2017-05-05 13:26:27 +02:00
|
|
|
// Copyright (c) 2014-2017 The Dash Core developers
|
|
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
#include "privatesend-server.h"
|
|
|
|
|
|
|
|
#include "activemasternode.h"
|
|
|
|
#include "consensus/validation.h"
|
|
|
|
#include "core_io.h"
|
|
|
|
#include "init.h"
|
|
|
|
#include "masternode-sync.h"
|
|
|
|
#include "masternodeman.h"
|
2016-11-25 20:01:56 +01:00
|
|
|
#include "netmessagemaker.h"
|
2017-12-01 19:53:34 +01:00
|
|
|
#include "script/interpreter.h"
|
2017-05-05 13:26:27 +02:00
|
|
|
#include "txmempool.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "utilmoneystr.h"
|
|
|
|
|
|
|
|
CPrivateSendServer privateSendServer;
|
|
|
|
|
2017-02-06 14:31:37 +01:00
|
|
|
void CPrivateSendServer::ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStream& vRecv, CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
if(fLiteMode) return; // ignore all Dash related functionality
|
|
|
|
if(!masternodeSync.IsBlockchainSynced()) return;
|
|
|
|
|
|
|
|
if(strCommand == NetMsgType::DSACCEPT) {
|
|
|
|
|
|
|
|
if(pfrom->nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION) {
|
|
|
|
LogPrintf("DSACCEPT -- incompatible version! nVersion: %d\n", pfrom->nVersion);
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_VERSION, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(IsSessionReady()) {
|
|
|
|
// too many users in this session already, reject new ones
|
|
|
|
LogPrintf("DSACCEPT -- queue is already full!\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_ACCEPTED, ERR_QUEUE_FULL, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
CDarksendAccept dsa;
|
|
|
|
vRecv >> dsa;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
LogPrint("privatesend", "DSACCEPT -- nDenom %d (%s) txCollateral %s", dsa.nDenom, CPrivateSend::GetDenominationsToString(dsa.nDenom), dsa.txCollateral.ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
masternode_info_t mnInfo;
|
|
|
|
if(!mnodeman.GetMasternodeInfo(activeMasternode.outpoint, mnInfo)) {
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_MN_LIST, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
if(vecSessionCollaterals.size() == 0 && mnInfo.nLastDsq != 0 &&
|
|
|
|
mnInfo.nLastDsq + mnodeman.CountEnabled(MIN_PRIVATESEND_PEER_PROTO_VERSION)/5 > mnodeman.nDsqCount)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
|
|
|
LogPrintf("DSACCEPT -- last dsq too recent, must wait: addr=%s\n", pfrom->addr.ToString());
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_RECENT, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
PoolMessage nMessageID = MSG_NOERR;
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
bool fResult = nSessionID == 0 ? CreateNewSession(dsa, nMessageID, connman)
|
|
|
|
: AddUserToExistingSession(dsa, nMessageID);
|
2017-05-05 13:26:27 +02:00
|
|
|
if(fResult) {
|
|
|
|
LogPrintf("DSACCEPT -- is compatible, please submit!\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_ACCEPTED, nMessageID, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
LogPrintf("DSACCEPT -- not compatible with existing transactions!\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, nMessageID, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if(strCommand == NetMsgType::DSQUEUE) {
|
|
|
|
TRY_LOCK(cs_darksend, lockRecv);
|
|
|
|
if(!lockRecv) return;
|
|
|
|
|
|
|
|
if(pfrom->nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION) {
|
|
|
|
LogPrint("privatesend", "DSQUEUE -- incompatible version! nVersion: %d\n", pfrom->nVersion);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
CDarksendQueue dsq;
|
|
|
|
vRecv >> dsq;
|
|
|
|
|
|
|
|
// process every dsq only once
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& q : vecDarksendQueue) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(q == dsq) {
|
|
|
|
// LogPrint("privatesend", "DSQUEUE -- %s seen\n", dsq.ToString());
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrint("privatesend", "DSQUEUE -- %s new\n", dsq.ToString());
|
|
|
|
|
2017-08-29 01:51:44 +02:00
|
|
|
if(dsq.IsExpired()) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
masternode_info_t mnInfo;
|
|
|
|
if(!mnodeman.GetMasternodeInfo(dsq.vin.prevout, mnInfo)) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
if(!dsq.CheckSignature(mnInfo.pubKeyMasternode)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
// we probably have outdated info
|
2017-09-19 16:51:38 +02:00
|
|
|
mnodeman.AskForMN(pfrom, dsq.vin.prevout, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!dsq.fReady) {
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& q : vecDarksendQueue) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(q.vin == dsq.vin) {
|
|
|
|
// no way same mn can send another "not yet ready" dsq this soon
|
2017-09-11 16:13:48 +02:00
|
|
|
LogPrint("privatesend", "DSQUEUE -- Masternode %s is sending WAY too many dsq messages\n", mnInfo.addr.ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
int nThreshold = mnInfo.nLastDsq + mnodeman.CountEnabled(MIN_PRIVATESEND_PEER_PROTO_VERSION)/5;
|
|
|
|
LogPrint("privatesend", "DSQUEUE -- nLastDsq: %d threshold: %d nDsqCount: %d\n", mnInfo.nLastDsq, nThreshold, mnodeman.nDsqCount);
|
2017-05-05 13:26:27 +02:00
|
|
|
//don't allow a few nodes to dominate the queuing process
|
2017-09-11 16:13:48 +02:00
|
|
|
if(mnInfo.nLastDsq != 0 && nThreshold > mnodeman.nDsqCount) {
|
|
|
|
LogPrint("privatesend", "DSQUEUE -- Masternode %s is sending too many dsq messages\n", mnInfo.addr.ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
2017-09-11 16:13:48 +02:00
|
|
|
mnodeman.AllowMixing(dsq.vin.prevout);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
LogPrint("privatesend", "DSQUEUE -- new PrivateSend queue (%s) from masternode %s\n", dsq.ToString(), mnInfo.addr.ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
vecDarksendQueue.push_back(dsq);
|
2017-09-19 16:51:38 +02:00
|
|
|
dsq.Relay(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
} else if(strCommand == NetMsgType::DSVIN) {
|
|
|
|
|
|
|
|
if(pfrom->nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION) {
|
|
|
|
LogPrintf("DSVIN -- incompatible version! nVersion: %d\n", pfrom->nVersion);
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_VERSION, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
//do we have enough users in the current session?
|
|
|
|
if(!IsSessionReady()) {
|
|
|
|
LogPrintf("DSVIN -- session not complete!\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_SESSION, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
CDarkSendEntry entry;
|
|
|
|
vRecv >> entry;
|
|
|
|
|
2017-09-20 14:02:53 +02:00
|
|
|
LogPrint("privatesend", "DSVIN -- txCollateral %s", entry.txCollateral->ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
if(entry.vecTxDSIn.size() > PRIVATESEND_ENTRY_MAX_SIZE) {
|
|
|
|
LogPrintf("DSVIN -- ERROR: too many inputs! %d/%d\n", entry.vecTxDSIn.size(), PRIVATESEND_ENTRY_MAX_SIZE);
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_MAXIMUM, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-12-04 07:06:07 +01:00
|
|
|
if(entry.vecTxOut.size() > PRIVATESEND_ENTRY_MAX_SIZE) {
|
|
|
|
LogPrintf("DSVIN -- ERROR: too many outputs! %d/%d\n", entry.vecTxOut.size(), PRIVATESEND_ENTRY_MAX_SIZE);
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_MAXIMUM, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
//do we have the same denominations as the current session?
|
2017-12-04 07:06:07 +01:00
|
|
|
if(!IsOutputsCompatibleWithSessionDenom(entry.vecTxOut)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrintf("DSVIN -- not compatible with existing transactions!\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_EXISTING_TX, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
//check it like a transaction
|
|
|
|
{
|
|
|
|
CAmount nValueIn = 0;
|
|
|
|
CAmount nValueOut = 0;
|
|
|
|
|
|
|
|
CMutableTransaction tx;
|
|
|
|
|
2017-12-04 07:06:07 +01:00
|
|
|
for (const auto& txout : entry.vecTxOut) {
|
2017-05-05 13:26:27 +02:00
|
|
|
nValueOut += txout.nValue;
|
|
|
|
tx.vout.push_back(txout);
|
|
|
|
|
|
|
|
if(txout.scriptPubKey.size() != 25) {
|
|
|
|
LogPrintf("DSVIN -- non-standard pubkey detected! scriptPubKey=%s\n", ScriptToAsmStr(txout.scriptPubKey));
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_NON_STANDARD_PUBKEY, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
2017-12-07 02:33:51 +01:00
|
|
|
if(!txout.scriptPubKey.IsPayToPublicKeyHash()) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrintf("DSVIN -- invalid script! scriptPubKey=%s\n", ScriptToAsmStr(txout.scriptPubKey));
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_INVALID_SCRIPT, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txin : entry.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
tx.vin.push_back(txin);
|
|
|
|
|
|
|
|
LogPrint("privatesend", "DSVIN -- txin=%s\n", txin.ToString());
|
|
|
|
|
2017-09-26 16:33:46 +02:00
|
|
|
Coin coin;
|
|
|
|
if(GetUTXOCoin(txin.prevout, coin)) {
|
|
|
|
nValueIn += coin.out.nValue;
|
2017-05-05 13:26:27 +02:00
|
|
|
} else {
|
|
|
|
LogPrintf("DSVIN -- missing input! tx=%s", tx.ToString());
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_MISSING_TX, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// There should be no fee in mixing tx
|
|
|
|
CAmount nFee = nValueIn - nValueOut;
|
|
|
|
if(nFee != 0) {
|
|
|
|
LogPrintf("DSVIN -- there should be no fee in mixing tx! fees: %lld, tx=%s", nFee, tx.ToString());
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, ERR_FEES, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
PoolMessage nMessageID = MSG_NOERR;
|
|
|
|
|
2017-07-25 12:57:26 +02:00
|
|
|
entry.addr = pfrom->addr;
|
2017-05-05 13:26:27 +02:00
|
|
|
if(AddEntry(entry, nMessageID)) {
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_ACCEPTED, nMessageID, connman);
|
|
|
|
CheckPool(connman);
|
|
|
|
RelayStatus(STATUS_ACCEPTED, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
} else {
|
2017-09-19 16:51:38 +02:00
|
|
|
PushStatus(pfrom, STATUS_REJECTED, nMessageID, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
SetNull();
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if(strCommand == NetMsgType::DSSIGNFINALTX) {
|
|
|
|
|
|
|
|
if(pfrom->nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION) {
|
|
|
|
LogPrintf("DSSIGNFINALTX -- incompatible version! nVersion: %d\n", pfrom->nVersion);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<CTxIn> vecTxIn;
|
|
|
|
vRecv >> vecTxIn;
|
|
|
|
|
|
|
|
LogPrint("privatesend", "DSSIGNFINALTX -- vecTxIn.size() %s\n", vecTxIn.size());
|
|
|
|
|
|
|
|
int nTxInIndex = 0;
|
|
|
|
int nTxInsCount = (int)vecTxIn.size();
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txin : vecTxIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
nTxInIndex++;
|
|
|
|
if(!AddScriptSig(txin)) {
|
|
|
|
LogPrint("privatesend", "DSSIGNFINALTX -- AddScriptSig() failed at %d/%d, session: %d\n", nTxInIndex, nTxInsCount, nSessionID);
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayStatus(STATUS_REJECTED, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
LogPrint("privatesend", "DSSIGNFINALTX -- AddScriptSig() %d/%d success\n", nTxInIndex, nTxInsCount);
|
|
|
|
}
|
|
|
|
// all is good
|
2017-09-19 16:51:38 +02:00
|
|
|
CheckPool(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CPrivateSendServer::SetNull()
|
|
|
|
{
|
|
|
|
// MN side
|
|
|
|
vecSessionCollaterals.clear();
|
|
|
|
|
2017-06-30 20:30:16 +02:00
|
|
|
CPrivateSendBase::SetNull();
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check the mixing progress and send client updates if a Masternode
|
|
|
|
//
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::CheckPool(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(fMasternodeMode) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckPool -- entries count %lu\n", GetEntriesCount());
|
|
|
|
|
|
|
|
// If entries are full, create finalized transaction
|
2017-06-30 20:30:16 +02:00
|
|
|
if(nState == POOL_STATE_ACCEPTING_ENTRIES && GetEntriesCount() >= CPrivateSend::GetMaxPoolTransactions()) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckPool -- FINALIZE TRANSACTIONS\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
CreateFinalTransaction(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we have all of the signatures, try to compile the transaction
|
|
|
|
if(nState == POOL_STATE_SIGNING && IsSignaturesComplete()) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckPool -- SIGNING\n");
|
2017-09-19 16:51:38 +02:00
|
|
|
CommitFinalTransaction(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// reset if we're here for 10 seconds
|
|
|
|
if((nState == POOL_STATE_ERROR || nState == POOL_STATE_SUCCESS) && GetTimeMillis() - nTimeLastSuccessfulStep >= 10000) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckPool -- timeout, RESETTING\n");
|
|
|
|
SetNull();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::CreateFinalTransaction(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CreateFinalTransaction -- FINALIZE TRANSACTIONS\n");
|
|
|
|
|
|
|
|
CMutableTransaction txNew;
|
|
|
|
|
|
|
|
// make our new transaction
|
|
|
|
for(int i = 0; i < GetEntriesCount(); i++) {
|
2017-12-04 07:06:07 +01:00
|
|
|
for (const auto& txout : vecEntries[i].vecTxOut)
|
|
|
|
txNew.vout.push_back(txout);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txdsin : vecEntries[i].vecTxDSIn)
|
2017-05-05 13:26:27 +02:00
|
|
|
txNew.vin.push_back(txdsin);
|
|
|
|
}
|
|
|
|
|
2017-07-10 16:42:59 +02:00
|
|
|
sort(txNew.vin.begin(), txNew.vin.end(), CompareInputBIP69());
|
|
|
|
sort(txNew.vout.begin(), txNew.vout.end(), CompareOutputBIP69());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
finalMutableTransaction = txNew;
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CreateFinalTransaction -- finalMutableTransaction=%s", txNew.ToString());
|
|
|
|
|
|
|
|
// request signatures from clients
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayFinalTransaction(finalMutableTransaction, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
SetState(POOL_STATE_SIGNING);
|
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::CommitFinalTransaction(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return; // check and relay final tx only on masternode
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-01-04 12:22:49 +01:00
|
|
|
CTransactionRef finalTransaction = MakeTransactionRef(finalMutableTransaction);
|
|
|
|
uint256 hashTx = finalTransaction->GetHash();
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-01-04 12:22:49 +01:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CommitFinalTransaction -- finalTransaction=%s", finalTransaction->ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
// See if the transaction is valid
|
|
|
|
TRY_LOCK(cs_main, lockMain);
|
|
|
|
CValidationState validationState;
|
|
|
|
mempool.PrioritiseTransaction(hashTx, hashTx.ToString(), 1000, 0.1*COIN);
|
2017-12-29 23:05:33 +01:00
|
|
|
if(!lockMain || !AcceptToMemoryPool(mempool, validationState, finalTransaction, false, NULL, false, maxTxFee, true))
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
|
|
|
LogPrintf("CPrivateSendServer::CommitFinalTransaction -- AcceptToMemoryPool() error: Transaction not valid\n");
|
|
|
|
SetNull();
|
|
|
|
// not much we can do in this case, just notify clients
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayCompletedTransaction(ERR_INVALID_TX, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrintf("CPrivateSendServer::CommitFinalTransaction -- CREATING DSTX\n");
|
|
|
|
|
|
|
|
// create and sign masternode dstx transaction
|
2017-07-19 21:49:48 +02:00
|
|
|
if(!CPrivateSend::GetDSTX(hashTx)) {
|
2017-09-11 16:13:48 +02:00
|
|
|
CDarksendBroadcastTx dstxNew(finalTransaction, activeMasternode.outpoint, GetAdjustedTime());
|
2017-06-30 20:30:16 +02:00
|
|
|
dstxNew.Sign();
|
|
|
|
CPrivateSend::AddDSTX(dstxNew);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
LogPrintf("CPrivateSendServer::CommitFinalTransaction -- TRANSMITTING DSTX\n");
|
|
|
|
|
|
|
|
CInv inv(MSG_DSTX, hashTx);
|
2017-09-19 16:51:38 +02:00
|
|
|
connman.RelayInv(inv);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
// Tell the clients it was successful
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayCompletedTransaction(MSG_SUCCESS, connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
// Randomly charge clients
|
2017-09-19 16:51:38 +02:00
|
|
|
ChargeRandomFees(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
// Reset
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CommitFinalTransaction -- COMPLETED -- RESETTING\n");
|
|
|
|
SetNull();
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Charge clients a fee if they're abusive
|
|
|
|
//
|
|
|
|
// Why bother? PrivateSend uses collateral to ensure abuse to the process is kept to a minimum.
|
|
|
|
// The submission and signing stages are completely separate. In the cases where
|
|
|
|
// a client submits a transaction then refused to sign, there must be a cost. Otherwise they
|
2018-02-08 06:46:44 +01:00
|
|
|
// would be able to do this over and over again and bring the mixing to a halt.
|
2017-05-05 13:26:27 +02:00
|
|
|
//
|
|
|
|
// How does this work? Messages to Masternodes come in via NetMsgType::DSVIN, these require a valid collateral
|
|
|
|
// transaction for the client to be able to enter the pool. This transaction is kept by the Masternode
|
|
|
|
// until the transaction is either complete or fails.
|
|
|
|
//
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::ChargeFees(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
//we don't need to charge collateral for every offence.
|
|
|
|
if(GetRandInt(100) > 33) return;
|
|
|
|
|
2017-09-20 14:02:53 +02:00
|
|
|
std::vector<CTransactionRef> vecOffendersCollaterals;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
if(nState == POOL_STATE_ACCEPTING_ENTRIES) {
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txCollateral : vecSessionCollaterals) {
|
2017-05-05 13:26:27 +02:00
|
|
|
bool fFound = false;
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries)
|
2017-09-20 14:02:53 +02:00
|
|
|
if(*entry.txCollateral == *txCollateral)
|
2017-05-05 13:26:27 +02:00
|
|
|
fFound = true;
|
|
|
|
|
|
|
|
// This queue entry didn't send us the promised transaction
|
|
|
|
if(!fFound) {
|
|
|
|
LogPrintf("CPrivateSendServer::ChargeFees -- found uncooperative node (didn't send transaction), found offence\n");
|
|
|
|
vecOffendersCollaterals.push_back(txCollateral);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(nState == POOL_STATE_SIGNING) {
|
|
|
|
// who didn't sign?
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
|
|
|
for (const auto& txdsin : entry.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(!txdsin.fHasSig) {
|
|
|
|
LogPrintf("CPrivateSendServer::ChargeFees -- found uncooperative node (didn't sign), found offence\n");
|
|
|
|
vecOffendersCollaterals.push_back(entry.txCollateral);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// no offences found
|
|
|
|
if(vecOffendersCollaterals.empty()) return;
|
|
|
|
|
|
|
|
//mostly offending? Charge sometimes
|
|
|
|
if((int)vecOffendersCollaterals.size() >= Params().PoolMaxTransactions() - 1 && GetRandInt(100) > 33) return;
|
|
|
|
|
|
|
|
//everyone is an offender? That's not right
|
|
|
|
if((int)vecOffendersCollaterals.size() >= Params().PoolMaxTransactions()) return;
|
|
|
|
|
|
|
|
//charge one of the offenders randomly
|
|
|
|
std::random_shuffle(vecOffendersCollaterals.begin(), vecOffendersCollaterals.end());
|
|
|
|
|
|
|
|
if(nState == POOL_STATE_ACCEPTING_ENTRIES || nState == POOL_STATE_SIGNING) {
|
|
|
|
LogPrintf("CPrivateSendServer::ChargeFees -- found uncooperative node (didn't %s transaction), charging fees: %s\n",
|
2017-09-20 14:02:53 +02:00
|
|
|
(nState == POOL_STATE_SIGNING) ? "sign" : "send", vecOffendersCollaterals[0]->ToString());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-12 13:47:35 +01:00
|
|
|
connman.RelayTransaction(*vecOffendersCollaterals[0]);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Charge the collateral randomly.
|
|
|
|
Mixing is completely free, to pay miners we randomly pay the collateral of users.
|
|
|
|
|
|
|
|
Collateral Fee Charges:
|
|
|
|
|
|
|
|
Being that mixing has "no fees" we need to have some kind of cost associated
|
|
|
|
with using it to stop abuse. Otherwise it could serve as an attack vector and
|
|
|
|
allow endless transaction that would bloat Dash and make it unusable. To
|
|
|
|
stop these kinds of attacks 1 in 10 successful transactions are charged. This
|
|
|
|
adds up to a cost of 0.001DRK per transaction on average.
|
|
|
|
*/
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::ChargeRandomFees(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txCollateral : vecSessionCollaterals) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(GetRandInt(100) > 10) return;
|
2017-09-20 14:02:53 +02:00
|
|
|
LogPrintf("CPrivateSendServer::ChargeRandomFees -- charging random fees, txCollateral=%s", txCollateral->ToString());
|
2018-02-12 13:47:35 +01:00
|
|
|
connman.RelayTransaction(*txCollateral);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check for various timeouts (queue objects, mixing, etc)
|
|
|
|
//
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::CheckTimeout(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2017-12-04 07:06:07 +01:00
|
|
|
CheckQueue();
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-01-26 02:11:01 +01:00
|
|
|
int nLagTime = fMasternodeMode ? 0 : 10000; // if we're the client, give the server a few extra seconds before resetting.
|
2017-05-05 13:26:27 +02:00
|
|
|
int nTimeout = (nState == POOL_STATE_SIGNING) ? PRIVATESEND_SIGNING_TIMEOUT : PRIVATESEND_QUEUE_TIMEOUT;
|
|
|
|
bool fTimeout = GetTimeMillis() - nTimeLastSuccessfulStep >= nTimeout*1000 + nLagTime;
|
|
|
|
|
|
|
|
if(nState != POOL_STATE_IDLE && fTimeout) {
|
2018-02-08 06:46:44 +01:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckTimeout -- %s timed out (%ds) -- resetting\n",
|
2017-05-05 13:26:27 +02:00
|
|
|
(nState == POOL_STATE_SIGNING) ? "Signing" : "Session", nTimeout);
|
2017-09-19 16:51:38 +02:00
|
|
|
ChargeFees(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
SetNull();
|
|
|
|
SetState(POOL_STATE_ERROR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Check to see if we're ready for submissions from clients
|
|
|
|
After receiving multiple dsa messages, the queue will switch to "accepting entries"
|
|
|
|
which is the active state right before merging the transaction
|
|
|
|
*/
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::CheckForCompleteQueue(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
if(nState == POOL_STATE_QUEUE && IsSessionReady()) {
|
|
|
|
SetState(POOL_STATE_ACCEPTING_ENTRIES);
|
|
|
|
|
2017-09-11 16:13:48 +02:00
|
|
|
CDarksendQueue dsq(nSessionDenom, activeMasternode.outpoint, GetAdjustedTime(), true);
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CheckForCompleteQueue -- queue is ready, signing and relaying (%s)\n", dsq.ToString());
|
|
|
|
dsq.Sign();
|
2017-09-19 16:51:38 +02:00
|
|
|
dsq.Relay(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check to make sure a given input matches an input in the pool and its scriptSig is valid
|
|
|
|
bool CPrivateSendServer::IsInputScriptSigValid(const CTxIn& txin)
|
|
|
|
{
|
|
|
|
CMutableTransaction txNew;
|
|
|
|
txNew.vin.clear();
|
|
|
|
txNew.vout.clear();
|
|
|
|
|
|
|
|
int i = 0;
|
|
|
|
int nTxInIndex = -1;
|
|
|
|
CScript sigPubKey = CScript();
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2017-12-04 07:06:07 +01:00
|
|
|
for (const auto& txout : entry.vecTxOut)
|
|
|
|
txNew.vout.push_back(txout);
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txdsin : entry.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
txNew.vin.push_back(txdsin);
|
|
|
|
|
|
|
|
if(txdsin.prevout == txin.prevout) {
|
|
|
|
nTxInIndex = i;
|
|
|
|
sigPubKey = txdsin.prevPubKey;
|
|
|
|
}
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(nTxInIndex >= 0) { //might have to do this one input at a time?
|
|
|
|
txNew.vin[nTxInIndex].scriptSig = txin.scriptSig;
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::IsInputScriptSigValid -- verifying scriptSig %s\n", ScriptToAsmStr(txin.scriptSig).substr(0,24));
|
|
|
|
if(!VerifyScript(txNew.vin[nTxInIndex].scriptSig, sigPubKey, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_STRICTENC, MutableTransactionSignatureChecker(&txNew, nTxInIndex))) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::IsInputScriptSigValid -- VerifyScript() failed on input %d\n", nTxInIndex);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::IsInputScriptSigValid -- Failed to find matching input in pool, %s\n", txin.ToString());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::IsInputScriptSigValid -- Successfully validated input and scriptSig\n");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Add a clients transaction to the pool
|
|
|
|
//
|
|
|
|
bool CPrivateSendServer::AddEntry(const CDarkSendEntry& entryNew, PoolMessage& nMessageIDRet)
|
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txin : entryNew.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(txin.prevout.IsNull()) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddEntry -- input not valid!\n");
|
|
|
|
nMessageIDRet = ERR_INVALID_INPUT;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-20 14:02:53 +02:00
|
|
|
if(!CPrivateSend::IsCollateralValid(*entryNew.txCollateral)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddEntry -- collateral not valid!\n");
|
|
|
|
nMessageIDRet = ERR_INVALID_COLLATERAL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-06-30 20:30:16 +02:00
|
|
|
if(GetEntriesCount() >= CPrivateSend::GetMaxPoolTransactions()) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddEntry -- entries is full!\n");
|
|
|
|
nMessageIDRet = ERR_ENTRIES_FULL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& txin : entryNew.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "looking for txin -- %s\n", txin.ToString());
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
|
|
|
for (const auto& txdsin : entry.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(txdsin.prevout == txin.prevout) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddEntry -- found in txin\n");
|
|
|
|
nMessageIDRet = ERR_ALREADY_HAVE;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
vecEntries.push_back(entryNew);
|
|
|
|
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddEntry -- adding entry\n");
|
|
|
|
nMessageIDRet = MSG_ENTRIES_ADDED;
|
|
|
|
nTimeLastSuccessfulStep = GetTimeMillis();
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CPrivateSendServer::AddScriptSig(const CTxIn& txinNew)
|
|
|
|
{
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- scriptSig=%s\n", ScriptToAsmStr(txinNew.scriptSig).substr(0,24));
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
|
|
|
for (const auto& txdsin : entry.vecTxDSIn) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(txdsin.scriptSig == txinNew.scriptSig) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- already exists\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!IsInputScriptSigValid(txinNew)) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- Invalid scriptSig\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- scriptSig=%s new\n", ScriptToAsmStr(txinNew.scriptSig).substr(0,24));
|
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (auto& txin : finalMutableTransaction.vin) {
|
2017-05-05 13:26:27 +02:00
|
|
|
if(txinNew.prevout == txin.prevout && txin.nSequence == txinNew.nSequence) {
|
|
|
|
txin.scriptSig = txinNew.scriptSig;
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- adding to finalMutableTransaction, scriptSig=%s\n", ScriptToAsmStr(txinNew.scriptSig).substr(0,24));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for(int i = 0; i < GetEntriesCount(); i++) {
|
|
|
|
if(vecEntries[i].AddScriptSig(txinNew)) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::AddScriptSig -- adding to entries, scriptSig=%s\n", ScriptToAsmStr(txinNew.scriptSig).substr(0,24));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrintf("CPrivateSendServer::AddScriptSig -- Couldn't set sig!\n" );
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check to make sure everything is signed
|
|
|
|
bool CPrivateSendServer::IsSignaturesComplete()
|
|
|
|
{
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries)
|
|
|
|
for (const auto& txdsin : entry.vecTxDSIn)
|
2017-05-05 13:26:27 +02:00
|
|
|
if(!txdsin.fHasSig) return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-12-04 07:06:07 +01:00
|
|
|
bool CPrivateSendServer::IsOutputsCompatibleWithSessionDenom(const std::vector<CTxOut>& vecTxOut)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2017-12-04 07:06:07 +01:00
|
|
|
if(CPrivateSend::GetDenominations(vecTxOut) == 0) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
2017-12-04 07:06:07 +01:00
|
|
|
LogPrintf("CPrivateSendServer::IsOutputsCompatibleWithSessionDenom -- vecTxOut denom %d, entry.vecTxOut denom %d\n",
|
|
|
|
CPrivateSend::GetDenominations(vecTxOut), CPrivateSend::GetDenominations(entry.vecTxOut));
|
|
|
|
if(CPrivateSend::GetDenominations(vecTxOut) != CPrivateSend::GetDenominations(entry.vecTxOut)) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
bool CPrivateSendServer::IsAcceptableDSA(const CDarksendAccept& dsa, PoolMessage& nMessageIDRet)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
// is denom even smth legit?
|
|
|
|
std::vector<int> vecBits;
|
2018-01-26 02:11:15 +01:00
|
|
|
if(!CPrivateSend::GetDenominationsBits(dsa.nDenom, vecBits)) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::%s -- denom not valid!\n", __func__);
|
2017-05-05 13:26:27 +02:00
|
|
|
nMessageIDRet = ERR_DENOM;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// check collateral
|
2018-01-26 02:11:15 +01:00
|
|
|
if(!fUnitTest && !CPrivateSend::IsCollateralValid(dsa.txCollateral)) {
|
|
|
|
LogPrint("privatesend", "CPrivateSendServer::%s -- collateral not valid!\n", __func__);
|
2017-05-05 13:26:27 +02:00
|
|
|
nMessageIDRet = ERR_INVALID_COLLATERAL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
bool CPrivateSendServer::CreateNewSession(const CDarksendAccept& dsa, PoolMessage& nMessageIDRet, CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode || nSessionID != 0) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
// new session can only be started in idle mode
|
|
|
|
if(nState != POOL_STATE_IDLE) {
|
|
|
|
nMessageIDRet = ERR_MODE;
|
|
|
|
LogPrintf("CPrivateSendServer::CreateNewSession -- incompatible mode: nState=%d\n", nState);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
if(!IsAcceptableDSA(dsa, nMessageIDRet)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// start new session
|
|
|
|
nMessageIDRet = MSG_NOERR;
|
|
|
|
nSessionID = GetRandInt(999999)+1;
|
2018-01-26 02:11:15 +01:00
|
|
|
nSessionDenom = dsa.nDenom;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
SetState(POOL_STATE_QUEUE);
|
|
|
|
nTimeLastSuccessfulStep = GetTimeMillis();
|
|
|
|
|
|
|
|
if(!fUnitTest) {
|
|
|
|
//broadcast that I'm accepting entries, only if it's the first entry through
|
2018-01-26 02:11:15 +01:00
|
|
|
CDarksendQueue dsq(dsa.nDenom, activeMasternode.outpoint, GetAdjustedTime(), false);
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::CreateNewSession -- signing and relaying new queue: %s\n", dsq.ToString());
|
|
|
|
dsq.Sign();
|
2017-09-19 16:51:38 +02:00
|
|
|
dsq.Relay(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
vecDarksendQueue.push_back(dsq);
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
vecSessionCollaterals.push_back(MakeTransactionRef(dsa.txCollateral));
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrintf("CPrivateSendServer::CreateNewSession -- new session created, nSessionID: %d nSessionDenom: %d (%s) vecSessionCollaterals.size(): %d\n",
|
2017-06-30 20:30:16 +02:00
|
|
|
nSessionID, nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom), vecSessionCollaterals.size());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
bool CPrivateSendServer::AddUserToExistingSession(const CDarksendAccept& dsa, PoolMessage& nMessageIDRet)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(!fMasternodeMode || nSessionID == 0 || IsSessionReady()) return false;
|
2017-05-05 13:26:27 +02:00
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
if(!IsAcceptableDSA(dsa, nMessageIDRet)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// we only add new users to an existing session when we are in queue mode
|
|
|
|
if(nState != POOL_STATE_QUEUE) {
|
|
|
|
nMessageIDRet = ERR_MODE;
|
|
|
|
LogPrintf("CPrivateSendServer::AddUserToExistingSession -- incompatible mode: nState=%d\n", nState);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-01-26 02:11:15 +01:00
|
|
|
if(dsa.nDenom != nSessionDenom) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrintf("CPrivateSendServer::AddUserToExistingSession -- incompatible denom %d (%s) != nSessionDenom %d (%s)\n",
|
2018-01-26 02:11:15 +01:00
|
|
|
dsa.nDenom, CPrivateSend::GetDenominationsToString(dsa.nDenom), nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom));
|
2017-05-05 13:26:27 +02:00
|
|
|
nMessageIDRet = ERR_DENOM;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// count new user as accepted to an existing session
|
|
|
|
|
|
|
|
nMessageIDRet = MSG_NOERR;
|
|
|
|
nTimeLastSuccessfulStep = GetTimeMillis();
|
2018-01-26 02:11:15 +01:00
|
|
|
vecSessionCollaterals.push_back(MakeTransactionRef(dsa.txCollateral));
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
LogPrintf("CPrivateSendServer::AddUserToExistingSession -- new user accepted, nSessionID: %d nSessionDenom: %d (%s) vecSessionCollaterals.size(): %d\n",
|
2017-06-30 20:30:16 +02:00
|
|
|
nSessionID, nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom), vecSessionCollaterals.size());
|
2017-05-05 13:26:27 +02:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::RelayFinalTransaction(const CTransaction& txFinal, CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2017-07-25 12:57:26 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::%s -- nSessionID: %d nSessionDenom: %d (%s)\n",
|
|
|
|
__func__, nSessionID, nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom));
|
|
|
|
|
|
|
|
// final mixing tx with empty signatures should be relayed to mixing participants only
|
|
|
|
for (const auto entry : vecEntries) {
|
2017-09-19 16:51:38 +02:00
|
|
|
bool fOk = connman.ForNode(entry.addr, [&txFinal, &connman, this](CNode* pnode) {
|
2016-11-25 20:01:56 +01:00
|
|
|
CNetMsgMaker msgMaker(pnode->GetSendVersion());
|
|
|
|
connman.PushMessage(pnode, msgMaker.Make(NetMsgType::DSFINALTX, nSessionID, txFinal));
|
2017-07-25 12:57:26 +02:00
|
|
|
return true;
|
|
|
|
});
|
|
|
|
if(!fOk) {
|
|
|
|
// no such node? maybe this client disconnected or our own connection went down
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayStatus(STATUS_REJECTED, connman);
|
2017-07-25 12:57:26 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::PushStatus(CNode* pnode, PoolStatusUpdate nStatusUpdate, PoolMessage nMessageID, CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
|
|
|
if(!pnode) return;
|
2016-11-25 20:01:56 +01:00
|
|
|
CNetMsgMaker msgMaker(pnode->GetSendVersion());
|
|
|
|
connman.PushMessage(pnode, msgMaker.Make(NetMsgType::DSSTATUSUPDATE, nSessionID, (int)nState, (int)vecEntries.size(), (int)nStatusUpdate, (int)nMessageID));
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::RelayStatus(PoolStatusUpdate nStatusUpdate, CConnman& connman, PoolMessage nMessageID)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2017-07-25 12:57:26 +02:00
|
|
|
unsigned int nDisconnected{};
|
|
|
|
// status updates should be relayed to mixing participants only
|
|
|
|
for (const auto entry : vecEntries) {
|
|
|
|
// make sure everyone is still connected
|
2017-09-19 16:51:38 +02:00
|
|
|
bool fOk = connman.ForNode(entry.addr, [&nStatusUpdate, &nMessageID, &connman, this](CNode* pnode) {
|
|
|
|
PushStatus(pnode, nStatusUpdate, nMessageID, connman);
|
2017-07-25 12:57:26 +02:00
|
|
|
return true;
|
|
|
|
});
|
|
|
|
if(!fOk) {
|
|
|
|
// no such node? maybe this client disconnected or our own connection went down
|
|
|
|
++nDisconnected;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (nDisconnected == 0) return; // all is clear
|
|
|
|
|
|
|
|
// smth went wrong
|
|
|
|
LogPrintf("CPrivateSendServer::%s -- can't continue, %llu client(s) disconnected, nSessionID: %d nSessionDenom: %d (%s)\n",
|
|
|
|
__func__, nDisconnected, nSessionID, nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom));
|
|
|
|
|
|
|
|
// notify everyone else that this session should be terminated
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
2017-09-19 16:51:38 +02:00
|
|
|
connman.ForNode(entry.addr, [&connman, this](CNode* pnode) {
|
|
|
|
PushStatus(pnode, STATUS_REJECTED, MSG_NOERR, connman);
|
2017-07-25 12:57:26 +02:00
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
if(nDisconnected == vecEntries.size()) {
|
|
|
|
// all clients disconnected, there is probably some issues with our own connection
|
|
|
|
// do not charge any fees, just reset the pool
|
|
|
|
SetNull();
|
|
|
|
}
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
2017-09-19 16:51:38 +02:00
|
|
|
void CPrivateSendServer::RelayCompletedTransaction(PoolMessage nMessageID, CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
2017-07-25 12:57:26 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::%s -- nSessionID: %d nSessionDenom: %d (%s)\n",
|
|
|
|
__func__, nSessionID, nSessionDenom, CPrivateSend::GetDenominationsToString(nSessionDenom));
|
|
|
|
|
|
|
|
// final mixing tx with empty signatures should be relayed to mixing participants only
|
2018-02-06 12:09:33 +01:00
|
|
|
for (const auto& entry : vecEntries) {
|
2017-09-19 16:51:38 +02:00
|
|
|
bool fOk = connman.ForNode(entry.addr, [&nMessageID, &connman, this](CNode* pnode) {
|
2016-11-25 20:01:56 +01:00
|
|
|
CNetMsgMaker msgMaker(pnode->GetSendVersion());
|
|
|
|
connman.PushMessage(pnode, msgMaker.Make(NetMsgType::DSCOMPLETE, nSessionID, (int)nMessageID));
|
2017-07-25 12:57:26 +02:00
|
|
|
return true;
|
|
|
|
});
|
|
|
|
if(!fOk) {
|
|
|
|
// no such node? maybe client disconnected or our own connection went down
|
2017-09-19 16:51:38 +02:00
|
|
|
RelayStatus(STATUS_REJECTED, connman);
|
2017-07-25 12:57:26 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void CPrivateSendServer::SetState(PoolState nStateNew)
|
|
|
|
{
|
2018-01-26 02:11:01 +01:00
|
|
|
if(fMasternodeMode && (nStateNew == POOL_STATE_ERROR || nStateNew == POOL_STATE_SUCCESS)) {
|
2017-05-05 13:26:27 +02:00
|
|
|
LogPrint("privatesend", "CPrivateSendServer::SetState -- Can't set state to ERROR or SUCCESS as a Masternode. \n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
LogPrintf("CPrivateSendServer::SetState -- nState: %d, nStateNew: %d\n", nState, nStateNew);
|
|
|
|
nState = nStateNew;
|
|
|
|
}
|
|
|
|
|
|
|
|
//TODO: Rename/move to core
|
2017-09-19 16:51:38 +02:00
|
|
|
void ThreadCheckPrivateSendServer(CConnman& connman)
|
2017-05-05 13:26:27 +02:00
|
|
|
{
|
|
|
|
if(fLiteMode) return; // disable all Dash specific functionality
|
|
|
|
|
|
|
|
static bool fOneThread;
|
|
|
|
if(fOneThread) return;
|
|
|
|
fOneThread = true;
|
|
|
|
|
|
|
|
// Make this thread recognisable as the PrivateSend thread
|
|
|
|
RenameThread("dash-ps-server");
|
|
|
|
|
|
|
|
unsigned int nTick = 0;
|
|
|
|
|
|
|
|
while (true)
|
|
|
|
{
|
|
|
|
MilliSleep(1000);
|
|
|
|
|
|
|
|
if(masternodeSync.IsBlockchainSynced() && !ShutdownRequested()) {
|
|
|
|
nTick++;
|
2017-09-19 16:51:38 +02:00
|
|
|
privateSendServer.CheckTimeout(connman);
|
|
|
|
privateSendServer.CheckForCompleteQueue(connman);
|
2017-05-05 13:26:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|