ZEPH support

This commit is contained in:
MoneroOcean
2023-06-24 21:42:23 +00:00
parent fa62a68afa
commit 23c3520d13
4 changed files with 99 additions and 18 deletions

View File

@@ -6,6 +6,7 @@
"src/main.cc", "src/main.cc",
"src/cryptonote_core/cryptonote_format_utils.cpp", "src/cryptonote_core/cryptonote_format_utils.cpp",
"src/offshore/pricing_record.cpp", "src/offshore/pricing_record.cpp",
"src/oracle/pricing_record.cpp",
"src/crypto/tree-hash.c", "src/crypto/tree-hash.c",
"src/crypto/crypto.cpp", "src/crypto/crypto.cpp",
"src/crypto/crypto-ops.c", "src/crypto/crypto-ops.c",

View File

@@ -33,4 +33,5 @@ enum BLOB_TYPE {
BLOB_TYPE_CRYPTONOTE_TUBE = 10, // TUBE BLOB_TYPE_CRYPTONOTE_TUBE = 10, // TUBE
BLOB_TYPE_CRYPTONOTE_XHV = 11, // Haven BLOB_TYPE_CRYPTONOTE_XHV = 11, // Haven
BLOB_TYPE_CRYPTONOTE_XTA = 12, // ITALO BLOB_TYPE_CRYPTONOTE_XTA = 12, // ITALO
BLOB_TYPE_CRYPTONOTE_ZEPH = 13, // ZEPH
}; };

View File

@@ -16,6 +16,7 @@
#include "serialization/binary_archive.h" #include "serialization/binary_archive.h"
#include "serialization/crypto.h" #include "serialization/crypto.h"
#include "serialization/pricing_record.h" #include "serialization/pricing_record.h"
#include "serialization/pricing_record_zeph.h"
#include "serialization/keyvalue_serialization.h" // eepe named serialization #include "serialization/keyvalue_serialization.h" // eepe named serialization
#include "string_tools.h" #include "string_tools.h"
#include "cryptonote_config.h" #include "cryptonote_config.h"
@@ -26,6 +27,7 @@
#include "ringct/rctTypes.h" #include "ringct/rctTypes.h"
#include "cryptonote_protocol/blobdatatype.h" #include "cryptonote_protocol/blobdatatype.h"
#include "offshore/pricing_record.h" #include "offshore/pricing_record.h"
#include "oracle/pricing_record.h"
namespace cryptonote namespace cryptonote
@@ -199,9 +201,42 @@ namespace cryptonote
FIELD(k_image) FIELD(k_image)
END_SERIALIZE() END_SERIALIZE()
}; };
struct txin_zephyr_key
{
uint64_t amount;
std::string asset_type;
std::vector<uint64_t> key_offsets;
crypto::key_image k_image; // double spending protection
BEGIN_SERIALIZE_OBJECT()
VARINT_FIELD(amount)
FIELD(asset_type)
FIELD(key_offsets)
FIELD(k_image)
END_SERIALIZE()
};
struct txout_zephyr_tagged_key
{
txout_zephyr_tagged_key() { }
txout_zephyr_tagged_key(const crypto::public_key &_key, const std::string &_asset_type, const crypto::view_tag &_view_tag) : key(_key), asset_type(_asset_type), view_tag(_view_tag) { }
crypto::public_key key;
std::string asset_type;
crypto::view_tag view_tag; // optimization to reduce scanning time
BEGIN_SERIALIZE_OBJECT()
FIELD(key)
FIELD(asset_type)
FIELD(view_tag)
END_SERIALIZE()
};
typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_to_key, txin_offshore, txin_onshore, txin_xasset> txin_v; typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_to_key, txin_offshore, txin_onshore, txin_xasset> txin_v;
typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_zephyr_key> txin_zeph_v;
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_zephyr_tagged_key> txout_zeph_target_v;
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_to_tagged_key> txout_target_v; typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_to_tagged_key> txout_target_v;
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_offshore, txout_xasset> txout_xhv_target_v; typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_offshore, txout_xasset> txout_xhv_target_v;
@@ -227,6 +262,17 @@ namespace cryptonote
END_SERIALIZE() END_SERIALIZE()
}; };
struct tx_out_zeph
{
uint64_t amount;
txout_zeph_target_v target;
BEGIN_SERIALIZE_OBJECT()
VARINT_FIELD(amount)
FIELD(target)
END_SERIALIZE()
};
enum loki_version enum loki_version
{ {
@@ -247,8 +293,10 @@ namespace cryptonote
uint64_t unlock_time; //number of block (or time), used as a limitation like: spend this tx not early then block/time uint64_t unlock_time; //number of block (or time), used as a limitation like: spend this tx not early then block/time
std::vector<txin_v> vin; std::vector<txin_v> vin;
std::vector<txin_zeph_v> vin_zeph;
std::vector<tx_out> vout; std::vector<tx_out> vout;
std::vector<tx_out_xhv> vout_xhv; std::vector<tx_out_xhv> vout_xhv;
std::vector<tx_out_zeph> vout_zeph;
//extra //extra
std::vector<uint8_t> extra; std::vector<uint8_t> extra;
// Block height to use PR from // Block height to use PR from
@@ -287,11 +335,17 @@ namespace cryptonote
} }
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV || version < POU_TRANSACTION_VERSION) if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV || version < POU_TRANSACTION_VERSION)
VARINT_FIELD(unlock_time) VARINT_FIELD(unlock_time)
FIELD(vin) if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH)
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV) FIELD(vin_zeph)
FIELD(vout)
else else
FIELD(vin)
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
FIELD(vout_xhv) FIELD(vout_xhv)
else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH)
FIELD(vout_zeph)
else
FIELD(vout)
if (blob_type == BLOB_TYPE_CRYPTONOTE_LOKI || blob_type == BLOB_TYPE_CRYPTONOTE_XTNC) if (blob_type == BLOB_TYPE_CRYPTONOTE_LOKI || blob_type == BLOB_TYPE_CRYPTONOTE_XTNC)
{ {
if (version >= loki_version_3_per_output_unlock_times && vout.size() != output_unlock_times.size()) return false; if (version >= loki_version_3_per_output_unlock_times && vout.size() != output_unlock_times.size()) return false;
@@ -323,6 +377,10 @@ namespace cryptonote
return false; return false;
} }
} }
} else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
VARINT_FIELD(pricing_record_height)
VARINT_FIELD(amount_burnt)
VARINT_FIELD(amount_minted)
} }
END_SERIALIZE() END_SERIALIZE()
@@ -381,23 +439,32 @@ namespace cryptonote
if (!vin.empty()) if (!vin.empty())
{ {
ar.begin_object(); ar.begin_object();
bool r = rct_signatures.serialize_rctsig_base(ar, vin.size(), blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? vout.size() : vout_xhv.size()); bool r;
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
r = rct_signatures.serialize_rctsig_base(ar, vin.size(), vout_xhv.size());
else if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
r = rct_signatures.serialize_rctsig_base(ar, vin_zeph.size(), vout_zeph.size());
else
r = rct_signatures.serialize_rctsig_base(ar, vin.size(), vout.size());
if (!r || !ar.stream().good()) return false; if (!r || !ar.stream().good()) return false;
ar.end_object(); ar.end_object();
if (rct_signatures.type != rct::RCTTypeNull) if (rct_signatures.type != rct::RCTTypeNull)
{ {
ar.tag("rctsig_prunable"); ar.tag("rctsig_prunable");
ar.begin_object(); ar.begin_object();
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV) { if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout.size(),
vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 : 0);
} else {
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout_xhv.size(), r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout_xhv.size(),
vin.size() > 0 && vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 : vin.size() > 0 && vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 :
vin.size() > 0 && vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(vin[0]).key_offsets.size() - 1 : vin.size() > 0 && vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(vin[0]).key_offsets.size() - 1 :
vin.size() > 0 && vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(vin[0]).key_offsets.size() - 1 : vin.size() > 0 && vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(vin[0]).key_offsets.size() - 1 :
vin.size() > 0 && vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(vin[0]).key_offsets.size() - 1 : vin.size() > 0 && vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(vin[0]).key_offsets.size() - 1 :
0); 0);
} else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin_zeph.size(), vout_zeph.size(),
vin_zeph.size() > 0 && vin_zeph[0].type() == typeid(txin_zephyr_key) ? boost::get<txin_zephyr_key>(vin_zeph[0]).key_offsets.size() - 1 : 0);
} else {
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout.size(),
vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 : 0);
} }
if (!r || !ar.stream().good()) return false; if (!r || !ar.stream().good()) return false;
ar.end_object(); ar.end_object();
@@ -428,8 +495,10 @@ namespace cryptonote
version = 0; version = 0;
unlock_time = 0; unlock_time = 0;
vin.clear(); vin.clear();
vin_zeph.clear();
vout.clear(); vout.clear();
vout_xhv.clear(); vout_xhv.clear();
vout_zeph.clear();
extra.clear(); extra.clear();
signatures.clear(); signatures.clear();
pricing_record_height = 0; pricing_record_height = 0;
@@ -452,6 +521,7 @@ namespace cryptonote
size_t operator()(const txin_offshore& txin) const {return txin.key_offsets.size();} size_t operator()(const txin_offshore& txin) const {return txin.key_offsets.size();}
size_t operator()(const txin_onshore& txin) const {return txin.key_offsets.size();} size_t operator()(const txin_onshore& txin) const {return txin.key_offsets.size();}
size_t operator()(const txin_xasset& txin) const {return txin.key_offsets.size();} size_t operator()(const txin_xasset& txin) const {return txin.key_offsets.size();}
size_t operator()(const txin_zephyr_key& txin) const {return txin.key_offsets.size();}
}; };
return boost::apply_visitor(txin_signature_size_visitor(), tx_in); return boost::apply_visitor(txin_signature_size_visitor(), tx_in);
@@ -572,6 +642,7 @@ namespace cryptonote
uint64_t nonce; uint64_t nonce;
uint64_t nonce8; uint64_t nonce8;
offshore::pricing_record pricing_record; offshore::pricing_record pricing_record;
oracle::pricing_record pricing_record_zeph;
crypto::cycle cycle; crypto::cycle cycle;
crypto::cycle40 cycle40; crypto::cycle40 cycle40;
crypto::cycle48 cycle48; crypto::cycle48 cycle48;
@@ -583,7 +654,7 @@ namespace cryptonote
FIELD(prev_id) FIELD(prev_id)
if (blob_type == BLOB_TYPE_CRYPTONOTE_CUCKOO || blob_type == BLOB_TYPE_CRYPTONOTE_TUBE || blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(nonce8) if (blob_type == BLOB_TYPE_CRYPTONOTE_CUCKOO || blob_type == BLOB_TYPE_CRYPTONOTE_TUBE || blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(nonce8)
if (blob_type != BLOB_TYPE_FORKNOTE2) { if (blob_type != BLOB_TYPE_FORKNOTE2) {
if (blob_type == BLOB_TYPE_AEON) { if (blob_type == BLOB_TYPE_AEON || blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
FIELD(nonce) FIELD(nonce)
} else { } else {
uint32_t nonce32; uint32_t nonce32;
@@ -596,6 +667,7 @@ namespace cryptonote
if (blob_type == BLOB_TYPE_CRYPTONOTE_TUBE) FIELD(cycle40) if (blob_type == BLOB_TYPE_CRYPTONOTE_TUBE) FIELD(cycle40)
if (blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(cycle48) if (blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(cycle48)
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) FIELD(pricing_record) if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) FIELD(pricing_record)
if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) FIELD(pricing_record_zeph)
END_SERIALIZE() END_SERIALIZE()
}; };
@@ -683,12 +755,14 @@ VARIANT_TAG(binary_archive, cryptonote::txin_gen, 0xff);
VARIANT_TAG(binary_archive, cryptonote::txin_to_script, 0x0); VARIANT_TAG(binary_archive, cryptonote::txin_to_script, 0x0);
VARIANT_TAG(binary_archive, cryptonote::txin_to_scripthash, 0x1); VARIANT_TAG(binary_archive, cryptonote::txin_to_scripthash, 0x1);
VARIANT_TAG(binary_archive, cryptonote::txin_to_key, 0x2); VARIANT_TAG(binary_archive, cryptonote::txin_to_key, 0x2);
VARIANT_TAG(binary_archive, cryptonote::txin_zephyr_key, 0x2);
VARIANT_TAG(binary_archive, cryptonote::txin_offshore, 0x3); VARIANT_TAG(binary_archive, cryptonote::txin_offshore, 0x3);
VARIANT_TAG(binary_archive, cryptonote::txin_onshore, 0x4); VARIANT_TAG(binary_archive, cryptonote::txin_onshore, 0x4);
VARIANT_TAG(binary_archive, cryptonote::txin_xasset, 0x5); VARIANT_TAG(binary_archive, cryptonote::txin_xasset, 0x5);
VARIANT_TAG(binary_archive, cryptonote::txout_to_script, 0x0); VARIANT_TAG(binary_archive, cryptonote::txout_to_script, 0x0);
VARIANT_TAG(binary_archive, cryptonote::txout_to_scripthash, 0x1); VARIANT_TAG(binary_archive, cryptonote::txout_to_scripthash, 0x1);
VARIANT_TAG(binary_archive, cryptonote::txout_to_key, 0x2); VARIANT_TAG(binary_archive, cryptonote::txout_to_key, 0x2);
VARIANT_TAG(binary_archive, cryptonote::txout_zephyr_tagged_key, 0x2);
VARIANT_TAG(binary_archive, cryptonote::txout_to_tagged_key, 0x3); VARIANT_TAG(binary_archive, cryptonote::txout_to_tagged_key, 0x3);
VARIANT_TAG(binary_archive, cryptonote::txout_offshore, 0x3); VARIANT_TAG(binary_archive, cryptonote::txout_offshore, 0x3);
VARIANT_TAG(binary_archive, cryptonote::txout_xasset, 0x5); VARIANT_TAG(binary_archive, cryptonote::txout_xasset, 0x5);

View File

@@ -185,18 +185,21 @@ namespace cryptonote
{ {
BOOST_FOREACH(const auto& in, tx.vin) BOOST_FOREACH(const auto& in, tx.vin)
{ {
if (tx.blob_type != BLOB_TYPE_CRYPTONOTE_XHV) { if (tx.blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key), false, "wrong variant type: "
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
<< ", in transaction id=" << get_transaction_hash(tx));
} else {
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key) || in.type() == typeid(txin_offshore) || in.type() == typeid(txin_onshore) || in.type() == typeid(txin_xasset), false, "wrong variant type: " CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key) || in.type() == typeid(txin_offshore) || in.type() == typeid(txin_onshore) || in.type() == typeid(txin_xasset), false, "wrong variant type: "
<< in.type().name() << ", expected " << typeid(txin_to_key).name() << in.type().name() << ", expected " << typeid(txin_to_key).name()
<< "or " << typeid(txin_offshore).name() << "or " << typeid(txin_offshore).name()
<< "or " << typeid(txin_onshore).name() << "or " << typeid(txin_onshore).name()
<< "or " << typeid(txin_xasset).name() << "or " << typeid(txin_xasset).name()
<< ", in transaction id=" << get_transaction_hash(tx)); << ", in transaction id=" << get_transaction_hash(tx));
} } else if (tx.blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_zephyr_key), false, "wrong variant type: "
<< in.type().name() << ", expected " << typeid(txin_zephyr_key).name()
<< ", in transaction id=" << get_transaction_hash(tx));
} else {
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key), false, "wrong variant type: "
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
<< ", in transaction id=" << get_transaction_hash(tx));
} }
return true; return true;
} }
@@ -277,15 +280,17 @@ namespace cryptonote
const size_t inputs = t.vin.size(); const size_t inputs = t.vin.size();
const size_t outputs = t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? t.vout.size() : t.vout_xhv.size(); const size_t outputs = t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? t.vout.size() : t.vout_xhv.size();
size_t mixin; size_t mixin;
if (t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV) { if (t.blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
mixin = t.vin.empty() ? 0 : t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 : 0;
} else {
mixin = t.vin.empty() ? 0 : mixin = t.vin.empty() ? 0 :
t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 : t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 :
t.vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(t.vin[0]).key_offsets.size() - 1 : t.vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(t.vin[0]).key_offsets.size() - 1 :
t.vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(t.vin[0]).key_offsets.size() - 1 : t.vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(t.vin[0]).key_offsets.size() - 1 :
t.vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(t.vin[0]).key_offsets.size() - 1 : t.vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(t.vin[0]).key_offsets.size() - 1 :
0; 0;
} else if (t.blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
mixin = t.vin_zeph.empty() ? 0 : t.vin_zeph[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin_zeph[0]).key_offsets.size() - 1 : 0;
} else {
mixin = t.vin.empty() ? 0 : t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 : 0;
} }
bool r = tt.rct_signatures.p.serialize_rctsig_prunable(ba, t.rct_signatures.type, inputs, outputs, mixin); bool r = tt.rct_signatures.p.serialize_rctsig_prunable(ba, t.rct_signatures.type, inputs, outputs, mixin);
CHECK_AND_ASSERT_MES(r, false, "Failed to serialize rct signatures prunable"); CHECK_AND_ASSERT_MES(r, false, "Failed to serialize rct signatures prunable");