// Copyright (c) 2014-2023, The Monero Project // // All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, are // permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this list of // conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, this list // of conditions and the following disclaimer in the documentation and/or other // materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors may be // used to endorse or promote products derived from this software without specific // prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // // Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers #include "wallet.h" #include "pending_transaction.h" #include "unsigned_transaction.h" #include "transaction_history.h" #include "address_book.h" #include "subaddress.h" #include "subaddress_account.h" #include "common_defines.h" #include "common/util.h" #include "mnemonics/electrum-words.h" #include "mnemonics/english.h" #include #include #include #ifdef WIN32 #include #endif #include using namespace std; using namespace cryptonote; #undef MONERO_DEFAULT_LOG_CATEGORY #define MONERO_DEFAULT_LOG_CATEGORY "WalletAPI" namespace Monero { namespace { // copy-pasted from simplewallet static const int DEFAULT_REFRESH_INTERVAL_MILLIS = 1000 * 10; // limit maximum refresh interval as one minute static const int MAX_REFRESH_INTERVAL_MILLIS = 1000 * 60 * 1; // Default refresh interval when connected to remote node static const int DEFAULT_REMOTE_NODE_REFRESH_INTERVAL_MILLIS = 1000 * 10; // Connection timeout 20 sec static const int DEFAULT_CONNECTION_TIMEOUT_MILLIS = 1000 * 20; std::string get_default_ringdb_path(cryptonote::network_type nettype) { boost::filesystem::path dir = tools::get_default_data_dir(); // remove .bitmonero, replace with .shared-ringdb dir = dir.remove_filename(); dir /= ".shared-ringdb"; if (nettype == cryptonote::TESTNET) dir /= "testnet"; else if (nettype == cryptonote::STAGENET) dir /= "stagenet"; return dir.string(); } void checkMultisigWalletReady(const tools::wallet2* wallet) { if (!wallet) { throw runtime_error("Wallet is not initialized yet"); } bool ready; if (!wallet->multisig(&ready)) { throw runtime_error("Wallet is not multisig"); } if (!ready) { throw runtime_error("Multisig wallet is not finalized yet"); } } void checkMultisigWalletReady(const std::unique_ptr &wallet) { return checkMultisigWalletReady(wallet.get()); } void checkMultisigWalletNotReady(const tools::wallet2* wallet) { if (!wallet) { throw runtime_error("Wallet is not initialized yet"); } bool ready; if (!wallet->multisig(&ready)) { throw runtime_error("Wallet is not multisig"); } if (ready) { throw runtime_error("Multisig wallet is already finalized"); } } void checkMultisigWalletNotReady(const std::unique_ptr &wallet) { return checkMultisigWalletNotReady(wallet.get()); } } struct Wallet2CallbackImpl : public tools::i_wallet2_callback { Wallet2CallbackImpl(WalletImpl * wallet) : m_listener(nullptr) , m_wallet(wallet) { } ~Wallet2CallbackImpl() { } void setListener(WalletListener * listener) { m_listener = listener; } WalletListener * getListener() const { return m_listener; } virtual void on_new_block(uint64_t height, const cryptonote::block& block) { // Don't flood the GUI with signals. On fast refresh - send signal every 1000th block // get_refresh_from_block_height() returns the blockheight from when the wallet was // created or the restore height specified when wallet was recovered if(height >= m_wallet->m_wallet->get_refresh_from_block_height() || height % 1000 == 0) { // LOG_PRINT_L3(__FUNCTION__ << ": new block. height: " << height); if (m_listener) { m_listener->newBlock(height); } } } virtual void on_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, uint64_t burnt, const cryptonote::subaddress_index& subaddr_index, bool is_change, uint64_t unlock_time) { std::string tx_hash = epee::string_tools::pod_to_hex(txid); LOG_PRINT_L3(__FUNCTION__ << ": money received. height: " << height << ", tx: " << tx_hash << ", amount: " << print_money(amount - burnt) << ", burnt: " << print_money(burnt) << ", raw_output_value: " << print_money(amount) << ", idx: " << subaddr_index); // do not signal on received tx if wallet is not syncronized completely if (m_listener && m_wallet->synchronized()) { m_listener->moneyReceived(tx_hash, amount - burnt); m_listener->updated(); } } virtual void on_unconfirmed_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, const cryptonote::subaddress_index& subaddr_index) { std::string tx_hash = epee::string_tools::pod_to_hex(txid); LOG_PRINT_L3(__FUNCTION__ << ": unconfirmed money received. height: " << height << ", tx: " << tx_hash << ", amount: " << print_money(amount) << ", idx: " << subaddr_index); // do not signal on received tx if wallet is not syncronized completely if (m_listener && m_wallet->synchronized()) { m_listener->unconfirmedMoneyReceived(tx_hash, amount); m_listener->updated(); } } virtual void on_money_spent(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& in_tx, uint64_t amount, const cryptonote::transaction& spend_tx, const cryptonote::subaddress_index& subaddr_index) { // TODO; std::string tx_hash = epee::string_tools::pod_to_hex(txid); LOG_PRINT_L3(__FUNCTION__ << ": money spent. height: " << height << ", tx: " << tx_hash << ", amount: " << print_money(amount) << ", idx: " << subaddr_index); // do not signal on sent tx if wallet is not syncronized completely if (m_listener && m_wallet->synchronized()) { m_listener->moneySpent(tx_hash, amount); m_listener->updated(); } } virtual void on_skip_transaction(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx) { // TODO; } virtual void on_device_button_request(uint64_t code) { if (m_listener) { m_listener->onDeviceButtonRequest(code); } } virtual void on_device_button_pressed() { if (m_listener) { m_listener->onDeviceButtonPressed(); } } virtual boost::optional on_device_pin_request() { if (m_listener) { auto pin = m_listener->onDevicePinRequest(); if (pin){ return boost::make_optional(epee::wipeable_string((*pin).data(), (*pin).size())); } } return boost::none; } virtual boost::optional on_device_passphrase_request(bool & on_device) { if (m_listener) { auto passphrase = m_listener->onDevicePassphraseRequest(on_device); if (passphrase) { return boost::make_optional(epee::wipeable_string((*passphrase).data(), (*passphrase).size())); } } else { on_device = true; } return boost::none; } virtual void on_device_progress(const hw::device_progress & event) { if (m_listener) { m_listener->onDeviceProgress(DeviceProgress(event.progress(), event.indeterminate())); } } WalletListener * m_listener; WalletImpl * m_wallet; }; Wallet::~Wallet() {} WalletListener::~WalletListener() {} string Wallet::displayAmount(uint64_t amount) { return cryptonote::print_money(amount); } uint64_t Wallet::amountFromString(const string &amount) { uint64_t result = 0; cryptonote::parse_amount(result, amount); return result; } uint64_t Wallet::amountFromDouble(double amount) { std::stringstream ss; ss << std::fixed << std::setprecision(CRYPTONOTE_DISPLAY_DECIMAL_POINT) << amount; return amountFromString(ss.str()); } std::string Wallet::genPaymentId() { crypto::hash8 payment_id = crypto::rand(); return epee::string_tools::pod_to_hex(payment_id); } bool Wallet::paymentIdValid(const string &paiment_id) { crypto::hash8 pid8; if (tools::wallet2::parse_short_payment_id(paiment_id, pid8)) return true; crypto::hash pid; if (tools::wallet2::parse_long_payment_id(paiment_id, pid)) return true; return false; } bool Wallet::addressValid(const std::string &str, NetworkType nettype) { cryptonote::address_parse_info info; return get_account_address_from_str(info, static_cast(nettype), str); } bool Wallet::keyValid(const std::string &secret_key_string, const std::string &address_string, bool isViewKey, NetworkType nettype, std::string &error) { cryptonote::address_parse_info info; if(!get_account_address_from_str(info, static_cast(nettype), address_string)) { error = tr("Failed to parse address"); return false; } cryptonote::blobdata key_data; if(!epee::string_tools::parse_hexstr_to_binbuff(secret_key_string, key_data) || key_data.size() != sizeof(crypto::secret_key)) { error = tr("Failed to parse key"); return false; } crypto::secret_key key = *reinterpret_cast(key_data.data()); // check the key match the given address crypto::public_key pkey; if (!crypto::secret_key_to_public_key(key, pkey)) { error = tr("failed to verify key"); return false; } bool matchAddress = false; if(isViewKey) matchAddress = info.address.m_view_public_key == pkey; else matchAddress = info.address.m_spend_public_key == pkey; if(!matchAddress) { error = tr("key does not match address"); return false; } return true; } std::string Wallet::paymentIdFromAddress(const std::string &str, NetworkType nettype) { cryptonote::address_parse_info info; if (!get_account_address_from_str(info, static_cast(nettype), str)) return ""; if (!info.has_payment_id) return ""; return epee::string_tools::pod_to_hex(info.payment_id); } uint64_t Wallet::maximumAllowedAmount() { return std::numeric_limits::max(); } void Wallet::init(const char *argv0, const char *default_log_base_name, const std::string &log_path, bool console) { #ifdef WIN32 // Activate UTF-8 support for Boost filesystem classes on Windows std::locale::global(boost::locale::generator().generate("")); boost::filesystem::path::imbue(std::locale()); #endif epee::string_tools::set_module_name_and_folder(argv0); mlog_configure(log_path.empty() ? mlog_get_default_log_path(default_log_base_name) : log_path.c_str(), console); } void Wallet::debug(const std::string &category, const std::string &str) { MCDEBUG(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str); } void Wallet::info(const std::string &category, const std::string &str) { MCINFO(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str); } void Wallet::warning(const std::string &category, const std::string &str) { MCWARNING(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str); } void Wallet::error(const std::string &category, const std::string &str) { MCERROR(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str); } ///////////////////////// WalletImpl implementation //////////////////////// WalletImpl::WalletImpl(NetworkType nettype, uint64_t kdf_rounds) :m_wallet(nullptr) , m_status(Wallet::Status_Ok) , m_wallet2Callback(nullptr) , m_recoveringFromSeed(false) , m_recoveringFromDevice(false) , m_synchronized(false) , m_rebuildWalletCache(false) , m_is_connected(false) , m_refreshShouldRescan(false) { m_wallet.reset(new tools::wallet2(static_cast(nettype), kdf_rounds, true)); m_history.reset(new TransactionHistoryImpl(this)); m_wallet2Callback.reset(new Wallet2CallbackImpl(this)); m_wallet->callback(m_wallet2Callback.get()); m_refreshThreadDone = false; m_refreshEnabled = false; m_addressBook.reset(new AddressBookImpl(this)); m_subaddress.reset(new SubaddressImpl(this)); m_subaddressAccount.reset(new SubaddressAccountImpl(this)); m_refreshIntervalMillis = DEFAULT_REFRESH_INTERVAL_MILLIS; m_refreshThread = boost::thread([this] () { this->refreshThreadFunc(); }); } WalletImpl::~WalletImpl() { LOG_PRINT_L1(__FUNCTION__); m_wallet->callback(NULL); // Pause refresh thread - prevents refresh from starting again WalletImpl::pauseRefresh(); // Call the method directly (not polymorphically) to protect against UB in destructor. // Close wallet - stores cache and stops ongoing refresh operation close(false); // do not store wallet as part of the closing activities // Stop refresh thread stopRefresh(); if (m_wallet2Callback->getListener()) { m_wallet2Callback->getListener()->onSetWallet(nullptr); } LOG_PRINT_L1(__FUNCTION__ << " finished"); } bool WalletImpl::create(const std::string &path, const std::string &password, const std::string &language) { clearStatus(); m_recoveringFromSeed = false; m_recoveringFromDevice = false; bool keys_file_exists; bool wallet_file_exists; tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists); LOG_PRINT_L3("wallet_path: " << path << ""); LOG_PRINT_L3("keys_file_exists: " << std::boolalpha << keys_file_exists << std::noboolalpha << " wallet_file_exists: " << std::boolalpha << wallet_file_exists << std::noboolalpha); // add logic to error out if new wallet requested but named wallet file exists if (keys_file_exists || wallet_file_exists) { std::string error = "attempting to generate or restore wallet, but specified file(s) exist. Exiting to not risk overwriting."; LOG_ERROR(error); setStatusCritical(error); return false; } // TODO: validate language m_wallet->set_seed_language(language); crypto::secret_key recovery_val, secret_key; try { recovery_val = m_wallet->generate(path, password, secret_key, false, false); m_password = password; clearStatus(); } catch (const std::exception &e) { LOG_ERROR("Error creating wallet: " << e.what()); setStatusCritical(e.what()); return false; } return true; } bool WalletImpl::createWatchOnly(const std::string &path, const std::string &password, const std::string &language) const { clearStatus(); std::unique_ptr view_wallet(new tools::wallet2(m_wallet->nettype())); // Store same refresh height as original wallet view_wallet->set_refresh_from_block_height(m_wallet->get_refresh_from_block_height()); bool keys_file_exists; bool wallet_file_exists; tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists); LOG_PRINT_L3("wallet_path: " << path << ""); LOG_PRINT_L3("keys_file_exists: " << std::boolalpha << keys_file_exists << std::noboolalpha << " wallet_file_exists: " << std::boolalpha << wallet_file_exists << std::noboolalpha); // add logic to error out if new wallet requested but named wallet file exists if (keys_file_exists || wallet_file_exists) { std::string error = "attempting to generate view only wallet, but specified file(s) exist. Exiting to not risk overwriting."; LOG_ERROR(error); setStatusError(error); return false; } // TODO: validate language view_wallet->set_seed_language(language); const crypto::secret_key viewkey = m_wallet->get_account().get_keys().m_view_secret_key; const cryptonote::account_public_address address = m_wallet->get_account().get_keys().m_account_address; try { // Generate view only wallet view_wallet->generate(path, password, address, viewkey); // Export/Import outputs auto outputs = m_wallet->export_outputs(true/*all*/); view_wallet->import_outputs(outputs); // Copy scanned blockchain auto bc = m_wallet->export_blockchain(); view_wallet->import_blockchain(bc); // copy payments auto payments = m_wallet->export_payments(); view_wallet->import_payments(payments); // copy confirmed outgoing payments std::list> out_payments; m_wallet->get_payments_out(out_payments, 0); view_wallet->import_payments_out(out_payments); // Export/Import key images // We already know the spent status from the outputs we exported, thus no need to check them again auto key_images = m_wallet->export_key_images(true/*all*/); uint64_t spent = 0; uint64_t unspent = 0; view_wallet->import_key_images(key_images.second, key_images.first, spent, unspent, false); clearStatus(); } catch (const std::exception &e) { LOG_ERROR("Error creating view only wallet: " << e.what()); setStatusError(e.what()); return false; } // Store wallet view_wallet->store(); return true; } bool WalletImpl::recoverFromKeys(const std::string &path, const std::string &language, const std::string &address_string, const std::string &viewkey_string, const std::string &spendkey_string) { return recoverFromKeysWithPassword(path, "", language, address_string, viewkey_string, spendkey_string); } bool WalletImpl::recoverFromKeysWithPassword(const std::string &path, const std::string &password, const std::string &language, const std::string &address_string, const std::string &viewkey_string, const std::string &spendkey_string) { cryptonote::address_parse_info info; if(!get_account_address_from_str(info, m_wallet->nettype(), address_string)) { setStatusError(tr("failed to parse address")); return false; } // parse optional spend key crypto::secret_key spendkey; bool has_spendkey = false; if (!spendkey_string.empty()) { cryptonote::blobdata spendkey_data; if(!epee::string_tools::parse_hexstr_to_binbuff(spendkey_string, spendkey_data) || spendkey_data.size() != sizeof(crypto::secret_key)) { setStatusError(tr("failed to parse secret spend key")); return false; } has_spendkey = true; spendkey = *reinterpret_cast(spendkey_data.data()); } // parse view secret key bool has_viewkey = true; crypto::secret_key viewkey; if (viewkey_string.empty()) { if(has_spendkey) { has_viewkey = false; } else { setStatusError(tr("Neither view key nor spend key supplied, cancelled")); return false; } } if(has_viewkey) { cryptonote::blobdata viewkey_data; if(!epee::string_tools::parse_hexstr_to_binbuff(viewkey_string, viewkey_data) || viewkey_data.size() != sizeof(crypto::secret_key)) { setStatusError(tr("failed to parse secret view key")); return false; } viewkey = *reinterpret_cast(viewkey_data.data()); } // check the spend and view keys match the given address crypto::public_key pkey; if(has_spendkey) { if (!crypto::secret_key_to_public_key(spendkey, pkey)) { setStatusError(tr("failed to verify secret spend key")); return false; } if (info.address.m_spend_public_key != pkey) { setStatusError(tr("spend key does not match address")); return false; } } if(has_viewkey) { if (!crypto::secret_key_to_public_key(viewkey, pkey)) { setStatusError(tr("failed to verify secret view key")); return false; } if (info.address.m_view_public_key != pkey) { setStatusError(tr("view key does not match address")); return false; } } try { if (has_spendkey && has_viewkey) { m_wallet->generate(path, password, info.address, spendkey, viewkey); LOG_PRINT_L1("Generated new wallet from spend key and view key"); } if(!has_spendkey && has_viewkey) { m_wallet->generate(path, password, info.address, viewkey); LOG_PRINT_L1("Generated new view only wallet from keys"); } if(has_spendkey && !has_viewkey) { m_wallet->generate(path, password, spendkey, true, false); setSeedLanguage(language); LOG_PRINT_L1("Generated deterministic wallet from spend key with seed language: " + language); } } catch (const std::exception& e) { setStatusError(string(tr("failed to generate new wallet: ")) + e.what()); return false; } return true; } bool WalletImpl::recoverFromDevice(const std::string &path, const std::string &password, const std::string &device_name) { clearStatus(); m_recoveringFromSeed = false; m_recoveringFromDevice = true; try { m_wallet->restore(path, password, device_name); LOG_PRINT_L1("Generated new wallet from device: " + device_name); } catch (const std::exception& e) { setStatusError(string(tr("failed to generate new wallet: ")) + e.what()); return false; } return true; } Wallet::Device WalletImpl::getDeviceType() const { return static_cast(m_wallet->get_device_type()); } bool WalletImpl::open(const std::string &path, const std::string &password) { clearStatus(); m_recoveringFromSeed = false; m_recoveringFromDevice = false; try { // TODO: handle "deprecated" // Check if wallet cache exists bool keys_file_exists; bool wallet_file_exists; tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists); if(!wallet_file_exists){ // Rebuilding wallet cache, using refresh height from .keys file m_rebuildWalletCache = true; } m_wallet->set_ring_database(get_default_ringdb_path(m_wallet->nettype())); m_wallet->load(path, password); m_password = password; } catch (const std::exception &e) { LOG_ERROR("Error opening wallet: " << e.what()); setStatusCritical(e.what()); } return status() == Status_Ok; } bool WalletImpl::recover(const std::string &path, const std::string &seed) { return recover(path, "", seed); } bool WalletImpl::recover(const std::string &path, const std::string &password, const std::string &seed, const std::string &seed_offset/* = {}*/) { clearStatus(); m_errorString.clear(); if (seed.empty()) { LOG_ERROR("Electrum seed is empty"); setStatusError(tr("Electrum seed is empty")); return false; } m_recoveringFromSeed = true; m_recoveringFromDevice = false; crypto::secret_key recovery_key; std::string old_language; if (!crypto::ElectrumWords::words_to_bytes(seed, recovery_key, old_language)) { setStatusError(tr("Electrum-style word list failed verification")); return false; } if (!seed_offset.empty()) { recovery_key = cryptonote::decrypt_key(recovery_key, seed_offset); } if (old_language == crypto::ElectrumWords::old_language_name) old_language = Language::English().get_language_name(); try { m_wallet->set_seed_language(old_language); m_wallet->generate(path, password, recovery_key, true, false); } catch (const std::exception &e) { setStatusCritical(e.what()); } return status() == Status_Ok; } bool WalletImpl::close(bool store) { bool result = false; LOG_PRINT_L1("closing wallet..."); try { if (store) { // Do not store wallet with invalid status // Status Critical refers to errors on opening or creating wallets. if (status() != Status_Critical) m_wallet->store(); else LOG_ERROR("Status_Critical - not saving wallet"); LOG_PRINT_L1("wallet::store done"); } LOG_PRINT_L1("Calling wallet::stop..."); m_wallet->stop(); LOG_PRINT_L1("wallet::stop done"); m_wallet->deinit(); result = true; clearStatus(); } catch (const std::exception &e) { setStatusCritical(e.what()); LOG_ERROR("Error closing wallet: " << e.what()); } return result; } std::string WalletImpl::seed(const std::string& seed_offset) const { epee::wipeable_string seed; if (m_wallet) m_wallet->get_seed(seed, seed_offset); return std::string(seed.data(), seed.size()); // TODO } std::string WalletImpl::getSeedLanguage() const { return m_wallet->get_seed_language(); } void WalletImpl::setSeedLanguage(const std::string &arg) { m_wallet->set_seed_language(arg); } int WalletImpl::status() const { boost::lock_guard l(m_statusMutex); return m_status; } std::string WalletImpl::errorString() const { boost::lock_guard l(m_statusMutex); return m_errorString; } void WalletImpl::statusWithErrorString(int& status, std::string& errorString) const { boost::lock_guard l(m_statusMutex); status = m_status; errorString = m_errorString; } bool WalletImpl::setPassword(const std::string &password) { clearStatus(); try { m_wallet->change_password(m_wallet->get_wallet_file(), m_password, password); m_password = password; } catch (const std::exception &e) { setStatusError(e.what()); } return status() == Status_Ok; } const std::string& WalletImpl::getPassword() const { return m_password; } bool WalletImpl::setDevicePin(const std::string &pin) { clearStatus(); try { m_wallet->get_account().get_device().set_pin(epee::wipeable_string(pin.data(), pin.size())); } catch (const std::exception &e) { setStatusError(e.what()); } return status() == Status_Ok; } bool WalletImpl::setDevicePassphrase(const std::string &passphrase) { clearStatus(); try { m_wallet->get_account().get_device().set_passphrase(epee::wipeable_string(passphrase.data(), passphrase.size())); } catch (const std::exception &e) { setStatusError(e.what()); } return status() == Status_Ok; } std::string WalletImpl::address(uint32_t accountIndex, uint32_t addressIndex) const { return m_wallet->get_subaddress_as_str({accountIndex, addressIndex}); } std::string WalletImpl::integratedAddress(const std::string &payment_id) const { crypto::hash8 pid; if (!tools::wallet2::parse_short_payment_id(payment_id, pid)) { return ""; } return m_wallet->get_integrated_address_as_str(pid); } std::string WalletImpl::secretViewKey() const { return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_view_secret_key); } std::string WalletImpl::publicViewKey() const { return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_account_address.m_view_public_key); } std::string WalletImpl::secretSpendKey() const { return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_spend_secret_key); } std::string WalletImpl::publicSpendKey() const { return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_account_address.m_spend_public_key); } std::string WalletImpl::publicMultisigSignerKey() const { try { crypto::public_key signer = m_wallet->get_multisig_signer_public_key(); return epee::string_tools::pod_to_hex(signer); } catch (const std::exception&) { return ""; } } std::string WalletImpl::path() const { return m_wallet->path(); } void WalletImpl::stop() { m_wallet->stop(); } bool WalletImpl::store(const std::string &path) { clearStatus(); try { if (path.empty()) { m_wallet->store(); } else { m_wallet->store_to(path, m_password); } } catch (const std::exception &e) { LOG_ERROR("Error saving wallet: " << e.what()); setStatusError(e.what()); return false; } return true; } string WalletImpl::filename() const { return m_wallet->get_wallet_file(); } string WalletImpl::keysFilename() const { return m_wallet->get_keys_file(); } bool WalletImpl::init(const std::string &daemon_address, uint64_t upper_transaction_size_limit, const std::string &daemon_username, const std::string &daemon_password, bool use_ssl, bool lightWallet, const std::string &proxy_address) { clearStatus(); if(daemon_username != "") m_daemon_login.emplace(daemon_username, daemon_password); return doInit(daemon_address, proxy_address, upper_transaction_size_limit, use_ssl); } void WalletImpl::setRefreshFromBlockHeight(uint64_t refresh_from_block_height) { m_wallet->set_refresh_from_block_height(refresh_from_block_height); } void WalletImpl::setRecoveringFromSeed(bool recoveringFromSeed) { m_recoveringFromSeed = recoveringFromSeed; } void WalletImpl::setRecoveringFromDevice(bool recoveringFromDevice) { m_recoveringFromDevice = recoveringFromDevice; } void WalletImpl::setSubaddressLookahead(uint32_t major, uint32_t minor) { m_wallet->set_subaddress_lookahead(major, minor); } uint64_t WalletImpl::balance(uint32_t accountIndex) const { return m_wallet->balance(accountIndex, false); } uint64_t WalletImpl::unlockedBalance(uint32_t accountIndex) const { return m_wallet->unlocked_balance(accountIndex, false); } uint64_t WalletImpl::blockChainHeight() const { return m_wallet->get_blockchain_current_height(); } uint64_t WalletImpl::approximateBlockChainHeight() const { return m_wallet->get_approximate_blockchain_height(); } uint64_t WalletImpl::estimateBlockChainHeight() const { return m_wallet->estimate_blockchain_height(); } uint64_t WalletImpl::daemonBlockChainHeight() const { if (!m_is_connected) return 0; std::string err; uint64_t result = m_wallet->get_daemon_blockchain_height(err); if (!err.empty()) { LOG_ERROR(__FUNCTION__ << ": " << err); result = 0; setStatusError(err); } else { clearStatus(); } return result; } uint64_t WalletImpl::daemonBlockChainTargetHeight() const { if (!m_is_connected) return 0; std::string err; uint64_t result = m_wallet->get_daemon_blockchain_target_height(err); if (!err.empty()) { LOG_ERROR(__FUNCTION__ << ": " << err); result = 0; setStatusError(err); } else { clearStatus(); } // Target height can be 0 when daemon is synced. Use blockchain height instead. if(result == 0) result = daemonBlockChainHeight(); return result; } bool WalletImpl::daemonSynced() const { if(connected() == Wallet::ConnectionStatus_Disconnected) return false; uint64_t blockChainHeight = daemonBlockChainHeight(); return (blockChainHeight >= daemonBlockChainTargetHeight() && blockChainHeight > 1); } bool WalletImpl::synchronized() const { return m_synchronized; } bool WalletImpl::refresh() { clearStatus(); //TODO: make doRefresh return bool to know whether the error occured during refresh or not //otherwise one may try, say, to send transaction, transfer fails and this method returns false doRefresh(); return status() == Status_Ok; } void WalletImpl::refreshAsync() { LOG_PRINT_L3(__FUNCTION__ << ": Refreshing asynchronously.."); clearStatus(); m_refreshCV.notify_one(); } bool WalletImpl::rescanBlockchain() { clearStatus(); m_refreshShouldRescan = true; doRefresh(); return status() == Status_Ok; } void WalletImpl::rescanBlockchainAsync() { m_refreshShouldRescan = true; refreshAsync(); } void WalletImpl::setAutoRefreshInterval(int millis) { if (millis > MAX_REFRESH_INTERVAL_MILLIS) { LOG_ERROR(__FUNCTION__<< ": invalid refresh interval " << millis << " ms, maximum allowed is " << MAX_REFRESH_INTERVAL_MILLIS << " ms"); m_refreshIntervalMillis = MAX_REFRESH_INTERVAL_MILLIS; } else { m_refreshIntervalMillis = millis; } } int WalletImpl::autoRefreshInterval() const { return m_refreshIntervalMillis; } UnsignedTransaction *WalletImpl::loadUnsignedTx(const std::string &unsigned_filename) { clearStatus(); UnsignedTransactionImpl * transaction = new UnsignedTransactionImpl(*this); if (!m_wallet->load_unsigned_tx(unsigned_filename, transaction->m_unsigned_tx_set)){ setStatusError(tr("Failed to load unsigned transactions")); transaction->m_status = UnsignedTransaction::Status::Status_Error; transaction->m_errorString = errorString(); return transaction; } // Check tx data and construct confirmation message std::string extra_message; if (!std::get<2>(transaction->m_unsigned_tx_set.transfers).empty()) extra_message = (boost::format("%u outputs to import. ") % (unsigned)std::get<2>(transaction->m_unsigned_tx_set.transfers).size()).str(); transaction->checkLoadedTx([&transaction](){return transaction->m_unsigned_tx_set.txes.size();}, [&transaction](size_t n)->const tools::wallet2::tx_construction_data&{return transaction->m_unsigned_tx_set.txes[n];}, extra_message); setStatus(transaction->status(), transaction->errorString()); return transaction; } bool WalletImpl::submitTransaction(const string &fileName) { clearStatus(); std::unique_ptr transaction(new PendingTransactionImpl(*this)); bool r = m_wallet->load_tx(fileName, transaction->m_pending_tx); if (!r) { setStatus(Status_Ok, tr("Failed to load transaction from file")); return false; } if(!transaction->commit()) { setStatusError(transaction->m_errorString); return false; } return true; } bool WalletImpl::exportKeyImages(const string &filename, bool all) { if (m_wallet->watch_only()) { setStatusError(tr("Wallet is view only")); return false; } try { if (!m_wallet->export_key_images(filename, all)) { setStatusError(tr("failed to save file ") + filename); return false; } } catch (const std::exception &e) { LOG_ERROR("Error exporting key images: " << e.what()); setStatusError(e.what()); return false; } return true; } bool WalletImpl::importKeyImages(const string &filename) { if (!trustedDaemon()) { setStatusError(tr("Key images can only be imported with a trusted daemon")); return false; } try { uint64_t spent = 0, unspent = 0; uint64_t height = m_wallet->import_key_images(filename, spent, unspent); LOG_PRINT_L2("Signed key images imported to height " << height << ", " << print_money(spent) << " spent, " << print_money(unspent) << " unspent"); } catch (const std::exception &e) { LOG_ERROR("Error exporting key images: " << e.what()); setStatusError(string(tr("Failed to import key images: ")) + e.what()); return false; } return true; } bool WalletImpl::exportOutputs(const string &filename, bool all) { if (m_wallet->key_on_device()) { setStatusError(string(tr("Not supported on HW wallets.")) + filename); return false; } try { std::string data = m_wallet->export_outputs_to_str(all); bool r = m_wallet->save_to_file(filename, data); if (!r) { LOG_ERROR("Failed to save file " << filename); setStatusError(string(tr("Failed to save file: ")) + filename); return false; } } catch (const std::exception &e) { LOG_ERROR("Error exporting outputs: " << e.what()); setStatusError(string(tr("Error exporting outputs: ")) + e.what()); return false; } LOG_PRINT_L2("Outputs exported to " << filename); return true; } bool WalletImpl::importOutputs(const string &filename) { if (m_wallet->key_on_device()) { setStatusError(string(tr("Not supported on HW wallets.")) + filename); return false; } std::string data; bool r = m_wallet->load_from_file(filename, data); if (!r) { LOG_ERROR("Failed to read file: " << filename); setStatusError(string(tr("Failed to read file: ")) + filename); return false; } try { size_t n_outputs = m_wallet->import_outputs_from_str(data); LOG_PRINT_L2(std::to_string(n_outputs) << " outputs imported"); } catch (const std::exception &e) { LOG_ERROR("Failed to import outputs: " << e.what()); setStatusError(string(tr("Failed to import outputs: ")) + e.what()); return false; } return true; } bool WalletImpl::scanTransactions(const std::vector &txids) { if (txids.empty()) { setStatusError(string(tr("Failed to scan transactions: no transaction ids provided."))); return false; } // Parse and dedup args std::unordered_set txids_u; for (const auto &s : txids) { crypto::hash txid; if (!epee::string_tools::hex_to_pod(s, txid)) { setStatusError(string(tr("Invalid txid specified: ")) + s); return false; } txids_u.insert(txid); } try { m_wallet->scan_tx(txids_u); } catch (const tools::error::wont_reprocess_recent_txs_via_untrusted_daemon &e) { setStatusError(e.what()); return false; } catch (const std::exception &e) { LOG_ERROR("Failed to scan transaction: " << e.what()); setStatusError(string(tr("Failed to scan transaction: ")) + e.what()); return false; } return true; } void WalletImpl::addSubaddressAccount(const std::string& label) { m_wallet->add_subaddress_account(label); } size_t WalletImpl::numSubaddressAccounts() const { return m_wallet->get_num_subaddress_accounts(); } size_t WalletImpl::numSubaddresses(uint32_t accountIndex) const { return m_wallet->get_num_subaddresses(accountIndex); } void WalletImpl::addSubaddress(uint32_t accountIndex, const std::string& label) { m_wallet->add_subaddress(accountIndex, label); } std::string WalletImpl::getSubaddressLabel(uint32_t accountIndex, uint32_t addressIndex) const { try { return m_wallet->get_subaddress_label({accountIndex, addressIndex}); } catch (const std::exception &e) { LOG_ERROR("Error getting subaddress label: " << e.what()); setStatusError(string(tr("Failed to get subaddress label: ")) + e.what()); return ""; } } void WalletImpl::setSubaddressLabel(uint32_t accountIndex, uint32_t addressIndex, const std::string &label) { try { return m_wallet->set_subaddress_label({accountIndex, addressIndex}, label); } catch (const std::exception &e) { LOG_ERROR("Error setting subaddress label: " << e.what()); setStatusError(string(tr("Failed to set subaddress label: ")) + e.what()); } } MultisigState WalletImpl::multisig() const { MultisigState state; state.isMultisig = m_wallet->multisig(&state.isReady, &state.threshold, &state.total); return state; } string WalletImpl::getMultisigInfo() const { try { clearStatus(); return m_wallet->get_multisig_first_kex_msg(); } catch (const exception& e) { LOG_ERROR("Error on generating multisig info: " << e.what()); setStatusError(string(tr("Failed to get multisig info: ")) + e.what()); } return string(); } string WalletImpl::makeMultisig(const vector& info, const uint32_t threshold) { try { clearStatus(); if (m_wallet->multisig()) { throw runtime_error("Wallet is already multisig"); } return m_wallet->make_multisig(epee::wipeable_string(m_password), info, threshold); } catch (const exception& e) { LOG_ERROR("Error on making multisig wallet: " << e.what()); setStatusError(string(tr("Failed to make multisig: ")) + e.what()); } return string(); } std::string WalletImpl::exchangeMultisigKeys(const std::vector &info, const bool force_update_use_with_caution /*= false*/) { try { clearStatus(); checkMultisigWalletNotReady(m_wallet); return m_wallet->exchange_multisig_keys(epee::wipeable_string(m_password), info, force_update_use_with_caution); } catch (const exception& e) { LOG_ERROR("Error on exchanging multisig keys: " << e.what()); setStatusError(string(tr("Failed to exchange multisig keys: ")) + e.what()); } return string(); } bool WalletImpl::exportMultisigImages(string& images) { try { clearStatus(); checkMultisigWalletReady(m_wallet); auto blob = m_wallet->export_multisig(); images = epee::string_tools::buff_to_hex_nodelimer(blob); return true; } catch (const exception& e) { LOG_ERROR("Error on exporting multisig images: " << e.what()); setStatusError(string(tr("Failed to export multisig images: ")) + e.what()); } return false; } size_t WalletImpl::importMultisigImages(const vector& images) { try { clearStatus(); checkMultisigWalletReady(m_wallet); std::vector blobs; blobs.reserve(images.size()); for (const auto& image: images) { std::string blob; if (!epee::string_tools::parse_hexstr_to_binbuff(image, blob)) { LOG_ERROR("Failed to parse imported multisig images"); setStatusError(tr("Failed to parse imported multisig images")); return 0; } blobs.emplace_back(std::move(blob)); } return m_wallet->import_multisig(blobs); } catch (const exception& e) { LOG_ERROR("Error on importing multisig images: " << e.what()); setStatusError(string(tr("Failed to import multisig images: ")) + e.what()); } return 0; } bool WalletImpl::hasMultisigPartialKeyImages() const { try { clearStatus(); checkMultisigWalletReady(m_wallet); return m_wallet->has_multisig_partial_key_images(); } catch (const exception& e) { LOG_ERROR("Error on checking for partial multisig key images: " << e.what()); setStatusError(string(tr("Failed to check for partial multisig key images: ")) + e.what()); } return false; } PendingTransaction* WalletImpl::restoreMultisigTransaction(const string& signData) { try { clearStatus(); checkMultisigWalletReady(m_wallet); string binary; if (!epee::string_tools::parse_hexstr_to_binbuff(signData, binary)) { throw runtime_error("Failed to deserialize multisig transaction"); } tools::wallet2::multisig_tx_set txSet; if (!m_wallet->load_multisig_tx(binary, txSet, {})) { throw runtime_error("couldn't parse multisig transaction data"); } auto ptx = new PendingTransactionImpl(*this); ptx->m_pending_tx = txSet.m_ptx; ptx->m_signers = txSet.m_signers; return ptx; } catch (exception& e) { LOG_ERROR("Error on restoring multisig transaction: " << e.what()); setStatusError(string(tr("Failed to restore multisig transaction: ")) + e.what()); } return nullptr; } // TODO: // 1 - properly handle payment id (add another menthod with explicit 'payment_id' param) // 2 - check / design how "Transaction" can be single interface // (instead of few different data structures within wallet2 implementation: // - pending_tx; // - transfer_details; // - payment_details; // - unconfirmed_transfer_details; // - confirmed_transfer_details) PendingTransaction *WalletImpl::createTransactionMultDest(const std::vector &dst_addr, const string &payment_id, optional> amount, uint32_t mixin_count, PendingTransaction::Priority priority, uint32_t subaddr_account, std::set subaddr_indices) { clearStatus(); // Pause refresh thread while creating transaction pauseRefresh(); cryptonote::address_parse_info info; uint32_t adjusted_priority = m_wallet->adjust_priority(static_cast(priority)); PendingTransactionImpl * transaction = new PendingTransactionImpl(*this); do { std::vector extra; std::string extra_nonce; vector dsts; if (!amount && dst_addr.size() > 1) { setStatusError(tr("Sending all requires one destination address")); break; } if (amount && (dst_addr.size() != (*amount).size())) { setStatusError(tr("Destinations and amounts are unequal")); break; } if (!payment_id.empty()) { crypto::hash payment_id_long; if (tools::wallet2::parse_long_payment_id(payment_id, payment_id_long)) { cryptonote::set_payment_id_to_tx_extra_nonce(extra_nonce, payment_id_long); } else { setStatusError(tr("payment id has invalid format, expected 64 character hex string: ") + payment_id); break; } } bool error = false; for (size_t i = 0; i < dst_addr.size() && !error; i++) { if(!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), dst_addr[i])) { // TODO: copy-paste 'if treating as an address fails, try as url' from simplewallet.cpp:1982 setStatusError(tr("Invalid destination address")); error = true; break; } if (info.has_payment_id) { if (!extra_nonce.empty()) { setStatusError(tr("a single transaction cannot use more than one payment id")); error = true; break; } set_encrypted_payment_id_to_tx_extra_nonce(extra_nonce, info.payment_id); } if (amount) { cryptonote::tx_destination_entry de; de.original = dst_addr[i]; de.addr = info.address; de.amount = (*amount)[i]; de.is_subaddress = info.is_subaddress; de.is_integrated = info.has_payment_id; dsts.push_back(de); } else { if (subaddr_indices.empty()) { for (uint32_t index = 0; index < m_wallet->get_num_subaddresses(subaddr_account); ++index) subaddr_indices.insert(index); } } } if (error) { break; } if (!extra_nonce.empty() && !add_extra_nonce_to_tx_extra(extra, extra_nonce)) { setStatusError(tr("failed to set up payment id, though it was decoded correctly")); break; } try { size_t fake_outs_count = mixin_count > 0 ? mixin_count : m_wallet->default_mixin(); fake_outs_count = m_wallet->adjust_mixin(mixin_count); if (amount) { transaction->m_pending_tx = m_wallet->create_transactions_2(dsts, fake_outs_count, 0 /* unlock_time */, adjusted_priority, extra, subaddr_account, subaddr_indices); } else { transaction->m_pending_tx = m_wallet->create_transactions_all(0, info.address, info.is_subaddress, 1, fake_outs_count, 0 /* unlock_time */, adjusted_priority, extra, subaddr_account, subaddr_indices); } pendingTxPostProcess(transaction); if (multisig().isMultisig) { auto tx_set = m_wallet->make_multisig_tx_set(transaction->m_pending_tx); transaction->m_pending_tx = tx_set.m_ptx; transaction->m_signers = tx_set.m_signers; } } catch (const tools::error::daemon_busy&) { // TODO: make it translatable with "tr"? setStatusError(tr("daemon is busy. Please try again later.")); } catch (const tools::error::no_connection_to_daemon&) { setStatusError(tr("no connection to daemon. Please make sure daemon is running.")); } catch (const tools::error::wallet_rpc_error& e) { setStatusError(tr("RPC error: ") + e.to_string()); } catch (const tools::error::get_outs_error &e) { setStatusError((boost::format(tr("failed to get outputs to mix: %s")) % e.what()).str()); } catch (const tools::error::not_enough_unlocked_money& e) { std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, available only %s, sent amount %s")) % print_money(e.available()) % print_money(e.tx_amount()); setStatusError(writer.str()); } catch (const tools::error::not_enough_money& e) { std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, overall balance only %s, sent amount %s")) % print_money(e.available()) % print_money(e.tx_amount()); setStatusError(writer.str()); } catch (const tools::error::tx_not_possible& e) { std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, available only %s, transaction amount %s = %s + %s (fee)")) % print_money(e.available()) % print_money(e.tx_amount() + e.fee()) % print_money(e.tx_amount()) % print_money(e.fee()); setStatusError(writer.str()); } catch (const tools::error::not_enough_outs_to_mix& e) { std::ostringstream writer; writer << tr("not enough outputs for specified ring size") << " = " << (e.mixin_count() + 1) << ":"; for (const std::pair outs_for_amount : e.scanty_outs()) { writer << "\n" << tr("output amount") << " = " << print_money(outs_for_amount.first) << ", " << tr("found outputs to use") << " = " << outs_for_amount.second; } writer << "\n" << tr("Please sweep unmixable outputs."); setStatusError(writer.str()); } catch (const tools::error::tx_not_constructed&) { setStatusError(tr("transaction was not constructed")); } catch (const tools::error::tx_rejected& e) { std::ostringstream writer; writer << (boost::format(tr("transaction %s was rejected by daemon with status: ")) % get_transaction_hash(e.tx())) << e.status(); setStatusError(writer.str()); } catch (const tools::error::tx_sum_overflow& e) { setStatusError(e.what()); } catch (const tools::error::zero_amount&) { setStatusError(tr("destination amount is zero")); } catch (const tools::error::zero_destination&) { setStatusError(tr("transaction has no destination")); } catch (const tools::error::tx_too_big& e) { setStatusError(tr("failed to find a suitable way to split transactions")); } catch (const tools::error::transfer_error& e) { setStatusError(string(tr("unknown transfer error: ")) + e.what()); } catch (const tools::error::wallet_internal_error& e) { setStatusError(string(tr("internal error: ")) + e.what()); } catch (const std::exception& e) { setStatusError(string(tr("unexpected error: ")) + e.what()); } catch (...) { setStatusError(tr("unknown error")); } } while (false); statusWithErrorString(transaction->m_status, transaction->m_errorString); // Resume refresh thread startRefresh(); return transaction; } PendingTransaction *WalletImpl::createTransaction(const string &dst_addr, const string &payment_id, optional amount, uint32_t mixin_count, PendingTransaction::Priority priority, uint32_t subaddr_account, std::set subaddr_indices) { return createTransactionMultDest(std::vector {dst_addr}, payment_id, amount ? (std::vector {*amount}) : (optional>()), mixin_count, priority, subaddr_account, subaddr_indices); } PendingTransaction *WalletImpl::createSweepUnmixableTransaction() { clearStatus(); cryptonote::tx_destination_entry de; PendingTransactionImpl * transaction = new PendingTransactionImpl(*this); do { try { transaction->m_pending_tx = m_wallet->create_unmixable_sweep_transactions(); pendingTxPostProcess(transaction); } catch (const tools::error::daemon_busy&) { // TODO: make it translatable with "tr"? setStatusError(tr("daemon is busy. Please try again later.")); } catch (const tools::error::no_connection_to_daemon&) { setStatusError(tr("no connection to daemon. Please make sure daemon is running.")); } catch (const tools::error::wallet_rpc_error& e) { setStatusError(tr("RPC error: ") + e.to_string()); } catch (const tools::error::get_outs_error&) { setStatusError(tr("failed to get outputs to mix")); } catch (const tools::error::not_enough_unlocked_money& e) { setStatusError(""); std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, available only %s, sent amount %s")) % print_money(e.available()) % print_money(e.tx_amount()); setStatusError(writer.str()); } catch (const tools::error::not_enough_money& e) { setStatusError(""); std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, overall balance only %s, sent amount %s")) % print_money(e.available()) % print_money(e.tx_amount()); setStatusError(writer.str()); } catch (const tools::error::tx_not_possible& e) { setStatusError(""); std::ostringstream writer; writer << boost::format(tr("not enough money to transfer, available only %s, transaction amount %s = %s + %s (fee)")) % print_money(e.available()) % print_money(e.tx_amount() + e.fee()) % print_money(e.tx_amount()) % print_money(e.fee()); setStatusError(writer.str()); } catch (const tools::error::not_enough_outs_to_mix& e) { std::ostringstream writer; writer << tr("not enough outputs for specified ring size") << " = " << (e.mixin_count() + 1) << ":"; for (const std::pair outs_for_amount : e.scanty_outs()) { writer << "\n" << tr("output amount") << " = " << print_money(outs_for_amount.first) << ", " << tr("found outputs to use") << " = " << outs_for_amount.second; } setStatusError(writer.str()); } catch (const tools::error::tx_not_constructed&) { setStatusError(tr("transaction was not constructed")); } catch (const tools::error::tx_rejected& e) { std::ostringstream writer; writer << (boost::format(tr("transaction %s was rejected by daemon with status: ")) % get_transaction_hash(e.tx())) << e.status(); setStatusError(writer.str()); } catch (const tools::error::tx_sum_overflow& e) { setStatusError(e.what()); } catch (const tools::error::zero_destination&) { setStatusError(tr("one of destinations is zero")); } catch (const tools::error::tx_too_big& e) { setStatusError(tr("failed to find a suitable way to split transactions")); } catch (const tools::error::transfer_error& e) { setStatusError(string(tr("unknown transfer error: ")) + e.what()); } catch (const tools::error::wallet_internal_error& e) { setStatusError(string(tr("internal error: ")) + e.what()); } catch (const std::exception& e) { setStatusError(string(tr("unexpected error: ")) + e.what()); } catch (...) { setStatusError(tr("unknown error")); } } while (false); statusWithErrorString(transaction->m_status, transaction->m_errorString); return transaction; } void WalletImpl::disposeTransaction(PendingTransaction *t) { delete t; } uint64_t WalletImpl::estimateTransactionFee(const std::vector> &destinations, PendingTransaction::Priority priority) const { const size_t pubkey_size = 33; const size_t encrypted_paymentid_size = 11; const size_t extra_size = pubkey_size + encrypted_paymentid_size; return m_wallet->estimate_fee( m_wallet->use_fork_rules(HF_VERSION_PER_BYTE_FEE, 0), m_wallet->use_fork_rules(4, 0), 1, m_wallet->get_min_ring_size() - 1, destinations.size() + 1, extra_size, m_wallet->use_fork_rules(8, 0), m_wallet->use_fork_rules(HF_VERSION_CLSAG, 0), m_wallet->use_fork_rules(HF_VERSION_BULLETPROOF_PLUS, 0), m_wallet->use_fork_rules(HF_VERSION_VIEW_TAGS, 0), m_wallet->get_base_fee(priority), m_wallet->get_fee_quantization_mask()); } TransactionHistory *WalletImpl::history() { return m_history.get(); } AddressBook *WalletImpl::addressBook() { return m_addressBook.get(); } Subaddress *WalletImpl::subaddress() { return m_subaddress.get(); } SubaddressAccount *WalletImpl::subaddressAccount() { return m_subaddressAccount.get(); } void WalletImpl::setListener(WalletListener *l) { // TODO thread synchronization; m_wallet2Callback->setListener(l); } uint32_t WalletImpl::defaultMixin() const { return m_wallet->default_mixin(); } void WalletImpl::setDefaultMixin(uint32_t arg) { m_wallet->default_mixin(arg); } bool WalletImpl::setCacheAttribute(const std::string &key, const std::string &val) { m_wallet->set_attribute(key, val); return true; } std::string WalletImpl::getCacheAttribute(const std::string &key) const { std::string value; m_wallet->get_attribute(key, value); return value; } bool WalletImpl::setUserNote(const std::string &txid, const std::string ¬e) { cryptonote::blobdata txid_data; if(!epee::string_tools::parse_hexstr_to_binbuff(txid, txid_data) || txid_data.size() != sizeof(crypto::hash)) return false; const crypto::hash htxid = *reinterpret_cast(txid_data.data()); m_wallet->set_tx_note(htxid, note); return true; } std::string WalletImpl::getUserNote(const std::string &txid) const { cryptonote::blobdata txid_data; if(!epee::string_tools::parse_hexstr_to_binbuff(txid, txid_data) || txid_data.size() != sizeof(crypto::hash)) return ""; const crypto::hash htxid = *reinterpret_cast(txid_data.data()); return m_wallet->get_tx_note(htxid); } std::string WalletImpl::getTxKey(const std::string &txid_str) const { crypto::hash txid; if(!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return ""; } crypto::secret_key tx_key; std::vector additional_tx_keys; try { clearStatus(); if (m_wallet->get_tx_key(txid, tx_key, additional_tx_keys)) { clearStatus(); std::ostringstream oss; oss << epee::string_tools::pod_to_hex(tx_key); for (size_t i = 0; i < additional_tx_keys.size(); ++i) oss << epee::string_tools::pod_to_hex(additional_tx_keys[i]); return oss.str(); } else { setStatusError(tr("no tx keys found for this txid")); return ""; } } catch (const std::exception &e) { setStatusError(e.what()); return ""; } } bool WalletImpl::checkTxKey(const std::string &txid_str, std::string tx_key_str, const std::string &address_str, uint64_t &received, bool &in_pool, uint64_t &confirmations) { crypto::hash txid; if (!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return false; } crypto::secret_key tx_key; std::vector additional_tx_keys; if (!epee::string_tools::hex_to_pod(tx_key_str.substr(0, 64), tx_key)) { setStatusError(tr("Failed to parse tx key")); return false; } tx_key_str = tx_key_str.substr(64); while (!tx_key_str.empty()) { additional_tx_keys.resize(additional_tx_keys.size() + 1); if (!epee::string_tools::hex_to_pod(tx_key_str.substr(0, 64), additional_tx_keys.back())) { setStatusError(tr("Failed to parse tx key")); return false; } tx_key_str = tx_key_str.substr(64); } cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str)) { setStatusError(tr("Failed to parse address")); return false; } try { m_wallet->check_tx_key(txid, tx_key, additional_tx_keys, info.address, received, in_pool, confirmations); clearStatus(); return true; } catch (const std::exception &e) { setStatusError(e.what()); return false; } } std::string WalletImpl::getTxProof(const std::string &txid_str, const std::string &address_str, const std::string &message) const { crypto::hash txid; if (!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return ""; } cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str)) { setStatusError(tr("Failed to parse address")); return ""; } try { clearStatus(); return m_wallet->get_tx_proof(txid, info.address, info.is_subaddress, message); } catch (const std::exception &e) { setStatusError(e.what()); return ""; } } bool WalletImpl::checkTxProof(const std::string &txid_str, const std::string &address_str, const std::string &message, const std::string &signature, bool &good, uint64_t &received, bool &in_pool, uint64_t &confirmations) { crypto::hash txid; if (!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return false; } cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str)) { setStatusError(tr("Failed to parse address")); return false; } try { good = m_wallet->check_tx_proof(txid, info.address, info.is_subaddress, message, signature, received, in_pool, confirmations); clearStatus(); return true; } catch (const std::exception &e) { setStatusError(e.what()); return false; } } std::string WalletImpl::getSpendProof(const std::string &txid_str, const std::string &message) const { crypto::hash txid; if(!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return ""; } try { clearStatus(); return m_wallet->get_spend_proof(txid, message); } catch (const std::exception &e) { setStatusError(e.what()); return ""; } } bool WalletImpl::checkSpendProof(const std::string &txid_str, const std::string &message, const std::string &signature, bool &good) const { good = false; crypto::hash txid; if(!epee::string_tools::hex_to_pod(txid_str, txid)) { setStatusError(tr("Failed to parse txid")); return false; } try { clearStatus(); good = m_wallet->check_spend_proof(txid, message, signature); return true; } catch (const std::exception &e) { setStatusError(e.what()); return false; } } std::string WalletImpl::getReserveProof(bool all, uint32_t account_index, uint64_t amount, const std::string &message) const { try { clearStatus(); boost::optional> account_minreserve; if (!all) { account_minreserve = std::make_pair(account_index, amount); } return m_wallet->get_reserve_proof(account_minreserve, message); } catch (const std::exception &e) { setStatusError(e.what()); return ""; } } bool WalletImpl::checkReserveProof(const std::string &address, const std::string &message, const std::string &signature, bool &good, uint64_t &total, uint64_t &spent) const { cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address)) { setStatusError(tr("Failed to parse address")); return false; } if (info.is_subaddress) { setStatusError(tr("Address must not be a subaddress")); return false; } good = false; try { clearStatus(); good = m_wallet->check_reserve_proof(info.address, message, signature, total, spent); return true; } catch (const std::exception &e) { setStatusError(e.what()); return false; } } std::string WalletImpl::signMessage(const std::string &message, const std::string &address) { if (address.empty()) { return m_wallet->sign(message, tools::wallet2::sign_with_spend_key); } cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address)) { setStatusError(tr("Failed to parse address")); return ""; } auto index = m_wallet->get_subaddress_index(info.address); if (!index) { setStatusError(tr("Address doesn't belong to the wallet")); return ""; } return m_wallet->sign(message, tools::wallet2::sign_with_spend_key, *index); } bool WalletImpl::verifySignedMessage(const std::string &message, const std::string &address, const std::string &signature) const { cryptonote::address_parse_info info; if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address)) return false; return m_wallet->verify(message, info.address, signature).valid; } std::string WalletImpl::signMultisigParticipant(const std::string &message) const { clearStatus(); bool ready = false; if (!m_wallet->multisig(&ready) || !ready) { m_status = Status_Error; m_errorString = tr("The wallet must be in multisig ready state"); return {}; } try { return m_wallet->sign_multisig_participant(message); } catch (const std::exception& e) { m_status = Status_Error; m_errorString = e.what(); } return {}; } bool WalletImpl::verifyMessageWithPublicKey(const std::string &message, const std::string &publicKey, const std::string &signature) const { clearStatus(); cryptonote::blobdata pkeyData; if(!epee::string_tools::parse_hexstr_to_binbuff(publicKey, pkeyData) || pkeyData.size() != sizeof(crypto::public_key)) { m_status = Status_Error; m_errorString = tr("Given string is not a key"); return false; } try { crypto::public_key pkey = *reinterpret_cast(pkeyData.data()); return m_wallet->verify_with_public_key(message, pkey, signature); } catch (const std::exception& e) { m_status = Status_Error; m_errorString = e.what(); } return false; } bool WalletImpl::connectToDaemon() { bool result = m_wallet->check_connection(NULL, NULL, DEFAULT_CONNECTION_TIMEOUT_MILLIS); if (!result) { setStatusError("Error connecting to daemon at " + m_wallet->get_daemon_address()); } else { clearStatus(); // start refreshing here } return result; } Wallet::ConnectionStatus WalletImpl::connected() const { uint32_t version = 0; bool wallet_is_outdated = false, daemon_is_outdated = false; m_is_connected = m_wallet->check_connection(&version, NULL, DEFAULT_CONNECTION_TIMEOUT_MILLIS, &wallet_is_outdated, &daemon_is_outdated); if (!m_is_connected) { if (wallet_is_outdated || daemon_is_outdated) return Wallet::ConnectionStatus_WrongVersion; else return Wallet::ConnectionStatus_Disconnected; } if ((version >> 16) != CORE_RPC_VERSION_MAJOR) return Wallet::ConnectionStatus_WrongVersion; return Wallet::ConnectionStatus_Connected; } void WalletImpl::setTrustedDaemon(bool arg) { m_wallet->set_trusted_daemon(arg); } bool WalletImpl::trustedDaemon() const { return m_wallet->is_trusted_daemon(); } bool WalletImpl::setProxy(const std::string &address) { return m_wallet->set_proxy(address); } bool WalletImpl::watchOnly() const { return m_wallet->watch_only(); } bool WalletImpl::isDeterministic() const { return m_wallet->is_deterministic(); } void WalletImpl::clearStatus() const { boost::lock_guard l(m_statusMutex); m_status = Status_Ok; m_errorString.clear(); } void WalletImpl::setStatusError(const std::string& message) const { setStatus(Status_Error, message); } void WalletImpl::setStatusCritical(const std::string& message) const { setStatus(Status_Critical, message); } void WalletImpl::setStatus(int status, const std::string& message) const { boost::lock_guard l(m_statusMutex); m_status = status; m_errorString = message; } void WalletImpl::refreshThreadFunc() { LOG_PRINT_L3(__FUNCTION__ << ": starting refresh thread"); while (true) { boost::mutex::scoped_lock lock(m_refreshMutex); if (m_refreshThreadDone) { break; } LOG_PRINT_L3(__FUNCTION__ << ": waiting for refresh..."); // if auto refresh enabled, we wait for the "m_refreshIntervalSeconds" interval. // if not - we wait forever if (m_refreshIntervalMillis > 0) { boost::posix_time::milliseconds wait_for_ms(m_refreshIntervalMillis.load()); m_refreshCV.timed_wait(lock, wait_for_ms); } else { m_refreshCV.wait(lock); } LOG_PRINT_L3(__FUNCTION__ << ": refresh lock acquired..."); LOG_PRINT_L3(__FUNCTION__ << ": m_refreshEnabled: " << m_refreshEnabled); LOG_PRINT_L3(__FUNCTION__ << ": m_status: " << status()); LOG_PRINT_L3(__FUNCTION__ << ": m_refreshShouldRescan: " << m_refreshShouldRescan); if (m_refreshEnabled) { LOG_PRINT_L3(__FUNCTION__ << ": refreshing..."); doRefresh(); } } LOG_PRINT_L3(__FUNCTION__ << ": refresh thread stopped"); } void WalletImpl::doRefresh() { bool rescan = m_refreshShouldRescan.exchange(false); // synchronizing async and sync refresh calls boost::lock_guard guarg(m_refreshMutex2); do try { LOG_PRINT_L3(__FUNCTION__ << ": doRefresh, rescan = "<rescan_blockchain(false); m_wallet->refresh(trustedDaemon()); if (!m_synchronized) { m_synchronized = true; } // assuming if we have empty history, it wasn't initialized yet // for further history changes client need to update history in // "on_money_received" and "on_money_sent" callbacks if (m_history->count() == 0) { m_history->refresh(); } m_wallet->find_and_save_rings(false); } else { LOG_PRINT_L3(__FUNCTION__ << ": skipping refresh - daemon is not synced"); } } catch (const std::exception &e) { setStatusError(e.what()); break; }while(!rescan && (rescan=m_refreshShouldRescan.exchange(false))); // repeat if not rescanned and rescan was requested if (m_wallet2Callback->getListener()) { m_wallet2Callback->getListener()->refreshed(); } } void WalletImpl::startRefresh() { if (!m_refreshEnabled) { LOG_PRINT_L2(__FUNCTION__ << ": refresh started/resumed..."); m_refreshEnabled = true; m_refreshCV.notify_one(); } } void WalletImpl::stopRefresh() { if (!m_refreshThreadDone) { m_refreshEnabled = false; m_refreshThreadDone = true; m_refreshCV.notify_one(); m_refreshThread.join(); } } void WalletImpl::pauseRefresh() { LOG_PRINT_L2(__FUNCTION__ << ": refresh paused..."); // TODO synchronize access if (!m_refreshThreadDone) { m_refreshEnabled = false; } } bool WalletImpl::isNewWallet() const { // in case wallet created without daemon connection, closed and opened again, // it's the same case as if it created from scratch, i.e. we need "fast sync" // with the daemon (pull hashes instead of pull blocks). // If wallet cache is rebuilt, creation height stored in .keys is used. // Watch only wallet is a copy of an existing wallet. return !(blockChainHeight() > 1 || m_recoveringFromSeed || m_recoveringFromDevice || m_rebuildWalletCache) && !watchOnly(); } void WalletImpl::pendingTxPostProcess(PendingTransactionImpl * pending) { // If the device being used is HW device with cold signing protocol, cold sign then. if (!m_wallet->get_account().get_device().has_tx_cold_sign()){ return; } tools::wallet2::signed_tx_set exported_txs; std::vector dsts_info; m_wallet->cold_sign_tx(pending->m_pending_tx, exported_txs, dsts_info, pending->m_tx_device_aux); pending->m_key_images = exported_txs.key_images; pending->m_pending_tx = exported_txs.ptx; } bool WalletImpl::doInit(const string &daemon_address, const std::string &proxy_address, uint64_t upper_transaction_size_limit, bool ssl) { if (!m_wallet->init(daemon_address, m_daemon_login, proxy_address, upper_transaction_size_limit)) return false; // in case new wallet, this will force fast-refresh (pulling hashes instead of blocks) // If daemon isn't synced a calculated block height will be used instead if (isNewWallet() && daemonSynced()) { LOG_PRINT_L2(__FUNCTION__ << ":New Wallet - fast refresh until " << daemonBlockChainHeight()); m_wallet->set_refresh_from_block_height(daemonBlockChainHeight()); } if (m_rebuildWalletCache) LOG_PRINT_L2(__FUNCTION__ << ": Rebuilding wallet cache, fast refresh until block " << m_wallet->get_refresh_from_block_height()); if (Utils::isAddressLocal(daemon_address)) { this->setTrustedDaemon(true); m_refreshIntervalMillis = DEFAULT_REFRESH_INTERVAL_MILLIS; } else { this->setTrustedDaemon(false); m_refreshIntervalMillis = DEFAULT_REMOTE_NODE_REFRESH_INTERVAL_MILLIS; } return true; } bool WalletImpl::parse_uri(const std::string &uri, std::string &address, std::string &payment_id, uint64_t &amount, std::string &tx_description, std::string &recipient_name, std::vector &unknown_parameters, std::string &error) { return m_wallet->parse_uri(uri, address, payment_id, amount, tx_description, recipient_name, unknown_parameters, error); } std::string WalletImpl::make_uri(const std::string &address, const std::string &payment_id, uint64_t amount, const std::string &tx_description, const std::string &recipient_name, std::string &error) const { return m_wallet->make_uri(address, payment_id, amount, tx_description, recipient_name, error); } std::string WalletImpl::getDefaultDataDir() const { return tools::get_default_data_dir(); } bool WalletImpl::rescanSpent() { clearStatus(); if (!trustedDaemon()) { setStatusError(tr("Rescan spent can only be used with a trusted daemon")); return false; } try { m_wallet->rescan_spent(); } catch (const std::exception &e) { LOG_ERROR(__FUNCTION__ << " error: " << e.what()); setStatusError(e.what()); return false; } return true; } void WalletImpl::setOffline(bool offline) { m_wallet->set_offline(offline); } bool WalletImpl::isOffline() const { return m_wallet->is_offline(); } void WalletImpl::hardForkInfo(uint8_t &version, uint64_t &earliest_height) const { m_wallet->get_hard_fork_info(version, earliest_height); } bool WalletImpl::useForkRules(uint8_t version, int64_t early_blocks) const { return m_wallet->use_fork_rules(version,early_blocks); } bool WalletImpl::blackballOutputs(const std::vector &outputs, bool add) { std::vector> raw_outputs; raw_outputs.reserve(outputs.size()); uint64_t amount = std::numeric_limits::max(), offset, num_offsets; for (const std::string &str: outputs) { if (sscanf(str.c_str(), "@%" PRIu64, &amount) == 1) continue; if (amount == std::numeric_limits::max()) { setStatusError("First line is not an amount"); return true; } if (sscanf(str.c_str(), "%" PRIu64 "*%" PRIu64, &offset, &num_offsets) == 2 && num_offsets <= std::numeric_limits::max() - offset) { while (num_offsets--) raw_outputs.push_back(std::make_pair(amount, offset++)); } else if (sscanf(str.c_str(), "%" PRIu64, &offset) == 1) { raw_outputs.push_back(std::make_pair(amount, offset)); } else { setStatusError(tr("Invalid output: ") + str); return false; } } bool ret = m_wallet->set_blackballed_outputs(raw_outputs, add); if (!ret) { setStatusError(tr("Failed to mark outputs as spent")); return false; } return true; } bool WalletImpl::blackballOutput(const std::string &amount, const std::string &offset) { uint64_t raw_amount, raw_offset; if (!epee::string_tools::get_xtype_from_string(raw_amount, amount)) { setStatusError(tr("Failed to parse output amount")); return false; } if (!epee::string_tools::get_xtype_from_string(raw_offset, offset)) { setStatusError(tr("Failed to parse output offset")); return false; } bool ret = m_wallet->blackball_output(std::make_pair(raw_amount, raw_offset)); if (!ret) { setStatusError(tr("Failed to mark output as spent")); return false; } return true; } bool WalletImpl::unblackballOutput(const std::string &amount, const std::string &offset) { uint64_t raw_amount, raw_offset; if (!epee::string_tools::get_xtype_from_string(raw_amount, amount)) { setStatusError(tr("Failed to parse output amount")); return false; } if (!epee::string_tools::get_xtype_from_string(raw_offset, offset)) { setStatusError(tr("Failed to parse output offset")); return false; } bool ret = m_wallet->unblackball_output(std::make_pair(raw_amount, raw_offset)); if (!ret) { setStatusError(tr("Failed to mark output as unspent")); return false; } return true; } bool WalletImpl::getRing(const std::string &key_image, std::vector &ring) const { crypto::key_image raw_key_image; if (!epee::string_tools::hex_to_pod(key_image, raw_key_image)) { setStatusError(tr("Failed to parse key image")); return false; } bool ret = m_wallet->get_ring(raw_key_image, ring); if (!ret) { setStatusError(tr("Failed to get ring")); return false; } return true; } bool WalletImpl::getRings(const std::string &txid, std::vector>> &rings) const { crypto::hash raw_txid; if (!epee::string_tools::hex_to_pod(txid, raw_txid)) { setStatusError(tr("Failed to parse txid")); return false; } std::vector>> raw_rings; bool ret = m_wallet->get_rings(raw_txid, raw_rings); if (!ret) { setStatusError(tr("Failed to get rings")); return false; } for (const auto &r: raw_rings) { rings.push_back(std::make_pair(epee::string_tools::pod_to_hex(r.first), r.second)); } return true; } bool WalletImpl::setRing(const std::string &key_image, const std::vector &ring, bool relative) { crypto::key_image raw_key_image; if (!epee::string_tools::hex_to_pod(key_image, raw_key_image)) { setStatusError(tr("Failed to parse key image")); return false; } bool ret = m_wallet->set_ring(raw_key_image, ring, relative); if (!ret) { setStatusError(tr("Failed to set ring")); return false; } return true; } void WalletImpl::segregatePreForkOutputs(bool segregate) { m_wallet->segregate_pre_fork_outputs(segregate); } void WalletImpl::segregationHeight(uint64_t height) { m_wallet->segregation_height(height); } void WalletImpl::keyReuseMitigation2(bool mitigation) { m_wallet->key_reuse_mitigation2(mitigation); } bool WalletImpl::lockKeysFile() { return m_wallet->lock_keys_file(); } bool WalletImpl::unlockKeysFile() { return m_wallet->unlock_keys_file(); } bool WalletImpl::isKeysFileLocked() { return m_wallet->is_keys_file_locked(); } uint64_t WalletImpl::coldKeyImageSync(uint64_t &spent, uint64_t &unspent) { return m_wallet->cold_key_image_sync(spent, unspent); } void WalletImpl::deviceShowAddress(uint32_t accountIndex, uint32_t addressIndex, const std::string &paymentId) { boost::optional payment_id_param = boost::none; if (!paymentId.empty()) { crypto::hash8 payment_id; bool res = tools::wallet2::parse_short_payment_id(paymentId, payment_id); if (!res) { throw runtime_error("Invalid payment ID"); } payment_id_param = payment_id; } m_wallet->device_show_address(accountIndex, addressIndex, payment_id_param); } bool WalletImpl::reconnectDevice() { clearStatus(); bool r; try { r = m_wallet->reconnect_device(); } catch (const std::exception &e) { LOG_ERROR(__FUNCTION__ << " error: " << e.what()); setStatusError(e.what()); return false; } return r; } uint64_t WalletImpl::getBytesReceived() { return m_wallet->get_bytes_received(); } uint64_t WalletImpl::getBytesSent() { return m_wallet->get_bytes_sent(); } } // namespace