aboutsummaryrefslogtreecommitdiff
path: root/tests (unfollow)
AgeCommit message (Collapse)AuthorFilesLines
2019-02-19blockchain: remove buggy long term block weight cachemoneromooo-monero1-3/+3
It seems to be buggy on reorgs, and prevents the use of a blockchain with two nodes. We'll speed this up again if/when the need arises.
2019-02-18tests: add a CNv4 JIT testmoneromooo-monero2-0/+133
2019-02-18blockchain: fix long term weight addition on pop/initmoneromooo-monero1-8/+1
2019-02-18performance_tests: add tests for new Cryptonight variantsmoneromooo-monero2-10/+10
2019-02-14Build fixes for some platformsmoneromooo-monero1-1/+1
2019-02-14Adding cnv4-2 tweaksLee Clagett1-10/+10
2019-02-14Cryptonight variant 4 aka CryptonightRSChernykh3-6/+35
It introduces random integer math into the main loop.
2019-02-12ringct: the commitment mask is now deterministicmoneromooo-monero2-36/+0
saves space in the tx and is safe Found by knaccc
2019-02-12ringct: encode 8 byte amount, saving 24 bytes per outputmoneromooo-monero3-6/+22
Found by knaccc
2019-02-12add a bulletproof version, new bulletproof type, and rct configmoneromooo-monero11-78/+89
This makes it easier to modify the bulletproof format
2019-02-12notify: handle arbitrary tagsmoneromooo-monero2-0/+91
2019-02-12ArticMine's new block weight algorithmmoneromooo-monero9-25/+738
This curbs runaway growth while still allowing substantial spikes in block weight Original specification from ArticMine: here is the scaling proposal Define: LongTermBlockWeight Before fork: LongTermBlockWeight = BlockWeight At or after fork: LongTermBlockWeight = min(BlockWeight, 1.4*LongTermEffectiveMedianBlockWeight) Note: To avoid possible consensus issues over rounding the LongTermBlockWeight for a given block should be calculated to the nearest byte, and stored as a integer in the block itself. The stored LongTermBlockWeight is then used for future calculations of the LongTermEffectiveMedianBlockWeight and not recalculated each time. Define: LongTermEffectiveMedianBlockWeight LongTermEffectiveMedianBlockWeight = max(300000, MedianOverPrevious100000Blocks(LongTermBlockWeight)) Change Definition of EffectiveMedianBlockWeight From (current definition) EffectiveMedianBlockWeight = max(300000, MedianOverPrevious100Blocks(BlockWeight)) To (proposed definition) EffectiveMedianBlockWeight = min(max(300000, MedianOverPrevious100Blocks(BlockWeight)), 50*LongTermEffectiveMedianBlockWeight) Notes: 1) There are no other changes to the existing penalty formula, median calculation, fees etc. 2) There is the requirement to store the LongTermBlockWeight of a block unencrypted in the block itself. This is to avoid possible consensus issues over rounding and also to prevent the calculations from becoming unwieldy as we move away from the fork. 3) When the EffectiveMedianBlockWeight cap is reached it is still possible to mine blocks up to 2x the EffectiveMedianBlockWeight by paying the corresponding penalty.
2018-10-18Rename "blackball" for claritymoneromooo-monero1-5/+5
Apparently some people seem to think it's a censorship list...
2018-10-07Merge pull request #4036Riccardo Spagni5-146/+298
9acf42d3 Multisig M/N functionality core tests added (naughtyfox) 9f3963e8 Arbitrary M/N multisig schemes: * support in wallet2 * support in monero-wallet-cli * support in monero-wallet-rpc * support in wallet api * support in monero-gen-trusted-multisig * unit tests for multisig wallets creation (naughtyfox)
2018-10-07Merge pull request #4511Riccardo Spagni1-562/+562
f9485a36 tests: update crypto tests data file after PRNG changes (moneromooo-monero)
2018-10-06Merge pull request #4492Riccardo Spagni1-0/+4
7f2ad1a7 functional_tests: fix linking on Windows (iDunk5400)
2018-10-02Merge pull request #4464Riccardo Spagni1-1/+1
bef1750f unit_tests: fix longstanding DNS related unit test (moneromooo-monero)
2018-09-27fuzz_tests: catch unhandled exceptionsmoneromooo-monero1-0/+4
Coverity 175293, 175312, 175266
2018-09-27unit_tests: catch unhandled exceptionsmoneromooo-monero1-0/+4
Coverity 182560
2018-09-27performance_test: fix bad last argument calling add_argmoneromooo-monero1-4/+4
Coverity 182572
2018-09-27unit_tests: add check for page size > 0 before dividingmoneromooo-monero1-0/+1
Coverity 188426
2018-09-27unit_tests: use std::shared_ptr to shut coverity up about leaksmoneromooo-monero1-34/+34
Coverity 188436, 188433, 188428, 188415, 188416, 188410, 188400, 188298, 188299, 188321, 188342, 188343, 188355, 188357, 188361, 188366, 188374
2018-09-23unit_tests: fix build with GCC 5.4.0 on ubuntumoneromooo-monero2-6/+6
2018-09-22cryptonote tweak v2.2Lee Clagett1-10/+10
2018-09-20ringdb: use cursors to be a bit fastermoneromooo-monero1-0/+24
2018-09-17api/wallet: properly disable key encryptionstoffu2-3/+3
2018-09-16Fix missing std::runtime_error def in difficulty.cppHoward Chu1-0/+1
2018-09-15unit_tests: sanity check on transaction weightmoneromooo-monero1-0/+32
2018-09-15tests: update test wallet keys file for encrypted keysmoneromooo-monero1-0/+0
2018-09-14remove obsolete daemon selection of fake outs and old tx constructionmoneromooo-monero1-6/+6
2018-09-12Adding expect<T> - a value-or-error implementationLee Clagett2-0/+916
2018-09-12wipeable_string: add hex_to_pod functionmoneromooo-monero1-0/+7
2018-09-11bulletproofs: speed up the latest changes a bitmoneromooo-monero3-0/+13
2018-09-11performance_tests: add padded bulletproof constructionmoneromooo-monero2-2/+14
2018-09-11core_tests: add a test for 4-aggregated BP verificationmoneromooo-monero3-0/+16
2018-09-11fuzz_tests: add a bulletproof fuzz testmoneromooo-monero3-0/+85
2018-09-11unit_tests: add a few more multiexp unit testsmoneromooo-monero1-2/+52
2018-09-11core_tests: add a test for a tx with empty bulletproofmoneromooo-monero3-0/+20
2018-09-11v8: per byte fee, pad bulletproofs, fixed 11 ring sizemoneromooo-monero14-255/+271
2018-09-11bulletproofs: a few fixes from the Kudelski reviewmoneromooo-monero1-10/+0
- fix integer overflow in n_bulletproof_amounts - check input scalars are in range - remove use of environment variable to tweak straus performance - do not use implementation defined signed shift for signum
2018-09-11bulletproofs: reject points not in the main subgroupmoneromooo-monero3-0/+64
2018-09-11Add Pippenger cache and limit Straus cache sizemoneromooo-monero2-9/+135
2018-09-11add pippenger unit testsmoneromooo-monero1-0/+55
2018-09-11performance_tests: add stats and loop count multiplier optionsmoneromooo-monero2-317/+409
Stats are: min, median, standard deviation
2018-09-11performance_tests: add aggregated bulletproof tx verificationmoneromooo-monero2-0/+81
2018-09-11Pippenger multiexpmoneromooo-monero2-1/+146
Based on sarang's python code
2018-09-11precalc the ge_p3 representation of Hmoneromooo-monero1-0/+7
2018-09-11performance_tests: document the tested bulletproof layoutsmoneromooo-monero1-8/+8
2018-09-11unit_tests: a couple more bulletproof unit tests for gammamoneromooo-monero1-0/+19
2018-09-11require canonical multi output bulletproof layoutmoneromooo-monero3-13/+13
2018-09-11Bulletproof aggregated verification and testsmoneromooo-monero9-17/+590
Also constrains bulletproofs to simple rct, for simplicity
2018-09-11aligned: aligned memory alloc/realloc/freemoneromooo-monero2-1/+88
2018-09-11performance_tests: add signature generation/verificationmoneromooo-monero3-0/+72
2018-09-11bulletproofs: add aggregated verificationmoneromooo-monero5-0/+87
Ported from sarang's java code
2018-09-11make straus cached mode thread safe, and add tests for itmoneromooo-monero4-1/+163
2018-09-11bulletproofs: add multi output bulletproofs to rctmoneromooo-monero4-3/+66
2018-09-11performance_tests: add tx checking tests with more than 2 outputsmoneromooo-monero2-12/+23
2018-09-11performance_tests: add a --verbose flag, and default to tersemoneromooo-monero2-121/+135
2018-09-11add Straus multiexpmoneromooo-monero3-0/+97
2018-09-11performance_tests: add crypto opsmoneromooo-monero3-0/+133
2018-09-11performance_tests: add bulletproofsmoneromooo-monero3-0/+73
2018-09-11performance_tests: add RingCT MLSAG gen/ver testsmoneromooo-monero1-0/+10
2018-09-11performance_tests: add (Borromean) range proofsmoneromooo-monero3-0/+68
2018-09-11bulletproofs: multi-output bulletproofsmoneromooo-monero1-0/+19
2018-09-11performance_tests: don't override log level to 0moneromooo-monero1-1/+0
2018-09-10record blackballs as amount/offset, and add export abilitymoneromooo-monero1-4/+4
2018-09-09Cryptonight variant 2SChernykh3-2/+216
Contains two modifications to improve ASIC resistance: shuffle and integer math. Shuffle makes use of the whole 64-byte cache line instead of 16 bytes only, making Cryptonight 4 times more demanding for memory bandwidth. Integer math adds 64:32 bit integer division followed by 64 bit integer square root, adding large and unavoidable computational latency to the main loop. More details and performance numbers: https://github.com/SChernykh/xmr-stak-cpu/blob/master/README.md
2018-08-25is_hdd updatep8p2-1/+19
2018-08-23unit_tests: disable mlocker tests on windows (no implementation)moneromooo-monero1-0/+8
2018-08-23add and use constant time 32 byte equality functionmoneromooo-monero3-0/+93
2018-08-23wallet: store trusted-daemon flag in wallet2stoffu1-1/+1
2018-08-20unit_tests: add tests for incremental keccakmoneromooo-monero2-0/+151
2018-08-16common: add a class to safely wrap mlock/munlockmoneromooo-monero2-0/+187
This class will allow mlocking small objects, of which there may be several per page. It adds refcounting so pages are only munlocked when the last object on that page munlocks.
2018-08-16store secret keys encrypted where possiblemoneromooo-monero5-4/+89
The secret spend key is kept encrypted in memory, and decrypted on the fly when needed. Both spend and view secret keys are kept encrypted in a JSON field in the keys file. This avoids leaving the keys in memory due to being manipulated by the JSON I/O API.
2018-08-16wallet: wipe seed from memory where appropriatemoneromooo-monero3-6/+231
2018-08-16wallet2: make --restricted-rpc available for wallet RPC onlystoffu1-2/+1
2018-08-15unit_tests: remove std::move in return statementmoneromooo-monero1-1/+1
This actually prevents copy elision
2018-08-14fuzz: set address properlystoffu1-0/+1
2018-08-13fuzz_tests: use __AFL_INIT when availablemoneromooo-monero1-0/+4
alleged to speed things up
2018-08-08wallet: allow adjusting number of rounds for the key derivation functionstoffu1-1/+1
2018-08-07fixed cncrypto tests not passing after the change in random_scalarMaxim Shishmarev1-1024/+1024
2018-08-03Added features to epee::span<T> :Lee Clagett1-1/+56
- Support for classes - Added `remove_prefix` function - Added `to_mut_span` and `as_mut_byte_span`
2018-08-02Fixed ZMQ-RPC for transactions and GET_BLOCKS_FASTLee Clagett2-0/+219
2018-07-30blockchain_db: remove unused get_output_key variantmoneromooo-monero1-1/+0
It was actually incorrect, as it would not return commitment
2018-07-28unit_tests: use valid key images, pub keys, etcmoneromooo-monero1-5/+9
2018-07-22tests: ringdb: use system's temporary dir pathredfish1-4/+4
Fixes failing test during Arch package build (due to attempt to write to ~/.bitmonero/...). Prefix temp dir path with "monero-" because we are not putting it on the system, so good to identify ourselves in case the dir gets left over due to crash, etc.
2018-07-20crypto: do not use boost::value_initialized to init null skey/pkeymoneromooo-monero1-0/+8
2018-07-13db: store cumulative rct output distribution in the db for speedmoneromooo-monero1-18/+20
This gets rid of the temporary precalc cache. Also make the RPC able to send data back in binary or JSON, since there can be a lot of data This bumps the LMDB database format to v3, with migration.
2018-07-07core_tests: add --filter to select which tests to runmoneromooo-monero3-20/+8
2018-07-05crypto: remove slight bias in key generation due to modulomoneromooo-monero2-0/+48
2018-06-29first new functional testsvictorsintnicolaas7-0/+478
2018-06-29add --regtest and --fixed-difficulty for regression testingvictorsintnicolaas1-0/+1
on_generateblocks RPC call combines functionality from the on_getblocktemplate and on_submitblock RPC calls to allow rapid block creation. Difficulty is set permanently to 1 for regtest. Makes use of FAKECHAIN network type, but takes hard fork heights from mainchain Default reserve_size in generate_blocks RPC call is now 1. If it is 0, the following error occurs 'Failed to calculate offset for'. Queries hard fork heights info of other network types
2018-06-28remove epee from link lines where it's redundantmoneromooo-monero1-1/+0
For some reason, this confuses and kills ASAN on startup as it thinks const uint8_t ipv4_network_address::ID is defined multiple times.
2018-06-28gtest: use -fPIC with CLANG toomoneromooo-monero1-0/+4
2018-06-27unit_tests: do not recreate the same base rct sig all the timemoneromooo-monero1-4/+18
Helps a bit when running with valgrind
2018-06-26threadpool: allow leaf functions to run concurrentlymoneromooo-monero1-6/+51
Decrease the number of worker threads by one to account for the fact the calling thread acts as a worker thread now
2018-06-26replace std::list with std::vector on some hot pathsmoneromooo-monero10-29/+29
also use reserve where appropriate
2018-06-23Changed URLs to HTTPSeinsteinsfool1-1/+1
2018-06-20rpc: add blockchain disk size to getinfomoneromooo-monero1-0/+1
This should help new nodes predict how much disk space will be needed for a full sync
2018-06-13wallet: on first refresh, start off with a quantized heightmoneromooo-monero1-7/+7
for privacy reasons, so an untrusted node can't easily track wallets from IP address to IP address, etc. The granularity is 1024 blocks, which is about a day and a half.
2018-06-10epee: adaptive connection timeout systemmoneromooo-monero2-0/+2
a connection's timeout is halved for every extra connection from the same host. Also keep track of when we don't need to use a connection anymore, so we can close it and free the resource for another connection. Also use the longer timeout for non routable local addresses.
2018-06-06ringct: remove an unnecessary scalarmultBase in zeroCommitmoneromooo-monero1-0/+10
2018-06-01unit_tests: add tests for local IP range detectionmoneromooo-monero1-0/+32
2018-05-30unit_tests/hardfork: add tests for get_voting_info()stoffu1-0/+49
2018-05-30hardfork: fix get_next_version()stoffu1-0/+29
2018-05-30unit_tests/hardfork: add tests for check_for_height()stoffu1-0/+24
2018-05-30hardfork: fix get_earliest_ideal_height_for_version() to support ↵stoffu1-0/+25
non-existent versions
2018-05-23db_lmdb: save pruned and prunable tx data separatelymoneromooo-monero1-2/+4
This bumps DB version to 2, migration code will run for v1 DBs
2018-05-21unit_tests: fix build after get_output_didstribution signature changemoneromooo-monero1-1/+1
2018-05-21speed up get_output_distribution (and precalc common case)moneromooo-monero1-0/+1
2018-05-21Revert "Merge pull request #3775"Riccardo Spagni1-1/+1
This reverts commit 20ef37bbcac7715d5299dd77d401583420e07ced, reversing changes made to 40070a661fd2ff503e07f4ed48dfe9fe67cfa297.
2018-05-20unit_tests: add threadpool unit testmoneromooo-monero2-0/+102
2018-05-15unit_tests: set default data dir to the source tree at build timemoneromooo-monero2-8/+5
2018-04-28unit_tests: fix build after get_output_didstribution signature changemoneromooo-monero1-1/+1
2018-04-22Only log an error if fork version is higher AND is not known.Thaer Khawaja2-0/+2
2018-04-12unit_tests: add device unit testsmoneromooo-monero2-0/+132
Annoyingly, its locking semantics are borked since it does not do any locking
2018-04-11unit_tests: add ringdb unit testsmoneromooo-monero2-1/+166
2018-04-11gtest: Fix compilation on MinGW with pthread /googletest#621stoffu2-5/+2
2018-03-27performance_tests: fix subaddress expansion test not expandingmoneromooo-monero1-1/+1
2018-03-21core: add get_earliest_ideal_height_for_version()stoffu2-0/+2
2018-03-16add RPC to get a histogram of outputs of a given amountmoneromooo-monero1-1/+2
2018-03-15Fix typos in various filesDimitris Apostolou2-4/+4
2018-03-14tests/hash: correctly reference crypto HASH_SIZE for less confusionAnythingTechPro1-1/+1
2018-03-14chacha: call prehashed version explicitly as generate_chacha_key_prehashedstoffu1-2/+2
hash: add prehashed version cn_slow_hash_prehashed slow-hash: let cn_slow_hash take 4th parameter for deciding prehashed or not slow-hash: add support for prehashed version for the other 3 platforms
2018-03-14crypto: revert odd namespace changes made in #3303stoffu1-6/+6
2018-03-14keypair::generate: always require hw::device to avoid possible mistakestoffu3-4/+4
2018-03-14device: untangle cyclic depenencystoffu1-3/+0
When #3303 was merged, a cyclic dependency chain was generated: libdevice <- libcncrypto <- libringct <- libdevice This was because libdevice needs access to a set of basic crypto operations implemented in libringct such as scalarmultBase(), while libringct also needs access to abstracted crypto operations implemented in libdevice such as ecdhEncode(). To untangle this cyclic dependency chain, this patch splits libringct into libringct_basic and libringct, where the basic crypto ops previously in libringct are moved into libringct_basic. The cyclic dependency is now resolved thanks to this separation: libcncrypto <- libringct_basic <- libdevice <- libcryptonote_basic <- libringct This eliminates the need for crypto_device.cpp and rctOps_device.cpp. Also, many abstracted interfaces of hw::device such as encrypt_payment_id() and get_subaddress_secret_key() were previously implemented in libcryptonote_basic (cryptonote_format_utils.cpp) and were then called from hw::core::device_default, which is odd because libdevice is supposed to be independent of libcryptonote_basic. Therefore, those functions were moved to device_default.cpp.
2018-03-14fuzz_tests: set small subaddress lookahead for speedmoneromooo-monero3-0/+3
2018-03-06Wallet API: make nettype non-defaulted to disambiguate from deprecated ↵stoffu1-51/+51
versions (and make libwallet_api_tests compilable)
2018-03-05tweaks to the monerov1 cryptonight algorithmLee Clagett1-5/+5
2018-03-05Monero Cryptonight variants, and add one for v7moneromooo-monero3-3/+15
This is the first variant of many, with the intent to improve Monero's resistance to ASICs and encourage mining decentralization.
2018-03-05Correct spelling mistakes.Edward Betts5-5/+5
2018-03-05Stagenetstoffu11-38/+38
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm14-32/+48
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.
2018-02-16options: remove testnet-* optionswhythat1-2/+1
2018-02-12unit_tests.serialization: refactored with ASSERT_EQ_MAPstoffu1-17/+21
2018-02-12unit_tests: added gtest utility ASSERT_EQ_MAP for easily testing key-value mapstoffu1-0/+7
2018-02-08dns: change default DNS to a worldwide selectionmoneromooo-monero1-13/+15
DNSSEC aware servers picked from https://wiki.ipfire.org/dns/public-servers
2018-02-07Fix coverity issues in performance_tests/main.cpph9087141241-0/+2
2018-02-02pass large parameters by const ref, not valuemoneromooo-monero1-1/+1
Coverity 136394 136397 136409 136526 136529 136533 175302
2018-02-02performance_tests: remove add_arg call stray extra parammoneromooo-monero1-1/+1
Coverity 182572
2018-02-02fuzz_tests: fix an uninitialized var in setupmoneromooo-monero1-2/+3
and comment it out, it's only used to generate a starting test case Coverity 182506
2018-01-28Tests: Fix building of two fuzz tests on WindowsiDunk54001-0/+2
2018-01-26Readd copyright starting datexmr-eric27-27/+27
2018-01-26Update 2018 copyrightxmr-eric144-144/+144
2018-01-26performance_tests: fix build after merging two conflicting patchesmoneromooo-monero1-8/+8
2018-01-18unit_tests: do not ASSERT_TRUE(decodeRct(...))moneromooo-monero1-5/+5
decodeRct returns the amount, which may be zero
2018-01-10move memwipe to epee to avoid common<->crypto circular dependenciesmoneromooo-monero1-1/+1
2018-01-10epee: remove dependency on commonmoneromooo-monero1-8/+14
2018-01-08fix for warningOnur Altun1-1/+1
monero/tests/unit_tests/memwipe.cpp:50:8: Warning: suggest explicit braces to avoid ambiguous 'else' [-Wdangling-else] if (wipe) ASSERT_TRUE(memcmp(quux, "bar", 3));
2018-01-05Factor the monero donation addressMaxithi1-1/+2
Signed-off-by: Maxithi <34792056+Maxithi@users.noreply.github.com>
2018-01-04performance_tests: add a --filter option to select what to runmoneromooo-monero2-63/+108
Removes a good bit of annoyance running those
2017-12-31performance_tests: add RingCT MLSAG gen/ver testsmoneromooo-monero2-0/+97
2017-12-31Add misc hardening flags to the cmake machinerymoneromooo-monero1-1/+1
See https://wiki.debian.org/Hardening#User_Space
2017-12-25Add a chacha20 variant to go with chacha8moneromooo-monero3-6/+6
2017-12-23tests: add levin fuzz testmoneromooo-monero3-0/+359
2017-12-23tests: add http client fuzz testmoneromooo-monero3-0/+120
2017-12-23add parse_url fuzz testmoneromooo-monero4-0/+89
2017-12-23tests: add base58 fuzz testmoneromooo-monero4-0/+87
2017-12-23tests: don't init stuff we don't need in fuzz tests - fastermoneromooo-monero1-32/+1
2017-12-23tests: better load-from-binary fuzz test data filemoneromooo-monero1-0/+0
Looks like there's some kind of header/signature
2017-12-23add load_from_binary/load_from_json fuzzersmoneromooo-monero5-0/+177
2017-12-22factor STL container serializationmoneromooo-monero2-2/+0
2017-12-20Fix exceptions not finding txpool txes when relayingmoneromooo-monero1-1/+1
2017-12-19tests: remove unused/unfinished keccak bitsmoneromooo-monero1-24/+0
The author doesn't seem to be finishing/fixing this, and it doesn't do anything.
2017-12-19tests: test wallets don't need a dummy temp file anymoremoneromooo-monero4-43/+4
2017-12-18performance_tests: add a test for subaddress expansionmoneromooo-monero3-0/+70
2017-12-18tests: fix a buffer overread in a unit testmoneromooo-monero1-3/+1
and remove a leftover debugging sanity check
2017-12-18tests: fix link error in hash tests now needing commonmoneromooo-monero1-0/+1
2017-12-17core_tests: multisig test now tests multiple inputsmoneromooo-monero3-136/+209
2017-12-17Match surae's recommendation to derive multisig keysmoneromooo-monero1-4/+6
2017-12-17wallet2: fix slow multisig unit tests with subaddress patchmoneromooo-monero1-0/+1
While there, move the wallet2 ctor to the cpp file as it's a huge amount of init list now, and remove an unused one.
2017-12-17make multisig work with subaddressesmoneromooo-monero1-7/+11
Thanks to kenshi84 for help getting this work
2017-12-17wallet: guard against partly initialized multisig walletmoneromooo-monero1-5/+12
2017-12-17add multisig core test and factor multisig building blocksmoneromooo-monero6-0/+716
2017-12-17N-1/N multisigmoneromooo-monero1-7/+19
2017-12-17gen_multisig: generates multisig wallets if participants trust each othermoneromooo-monero1-8/+8
2017-12-17wallet2: allow empty wallet filename to avoid saving datamoneromooo-monero1-11/+1
Useful to speed tests up and avoid unnecessary leftover files
2017-12-17tests: add multisig unit testsmoneromooo-monero2-0/+179
2017-12-17Add N/N multisig tx generation and signingmoneromooo-monero2-10/+10
Scheme by luigi1111: Multisig for RingCT on Monero 2 of 2 User A (coordinator): Spendkey b,B Viewkey a,A (shared) User B: Spendkey c,C Viewkey a,A (shared) Public Address: C+B, A Both have their own watch only wallet via C+B, a A will coordinate spending process (though B could easily as well, coordinator is more needed for more participants) A and B watch for incoming outputs B creates "half" key images for discovered output D: I2_D = (Hs(aR)+c) * Hp(D) B also creates 1.5 random keypairs (one scalar and 2 pubkeys; one on base G and one on base Hp(D)) for each output, storing the scalar(k) (linked to D), and sending the pubkeys with I2_D. A also creates "half" key images: I1_D = (Hs(aR)+b) * Hp(D) Then I_D = I1_D + I2_D Having I_D allows A to check spent status of course, but more importantly allows A to actually build a transaction prefix (and thus transaction). A builds the transaction until most of the way through MLSAG_Gen, adding the 2 pubkeys (per input) provided with I2_D to his own generated ones where they are needed (secret row L, R). At this point, A has a mostly completed transaction (but with an invalid/incomplete signature). A sends over the tx and includes r, which allows B (with the recipient's address) to verify the destination and amount (by reconstructing the stealth address and decoding ecdhInfo). B then finishes the signature by computing ss[secret_index][0] = ss[secret_index][0] + k - cc[secret_index]*c (secret indices need to be passed as well). B can then broadcast the tx, or send it back to A for broadcasting. Once B has completed the signing (and verified the tx to be valid), he can add the full I_D to his cache, allowing him to verify spent status as well. NOTE: A and B *must* present key A and B to each other with a valid signature proving they know a and b respectively. Otherwise, trickery like the following becomes possible: A creates viewkey a,A, spendkey b,B, and sends a,A,B to B. B creates a fake key C = zG - B. B sends C back to A. The combined spendkey C+B then equals zG, allowing B to spend funds at any time! The signature fixes this, because B does not know a c corresponding to C (and thus can't produce a signature). 2 of 3 User A (coordinator) Shared viewkey a,A "spendkey" j,J User B "spendkey" k,K User C "spendkey" m,M A collects K and M from B and C B collects J and M from A and C C collects J and K from A and B A computes N = nG, n = Hs(jK) A computes O = oG, o = Hs(jM) B anc C compute P = pG, p = Hs(kM) || Hs(mK) B and C can also compute N and O respectively if they wish to be able to coordinate Address: N+O+P, A The rest follows as above. The coordinator possesses 2 of 3 needed keys; he can get the other needed part of the signature/key images from either of the other two. Alternatively, if secure communication exists between parties: A gives j to B B gives k to C C gives m to A Address: J+K+M, A 3 of 3 Identical to 2 of 2, except the coordinator must collect the key images from both of the others. The transaction must also be passed an additional hop: A -> B -> C (or A -> C -> B), who can then broadcast it or send it back to A. N-1 of N Generally the same as 2 of 3, except participants need to be arranged in a ring to pass their keys around (using either the secure or insecure method). For example (ignoring viewkey so letters line up): [4 of 5] User: spendkey A: a B: b C: c D: d E: e a -> B, b -> C, c -> D, d -> E, e -> A Order of signing does not matter, it just must reach n-1 users. A "remaining keys" list must be passed around with the transaction so the signers know if they should use 1 or both keys. Collecting key image parts becomes a little messy, but basically every wallet sends over both of their parts with a tag for each. Thia way the coordinating wallet can keep track of which images have been added and which wallet they come from. Reasoning: 1. The key images must be added only once (coordinator will get key images for key a from both A and B, he must add only one to get the proper key actual key image) 2. The coordinator must keep track of which helper pubkeys came from which wallet (discussed in 2 of 2 section). The coordinator must choose only one set to use, then include his choice in the "remaining keys" list so the other wallets know which of their keys to use. You can generalize it further to N-2 of N or even M of N, but I'm not sure there's legitimate demand to justify the complexity. It might also be straightforward enough to support with minimal changes from N-1 format. You basically just give each user additional keys for each additional "-1" you desire. N-2 would be 3 keys per user, N-3 4 keys, etc. The process is somewhat cumbersome: To create a N/N multisig wallet: - each participant creates a normal wallet - each participant runs "prepare_multisig", and sends the resulting string to every other participant - each participant runs "make_multisig N A B C D...", with N being the threshold and A B C D... being the strings received from other participants (the threshold must currently equal N) As txes are received, participants' wallets will need to synchronize so that those new outputs may be spent: - each participant runs "export_multisig FILENAME", and sends the FILENAME file to every other participant - each participant runs "import_multisig A B C D...", with A B C D... being the filenames received from other participants Then, a transaction may be initiated: - one of the participants runs "transfer ADDRESS AMOUNT" - this partly signed transaction will be written to the "multisig_monero_tx" file - the initiator sends this file to another participant - that other participant runs "sign_multisig multisig_monero_tx" - the resulting transaction is written to the "multisig_monero_tx" file again - if the threshold was not reached, the file must be sent to another participant, until enough have signed - the last participant to sign runs "submit_multisig multisig_monero_tx" to relay the transaction to the Monero network
2017-12-17unit_tests: fix memwipe test comparisonmoneromooo-monero1-1/+1
free might overwrite the memory, so we can't expect to see the NULs we overwrote with, but at least we shouldn't see the original data.
2017-12-16cryptonote_core does not depend on p2p anymoremoneromooo-monero4-1/+15
As a followon side effect, this makes a lot of inline code included only in particular cpp files (and instanciated when necessary.
2017-12-16move includes around to lessen overall loadmoneromooo-monero11-6/+13
2017-12-16Scrub keys from memory just before scope end.moneromooo-monero1-0/+1
Partially implements #74. Securely erases keys from memory after they are no longer needed. Might have a performance impact, which I haven't measured (perf measurements aren't generally reliable on laptops). Thanks to @stoffu for the suggestion to specialize the pod_to_hex/hex_to_pod functions. Using overloads + SFINAE instead generalizes it so other types can be marked as scrubbed without adding more boilerplate.
2017-12-08add bulletproofs from v7 on testnetmoneromooo-monero2-2/+2
2017-12-08integrate bulletproofs into moneromoneromooo-monero1-0/+1
2017-12-08add bulletproofs to the build, with basic unit testsmoneromooo-monero2-0/+71
Based on Java code from Sarang Noether
2017-12-07util: allow non numeric version partsmoneromooo-monero1-0/+2
2017-11-27new wipeable_string class to replace std::string passphrasesmoneromooo-monero1-1/+1
2017-11-27add a memwipe functionmoneromooo-monero2-0/+67
It's meant to avoid being optimized out memory_cleanse lifted from bitcoin
2017-11-26tests: disable libwallet_api_tests when BUILD_GUI_DEPS is not setmoneromooo-monero1-1/+3
2017-11-16split wallet and wallet_apimoneromooo-monero2-1/+2
This speeds up building a lot when wallet2.h (or something it includes) changes, since all the API includes wallet2.h
2017-11-15unit_tests: fix running without --data-dirmoneromooo-monero1-2/+2
While there, also use the new is_arg_defaulted API instead of going to poke the internal API directly.
2017-11-14unit_tests: fix build after wallet2 list/vector changemoneromooo-monero1-2/+2
2017-11-14move cryptonote command line options to cryptonote_coremoneromooo-monero6-6/+2
Those have no reason to be in a generic module
2017-11-14make this build on SunOS/SolarisPavel Maryanov1-2/+2
2017-11-14remove "using namespace std" from headersmoneromooo-monero4-4/+5
It's nasty, and actually breaks on Solaris, where if.h fails to build due to: struct map *if_memmap;
2017-11-11kaccak: remove unused return valuemoneromooo-monero1-5/+1
2017-11-08Protect node privacy by proper filtering in restricted-mode RPC answersbinaryFate1-2/+2
This patch allows to filter out sensitive information for queries that rely on the pool state, when running in restricted mode. This filtering is only applied to data sent back to RPC queries. Results of inline commands typed locally in the daemon are not affected. In practice, when running with `--restricted-rpc`: * get_transaction_pool will list relayed transactions with the fields "last relayed time" and "received time" set to zero. * get_transaction_pool will not list transaction that have do_not_relay set to true, and will not list key images that are used only for such transactions * get_transaction_pool_hashes.bin will not list such transaction * get_transaction_pool_stats will not count such transactions in any of the aggregated values that are computed The implementation does not make filtering the default, so developers should be mindful of this if they add new RPC functionality. Fixes #2590.
2017-10-29fix libwallet api test after api changeJaquee1-8/+8