2017-05-05 13:26:27 +02:00
// Copyright (c) 2014-2017 The Dash Core developers
// Distributed under the MIT/X11 software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
# include "privatesend-client.h"
2016-10-21 15:30:14 +02:00
# include "wallet/coincontrol.h"
2017-05-05 13:26:27 +02:00
# include "consensus/validation.h"
# include "core_io.h"
# include "init.h"
2018-02-12 13:47:20 +01:00
# include "masternode-payments.h"
2017-05-05 13:26:27 +02:00
# include "masternode-sync.h"
# include "masternodeman.h"
2016-11-25 20:01:56 +01:00
# include "netmessagemaker.h"
2017-05-05 13:26:27 +02:00
# include "script/sign.h"
# include "txmempool.h"
# include "util.h"
# include "utilmoneystr.h"
2017-07-03 15:14:07 +02:00
2017-05-28 15:50:07 +02:00
# include <memory>
2017-05-05 13:26:27 +02:00
CPrivateSendClient privateSendClient ;
2017-02-06 14:31:37 +01:00
void CPrivateSendClient : : ProcessMessage ( CNode * pfrom , const std : : string & strCommand , CDataStream & vRecv , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) return ;
2017-05-05 13:26:27 +02:00
if ( fLiteMode ) return ; // ignore all Dash related functionality
if ( ! masternodeSync . IsBlockchainSynced ( ) ) return ;
if ( strCommand = = NetMsgType : : DSQUEUE ) {
TRY_LOCK ( cs_darksend , lockRecv ) ;
if ( ! lockRecv ) return ;
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2018-03-15 10:21:43 +01:00
LogPrint ( " privatesend " , " DSQUEUE -- peer=%d using obsolete version %i \n " , pfrom - > id , pfrom - > nVersion ) ;
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand , REJECT_OBSOLETE ,
strprintf ( " Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
CDarksendQueue dsq ;
vRecv > > dsq ;
// process every dsq only once
2018-02-06 12:09:33 +01:00
for ( const auto & q : vecDarksendQueue ) {
2017-05-05 13:26:27 +02:00
if ( q = = dsq ) {
// LogPrint("privatesend", "DSQUEUE -- %s seen\n", dsq.ToString());
return ;
}
}
LogPrint ( " privatesend " , " DSQUEUE -- %s new \n " , dsq . ToString ( ) ) ;
2017-08-29 01:51:44 +02:00
if ( dsq . IsExpired ( ) ) return ;
2018-05-26 20:03:23 +02:00
if ( dsq . nInputCount < 0 | | dsq . nInputCount > PRIVATESEND_ENTRY_MAX_SIZE ) return ;
2017-05-05 13:26:27 +02:00
2017-09-11 16:13:48 +02:00
masternode_info_t infoMn ;
2018-02-15 08:29:44 +01:00
if ( ! mnodeman . GetMasternodeInfo ( dsq . masternodeOutpoint , infoMn ) ) return ;
2017-05-05 13:26:27 +02:00
2018-08-31 15:31:59 +02:00
if ( ! dsq . CheckSignature ( infoMn . keyIDOperator ) ) {
2017-05-05 13:26:27 +02:00
// we probably have outdated info
2018-02-15 08:29:44 +01:00
mnodeman . AskForMN ( pfrom , dsq . masternodeOutpoint , connman ) ;
2017-05-05 13:26:27 +02:00
return ;
}
// if the queue is ready, submit if we can
if ( dsq . fReady ) {
if ( ! infoMixingMasternode . fInfoValid ) return ;
2017-07-25 12:57:26 +02:00
if ( infoMixingMasternode . addr ! = infoMn . addr ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " DSQUEUE -- message doesn't match current Masternode: infoMixingMasternode=%s, addr=%s \n " , infoMixingMasternode . addr . ToString ( ) , infoMn . addr . ToString ( ) ) ;
return ;
}
if ( nState = = POOL_STATE_QUEUE ) {
LogPrint ( " privatesend " , " DSQUEUE -- PrivateSend queue (%s) is ready on masternode %s \n " , dsq . ToString ( ) , infoMn . addr . ToString ( ) ) ;
2017-09-19 16:51:38 +02:00
SubmitDenominate ( connman ) ;
2017-05-05 13:26:27 +02:00
}
} else {
2018-02-06 12:09:33 +01:00
for ( const auto & q : vecDarksendQueue ) {
2018-02-15 08:29:44 +01:00
if ( q . masternodeOutpoint = = dsq . masternodeOutpoint ) {
2017-05-05 13:26:27 +02:00
// no way same mn can send another "not yet ready" dsq this soon
LogPrint ( " privatesend " , " DSQUEUE -- Masternode %s is sending WAY too many dsq messages \n " , infoMn . addr . ToString ( ) ) ;
return ;
}
}
int nThreshold = infoMn . nLastDsq + mnodeman . CountEnabled ( MIN_PRIVATESEND_PEER_PROTO_VERSION ) / 5 ;
LogPrint ( " privatesend " , " DSQUEUE -- nLastDsq: %d threshold: %d nDsqCount: %d \n " , infoMn . nLastDsq , nThreshold , mnodeman . nDsqCount ) ;
//don't allow a few nodes to dominate the queuing process
if ( infoMn . nLastDsq ! = 0 & & nThreshold > mnodeman . nDsqCount ) {
LogPrint ( " privatesend " , " DSQUEUE -- Masternode %s is sending too many dsq messages \n " , infoMn . addr . ToString ( ) ) ;
return ;
}
2018-02-15 08:29:44 +01:00
if ( ! mnodeman . AllowMixing ( dsq . masternodeOutpoint ) ) return ;
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " DSQUEUE -- new PrivateSend queue (%s) from masternode %s \n " , dsq . ToString ( ) , infoMn . addr . ToString ( ) ) ;
2018-02-15 08:29:44 +01:00
if ( infoMixingMasternode . fInfoValid & & infoMixingMasternode . outpoint = = dsq . masternodeOutpoint ) {
2017-05-05 13:26:27 +02:00
dsq . fTried = true ;
}
vecDarksendQueue . push_back ( dsq ) ;
2017-09-19 16:51:38 +02:00
dsq . Relay ( connman ) ;
2017-05-05 13:26:27 +02:00
}
} else if ( strCommand = = NetMsgType : : DSSTATUSUPDATE ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2018-03-15 10:21:43 +01:00
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- peer=%d using obsolete version %i \n " , pfrom - > id , pfrom - > nVersion ) ;
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand , REJECT_OBSOLETE ,
strprintf ( " Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
if ( ! infoMixingMasternode . fInfoValid ) return ;
2017-07-25 12:57:26 +02:00
if ( infoMixingMasternode . addr ! = pfrom - > addr ) {
2017-05-05 13:26:27 +02:00
//LogPrintf("DSSTATUSUPDATE -- message doesn't match current Masternode: infoMixingMasternode %s addr %s\n", infoMixingMasternode.addr.ToString(), pfrom->addr.ToString());
return ;
}
int nMsgSessionID ;
int nMsgState ;
int nMsgEntriesCount ;
int nMsgStatusUpdate ;
int nMsgMessageID ;
vRecv > > nMsgSessionID > > nMsgState > > nMsgEntriesCount > > nMsgStatusUpdate > > nMsgMessageID ;
if ( nMsgState < POOL_STATE_MIN | | nMsgState > POOL_STATE_MAX ) {
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- nMsgState is out of bounds: %d \n " , nMsgState ) ;
return ;
}
if ( nMsgStatusUpdate < STATUS_REJECTED | | nMsgStatusUpdate > STATUS_ACCEPTED ) {
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- nMsgStatusUpdate is out of bounds: %d \n " , nMsgStatusUpdate ) ;
return ;
}
if ( nMsgMessageID < MSG_POOL_MIN | | nMsgMessageID > MSG_POOL_MAX ) {
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- nMsgMessageID is out of bounds: %d \n " , nMsgMessageID ) ;
return ;
}
2018-02-26 12:10:20 +01:00
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- nMsgSessionID %d nMsgState: %d nEntriesCount: %d nMsgStatusUpdate: %d nMsgMessageID %d (%s) \n " ,
nMsgSessionID , nMsgState , nEntriesCount , nMsgStatusUpdate , nMsgMessageID , CPrivateSend : : GetMessageByID ( PoolMessage ( nMsgMessageID ) ) ) ;
2017-05-05 13:26:27 +02:00
if ( ! CheckPoolStateUpdate ( PoolState ( nMsgState ) , nMsgEntriesCount , PoolStatusUpdate ( nMsgStatusUpdate ) , PoolMessage ( nMsgMessageID ) , nMsgSessionID ) ) {
LogPrint ( " privatesend " , " DSSTATUSUPDATE -- CheckPoolStateUpdate failed \n " ) ;
}
} else if ( strCommand = = NetMsgType : : DSFINALTX ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2018-03-15 10:21:43 +01:00
LogPrint ( " privatesend " , " DSFINALTX -- peer=%d using obsolete version %i \n " , pfrom - > id , pfrom - > nVersion ) ;
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand , REJECT_OBSOLETE ,
strprintf ( " Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
if ( ! infoMixingMasternode . fInfoValid ) return ;
2017-07-25 12:57:26 +02:00
if ( infoMixingMasternode . addr ! = pfrom - > addr ) {
2017-05-05 13:26:27 +02:00
//LogPrintf("DSFINALTX -- message doesn't match current Masternode: infoMixingMasternode %s addr %s\n", infoMixingMasternode.addr.ToString(), pfrom->addr.ToString());
return ;
}
int nMsgSessionID ;
2016-12-05 08:01:20 +01:00
vRecv > > nMsgSessionID ;
CTransaction txNew ( deserialize , vRecv ) ;
2017-05-05 13:26:27 +02:00
if ( nSessionID ! = nMsgSessionID ) {
LogPrint ( " privatesend " , " DSFINALTX -- message doesn't match current PrivateSend session: nSessionID: %d nMsgSessionID: %d \n " , nSessionID , nMsgSessionID ) ;
return ;
}
LogPrint ( " privatesend " , " DSFINALTX -- txNew %s " , txNew . ToString ( ) ) ;
//check to see if input is spent already? (and probably not confirmed)
2017-09-19 16:51:38 +02:00
SignFinalTransaction ( txNew , pfrom , connman ) ;
2017-05-05 13:26:27 +02:00
} else if ( strCommand = = NetMsgType : : DSCOMPLETE ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2018-03-15 10:21:43 +01:00
LogPrint ( " privatesend " , " DSCOMPLETE -- peer=%d using obsolete version %i \n " , pfrom - > id , pfrom - > nVersion ) ;
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand , REJECT_OBSOLETE ,
strprintf ( " Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
if ( ! infoMixingMasternode . fInfoValid ) return ;
2017-07-25 12:57:26 +02:00
if ( infoMixingMasternode . addr ! = pfrom - > addr ) {
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " DSCOMPLETE -- message doesn't match current Masternode: infoMixingMasternode=%s addr=%s \n " , infoMixingMasternode . addr . ToString ( ) , pfrom - > addr . ToString ( ) ) ;
return ;
}
int nMsgSessionID ;
int nMsgMessageID ;
vRecv > > nMsgSessionID > > nMsgMessageID ;
if ( nMsgMessageID < MSG_POOL_MIN | | nMsgMessageID > MSG_POOL_MAX ) {
LogPrint ( " privatesend " , " DSCOMPLETE -- nMsgMessageID is out of bounds: %d \n " , nMsgMessageID ) ;
return ;
}
if ( nSessionID ! = nMsgSessionID ) {
LogPrint ( " privatesend " , " DSCOMPLETE -- message doesn't match current PrivateSend session: nSessionID: %d nMsgSessionID: %d \n " , nSessionID , nMsgSessionID ) ;
return ;
}
2017-06-30 20:30:16 +02:00
LogPrint ( " privatesend " , " DSCOMPLETE -- nMsgSessionID %d nMsgMessageID %d (%s) \n " , nMsgSessionID , nMsgMessageID , CPrivateSend : : GetMessageByID ( PoolMessage ( nMsgMessageID ) ) ) ;
2017-05-05 13:26:27 +02:00
CompletedTransaction ( PoolMessage ( nMsgMessageID ) ) ;
}
}
void CPrivateSendClient : : ResetPool ( )
{
nCachedLastSuccessBlock = 0 ;
txMyCollateral = CMutableTransaction ( ) ;
vecMasternodesUsed . clear ( ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
}
void CPrivateSendClient : : SetNull ( )
{
// Client side
nEntriesCount = 0 ;
fLastEntryAccepted = false ;
infoMixingMasternode = masternode_info_t ( ) ;
2018-02-01 02:10:52 +01:00
pendingDsaRequest = CPendingDsaRequest ( ) ;
2017-05-05 13:26:27 +02:00
2017-06-30 20:30:16 +02:00
CPrivateSendBase : : SetNull ( ) ;
2017-05-05 13:26:27 +02:00
}
//
// Unlock coins after mixing fails or succeeds
//
void CPrivateSendClient : : UnlockCoins ( )
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return ;
2017-05-05 13:26:27 +02:00
while ( true ) {
TRY_LOCK ( pwalletMain - > cs_wallet , lockWallet ) ;
if ( ! lockWallet ) { MilliSleep ( 50 ) ; continue ; }
2018-02-06 12:09:33 +01:00
for ( const auto & outpoint : vecOutPointLocked )
2017-05-05 13:26:27 +02:00
pwalletMain - > UnlockCoin ( outpoint ) ;
break ;
}
vecOutPointLocked . clear ( ) ;
}
std : : string CPrivateSendClient : : GetStatus ( )
{
static int nStatusMessageProgress = 0 ;
nStatusMessageProgress + = 10 ;
std : : string strSuffix = " " ;
2017-09-03 15:30:58 +02:00
if ( WaitForAnotherBlock ( ) | | ! masternodeSync . IsBlockchainSynced ( ) )
2017-05-05 13:26:27 +02:00
return strAutoDenomResult ;
switch ( nState ) {
case POOL_STATE_IDLE :
return _ ( " PrivateSend is idle. " ) ;
case POOL_STATE_QUEUE :
if ( nStatusMessageProgress % 70 < = 30 ) strSuffix = " . " ;
else if ( nStatusMessageProgress % 70 < = 50 ) strSuffix = " .. " ;
else if ( nStatusMessageProgress % 70 < = 70 ) strSuffix = " ... " ;
return strprintf ( _ ( " Submitted to masternode, waiting in queue %s " ) , strSuffix ) ; ;
case POOL_STATE_ACCEPTING_ENTRIES :
if ( nEntriesCount = = 0 ) {
nStatusMessageProgress = 0 ;
return strAutoDenomResult ;
} else if ( fLastEntryAccepted ) {
if ( nStatusMessageProgress % 10 > 8 ) {
fLastEntryAccepted = false ;
nStatusMessageProgress = 0 ;
}
return _ ( " PrivateSend request complete: " ) + " " + _ ( " Your transaction was accepted into the pool! " ) ;
} else {
2017-06-30 20:30:16 +02:00
if ( nStatusMessageProgress % 70 < = 40 ) return strprintf ( _ ( " Submitted following entries to masternode: %u / %d " ) , nEntriesCount , CPrivateSend : : GetMaxPoolTransactions ( ) ) ;
2017-05-05 13:26:27 +02:00
else if ( nStatusMessageProgress % 70 < = 50 ) strSuffix = " . " ;
else if ( nStatusMessageProgress % 70 < = 60 ) strSuffix = " .. " ;
else if ( nStatusMessageProgress % 70 < = 70 ) strSuffix = " ... " ;
2017-06-30 20:30:16 +02:00
return strprintf ( _ ( " Submitted to masternode, waiting for more entries ( %u / %d ) % s " ), nEntriesCount, CPrivateSend::GetMaxPoolTransactions(), strSuffix) ;
2017-05-05 13:26:27 +02:00
}
case POOL_STATE_SIGNING :
if ( nStatusMessageProgress % 70 < = 40 ) return _ ( " Found enough users, signing ... " ) ;
else if ( nStatusMessageProgress % 70 < = 50 ) strSuffix = " . " ;
else if ( nStatusMessageProgress % 70 < = 60 ) strSuffix = " .. " ;
else if ( nStatusMessageProgress % 70 < = 70 ) strSuffix = " ... " ;
return strprintf ( _ ( " Found enough users, signing ( waiting %s ) " ), strSuffix) ;
case POOL_STATE_ERROR :
return _ ( " PrivateSend request incomplete: " ) + " " + strLastMessage + " " + _ ( " Will retry... " ) ;
case POOL_STATE_SUCCESS :
return _ ( " PrivateSend request complete: " ) + " " + strLastMessage ;
default :
return strprintf ( _ ( " Unknown state: id = %u " ) , nState ) ;
}
}
2017-12-04 07:06:07 +01:00
bool CPrivateSendClient : : GetMixingMasternodeInfo ( masternode_info_t & mnInfoRet )
{
mnInfoRet = infoMixingMasternode . fInfoValid ? infoMixingMasternode : masternode_info_t ( ) ;
return infoMixingMasternode . fInfoValid ;
}
bool CPrivateSendClient : : IsMixingMasternode ( const CNode * pnode )
{
return infoMixingMasternode . fInfoValid & & pnode - > addr = = infoMixingMasternode . addr ;
}
2017-05-05 13:26:27 +02:00
//
// Check the mixing progress and send client updates if a Masternode
//
void CPrivateSendClient : : CheckPool ( )
{
// reset if we're here for 10 seconds
2018-02-12 13:47:53 +01:00
if ( ( nState = = POOL_STATE_ERROR | | nState = = POOL_STATE_SUCCESS ) & & GetTime ( ) - nTimeLastSuccessfulStep > = 10 ) {
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " CPrivateSendClient::CheckPool -- timeout, RESETTING \n " ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
if ( nState = = POOL_STATE_ERROR ) {
keyHolderStorage . ReturnAll ( ) ;
} else {
keyHolderStorage . KeepAll ( ) ;
}
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
}
}
//
// Check for various timeouts (queue objects, mixing, etc)
//
void CPrivateSendClient : : CheckTimeout ( )
{
2018-03-21 12:10:01 +01:00
if ( fMasternodeMode ) return ;
2017-12-04 07:06:07 +01:00
CheckQueue ( ) ;
2017-05-05 13:26:27 +02:00
2018-03-21 12:10:01 +01:00
if ( ! fEnablePrivateSend ) return ;
2017-05-05 13:26:27 +02:00
// catching hanging sessions
2018-03-21 12:10:01 +01:00
switch ( nState ) {
case POOL_STATE_ERROR :
LogPrint ( " privatesend " , " CPrivateSendClient::CheckTimeout -- Pool error -- Running CheckPool \n " ) ;
CheckPool ( ) ;
break ;
case POOL_STATE_SUCCESS :
LogPrint ( " privatesend " , " CPrivateSendClient::CheckTimeout -- Pool success -- Running CheckPool \n " ) ;
CheckPool ( ) ;
break ;
default :
break ;
2017-05-05 13:26:27 +02:00
}
2018-02-12 13:47:53 +01:00
int nLagTime = 10 ; // give the server a few extra seconds before resetting.
2017-05-05 13:26:27 +02:00
int nTimeout = ( nState = = POOL_STATE_SIGNING ) ? PRIVATESEND_SIGNING_TIMEOUT : PRIVATESEND_QUEUE_TIMEOUT ;
2018-02-12 13:47:53 +01:00
bool fTimeout = GetTime ( ) - nTimeLastSuccessfulStep > = nTimeout + nLagTime ;
2017-05-05 13:26:27 +02:00
if ( nState ! = POOL_STATE_IDLE & & fTimeout ) {
2018-02-08 06:46:44 +01:00
LogPrint ( " privatesend " , " CPrivateSendClient::CheckTimeout -- %s timed out (%ds) -- resetting \n " ,
2017-05-05 13:26:27 +02:00
( nState = = POOL_STATE_SIGNING ) ? " Signing " : " Session " , nTimeout ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
SetState ( POOL_STATE_ERROR ) ;
strLastMessage = _ ( " Session timed out. " ) ;
}
}
//
// Execute a mixing denomination via a Masternode.
// This is only ran from clients
//
2017-12-04 07:06:07 +01:00
bool CPrivateSendClient : : SendDenominate ( const std : : vector < CTxDSIn > & vecTxDSIn , const std : : vector < CTxOut > & vecTxOut , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::SendDenominate -- PrivateSend from a Masternode is not supported currently. \n " ) ;
return false ;
}
if ( txMyCollateral = = CMutableTransaction ( ) ) {
LogPrintf ( " CPrivateSendClient:SendDenominate -- PrivateSend collateral not set \n " ) ;
return false ;
}
// lock the funds we're going to use
2018-02-06 12:09:33 +01:00
for ( const auto & txin : txMyCollateral . vin )
2017-05-05 13:26:27 +02:00
vecOutPointLocked . push_back ( txin . prevout ) ;
2017-12-04 07:06:07 +01:00
for ( const auto & txdsin : vecTxDSIn )
vecOutPointLocked . push_back ( txdsin . prevout ) ;
2017-05-05 13:26:27 +02:00
// we should already be connected to a Masternode
if ( ! nSessionID ) {
LogPrintf ( " CPrivateSendClient::SendDenominate -- No Masternode has been selected yet. \n " ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
return false ;
}
if ( ! CheckDiskSpace ( ) ) {
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
fEnablePrivateSend = false ;
LogPrintf ( " CPrivateSendClient::SendDenominate -- Not enough disk space, disabling PrivateSend. \n " ) ;
return false ;
}
SetState ( POOL_STATE_ACCEPTING_ENTRIES ) ;
strLastMessage = " " ;
LogPrintf ( " CPrivateSendClient::SendDenominate -- Added transaction to pool. \n " ) ;
{
2018-02-12 13:47:35 +01:00
// construct a pseudo tx, for debugging purpuses only
2017-05-05 13:26:27 +02:00
CMutableTransaction tx ;
2017-12-04 07:06:07 +01:00
for ( const auto & txdsin : vecTxDSIn ) {
LogPrint ( " privatesend " , " CPrivateSendClient::SendDenominate -- txdsin=%s \n " , txdsin . ToString ( ) ) ;
tx . vin . push_back ( txdsin ) ;
2017-05-05 13:26:27 +02:00
}
2018-02-06 12:09:33 +01:00
for ( const CTxOut & txout : vecTxOut ) {
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " CPrivateSendClient::SendDenominate -- txout=%s \n " , txout . ToString ( ) ) ;
tx . vout . push_back ( txout ) ;
}
LogPrintf ( " CPrivateSendClient::SendDenominate -- Submitting partial tx %s " , tx . ToString ( ) ) ;
}
// store our entry for later use
2017-12-04 07:06:07 +01:00
CDarkSendEntry entry ( vecTxDSIn , vecTxOut , txMyCollateral ) ;
2017-05-05 13:26:27 +02:00
vecEntries . push_back ( entry ) ;
2017-09-19 16:51:38 +02:00
RelayIn ( entry , connman ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
// Incoming message from Masternode updating the progress of mixing
bool CPrivateSendClient : : CheckPoolStateUpdate ( PoolState nStateNew , int nEntriesCountNew , PoolStatusUpdate nStatusUpdate , PoolMessage nMessageID , int nSessionIDNew )
{
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) return false ;
2017-05-05 13:26:27 +02:00
// do not update state when mixing client state is one of these
if ( nState = = POOL_STATE_IDLE | | nState = = POOL_STATE_ERROR | | nState = = POOL_STATE_SUCCESS ) return false ;
2017-06-30 20:30:16 +02:00
strAutoDenomResult = _ ( " Masternode: " ) + " " + CPrivateSend : : GetMessageByID ( nMessageID ) ;
2017-05-05 13:26:27 +02:00
// if rejected at any state
if ( nStatusUpdate = = STATUS_REJECTED ) {
LogPrintf ( " CPrivateSendClient::CheckPoolStateUpdate -- entry is rejected by Masternode \n " ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
SetState ( POOL_STATE_ERROR ) ;
2017-06-30 20:30:16 +02:00
strLastMessage = CPrivateSend : : GetMessageByID ( nMessageID ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
if ( nStatusUpdate = = STATUS_ACCEPTED & & nState = = nStateNew ) {
if ( nStateNew = = POOL_STATE_QUEUE & & nSessionID = = 0 & & nSessionIDNew ! = 0 ) {
// new session id should be set only in POOL_STATE_QUEUE state
nSessionID = nSessionIDNew ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::CheckPoolStateUpdate -- set nSessionID to %d \n " , nSessionID ) ;
return true ;
}
else if ( nStateNew = = POOL_STATE_ACCEPTING_ENTRIES & & nEntriesCount ! = nEntriesCountNew ) {
nEntriesCount = nEntriesCountNew ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
fLastEntryAccepted = true ;
LogPrintf ( " CPrivateSendClient::CheckPoolStateUpdate -- new entry accepted! \n " ) ;
return true ;
}
}
// only situations above are allowed, fail in any other case
return false ;
}
//
// After we receive the finalized transaction from the Masternode, we must
// check it to make sure it's what we want, then sign it if we agree.
// If we refuse to sign, it's possible we'll be charged collateral
//
2017-09-19 16:51:38 +02:00
bool CPrivateSendClient : : SignFinalTransaction ( const CTransaction & finalTransactionNew , CNode * pnode , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2018-07-12 11:08:43 +02:00
if ( fMasternodeMode | | pnode = = nullptr ) return false ;
2017-05-05 13:26:27 +02:00
finalMutableTransaction = finalTransactionNew ;
LogPrintf ( " CPrivateSendClient::SignFinalTransaction -- finalMutableTransaction=%s " , finalMutableTransaction . ToString ( ) ) ;
2017-09-22 03:53:15 +02:00
// Make sure it's BIP69 compliant
sort ( finalMutableTransaction . vin . begin ( ) , finalMutableTransaction . vin . end ( ) , CompareInputBIP69 ( ) ) ;
sort ( finalMutableTransaction . vout . begin ( ) , finalMutableTransaction . vout . end ( ) , CompareOutputBIP69 ( ) ) ;
if ( finalMutableTransaction . GetHash ( ) ! = finalTransactionNew . GetHash ( ) ) {
2018-02-15 08:29:44 +01:00
LogPrintf ( " CPrivateSendClient::SignFinalTransaction -- WARNING! Masternode %s is not BIP69 compliant! \n " , infoMixingMasternode . outpoint . ToStringShort ( ) ) ;
2017-09-22 03:53:15 +02:00
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
std : : vector < CTxIn > sigs ;
//make sure my inputs/outputs are present, otherwise refuse to sign
2018-02-06 12:09:33 +01:00
for ( const auto & entry : vecEntries ) {
for ( const auto & txdsin : entry . vecTxDSIn ) {
2017-05-05 13:26:27 +02:00
/* Sign my transaction and all outputs */
int nMyInputIndex = - 1 ;
CScript prevPubKey = CScript ( ) ;
CTxIn txin = CTxIn ( ) ;
for ( unsigned int i = 0 ; i < finalMutableTransaction . vin . size ( ) ; i + + ) {
if ( finalMutableTransaction . vin [ i ] = = txdsin ) {
nMyInputIndex = i ;
prevPubKey = txdsin . prevPubKey ;
txin = txdsin ;
}
}
if ( nMyInputIndex > = 0 ) { //might have to do this one input at a time?
int nFoundOutputsCount = 0 ;
CAmount nValue1 = 0 ;
CAmount nValue2 = 0 ;
2017-12-04 07:06:07 +01:00
for ( const auto & txoutFinal : finalMutableTransaction . vout ) {
for ( const auto & txout : entry . vecTxOut ) {
if ( txoutFinal = = txout ) {
2017-05-05 13:26:27 +02:00
nFoundOutputsCount + + ;
2017-12-04 07:06:07 +01:00
nValue1 + = txoutFinal . nValue ;
2017-05-05 13:26:27 +02:00
}
}
}
2017-12-04 07:06:07 +01:00
for ( const auto & txout : entry . vecTxOut )
2017-05-05 13:26:27 +02:00
nValue2 + = txout . nValue ;
2017-12-04 07:06:07 +01:00
int nTargetOuputsCount = entry . vecTxOut . size ( ) ;
2017-05-05 13:26:27 +02:00
if ( nFoundOutputsCount < nTargetOuputsCount | | nValue1 ! = nValue2 ) {
// in this case, something went wrong and we'll refuse to sign. It's possible we'll be charged collateral. But that's
// better then signing if the transaction doesn't look like what we wanted.
LogPrintf ( " CPrivateSendClient::SignFinalTransaction -- My entries are not correct! Refusing to sign: nFoundOutputsCount: %d, nTargetOuputsCount: %d \n " , nFoundOutputsCount , nTargetOuputsCount ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
return false ;
}
const CKeyStore & keystore = * pwalletMain ;
LogPrint ( " privatesend " , " CPrivateSendClient::SignFinalTransaction -- Signing my input %i \n " , nMyInputIndex ) ;
if ( ! SignSignature ( keystore , prevPubKey , finalMutableTransaction , nMyInputIndex , int ( SIGHASH_ALL | SIGHASH_ANYONECANPAY ) ) ) { // changes scriptSig
LogPrint ( " privatesend " , " CPrivateSendClient::SignFinalTransaction -- Unable to sign my own transaction! \n " ) ;
// not sure what to do here, it will timeout...?
}
sigs . push_back ( finalMutableTransaction . vin [ nMyInputIndex ] ) ;
LogPrint ( " privatesend " , " CPrivateSendClient::SignFinalTransaction -- nMyInputIndex: %d, sigs.size(): %d, scriptSig=%s \n " , nMyInputIndex , ( int ) sigs . size ( ) , ScriptToAsmStr ( finalMutableTransaction . vin [ nMyInputIndex ] . scriptSig ) ) ;
}
}
}
if ( sigs . empty ( ) ) {
LogPrintf ( " CPrivateSendClient::SignFinalTransaction -- can't sign anything! \n " ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
return false ;
}
// push all of our signatures to the Masternode
LogPrintf ( " CPrivateSendClient::SignFinalTransaction -- pushing sigs to the masternode, finalMutableTransaction=%s " , finalMutableTransaction . ToString ( ) ) ;
2016-11-25 20:01:56 +01:00
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSSIGNFINALTX , sigs ) ) ;
2017-05-05 13:26:27 +02:00
SetState ( POOL_STATE_SIGNING ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
// mixing transaction was completed (failed or successful)
void CPrivateSendClient : : CompletedTransaction ( PoolMessage nMessageID )
{
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) return ;
2017-05-05 13:26:27 +02:00
if ( nMessageID = = MSG_SUCCESS ) {
LogPrintf ( " CompletedTransaction -- success \n " ) ;
2017-08-25 14:57:05 +02:00
nCachedLastSuccessBlock = nCachedBlockHeight ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . KeepAll ( ) ;
2017-05-05 13:26:27 +02:00
} else {
LogPrintf ( " CompletedTransaction -- error \n " ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
}
UnlockCoins ( ) ;
SetNull ( ) ;
2017-06-30 20:30:16 +02:00
strLastMessage = CPrivateSend : : GetMessageByID ( nMessageID ) ;
2017-05-05 13:26:27 +02:00
}
2018-04-20 12:53:23 +02:00
bool CPrivateSendClient : : IsDenomSkipped ( CAmount nDenomValue )
{
return std : : find ( vecDenominationsSkipped . begin ( ) , vecDenominationsSkipped . end ( ) , nDenomValue ) ! = vecDenominationsSkipped . end ( ) ;
}
2017-09-03 15:30:58 +02:00
bool CPrivateSendClient : : WaitForAnotherBlock ( )
{
if ( ! masternodeSync . IsMasternodeListSynced ( ) )
return true ;
if ( fPrivateSendMultiSession )
return false ;
return nCachedBlockHeight - nCachedLastSuccessBlock < nMinBlocksToWait ;
}
2017-05-05 13:26:27 +02:00
bool CPrivateSendClient : : CheckAutomaticBackup ( )
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) {
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Wallet is not initialized, no mixing available. \n " ) ;
strAutoDenomResult = _ ( " Wallet is not initialized " ) + " , " + _ ( " no mixing available. " ) ;
fEnablePrivateSend = false ; // no mixing
return false ;
}
2017-05-05 13:26:27 +02:00
switch ( nWalletBackups ) {
case 0 :
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Automatic backups disabled, no mixing available. \n " ) ;
strAutoDenomResult = _ ( " Automatic backups disabled " ) + " , " + _ ( " no mixing available. " ) ;
fEnablePrivateSend = false ; // stop mixing
pwalletMain - > nKeysLeftSinceAutoBackup = 0 ; // no backup, no "keys since last backup"
return false ;
case - 1 :
// Automatic backup failed, nothing else we can do until user fixes the issue manually.
// There is no way to bring user attention in daemon mode so we just update status and
2018-02-08 06:46:44 +01:00
// keep spamming if debug is on.
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- ERROR! Failed to create automatic backup. \n " ) ;
strAutoDenomResult = _ ( " ERROR! Failed to create automatic backup " ) + " , " + _ ( " see debug.log for details. " ) ;
return false ;
case - 2 :
// We were able to create automatic backup but keypool was not replenished because wallet is locked.
// There is no way to bring user attention in daemon mode so we just update status and
2018-02-08 06:46:44 +01:00
// keep spamming if debug is on.
2017-05-05 13:26:27 +02:00
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- WARNING! Failed to create replenish keypool, please unlock your wallet to do so. \n " ) ;
strAutoDenomResult = _ ( " WARNING! Failed to replenish keypool, please unlock your wallet to do so. " ) + " , " + _ ( " see debug.log for details. " ) ;
return false ;
}
if ( pwalletMain - > nKeysLeftSinceAutoBackup < PRIVATESEND_KEYS_THRESHOLD_STOP ) {
// We should never get here via mixing itself but probably smth else is still actively using keypool
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Very low number of keys left: %d, no mixing available. \n " , pwalletMain - > nKeysLeftSinceAutoBackup ) ;
strAutoDenomResult = strprintf ( _ ( " Very low number of keys left: %d " ) + " , " + _ ( " no mixing available. " ) , pwalletMain - > nKeysLeftSinceAutoBackup ) ;
// It's getting really dangerous, stop mixing
fEnablePrivateSend = false ;
return false ;
} else if ( pwalletMain - > nKeysLeftSinceAutoBackup < PRIVATESEND_KEYS_THRESHOLD_WARNING ) {
// Low number of keys left but it's still more or less safe to continue
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Very low number of keys left: %d \n " , pwalletMain - > nKeysLeftSinceAutoBackup ) ;
strAutoDenomResult = strprintf ( _ ( " Very low number of keys left: %d " ) , pwalletMain - > nKeysLeftSinceAutoBackup ) ;
if ( fCreateAutoBackups ) {
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Trying to create new backup. \n " ) ;
std : : string warningString ;
std : : string errorString ;
if ( ! AutoBackupWallet ( pwalletMain , " " , warningString , errorString ) ) {
if ( ! warningString . empty ( ) ) {
// There were some issues saving backup but yet more or less safe to continue
LogPrintf ( " CPrivateSendClient::CheckAutomaticBackup -- WARNING! Something went wrong on automatic backup: %s \n " , warningString ) ;
}
if ( ! errorString . empty ( ) ) {
// Things are really broken
LogPrintf ( " CPrivateSendClient::CheckAutomaticBackup -- ERROR! Failed to create automatic backup: %s \n " , errorString ) ;
strAutoDenomResult = strprintf ( _ ( " ERROR! Failed to create automatic backup " ) + " : %s " , errorString ) ;
return false ;
}
}
} else {
// Wait for smth else (e.g. GUI action) to create automatic backup for us
return false ;
}
}
LogPrint ( " privatesend " , " CPrivateSendClient::CheckAutomaticBackup -- Keys left since latest backup: %d \n " , pwalletMain - > nKeysLeftSinceAutoBackup ) ;
return true ;
}
//
// Passively run mixing in the background to anonymize funds based on the given configuration.
//
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
bool CPrivateSendClient : : DoAutomaticDenominating ( CConnman & connman , bool fDryRun )
2017-05-05 13:26:27 +02:00
{
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) return false ; // no client-side mixing on masternodes
2017-08-25 14:57:05 +02:00
if ( ! fEnablePrivateSend ) return false ;
2017-05-05 13:26:27 +02:00
if ( nState ! = POOL_STATE_IDLE ) return false ;
if ( ! masternodeSync . IsMasternodeListSynced ( ) ) {
strAutoDenomResult = _ ( " Can't mix while sync in progress. " ) ;
return false ;
}
2018-07-28 15:51:45 +02:00
if ( ! pwalletMain ) {
strAutoDenomResult = _ ( " Wallet is not initialized " ) ;
return false ;
}
if ( ! fDryRun & & pwalletMain - > IsLocked ( true ) ) {
strAutoDenomResult = _ ( " Wallet is locked. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
if ( ! CheckAutomaticBackup ( ) )
return false ;
if ( GetEntriesCount ( ) > 0 ) {
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
return false ;
}
TRY_LOCK ( cs_darksend , lockDS ) ;
if ( ! lockDS ) {
strAutoDenomResult = _ ( " Lock is already in place. " ) ;
return false ;
}
2017-09-03 15:30:58 +02:00
if ( WaitForAnotherBlock ( ) ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- Last successful PrivateSend action was too recent \n " ) ;
strAutoDenomResult = _ ( " Last successful PrivateSend action was too recent. " ) ;
return false ;
}
if ( mnodeman . size ( ) = = 0 ) {
LogPrint ( " privatesend " , " CPrivateSendClient::DoAutomaticDenominating -- No Masternodes detected \n " ) ;
strAutoDenomResult = _ ( " No Masternodes detected. " ) ;
return false ;
}
2017-06-30 20:30:16 +02:00
CAmount nValueMin = CPrivateSend : : GetSmallestDenomination ( ) ;
2017-05-05 13:26:27 +02:00
// if there are no confirmed DS collateral inputs yet
if ( ! pwalletMain - > HasCollateralInputs ( ) ) {
// should have some additional amount for them
2017-06-30 20:30:16 +02:00
nValueMin + = CPrivateSend : : GetMaxCollateralAmount ( ) ;
2017-05-05 13:26:27 +02:00
}
// including denoms but applying some restrictions
CAmount nBalanceNeedsAnonymized = pwalletMain - > GetNeedsToBeAnonymizedBalance ( nValueMin ) ;
// anonymizable balance is way too small
if ( nBalanceNeedsAnonymized < nValueMin ) {
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- Not enough funds to anonymize \n " ) ;
strAutoDenomResult = _ ( " Not enough funds to anonymize. " ) ;
return false ;
}
// excluding denoms
CAmount nBalanceAnonimizableNonDenom = pwalletMain - > GetAnonymizableBalance ( true ) ;
// denoms
CAmount nBalanceDenominatedConf = pwalletMain - > GetDenominatedBalance ( ) ;
CAmount nBalanceDenominatedUnconf = pwalletMain - > GetDenominatedBalance ( true ) ;
CAmount nBalanceDenominated = nBalanceDenominatedConf + nBalanceDenominatedUnconf ;
LogPrint ( " privatesend " , " CPrivateSendClient::DoAutomaticDenominating -- nValueMin: %f, nBalanceNeedsAnonymized: %f, nBalanceAnonimizableNonDenom: %f, nBalanceDenominatedConf: %f, nBalanceDenominatedUnconf: %f, nBalanceDenominated: %f \n " ,
( float ) nValueMin / COIN ,
( float ) nBalanceNeedsAnonymized / COIN ,
( float ) nBalanceAnonimizableNonDenom / COIN ,
( float ) nBalanceDenominatedConf / COIN ,
( float ) nBalanceDenominatedUnconf / COIN ,
( float ) nBalanceDenominated / COIN ) ;
if ( fDryRun ) return true ;
// Check if we have should create more denominated inputs i.e.
// there are funds to denominate and denominated balance does not exceed
// max amount to mix yet.
2017-06-30 20:30:16 +02:00
if ( nBalanceAnonimizableNonDenom > = nValueMin + CPrivateSend : : GetCollateralAmount ( ) & & nBalanceDenominated < nPrivateSendAmount * COIN )
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
return CreateDenominated ( connman ) ;
2017-05-05 13:26:27 +02:00
//check if we have the collateral sized inputs
if ( ! pwalletMain - > HasCollateralInputs ( ) )
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
return ! pwalletMain - > HasCollateralInputs ( false ) & & MakeCollateralAmounts ( connman ) ;
2017-05-05 13:26:27 +02:00
if ( nSessionID ) {
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
return false ;
}
// Initial phase, find a Masternode
// Clean if there is anything left from previous session
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
// should be no unconfirmed denoms in non-multi-session mode
if ( ! fPrivateSendMultiSession & & nBalanceDenominatedUnconf > 0 ) {
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- Found unconfirmed denominated outputs, will wait till they confirm to continue. \n " ) ;
strAutoDenomResult = _ ( " Found unconfirmed denominated outputs, will wait till they confirm to continue. " ) ;
return false ;
}
//check our collateral and create new if needed
std : : string strReason ;
if ( txMyCollateral = = CMutableTransaction ( ) ) {
if ( ! pwalletMain - > CreateCollateralTransaction ( txMyCollateral , strReason ) ) {
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- create collateral error:%s \n " , strReason ) ;
return false ;
}
} else {
2017-06-30 20:30:16 +02:00
if ( ! CPrivateSend : : IsCollateralValid ( txMyCollateral ) ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- invalid collateral, recreating... \n " ) ;
if ( ! pwalletMain - > CreateCollateralTransaction ( txMyCollateral , strReason ) ) {
LogPrintf ( " CPrivateSendClient::DoAutomaticDenominating -- create collateral error: %s \n " , strReason ) ;
return false ;
}
}
}
int nMnCountEnabled = mnodeman . CountEnabled ( MIN_PRIVATESEND_PEER_PROTO_VERSION ) ;
// If we've used 90% of the Masternode list then drop the oldest first ~30%
int nThreshold_high = nMnCountEnabled * 0.9 ;
int nThreshold_low = nThreshold_high * 0.7 ;
LogPrint ( " privatesend " , " Checking vecMasternodesUsed: size: %d, threshold: %d \n " , ( int ) vecMasternodesUsed . size ( ) , nThreshold_high ) ;
if ( ( int ) vecMasternodesUsed . size ( ) > nThreshold_high ) {
vecMasternodesUsed . erase ( vecMasternodesUsed . begin ( ) , vecMasternodesUsed . begin ( ) + vecMasternodesUsed . size ( ) - nThreshold_low ) ;
LogPrint ( " privatesend " , " vecMasternodesUsed: new size: %d, threshold: %d \n " , ( int ) vecMasternodesUsed . size ( ) , nThreshold_high ) ;
}
bool fUseQueue = GetRandInt ( 100 ) > 33 ;
// don't use the queues all of the time for mixing unless we are a liquidity provider
2017-09-19 16:51:38 +02:00
if ( ( nLiquidityProvider | | fUseQueue ) & & JoinExistingQueue ( nBalanceNeedsAnonymized , connman ) )
2017-05-05 13:26:27 +02:00
return true ;
// do not initiate queue if we are a liquidity provider to avoid useless inter-mixing
if ( nLiquidityProvider ) return false ;
2017-09-19 16:51:38 +02:00
if ( StartNewQueue ( nValueMin , nBalanceNeedsAnonymized , connman ) )
2017-05-05 13:26:27 +02:00
return true ;
strAutoDenomResult = _ ( " No compatible Masternode found. " ) ;
return false ;
}
2017-09-19 16:51:38 +02:00
bool CPrivateSendClient : : JoinExistingQueue ( CAmount nBalanceNeedsAnonymized , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-06-30 20:30:16 +02:00
std : : vector < CAmount > vecStandardDenoms = CPrivateSend : : GetStandardDenominations ( ) ;
2017-05-05 13:26:27 +02:00
// Look through the queues and see if anything matches
2018-02-06 12:09:33 +01:00
for ( auto & dsq : vecDarksendQueue ) {
2017-05-05 13:26:27 +02:00
// only try each queue once
if ( dsq . fTried ) continue ;
dsq . fTried = true ;
if ( dsq . IsExpired ( ) ) continue ;
2017-09-11 16:13:48 +02:00
masternode_info_t infoMn ;
2017-05-05 13:26:27 +02:00
2018-02-15 08:29:44 +01:00
if ( ! mnodeman . GetMasternodeInfo ( dsq . masternodeOutpoint , infoMn ) ) {
LogPrintf ( " CPrivateSendClient::JoinExistingQueue -- dsq masternode is not in masternode list, masternode=%s \n " , dsq . masternodeOutpoint . ToStringShort ( ) ) ;
2017-05-05 13:26:27 +02:00
continue ;
}
if ( infoMn . nProtocolVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) continue ;
2018-02-12 13:47:20 +01:00
// skip next mn payments winners
if ( mnpayments . IsScheduled ( infoMn , 0 ) ) {
2018-02-15 08:29:44 +01:00
LogPrintf ( " CPrivateSendClient::JoinExistingQueue -- skipping winner, masternode=%s \n " , infoMn . outpoint . ToStringShort ( ) ) ;
2018-02-12 13:47:20 +01:00
continue ;
}
2017-05-05 13:26:27 +02:00
std : : vector < int > vecBits ;
2017-06-30 20:30:16 +02:00
if ( ! CPrivateSend : : GetDenominationsBits ( dsq . nDenom , vecBits ) ) {
2017-05-05 13:26:27 +02:00
// incompatible denom
continue ;
}
// mixing rate limit i.e. nLastDsq check should already pass in DSQUEUE ProcessMessage
// in order for dsq to get into vecDarksendQueue, so we should be safe to mix already,
// no need for additional verification here
LogPrint ( " privatesend " , " CPrivateSendClient::JoinExistingQueue -- found valid queue: %s \n " , dsq . ToString ( ) ) ;
CAmount nValueInTmp = 0 ;
2017-12-04 07:06:07 +01:00
std : : vector < CTxDSIn > vecTxDSInTmp ;
2017-05-05 13:26:27 +02:00
std : : vector < COutput > vCoinsTmp ;
2018-06-06 09:59:09 +02:00
CAmount nMinAmount = vecStandardDenoms [ vecBits . front ( ) ] ;
CAmount nMaxAmount = nBalanceNeedsAnonymized ;
2018-05-26 20:03:23 +02:00
// nInputCount is not covered by legacy signature, require SPORK_6_NEW_SIGS to activate to use new algo
// (to make sure nInputCount wasn't modified by some intermediary node)
bool fNewAlgo = infoMn . nProtocolVersion > 70208 & & sporkManager . IsSporkActive ( SPORK_6_NEW_SIGS ) ;
if ( fNewAlgo & & dsq . nInputCount ! = 0 ) {
nMinAmount = nMaxAmount = dsq . nInputCount * vecStandardDenoms [ vecBits . front ( ) ] ;
}
// Try to match their denominations if possible, select exact number of denominations
if ( ! pwalletMain - > SelectCoinsByDenominations ( dsq . nDenom , nMinAmount , nMaxAmount , vecTxDSInTmp , vCoinsTmp , nValueInTmp , 0 , nPrivateSendRounds ) ) {
LogPrintf ( " CPrivateSendClient::JoinExistingQueue -- Couldn't match %d denominations %d %d (%s) \n " , dsq . nInputCount , vecBits . front ( ) , dsq . nDenom , CPrivateSend : : GetDenominationsToString ( dsq . nDenom ) ) ;
2017-05-05 13:26:27 +02:00
continue ;
}
2018-02-15 08:29:44 +01:00
vecMasternodesUsed . push_back ( dsq . masternodeOutpoint ) ;
2017-05-05 13:26:27 +02:00
2018-01-17 16:09:08 +01:00
if ( connman . IsMasternodeOrDisconnectRequested ( infoMn . addr ) ) {
2018-01-09 10:17:54 +01:00
LogPrintf ( " CPrivateSendClient::JoinExistingQueue -- skipping masternode connection, addr=%s \n " , infoMn . addr . ToString ( ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
continue ;
2018-01-09 10:17:54 +01:00
}
2017-05-05 13:26:27 +02:00
2018-02-01 02:10:52 +01:00
nSessionDenom = dsq . nDenom ;
2018-05-26 20:03:23 +02:00
nSessionInputCount = fNewAlgo ? dsq . nInputCount : 0 ;
2018-02-01 02:10:52 +01:00
infoMixingMasternode = infoMn ;
2018-05-26 20:03:23 +02:00
pendingDsaRequest = CPendingDsaRequest ( infoMn . addr , CDarksendAccept ( nSessionDenom , nSessionInputCount , txMyCollateral ) ) ;
2018-02-01 02:10:52 +01:00
connman . AddPendingMasternode ( infoMn . addr ) ;
// TODO: add new state POOL_STATE_CONNECTING and bump MIN_PRIVATESEND_PEER_PROTO_VERSION
SetState ( POOL_STATE_QUEUE ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2018-05-26 20:03:23 +02:00
LogPrintf ( " CPrivateSendClient::JoinExistingQueue -- pending connection (from queue): nSessionDenom: %d (%s), nSessionInputCount: %d, addr=%s \n " ,
nSessionDenom , CPrivateSend : : GetDenominationsToString ( nSessionDenom ) , nSessionInputCount , infoMn . addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Trying to connect... " ) ;
2018-01-17 16:09:08 +01:00
return true ;
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Failed to find mixing queue to join " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2017-09-19 16:51:38 +02:00
bool CPrivateSendClient : : StartNewQueue ( CAmount nValueMin , CAmount nBalanceNeedsAnonymized , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-05-05 13:26:27 +02:00
int nTries = 0 ;
int nMnCountEnabled = mnodeman . CountEnabled ( MIN_PRIVATESEND_PEER_PROTO_VERSION ) ;
// ** find the coins we'll use
std : : vector < CTxIn > vecTxIn ;
CAmount nValueInTmp = 0 ;
if ( ! pwalletMain - > SelectCoinsDark ( nValueMin , nBalanceNeedsAnonymized , vecTxIn , nValueInTmp , 0 , nPrivateSendRounds ) ) {
// this should never happen
LogPrintf ( " CPrivateSendClient::StartNewQueue -- Can't mix: no compatible inputs found! \n " ) ;
strAutoDenomResult = _ ( " Can't mix: no compatible inputs found! " ) ;
return false ;
}
// otherwise, try one randomly
while ( nTries < 10 ) {
masternode_info_t infoMn = mnodeman . FindRandomNotInVec ( vecMasternodesUsed , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ;
2018-02-12 13:47:20 +01:00
2017-05-05 13:26:27 +02:00
if ( ! infoMn . fInfoValid ) {
LogPrintf ( " CPrivateSendClient::StartNewQueue -- Can't find random masternode! \n " ) ;
strAutoDenomResult = _ ( " Can't find random Masternode. " ) ;
return false ;
}
2018-02-12 13:47:20 +01:00
// skip next mn payments winners
if ( mnpayments . IsScheduled ( infoMn , 0 ) ) {
2018-02-15 08:29:44 +01:00
LogPrintf ( " CPrivateSendClient::StartNewQueue -- skipping winner, masternode=%s \n " , infoMn . outpoint . ToStringShort ( ) ) ;
2018-02-12 13:47:20 +01:00
nTries + + ;
continue ;
}
2018-02-15 08:29:44 +01:00
vecMasternodesUsed . push_back ( infoMn . outpoint ) ;
2017-05-05 13:26:27 +02:00
if ( infoMn . nLastDsq ! = 0 & & infoMn . nLastDsq + nMnCountEnabled / 5 > mnodeman . nDsqCount ) {
LogPrintf ( " CPrivateSendClient::StartNewQueue -- Too early to mix on this masternode! "
" masternode=%s addr=%s nLastDsq=%d CountEnabled/5=%d nDsqCount=%d \n " ,
2018-02-15 08:29:44 +01:00
infoMn . outpoint . ToStringShort ( ) , infoMn . addr . ToString ( ) , infoMn . nLastDsq ,
2017-05-05 13:26:27 +02:00
nMnCountEnabled / 5 , mnodeman . nDsqCount ) ;
nTries + + ;
continue ;
}
2018-01-17 16:09:08 +01:00
if ( connman . IsMasternodeOrDisconnectRequested ( infoMn . addr ) ) {
2018-01-09 10:17:54 +01:00
LogPrintf ( " CPrivateSendClient::StartNewQueue -- skipping masternode connection, addr=%s \n " , infoMn . addr . ToString ( ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
nTries + + ;
continue ;
2017-05-05 13:26:27 +02:00
}
LogPrintf ( " CPrivateSendClient::StartNewQueue -- attempt %d connection to Masternode %s \n " , nTries , infoMn . addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
std : : vector < CAmount > vecAmounts ;
pwalletMain - > ConvertList ( vecTxIn , vecAmounts ) ;
// try to get a single random denom out of vecAmounts
while ( nSessionDenom = = 0 ) {
nSessionDenom = CPrivateSend : : GetDenominationsByAmounts ( vecAmounts ) ;
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
2018-05-26 20:03:23 +02:00
// Count available denominations.
// Should never really fail after this point, since we just selected compatible inputs ourselves.
std : : vector < int > vecBits ;
if ( ! CPrivateSend : : GetDenominationsBits ( nSessionDenom , vecBits ) ) {
return false ;
}
CAmount nValueInTmp = 0 ;
std : : vector < CTxDSIn > vecTxDSInTmp ;
std : : vector < COutput > vCoinsTmp ;
std : : vector < CAmount > vecStandardDenoms = CPrivateSend : : GetStandardDenominations ( ) ;
bool fSelected = pwalletMain - > SelectCoinsByDenominations ( nSessionDenom , vecStandardDenoms [ vecBits . front ( ) ] , vecStandardDenoms [ vecBits . front ( ) ] * PRIVATESEND_ENTRY_MAX_SIZE , vecTxDSInTmp , vCoinsTmp , nValueInTmp , 0 , nPrivateSendRounds ) ;
if ( ! fSelected ) {
return false ;
}
// nInputCount is not covered by legacy signature, require SPORK_6_NEW_SIGS to activate to use new algo
// (to make sure nInputCount wasn't modified by some intermediary node)
bool fNewAlgo = infoMn . nProtocolVersion > 70208 & & sporkManager . IsSporkActive ( SPORK_6_NEW_SIGS ) ;
nSessionInputCount = fNewAlgo
? std : : min ( vecTxDSInTmp . size ( ) , size_t ( 5 + GetRand ( PRIVATESEND_ENTRY_MAX_SIZE - 5 + 1 ) ) )
: 0 ;
2018-02-01 02:10:52 +01:00
infoMixingMasternode = infoMn ;
connman . AddPendingMasternode ( infoMn . addr ) ;
2018-05-26 20:03:23 +02:00
pendingDsaRequest = CPendingDsaRequest ( infoMn . addr , CDarksendAccept ( nSessionDenom , nSessionInputCount , txMyCollateral ) ) ;
2018-02-01 02:10:52 +01:00
// TODO: add new state POOL_STATE_CONNECTING and bump MIN_PRIVATESEND_PEER_PROTO_VERSION
SetState ( POOL_STATE_QUEUE ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2018-05-26 20:03:23 +02:00
LogPrintf ( " CPrivateSendClient::StartNewQueue -- pending connection, nSessionDenom: %d (%s), nSessionInputCount: %d, addr=%s \n " ,
nSessionDenom , CPrivateSend : : GetDenominationsToString ( nSessionDenom ) , nSessionInputCount , infoMn . addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Trying to connect... " ) ;
2018-01-17 16:09:08 +01:00
return true ;
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Failed to start a new mixing queue " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-02-01 02:10:52 +01:00
void CPrivateSendClient : : ProcessPendingDsaRequest ( CConnman & connman )
{
2018-02-21 17:32:08 +01:00
if ( ! pendingDsaRequest ) return ;
2018-02-01 02:10:52 +01:00
bool fDone = connman . ForNode ( pendingDsaRequest . GetAddr ( ) , [ & ] ( CNode * pnode ) {
LogPrint ( " privatesend " , " -- processing dsa queue for addr=%s \n " , pnode - > addr . ToString ( ) ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2018-02-01 02:10:52 +01:00
// TODO: this vvvv should be here after new state POOL_STATE_CONNECTING is added and MIN_PRIVATESEND_PEER_PROTO_VERSION is bumped
// SetState(POOL_STATE_QUEUE);
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSACCEPT , pendingDsaRequest . GetDSA ( ) ) ) ;
return true ;
} ) ;
if ( fDone ) {
pendingDsaRequest = CPendingDsaRequest ( ) ;
} else if ( pendingDsaRequest . IsExpired ( ) ) {
LogPrint ( " privatesend " , " CPrivateSendClient::%s -- failed to connect to %s \n " , __func__ , pendingDsaRequest . GetAddr ( ) . ToString ( ) ) ;
SetNull ( ) ;
}
}
2017-09-19 16:51:38 +02:00
bool CPrivateSendClient : : SubmitDenominate ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
std : : string strError ;
2017-12-04 07:06:07 +01:00
std : : vector < CTxDSIn > vecTxDSInRet ;
2017-05-05 13:26:27 +02:00
std : : vector < CTxOut > vecTxOutRet ;
// Submit transaction to the pool if we get here
2018-01-06 11:06:22 +01:00
if ( nLiquidityProvider ) {
// Try to use only inputs with the same number of rounds starting from the lowest number of rounds possible
for ( int i = 0 ; i < nPrivateSendRounds ; i + + ) {
if ( PrepareDenominate ( i , i + 1 , strError , vecTxDSInRet , vecTxOutRet ) ) {
LogPrintf ( " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for %d rounds, success \n " , i ) ;
return SendDenominate ( vecTxDSInRet , vecTxOutRet , connman ) ;
}
LogPrint ( " privatesend " , " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for %d rounds, error: %s \n " , i , strError ) ;
}
} else {
// Try to use only inputs with the same number of rounds starting from the highest number of rounds possible
for ( int i = nPrivateSendRounds ; i > 0 ; i - - ) {
if ( PrepareDenominate ( i - 1 , i , strError , vecTxDSInRet , vecTxOutRet ) ) {
LogPrintf ( " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for %d rounds, success \n " , i ) ;
return SendDenominate ( vecTxDSInRet , vecTxOutRet , connman ) ;
}
LogPrint ( " privatesend " , " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for %d rounds, error: %s \n " , i , strError ) ;
2017-05-05 13:26:27 +02:00
}
}
// We failed? That's strange but let's just make final attempt and try to mix everything
2017-12-04 07:06:07 +01:00
if ( PrepareDenominate ( 0 , nPrivateSendRounds , strError , vecTxDSInRet , vecTxOutRet ) ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for all rounds, success \n " ) ;
2017-12-04 07:06:07 +01:00
return SendDenominate ( vecTxDSInRet , vecTxOutRet , connman ) ;
2017-05-05 13:26:27 +02:00
}
// Should never actually get here but just in case
LogPrintf ( " CPrivateSendClient::SubmitDenominate -- Running PrivateSend denominate for all rounds, error: %s \n " , strError ) ;
strAutoDenomResult = strError ;
return false ;
}
2017-12-04 07:06:07 +01:00
bool CPrivateSendClient : : PrepareDenominate ( int nMinRounds , int nMaxRounds , std : : string & strErrorRet , std : : vector < CTxDSIn > & vecTxDSInRet , std : : vector < CTxOut > & vecTxOutRet )
2017-05-05 13:26:27 +02:00
{
if ( ! pwalletMain ) {
strErrorRet = " Wallet is not initialized " ;
return false ;
}
if ( pwalletMain - > IsLocked ( true ) ) {
strErrorRet = " Wallet locked, unable to create transaction! " ;
return false ;
}
if ( GetEntriesCount ( ) > 0 ) {
strErrorRet = " Already have pending entries in the PrivateSend pool " ;
return false ;
}
// make sure returning vectors are empty before filling them up
2017-12-04 07:06:07 +01:00
vecTxDSInRet . clear ( ) ;
2017-05-05 13:26:27 +02:00
vecTxOutRet . clear ( ) ;
// ** find the coins we'll use
2017-12-04 07:06:07 +01:00
std : : vector < CTxDSIn > vecTxDSIn ;
2017-05-05 13:26:27 +02:00
std : : vector < COutput > vCoins ;
CAmount nValueIn = 0 ;
/*
Select the coins we ' ll use
if nMinRounds > = 0 it means only denominated inputs are going in and coming out
*/
std : : vector < int > vecBits ;
2017-06-30 20:30:16 +02:00
if ( ! CPrivateSend : : GetDenominationsBits ( nSessionDenom , vecBits ) ) {
2017-05-05 13:26:27 +02:00
strErrorRet = " Incorrect session denom " ;
return false ;
}
2017-06-30 20:30:16 +02:00
std : : vector < CAmount > vecStandardDenoms = CPrivateSend : : GetStandardDenominations ( ) ;
2018-05-26 20:03:23 +02:00
bool fSelected = pwalletMain - > SelectCoinsByDenominations ( nSessionDenom , vecStandardDenoms [ vecBits . front ( ) ] , vecStandardDenoms [ vecBits . front ( ) ] * PRIVATESEND_ENTRY_MAX_SIZE , vecTxDSIn , vCoins , nValueIn , nMinRounds , nMaxRounds ) ;
2017-05-05 13:26:27 +02:00
if ( nMinRounds > = 0 & & ! fSelected ) {
strErrorRet = " Can't select current denominated inputs " ;
return false ;
}
LogPrintf ( " CPrivateSendClient::PrepareDenominate -- max value: %f \n " , ( double ) nValueIn / COIN ) ;
{
LOCK ( pwalletMain - > cs_wallet ) ;
2018-02-06 12:09:33 +01:00
for ( const auto & txin : vecTxDSIn ) {
2017-05-05 13:26:27 +02:00
pwalletMain - > LockCoin ( txin . prevout ) ;
}
}
CAmount nValueLeft = nValueIn ;
// Try to add every needed denomination, repeat up to 5-PRIVATESEND_ENTRY_MAX_SIZE times.
// NOTE: No need to randomize order of inputs because they were
// initially shuffled in CWallet::SelectCoinsByDenominations already.
int nStep = 0 ;
2018-05-26 20:03:23 +02:00
int nStepsMax = nSessionInputCount ! = 0 ? nSessionInputCount : ( 5 + GetRandInt ( PRIVATESEND_ENTRY_MAX_SIZE - 5 + 1 ) ) ;
2017-05-05 13:26:27 +02:00
while ( nStep < nStepsMax ) {
2018-02-06 12:09:33 +01:00
for ( const auto & nBit : vecBits ) {
2017-06-30 20:30:16 +02:00
CAmount nValueDenom = vecStandardDenoms [ nBit ] ;
2017-05-05 13:26:27 +02:00
if ( nValueLeft - nValueDenom < 0 ) continue ;
// Note: this relies on a fact that both vectors MUST have same size
2017-12-04 07:06:07 +01:00
std : : vector < CTxDSIn > : : iterator it = vecTxDSIn . begin ( ) ;
2017-05-05 13:26:27 +02:00
std : : vector < COutput > : : iterator it2 = vCoins . begin ( ) ;
while ( it2 ! = vCoins . end ( ) ) {
// we have matching inputs
2016-12-05 08:01:20 +01:00
if ( ( * it2 ) . tx - > tx - > vout [ ( * it2 ) . i ] . nValue = = nValueDenom ) {
2017-05-05 13:26:27 +02:00
// add new input in resulting vector
2017-12-04 07:06:07 +01:00
vecTxDSInRet . push_back ( * it ) ;
2018-02-08 06:46:44 +01:00
// remove corresponding items from initial vectors
2017-12-04 07:06:07 +01:00
vecTxDSIn . erase ( it ) ;
2017-05-05 13:26:27 +02:00
vCoins . erase ( it2 ) ;
2018-01-09 12:11:43 +01:00
CScript scriptDenom = keyHolderStorage . AddKey ( pwalletMain ) ;
2017-05-05 13:26:27 +02:00
// add new output
2017-05-29 13:51:40 +02:00
CTxOut txout ( nValueDenom , scriptDenom ) ;
2017-05-05 13:26:27 +02:00
vecTxOutRet . push_back ( txout ) ;
// subtract denomination amount
nValueLeft - = nValueDenom ;
// step is complete
break ;
}
+ + it ;
+ + it2 ;
}
}
nStep + + ;
2018-06-22 17:57:46 +02:00
if ( nValueLeft = = 0 ) break ;
2017-05-05 13:26:27 +02:00
}
{
// unlock unused coins
LOCK ( pwalletMain - > cs_wallet ) ;
2018-02-06 12:09:33 +01:00
for ( const auto & txin : vecTxDSIn ) {
2017-05-05 13:26:27 +02:00
pwalletMain - > UnlockCoin ( txin . prevout ) ;
}
}
2018-06-22 17:57:46 +02:00
if ( CPrivateSend : : GetDenominations ( vecTxOutRet ) ! = nSessionDenom | | ( nSessionInputCount ! = 0 & & vecTxOutRet . size ( ) ! = nSessionInputCount ) ) {
2018-03-20 12:05:39 +01:00
{
// unlock used coins on failure
LOCK ( pwalletMain - > cs_wallet ) ;
for ( const auto & txin : vecTxDSInRet ) {
pwalletMain - > UnlockCoin ( txin . prevout ) ;
}
2017-05-05 13:26:27 +02:00
}
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
strErrorRet = " Can't make current denominated outputs " ;
return false ;
}
// We also do not care about full amount as long as we have right denominations
return true ;
}
// Create collaterals by looping through inputs grouped by addresses
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
bool CPrivateSendClient : : MakeCollateralAmounts ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-05-05 13:26:27 +02:00
std : : vector < CompactTallyItem > vecTally ;
if ( ! pwalletMain - > SelectCoinsGrouppedByAddresses ( vecTally , false ) ) {
LogPrint ( " privatesend " , " CPrivateSendClient::MakeCollateralAmounts -- SelectCoinsGrouppedByAddresses can't find any inputs! \n " ) ;
return false ;
}
2017-07-10 16:42:32 +02:00
// First try to use only non-denominated funds
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
if ( ! MakeCollateralAmounts ( item , false , connman ) ) continue ;
2017-05-05 13:26:27 +02:00
return true ;
}
2017-07-10 16:42:32 +02:00
// There should be at least some denominated funds we should be able to break in pieces to continue mixing
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
if ( ! MakeCollateralAmounts ( item , true , connman ) ) continue ;
2017-07-10 16:42:32 +02:00
return true ;
}
// If we got here then smth is terribly broken actually
LogPrintf ( " CPrivateSendClient::MakeCollateralAmounts -- ERROR: Can't make collaterals! \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// Split up large inputs or create fee sized inputs
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
bool CPrivateSendClient : : MakeCollateralAmounts ( const CompactTallyItem & tallyItem , bool fTryDenominated , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-07-10 16:42:32 +02:00
LOCK2 ( cs_main , pwalletMain - > cs_wallet ) ;
2017-09-27 19:42:53 +02:00
// denominated input is always a single one, so we can check its amount directly and return early
2018-02-15 08:29:31 +01:00
if ( ! fTryDenominated & & tallyItem . vecOutPoints . size ( ) = = 1 & & CPrivateSend : : IsDenominatedAmount ( tallyItem . nAmount ) )
2017-09-27 19:42:53 +02:00
return false ;
2017-05-05 13:26:27 +02:00
CWalletTx wtx ;
CAmount nFeeRet = 0 ;
int nChangePosRet = - 1 ;
std : : string strFail = " " ;
std : : vector < CRecipient > vecSend ;
// make our collateral address
CReserveKey reservekeyCollateral ( pwalletMain ) ;
// make our change address
CReserveKey reservekeyChange ( pwalletMain ) ;
CScript scriptCollateral ;
CPubKey vchPubKey ;
2017-05-29 13:51:40 +02:00
assert ( reservekeyCollateral . GetReservedKey ( vchPubKey , false ) ) ; // should never fail, as we just unlocked
2017-05-05 13:26:27 +02:00
scriptCollateral = GetScriptForDestination ( vchPubKey . GetID ( ) ) ;
2017-06-30 20:30:16 +02:00
vecSend . push_back ( ( CRecipient ) { scriptCollateral , CPrivateSend : : GetMaxCollateralAmount ( ) , false } ) ;
2017-05-05 13:26:27 +02:00
// try to use non-denominated and not mn-like funds first, select them explicitly
CCoinControl coinControl ;
coinControl . fAllowOtherInputs = false ;
coinControl . fAllowWatchOnly = false ;
// send change to the same address so that we were able create more denoms out of it later
2017-09-27 19:43:16 +02:00
coinControl . destChange = tallyItem . txdest ;
2018-02-15 08:29:31 +01:00
for ( const auto & outpoint : tallyItem . vecOutPoints )
coinControl . Select ( outpoint ) ;
2017-05-05 13:26:27 +02:00
bool fSuccess = pwalletMain - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2017-11-01 16:11:39 +01:00
nFeeRet , nChangePosRet , strFail , & coinControl , true , ONLY_NONDENOMINATED ) ;
2017-05-05 13:26:27 +02:00
if ( ! fSuccess ) {
2017-11-01 16:11:39 +01:00
LogPrintf ( " CPrivateSendClient::MakeCollateralAmounts -- ONLY_NONDENOMINATED: %s \n " , strFail ) ;
2018-02-08 06:46:44 +01:00
// If we failed then most likely there are not enough funds on this address.
2017-07-10 16:42:32 +02:00
if ( fTryDenominated ) {
// Try to also use denominated coins (we can't mix denominated without collaterals anyway).
if ( ! pwalletMain - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2017-11-01 16:11:39 +01:00
nFeeRet , nChangePosRet , strFail , & coinControl , true , ALL_COINS ) ) {
LogPrintf ( " CPrivateSendClient::MakeCollateralAmounts -- ALL_COINS Error: %s \n " , strFail ) ;
2017-07-10 16:42:32 +02:00
reservekeyCollateral . ReturnKey ( ) ;
return false ;
}
} else {
// Nothing else we can do.
2017-05-05 13:26:27 +02:00
reservekeyCollateral . ReturnKey ( ) ;
return false ;
}
}
reservekeyCollateral . KeepKey ( ) ;
LogPrintf ( " CPrivateSendClient::MakeCollateralAmounts -- txid=%s \n " , wtx . GetHash ( ) . GetHex ( ) ) ;
2018-02-08 06:46:44 +01:00
// use the same nCachedLastSuccessBlock as for DS mixing to prevent race
2016-10-28 13:49:04 +02:00
CValidationState state ;
if ( ! pwalletMain - > CommitTransaction ( wtx , reservekeyChange , & connman , state ) ) {
LogPrintf ( " CPrivateSendClient::MakeCollateralAmounts -- CommitTransaction failed! Reason given: %s \n " , state . GetRejectReason ( ) ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2017-08-25 14:57:05 +02:00
nCachedLastSuccessBlock = nCachedBlockHeight ;
2017-05-05 13:26:27 +02:00
return true ;
}
// Create denominations by looping through inputs grouped by addresses
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
bool CPrivateSendClient : : CreateDenominated ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-05-28 15:50:07 +02:00
LOCK2 ( cs_main , pwalletMain - > cs_wallet ) ;
2017-05-05 13:26:27 +02:00
std : : vector < CompactTallyItem > vecTally ;
if ( ! pwalletMain - > SelectCoinsGrouppedByAddresses ( vecTally ) ) {
LogPrint ( " privatesend " , " CPrivateSendClient::CreateDenominated -- SelectCoinsGrouppedByAddresses can't find any inputs! \n " ) ;
return false ;
}
bool fCreateMixingCollaterals = ! pwalletMain - > HasCollateralInputs ( ) ;
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
if ( ! CreateDenominated ( item , fCreateMixingCollaterals , connman ) ) continue ;
2017-05-05 13:26:27 +02:00
return true ;
}
LogPrintf ( " CPrivateSendClient::CreateDenominated -- failed! \n " ) ;
return false ;
}
// Create denominations
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
bool CPrivateSendClient : : CreateDenominated ( const CompactTallyItem & tallyItem , bool fCreateMixingCollaterals , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-07-28 15:50:41 +02:00
if ( ! pwalletMain ) return false ;
2017-05-05 13:26:27 +02:00
std : : vector < CRecipient > vecSend ;
2017-09-11 16:14:55 +02:00
CKeyHolderStorage keyHolderStorageDenom ;
2017-05-05 13:26:27 +02:00
CAmount nValueLeft = tallyItem . nAmount ;
2017-06-30 20:30:16 +02:00
nValueLeft - = CPrivateSend : : GetCollateralAmount ( ) ; // leave some room for fees
2017-05-05 13:26:27 +02:00
2018-02-26 12:10:20 +01:00
LogPrintf ( " CreateDenominated0: %s nValueLeft: %f \n " , CBitcoinAddress ( tallyItem . txdest ) . ToString ( ) , ( float ) nValueLeft / COIN ) ;
2017-05-05 13:26:27 +02:00
2017-09-11 16:14:55 +02:00
// ****** Add an output for mixing collaterals ************ /
2017-05-05 13:26:27 +02:00
if ( fCreateMixingCollaterals ) {
2018-01-09 12:11:43 +01:00
CScript scriptCollateral = keyHolderStorageDenom . AddKey ( pwalletMain ) ;
2017-09-11 16:14:55 +02:00
vecSend . push_back ( ( CRecipient ) { scriptCollateral , CPrivateSend : : GetMaxCollateralAmount ( ) , false } ) ;
2017-06-30 20:30:16 +02:00
nValueLeft - = CPrivateSend : : GetMaxCollateralAmount ( ) ;
2017-05-05 13:26:27 +02:00
}
2017-09-11 16:14:55 +02:00
// ****** Add outputs for denoms ************ /
2017-05-05 13:26:27 +02:00
2017-09-11 16:14:55 +02:00
// try few times - skipping smallest denoms first if there are too many of them already, if failed - use them too
2017-05-05 13:26:27 +02:00
int nOutputsTotal = 0 ;
bool fSkip = true ;
do {
2017-06-30 20:30:16 +02:00
std : : vector < CAmount > vecStandardDenoms = CPrivateSend : : GetStandardDenominations ( ) ;
2017-05-05 13:26:27 +02:00
2018-07-12 11:07:51 +02:00
for ( auto it = vecStandardDenoms . rbegin ( ) ; it ! = vecStandardDenoms . rend ( ) ; + + it ) {
CAmount nDenomValue = * it ;
2017-05-05 13:26:27 +02:00
if ( fSkip ) {
// Note: denoms are skipped if there are already DENOMS_COUNT_MAX of them
// and there are still larger denoms which can be used for mixing
// check skipped denoms
if ( IsDenomSkipped ( nDenomValue ) ) continue ;
// find new denoms to skip if any (ignore the largest one)
2017-06-30 20:30:16 +02:00
if ( nDenomValue ! = vecStandardDenoms . front ( ) & & pwalletMain - > CountInputsWithAmount ( nDenomValue ) > DENOMS_COUNT_MAX ) {
2017-05-05 13:26:27 +02:00
strAutoDenomResult = strprintf ( _ ( " Too many %f denominations, removing. " ) , ( float ) nDenomValue / COIN ) ;
LogPrintf ( " CPrivateSendClient::CreateDenominated -- %s \n " , strAutoDenomResult ) ;
vecDenominationsSkipped . push_back ( nDenomValue ) ;
continue ;
}
}
int nOutputs = 0 ;
2017-05-28 15:50:07 +02:00
// add each output up to 11 times until it can't be added again
2017-05-05 13:26:27 +02:00
while ( nValueLeft - nDenomValue > = 0 & & nOutputs < = 10 ) {
2018-01-09 12:11:43 +01:00
CScript scriptDenom = keyHolderStorageDenom . AddKey ( pwalletMain ) ;
2017-05-05 13:26:27 +02:00
vecSend . push_back ( ( CRecipient ) { scriptDenom , nDenomValue , false } ) ;
//increment outputs and subtract denomination amount
nOutputs + + ;
nValueLeft - = nDenomValue ;
2017-05-28 15:50:07 +02:00
LogPrintf ( " CreateDenominated1: totalOutputs: %d, nOutputsTotal: %d, nOutputs: %d, nValueLeft: %f \n " , nOutputsTotal + nOutputs , nOutputsTotal , nOutputs , ( float ) nValueLeft / COIN ) ;
2017-05-05 13:26:27 +02:00
}
nOutputsTotal + = nOutputs ;
if ( nValueLeft = = 0 ) break ;
}
LogPrintf ( " CreateDenominated2: nOutputsTotal: %d, nValueLeft: %f \n " , nOutputsTotal , ( float ) nValueLeft / COIN ) ;
// if there were no outputs added, start over without skipping
fSkip = ! fSkip ;
} while ( nOutputsTotal = = 0 & & ! fSkip ) ;
LogPrintf ( " CreateDenominated3: nOutputsTotal: %d, nValueLeft: %f \n " , nOutputsTotal , ( float ) nValueLeft / COIN ) ;
// if we have anything left over, it will be automatically send back as change - there is no need to send it manually
CCoinControl coinControl ;
coinControl . fAllowOtherInputs = false ;
coinControl . fAllowWatchOnly = false ;
// send change to the same address so that we were able create more denoms out of it later
2017-09-27 19:43:16 +02:00
coinControl . destChange = tallyItem . txdest ;
2018-02-15 08:29:31 +01:00
for ( const auto & outpoint : tallyItem . vecOutPoints )
coinControl . Select ( outpoint ) ;
2017-05-05 13:26:27 +02:00
CWalletTx wtx ;
CAmount nFeeRet = 0 ;
int nChangePosRet = - 1 ;
std : : string strFail = " " ;
// make our change address
CReserveKey reservekeyChange ( pwalletMain ) ;
bool fSuccess = pwalletMain - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2017-11-01 16:11:39 +01:00
nFeeRet , nChangePosRet , strFail , & coinControl , true , ONLY_NONDENOMINATED ) ;
2017-05-05 13:26:27 +02:00
if ( ! fSuccess ) {
LogPrintf ( " CPrivateSendClient::CreateDenominated -- Error: %s \n " , strFail ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorageDenom . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2017-09-11 16:14:55 +02:00
keyHolderStorageDenom . KeepAll ( ) ;
2017-05-05 13:26:27 +02:00
2016-10-28 13:49:04 +02:00
CValidationState state ;
if ( ! pwalletMain - > CommitTransaction ( wtx , reservekeyChange , & connman , state ) ) {
LogPrintf ( " CPrivateSendClient::CreateDenominated -- CommitTransaction failed! Reason given: %s \n " , state . GetRejectReason ( ) ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// use the same nCachedLastSuccessBlock as for DS mixing to prevent race
2017-08-25 14:57:05 +02:00
nCachedLastSuccessBlock = nCachedBlockHeight ;
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::CreateDenominated -- txid=%s \n " , wtx . GetHash ( ) . GetHex ( ) ) ;
return true ;
}
2017-09-19 16:51:38 +02:00
void CPrivateSendClient : : RelayIn ( const CDarkSendEntry & entry , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
if ( ! infoMixingMasternode . fInfoValid ) return ;
2017-09-19 16:51:38 +02:00
connman . ForNode ( infoMixingMasternode . addr , [ & entry , & connman ] ( CNode * pnode ) {
2017-05-05 13:26:27 +02:00
LogPrintf ( " CPrivateSendClient::RelayIn -- found master, relaying message to %s \n " , pnode - > addr . ToString ( ) ) ;
2016-11-25 20:01:56 +01:00
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSVIN , entry ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
return true ;
} ) ;
2017-05-05 13:26:27 +02:00
}
void CPrivateSendClient : : SetState ( PoolState nStateNew )
{
LogPrintf ( " CPrivateSendClient::SetState -- nState: %d, nStateNew: %d \n " , nState , nStateNew ) ;
nState = nStateNew ;
}
void CPrivateSendClient : : UpdatedBlockTip ( const CBlockIndex * pindex )
{
2017-08-25 14:57:05 +02:00
nCachedBlockHeight = pindex - > nHeight ;
LogPrint ( " privatesend " , " CPrivateSendClient::UpdatedBlockTip -- nCachedBlockHeight: %d \n " , nCachedBlockHeight ) ;
2017-05-05 13:26:27 +02:00
}
2018-07-16 14:47:37 +02:00
void CPrivateSendClient : : DoMaintenance ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
if ( fLiteMode ) return ; // disable all Dash specific functionality
2018-01-26 02:11:01 +01:00
if ( fMasternodeMode ) return ; // no client-side mixing on masternodes
2017-05-05 13:26:27 +02:00
2018-07-16 14:47:37 +02:00
if ( ! masternodeSync . IsBlockchainSynced ( ) | | ShutdownRequested ( ) )
return ;
2017-05-05 13:26:27 +02:00
2018-07-16 14:47:37 +02:00
static unsigned int nTick = 0 ;
static unsigned int nDoAutoNextRun = nTick + PRIVATESEND_AUTO_TIMEOUT_MIN ;
2017-05-05 13:26:27 +02:00
2018-07-16 14:47:37 +02:00
nTick + + ;
privateSendClient . CheckTimeout ( ) ;
privateSendClient . ProcessPendingDsaRequest ( connman ) ;
if ( nDoAutoNextRun = = nTick ) {
privateSendClient . DoAutomaticDenominating ( connman ) ;
nDoAutoNextRun = nTick + PRIVATESEND_AUTO_TIMEOUT_MIN + GetRandInt ( PRIVATESEND_AUTO_TIMEOUT_MAX - PRIVATESEND_AUTO_TIMEOUT_MIN ) ;
2017-05-05 13:26:27 +02:00
}
}