ZEPH support
This commit is contained in:
@@ -6,6 +6,7 @@
|
|||||||
"src/main.cc",
|
"src/main.cc",
|
||||||
"src/cryptonote_core/cryptonote_format_utils.cpp",
|
"src/cryptonote_core/cryptonote_format_utils.cpp",
|
||||||
"src/offshore/pricing_record.cpp",
|
"src/offshore/pricing_record.cpp",
|
||||||
|
"src/oracle/pricing_record.cpp",
|
||||||
"src/crypto/tree-hash.c",
|
"src/crypto/tree-hash.c",
|
||||||
"src/crypto/crypto.cpp",
|
"src/crypto/crypto.cpp",
|
||||||
"src/crypto/crypto-ops.c",
|
"src/crypto/crypto-ops.c",
|
||||||
|
|||||||
@@ -33,4 +33,5 @@ enum BLOB_TYPE {
|
|||||||
BLOB_TYPE_CRYPTONOTE_TUBE = 10, // TUBE
|
BLOB_TYPE_CRYPTONOTE_TUBE = 10, // TUBE
|
||||||
BLOB_TYPE_CRYPTONOTE_XHV = 11, // Haven
|
BLOB_TYPE_CRYPTONOTE_XHV = 11, // Haven
|
||||||
BLOB_TYPE_CRYPTONOTE_XTA = 12, // ITALO
|
BLOB_TYPE_CRYPTONOTE_XTA = 12, // ITALO
|
||||||
|
BLOB_TYPE_CRYPTONOTE_ZEPH = 13, // ZEPH
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -16,6 +16,7 @@
|
|||||||
#include "serialization/binary_archive.h"
|
#include "serialization/binary_archive.h"
|
||||||
#include "serialization/crypto.h"
|
#include "serialization/crypto.h"
|
||||||
#include "serialization/pricing_record.h"
|
#include "serialization/pricing_record.h"
|
||||||
|
#include "serialization/pricing_record_zeph.h"
|
||||||
#include "serialization/keyvalue_serialization.h" // eepe named serialization
|
#include "serialization/keyvalue_serialization.h" // eepe named serialization
|
||||||
#include "string_tools.h"
|
#include "string_tools.h"
|
||||||
#include "cryptonote_config.h"
|
#include "cryptonote_config.h"
|
||||||
@@ -26,6 +27,7 @@
|
|||||||
#include "ringct/rctTypes.h"
|
#include "ringct/rctTypes.h"
|
||||||
#include "cryptonote_protocol/blobdatatype.h"
|
#include "cryptonote_protocol/blobdatatype.h"
|
||||||
#include "offshore/pricing_record.h"
|
#include "offshore/pricing_record.h"
|
||||||
|
#include "oracle/pricing_record.h"
|
||||||
|
|
||||||
|
|
||||||
namespace cryptonote
|
namespace cryptonote
|
||||||
@@ -199,9 +201,42 @@ namespace cryptonote
|
|||||||
FIELD(k_image)
|
FIELD(k_image)
|
||||||
END_SERIALIZE()
|
END_SERIALIZE()
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct txin_zephyr_key
|
||||||
|
{
|
||||||
|
uint64_t amount;
|
||||||
|
std::string asset_type;
|
||||||
|
std::vector<uint64_t> key_offsets;
|
||||||
|
crypto::key_image k_image; // double spending protection
|
||||||
|
|
||||||
|
BEGIN_SERIALIZE_OBJECT()
|
||||||
|
VARINT_FIELD(amount)
|
||||||
|
FIELD(asset_type)
|
||||||
|
FIELD(key_offsets)
|
||||||
|
FIELD(k_image)
|
||||||
|
END_SERIALIZE()
|
||||||
|
};
|
||||||
|
|
||||||
|
struct txout_zephyr_tagged_key
|
||||||
|
{
|
||||||
|
txout_zephyr_tagged_key() { }
|
||||||
|
txout_zephyr_tagged_key(const crypto::public_key &_key, const std::string &_asset_type, const crypto::view_tag &_view_tag) : key(_key), asset_type(_asset_type), view_tag(_view_tag) { }
|
||||||
|
crypto::public_key key;
|
||||||
|
std::string asset_type;
|
||||||
|
crypto::view_tag view_tag; // optimization to reduce scanning time
|
||||||
|
|
||||||
|
BEGIN_SERIALIZE_OBJECT()
|
||||||
|
FIELD(key)
|
||||||
|
FIELD(asset_type)
|
||||||
|
FIELD(view_tag)
|
||||||
|
END_SERIALIZE()
|
||||||
|
};
|
||||||
|
|
||||||
typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_to_key, txin_offshore, txin_onshore, txin_xasset> txin_v;
|
typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_to_key, txin_offshore, txin_onshore, txin_xasset> txin_v;
|
||||||
|
|
||||||
|
typedef boost::variant<txin_gen, txin_to_script, txin_to_scripthash, txin_zephyr_key> txin_zeph_v;
|
||||||
|
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_zephyr_tagged_key> txout_zeph_target_v;
|
||||||
|
|
||||||
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_to_tagged_key> txout_target_v;
|
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_to_tagged_key> txout_target_v;
|
||||||
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_offshore, txout_xasset> txout_xhv_target_v;
|
typedef boost::variant<txout_to_script, txout_to_scripthash, txout_to_key, txout_offshore, txout_xasset> txout_xhv_target_v;
|
||||||
|
|
||||||
@@ -227,6 +262,17 @@ namespace cryptonote
|
|||||||
END_SERIALIZE()
|
END_SERIALIZE()
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct tx_out_zeph
|
||||||
|
{
|
||||||
|
uint64_t amount;
|
||||||
|
txout_zeph_target_v target;
|
||||||
|
|
||||||
|
BEGIN_SERIALIZE_OBJECT()
|
||||||
|
VARINT_FIELD(amount)
|
||||||
|
FIELD(target)
|
||||||
|
END_SERIALIZE()
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
enum loki_version
|
enum loki_version
|
||||||
{
|
{
|
||||||
@@ -247,8 +293,10 @@ namespace cryptonote
|
|||||||
uint64_t unlock_time; //number of block (or time), used as a limitation like: spend this tx not early then block/time
|
uint64_t unlock_time; //number of block (or time), used as a limitation like: spend this tx not early then block/time
|
||||||
|
|
||||||
std::vector<txin_v> vin;
|
std::vector<txin_v> vin;
|
||||||
|
std::vector<txin_zeph_v> vin_zeph;
|
||||||
std::vector<tx_out> vout;
|
std::vector<tx_out> vout;
|
||||||
std::vector<tx_out_xhv> vout_xhv;
|
std::vector<tx_out_xhv> vout_xhv;
|
||||||
|
std::vector<tx_out_zeph> vout_zeph;
|
||||||
//extra
|
//extra
|
||||||
std::vector<uint8_t> extra;
|
std::vector<uint8_t> extra;
|
||||||
// Block height to use PR from
|
// Block height to use PR from
|
||||||
@@ -287,11 +335,17 @@ namespace cryptonote
|
|||||||
}
|
}
|
||||||
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV || version < POU_TRANSACTION_VERSION)
|
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV || version < POU_TRANSACTION_VERSION)
|
||||||
VARINT_FIELD(unlock_time)
|
VARINT_FIELD(unlock_time)
|
||||||
FIELD(vin)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH)
|
||||||
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV)
|
FIELD(vin_zeph)
|
||||||
FIELD(vout)
|
|
||||||
else
|
else
|
||||||
|
FIELD(vin)
|
||||||
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
|
||||||
FIELD(vout_xhv)
|
FIELD(vout_xhv)
|
||||||
|
else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH)
|
||||||
|
FIELD(vout_zeph)
|
||||||
|
else
|
||||||
|
FIELD(vout)
|
||||||
|
|
||||||
if (blob_type == BLOB_TYPE_CRYPTONOTE_LOKI || blob_type == BLOB_TYPE_CRYPTONOTE_XTNC)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_LOKI || blob_type == BLOB_TYPE_CRYPTONOTE_XTNC)
|
||||||
{
|
{
|
||||||
if (version >= loki_version_3_per_output_unlock_times && vout.size() != output_unlock_times.size()) return false;
|
if (version >= loki_version_3_per_output_unlock_times && vout.size() != output_unlock_times.size()) return false;
|
||||||
@@ -323,6 +377,10 @@ namespace cryptonote
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
} else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
|
||||||
|
VARINT_FIELD(pricing_record_height)
|
||||||
|
VARINT_FIELD(amount_burnt)
|
||||||
|
VARINT_FIELD(amount_minted)
|
||||||
}
|
}
|
||||||
END_SERIALIZE()
|
END_SERIALIZE()
|
||||||
|
|
||||||
@@ -381,23 +439,32 @@ namespace cryptonote
|
|||||||
if (!vin.empty())
|
if (!vin.empty())
|
||||||
{
|
{
|
||||||
ar.begin_object();
|
ar.begin_object();
|
||||||
bool r = rct_signatures.serialize_rctsig_base(ar, vin.size(), blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? vout.size() : vout_xhv.size());
|
bool r;
|
||||||
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
|
||||||
|
r = rct_signatures.serialize_rctsig_base(ar, vin.size(), vout_xhv.size());
|
||||||
|
else if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV)
|
||||||
|
r = rct_signatures.serialize_rctsig_base(ar, vin_zeph.size(), vout_zeph.size());
|
||||||
|
else
|
||||||
|
r = rct_signatures.serialize_rctsig_base(ar, vin.size(), vout.size());
|
||||||
if (!r || !ar.stream().good()) return false;
|
if (!r || !ar.stream().good()) return false;
|
||||||
ar.end_object();
|
ar.end_object();
|
||||||
if (rct_signatures.type != rct::RCTTypeNull)
|
if (rct_signatures.type != rct::RCTTypeNull)
|
||||||
{
|
{
|
||||||
ar.tag("rctsig_prunable");
|
ar.tag("rctsig_prunable");
|
||||||
ar.begin_object();
|
ar.begin_object();
|
||||||
if (blob_type != BLOB_TYPE_CRYPTONOTE_XHV) {
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
|
||||||
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout.size(),
|
|
||||||
vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 : 0);
|
|
||||||
} else {
|
|
||||||
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout_xhv.size(),
|
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout_xhv.size(),
|
||||||
vin.size() > 0 && vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 :
|
vin.size() > 0 && vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 :
|
||||||
vin.size() > 0 && vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(vin[0]).key_offsets.size() - 1 :
|
vin.size() > 0 && vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(vin[0]).key_offsets.size() - 1 :
|
||||||
vin.size() > 0 && vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(vin[0]).key_offsets.size() - 1 :
|
vin.size() > 0 && vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(vin[0]).key_offsets.size() - 1 :
|
||||||
vin.size() > 0 && vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(vin[0]).key_offsets.size() - 1 :
|
vin.size() > 0 && vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(vin[0]).key_offsets.size() - 1 :
|
||||||
0);
|
0);
|
||||||
|
} else if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
|
||||||
|
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin_zeph.size(), vout_zeph.size(),
|
||||||
|
vin_zeph.size() > 0 && vin_zeph[0].type() == typeid(txin_zephyr_key) ? boost::get<txin_zephyr_key>(vin_zeph[0]).key_offsets.size() - 1 : 0);
|
||||||
|
} else {
|
||||||
|
r = rct_signatures.p.serialize_rctsig_prunable(ar, rct_signatures.type, vin.size(), vout.size(),
|
||||||
|
vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(vin[0]).key_offsets.size() - 1 : 0);
|
||||||
}
|
}
|
||||||
if (!r || !ar.stream().good()) return false;
|
if (!r || !ar.stream().good()) return false;
|
||||||
ar.end_object();
|
ar.end_object();
|
||||||
@@ -428,8 +495,10 @@ namespace cryptonote
|
|||||||
version = 0;
|
version = 0;
|
||||||
unlock_time = 0;
|
unlock_time = 0;
|
||||||
vin.clear();
|
vin.clear();
|
||||||
|
vin_zeph.clear();
|
||||||
vout.clear();
|
vout.clear();
|
||||||
vout_xhv.clear();
|
vout_xhv.clear();
|
||||||
|
vout_zeph.clear();
|
||||||
extra.clear();
|
extra.clear();
|
||||||
signatures.clear();
|
signatures.clear();
|
||||||
pricing_record_height = 0;
|
pricing_record_height = 0;
|
||||||
@@ -452,6 +521,7 @@ namespace cryptonote
|
|||||||
size_t operator()(const txin_offshore& txin) const {return txin.key_offsets.size();}
|
size_t operator()(const txin_offshore& txin) const {return txin.key_offsets.size();}
|
||||||
size_t operator()(const txin_onshore& txin) const {return txin.key_offsets.size();}
|
size_t operator()(const txin_onshore& txin) const {return txin.key_offsets.size();}
|
||||||
size_t operator()(const txin_xasset& txin) const {return txin.key_offsets.size();}
|
size_t operator()(const txin_xasset& txin) const {return txin.key_offsets.size();}
|
||||||
|
size_t operator()(const txin_zephyr_key& txin) const {return txin.key_offsets.size();}
|
||||||
};
|
};
|
||||||
|
|
||||||
return boost::apply_visitor(txin_signature_size_visitor(), tx_in);
|
return boost::apply_visitor(txin_signature_size_visitor(), tx_in);
|
||||||
@@ -572,6 +642,7 @@ namespace cryptonote
|
|||||||
uint64_t nonce;
|
uint64_t nonce;
|
||||||
uint64_t nonce8;
|
uint64_t nonce8;
|
||||||
offshore::pricing_record pricing_record;
|
offshore::pricing_record pricing_record;
|
||||||
|
oracle::pricing_record pricing_record_zeph;
|
||||||
crypto::cycle cycle;
|
crypto::cycle cycle;
|
||||||
crypto::cycle40 cycle40;
|
crypto::cycle40 cycle40;
|
||||||
crypto::cycle48 cycle48;
|
crypto::cycle48 cycle48;
|
||||||
@@ -583,7 +654,7 @@ namespace cryptonote
|
|||||||
FIELD(prev_id)
|
FIELD(prev_id)
|
||||||
if (blob_type == BLOB_TYPE_CRYPTONOTE_CUCKOO || blob_type == BLOB_TYPE_CRYPTONOTE_TUBE || blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(nonce8)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_CUCKOO || blob_type == BLOB_TYPE_CRYPTONOTE_TUBE || blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(nonce8)
|
||||||
if (blob_type != BLOB_TYPE_FORKNOTE2) {
|
if (blob_type != BLOB_TYPE_FORKNOTE2) {
|
||||||
if (blob_type == BLOB_TYPE_AEON) {
|
if (blob_type == BLOB_TYPE_AEON || blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
|
||||||
FIELD(nonce)
|
FIELD(nonce)
|
||||||
} else {
|
} else {
|
||||||
uint32_t nonce32;
|
uint32_t nonce32;
|
||||||
@@ -596,6 +667,7 @@ namespace cryptonote
|
|||||||
if (blob_type == BLOB_TYPE_CRYPTONOTE_TUBE) FIELD(cycle40)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_TUBE) FIELD(cycle40)
|
||||||
if (blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(cycle48)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_XTA) FIELD(cycle48)
|
||||||
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) FIELD(pricing_record)
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_XHV) FIELD(pricing_record)
|
||||||
|
if (blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) FIELD(pricing_record_zeph)
|
||||||
|
|
||||||
END_SERIALIZE()
|
END_SERIALIZE()
|
||||||
};
|
};
|
||||||
@@ -683,12 +755,14 @@ VARIANT_TAG(binary_archive, cryptonote::txin_gen, 0xff);
|
|||||||
VARIANT_TAG(binary_archive, cryptonote::txin_to_script, 0x0);
|
VARIANT_TAG(binary_archive, cryptonote::txin_to_script, 0x0);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txin_to_scripthash, 0x1);
|
VARIANT_TAG(binary_archive, cryptonote::txin_to_scripthash, 0x1);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txin_to_key, 0x2);
|
VARIANT_TAG(binary_archive, cryptonote::txin_to_key, 0x2);
|
||||||
|
VARIANT_TAG(binary_archive, cryptonote::txin_zephyr_key, 0x2);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txin_offshore, 0x3);
|
VARIANT_TAG(binary_archive, cryptonote::txin_offshore, 0x3);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txin_onshore, 0x4);
|
VARIANT_TAG(binary_archive, cryptonote::txin_onshore, 0x4);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txin_xasset, 0x5);
|
VARIANT_TAG(binary_archive, cryptonote::txin_xasset, 0x5);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_to_script, 0x0);
|
VARIANT_TAG(binary_archive, cryptonote::txout_to_script, 0x0);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_to_scripthash, 0x1);
|
VARIANT_TAG(binary_archive, cryptonote::txout_to_scripthash, 0x1);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_to_key, 0x2);
|
VARIANT_TAG(binary_archive, cryptonote::txout_to_key, 0x2);
|
||||||
|
VARIANT_TAG(binary_archive, cryptonote::txout_zephyr_tagged_key, 0x2);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_to_tagged_key, 0x3);
|
VARIANT_TAG(binary_archive, cryptonote::txout_to_tagged_key, 0x3);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_offshore, 0x3);
|
VARIANT_TAG(binary_archive, cryptonote::txout_offshore, 0x3);
|
||||||
VARIANT_TAG(binary_archive, cryptonote::txout_xasset, 0x5);
|
VARIANT_TAG(binary_archive, cryptonote::txout_xasset, 0x5);
|
||||||
|
|||||||
@@ -185,18 +185,21 @@ namespace cryptonote
|
|||||||
{
|
{
|
||||||
BOOST_FOREACH(const auto& in, tx.vin)
|
BOOST_FOREACH(const auto& in, tx.vin)
|
||||||
{
|
{
|
||||||
if (tx.blob_type != BLOB_TYPE_CRYPTONOTE_XHV) {
|
if (tx.blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
|
||||||
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key), false, "wrong variant type: "
|
|
||||||
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
|
|
||||||
<< ", in transaction id=" << get_transaction_hash(tx));
|
|
||||||
} else {
|
|
||||||
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key) || in.type() == typeid(txin_offshore) || in.type() == typeid(txin_onshore) || in.type() == typeid(txin_xasset), false, "wrong variant type: "
|
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key) || in.type() == typeid(txin_offshore) || in.type() == typeid(txin_onshore) || in.type() == typeid(txin_xasset), false, "wrong variant type: "
|
||||||
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
|
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
|
||||||
<< "or " << typeid(txin_offshore).name()
|
<< "or " << typeid(txin_offshore).name()
|
||||||
<< "or " << typeid(txin_onshore).name()
|
<< "or " << typeid(txin_onshore).name()
|
||||||
<< "or " << typeid(txin_xasset).name()
|
<< "or " << typeid(txin_xasset).name()
|
||||||
<< ", in transaction id=" << get_transaction_hash(tx));
|
<< ", in transaction id=" << get_transaction_hash(tx));
|
||||||
}
|
} else if (tx.blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
|
||||||
|
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_zephyr_key), false, "wrong variant type: "
|
||||||
|
<< in.type().name() << ", expected " << typeid(txin_zephyr_key).name()
|
||||||
|
<< ", in transaction id=" << get_transaction_hash(tx));
|
||||||
|
} else {
|
||||||
|
CHECK_AND_ASSERT_MES(in.type() == typeid(txin_to_key), false, "wrong variant type: "
|
||||||
|
<< in.type().name() << ", expected " << typeid(txin_to_key).name()
|
||||||
|
<< ", in transaction id=" << get_transaction_hash(tx));
|
||||||
}
|
}
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
@@ -277,15 +280,17 @@ namespace cryptonote
|
|||||||
const size_t inputs = t.vin.size();
|
const size_t inputs = t.vin.size();
|
||||||
const size_t outputs = t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? t.vout.size() : t.vout_xhv.size();
|
const size_t outputs = t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV ? t.vout.size() : t.vout_xhv.size();
|
||||||
size_t mixin;
|
size_t mixin;
|
||||||
if (t.blob_type != BLOB_TYPE_CRYPTONOTE_XHV) {
|
if (t.blob_type == BLOB_TYPE_CRYPTONOTE_XHV) {
|
||||||
mixin = t.vin.empty() ? 0 : t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 : 0;
|
|
||||||
} else {
|
|
||||||
mixin = t.vin.empty() ? 0 :
|
mixin = t.vin.empty() ? 0 :
|
||||||
t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 :
|
t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 :
|
||||||
t.vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(t.vin[0]).key_offsets.size() - 1 :
|
t.vin[0].type() == typeid(txin_offshore) ? boost::get<txin_offshore>(t.vin[0]).key_offsets.size() - 1 :
|
||||||
t.vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(t.vin[0]).key_offsets.size() - 1 :
|
t.vin[0].type() == typeid(txin_onshore) ? boost::get<txin_onshore>(t.vin[0]).key_offsets.size() - 1 :
|
||||||
t.vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(t.vin[0]).key_offsets.size() - 1 :
|
t.vin[0].type() == typeid(txin_xasset) ? boost::get<txin_xasset>(t.vin[0]).key_offsets.size() - 1 :
|
||||||
0;
|
0;
|
||||||
|
} else if (t.blob_type == BLOB_TYPE_CRYPTONOTE_ZEPH) {
|
||||||
|
mixin = t.vin_zeph.empty() ? 0 : t.vin_zeph[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin_zeph[0]).key_offsets.size() - 1 : 0;
|
||||||
|
} else {
|
||||||
|
mixin = t.vin.empty() ? 0 : t.vin[0].type() == typeid(txin_to_key) ? boost::get<txin_to_key>(t.vin[0]).key_offsets.size() - 1 : 0;
|
||||||
}
|
}
|
||||||
bool r = tt.rct_signatures.p.serialize_rctsig_prunable(ba, t.rct_signatures.type, inputs, outputs, mixin);
|
bool r = tt.rct_signatures.p.serialize_rctsig_prunable(ba, t.rct_signatures.type, inputs, outputs, mixin);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "Failed to serialize rct signatures prunable");
|
CHECK_AND_ASSERT_MES(r, false, "Failed to serialize rct signatures prunable");
|
||||||
|
|||||||
Reference in New Issue
Block a user