|
|
|
//
|
|
|
|
// Created by marcin on 5/11/15.
|
|
|
|
//
|
|
|
|
|
|
|
|
#include "tools.h"
|
|
|
|
#include <codecvt>
|
|
|
|
#include <thread>
|
|
|
|
|
|
|
|
|
|
|
|
namespace xmreg
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parse key string, e.g., a viewkey in a string
|
|
|
|
* into crypto::secret_key or crypto::public_key
|
|
|
|
* depending on the template argument.
|
|
|
|
*/
|
|
|
|
template <typename T>
|
|
|
|
bool
|
|
|
|
parse_str_secret_key(const string& key_str, T& secret_key)
|
|
|
|
{
|
|
|
|
|
|
|
|
// hash and keys have same structure, so to parse string of
|
|
|
|
// a key, e.g., a view key, we can first parse it into the hash
|
|
|
|
// object using parse_hash256 function, and then copy the reslting
|
|
|
|
// hash data into secret key.
|
|
|
|
crypto::hash hash_;
|
|
|
|
|
|
|
|
if(!parse_hash256(key_str, hash_))
|
|
|
|
{
|
|
|
|
cerr << "Cant parse a key (e.g. viewkey): " << key_str << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// crypto::hash and crypto::secret_key have basicly same
|
|
|
|
// structure. They both keep they key/hash as c-style char array
|
|
|
|
// of fixed size. Thus we can just copy data from hash
|
|
|
|
// to key
|
|
|
|
copy(begin(hash_.data), end(hash_.data), secret_key.data);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// explicit instantiations of get template function
|
|
|
|
template bool parse_str_secret_key<crypto::secret_key>(const string& key_str, crypto::secret_key& secret_key);
|
|
|
|
template bool parse_str_secret_key<crypto::public_key>(const string& key_str, crypto::public_key& secret_key);
|
|
|
|
template bool parse_str_secret_key<crypto::hash>(const string& key_str, crypto::hash& secret_key);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get transaction tx using given tx hash. Hash is represent as string here,
|
|
|
|
* so before we can tap into the blockchain, we need to pare it into
|
|
|
|
* crypto::hash object.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
get_tx_pub_key_from_str_hash(Blockchain& core_storage, const string& hash_str, transaction& tx)
|
|
|
|
{
|
|
|
|
crypto::hash tx_hash;
|
|
|
|
parse_hash256(hash_str, tx_hash);
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
// get transaction with given hash
|
|
|
|
tx = core_storage.get_db().get_tx(tx_hash);
|
|
|
|
}
|
|
|
|
catch (const TX_DNE& e)
|
|
|
|
{
|
|
|
|
cerr << e.what() << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parse monero address in a string form into
|
|
|
|
* cryptonote::account_public_address object
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
parse_str_address(const string& address_str,
|
|
|
|
address_parse_info& address_info,
|
|
|
|
cryptonote::network_type nettype)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (!get_account_address_from_str(address_info, nettype, address_str))
|
|
|
|
{
|
|
|
|
cerr << "Error getting address: " << address_str << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return string representation of monero address
|
|
|
|
*/
|
|
|
|
string
|
|
|
|
print_address(const address_parse_info& address_info, cryptonote::network_type nettype)
|
|
|
|
{
|
|
|
|
return "<" + get_account_address_as_str(
|
|
|
|
nettype, address_info.is_subaddress, address_info.address)
|
|
|
|
+ ">";
|
|
|
|
}
|
|
|
|
|
|
|
|
string
|
|
|
|
print_sig (const signature& sig)
|
|
|
|
{
|
|
|
|
stringstream ss;
|
|
|
|
|
|
|
|
ss << "c: <" << epee::string_tools::pod_to_hex(sig.c) << "> "
|
|
|
|
<< "r: <" << epee::string_tools::pod_to_hex(sig.r) << ">";
|
|
|
|
|
|
|
|
return ss.str();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if a character is a path seprator
|
|
|
|
*/
|
|
|
|
inline bool
|
|
|
|
is_separator(char c)
|
|
|
|
{
|
|
|
|
// default linux path separator
|
|
|
|
const char separator = PATH_SEPARARTOR;
|
|
|
|
|
|
|
|
return c == separator;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Remove trailinig path separator.
|
|
|
|
*/
|
|
|
|
string
|
|
|
|
remove_trailing_path_separator(const string& in_path)
|
|
|
|
{
|
|
|
|
string new_string = in_path;
|
|
|
|
if (!new_string.empty() && is_separator(new_string[new_string.size() - 1]))
|
|
|
|
new_string.erase(new_string.size() - 1);
|
|
|
|
return new_string;
|
|
|
|
}
|
|
|
|
|
|
|
|
bf::path
|
|
|
|
remove_trailing_path_separator(const bf::path& in_path)
|
|
|
|
{
|
|
|
|
#ifdef WIN32
|
|
|
|
std::wstring_convert<std::codecvt_utf8<wchar_t>, wchar_t> converter;
|
|
|
|
string path_str = converter.to_bytes(in_path.native());
|
|
|
|
#else
|
|
|
|
string path_str = in_path.native();
|
|
|
|
#endif
|
|
|
|
return bf::path(remove_trailing_path_separator(path_str));
|
|
|
|
}
|
|
|
|
|
|
|
|
//string
|
|
|
|
//timestamp_to_str(time_t timestamp, const char* format)
|
|
|
|
//{
|
|
|
|
// return get_human_readable_timestamp(timestamp);
|
|
|
|
//}
|
|
|
|
|
|
|
|
|
|
|
|
string
|
|
|
|
timestamp_to_str_gm(time_t timestamp, const char* format)
|
|
|
|
{
|
|
|
|
const time_t* t = ×tamp;
|
|
|
|
|
|
|
|
const int TIME_LENGTH = 60;
|
|
|
|
|
|
|
|
char str_buff[TIME_LENGTH];
|
|
|
|
|
|
|
|
std::tm tmp;
|
|
|
|
gmtime_r(t, &tmp);
|
|
|
|
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
len = std::strftime(str_buff, TIME_LENGTH, format, &tmp);
|
|
|
|
|
|
|
|
return string(str_buff, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
ostream&
|
|
|
|
operator<< (ostream& os, const address_parse_info& addr_info)
|
|
|
|
{
|
|
|
|
os << get_account_address_as_str(network_type::MAINNET, addr_info.is_subaddress, addr_info.address);
|
|
|
|
return os;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generate key_image of foran ith output
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
generate_key_image(const crypto::key_derivation& derivation,
|
|
|
|
const std::size_t i,
|
|
|
|
const crypto::secret_key& sec_key,
|
|
|
|
const crypto::public_key& pub_key,
|
|
|
|
crypto::key_image& key_img)
|
|
|
|
{
|
|
|
|
|
|
|
|
cryptonote::keypair in_ephemeral;
|
|
|
|
|
|
|
|
if (!crypto::derive_public_key(derivation, i,
|
|
|
|
pub_key,
|
|
|
|
in_ephemeral.pub))
|
|
|
|
{
|
|
|
|
cerr << "Error generating publick key " << pub_key << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
|
|
|
|
crypto::derive_secret_key(derivation, i,
|
|
|
|
sec_key,
|
|
|
|
in_ephemeral.sec);
|
|
|
|
}
|
|
|
|
catch(const std::exception& e)
|
|
|
|
{
|
|
|
|
cerr << "Error generate secret image: " << e.what() << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
crypto::generate_key_image(in_ephemeral.pub,
|
|
|
|
in_ephemeral.sec,
|
|
|
|
key_img);
|
|
|
|
}
|
|
|
|
catch(const std::exception& e)
|
|
|
|
{
|
|
|
|
cerr << "Error generate key image: " << e.what() << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string
|
|
|
|
get_default_lmdb_folder(cryptonote::network_type nettype)
|
|
|
|
{
|
|
|
|
// default path to monero folder
|
|
|
|
// on linux this is /home/<username>/.bitmonero
|
|
|
|
string default_monero_dir = tools::get_default_data_dir();
|
|
|
|
|
|
|
|
if (nettype == cryptonote::network_type::TESTNET)
|
|
|
|
default_monero_dir += "/testnet";
|
|
|
|
if (nettype == cryptonote::network_type::STAGENET)
|
|
|
|
default_monero_dir += "/stagenet";
|
|
|
|
|
|
|
|
|
|
|
|
// the default folder of the lmdb blockchain database
|
|
|
|
// is therefore as follows
|
|
|
|
return default_monero_dir + string("/lmdb");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ge blockchain exception from command line option
|
|
|
|
*
|
|
|
|
* If not given, provide default path
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
get_blockchain_path(const boost::optional<string>& bc_path,
|
|
|
|
bf::path& blockchain_path,
|
|
|
|
cryptonote::network_type nettype)
|
|
|
|
{
|
|
|
|
// the default folder of the lmdb blockchain database
|
|
|
|
string default_lmdb_dir = xmreg::get_default_lmdb_folder(nettype);
|
|
|
|
|
|
|
|
blockchain_path = bc_path
|
|
|
|
? bf::path(*bc_path)
|
|
|
|
: bf::path(default_lmdb_dir);
|
|
|
|
|
|
|
|
if (!bf::is_directory(blockchain_path))
|
|
|
|
{
|
|
|
|
cerr << "Given path \"" << blockchain_path << "\" "
|
|
|
|
<< "is not a folder or does not exist" << " "
|
|
|
|
<< endl;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
blockchain_path = xmreg::remove_trailing_path_separator(blockchain_path);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
sum_money_in_outputs(const transaction& tx)
|
|
|
|
{
|
|
|
|
uint64_t sum_xmr {0};
|
|
|
|
|
|
|
|
for (const tx_out& txout: tx.vout)
|
|
|
|
{
|
|
|
|
sum_xmr += txout.amount;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
}
|
|
|
|
|
|
|
|
pair<uint64_t, uint64_t>
|
|
|
|
sum_money_in_outputs(const string& json_str)
|
|
|
|
{
|
|
|
|
pair<uint64_t, uint64_t> sum_xmr {0, 0};
|
|
|
|
|
|
|
|
json j;
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
j = json::parse( json_str);
|
|
|
|
}
|
|
|
|
catch (std::invalid_argument& e)
|
|
|
|
{
|
|
|
|
cerr << "sum_money_in_outputs: " << e.what() << endl;
|
|
|
|
return sum_xmr;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (json& vout: j["vout"])
|
|
|
|
{
|
|
|
|
sum_xmr.first += vout["amount"].get<uint64_t>();
|
|
|
|
++sum_xmr.second;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
pair<uint64_t, uint64_t>
|
|
|
|
sum_money_in_outputs(const json& _json)
|
|
|
|
{
|
|
|
|
pair<uint64_t, uint64_t> sum_xmr {0ULL, 0ULL};
|
|
|
|
|
|
|
|
for (const json& vout: _json["vout"])
|
|
|
|
{
|
|
|
|
sum_xmr.first += vout["amount"].get<uint64_t>();
|
|
|
|
++sum_xmr.second;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
array<uint64_t, 4>
|
|
|
|
summary_of_in_out_rct(
|
|
|
|
const transaction& tx,
|
|
|
|
vector<pair<txout_to_key, uint64_t>>& output_pub_keys,
|
|
|
|
vector<txin_to_key>& input_key_imgs)
|
|
|
|
{
|
|
|
|
|
|
|
|
uint64_t xmr_outputs {0};
|
|
|
|
uint64_t xmr_inputs {0};
|
|
|
|
uint64_t mixin_no {0};
|
|
|
|
uint64_t num_nonrct_inputs {0};
|
|
|
|
|
|
|
|
|
|
|
|
for (const tx_out& txout: tx.vout)
|
|
|
|
{
|
|
|
|
if (txout.target.type() != typeid(txout_to_key))
|
|
|
|
{
|
|
|
|
// push empty pair.
|
|
|
|
output_pub_keys.push_back(pair<txout_to_key, uint64_t>{});
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const txout_to_key& txout_key
|
|
|
|
= boost::get<cryptonote::txout_to_key>(txout.target);
|
|
|
|
|
|
|
|
output_pub_keys.push_back(make_pair(txout_key, txout.amount));
|
|
|
|
|
|
|
|
xmr_outputs += txout.amount;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t input_no = tx.vin.size();
|
|
|
|
|
|
|
|
for (size_t i = 0; i < input_no; ++i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if(tx.vin[i].type() != typeid(cryptonote::txin_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const cryptonote::txin_to_key& tx_in_to_key
|
|
|
|
= boost::get<cryptonote::txin_to_key>(tx.vin[i]);
|
|
|
|
|
|
|
|
xmr_inputs += tx_in_to_key.amount;
|
|
|
|
|
|
|
|
if (tx_in_to_key.amount != 0)
|
|
|
|
{
|
|
|
|
++num_nonrct_inputs;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mixin_no == 0)
|
|
|
|
{
|
|
|
|
mixin_no = tx_in_to_key.key_offsets.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
input_key_imgs.push_back(tx_in_to_key);
|
|
|
|
|
|
|
|
} // for (size_t i = 0; i < input_no; ++i)
|
|
|
|
|
|
|
|
|
|
|
|
return {xmr_outputs, xmr_inputs, mixin_no, num_nonrct_inputs};
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
// this version for mempool txs from json
|
|
|
|
array<uint64_t, 6>
|
|
|
|
summary_of_in_out_rct(const json& _json)
|
|
|
|
{
|
|
|
|
uint64_t xmr_outputs {0};
|
|
|
|
uint64_t xmr_inputs {0};
|
|
|
|
uint64_t no_outputs {0};
|
|
|
|
uint64_t no_inputs {0};
|
|
|
|
uint64_t mixin_no {0};
|
|
|
|
uint64_t num_nonrct_inputs {0};
|
|
|
|
|
|
|
|
for (const json& vout: _json["vout"])
|
|
|
|
{
|
|
|
|
xmr_outputs += vout["amount"].get<uint64_t>();
|
|
|
|
}
|
|
|
|
|
|
|
|
no_outputs = _json["vout"].size();
|
|
|
|
|
|
|
|
for (const json& vin: _json["vin"])
|
|
|
|
{
|
|
|
|
uint64_t amount = vin["key"]["amount"].get<uint64_t>();
|
|
|
|
|
|
|
|
xmr_inputs += amount;
|
|
|
|
|
|
|
|
if (amount != 0)
|
|
|
|
++num_nonrct_inputs;
|
|
|
|
}
|
|
|
|
|
|
|
|
no_inputs = _json["vin"].size();
|
|
|
|
|
|
|
|
mixin_no = _json["vin"].at(0)["key"]["key_offsets"].size() - 1;
|
|
|
|
|
|
|
|
return {xmr_outputs, xmr_inputs, no_outputs, no_inputs, mixin_no, num_nonrct_inputs};
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
sum_money_in_inputs(const transaction& tx)
|
|
|
|
{
|
|
|
|
uint64_t sum_xmr {0};
|
|
|
|
|
|
|
|
size_t input_no = tx.vin.size();
|
|
|
|
|
|
|
|
for (size_t i = 0; i < input_no; ++i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if(tx.vin[i].type() != typeid(cryptonote::txin_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const cryptonote::txin_to_key& tx_in_to_key
|
|
|
|
= boost::get<cryptonote::txin_to_key>(tx.vin[i]);
|
|
|
|
|
|
|
|
sum_xmr += tx_in_to_key.amount;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
}
|
|
|
|
|
|
|
|
pair<uint64_t, uint64_t>
|
|
|
|
sum_money_in_inputs(const string& json_str)
|
|
|
|
{
|
|
|
|
pair<uint64_t, uint64_t> sum_xmr {0, 0};
|
|
|
|
|
|
|
|
json j;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
j = json::parse( json_str);
|
|
|
|
}
|
|
|
|
catch (std::invalid_argument& e)
|
|
|
|
{
|
|
|
|
cerr << "sum_money_in_outputs: " << e.what() << endl;
|
|
|
|
return sum_xmr;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (json& vin: j["vin"])
|
|
|
|
{
|
|
|
|
sum_xmr.first += vin["key"]["amount"].get<uint64_t>();
|
|
|
|
++sum_xmr.second;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
pair<uint64_t, uint64_t>
|
|
|
|
sum_money_in_inputs(const json& _json)
|
|
|
|
{
|
|
|
|
pair<uint64_t, uint64_t> sum_xmr {0, 0};
|
|
|
|
|
|
|
|
for (const json& vin: _json["vin"])
|
|
|
|
{
|
|
|
|
sum_xmr.first += vin["key"]["amount"].get<uint64_t>();
|
|
|
|
++sum_xmr.second;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
count_nonrct_inputs(const transaction& tx)
|
|
|
|
{
|
|
|
|
uint64_t num {0};
|
|
|
|
|
|
|
|
size_t input_no = tx.vin.size();
|
|
|
|
|
|
|
|
for (size_t i = 0; i < input_no; ++i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if(tx.vin[i].type() != typeid(cryptonote::txin_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const cryptonote::txin_to_key& tx_in_to_key
|
|
|
|
= boost::get<cryptonote::txin_to_key>(tx.vin[i]);
|
|
|
|
|
|
|
|
if (tx_in_to_key.amount != 0)
|
|
|
|
++num;
|
|
|
|
}
|
|
|
|
|
|
|
|
return num;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
count_nonrct_inputs(const string& json_str)
|
|
|
|
{
|
|
|
|
uint64_t num {0};
|
|
|
|
|
|
|
|
json j;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
j = json::parse( json_str);
|
|
|
|
}
|
|
|
|
catch (std::invalid_argument& e)
|
|
|
|
{
|
|
|
|
cerr << "count_nonrct_inputs: " << e.what() << endl;
|
|
|
|
return num;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (json& vin: j["vin"])
|
|
|
|
{
|
|
|
|
uint64_t amount = vin["key"]["amount"].get<uint64_t>();
|
|
|
|
if (amount != 0)
|
|
|
|
++num;
|
|
|
|
}
|
|
|
|
|
|
|
|
return num;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
count_nonrct_inputs(const json& _json)
|
|
|
|
{
|
|
|
|
uint64_t num {0};
|
|
|
|
|
|
|
|
for (const json& vin: _json["vin"])
|
|
|
|
{
|
|
|
|
uint64_t amount = vin["key"]["amount"].get<uint64_t>();
|
|
|
|
if (amount != 0)
|
|
|
|
++num;
|
|
|
|
}
|
|
|
|
|
|
|
|
return num;
|
|
|
|
};
|
|
|
|
|
|
|
|
array<uint64_t, 2>
|
|
|
|
sum_money_in_tx(const transaction& tx)
|
|
|
|
{
|
|
|
|
array<uint64_t, 2> sum_xmr;
|
|
|
|
|
|
|
|
sum_xmr[0] = sum_money_in_inputs(tx);
|
|
|
|
sum_xmr[1] = sum_money_in_outputs(tx);
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
array<uint64_t, 2>
|
|
|
|
sum_money_in_txs(const vector<transaction>& txs)
|
|
|
|
{
|
|
|
|
array<uint64_t, 2> sum_xmr {0,0};
|
|
|
|
|
|
|
|
for (const transaction& tx: txs)
|
|
|
|
{
|
|
|
|
sum_xmr[0] += sum_money_in_inputs(tx);
|
|
|
|
sum_xmr[1] += sum_money_in_outputs(tx);
|
|
|
|
}
|
|
|
|
|
|
|
|
return sum_xmr;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
sum_fees_in_txs(const vector<transaction>& txs)
|
|
|
|
{
|
|
|
|
uint64_t fees_sum {0};
|
|
|
|
|
|
|
|
for (const transaction& tx: txs)
|
|
|
|
{
|
|
|
|
fees_sum += get_tx_fee(tx);
|
|
|
|
}
|
|
|
|
|
|
|
|
return fees_sum;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector<pair<txout_to_key, uint64_t>>
|
|
|
|
get_ouputs(const transaction& tx)
|
|
|
|
{
|
|
|
|
vector<pair<txout_to_key, uint64_t>> outputs;
|
|
|
|
|
|
|
|
for (const tx_out& txout: tx.vout)
|
|
|
|
{
|
|
|
|
if (txout.target.type() != typeid(txout_to_key))
|
|
|
|
{
|
|
|
|
// push empty pair.
|
|
|
|
outputs.push_back(pair<txout_to_key, uint64_t>{});
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const txout_to_key& txout_key
|
|
|
|
= boost::get<cryptonote::txout_to_key>(txout.target);
|
|
|
|
|
|
|
|
outputs.push_back(make_pair(txout_key, txout.amount));
|
|
|
|
}
|
|
|
|
|
|
|
|
return outputs;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
vector<tuple<txout_to_key, uint64_t, uint64_t>>
|
|
|
|
get_ouputs_tuple(const transaction& tx)
|
|
|
|
{
|
|
|
|
vector<tuple<txout_to_key, uint64_t, uint64_t>> outputs;
|
|
|
|
|
|
|
|
for (uint64_t n = 0; n < tx.vout.size(); ++n)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (tx.vout[n].target.type() != typeid(txout_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const txout_to_key& txout_key
|
|
|
|
= boost::get<cryptonote::txout_to_key>(tx.vout[n].target);
|
|
|
|
|
|
|
|
outputs.push_back(make_tuple(txout_key, tx.vout[n].amount, n));
|
|
|
|
}
|
|
|
|
|
|
|
|
return outputs;
|
|
|
|
};
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
get_mixin_no(const transaction& tx)
|
|
|
|
{
|
|
|
|
uint64_t mixin_no {0};
|
|
|
|
|
|
|
|
size_t input_no = tx.vin.size();
|
|
|
|
|
|
|
|
for (size_t i = 0; i < input_no; ++i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if(tx.vin[i].type() != typeid(cryptonote::txin_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const txin_to_key& tx_in_to_key
|
|
|
|
= boost::get<cryptonote::txin_to_key>(tx.vin[i]);
|
|
|
|
|
|
|
|
mixin_no = tx_in_to_key.key_offsets.size();
|
|
|
|
|
|
|
|
// look for first mixin number.
|
|
|
|
// all inputs in a single transaction have same number
|
|
|
|
if (mixin_no > 0)
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return mixin_no;
|
|
|
|
}
|
|
|
|
vector<uint64_t>
|
|
|
|
get_mixin_no(const string& json_str)
|
|
|
|
{
|
|
|
|
vector<uint64_t> mixin_no;
|
|
|
|
|
|
|
|
json j;
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
j = json::parse(json_str);
|
|
|
|
|
|
|
|
mixin_no.push_back(j["vin"].at(0)["key"]["key_offsets"].size());
|
|
|
|
}
|
|
|
|
catch (std::invalid_argument& e)
|
|
|
|
{
|
|
|
|
cerr << "get_mixin_no: " << e.what() << endl;
|
|
|
|
return mixin_no;
|
|
|
|
}
|
|
|
|
|
|
|
|
return mixin_no;
|
|
|
|
}
|
|
|
|
|
|
|
|
vector<uint64_t>
|
|
|
|
get_mixin_no(const json& _json)
|
|
|
|
{
|
|
|
|
vector<uint64_t> mixin_no;
|
|
|
|
|
|
|
|
mixin_no.push_back(_json["vin"].at(0)["key"]["key_offsets"].size());
|
|
|
|
|
|
|
|
return mixin_no;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector<uint64_t>
|
|
|
|
get_mixin_no_in_txs(const vector<transaction>& txs)
|
|
|
|
{
|
|
|
|
vector<uint64_t> mixin_no;
|
|
|
|
|
|
|
|
for (const transaction& tx: txs)
|
|
|
|
{
|
|
|
|
mixin_no.push_back(get_mixin_no(tx));
|
|
|
|
}
|
|
|
|
|
|
|
|
return mixin_no;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
vector<txin_to_key>
|
|
|
|
get_key_images(const transaction& tx)
|
|
|
|
{
|
|
|
|
vector<txin_to_key> key_images;
|
|
|
|
|
|
|
|
size_t input_no = tx.vin.size();
|
|
|
|
|
|
|
|
for (size_t i = 0; i < input_no; ++i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if(tx.vin[i].type() != typeid(txin_to_key))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// get tx input key
|
|
|
|
const txin_to_key& tx_in_to_key
|
|
|
|
= boost::get<cryptonote::txin_to_key>(tx.vin[i]);
|
|
|
|
|
|
|
|
key_images.push_back(tx_in_to_key);
|
|
|
|
}
|
|
|
|
|
|
|
|
return key_images;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
get_payment_id(const vector<uint8_t>& extra,
|
|
|
|
crypto::hash& payment_id,
|
|
|
|
crypto::hash8& payment_id8)
|
|
|
|
{
|
|
|
|
payment_id = null_hash;
|
|
|
|
payment_id8 = null_hash8;
|
|
|
|
|
|
|
|
std::vector<tx_extra_field> tx_extra_fields;
|
|
|
|
|
|
|
|
if(!parse_tx_extra(extra, tx_extra_fields))
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
tx_extra_nonce extra_nonce;
|
|
|
|
|
|
|
|
if (find_tx_extra_field_by_type(tx_extra_fields, extra_nonce))
|
|
|
|
{
|
|
|
|
// first check for encrypted id and then for normal one
|
|
|
|
if(get_encrypted_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id8))
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
else if (get_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id))
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
get_payment_id(const transaction& tx,
|
|
|
|
crypto::hash& payment_id,
|
|
|
|
crypto::hash8& payment_id8)
|
|
|
|
{
|
|
|
|
return get_payment_id(tx.extra, payment_id, payment_id8);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
array<size_t, 5>
|
|
|
|
timestamp_difference(uint64_t t1, uint64_t t2)
|
|
|
|
{
|
|
|
|
|
|
|
|
uint64_t timestamp_diff = t1 - t2;
|
|
|
|
|
|
|
|
// calculate difference of timestamps from current block to the mixin one
|
|
|
|
if (t2 > t1)
|
|
|
|
{
|
|
|
|
timestamp_diff = t2 - t1;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t time_diff_years = timestamp_diff / 31536000;
|
|
|
|
|
|
|
|
timestamp_diff -= time_diff_years * 31536000;
|
|
|
|
|
|
|
|
uint64_t time_diff_days = timestamp_diff / 86400;
|
|
|
|
|
|
|
|
timestamp_diff -= time_diff_days * 86400;
|
|
|
|
|
|
|
|
uint64_t time_diff_hours = timestamp_diff / 3600;
|
|
|
|
|
|
|
|
timestamp_diff -= time_diff_hours * 3600;
|
|
|
|
|
|
|
|
uint64_t time_diff_minutes = timestamp_diff / 60;
|
|
|
|
|
|
|
|
timestamp_diff -= time_diff_minutes * 60;
|
|
|
|
|
|
|
|
uint64_t time_diff_seconds = timestamp_diff ;
|
|
|
|
|
|
|
|
return array<size_t, 5> {time_diff_years, time_diff_days,
|
|
|
|
time_diff_hours, time_diff_minutes,
|
|
|
|
time_diff_seconds};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
string
|
|
|
|
read(string filename)
|
|
|
|
{
|
|
|
|
if (!bf::exists(bf::path(filename)))
|
|
|
|
{
|
|
|
|
cerr << "File does not exist: " << filename << endl;
|
|
|
|
return string();
|
|
|
|
}
|
|
|
|
|
|
|
|
std::ifstream t(filename);
|
|
|
|
return string(std::istreambuf_iterator<char>(t),
|
|
|
|
std::istreambuf_iterator<char>());
|
|
|
|
}
|
|
|
|
|
|
|
|
pair<string, double>
|
|
|
|
timestamps_time_scale(const vector<uint64_t>& timestamps,
|
|
|
|
uint64_t timeN,
|
|
|
|
uint64_t resolution,
|
|
|
|
uint64_t time0)
|
|
|
|
{
|
|
|
|
string empty_time = string(resolution, '_');
|
|
|
|
|
|
|
|
size_t time_axis_length = empty_time.size();
|
|
|
|
|
|
|
|
uint64_t interval_length = timeN-time0;
|
|
|
|
|
|
|
|
double scale = double(interval_length) / double(time_axis_length);
|
|
|
|
|
|
|
|
for (const auto& timestamp: timestamps)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (timestamp < time0 || timestamp > timeN)
|
|
|
|
{
|
|
|
|
cout << "Out of range" << endl;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t timestamp_place = double(timestamp-time0)
|
|
|
|
/ double(interval_length)*(time_axis_length - 1);
|
|
|
|
|
|
|
|
empty_time[timestamp_place + 1] = '*';
|
|
|
|
}
|
|
|
|
|
|
|
|
return make_pair(empty_time, scale);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
decode_ringct(const rct::rctSig& rv,
|
|
|
|
const crypto::public_key pub,
|
|
|
|
const crypto::secret_key &sec,
|
|
|
|
unsigned int i,
|
|
|
|
rct::key & mask,
|
|
|
|
uint64_t & amount)
|
|
|
|
{
|
|
|
|
crypto::key_derivation derivation;
|
|
|
|
|
|
|
|
bool r = crypto::generate_key_derivation(pub, sec, derivation);
|
|
|
|
|
|
|
|
if (!r)
|
|
|
|
{
|
|
|
|
cerr <<"Failed to generate key derivation to decode rct output " << i << endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return decode_ringct(rv, derivation, i, mask, amount);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
decode_ringct(rct::rctSig const& rv,
|
|
|
|
crypto::key_derivation const& derivation,
|
|
|
|
unsigned int i,
|
|
|
|
rct::key& mask,
|
|
|
|
uint64_t& amount)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
crypto::secret_key scalar1;
|
|
|
|
|
|
|
|
crypto::derivation_to_scalar(derivation, i, scalar1);
|
|
|
|
|
|
|
|
switch (rv.type)
|
|
|
|
{
|
|
|
|
case rct::RCTTypeSimple:
|
|
|
|
case rct::RCTTypeSimpleBulletproof:
|
|
|
|
amount = rct::decodeRctSimple(rv,
|
|
|
|
rct::sk2rct(scalar1),
|
|
|
|
i,
|
|
|
|
mask,
|
|
|
|
hw::get_device("default"));
|
|
|
|
break;
|
|
|
|
case rct::RCTTypeFull:
|
|
|
|
case rct::RCTTypeFullBulletproof:
|
|
|
|
amount = rct::decodeRct(rv,
|
|
|
|
rct::sk2rct(scalar1),
|
|
|
|
i,
|
|
|
|
mask,
|
|
|
|
hw::get_device("default"));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
cerr << "Unsupported rct type: " << rv.type << '\n';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (...)
|
|
|
|
{
|
|
|
|
cerr << "Failed to decode input " << i << '\n';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
url_decode(const std::string& in, std::string& out)
|
|
|
|
{
|
|
|
|
out.clear();
|
|
|
|
out.reserve(in.size());
|
|
|
|
for (std::size_t i = 0; i < in.size(); ++i)
|
|
|
|
{
|
|
|
|
if (in[i] == '%')
|
|
|
|
{
|
|
|
|
if (i + 3 <= in.size())
|
|
|
|
{
|
|
|
|
int value = 0;
|
|
|
|
std::istringstream is(in.substr(i + 1, 2));
|
|
|
|
if (is >> std::hex >> value)
|
|
|
|
{
|
|
|
|
out += static_cast<char>(value);
|
|
|
|
i += 2;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (in[i] == '+')
|
|
|
|
{
|
|
|
|
out += ' ';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
out += in[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
map<std::string, std::string>
|
|
|
|
parse_crow_post_data(const string& req_body)
|
|
|
|
{
|
|
|
|
map<std::string, std::string> body;
|
|
|
|
|
|
|
|
vector<string> vec;
|
|
|
|
string tmp;
|
|
|
|
bool result = url_decode(req_body, tmp);
|
|
|
|
if (result)
|
|
|
|
{
|
|
|
|
boost::algorithm::split(vec, tmp,
|
|
|
|
[](char x) {return x == '&';
|
|
|
|
});
|
|
|
|
|
|
|
|
for(auto &it : vec)
|
|
|
|
{
|
|
|
|
auto pos = it.find("=");
|
|
|
|
|
|
|
|
if (pos != string::npos)
|
|
|
|
body[it.substr(0, pos)] = it.substr(pos + 1);
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return body;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// from wallet2::decrypt
|
|
|
|
string
|
|
|
|
decrypt(const std::string &ciphertext,
|
|
|
|
const crypto::secret_key &skey,
|
|
|
|
bool authenticated)
|
|
|
|
{
|
|
|
|
|
|
|
|
const size_t prefix_size = sizeof(chacha_iv)
|
|
|
|
+ (authenticated ? sizeof(crypto::signature) : 0);
|
|
|
|
if (ciphertext.size() < prefix_size)
|
|
|
|
{
|
|
|
|
cerr << "Unexpected ciphertext size" << endl;
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto::chacha_key key;
|
|
|
|
crypto::generate_chacha_key(&skey, sizeof(skey), key);
|
|
|
|
|
|
|
|
const crypto::chacha_iv &iv = *(const crypto::chacha_iv*)&ciphertext[0];
|
|
|
|
|
|
|
|
std::string plaintext;
|
|
|
|
|
|
|
|
plaintext.resize(ciphertext.size() - prefix_size);
|
|
|
|
|
|
|
|
if (authenticated)
|
|
|
|
{
|
|
|
|
crypto::hash hash;
|
|
|
|
crypto::cn_fast_hash(ciphertext.data(), ciphertext.size() - sizeof(signature), hash);
|
|
|
|
crypto::public_key pkey;
|
|
|
|
crypto::secret_key_to_public_key(skey, pkey);
|
|
|
|
|
|
|
|
const crypto::signature &signature =
|
|
|
|
*(const crypto::signature*)&ciphertext[ciphertext.size()
|
|
|
|
- sizeof(crypto::signature)];
|
|
|
|
|
|
|
|
if (!crypto::check_signature(hash, pkey, signature))
|
|
|
|
{
|
|
|
|
cerr << "Failed to authenticate criphertext" << endl;
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto::chacha8(ciphertext.data() + sizeof(iv),
|
|
|
|
ciphertext.size() - prefix_size,
|
|
|
|
key, iv, &plaintext[0]);
|
|
|
|
|
|
|
|
return plaintext;
|
|
|
|
}
|
|
|
|
|
|
|
|
// based on
|
|
|
|
// crypto::public_key wallet2::get_tx_pub_key_from_received_outs(const tools::wallet2::transfer_details &td) const
|
|
|
|
public_key
|
|
|
|
get_tx_pub_key_from_received_outs(const transaction &tx)
|
|
|
|
{
|
|
|
|
std::vector<tx_extra_field> tx_extra_fields;
|
|
|
|
|
|
|
|
if(!parse_tx_extra(tx.extra, tx_extra_fields))
|
|
|
|
{
|
|
|
|
// Extra may only be partially parsed, it's OK if tx_extra_fields contains public key
|
|
|
|
}
|
|
|
|
|
|
|
|
// Due to a previous bug, there might be more than one tx pubkey in extra, one being
|
|
|
|
// the result of a previously discarded signature.
|
|
|
|
// For speed, since scanning for outputs is a slow process, we check whether extra
|
|
|
|
// contains more than one pubkey. If not, the first one is returned. If yes, they're
|
|
|
|
// checked for whether they yield at least one output
|
|
|
|
tx_extra_pub_key pub_key_field;
|
|
|
|
|
|
|
|
if (!find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, 0))
|
|
|
|
{
|
|
|
|
return null_pkey;
|
|
|
|
}
|
|
|
|
|
|
|
|
public_key tx_pub_key = pub_key_field.pub_key;
|
|
|
|
|
|
|
|
bool two_found = find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, 1);
|
|
|
|
|
|
|
|
if (!two_found)
|
|
|
|
{
|
|
|
|
// easy case, just one found
|
|
|
|
return tx_pub_key;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// just return second one if there are two.
|
|
|
|
// this does not require private view key, as
|
|
|
|
// its not needed for my use case.
|
|
|
|
return pub_key_field.pub_key;
|
|
|
|
}
|
|
|
|
|
|
|
|
return null_pkey;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if given output (specified by output_index)
|
|
|
|
* belongs is ours based
|
|
|
|
* on our private view key and public spend key
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
is_output_ours(const size_t& output_index,
|
|
|
|
const transaction& tx,
|
|
|
|
const public_key& pub_tx_key,
|
|
|
|
const secret_key& private_view_key,
|
|
|
|
const public_key& public_spend_key)
|
|
|
|
{
|
|
|
|
// public transaction key is combined with our viewkey
|
|
|
|
// to create, so called, derived key.
|
|
|
|
key_derivation derivation;
|
|
|
|
|
|
|
|
if (!generate_key_derivation(pub_tx_key, private_view_key, derivation))
|
|
|
|
{
|
|
|
|
cerr << "Cant get dervied key for: " << "\n"
|
|
|
|
<< "pub_tx_key: " << pub_tx_key << " and "
|
|
|
|
<< "prv_view_key" << private_view_key << endl;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// get the tx output public key
|
|
|
|
// that normally would be generated for us,
|
|
|
|
// if someone had sent us some xmr.
|
|
|
|
public_key pubkey;
|
|
|
|
|
|
|
|
derive_public_key(derivation,
|
|
|
|
output_index,
|
|
|
|
public_spend_key,
|
|
|
|
pubkey);
|
|
|
|
|
|
|
|
//cout << "\n" << tx.vout.size() << " " << output_index << endl;
|
|
|
|
|
|
|
|
// get tx output public key
|
|
|
|
const txout_to_key tx_out_to_key
|
|
|
|
= boost::get<txout_to_key>(tx.vout[output_index].target);
|
|
|
|
|
|
|
|
|
|
|
|
if (tx_out_to_key.key == pubkey)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
get_real_output_for_key_image(const key_image& ki,
|
|
|
|
const transaction& tx,
|
|
|
|
const secret_key& private_view_key,
|
|
|
|
const public_key& public_spend_key,
|
|
|
|
uint64_t output_idx,
|
|
|
|
public_key output_pub_key)
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string
|
|
|
|
make_printable(const string& in_s)
|
|
|
|
{
|
|
|
|
string output;
|
|
|
|
|
|
|
|
for (char c: in_s)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (isprint(c))
|
|
|
|
{
|
|
|
|
output += c;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
switch(c){
|
|
|
|
case '\000': output += "\\000";break;
|
|
|
|
case '\001': output += "\\001";break;
|
|
|
|
case '\002': output += "\\002";break;
|
|
|
|
case '\003': output += "\\003";break;
|
|
|
|
case '\004': output += "\\004";break;
|
|
|
|
case '\005': output += "\\005";break;
|
|
|
|
case '\006': output += "\\006";break;
|
|
|
|
case '\007': output += "\\007";break;
|
|
|
|
// there are more case but for now its ok
|
|
|
|
default:
|
|
|
|
stringstream ss;
|
|
|
|
ss << std::hex << (int)c;
|
|
|
|
output += "0x" + ss.str();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return output;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string
|
|
|
|
get_human_readable_timestamp(uint64_t ts)
|
|
|
|
{
|
|
|
|
char buffer[64];
|
|
|
|
if (ts < 1234567890)
|
|
|
|
return "<unknown>";
|
|
|
|
|
|
|
|
time_t tt = ts;
|
|
|
|
|
|
|
|
struct tm tm;
|
|
|
|
|
|
|
|
gmtime_r(&tt, &tm);
|
|
|
|
|
|
|
|
strftime(buffer, sizeof(buffer), "%Y-%m-%d %I:%M:%S", &tm);
|
|
|
|
|
|
|
|
return std::string(buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
pause_execution(uint64_t no_seconds, const string& text)
|
|
|
|
{
|
|
|
|
|
|
|
|
cout << "\nPausing " << text
|
|
|
|
<< " for " << no_seconds << " seconds: "
|
|
|
|
<< flush;
|
|
|
|
|
|
|
|
for (size_t i = 0; i < no_seconds; ++i)
|
|
|
|
{
|
|
|
|
cout << "." << flush;
|
|
|
|
std::this_thread::sleep_for(std::chrono::seconds(1));
|
|
|
|
}
|
|
|
|
|
|
|
|
cout << endl;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|