|
|
@ -652,8 +652,8 @@ int32_t dpow_signedtxgen(struct supernet_info *myinfo,struct dpow_info *dp,struc |
|
|
|
printf("datalen.%d siglen.%d myind.%d lastk.%d mask.%llx\n",datalen,siglen,myind,lastk,(long long)mask); |
|
|
|
for (i=0; i<numnotaries; i++) |
|
|
|
{ |
|
|
|
if ( i == myind ) |
|
|
|
continue; |
|
|
|
//if ( i == myind )
|
|
|
|
// continue;
|
|
|
|
for (z=0; z<sizeof(desthash); z++) |
|
|
|
desthash.bytes[z] = notaries[i].pubkey[z+1]; |
|
|
|
char datastr[1024]; |
|
|
@ -716,14 +716,14 @@ int32_t dpow_mostsignedtx(struct supernet_info *myinfo,struct dpow_info *dp,stru |
|
|
|
channel = 's' | ('i' << 8) | ('g' << 16) | ('s' << 24); |
|
|
|
if ( bits256_nonz(btctxid) == 0 ) |
|
|
|
channel = ~channel; |
|
|
|
for (j=0; j<sizeof(desthash); j++) |
|
|
|
desthash.bytes[j] = myinfo->DPOW.minerkey33[j+1]; |
|
|
|
for (j=0; j<sizeof(srchash); j++) |
|
|
|
srchash.bytes[j] = myinfo->DPOW.minerkey33[j+1]; |
|
|
|
num = 0; |
|
|
|
k_masks = calloc(4096,128); |
|
|
|
for (i=0; i<numnotaries; i++) |
|
|
|
{ |
|
|
|
for (j=0; j<sizeof(srchash); j++) |
|
|
|
srchash.bytes[j] = notaries[i].pubkey[j+1]; |
|
|
|
for (j=0; j<sizeof(desthash); j++) |
|
|
|
desthash.bytes[j] = notaries[i].pubkey[j+1]; |
|
|
|
if ( (retarray= basilisk_channelget(myinfo,srchash,desthash,channel,height,0)) != 0 ) |
|
|
|
{ |
|
|
|
printf("RETARRAY.(%s)\n",jprint(retarray,0)); |
|
|
@ -846,8 +846,8 @@ uint32_t dpow_statemachineiterate(struct supernet_info *myinfo,struct dpow_info |
|
|
|
len = dpow_rwutxobuf(1,data,&hashmsg,&txid,&vout,&commit); |
|
|
|
for (i=0; i<numnotaries; i++) |
|
|
|
{ |
|
|
|
if ( i == myind ) |
|
|
|
continue; |
|
|
|
//if ( i == myind )
|
|
|
|
// continue;
|
|
|
|
for (j=0; j<sizeof(srchash); j++) |
|
|
|
desthash.bytes[j] = notaries[i].pubkey[j+1]; |
|
|
|
char str[65],str2[65]; printf("STATE1: %s send %s %s/v%d\n",coin->symbol,bits256_str(str,hashmsg),bits256_str(str2,txid),vout); |
|
|
|