mirror of
https://github.com/XRPLF/rippled.git
synced 2025-12-01 00:15:51 +00:00
RPC: Add proof_solve.
This commit is contained in:
@@ -482,6 +482,16 @@ Json::Value RPCParser::parseProofCreate(const Json::Value& jvParams)
|
||||
return jvRequest;
|
||||
}
|
||||
|
||||
// proof_solve <token>
|
||||
Json::Value RPCParser::parseProofSolve(const Json::Value& jvParams)
|
||||
{
|
||||
Json::Value jvRequest;
|
||||
|
||||
jvRequest["token"] = jvParams[0u].asString();
|
||||
|
||||
return jvRequest;
|
||||
}
|
||||
|
||||
// proof_verify <token> <solution>
|
||||
Json::Value RPCParser::parseProofVerify(const Json::Value& jvParams)
|
||||
{
|
||||
@@ -721,6 +731,7 @@ Json::Value RPCParser::parseCommand(std::string strMethod, Json::Value jvParams)
|
||||
{ "ping", &RPCParser::parseAsIs, 0, 0 },
|
||||
// { "profile", &RPCParser::parseProfile, 1, 9 },
|
||||
{ "proof_create", &RPCParser::parseProofCreate, 0, 1 },
|
||||
{ "proof_solve", &RPCParser::parseProofSolve, 1, 1 },
|
||||
{ "proof_verify", &RPCParser::parseProofVerify, 2, 2 },
|
||||
{ "random", &RPCParser::parseAsIs, 0, 0 },
|
||||
{ "ripple_path_find", &RPCParser::parseRipplePathFind, 1, 2 },
|
||||
|
||||
@@ -35,6 +35,7 @@ protected:
|
||||
Json::Value parseLogLevel(const Json::Value& jvParams);
|
||||
Json::Value parseOwnerInfo(const Json::Value& jvParams);
|
||||
Json::Value parseProofCreate(const Json::Value& jvParams);
|
||||
Json::Value parseProofSolve(const Json::Value& jvParams);
|
||||
Json::Value parseProofVerify(const Json::Value& jvParams);
|
||||
Json::Value parseRandom(const Json::Value& jvParams);
|
||||
Json::Value parseRipplePathFind(const Json::Value& jvParams);
|
||||
|
||||
@@ -5,6 +5,7 @@
|
||||
#include <boost/test/unit_test.hpp>
|
||||
#include <boost/algorithm/string.hpp>
|
||||
#include <boost/format.hpp>
|
||||
#include <boost/regex.hpp>
|
||||
|
||||
#include <openssl/rand.h>
|
||||
|
||||
@@ -48,6 +49,19 @@ const uint256 ProofOfWork::sMinTarget("00000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
|
||||
const int ProofOfWork::sMaxIterations(1 << 23);
|
||||
const int ProofOfWork::sMaxDifficulty(30);
|
||||
|
||||
ProofOfWork::ProofOfWork(const std::string& token)
|
||||
{
|
||||
std::vector<std::string> fields;
|
||||
boost::split(fields, token, boost::algorithm::is_any_of("-"));
|
||||
if (fields.size() != 5)
|
||||
throw std::runtime_error("invalid token");
|
||||
|
||||
mToken = token;
|
||||
mChallenge.SetHex(fields[0]);
|
||||
mTarget.SetHex(fields[1]);
|
||||
mIterations = lexical_cast_s<int>(fields[2]);
|
||||
}
|
||||
|
||||
bool ProofOfWork::isValid() const
|
||||
{
|
||||
if ((mIterations <= sMaxIterations) && (mTarget >= sMinTarget))
|
||||
@@ -141,6 +155,14 @@ bool ProofOfWork::checkSolution(const uint256& solution) const
|
||||
return getSHA512Half(buf2) <= mTarget;
|
||||
}
|
||||
|
||||
bool ProofOfWork::validateToken(const std::string& strToken)
|
||||
{
|
||||
static boost::regex reToken("[[:xdigit:]]{64}-[[:xdigit:]]{64}-[[:digit:]]+-[[:digit:]]+-[[:xdigit:]]{64}");
|
||||
boost::smatch smMatch;
|
||||
|
||||
return boost::regex_match(strToken, smMatch, reToken);
|
||||
}
|
||||
|
||||
ProofOfWorkGenerator::ProofOfWorkGenerator() : mValidTime(180)
|
||||
{
|
||||
setDifficulty(1);
|
||||
|
||||
@@ -43,6 +43,8 @@ public:
|
||||
mToken(token), mChallenge(challenge), mTarget(target), mIterations(iterations)
|
||||
{ ; }
|
||||
|
||||
ProofOfWork(const std::string& token);
|
||||
|
||||
bool isValid() const;
|
||||
|
||||
uint256 solve(int maxIterations = 2 * sMaxIterations) const;
|
||||
@@ -54,6 +56,8 @@ public:
|
||||
// approximate number of hashes needed to solve
|
||||
static uint64 getDifficulty(const uint256& target, int iterations);
|
||||
uint64 getDifficulty() const { return getDifficulty(mTarget, mIterations); }
|
||||
|
||||
static bool validateToken(const std::string& strToken);
|
||||
};
|
||||
|
||||
class ProofOfWorkGenerator
|
||||
|
||||
@@ -910,6 +910,29 @@ Json::Value RPCHandler::doProofCreate(Json::Value jvRequest, int& cost, ScopedLo
|
||||
return jvResult;
|
||||
}
|
||||
|
||||
// {
|
||||
// token: <token>
|
||||
// }
|
||||
Json::Value RPCHandler::doProofSolve(Json::Value jvRequest, int& cost, ScopedLock& MasterLockHolder)
|
||||
{
|
||||
Json::Value jvResult;
|
||||
|
||||
if (!jvRequest.isMember("token"))
|
||||
return rpcError(rpcINVALID_PARAMS);
|
||||
|
||||
std::string strToken = jvRequest["token"].asString();
|
||||
|
||||
if (!ProofOfWork::validateToken(strToken))
|
||||
return rpcError(rpcINVALID_PARAMS);
|
||||
|
||||
ProofOfWork powProof(strToken);
|
||||
uint256 uSolution = powProof.solve();
|
||||
|
||||
jvResult["solution"] = uSolution.GetHex();
|
||||
|
||||
return jvResult;
|
||||
}
|
||||
|
||||
|
||||
// {
|
||||
// token: <token>
|
||||
@@ -3412,6 +3435,7 @@ Json::Value RPCHandler::doCommand(const Json::Value& jvRequest, int iRole, int &
|
||||
{ "ping", &RPCHandler::doPing, false, optNone },
|
||||
// { "profile", &RPCHandler::doProfile, false, optCurrent },
|
||||
{ "proof_create", &RPCHandler::doProofCreate, false, optNone },
|
||||
{ "proof_solve", &RPCHandler::doProofSolve, true, optNone },
|
||||
{ "proof_verify", &RPCHandler::doProofVerify, true, optNone },
|
||||
{ "random", &RPCHandler::doRandom, false, optNone },
|
||||
{ "ripple_path_find", &RPCHandler::doRipplePathFind, false, optCurrent },
|
||||
|
||||
@@ -73,6 +73,7 @@ class RPCHandler
|
||||
Json::Value doPing(Json::Value params, int& cost, ScopedLock& mlh);
|
||||
Json::Value doProfile(Json::Value params, int& cost, ScopedLock& mlh);
|
||||
Json::Value doProofCreate(Json::Value params, int& cost, ScopedLock& mlh);
|
||||
Json::Value doProofSolve(Json::Value params, int& cost, ScopedLock& mlh);
|
||||
Json::Value doProofVerify(Json::Value params, int& cost, ScopedLock& mlh);
|
||||
Json::Value doRandom(Json::Value jvRequest, int& cost, ScopedLock& mlh);
|
||||
Json::Value doRipplePathFind(Json::Value jvRequest, int& cost, ScopedLock& mlh);
|
||||
|
||||
Reference in New Issue
Block a user