You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
692 lines
18 KiB
692 lines
18 KiB
/*
|
|
This file is part of cpp-ethereum.
|
|
|
|
cpp-ethereum is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
cpp-ethereum is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with cpp-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
/** @file main.cpp
|
|
* @author Gav Wood <i@gavwood.com>
|
|
* @date 2014
|
|
* Ethereum client.
|
|
*/
|
|
#if ETH_ETHASHCL
|
|
#define __CL_ENABLE_EXCEPTIONS
|
|
#define CL_USE_DEPRECATED_OPENCL_2_0_APIS
|
|
#if defined(__clang__)
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wunused-parameter"
|
|
#include <libethash-cl/cl.hpp>
|
|
#pragma clang diagnostic pop
|
|
#else
|
|
#include <libethash-cl/cl.hpp>
|
|
#endif
|
|
#endif
|
|
#include <functional>
|
|
#include <boost/filesystem.hpp>
|
|
#include <boost/algorithm/string.hpp>
|
|
#include <libdevcore/RangeMask.h>
|
|
#include <libdevcore/Log.h>
|
|
#include <libdevcore/Common.h>
|
|
#include <libdevcore/CommonData.h>
|
|
#include <libdevcore/RLP.h>
|
|
#include <libdevcore/TransientDirectory.h>
|
|
#include <libdevcore/CommonIO.h>
|
|
#include <libdevcrypto/TrieDB.h>
|
|
#include <libp2p/All.h>
|
|
#include <libethcore/ProofOfWork.h>
|
|
#include <libdevcrypto/FileSystem.h>
|
|
#include <libethereum/All.h>
|
|
#include <libethereum/Farm.h>
|
|
#include <libethereum/AccountDiff.h>
|
|
#include <libethereum/DownloadMan.h>
|
|
#include <libethereum/Client.h>
|
|
#include <liblll/All.h>
|
|
#include <libwhisper/WhisperPeer.h>
|
|
#include <libwhisper/WhisperHost.h>
|
|
#include <test/JsonSpiritHeaders.h>
|
|
using namespace std;
|
|
using namespace dev;
|
|
using namespace dev::eth;
|
|
using namespace dev::p2p;
|
|
using namespace dev::shh;
|
|
namespace js = json_spirit;
|
|
namespace fs = boost::filesystem;
|
|
|
|
#if 1
|
|
|
|
inline h128 fromUUID(std::string const& _uuid) { return h128(boost::replace_all_copy(_uuid, "-", "")); }
|
|
inline std::string toUUID(h128 const& _uuid) { std::string ret = toHex(_uuid.ref()); for (unsigned i: {20, 16, 12, 8}) ret.insert(ret.begin() + i, '-'); return ret; }
|
|
|
|
class KeyStore
|
|
{
|
|
public:
|
|
KeyStore() { load(); }
|
|
~KeyStore() {}
|
|
|
|
bytes secret(h128 const& _uuid, function<std::string()> const& _pass)
|
|
{
|
|
auto rit = m_cached.find(_uuid);
|
|
if (rit != m_cached.end())
|
|
return rit->second;
|
|
auto it = m_keys.find(_uuid);
|
|
if (it == m_keys.end())
|
|
return bytes();
|
|
bytes key = decrypt(it->second.first, _pass());
|
|
if (!key.empty())
|
|
m_cached[_uuid] = key;
|
|
return key;
|
|
}
|
|
|
|
h128 importSecret(bytes const& _s, std::string const& _pass)
|
|
{
|
|
h128 r = h128::random();
|
|
m_cached[r] = _s;
|
|
m_keys[r] = make_pair(encrypt(_s, _pass), std::string());
|
|
save();
|
|
return r;
|
|
}
|
|
|
|
void kill(h128 const& _uuid)
|
|
{
|
|
m_cached.erase(_uuid);
|
|
if (m_keys.count(_uuid))
|
|
{
|
|
boost::filesystem::remove(m_keys[_uuid].second);
|
|
m_keys.erase(_uuid);
|
|
}
|
|
}
|
|
|
|
// Clear any cached keys.
|
|
void clearCache() const { m_cached.clear(); }
|
|
|
|
private:
|
|
void save(std::string const& _keysPath = getDataDir("web3") + "/keys")
|
|
{
|
|
fs::path p(_keysPath);
|
|
boost::filesystem::create_directories(p);
|
|
for (auto& k: m_keys)
|
|
{
|
|
std::string uuid = toUUID(k.first);
|
|
std::string filename = (p / uuid).string() + ".json";
|
|
js::mObject v;
|
|
v["crypto"] = k.second.first;
|
|
v["id"] = uuid;
|
|
v["version"] = 2;
|
|
writeFile(filename, js::write_string(js::mValue(v), true));
|
|
if (!k.second.second.empty() && k.second.second != filename)
|
|
boost::filesystem::remove(k.second.second);
|
|
k.second.second = filename;
|
|
}
|
|
}
|
|
|
|
void load(std::string const& _keysPath = getDataDir("web3") + "/keys")
|
|
{
|
|
fs::path p(_keysPath);
|
|
js::mValue v;
|
|
for (fs::directory_iterator it(p); it != fs::directory_iterator(); ++it)
|
|
if (is_regular_file(it->path()))
|
|
{
|
|
cdebug << "Reading" << it->path();
|
|
js::read_string(contentsString(it->path().string()), v);
|
|
if (v.type() == js::obj_type)
|
|
{
|
|
js::mObject o = v.get_obj();
|
|
int version = o.count("Version") ? stoi(o["Version"].get_str()) : o.count("version") ? o["version"].get_int() : 0;
|
|
if (version == 2)
|
|
m_keys[fromUUID(o["id"].get_str())] = make_pair(o["crypto"], it->path().string());
|
|
else
|
|
cwarn << "Cannot read key version" << version;
|
|
}
|
|
// else
|
|
// cwarn << "Invalid JSON in key file" << it->path().string();
|
|
}
|
|
}
|
|
|
|
static js::mValue encrypt(bytes const& _v, std::string const& _pass)
|
|
{
|
|
js::mObject ret;
|
|
|
|
// KDF info
|
|
unsigned dklen = 16;
|
|
unsigned iterations = 262144;
|
|
bytes salt = h256::random().asBytes();
|
|
ret["kdf"] = "pbkdf2";
|
|
{
|
|
js::mObject params;
|
|
params["prf"] = "hmac-sha256";
|
|
params["c"] = (int)iterations;
|
|
params["salt"] = toHex(salt);
|
|
params["dklen"] = (int)dklen;
|
|
ret["kdfparams"] = params;
|
|
}
|
|
bytes derivedKey = pbkdf2(_pass, salt, iterations, dklen);
|
|
|
|
// cipher info
|
|
ret["cipher"] = "aes-128-cbc";
|
|
h128 key(sha3(h128(derivedKey, h128::AlignRight)), h128::AlignRight);
|
|
h128 iv = h128::random();
|
|
{
|
|
js::mObject params;
|
|
params["iv"] = toHex(iv.ref());
|
|
ret["cipherparams"] = params;
|
|
}
|
|
|
|
// cipher text
|
|
bytes cipherText = encryptSymNoAuth(key, iv, &_v);
|
|
ret["ciphertext"] = toHex(cipherText);
|
|
|
|
// and mac.
|
|
h256 mac = sha3(bytesConstRef(&derivedKey).cropped(derivedKey.size() - 16).toBytes() + cipherText);
|
|
ret["mac"] = toHex(mac.ref());
|
|
|
|
return ret;
|
|
}
|
|
|
|
static bytes decrypt(js::mValue const& _v, std::string const& _pass)
|
|
{
|
|
js::mObject o = _v.get_obj();
|
|
|
|
// derive key
|
|
bytes derivedKey;
|
|
if (o["kdf"].get_str() == "pbkdf2")
|
|
{
|
|
auto params = o["kdfparams"].get_obj();
|
|
if (params["prf"].get_str() != "hmac-sha256")
|
|
{
|
|
cwarn << "Unknown PRF for PBKDF2" << params["prf"].get_str() << "not supported.";
|
|
return bytes();
|
|
}
|
|
unsigned iterations = params["c"].get_int();
|
|
bytes salt = fromHex(params["salt"].get_str());
|
|
derivedKey = pbkdf2(_pass, salt, iterations, params["dklen"].get_int());
|
|
}
|
|
else
|
|
{
|
|
cwarn << "Unknown KDF" << o["kdf"].get_str() << "not supported.";
|
|
return bytes();
|
|
}
|
|
|
|
bytes cipherText = fromHex(o["ciphertext"].get_str());
|
|
|
|
// check MAC
|
|
h256 mac(o["mac"].get_str());
|
|
h256 macExp = sha3(bytesConstRef(&derivedKey).cropped(derivedKey.size() - 16).toBytes() + cipherText);
|
|
if (mac != macExp)
|
|
{
|
|
cwarn << "Invalid key - MAC mismatch; expected" << toString(macExp) << ", got" << toString(mac);
|
|
return bytes();
|
|
}
|
|
|
|
// decrypt
|
|
if (o["cipher"].get_str() == "aes-128-cbc")
|
|
{
|
|
auto params = o["cipherparams"].get_obj();
|
|
h128 key(sha3(h128(derivedKey, h128::AlignRight)), h128::AlignRight);
|
|
h128 iv(params["iv"].get_str());
|
|
return decryptSymNoAuth(key, iv, &cipherText);
|
|
}
|
|
else
|
|
{
|
|
cwarn << "Unknown cipher" << o["cipher"].get_str() << "not supported.";
|
|
return bytes();
|
|
}
|
|
}
|
|
|
|
mutable std::map<h128, bytes> m_cached;
|
|
std::map<h128, std::pair<js::mValue, std::string>> m_keys;
|
|
};
|
|
|
|
class UnknownPassword: public Exception {};
|
|
|
|
struct KeyInfo
|
|
{
|
|
h256 passHash;
|
|
std::string info;
|
|
};
|
|
|
|
static const auto DontKnowThrow = [](){ BOOST_THROW_EXCEPTION(UnknownPassword()); return std::string(); };
|
|
|
|
// TODO: This one is specifically for Ethereum, but we can make it generic in due course.
|
|
// TODO: hidden-partition style key-store.
|
|
/**
|
|
* @brief High-level manager of keys for Ethereum.
|
|
* Usage:
|
|
*
|
|
* Call exists() to check whether there is already a database. If so, get the master password from
|
|
* the user and call load() with it. If not, get a new master password from the user (get them to type
|
|
* it twice and keep some hint around!) and call create() with it.
|
|
*/
|
|
class KeyManager
|
|
{
|
|
public:
|
|
KeyManager(std::string const& _keysFile = getDataDir("ethereum") + "/keys.info"): m_keysFile(_keysFile) {}
|
|
~KeyManager() {}
|
|
|
|
void setKeysFile(std::string const& _keysFile) { m_keysFile = _keysFile; }
|
|
std::string const& keysFile() const { return m_keysFile; }
|
|
|
|
bool exists()
|
|
{
|
|
return !contents(m_keysFile + ".salt").empty() && !contents(m_keysFile).empty();
|
|
}
|
|
|
|
void create(std::string const& _pass)
|
|
{
|
|
m_password = asString(h256::random().asBytes());
|
|
save(_pass, m_keysFile);
|
|
}
|
|
|
|
bool load(std::string const& _pass)
|
|
{
|
|
try {
|
|
bytes salt = contents(m_keysFile + ".salt");
|
|
bytes encKeys = contents(m_keysFile);
|
|
m_key = h128(pbkdf2(_pass, salt, 262144, 16));
|
|
bytes bs = decryptSymNoAuth(m_key, h128(), &encKeys);
|
|
RLP s(bs);
|
|
unsigned version = (unsigned)s[0];
|
|
if (version == 1)
|
|
{
|
|
for (auto const& i: s[1])
|
|
m_keyInfo[m_addrLookup[(Address)i[0]] = (h128)i[1]] = KeyInfo{(h256)i[2], (std::string)i[3]};
|
|
for (auto const& i: s[2])
|
|
m_passwordInfo[(h256)i[0]] = (std::string)i[1];
|
|
m_password = (string)s[3];
|
|
}
|
|
m_cachedPasswords[hashPassword(m_password)] = m_password;
|
|
return true;
|
|
}
|
|
catch (...) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
void resave(std::string const& _pass)
|
|
{
|
|
save(_pass, m_keysFile);
|
|
}
|
|
|
|
Secret secret(Address const& _address, function<std::string()> const& _pass = DontKnowThrow)
|
|
{
|
|
auto it = m_addrLookup.find(_address);
|
|
if (it == m_addrLookup.end())
|
|
return Secret();
|
|
return secret(it->second, _pass);
|
|
}
|
|
|
|
Secret secret(h128 const& _uuid, function<std::string()> const& _pass = DontKnowThrow)
|
|
{
|
|
return Secret(m_store.secret(_uuid, [&](){
|
|
auto it = m_cachedPasswords.find(m_keyInfo[_uuid].passHash);
|
|
if (it == m_cachedPasswords.end())
|
|
{
|
|
std::string p = _pass();
|
|
m_cachedPasswords[hashPassword(p)] = p;
|
|
return p;
|
|
}
|
|
else
|
|
return it->second;
|
|
}));
|
|
}
|
|
|
|
h128 uuid(Address const& _a) const
|
|
{
|
|
auto it = m_addrLookup.find(_a);
|
|
if (it == m_addrLookup.end())
|
|
return h128();
|
|
return it->second;
|
|
}
|
|
|
|
Address address(h128 const& _uuid) const
|
|
{
|
|
for (auto const& i: m_addrLookup)
|
|
if (i.second == _uuid)
|
|
return i.first;
|
|
return Address();
|
|
}
|
|
|
|
h128 import(Secret const& _s, string const& _info, std::string const& _pass, string const& _passInfo)
|
|
{
|
|
Address addr = KeyPair(_s).address();
|
|
auto passHash = hashPassword(_pass);
|
|
m_cachedPasswords[passHash] = _pass;
|
|
m_passwordInfo[passHash] = _passInfo;
|
|
auto uuid = m_store.importSecret(_s.asBytes(), _pass);
|
|
m_keyInfo[uuid] = KeyInfo{passHash, _info};
|
|
m_addrLookup[addr] = uuid;
|
|
save(m_keysFile);
|
|
return uuid;
|
|
}
|
|
|
|
h128 import(Secret const& _s, std::string const& _info)
|
|
{
|
|
// cache password, remember the key, remember the address
|
|
return import(_s, _info, m_password, std::string());
|
|
}
|
|
|
|
void importExisting(h128 const& _uuid, std::string const& _info, std::string const& _pass, std::string const& _passInfo)
|
|
{
|
|
bytes key = m_store.secret(_uuid, [&](){ return _pass; });
|
|
if (key.empty())
|
|
return;
|
|
Address a = KeyPair(Secret(key)).address();
|
|
auto passHash = hashPassword(_pass);
|
|
if (!m_passwordInfo.count(passHash))
|
|
m_passwordInfo[passHash] = _passInfo;
|
|
if (!m_cachedPasswords.count(passHash))
|
|
m_cachedPasswords[passHash] = _pass;
|
|
m_addrLookup[a] = _uuid;
|
|
m_keyInfo[_uuid].passHash = passHash;
|
|
m_keyInfo[_uuid].info = _info;
|
|
save(m_keysFile);
|
|
}
|
|
|
|
void kill(h128 const& _id)
|
|
{
|
|
kill(address(_id));
|
|
}
|
|
|
|
void kill(Address const& _a)
|
|
{
|
|
auto id = m_addrLookup[_a];
|
|
m_addrLookup.erase(_a);
|
|
m_keyInfo.erase(id);
|
|
m_store.kill(id);
|
|
}
|
|
|
|
std::map<Address, std::string> keys() const
|
|
{
|
|
std::map<Address, std::string> ret;
|
|
for (auto const& i: m_addrLookup)
|
|
if (m_keyInfo.count(i.second) > 0)
|
|
ret[i.first] = m_keyInfo.at(i.second).info;
|
|
return ret;
|
|
}
|
|
|
|
KeyStore& store() { return m_store; }
|
|
|
|
private:
|
|
h256 hashPassword(std::string const& _pass) const
|
|
{
|
|
// TODO SECURITY: store this a bit more securely; Scrypt perhaps?
|
|
return h256(pbkdf2(_pass, asBytes(m_password), 262144, 32));
|
|
}
|
|
|
|
// Only use if previously loaded ok.
|
|
// @returns false if wasn't previously loaded ok.
|
|
bool save(std::string const& _keysFile)
|
|
{
|
|
if (!m_key)
|
|
return false;
|
|
save(m_key, _keysFile);
|
|
return true;
|
|
}
|
|
|
|
void save(std::string const& _pass, std::string const& _keysFile)
|
|
{
|
|
bytes salt = h256::random().asBytes();
|
|
writeFile(_keysFile + ".salt", salt);
|
|
auto key = h128(pbkdf2(_pass, salt, 262144, 16));
|
|
save(key, _keysFile);
|
|
}
|
|
|
|
void save(h128 const& _key, std::string const& _keysFile)
|
|
{
|
|
RLPStream s(4);
|
|
s << 1;
|
|
s.appendList(m_addrLookup.size());
|
|
for (auto const& i: m_addrLookup)
|
|
s.appendList(4) << i.first << i.second << m_keyInfo[i.second].passHash << m_keyInfo[i.second].info;
|
|
s.appendList(m_passwordInfo.size());
|
|
for (auto const& i: m_passwordInfo)
|
|
s.appendList(2) << i.first << i.second;
|
|
s.append(m_password);
|
|
|
|
writeFile(_keysFile, encryptSymNoAuth(_key, h128(), &s.out()));
|
|
m_key = _key;
|
|
}
|
|
|
|
// Ethereum keys.
|
|
std::map<Address, h128> m_addrLookup;
|
|
std::map<h128, KeyInfo> m_keyInfo;
|
|
std::map<h256, std::string> m_passwordInfo;
|
|
|
|
// Passwords that we're storing.
|
|
std::map<h256, std::string> m_cachedPasswords;
|
|
|
|
// The default password for keys in the keystore - protected by the master password.
|
|
std::string m_password;
|
|
|
|
KeyStore m_store;
|
|
h128 m_key;
|
|
std::string m_keysFile;
|
|
};
|
|
|
|
int main()
|
|
{
|
|
KeyManager keyman;
|
|
if (keyman.exists())
|
|
keyman.load("foo");
|
|
else
|
|
keyman.create("foo");
|
|
|
|
Address a("9cab1cc4e8fe528267c6c3af664a1adbce810b5f");
|
|
|
|
// keyman.importExisting(fromUUID("441193ae-a767-f1c3-48ba-dd6610db5ed0"), "{\"name\":\"Gavin Wood - Main identity\"}", "bar", "{\"hint\":\"Not foo.\"}");
|
|
// Address a2 = keyman.address(keyman.import(Secret::random(), "Key with no additional security."));
|
|
// cdebug << toString(a2);
|
|
Address a2("19c486071651b2650449ba3c6a807f316a73e8fe");
|
|
|
|
cdebug << "Secret key for " << a << "is" << keyman.secret(a, [](){ return "bar"; });
|
|
cdebug << "Secret key for " << a2 << "is" << keyman.secret(a2);
|
|
|
|
}
|
|
|
|
#elif 0
|
|
int main()
|
|
{
|
|
DownloadMan man;
|
|
DownloadSub s0(man);
|
|
DownloadSub s1(man);
|
|
DownloadSub s2(man);
|
|
man.resetToChain(h256s({u256(0), u256(1), u256(2), u256(3), u256(4), u256(5), u256(6), u256(7), u256(8)}));
|
|
assert((s0.nextFetch(2) == h256Set{(u256)7, (u256)8}));
|
|
assert((s1.nextFetch(2) == h256Set{(u256)5, (u256)6}));
|
|
assert((s2.nextFetch(2) == h256Set{(u256)3, (u256)4}));
|
|
s0.noteBlock(u256(8));
|
|
s0.doneFetch();
|
|
assert((s0.nextFetch(2) == h256Set{(u256)2, (u256)7}));
|
|
s1.noteBlock(u256(6));
|
|
s1.noteBlock(u256(5));
|
|
s1.doneFetch();
|
|
assert((s1.nextFetch(2) == h256Set{(u256)0, (u256)1}));
|
|
s0.doneFetch(); // TODO: check exact semantics of doneFetch & nextFetch. Not sure if they're right -> doneFetch calls resetFetch which kills all the info of past fetches.
|
|
cdebug << s0.nextFetch(2);
|
|
assert((s0.nextFetch(2) == h256Set{(u256)3, (u256)4}));
|
|
|
|
/* RangeMask<unsigned> m(0, 100);
|
|
cnote << m;
|
|
m += UnsignedRange(3, 10);
|
|
cnote << m;
|
|
m += UnsignedRange(11, 16);
|
|
cnote << m;
|
|
m += UnsignedRange(10, 11);
|
|
cnote << m;
|
|
cnote << ~m;
|
|
cnote << (~m).lowest(10);
|
|
for (auto i: (~m).lowest(10))
|
|
cnote << i;*/
|
|
return 0;
|
|
}
|
|
#elif 0
|
|
int main()
|
|
{
|
|
KeyPair u = KeyPair::create();
|
|
KeyPair cb = KeyPair::create();
|
|
OverlayDB db;
|
|
State s(cb.address(), db, BaseState::Empty);
|
|
cnote << s.rootHash();
|
|
s.addBalance(u.address(), 1 * ether);
|
|
Address c = s.newContract(1000 * ether, compileLLL("(suicide (caller))"));
|
|
s.commit();
|
|
State before = s;
|
|
cnote << "State before transaction: " << before;
|
|
Transaction t(0, 10000, 10000, c, bytes(), 0, u.secret());
|
|
cnote << "Transaction: " << t;
|
|
cnote << s.balance(c);
|
|
s.execute(LastHashes(), t.rlp());
|
|
cnote << "State after transaction: " << s;
|
|
cnote << before.diff(s);
|
|
}
|
|
#elif 0
|
|
int main()
|
|
{
|
|
GenericFarm<Ethash> f;
|
|
BlockInfo genesis = CanonBlockChain::genesis();
|
|
genesis.difficulty = 1 << 18;
|
|
cdebug << genesis.boundary();
|
|
|
|
auto mine = [](GenericFarm<Ethash>& f, BlockInfo const& g, unsigned timeout) {
|
|
BlockInfo bi = g;
|
|
bool completed = false;
|
|
f.onSolutionFound([&](ProofOfWork::Solution sol)
|
|
{
|
|
ProofOfWork::assignResult(sol, bi);
|
|
return completed = true;
|
|
});
|
|
f.setWork(bi);
|
|
for (unsigned i = 0; !completed && i < timeout * 10; ++i, cout << f.miningProgress() << "\r" << flush)
|
|
this_thread::sleep_for(chrono::milliseconds(100));
|
|
cout << endl << flush;
|
|
cdebug << bi.mixHash << bi.nonce << (Ethash::verify(bi) ? "GOOD" : "bad");
|
|
};
|
|
|
|
Ethash::prep(genesis);
|
|
|
|
genesis.difficulty = u256(1) << 40;
|
|
genesis.noteDirty();
|
|
f.startCPU();
|
|
mine(f, genesis, 10);
|
|
|
|
f.startGPU();
|
|
|
|
cdebug << "Good:";
|
|
genesis.difficulty = 1 << 18;
|
|
genesis.noteDirty();
|
|
mine(f, genesis, 30);
|
|
|
|
cdebug << "Bad:";
|
|
genesis.difficulty = (u256(1) << 40);
|
|
genesis.noteDirty();
|
|
mine(f, genesis, 30);
|
|
|
|
f.stop();
|
|
|
|
return 0;
|
|
}
|
|
#elif 0
|
|
|
|
void mine(State& s, BlockChain const& _bc)
|
|
{
|
|
s.commitToMine(_bc);
|
|
GenericFarm<ProofOfWork> f;
|
|
bool completed = false;
|
|
f.onSolutionFound([&](ProofOfWork::Solution sol)
|
|
{
|
|
return completed = s.completeMine<ProofOfWork>(sol);
|
|
});
|
|
f.setWork(s.info());
|
|
f.startCPU();
|
|
while (!completed)
|
|
this_thread::sleep_for(chrono::milliseconds(20));
|
|
}
|
|
#elif 0
|
|
int main()
|
|
{
|
|
cnote << "Testing State...";
|
|
|
|
KeyPair me = sha3("Gav Wood");
|
|
KeyPair myMiner = sha3("Gav's Miner");
|
|
// KeyPair you = sha3("123");
|
|
|
|
Defaults::setDBPath(boost::filesystem::temp_directory_path().string() + "/" + toString(chrono::system_clock::now().time_since_epoch().count()));
|
|
|
|
OverlayDB stateDB = State::openDB();
|
|
CanonBlockChain bc;
|
|
cout << bc;
|
|
|
|
State s(stateDB, BaseState::CanonGenesis, myMiner.address());
|
|
cout << s;
|
|
|
|
// Sync up - this won't do much until we use the last state.
|
|
s.sync(bc);
|
|
|
|
cout << s;
|
|
|
|
// Mine to get some ether!
|
|
mine(s, bc);
|
|
|
|
bc.attemptImport(s.blockData(), stateDB);
|
|
|
|
cout << bc;
|
|
|
|
s.sync(bc);
|
|
|
|
cout << s;
|
|
|
|
// Inject a transaction to transfer funds from miner to me.
|
|
Transaction t(1000, 10000, 30000, me.address(), bytes(), s.transactionsFrom(myMiner.address()), myMiner.secret());
|
|
assert(t.sender() == myMiner.address());
|
|
s.execute(bc.lastHashes(), t);
|
|
|
|
cout << s;
|
|
|
|
// Mine to get some ether and set in stone.
|
|
s.commitToMine(bc);
|
|
s.commitToMine(bc);
|
|
mine(s, bc);
|
|
bc.attemptImport(s.blockData(), stateDB);
|
|
|
|
cout << bc;
|
|
|
|
s.sync(bc);
|
|
|
|
cout << s;
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int main()
|
|
{
|
|
string tempDir = boost::filesystem::temp_directory_path().string() + "/" + toString(chrono::system_clock::now().time_since_epoch().count());
|
|
|
|
KeyPair myMiner = sha3("Gav's Miner");
|
|
|
|
p2p::Host net("Test");
|
|
cdebug << "Path:" << tempDir;
|
|
Client c(&net, tempDir);
|
|
|
|
c.setAddress(myMiner.address());
|
|
|
|
this_thread::sleep_for(chrono::milliseconds(1000));
|
|
|
|
c.startMining();
|
|
|
|
this_thread::sleep_for(chrono::milliseconds(6000));
|
|
|
|
c.stopMining();
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
|