2020-01-17 15:42:55 +01:00
// Copyright (c) 2014-2020 The Dash Core developers
2017-05-05 13:26:27 +02:00
// Distributed under the MIT/X11 software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
2018-11-05 10:29:33 +01:00
2020-03-19 23:46:56 +01:00
# include <privatesend/privatesend-client.h>
2017-05-05 13:26:27 +02:00
2020-03-19 23:46:56 +01:00
# include <consensus/validation.h>
# include <core_io.h>
# include <init.h>
# include <masternode/masternode-payments.h>
# include <masternode/masternode-sync.h>
# include <masternode/masternode-meta.h>
# include <netmessagemaker.h>
# include <script/sign.h>
# include <txmempool.h>
# include <util.h>
# include <utilmoneystr.h>
# include <validation.h>
# include <wallet/coincontrol.h>
2017-07-03 15:14:07 +02:00
2017-05-28 15:50:07 +02:00
# include <memory>
2019-10-09 18:48:53 +02:00
# include <univalue.h>
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
CPrivateSendClientManager privateSendClient ;
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
void CPrivateSendClientManager : : ProcessMessage ( CNode * pfrom , const std : : string & strCommand , CDataStream & vRecv , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ;
2019-06-27 22:24:43 +02:00
if ( ! fEnablePrivateSend ) return ;
2018-11-05 10:29:07 +01:00
if ( ! masternodeSync . IsBlockchainSynced ( ) ) return ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( ! CheckDiskSpace ( ) ) {
2018-09-04 12:54:59 +02:00
ResetPool ( ) ;
2019-06-27 22:24:43 +02:00
fPrivateSendRunning = false ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::ProcessMessage -- Not enough disk space, disabling PrivateSend. \n " ) ;
2018-09-04 12:54:59 +02:00
return ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( strCommand = = NetMsgType : : DSQUEUE ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2017-05-07 09:59:42 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- peer=%d using obsolete version %i \n " , pfrom - > GetId ( ) , pfrom - > nVersion ) ;
2020-04-19 13:04:31 +02:00
if ( g_enable_bip61 ) {
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand ,
REJECT_OBSOLETE , strprintf (
" Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
}
2017-05-05 13:26:27 +02:00
return ;
}
2018-10-25 16:31:32 +02:00
CPrivateSendQueue dsq ;
2017-05-05 13:26:27 +02:00
vRecv > > dsq ;
2018-09-04 12:54:59 +02:00
{
TRY_LOCK ( cs_vecqueue , lockRecv ) ;
2018-11-05 10:29:07 +01:00
if ( ! lockRecv ) return ;
2018-09-04 12:54:59 +02:00
// process every dsq only once
2018-10-25 16:31:32 +02:00
for ( const auto & q : vecPrivateSendQueue ) {
2018-11-05 10:29:07 +01:00
if ( q = = dsq ) {
2018-09-04 12:54:59 +02:00
return ;
}
2019-10-09 18:48:32 +02:00
if ( q . fReady = = dsq . fReady & & q . masternodeOutpoint = = dsq . masternodeOutpoint ) {
// no way the same mn can send another dsq with the same readiness this soon
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- Peer %s is sending WAY too many dsq messages for a masternode with collateral %s \n " , pfrom - > GetLogString ( ) , dsq . masternodeOutpoint . ToStringShort ( ) ) ;
return ;
}
2017-05-05 13:26:27 +02:00
}
2018-09-04 12:54:59 +02:00
} // cs_vecqueue
2017-05-05 13:26:27 +02:00
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- %s new \n " , dsq . ToString ( ) ) ;
2017-05-05 13:26:27 +02:00
2019-10-09 18:48:32 +02:00
if ( dsq . IsTimeOutOfBounds ( ) ) return ;
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
auto mnList = deterministicMNManager - > GetListAtChainTip ( ) ;
auto dmn = mnList . GetValidMNByCollateral ( dsq . masternodeOutpoint ) ;
if ( ! dmn ) return ;
2017-05-05 13:26:27 +02:00
2019-06-13 11:01:26 +02:00
if ( ! dsq . CheckSignature ( dmn - > pdmnState - > pubKeyOperator . Get ( ) ) ) {
2018-12-31 14:01:04 +01:00
LOCK ( cs_main ) ;
2017-05-07 09:59:42 +02:00
Misbehaving ( pfrom - > GetId ( ) , 10 ) ;
2017-05-05 13:26:27 +02:00
return ;
}
// if the queue is ready, submit if we can
2018-11-05 10:29:07 +01:00
if ( dsq . fReady ) {
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
for ( auto & session : deqSessions ) {
2018-12-17 15:45:36 +01:00
CDeterministicMNCPtr mnMixing ;
if ( session . GetMixingMasternodeInfo ( mnMixing ) & & mnMixing - > pdmnState - > addr = = dmn - > pdmnState - > addr & & session . GetState ( ) = = POOL_STATE_QUEUE ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- PrivateSend queue (%s) is ready on masternode %s \n " , dsq . ToString ( ) , dmn - > pdmnState - > addr . ToString ( ) ) ;
2018-09-04 12:54:59 +02:00
session . SubmitDenominate ( connman ) ;
return ;
}
2017-05-05 13:26:27 +02:00
}
} else {
2019-01-03 21:08:34 +01:00
int64_t nLastDsq = mmetaman . GetMetaInfo ( dmn - > proTxHash ) - > GetLastDsq ( ) ;
2018-12-17 15:45:36 +01:00
int nThreshold = nLastDsq + mnList . GetValidMNsCount ( ) / 5 ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- nLastDsq: %d threshold: %d nDsqCount: %d \n " , nLastDsq , nThreshold , mmetaman . GetDsqCount ( ) ) ;
2019-06-18 13:33:05 +02:00
// don't allow a few nodes to dominate the queuing process
2019-01-03 21:08:34 +01:00
if ( nLastDsq ! = 0 & & nThreshold > mmetaman . GetDsqCount ( ) ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- Masternode %s is sending too many dsq messages \n " , dmn - > proTxHash . ToString ( ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-01-03 21:08:34 +01:00
mmetaman . AllowMixing ( dmn - > proTxHash ) ;
2017-05-05 13:26:27 +02:00
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSQUEUE -- new PrivateSend queue (%s) from masternode %s \n " , dsq . ToString ( ) , dmn - > pdmnState - > addr . ToString ( ) ) ;
2019-10-09 18:48:32 +02:00
LOCK ( cs_deqsessions ) ;
2018-09-20 14:40:43 +02:00
for ( auto & session : deqSessions ) {
2018-12-17 15:45:36 +01:00
CDeterministicMNCPtr mnMixing ;
if ( session . GetMixingMasternodeInfo ( mnMixing ) & & mnMixing - > collateralOutpoint = = dsq . masternodeOutpoint ) {
2018-09-04 12:54:59 +02:00
dsq . fTried = true ;
}
2017-05-05 13:26:27 +02:00
}
2019-10-09 18:48:32 +02:00
TRY_LOCK ( cs_vecqueue , lockRecv ) ;
if ( ! lockRecv ) return ;
2018-10-25 16:31:32 +02:00
vecPrivateSendQueue . push_back ( dsq ) ;
2017-09-19 16:51:38 +02:00
dsq . Relay ( connman ) ;
2017-05-05 13:26:27 +02:00
}
2019-06-18 13:33:05 +02:00
} else if ( strCommand = = NetMsgType : : DSSTATUSUPDATE | |
strCommand = = NetMsgType : : DSFINALTX | |
strCommand = = NetMsgType : : DSCOMPLETE ) {
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
for ( auto & session : deqSessions ) {
2018-09-04 12:54:59 +02:00
session . ProcessMessage ( pfrom , strCommand , vRecv , connman ) ;
}
}
}
void CPrivateSendClientSession : : ProcessMessage ( CNode * pfrom , const std : : string & strCommand , CDataStream & vRecv , CConnman & connman )
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ;
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend ) return ;
2018-11-05 10:29:07 +01:00
if ( ! masternodeSync . IsBlockchainSynced ( ) ) return ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( strCommand = = NetMsgType : : DSSTATUSUPDATE ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2017-05-07 09:59:42 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- peer=%d using obsolete version %i \n " , pfrom - > GetId ( ) , pfrom - > nVersion ) ;
2020-04-19 13:04:31 +02:00
if ( g_enable_bip61 ) {
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand ,
REJECT_OBSOLETE , strprintf (
" Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
}
2017-05-05 13:26:27 +02:00
return ;
}
2018-12-17 15:45:36 +01:00
if ( ! mixingMasternode ) return ;
if ( mixingMasternode - > pdmnState - > addr ! = pfrom - > addr ) {
2017-05-05 13:26:27 +02:00
return ;
}
2019-06-18 13:33:30 +02:00
CPrivateSendStatusUpdate psssup ;
vRecv > > psssup ;
if ( psssup . nState < POOL_STATE_MIN | | psssup . nState > POOL_STATE_MAX ) {
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- psssup.nState is out of bounds: %d \n " , psssup . nState ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-06-18 13:33:30 +02:00
if ( psssup . nStatusUpdate < STATUS_REJECTED | | psssup . nStatusUpdate > STATUS_ACCEPTED ) {
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- psssup.nStatusUpdate is out of bounds: %d \n " , psssup . nStatusUpdate ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-06-18 13:33:30 +02:00
if ( psssup . nMessageID < MSG_POOL_MIN | | psssup . nMessageID > MSG_POOL_MAX ) {
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- psssup.nMessageID is out of bounds: %d \n " , psssup . nMessageID ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-06-18 13:33:30 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- psssup.nSessionID %d psssup.nState: %d psssup.nStatusUpdate: %d psssup.nMessageID %d (%s) \n " ,
psssup . nSessionID , psssup . nState , psssup . nStatusUpdate , psssup . nMessageID , CPrivateSend : : GetMessageByID ( psssup . nMessageID ) ) ;
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:30 +02:00
if ( ! CheckPoolStateUpdate ( psssup ) ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSSTATUSUPDATE -- CheckPoolStateUpdate failed \n " ) ;
2017-05-05 13:26:27 +02:00
}
2018-11-05 10:29:07 +01:00
} else if ( strCommand = = NetMsgType : : DSFINALTX ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2017-05-07 09:59:42 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSFINALTX -- peer=%d using obsolete version %i \n " , pfrom - > GetId ( ) , pfrom - > nVersion ) ;
2020-04-19 13:04:31 +02:00
if ( g_enable_bip61 ) {
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand ,
REJECT_OBSOLETE , strprintf (
" Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
}
2017-05-05 13:26:27 +02:00
return ;
}
2018-12-17 15:45:36 +01:00
if ( ! mixingMasternode ) return ;
if ( mixingMasternode - > pdmnState - > addr ! = pfrom - > addr ) {
2017-05-05 13:26:27 +02:00
return ;
}
int nMsgSessionID ;
2016-12-05 08:01:20 +01:00
vRecv > > nMsgSessionID ;
CTransaction txNew ( deserialize , vRecv ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( nSessionID ! = nMsgSessionID ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSFINALTX -- message doesn't match current PrivateSend session: nSessionID: %d nMsgSessionID: %d \n " , nSessionID , nMsgSessionID ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSFINALTX -- txNew %s " , txNew . ToString ( ) ) ;
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:05 +02:00
// check to see if input is spent already? (and probably not confirmed)
2017-09-19 16:51:38 +02:00
SignFinalTransaction ( txNew , pfrom , connman ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
} else if ( strCommand = = NetMsgType : : DSCOMPLETE ) {
if ( pfrom - > nVersion < MIN_PRIVATESEND_PEER_PROTO_VERSION ) {
2017-05-07 09:59:42 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSCOMPLETE -- peer=%d using obsolete version %i \n " , pfrom - > GetId ( ) , pfrom - > nVersion ) ;
2020-04-19 13:04:31 +02:00
if ( g_enable_bip61 ) {
connman . PushMessage ( pfrom , CNetMsgMaker ( pfrom - > GetSendVersion ( ) ) . Make ( NetMsgType : : REJECT , strCommand ,
REJECT_OBSOLETE , strprintf (
" Version must be %d or greater " , MIN_PRIVATESEND_PEER_PROTO_VERSION ) ) ) ;
}
2017-05-05 13:26:27 +02:00
return ;
}
2018-12-17 15:45:36 +01:00
if ( ! mixingMasternode ) return ;
if ( mixingMasternode - > pdmnState - > addr ! = pfrom - > addr ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSCOMPLETE -- message doesn't match current Masternode: infoMixingMasternode=%s addr=%s \n " , mixingMasternode - > pdmnState - > addr . ToString ( ) , pfrom - > addr . ToString ( ) ) ;
2017-05-05 13:26:27 +02:00
return ;
}
int nMsgSessionID ;
2019-06-18 13:33:30 +02:00
PoolMessage nMsgMessageID ;
2017-05-05 13:26:27 +02:00
vRecv > > nMsgSessionID > > nMsgMessageID ;
2018-11-05 10:29:07 +01:00
if ( nMsgMessageID < MSG_POOL_MIN | | nMsgMessageID > MSG_POOL_MAX ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSCOMPLETE -- nMsgMessageID is out of bounds: %d \n " , nMsgMessageID ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2018-11-05 10:29:07 +01:00
if ( nSessionID ! = nMsgSessionID ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSCOMPLETE -- message doesn't match current PrivateSend session: nSessionID: %d nMsgSessionID: %d \n " , nSessionID , nMsgSessionID ) ;
2017-05-05 13:26:27 +02:00
return ;
}
2019-06-18 13:33:30 +02:00
LogPrint ( BCLog : : PRIVATESEND , " DSCOMPLETE -- nMsgSessionID %d nMsgMessageID %d (%s) \n " , nMsgSessionID , nMsgMessageID , CPrivateSend : : GetMessageByID ( nMsgMessageID ) ) ;
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:30 +02:00
CompletedTransaction ( nMsgMessageID ) ;
2017-05-05 13:26:27 +02:00
}
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientSession : : ResetPool ( )
2017-05-05 13:26:27 +02:00
{
txMyCollateral = CMutableTransaction ( ) ;
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientManager : : ResetPool ( )
{
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
2018-09-04 12:54:59 +02:00
nCachedLastSuccessBlock = 0 ;
vecMasternodesUsed . clear ( ) ;
2018-09-20 14:40:43 +02:00
for ( auto & session : deqSessions ) {
2018-09-04 12:54:59 +02:00
session . ResetPool ( ) ;
}
2018-09-20 14:40:43 +02:00
deqSessions . clear ( ) ;
2018-09-04 12:54:59 +02:00
}
void CPrivateSendClientSession : : SetNull ( )
2017-05-05 13:26:27 +02:00
{
// Client side
2018-12-17 15:45:36 +01:00
mixingMasternode = nullptr ;
2018-02-01 02:10:52 +01:00
pendingDsaRequest = CPendingDsaRequest ( ) ;
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
CPrivateSendBaseSession : : SetNull ( ) ;
2017-05-05 13:26:27 +02:00
}
//
// Unlock coins after mixing fails or succeeds
//
2018-09-04 12:54:59 +02:00
void CPrivateSendClientSession : : UnlockCoins ( )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend ) return ;
2018-07-28 15:50:41 +02:00
2018-11-05 10:29:07 +01:00
while ( true ) {
2020-04-17 03:17:25 +02:00
TRY_LOCK ( GetWallets ( ) [ 0 ] - > cs_wallet , lockWallet ) ;
2018-11-05 10:29:07 +01:00
if ( ! lockWallet ) {
MilliSleep ( 50 ) ;
continue ;
}
2018-02-06 12:09:33 +01:00
for ( const auto & outpoint : vecOutPointLocked )
2020-04-17 03:17:25 +02:00
GetWallets ( ) [ 0 ] - > UnlockCoin ( outpoint ) ;
2017-05-05 13:26:27 +02:00
break ;
}
vecOutPointLocked . clear ( ) ;
}
2018-09-04 12:54:59 +02:00
std : : string CPrivateSendClientSession : : GetStatus ( bool fWaitForBlock )
2017-05-05 13:26:27 +02:00
{
static int nStatusMessageProgress = 0 ;
nStatusMessageProgress + = 10 ;
std : : string strSuffix = " " ;
2019-06-18 13:33:05 +02:00
if ( fWaitForBlock | | ! masternodeSync . IsBlockchainSynced ( ) ) {
2017-05-05 13:26:27 +02:00
return strAutoDenomResult ;
2019-06-18 13:33:05 +02:00
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
switch ( nState ) {
case POOL_STATE_IDLE :
return _ ( " PrivateSend is idle. " ) ;
case POOL_STATE_QUEUE :
if ( nStatusMessageProgress % 70 < = 30 )
strSuffix = " . " ;
else if ( nStatusMessageProgress % 70 < = 50 )
strSuffix = " .. " ;
else if ( nStatusMessageProgress % 70 < = 70 )
strSuffix = " ... " ;
return strprintf ( _ ( " Submitted to masternode, waiting in queue %s " ) , strSuffix ) ;
case POOL_STATE_ACCEPTING_ENTRIES :
2019-06-18 13:33:30 +02:00
return strAutoDenomResult ;
2018-11-05 10:29:07 +01:00
case POOL_STATE_SIGNING :
if ( nStatusMessageProgress % 70 < = 40 )
return _ ( " Found enough users, signing ... " ) ;
else if ( nStatusMessageProgress % 70 < = 50 )
strSuffix = " . " ;
else if ( nStatusMessageProgress % 70 < = 60 )
strSuffix = " .. " ;
else if ( nStatusMessageProgress % 70 < = 70 )
strSuffix = " ... " ;
return strprintf ( _ ( " Found enough users, signing ( waiting %s ) " ), strSuffix) ;
case POOL_STATE_ERROR :
return _ ( " PrivateSend request incomplete: " ) + " " + strLastMessage + " " + _ ( " Will retry... " ) ;
case POOL_STATE_SUCCESS :
return _ ( " PrivateSend request complete: " ) + " " + strLastMessage ;
default :
return strprintf ( _ ( " Unknown state: id = %u " ) , nState ) ;
2017-05-05 13:26:27 +02:00
}
}
2018-09-04 12:54:59 +02:00
std : : string CPrivateSendClientManager : : GetStatuses ( )
{
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
2018-09-04 12:54:59 +02:00
std : : string strStatus ;
bool fWaitForBlock = WaitForAnotherBlock ( ) ;
2018-09-20 14:40:43 +02:00
for ( auto & session : deqSessions ) {
2018-09-04 12:54:59 +02:00
strStatus + = session . GetStatus ( fWaitForBlock ) + " ; " ;
}
return strStatus ;
}
std : : string CPrivateSendClientManager : : GetSessionDenoms ( )
{
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
2018-09-04 12:54:59 +02:00
std : : string strSessionDenoms ;
2018-09-20 14:40:43 +02:00
for ( auto & session : deqSessions ) {
2020-03-12 11:31:55 +01:00
strSessionDenoms + = CPrivateSend : : DenominationToString ( session . nSessionDenom ) + " ; " ;
2018-09-04 12:54:59 +02:00
}
return strSessionDenoms . empty ( ) ? " N/A " : strSessionDenoms ;
}
2018-12-17 15:45:36 +01:00
bool CPrivateSendClientSession : : GetMixingMasternodeInfo ( CDeterministicMNCPtr & ret ) const
2017-12-04 07:06:07 +01:00
{
2018-12-17 15:45:36 +01:00
ret = mixingMasternode ;
return ret ! = nullptr ;
2017-12-04 07:06:07 +01:00
}
2018-12-17 15:45:36 +01:00
bool CPrivateSendClientManager : : GetMixingMasternodesInfo ( std : : vector < CDeterministicMNCPtr > & vecDmnsRet ) const
2017-12-04 07:06:07 +01:00
{
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
for ( const auto & session : deqSessions ) {
2018-12-17 15:45:36 +01:00
CDeterministicMNCPtr dmn ;
if ( session . GetMixingMasternodeInfo ( dmn ) ) {
vecDmnsRet . push_back ( dmn ) ;
2018-09-04 12:54:59 +02:00
}
}
2018-12-17 15:45:36 +01:00
return ! vecDmnsRet . empty ( ) ;
2017-12-04 07:06:07 +01:00
}
2017-05-05 13:26:27 +02:00
//
// Check the mixing progress and send client updates if a Masternode
//
2018-09-04 12:54:59 +02:00
void CPrivateSendClientSession : : CheckPool ( )
2017-05-05 13:26:27 +02:00
{
// reset if we're here for 10 seconds
2018-11-05 10:29:07 +01:00
if ( ( nState = = POOL_STATE_ERROR | | nState = = POOL_STATE_SUCCESS ) & & GetTime ( ) - nTimeLastSuccessfulStep > = 10 ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckPool -- timeout, RESETTING \n " ) ;
2017-05-05 13:26:27 +02:00
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
if ( nState = = POOL_STATE_ERROR ) {
keyHolderStorage . ReturnAll ( ) ;
} else {
keyHolderStorage . KeepAll ( ) ;
}
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
}
}
//
2018-09-04 12:54:59 +02:00
// Check session timeouts
2017-05-05 13:26:27 +02:00
//
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : CheckTimeout ( )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return false ;
2017-05-05 13:26:27 +02:00
// catching hanging sessions
2018-11-05 10:29:07 +01:00
switch ( nState ) {
case POOL_STATE_ERROR :
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckTimeout -- Pool error -- Running CheckPool \n " ) ;
2018-11-05 10:29:07 +01:00
CheckPool ( ) ;
break ;
case POOL_STATE_SUCCESS :
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckTimeout -- Pool success -- Running CheckPool \n " ) ;
2018-11-05 10:29:07 +01:00
CheckPool ( ) ;
break ;
default :
break ;
2017-05-05 13:26:27 +02:00
}
2018-02-12 13:47:53 +01:00
int nLagTime = 10 ; // give the server a few extra seconds before resetting.
2017-05-05 13:26:27 +02:00
int nTimeout = ( nState = = POOL_STATE_SIGNING ) ? PRIVATESEND_SIGNING_TIMEOUT : PRIVATESEND_QUEUE_TIMEOUT ;
2018-02-12 13:47:53 +01:00
bool fTimeout = GetTime ( ) - nTimeLastSuccessfulStep > = nTimeout + nLagTime ;
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:05 +02:00
if ( nState = = POOL_STATE_IDLE | | ! fTimeout ) return false ;
2018-09-04 12:54:59 +02:00
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckTimeout -- %s timed out (%ds) -- resetting \n " ,
2018-11-05 10:29:07 +01:00
( nState = = POOL_STATE_SIGNING ) ? " Signing " : " Session " , nTimeout ) ;
2018-09-04 12:54:59 +02:00
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
SetState ( POOL_STATE_ERROR ) ;
return true ;
}
//
// Check all queues and sessions for timeouts
//
void CPrivateSendClientManager : : CheckTimeout ( )
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ;
2018-09-04 12:54:59 +02:00
CheckQueue ( ) ;
2019-06-27 22:24:43 +02:00
if ( ! fEnablePrivateSend | | ! fPrivateSendRunning ) return ;
2018-11-25 14:35:52 +01:00
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
for ( auto & session : deqSessions ) {
2018-09-04 12:54:59 +02:00
if ( session . CheckTimeout ( ) ) {
strAutoDenomResult = _ ( " Session timed out. " ) ;
}
2017-05-05 13:26:27 +02:00
}
}
//
// Execute a mixing denomination via a Masternode.
// This is only ran from clients
//
2018-11-05 10:29:07 +01:00
bool CPrivateSendClientSession : : SendDenominate ( const std : : vector < std : : pair < CTxDSIn , CTxOut > > & vecPSInOutPairsIn , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SendDenominate -- PrivateSend from a Masternode is not supported currently. \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-11-05 10:29:07 +01:00
if ( txMyCollateral = = CMutableTransaction ( ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClient:SendDenominate -- PrivateSend collateral not set \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// we should already be connected to a Masternode
2018-11-05 10:29:07 +01:00
if ( ! nSessionID ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SendDenominate -- No Masternode has been selected yet. \n " ) ;
2017-05-05 13:26:27 +02:00
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
return false ;
}
2018-11-05 10:29:07 +01:00
if ( ! CheckDiskSpace ( ) ) {
2017-05-05 13:26:27 +02:00
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SendDenominate -- Not enough disk space. \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
SetState ( POOL_STATE_ACCEPTING_ENTRIES ) ;
strLastMessage = " " ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SendDenominate -- Added transaction to pool. \n " ) ;
2017-05-05 13:26:27 +02:00
2018-09-15 12:18:32 +02:00
CMutableTransaction tx ; // for debug purposes only
std : : vector < CTxDSIn > vecTxDSInTmp ;
std : : vector < CTxOut > vecTxOutTmp ;
2017-05-05 13:26:27 +02:00
2018-09-15 12:18:32 +02:00
for ( const auto & pair : vecPSInOutPairsIn ) {
vecTxDSInTmp . emplace_back ( pair . first ) ;
vecTxOutTmp . emplace_back ( pair . second ) ;
tx . vin . emplace_back ( pair . first ) ;
tx . vout . emplace_back ( pair . second ) ;
2017-05-05 13:26:27 +02:00
}
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SendDenominate -- Submitting partial tx %s " , tx . ToString ( ) ) ;
2018-09-15 12:18:32 +02:00
2017-05-05 13:26:27 +02:00
// store our entry for later use
2018-09-15 12:18:32 +02:00
vecEntries . emplace_back ( vecTxDSInTmp , vecTxOutTmp , txMyCollateral ) ;
RelayIn ( vecEntries . back ( ) , connman ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
// Incoming message from Masternode updating the progress of mixing
2019-06-18 13:33:30 +02:00
bool CPrivateSendClientSession : : CheckPoolStateUpdate ( CPrivateSendStatusUpdate psssup )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return false ;
2017-05-05 13:26:27 +02:00
// do not update state when mixing client state is one of these
2018-11-05 10:29:07 +01:00
if ( nState = = POOL_STATE_IDLE | | nState = = POOL_STATE_ERROR | | nState = = POOL_STATE_SUCCESS ) return false ;
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:30 +02:00
strAutoDenomResult = _ ( " Masternode: " ) + " " + CPrivateSend : : GetMessageByID ( psssup . nMessageID ) ;
2017-05-05 13:26:27 +02:00
// if rejected at any state
2019-06-18 13:33:30 +02:00
if ( psssup . nStatusUpdate = = STATUS_REJECTED ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckPoolStateUpdate -- entry is rejected by Masternode \n " ) ;
2017-05-05 13:26:27 +02:00
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
SetState ( POOL_STATE_ERROR ) ;
2019-06-18 13:33:30 +02:00
strLastMessage = CPrivateSend : : GetMessageByID ( psssup . nMessageID ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
2019-06-18 13:33:30 +02:00
if ( psssup . nStatusUpdate = = STATUS_ACCEPTED & & nState = = psssup . nState ) {
if ( psssup . nState = = POOL_STATE_QUEUE & & nSessionID = = 0 & & psssup . nSessionID ! = 0 ) {
2017-05-05 13:26:27 +02:00
// new session id should be set only in POOL_STATE_QUEUE state
2019-06-18 13:33:30 +02:00
nSessionID = psssup . nSessionID ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CheckPoolStateUpdate -- set nSessionID to %d \n " , nSessionID ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
}
// only situations above are allowed, fail in any other case
return false ;
}
//
// After we receive the finalized transaction from the Masternode, we must
// check it to make sure it's what we want, then sign it if we agree.
// If we refuse to sign, it's possible we'll be charged collateral
//
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : SignFinalTransaction ( const CTransaction & finalTransactionNew , CNode * pnode , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode | | pnode = = nullptr ) return false ;
2018-12-17 15:45:36 +01:00
if ( ! mixingMasternode ) return false ;
2017-05-05 13:26:27 +02:00
finalMutableTransaction = finalTransactionNew ;
2020-01-01 15:12:25 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- finalMutableTransaction=%s " , __func__ , finalMutableTransaction . ToString ( ) ) ;
// STEP 1: check final transaction general rules
2017-05-05 13:26:27 +02:00
2017-09-22 03:53:15 +02:00
// Make sure it's BIP69 compliant
sort ( finalMutableTransaction . vin . begin ( ) , finalMutableTransaction . vin . end ( ) , CompareInputBIP69 ( ) ) ;
sort ( finalMutableTransaction . vout . begin ( ) , finalMutableTransaction . vout . end ( ) , CompareOutputBIP69 ( ) ) ;
2018-11-05 10:29:07 +01:00
if ( finalMutableTransaction . GetHash ( ) ! = finalTransactionNew . GetHash ( ) ) {
2020-01-01 15:12:25 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- ERROR! Masternode %s is not BIP69 compliant! \n " , __func__ , mixingMasternode - > proTxHash . ToString ( ) ) ;
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
return false ;
}
// Make sure all inputs/outputs are valid
PoolMessage nMessageID { MSG_NOERR } ;
if ( ! IsValidInOuts ( finalMutableTransaction . vin , finalMutableTransaction . vout , nMessageID , nullptr ) ) {
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- ERROR! IsValidInOuts() failed: %s \n " , __func__ , CPrivateSend : : GetMessageByID ( nMessageID ) ) ;
2017-09-22 03:53:15 +02:00
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
return false ;
}
2020-01-01 15:12:25 +01:00
// STEP 2: make sure our own inputs/outputs are present, otherwise refuse to sign
2017-05-05 13:26:27 +02:00
std : : vector < CTxIn > sigs ;
2018-02-06 12:09:33 +01:00
for ( const auto & entry : vecEntries ) {
2020-01-01 15:12:25 +01:00
// Check that the final transaction has all our outputs
for ( const auto & txout : entry . vecTxOut ) {
bool fFound = false ;
for ( const auto & txoutFinal : finalMutableTransaction . vout ) {
if ( txoutFinal = = txout ) {
fFound = true ;
break ;
}
}
if ( ! fFound ) {
// Something went wrong and we'll refuse to sign. It's possible we'll be charged collateral. But that's
// better than signing if the transaction doesn't look like what we wanted.
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- an output is missing, refusing to sign! txout=%s \n " , txout . ToString ( ) ) ;
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
return false ;
}
}
2018-02-06 12:09:33 +01:00
for ( const auto & txdsin : entry . vecTxDSIn ) {
2017-05-05 13:26:27 +02:00
/* Sign my transaction and all outputs */
int nMyInputIndex = - 1 ;
CScript prevPubKey = CScript ( ) ;
2018-11-05 10:29:07 +01:00
for ( unsigned int i = 0 ; i < finalMutableTransaction . vin . size ( ) ; i + + ) {
if ( finalMutableTransaction . vin [ i ] = = txdsin ) {
2017-05-05 13:26:27 +02:00
nMyInputIndex = i ;
prevPubKey = txdsin . prevPubKey ;
2020-01-01 15:12:25 +01:00
break ;
2017-05-05 13:26:27 +02:00
}
}
2020-01-01 15:12:25 +01:00
if ( nMyInputIndex = = - 1 ) {
// Can't find one of my own inputs, refuse to sign. It's possible we'll be charged collateral. But that's
// better than signing if the transaction doesn't look like what we wanted.
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- missing input! txdsin=%s \n " , __func__ , txdsin . ToString ( ) ) ;
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
const CKeyStore & keystore = * GetWallets ( ) [ 0 ] ;
2017-05-05 13:26:27 +02:00
2020-01-01 15:12:25 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- Signing my input %i \n " , __func__ , nMyInputIndex ) ;
// TODO we're using amount=0 here but we should use the correct amount. This works because Dash ignores the amount while signing/verifying (only used in Bitcoin/Segwit)
if ( ! SignSignature ( keystore , prevPubKey , finalMutableTransaction , nMyInputIndex , 0 , int ( SIGHASH_ALL | SIGHASH_ANYONECANPAY ) ) ) { // changes scriptSig
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- Unable to sign my own transaction! \n " , __func__ ) ;
// not sure what to do here, it will timeout...?
2017-05-05 13:26:27 +02:00
}
2020-01-01 15:12:25 +01:00
sigs . push_back ( finalMutableTransaction . vin [ nMyInputIndex ] ) ;
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- nMyInputIndex: %d, sigs.size(): %d, scriptSig=%s \n " ,
__func__ , nMyInputIndex , ( int ) sigs . size ( ) , ScriptToAsmStr ( finalMutableTransaction . vin [ nMyInputIndex ] . scriptSig ) ) ;
2017-05-05 13:26:27 +02:00
}
}
2018-11-05 10:29:07 +01:00
if ( sigs . empty ( ) ) {
2020-01-01 15:12:25 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- can't sign anything! \n " , __func__ ) ;
2017-05-05 13:26:27 +02:00
UnlockCoins ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
SetNull ( ) ;
return false ;
}
// push all of our signatures to the Masternode
2020-01-01 15:12:25 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- pushing sigs to the masternode, finalMutableTransaction=%s " , __func__ , finalMutableTransaction . ToString ( ) ) ;
2016-11-25 20:01:56 +01:00
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSSIGNFINALTX , sigs ) ) ;
2017-05-05 13:26:27 +02:00
SetState ( POOL_STATE_SIGNING ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
// mixing transaction was completed (failed or successful)
2018-09-04 12:54:59 +02:00
void CPrivateSendClientSession : : CompletedTransaction ( PoolMessage nMessageID )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( nMessageID = = MSG_SUCCESS ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CompletedTransaction -- success \n " ) ;
2018-09-04 12:54:59 +02:00
privateSendClient . UpdatedSuccessBlock ( ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . KeepAll ( ) ;
2017-05-05 13:26:27 +02:00
} else {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CompletedTransaction -- error \n " ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
}
UnlockCoins ( ) ;
SetNull ( ) ;
2017-06-30 20:30:16 +02:00
strLastMessage = CPrivateSend : : GetMessageByID ( nMessageID ) ;
2017-05-05 13:26:27 +02:00
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientManager : : UpdatedSuccessBlock ( )
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ;
2018-09-04 12:54:59 +02:00
nCachedLastSuccessBlock = nCachedBlockHeight ;
}
bool CPrivateSendClientManager : : IsDenomSkipped ( const CAmount & nDenomValue )
2018-04-20 12:53:23 +02:00
{
return std : : find ( vecDenominationsSkipped . begin ( ) , vecDenominationsSkipped . end ( ) , nDenomValue ) ! = vecDenominationsSkipped . end ( ) ;
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientManager : : AddSkippedDenom ( const CAmount & nDenomValue )
{
vecDenominationsSkipped . push_back ( nDenomValue ) ;
}
2019-06-26 13:39:36 +02:00
void CPrivateSendClientManager : : RemoveSkippedDenom ( const CAmount & nDenomValue )
{
vecDenominationsSkipped . erase ( std : : remove ( vecDenominationsSkipped . begin ( ) , vecDenominationsSkipped . end ( ) , nDenomValue ) , vecDenominationsSkipped . end ( ) ) ;
}
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientManager : : WaitForAnotherBlock ( )
2017-09-03 15:30:58 +02:00
{
2019-06-18 13:33:05 +02:00
if ( ! masternodeSync . IsBlockchainSynced ( ) ) return true ;
2017-09-03 15:30:58 +02:00
2019-06-18 13:33:05 +02:00
if ( fPrivateSendMultiSession ) return false ;
2017-09-03 15:30:58 +02:00
return nCachedBlockHeight - nCachedLastSuccessBlock < nMinBlocksToWait ;
}
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientManager : : CheckAutomaticBackup ( )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! fEnablePrivateSend | | ! fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2018-11-05 10:29:07 +01:00
switch ( nWalletBackups ) {
case 0 :
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- Automatic backups disabled, no mixing available. \n " ) ;
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " Automatic backups disabled " ) + " , " + _ ( " no mixing available. " ) ;
2019-06-27 22:24:43 +02:00
fPrivateSendRunning = false ; // stop mixing
2020-04-17 03:17:25 +02:00
GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup = 0 ; // no backup, no "keys since last backup"
2018-11-05 10:29:07 +01:00
return false ;
case - 1 :
// Automatic backup failed, nothing else we can do until user fixes the issue manually.
// There is no way to bring user attention in daemon mode so we just update status and
// keep spamming if debug is on.
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- ERROR! Failed to create automatic backup. \n " ) ;
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " ERROR! Failed to create automatic backup " ) + " , " + _ ( " see debug.log for details. " ) ;
return false ;
case - 2 :
// We were able to create automatic backup but keypool was not replenished because wallet is locked.
// There is no way to bring user attention in daemon mode so we just update status and
// keep spamming if debug is on.
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- WARNING! Failed to create replenish keypool, please unlock your wallet to do so. \n " ) ;
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " WARNING! Failed to replenish keypool, please unlock your wallet to do so. " ) + " , " + _ ( " see debug.log for details. " ) ;
return false ;
2017-05-05 13:26:27 +02:00
}
2020-04-17 03:17:25 +02:00
if ( GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup < PRIVATESEND_KEYS_THRESHOLD_STOP ) {
2020-01-08 08:02:49 +01:00
// We should never get here via mixing itself but probably something else is still actively using keypool
2020-04-17 03:17:25 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- Very low number of keys left: %d, no mixing available. \n " , GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup ) ;
strAutoDenomResult = strprintf ( _ ( " Very low number of keys left: %d " ) + " , " + _ ( " no mixing available. " ) , GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup ) ;
2017-05-05 13:26:27 +02:00
// It's getting really dangerous, stop mixing
2019-06-27 22:24:43 +02:00
fPrivateSendRunning = false ;
2017-05-05 13:26:27 +02:00
return false ;
2020-04-17 03:17:25 +02:00
} else if ( GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup < PRIVATESEND_KEYS_THRESHOLD_WARNING ) {
2017-05-05 13:26:27 +02:00
// Low number of keys left but it's still more or less safe to continue
2020-04-17 03:17:25 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- Very low number of keys left: %d \n " , GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup ) ;
strAutoDenomResult = strprintf ( _ ( " Very low number of keys left: %d " ) , GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( fCreateAutoBackups ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- Trying to create new backup. \n " ) ;
2017-05-05 13:26:27 +02:00
std : : string warningString ;
std : : string errorString ;
2020-04-23 11:47:38 +02:00
if ( ! GetWallets ( ) [ 0 ] - > AutoBackupWallet ( " " , warningString , errorString ) ) {
2018-11-05 10:29:07 +01:00
if ( ! warningString . empty ( ) ) {
2017-05-05 13:26:27 +02:00
// There were some issues saving backup but yet more or less safe to continue
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- WARNING! Something went wrong on automatic backup: %s \n " , warningString ) ;
2017-05-05 13:26:27 +02:00
}
2018-11-05 10:29:07 +01:00
if ( ! errorString . empty ( ) ) {
2017-05-05 13:26:27 +02:00
// Things are really broken
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- ERROR! Failed to create automatic backup: %s \n " , errorString ) ;
2017-05-05 13:26:27 +02:00
strAutoDenomResult = strprintf ( _ ( " ERROR! Failed to create automatic backup " ) + " : %s " , errorString ) ;
return false ;
}
}
} else {
2020-01-08 08:02:49 +01:00
// Wait for something else (e.g. GUI action) to create automatic backup for us
2017-05-05 13:26:27 +02:00
return false ;
}
}
2020-04-17 03:17:25 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::CheckAutomaticBackup -- Keys left since latest backup: %d \n " , GetWallets ( ) [ 0 ] - > nKeysLeftSinceAutoBackup ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
//
2019-11-21 21:49:35 +01:00
// Passively run mixing in the background to mix funds based on the given configuration.
2017-05-05 13:26:27 +02:00
//
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : DoAutomaticDenominating ( CConnman & connman , bool fDryRun )
2017-05-05 13:26:27 +02:00
{
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return false ; // no client-side mixing on masternodes
if ( nState ! = POOL_STATE_IDLE ) return false ;
2017-05-05 13:26:27 +02:00
2019-01-03 10:17:43 +01:00
if ( ! masternodeSync . IsBlockchainSynced ( ) ) {
2017-05-05 13:26:27 +02:00
strAutoDenomResult = _ ( " Can't mix while sync in progress. " ) ;
return false ;
}
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:51:45 +02:00
2018-09-04 12:54:59 +02:00
CAmount nBalanceNeedsAnonymized ;
{
2020-04-17 03:17:25 +02:00
LOCK2 ( cs_main , GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
if ( ! fDryRun & & GetWallets ( ) [ 0 ] - > IsLocked ( true ) ) {
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " Wallet is locked. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( GetEntriesCount ( ) > 0 ) {
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
TRY_LOCK ( cs_privatesend , lockDS ) ;
if ( ! lockDS ) {
strAutoDenomResult = _ ( " Lock is already in place. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
if ( deterministicMNManager - > GetListAtChainTip ( ) . GetValidMNsCount ( ) = = 0 ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- No Masternodes detected \n " ) ;
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " No Masternodes detected. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
// check if there is anything left to do
2020-04-17 03:17:25 +02:00
CAmount nBalanceAnonymized = GetWallets ( ) [ 0 ] - > GetAnonymizedBalance ( ) ;
2019-04-30 15:19:23 +02:00
nBalanceNeedsAnonymized = privateSendClient . nPrivateSendAmount * COIN - nBalanceAnonymized ;
if ( nBalanceNeedsAnonymized < 0 ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- Nothing to do \n " ) ;
2019-04-30 15:19:23 +02:00
// nothing to do, just keep it in idle mode
return false ;
}
CAmount nValueMin = CPrivateSend : : GetSmallestDenomination ( ) ;
2018-11-05 10:29:07 +01:00
// if there are no confirmed DS collateral inputs yet
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > HasCollateralInputs ( ) ) {
2018-11-05 10:29:07 +01:00
// should have some additional amount for them
nValueMin + = CPrivateSend : : GetMaxCollateralAmount ( ) ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
// including denoms but applying some restrictions
2020-04-17 03:17:25 +02:00
CAmount nBalanceAnonymizable = GetWallets ( ) [ 0 ] - > GetAnonymizableBalance ( ) ;
2017-05-05 13:26:27 +02:00
2019-11-21 21:49:35 +01:00
// mixable balance is way too small
2019-04-30 15:19:23 +02:00
if ( nBalanceAnonymizable < nValueMin ) {
2019-11-21 21:49:35 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- Not enough funds to mix \n " ) ;
strAutoDenomResult = _ ( " Not enough funds to mix. " ) ;
2018-11-05 10:29:07 +01:00
return false ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
// excluding denoms
2020-04-17 03:17:25 +02:00
CAmount nBalanceAnonimizableNonDenom = GetWallets ( ) [ 0 ] - > GetAnonymizableBalance ( true ) ;
2018-11-05 10:29:07 +01:00
// denoms
2020-04-17 03:17:25 +02:00
CAmount nBalanceDenominatedConf = GetWallets ( ) [ 0 ] - > GetDenominatedBalance ( ) ;
CAmount nBalanceDenominatedUnconf = GetWallets ( ) [ 0 ] - > GetDenominatedBalance ( true ) ;
2018-11-05 10:29:07 +01:00
CAmount nBalanceDenominated = nBalanceDenominatedConf + nBalanceDenominatedUnconf ;
2019-04-30 15:19:23 +02:00
CAmount nBalanceToDenominate = privateSendClient . nPrivateSendAmount * COIN - nBalanceDenominated ;
// adjust nBalanceNeedsAnonymized to consume final denom
if ( nBalanceDenominated - nBalanceAnonymized > nBalanceNeedsAnonymized ) {
auto denoms = CPrivateSend : : GetStandardDenominations ( ) ;
CAmount nAdditionalDenom { 0 } ;
for ( const auto & denom : denoms ) {
if ( nBalanceNeedsAnonymized < denom ) {
nAdditionalDenom = denom ;
} else {
break ;
}
}
nBalanceNeedsAnonymized + = nAdditionalDenom ;
}
2018-11-05 10:29:07 +01:00
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- current stats: \n "
2019-04-30 14:48:21 +02:00
" nValueMin: %s \n "
2019-04-30 15:19:23 +02:00
" nBalanceAnonymizable: %s \n "
" nBalanceAnonymized: %s \n "
2019-04-30 14:48:21 +02:00
" nBalanceNeedsAnonymized: %s \n "
" nBalanceAnonimizableNonDenom: %s \n "
" nBalanceDenominatedConf: %s \n "
" nBalanceDenominatedUnconf: %s \n "
2019-05-02 01:20:36 +02:00
" nBalanceDenominated: %s \n "
2019-04-30 15:19:23 +02:00
" nBalanceToDenominate: %s \n " ,
2019-04-30 14:48:21 +02:00
FormatMoney ( nValueMin ) ,
2019-04-30 15:19:23 +02:00
FormatMoney ( nBalanceAnonymizable ) ,
FormatMoney ( nBalanceAnonymized ) ,
2019-04-30 14:48:21 +02:00
FormatMoney ( nBalanceNeedsAnonymized ) ,
FormatMoney ( nBalanceAnonimizableNonDenom ) ,
FormatMoney ( nBalanceDenominatedConf ) ,
FormatMoney ( nBalanceDenominatedUnconf ) ,
2019-04-30 15:19:23 +02:00
FormatMoney ( nBalanceDenominated ) ,
FormatMoney ( nBalanceToDenominate )
2019-04-30 14:48:21 +02:00
) ;
2018-11-05 10:29:07 +01:00
if ( fDryRun ) return true ;
// Check if we have should create more denominated inputs i.e.
// there are funds to denominate and denominated balance does not exceed
// max amount to mix yet.
2019-04-30 15:19:23 +02:00
if ( nBalanceAnonimizableNonDenom > = nValueMin + CPrivateSend : : GetCollateralAmount ( ) & & nBalanceToDenominate > 0 ) {
CreateDenominated ( nBalanceToDenominate , connman ) ;
}
2018-11-05 10:29:07 +01:00
//check if we have the collateral sized inputs
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > HasCollateralInputs ( ) ) {
return ! GetWallets ( ) [ 0 ] - > HasCollateralInputs ( false ) & & MakeCollateralAmounts ( connman ) ;
2019-06-18 13:33:05 +02:00
}
2018-11-05 10:29:07 +01:00
if ( nSessionID ) {
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
// Initial phase, find a Masternode
// Clean if there is anything left from previous session
UnlockCoins ( ) ;
keyHolderStorage . ReturnAll ( ) ;
SetNull ( ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
// should be no unconfirmed denoms in non-multi-session mode
if ( ! privateSendClient . fPrivateSendMultiSession & & nBalanceDenominatedUnconf > 0 ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- Found unconfirmed denominated outputs, will wait till they confirm to continue. \n " ) ;
2018-11-05 10:29:07 +01:00
strAutoDenomResult = _ ( " Found unconfirmed denominated outputs, will wait till they confirm to continue. " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-11-05 10:29:07 +01:00
//check our collateral and create new if needed
std : : string strReason ;
if ( txMyCollateral = = CMutableTransaction ( ) ) {
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > CreateCollateralTransaction ( txMyCollateral , strReason ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- create collateral error:%s \n " , strReason ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-11-05 10:29:07 +01:00
} else {
if ( ! CPrivateSend : : IsCollateralValid ( txMyCollateral ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- invalid collateral, recreating... \n " ) ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > CreateCollateralTransaction ( txMyCollateral , strReason ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::DoAutomaticDenominating -- create collateral error: %s \n " , strReason ) ;
2018-11-05 10:29:07 +01:00
return false ;
}
}
2017-05-05 13:26:27 +02:00
}
2019-11-13 21:03:52 +01:00
// lock the funds we're going to use for our collateral
for ( const auto & txin : txMyCollateral . vin ) {
2020-04-17 03:17:25 +02:00
GetWallets ( ) [ 0 ] - > LockCoin ( txin . prevout ) ;
2019-11-13 21:03:52 +01:00
vecOutPointLocked . push_back ( txin . prevout ) ;
}
2020-04-17 03:17:25 +02:00
} // LOCK2(cs_main, GetWallets()[0]->cs_wallet);
2018-09-04 12:54:59 +02:00
2019-09-17 14:07:56 +02:00
// Always attempt to join an existing queue
if ( JoinExistingQueue ( nBalanceNeedsAnonymized , connman ) ) {
2018-09-04 12:54:59 +02:00
return true ;
2019-06-18 13:33:05 +02:00
}
2018-09-04 12:54:59 +02:00
2019-09-17 14:07:56 +02:00
// If we were unable to find/join an existing queue then start a new one.
2019-06-18 13:33:05 +02:00
if ( StartNewQueue ( nBalanceNeedsAnonymized , connman ) ) return true ;
2018-09-04 12:54:59 +02:00
strAutoDenomResult = _ ( " No compatible Masternode found. " ) ;
return false ;
}
bool CPrivateSendClientManager : : DoAutomaticDenominating ( CConnman & connman , bool fDryRun )
{
if ( fMasternodeMode ) return false ; // no client-side mixing on masternodes
2019-06-27 22:24:43 +02:00
if ( ! fEnablePrivateSend | | ! fPrivateSendRunning ) return false ;
2018-09-04 12:54:59 +02:00
2019-01-03 10:17:43 +01:00
if ( ! masternodeSync . IsBlockchainSynced ( ) ) {
2018-09-04 12:54:59 +02:00
strAutoDenomResult = _ ( " Can't mix while sync in progress. " ) ;
return false ;
}
2020-04-17 03:17:25 +02:00
if ( ! fDryRun & & GetWallets ( ) [ 0 ] - > IsLocked ( true ) ) {
2018-09-04 12:54:59 +02:00
strAutoDenomResult = _ ( " Wallet is locked. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
int nMnCountEnabled = deterministicMNManager - > GetListAtChainTip ( ) . GetValidMNsCount ( ) ;
2017-05-05 13:26:27 +02:00
// If we've used 90% of the Masternode list then drop the oldest first ~30%
2018-11-27 08:03:41 +01:00
int nThreshold_high = nMnCountEnabled * 0.9 ;
2017-05-05 13:26:27 +02:00
int nThreshold_low = nThreshold_high * 0.7 ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " Checking vecMasternodesUsed: size: %d, threshold: %d \n " , ( int ) vecMasternodesUsed . size ( ) , nThreshold_high ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( ( int ) vecMasternodesUsed . size ( ) > nThreshold_high ) {
2017-05-05 13:26:27 +02:00
vecMasternodesUsed . erase ( vecMasternodesUsed . begin ( ) , vecMasternodesUsed . begin ( ) + vecMasternodesUsed . size ( ) - nThreshold_low ) ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " vecMasternodesUsed: new size: %d, threshold: %d \n " , ( int ) vecMasternodesUsed . size ( ) , nThreshold_high ) ;
2017-05-05 13:26:27 +02:00
}
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
2018-09-04 12:54:59 +02:00
bool fResult = true ;
2018-09-20 14:40:43 +02:00
if ( ( int ) deqSessions . size ( ) < nPrivateSendSessions ) {
deqSessions . emplace_back ( ) ;
2018-09-04 12:54:59 +02:00
}
2018-09-20 14:40:43 +02:00
for ( auto & session : deqSessions ) {
2019-06-18 13:33:05 +02:00
if ( ! CheckAutomaticBackup ( ) ) return false ;
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
if ( WaitForAnotherBlock ( ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::DoAutomaticDenominating -- Last successful PrivateSend action was too recent \n " ) ;
2018-09-04 12:54:59 +02:00
strAutoDenomResult = _ ( " Last successful PrivateSend action was too recent. " ) ;
return false ;
}
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
fResult & = session . DoAutomaticDenominating ( connman , fDryRun ) ;
}
2017-05-05 13:26:27 +02:00
2018-09-04 12:54:59 +02:00
return fResult ;
}
void CPrivateSendClientManager : : AddUsedMasternode ( const COutPoint & outpointMn )
{
vecMasternodesUsed . push_back ( outpointMn ) ;
}
2018-12-17 15:47:57 +01:00
CDeterministicMNCPtr CPrivateSendClientManager : : GetRandomNotUsedMasternode ( )
2018-09-04 12:54:59 +02:00
{
2018-12-17 15:47:57 +01:00
auto mnList = deterministicMNManager - > GetListAtChainTip ( ) ;
int nCountEnabled = mnList . GetValidMNsCount ( ) ;
int nCountNotExcluded = nCountEnabled - vecMasternodesUsed . size ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::%s -- %d enabled masternodes, %d masternodes to choose from \n " , __func__ , nCountEnabled , nCountNotExcluded ) ;
2018-12-17 15:47:57 +01:00
if ( nCountNotExcluded < 1 ) {
return nullptr ;
}
// fill a vector
std : : vector < CDeterministicMNCPtr > vpMasternodesShuffled ;
vpMasternodesShuffled . reserve ( ( size_t ) nCountEnabled ) ;
mnList . ForEachMN ( true , [ & ] ( const CDeterministicMNCPtr & dmn ) {
vpMasternodesShuffled . emplace_back ( dmn ) ;
} ) ;
FastRandomContext insecure_rand ;
// shuffle pointers
std : : random_shuffle ( vpMasternodesShuffled . begin ( ) , vpMasternodesShuffled . end ( ) , insecure_rand ) ;
std : : set < COutPoint > excludeSet ( vecMasternodesUsed . begin ( ) , vecMasternodesUsed . end ( ) ) ;
// loop through
for ( const auto & dmn : vpMasternodesShuffled ) {
if ( excludeSet . count ( dmn - > collateralOutpoint ) ) {
continue ;
}
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::%s -- found, masternode=%s \n " , __func__ , dmn - > collateralOutpoint . ToStringShort ( ) ) ;
2018-12-17 15:47:57 +01:00
return dmn ;
}
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::%s -- failed \n " , __func__ ) ;
2018-12-17 15:47:57 +01:00
return nullptr ;
2017-05-05 13:26:27 +02:00
}
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : JoinExistingQueue ( CAmount nBalanceNeedsAnonymized , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2018-12-17 15:45:36 +01:00
auto mnList = deterministicMNManager - > GetListAtChainTip ( ) ;
2017-05-05 13:26:27 +02:00
// Look through the queues and see if anything matches
2018-10-25 16:31:32 +02:00
CPrivateSendQueue dsq ;
2018-09-04 12:54:59 +02:00
while ( privateSendClient . GetQueueItemAndTry ( dsq ) ) {
2018-12-17 15:45:36 +01:00
auto dmn = mnList . GetValidMNByCollateral ( dsq . masternodeOutpoint ) ;
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
if ( ! dmn ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- dsq masternode is not in masternode list, masternode=%s \n " , dsq . masternodeOutpoint . ToStringShort ( ) ) ;
2017-05-05 13:26:27 +02:00
continue ;
}
2018-02-12 13:47:20 +01:00
// skip next mn payments winners
2018-12-17 15:45:36 +01:00
if ( mnpayments . IsScheduled ( dmn , 0 ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- skipping winner, masternode=%s \n " , dmn - > proTxHash . ToString ( ) ) ;
2018-02-12 13:47:20 +01:00
continue ;
}
2017-05-05 13:26:27 +02:00
// mixing rate limit i.e. nLastDsq check should already pass in DSQUEUE ProcessMessage
2018-10-25 16:31:32 +02:00
// in order for dsq to get into vecPrivateSendQueue, so we should be safe to mix already,
2017-05-05 13:26:27 +02:00
// no need for additional verification here
2020-03-12 11:31:55 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- trying queue: %s \n " , dsq . ToString ( ) ) ;
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
std : : vector < std : : pair < CTxDSIn , CTxOut > > vecPSInOutPairsTmp ;
2018-05-26 20:03:23 +02:00
// Try to match their denominations if possible, select exact number of denominations
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > SelectPSInOutPairsByDenominations ( dsq . nDenom , nBalanceNeedsAnonymized , vecPSInOutPairsTmp ) ) {
2020-03-12 11:31:55 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- Couldn't match denomination %d (%s) \n " , dsq . nDenom , CPrivateSend : : DenominationToString ( dsq . nDenom ) ) ;
2017-05-05 13:26:27 +02:00
continue ;
}
2018-09-04 12:54:59 +02:00
privateSendClient . AddUsedMasternode ( dsq . masternodeOutpoint ) ;
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
if ( connman . IsMasternodeOrDisconnectRequested ( dmn - > pdmnState - > addr ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- skipping masternode connection, addr=%s \n " , dmn - > pdmnState - > addr . ToString ( ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
continue ;
2018-01-09 10:17:54 +01:00
}
2017-05-05 13:26:27 +02:00
2018-02-01 02:10:52 +01:00
nSessionDenom = dsq . nDenom ;
2018-12-17 15:45:36 +01:00
mixingMasternode = dmn ;
pendingDsaRequest = CPendingDsaRequest ( dmn - > pdmnState - > addr , CPrivateSendAccept ( nSessionDenom , txMyCollateral ) ) ;
2020-03-19 14:21:02 +01:00
connman . AddPendingMasternode ( dmn - > proTxHash ) ;
2018-02-01 02:10:52 +01:00
// TODO: add new state POOL_STATE_CONNECTING and bump MIN_PRIVATESEND_PEER_PROTO_VERSION
SetState ( POOL_STATE_QUEUE ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::JoinExistingQueue -- pending connection (from queue): nSessionDenom: %d (%s), addr=%s \n " ,
2020-03-12 11:31:55 +01:00
nSessionDenom , CPrivateSend : : DenominationToString ( nSessionDenom ) , dmn - > pdmnState - > addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Trying to connect... " ) ;
2018-01-17 16:09:08 +01:00
return true ;
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Failed to find mixing queue to join " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2019-04-30 15:19:23 +02:00
bool CPrivateSendClientSession : : StartNewQueue ( CAmount nBalanceNeedsAnonymized , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2019-04-30 15:19:23 +02:00
if ( nBalanceNeedsAnonymized < = 0 ) return false ;
2018-07-28 15:50:41 +02:00
2017-05-05 13:26:27 +02:00
int nTries = 0 ;
2018-12-17 15:45:36 +01:00
int nMnCount = deterministicMNManager - > GetListAtChainTip ( ) . GetValidMNsCount ( ) ;
2017-05-05 13:26:27 +02:00
2020-03-12 11:31:55 +01:00
// find available denominated amounts
std : : set < CAmount > setAmounts ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > SelectDenominatedAmounts ( nBalanceNeedsAnonymized , setAmounts ) ) {
2017-05-05 13:26:27 +02:00
// this should never happen
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- Can't mix: no compatible inputs found! \n " ) ;
2017-05-05 13:26:27 +02:00
strAutoDenomResult = _ ( " Can't mix: no compatible inputs found! " ) ;
return false ;
}
// otherwise, try one randomly
2018-11-05 10:29:07 +01:00
while ( nTries < 10 ) {
2018-12-17 15:45:36 +01:00
auto dmn = privateSendClient . GetRandomNotUsedMasternode ( ) ;
2018-02-12 13:47:20 +01:00
2018-12-17 15:45:36 +01:00
if ( ! dmn ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- Can't find random masternode! \n " ) ;
2017-05-05 13:26:27 +02:00
strAutoDenomResult = _ ( " Can't find random Masternode. " ) ;
return false ;
}
2018-02-12 13:47:20 +01:00
2018-12-17 15:45:36 +01:00
privateSendClient . AddUsedMasternode ( dmn - > collateralOutpoint ) ;
2018-10-11 16:32:51 +02:00
2018-02-12 13:47:20 +01:00
// skip next mn payments winners
2018-12-17 15:45:36 +01:00
if ( mnpayments . IsScheduled ( dmn , 0 ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- skipping winner, masternode=%s \n " , dmn - > proTxHash . ToString ( ) ) ;
2018-02-12 13:47:20 +01:00
nTries + + ;
continue ;
}
2019-01-03 21:08:34 +01:00
int64_t nLastDsq = mmetaman . GetMetaInfo ( dmn - > proTxHash ) - > GetLastDsq ( ) ;
if ( nLastDsq ! = 0 & & nLastDsq + nMnCount / 5 > mmetaman . GetDsqCount ( ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- Too early to mix on this masternode! "
2018-11-05 10:29:07 +01:00
" masternode=%s addr=%s nLastDsq=%d CountEnabled/5=%d nDsqCount=%d \n " ,
2018-12-17 15:45:36 +01:00
dmn - > proTxHash . ToString ( ) , dmn - > pdmnState - > addr . ToString ( ) , nLastDsq ,
2019-01-03 21:08:34 +01:00
nMnCount / 5 , mmetaman . GetDsqCount ( ) ) ;
2017-05-05 13:26:27 +02:00
nTries + + ;
continue ;
}
2018-12-17 15:45:36 +01:00
if ( connman . IsMasternodeOrDisconnectRequested ( dmn - > pdmnState - > addr ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- skipping masternode connection, addr=%s \n " , dmn - > pdmnState - > addr . ToString ( ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
nTries + + ;
continue ;
2017-05-05 13:26:27 +02:00
}
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- attempt %d connection to Masternode %s \n " , nTries , dmn - > pdmnState - > addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
2020-03-12 11:31:55 +01:00
// try to get a single random denom out of setAmounts
2018-11-05 10:29:07 +01:00
while ( nSessionDenom = = 0 ) {
2020-03-12 11:31:55 +01:00
for ( const auto & amount : setAmounts ) {
if ( setAmounts . size ( ) > 1 & & GetRandInt ( 2 ) ) continue ;
nSessionDenom = CPrivateSend : : AmountToDenomination ( amount ) ;
break ;
}
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
2018-12-17 15:45:36 +01:00
mixingMasternode = dmn ;
2020-03-19 14:21:02 +01:00
connman . AddPendingMasternode ( dmn - > proTxHash ) ;
2018-12-17 15:45:36 +01:00
pendingDsaRequest = CPendingDsaRequest ( dmn - > pdmnState - > addr , CPrivateSendAccept ( nSessionDenom , txMyCollateral ) ) ;
2018-02-01 02:10:52 +01:00
// TODO: add new state POOL_STATE_CONNECTING and bump MIN_PRIVATESEND_PEER_PROTO_VERSION
SetState ( POOL_STATE_QUEUE ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::StartNewQueue -- pending connection, nSessionDenom: %d (%s), addr=%s \n " ,
2020-03-12 11:31:55 +01:00
nSessionDenom , CPrivateSend : : DenominationToString ( nSessionDenom ) , dmn - > pdmnState - > addr . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Trying to connect... " ) ;
2018-01-17 16:09:08 +01:00
return true ;
2017-05-05 13:26:27 +02:00
}
2018-02-01 02:10:52 +01:00
strAutoDenomResult = _ ( " Failed to start a new mixing queue " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : ProcessPendingDsaRequest ( CConnman & connman )
2018-02-01 02:10:52 +01:00
{
2018-09-04 12:54:59 +02:00
if ( ! pendingDsaRequest ) return false ;
2018-02-01 02:10:52 +01:00
bool fDone = connman . ForNode ( pendingDsaRequest . GetAddr ( ) , [ & ] ( CNode * pnode ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " -- processing dsa queue for addr=%s \n " , pnode - > addr . ToString ( ) ) ;
2018-02-12 13:47:53 +01:00
nTimeLastSuccessfulStep = GetTime ( ) ;
2018-02-01 02:10:52 +01:00
// TODO: this vvvv should be here after new state POOL_STATE_CONNECTING is added and MIN_PRIVATESEND_PEER_PROTO_VERSION is bumped
// SetState(POOL_STATE_QUEUE);
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSACCEPT , pendingDsaRequest . GetDSA ( ) ) ) ;
return true ;
} ) ;
if ( fDone ) {
pendingDsaRequest = CPendingDsaRequest ( ) ;
} else if ( pendingDsaRequest . IsExpired ( ) ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::%s -- failed to connect to %s \n " , __func__ , pendingDsaRequest . GetAddr ( ) . ToString ( ) ) ;
2018-02-01 02:10:52 +01:00
SetNull ( ) ;
}
2018-09-04 12:54:59 +02:00
return fDone ;
}
void CPrivateSendClientManager : : ProcessPendingDsaRequest ( CConnman & connman )
{
2018-09-20 14:40:43 +02:00
LOCK ( cs_deqsessions ) ;
for ( auto & session : deqSessions ) {
2018-09-04 12:54:59 +02:00
if ( session . ProcessPendingDsaRequest ( connman ) ) {
strAutoDenomResult = _ ( " Mixing in progress... " ) ;
}
}
2018-02-01 02:10:52 +01:00
}
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : SubmitDenominate ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2020-04-17 03:17:25 +02:00
LOCK2 ( cs_main , GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2018-09-04 12:54:59 +02:00
2017-05-05 13:26:27 +02:00
std : : string strError ;
2018-11-05 10:29:07 +01:00
std : : vector < std : : pair < CTxDSIn , CTxOut > > vecPSInOutPairs , vecPSInOutPairsTmp ;
2018-09-15 12:18:32 +02:00
if ( ! SelectDenominate ( strError , vecPSInOutPairs ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- SelectDenominate failed, error: %s \n " , strError ) ;
2018-09-15 12:18:32 +02:00
return false ;
}
2018-11-05 10:29:07 +01:00
std : : vector < std : : pair < int , size_t > > vecInputsByRounds ;
2017-05-05 13:26:27 +02:00
2018-10-15 13:58:47 +02:00
for ( int i = 0 ; i < privateSendClient . nPrivateSendRounds ; i + + ) {
2019-09-15 22:08:05 +02:00
if ( PrepareDenominate ( i , i , strError , vecPSInOutPairs , vecPSInOutPairsTmp , true ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- Running PrivateSend denominate for %d rounds, success \n " , i ) ;
2018-10-15 13:58:47 +02:00
vecInputsByRounds . emplace_back ( i , vecPSInOutPairsTmp . size ( ) ) ;
} else {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- Running PrivateSend denominate for %d rounds, error: %s \n " , i , strError ) ;
2017-05-05 13:26:27 +02:00
}
2018-10-15 13:58:47 +02:00
}
// more inputs first, for equal input count prefer the one with less rounds
std : : sort ( vecInputsByRounds . begin ( ) , vecInputsByRounds . end ( ) , [ ] ( const auto & a , const auto & b ) {
return a . second > b . second | | ( a . second = = b . second & & a . first < b . first ) ;
} ) ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " vecInputsByRounds for denom %d \n " , nSessionDenom ) ;
2018-10-15 13:58:47 +02:00
for ( const auto & pair : vecInputsByRounds ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " vecInputsByRounds: rounds: %d, inputs: %d \n " , pair . first , pair . second ) ;
2018-10-15 13:58:47 +02:00
}
int nRounds = vecInputsByRounds . begin ( ) - > first ;
if ( PrepareDenominate ( nRounds , nRounds , strError , vecPSInOutPairs , vecPSInOutPairsTmp ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- Running PrivateSend denominate for %d rounds, success \n " , nRounds ) ;
2018-10-15 13:58:47 +02:00
return SendDenominate ( vecPSInOutPairsTmp , connman ) ;
2017-05-05 13:26:27 +02:00
}
// We failed? That's strange but let's just make final attempt and try to mix everything
2018-09-15 12:18:32 +02:00
if ( PrepareDenominate ( 0 , privateSendClient . nPrivateSendRounds - 1 , strError , vecPSInOutPairs , vecPSInOutPairsTmp ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- Running PrivateSend denominate for all rounds, success \n " ) ;
2018-09-15 12:18:32 +02:00
return SendDenominate ( vecPSInOutPairsTmp , connman ) ;
2017-05-05 13:26:27 +02:00
}
// Should never actually get here but just in case
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SubmitDenominate -- Running PrivateSend denominate for all rounds, error: %s \n " , strError ) ;
2017-05-05 13:26:27 +02:00
strAutoDenomResult = strError ;
return false ;
}
2018-11-05 10:29:07 +01:00
bool CPrivateSendClientSession : : SelectDenominate ( std : : string & strErrorRet , std : : vector < std : : pair < CTxDSIn , CTxOut > > & vecPSInOutPairsRet )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
if ( GetWallets ( ) [ 0 ] - > IsLocked ( true ) ) {
2017-05-05 13:26:27 +02:00
strErrorRet = " Wallet locked, unable to create transaction! " ;
return false ;
}
if ( GetEntriesCount ( ) > 0 ) {
strErrorRet = " Already have pending entries in the PrivateSend pool " ;
return false ;
}
2018-09-15 12:18:32 +02:00
vecPSInOutPairsRet . clear ( ) ;
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
bool fSelected = GetWallets ( ) [ 0 ] - > SelectPSInOutPairsByDenominations ( nSessionDenom , CPrivateSend : : GetMaxPoolAmount ( ) , vecPSInOutPairsRet ) ;
2018-09-15 12:18:32 +02:00
if ( ! fSelected ) {
2017-05-05 13:26:27 +02:00
strErrorRet = " Can't select current denominated inputs " ;
return false ;
}
2018-09-15 12:18:32 +02:00
return true ;
}
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
bool CPrivateSendClientSession : : PrepareDenominate ( int nMinRounds , int nMaxRounds , std : : string & strErrorRet , const std : : vector < std : : pair < CTxDSIn , CTxOut > > & vecPSInOutPairsIn , std : : vector < std : : pair < CTxDSIn , CTxOut > > & vecPSInOutPairsRet , bool fDryRun )
2018-09-15 12:18:32 +02:00
{
2019-11-13 21:03:52 +01:00
AssertLockHeld ( cs_main ) ;
2020-04-17 03:17:25 +02:00
AssertLockHeld ( GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2019-11-13 21:03:52 +01:00
2020-03-12 11:31:55 +01:00
if ( ! CPrivateSend : : IsValidDenomination ( nSessionDenom ) ) {
2018-09-15 12:18:32 +02:00
strErrorRet = " Incorrect session denom " ;
return false ;
2017-05-05 13:26:27 +02:00
}
2020-03-12 11:31:55 +01:00
CAmount nDenomAmount = CPrivateSend : : DenominationToAmount ( nSessionDenom ) ;
2017-05-05 13:26:27 +02:00
// NOTE: No need to randomize order of inputs because they were
2018-09-15 12:18:32 +02:00
// initially shuffled in CWallet::SelectPSInOutPairsByDenominations already.
2020-03-12 11:31:55 +01:00
int nSteps { 0 } ;
2018-09-15 12:18:32 +02:00
vecPSInOutPairsRet . clear ( ) ;
2017-05-05 13:26:27 +02:00
2018-10-15 13:58:47 +02:00
// Try to add up to PRIVATESEND_ENTRY_MAX_SIZE of every needed denomination
2018-11-05 10:29:07 +01:00
for ( const auto & pair : vecPSInOutPairsIn ) {
2020-03-12 11:31:55 +01:00
if ( nSteps > = PRIVATESEND_ENTRY_MAX_SIZE ) break ;
if ( pair . second . nRounds < nMinRounds | | pair . second . nRounds > nMaxRounds ) continue ;
if ( pair . second . nValue ! = nDenomAmount ) continue ;
CScript scriptDenom ;
if ( fDryRun ) {
scriptDenom = CScript ( ) ;
} else {
// randomly skip some inputs when we have at least one of the same denom already
// TODO: make it adjustable via options/cmd-line params
if ( nSteps > = 1 & & GetRandInt ( 5 ) = = 0 ) {
// still count it as a step to randomize number of inputs
// if we have more than (or exactly) PRIVATESEND_ENTRY_MAX_SIZE of them
+ + nSteps ;
continue ;
2017-05-05 13:26:27 +02:00
}
2020-04-17 03:17:25 +02:00
scriptDenom = keyHolderStorage . AddKey ( GetWallets ( ) [ 0 ] ) ;
2017-05-05 13:26:27 +02:00
}
2020-03-12 11:31:55 +01:00
vecPSInOutPairsRet . emplace_back ( pair . first , CTxOut ( nDenomAmount , scriptDenom ) ) ;
// step is complete
+ + nSteps ;
2017-05-05 13:26:27 +02:00
}
2020-03-12 11:31:55 +01:00
if ( vecPSInOutPairsRet . empty ( ) ) {
2017-09-11 16:14:55 +02:00
keyHolderStorage . ReturnAll ( ) ;
2018-09-04 12:54:59 +02:00
strErrorRet = " Can't prepare current denominated outputs " ;
2017-05-05 13:26:27 +02:00
return false ;
}
2019-11-13 21:03:52 +01:00
if ( fDryRun ) {
return true ;
}
for ( const auto & pair : vecPSInOutPairsRet ) {
2020-04-17 03:17:25 +02:00
GetWallets ( ) [ 0 ] - > LockCoin ( pair . first . prevout ) ;
2019-11-13 21:03:52 +01:00
vecOutPointLocked . push_back ( pair . first . prevout ) ;
}
2017-05-05 13:26:27 +02:00
return true ;
}
// Create collaterals by looping through inputs grouped by addresses
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : MakeCollateralAmounts ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2020-04-17 03:17:25 +02:00
LOCK2 ( cs_main , GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2019-11-13 21:04:12 +01:00
2019-10-17 11:36:18 +02:00
// NOTE: We do not allow txes larger than 100kB, so we have to limit number of inputs here.
// We still want to consume a lot of inputs to avoid creating only smaller denoms though.
// Knowing that each CTxIn is at least 148b big, 400 inputs should take 400 x ~148b = ~60kB.
// This still leaves more than enough room for another data of typical MakeCollateralAmounts tx.
2017-05-05 13:26:27 +02:00
std : : vector < CompactTallyItem > vecTally ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > SelectCoinsGroupedByAddresses ( vecTally , false , false , true , 400 ) ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- SelectCoinsGroupedByAddresses can't find any inputs! \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-11-26 14:22:39 +01:00
// Start from smallest balances first to consume tiny amounts and cleanup UTXO a bit
std : : sort ( vecTally . begin ( ) , vecTally . end ( ) , [ ] ( const CompactTallyItem & a , const CompactTallyItem & b ) {
return a . nAmount < b . nAmount ;
} ) ;
2017-07-10 16:42:32 +02:00
// First try to use only non-denominated funds
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
2018-11-05 10:29:07 +01:00
if ( ! MakeCollateralAmounts ( item , false , connman ) ) continue ;
2017-05-05 13:26:27 +02:00
return true ;
}
2017-07-10 16:42:32 +02:00
// There should be at least some denominated funds we should be able to break in pieces to continue mixing
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
2018-11-05 10:29:07 +01:00
if ( ! MakeCollateralAmounts ( item , true , connman ) ) continue ;
2017-07-10 16:42:32 +02:00
return true ;
}
2020-01-08 08:02:49 +01:00
// If we got here then something is terribly broken actually
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- ERROR: Can't make collaterals! \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// Split up large inputs or create fee sized inputs
2018-09-04 12:54:59 +02:00
bool CPrivateSendClientSession : : MakeCollateralAmounts ( const CompactTallyItem & tallyItem , bool fTryDenominated , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-11-13 21:04:12 +01:00
AssertLockHeld ( cs_main ) ;
2020-04-17 03:17:25 +02:00
AssertLockHeld ( GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2018-07-28 15:50:41 +02:00
2019-11-13 21:04:12 +01:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2017-07-10 16:42:32 +02:00
2020-03-12 11:32:12 +01:00
// Skip way too tiny amounts
if ( tallyItem . nAmount < CPrivateSend : : GetCollateralAmount ( ) ) {
return false ;
}
// Skip single inputs that can be used as collaterals already
if ( tallyItem . vecOutPoints . size ( ) = = 1 & & CPrivateSend : : IsCollateralAmount ( tallyItem . nAmount ) ) {
return false ;
}
2017-09-27 19:42:53 +02:00
// denominated input is always a single one, so we can check its amount directly and return early
2019-06-18 13:33:05 +02:00
if ( ! fTryDenominated & & tallyItem . vecOutPoints . size ( ) = = 1 & & CPrivateSend : : IsDenominatedAmount ( tallyItem . nAmount ) ) {
2017-09-27 19:42:53 +02:00
return false ;
2019-06-18 13:33:05 +02:00
}
2017-09-27 19:42:53 +02:00
2017-05-05 13:26:27 +02:00
CWalletTx wtx ;
CAmount nFeeRet = 0 ;
int nChangePosRet = - 1 ;
std : : string strFail = " " ;
std : : vector < CRecipient > vecSend ;
// make our collateral address
2020-04-17 03:17:25 +02:00
CReserveKey reservekeyCollateral ( GetWallets ( ) [ 0 ] ) ;
2017-05-05 13:26:27 +02:00
// make our change address
2020-04-17 03:17:25 +02:00
CReserveKey reservekeyChange ( GetWallets ( ) [ 0 ] ) ;
2017-05-05 13:26:27 +02:00
CScript scriptCollateral ;
CPubKey vchPubKey ;
2017-05-29 13:51:40 +02:00
assert ( reservekeyCollateral . GetReservedKey ( vchPubKey , false ) ) ; // should never fail, as we just unlocked
2017-05-05 13:26:27 +02:00
scriptCollateral = GetScriptForDestination ( vchPubKey . GetID ( ) ) ;
2020-03-12 11:32:12 +01:00
CAmount nCollateralAmount { 0 } ;
if ( tallyItem . nAmount > CPrivateSend : : GetMaxCollateralAmount ( ) + CPrivateSend : : GetCollateralAmount ( ) * 2 ) {
// Change output will be large enough to be valid as a collateral or a source input for another run
nCollateralAmount = CPrivateSend : : GetMaxCollateralAmount ( ) ;
} else {
// Change output might be too small for another collateral if we try to create the largest collateral
// here, create a slightly smaller one instead
nCollateralAmount = CPrivateSend : : GetMaxCollateralAmount ( ) - CPrivateSend : : GetCollateralAmount ( ) ;
}
vecSend . push_back ( ( CRecipient ) { scriptCollateral , nCollateralAmount , false } ) ;
2017-05-05 13:26:27 +02:00
// try to use non-denominated and not mn-like funds first, select them explicitly
CCoinControl coinControl ;
coinControl . fAllowOtherInputs = false ;
coinControl . fAllowWatchOnly = false ;
2019-10-23 09:56:44 +02:00
coinControl . nCoinType = CoinType : : ONLY_NONDENOMINATED ;
2017-05-05 13:26:27 +02:00
// send change to the same address so that we were able create more denoms out of it later
2017-09-27 19:43:16 +02:00
coinControl . destChange = tallyItem . txdest ;
2019-06-18 13:33:05 +02:00
for ( const auto & outpoint : tallyItem . vecOutPoints ) {
2018-02-15 08:29:31 +01:00
coinControl . Select ( outpoint ) ;
2019-06-18 13:33:05 +02:00
}
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
bool fSuccess = GetWallets ( ) [ 0 ] - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2019-10-23 09:56:44 +02:00
nFeeRet , nChangePosRet , strFail , coinControl ) ;
2018-11-05 10:29:07 +01:00
if ( ! fSuccess ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- ONLY_NONDENOMINATED: %s \n " , strFail ) ;
2018-02-08 06:46:44 +01:00
// If we failed then most likely there are not enough funds on this address.
2018-11-05 10:29:07 +01:00
if ( fTryDenominated ) {
2017-07-10 16:42:32 +02:00
// Try to also use denominated coins (we can't mix denominated without collaterals anyway).
2019-10-23 09:56:44 +02:00
coinControl . nCoinType = CoinType : : ALL_COINS ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2019-10-23 09:56:44 +02:00
nFeeRet , nChangePosRet , strFail , coinControl ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- ALL_COINS Error: %s \n " , strFail ) ;
2017-07-10 16:42:32 +02:00
reservekeyCollateral . ReturnKey ( ) ;
return false ;
}
} else {
// Nothing else we can do.
2017-05-05 13:26:27 +02:00
reservekeyCollateral . ReturnKey ( ) ;
return false ;
}
}
reservekeyCollateral . KeepKey ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- txid=%s \n " , wtx . GetHash ( ) . GetHex ( ) ) ;
2017-05-05 13:26:27 +02:00
2018-02-08 06:46:44 +01:00
// use the same nCachedLastSuccessBlock as for DS mixing to prevent race
2016-10-28 13:49:04 +02:00
CValidationState state ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > CommitTransaction ( wtx , reservekeyChange , & connman , state ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::MakeCollateralAmounts -- CommitTransaction failed! Reason given: %s \n " , state . GetRejectReason ( ) ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-09-04 12:54:59 +02:00
privateSendClient . UpdatedSuccessBlock ( ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
// Create denominations by looping through inputs grouped by addresses
2019-04-30 15:19:23 +02:00
bool CPrivateSendClientSession : : CreateDenominated ( CAmount nBalanceToDenominate , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2020-04-17 03:17:25 +02:00
LOCK2 ( cs_main , GetWallets ( ) [ 0 ] - > cs_wallet ) ;
2017-05-28 15:50:07 +02:00
2018-11-25 14:27:31 +01:00
// NOTE: We do not allow txes larger than 100kB, so we have to limit number of inputs here.
// We still want to consume a lot of inputs to avoid creating only smaller denoms though.
// Knowing that each CTxIn is at least 148b big, 400 inputs should take 400 x ~148b = ~60kB.
// This still leaves more than enough room for another data of typical CreateDenominated tx.
2017-05-05 13:26:27 +02:00
std : : vector < CompactTallyItem > vecTally ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > SelectCoinsGroupedByAddresses ( vecTally , true , true , true , 400 ) ) {
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- SelectCoinsGroupedByAddresses can't find any inputs! \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2018-11-26 14:22:39 +01:00
// Start from largest balances first to speed things up by creating txes with larger/largest denoms included
std : : sort ( vecTally . begin ( ) , vecTally . end ( ) , [ ] ( const CompactTallyItem & a , const CompactTallyItem & b ) {
return a . nAmount > b . nAmount ;
} ) ;
2020-04-17 03:17:25 +02:00
bool fCreateMixingCollaterals = ! GetWallets ( ) [ 0 ] - > HasCollateralInputs ( ) ;
2017-05-05 13:26:27 +02:00
2018-02-06 12:09:33 +01:00
for ( const auto & item : vecTally ) {
2019-04-30 15:19:23 +02:00
if ( ! CreateDenominated ( nBalanceToDenominate , item , fCreateMixingCollaterals , connman ) ) continue ;
2017-05-05 13:26:27 +02:00
return true ;
}
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- failed! \n " ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// Create denominations
2019-04-30 15:19:23 +02:00
bool CPrivateSendClientSession : : CreateDenominated ( CAmount nBalanceToDenominate , const CompactTallyItem & tallyItem , bool fCreateMixingCollaterals , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! privateSendClient . fEnablePrivateSend | | ! privateSendClient . fPrivateSendRunning ) return false ;
2018-07-28 15:50:41 +02:00
2017-05-05 13:26:27 +02:00
std : : vector < CRecipient > vecSend ;
2017-09-11 16:14:55 +02:00
CKeyHolderStorage keyHolderStorageDenom ;
2017-05-05 13:26:27 +02:00
CAmount nValueLeft = tallyItem . nAmount ;
2017-06-30 20:30:16 +02:00
nValueLeft - = CPrivateSend : : GetCollateralAmount ( ) ; // leave some room for fees
2017-05-05 13:26:27 +02:00
Merge #11117: Prepare for non-Base58 addresses (#3294)
* Merge #11117: Prepare for non-Base58 addresses
864cd2787 Move CBitcoinAddress to base58.cpp (Pieter Wuille)
5c8ff0d44 Introduce wrappers around CBitcoinAddress (Pieter Wuille)
Pull request description:
This patch removes the need for the intermediary Base58 type `CBitcoinAddress`, by providing {`Encode`,`Decode`,`IsValid`}`Destination` functions that directly operate on the conversion between `std::string`s and `CTxDestination`.
As a side, it also fixes a number of indentation issues, and removes probably several unnecessary implicit `CTxDestination`<->`CBitcoinAddress` conversions.
This change is far from complete. In follow-ups I'd like to:
* Split off the specific address and key encoding logic from base58.h, and move it to a address.h or so.
* Replace `CTxDestination` with a non-`boost::variant` version (which can be more efficient as `boost::variant` allocates everything on the heap, and remove the need for `boost::get<...>` and `IsValidDestination` calls everywhere).
* Do the same for `CBitcoinSecret`, `CBitcoinExtKey`, and `CBitcoinExtPubKey`.
However, I've tried to keep this patch to be minimally invasive, but still enough to support non-Base58 addresses. Perhaps a smaller patch is possible to hack Bech32 support into `CBitcoinAddress`, but I would consider that a move in the wrong direction.
Tree-SHA512: c2c77ffb57caeadf2429b1c2562ce60e8c7be8aa9f8e51b591f354b6b441162625b2efe14c023a1ae485cf2ed417263afa35c892891dfaa7844e7fbabccab85e
* CBitcoinAddress -> EncodeDestination in providertx.h
Signed-off-by: Pasta <pasta@dashboost.org>
* more CBitcoinAddress -> EncodeDestination in providertx.h
Signed-off-by: Pasta <pasta@dashboost.org>
* more CBitcoinAddress -> EncodeDestination in providertx.h
Signed-off-by: Pasta <pasta@dashboost.org>
* more CBitcoinAddress -> EncodeDestination in providertx.h
Signed-off-by: Pasta <pasta@dashboost.org>
* fix CBitcoinAddress GetKeyID check
Signed-off-by: Pasta <pasta@dashboost.org>
* fix providertx.cpp
Signed-off-by: Pasta <pasta@dashboost.org>
* hopefully fix governance-classes.cpp
Signed-off-by: Pasta <pasta@dashboost.org>
* partially fix governance-validators.cpp, unable to resolve "address.IsScript()"
Signed-off-by: Pasta <pasta@dashboost.org>
* partially fix governance-classes.cpp, unable to resolve "address.IsScript()"
Signed-off-by: Pasta <pasta@dashboost.org>
* fix governance-classes.h
Signed-off-by: Pasta <pasta@dashboost.org>
* DecodeTransaction -> DecodeDestination, fix governance-validators.cpp
Signed-off-by: Pasta <pasta@dashboost.org>
* More fixes for 3294
* Move GetIndexKey into rpc/misc.cpp near getAddressesFromParams
No need to have it in base58.cpp anymore as this is only used in getAddressesFromParams
Co-authored-by: Wladimir J. van der Laan <laanwj@gmail.com>
Co-authored-by: UdjinM6 <UdjinM6@users.noreply.github.com>
Co-authored-by: Alexander Block <ablock84@gmail.com>
2020-01-22 11:35:04 +01:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- 0 - %s nValueLeft: %f \n " , EncodeDestination ( tallyItem . txdest ) , ( float ) nValueLeft / COIN ) ;
2017-05-05 13:26:27 +02:00
2017-09-11 16:14:55 +02:00
// ****** Add an output for mixing collaterals ************ /
2017-05-05 13:26:27 +02:00
2018-11-05 10:29:07 +01:00
if ( fCreateMixingCollaterals ) {
2020-04-17 03:17:25 +02:00
CScript scriptCollateral = keyHolderStorageDenom . AddKey ( GetWallets ( ) [ 0 ] ) ;
2018-11-05 10:29:07 +01:00
vecSend . push_back ( ( CRecipient ) { scriptCollateral , CPrivateSend : : GetMaxCollateralAmount ( ) , false } ) ;
2017-06-30 20:30:16 +02:00
nValueLeft - = CPrivateSend : : GetMaxCollateralAmount ( ) ;
2017-05-05 13:26:27 +02:00
}
2017-09-11 16:14:55 +02:00
// ****** Add outputs for denoms ************ /
2017-05-05 13:26:27 +02:00
int nOutputsTotal = 0 ;
2019-04-30 15:19:23 +02:00
bool fAddFinal = true ;
std : : vector < CAmount > vecStandardDenoms = CPrivateSend : : GetStandardDenominations ( ) ;
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
for ( auto it = vecStandardDenoms . rbegin ( ) ; it ! = vecStandardDenoms . rend ( ) ; + + it ) {
CAmount nDenomValue = * it ;
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
// Note: denoms are skipped if there are already nPrivateSendDenoms of them
// and there are still larger denoms which can be used for mixing
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
// check skipped denoms
if ( privateSendClient . IsDenomSkipped ( nDenomValue ) ) {
strAutoDenomResult = strprintf ( _ ( " Too many %f denominations, skipping. " ) , ( float ) nDenomValue / COIN ) ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- %s \n " , strAutoDenomResult ) ;
2019-04-30 15:19:23 +02:00
continue ;
}
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
// find new denoms to skip if any (ignore the largest one)
2020-04-17 03:17:25 +02:00
if ( nDenomValue ! = vecStandardDenoms . front ( ) & & GetWallets ( ) [ 0 ] - > CountInputsWithAmount ( nDenomValue ) > privateSendClient . nPrivateSendDenoms ) {
2019-04-30 15:19:23 +02:00
strAutoDenomResult = strprintf ( _ ( " Too many %f denominations, removing. " ) , ( float ) nDenomValue / COIN ) ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- %s \n " , strAutoDenomResult ) ;
2019-04-30 15:19:23 +02:00
privateSendClient . AddSkippedDenom ( nDenomValue ) ;
continue ;
}
2017-05-05 13:26:27 +02:00
2019-04-30 15:19:23 +02:00
int nOutputs = 0 ;
auto needMoreOutputs = [ & ] ( ) {
bool fRegular = ( nValueLeft > = nDenomValue & & nBalanceToDenominate > = nDenomValue ) ;
bool fFinal = ( fAddFinal
& & nValueLeft > = nDenomValue
& & nBalanceToDenominate > 0
& & nBalanceToDenominate < nDenomValue ) ;
fAddFinal = false ; // add final denom only once, only the smalest possible one
return fRegular | | fFinal ;
} ;
// add each output up to 11 times until it can't be added again
while ( needMoreOutputs ( ) & & nOutputs < = 10 ) {
2020-04-17 03:17:25 +02:00
CScript scriptDenom = keyHolderStorageDenom . AddKey ( GetWallets ( ) [ 0 ] ) ;
2019-04-30 15:19:23 +02:00
vecSend . push_back ( ( CRecipient ) { scriptDenom , nDenomValue , false } ) ;
//increment outputs and subtract denomination amount
nOutputs + + ;
nValueLeft - = nDenomValue ;
nBalanceToDenominate - = nDenomValue ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- 1 - totalOutputs: %d, nOutputsTotal: %d, nOutputs: %d, nValueLeft: %f \n " , nOutputsTotal + nOutputs , nOutputsTotal , nOutputs , ( float ) nValueLeft / COIN ) ;
2017-05-05 13:26:27 +02:00
}
2019-04-30 15:19:23 +02:00
nOutputsTotal + = nOutputs ;
if ( nValueLeft = = 0 | | nBalanceToDenominate < = 0 ) break ;
}
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- 2 - nOutputsTotal: %d, nValueLeft: %f \n " , nOutputsTotal , ( float ) nValueLeft / COIN ) ;
2017-05-05 13:26:27 +02:00
2018-09-15 12:19:00 +02:00
// No reasons to create mixing collaterals if we can't create denoms to mix
if ( nOutputsTotal = = 0 ) return false ;
2017-05-05 13:26:27 +02:00
// if we have anything left over, it will be automatically send back as change - there is no need to send it manually
CCoinControl coinControl ;
coinControl . fAllowOtherInputs = false ;
coinControl . fAllowWatchOnly = false ;
2019-10-23 09:56:44 +02:00
coinControl . nCoinType = CoinType : : ONLY_NONDENOMINATED ;
2017-05-05 13:26:27 +02:00
// send change to the same address so that we were able create more denoms out of it later
2017-09-27 19:43:16 +02:00
coinControl . destChange = tallyItem . txdest ;
2019-06-18 13:33:05 +02:00
for ( const auto & outpoint : tallyItem . vecOutPoints ) {
2018-02-15 08:29:31 +01:00
coinControl . Select ( outpoint ) ;
2019-06-18 13:33:05 +02:00
}
2017-05-05 13:26:27 +02:00
CWalletTx wtx ;
CAmount nFeeRet = 0 ;
int nChangePosRet = - 1 ;
std : : string strFail = " " ;
// make our change address
2020-04-17 03:17:25 +02:00
CReserveKey reservekeyChange ( GetWallets ( ) [ 0 ] ) ;
2017-05-05 13:26:27 +02:00
2020-04-17 03:17:25 +02:00
bool fSuccess = GetWallets ( ) [ 0 ] - > CreateTransaction ( vecSend , wtx , reservekeyChange ,
2019-10-23 09:56:44 +02:00
nFeeRet , nChangePosRet , strFail , coinControl ) ;
2018-11-05 10:29:07 +01:00
if ( ! fSuccess ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- Error: %s \n " , strFail ) ;
2017-09-11 16:14:55 +02:00
keyHolderStorageDenom . ReturnAll ( ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
2017-09-11 16:14:55 +02:00
keyHolderStorageDenom . KeepAll ( ) ;
2017-05-05 13:26:27 +02:00
2016-10-28 13:49:04 +02:00
CValidationState state ;
2020-04-17 03:17:25 +02:00
if ( ! GetWallets ( ) [ 0 ] - > CommitTransaction ( wtx , reservekeyChange , & connman , state ) ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- CommitTransaction failed! Reason given: %s \n " , state . GetRejectReason ( ) ) ;
2017-05-05 13:26:27 +02:00
return false ;
}
// use the same nCachedLastSuccessBlock as for DS mixing to prevent race
2018-09-04 12:54:59 +02:00
privateSendClient . UpdatedSuccessBlock ( ) ;
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::CreateDenominated -- txid=%s \n " , wtx . GetHash ( ) . GetHex ( ) ) ;
2017-05-05 13:26:27 +02:00
return true ;
}
2018-10-25 16:31:32 +02:00
void CPrivateSendClientSession : : RelayIn ( const CPrivateSendEntry & entry , CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2018-12-17 15:45:36 +01:00
if ( ! mixingMasternode ) return ;
2017-05-05 13:26:27 +02:00
2018-12-17 15:45:36 +01:00
connman . ForNode ( mixingMasternode - > pdmnState - > addr , [ & entry , & connman ] ( CNode * pnode ) {
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::RelayIn -- found master, relaying message to %s \n " , pnode - > addr . ToString ( ) ) ;
2016-11-25 20:01:56 +01:00
CNetMsgMaker msgMaker ( pnode - > GetSendVersion ( ) ) ;
connman . PushMessage ( pnode , msgMaker . Make ( NetMsgType : : DSVIN , entry ) ) ;
Backport Bitcoin PR#8085: p2p: Begin encapsulation (#1537)
* net: move CBanDB and CAddrDB out of net.h/cpp
This will eventually solve a circular dependency
* net: Create CConnman to encapsulate p2p connections
* net: Move socket binding into CConnman
* net: move OpenNetworkConnection into CConnman
* net: move ban and addrman functions into CConnman
* net: Add oneshot functions to CConnman
* net: move added node functions to CConnman
* net: Add most functions needed for vNodes to CConnman
* net: handle nodesignals in CConnman
* net: Pass CConnection to wallet rather than using the global
* net: Add rpc error for missing/disabled p2p functionality
* net: Pass CConnman around as needed
* gui: add NodeID to the peer table
* net: create generic functor accessors and move vNodes to CConnman
* net: move whitelist functions into CConnman
* net: move nLastNodeId to CConnman
* net: move nLocalHostNonce to CConnman
This behavior seems to have been quite racy and broken.
Move nLocalHostNonce into CNode, and check received nonces against all
non-fully-connected nodes. If there's a match, assume we've connected
to ourself.
* net: move messageHandlerCondition to CConnman
* net: move send/recv statistics to CConnman
* net: move SendBufferSize/ReceiveFloodSize to CConnman
* net: move nLocalServices/nRelevantServices to CConnman
These are in-turn passed to CNode at connection time. This allows us to offer
different services to different peers (or test the effects of doing so).
* net: move semOutbound and semMasternodeOutbound to CConnman
* net: SocketSendData returns written size
* net: move max/max-outbound to CConnman
* net: Pass best block known height into CConnman
CConnman then passes the current best height into CNode at creation time.
This way CConnman/CNode have no dependency on main for height, and the signals
only move in one direction.
This also helps to prevent identity leakage a tiny bit. Before this change, an
attacker could theoretically make 2 connections on different interfaces. They
would connect fully on one, and only establish the initial connection on the
other. Once they receive a new block, they would relay it to your first
connection, and immediately commence the version handshake on the second. Since
the new block height is reflected immediately, they could attempt to learn
whether the two connections were correlated.
This is, of course, incredibly unlikely to work due to the small timings
involved and receipt from other senders. But it doesn't hurt to lock-in
nBestHeight at the time of connection, rather than letting the remote choose
the time.
* net: pass CClientUIInterface into CConnman
* net: Drop StartNode/StopNode and use CConnman directly
* net: Introduce CConnection::Options to avoid passing so many params
* net: add nSendBufferMaxSize/nReceiveFloodSize to CConnection::Options
* net: move vNodesDisconnected into CConnman
* Made the ForEachNode* functions in src/net.cpp more pragmatic and self documenting
* Convert ForEachNode* functions to take a templated function argument rather than a std::function to eliminate std::function overhead
* net: move MAX_FEELER_CONNECTIONS into connman
2017-07-21 11:35:19 +02:00
return true ;
} ) ;
2017-05-05 13:26:27 +02:00
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientSession : : SetState ( PoolState nStateNew )
2017-05-05 13:26:27 +02:00
{
2019-09-03 21:48:35 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientSession::SetState -- nState: %d, nStateNew: %d \n " , nState , nStateNew ) ;
2017-05-05 13:26:27 +02:00
nState = nStateNew ;
}
2018-11-05 10:29:07 +01:00
void CPrivateSendClientManager : : UpdatedBlockTip ( const CBlockIndex * pindex )
2017-05-05 13:26:27 +02:00
{
2017-08-25 14:57:05 +02:00
nCachedBlockHeight = pindex - > nHeight ;
2019-05-22 23:51:39 +02:00
LogPrint ( BCLog : : PRIVATESEND , " CPrivateSendClientManager::UpdatedBlockTip -- nCachedBlockHeight: %d \n " , nCachedBlockHeight ) ;
2017-05-05 13:26:27 +02:00
}
2018-09-04 12:54:59 +02:00
void CPrivateSendClientManager : : DoMaintenance ( CConnman & connman )
2017-05-05 13:26:27 +02:00
{
2019-06-27 22:24:43 +02:00
if ( ! fEnablePrivateSend ) return ;
2018-11-05 10:29:07 +01:00
if ( fMasternodeMode ) return ; // no client-side mixing on masternodes
2017-05-05 13:26:27 +02:00
2019-06-18 13:33:05 +02:00
if ( ! masternodeSync . IsBlockchainSynced ( ) | | ShutdownRequested ( ) ) return ;
2017-05-05 13:26:27 +02:00
2018-07-16 14:47:37 +02:00
static unsigned int nTick = 0 ;
static unsigned int nDoAutoNextRun = nTick + PRIVATESEND_AUTO_TIMEOUT_MIN ;
2017-05-05 13:26:27 +02:00
2018-07-16 14:47:37 +02:00
nTick + + ;
2018-09-04 12:54:59 +02:00
CheckTimeout ( ) ;
ProcessPendingDsaRequest ( connman ) ;
2018-11-05 10:29:07 +01:00
if ( nDoAutoNextRun = = nTick ) {
2018-09-04 12:54:59 +02:00
DoAutomaticDenominating ( connman ) ;
2018-07-16 14:47:37 +02:00
nDoAutoNextRun = nTick + PRIVATESEND_AUTO_TIMEOUT_MIN + GetRandInt ( PRIVATESEND_AUTO_TIMEOUT_MAX - PRIVATESEND_AUTO_TIMEOUT_MIN ) ;
2017-05-05 13:26:27 +02:00
}
}
2019-10-09 18:48:53 +02:00
void CPrivateSendClientSession : : GetJsonInfo ( UniValue & obj ) const
{
obj . clear ( ) ;
obj . setObject ( ) ;
if ( mixingMasternode ! = nullptr ) {
assert ( mixingMasternode - > pdmnState ) ;
obj . push_back ( Pair ( " protxhash " , mixingMasternode - > proTxHash . ToString ( ) ) ) ;
obj . push_back ( Pair ( " outpoint " , mixingMasternode - > collateralOutpoint . ToStringShort ( ) ) ) ;
obj . push_back ( Pair ( " service " , mixingMasternode - > pdmnState - > addr . ToString ( ) ) ) ;
}
2020-03-12 11:31:55 +01:00
obj . push_back ( Pair ( " denomination " , ValueFromAmount ( CPrivateSend : : DenominationToAmount ( nSessionDenom ) ) ) ) ;
2019-10-09 18:48:53 +02:00
obj . push_back ( Pair ( " state " , GetStateString ( ) ) ) ;
obj . push_back ( Pair ( " entries_count " , GetEntriesCount ( ) ) ) ;
}
void CPrivateSendClientManager : : GetJsonInfo ( UniValue & obj ) const
{
LOCK ( cs_deqsessions ) ;
obj . clear ( ) ;
obj . setObject ( ) ;
obj . push_back ( Pair ( " enabled " , fEnablePrivateSend ) ) ;
obj . push_back ( Pair ( " running " , fPrivateSendRunning ) ) ;
obj . push_back ( Pair ( " multisession " , fPrivateSendMultiSession ) ) ;
obj . push_back ( Pair ( " max_sessions " , nPrivateSendSessions ) ) ;
obj . push_back ( Pair ( " max_rounds " , nPrivateSendRounds ) ) ;
obj . push_back ( Pair ( " max_amount " , nPrivateSendAmount ) ) ;
obj . push_back ( Pair ( " max_denoms " , nPrivateSendDenoms ) ) ;
obj . push_back ( Pair ( " queue_size " , GetQueueSize ( ) ) ) ;
UniValue arrSessions ( UniValue : : VARR ) ;
for ( const auto & session : deqSessions ) {
if ( session . GetState ( ) ! = POOL_STATE_IDLE ) {
UniValue objSession ( UniValue : : VOBJ ) ;
session . GetJsonInfo ( objSession ) ;
arrSessions . push_back ( objSession ) ;
}
}
obj . push_back ( Pair ( " sessions " , arrSessions ) ) ;
}