|
|
|
#!/usr/bin/env python3
|
|
|
|
# Copyright (c) 2010 ArtForz -- public domain half-a-node
|
|
|
|
# Copyright (c) 2012 Jeff Garzik
|
|
|
|
# Copyright (c) 2010-2017 The Bitcoin Core developers
|
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
"""Bitcoin test framework primitive and message strcutures
|
|
|
|
|
|
|
|
CBlock, CTransaction, CBlockHeader, CTxIn, CTxOut, etc....:
|
|
|
|
data structures that should map to corresponding structures in
|
|
|
|
bitcoin/primitives
|
|
|
|
|
|
|
|
msg_block, msg_tx, msg_headers, etc.:
|
|
|
|
data structures that represent network messages
|
|
|
|
|
|
|
|
ser_*, deser_*: functions that handle serialization/deserialization.
|
|
|
|
"""
|
|
|
|
|
|
|
|
from codecs import encode
|
|
|
|
import copy
|
|
|
|
import hashlib
|
|
|
|
from io import BytesIO
|
|
|
|
import random
|
|
|
|
import socket
|
|
|
|
import struct
|
|
|
|
import time
|
|
|
|
|
|
|
|
from .siphash import siphash256
|
|
|
|
from .util import hex_str_to_bytes, bytes_to_hex_str
|
|
|
|
|
|
|
|
MIN_VERSION_SUPPORTED = 60001
|
|
|
|
MY_VERSION = 70925
|
|
|
|
MY_SUBVERSION = "/python-mininode-tester:0.0.3/"
|
|
|
|
MY_RELAY = 1 # from version 70001 onwards, fRelay should be appended to version messages (BIP37)
|
|
|
|
|
|
|
|
MAX_INV_SZ = 50000
|
|
|
|
MAX_BLOCK_BASE_SIZE = 2000000
|
|
|
|
CURRENT_BLK_VERSION = 11
|
|
|
|
|
|
|
|
COIN = 100000000 # 1 PIV in satoshis
|
|
|
|
|
|
|
|
NODE_NETWORK = (1 << 0)
|
|
|
|
# NODE_GETUTXO = (1 << 1)
|
|
|
|
NODE_BLOOM = (1 << 2)
|
|
|
|
|
|
|
|
MSG_TX = 1
|
|
|
|
MSG_BLOCK = 2
|
|
|
|
MSG_TYPE_MASK = 0xffffffff >> 2
|
|
|
|
|
|
|
|
# Serialization/deserialization tools
|
|
|
|
def sha256(s):
|
|
|
|
return hashlib.new('sha256', s).digest()
|
|
|
|
|
|
|
|
def ripemd160(s):
|
|
|
|
return hashlib.new('ripemd160', s).digest()
|
|
|
|
|
|
|
|
def hash256(s):
|
|
|
|
return sha256(sha256(s))
|
|
|
|
|
|
|
|
def ser_compact_size(l):
|
|
|
|
r = b""
|
|
|
|
if l < 253:
|
|
|
|
r = struct.pack("B", l)
|
|
|
|
elif l < 0x10000:
|
|
|
|
r = struct.pack("<BH", 253, l)
|
|
|
|
elif l < 0x100000000:
|
|
|
|
r = struct.pack("<BI", 254, l)
|
|
|
|
else:
|
|
|
|
r = struct.pack("<BQ", 255, l)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def deser_compact_size(f):
|
|
|
|
nit = struct.unpack("<B", f.read(1))[0]
|
|
|
|
if nit == 253:
|
|
|
|
nit = struct.unpack("<H", f.read(2))[0]
|
|
|
|
elif nit == 254:
|
|
|
|
nit = struct.unpack("<I", f.read(4))[0]
|
|
|
|
elif nit == 255:
|
|
|
|
nit = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
return nit
|
|
|
|
|
|
|
|
def deser_string(f):
|
|
|
|
nit = deser_compact_size(f)
|
|
|
|
return f.read(nit)
|
|
|
|
|
|
|
|
def ser_string(s):
|
|
|
|
return ser_compact_size(len(s)) + s
|
|
|
|
|
|
|
|
def deser_uint256(f):
|
|
|
|
r = 0
|
|
|
|
for i in range(8):
|
|
|
|
t = struct.unpack("<I", f.read(4))[0]
|
|
|
|
r += t << (i * 32)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def ser_uint256(u):
|
|
|
|
rs = b""
|
|
|
|
for i in range(8):
|
|
|
|
rs += struct.pack("<I", u & 0xFFFFFFFF)
|
|
|
|
u >>= 32
|
|
|
|
return rs
|
|
|
|
|
|
|
|
|
|
|
|
def ser_uint64(u):
|
|
|
|
rs = b""
|
|
|
|
for i in range(2):
|
|
|
|
rs += struct.pack("<I", u & 0xFFFFFFFF)
|
|
|
|
u >>= 32
|
|
|
|
return rs
|
|
|
|
|
|
|
|
|
|
|
|
def uint256_from_str(s):
|
|
|
|
r = 0
|
|
|
|
t = struct.unpack("<IIIIIIII", s[:32])
|
|
|
|
for i in range(8):
|
|
|
|
r += t[i] << (i * 32)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def uint256_from_compact(c):
|
|
|
|
nbytes = (c >> 24) & 0xFF
|
|
|
|
v = (c & 0xFFFFFF) << (8 * (nbytes - 3))
|
|
|
|
return v
|
|
|
|
|
|
|
|
|
|
|
|
# deser_function_name: Allow for an alternate deserialization function on the
|
|
|
|
# entries in the vector.
|
|
|
|
def deser_vector(f, c, deser_function_name=None):
|
|
|
|
nit = deser_compact_size(f)
|
|
|
|
r = []
|
|
|
|
for _ in range(nit):
|
|
|
|
t = c()
|
|
|
|
if deser_function_name:
|
|
|
|
getattr(t, deser_function_name)(f)
|
|
|
|
else:
|
|
|
|
t.deserialize(f)
|
|
|
|
r.append(t)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
# ser_function_name: Allow for an alternate serialization function on the
|
|
|
|
# entries in the vector (we use this for serializing the vector of transactions
|
|
|
|
# for a witness block).
|
|
|
|
def ser_vector(l, ser_function_name=None):
|
|
|
|
r = ser_compact_size(len(l))
|
|
|
|
for i in l:
|
|
|
|
if ser_function_name:
|
|
|
|
r += getattr(i, ser_function_name)()
|
|
|
|
else:
|
|
|
|
r += i.serialize()
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def deser_uint256_vector(f):
|
|
|
|
nit = deser_compact_size(f)
|
|
|
|
r = []
|
|
|
|
for i in range(nit):
|
|
|
|
t = deser_uint256(f)
|
|
|
|
r.append(t)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def ser_uint256_vector(l):
|
|
|
|
r = ser_compact_size(len(l))
|
|
|
|
for i in l:
|
|
|
|
r += ser_uint256(i)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def deser_string_vector(f):
|
|
|
|
nit = deser_compact_size(f)
|
|
|
|
r = []
|
|
|
|
for i in range(nit):
|
|
|
|
t = deser_string(f)
|
|
|
|
r.append(t)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
def ser_string_vector(l):
|
|
|
|
r = ser_compact_size(len(l))
|
|
|
|
for sv in l:
|
|
|
|
r += ser_string(sv)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
# Deserialize from bytes
|
|
|
|
def FromBytes(obj, tx_bytes):
|
|
|
|
obj.deserialize(BytesIO(tx_bytes))
|
|
|
|
return obj
|
|
|
|
|
|
|
|
|
|
|
|
# Deserialize from a hex string representation (eg from RPC)
|
|
|
|
def FromHex(obj, hex_string):
|
|
|
|
obj.deserialize(BytesIO(hex_str_to_bytes(hex_string)))
|
|
|
|
return obj
|
|
|
|
|
|
|
|
|
|
|
|
# Convert a binary-serializable object to hex (eg for submission via RPC)
|
|
|
|
def ToHex(obj):
|
|
|
|
return bytes_to_hex_str(obj.serialize())
|
|
|
|
|
|
|
|
# Objects that map to pivxd objects, which can be serialized/deserialized
|
|
|
|
|
|
|
|
class CAddress:
|
|
|
|
__slots__ = ("net", "ip", "nServices", "port", "time")
|
|
|
|
|
|
|
|
# see https://github.com/bitcoin/bips/blob/master/bip-0155.mediawiki
|
|
|
|
NET_IPV4 = 1
|
|
|
|
|
|
|
|
ADDRV2_NET_NAME = {
|
|
|
|
NET_IPV4: "IPv4"
|
|
|
|
}
|
|
|
|
|
|
|
|
ADDRV2_ADDRESS_LENGTH = {
|
|
|
|
NET_IPV4: 4
|
|
|
|
}
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.time = 0
|
|
|
|
self.nServices = 1
|
|
|
|
self.net = self.NET_IPV4
|
|
|
|
self.ip = "0.0.0.0"
|
|
|
|
self.port = 0
|
|
|
|
|
|
|
|
def deserialize(self, f, *, with_time=True):
|
|
|
|
"""Deserialize from addrv1 format (pre-BIP155)"""
|
|
|
|
if with_time:
|
|
|
|
# VERSION messages serialize CAddress objects without time
|
|
|
|
self.time = struct.unpack("<I", f.read(4))[0]
|
|
|
|
self.nServices = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
# We only support IPv4 which means skip 12 bytes and read the next 4 as IPv4 address.
|
|
|
|
f.read(12)
|
|
|
|
self.net = self.NET_IPV4
|
|
|
|
self.ip = socket.inet_ntoa(f.read(4))
|
|
|
|
self.port = struct.unpack(">H", f.read(2))[0]
|
|
|
|
|
|
|
|
def serialize(self, *, with_time=True):
|
|
|
|
"""Serialize in addrv1 format (pre-BIP155)"""
|
|
|
|
assert self.net == self.NET_IPV4
|
|
|
|
r = b""
|
|
|
|
if with_time:
|
|
|
|
# VERSION messages serialize CAddress objects without time
|
|
|
|
r += struct.pack("<I", self.time)
|
|
|
|
r += struct.pack("<Q", self.nServices)
|
|
|
|
r += b"\x00" * 10 + b"\xff" * 2
|
|
|
|
r += socket.inet_aton(self.ip)
|
|
|
|
r += struct.pack(">H", self.port)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def deserialize_v2(self, f):
|
|
|
|
"""Deserialize from addrv2 format (BIP155)"""
|
|
|
|
self.time = struct.unpack("<I", f.read(4))[0]
|
|
|
|
|
|
|
|
self.nServices = deser_compact_size(f)
|
|
|
|
|
|
|
|
self.net = struct.unpack("B", f.read(1))[0]
|
|
|
|
assert self.net == self.NET_IPV4
|
|
|
|
|
|
|
|
address_length = deser_compact_size(f)
|
|
|
|
assert address_length == self.ADDRV2_ADDRESS_LENGTH[self.net]
|
|
|
|
|
|
|
|
self.ip = socket.inet_ntoa(f.read(4))
|
|
|
|
|
|
|
|
self.port = struct.unpack(">H", f.read(2))[0]
|
|
|
|
|
|
|
|
def serialize_v2(self):
|
|
|
|
"""Serialize in addrv2 format (BIP155)"""
|
|
|
|
assert self.net == self.NET_IPV4
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<I", self.time)
|
|
|
|
r += ser_compact_size(self.nServices)
|
|
|
|
r += struct.pack("B", self.net)
|
|
|
|
r += ser_compact_size(self.ADDRV2_ADDRESS_LENGTH[self.net])
|
|
|
|
r += socket.inet_aton(self.ip)
|
|
|
|
r += struct.pack(">H", self.port)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return ("CAddress(nServices=%i net=%s addr=%s port=%i)"
|
|
|
|
% (self.nServices, self.ADDRV2_NET_NAME[self.net], self.ip, self.port))
|
|
|
|
|
|
|
|
class CInv:
|
|
|
|
typemap = {
|
|
|
|
0: "MSG_ERROR",
|
|
|
|
1: "MSG_TX",
|
|
|
|
2: "MSG_BLOCK",
|
|
|
|
3: "MSG_FILTERED_BLOCK",
|
|
|
|
4: "MSG_TXLOCK_REQUEST",
|
|
|
|
5: "MSG_TXLOCK_VOTE",
|
|
|
|
6: "MSG_SPORK",
|
|
|
|
7: "MSG_MASTERNODE_WINNER",
|
|
|
|
8: "MSG_MASTERNODE_SCANNING_ERROR",
|
|
|
|
9: "MSG_BUDGET_VOTE",
|
|
|
|
10: "MSG_BUDGET_PROPOSAL",
|
|
|
|
11: "MSG_BUDGET_FINALIZED",
|
|
|
|
12: "MSG_BUDGET_FINALIZED_VOTE",
|
|
|
|
13: "MSG_MASTERNODE_QUORUM",
|
|
|
|
15: "MSG_MASTERNODE_ANNOUNCE",
|
|
|
|
16: "MSG_MASTERNODE_PING",
|
|
|
|
17: "MSG_DSTX"
|
|
|
|
}
|
|
|
|
|
|
|
|
def __init__(self, t=0, h=0):
|
|
|
|
self.type = t
|
|
|
|
self.hash = h
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.type = struct.unpack("<i", f.read(4))[0]
|
|
|
|
self.hash = deser_uint256(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.type)
|
|
|
|
r += ser_uint256(self.hash)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CInv(type=%s hash=%064x)" \
|
|
|
|
% (self.typemap[self.type], self.hash)
|
|
|
|
|
|
|
|
|
|
|
|
class CBlockLocator:
|
|
|
|
def __init__(self):
|
|
|
|
self.nVersion = MY_VERSION
|
|
|
|
self.vHave = []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nVersion = struct.unpack("<i", f.read(4))[0]
|
|
|
|
self.vHave = deser_uint256_vector(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.nVersion)
|
|
|
|
r += ser_uint256_vector(self.vHave)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CBlockLocator(nVersion=%i vHave=%s)" \
|
|
|
|
% (self.nVersion, repr(self.vHave))
|
|
|
|
|
|
|
|
|
|
|
|
class COutPoint:
|
|
|
|
def __init__(self, hash=0, n=0):
|
|
|
|
self.hash = hash
|
|
|
|
self.n = n
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.hash = deser_uint256(f)
|
|
|
|
self.n = struct.unpack("<I", f.read(4))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += ser_uint256(self.hash)
|
|
|
|
r += struct.pack("<I", self.n)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def serialize_uniqueness(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<I", self.n)
|
|
|
|
r += ser_uint256(self.hash)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def deserialize_uniqueness(self, f):
|
|
|
|
self.n = struct.unpack("<I", f.read(4))[0]
|
|
|
|
self.hash = deser_uint256(f)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "COutPoint(hash=%064x n=%i)" % (self.hash, self.n)
|
|
|
|
|
|
|
|
def to_json(self):
|
|
|
|
return {"txid": "%064x" % self.hash, "vout": self.n}
|
|
|
|
|
|
|
|
NullOutPoint = COutPoint(0, 0xffffffff)
|
|
|
|
|
|
|
|
class CTxIn:
|
|
|
|
def __init__(self, outpoint=None, scriptSig=b"", nSequence=0):
|
|
|
|
if outpoint is None:
|
|
|
|
self.prevout = COutPoint()
|
|
|
|
else:
|
|
|
|
self.prevout = outpoint
|
|
|
|
self.scriptSig = scriptSig
|
|
|
|
self.nSequence = nSequence
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.prevout = COutPoint()
|
|
|
|
self.prevout.deserialize(f)
|
|
|
|
self.scriptSig = deser_string(f)
|
|
|
|
self.nSequence = struct.unpack("<I", f.read(4))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.prevout.serialize()
|
|
|
|
r += ser_string(self.scriptSig)
|
|
|
|
r += struct.pack("<I", self.nSequence)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CTxIn(prevout=%s scriptSig=%s nSequence=%i)" \
|
|
|
|
% (repr(self.prevout), bytes_to_hex_str(self.scriptSig),
|
|
|
|
self.nSequence)
|
|
|
|
|
|
|
|
def is_zerocoinspend(self):
|
|
|
|
return bytes_to_hex_str(self.scriptSig)[:2] == "c2"
|
|
|
|
|
|
|
|
|
|
|
|
class CTxOut:
|
|
|
|
def __init__(self, nValue=0, scriptPubKey=b""):
|
|
|
|
self.nValue = nValue
|
|
|
|
self.scriptPubKey = scriptPubKey
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nValue = struct.unpack("<q", f.read(8))[0]
|
|
|
|
self.scriptPubKey = deser_string(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<q", self.nValue)
|
|
|
|
r += ser_string(self.scriptPubKey)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CTxOut(nValue=%i.%08i scriptPubKey=%s)" \
|
|
|
|
% (self.nValue // COIN, self.nValue % COIN,
|
|
|
|
bytes_to_hex_str(self.scriptPubKey))
|
|
|
|
|
|
|
|
|
|
|
|
class SpendDescription:
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.cv = deser_uint256(f)
|
|
|
|
self.anchor = deser_uint256(f)
|
|
|
|
self.nullifier = deser_uint256(f)
|
|
|
|
self.rk = deser_uint256(f)
|
|
|
|
self.zkproof = f.read(192)
|
|
|
|
self.spendAuthSig = f.read(64)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += ser_uint256(self.cv)
|
|
|
|
r += ser_uint256(self.anchor)
|
|
|
|
r += ser_uint256(self.nullifier)
|
|
|
|
r += ser_uint256(self.rk)
|
|
|
|
r += self.zkproof
|
|
|
|
r += self.spendAuthSig
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
class OutputDescription:
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.cv = deser_uint256(f)
|
|
|
|
self.cmu = deser_uint256(f)
|
|
|
|
self.ephemeralKey = deser_uint256(f)
|
|
|
|
self.encCiphertext = f.read(580)
|
|
|
|
self.outCiphertext = f.read(80)
|
|
|
|
self.zkproof = f.read(192)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += ser_uint256(self.cv)
|
|
|
|
r += ser_uint256(self.cmu)
|
|
|
|
r += ser_uint256(self.ephemeralKey)
|
|
|
|
r += self.encCiphertext
|
|
|
|
r += self.outCiphertext
|
|
|
|
r += self.zkproof
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
class SaplingTxData:
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.pre = f.read(1)
|
|
|
|
self.valueBalance = struct.unpack("<q", f.read(8))[0]
|
|
|
|
|
|
|
|
self.vShieldedSpend = deser_vector(f, SpendDescription)
|
|
|
|
self.vShieldedOutput = deser_vector(f, OutputDescription)
|
|
|
|
|
|
|
|
self.bindingSig = f.read(64)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.pre
|
|
|
|
r += struct.pack("<q", self.valueBalance)
|
|
|
|
r += ser_vector(self.vShieldedSpend)
|
|
|
|
r += ser_vector(self.vShieldedOutput)
|
|
|
|
r += self.bindingSig
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
class CTransaction:
|
|
|
|
def __init__(self, tx=None):
|
|
|
|
if tx is None:
|
|
|
|
self.nVersion = 1
|
|
|
|
self.nType = 0
|
|
|
|
self.vin = []
|
|
|
|
self.vout = []
|
|
|
|
self.sapData = None
|
|
|
|
self.extraData = b""
|
|
|
|
self.nLockTime = 0
|
|
|
|
self.sha256 = None
|
|
|
|
self.hash = None
|
|
|
|
else:
|
|
|
|
self.nVersion = tx.nVersion
|
|
|
|
self.nType = tx.nType
|
|
|
|
self.vin = copy.deepcopy(tx.vin)
|
|
|
|
self.vout = copy.deepcopy(tx.vout)
|
|
|
|
self.nLockTime = tx.nLockTime
|
|
|
|
self.sapData = tx.sapData
|
|
|
|
self.extraData = tx.extraData
|
|
|
|
self.sha256 = tx.sha256
|
|
|
|
self.hash = tx.hash
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nVersion = struct.unpack("<h", f.read(2))[0]
|
|
|
|
self.nType = struct.unpack("<h", f.read(2))[0]
|
|
|
|
self.vin = deser_vector(f, CTxIn)
|
|
|
|
self.vout = deser_vector(f, CTxOut)
|
|
|
|
self.nLockTime = struct.unpack("<I", f.read(4))[0]
|
|
|
|
if self.nVersion >= 3:
|
|
|
|
self.sapData = SaplingTxData()
|
|
|
|
self.sapData.deserialize(f)
|
|
|
|
if self.nType != 0:
|
|
|
|
self.extraData = deser_string(f)
|
|
|
|
self.sha256 = None
|
|
|
|
self.hash = None
|
|
|
|
|
|
|
|
def serialize_without_witness(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<h", self.nVersion)
|
|
|
|
r += struct.pack("<h", self.nType)
|
|
|
|
r += ser_vector(self.vin)
|
|
|
|
r += ser_vector(self.vout)
|
|
|
|
r += struct.pack("<I", self.nLockTime)
|
|
|
|
if self.nVersion >= 3:
|
|
|
|
r += self.sapData.serialize()
|
|
|
|
if self.nType != 0:
|
|
|
|
r += ser_string(self.extraData)
|
|
|
|
return r
|
|
|
|
|
|
|
|
# Regular serialization is with witness -- must explicitly
|
|
|
|
# call serialize_without_witness to exclude witness data.
|
|
|
|
def serialize(self):
|
|
|
|
return self.serialize_without_witness()
|
|
|
|
|
|
|
|
# Recalculate the txid (transaction hash without witness)
|
|
|
|
def rehash(self):
|
|
|
|
self.sha256 = None
|
|
|
|
self.calc_sha256()
|
|
|
|
|
|
|
|
# We will only cache the serialization without witness in
|
|
|
|
# self.sha256 and self.hash -- those are expected to be the txid.
|
|
|
|
def calc_sha256(self, with_witness=False):
|
|
|
|
if self.sha256 is None:
|
|
|
|
self.sha256 = uint256_from_str(hash256(self.serialize_without_witness()))
|
|
|
|
self.hash = encode(hash256(self.serialize_without_witness())[::-1], 'hex_codec').decode('ascii')
|
|
|
|
|
|
|
|
def is_valid(self):
|
|
|
|
self.calc_sha256()
|
|
|
|
for tout in self.vout:
|
|
|
|
if tout.nValue < 0 or tout.nValue > 21000000 * COIN:
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
|
|
def is_coinbase(self):
|
|
|
|
return (
|
|
|
|
len(self.vin) == 1 and
|
|
|
|
self.vin[0].prevout == NullOutPoint and
|
|
|
|
(not self.vin[0].is_zerocoinspend())
|
|
|
|
)
|
|
|
|
|
|
|
|
def is_coinstake(self):
|
|
|
|
return (
|
|
|
|
len(self.vin) == 1 and
|
|
|
|
len(self.vout) >= 2 and
|
|
|
|
self.vout[0] == CTxOut()
|
|
|
|
)
|
|
|
|
|
|
|
|
def from_hex(self, hexstring):
|
|
|
|
f = BytesIO(hex_str_to_bytes(hexstring))
|
|
|
|
self.deserialize(f)
|
|
|
|
|
|
|
|
def spends(self, outpoint):
|
|
|
|
return len([x for x in self.vin if
|
|
|
|
x.prevout.hash == outpoint.hash and x.prevout.n == outpoint.n]) > 0
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CTransaction(nVersion=%i nType=%i vin=%s vout=%s nLockTime=%i)" \
|
|
|
|
% (self.nVersion, self.nType, repr(self.vin), repr(self.vout), self.nLockTime)
|
|
|
|
|
|
|
|
|
|
|
|
class CBlockHeader:
|
|
|
|
def __init__(self, header=None):
|
|
|
|
if header is None:
|
|
|
|
self.set_null()
|
|
|
|
else:
|
|
|
|
self.nVersion = header.nVersion
|
|
|
|
self.hashPrevBlock = header.hashPrevBlock
|
|
|
|
self.hashMerkleRoot = header.hashMerkleRoot
|
|
|
|
self.nTime = header.nTime
|
|
|
|
self.nBits = header.nBits
|
|
|
|
self.nNonce = header.nNonce
|
|
|
|
self.hashFinalSaplingRoot = header.hashFinalSaplingRoot
|
|
|
|
self.sha256 = header.sha256
|
|
|
|
self.hash = header.hash
|
|
|
|
self.calc_sha256()
|
|
|
|
|
|
|
|
def set_null(self):
|
|
|
|
self.nVersion = CURRENT_BLK_VERSION
|
|
|
|
self.hashPrevBlock = 0
|
|
|
|
self.hashMerkleRoot = 0
|
|
|
|
self.nTime = 0
|
|
|
|
self.nBits = 0
|
|
|
|
self.nNonce = 0
|
|
|
|
self.hashFinalSaplingRoot = 0
|
|
|
|
self.sha256 = None
|
|
|
|
self.hash = None
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nVersion = struct.unpack("<i", f.read(4))[0]
|
|
|
|
self.hashPrevBlock = deser_uint256(f)
|
|
|
|
self.hashMerkleRoot = deser_uint256(f)
|
|
|
|
self.nTime = struct.unpack("<I", f.read(4))[0]
|
|
|
|
self.nBits = struct.unpack("<I", f.read(4))[0]
|
|
|
|
self.nNonce = struct.unpack("<I", f.read(4))[0]
|
|
|
|
if self.nVersion >= 8:
|
|
|
|
self.hashFinalSaplingRoot = deser_uint256(f)
|
|
|
|
self.sha256 = None
|
|
|
|
self.hash = None
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.nVersion)
|
|
|
|
r += ser_uint256(self.hashPrevBlock)
|
|
|
|
r += ser_uint256(self.hashMerkleRoot)
|
|
|
|
r += struct.pack("<I", self.nTime)
|
|
|
|
r += struct.pack("<I", self.nBits)
|
|
|
|
r += struct.pack("<I", self.nNonce)
|
|
|
|
if self.nVersion >= 8:
|
|
|
|
r += ser_uint256(self.hashFinalSaplingRoot)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def calc_sha256(self):
|
|
|
|
if self.sha256 is None:
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.nVersion)
|
|
|
|
r += ser_uint256(self.hashPrevBlock)
|
|
|
|
r += ser_uint256(self.hashMerkleRoot)
|
|
|
|
r += struct.pack("<I", self.nTime)
|
|
|
|
r += struct.pack("<I", self.nBits)
|
|
|
|
r += struct.pack("<I", self.nNonce)
|
|
|
|
if self.nVersion >= 8:
|
|
|
|
r += ser_uint256(self.hashFinalSaplingRoot)
|
|
|
|
self.sha256 = uint256_from_str(hash256(r))
|
|
|
|
self.hash = encode(hash256(r)[::-1], 'hex_codec').decode('ascii')
|
|
|
|
|
|
|
|
def rehash(self):
|
|
|
|
self.sha256 = None
|
|
|
|
self.calc_sha256()
|
|
|
|
return self.sha256
|
|
|
|
|
|
|
|
# PIVX
|
|
|
|
def solve_stake(self, stakeInputs, prevModifier):
|
|
|
|
target0 = uint256_from_compact(self.nBits)
|
|
|
|
loop = True
|
|
|
|
while loop:
|
|
|
|
for uniqueness in stakeInputs:
|
|
|
|
nvalue, _, prevTime = stakeInputs[uniqueness]
|
|
|
|
target = int(target0 * nvalue / 100) % 2**256
|
|
|
|
data = b""
|
|
|
|
# always modifier V2 (256 bits) on regtest
|
|
|
|
data += ser_uint256(prevModifier)
|
|
|
|
data += struct.pack("<I", prevTime)
|
|
|
|
# prevout is CStake uniqueness
|
|
|
|
data += uniqueness
|
|
|
|
data += struct.pack("<I", self.nTime)
|
|
|
|
posHash = uint256_from_str(hash256(data))
|
|
|
|
if posHash <= target:
|
|
|
|
self.prevoutStake = uniqueness
|
|
|
|
loop = False
|
|
|
|
break
|
|
|
|
if loop:
|
|
|
|
self.nTime += 1
|
|
|
|
return True
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CBlockHeader(nVersion=%i hashPrevBlock=%064x hashMerkleRoot=%064x nTime=%s nBits=%08x nNonce=%08x)" \
|
|
|
|
% (self.nVersion, self.hashPrevBlock, self.hashMerkleRoot,
|
|
|
|
time.ctime(self.nTime), self.nBits, self.nNonce)
|
|
|
|
|
|
|
|
|
|
|
|
class CBlock(CBlockHeader):
|
|
|
|
def __init__(self, header=None):
|
|
|
|
super(CBlock, self).__init__(header)
|
|
|
|
self.vtx = []
|
|
|
|
self.sig_key = None # not serialized / used only to re_sign
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
super(CBlock, self).deserialize(f)
|
|
|
|
self.vtx = deser_vector(f, CTransaction)
|
|
|
|
self.sig_key = None
|
|
|
|
|
|
|
|
def serialize(self, with_witness=False):
|
|
|
|
r = b""
|
|
|
|
r += super(CBlock, self).serialize()
|
|
|
|
if with_witness:
|
|
|
|
r += ser_vector(self.vtx, "serialize_with_witness")
|
|
|
|
else:
|
|
|
|
r += ser_vector(self.vtx, "serialize_without_witness")
|
|
|
|
if hasattr(self, 'vchBlockSig'):
|
|
|
|
r += ser_string(self.vchBlockSig)
|
|
|
|
return r
|
|
|
|
|
|
|
|
# Calculate the merkle root given a vector of transaction hashes
|
|
|
|
@classmethod
|
|
|
|
def get_merkle_root(cls, hashes):
|
|
|
|
while len(hashes) > 1:
|
|
|
|
newhashes = []
|
|
|
|
for i in range(0, len(hashes), 2):
|
|
|
|
i2 = min(i+1, len(hashes)-1)
|
|
|
|
newhashes.append(hash256(hashes[i] + hashes[i2]))
|
|
|
|
hashes = newhashes
|
|
|
|
return uint256_from_str(hashes[0])
|
|
|
|
|
|
|
|
def calc_merkle_root(self):
|
|
|
|
hashes = []
|
|
|
|
for tx in self.vtx:
|
|
|
|
tx.calc_sha256()
|
|
|
|
hashes.append(ser_uint256(tx.sha256))
|
|
|
|
return self.get_merkle_root(hashes)
|
|
|
|
|
|
|
|
def calc_witness_merkle_root(self):
|
|
|
|
# For witness root purposes, the hash of the
|
|
|
|
# coinbase, with witness, is defined to be 0...0
|
|
|
|
hashes = [ser_uint256(0)]
|
|
|
|
|
|
|
|
for tx in self.vtx[1:]:
|
|
|
|
# Calculate the hashes with witness data
|
|
|
|
hashes.append(ser_uint256(tx.calc_sha256(True)))
|
|
|
|
|
|
|
|
return self.get_merkle_root(hashes)
|
|
|
|
|
|
|
|
def is_valid(self):
|
|
|
|
self.calc_sha256()
|
|
|
|
target = uint256_from_compact(self.nBits)
|
|
|
|
if self.sha256 > target:
|
|
|
|
return False
|
|
|
|
for tx in self.vtx:
|
|
|
|
if not tx.is_valid():
|
|
|
|
return False
|
|
|
|
if self.calc_merkle_root() != self.hashMerkleRoot:
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
|
|
def solve(self):
|
|
|
|
self.rehash()
|
|
|
|
target = uint256_from_compact(self.nBits)
|
|
|
|
while self.sha256 > target:
|
|
|
|
self.nNonce += 1
|
|
|
|
self.rehash()
|
|
|
|
|
|
|
|
def sign_block(self, key, low_s=True):
|
|
|
|
data = b""
|
|
|
|
data += struct.pack("<i", self.nVersion)
|
|
|
|
data += ser_uint256(self.hashPrevBlock)
|
|
|
|
data += ser_uint256(self.hashMerkleRoot)
|
|
|
|
data += struct.pack("<I", self.nTime)
|
|
|
|
data += struct.pack("<I", self.nBits)
|
|
|
|
data += struct.pack("<I", self.nNonce)
|
|
|
|
if self.nVersion >= 8:
|
|
|
|
data += ser_uint256(self.hashFinalSaplingRoot)
|
|
|
|
sha256NoSig = hash256(data)
|
|
|
|
self.vchBlockSig = key.sign(sha256NoSig, low_s=low_s)
|
|
|
|
self.sig_key = key
|
|
|
|
self.low_s = low_s
|
|
|
|
|
|
|
|
def re_sign_block(self):
|
|
|
|
if self.sig_key is None:
|
|
|
|
raise Exception("Unable to re-sign block. Key Not present, use 'sign_block' first.")
|
|
|
|
return self.sign_block(self.sig_key, self.low_s)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CBlock(nVersion=%i hashPrevBlock=%064x hashMerkleRoot=%064x nTime=%s nBits=%08x nNonce=%08x vtx=%s)" \
|
|
|
|
% (self.nVersion, self.hashPrevBlock, self.hashMerkleRoot,
|
|
|
|
time.ctime(self.nTime), self.nBits, self.nNonce, repr(self.vtx))
|
|
|
|
|
|
|
|
|
|
|
|
class PrefilledTransaction:
|
|
|
|
def __init__(self, index=0, tx = None):
|
|
|
|
self.index = index
|
|
|
|
self.tx = tx
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.index = deser_compact_size(f)
|
|
|
|
self.tx = CTransaction()
|
|
|
|
self.tx.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self, with_witness=True):
|
|
|
|
r = b""
|
|
|
|
r += ser_compact_size(self.index)
|
|
|
|
if with_witness:
|
|
|
|
r += self.tx.serialize_with_witness()
|
|
|
|
else:
|
|
|
|
r += self.tx.serialize_without_witness()
|
|
|
|
return r
|
|
|
|
|
|
|
|
def serialize_without_witness(self):
|
|
|
|
return self.serialize(with_witness=False)
|
|
|
|
|
|
|
|
def serialize_with_witness(self):
|
|
|
|
return self.serialize(with_witness=True)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "PrefilledTransaction(index=%d, tx=%s)" % (self.index, repr(self.tx))
|
|
|
|
|
|
|
|
# This is what we send on the wire, in a cmpctblock message.
|
|
|
|
class P2PHeaderAndShortIDs:
|
|
|
|
def __init__(self):
|
|
|
|
self.header = CBlockHeader()
|
|
|
|
self.nonce = 0
|
|
|
|
self.shortids_length = 0
|
|
|
|
self.shortids = []
|
|
|
|
self.prefilled_txn_length = 0
|
|
|
|
self.prefilled_txn = []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.header.deserialize(f)
|
|
|
|
self.nonce = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
self.shortids_length = deser_compact_size(f)
|
|
|
|
for i in range(self.shortids_length):
|
|
|
|
# shortids are defined to be 6 bytes in the spec, so append
|
|
|
|
# two zero bytes and read it in as an 8-byte number
|
|
|
|
self.shortids.append(struct.unpack("<Q", f.read(6) + b'\x00\x00')[0])
|
|
|
|
self.prefilled_txn = deser_vector(f, PrefilledTransaction)
|
|
|
|
self.prefilled_txn_length = len(self.prefilled_txn)
|
|
|
|
|
|
|
|
# When using version 2 compact blocks, we must serialize with_witness.
|
|
|
|
def serialize(self, with_witness=False):
|
|
|
|
r = b""
|
|
|
|
r += self.header.serialize()
|
|
|
|
r += struct.pack("<Q", self.nonce)
|
|
|
|
r += ser_compact_size(self.shortids_length)
|
|
|
|
for x in self.shortids:
|
|
|
|
# We only want the first 6 bytes
|
|
|
|
r += struct.pack("<Q", x)[0:6]
|
|
|
|
if with_witness:
|
|
|
|
r += ser_vector(self.prefilled_txn, "serialize_with_witness")
|
|
|
|
else:
|
|
|
|
r += ser_vector(self.prefilled_txn, "serialize_without_witness")
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "P2PHeaderAndShortIDs(header=%s, nonce=%d, shortids_length=%d, shortids=%s, prefilled_txn_length=%d, prefilledtxn=%s" % (repr(self.header), self.nonce, self.shortids_length, repr(self.shortids), self.prefilled_txn_length, repr(self.prefilled_txn))
|
|
|
|
|
|
|
|
# P2P version of the above that will use witness serialization (for compact
|
|
|
|
# block version 2)
|
|
|
|
class P2PHeaderAndShortWitnessIDs(P2PHeaderAndShortIDs):
|
|
|
|
def serialize(self):
|
|
|
|
return super(P2PHeaderAndShortWitnessIDs, self).serialize(with_witness=True)
|
|
|
|
|
|
|
|
# Calculate the BIP 152-compact blocks shortid for a given transaction hash
|
|
|
|
def calculate_shortid(k0, k1, tx_hash):
|
|
|
|
expected_shortid = siphash256(k0, k1, tx_hash)
|
|
|
|
expected_shortid &= 0x0000ffffffffffff
|
|
|
|
return expected_shortid
|
|
|
|
|
|
|
|
# This version gets rid of the array lengths, and reinterprets the differential
|
|
|
|
# encoding into indices that can be used for lookup.
|
|
|
|
class HeaderAndShortIDs:
|
|
|
|
def __init__(self, p2pheaders_and_shortids = None):
|
|
|
|
self.header = CBlockHeader()
|
|
|
|
self.nonce = 0
|
|
|
|
self.shortids = []
|
|
|
|
self.prefilled_txn = []
|
|
|
|
self.use_witness = False
|
|
|
|
|
|
|
|
if p2pheaders_and_shortids is not None:
|
|
|
|
self.header = p2pheaders_and_shortids.header
|
|
|
|
self.nonce = p2pheaders_and_shortids.nonce
|
|
|
|
self.shortids = p2pheaders_and_shortids.shortids
|
|
|
|
last_index = -1
|
|
|
|
for x in p2pheaders_and_shortids.prefilled_txn:
|
|
|
|
self.prefilled_txn.append(PrefilledTransaction(x.index + last_index + 1, x.tx))
|
|
|
|
last_index = self.prefilled_txn[-1].index
|
|
|
|
|
|
|
|
def to_p2p(self):
|
|
|
|
if self.use_witness:
|
|
|
|
ret = P2PHeaderAndShortWitnessIDs()
|
|
|
|
else:
|
|
|
|
ret = P2PHeaderAndShortIDs()
|
|
|
|
ret.header = self.header
|
|
|
|
ret.nonce = self.nonce
|
|
|
|
ret.shortids_length = len(self.shortids)
|
|
|
|
ret.shortids = self.shortids
|
|
|
|
ret.prefilled_txn_length = len(self.prefilled_txn)
|
|
|
|
ret.prefilled_txn = []
|
|
|
|
last_index = -1
|
|
|
|
for x in self.prefilled_txn:
|
|
|
|
ret.prefilled_txn.append(PrefilledTransaction(x.index - last_index - 1, x.tx))
|
|
|
|
last_index = x.index
|
|
|
|
return ret
|
|
|
|
|
|
|
|
def get_siphash_keys(self):
|
|
|
|
header_nonce = self.header.serialize()
|
|
|
|
header_nonce += struct.pack("<Q", self.nonce)
|
|
|
|
hash_header_nonce_as_str = sha256(header_nonce)
|
|
|
|
key0 = struct.unpack("<Q", hash_header_nonce_as_str[0:8])[0]
|
|
|
|
key1 = struct.unpack("<Q", hash_header_nonce_as_str[8:16])[0]
|
|
|
|
return [ key0, key1 ]
|
|
|
|
|
|
|
|
# Version 2 compact blocks use wtxid in shortids (rather than txid)
|
|
|
|
def initialize_from_block(self, block, nonce=0, prefill_list = [0], use_witness = False):
|
|
|
|
self.header = CBlockHeader(block)
|
|
|
|
self.nonce = nonce
|
|
|
|
self.prefilled_txn = [ PrefilledTransaction(i, block.vtx[i]) for i in prefill_list ]
|
|
|
|
self.shortids = []
|
|
|
|
self.use_witness = use_witness
|
|
|
|
[k0, k1] = self.get_siphash_keys()
|
|
|
|
for i in range(len(block.vtx)):
|
|
|
|
if i not in prefill_list:
|
|
|
|
tx_hash = block.vtx[i].sha256
|
|
|
|
if use_witness:
|
|
|
|
tx_hash = block.vtx[i].calc_sha256(with_witness=True)
|
|
|
|
self.shortids.append(calculate_shortid(k0, k1, tx_hash))
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "HeaderAndShortIDs(header=%s, nonce=%d, shortids=%s, prefilledtxn=%s" % (repr(self.header), self.nonce, repr(self.shortids), repr(self.prefilled_txn))
|
|
|
|
|
|
|
|
|
|
|
|
class BlockTransactionsRequest:
|
|
|
|
|
|
|
|
def __init__(self, blockhash=0, indexes = None):
|
|
|
|
self.blockhash = blockhash
|
|
|
|
self.indexes = indexes if indexes is not None else []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.blockhash = deser_uint256(f)
|
|
|
|
indexes_length = deser_compact_size(f)
|
|
|
|
for i in range(indexes_length):
|
|
|
|
self.indexes.append(deser_compact_size(f))
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += ser_uint256(self.blockhash)
|
|
|
|
r += ser_compact_size(len(self.indexes))
|
|
|
|
for x in self.indexes:
|
|
|
|
r += ser_compact_size(x)
|
|
|
|
return r
|
|
|
|
|
|
|
|
# helper to set the differentially encoded indexes from absolute ones
|
|
|
|
def from_absolute(self, absolute_indexes):
|
|
|
|
self.indexes = []
|
|
|
|
last_index = -1
|
|
|
|
for x in absolute_indexes:
|
|
|
|
self.indexes.append(x-last_index-1)
|
|
|
|
last_index = x
|
|
|
|
|
|
|
|
def to_absolute(self):
|
|
|
|
absolute_indexes = []
|
|
|
|
last_index = -1
|
|
|
|
for x in self.indexes:
|
|
|
|
absolute_indexes.append(x+last_index+1)
|
|
|
|
last_index = absolute_indexes[-1]
|
|
|
|
return absolute_indexes
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "BlockTransactionsRequest(hash=%064x indexes=%s)" % (self.blockhash, repr(self.indexes))
|
|
|
|
|
|
|
|
|
|
|
|
class BlockTransactions:
|
|
|
|
|
|
|
|
def __init__(self, blockhash=0, transactions = None):
|
|
|
|
self.blockhash = blockhash
|
|
|
|
self.transactions = transactions if transactions is not None else []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.blockhash = deser_uint256(f)
|
|
|
|
self.transactions = deser_vector(f, CTransaction)
|
|
|
|
|
|
|
|
def serialize(self, with_witness=True):
|
|
|
|
r = b""
|
|
|
|
r += ser_uint256(self.blockhash)
|
|
|
|
if with_witness:
|
|
|
|
r += ser_vector(self.transactions, "serialize_with_witness")
|
|
|
|
else:
|
|
|
|
r += ser_vector(self.transactions, "serialize_without_witness")
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "BlockTransactions(hash=%064x transactions=%s)" % (self.blockhash, repr(self.transactions))
|
|
|
|
|
|
|
|
class CPartialMerkleTree:
|
|
|
|
def __init__(self):
|
|
|
|
self.nTransactions = 0
|
|
|
|
self.vHash = []
|
|
|
|
self.vBits = []
|
|
|
|
self.fBad = False
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nTransactions = struct.unpack("<i", f.read(4))[0]
|
|
|
|
self.vHash = deser_uint256_vector(f)
|
|
|
|
vBytes = deser_string(f)
|
|
|
|
self.vBits = []
|
|
|
|
for i in range(len(vBytes) * 8):
|
|
|
|
self.vBits.append(vBytes[i//8] & (1 << (i % 8)) != 0)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.nTransactions)
|
|
|
|
r += ser_uint256_vector(self.vHash)
|
|
|
|
vBytesArray = bytearray([0x00] * ((len(self.vBits) + 7)//8))
|
|
|
|
for i in range(len(self.vBits)):
|
|
|
|
vBytesArray[i // 8] |= self.vBits[i] << (i % 8)
|
|
|
|
r += ser_string(bytes(vBytesArray))
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CPartialMerkleTree(nTransactions=%d, vHash=%s, vBits=%s)" % (self.nTransactions, repr(self.vHash), repr(self.vBits))
|
|
|
|
|
|
|
|
class CMerkleBlock:
|
|
|
|
def __init__(self):
|
|
|
|
self.header = CBlockHeader()
|
|
|
|
self.txn = CPartialMerkleTree()
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.header.deserialize(f)
|
|
|
|
self.txn.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.header.serialize()
|
|
|
|
r += self.txn.serialize()
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "CMerkleBlock(header=%s, txn=%s)" % (repr(self.header), repr(self.txn))
|
|
|
|
|
|
|
|
|
|
|
|
# Objects that correspond to messages on the wire
|
|
|
|
class msg_version:
|
|
|
|
command = b"version"
|
|
|
|
|
|
|
|
def __init__(self, mn_auth_challenge=0):
|
|
|
|
self.nVersion = MY_VERSION
|
|
|
|
self.nServices = NODE_NETWORK
|
|
|
|
self.nTime = int(time.time())
|
|
|
|
self.addrTo = CAddress()
|
|
|
|
self.addrFrom = CAddress()
|
|
|
|
self.nNonce = random.getrandbits(64)
|
|
|
|
self.strSubVer = MY_SUBVERSION
|
|
|
|
self.nStartingHeight = -1
|
|
|
|
self.nRelay = MY_RELAY
|
|
|
|
self.mn_auth_challenge = mn_auth_challenge
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nVersion = struct.unpack("<i", f.read(4))[0]
|
|
|
|
if self.nVersion == 10300:
|
|
|
|
self.nVersion = 300
|
|
|
|
self.nServices = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
self.nTime = struct.unpack("<q", f.read(8))[0]
|
|
|
|
self.addrTo = CAddress()
|
|
|
|
self.addrTo.deserialize(f, with_time=False)
|
|
|
|
|
|
|
|
if self.nVersion >= 106:
|
|
|
|
self.addrFrom = CAddress()
|
|
|
|
self.addrFrom.deserialize(f, with_time=False)
|
|
|
|
self.nNonce = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
self.strSubVer = deser_string(f).decode('utf-8')
|
|
|
|
else:
|
|
|
|
self.addrFrom = None
|
|
|
|
self.nNonce = None
|
|
|
|
self.strSubVer = None
|
|
|
|
self.nStartingHeight = None
|
|
|
|
|
|
|
|
if self.nVersion >= 209:
|
|
|
|
self.nStartingHeight = struct.unpack("<i", f.read(4))[0]
|
|
|
|
else:
|
|
|
|
self.nStartingHeight = None
|
|
|
|
|
|
|
|
if self.nVersion >= 70001:
|
|
|
|
# Relay field is optional for version 70001 onwards
|
|
|
|
try:
|
|
|
|
self.nRelay = struct.unpack("<b", f.read(1))[0]
|
|
|
|
except:
|
|
|
|
self.nRelay = 0
|
|
|
|
else:
|
|
|
|
self.nRelay = 0
|
|
|
|
|
|
|
|
if self.nVersion >= 70925:
|
|
|
|
try:
|
|
|
|
self.mn_auth_challenge = deser_uint256(f)
|
|
|
|
except:
|
|
|
|
self.mn_auth_challenge = 0
|
|
|
|
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<i", self.nVersion)
|
|
|
|
r += struct.pack("<Q", self.nServices)
|
|
|
|
r += struct.pack("<q", self.nTime)
|
|
|
|
r += self.addrTo.serialize(with_time=False)
|
|
|
|
r += self.addrFrom.serialize(with_time=False)
|
|
|
|
r += struct.pack("<Q", self.nNonce)
|
|
|
|
r += ser_string(self.strSubVer.encode('utf-8'))
|
|
|
|
r += struct.pack("<i", self.nStartingHeight)
|
|
|
|
r += struct.pack("<b", self.nRelay)
|
|
|
|
if self.mn_auth_challenge != 0:
|
|
|
|
r += ser_uint256(self.mn_auth_challenge)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return 'msg_version(nVersion=%i nServices=%i nTime=%s addrTo=%s addrFrom=%s nNonce=0x%016X strSubVer=%s nStartingHeight=%i nRelay=%i)' \
|
|
|
|
% (self.nVersion, self.nServices, time.ctime(self.nTime),
|
|
|
|
repr(self.addrTo), repr(self.addrFrom), self.nNonce,
|
|
|
|
self.strSubVer, self.nStartingHeight, self.nRelay)
|
|
|
|
|
|
|
|
|
|
|
|
class msg_verack:
|
|
|
|
command = b"verack"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return b""
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_verack()"
|
|
|
|
|
|
|
|
|
|
|
|
class msg_addr:
|
|
|
|
command = b"addr"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.addrs = []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.addrs = deser_vector(f, CAddress)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return ser_vector(self.addrs)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_addr(addrs=%s)" % (repr(self.addrs))
|
|
|
|
|
|
|
|
class msg_addrv2:
|
|
|
|
__slots__ = ("addrs",)
|
|
|
|
command = b"addrv2"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.addrs = []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.addrs = deser_vector(f, CAddress, "deserialize_v2")
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return ser_vector(self.addrs, "serialize_v2")
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_addrv2(addrs=%s)" % (repr(self.addrs))
|
|
|
|
|
|
|
|
|
|
|
|
class msg_sendaddrv2:
|
|
|
|
__slots__ = ()
|
|
|
|
command = b"sendaddrv2"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return b""
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_sendaddrv2()"
|
|
|
|
|
|
|
|
class msg_inv:
|
|
|
|
command = b"inv"
|
|
|
|
|
|
|
|
def __init__(self, inv=None):
|
|
|
|
if inv is None:
|
|
|
|
self.inv = []
|
|
|
|
else:
|
|
|
|
self.inv = inv
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.inv = deser_vector(f, CInv)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return ser_vector(self.inv)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_inv(inv=%s)" % (repr(self.inv))
|
|
|
|
|
|
|
|
|
|
|
|
class msg_getdata:
|
|
|
|
command = b"getdata"
|
|
|
|
|
|
|
|
def __init__(self, inv=None):
|
|
|
|
self.inv = inv if inv is not None else []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.inv = deser_vector(f, CInv)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return ser_vector(self.inv)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_getdata(inv=%s)" % (repr(self.inv))
|
|
|
|
|
|
|
|
|
|
|
|
class msg_getblocks:
|
|
|
|
command = b"getblocks"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.locator = CBlockLocator()
|
|
|
|
self.hashstop = 0
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.locator = CBlockLocator()
|
|
|
|
self.locator.deserialize(f)
|
|
|
|
self.hashstop = deser_uint256(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.locator.serialize()
|
|
|
|
r += ser_uint256(self.hashstop)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_getblocks(locator=%s hashstop=%064x)" \
|
|
|
|
% (repr(self.locator), self.hashstop)
|
|
|
|
|
|
|
|
class msg_mnping:
|
|
|
|
command = b"mnp"
|
|
|
|
|
|
|
|
def __init__(self, _vin, _blockhash, _sigtime):
|
|
|
|
self.vin = _vin
|
|
|
|
self.blockhash = _blockhash
|
|
|
|
self.sigtime = _sigtime
|
|
|
|
self.vch_sig = b""
|
|
|
|
self.mess_version = 1
|
|
|
|
self.cached_hash = b""
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.vin.deserialize(f)
|
|
|
|
self.blockhash = deser_uint256(f)
|
|
|
|
self.sigtime = struct.unpack("<q", f.read(8))[0]
|
|
|
|
self.vch_sig = deser_string(f)
|
|
|
|
self.mess_version = struct.unpack("<i", f.read(4))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.vin.serialize()
|
|
|
|
r += ser_uint256(self.blockhash)
|
|
|
|
r += struct.pack("<q", self.sigtime)
|
|
|
|
r += ser_string(self.vch_sig)
|
|
|
|
r += struct.pack("<I", self.mess_version)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def get_hash(self):
|
|
|
|
if self.cached_hash == b"":
|
|
|
|
self.cached_hash = uint256_from_str(hash256(self.serialize()))
|
|
|
|
return self.cached_hash
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_mnping(vin=%s blockhash=%064x)" \
|
|
|
|
% (repr(self.vin), self.blockhash)
|
|
|
|
|
|
|
|
class msg_tx:
|
|
|
|
command = b"tx"
|
|
|
|
|
|
|
|
def __init__(self, tx=CTransaction()):
|
|
|
|
self.tx = tx
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.tx.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return self.tx.serialize_without_witness()
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_tx(tx=%s)" % (repr(self.tx))
|
|
|
|
|
|
|
|
class msg_witness_tx(msg_tx):
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return self.tx.serialize_with_witness()
|
|
|
|
|
|
|
|
|
|
|
|
class msg_block:
|
|
|
|
command = b"block"
|
|
|
|
|
|
|
|
def __init__(self, block=None):
|
|
|
|
if block is None:
|
|
|
|
self.block = CBlock()
|
|
|
|
else:
|
|
|
|
self.block = block
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.block.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return self.block.serialize(with_witness=False)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_block(block=%s)" % (repr(self.block))
|
|
|
|
|
|
|
|
# for cases where a user needs tighter control over what is sent over the wire
|
|
|
|
# note that the user must supply the name of the command, and the data
|
|
|
|
class msg_generic():
|
|
|
|
def __init__(self, command, data=None):
|
|
|
|
self.command = command
|
|
|
|
self.data = data
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return self.data
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_generic()"
|
|
|
|
|
|
|
|
class msg_witness_block(msg_block):
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = self.block.serialize(with_witness=True)
|
|
|
|
return r
|
|
|
|
|
|
|
|
class msg_getaddr:
|
|
|
|
command = b"getaddr"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return b""
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_getaddr()"
|
|
|
|
|
|
|
|
|
|
|
|
class msg_ping:
|
|
|
|
command = b"ping"
|
|
|
|
|
|
|
|
def __init__(self, nonce=0):
|
|
|
|
self.nonce = nonce
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nonce = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<Q", self.nonce)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_ping(nonce=%08x)" % self.nonce
|
|
|
|
|
|
|
|
|
|
|
|
class msg_pong:
|
|
|
|
command = b"pong"
|
|
|
|
|
|
|
|
def __init__(self, nonce=0):
|
|
|
|
self.nonce = nonce
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.nonce = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<Q", self.nonce)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_pong(nonce=%08x)" % self.nonce
|
|
|
|
|
|
|
|
|
|
|
|
class msg_mempool:
|
|
|
|
command = b"mempool"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return b""
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_mempool()"
|
|
|
|
|
|
|
|
class msg_sendheaders:
|
|
|
|
command = b"sendheaders"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
return b""
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_sendheaders()"
|
|
|
|
|
|
|
|
|
|
|
|
# getheaders message has
|
|
|
|
# number of entries
|
|
|
|
# vector of hashes
|
|
|
|
# hash_stop (hash of last desired block header, 0 to get as many as possible)
|
|
|
|
class msg_getheaders:
|
|
|
|
command = b"getheaders"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.locator = CBlockLocator()
|
|
|
|
self.hashstop = 0
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.locator = CBlockLocator()
|
|
|
|
self.locator.deserialize(f)
|
|
|
|
self.hashstop = deser_uint256(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.locator.serialize()
|
|
|
|
r += ser_uint256(self.hashstop)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_getheaders(locator=%s, stop=%064x)" \
|
|
|
|
% (repr(self.locator), self.hashstop)
|
|
|
|
|
|
|
|
|
|
|
|
# headers message has
|
|
|
|
# <count> <vector of block headers>
|
|
|
|
class msg_headers:
|
|
|
|
command = b"headers"
|
|
|
|
|
|
|
|
def __init__(self, headers=None):
|
|
|
|
self.headers = headers if headers is not None else []
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
# comment in pivxd indicates these should be deserialized as blocks
|
|
|
|
blocks = deser_vector(f, CBlock)
|
|
|
|
for x in blocks:
|
|
|
|
self.headers.append(CBlockHeader(x))
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
blocks = [CBlock(x) for x in self.headers]
|
|
|
|
return ser_vector(blocks)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_headers(headers=%s)" % repr(self.headers)
|
|
|
|
|
|
|
|
class msg_feefilter:
|
|
|
|
command = b"feefilter"
|
|
|
|
|
|
|
|
def __init__(self, feerate=0):
|
|
|
|
self.feerate = feerate
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.feerate = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<Q", self.feerate)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_feefilter(feerate=%08x)" % self.feerate
|
|
|
|
|
|
|
|
class msg_sendcmpct:
|
|
|
|
command = b"sendcmpct"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.announce = False
|
|
|
|
self.version = 1
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.announce = struct.unpack("<?", f.read(1))[0]
|
|
|
|
self.version = struct.unpack("<Q", f.read(8))[0]
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += struct.pack("<?", self.announce)
|
|
|
|
r += struct.pack("<Q", self.version)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_sendcmpct(announce=%s, version=%lu)" % (self.announce, self.version)
|
|
|
|
|
|
|
|
class msg_cmpctblock:
|
|
|
|
command = b"cmpctblock"
|
|
|
|
|
|
|
|
def __init__(self, header_and_shortids = None):
|
|
|
|
self.header_and_shortids = header_and_shortids
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.header_and_shortids = P2PHeaderAndShortIDs()
|
|
|
|
self.header_and_shortids.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.header_and_shortids.serialize()
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_cmpctblock(HeaderAndShortIDs=%s)" % repr(self.header_and_shortids)
|
|
|
|
|
|
|
|
class msg_getblocktxn:
|
|
|
|
command = b"getblocktxn"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.block_txn_request = None
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.block_txn_request = BlockTransactionsRequest()
|
|
|
|
self.block_txn_request.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.block_txn_request.serialize()
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_getblocktxn(block_txn_request=%s)" % (repr(self.block_txn_request))
|
|
|
|
|
|
|
|
class msg_blocktxn():
|
|
|
|
command = b"blocktxn"
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.block_transactions = BlockTransactions()
|
|
|
|
|
|
|
|
def deserialize(self, f):
|
|
|
|
self.block_transactions.deserialize(f)
|
|
|
|
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.block_transactions.serialize(with_witness=False)
|
|
|
|
return r
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "msg_blocktxn(block_transactions=%s)" % (repr(self.block_transactions))
|
|
|
|
|
|
|
|
class msg_witness_blocktxn(msg_blocktxn):
|
|
|
|
def serialize(self):
|
|
|
|
r = b""
|
|
|
|
r += self.block_transactions.serialize(with_witness=True)
|
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
|
|
# PIVX Classes
|
|
|
|
class Masternode(object):
|
|
|
|
def __init__(self, idx, owner_addr, operator_pk, voting_addr, ipport, payout_addr, operator_sk):
|
|
|
|
self.idx = idx
|
|
|
|
self.owner = owner_addr
|
|
|
|
self.operator_pk = operator_pk
|
|
|
|
self.voting = voting_addr
|
|
|
|
self.ipport = ipport
|
|
|
|
self.payee = payout_addr
|
|
|
|
self.operator_sk = operator_sk
|
|
|
|
self.proTx = None
|
|
|
|
self.collateral = None
|
|
|
|
|
|
|
|
def revoked(self):
|
|
|
|
self.ipport = "[::]:0"
|
|
|
|
self.operator_pk = ""
|
|
|
|
self.operator_sk = None
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "Masternode(idx=%d, owner=%s, operator=%s, voting=%s, ip=%s, payee=%s, opkey=%s, protx=%s, collateral=%s)" % (
|
|
|
|
self.idx, str(self.owner), str(self.operator_pk), str(self.voting), str(self.ipport),
|
|
|
|
str(self.payee), str(self.operator_sk), str(self.proTx), str(self.collateral)
|
|
|
|
)
|
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return self.__repr__()
|