mirror of
https://codeberg.org/anoncontributorxmr/monero.git
synced 2024-12-13 17:40:26 +00:00
193 lines
6.3 KiB
C++
193 lines
6.3 KiB
C++
// Copyright (c) 2012-2013 The Cryptonote developers
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
|
#include "include_base_utils.h"
|
|
using namespace epee;
|
|
|
|
#include "cryptonote_basic_impl.h"
|
|
#include "string_tools.h"
|
|
#include "serialization/binary_utils.h"
|
|
#include "serialization/vector.h"
|
|
#include "cryptonote_format_utils.h"
|
|
#include "cryptonote_config.h"
|
|
#include "misc_language.h"
|
|
#include "common/base58.h"
|
|
#include "crypto/hash.h"
|
|
#include "common/int-util.h"
|
|
|
|
namespace cryptonote {
|
|
|
|
/************************************************************************/
|
|
/* Cryptonote helper functions */
|
|
/************************************************************************/
|
|
//-----------------------------------------------------------------------------------------------
|
|
size_t get_max_block_size()
|
|
{
|
|
return CRYPTONOTE_MAX_BLOCK_SIZE;
|
|
}
|
|
//-----------------------------------------------------------------------------------------------
|
|
size_t get_max_tx_size()
|
|
{
|
|
return CRYPTONOTE_MAX_TX_SIZE;
|
|
}
|
|
//-----------------------------------------------------------------------------------------------
|
|
uint64_t get_block_reward(std::vector<size_t>& last_blocks_sizes, size_t current_block_size, bool& block_too_big, uint64_t already_generated_coins)
|
|
{
|
|
block_too_big = false;
|
|
|
|
uint64_t base_reward = (MONEY_SUPPLY - already_generated_coins) >> 18;
|
|
|
|
if(current_block_size < CRYPTONOTE_BLOCK_GRANTED_FULL_REWARD_ZONE)
|
|
return base_reward;
|
|
|
|
size_t med_sz = misc_utils::median(last_blocks_sizes);
|
|
|
|
//make it soft
|
|
if(med_sz < CRYPTONOTE_BLOCK_GRANTED_FULL_REWARD_ZONE)
|
|
med_sz = CRYPTONOTE_BLOCK_GRANTED_FULL_REWARD_ZONE;
|
|
|
|
if(current_block_size > med_sz)
|
|
{
|
|
if(current_block_size > med_sz*2)
|
|
{
|
|
LOG_PRINT_L0("Block cumulative size is too big: " << current_block_size << ", expected less than " << med_sz*2);
|
|
block_too_big = true;
|
|
return 0;
|
|
}
|
|
|
|
assert(med_sz < std::numeric_limits<uint32_t>::max());
|
|
assert(current_block_size < std::numeric_limits<uint32_t>::max());
|
|
|
|
uint64_t product_hi;
|
|
uint64_t product_lo = mul128(base_reward, current_block_size * (2 * med_sz - current_block_size), &product_hi);
|
|
|
|
uint64_t reward_hi;
|
|
uint64_t reward_lo;
|
|
div128_32(product_hi, product_lo, static_cast<uint32_t>(med_sz), &reward_hi, &reward_lo);
|
|
div128_32(reward_hi, reward_lo, static_cast<uint32_t>(med_sz), &reward_hi, &reward_lo);
|
|
assert(0 == reward_hi);
|
|
assert(reward_lo < base_reward);
|
|
|
|
return reward_lo;
|
|
}else
|
|
return base_reward;
|
|
}
|
|
//------------------------------------------------------------------------------------
|
|
uint8_t get_account_address_checksum(const public_address_outer_blob& bl)
|
|
{
|
|
const unsigned char* pbuf = reinterpret_cast<const unsigned char*>(&bl);
|
|
uint8_t summ = 0;
|
|
for(size_t i = 0; i!= sizeof(public_address_outer_blob)-1; i++)
|
|
summ += pbuf[i];
|
|
|
|
return summ;
|
|
}
|
|
//-----------------------------------------------------------------------
|
|
std::string get_account_address_as_str(const account_public_address& adr)
|
|
{
|
|
return tools::base58::encode_addr(CRYPTONOTE_PUBLIC_ADDRESS_BASE58_PREFIX, t_serializable_object_to_blob(adr));
|
|
}
|
|
//-----------------------------------------------------------------------
|
|
bool is_coinbase(const transaction& tx)
|
|
{
|
|
if(tx.vin.size() != 1)
|
|
return false;
|
|
|
|
if(tx.vin[0].type() != typeid(txin_gen))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
//-----------------------------------------------------------------------
|
|
bool get_account_address_from_str(account_public_address& adr, const std::string& str)
|
|
{
|
|
if (2 * sizeof(public_address_outer_blob) != str.size())
|
|
{
|
|
blobdata data;
|
|
uint64_t prefix;
|
|
if (!tools::base58::decode_addr(str, prefix, data))
|
|
{
|
|
LOG_PRINT_L1("Invalid address format");
|
|
return false;
|
|
}
|
|
|
|
if (CRYPTONOTE_PUBLIC_ADDRESS_BASE58_PREFIX != prefix)
|
|
{
|
|
LOG_PRINT_L1("Wrong address prefix: " << prefix << ", expected " << CRYPTONOTE_PUBLIC_ADDRESS_BASE58_PREFIX);
|
|
return false;
|
|
}
|
|
|
|
if (!::serialization::parse_binary(data, adr))
|
|
{
|
|
LOG_PRINT_L1("Account public address keys can't be parsed");
|
|
return false;
|
|
}
|
|
|
|
if (!crypto::check_key(adr.m_spend_public_key) || !crypto::check_key(adr.m_view_public_key))
|
|
{
|
|
LOG_PRINT_L1("Failed to validate address keys");
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Old address format
|
|
std::string buff;
|
|
if(!string_tools::parse_hexstr_to_binbuff(str, buff))
|
|
return false;
|
|
|
|
if(buff.size()!=sizeof(public_address_outer_blob))
|
|
{
|
|
LOG_PRINT_L1("Wrong public address size: " << buff.size() << ", expected size: " << sizeof(public_address_outer_blob));
|
|
return false;
|
|
}
|
|
|
|
public_address_outer_blob blob = *reinterpret_cast<const public_address_outer_blob*>(buff.data());
|
|
|
|
|
|
if(blob.m_ver > CRYPTONOTE_PUBLIC_ADDRESS_TEXTBLOB_VER)
|
|
{
|
|
LOG_PRINT_L1("Unknown version of public address: " << blob.m_ver << ", expected " << CRYPTONOTE_PUBLIC_ADDRESS_TEXTBLOB_VER);
|
|
return false;
|
|
}
|
|
|
|
if(blob.check_sum != get_account_address_checksum(blob))
|
|
{
|
|
LOG_PRINT_L1("Wrong public address checksum");
|
|
return false;
|
|
}
|
|
|
|
//we success
|
|
adr = blob.m_address;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool operator ==(const cryptonote::transaction& a, const cryptonote::transaction& b) {
|
|
return cryptonote::get_transaction_hash(a) == cryptonote::get_transaction_hash(b);
|
|
}
|
|
|
|
bool operator ==(const cryptonote::block& a, const cryptonote::block& b) {
|
|
return cryptonote::get_block_hash(a) == cryptonote::get_block_hash(b);
|
|
}
|
|
}
|
|
|
|
//--------------------------------------------------------------------------------
|
|
bool parse_hash256(const std::string str_hash, crypto::hash& hash)
|
|
{
|
|
std::string buf;
|
|
bool res = epee::string_tools::parse_hexstr_to_binbuff(str_hash, buf);
|
|
if (!res || buf.size() != sizeof(crypto::hash))
|
|
{
|
|
std::cout << "invalid hash format: <" << str_hash << '>' << std::endl;
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
buf.copy(reinterpret_cast<char *>(&hash), sizeof(crypto::hash));
|
|
return true;
|
|
}
|
|
}
|