aboutsummaryrefslogtreecommitdiff
path: root/src/wallet (unfollow)
AgeCommit message (Collapse)AuthorFilesLines
2021-08-19Protect client from divide by 0 caused by integer truncationj-berman1-0/+6
2021-08-19wallet_api: add make_uritobtoht3-0/+7
2021-08-12support freeze, thaw, and frozen in wallet rpcwoodser3-1/+154
2021-08-11Make sure node returns to wallet that real output is unlockedj-berman1-1/+2
2021-08-07provide key images of spent outputs in wallet rpcwoodser3-10/+40
2021-07-14fix #7784 - deinit wallet in wallet dtorDusan Klinec1-3/+6
2021-07-14wallet: rephrase error message on invalid device addressDusan Klinec1-1/+1
2021-07-13cmake: fix undefined symbols and multiple definitionsanon1-0/+3
2021-04-22wallet2: Fix rescan_bc keep_ki optionNathan Dorfman2-22/+27
2021-04-22wallet_api: import / export output functiontobtoht3-0/+77
2021-04-22expose set_offline to wallet apibenevanoff3-0/+12
2021-04-22wallet_api: add isDeterministic()tobtoht3-0/+12
2021-04-22wallet_api: add seed_offset param to seed()tobtoht3-4/+4
2021-04-22wallet_api: store fee for incoming txs in historyBen Evanoff1-0/+1
2021-04-22wallet api: allow wallet to fetch all key images via apibenevanoff3-4/+5
2021-04-22Allow tx note edits via TransactionHistory object in wallet/apidsc3-0/+13
2021-04-22wallet_api: TransactionHistory - fill unconfirmed out payments destsxiphon1-0/+4
2021-04-22Extend TransactionInfo with coinbase and description attributes in wallet/apidsc4-0/+23
2021-04-22Allow AddressBook description edits via wallet/api interfacedsc3-0/+21
2021-03-05fix serialization being different on macmoneromooo-monero3-11/+21
On Mac, size_t is a distinct type from uint64_t, and some types (in wallet cache as well as cold/hot wallet transfer data) use pairs/containers with size_t as fields. Mac would save those as full size, while other platforms would save them as varints. Might apply to other platforms where the types are distinct. There's a nasty hack for backward compatibility, which can go after a couple forks.
2020-12-22restrict public node checks a littlemoneromooo-monero1-0/+1
do not include blocked hosts in peer lists or public node lists by default, warn about no https on clearnet and about untrusted peers likely being spies
2020-12-03wallet2: set propagation timeout to current max timeoutselsta1-1/+2
2020-11-24wallet2: check imported multisig curve points are in main subgroupCrypto City1-0/+14
2020-10-18wallet2: wait for propagation timeout before marking tx as failedxiphon1-2/+6
2020-10-18wallet2_api: implement stop() to interrupt refresh() loop oncexiphon3-0/+11
2020-10-12wallet2: fix missing m_state field in wallet serializationmoneromooo-monero1-1/+3
2020-09-24fix a couple bugs found by OSS-fuzzmoneromooo-monero1-0/+2
- index out of bounds when importing outputs - accessing invalid CLSAG data
2020-09-15wallet2: adapt to deterministic unlock timeTheCharlatan4-18/+44
2020-09-12wallet2: fix tx sanity check triggering on pre-rct outputsmoneromooo-monero2-4/+9
2020-09-09Fix typo in command line argument descriptionReinaldulin1-1/+1
2020-09-04enable CLSAG support for Trezor clientDusan Klinec1-1/+1
2020-09-01update error message "No unlocked balance in the specified account"woodser1-1/+1
2020-09-01threadpool: guard against exceptions in jobs, and armour platingmoneromooo-monero1-15/+15
Those would, if uncaught, exit run and leave the waiter to wait indefinitely for the number of active jobs to reach 0
2020-08-28Bind signature to full address and signing modeSarang Noether4-29/+42
2020-08-28wallet: allow signing a message with spend or view keymoneromooo-monero6-25/+122
2020-08-27Integrate CLSAGs into moneromoneromooo-monero3-31/+66
They are allowed from v12, and MLSAGs are rejected from v13.
2020-08-17Revert "Use domain-separated ChaCha20 for in-memory key encryption"luigi11112-27/+0
This reverts commit 921dd8dde5d381052d0aa2936304a3541a230c55.
2020-08-17replace most boost serialization with existing monero serializationmoneromooo-monero6-107/+527
This reduces the attack surface for data that can come from malicious sources (exported output and key images, multisig transactions...) since the monero serialization is already exposed to the outside, and the boost lib we were using had a few known crashers. For interoperability, a new load-deprecated-formats wallet setting is added (off by default). This allows loading boost format data if there is no alternative. It will likely go at some point, along with the ability to load those. Notably, the peer lists file still uses the boost serialization code, as the data it stores is define in epee, while the new serialization code is in monero, and migrating it was fairly hairy. Since this file is local and not obtained from anyone else, the marginal risk is minimal, but it could be migrated later if needed. Some tests and tools also do, this will stay as is for now.
2020-08-16Fix build with Boost 1.74moneromooo-monero1-0/+3
Thanks iDunk for testing
2020-08-10simplewallet: allow setting tx keys when sending to a subaddressmoneromooo-monero2-2/+12
The tx key derivation is different then
2020-08-09Use domain-separated ChaCha20 for in-memory key encryptionSarang Noether2-0/+27
2020-08-09Updates InProofV1, OutProofV1, and ReserveProofV1 to new V2 variants that ↵Sarang Noether1-17/+29
include all public proof parameters in Schnorr challenges, along with hash function domain separators. Includes new randomized unit tests.
2020-08-08wallet2: fix setting tx keys when another is already setmoneromooo-monero1-10/+10
insert doesn't actually insert if another element with the same key is already in the map
2020-08-05Fix broken multisig pubkey sortingJason Rhinelander1-2/+2
The sort predicate is a boolean ordered-before value, but these are returning the memcmp value directly, and thus returns true whenever the pubkeys aren't equal. This means: - it isn't actually sorting. - it can (and does) segfault for some inputs.
2020-07-31wallet2: fix wrong name when checking RPC costmoneromooo-monero1-1/+1
2020-07-20wallet2_api: implement runtime proxy configurationxiphon7-40/+41
2020-07-20wallet2: throw a error on wallet initialization failurexiphon1-1/+4
2020-06-06fix warning by removing std::move() on temporary http_client objectwoodser1-1/+1
2020-05-31Fix boost <1.60 compilation and fix boost 1.73+ warningsLee Clagett1-1/+1
2020-05-25fix typo in pick_preferred_rct_inputsDenis Smirnov1-1/+1
2020-05-24[master] MMS: New 'config_checksum' subcommandrbrunner72-25/+79
2020-05-19wallet2: fix multisig data clearing stomping on a vectormoneromooo-monero1-1/+1
2020-05-17wallet_rpc_server: use unlock_time in suggested confirmations calcmoneromooo-monero1-5/+17
2020-05-13simplewallet: don't complain about incoming payment ids on changemoneromooo-monero3-4/+19
2020-05-11remove double includessumogr1-1/+0
2020-05-06Update copyright year to 2020SomaticFanatic35-35/+35
Update copyright year to 2020
2020-05-05wallet2: fix keys file deserialization exception handlingxiphon1-7/+1
2020-04-27wallet2: fix subaddress expansion when receiving moneromoneromooo-monero2-3/+17
2020-04-27trezor: adapt to new passphrase mechanismDusan Klinec4-9/+15
- choice where to enter passphrase is now made on the host - use wipeable string in the comm stack - wipe passphrase memory - protocol optimizations, prepare for new firmware version - minor fixes and improvements - tests fixes, HF12 support
2020-04-27message_store: don't print an error when there is no mms filemoneromooo-monero1-1/+1
It confuses people
2020-04-26wallet2: check_connection return false on get_version status != OKxiphon1-3/+2
2020-04-22simplewallet: report timestamp based expected unlock time on balancemoneromooo-monero4-20/+38
2020-04-15Allow wallet2.h to run in WebAssemblywoodser9-158/+251
- Add abstract_http_client.h which http_client.h extends. - Replace simple_http_client with abstract_http_client in wallet2, message_store, message_transporter, and node_rpc_proxy. - Import and export wallet data in wallet2. - Use #if defined __EMSCRIPTEN__ directives to skip incompatible code.
2020-04-15use memwipe on secret k/alpha valuesmoneromooo-monero1-6/+10
Reported by UkoeHB_ and sarang
2020-04-07simplewallet: new "address one-off <major> <minor>" commandmoneromooo-monero2-3/+13
2020-04-02wallet_api: checkUpdate - optional version and buildtag paramsxiphon2-7/+19
2020-04-01Hash domain separationSarang Noether2-10/+5
2020-03-31cryptonote_basic: drop unused verification_context::m_not_rct fieldxiphon1-2/+0
2020-03-09Move hex->bin conversion to monero copyright files and with less includesLee Clagett1-1/+1
2020-03-07wallet2: remember daemon address overrides when loading a new walletmoneromooo-monero2-2/+26
2020-02-11wallet2_api: wallet recovery - seed offset passphrase supportxiphon5-6/+14
2020-02-07wallet2: mention --daemon-ssl-allow-any-cert in --proxy error msgxiphon1-0/+1
2020-01-26wallet: do not split integrated addresses in address book apimoneromooo-monero5-135/+63
2020-01-25wallet2_api: implement estimateTransactionFeexiphon5-14/+45
2020-01-24wallet2: fix store-tx-info loadingmoneromooo-monero1-3/+12
The backward compatibility code was always setting it to 1 in modern wallets since store_tx_keys was not present and thus assumed to be 1 by default. Reported by SeventhAlpaca
2020-01-16wallet2: reject zero keys in json inputmoneromooo-monero1-0/+4
Because the user might do this for reasons unknown. Values beyond l-1 will be reduced, so are accepted. Reported by who-biz.
2020-01-14wallet: reroll fake outs selection on local tx_sanity_check failurexiphon2-2/+45
2020-01-11Wallet: Distingush amounts for a single subaddressTadeas Moravec4-2/+38
Adding a new `amounts` field ot the output of `get_transfers` RPC method. This field specifies individual payments made to a single subaddress in a single transaction, e.g., made by this command: transfer <addr1> <amount1> <addr1> <amount2>
2020-01-09ringdb: use a different iv for key and data in rings tablemoneromooo-monero1-18/+37
This is technically a record encrypted in two pieces, so the iv needs to be different. Some backward compatibility is added to read data written by existing code, but new data is written with the new code.
2020-01-09wallet2: do not remove known rings when a tx failsmoneromooo-monero1-1/+0
Even if it fails, the ring composition is known to a potential adversary, and so we should reuse the same ring next time
2019-12-31wallet: allow message sign/verify for subaddressesmoneromooo-monero4-5/+23
2019-12-30wallet: fix exceptions getting the hash of a pruned txmoneromooo-monero3-11/+11
2019-12-17wallet2: guard against race with multiple decrypt_keys usersmoneromooo-monero2-0/+9
If more than one thread wants to make sure of the spend secret key, then we decrypt on the first caller and reencrypt on the last caller, otherwise we could use an invalid secret key.
2019-12-16wallet-cli/rpc: allow sweep_all to use outputs in all subaddresses within an ↵stoffu2-2/+15
account
2019-12-14wallet2: fix hang in wallet refreshmoneromooo-monero1-1/+1
If the hashes received would move the current blockchain past the stop point, the short history would not be updated, since we do not expect another loop, but the daemon might return earlier hashes, causing the end index to not be enough to reach the threshold and this require another loop, which will download the same hashes and cause an infinite loop.
2019-12-01remove unused variable 'ptx' from on_describe_transfer()woodser1-1/+0
2019-11-28wallet2: better error when restoring a wallet with the wrong keysmoneromooo-monero1-1/+1
2019-11-27node_rpc_proxy: init some new rpc payment fields in invalidatemoneromooo-monero1-0/+4
The cache time would take care of these, but it's cleaner that way Coverity 205412
2019-11-22wallet_rpc_server: add count parameter to create_addressMatt Smith2-7/+33
2019-11-19wallet: don't issue node rpc proxy requests in '--offline' modexiphon1-0/+1
2019-11-14wallet: set non-empty error string on connection failurexiphon1-1/+1
2019-11-09build: fix IOS, build blockchain_db and rpc, skip wallet_rpc_serverxiphon1-32/+33
2019-11-06wallet_rpc_server: new estimate_tx_size_and_weight RPCmoneromooo-monero5-0/+72
2019-11-05wallet2: don't try to lock an empty filenamemoneromooo-monero1-0/+6
2019-11-05wallet_rpc_server: add tx weight in transfer commands responsesmoneromooo-monero3-7/+18
2019-11-04wallet2: fix pool txes not being flushed when minedmoneromooo-monero1-1/+1
2019-11-01wallet: reuse cached height when set after refreshmoneromooo-monero2-0/+11
Refreshing sets cached height, which is otherwise got by calling get_info. Since get_info is called upon needing to display a prompt after a command has finished, it can be used to determine how much time a given command took to run if the cache timeout lapses while the command runs. Refreshing caches the height as a side effect, so get_info will never be called as a result of displaying a prompt after refreshing (and potentially leaking how much time it took to process a set of transactions, therefore leaking whether we got some monero in them).
2019-11-01wallet2: fix is_synced checking target height, not heightmoneromooo-monero1-1/+1
Target height would be appropriate for the daemon, which syncs off other daemons, but the wallet syncs off the daemon it's connected to, and its target is the daemon's current height.
2019-11-01wallet: fix another facet of "did I get some monero" information leakmoneromooo-monero3-13/+40
We get new pool txes before processing any tx, pool or not. This ensures that if we're asked for a password, this does not cause a measurable delay in the txpool query after the last block query.
2019-11-01wallet2: do not send an unnecessary last getblocks.bin call on refreshmoneromooo-monero2-7/+17
The "everything refreshed" state was detected when a refresh call did not return any new blocks. This can be detected without that extra "empty" call by comparing the claimed node height to the height of the last block retrieved. Doing this avoids that last call, saves some bandwidth, and makes the common refresh case use only one call rather than two. As a side effect, it prevents an information leak reported by Tramèr et al: if the wallet retrieves a set of blocks which includes an output sent to the refreshing wallet, the wallet will prompt the user for the password to decode the amount and calculate the key image for the new output, and this will delay subsequent calls to getblocks.bin, allowing a passive adversary to note the delay and deduce when the wallet receives at least one output. This can still happen if the wallet downloads more than 1000 blocks, since this will be split in several calls, but then the most the adversary can tell is which 1000 block section the user received some monero (the adversary can estimate the heights of the blocks by calculating how many "large" transfers are done, which will be sections of blocks, the last of which will usually be below 1000, but the size of the data should allow the actual number of blocks sent to be determined fairly accurately). This timing trick still be used via the subsequent scan for incoming txes in the txpool, which will be fixed later.
2019-11-01wallet2: do not repeatedly ask for pool txes sent to usmoneromooo-monero1-5/+0
This lets a passive attacker with access to the network link between node and wallet perform traffic analysis to deduce when an idle wallet receives a transaction. Reported by Tramèr et al.
2019-10-29wallet2: make keys unlocker reentrantmoneromooo-monero2-3/+23
protects against having your keys mangled
2019-10-27wallet: do not warn if the rpc cost was freemoneromooo-monero1-1/+1
2019-10-27wallet: do not warn if the rpc cost was freemoneromooo-monero1-1/+1
2019-10-25simplewallet: add public_nodes commandmoneromooo-monero2-0/+23
Lists nodes exposing their RPC port for public use
2019-10-25daemon, wallet: new pay for RPC use systemmoneromooo-monero11-324/+1001
Daemons intended for public use can be set up to require payment in the form of hashes in exchange for RPC service. This enables public daemons to receive payment for their work over a large number of calls. This system behaves similarly to a pool, so payment takes the form of valid blocks every so often, yielding a large one off payment, rather than constant micropayments. This system can also be used by third parties as a "paywall" layer, where users of a service can pay for use by mining Monero to the service provider's address. An example of this for web site access is Primo, a Monero mining based website "paywall": https://github.com/selene-kovri/primo This has some advantages: - incentive to run a node providing RPC services, thereby promoting the availability of third party nodes for those who can't run their own - incentive to run your own node instead of using a third party's, thereby promoting decentralization - decentralized: payment is done between a client and server, with no third party needed - private: since the system is "pay as you go", you don't need to identify yourself to claim a long lived balance - no payment occurs on the blockchain, so there is no extra transactional load - one may mine with a beefy server, and use those credits from a phone, by reusing the client ID (at the cost of some privacy) - no barrier to entry: anyone may run a RPC node, and your expected revenue depends on how much work you do - Sybil resistant: if you run 1000 idle RPC nodes, you don't magically get more revenue - no large credit balance maintained on servers, so they have no incentive to exit scam - you can use any/many node(s), since there's little cost in switching servers - market based prices: competition between servers to lower costs - incentive for a distributed third party node system: if some public nodes are overused/slow, traffic can move to others - increases network security - helps counteract mining pools' share of the network hash rate - zero incentive for a payer to "double spend" since a reorg does not give any money back to the miner And some disadvantages: - low power clients will have difficulty mining (but one can optionally mine in advance and/or with a faster machine) - payment is "random", so a server might go a long time without a block before getting one - a public node's overall expected payment may be small Public nodes are expected to compete to find a suitable level for cost of service. The daemon can be set up this way to require payment for RPC services: monerod --rpc-payment-address 4xxxxxx \ --rpc-payment-credits 250 --rpc-payment-difficulty 1000 These values are an example only. The --rpc-payment-difficulty switch selects how hard each "share" should be, similar to a mining pool. The higher the difficulty, the fewer shares a client will find. The --rpc-payment-credits switch selects how many credits are awarded for each share a client finds. Considering both options, clients will be awarded credits/difficulty credits for every hash they calculate. For example, in the command line above, 0.25 credits per hash. A client mining at 100 H/s will therefore get an average of 25 credits per second. For reference, in the current implementation, a credit is enough to sync 20 blocks, so a 100 H/s client that's just starting to use Monero and uses this daemon will be able to sync 500 blocks per second. The wallet can be set to automatically mine if connected to a daemon which requires payment for RPC usage. It will try to keep a balance of 50000 credits, stopping mining when it's at this level, and starting again as credits are spent. With the example above, a new client will mine this much credits in about half an hour, and this target is enough to sync 500000 blocks (currently about a third of the monero blockchain). There are three new settings in the wallet: - credits-target: this is the amount of credits a wallet will try to reach before stopping mining. The default of 0 means 50000 credits. - auto-mine-for-rpc-payment-threshold: this controls the minimum credit rate which the wallet considers worth mining for. If the daemon credits less than this ratio, the wallet will consider mining to be not worth it. In the example above, the rate is 0.25 - persistent-rpc-client-id: if set, this allows the wallet to reuse a client id across runs. This means a public node can tell a wallet that's connecting is the same as one that connected previously, but allows a wallet to keep their credit balance from one run to the other. Since the wallet only mines to keep a small credit balance, this is not normally worth doing. However, someone may want to mine on a fast server, and use that credit balance on a low power device such as a phone. If left unset, a new client ID is generated at each wallet start, for privacy reasons. To mine and use a credit balance on two different devices, you can use the --rpc-client-secret-key switch. A wallet's client secret key can be found using the new rpc_payments command in the wallet. Note: anyone knowing your RPC client secret key is able to use your credit balance. The wallet has a few new commands too: - start_mining_for_rpc: start mining to acquire more credits, regardless of the auto mining settings - stop_mining_for_rpc: stop mining to acquire more credits - rpc_payments: display information about current credits with the currently selected daemon The node has an extra command: - rpc_payments: display information about clients and their balances The node will forget about any balance for clients which have been inactive for 6 months. Balances carry over on node restart.
2019-10-24changed 'batttery' to 'battery'Jake Hemmerle1-2/+2
2019-10-23wallet2: error out when we need a daemon password but have no prompt functionmoneromooo-monero1-0/+5
2019-10-23wallet2: fix the logged number of detached transfersmoneromooo-monero1-0/+1
2019-10-14wallet_rpc_server: don't report integrated addresses for 0 payment IDmoneromooo-monero1-2/+5
These are dummy ones
2019-10-14wallet: remove long payment ID sending supportmoneromooo-monero3-34/+3
2019-10-14wallet2: ignore received unencrypted payment IDs (but warn hard)moneromooo-monero2-7/+19
2019-10-04wallet2: don't delete file that may not existselsta1-5/+5
2019-10-02wallet2: add ignore-outputs-{above/below} optionstoffu2-1/+41
https://github.com/aeonix/aeon/pull/131
2019-09-28RPC on_transfer_split error consistent with on_transfer if no tx sentbinaryFate1-0/+7
2019-09-28build: link wallet_merged against blockchain_db and hardforks objxiphon1-0/+2
2019-09-27monerod can now sync from pruned blocksmoneromooo-monero1-1/+1
If the peer (whether pruned or not itself) supports sending pruned blocks to syncing nodes, the pruned version will be sent along with the hash of the pruned data and the block weight. The original tx hashes can be reconstructed from the pruned txes and theur prunable data hash. Those hashes and the block weights are hashes and checked against the set of precompiled hashes, ensuring the data we received is the original data. It is currently not possible to use this system when not using the set of precompiled hashes, since block weights can not otherwise be checked for validity. This is off by default for now, and is enabled by --sync-pruned-blocks
2019-09-17wallet: add edit_address_book RPCmoneromooo-monero5-1/+153
2019-09-10wallet2: enable ignoring fractional outputs also when sweepingstoffu1-0/+16
2019-09-09wallet2_api: add missing parameterselsta2-4/+4
2019-09-09wallet2_api: fix load unsigned tx from file error propagationxiphon1-0/+4
2019-09-06wallet2: resolve CID 203918 null pointer deference (NULL_RETURNS)anonimal1-0/+6
2019-09-05wallet: fix mismatch between two concepts of "balance"moneromooo-monero4-49/+79
One considers the blockchain, while the other considers the blockchain and some recent actions, such as a recently created transaction which spend some outputs, but isn't yet mined. Typically, the "balance" command wants the latter, to reflect the recent action, but things like proving ownership wants the former. This fixes a crash in get_reserve_proof, where a preliminary check and the main code used two concepts of "balance".
2019-09-05wallet_rpc_server: add locked field to get_transfers/get_{bulk_,}_paymentsmoneromooo-monero2-1/+12
Much easier to work with than the raw unlock_time field
2019-09-02Removed unused boost/value_init headerLev Sizov1-1/+0
2019-09-02Changed the use of boost:value_initialized for C++ list initializerJesus Ramirez2-5/+5
2019-08-28simplewallet: lock console on inactivitymoneromooo-monero2-0/+12
2019-08-28wallet_rpc_server: call deinit on exitmoneromooo-monero1-0/+1
2019-08-28rpc: move a leftover light wallet RPC out of daemon RPCmoneromooo-monero2-2/+49
2019-08-26wallet, rpc: add a release field to get_versionmoneromooo-monero2-1/+5
It does not leak much since you can make a fair guess by RPC version already, and some people want to avoid non release clients when using third parties' nodes (because they'd never lie about it)
2019-08-24wallet2: fix unset_ring tx retrieval checksmoneromooo-monero1-3/+1
2019-08-23wallet2: fix cold signing losing tx keysmoneromooo-monero1-1/+1
2019-08-22Wallet: Option to export data to ASCIITadeas Moravec2-21/+120
New CLI wallet variable: export-format with options "binary" (the default), or "ascii". "Binary" behaves as before, "ascii" forces the wallet to convert data to ASCII using base64. Reading files from the disk tries to auto detect what format has been used (using a magic string added when exporting the data). Implements https://github.com/monero-project/monero/issues/2859
2019-08-22ringdb: fix bug in blackballingstoffu1-1/+1
2019-08-22wallet: add --extra-entropy command line flagmoneromooo-monero1-0/+11
It lets the user add custom entropy to the PRNG. It does this by hashing the new data and xoring the resulting hash with the PRNG state.
2019-08-20MMS: Use chans instead of normal addresses for auto-configrbrunner73-35/+41
2019-08-19reject setting lookahead major or minor to 0moneromooo-monero1-0/+2
2019-08-16wallet_api: add multi destination tx supportselsta3-48/+79
2019-08-15Replace std::random_shuffle with std::shuffleTom Smeding1-2/+2
According to [1], std::random_shuffle is deprecated in C++14 and removed in C++17. Since std::shuffle is available since C++11 as a replacement and monero already requires C++11, this is a good replacement. A cryptographically secure random number generator is used in all cases to prevent people from perhaps copying an insecure std::shuffle call over to a place where a secure one would be warranted. A form of defense-in-depth. [1]: https://en.cppreference.com/w/cpp/algorithm/random_shuffle
2019-07-31Add IPv6 supportThomas Winget1-1/+3
new cli options (RPC ones also apply to wallet): --p2p-bind-ipv6-address (default = "::") --p2p-bind-port-ipv6 (default same as ipv4 port for given nettype) --rpc-bind-ipv6-address (default = "::1") --p2p-use-ipv6 (default false) --rpc-use-ipv6 (default false) --p2p-require-ipv4 (default true, if ipv4 bind fails and this is true, will not continue even if ipv6 bind successful) --rpc-require-ipv4 (default true, description as above) ipv6 addresses are to be specified as "[xx:xx:xx::xx:xx]:port" except in the cases of the cli args for bind address. For those the square braces can be omitted.
2019-07-29functional_tests: add validate_address testsmoneromooo-monero1-3/+2
2019-07-28Fixed error preventing build of monero-guiNejcraft1-1/+3
get_attribute expects 2 values instead of 1
2019-07-10wallet: provide original address for outgoing transfersxiphon2-3/+3
2019-07-09wallet_rpc_server: fix get_bulk_payments with short payment idsmoneromooo-monero1-0/+5
2019-07-02simplewallet: optional all flag to export_outputs/export_key_imagesmoneromooo-monero2-3/+3
2019-07-01wallet: do not print log settings when unsetmoneromooo-monero1-1/+4
Coverity 199721
2019-06-19wallet_api: catch getTxKey exceptionDusan Klinec1-8/+17
- getTxKey method throws an exception, e.g., when user declines txKey export
2019-06-19wallet2: fix change subaddress mixup when sending pre rct outputsmoneromooo-monero1-0/+1
2019-06-17device: show address on device displayDusan Klinec5-0/+53
- Trezor: support for device address display (subaddress, integrated address) - Wallet::API support added - Simplewallet: - address device [<index>] - address new <label> // shows address on device also - integrated_address [device] <payment_id|address> // new optional "device" arg to display also on the device
2019-06-17device: tx_key caching fixed, store recovered txkeyDusan Klinec1-3/+11
2019-06-02Remember RPC version on initial connectHoward Chu2-7/+13
Don't keep asking for it on an intact connection Wallet is too chatty over the wire
2019-05-27wallet_manager: omit redundant disconnect, drop unused variablexiphon2-4/+0
2019-05-22Fix allow any cert mode in wallet rpc when configured over rpcLee Clagett1-1/+5
2019-05-22Add ssl_options support to monerod's rpc mode.Lee Clagett1-50/+1
2019-05-21Fix configuration bug; wallet2 --daemon-ssl-allow-any-cert now works.Lee Clagett1-1/+4
2019-05-16wallet: add unlock_time details to show_transfersmoneromooo-monero3-4/+4
also add a note when receiving the tx, because the user might not notice the "XXX blocks to unlock" in the balance.
2019-05-11wallet: fix certificate fingerprint length checkmoneromooo-monero2-2/+2
Fixed by crCr62U0
2019-05-10expose set/get walletcache attribute functionality in wallet apidsc3-0/+28
2019-05-10wallet_rpc_server: use original addresses in destinations in get_transfersmoneromooo-monero1-1/+9
And add them for pending transfers, where they were missing
2019-05-02wallet2: don't wait a day before using new version feesmoneromooo-monero1-2/+2
30 blocks should be more than enough to drain the txpool of transactions made with the old fee scheme
2019-05-02wallet: distinguish between empty and absent attributesmoneromooo-monero4-6/+16
2019-05-02wallet_rpc_server: use original addresses in destinations in get_transfersmoneromooo-monero1-1/+9
And add them for pending transfers, where they were missing
2019-05-01wallet2: reject standalone short payment IDs in monero: URI APImoneromooo-monero1-4/+2
2019-04-30wallet_rpc_server: reject standalone short payment id in address bookmoneromooo-monero1-4/+4
2019-04-29remove unused codemoneromooo-monero1-3/+0
2019-04-29wallet2: fix infinite loop picking outputs in corner casemoneromooo-monero1-2/+5
If we have fewer outputs available on the chain than what we require, but the output we're spending already has a ring, it would loop picking outputs randomly, but never find enough. Also tune logs for better debugging this kind of thing.
2019-04-26change SSL certificate fingerprint whitelisting from SHA1 to SHA-256moneromooo-monero2-0/+15
SHA1 is too close to bruteforceable
2019-04-25wallet_rpc_server: adding missing return on error in set_daemonmoneromooo-monero1-0/+1
2019-04-25wallet_rpc_server: return false on error in set_log_categoriesmoneromooo-monero1-1/+1
Reported by SmajeNz0
2019-04-25wallet_rpc_server: fix crash in validate_address if no wallet is loadedmoneromooo-monero1-1/+2
Reported by SmajeNz0
2019-04-24wallet2: default to trying to keep 5 outputs of 2+ moneromoneromooo-monero1-3/+13
In the case where previously a second unneeded output would be added to a transaction. This should help *some* of the cases where outputs are slowly being consolidated, leading to the whole balance being locked when sending monero.
2019-04-23consensus: from v12, enforce >= 2 outputsmoneromooo-monero1-0/+2
2019-04-23wallet2: add missing "sanity check failed" reason messagemoneromooo-monero1-0/+2
2019-04-23wallet2: fix wrong change being recorded in sweep_allmoneromooo-monero1-2/+2
leading to the sanity check triggering
2019-04-22wallet: fix key image computation signaling to the deviceDusan Klinec1-1/+1
2019-04-20wallet_rpc_server: add block_height and frozen to incoming_transfersmoneromooo-monero2-1/+7
2019-04-18simplewallet: fix output representation offsetmoneromooo-monero1-2/+2
2019-04-18wallet2: "output lineup" fake out selectionmoneromooo-monero2-60/+72
Based on python code by sarang: https://github.com/SarangNoether/skunkworks/blob/outputs/outputs/simulate.py
2019-04-17wallet_rpc_server: add unlocked field to incoming_transfers outputmoneromooo-monero2-1/+4
2019-04-17wallet_rpc_server: remove unused variablemoneromooo-monero1-2/+0
2019-04-16wallet_rpc_server: set suggested_confirmations_threshold for pool txesmoneromooo-monero1-5/+3
2019-04-16wallet_rpc_server: add set_log_level/set_log_categoriesmoneromooo-monero4-1/+82
2019-04-15wallet: new --offline optionmoneromooo-monero4-60/+115
It will avoid connecting to a daemon (so useful for cold signing using a RPC wallet), and not perform DNS queries.
2019-04-15wallet_rpc_server: remove unused codemoneromooo-monero1-5/+1
2019-04-12rpc: new sanity check on relayed transactionsmoneromooo-monero1-0/+1
This will weed out some transactions with silly rings
2019-04-12wallet_rpc_server: fix inconsistent wallet caches on reloadmoneromooo-monero2-42/+58
Loading the same wallet as the currently loaded one would autosave the current state after loading it, leading to some kind of rollback effect. We now save before loading to avoid this. If loading fails, it means the current wallet will be saved (or maybe not, depending on where the failure occurs: most of the sanity checks occur before saving). There is a new autosave_current flag to open/restore calls so the (enabled by default) autosave can be skipped.
2019-04-11wallet2: update estimate_rct_tx_size for smaller rct proofsmoneromooo-monero1-1/+1
2019-04-11simplewallet: new net_stats commandmoneromooo-monero2-0/+13
displays total sent and received bytes
2019-04-10wallet_rpc_server: add a all flag to export_outputsmoneromooo-monero4-9/+13
if we don't want to export new outputs only
2019-04-07Enabling daemon-rpc SSL now requires non-system CA verificationLee Clagett2-17/+29
If `--daemon-ssl enabled` is set in the wallet, then a user certificate, fingerprint, or onion/i2p address must be provided.
2019-04-07device/trezor: add button pressed requestDusan Klinec4-0/+27
2019-04-07Require manual override for user chain certificates.Lee Clagett1-0/+5
An override for the wallet to daemon connection is provided, but not for other SSL contexts. The intent is to prevent users from supplying a system CA as the "user" whitelisted certificate, which is less secure since the key is controlled by a third party.
2019-04-07Pass SSL arguments via one class and use shared_ptr instead of referenceLee Clagett3-31/+55
2019-04-06Change default SSL to "enabled" if user specifies fingerprint/certificateLee Clagett2-7/+17
Currently if a user specifies a ca file or fingerprint to verify peer, the default behavior is SSL autodetect which allows for mitm downgrade attacks. It should be investigated whether a manual override should be allowed - the configuration is likely always invalid.
2019-04-06Change SSL certificate file list to OpenSSL builtin load_verify_locationLee Clagett4-40/+19
Specifying SSL certificates for peer verification does an exact match, making it a not-so-obvious alias for the fingerprints option. This changes the checks to OpenSSL which loads concatenated certificate(s) from a single file and does a certificate-authority (chain of trust) check instead. There is no drop in security - a compromised exact match fingerprint has the same worse case failure. There is increased security in allowing separate long-term CA key and short-term SSL server keys. This also removes loading of the system-default CA files if a custom CA file or certificate fingerprint is specified.
2019-04-06wallet: add number of blocks required for the balance to fully unlockmoneromooo-monero4-19/+55
2019-04-05wallet: API changes to enable passphrase entryDusan Klinec4-10/+37
2019-04-04wallet: new option to start background miningmoneromooo-monero4-0/+74
The setup-background-mining option can be used to select background mining when a wallet loads. The user will be asked the first time the wallet is created.
2019-04-04wallet2: add --no-dns flagmoneromooo-monero2-3/+10
2019-04-04crypto: replace rand<T>()%N idiom with unbiased rand_idx(N)stoffu1-4/+4