// // Created by marcin on 5/11/15. // #include "tools.h" #include #include namespace xmreg { /** * Parse key string, e.g., a viewkey in a string * into crypto::secret_key or crypto::public_key * depending on the template argument. */ template bool parse_str_secret_key(const string& key_str, T& secret_key) { // hash and keys have same structure, so to parse string of // a key, e.g., a view key, we can first parse it into the hash // object using parse_hash256 function, and then copy the reslting // hash data into secret key. crypto::hash hash_; if(!parse_hash256(key_str, hash_)) { cerr << "Cant parse a key (e.g. viewkey): " << key_str << endl; return false; } // crypto::hash and crypto::secret_key have basicly same // structure. They both keep they key/hash as c-style char array // of fixed size. Thus we can just copy data from hash // to key copy(begin(hash_.data), end(hash_.data), secret_key.data); return true; } // explicit instantiations of get template function template bool parse_str_secret_key(const string& key_str, crypto::secret_key& secret_key); template bool parse_str_secret_key(const string& key_str, crypto::public_key& secret_key); template bool parse_str_secret_key(const string& key_str, crypto::hash& secret_key); /** * Get transaction tx using given tx hash. Hash is represent as string here, * so before we can tap into the blockchain, we need to pare it into * crypto::hash object. */ bool get_tx_pub_key_from_str_hash(Blockchain& core_storage, const string& hash_str, transaction& tx) { crypto::hash tx_hash; parse_hash256(hash_str, tx_hash); try { // get transaction with given hash tx = core_storage.get_db().get_tx(tx_hash); } catch (const TX_DNE& e) { cerr << e.what() << endl; return false; } return true; } /** * Parse monero address in a string form into * cryptonote::account_public_address object */ bool parse_str_address(const string& address_str, address_parse_info& address_info, cryptonote::network_type nettype) { if (!get_account_address_from_str(address_info, nettype, address_str)) { cerr << "Error getting address: " << address_str << endl; return false; } return true; } /** * Return string representation of monero address */ string print_address(const address_parse_info& address_info, cryptonote::network_type nettype) { return "<" + get_account_address_as_str( nettype, address_info.is_subaddress, address_info.address) + ">"; } string print_sig (const signature& sig) { stringstream ss; ss << "c: <" << epee::string_tools::pod_to_hex(sig.c) << "> " << "r: <" << epee::string_tools::pod_to_hex(sig.r) << ">"; return ss.str(); } /** * Check if a character is a path seprator */ inline bool is_separator(char c) { // default linux path separator const char separator = PATH_SEPARARTOR; return c == separator; } /** * Remove trailinig path separator. */ string remove_trailing_path_separator(const string& in_path) { string new_string = in_path; if (!new_string.empty() && is_separator(new_string[new_string.size() - 1])) new_string.erase(new_string.size() - 1); return new_string; } bf::path remove_trailing_path_separator(const bf::path& in_path) { #ifdef WIN32 std::wstring_convert, wchar_t> converter; string path_str = converter.to_bytes(in_path.native()); #else string path_str = in_path.native(); #endif return bf::path(remove_trailing_path_separator(path_str)); } //string //timestamp_to_str(time_t timestamp, const char* format) //{ // return get_human_readable_timestamp(timestamp); //} string timestamp_to_str_gm(time_t timestamp, const char* format) { const time_t* t = ×tamp; const int TIME_LENGTH = 60; char str_buff[TIME_LENGTH]; std::tm tmp; gmtime_r(t, &tmp); size_t len; len = std::strftime(str_buff, TIME_LENGTH, format, &tmp); return string(str_buff, len); } ostream& operator<< (ostream& os, const address_parse_info& addr_info) { os << get_account_address_as_str(network_type::MAINNET, addr_info.is_subaddress, addr_info.address); return os; } /* * Generate key_image of foran ith output */ bool generate_key_image(const crypto::key_derivation& derivation, const std::size_t i, const crypto::secret_key& sec_key, const crypto::public_key& pub_key, crypto::key_image& key_img) { cryptonote::keypair in_ephemeral; if (!crypto::derive_public_key(derivation, i, pub_key, in_ephemeral.pub)) { cerr << "Error generating publick key " << pub_key << endl; return false; } try { crypto::derive_secret_key(derivation, i, sec_key, in_ephemeral.sec); } catch(const std::exception& e) { cerr << "Error generate secret image: " << e.what() << endl; return false; } try { crypto::generate_key_image(in_ephemeral.pub, in_ephemeral.sec, key_img); } catch(const std::exception& e) { cerr << "Error generate key image: " << e.what() << endl; return false; } return true; } string get_default_lmdb_folder(cryptonote::network_type nettype) { // default path to monero folder // on linux this is /home//.bitmonero string default_monero_dir = tools::get_default_data_dir(); if (nettype == cryptonote::network_type::TESTNET) default_monero_dir += "/testnet"; if (nettype == cryptonote::network_type::STAGENET) default_monero_dir += "/stagenet"; // the default folder of the lmdb blockchain database // is therefore as follows return default_monero_dir + string("/lmdb"); } /* * Ge blockchain exception from command line option * * If not given, provide default path */ bool get_blockchain_path(const boost::optional& bc_path, bf::path& blockchain_path, cryptonote::network_type nettype) { // the default folder of the lmdb blockchain database string default_lmdb_dir = xmreg::get_default_lmdb_folder(nettype); blockchain_path = bc_path ? bf::path(*bc_path) : bf::path(default_lmdb_dir); if (!bf::is_directory(blockchain_path)) { cerr << "Given path \"" << blockchain_path << "\" " << "is not a folder or does not exist" << " " << endl; return false; } blockchain_path = xmreg::remove_trailing_path_separator(blockchain_path); return true; } uint64_t sum_money_in_outputs(const transaction& tx) { uint64_t sum_xmr {0}; for (const tx_out& txout: tx.vout) { sum_xmr += txout.amount; } return sum_xmr; } pair sum_money_in_outputs(const string& json_str) { pair sum_xmr {0, 0}; json j; try { j = json::parse( json_str); } catch (std::invalid_argument& e) { cerr << "sum_money_in_outputs: " << e.what() << endl; return sum_xmr; } for (json& vout: j["vout"]) { sum_xmr.first += vout["amount"].get(); ++sum_xmr.second; } return sum_xmr; }; pair sum_money_in_outputs(const json& _json) { pair sum_xmr {0ULL, 0ULL}; for (const json& vout: _json["vout"]) { sum_xmr.first += vout["amount"].get(); ++sum_xmr.second; } return sum_xmr; }; array summary_of_in_out_rct( const transaction& tx, vector& output_pub_keys, vector& input_key_imgs) { uint64_t xmr_outputs {0}; uint64_t xmr_inputs {0}; uint64_t mixin_no {0}; uint64_t num_nonrct_inputs {0}; for (const tx_out& txout: tx.vout) { public_key output_pub_key; if (!cryptonote::get_output_public_key(txout, output_pub_key)) { // push empty pair. output_pub_keys.push_back(output_tuple_with_tag { public_key{}, uint64_t{}, boost::none }); continue; } boost::optional output_tag; if (txout.target.type() == typeid(txout_to_tagged_key)) { output_tag = boost::get< txout_to_tagged_key >(txout.target).view_tag; } output_pub_keys.push_back( make_tuple(output_pub_key, txout.amount, output_tag)); xmr_outputs += txout.amount; } size_t input_no = tx.vin.size(); for (size_t i = 0; i < input_no; ++i) { if(tx.vin[i].type() != typeid(cryptonote::txin_to_key)) { continue; } // get tx input key const cryptonote::txin_to_key& tx_in_to_key = boost::get(tx.vin[i]); xmr_inputs += tx_in_to_key.amount; if (tx_in_to_key.amount != 0) { ++num_nonrct_inputs; } if (mixin_no == 0) { mixin_no = tx_in_to_key.key_offsets.size(); } input_key_imgs.push_back(tx_in_to_key); } // for (size_t i = 0; i < input_no; ++i) return {xmr_outputs, xmr_inputs, mixin_no, num_nonrct_inputs}; }; // this version for mempool txs from json array summary_of_in_out_rct(const json& _json) { uint64_t xmr_outputs {0}; uint64_t xmr_inputs {0}; uint64_t no_outputs {0}; uint64_t no_inputs {0}; uint64_t mixin_no {0}; uint64_t num_nonrct_inputs {0}; for (const json& vout: _json["vout"]) { xmr_outputs += vout["amount"].get(); } no_outputs = _json["vout"].size(); for (const json& vin: _json["vin"]) { uint64_t amount = vin["key"]["amount"].get(); xmr_inputs += amount; if (amount != 0) ++num_nonrct_inputs; } no_inputs = _json["vin"].size(); mixin_no = _json["vin"].at(0)["key"]["key_offsets"].size() - 1; return {xmr_outputs, xmr_inputs, no_outputs, no_inputs, mixin_no, num_nonrct_inputs}; }; uint64_t sum_money_in_inputs(const transaction& tx) { uint64_t sum_xmr {0}; size_t input_no = tx.vin.size(); for (size_t i = 0; i < input_no; ++i) { if(tx.vin[i].type() != typeid(cryptonote::txin_to_key)) { continue; } // get tx input key const cryptonote::txin_to_key& tx_in_to_key = boost::get(tx.vin[i]); sum_xmr += tx_in_to_key.amount; } return sum_xmr; } pair sum_money_in_inputs(const string& json_str) { pair sum_xmr {0, 0}; json j; try { j = json::parse( json_str); } catch (std::invalid_argument& e) { cerr << "sum_money_in_outputs: " << e.what() << endl; return sum_xmr; } for (json& vin: j["vin"]) { sum_xmr.first += vin["key"]["amount"].get(); ++sum_xmr.second; } return sum_xmr; }; pair sum_money_in_inputs(const json& _json) { pair sum_xmr {0, 0}; for (const json& vin: _json["vin"]) { sum_xmr.first += vin["key"]["amount"].get(); ++sum_xmr.second; } return sum_xmr; }; uint64_t count_nonrct_inputs(const transaction& tx) { uint64_t num {0}; size_t input_no = tx.vin.size(); for (size_t i = 0; i < input_no; ++i) { if(tx.vin[i].type() != typeid(cryptonote::txin_to_key)) { continue; } // get tx input key const cryptonote::txin_to_key& tx_in_to_key = boost::get(tx.vin[i]); if (tx_in_to_key.amount != 0) ++num; } return num; } uint64_t count_nonrct_inputs(const string& json_str) { uint64_t num {0}; json j; try { j = json::parse( json_str); } catch (std::invalid_argument& e) { cerr << "count_nonrct_inputs: " << e.what() << endl; return num; } for (json& vin: j["vin"]) { uint64_t amount = vin["key"]["amount"].get(); if (amount != 0) ++num; } return num; }; uint64_t count_nonrct_inputs(const json& _json) { uint64_t num {0}; for (const json& vin: _json["vin"]) { uint64_t amount = vin["key"]["amount"].get(); if (amount != 0) ++num; } return num; }; array sum_money_in_tx(const transaction& tx) { array sum_xmr; sum_xmr[0] = sum_money_in_inputs(tx); sum_xmr[1] = sum_money_in_outputs(tx); return sum_xmr; }; array sum_money_in_txs(const vector& txs) { array sum_xmr {0,0}; for (const transaction& tx: txs) { sum_xmr[0] += sum_money_in_inputs(tx); sum_xmr[1] += sum_money_in_outputs(tx); } return sum_xmr; }; uint64_t sum_fees_in_txs(const vector& txs) { uint64_t fees_sum {0}; for (const transaction& tx: txs) { fees_sum += get_tx_fee(tx); } return fees_sum; } vector get_ouputs(const transaction& tx) { vector outputs; for (const tx_out& txout: tx.vout) { public_key output_pub_key; if (!cryptonote::get_output_public_key(txout, output_pub_key)) { // push empty tuple. outputs.push_back(output_tuple_with_tag { public_key{}, uint64_t{}, boost::none }); continue; } boost::optional output_tag; if (txout.target.type() == typeid(txout_to_tagged_key)) { output_tag = boost::get< txout_to_tagged_key >(txout.target) .view_tag; } outputs.push_back(make_tuple(output_pub_key, txout.amount, output_tag)); } return outputs; }; vector> get_ouputs_tuple(const transaction& tx) { vector> outputs; for (uint64_t n = 0; n < tx.vout.size(); ++n) { public_key output_pub_key; if (!cryptonote::get_output_public_key(tx.vout[n], output_pub_key)) { continue; } outputs.push_back(make_tuple(output_pub_key, tx.vout[n].amount, n)); } return outputs; }; uint64_t get_mixin_no(const transaction& tx) { uint64_t mixin_no {0}; size_t input_no = tx.vin.size(); for (size_t i = 0; i < input_no; ++i) { if(tx.vin[i].type() != typeid(cryptonote::txin_to_key)) { continue; } // get tx input key const txin_to_key& tx_in_to_key = boost::get(tx.vin[i]); mixin_no = tx_in_to_key.key_offsets.size(); // look for first mixin number. // all inputs in a single transaction have same number if (mixin_no > 0) { break; } } return mixin_no; } vector get_mixin_no(const string& json_str) { vector mixin_no; json j; try { j = json::parse(json_str); mixin_no.push_back(j["vin"].at(0)["key"]["key_offsets"].size()); } catch (std::invalid_argument& e) { cerr << "get_mixin_no: " << e.what() << endl; return mixin_no; } return mixin_no; } vector get_mixin_no(const json& _json) { vector mixin_no; mixin_no.push_back(_json["vin"].at(0)["key"]["key_offsets"].size()); return mixin_no; } vector get_mixin_no_in_txs(const vector& txs) { vector mixin_no; for (const transaction& tx: txs) { mixin_no.push_back(get_mixin_no(tx)); } return mixin_no; } vector get_key_images(const transaction& tx) { vector key_images; size_t input_no = tx.vin.size(); for (size_t i = 0; i < input_no; ++i) { if(tx.vin[i].type() != typeid(txin_to_key)) { continue; } // get tx input key const txin_to_key& tx_in_to_key = boost::get(tx.vin[i]); key_images.push_back(tx_in_to_key); } return key_images; } bool get_payment_id(const vector& extra, crypto::hash& payment_id, crypto::hash8& payment_id8) { payment_id = null_hash; payment_id8 = null_hash8; std::vector tx_extra_fields; if(!parse_tx_extra(extra, tx_extra_fields)) { return false; } tx_extra_nonce extra_nonce; if (find_tx_extra_field_by_type(tx_extra_fields, extra_nonce)) { // first check for encrypted id and then for normal one if(get_encrypted_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id8)) { return true; } else if (get_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id)) { return true; } } return false; } bool get_payment_id(const transaction& tx, crypto::hash& payment_id, crypto::hash8& payment_id8) { return get_payment_id(tx.extra, payment_id, payment_id8); } array timestamp_difference(uint64_t t1, uint64_t t2) { uint64_t timestamp_diff = t1 - t2; // calculate difference of timestamps from current block to the mixin one if (t2 > t1) { timestamp_diff = t2 - t1; } uint64_t time_diff_years = timestamp_diff / 31536000; timestamp_diff -= time_diff_years * 31536000; uint64_t time_diff_days = timestamp_diff / 86400; timestamp_diff -= time_diff_days * 86400; uint64_t time_diff_hours = timestamp_diff / 3600; timestamp_diff -= time_diff_hours * 3600; uint64_t time_diff_minutes = timestamp_diff / 60; timestamp_diff -= time_diff_minutes * 60; uint64_t time_diff_seconds = timestamp_diff ; return array {time_diff_years, time_diff_days, time_diff_hours, time_diff_minutes, time_diff_seconds}; }; string read(string filename) { if (!bf::exists(bf::path(filename))) { cerr << "File does not exist: " << filename << endl; return string(); } std::ifstream t(filename); return string(std::istreambuf_iterator(t), std::istreambuf_iterator()); } pair timestamps_time_scale(const vector& timestamps, uint64_t timeN, uint64_t resolution, uint64_t time0) { string empty_time = string(resolution, '_'); size_t time_axis_length = empty_time.size(); uint64_t interval_length = timeN-time0; double scale = double(interval_length) / double(time_axis_length); for (const auto& timestamp: timestamps) { if (timestamp < time0 || timestamp > timeN) { cout << "Out of range" << endl; continue; } uint64_t timestamp_place = double(timestamp-time0) / double(interval_length)*(time_axis_length - 1); empty_time[timestamp_place + 1] = '*'; } return make_pair(empty_time, scale); } bool decode_ringct(const rct::rctSig& rv, const crypto::public_key pub, const crypto::secret_key &sec, unsigned int i, rct::key & mask, uint64_t & amount) { crypto::key_derivation derivation; bool r = crypto::generate_key_derivation(pub, sec, derivation); if (!r) { cerr <<"Failed to generate key derivation to decode rct output " << i << endl; return false; } return decode_ringct(rv, derivation, i, mask, amount); } bool decode_ringct(rct::rctSig const& rv, crypto::key_derivation const& derivation, unsigned int i, rct::key& mask, uint64_t& amount) { try { crypto::secret_key scalar1; crypto::derivation_to_scalar(derivation, i, scalar1); switch (rv.type) { case rct::RCTTypeSimple: case rct::RCTTypeBulletproof: case rct::RCTTypeBulletproof2: case rct::RCTTypeCLSAG: case rct::RCTTypeBulletproofPlus: amount = rct::decodeRctSimple(rv, rct::sk2rct(scalar1), i, mask, hw::get_device("default")); break; case rct::RCTTypeFull: amount = rct::decodeRct(rv, rct::sk2rct(scalar1), i, mask, hw::get_device("default")); break; default: cerr << "Unsupported rct type: " << rv.type << '\n'; return false; } } catch (...) { cerr << "Failed to decode input " << i << '\n'; return false; } return true; } bool url_decode(const std::string& in, std::string& out) { out.clear(); out.reserve(in.size()); for (std::size_t i = 0; i < in.size(); ++i) { if (in[i] == '%') { if (i + 3 <= in.size()) { int value = 0; std::istringstream is(in.substr(i + 1, 2)); if (is >> std::hex >> value) { out += static_cast(value); i += 2; } else { return false; } } else { return false; } } else if (in[i] == '+') { out += ' '; } else { out += in[i]; } } return true; } map parse_crow_post_data(const string& req_body) { map body; vector vec; string tmp; bool result = url_decode(req_body, tmp); if (result) { boost::algorithm::split(vec, tmp, [](char x) {return x == '&'; }); for(auto &it : vec) { auto pos = it.find("="); if (pos != string::npos) body[it.substr(0, pos)] = it.substr(pos + 1); else break; } } return body; } // from wallet2::decrypt string decrypt(const std::string &ciphertext, const crypto::secret_key &skey, bool authenticated) { const size_t prefix_size = sizeof(chacha_iv) + (authenticated ? sizeof(crypto::signature) : 0); if (ciphertext.size() < prefix_size) { cerr << "Unexpected ciphertext size" << endl; return {}; } crypto::chacha_key key; crypto::generate_chacha_key(&skey, sizeof(skey), key, 1); const crypto::chacha_iv &iv = *(const crypto::chacha_iv*)&ciphertext[0]; std::string plaintext; plaintext.resize(ciphertext.size() - prefix_size); if (authenticated) { crypto::hash hash; crypto::cn_fast_hash(ciphertext.data(), ciphertext.size() - sizeof(signature), hash); crypto::public_key pkey; crypto::secret_key_to_public_key(skey, pkey); const crypto::signature &signature = *(const crypto::signature*)&ciphertext[ciphertext.size() - sizeof(crypto::signature)]; if (!crypto::check_signature(hash, pkey, signature)) { cerr << "Failed to authenticate criphertext" << endl; return {}; } } crypto::chacha20(ciphertext.data() + sizeof(iv), ciphertext.size() - prefix_size, key, iv, &plaintext[0]); return plaintext; } // based on // crypto::public_key wallet2::get_tx_pub_key_from_received_outs(const tools::wallet2::transfer_details &td) const public_key get_tx_pub_key_from_received_outs(const transaction &tx) { std::vector tx_extra_fields; if(!parse_tx_extra(tx.extra, tx_extra_fields)) { // Extra may only be partially parsed, it's OK if tx_extra_fields contains public key } // Due to a previous bug, there might be more than one tx pubkey in extra, one being // the result of a previously discarded signature. // For speed, since scanning for outputs is a slow process, we check whether extra // contains more than one pubkey. If not, the first one is returned. If yes, they're // checked for whether they yield at least one output tx_extra_pub_key pub_key_field; if (!find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, 0)) { return null_pkey; } public_key tx_pub_key = pub_key_field.pub_key; bool two_found = find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, 1); if (!two_found) { // easy case, just one found return tx_pub_key; } else { // just return second one if there are two. // this does not require private view key, as // its not needed for my use case. return pub_key_field.pub_key; } return null_pkey; } /** * Check if given output (specified by output_index) * belongs is ours based * on our private view key and public spend key */ bool is_output_ours(const size_t& output_index, const transaction& tx, const public_key& pub_tx_key, const secret_key& private_view_key, const public_key& public_spend_key) { // public transaction key is combined with our viewkey // to create, so called, derived key. key_derivation derivation; if (!generate_key_derivation(pub_tx_key, private_view_key, derivation)) { cerr << "Cant get dervied key for: " << "\n" << "pub_tx_key: " << pub_tx_key << " and " << "prv_view_key" << private_view_key << endl; return false; } // get the tx output public key // that normally would be generated for us, // if someone had sent us some xmr. public_key pubkey; derive_public_key(derivation, output_index, public_spend_key, pubkey); //cout << "\n" << tx.vout.size() << " " << output_index << endl; // get tx output public key public_key output_pub_key; cryptonote::get_output_public_key(tx.vout[output_index], output_pub_key); if (output_pub_key == pubkey) { return true; } return false; } bool get_real_output_for_key_image(const key_image& ki, const transaction& tx, const secret_key& private_view_key, const public_key& public_spend_key, uint64_t output_idx, public_key output_pub_key) { return false; } string make_printable(const string& in_s) { string output; for (char c: in_s) { if (isprint(c)) { output += c; } else { switch(c){ case '\000': output += "\\000";break; case '\001': output += "\\001";break; case '\002': output += "\\002";break; case '\003': output += "\\003";break; case '\004': output += "\\004";break; case '\005': output += "\\005";break; case '\006': output += "\\006";break; case '\007': output += "\\007";break; // there are more case but for now its ok default: stringstream ss; ss << std::hex << (int)c; output += "0x" + ss.str(); break; } } } return output; } string get_human_readable_timestamp(uint64_t ts) { char buffer[64]; if (ts < 1234567890) return ""; time_t tt = ts; struct tm tm; gmtime_r(&tt, &tm); strftime(buffer, sizeof(buffer), "%Y-%m-%d %I:%M:%S", &tm); return std::string(buffer); } void pause_execution(uint64_t no_seconds, const string& text) { cout << "\nPausing " << text << " for " << no_seconds << " seconds: " << flush; for (size_t i = 0; i < no_seconds; ++i) { cout << "." << flush; std::this_thread::sleep_for(std::chrono::seconds(1)); } cout << endl; } string tx_to_hex(transaction const& tx) { return epee::string_tools::buff_to_hex_nodelimer(t_serializable_object_to_blob(tx)); } void get_metric_prefix(cryptonote::difficulty_type hr, double& hr_d, char& prefix) { if (hr < 1000) { prefix = 0; return; } static const char metric_prefixes[4] = { 'k', 'M', 'G', 'T' }; for (size_t i = 0; i < sizeof(metric_prefixes); ++i) { if (hr < 1000000) { hr_d = hr.convert_to() / 1000; prefix = metric_prefixes[i]; return; } hr /= 1000; } prefix = 0; } cryptonote::difficulty_type make_difficulty(uint64_t low, uint64_t high) { return (cryptonote::difficulty_type(high) << 64) + low; } }