2010-11-25 10:03:59 +01:00
|
|
|
/*
|
2013-06-08 22:15:00 +02:00
|
|
|
* Copyright 2010 Jeff Garzik
|
2014-04-30 23:03:58 +02:00
|
|
|
* Copyright 2012 Luke Dashjr
|
2020-06-25 17:02:57 +02:00
|
|
|
* Copyright 2012-2020 pooler
|
2019-01-08 17:38:06 +01:00
|
|
|
* Copyright 2017 Pieter Wuille
|
2010-11-25 10:03:59 +01:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License as published by the Free
|
2011-03-15 04:17:34 +01:00
|
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
2010-11-25 10:03:59 +01:00
|
|
|
* any later version. See COPYING for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#include "cpuminer-config.h"
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2011-03-18 07:53:13 +01:00
|
|
|
#include <ctype.h>
|
2011-03-18 22:24:16 +01:00
|
|
|
#include <stdarg.h>
|
2010-11-25 10:03:59 +01:00
|
|
|
#include <string.h>
|
2012-03-10 13:37:33 +01:00
|
|
|
#include <stdbool.h>
|
2013-07-12 18:39:23 +02:00
|
|
|
#include <inttypes.h>
|
2014-04-30 23:03:58 +02:00
|
|
|
#include <limits.h>
|
|
|
|
#include <errno.h>
|
2011-12-21 04:19:44 +01:00
|
|
|
#include <unistd.h>
|
2010-11-25 10:03:59 +01:00
|
|
|
#include <jansson.h>
|
|
|
|
#include <curl/curl.h>
|
2011-03-18 22:24:16 +01:00
|
|
|
#include <time.h>
|
2012-02-25 22:22:45 +01:00
|
|
|
#if defined(WIN32)
|
|
|
|
#include <winsock2.h>
|
|
|
|
#include <mstcpip.h>
|
|
|
|
#else
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#endif
|
2011-12-21 04:19:44 +01:00
|
|
|
#include "compat.h"
|
2010-11-25 10:03:59 +01:00
|
|
|
#include "miner.h"
|
2011-03-15 04:17:34 +01:00
|
|
|
#include "elist.h"
|
2010-11-25 10:03:59 +01:00
|
|
|
|
|
|
|
struct data_buffer {
|
|
|
|
void *buf;
|
|
|
|
size_t len;
|
|
|
|
};
|
|
|
|
|
2011-03-18 07:53:13 +01:00
|
|
|
struct header_info {
|
|
|
|
char *lp_path;
|
2012-06-13 01:08:20 +02:00
|
|
|
char *reason;
|
2013-06-08 22:15:00 +02:00
|
|
|
char *stratum_url;
|
2011-03-18 07:53:13 +01:00
|
|
|
};
|
|
|
|
|
2011-03-15 04:17:34 +01:00
|
|
|
struct tq_ent {
|
|
|
|
void *data;
|
|
|
|
struct list_head q_node;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct thread_q {
|
|
|
|
struct list_head q;
|
|
|
|
|
|
|
|
bool frozen;
|
|
|
|
|
|
|
|
pthread_mutex_t mutex;
|
|
|
|
pthread_cond_t cond;
|
|
|
|
};
|
|
|
|
|
2011-03-18 22:24:16 +01:00
|
|
|
void applog(int prio, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
|
|
if (use_syslog) {
|
2012-04-08 20:32:44 +02:00
|
|
|
va_list ap2;
|
|
|
|
char *buf;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
va_copy(ap2, ap);
|
|
|
|
len = vsnprintf(NULL, 0, fmt, ap2) + 1;
|
|
|
|
va_end(ap2);
|
|
|
|
buf = alloca(len);
|
|
|
|
if (vsnprintf(buf, len, fmt, ap) >= 0)
|
|
|
|
syslog(prio, "%s", buf);
|
2011-03-18 22:24:16 +01:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
if (0) {}
|
|
|
|
#endif
|
|
|
|
else {
|
|
|
|
char *f;
|
|
|
|
int len;
|
2011-12-21 04:19:44 +01:00
|
|
|
time_t now;
|
2011-03-18 22:24:16 +01:00
|
|
|
struct tm tm, *tm_p;
|
|
|
|
|
2011-12-21 04:19:44 +01:00
|
|
|
time(&now);
|
2011-03-18 22:24:16 +01:00
|
|
|
|
2012-04-16 00:37:09 +02:00
|
|
|
pthread_mutex_lock(&applog_lock);
|
2011-12-21 04:19:44 +01:00
|
|
|
tm_p = localtime(&now);
|
2011-03-18 22:24:16 +01:00
|
|
|
memcpy(&tm, tm_p, sizeof(tm));
|
2012-04-16 00:37:09 +02:00
|
|
|
pthread_mutex_unlock(&applog_lock);
|
2011-03-18 22:24:16 +01:00
|
|
|
|
|
|
|
len = 40 + strlen(fmt) + 2;
|
|
|
|
f = alloca(len);
|
|
|
|
sprintf(f, "[%d-%02d-%02d %02d:%02d:%02d] %s\n",
|
|
|
|
tm.tm_year + 1900,
|
2011-04-11 23:32:25 +02:00
|
|
|
tm.tm_mon + 1,
|
2011-03-18 22:24:16 +01:00
|
|
|
tm.tm_mday,
|
|
|
|
tm.tm_hour,
|
|
|
|
tm.tm_min,
|
|
|
|
tm.tm_sec,
|
|
|
|
fmt);
|
2012-04-16 00:37:09 +02:00
|
|
|
pthread_mutex_lock(&applog_lock);
|
2011-03-18 22:24:16 +01:00
|
|
|
vfprintf(stderr, f, ap); /* atomic write to stderr */
|
2013-07-04 15:23:10 +02:00
|
|
|
fflush(stderr);
|
2012-04-16 00:37:09 +02:00
|
|
|
pthread_mutex_unlock(&applog_lock);
|
2011-03-18 22:24:16 +01:00
|
|
|
}
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
/* Modify the representation of integer numbers which would cause an overflow
|
|
|
|
* so that they are treated as floating-point numbers.
|
|
|
|
* This is a hack to overcome the limitations of some versions of Jansson. */
|
|
|
|
static char *hack_json_numbers(const char *in)
|
|
|
|
{
|
|
|
|
char *out;
|
|
|
|
int i, off, intoff;
|
|
|
|
bool in_str, in_int;
|
|
|
|
|
|
|
|
out = calloc(2 * strlen(in) + 1, 1);
|
|
|
|
if (!out)
|
|
|
|
return NULL;
|
|
|
|
off = intoff = 0;
|
|
|
|
in_str = in_int = false;
|
|
|
|
for (i = 0; in[i]; i++) {
|
|
|
|
char c = in[i];
|
|
|
|
if (c == '"') {
|
|
|
|
in_str = !in_str;
|
|
|
|
} else if (c == '\\') {
|
|
|
|
out[off++] = c;
|
|
|
|
if (!in[++i])
|
|
|
|
break;
|
|
|
|
} else if (!in_str && !in_int && isdigit(c)) {
|
|
|
|
intoff = off;
|
|
|
|
in_int = true;
|
|
|
|
} else if (in_int && !isdigit(c)) {
|
|
|
|
if (c != '.' && c != 'e' && c != 'E' && c != '+' && c != '-') {
|
|
|
|
in_int = false;
|
|
|
|
if (off - intoff > 4) {
|
|
|
|
char *end;
|
|
|
|
#if JSON_INTEGER_IS_LONG_LONG
|
|
|
|
errno = 0;
|
|
|
|
strtoll(out + intoff, &end, 10);
|
|
|
|
if (!*end && errno == ERANGE) {
|
|
|
|
#else
|
|
|
|
long l;
|
|
|
|
errno = 0;
|
|
|
|
l = strtol(out + intoff, &end, 10);
|
|
|
|
if (!*end && (errno == ERANGE || l > INT_MAX)) {
|
|
|
|
#endif
|
|
|
|
out[off++] = '.';
|
|
|
|
out[off++] = '0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
out[off++] = in[i];
|
|
|
|
}
|
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
2010-11-25 10:03:59 +01:00
|
|
|
static void databuf_free(struct data_buffer *db)
|
|
|
|
{
|
|
|
|
if (!db)
|
|
|
|
return;
|
2011-03-15 04:17:34 +01:00
|
|
|
|
2010-11-25 10:03:59 +01:00
|
|
|
free(db->buf);
|
|
|
|
|
|
|
|
memset(db, 0, sizeof(*db));
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct data_buffer *db = user_data;
|
|
|
|
size_t len = size * nmemb;
|
|
|
|
size_t oldlen, newlen;
|
|
|
|
void *newmem;
|
2012-02-03 23:47:04 +01:00
|
|
|
static const unsigned char zero = 0;
|
2010-11-25 10:03:59 +01:00
|
|
|
|
|
|
|
oldlen = db->len;
|
|
|
|
newlen = oldlen + len;
|
|
|
|
|
|
|
|
newmem = realloc(db->buf, newlen + 1);
|
|
|
|
if (!newmem)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
db->buf = newmem;
|
|
|
|
db->len = newlen;
|
|
|
|
memcpy(db->buf + oldlen, ptr, len);
|
|
|
|
memcpy(db->buf + newlen, &zero, 1); /* null terminate */
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2011-03-18 07:53:13 +01:00
|
|
|
static size_t resp_hdr_cb(void *ptr, size_t size, size_t nmemb, void *user_data)
|
|
|
|
{
|
|
|
|
struct header_info *hi = user_data;
|
|
|
|
size_t remlen, slen, ptrlen = size * nmemb;
|
|
|
|
char *rem, *val = NULL, *key = NULL;
|
|
|
|
void *tmp;
|
|
|
|
|
|
|
|
val = calloc(1, ptrlen);
|
|
|
|
key = calloc(1, ptrlen);
|
|
|
|
if (!key || !val)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
tmp = memchr(ptr, ':', ptrlen);
|
|
|
|
if (!tmp || (tmp == ptr)) /* skip empty keys / blanks */
|
|
|
|
goto out;
|
|
|
|
slen = tmp - ptr;
|
|
|
|
if ((slen + 1) == ptrlen) /* skip key w/ no value */
|
|
|
|
goto out;
|
|
|
|
memcpy(key, ptr, slen); /* store & nul term key */
|
|
|
|
key[slen] = 0;
|
|
|
|
|
|
|
|
rem = ptr + slen + 1; /* trim value's leading whitespace */
|
|
|
|
remlen = ptrlen - slen - 1;
|
|
|
|
while ((remlen > 0) && (isspace(*rem))) {
|
|
|
|
remlen--;
|
|
|
|
rem++;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(val, rem, remlen); /* store value, trim trailing ws */
|
|
|
|
val[remlen] = 0;
|
|
|
|
while ((*val) && (isspace(val[strlen(val) - 1]))) {
|
|
|
|
val[strlen(val) - 1] = 0;
|
|
|
|
}
|
|
|
|
if (!*val) /* skip blank value */
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (!strcasecmp("X-Long-Polling", key)) {
|
|
|
|
hi->lp_path = val; /* steal memory reference */
|
|
|
|
val = NULL;
|
|
|
|
}
|
|
|
|
|
2012-06-13 01:08:20 +02:00
|
|
|
if (!strcasecmp("X-Reject-Reason", key)) {
|
|
|
|
hi->reason = val; /* steal memory reference */
|
|
|
|
val = NULL;
|
|
|
|
}
|
|
|
|
|
2013-06-08 22:15:00 +02:00
|
|
|
if (!strcasecmp("X-Stratum", key)) {
|
|
|
|
hi->stratum_url = val; /* steal memory reference */
|
|
|
|
val = NULL;
|
|
|
|
}
|
|
|
|
|
2011-03-18 07:53:13 +01:00
|
|
|
out:
|
|
|
|
free(key);
|
|
|
|
free(val);
|
|
|
|
return ptrlen;
|
|
|
|
}
|
|
|
|
|
2012-02-25 22:22:45 +01:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x070f06
|
2013-06-08 22:15:00 +02:00
|
|
|
static int sockopt_keepalive_cb(void *userdata, curl_socket_t fd,
|
2012-02-25 22:22:45 +01:00
|
|
|
curlsocktype purpose)
|
|
|
|
{
|
|
|
|
int keepalive = 1;
|
|
|
|
int tcp_keepcnt = 3;
|
|
|
|
int tcp_keepidle = 50;
|
|
|
|
int tcp_keepintvl = 50;
|
|
|
|
|
|
|
|
#ifndef WIN32
|
|
|
|
if (unlikely(setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &keepalive,
|
|
|
|
sizeof(keepalive))))
|
|
|
|
return 1;
|
|
|
|
#ifdef __linux
|
|
|
|
if (unlikely(setsockopt(fd, SOL_TCP, TCP_KEEPCNT,
|
|
|
|
&tcp_keepcnt, sizeof(tcp_keepcnt))))
|
|
|
|
return 1;
|
|
|
|
if (unlikely(setsockopt(fd, SOL_TCP, TCP_KEEPIDLE,
|
|
|
|
&tcp_keepidle, sizeof(tcp_keepidle))))
|
|
|
|
return 1;
|
|
|
|
if (unlikely(setsockopt(fd, SOL_TCP, TCP_KEEPINTVL,
|
|
|
|
&tcp_keepintvl, sizeof(tcp_keepintvl))))
|
|
|
|
return 1;
|
|
|
|
#endif /* __linux */
|
|
|
|
#ifdef __APPLE_CC__
|
|
|
|
if (unlikely(setsockopt(fd, IPPROTO_TCP, TCP_KEEPALIVE,
|
|
|
|
&tcp_keepintvl, sizeof(tcp_keepintvl))))
|
|
|
|
return 1;
|
|
|
|
#endif /* __APPLE_CC__ */
|
|
|
|
#else /* WIN32 */
|
|
|
|
struct tcp_keepalive vals;
|
|
|
|
vals.onoff = 1;
|
|
|
|
vals.keepalivetime = tcp_keepidle * 1000;
|
|
|
|
vals.keepaliveinterval = tcp_keepintvl * 1000;
|
|
|
|
DWORD outputBytes;
|
|
|
|
if (unlikely(WSAIoctl(fd, SIO_KEEPALIVE_VALS, &vals, sizeof(vals),
|
|
|
|
NULL, 0, &outputBytes, NULL, NULL)))
|
|
|
|
return 1;
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2011-02-10 06:41:44 +01:00
|
|
|
json_t *json_rpc_call(CURL *curl, const char *url,
|
2011-03-18 07:53:13 +01:00
|
|
|
const char *userpass, const char *rpc_req,
|
2014-04-14 14:15:02 +02:00
|
|
|
int *curl_err, int flags)
|
2010-11-25 10:03:59 +01:00
|
|
|
{
|
2010-12-28 21:22:53 +01:00
|
|
|
json_t *val, *err_val, *res_val;
|
2010-11-25 10:03:59 +01:00
|
|
|
int rc;
|
2014-04-14 14:15:02 +02:00
|
|
|
long http_rc;
|
2012-03-10 23:29:11 +01:00
|
|
|
struct data_buffer all_data = {0};
|
2014-04-30 23:03:58 +02:00
|
|
|
char *json_buf;
|
2012-03-10 23:29:11 +01:00
|
|
|
json_error_t err;
|
2010-11-25 10:03:59 +01:00
|
|
|
struct curl_slist *headers = NULL;
|
2010-12-28 23:13:59 +01:00
|
|
|
char curl_err_str[CURL_ERROR_SIZE];
|
2014-04-14 14:15:02 +02:00
|
|
|
long timeout = (flags & JSON_RPC_LONGPOLL) ? opt_timeout : 30;
|
2012-03-10 23:29:11 +01:00
|
|
|
struct header_info hi = {0};
|
2010-11-25 10:03:59 +01:00
|
|
|
|
2011-02-10 06:41:44 +01:00
|
|
|
/* it is assumed that 'curl' is freshly [re]initialized at this pt */
|
2010-11-25 10:03:59 +01:00
|
|
|
|
|
|
|
if (opt_protocol)
|
|
|
|
curl_easy_setopt(curl, CURLOPT_VERBOSE, 1);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, url);
|
2013-06-13 21:50:47 +02:00
|
|
|
if (opt_cert)
|
|
|
|
curl_easy_setopt(curl, CURLOPT_CAINFO, opt_cert);
|
2010-11-25 10:03:59 +01:00
|
|
|
curl_easy_setopt(curl, CURLOPT_ENCODING, "");
|
|
|
|
curl_easy_setopt(curl, CURLOPT_FAILONERROR, 1);
|
2011-12-16 18:01:45 +01:00
|
|
|
curl_easy_setopt(curl, CURLOPT_NOSIGNAL, 1);
|
2010-11-25 10:03:59 +01:00
|
|
|
curl_easy_setopt(curl, CURLOPT_TCP_NODELAY, 1);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, all_data_cb);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_WRITEDATA, &all_data);
|
2010-12-28 23:13:59 +01:00
|
|
|
curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, curl_err_str);
|
2014-04-15 23:11:00 +02:00
|
|
|
if (opt_redirect)
|
|
|
|
curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1);
|
2011-03-18 07:53:13 +01:00
|
|
|
curl_easy_setopt(curl, CURLOPT_TIMEOUT, timeout);
|
2012-06-13 01:08:20 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_HEADERFUNCTION, resp_hdr_cb);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_HEADERDATA, &hi);
|
2012-02-26 01:34:58 +01:00
|
|
|
if (opt_proxy) {
|
|
|
|
curl_easy_setopt(curl, CURLOPT_PROXY, opt_proxy);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_PROXYTYPE, opt_proxy_type);
|
|
|
|
}
|
2010-11-25 10:03:59 +01:00
|
|
|
if (userpass) {
|
|
|
|
curl_easy_setopt(curl, CURLOPT_USERPWD, userpass);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
|
|
|
|
}
|
2012-02-25 22:22:45 +01:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x070f06
|
2014-04-14 14:15:02 +02:00
|
|
|
if (flags & JSON_RPC_LONGPOLL)
|
2013-06-08 22:15:00 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_SOCKOPTFUNCTION, sockopt_keepalive_cb);
|
2012-02-25 22:22:45 +01:00
|
|
|
#endif
|
2020-07-25 17:25:12 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_POSTFIELDS, rpc_req);
|
2010-11-25 10:03:59 +01:00
|
|
|
|
|
|
|
if (opt_protocol)
|
2011-03-21 09:02:13 +01:00
|
|
|
applog(LOG_DEBUG, "JSON protocol request:\n%s\n", rpc_req);
|
2010-11-25 10:03:59 +01:00
|
|
|
|
2013-06-08 22:15:00 +02:00
|
|
|
headers = curl_slist_append(headers, "Content-Type: application/json");
|
|
|
|
headers = curl_slist_append(headers, "User-Agent: " USER_AGENT);
|
|
|
|
headers = curl_slist_append(headers, "X-Mining-Extensions: midstate");
|
2012-02-01 03:59:08 +01:00
|
|
|
headers = curl_slist_append(headers, "Accept:"); /* disable Accept hdr*/
|
2010-11-25 10:03:59 +01:00
|
|
|
headers = curl_slist_append(headers, "Expect:"); /* disable Expect hdr*/
|
|
|
|
|
|
|
|
curl_easy_setopt(curl, CURLOPT_HTTPHEADER, headers);
|
|
|
|
|
|
|
|
rc = curl_easy_perform(curl);
|
2012-01-21 00:31:51 +01:00
|
|
|
if (curl_err != NULL)
|
|
|
|
*curl_err = rc;
|
2010-12-28 23:13:59 +01:00
|
|
|
if (rc) {
|
2014-04-14 14:15:02 +02:00
|
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &http_rc);
|
|
|
|
if (!((flags & JSON_RPC_LONGPOLL) && rc == CURLE_OPERATION_TIMEDOUT) &&
|
|
|
|
!((flags & JSON_RPC_QUIET_404) && http_rc == 404))
|
2011-12-04 22:55:30 +01:00
|
|
|
applog(LOG_ERR, "HTTP request failed: %s", curl_err_str);
|
2014-04-30 23:03:58 +02:00
|
|
|
if (curl_err && (flags & JSON_RPC_QUIET_404) && http_rc == 404)
|
|
|
|
*curl_err = CURLE_OK;
|
2010-11-25 10:03:59 +01:00
|
|
|
goto err_out;
|
2010-12-28 23:13:59 +01:00
|
|
|
}
|
2010-11-25 10:03:59 +01:00
|
|
|
|
2013-06-08 22:15:00 +02:00
|
|
|
/* If X-Stratum was found, activate Stratum */
|
|
|
|
if (want_stratum && hi.stratum_url &&
|
2014-04-15 19:59:17 +02:00
|
|
|
!strncasecmp(hi.stratum_url, "stratum+tcp://", 14)) {
|
2013-06-08 22:15:00 +02:00
|
|
|
have_stratum = true;
|
|
|
|
tq_push(thr_info[stratum_thr_id].q, hi.stratum_url);
|
|
|
|
hi.stratum_url = NULL;
|
|
|
|
}
|
|
|
|
|
2011-03-18 07:53:13 +01:00
|
|
|
/* If X-Long-Polling was found, activate long polling */
|
2014-04-30 23:03:58 +02:00
|
|
|
if (!have_longpoll && want_longpoll && hi.lp_path && !have_gbt &&
|
|
|
|
allow_getwork && !have_stratum) {
|
2011-03-18 07:53:13 +01:00
|
|
|
have_longpoll = true;
|
|
|
|
tq_push(thr_info[longpoll_thr_id].q, hi.lp_path);
|
2013-06-08 22:15:00 +02:00
|
|
|
hi.lp_path = NULL;
|
|
|
|
}
|
2011-03-18 07:53:13 +01:00
|
|
|
|
2012-02-03 23:47:04 +01:00
|
|
|
if (!all_data.buf) {
|
|
|
|
applog(LOG_ERR, "Empty data received in json_rpc_call.");
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
json_buf = hack_json_numbers(all_data.buf);
|
|
|
|
errno = 0; /* needed for Jansson < 2.1 */
|
|
|
|
val = JSON_LOADS(json_buf, &err);
|
|
|
|
free(json_buf);
|
2010-11-25 10:03:59 +01:00
|
|
|
if (!val) {
|
2011-03-21 09:02:13 +01:00
|
|
|
applog(LOG_ERR, "JSON decode failed(%d): %s", err.line, err.text);
|
2010-11-25 10:03:59 +01:00
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (opt_protocol) {
|
|
|
|
char *s = json_dumps(val, JSON_INDENT(3));
|
2011-03-21 09:02:13 +01:00
|
|
|
applog(LOG_DEBUG, "JSON protocol response:\n%s", s);
|
2010-11-25 10:03:59 +01:00
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
/* JSON-RPC valid response returns a 'result' and a null 'error'. */
|
2010-12-28 21:22:53 +01:00
|
|
|
res_val = json_object_get(val, "result");
|
|
|
|
err_val = json_object_get(val, "error");
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
if (!res_val || (err_val && !json_is_null(err_val))) {
|
2010-12-28 21:22:53 +01:00
|
|
|
char *s;
|
|
|
|
|
|
|
|
if (err_val)
|
|
|
|
s = json_dumps(err_val, JSON_INDENT(3));
|
|
|
|
else
|
|
|
|
s = strdup("(unknown reason)");
|
|
|
|
|
2011-03-21 09:02:13 +01:00
|
|
|
applog(LOG_ERR, "JSON-RPC call failed: %s", s);
|
2010-12-28 21:22:53 +01:00
|
|
|
|
|
|
|
free(s);
|
2011-03-15 04:17:34 +01:00
|
|
|
|
2010-12-28 21:22:53 +01:00
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
2012-06-13 01:08:20 +02:00
|
|
|
if (hi.reason)
|
|
|
|
json_object_set_new(val, "reject-reason", json_string(hi.reason));
|
|
|
|
|
2010-11-25 10:03:59 +01:00
|
|
|
databuf_free(&all_data);
|
|
|
|
curl_slist_free_all(headers);
|
2011-02-10 06:41:44 +01:00
|
|
|
curl_easy_reset(curl);
|
2010-11-25 10:03:59 +01:00
|
|
|
return val;
|
|
|
|
|
|
|
|
err_out:
|
2013-06-08 22:15:00 +02:00
|
|
|
free(hi.lp_path);
|
|
|
|
free(hi.reason);
|
|
|
|
free(hi.stratum_url);
|
2010-11-25 10:03:59 +01:00
|
|
|
databuf_free(&all_data);
|
|
|
|
curl_slist_free_all(headers);
|
2011-02-10 06:41:44 +01:00
|
|
|
curl_easy_reset(curl);
|
2010-11-25 10:03:59 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-04-28 12:19:18 +02:00
|
|
|
void memrev(unsigned char *p, size_t len)
|
|
|
|
{
|
|
|
|
unsigned char c, *q;
|
|
|
|
for (q = p + len - 1; p < q; p++, q--) {
|
|
|
|
c = *p;
|
|
|
|
*p = *q;
|
|
|
|
*q = c;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
void bin2hex(char *s, const unsigned char *p, size_t len)
|
2010-11-25 10:03:59 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < len; i++)
|
|
|
|
sprintf(s + (i * 2), "%02x", (unsigned int) p[i]);
|
2014-04-30 23:03:58 +02:00
|
|
|
}
|
2010-11-25 10:03:59 +01:00
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
char *abin2hex(const unsigned char *p, size_t len)
|
|
|
|
{
|
|
|
|
char *s = malloc((len * 2) + 1);
|
|
|
|
if (!s)
|
|
|
|
return NULL;
|
|
|
|
bin2hex(s, p, len);
|
2010-11-25 10:03:59 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool hex2bin(unsigned char *p, const char *hexstr, size_t len)
|
|
|
|
{
|
2013-06-09 16:06:46 +02:00
|
|
|
char hex_byte[3];
|
|
|
|
char *ep;
|
|
|
|
|
|
|
|
hex_byte[2] = '\0';
|
2010-11-25 10:03:59 +01:00
|
|
|
|
2013-06-09 16:06:46 +02:00
|
|
|
while (*hexstr && len) {
|
2010-11-25 10:03:59 +01:00
|
|
|
if (!hexstr[1]) {
|
2011-03-21 09:02:13 +01:00
|
|
|
applog(LOG_ERR, "hex2bin str truncated");
|
2010-11-25 10:03:59 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
hex_byte[0] = hexstr[0];
|
|
|
|
hex_byte[1] = hexstr[1];
|
2013-06-09 16:06:46 +02:00
|
|
|
*p = (unsigned char) strtol(hex_byte, &ep, 16);
|
|
|
|
if (*ep) {
|
|
|
|
applog(LOG_ERR, "hex2bin failed on '%s'", hex_byte);
|
2010-11-25 10:03:59 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
p++;
|
|
|
|
hexstr += 2;
|
|
|
|
len--;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (len == 0 && *hexstr == 0) ? true : false;
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
int varint_encode(unsigned char *p, uint64_t n)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
if (n < 0xfd) {
|
|
|
|
p[0] = n;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (n <= 0xffff) {
|
|
|
|
p[0] = 0xfd;
|
|
|
|
p[1] = n & 0xff;
|
|
|
|
p[2] = n >> 8;
|
|
|
|
return 3;
|
|
|
|
}
|
|
|
|
if (n <= 0xffffffff) {
|
|
|
|
p[0] = 0xfe;
|
|
|
|
for (i = 1; i < 5; i++) {
|
|
|
|
p[i] = n & 0xff;
|
|
|
|
n >>= 8;
|
|
|
|
}
|
|
|
|
return 5;
|
|
|
|
}
|
|
|
|
p[0] = 0xff;
|
|
|
|
for (i = 1; i < 9; i++) {
|
|
|
|
p[i] = n & 0xff;
|
|
|
|
n >>= 8;
|
|
|
|
}
|
|
|
|
return 9;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char b58digits[] = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz";
|
|
|
|
|
|
|
|
static bool b58dec(unsigned char *bin, size_t binsz, const char *b58)
|
|
|
|
{
|
|
|
|
size_t i, j;
|
|
|
|
uint64_t t;
|
|
|
|
uint32_t c;
|
|
|
|
uint32_t *outi;
|
|
|
|
size_t outisz = (binsz + 3) / 4;
|
|
|
|
int rem = binsz % 4;
|
|
|
|
uint32_t remmask = 0xffffffff << (8 * rem);
|
|
|
|
size_t b58sz = strlen(b58);
|
|
|
|
bool rc = false;
|
|
|
|
|
|
|
|
outi = calloc(outisz, sizeof(*outi));
|
|
|
|
|
|
|
|
for (i = 0; i < b58sz; ++i) {
|
|
|
|
for (c = 0; b58digits[c] != b58[i]; c++)
|
|
|
|
if (!b58digits[c])
|
|
|
|
goto out;
|
|
|
|
for (j = outisz; j--; ) {
|
|
|
|
t = (uint64_t)outi[j] * 58 + c;
|
|
|
|
c = t >> 32;
|
|
|
|
outi[j] = t & 0xffffffff;
|
|
|
|
}
|
|
|
|
if (c || outi[0] & remmask)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
j = 0;
|
|
|
|
switch (rem) {
|
|
|
|
case 3:
|
|
|
|
*(bin++) = (outi[0] >> 16) & 0xff;
|
|
|
|
case 2:
|
|
|
|
*(bin++) = (outi[0] >> 8) & 0xff;
|
|
|
|
case 1:
|
|
|
|
*(bin++) = outi[0] & 0xff;
|
|
|
|
++j;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
for (; j < outisz; ++j) {
|
|
|
|
be32enc((uint32_t *)bin, outi[j]);
|
|
|
|
bin += sizeof(uint32_t);
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = true;
|
|
|
|
out:
|
|
|
|
free(outi);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int b58check(unsigned char *bin, size_t binsz, const char *b58)
|
|
|
|
{
|
|
|
|
unsigned char buf[32];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
sha256d(buf, bin, binsz - 4);
|
|
|
|
if (memcmp(&bin[binsz - 4], buf, 4))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Check number of zeros is correct AFTER verifying checksum
|
|
|
|
* (to avoid possibility of accessing the string beyond the end) */
|
|
|
|
for (i = 0; bin[i] == '\0' && b58[i] == '1'; ++i);
|
|
|
|
if (bin[i] == '\0' || b58[i] == '1')
|
|
|
|
return -3;
|
|
|
|
|
|
|
|
return bin[0];
|
|
|
|
}
|
|
|
|
|
2019-01-08 17:38:06 +01:00
|
|
|
static uint32_t bech32_polymod_step(uint32_t pre) {
|
|
|
|
uint8_t b = pre >> 25;
|
|
|
|
return ((pre & 0x1FFFFFF) << 5) ^
|
|
|
|
(-((b >> 0) & 1) & 0x3b6a57b2UL) ^
|
|
|
|
(-((b >> 1) & 1) & 0x26508e6dUL) ^
|
|
|
|
(-((b >> 2) & 1) & 0x1ea119faUL) ^
|
|
|
|
(-((b >> 3) & 1) & 0x3d4233ddUL) ^
|
|
|
|
(-((b >> 4) & 1) & 0x2a1462b3UL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const int8_t bech32_charset_rev[128] = {
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
|
|
|
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
|
|
|
15, -1, 10, 17, 21, 20, 26, 30, 7, 5, -1, -1, -1, -1, -1, -1,
|
|
|
|
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
|
|
|
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1,
|
|
|
|
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
|
|
|
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1
|
|
|
|
};
|
|
|
|
|
|
|
|
static bool bech32_decode(char *hrp, uint8_t *data, size_t *data_len, const char *input) {
|
|
|
|
uint32_t chk = 1;
|
|
|
|
size_t i;
|
|
|
|
size_t input_len = strlen(input);
|
|
|
|
size_t hrp_len;
|
|
|
|
int have_lower = 0, have_upper = 0;
|
|
|
|
if (input_len < 8 || input_len > 90) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*data_len = 0;
|
|
|
|
while (*data_len < input_len && input[(input_len - 1) - *data_len] != '1') {
|
|
|
|
++(*data_len);
|
|
|
|
}
|
|
|
|
hrp_len = input_len - (1 + *data_len);
|
|
|
|
if (1 + *data_len >= input_len || *data_len < 6) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*(data_len) -= 6;
|
|
|
|
for (i = 0; i < hrp_len; ++i) {
|
|
|
|
int ch = input[i];
|
|
|
|
if (ch < 33 || ch > 126) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (ch >= 'a' && ch <= 'z') {
|
|
|
|
have_lower = 1;
|
|
|
|
} else if (ch >= 'A' && ch <= 'Z') {
|
|
|
|
have_upper = 1;
|
|
|
|
ch = (ch - 'A') + 'a';
|
|
|
|
}
|
|
|
|
hrp[i] = ch;
|
|
|
|
chk = bech32_polymod_step(chk) ^ (ch >> 5);
|
|
|
|
}
|
|
|
|
hrp[i] = 0;
|
|
|
|
chk = bech32_polymod_step(chk);
|
|
|
|
for (i = 0; i < hrp_len; ++i) {
|
|
|
|
chk = bech32_polymod_step(chk) ^ (input[i] & 0x1f);
|
|
|
|
}
|
|
|
|
++i;
|
|
|
|
while (i < input_len) {
|
|
|
|
int v = (input[i] & 0x80) ? -1 : bech32_charset_rev[(int)input[i]];
|
|
|
|
if (input[i] >= 'a' && input[i] <= 'z') have_lower = 1;
|
|
|
|
if (input[i] >= 'A' && input[i] <= 'Z') have_upper = 1;
|
|
|
|
if (v == -1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
chk = bech32_polymod_step(chk) ^ v;
|
|
|
|
if (i + 6 < input_len) {
|
|
|
|
data[i - (1 + hrp_len)] = v;
|
|
|
|
}
|
|
|
|
++i;
|
|
|
|
}
|
|
|
|
if (have_lower && have_upper) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return chk == 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool convert_bits(uint8_t *out, size_t *outlen, int outbits, const uint8_t *in, size_t inlen, int inbits, int pad) {
|
|
|
|
uint32_t val = 0;
|
|
|
|
int bits = 0;
|
|
|
|
uint32_t maxv = (((uint32_t)1) << outbits) - 1;
|
|
|
|
while (inlen--) {
|
|
|
|
val = (val << inbits) | *(in++);
|
|
|
|
bits += inbits;
|
|
|
|
while (bits >= outbits) {
|
|
|
|
bits -= outbits;
|
|
|
|
out[(*outlen)++] = (val >> bits) & maxv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (pad) {
|
|
|
|
if (bits) {
|
|
|
|
out[(*outlen)++] = (val << (outbits - bits)) & maxv;
|
|
|
|
}
|
|
|
|
} else if (((val << (outbits - bits)) & maxv) || bits >= inbits) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool segwit_addr_decode(int *witver, uint8_t *witdata, size_t *witdata_len, const char *addr) {
|
|
|
|
uint8_t data[84];
|
|
|
|
char hrp_actual[84];
|
|
|
|
size_t data_len;
|
|
|
|
if (!bech32_decode(hrp_actual, data, &data_len, addr)) return false;
|
|
|
|
if (data_len == 0 || data_len > 65) return false;
|
|
|
|
if (data[0] > 16) return false;
|
|
|
|
*witdata_len = 0;
|
|
|
|
if (!convert_bits(witdata, witdata_len, 8, data + 1, data_len - 1, 5, 0)) return false;
|
|
|
|
if (*witdata_len < 2 || *witdata_len > 40) return false;
|
|
|
|
if (data[0] == 0 && *witdata_len != 20 && *witdata_len != 32) return false;
|
|
|
|
*witver = data[0];
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t bech32_to_script(uint8_t *out, size_t outsz, const char *addr) {
|
|
|
|
uint8_t witprog[40];
|
|
|
|
size_t witprog_len;
|
|
|
|
int witver;
|
|
|
|
|
|
|
|
if (!segwit_addr_decode(&witver, witprog, &witprog_len, addr))
|
|
|
|
return 0;
|
|
|
|
if (outsz < witprog_len + 2)
|
|
|
|
return 0;
|
|
|
|
out[0] = witver ? (0x50 + witver) : 0;
|
|
|
|
out[1] = witprog_len;
|
|
|
|
memcpy(out + 2, witprog, witprog_len);
|
|
|
|
return witprog_len + 2;
|
|
|
|
}
|
|
|
|
|
2014-04-30 23:03:58 +02:00
|
|
|
size_t address_to_script(unsigned char *out, size_t outsz, const char *addr)
|
|
|
|
{
|
|
|
|
unsigned char addrbin[25];
|
|
|
|
int addrver;
|
|
|
|
size_t rv;
|
|
|
|
|
|
|
|
if (!b58dec(addrbin, sizeof(addrbin), addr))
|
2019-01-08 17:38:06 +01:00
|
|
|
return bech32_to_script(out, outsz, addr);
|
2014-04-30 23:03:58 +02:00
|
|
|
addrver = b58check(addrbin, sizeof(addrbin), addr);
|
|
|
|
if (addrver < 0)
|
|
|
|
return 0;
|
|
|
|
switch (addrver) {
|
|
|
|
case 5: /* Bitcoin script hash */
|
|
|
|
case 196: /* Testnet script hash */
|
|
|
|
if (outsz < (rv = 23))
|
|
|
|
return rv;
|
|
|
|
out[ 0] = 0xa9; /* OP_HASH160 */
|
|
|
|
out[ 1] = 0x14; /* push 20 bytes */
|
|
|
|
memcpy(&out[2], &addrbin[1], 20);
|
|
|
|
out[22] = 0x87; /* OP_EQUAL */
|
|
|
|
return rv;
|
|
|
|
default:
|
|
|
|
if (outsz < (rv = 25))
|
|
|
|
return rv;
|
|
|
|
out[ 0] = 0x76; /* OP_DUP */
|
|
|
|
out[ 1] = 0xa9; /* OP_HASH160 */
|
|
|
|
out[ 2] = 0x14; /* push 20 bytes */
|
|
|
|
memcpy(&out[3], &addrbin[1], 20);
|
|
|
|
out[23] = 0x88; /* OP_EQUALVERIFY */
|
|
|
|
out[24] = 0xac; /* OP_CHECKSIG */
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-11-27 05:12:24 +01:00
|
|
|
/* Subtract the `struct timeval' values X and Y,
|
|
|
|
storing the result in RESULT.
|
|
|
|
Return 1 if the difference is negative, otherwise 0. */
|
2012-03-10 23:29:11 +01:00
|
|
|
int timeval_subtract(struct timeval *result, struct timeval *x,
|
|
|
|
struct timeval *y)
|
2010-11-27 05:12:24 +01:00
|
|
|
{
|
2012-03-10 23:29:11 +01:00
|
|
|
/* Perform the carry for the later subtraction by updating Y. */
|
|
|
|
if (x->tv_usec < y->tv_usec) {
|
|
|
|
int nsec = (y->tv_usec - x->tv_usec) / 1000000 + 1;
|
|
|
|
y->tv_usec -= 1000000 * nsec;
|
|
|
|
y->tv_sec += nsec;
|
|
|
|
}
|
|
|
|
if (x->tv_usec - y->tv_usec > 1000000) {
|
|
|
|
int nsec = (x->tv_usec - y->tv_usec) / 1000000;
|
|
|
|
y->tv_usec += 1000000 * nsec;
|
|
|
|
y->tv_sec -= nsec;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Compute the time remaining to wait.
|
|
|
|
* `tv_usec' is certainly positive. */
|
|
|
|
result->tv_sec = x->tv_sec - y->tv_sec;
|
|
|
|
result->tv_usec = x->tv_usec - y->tv_usec;
|
|
|
|
|
|
|
|
/* Return 1 if result is negative. */
|
|
|
|
return x->tv_sec < y->tv_sec;
|
2010-11-27 05:12:24 +01:00
|
|
|
}
|
|
|
|
|
2012-03-10 13:37:33 +01:00
|
|
|
bool fulltest(const uint32_t *hash, const uint32_t *target)
|
2011-02-03 00:47:04 +01:00
|
|
|
{
|
2011-02-03 06:46:55 +01:00
|
|
|
int i;
|
|
|
|
bool rc = true;
|
2012-03-10 13:37:33 +01:00
|
|
|
|
|
|
|
for (i = 7; i >= 0; i--) {
|
|
|
|
if (hash[i] > target[i]) {
|
2011-02-03 06:46:55 +01:00
|
|
|
rc = false;
|
|
|
|
break;
|
|
|
|
}
|
2012-03-10 13:37:33 +01:00
|
|
|
if (hash[i] < target[i]) {
|
2011-02-03 06:46:55 +01:00
|
|
|
rc = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-02-04 17:53:51 +01:00
|
|
|
if (opt_debug) {
|
2013-06-16 00:00:55 +02:00
|
|
|
uint32_t hash_be[8], target_be[8];
|
2014-04-30 23:03:58 +02:00
|
|
|
char hash_str[65], target_str[65];
|
2012-03-10 13:37:33 +01:00
|
|
|
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
|
|
be32enc(hash_be + i, hash[7 - i]);
|
|
|
|
be32enc(target_be + i, target[7 - i]);
|
|
|
|
}
|
2014-04-30 23:03:58 +02:00
|
|
|
bin2hex(hash_str, (unsigned char *)hash_be, 32);
|
|
|
|
bin2hex(target_str, (unsigned char *)target_be, 32);
|
2011-02-04 17:53:51 +01:00
|
|
|
|
2012-03-10 13:37:33 +01:00
|
|
|
applog(LOG_DEBUG, "DEBUG: %s\nHash: %s\nTarget: %s",
|
|
|
|
rc ? "hash <= target"
|
|
|
|
: "hash > target (false positive)",
|
2011-02-04 17:53:51 +01:00
|
|
|
hash_str,
|
2012-03-10 13:37:33 +01:00
|
|
|
target_str);
|
2011-02-04 17:53:51 +01:00
|
|
|
}
|
2011-02-03 06:46:55 +01:00
|
|
|
|
2012-03-10 13:37:33 +01:00
|
|
|
return rc;
|
2011-02-03 06:46:55 +01:00
|
|
|
}
|
2011-03-15 04:17:34 +01:00
|
|
|
|
2013-06-08 22:15:00 +02:00
|
|
|
void diff_to_target(uint32_t *target, double diff)
|
|
|
|
{
|
|
|
|
uint64_t m;
|
|
|
|
int k;
|
|
|
|
|
|
|
|
for (k = 6; k > 0 && diff > 1.0; k--)
|
|
|
|
diff /= 4294967296.0;
|
|
|
|
m = 4294901760.0 / diff;
|
|
|
|
if (m == 0 && k == 6)
|
|
|
|
memset(target, 0xff, 32);
|
|
|
|
else {
|
|
|
|
memset(target, 0, 32);
|
|
|
|
target[k] = (uint32_t)m;
|
|
|
|
target[k + 1] = (uint32_t)(m >> 32);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef WIN32
|
|
|
|
#define socket_blocks() (WSAGetLastError() == WSAEWOULDBLOCK)
|
|
|
|
#else
|
|
|
|
#define socket_blocks() (errno == EAGAIN || errno == EWOULDBLOCK)
|
|
|
|
#endif
|
|
|
|
|
2015-04-06 19:26:24 +02:00
|
|
|
static bool send_line(struct stratum_ctx *sctx, char *s)
|
2013-06-08 22:15:00 +02:00
|
|
|
{
|
|
|
|
ssize_t len, sent = 0;
|
|
|
|
|
|
|
|
len = strlen(s);
|
|
|
|
s[len++] = '\n';
|
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
struct timeval timeout = {0, 0};
|
|
|
|
ssize_t n;
|
|
|
|
fd_set wd;
|
|
|
|
|
|
|
|
FD_ZERO(&wd);
|
2015-04-06 19:26:24 +02:00
|
|
|
FD_SET(sctx->sock, &wd);
|
|
|
|
if (select(sctx->sock + 1, NULL, &wd, NULL, &timeout) < 1)
|
2013-06-08 22:15:00 +02:00
|
|
|
return false;
|
2015-04-06 19:26:24 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x071202
|
|
|
|
CURLcode rc = curl_easy_send(sctx->curl, s + sent, len, (size_t *)&n);
|
|
|
|
if (rc != CURLE_OK) {
|
|
|
|
if (rc != CURLE_AGAIN)
|
|
|
|
#else
|
|
|
|
n = send(sctx->sock, s + sent, len, 0);
|
2013-06-08 22:15:00 +02:00
|
|
|
if (n < 0) {
|
|
|
|
if (!socket_blocks())
|
2015-04-06 19:26:24 +02:00
|
|
|
#endif
|
2013-06-08 22:15:00 +02:00
|
|
|
return false;
|
|
|
|
n = 0;
|
|
|
|
}
|
|
|
|
sent += n;
|
|
|
|
len -= n;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool stratum_send_line(struct stratum_ctx *sctx, char *s)
|
|
|
|
{
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
if (opt_protocol)
|
|
|
|
applog(LOG_DEBUG, "> %s", s);
|
|
|
|
|
|
|
|
pthread_mutex_lock(&sctx->sock_lock);
|
2015-04-06 19:26:24 +02:00
|
|
|
ret = send_line(sctx, s);
|
2013-06-08 22:15:00 +02:00
|
|
|
pthread_mutex_unlock(&sctx->sock_lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool socket_full(curl_socket_t sock, int timeout)
|
|
|
|
{
|
|
|
|
struct timeval tv;
|
|
|
|
fd_set rd;
|
|
|
|
|
|
|
|
FD_ZERO(&rd);
|
|
|
|
FD_SET(sock, &rd);
|
|
|
|
tv.tv_sec = timeout;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
if (select(sock + 1, &rd, NULL, NULL, &tv) > 0)
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool stratum_socket_full(struct stratum_ctx *sctx, int timeout)
|
|
|
|
{
|
|
|
|
return strlen(sctx->sockbuf) || socket_full(sctx->sock, timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define RBUFSIZE 2048
|
|
|
|
#define RECVSIZE (RBUFSIZE - 4)
|
|
|
|
|
|
|
|
static void stratum_buffer_append(struct stratum_ctx *sctx, const char *s)
|
|
|
|
{
|
|
|
|
size_t old, new;
|
|
|
|
|
|
|
|
old = strlen(sctx->sockbuf);
|
|
|
|
new = old + strlen(s) + 1;
|
|
|
|
if (new >= sctx->sockbuf_size) {
|
|
|
|
sctx->sockbuf_size = new + (RBUFSIZE - (new % RBUFSIZE));
|
|
|
|
sctx->sockbuf = realloc(sctx->sockbuf, sctx->sockbuf_size);
|
|
|
|
}
|
|
|
|
strcpy(sctx->sockbuf + old, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
char *stratum_recv_line(struct stratum_ctx *sctx)
|
|
|
|
{
|
|
|
|
ssize_t len, buflen;
|
|
|
|
char *tok, *sret = NULL;
|
|
|
|
|
|
|
|
if (!strstr(sctx->sockbuf, "\n")) {
|
|
|
|
bool ret = true;
|
|
|
|
time_t rstart;
|
|
|
|
|
|
|
|
time(&rstart);
|
|
|
|
if (!socket_full(sctx->sock, 60)) {
|
|
|
|
applog(LOG_ERR, "stratum_recv_line timed out");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
do {
|
|
|
|
char s[RBUFSIZE];
|
|
|
|
ssize_t n;
|
|
|
|
|
|
|
|
memset(s, 0, RBUFSIZE);
|
2015-04-06 19:26:24 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x071202
|
|
|
|
CURLcode rc = curl_easy_recv(sctx->curl, s, RECVSIZE, (size_t *)&n);
|
|
|
|
if (rc == CURLE_OK && !n) {
|
|
|
|
ret = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (rc != CURLE_OK) {
|
|
|
|
if (rc != CURLE_AGAIN || !socket_full(sctx->sock, 1)) {
|
|
|
|
#else
|
2013-06-08 22:15:00 +02:00
|
|
|
n = recv(sctx->sock, s, RECVSIZE, 0);
|
|
|
|
if (!n) {
|
|
|
|
ret = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (n < 0) {
|
|
|
|
if (!socket_blocks() || !socket_full(sctx->sock, 1)) {
|
2015-04-06 19:26:24 +02:00
|
|
|
#endif
|
2013-06-08 22:15:00 +02:00
|
|
|
ret = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
stratum_buffer_append(sctx, s);
|
|
|
|
} while (time(NULL) - rstart < 60 && !strstr(sctx->sockbuf, "\n"));
|
|
|
|
|
|
|
|
if (!ret) {
|
|
|
|
applog(LOG_ERR, "stratum_recv_line failed");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
buflen = strlen(sctx->sockbuf);
|
|
|
|
tok = strtok(sctx->sockbuf, "\n");
|
|
|
|
if (!tok) {
|
|
|
|
applog(LOG_ERR, "stratum_recv_line failed to parse a newline-terminated string");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
sret = strdup(tok);
|
|
|
|
len = strlen(sret);
|
|
|
|
|
|
|
|
if (buflen > len + 1)
|
|
|
|
memmove(sctx->sockbuf, sctx->sockbuf + len + 1, buflen - len + 1);
|
|
|
|
else
|
|
|
|
sctx->sockbuf[0] = '\0';
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (sret && opt_protocol)
|
|
|
|
applog(LOG_DEBUG, "< %s", sret);
|
|
|
|
return sret;
|
|
|
|
}
|
|
|
|
|
2020-06-24 19:22:36 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x071101 && LIBCURL_VERSION_NUM < 0x072d00
|
2013-06-08 22:15:00 +02:00
|
|
|
static curl_socket_t opensocket_grab_cb(void *clientp, curlsocktype purpose,
|
|
|
|
struct curl_sockaddr *addr)
|
|
|
|
{
|
|
|
|
curl_socket_t *sock = clientp;
|
|
|
|
*sock = socket(addr->family, addr->socktype, addr->protocol);
|
|
|
|
return *sock;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
bool stratum_connect(struct stratum_ctx *sctx, const char *url)
|
|
|
|
{
|
|
|
|
CURL *curl;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&sctx->sock_lock);
|
|
|
|
if (sctx->curl)
|
|
|
|
curl_easy_cleanup(sctx->curl);
|
|
|
|
sctx->curl = curl_easy_init();
|
|
|
|
if (!sctx->curl) {
|
|
|
|
applog(LOG_ERR, "CURL initialization failed");
|
|
|
|
pthread_mutex_unlock(&sctx->sock_lock);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
curl = sctx->curl;
|
|
|
|
if (!sctx->sockbuf) {
|
|
|
|
sctx->sockbuf = calloc(RBUFSIZE, 1);
|
|
|
|
sctx->sockbuf_size = RBUFSIZE;
|
|
|
|
}
|
|
|
|
sctx->sockbuf[0] = '\0';
|
|
|
|
pthread_mutex_unlock(&sctx->sock_lock);
|
|
|
|
|
|
|
|
if (url != sctx->url) {
|
|
|
|
free(sctx->url);
|
|
|
|
sctx->url = strdup(url);
|
|
|
|
}
|
|
|
|
free(sctx->curl_url);
|
|
|
|
sctx->curl_url = malloc(strlen(url));
|
2015-04-06 19:26:24 +02:00
|
|
|
sprintf(sctx->curl_url, "http%s", url + 11);
|
2013-06-08 22:15:00 +02:00
|
|
|
|
|
|
|
if (opt_protocol)
|
|
|
|
curl_easy_setopt(curl, CURLOPT_VERBOSE, 1);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, sctx->curl_url);
|
2015-04-16 12:59:40 +02:00
|
|
|
if (opt_cert)
|
|
|
|
curl_easy_setopt(curl, CURLOPT_CAINFO, opt_cert);
|
2013-06-08 22:15:00 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_FRESH_CONNECT, 1);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_CONNECTTIMEOUT, 30);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, sctx->curl_err_str);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_NOSIGNAL, 1);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_TCP_NODELAY, 1);
|
2014-04-15 19:59:17 +02:00
|
|
|
if (opt_proxy) {
|
2013-06-08 22:15:00 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_PROXY, opt_proxy);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_PROXYTYPE, opt_proxy_type);
|
|
|
|
}
|
2014-04-16 10:47:22 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_HTTPPROXYTUNNEL, 1);
|
2013-06-08 22:15:00 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x070f06
|
|
|
|
curl_easy_setopt(curl, CURLOPT_SOCKOPTFUNCTION, sockopt_keepalive_cb);
|
|
|
|
#endif
|
2020-06-24 19:22:36 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x071101 && LIBCURL_VERSION_NUM < 0x072d00
|
2013-06-08 22:15:00 +02:00
|
|
|
curl_easy_setopt(curl, CURLOPT_OPENSOCKETFUNCTION, opensocket_grab_cb);
|
|
|
|
curl_easy_setopt(curl, CURLOPT_OPENSOCKETDATA, &sctx->sock);
|
|
|
|
#endif
|
|
|
|
curl_easy_setopt(curl, CURLOPT_CONNECT_ONLY, 1);
|
|
|
|
|
|
|
|
rc = curl_easy_perform(curl);
|
|
|
|
if (rc) {
|
|
|
|
applog(LOG_ERR, "Stratum connection failed: %s", sctx->curl_err_str);
|
|
|
|
curl_easy_cleanup(curl);
|
|
|
|
sctx->curl = NULL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-06-24 19:22:36 +02:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x072d00
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_ACTIVESOCKET, &sctx->sock);
|
|
|
|
#elif LIBCURL_VERSION_NUM < 0x071101
|
2013-06-08 22:15:00 +02:00
|
|
|
/* CURLINFO_LASTSOCKET is broken on Win64; only use it as a last resort */
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_LASTSOCKET, (long *)&sctx->sock);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void stratum_disconnect(struct stratum_ctx *sctx)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&sctx->sock_lock);
|
|
|
|
if (sctx->curl) {
|
|
|
|
curl_easy_cleanup(sctx->curl);
|
|
|
|
sctx->curl = NULL;
|
|
|
|
sctx->sockbuf[0] = '\0';
|
|
|
|
}
|
|
|
|
pthread_mutex_unlock(&sctx->sock_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *get_stratum_session_id(json_t *val)
|
|
|
|
{
|
|
|
|
json_t *arr_val;
|
|
|
|
int i, n;
|
|
|
|
|
|
|
|
arr_val = json_array_get(val, 0);
|
|
|
|
if (!arr_val || !json_is_array(arr_val))
|
|
|
|
return NULL;
|
|
|
|
n = json_array_size(arr_val);
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
const char *notify;
|
|
|
|
json_t *arr = json_array_get(arr_val, i);
|
|
|
|
|
|
|
|
if (!arr || !json_is_array(arr))
|
|
|
|
break;
|
|
|
|
notify = json_string_value(json_array_get(arr, 0));
|
|
|
|
if (!notify)
|
|
|
|
continue;
|
|
|
|
if (!strcasecmp(notify, "mining.notify"))
|
|
|
|
return json_string_value(json_array_get(arr, 1));
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool stratum_subscribe(struct stratum_ctx *sctx)
|
|
|
|
{
|
|
|
|
char *s, *sret = NULL;
|
|
|
|
const char *sid, *xnonce1;
|
|
|
|
int xn2_size;
|
|
|
|
json_t *val = NULL, *res_val, *err_val;
|
|
|
|
json_error_t err;
|
|
|
|
bool ret = false, retry = false;
|
|
|
|
|
|
|
|
start:
|
|
|
|
s = malloc(128 + (sctx->session_id ? strlen(sctx->session_id) : 0));
|
|
|
|
if (retry)
|
|
|
|
sprintf(s, "{\"id\": 1, \"method\": \"mining.subscribe\", \"params\": []}");
|
|
|
|
else if (sctx->session_id)
|
|
|
|
sprintf(s, "{\"id\": 1, \"method\": \"mining.subscribe\", \"params\": [\"" USER_AGENT "\", \"%s\"]}", sctx->session_id);
|
|
|
|
else
|
|
|
|
sprintf(s, "{\"id\": 1, \"method\": \"mining.subscribe\", \"params\": [\"" USER_AGENT "\"]}");
|
|
|
|
|
2014-03-31 14:29:19 +02:00
|
|
|
if (!stratum_send_line(sctx, s)) {
|
|
|
|
applog(LOG_ERR, "stratum_subscribe send failed");
|
2013-06-08 22:15:00 +02:00
|
|
|
goto out;
|
2014-03-31 14:29:19 +02:00
|
|
|
}
|
2013-06-08 22:15:00 +02:00
|
|
|
|
|
|
|
if (!socket_full(sctx->sock, 30)) {
|
|
|
|
applog(LOG_ERR, "stratum_subscribe timed out");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
sret = stratum_recv_line(sctx);
|
|
|
|
if (!sret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
val = JSON_LOADS(sret, &err);
|
|
|
|
free(sret);
|
|
|
|
if (!val) {
|
|
|
|
applog(LOG_ERR, "JSON decode failed(%d): %s", err.line, err.text);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
res_val = json_object_get(val, "result");
|
|
|
|
err_val = json_object_get(val, "error");
|
|
|
|
|
|
|
|
if (!res_val || json_is_null(res_val) ||
|
|
|
|
(err_val && !json_is_null(err_val))) {
|
|
|
|
if (opt_debug || retry) {
|
|
|
|
free(s);
|
|
|
|
if (err_val)
|
|
|
|
s = json_dumps(err_val, JSON_INDENT(3));
|
|
|
|
else
|
|
|
|
s = strdup("(unknown reason)");
|
|
|
|
applog(LOG_ERR, "JSON-RPC call failed: %s", s);
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
sid = get_stratum_session_id(res_val);
|
|
|
|
if (opt_debug && !sid)
|
|
|
|
applog(LOG_DEBUG, "Failed to get Stratum session id");
|
|
|
|
xnonce1 = json_string_value(json_array_get(res_val, 1));
|
|
|
|
if (!xnonce1) {
|
|
|
|
applog(LOG_ERR, "Failed to get extranonce1");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
xn2_size = json_integer_value(json_array_get(res_val, 2));
|
|
|
|
if (!xn2_size) {
|
|
|
|
applog(LOG_ERR, "Failed to get extranonce2_size");
|
|
|
|
goto out;
|
|
|
|
}
|
2014-08-08 14:49:07 +02:00
|
|
|
if (xn2_size < 0 || xn2_size > 100) {
|
|
|
|
applog(LOG_ERR, "Invalid value of extranonce2_size");
|
|
|
|
goto out;
|
|
|
|
}
|
2013-06-08 22:15:00 +02:00
|
|
|
|
|
|
|
pthread_mutex_lock(&sctx->work_lock);
|
|
|
|
free(sctx->session_id);
|
|
|
|
free(sctx->xnonce1);
|
|
|
|
sctx->session_id = sid ? strdup(sid) : NULL;
|
|
|
|
sctx->xnonce1_size = strlen(xnonce1) / 2;
|
|
|
|
sctx->xnonce1 = malloc(sctx->xnonce1_size);
|
|
|
|
hex2bin(sctx->xnonce1, xnonce1, sctx->xnonce1_size);
|
|
|
|
sctx->xnonce2_size = xn2_size;
|
|
|
|
sctx->next_diff = 1.0;
|
|
|
|
pthread_mutex_unlock(&sctx->work_lock);
|
|
|
|
|
|
|
|
if (opt_debug && sid)
|
|
|
|
applog(LOG_DEBUG, "Stratum session id: %s", sctx->session_id);
|
|
|
|
|
|
|
|
ret = true;
|
|
|
|
|
|
|
|
out:
|
|
|
|
free(s);
|
|
|
|
if (val)
|
|
|
|
json_decref(val);
|
|
|
|
|
|
|
|
if (!ret) {
|
|
|
|
if (sret && !retry) {
|
|
|
|
retry = true;
|
|
|
|
goto start;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool stratum_authorize(struct stratum_ctx *sctx, const char *user, const char *pass)
|
|
|
|
{
|
|
|
|
json_t *val = NULL, *res_val, *err_val;
|
|
|
|
char *s, *sret;
|
|
|
|
json_error_t err;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
s = malloc(80 + strlen(user) + strlen(pass));
|
|
|
|
sprintf(s, "{\"id\": 2, \"method\": \"mining.authorize\", \"params\": [\"%s\", \"%s\"]}",
|
|
|
|
user, pass);
|
|
|
|
|
|
|
|
if (!stratum_send_line(sctx, s))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
sret = stratum_recv_line(sctx);
|
|
|
|
if (!sret)
|
|
|
|
goto out;
|
|
|
|
if (!stratum_handle_method(sctx, sret))
|
|
|
|
break;
|
|
|
|
free(sret);
|
|
|
|
}
|
|
|
|
|
|
|
|
val = JSON_LOADS(sret, &err);
|
|
|
|
free(sret);
|
|
|
|
if (!val) {
|
|
|
|
applog(LOG_ERR, "JSON decode failed(%d): %s", err.line, err.text);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
res_val = json_object_get(val, "result");
|
|
|
|
err_val = json_object_get(val, "error");
|
|
|
|
|
2013-06-17 11:13:28 +02:00
|
|
|
if (!res_val || json_is_false(res_val) ||
|
2013-06-08 22:15:00 +02:00
|
|
|
(err_val && !json_is_null(err_val))) {
|
|
|
|
applog(LOG_ERR, "Stratum authentication failed");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = true;
|
|
|
|
|
|
|
|
out:
|
|
|
|
free(s);
|
|
|
|
if (val)
|
|
|
|
json_decref(val);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool stratum_notify(struct stratum_ctx *sctx, json_t *params)
|
|
|
|
{
|
|
|
|
const char *job_id, *prevhash, *coinb1, *coinb2, *version, *nbits, *ntime;
|
|
|
|
size_t coinb1_size, coinb2_size;
|
|
|
|
bool clean, ret = false;
|
|
|
|
int merkle_count, i;
|
|
|
|
json_t *merkle_arr;
|
|
|
|
unsigned char **merkle;
|
|
|
|
|
|
|
|
job_id = json_string_value(json_array_get(params, 0));
|
|
|
|
prevhash = json_string_value(json_array_get(params, 1));
|
|
|
|
coinb1 = json_string_value(json_array_get(params, 2));
|
|
|
|
coinb2 = json_string_value(json_array_get(params, 3));
|
|
|
|
merkle_arr = json_array_get(params, 4);
|
|
|
|
if (!merkle_arr || !json_is_array(merkle_arr))
|
|
|
|
goto out;
|
|
|
|
merkle_count = json_array_size(merkle_arr);
|
|
|
|
version = json_string_value(json_array_get(params, 5));
|
|
|
|
nbits = json_string_value(json_array_get(params, 6));
|
|
|
|
ntime = json_string_value(json_array_get(params, 7));
|
|
|
|
clean = json_is_true(json_array_get(params, 8));
|
|
|
|
|
|
|
|
if (!job_id || !prevhash || !coinb1 || !coinb2 || !version || !nbits || !ntime ||
|
|
|
|
strlen(prevhash) != 64 || strlen(version) != 8 ||
|
|
|
|
strlen(nbits) != 8 || strlen(ntime) != 8) {
|
|
|
|
applog(LOG_ERR, "Stratum notify: invalid parameters");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
merkle = malloc(merkle_count * sizeof(char *));
|
|
|
|
for (i = 0; i < merkle_count; i++) {
|
|
|
|
const char *s = json_string_value(json_array_get(merkle_arr, i));
|
|
|
|
if (!s || strlen(s) != 64) {
|
|
|
|
while (i--)
|
|
|
|
free(merkle[i]);
|
|
|
|
free(merkle);
|
|
|
|
applog(LOG_ERR, "Stratum notify: invalid Merkle branch");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
merkle[i] = malloc(32);
|
|
|
|
hex2bin(merkle[i], s, 32);
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_lock(&sctx->work_lock);
|
|
|
|
|
|
|
|
coinb1_size = strlen(coinb1) / 2;
|
|
|
|
coinb2_size = strlen(coinb2) / 2;
|
|
|
|
sctx->job.coinbase_size = coinb1_size + sctx->xnonce1_size +
|
|
|
|
sctx->xnonce2_size + coinb2_size;
|
|
|
|
sctx->job.coinbase = realloc(sctx->job.coinbase, sctx->job.coinbase_size);
|
|
|
|
sctx->job.xnonce2 = sctx->job.coinbase + coinb1_size + sctx->xnonce1_size;
|
|
|
|
hex2bin(sctx->job.coinbase, coinb1, coinb1_size);
|
|
|
|
memcpy(sctx->job.coinbase + coinb1_size, sctx->xnonce1, sctx->xnonce1_size);
|
|
|
|
if (!sctx->job.job_id || strcmp(sctx->job.job_id, job_id))
|
|
|
|
memset(sctx->job.xnonce2, 0, sctx->xnonce2_size);
|
|
|
|
hex2bin(sctx->job.xnonce2 + sctx->xnonce2_size, coinb2, coinb2_size);
|
|
|
|
|
|
|
|
free(sctx->job.job_id);
|
|
|
|
sctx->job.job_id = strdup(job_id);
|
|
|
|
hex2bin(sctx->job.prevhash, prevhash, 32);
|
|
|
|
|
|
|
|
for (i = 0; i < sctx->job.merkle_count; i++)
|
|
|
|
free(sctx->job.merkle[i]);
|
|
|
|
free(sctx->job.merkle);
|
|
|
|
sctx->job.merkle = merkle;
|
|
|
|
sctx->job.merkle_count = merkle_count;
|
|
|
|
|
|
|
|
hex2bin(sctx->job.version, version, 4);
|
|
|
|
hex2bin(sctx->job.nbits, nbits, 4);
|
|
|
|
hex2bin(sctx->job.ntime, ntime, 4);
|
|
|
|
sctx->job.clean = clean;
|
|
|
|
|
|
|
|
sctx->job.diff = sctx->next_diff;
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&sctx->work_lock);
|
|
|
|
|
|
|
|
ret = true;
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool stratum_set_difficulty(struct stratum_ctx *sctx, json_t *params)
|
|
|
|
{
|
|
|
|
double diff;
|
|
|
|
|
|
|
|
diff = json_number_value(json_array_get(params, 0));
|
|
|
|
if (diff == 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&sctx->work_lock);
|
|
|
|
sctx->next_diff = diff;
|
|
|
|
pthread_mutex_unlock(&sctx->work_lock);
|
|
|
|
|
|
|
|
if (opt_debug)
|
|
|
|
applog(LOG_DEBUG, "Stratum difficulty set to %g", diff);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool stratum_reconnect(struct stratum_ctx *sctx, json_t *params)
|
|
|
|
{
|
|
|
|
json_t *port_val;
|
2014-04-15 23:11:00 +02:00
|
|
|
char *url;
|
2013-06-08 22:15:00 +02:00
|
|
|
const char *host;
|
|
|
|
int port;
|
|
|
|
|
|
|
|
host = json_string_value(json_array_get(params, 0));
|
|
|
|
port_val = json_array_get(params, 1);
|
|
|
|
if (json_is_string(port_val))
|
|
|
|
port = atoi(json_string_value(port_val));
|
|
|
|
else
|
|
|
|
port = json_integer_value(port_val);
|
|
|
|
if (!host || !port)
|
|
|
|
return false;
|
|
|
|
|
2014-04-15 23:11:00 +02:00
|
|
|
url = malloc(32 + strlen(host));
|
2015-04-06 19:26:24 +02:00
|
|
|
strncpy(url, sctx->url, 15);
|
|
|
|
sprintf(strstr(url, "://") + 3, "%s:%d", host, port);
|
2013-06-08 22:15:00 +02:00
|
|
|
|
2014-04-15 23:11:00 +02:00
|
|
|
if (!opt_redirect) {
|
|
|
|
applog(LOG_INFO, "Ignoring request to reconnect to %s", url);
|
|
|
|
free(url);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
applog(LOG_NOTICE, "Server requested reconnection to %s", url);
|
|
|
|
|
|
|
|
free(sctx->url);
|
|
|
|
sctx->url = url;
|
2013-06-08 22:15:00 +02:00
|
|
|
stratum_disconnect(sctx);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool stratum_get_version(struct stratum_ctx *sctx, json_t *id)
|
|
|
|
{
|
|
|
|
char *s;
|
|
|
|
json_t *val;
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
if (!id || json_is_null(id))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
val = json_object();
|
|
|
|
json_object_set(val, "id", id);
|
|
|
|
json_object_set_new(val, "error", json_null());
|
|
|
|
json_object_set_new(val, "result", json_string(USER_AGENT));
|
|
|
|
s = json_dumps(val, 0);
|
|
|
|
ret = stratum_send_line(sctx, s);
|
|
|
|
json_decref(val);
|
|
|
|
free(s);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool stratum_show_message(struct stratum_ctx *sctx, json_t *id, json_t *params)
|
|
|
|
{
|
|
|
|
char *s;
|
|
|
|
json_t *val;
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
val = json_array_get(params, 0);
|
|
|
|
if (val)
|
|
|
|
applog(LOG_NOTICE, "MESSAGE FROM SERVER: %s", json_string_value(val));
|
|
|
|
|
|
|
|
if (!id || json_is_null(id))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
val = json_object();
|
|
|
|
json_object_set(val, "id", id);
|
|
|
|
json_object_set_new(val, "error", json_null());
|
|
|
|
json_object_set_new(val, "result", json_true());
|
|
|
|
s = json_dumps(val, 0);
|
|
|
|
ret = stratum_send_line(sctx, s);
|
|
|
|
json_decref(val);
|
|
|
|
free(s);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool stratum_handle_method(struct stratum_ctx *sctx, const char *s)
|
|
|
|
{
|
|
|
|
json_t *val, *id, *params;
|
|
|
|
json_error_t err;
|
|
|
|
const char *method;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
val = JSON_LOADS(s, &err);
|
|
|
|
if (!val) {
|
|
|
|
applog(LOG_ERR, "JSON decode failed(%d): %s", err.line, err.text);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
method = json_string_value(json_object_get(val, "method"));
|
|
|
|
if (!method)
|
|
|
|
goto out;
|
|
|
|
id = json_object_get(val, "id");
|
|
|
|
params = json_object_get(val, "params");
|
|
|
|
|
|
|
|
if (!strcasecmp(method, "mining.notify")) {
|
|
|
|
ret = stratum_notify(sctx, params);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!strcasecmp(method, "mining.set_difficulty")) {
|
|
|
|
ret = stratum_set_difficulty(sctx, params);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!strcasecmp(method, "client.reconnect")) {
|
|
|
|
ret = stratum_reconnect(sctx, params);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!strcasecmp(method, "client.get_version")) {
|
|
|
|
ret = stratum_get_version(sctx, id);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!strcasecmp(method, "client.show_message")) {
|
|
|
|
ret = stratum_show_message(sctx, id, params);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (val)
|
|
|
|
json_decref(val);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-03-15 04:17:34 +01:00
|
|
|
struct thread_q *tq_new(void)
|
|
|
|
{
|
|
|
|
struct thread_q *tq;
|
|
|
|
|
|
|
|
tq = calloc(1, sizeof(*tq));
|
|
|
|
if (!tq)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&tq->q);
|
|
|
|
pthread_mutex_init(&tq->mutex, NULL);
|
|
|
|
pthread_cond_init(&tq->cond, NULL);
|
|
|
|
|
|
|
|
return tq;
|
|
|
|
}
|
|
|
|
|
|
|
|
void tq_free(struct thread_q *tq)
|
|
|
|
{
|
|
|
|
struct tq_ent *ent, *iter;
|
|
|
|
|
|
|
|
if (!tq)
|
|
|
|
return;
|
|
|
|
|
2014-05-16 11:06:02 +02:00
|
|
|
list_for_each_entry_safe(ent, iter, &tq->q, q_node, struct tq_ent) {
|
2011-03-15 04:17:34 +01:00
|
|
|
list_del(&ent->q_node);
|
|
|
|
free(ent);
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_cond_destroy(&tq->cond);
|
|
|
|
pthread_mutex_destroy(&tq->mutex);
|
|
|
|
|
|
|
|
memset(tq, 0, sizeof(*tq)); /* poison */
|
|
|
|
free(tq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void tq_freezethaw(struct thread_q *tq, bool frozen)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&tq->mutex);
|
|
|
|
|
|
|
|
tq->frozen = frozen;
|
|
|
|
|
|
|
|
pthread_cond_signal(&tq->cond);
|
|
|
|
pthread_mutex_unlock(&tq->mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
void tq_freeze(struct thread_q *tq)
|
|
|
|
{
|
|
|
|
tq_freezethaw(tq, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
void tq_thaw(struct thread_q *tq)
|
|
|
|
{
|
|
|
|
tq_freezethaw(tq, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool tq_push(struct thread_q *tq, void *data)
|
|
|
|
{
|
|
|
|
struct tq_ent *ent;
|
|
|
|
bool rc = true;
|
|
|
|
|
|
|
|
ent = calloc(1, sizeof(*ent));
|
|
|
|
if (!ent)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
ent->data = data;
|
|
|
|
INIT_LIST_HEAD(&ent->q_node);
|
|
|
|
|
|
|
|
pthread_mutex_lock(&tq->mutex);
|
|
|
|
|
|
|
|
if (!tq->frozen) {
|
|
|
|
list_add_tail(&ent->q_node, &tq->q);
|
|
|
|
} else {
|
|
|
|
free(ent);
|
|
|
|
rc = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_cond_signal(&tq->cond);
|
|
|
|
pthread_mutex_unlock(&tq->mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *tq_pop(struct thread_q *tq, const struct timespec *abstime)
|
|
|
|
{
|
|
|
|
struct tq_ent *ent;
|
|
|
|
void *rval = NULL;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&tq->mutex);
|
|
|
|
|
|
|
|
if (!list_empty(&tq->q))
|
|
|
|
goto pop;
|
|
|
|
|
|
|
|
if (abstime)
|
|
|
|
rc = pthread_cond_timedwait(&tq->cond, &tq->mutex, abstime);
|
|
|
|
else
|
|
|
|
rc = pthread_cond_wait(&tq->cond, &tq->mutex);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
if (list_empty(&tq->q))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
pop:
|
|
|
|
ent = list_entry(tq->q.next, struct tq_ent, q_node);
|
|
|
|
rval = ent->data;
|
|
|
|
|
|
|
|
list_del(&ent->q_node);
|
|
|
|
free(ent);
|
|
|
|
|
|
|
|
out:
|
|
|
|
pthread_mutex_unlock(&tq->mutex);
|
|
|
|
return rval;
|
|
|
|
}
|