfirmed_payments payload was payment_details std::unordered_multimap m; a & m; m_unconfirmed_payments.clear(); for (const auto &i: m) m_unconfirmed_payments.insert(std::make_pair(i.first, pool_payment_details{i.second, false})); } if(ver < 18) return; a & m_scanned_pool_txs[0]; a & m_scanned_pool_txs[1]; if (ver < 20) return; a & m_subaddresses.parent(); std::unordered_map dummy_subaddresses_inv; a & dummy_subaddresses_inv; a & m_subaddress_labels; a & m_additional_tx_keys.parent(); if(ver < 21) return; a & m_attributes.parent(); if(ver < 22) return; a & m_unconfirmed_payments.parent(); if(ver < 23) return; a & (std::pair, std::vector>&)m_account_tags; if(ver < 24) return; a & m_ring_history_saved; if(ver < 25) return; a & m_last_block_reward; if(ver < 26) return; a & m_tx_device.parent(); if(ver < 27) return; a & m_device_last_key_image_sync; if(ver < 28) return; a & m_cold_key_images.parent(); if(ver < 29) return; a & m_rpc_client_secret_key; if(ver < 30) { m_has_ever_refreshed_from_node = false; return; } a & m_has_ever_refreshed_from_node; } BEGIN_SERIALIZE_OBJECT() MAGIC_FIELD("monero wallet cache") VERSION_FIELD(1) FIELD(m_blockchain) FIELD(m_transfers) FIELD(m_account_public_address) FIELD(m_key_images) FIELD(m_unconfirmed_txs) FIELD(m_payments) FIELD(m_tx_keys) FIELD(m_confirmed_txs) FIELD(m_tx_notes) FIELD(m_unconfirmed_payments) FIELD(m_pub_keys) FIELD(m_address_book) FIELD(m_scanned_pool_txs[0]) FIELD(m_scanned_pool_txs[1]) FIELD(m_subaddresses) FIELD(m_subaddress_labels) FIELD(m_additional_tx_keys) FIELD(m_attributes) FIELD(m_account_tags) FIELD(m_ring_history_saved) FIELD(m_last_block_reward) FIELD(m_tx_device) FIELD(m_device_last_key_image_sync) FIELD(m_cold_key_images) FIELD(m_rpc_client_secret_key) if (version < 1) { m_has_ever_refreshed_from_node = false; return true; } FIELD(m_has_ever_refreshed_from_node) END_SERIALIZE() /*! * \brief Check if wallet keys and bin files exist * \param file_path Wallet file path * \param keys_file_exists Whether keys file exists * \param wallet_file_exists Whether bin file exists */ static void wallet_exists(const std::string& file_path, bool& keys_file_exists, bool& wallet_file_exists); /*! * \brief Check if wallet file path is valid format * \param file_path Wallet file path * \return Whether path is valid format */ static bool wallet_valid_path_format(const std::string& file_path); static bool parse_long_payment_id(const std::string& payment_id_str, crypto::hash& payment_id); static bool parse_short_payment_id(const std::string& payment_id_str, crypto::hash8& payment_id); static bool parse_payment_id(const std::string& payment_id_str, crypto::hash& payment_id); bool always_confirm_transfers() const { return m_always_confirm_transfers; } void always_confirm_transfers(bool always) { m_always_confirm_transfers = always; } bool print_ring_members() const { return m_print_ring_members; } void print_ring_members(bool value) { m_print_ring_members = value; } bool store_tx_info() const { return m_store_tx_info; } void store_tx_info(bool store) { m_store_tx_info = store; } uint32_t default_mixin() const { return m_default_mixin; } void default_mixin(uint32_t m) { m_default_mixin = m; } uint32_t get_default_priority() const { return m_default_priority; } void set_default_priority(uint32_t p) { m_default_priority = p; } bool auto_refresh() const { return m_auto_refresh; } void auto_refresh(bool r) { m_auto_refresh = r; } AskPasswordType ask_password() const { return m_ask_password; } void ask_password(AskPasswordType ask) { m_ask_password = ask; } void set_min_output_count(uint32_t count) { m_min_output_count = count; } uint32_t get_min_output_count() const { return m_min_output_count; } void set_min_output_value(uint64_t value) { m_min_output_value = value; } uint64_t get_min_output_value() const { return m_min_output_value; } void merge_destinations(bool merge) { m_merge_destinations = merge; } bool merge_destinations() const { return m_merge_destinations; } bool confirm_backlog() const { return m_confirm_backlog; } void confirm_backlog(bool always) { m_confirm_backlog = always; } void set_confirm_backlog_threshold(uint32_t threshold) { m_confirm_backlog_threshold = threshold; }; uint32_t get_confirm_backlog_threshold() const { return m_confirm_backlog_threshold; }; bool confirm_export_overwrite() const { return m_confirm_export_overwrite; } void confirm_export_overwrite(bool always) { m_confirm_export_overwrite = always; } bool auto_low_priority() const { return m_auto_low_priority; } void auto_low_priority(bool value) { m_auto_low_priority = value; } bool segregate_pre_fork_outputs() const { return m_segregate_pre_fork_outputs; } void segregate_pre_fork_outputs(bool value) { m_segregate_pre_fork_outputs = value; } bool key_reuse_mitigation2() const { return m_key_reuse_mitigation2; } void key_reuse_mitigation2(bool value) { m_key_reuse_mitigation2 = value; } uint64_t segregation_height() const { return m_segregation_height; } void segregation_height(uint64_t height) { m_segregation_height = height; } bool ignore_fractional_outputs() const { return m_ignore_fractional_outputs; } void ignore_fractional_outputs(bool value) { m_ignore_fractional_outputs = value; } bool confirm_non_default_ring_size() const { return m_confirm_non_default_ring_size; } void confirm_non_default_ring_size(bool always) { m_confirm_non_default_ring_size = always; } uint64_t ignore_outputs_above() const { return m_ignore_outputs_above; } void ignore_outputs_above(uint64_t value) { m_ignore_outputs_above = value; } uint64_t ignore_outputs_below() const { return m_ignore_outputs_below; } void ignore_outputs_below(uint64_t value) { m_ignore_outputs_below = value; } bool track_uses() const { return m_track_uses; } void track_uses(bool value) { m_track_uses = value; } bool show_wallet_name_when_locked() const { return m_show_wallet_name_when_locked; } void show_wallet_name_when_locked(bool value) { m_show_wallet_name_when_locked = value; } BackgroundMiningSetupType setup_background_mining() const { return m_setup_background_mining; } void setup_background_mining(BackgroundMiningSetupType value) { m_setup_background_mining = value; } uint32_t inactivity_lock_timeout() const { return m_inactivity_lock_timeout; } void inactivity_lock_timeout(uint32_t seconds) { m_inactivity_lock_timeout = seconds; } const std::string & device_name() const { return m_device_name; } void device_name(const std::string & device_name) { m_device_name = device_name; } const std::string & device_derivation_path() const { return m_device_derivation_path; } void device_derivation_path(const std::string &device_derivation_path) { m_device_derivation_path = device_derivation_path; } const ExportFormat & export_format() const { return m_export_format; } inline void set_export_format(const ExportFormat& export_format) { m_export_format = export_format; } bool load_deprecated_formats() const { return m_load_deprecated_formats; } void load_deprecated_formats(bool load) { m_load_deprecated_formats = load; } bool persistent_rpc_client_id() const { return m_persistent_rpc_client_id; } void persistent_rpc_client_id(bool persistent) { m_persistent_rpc_client_id = persistent; } void auto_mine_for_rpc_payment_threshold(float threshold) { m_auto_mine_for_rpc_payment_threshold = threshold; } float auto_mine_for_rpc_payment_threshold() const { return m_auto_mine_for_rpc_payment_threshold; } crypto::secret_key get_rpc_client_secret_key() const { return m_rpc_client_secret_key; } void set_rpc_client_secret_key(const crypto::secret_key &key) { m_rpc_client_secret_key = key; m_node_rpc_proxy.set_client_secret_key(key); } uint64_t credits_target() const { return m_credits_target; } void credits_target(uint64_t threshold) { m_credits_target = threshold; } bool is_multisig_enabled() const { return m_enable_multisig; } void enable_multisig(bool enable) { m_enable_multisig = enable; } bool is_mismatched_daemon_version_allowed() const { return m_allow_mismatched_daemon_version; } void allow_mismatched_daemon_version(bool allow_mismatch) { m_allow_mismatched_daemon_version = allow_mismatch; } bool get_tx_key_cached(const crypto::hash &txid, crypto::secret_key &tx_key, std::vector &additional_tx_keys) const; void set_tx_key(const crypto::hash &txid, const crypto::secret_key &tx_key, const std::vector &additional_tx_keys, const boost::optional &single_destination_subaddress = boost::none); bool get_tx_key(const crypto::hash &txid, crypto::secret_key &tx_key, std::vector &additional_tx_keys); void check_tx_key(const crypto::hash &txid, const crypto::secret_key &tx_key, const std::vector &additional_tx_keys, const cryptonote::account_public_address &address, uint64_t &received, bool &in_pool, uint64_t &confirmations); void check_tx_key_helper(const crypto::hash &txid, const crypto::key_derivation &derivation, const std::vector &additional_derivations, const cryptonote::account_public_address &address, uint64_t &received, bool &in_pool, uint64_t &confirmations); void check_tx_key_helper(const cryptonote::transaction &tx, const crypto::key_derivation &derivation, const std::vector &additional_derivations, const cryptonote::account_public_address &address, uint64_t &received) const; bool is_out_to_acc(const cryptonote::account_public_address &address, const crypto::public_key& out_key, const crypto::key_derivation &derivation, const std::vector &additional_derivations, const size_t output_index, const boost::optional &view_tag_opt, crypto::key_derivation &found_derivation) const; std::string get_tx_proof(const crypto::hash &txid, const cryptonote::account_public_address &address, bool is_subaddress, const std::string &message); std::string get_tx_proof(const cryptonote::transaction &tx, const crypto::secret_key &tx_key, const std::vector &additional_tx_keys, const cryptonote::account_public_address &address, bool is_subaddress, const std::string &message) const; bool check_tx_proof(const crypto::hash &txid, const cryptonote::account_public_address &address, bool is_subaddress, const std::string &message, const std::string &sig_str, uint64_t &received, bool &in_pool, uint64_t &confirmations); bool check_tx_proof(const cryptonote::transaction &tx, const cryptonote::account_public_address &address, bool is_subaddress, const std::string &message, const std::string &sig_str, uint64_t &received) const; std::string get_spend_proof(const crypto::hash &txid, const std::string &message); bool check_spend_proof(const crypto::hash &txid, const std::string &message, const std::string &sig_str); void scan_tx(const std::unordered_set &txids); /*! * \brief Generates a proof that proves the reserve of unspent funds * \param account_minreserve When specified, collect outputs only belonging to the given account and prove the smallest reserve above the given amount * When unspecified, proves for all unspent outputs across all accounts * \param message Arbitrary challenge message to be signed together * \return Signature string */ std::string get_reserve_proof(const boost::optional> &account_minreserve, const std::string &message); /*! * \brief Verifies a proof of reserve * \param address The signer's address * \param message Challenge message used for signing * \param sig_str Signature string * \param total [OUT] the sum of funds included in the signature * \param spent [OUT] the sum of spent funds included in the signature * \return true if the signature verifies correctly */ bool check_reserve_proof(const cryptonote::account_public_address &address, const std::string &message, const std::string &sig_str, uint64_t &total, uint64_t &spent); /*! * \brief GUI Address book get/store */ std::vector get_address_book() const { return m_address_book; } bool add_address_book_row(const cryptonote::account_public_address &address, const crypto::hash8 *payment_id, const std::string &description, bool is_subaddress); bool set_address_book_row(size_t row_id, const cryptonote::account_public_address &address, const crypto::hash8 *payment_id, const std::string &description, bool is_subaddress); bool delete_address_book_row(std::size_t row_id); uint64_t get_num_rct_outputs(); size_t get_num_transfer_details() const { return m_transfers.size(); } const transfer_details &get_transfer_details(size_t idx) const; uint8_t get_current_hard_fork(); void get_hard_fork_info(uint8_t version, uint64_t &earliest_height); bool use_fork_rules(uint8_t version, int64_t early_blocks = 0); int get_fee_algorithm(); std::string get_wallet_file() const; std::string get_keys_file() const; std::string get_daemon_address() const; const boost::optional& get_daemon_login() const { return m_daemon_login; } uint64_t get_daemon_blockchain_height(std::string& err); uint64_t get_daemon_blockchain_target_height(std::string& err); uint64_t get_daemon_adjusted_time(); /*! * \brief Calculates the approximate blockchain height from current date/time. */ uint64_t get_approximate_blockchain_height() const; uint64_t estimate_blockchain_height(); std::vector select_available_outputs_from_histogram(uint64_t count, bool atleast, bool unlocked, bool allow_rct); std::vector select_available_outputs(const std::function &f); std::vector select_available_unmixable_outputs(); std::vector select_available_mixable_outputs(); size_t pop_best_value_from(const transfer_container &transfers, std::vector &unused_dust_indices, const std::vector& selected_transfers, bool smallest = false) const; size_t pop_best_value(std::vector &unused_dust_indices, const std::vector& selected_transfers, bool smallest = false) const; void set_tx_note(const crypto::hash &txid, const std::string ¬e); std::string get_tx_note(const crypto::hash &txid) const; void set_tx_device_aux(const crypto::hash &txid, const std::string &aux); std::string get_tx_device_aux(const crypto::hash &txid) const; void set_description(const std::string &description); std::string get_description() const; /*! * \brief Get the list of registered account tags. * \return first.Key=(tag's name), first.Value=(tag's label), second[i]=(i-th account's tag) */ const std::pair, std::vector>& get_account_tags(); /*! * \brief Set a tag to the given accounts. * \param account_indices Indices of accounts. * \param tag Tag's name. If empty, the accounts become untagged. */ void set_account_tag(const std::set &account_indices, const std::string& tag); /*! * \brief Set the label of the given tag. * \param tag Tag's name (which must be non-empty). * \param description Tag's description. */ void set_account_tag_description(const std::string& tag, const std::string& description); enum message_signature_type_t { sign_with_spend_key, sign_with_view_key }; std::string sign(const std::string &data, message_signature_type_t signature_type, cryptonote::subaddress_index index = {0, 0}) const; struct message_signature_result_t { bool valid; unsigned version; bool old; message_signature_type_t type; }; message_signature_result_t verify(const std::string &data, const cryptonote::account_public_address &address, const std::string &signature) const; /*! * \brief sign_multisig_participant signs given message with the multisig public signer key * \param data message to sign * \throws if wallet is not multisig * \return signature */ std::string sign_multisig_participant(const std::string& data) const; /*! * \brief verify_with_public_key verifies message was signed with given public key * \param data message * \param public_key public key to check signature * \param signature signature of the message * \return true if the signature is correct */ bool verify_with_public_key(const std::string &data, const crypto::public_key &public_key, const std::string &signature) const; // Import/Export wallet data std::tuple> export_outputs(bool all = false, uint32_t start = 0, uint32_t count = 0xffffffff) const; std::string export_outputs_to_str(bool all = false, uint32_t start = 0, uint32_t count = 0xffffffff) const; size_t import_outputs(const std::tuple> &outputs); size_t import_outputs(const std::tuple> &outputs); size_t import_outputs_from_str(const std::string &outputs_st); payment_container export_payments() const; void import_payments(const payment_container &payments); void import_payments_out(const std::list> &confirmed_payments); std::tuple> export_blockchain() const; void import_blockchain(const std::tuple> &bc); bool export_key_images(const std::string &filename, bool all = false) const; std::pair>> export_key_images(bool all = false) const; uint64_t import_key_images(const std::vector> &signed_key_images, size_t offset, uint64_t &spent, uint64_t &unspent, bool check_spent = true); uint64_t import_key_images(const std::string &filename, uint64_t &spent, uint64_t &unspent); bool import_key_images(std::vector key_images, size_t offset=0, boost::optional> selected_transfers=boost::none); bool import_key_images(signed_tx_set & signed_tx, size_t offset=0, bool only_selected_transfers=false); crypto::public_key get_tx_pub_key_from_received_outs(const tools::wallet2::transfer_details &td) const; void update_pool_state(std::vector> &process_txs, bool refreshed = false, bool try_incremental = false); void process_pool_state(const std::vector> &txs); void remove_obsolete_pool_txs(const std::vector &tx_hashes, bool remove_if_found); std::string encrypt(const char *plaintext, size_t len, const crypto::secret_key &skey, bool authenticated = true) const; std::string encrypt(const epee::span &span, const crypto::secret_key &skey, bool authenticated = true) const; std::string encrypt(const std::string &plaintext, const crypto::secret_key &skey, bool authenticated = true) const; std::string encrypt(const epee::wipeable_string &plaintext, const crypto::secret_key &skey, bool authenticated = true) const; std::string encrypt_with_view_secret_key(const std::string &plaintext, bool authenticated = true) const; template T decrypt(const std::string &ciphertext, const crypto::secret_key &skey, bool authenticated = true) const; std::string decrypt_with_view_secret_key(const std::string &ciphertext, bool authenticated = true) const; std::string make_uri(const std::string &address, const std::string &payment_id, uint64_t amount, const std::string &tx_description, const std::string &recipient_name, std::string &error) const; bool parse_uri(const std::string &uri, std::string &address, std::string &payment_id, uint64_t &amount, std::string &tx_description, std::string &recipient_name, std::vector &unknown_parameters, std::string &error); uint64_t get_blockchain_height_by_date(uint16_t year, uint8_t month, uint8_t day); // 1<=month<=12, 1<=day<=31 bool is_synced(); std::vector> estimate_backlog(const std::vector> &fee_levels); std::vector> estimate_backlog(uint64_t min_tx_weight, uint64_t max_tx_weight, const std::vector &fees); uint64_t estimate_fee(bool use_per_byte_fee, bool use_rct, int n_inputs, int mixin, int n_outputs, size_t extra_size, bool bulletproof, bool clsag, bool bulletproof_plus, bool use_view_tags, uint64_t base_fee, uint64_t fee_quantization_mask) const; uint64_t get_fee_multiplier(uint32_t priority, int fee_algorithm = -1); uint64_t get_base_fee(uint32_t priority); uint64_t get_base_fee(); uint64_t get_fee_quantization_mask(); uint64_t get_min_ring_size(); uint64_t get_max_ring_size(); uint64_t adjust_mixin(uint64_t mixin); uint32_t adjust_priority(uint32_t priority); bool is_unattended() const { return m_unattended; } std::pair estimate_tx_size_and_weight(bool use_rct, int n_inputs, int ring_size, int n_outputs, size_t extra_size); bool get_rpc_payment_info(bool mining, bool &payment_required, uint64_t &credits, uint64_t &diff, uint64_t &credits_per_hash_found, cryptonote::blobdata &hashing_blob, uint64_t &height, uint64_t &seed_height, crypto::hash &seed_hash, crypto::hash &next_seed_hash, uint32_t &cookie); bool daemon_requires_payment(); bool make_rpc_payment(uint32_t nonce, uint32_t cookie, uint64_t &credits, uint64_t &balance); bool search_for_rpc_payment(uint64_t credits_target, uint32_t n_threads, const std::function &startfunc, const std::function &contfunc, const std::function &foundfunc = NULL, const std::function &errorfunc = NULL); template void handle_payment_changes(const T &res, std::true_type) { if (res.status == CORE_RPC_STATUS_OK || res.status == CORE_RPC_STATUS_PAYMENT_REQUIRED) m_rpc_payment_state.credits = res.credits; if (res.top_hash != m_rpc_payment_state.top_hash) { m_rpc_payment_state.top_hash = res.top_hash; m_rpc_payment_state.stale = true; } } template void handle_payment_changes(const T &res, std::false_type) {} // Light wallet specific functions // fetch unspent outs from lw node and store in m_transfers void light_wallet_get_unspent_outs(); // fetch txs and store in m_payments void light_wallet_get_address_txs(); // get_address_info bool light_wallet_get_address_info(tools::COMMAND_RPC_GET_ADDRESS_INFO::response &response); // Login. new_address is true if address hasn't been used on lw node before. bool light_wallet_login(bool &new_address); // Send an import request to lw node. returns info about import fee, address and payment_id bool light_wallet_import_wallet_request(tools::COMMAND_RPC_IMPORT_WALLET_REQUEST::response &response); // get random outputs from light wallet server void light_wallet_get_outs(std::vector> &outs, const std::vector &selected_transfers, size_t fake_outputs_count); // Parse rct string bool light_wallet_parse_rct_str(const std::string& rct_string, const crypto::public_key& tx_pub_key, uint64_t internal_output_index, rct::key& decrypted_mask, rct::key& rct_commit, bool decrypt) const; // check if key image is ours bool light_wallet_key_image_is_ours(const crypto::key_image& key_image, const crypto::public_key& tx_public_key, uint64_t out_index); /* * "attributes" are a mechanism to store an arbitrary number of string values * on the level of the wallet as a whole, identified by keys. Their introduction, * technically the unordered map m_attributes stored as part of a wallet file, * led to a new wallet file version, but now new singular pieces of info may be added * without the need for a new version. * * The first and so far only value stored as such an attribute is the description. * It's stored under the standard key ATTRIBUTE_DESCRIPTION (see method set_description). * * The mechanism is open to all clients and allows them to use it for storing basically any * single string values in a wallet. To avoid the problem that different clients possibly * overwrite or misunderstand each other's attributes, a two-part key scheme is * proposed: . */ const char* const ATTRIBUTE_DESCRIPTION = "wallet2.description"; void set_attribute(const std::string &key, const std::string &value); bool get_attribute(const std::string &key, std::string &value) const; crypto::public_key get_multisig_signer_public_key() const; crypto::public_key get_multisig_signing_public_key(size_t idx) const; crypto::public_key get_multisig_signing_public_key(const crypto::secret_key &skey) const; template inline bool invoke_http_json(const boost::string_ref uri, const t_request& req, t_response& res, std::chrono::milliseconds timeout = std::chrono::seconds(15), const boost::string_ref http_method = "POST") { if (m_offline) return false; boost::lock_guard lock(m_daemon_rpc_mutex); return epee::net_utils::invoke_http_json(uri, req, res, *m_http_client, timeout, http_method); } template inline bool invoke_http_bin(const boost::string_ref uri, const t_request& req, t_response& res, std::chrono::milliseconds timeout = std::chrono::seconds(15), const boost::string_ref http_method = "POST") { if (m_offline) return false; boost::lock_guard lock(m_daemon_rpc_mutex); return epee::net_utils::invoke_http_bin(uri, req, res, *m_http_client, timeout, http_method); } template inline bool invoke_http_json_rpc(const boost::string_ref uri, const std::string& method_name, const t_request& req, t_response& res, std::chrono::milliseconds timeout = std::chrono::seconds(15), const boost::string_ref http_method = "POST", const std::string& req_id = "0") { if (m_offline) return false; boost::lock_guard lock(m_daemon_rpc_mutex); return epee::net_utils::invoke_http_json_rpc(uri, method_name, req, res, *m_http_client, timeout, http_method, req_id); } bool set_ring_database(const std::string &filename); const std::string get_ring_database() const { return m_ring_database; } bool get_ring(const crypto::key_image &key_image, std::vector &outs); bool get_rings(const crypto::hash &txid, std::vector>> &outs); bool get_rings(const crypto::chacha_key &key, const std::vector &key_images, std::vector> &outs); bool set_ring(const crypto::key_image &key_image, const std::vector &outs, bool relative); bool set_rings(const std::vector>> &rings, bool relative); bool unset_ring(const std::vector &key_images); bool unset_ring(const crypto::hash &txid); bool find_and_save_rings(bool force = true); bool blackball_output(const std::pair &output); bool set_blackballed_outputs(const std::vector> &outputs, bool add = false); bool unblackball_output(const std::pair &output); bool is_output_blackballed(const std::pair &output) const; void freeze(size_t idx); void thaw(size_t idx); bool frozen(size_t idx) const; void freeze(const crypto::key_image &ki); void thaw(const crypto::key_image &ki); bool frozen(const crypto::key_image &ki) const; bool frozen(const transfer_details &td) const; bool frozen(const multisig_tx_set& txs) const; // does partially signed txset contain frozen enotes? bool save_to_file(const std::string& path_to_file, const std::string& binary, bool is_printable = false) const; static bool load_from_file(const std::string& path_to_file, std::string& target_str, size_t max_size = 1000000000); uint64_t get_bytes_sent() const; uint64_t get_bytes_received() const; // MMS ------------------------------------------------------------------------------------------------- mms::message_store& get_message_store() { return m_message_store; }; const mms::message_store& get_message_store() const { return m_message_store; }; mms::multisig_wallet_state get_multisig_wallet_state() const; bool lock_keys_file(); bool unlock_keys_file(); bool is_keys_file_locked() const; void change_password(const std::string &filename, const epee::wipeable_string &original_password, const epee::wipeable_string &new_password); void set_tx_notify(const std::shared_ptr ¬ify) { m_tx_notify = notify; } bool is_tx_spendtime_unlocked(uint64_t unlock_time, uint64_t block_height); void hash_m_transfer(const transfer_details & transfer, crypto::hash &hash) const; uint64_t hash_m_transfers(boost::optional transfer_height, crypto::hash &hash) const; void finish_rescan_bc_keep_key_images(uint64_t transfer_height, const crypto::hash &hash); void enable_dns(bool enable) { m_use_dns = enable; } void set_offline(bool offline = true); bool is_offline() const { return m_offline; } uint64_t credits() const { return m_rpc_payment_state.credits; } void credit_report(uint64_t &expected_spent, uint64_t &discrepancy) const { expected_spent = m_rpc_payment_state.expected_spent; discrepancy = m_rpc_payment_state.discrepancy; } static std::string get_default_daemon_address() { CRITICAL_REGION_LOCAL(default_daemon_address_lock); return default_daemon_address; } private: /*! * \brief Stores wallet information to wallet file. * \param keys_file_name Name of wallet file * \param password Password of wallet file * \param watch_only true to save only view key, false to save both spend and view keys * \return Whether it was successful. */ bool store_keys(const std::string& keys_file_name, const epee::wipeable_string& password, bool watch_only = false); /*! * \brief Load wallet keys information from wallet file. * \param keys_file_name Name of wallet file * \param password Password of wallet file */ bool load_keys(const std::string& keys_file_name, const epee::wipeable_string& password); /*! * \brief Load wallet keys information from a string buffer. * \param keys_buf Keys buffer to load * \param password Password of keys buffer */ bool load_keys_buf(const std::string& keys_buf, const epee::wipeable_string& password); bool load_keys_buf(const std::string& keys_buf, const epee::wipeable_string& password, boost::optional& keys_to_encrypt); void process_new_transaction(const crypto::hash &txid, const cryptonote::transaction& tx, const std::vector &o_indices, uint64_t height, uint8_t block_version, uint64_t ts, bool miner_tx, bool pool, bool double_spend_seen, const tx_cache_data &tx_cache_data, std::map, size_t> *output_tracker_cache = NULL, bool ignore_callbacks = false); bool should_skip_block(const cryptonote::block &b, uint64_t height) const; void process_new_blockchain_entry(const cryptonote::block& b, const cryptonote::block_complete_entry& bche, const parsed_block &parsed_block, const crypto::hash& bl_id, uint64_t height, const std::vector &tx_cache_data, size_t tx_cache_data_offset, std::map, size_t> *output_tracker_cache = NULL); detached_blockchain_data detach_blockchain(uint64_t height, std::map, size_t> *output_tracker_cache = NULL); void handle_reorg(uint64_t height, std::map, size_t> *output_tracker_cache = NULL); void get_short_chain_history(std::list& ids, uint64_t granularity = 1) const; bool clear(); void clear_soft(bool keep_key_images=false); void pull_blocks(bool first, bool try_incremental, uint64_t start_height, uint64_t& blocks_start_height, const std::list &short_chain_history, std::vector &blocks, std::vector &o_indices, uint64_t ¤t_height); void pull_hashes(uint64_t start_height, uint64_t& blocks_start_height, const std::list &short_chain_history, std::vector &hashes); void fast_refresh(uint64_t stop_height, uint64_t &blocks_start_height, std::list &short_chain_history, bool force = false); void pull_and_parse_next_blocks(bool first, bool try_incremental, uint64_t start_height, uint64_t &blocks_start_height, std::list &short_chain_history, const std::vector &prev_blocks, const std::vector &prev_parsed_blocks, std::vector &blocks, std::vector &parsed_blocks, bool &last, bool &error, std::exception_ptr &exception); void process_parsed_blocks(uint64_t start_height, const std::vector &blocks, const std::vector &parsed_blocks, uint64_t& blocks_added, std::map, size_t> *output_tracker_cache = NULL); bool accept_pool_tx_for_processing(const crypto::hash &txid); void process_unconfirmed_transfer(bool incremental, const crypto::hash &txid, wallet2::unconfirmed_transfer_details &tx_details, bool seen_in_pool, std::chrono::system_clock::time_point now, bool refreshed); void process_pool_info_extent(const cryptonote::COMMAND_RPC_GET_BLOCKS_FAST::response &res, std::vector> &process_txs, bool refreshed); void update_pool_state_by_pool_query(std::vector> &process_txs, bool refreshed = false); void update_pool_state_from_pool_data(bool incremental, const std::vector &removed_pool_txids, const std::vector> &added_pool_txs, std::vector> &process_txs, bool refreshed); uint64_t select_transfers(uint64_t needed_money, std::vector unused_transfers_indices, std::vector& selected_transfers) const; bool prepare_file_names(const std::string& file_path); void process_unconfirmed(const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t height); void process_outgoing(const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t height, uint64_t ts, uint64_t spent, uint64_t received, uint32_t subaddr_account, const std::set& subaddr_indices); void add_unconfirmed_tx(const cryptonote::transaction& tx, uint64_t amount_in, const std::vector &dests, const crypto::hash &payment_id, uint64_t change_amount, uint32_t subaddr_account, const std::set& subaddr_indices); void generate_genesis(cryptonote::block& b) const; void check_genesis(const crypto::hash& genesis_hash) const; //throws bool generate_chacha_key_from_secret_keys(crypto::chacha_key &key) const; void generate_chacha_key_from_password(const epee::wipeable_string &pass, crypto::chacha_key &key) const; crypto::hash get_payment_id(const pending_tx &ptx) const; void check_acc_out_precomp(const cryptonote::tx_out &o, const crypto::key_derivation &derivation, const std::vector &additional_derivations, size_t i, tx_scan_info_t &tx_scan_info) const; void check_acc_out_precomp(const cryptonote::tx_out &o, const crypto::key_derivation &derivation, const std::vector &additional_derivations, size_t i, const is_out_data *is_out_data, tx_scan_info_t &tx_scan_info) const; void check_acc_out_precomp_once(const cryptonote::tx_out &o, const crypto::key_derivation &derivation, const std::vector &additional_derivations, size_t i, const is_out_data *is_out_data, tx_scan_info_t &tx_scan_info, bool &already_seen) const; void parse_block_round(const cryptonote::blobdata &blob, cryptonote::block &bl, crypto::hash &bl_id, bool &error) const; uint64_t get_upper_transaction_weight_limit(); std::vector get_unspent_amounts_vector(bool strict); uint64_t get_dynamic_base_fee_estimate(); float get_output_relatedness(const transfer_details &td0, const transfer_details &td1) const; std::vector pick_preferred_rct_inputs(uint64_t needed_money, uint32_t subaddr_account, const std::set &subaddr_indices); void set_spent(size_t idx, uint64_t height); void set_unspent(size_t idx); bool is_spent(const transfer_details &td, bool strict = true) const; bool is_spent(size_t idx, bool strict = true) const; void get_outs(std::vector> &outs, const std::vector &selected_transfers, size_t fake_outputs_count, bool rct, std::unordered_set &valid_public_keys_cache); void get_outs(std::vector> &outs, const std::vector &selected_transfers, size_t fake_outputs_count, std::vector &rct_offsets, std::unordered_set &valid_public_keys_cache); bool tx_add_fake_output(std::vector> &outs, uint64_t global_index, const crypto::public_key& tx_public_key, const rct::key& mask, uint64_t real_index, bool unlocked, std::unordered_set &valid_public_keys_cache) const; bool should_pick_a_second_output(bool use_rct, size_t n_transfers, const std::vector &unused_transfers_indices, const std::vector &unused_dust_indices) const; std::vector get_only_rct(const std::vector &unused_dust_indices, const std::vector &unused_transfers_indices) const; void scan_output(const cryptonote::transaction &tx, bool miner_tx, const crypto::public_key &tx_pub_key, size_t i, tx_scan_info_t &tx_scan_info, int &num_vouts_received, std::unordered_map &tx_money_got_in_outs, std::vector &outs, bool pool); void trim_hashchain(); crypto::key_image get_multisig_composite_key_image(size_t n) const; rct::multisig_kLRki get_multisig_composite_kLRki(size_t n, const std::unordered_set &ignore_set, std::unordered_set &used_L, std::unordered_set &new_used_L) const; rct::multisig_kLRki get_multisig_kLRki(size_t n, const rct::key &k) const; void get_multisig_k(size_t idx, const std::unordered_set &used_L, rct::key &nonce); void update_multisig_rescan_info(const std::vector> &multisig_k, const std::vector> &info, size_t n); bool add_rings(const crypto::chacha_key &key, const cryptonote::transaction_prefix &tx); bool add_rings(const cryptonote::transaction_prefix &tx); bool remove_rings(const cryptonote::transaction_prefix &tx); bool get_ring(const crypto::chacha_key &key, const crypto::key_image &key_image, std::vector &outs); crypto::chacha_key get_ringdb_key(); void setup_keys(const epee::wipeable_string &password); size_t get_transfer_details(const crypto::key_image &ki) const; tx_entry_data get_tx_entries(const std::unordered_set &txids); void sort_scan_tx_entries(std::vector &unsorted_tx_entries); void process_scan_txs(const tx_entry_data &txs_to_scan, const tx_entry_data &txs_to_reprocess, const std::unordered_set &tx_hashes_to_reprocess, detached_blockchain_data &dbd); void register_devices(); hw::device& lookup_device(const std::string & device_descriptor); bool get_rct_distribution(uint64_t &start_height, std::vector &distribution); uint64_t get_segregation_fork_height() const; void cache_tx_data(const cryptonote::transaction& tx, const crypto::hash &txid, tx_cache_data &tx_cache_data) const; std::shared_ptr, size_t>> create_output_tracker_cache() const; void init_type(hw::device::device_type device_type); void setup_new_blockchain(); void create_keys_file(const std::string &wallet_, bool watch_only, const epee::wipeable_string &password, bool create_address_file); wallet_device_callback * get_device_callback(); void on_device_button_request(uint64_t code); void on_device_button_pressed(); boost::optional on_device_pin_request(); boost::optional on_device_passphrase_request(bool & on_device); void on_device_progress(const hw::device_progress& event); std::string get_rpc_status(const std::string &s) const; void throw_on_rpc_response_error(bool r, const epee::json_rpc::error &error, const std::string &status, const char *method) const; std::string get_client_signature() const; void check_rpc_cost(const char *call, uint64_t post_call_credits, uint64_t pre_credits, double expected_cost); bool should_expand(const cryptonote::subaddress_index &index) const; bool spends_one_of_ours(const cryptonote::transaction &tx) const; cryptonote::account_base m_account; boost::optional m_daemon_login; std::string m_daemon_address; std::string m_wallet_file; std::string m_keys_file; std::string m_mms_file; const std::unique_ptr m_http_client; hashchain m_blockchain; serializable_unordered_map m_unconfirmed_txs; serializable_unordered_map m_confirmed_txs; serializable_unordered_multimap m_unconfirmed_payments; serializable_unordered_map m_tx_keys; cryptonote::checkpoints m_checkpoints; serializable_unordered_map> m_additional_tx_keys; transfer_container m_transfers; payment_container m_payments; serializable_unordered_map m_key_images; serializable_unordered_map m_pub_keys; cryptonote::account_public_address m_account_public_address; serializable_unordered_map m_subaddresses; std::vector> m_subaddress_labels; serializable_unordered_map m_tx_notes; serializable_unordered_map m_attributes; std::vector m_address_book; std::pair, std::vector> m_account_tags; uint64_t m_upper_transaction_weight_limit; //TODO: auto-calc this value or request from daemon, now use some fixed value const std::vector> *m_multisig_rescan_info; const std::vector> *m_multisig_rescan_k; serializable_unordered_map m_cold_key_images; std::atomic m_run; boost::recursive_mutex m_daemon_rpc_mutex; bool m_trusted_daemon; i_wallet2_callback* m_callback; hw::device::device_type m_key_device_type; cryptonote::network_type m_nettype; uint64_t m_kdf_rounds; std::string seed_language; /*!< Language of the mnemonics (seed). */ bool is_old_file_format; /*!< Whether the wallet file is of an old file format */ bool m_watch_only; /*!< no spend key */ bool m_multisig; /*!< if > 1 spend secret key will not match spend public key */ uint32_t m_multisig_threshold; std::vector m_multisig_signers; //in case of general M/N multisig wallet we should perform N - M + 1 key exchange rounds and remember how many rounds are passed. uint32_t m_multisig_rounds_passed; std::vector m_multisig_derivations; bool m_always_confirm_transfers; bool m_print_ring_members; bool m_store_tx_info; /*!< request txkey to be returned in RPC, and store in the wallet cache file */ uint32_t m_default_mixin; uint32_t m_default_priority; RefreshType m_refresh_type; bool m_auto_refresh; bool m_first_refresh_done; uint64_t m_refresh_from_block_height; // If m_refresh_from_block_height is explicitly set to zero we need this to differentiate it from the case that // m_refresh_from_block_height was defaulted to zero.*/ bool m_explicit_refresh_from_block_height; uint64_t m_pool_info_query_time; std::vector> m_process_pool_txs; uint64_t m_skip_to_height; // m_skip_to_height is useful when we don't want to modify the wallet's restore height. // m_refresh_from_block_height is also a wallet's restore height which should remain constant unless explicitly modified by the user. bool m_confirm_non_default_ring_size; AskPasswordType m_ask_password; uint64_t m_max_reorg_depth; uint32_t m_min_output_count; uint64_t m_min_output_value; bool m_merge_destinations; bool m_confirm_backlog; uint32_t m_confirm_backlog_threshold; bool m_confirm_export_overwrite; bool m_auto_low_priority; bool m_segregate_pre_fork_outputs; bool m_key_reuse_mitigation2; uint64_t m_segregation_height; bool m_ignore_fractional_outputs; uint64_t m_ignore_outputs_above; uint64_t m_ignore_outputs_below; bool m_track_uses; bool m_show_wallet_name_when_locked; uint32_t m_inactivity_lock_timeout; BackgroundMiningSetupType m_setup_background_mining; bool m_persistent_rpc_client_id; float m_auto_mine_for_rpc_payment_threshold; bool m_is_initialized; NodeRPCProxy m_node_rpc_proxy; std::unordered_set m_scanned_pool_txs[2]; size_t m_subaddress_lookahead_major, m_subaddress_lookahead_minor; std::string m_device_name; std::string m_device_derivation_path; uint64_t m_device_last_key_image_sync; bool m_use_dns; bool m_offline; uint32_t m_rpc_version; crypto::secret_key m_rpc_client_secret_key; rpc_payment_state_t m_rpc_payment_state; uint64_t m_credits_target; bool m_enable_multisig; bool m_allow_mismatched_daemon_version; // Aux transaction data from device serializable_unordered_map m_tx_device; // Light wallet bool m_light_wallet; /* sends view key to daemon for scanning */ uint64_t m_light_wallet_scanned_block_height; uint64_t m_light_wallet_blockchain_height; uint64_t m_light_wallet_per_kb_fee = FEE_PER_KB; bool m_light_wallet_connected; uint64_t m_light_wallet_balance; uint64_t m_light_wallet_unlocked_balance; // Light wallet info needed to populate m_payment requires 2 separate api calls (get_address_txs and get_unspent_outs) // We save the info from the first call in m_light_wallet_address_txs for easier lookup. std::unordered_map m_light_wallet_address_txs; // store calculated key image for faster lookup serializable_unordered_map > m_key_image_cache; std::string m_ring_database; bool m_ring_history_saved; std::unique_ptr m_ringdb; boost::optional m_ringdb_key; uint64_t m_last_block_reward; std::unique_ptr m_keys_file_locker; mms::message_store m_message_store; bool m_original_keys_available; cryptonote::account_public_address m_original_address; crypto::secret_key m_original_view_secret_key; crypto::chacha_key m_cache_key; std::shared_ptr m_encrypt_keys_after_refresh; bool m_unattended; bool m_devices_registered; std::shared_ptr m_tx_notify; std::unique_ptr m_device_callback; ExportFormat m_export_format; bool m_load_deprecated_formats; bool m_has_ever_refreshed_from_node; static boost::mutex default_daemon_address_lock; static std::string default_daemon_address; }; } BOOST_CLASS_VERSION(tools::wallet2, 30) BOOST_CLASS_VERSION(tools::wallet2::transfer_details, 12) BOOST_CLASS_VERSION(tools::wallet2::multisig_info, 1) BOOST_CLASS_VERSION(tools::wallet2::multisig_info::LR, 0) BOOST_CLASS_VERSION(tools::wallet2::multisig_tx_set, 1) BOOST_CLASS_VERSION(tools::wallet2::payment_details, 5) BOOST_CLASS_VERSION(tools::wallet2::pool_payment_details, 1) BOOST_CLASS_VERSION(tools::wallet2::unconfirmed_transfer_details, 8) BOOST_CLASS_VERSION(tools::wallet2::confirmed_transfer_details, 6) BOOST_CLASS_VERSION(tools::wallet2::address_book_row, 18) BOOST_CLASS_VERSION(tools::wallet2::reserve_proof_entry, 0) BOOST_CLASS_VERSION(tools::wallet2::unsigned_tx_set, 1) BOOST_CLASS_VERSION(tools::wallet2::signed_tx_set, 1) BOOST_CLASS_VERSION(tools::wallet2::tx_construction_data, 4) BOOST_CLASS_VERSION(tools::wallet2::pending_tx, 3) BOOST_CLASS_VERSION(tools::wallet2::multisig_sig, 1) namespace boost { namespace serialization { template inline void serialize( Archive & ar, std::tuple & t, const unsigned int /* file_version */ ){ ar & boost::serialization::make_nvp("f", std::get<0>(t)); ar & boost::serialization::make_nvp("s", std::get<1>(t)); ar & boost::serialization::make_nvp("t", std::get<2>(t)); } template inline typename std::enable_if::type initialize_transfer_details(Archive &a, tools::wallet2::transfer_details &x, const boost::serialization::version_type ver) { } template inline typename std::enable_if::type initialize_transfer_details(Archive &a, tools::wallet2::transfer_details &x, const boost::serialization::version_type ver) { if (ver < 1) { x.m_mask = rct::identity(); x.m_amount = x.m_tx.vout[x.m_internal_output_index].amount; } if (ver < 2) { x.m_spent_height = 0; } if (ver < 4) { x.m_rct = x.m_tx.vout[x.m_internal_output_index].amount == 0; } if (ver < 6) { x.m_key_image_known = true; } if (ver < 7) { x.m_pk_index = 0; } if (ver < 8) { x.m_subaddr_index = {}; } if (ver < 9) { x.m_key_image_partial = false; x.m_multisig_k.clear(); x.m_multisig_info.clear(); } if (ver < 10) { x.m_key_image_request = false; } if (ver < 12) { x.m_frozen = false; } } template inline void serialize(Archive &a, tools::wallet2::transfer_details &x, const boost::serialization::version_type ver) { a & x.m_block_height; a & x.m_global_output_index; a & x.m_internal_output_index; if (ver < 3) { cryptonote::transaction tx; a & tx; x.m_tx = (const cryptonote::transaction_prefix&)tx; x.m_txid = cryptonote::get_transaction_hash(tx); } else { a & x.m_tx; } a & x.m_spent; a & x.m_key_image; if (ver < 1) { // ensure mask and amount are set initialize_transfer_details(a, x, ver); return; } a & x.m_mask; a & x.m_amount; if (ver < 2) { initialize_transfer_details(a, x, ver); return; } a & x.m_spent_height; if (ver < 3) { initialize_transfer_details(a, x, ver); return; } a & x.m_txid; if (ver < 4) { initialize_transfer_details(a, x, ver); return; } a & x.m_rct; if (ver < 5) { initialize_transfer_details(a, x, ver); return; } if (ver < 6) { // v5 did not properly initialize uint8_t u; a & u; x.m_key_image_known = true; return; } a & x.m_key_image_known; if (ver < 7) { initialize_transfer_details(a, x, ver); return; } a & x.m_pk_index; if (ver < 8) { initialize_transfer_details(a, x, ver); return; } a & x.m_subaddr_index; if (ver < 9) { initialize_transfer_details(a, x, ver); return; } a & x.m_multisig_info; a & x.m_multisig_k; a & x.m_key_image_partial; if (ver < 10) { initialize_transfer_details(a, x, ver); return; } a & x.m_key_image_request; if (ver < 11) { initialize_transfer_details(a, x, ver); return; } a & x.m_uses; if (ver < 12) { initialize_transfer_details(a, x, ver); return; } a & x.m_frozen; } template inline void serialize(Archive &a, tools::wallet2::multisig_info::LR &x, const boost::serialization::version_type ver) { a & x.m_L; a & x.m_R; } template inline void serialize(Archive &a, tools::wallet2::multisig_info &x, const boost::serialization::version_type ver) { a & x.m_signer; a & x.m_LR; a & x.m_partial_key_images; } template inline void serialize(Archive &a, tools::wallet2::multisig_tx_set &x, const boost::serialization::version_type ver) { a & x.m_ptx; a & x.m_signers; } template inline void serialize(Archive &a, tools::wallet2::unconfirmed_transfer_details &x, const boost::serialization::version_type ver) { a & x.m_change; a & x.m_sent_time; if (ver < 5) { cryptonote::transaction tx; a & tx; x.m_tx = (const cryptonote::transaction_prefix&)tx; } else { a & x.m_tx; } if (ver < 1) return; a & x.m_dests; a & x.m_payment_id; if (ver < 2) return; a & x.m_state; if (ver < 3) return; a & x.m_timestamp; if (ver < 4) return; a & x.m_amount_in; a & x.m_amount_out; if (ver < 6) { // v<6 may not have change accumulated in m_amount_out, which is a pain, // as it's readily understood to be sum of outputs. // We convert it to include change from v6 if (!typename Archive::is_saving() && x.m_change != (uint64_t)-1) x.m_amount_out += x.m_change; } if (ver < 7) { x.m_subaddr_account = 0; return; } a & x.m_subaddr_account; a & x.m_subaddr_indices; if (ver < 8) return; a & x.m_rings; } template inline void serialize(Archive &a, tools::wallet2::confirmed_transfer_details &x, const boost::serialization::version_type ver) { a & x.m_amount_in; a & x.m_amount_out; a & x.m_change; a & x.m_block_height; if (ver < 1) return; a & x.m_dests; a & x.m_payment_id; if (ver < 2) return; a & x.m_timestamp; if (ver < 3) { // v<3 may not have change accumulated in m_amount_out, which is a pain, // as it's readily understood to be sum of outputs. Whether it got added // or not depends on whether it came from a unconfirmed_transfer_details // (not included) or not (included). We can't reliably tell here, so we // check whether either yields a "negative" fee, or use the other if so. // We convert it to include change from v3 if (!typename Archive::is_saving() && x.m_change != (uint64_t)-1) { if (x.m_amount_in > (x.m_amount_out + x.m_change)) x.m_amount_out += x.m_change; } } if (ver < 4) { if (!typename Archive::is_saving()) x.m_unlock_time = 0; return; } a & x.m_unlock_time; if (ver < 5) { x.m_subaddr_account = 0; return; } a & x.m_subaddr_account; a & x.m_subaddr_indices; if (ver < 6) return; a & x.m_rings; } template inline void serialize(Archive& a, tools::wallet2::payment_details& x, const boost::serialization::version_type ver) { a & x.m_tx_hash; a & x.m_amount; a & x.m_block_height; a & x.m_unlock_time; if (ver < 1) return; a & x.m_timestamp; if (ver < 2) { x.m_coinbase = false; x.m_subaddr_index = {}; return; } a & x.m_subaddr_index; if (ver < 3) { x.m_coinbase = false; x.m_fee = 0; return; } a & x.m_fee; if (ver < 4) { x.m_coinbase = false; return; } a & x.m_coinbase; if (ver < 5) return; a & x.m_amounts; } template inline void serialize(Archive& a, tools::wallet2::pool_payment_details& x, const boost::serialization::version_type ver) { a & x.m_pd; a & x.m_double_spend_seen; } template inline void serialize(Archive& a, tools::wallet2::address_book_row& x, const boost::serialization::version_type ver) { a & x.m_address; if (ver < 18) { crypto::hash payment_id; a & payment_id; x.m_has_payment_id = !(payment_id == crypto::null_hash); if (x.m_has_payment_id) { bool is_long = false; for (int i = 8; i < 32; ++i) is_long |= payment_id.data[i]; if (is_long) { MWARNING("Long payment ID ignored on address book load"); x.m_payment_id = crypto::null_hash8; x.m_has_payment_id = false; } else memcpy(x.m_payment_id.data, payment_id.data, 8); } } a & x.m_description; if (ver < 17) { x.m_is_subaddress = false; return; } a & x.m_is_subaddress; if (ver < 18) return; a & x.m_has_payment_id; if (x.m_has_payment_id) a & x.m_payment_id; } template inline void serialize(Archive& a, tools::wallet2::reserve_proof_entry& x, const boost::serialization::version_type ver) { a & x.txid; a & x.index_in_tx; a & x.shared_secret; a & x.key_image; a & x.shared_secret_sig; a & x.key_image_sig; } template inline void serialize(Archive &a, tools::wallet2::unsigned_tx_set &x, const boost::serialization::version_type ver) { a & x.txes; if (ver == 0) { // load old version std::pair old_transfers; a & old_transfers; std::get<0>(x.transfers) = std::get<0>(old_transfers); std::get<1>(x.transfers) = std::get<0>(old_transfers) + std::get<1>(old_transfers).size(); std::get<2>(x.transfers) = std::get<1>(old_transfers); return; } throw std::runtime_error("Boost serialization not supported for newest unsigned_tx_set"); } template inline void serialize(Archive &a, tools::wallet2::signed_tx_set &x, const boost::serialization::version_type ver) { a & x.ptx; a & x.key_images; if (ver < 1) return; a & x.tx_key_images.parent(); } template inline void serialize(Archive &a, tools::wallet2::tx_construction_data &x, const boost::serialization::version_type ver) { a & x.sources; a & x.change_dts; a & x.splitted_dsts; if (ver < 2) { // load list to vector std::list selected_transfers; a & selected_transfers; x.selected_transfers.clear(); x.selected_transfers.reserve(selected_transfers.size()); for (size_t t: selected_transfers) x.selected_transfers.push_back(t); } a & x.extra; a & x.unlock_time; a & x.use_rct; a & x.dests; if (ver < 1) { x.subaddr_account = 0; return; } a & x.subaddr_account; a & x.subaddr_indices; if (ver < 2) { if (!typename Archive::is_saving()) x.rct_config = { rct::RangeProofBorromean, 0 }; return; } a & x.selected_transfers; if (ver < 3) { if (!typename Archive::is_saving()) x.rct_config = { rct::RangeProofBorromean, 0 }; return; } if (ver < 4) { bool use_bulletproofs = x.rct_config.range_proof_type != rct::RangeProofBorromean; a & use_bulletproofs; if (!typename Archive::is_saving()) x.rct_config = { use_bulletproofs ? rct::RangeProofBulletproof : rct::RangeProofBorromean, 0 }; return; } a & x.rct_config; } template inline void serialize(Archive &a, tools::wallet2::multisig_sig &x, const boost::serialization::version_type ver) { a & x.sigs; a & x.ignore; a & x.used_L; a & x.signing_keys; a & x.msout; if (ver < 1) return; a & x.total_alpha_G; a & x.total_alpha_H; a & x.c_0; a & x.s; } template inline void serialize(Archive &a, tools::wallet2::pending_tx &x, const boost::serialization::version_type ver) { a & x.tx; a & x.dust; a & x.fee; a & x.dust_added_to_fee; a & x.change_dts; if (ver < 2) { // load list to vector std::list selected_transfers; a & selected_transfers; x.selected_transfers.clear(); x.selected_transfers.reserve(selected_transfers.size()); for (size_t t: selected_transfers) x.selected_transfers.push_back(t); } a & x.key_images; a & x.tx_key; a & x.dests; a & x.construction_data; if (ver < 1) return; a & x.additional_tx_keys; if (ver < 2) return; a & x.selected_transfers; if (ver < 3) return; a & x.multisig_sigs; } } } namespace tools { namespace detail { //---------------------------------------------------------------------------------------------------- inline void digit_split_strategy(const std::vector& dsts, const cryptonote::tx_destination_entry& change_dst, uint64_t dust_threshold, std::vector& splitted_dsts, std::vector &dust_dsts) { splitted_dsts.clear(); dust_dsts.clear(); for(auto& de: dsts) { cryptonote::decompose_amount_into_digits(de.amount, 0, [&](uint64_t chunk) { splitted_dsts.push_back(cryptonote::tx_destination_entry(chunk, de.addr, de.is_subaddress)); }, [&](uint64_t a_dust) { splitted_dsts.push_back(cryptonote::tx_destination_entry(a_dust, de.addr, de.is_subaddress)); } ); } cryptonote::decompose_amount_into_digits(change_dst.amount, 0, [&](uint64_t chunk) { if (chunk <= dust_threshold) dust_dsts.push_back(cryptonote::tx_destination_entry(chunk, change_dst.addr, false)); else splitted_dsts.push_back(cryptonote::tx_destination_entry(chunk, change_dst.addr, false)); }, [&](uint64_t a_dust) { dust_dsts.push_back(cryptonote::tx_destination_entry(a_dust, change_dst.addr, false)); } ); } //---------------------------------------------------------------------------------------------------- inline void null_split_strategy(const std::vector& dsts, const cryptonote::tx_destination_entry& change_dst, uint64_t dust_threshold, std::vector& splitted_dsts, std::vector &dust_dsts) { splitted_dsts = dsts; dust_dsts.clear(); uint64_t change = change_dst.amount; if (0 != change) { splitted_dsts.push_back(cryptonote::tx_destination_entry(change, change_dst.addr, false)); } } //---------------------------------------------------------------------------------------------------- inline void print_source_entry(const cryptonote::tx_source_entry& src) { std::string indexes; std::for_each(src.outputs.begin(), src.outputs.end(), [&](const cryptonote::tx_source_entry::output_entry& s_e) { indexes += boost::to_string(s_e.first) + " "; }); LOG_PRINT_L0("amount=" << cryptonote::print_money(src.amount) << ", real_output=" <