aboutsummaryrefslogtreecommitdiff
path: root/src/wallet (unfollow)
AgeCommit message (Collapse)AuthorFilesLines
2019-07-09wallet_rpc_server: fix get_bulk_payments with short payment idsmoneromooo-monero1-0/+5
2019-05-21Fix allow any cert mode in wallet rpc when configured over rpcLee Clagett1-1/+5
2019-05-21Add ssl_options support to monerod's rpc mode.Lee Clagett1-50/+1
2019-05-21Fix configuration bug; wallet2 --daemon-ssl-allow-any-cert now works.Lee Clagett1-1/+4
2019-05-16wallet: add unlock_time details to show_transfersmoneromooo-monero3-4/+4
also add a note when receiving the tx, because the user might not notice the "XXX blocks to unlock" in the balance.
2019-05-11wallet: fix certificate fingerprint length checkmoneromooo-monero2-2/+2
Fixed by crCr62U0
2019-05-10wallet_rpc_server: use original addresses in destinations in get_transfersmoneromooo-monero1-1/+9
And add them for pending transfers, where they were missing
2019-05-01wallet2: reject standalone short payment IDs in monero: URI APImoneromooo-monero1-4/+2
2019-04-30wallet_rpc_server: reject standalone short payment id in address bookmoneromooo-monero1-4/+4
2019-04-29wallet2: fix infinite loop picking outputs in corner casemoneromooo-monero1-2/+5
If we have fewer outputs available on the chain than what we require, but the output we're spending already has a ring, it would loop picking outputs randomly, but never find enough. Also tune logs for better debugging this kind of thing.
2019-04-26change SSL certificate fingerprint whitelisting from SHA1 to SHA-256moneromooo-monero2-0/+15
SHA1 is too close to bruteforceable
2019-04-25wallet_rpc_server: adding missing return on error in set_daemonmoneromooo-monero1-0/+1
2019-04-25wallet_rpc_server: return false on error in set_log_categoriesmoneromooo-monero1-1/+1
Reported by SmajeNz0
2019-04-25wallet_rpc_server: fix crash in validate_address if no wallet is loadedmoneromooo-monero1-1/+2
Reported by SmajeNz0
2019-04-24wallet2: default to trying to keep 5 outputs of 2+ moneromoneromooo-monero1-3/+13
In the case where previously a second unneeded output would be added to a transaction. This should help *some* of the cases where outputs are slowly being consolidated, leading to the whole balance being locked when sending monero.
2019-04-23wallet2: add missing "sanity check failed" reason messagemoneromooo-monero1-0/+2
2019-04-23wallet2: fix wrong change being recorded in sweep_allmoneromooo-monero1-2/+2
leading to the sanity check triggering
2019-04-22wallet: fix key image computation signaling to the deviceDusan Klinec1-1/+1
2019-04-20wallet_rpc_server: add block_height and frozen to incoming_transfersmoneromooo-monero2-1/+7
2019-04-18simplewallet: fix output representation offsetmoneromooo-monero1-2/+2
2019-04-18wallet2: "output lineup" fake out selectionmoneromooo-monero2-60/+72
Based on python code by sarang: https://github.com/SarangNoether/skunkworks/blob/outputs/outputs/simulate.py
2019-04-17wallet_rpc_server: add unlocked field to incoming_transfers outputmoneromooo-monero2-1/+4
2019-04-16wallet_rpc_server: set suggested_confirmations_threshold for pool txesmoneromooo-monero1-5/+3
2019-04-16wallet_rpc_server: add set_log_level/set_log_categoriesmoneromooo-monero4-1/+82
2019-04-15wallet: new --offline optionmoneromooo-monero4-60/+115
It will avoid connecting to a daemon (so useful for cold signing using a RPC wallet), and not perform DNS queries.
2019-04-15wallet_rpc_server: remove unused codemoneromooo-monero1-5/+1
2019-04-12rpc: new sanity check on relayed transactionsmoneromooo-monero1-0/+1
This will weed out some transactions with silly rings
2019-04-12wallet_rpc_server: fix inconsistent wallet caches on reloadmoneromooo-monero2-42/+58
Loading the same wallet as the currently loaded one would autosave the current state after loading it, leading to some kind of rollback effect. We now save before loading to avoid this. If loading fails, it means the current wallet will be saved (or maybe not, depending on where the failure occurs: most of the sanity checks occur before saving). There is a new autosave_current flag to open/restore calls so the (enabled by default) autosave can be skipped.
2019-04-11wallet2: update estimate_rct_tx_size for smaller rct proofsmoneromooo-monero1-1/+1
2019-04-11simplewallet: new net_stats commandmoneromooo-monero2-0/+13
displays total sent and received bytes
2019-04-10wallet_rpc_server: add a all flag to export_outputsmoneromooo-monero4-9/+13
if we don't want to export new outputs only
2019-04-07Enabling daemon-rpc SSL now requires non-system CA verificationLee Clagett2-17/+29
If `--daemon-ssl enabled` is set in the wallet, then a user certificate, fingerprint, or onion/i2p address must be provided.
2019-04-07device/trezor: add button pressed requestDusan Klinec4-0/+27
2019-04-07Require manual override for user chain certificates.Lee Clagett1-0/+5
An override for the wallet to daemon connection is provided, but not for other SSL contexts. The intent is to prevent users from supplying a system CA as the "user" whitelisted certificate, which is less secure since the key is controlled by a third party.
2019-04-07Pass SSL arguments via one class and use shared_ptr instead of referenceLee Clagett3-31/+55
2019-04-06Change default SSL to "enabled" if user specifies fingerprint/certificateLee Clagett2-7/+17
Currently if a user specifies a ca file or fingerprint to verify peer, the default behavior is SSL autodetect which allows for mitm downgrade attacks. It should be investigated whether a manual override should be allowed - the configuration is likely always invalid.
2019-04-06Change SSL certificate file list to OpenSSL builtin load_verify_locationLee Clagett4-40/+19
Specifying SSL certificates for peer verification does an exact match, making it a not-so-obvious alias for the fingerprints option. This changes the checks to OpenSSL which loads concatenated certificate(s) from a single file and does a certificate-authority (chain of trust) check instead. There is no drop in security - a compromised exact match fingerprint has the same worse case failure. There is increased security in allowing separate long-term CA key and short-term SSL server keys. This also removes loading of the system-default CA files if a custom CA file or certificate fingerprint is specified.
2019-04-06wallet: add number of blocks required for the balance to fully unlockmoneromooo-monero4-19/+55
2019-04-05wallet: API changes to enable passphrase entryDusan Klinec4-10/+37
2019-04-04wallet: new option to start background miningmoneromooo-monero4-0/+74
The setup-background-mining option can be used to select background mining when a wallet loads. The user will be asked the first time the wallet is created.
2019-04-04wallet2: add --no-dns flagmoneromooo-monero2-3/+10
2019-04-04crypto: replace rand<T>()%N idiom with unbiased rand_idx(N)stoffu1-4/+4
2019-04-03wallet2: support multi out txes without change in sanity checkmoneromooo-monero1-7/+9
2019-04-02libwallet_merged: add missing net targetselsta1-0/+1
2019-04-02simplewallet: new unset_ring commandmoneromooo-monero4-11/+61
Useful when debugging, though not much for users
2019-04-02api/wallet: fix some wrong namespacestoffu1-2/+2
2019-04-01wallet: add number of blocks required for the balance to fully unlockmoneromooo-monero4-20/+56
2019-04-01wallet2: set confirmations to 0 for pool txes in proofsmoneromooo-monero1-4/+4
It makes more sense than (uint64_t)-1, which is going to look like very much confirmed when not checking in_pool
2019-04-01wallet_rpc_server: error out on getting the spend key from a hot walletmoneromooo-monero1-1/+7
2019-04-01wallet_rpc_server: always fill out subaddr_indices in get_transfersmoneromooo-monero1-0/+2
It was not filled out for in and pool types
2019-04-01wallet_rpc_server: error out on getting the spend key from a hot walletmoneromooo-monero1-1/+7
2019-04-01wallet_rpc_server: add a set_daemon RPCmoneromooo-monero5-7/+91
2019-04-01wallet2: init some variables to default values if loading old walletsmoneromooo-monero1-0/+3
2019-04-01wallet_rpc_server: always fill out subaddr_indices in get_transfersmoneromooo-monero1-0/+2
It was not filled out for in and pool types
2019-04-01wallet_rpc_server: set confirmations to 0 for pending/pool txesmoneromooo-monero1-1/+1
2019-03-28Add get_tx_proof support, needed for new sanity checkcslashm1-21/+29
Enhance debug info
2019-03-27wallet2: factor the watchonly/multisig/etc fields on creationmoneromooo-monero2-36/+23
There's half a dozen calls, and it's easy to miss some when adding a new field.
2019-03-25wallet2: fix tx sanity check change test for the sweep_all casemoneromooo-monero1-3/+9
2019-03-25wallet2: skip derivation precalc for blocks we know we'll skipmoneromooo-monero2-1/+24
2019-03-25cryptonote: block parsing + hash calculation speedupmoneromooo-monero1-3/+1
This saves a duplicate serialization step
2019-03-25wallet_rpc_server: allow english/local language names in create_walletmoneromooo-monero2-4/+12
and return both in get_languages
2019-03-25wallet: fix memory only walletsmoneromooo-monero2-18/+9
at least when using restore_deterministic_wallet
2019-03-25Added socks proxy (tor/i2pd/kovri) support to walletLee Clagett4-6/+55
2019-03-24wallet2: set confirmations to 0 for pool txes in proofsmoneromooo-monero1-4/+4
It makes more sense than (uint64_t)-1, which is going to look like very much confirmed when not checking in_pool
2019-03-24wallet: use original user address if we have a short payment idmoneromooo-monero1-1/+1
2019-03-22wallet: add freeze/thaw/frozen commandsmoneromooo-monero2-13/+98
These commands let one freeze outputs by key image, so they do not appear in balance, nor are considered when creating a transaction, etc This is helpful when receiving an output from a suspected spy, who might try to track your other outputs by seeing with what other outputs it gets spent. The frozen command may be used without parameters to list all currently frozen outputs.
2019-03-21wallet_rpc_server: remove mixin from transfer RPCsmoneromooo-monero2-44/+4
it's been a while, only use ring_size now
2019-03-21wallet: fix offline signing calling a daemon RPCmoneromooo-monero2-18/+24
2019-03-21wallet2: sanity check new tx before sendingmoneromooo-monero2-105/+217
We generate and check tx proofs and verify the amounts in those match what the original amounts were.
2019-03-20device/trezor: HF10 support added, wallet::APIDusan Klinec7-38/+306
- import only key images generated by cold signing process - wallet_api: trezor methods added - wallet: button request code added - const added to methods - wallet2::get_tx_key_device() tries to decrypt stored tx private keys using the device. - simplewallet supports get_tx_key and get_tx_proof on hw device using the get_tx_key feature - live refresh enables refresh with trezor i.e. computing key images on the fly. More convenient and efficient for users. - device: has_ki_live_refresh added - a thread is watching whether live refresh is being computed, if not for 30 seconds, it terminates the live refresh process - switches Trezor state
2019-03-17wallet2: make use_fork_rules handle chain heights lower than leewaymoneromooo-monero1-1/+1
2019-03-17wallet: flush output cache upon reorgmoneromooo-monero2-4/+13
Fixes output usage tracking
2019-03-17wallet_rpc_server: new auto_refresh RPCmoneromooo-monero3-1/+59
It can enable/disable auto refresh, and set auto refresh period
2019-03-15wallet_rpc_server: fix buffer read overflow in string assignmentmoneromooo-monero1-1/+1
2019-03-15wallet: move light wallet RPC out of core RPCmoneromooo-monero3-13/+334
It's not nothing to do with it
2019-03-15wallet: adds rescan_bc option with preserving key imagesDusan Klinec2-17/+93
- enables to perform rescan_spent / ki sync with untrusted daemon. Spent check status involves RPC calls which require trusted daemon status as it leaks information. The new call performs soft reset while preserving key images thus a sequence: refresh, ki sync / import, rescan_bc keep_ki will correctly perform spent checking without need for trusted daemon. - useful to detect spent outputs with untrusted daemon on watch_only / multisig / hw-cold wallets after expensive key image sync. - cli: rescan_bc keep_ki
2019-03-15wallet2: set seed language when creating from jsonmoneromooo-monero1-0/+2
2019-03-14wallet2: fix generation from json when restore height is not setmoneromooo-monero1-1/+1
It was not recovering then, but creating a new random address
2019-03-13wallet_rpc_server: include out subaddress indices in get_transfersmoneromooo-monero2-0/+6
2019-03-13wallet_rpc_server: add missing --rpc-ssl-allowed-fingerprintsmoneromooo-monero1-0/+1
2019-03-12wallet2: don't store 0 amount outputs, they'll fail to be spentmoneromooo-monero1-1/+7
It's better to just ignore them, the user does not really need to know they're here. If the mask is wrong, they'll fail to be used, and sweeping will fail as it tries to use it. Reported by Josh Davis.
2019-03-12Wallet API: multisig_tx_set passing bug fixednaughtyfox1-1/+3
2019-03-11wallet: fix load failure if the mms isn't usablemoneromooo-monero1-1/+8
2019-03-07wallet2: do not use invalid keys as fake outs in ringsmoneromooo-monero1-0/+11
2019-03-05wallet2: key image import fixesmoneromooo-monero1-15/+17
- return the right output data when offset is not zero - do not consider import failed if result height is zero (it can be 0 if unknown) - select the right tx pubkey when using subaddresses (it's faster, and we might select the wrong one if we got an output using one of the additional tx keys) - account for skipped outputs for spent/unspent balance info "spent" is arguably wrong, since it will count spent change multiple times as it goes through receive/spend cycles.
2019-03-05Update 2019 copyrightbinaryFate33-33/+33
2019-03-05add multisig tx sets to describe_transfer rpc endpointspoke04-27/+71
2019-03-05epee: add SSL supportMartijn Otto3-5/+17
RPC connections now have optional tranparent SSL. An optional private key and certificate file can be passed, using the --{rpc,daemon}-ssl-private-key and --{rpc,daemon}-ssl-certificate options. Those have as argument a path to a PEM format private private key and certificate, respectively. If not given, a temporary self signed certificate will be used. SSL can be enabled or disabled using --{rpc}-ssl, which accepts autodetect (default), disabled or enabled. Access can be restricted to particular certificates using the --rpc-ssl-allowed-certificates, which takes a list of paths to PEM encoded certificates. This can allow a wallet to connect to only the daemon they think they're connected to, by forcing SSL and listing the paths to the known good certificates. To generate long term certificates: openssl genrsa -out /tmp/KEY 4096 openssl req -new -key /tmp/KEY -out /tmp/REQ openssl x509 -req -days 999999 -sha256 -in /tmp/REQ -signkey /tmp/KEY -out /tmp/CERT /tmp/KEY is the private key, and /tmp/CERT is the certificate, both in PEM format. /tmp/REQ can be removed. Adjust the last command to set expiration date, etc, as needed. It doesn't make a whole lot of sense for monero anyway, since most servers will run with one time temporary self signed certificates anyway. SSL support is transparent, so all communication is done on the existing ports, with SSL autodetection. This means you can start using an SSL daemon now, but you should not enforce SSL yet or nothing will talk to you.
2019-03-05device/trezor: debugging features, trezor testsDusan Klinec1-0/+2
2019-03-05wallet_rpc_server: avoid repeated string allocations when parsingmoneromooo-monero1-20/+14
2019-03-05wallet2: don't calculate prefix hash when we don't need itmoneromooo-monero1-6/+6
2019-03-04check load_t_from_json return valuesmoneromooo-monero1-3/+9
2019-03-04default initialize rpc structuresmoneromooo-monero3-155/+314
2019-03-04various: remove unused variablesmoneromooo-monero3-7/+0
2019-03-04Print the reason why a notification spec failed to parsemoneromooo-monero1-1/+1
2019-03-03wallet2: fix mishandling rct outputs in coinbase txmoneromooo-monero2-7/+13
Reported by cutcoin
2019-03-02Simplify RPC endpoint, emoving second RPC endpoint generate_from_view_keyJoel2-17/+4
2019-02-22Better error when sending a tx with a too large extra fieldmoneromooo-monero2-3/+21
2019-02-21Remove code duplicationJoel3-190/+20
2019-02-20wallet-rpc: get balance for all accounts and subaddressesstoffu2-21/+49
2019-02-20wallet: fix payment ID decryption for construction dataDusan Klinec1-7/+6
2019-02-19Add generate_from_view_key RPC methodJoel3-0/+185
2019-02-19Add generate_from_keys RPC methodJoel3-0/+201
2019-02-17wallet-rpc: get transfers for all accounts and subaddressesJethro Grassie2-5/+15
2019-02-14wallet_rpc_server: add a validate_address RPCmoneromooo-monero3-1/+89
2019-02-13Don't decrypt keys in view only wallets in wallet_keys_unlockerDoyle1-1/+1
2019-02-02epee: add SSL supportmoneromooo-monero4-12/+80
RPC connections now have optional tranparent SSL. An optional private key and certificate file can be passed, using the --{rpc,daemon}-ssl-private-key and --{rpc,daemon}-ssl-certificate options. Those have as argument a path to a PEM format private private key and certificate, respectively. If not given, a temporary self signed certificate will be used. SSL can be enabled or disabled using --{rpc}-ssl, which accepts autodetect (default), disabled or enabled. Access can be restricted to particular certificates using the --rpc-ssl-allowed-certificates, which takes a list of paths to PEM encoded certificates. This can allow a wallet to connect to only the daemon they think they're connected to, by forcing SSL and listing the paths to the known good certificates. To generate long term certificates: openssl genrsa -out /tmp/KEY 4096 openssl req -new -key /tmp/KEY -out /tmp/REQ openssl x509 -req -days 999999 -sha256 -in /tmp/REQ -signkey /tmp/KEY -out /tmp/CERT /tmp/KEY is the private key, and /tmp/CERT is the certificate, both in PEM format. /tmp/REQ can be removed. Adjust the last command to set expiration date, etc, as needed. It doesn't make a whole lot of sense for monero anyway, since most servers will run with one time temporary self signed certificates anyway. SSL support is transparent, so all communication is done on the existing ports, with SSL autodetection. This means you can start using an SSL daemon now, but you should not enforce SSL yet or nothing will talk to you.
2019-02-02wallet_rpc_server: remove detached short payment ids supportmoneromooo-monero1-5/+1
2019-01-28rpc: fix internal daemon calls in restricted rpc getting partial datamoneromooo-monero2-153/+154
2019-01-28notify: handle arbitrary tagsmoneromooo-monero1-1/+1
2019-01-22ringct: encode 8 byte amount, saving 24 bytes per outputmoneromooo-monero1-2/+2
Found by knaccc
2019-01-22add a bulletproof version, new bulletproof type, and rct configmoneromooo-monero2-19/+28
This makes it easier to modify the bulletproof format
2019-01-22Pruningmoneromooo-monero1-76/+113
The blockchain prunes seven eighths of prunable tx data. This saves about two thirds of the blockchain size, while keeping the node useful as a sync source for an eighth of the blockchain. No other data is currently pruned. There are three ways to prune a blockchain: - run monerod with --prune-blockchain - run "prune_blockchain" in the monerod console - run the monero-blockchain-prune utility The first two will prune in place. Due to how LMDB works, this will not reduce the blockchain size on disk. Instead, it will mark parts of the file as free, so that future data will use that free space, causing the file to not grow until free space grows scarce. The third way will create a second database, a pruned copy of the original one. Since this is a new file, this one will be smaller than the original one. Once the database is pruned, it will stay pruned as it syncs. That is, there is no need to use --prune-blockchain again, etc.
2019-01-19wallet2: fix hashchain going out of sync on refresh errormoneromooo-monero1-0/+5
2019-01-18core, wallet: remember original text version of destination addressmoneromooo-monero3-7/+15
2019-01-16wallet2: remember which output keys map to which key imagesmoneromooo-monero2-16/+101
This allows filling in transfer_details when a cold signed tx gets seen in a block next
2019-01-15wallet api: don't truncate address in subaddress_accountselsta1-1/+1
Same behaviour as subaddress.cpp now.
2019-01-13wallet2: fix incorrect patch for determining fork rulesmoneromooo-monero1-1/+1
Half of the patch was correct, but half was introducing another bug, where a wallet asking for a fork that the daemon does not know about yet would decide to use those rules.
2019-01-13wallet2: fix duplicate tx notifications for pool txesmoneromooo-monero1-3/+10
2019-01-09wallet: do not check txpool in background modemoneromooo-monero2-9/+9
This avoids the constant message about needed to run refresh to enter a password. Also mention the txpool when asking for the password if the reason is a pool tx.
2019-01-07message_store: init me fieldmoneromooo-monero1-0/+1
Coverity 190651
2019-01-07wallet_api: fix usage of LOG_ERRORmoneromooo-monero1-10/+10
2019-01-02wallet api/device: set estimated restore height if none is providedselsta4-0/+15
2018-12-31wallet2: speedup output trackingmoneromooo-monero2-13/+49
It can get heavy for large wallets
2018-12-31wallet: optionally keep track of owned outputs usesmoneromooo-monero2-3/+34
2018-12-30wallet: do not display daemon controlled text if untrustedmoneromooo-monero2-26/+76
2018-12-24wallet_rpc_server: add all field to export_key_imagesmoneromooo-monero4-6/+12
To use if you want all key images, not just the ones for recently imported outputs
2018-12-22message_store: fix error message adding const char * with offsetmoneromooo-monero1-7/+7
2018-12-21wallet2: finalize_multisig now rejects non N-1/N multisig walletsmoneromooo-monero1-0/+17
2018-12-19Remove unused hash in export_key_imagesdoy-lee1-3/+0
2018-12-18build: protobuf dependency fixes, libusb buildDusan Klinec1-0/+6
- docker protobuf dependencies, cross-compilation - device/trezor protobuf build fixes, try_compile - libusb built under all platforms, used by trezor for direct connect
2018-12-16wallet2: cut down on the number of useless derivation threadsmoneromooo-monero1-6/+9
2018-12-16wallet2: fix accessing unwound stack on exceptionmoneromooo-monero1-4/+12
2018-12-14Sync hashchain bug fixednaughtyfox1-4/+3
2018-12-14Wallet: Initialize members without default ctor.Tadeas Moravec1-0/+2
Found by Coverity (188336 in Anonimal's Coverity account).
2018-12-12MMS (Multisig Messaging System): Initial versionrbrunner78-7/+2453
2018-12-08wallet2: clear all payments on soft rescan_bcmoneromooo-monero1-0/+4
They'll get duplicated otherwise
2018-12-04device/trezor: ask for KI sync on first refreshDusan Klinec2-6/+15
When doing a first refresh on HW-token based wallet KI sync is required if money were received. Received money may indicate wallet was already used before the restore I.e., some transaction could have been already sent from the wallet. The spent UTXO would not be detected as spent which could lead to double spending errors on submitting a new transaction. Thus if the wallet is HW-token based with the cold signing protocol and the first refresh detected received money the user is asked to perform the key image sync.
2018-12-04device: enable to use multiple independent device walletsDusan Klinec2-0/+23
- adds a new option `--hw-device-deriv-path` to the simple wallet. Enables to specify wallet derivation path / wallet code (path avoided so it can be misinterpreted as a file path). - devices can use different derivation mechanisms. Trezor uses standard SLIP-10 mechanism with fixed SLIP-44 prefix for Monero - Trezor: when empty, the default derivation mechanism is used with 44'/128'/0'. When entered the derivation path is 44'/128'/PATH. - Trezor: the path is always taken as elements are hardened (1<<31 bit turned on)
2018-11-29device/trezor: passphrase entry on hostDusan Klinec3-3/+79
- simple device callback object added. Device can request passphrase/PIN entry via the callback or notify user some action is required - callback is routed to wallet2, which routes the callback to i_wallet_callback so CLI or GUI wallets can support passphrase entry for HW tokens - wallet: device open needs wallet callback first - passphrase protected device needs wallet callback so user can enter passphrase
2018-11-26rpc: speedup get_outs.binmoneromooo-monero1-0/+1
2018-11-23wallet_rpc_server: do not use RPC data if the call failedmoneromooo-monero1-1/+2
Found by codacy.com
2018-11-23remove some unused codemoneromooo-monero1-5/+0
Found by codacy.com
2018-11-23a few minor (but easy) performance tweaksmoneromooo-monero2-4/+4
Found by codacy.com
2018-11-22wallet2: resume processing when tx extra is partially brokenstoffu1-2/+2
Motivated by https://monero.stackexchange.com/questions/10483 Some exchanges appear to have customized the wallet software in an inappropriate way, making the tx extra field partially unreadable. PR #3716 changed the wallet behavior disallowing such partially valid tx extra. An example tx reported by the user is e87c675a85f34ecac58a8846613d25062f1813e1023c552b705afad32b972c38 where the normal tx pubkey appears again with the aditional tx pubkeys tag `04` which is inappropriate.
2018-11-22wallet2: add n_vouts to capture listmoneromooo-monero1-1/+1
2018-11-20Fix issue 4793 - M/N multisig transaction signaturenaughtyfox2-18/+63
2018-11-20rpc: speedup get_output_distributionmoneromooo-monero1-2/+5
and decrease the amount of data carried around
2018-11-15Removed a lot of unnecessary includesMartijn Otto3-1/+3
2018-11-15various: do not propagate exception through dtormoneromooo-monero1-1/+6
Coverity 189689, 189690, 189692, 189695
2018-11-07api/wallet: fix compile errors made in #4720stoffu1-3/+3
2018-11-07wallet2: remove redundant chacha key generation in store_keysstoffu1-1/+0
2018-11-06build: fix Ubuntu 16.04 (GCC 5.4.0) compilationxiphon1-1/+2
2018-11-06Fix build of monero-gui by adding device_trezor to wallet_mergedburicl1-1/+2
2018-11-05wallet2: fix off by one in output pickingmoneromooo-monero1-12/+19
and take into account wallet level minimum spend age
2018-11-05wallet_rpc_server: account for watch-only/non-deterministic/multisig when ↵stoffu1-1/+32
querying seed Followup on #4653
2018-11-04wallet2: only export necessary outputs and key imagesmoneromooo-monero4-59/+106
and disable annoying test that requires ridiculous amounts of skullduggery every time some format changes
2018-11-04wallet2: faster output and key image import/exportmoneromooo-monero1-18/+76
2018-11-04Fix: out_of_hashchain_bounds_error in refreshHasan Pekdemir1-1/+1
15:43 < hahsun> Im on stagenet and I suddenly get this exception: 2018-11-04 14:42:52.416 [RPC0] ERROR wallet.wallet2 src/wallet/wallet2.cpp:2070 !m_blockchain.is_in_bounds(current_index). THROW EXCEPTION: error::out_of_hashchain_bounds_error 16:01 <+moneromooo> OK, possibly because the blckchain is always seeded with the genesis block hash... 16:02 <+moneromooo> So that case should be allowed, assuming it doesn't break the code around it. 16:05 <+moneromooo> OK if stop_height == size || (size==1 && stop_heigt ==0) 16:05 <+moneromooo> Throw if not that. 16:06 < hahsun> k
2018-11-03wallet: warn if lockable memory limit is too lowmoneromooo-monero1-0/+8
2018-11-03wallet: add a non destructive blockchain rescanmoneromooo-monero4-5/+24
2018-11-03wallet2: demote a few uninteresting recurring logs to TRACEmoneromooo-monero1-5/+5
2018-11-03wallet2: fix print_ring printing double entries for transactionsmoneromooo-monero1-0/+1
When a tx gets from unconfirmed to conirmed, the rings for that transaction were being added twice
2018-11-02device/trezor: trezor support addedDusan Klinec3-27/+154
2018-11-02wallet_rpc_server: include additional tx keys in sign_transfer responsestoffu1-0/+4
Followup on #4552
2018-10-31wallet2: use padded bulletproofs for multisig signingstoffu1-4/+1
Analogous to #4540
2018-10-29wallet-rpc: add on_restore_deterministic RPC call.Hasan Pekdemir3-1/+234
2018-10-29wallet2: initialize amount to 0 in tx_scan_info_t ctormoneromooo-monero1-1/+1
It seems the more prudent thing to do here. It will not catch attempts to use that value before it is initialized when using ASAN or valgrind, but in a case where it does, it will have smaller repercussions. So it seems appropriate in this particular case. Coverity 182498
2018-10-28wallet2: rewrite keys file in a safer mannerNathan Dorfman1-3/+12
2018-10-27wallet2: save ring in the ringdb once a tx is createdmoneromooo-monero1-0/+14
Even if it is never relayed, it ensures a daemon supplying fake outs on demand will never be asked for a set with the real input being the only intersecting member (only a problem with people who trust their privacy to some stranger's node, but it seems to be a massively common thing, even in Monero)
2018-10-27wallet2: fix ring reuse breaking when using histogrammoneromooo-monero1-0/+3
2018-10-25simplewallet: display locked/unlocked state in show_transfersmoneromooo-monero1-1/+2
it doesn't display the details, which are already displayed in show_transfer
2018-10-23Update ZMQ fee estimate and add ZMQ output distributionLee Clagett1-8/+8
2018-10-23wallet2: extend fake out picks away from the gamma pickmoneromooo-monero1-2/+23
in order to unbias selection from blocks with few txes
2018-10-22wallet2/create_transactions_2: removed obsolete '/ 1024' on min_fee calcPaul Shapiro1-1/+1
2018-10-22wallet2: sanity check rct output distribution from the daemonmoneromooo-monero1-1/+7
2018-10-21wallet2/create_transactions_2: fixed typo in try_tx=true's estimate_fee argsPaul Shapiro1-1/+1
2018-10-21wallet2/create_transactions_2: removed extraneous shuffle before sort of ↵Paul Shapiro1-5/+1
unused_*_indices_per_subaddr
2018-10-18Add RPC error code for non-deterministic walletMichał Sałaban2-0/+2
2018-10-18Rename "blackball" for claritymoneromooo-monero3-6/+6
Apparently some people seem to think it's a censorship list...
2018-10-16wallet_rpc_server: fix change_wallet_password RPCmoneromooo-monero1-2/+1
2018-10-16wallet2_api: fix generating new wallet in the GUImoneromooo-monero1-1/+1
It was creating a new wallet without a password first (this should be fixed), then not changing the password correctly
2018-10-16wallet2: initialize some scalar fields in ctor where appropriatemoneromooo-monero1-0/+4
Coverity 188336
2018-10-16WalletAPI: rescanBlockchain, rescanBlockchainAsyncmmitkevich3-2/+38
2018-10-13SOFTWARE is the default wallet devicem2049r1-0/+1
2018-10-12Remove epee header dependency on cryptonote_coremoneromooo-monero1-0/+1
2018-10-11Return appropriate RPC error code when key image signature check failsMichał Sałaban3-1/+15
2018-10-10wallet_rpc_server: optionally return tx keys in sign_transfermoneromooo-monero3-0/+10
2018-10-09wallet2: make fake out selection messages less spammymoneromooo-monero1-3/+18
2018-10-09wallet2: fix cold signing using non padded bulletproofsmoneromooo-monero1-4/+1
This code was deciding which bulletproof configuration to use based on ptx which weren't created yet.
2018-10-09wallet_rpc_server: add describe_transfer RPCmoneromooo-monero3-1/+229
for unsigned tx sets using a view only wallet
2018-10-06Fix some calls to the translation functionGuillaume LE VAILLANT1-2/+2
Some strings were not detected by lupdate because "tr() cannot be called without context".
2018-10-04wallet2_api: fix build with C++14moneromooo-monero1-7/+14
2018-10-03wallet2: disable height based segregationmoneromooo-monero1-3/+3
It can still be enable via DNS if a key reusing fork pops up
2018-10-02wallet2: clear found out for every tx keydoy-lee1-1/+1
Avoids triggering the sanity check
2018-10-01Arbitrary M/N multisig schemes:naughtyfox8-99/+419
* support in wallet2 * support in monero-wallet-cli * support in monero-wallet-rpc * support in wallet api * support in monero-gen-trusted-multisig * unit tests for multisig wallets creation
2018-10-01wallet_rpc_server: include all transfer records for a txidmoneromooo-monero2-9/+17
Since subaddresses were added, a tx can now create more than one payment
2018-10-01wallet: fix --generate-from-json using wrong passwordmoneromooo-monero3-6/+12
2018-09-30wallet2_api: blackball/unblackball now take two parametersmoneromooo-monero3-2/+28
amount and offset (instead of pubkey)
2018-09-29Merge pull request #4333Riccardo Spagni2-0/+29
73403004 add --block-notify to monerod and --tx-notify to monero-wallet-{cli,rpc} (moneromooo-monero)