2020-07-07 22:50:26 +02:00
|
|
|
#include <bitcoin/address.h>
|
|
|
|
#include <bitcoin/base58.h>
|
|
|
|
#include <bitcoin/chainparams.h>
|
2020-07-07 22:50:21 +02:00
|
|
|
#include <bitcoin/feerate.h>
|
2020-09-03 19:59:55 +02:00
|
|
|
#include <bitcoin/psbt.h>
|
2020-07-07 22:50:26 +02:00
|
|
|
#include <bitcoin/script.h>
|
2019-01-15 04:54:27 +01:00
|
|
|
#include <ccan/crypto/sha256/sha256.h>
|
2019-06-12 02:38:54 +02:00
|
|
|
#include <ccan/json_escape/json_escape.h>
|
2018-12-08 01:39:28 +01:00
|
|
|
#include <ccan/str/hex/hex.h>
|
|
|
|
#include <ccan/tal/str/str.h>
|
2019-02-21 01:45:57 +01:00
|
|
|
#include <common/amount.h>
|
2020-07-07 22:50:26 +02:00
|
|
|
#include <common/bech32.h>
|
2020-05-15 12:29:53 +02:00
|
|
|
#include <common/channel_id.h>
|
2018-12-08 01:39:28 +01:00
|
|
|
#include <common/json_command.h>
|
2019-08-28 05:23:14 +02:00
|
|
|
#include <common/json_helpers.h>
|
2018-12-08 01:39:28 +01:00
|
|
|
#include <common/json_tok.h>
|
|
|
|
#include <common/jsonrpc_errors.h>
|
|
|
|
#include <common/param.h>
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_array(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
const jsmntok_t **arr)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
2018-12-16 05:50:06 +01:00
|
|
|
if (tok->type == JSMN_ARRAY) {
|
|
|
|
*arr = tok;
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok, "should be an array");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_bool(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
bool **b)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
*b = tal(cmd, bool);
|
2018-12-16 05:47:06 +01:00
|
|
|
if (json_to_bool(buffer, tok, *b))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be 'true' or 'false'");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2020-01-29 12:30:00 +01:00
|
|
|
struct command_result *param_millionths(struct command *cmd, const char *name,
|
|
|
|
const char *buffer,
|
|
|
|
const jsmntok_t *tok, uint64_t **num)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
2020-02-19 11:11:36 +01:00
|
|
|
*num = tal(cmd, uint64_t);
|
|
|
|
if (json_to_millionths(buffer, tok, *num))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a non-negative floating-point number");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_escaped_string(struct command *cmd,
|
|
|
|
const char *name,
|
|
|
|
const char * buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
const char **str)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
2019-06-12 02:38:54 +02:00
|
|
|
if (tok->type == JSMN_STRING) {
|
|
|
|
struct json_escape *esc;
|
|
|
|
/* jsmn always gives us ~ well-formed strings. */
|
|
|
|
esc = json_escape_string_(cmd, buffer + tok->start,
|
|
|
|
tok->end - tok->start);
|
|
|
|
*str = json_escape_unescape(cmd, esc);
|
2018-12-08 01:39:28 +01:00
|
|
|
if (*str)
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a string (without \\u)");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_string(struct command *cmd, const char *name,
|
|
|
|
const char * buffer, const jsmntok_t *tok,
|
|
|
|
const char **str)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
*str = tal_strndup(cmd, buffer + tok->start,
|
|
|
|
tok->end - tok->start);
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2019-07-16 03:41:51 +02:00
|
|
|
struct command_result *param_ignore(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
const void *unused)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_label(struct command *cmd, const char *name,
|
|
|
|
const char * buffer, const jsmntok_t *tok,
|
2019-06-12 02:38:54 +02:00
|
|
|
struct json_escape **label)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
/* We accept both strings and number literals here. */
|
2019-06-12 02:38:54 +02:00
|
|
|
*label = json_escape_string_(cmd, buffer + tok->start, tok->end - tok->start);
|
2018-12-08 01:39:28 +01:00
|
|
|
if (*label && (tok->type == JSMN_STRING || json_tok_is_num(buffer, tok)))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a string or number");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_number(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
unsigned int **num)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
*num = tal(cmd, unsigned int);
|
|
|
|
if (json_to_number(buffer, tok, *num))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be an integer");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_sha256(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct sha256 **hash)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
*hash = tal(cmd, struct sha256);
|
|
|
|
if (hex_decode(buffer + tok->start,
|
|
|
|
tok->end - tok->start,
|
|
|
|
*hash, sizeof(**hash)))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a 32 byte hex value");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_u64(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
uint64_t **num)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
|
|
|
*num = tal(cmd, uint64_t);
|
|
|
|
if (json_to_u64(buffer, tok, *num))
|
2018-12-16 05:50:06 +01:00
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be an unsigned 64 bit integer");
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
|
|
|
|
2018-12-16 05:50:06 +01:00
|
|
|
struct command_result *param_tok(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t * tok,
|
|
|
|
const jsmntok_t **out)
|
2018-12-08 01:39:28 +01:00
|
|
|
{
|
2018-12-16 05:50:06 +01:00
|
|
|
*out = tok;
|
|
|
|
return NULL;
|
2018-12-08 01:39:28 +01:00
|
|
|
}
|
2019-02-21 01:45:57 +01:00
|
|
|
|
|
|
|
struct command_result *param_msat(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct amount_msat **msat)
|
|
|
|
{
|
|
|
|
*msat = tal(cmd, struct amount_msat);
|
|
|
|
if (parse_amount_msat(*msat, buffer + tok->start, tok->end - tok->start))
|
|
|
|
return NULL;
|
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a millisatoshi amount");
|
2019-02-21 01:45:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
struct command_result *param_sat(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct amount_sat **sat)
|
|
|
|
{
|
|
|
|
*sat = tal(cmd, struct amount_sat);
|
|
|
|
if (parse_amount_sat(*sat, buffer + tok->start, tok->end - tok->start))
|
|
|
|
return NULL;
|
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a satoshi amount");
|
2019-02-21 01:45:57 +01:00
|
|
|
}
|
|
|
|
|
2019-08-15 19:41:23 +02:00
|
|
|
struct command_result *param_sat_or_all(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct amount_sat **sat)
|
|
|
|
{
|
|
|
|
if (json_tok_streq(buffer, tok, "all")) {
|
|
|
|
*sat = tal(cmd, struct amount_sat);
|
|
|
|
**sat = AMOUNT_SAT(-1ULL);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return param_sat(cmd, name, buffer, tok, sat);
|
|
|
|
}
|
2019-08-28 05:23:14 +02:00
|
|
|
|
|
|
|
struct command_result *param_node_id(struct command *cmd, const char *name,
|
2020-02-04 01:03:22 +01:00
|
|
|
const char *buffer, const jsmntok_t *tok,
|
2019-08-28 05:23:14 +02:00
|
|
|
struct node_id **id)
|
|
|
|
{
|
|
|
|
*id = tal(cmd, struct node_id);
|
|
|
|
if (json_to_node_id(buffer, tok, *id))
|
|
|
|
return NULL;
|
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a node id");
|
2019-08-28 05:23:14 +02:00
|
|
|
}
|
2019-09-30 18:31:27 +02:00
|
|
|
|
|
|
|
struct command_result *param_channel_id(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct channel_id **cid)
|
|
|
|
{
|
|
|
|
*cid = tal(cmd, struct channel_id);
|
|
|
|
if (json_to_channel_id(buffer, tok, *cid))
|
|
|
|
return NULL;
|
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a channel id");
|
2019-09-30 18:31:27 +02:00
|
|
|
}
|
2019-11-07 17:56:06 +01:00
|
|
|
|
|
|
|
struct command_result *param_secret(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct secret **secret)
|
|
|
|
{
|
|
|
|
*secret = tal(cmd, struct secret);
|
|
|
|
if (hex_decode(buffer + tok->start,
|
|
|
|
tok->end - tok->start,
|
|
|
|
*secret, sizeof(**secret)))
|
|
|
|
return NULL;
|
|
|
|
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a 32 byte hex value");
|
2019-11-07 17:56:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
struct command_result *param_bin_from_hex(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
u8 **bin)
|
|
|
|
{
|
|
|
|
*bin = json_tok_bin_from_hex(cmd, buffer, tok);
|
|
|
|
if (bin != NULL)
|
|
|
|
return NULL;
|
2020-08-25 23:20:50 +02:00
|
|
|
|
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a hex value");
|
2019-11-07 17:56:06 +01:00
|
|
|
}
|
2019-11-24 19:09:19 +01:00
|
|
|
|
|
|
|
struct command_result *param_hops_array(struct command *cmd, const char *name,
|
|
|
|
const char *buffer, const jsmntok_t *tok,
|
|
|
|
struct sphinx_hop **hops)
|
|
|
|
{
|
2019-12-05 11:06:28 +01:00
|
|
|
const jsmntok_t *hop, *payloadtok, *pubkeytok;
|
2019-11-24 19:09:19 +01:00
|
|
|
struct sphinx_hop h;
|
|
|
|
size_t i;
|
|
|
|
if (tok->type != JSMN_ARRAY) {
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be an array of hops");
|
2019-11-24 19:09:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
*hops = tal_arr(cmd, struct sphinx_hop, 0);
|
|
|
|
|
|
|
|
json_for_each_arr(i, hop, tok) {
|
|
|
|
payloadtok = json_get_member(buffer, hop, "payload");
|
|
|
|
pubkeytok = json_get_member(buffer, hop, "pubkey");
|
|
|
|
|
|
|
|
if (!pubkeytok)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Hop %zu does not have a pubkey", i);
|
|
|
|
|
|
|
|
if (!payloadtok)
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"Hop %zu does not have a payload", i);
|
|
|
|
|
2019-12-05 11:06:28 +01:00
|
|
|
h.raw_payload = json_tok_bin_from_hex(*hops, buffer, payloadtok);
|
2019-11-24 19:09:19 +01:00
|
|
|
if (!json_to_pubkey(buffer, pubkeytok, &h.pubkey))
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, pubkeytok,
|
|
|
|
"should be a pubkey");
|
2019-11-24 19:09:19 +01:00
|
|
|
|
2019-12-05 11:06:28 +01:00
|
|
|
if (!h.raw_payload)
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer,
|
|
|
|
payloadtok,
|
|
|
|
"should be hex");
|
2019-11-24 19:09:19 +01:00
|
|
|
|
|
|
|
tal_arr_expand(hops, h);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tal_count(*hops) == 0) {
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"At least one hop must be specified.");
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2019-11-25 13:42:23 +01:00
|
|
|
|
|
|
|
struct command_result *param_secrets_array(struct command *cmd,
|
|
|
|
const char *name, const char *buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
struct secret **secrets)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
const jsmntok_t *s;
|
|
|
|
struct secret secret;
|
|
|
|
|
|
|
|
if (tok->type != JSMN_ARRAY) {
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be an array of secrets");
|
2019-11-25 13:42:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
*secrets = tal_arr(cmd, struct secret, 0);
|
|
|
|
json_for_each_arr(i, s, tok) {
|
|
|
|
if (!hex_decode(buffer + s->start, s->end - s->start, &secret,
|
|
|
|
sizeof(secret)))
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"'%s[%zu]' should be a 32 byte hex "
|
|
|
|
"value, not '%.*s'",
|
|
|
|
name, i, s->end - s->start,
|
|
|
|
buffer + s->start);
|
|
|
|
|
|
|
|
tal_arr_expand(secrets, secret);
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
2020-07-07 22:50:21 +02:00
|
|
|
|
|
|
|
struct command_result *param_feerate_val(struct command *cmd,
|
|
|
|
const char *name, const char *buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
u32 **feerate_per_kw)
|
|
|
|
{
|
|
|
|
jsmntok_t base = *tok, suffix = *tok;
|
|
|
|
enum feerate_style style;
|
|
|
|
unsigned int num;
|
|
|
|
|
|
|
|
/* We have to split the number and suffix. */
|
|
|
|
suffix.start = suffix.end;
|
|
|
|
while (suffix.start > base.start && !isdigit(buffer[suffix.start-1])) {
|
|
|
|
suffix.start--;
|
|
|
|
base.end--;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!json_to_number(buffer, &base, &num)) {
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"'%s' prefix should be an integer, not '%.*s'",
|
|
|
|
name, base.end - base.start,
|
|
|
|
buffer + base.start);
|
|
|
|
}
|
|
|
|
|
2020-07-07 22:50:24 +02:00
|
|
|
if (suffix.end == suffix.start
|
2020-07-07 22:50:21 +02:00
|
|
|
|| json_tok_streq(buffer, &suffix,
|
|
|
|
feerate_style_name(FEERATE_PER_KBYTE))) {
|
|
|
|
style = FEERATE_PER_KBYTE;
|
|
|
|
} else if (json_tok_streq(buffer, &suffix,
|
|
|
|
feerate_style_name(FEERATE_PER_KSIPA))) {
|
|
|
|
style = FEERATE_PER_KSIPA;
|
|
|
|
} else {
|
|
|
|
return command_fail(cmd, JSONRPC2_INVALID_PARAMS,
|
|
|
|
"'%s' suffix should be '%s' or '%s', not '%.*s'",
|
|
|
|
name,
|
|
|
|
feerate_style_name(FEERATE_PER_KSIPA),
|
|
|
|
feerate_style_name(FEERATE_PER_KBYTE),
|
|
|
|
suffix.end - suffix.start,
|
|
|
|
buffer + suffix.start);
|
|
|
|
}
|
|
|
|
|
|
|
|
*feerate_per_kw = tal(cmd, u32);
|
|
|
|
**feerate_per_kw = feerate_from_style(num, style);
|
|
|
|
if (**feerate_per_kw < FEERATE_FLOOR)
|
|
|
|
**feerate_per_kw = FEERATE_FLOOR;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-07-07 22:50:26 +02:00
|
|
|
/**
|
|
|
|
* segwit_addr_net_decode - Try to decode a Bech32 address and detect
|
|
|
|
* testnet/mainnet/regtest/signet
|
|
|
|
*
|
|
|
|
* This processes the address and returns a string if it is a Bech32
|
|
|
|
* address specified by BIP173. The string is set whether it is
|
2020-09-22 10:04:05 +02:00
|
|
|
* testnet or signet (both "tb"), mainnet ("bc"), regtest ("bcrt")
|
2020-07-07 22:50:26 +02:00
|
|
|
* It does not check, witness version and program size restrictions.
|
|
|
|
*
|
|
|
|
* Out: witness_version: Pointer to an int that will be updated to contain
|
|
|
|
* the witness program version (between 0 and 16 inclusive).
|
|
|
|
* witness_program: Pointer to a buffer of size 40 that will be updated
|
|
|
|
* to contain the witness program bytes.
|
|
|
|
* witness_program_len: Pointer to a size_t that will be updated to
|
|
|
|
* contain the length of bytes in witness_program.
|
|
|
|
* In: addrz: Pointer to the null-terminated address.
|
|
|
|
* Returns string containing the human readable segment of bech32 address
|
|
|
|
*/
|
|
|
|
static const char *segwit_addr_net_decode(int *witness_version,
|
|
|
|
uint8_t *witness_program,
|
|
|
|
size_t *witness_program_len,
|
|
|
|
const char *addrz,
|
|
|
|
const struct chainparams *chainparams)
|
|
|
|
{
|
|
|
|
if (segwit_addr_decode(witness_version, witness_program,
|
|
|
|
witness_program_len, chainparams->bip173_name,
|
|
|
|
addrz))
|
|
|
|
return chainparams->bip173_name;
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum address_parse_result
|
|
|
|
json_to_address_scriptpubkey(const tal_t *ctx,
|
|
|
|
const struct chainparams *chainparams,
|
|
|
|
const char *buffer,
|
|
|
|
const jsmntok_t *tok, const u8 **scriptpubkey)
|
|
|
|
{
|
|
|
|
struct bitcoin_address destination;
|
|
|
|
int witness_version;
|
|
|
|
/* segwit_addr_net_decode requires a buffer of size 40, and will
|
|
|
|
* not write to the buffer if the address is too long, so a buffer
|
|
|
|
* of fixed size 40 will not overflow. */
|
|
|
|
uint8_t witness_program[40];
|
|
|
|
size_t witness_program_len;
|
|
|
|
|
|
|
|
char *addrz;
|
|
|
|
const char *bip173;
|
|
|
|
|
|
|
|
bool parsed;
|
|
|
|
bool right_network;
|
|
|
|
u8 addr_version;
|
|
|
|
|
|
|
|
parsed =
|
|
|
|
ripemd160_from_base58(&addr_version, &destination.addr,
|
|
|
|
buffer + tok->start, tok->end - tok->start);
|
|
|
|
|
|
|
|
if (parsed) {
|
|
|
|
if (addr_version == chainparams->p2pkh_version) {
|
|
|
|
*scriptpubkey = scriptpubkey_p2pkh(ctx, &destination);
|
|
|
|
return ADDRESS_PARSE_SUCCESS;
|
|
|
|
} else if (addr_version == chainparams->p2sh_version) {
|
|
|
|
*scriptpubkey =
|
|
|
|
scriptpubkey_p2sh_hash(ctx, &destination.addr);
|
|
|
|
return ADDRESS_PARSE_SUCCESS;
|
|
|
|
} else {
|
|
|
|
return ADDRESS_PARSE_WRONG_NETWORK;
|
|
|
|
}
|
|
|
|
/* Insert other parsers that accept pointer+len here. */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Generate null-terminated address. */
|
|
|
|
addrz = tal_dup_arr(ctx, char, buffer + tok->start, tok->end - tok->start, 1);
|
|
|
|
addrz[tok->end - tok->start] = '\0';
|
|
|
|
|
|
|
|
bip173 = segwit_addr_net_decode(&witness_version, witness_program,
|
|
|
|
&witness_program_len, addrz, chainparams);
|
|
|
|
|
|
|
|
if (bip173) {
|
|
|
|
bool witness_ok = false;
|
|
|
|
if (witness_version == 0 && (witness_program_len == 20 ||
|
|
|
|
witness_program_len == 32)) {
|
|
|
|
witness_ok = true;
|
|
|
|
}
|
|
|
|
/* Insert other witness versions here. */
|
|
|
|
|
|
|
|
if (witness_ok) {
|
|
|
|
*scriptpubkey = scriptpubkey_witness_raw(ctx, witness_version,
|
|
|
|
witness_program, witness_program_len);
|
|
|
|
parsed = true;
|
|
|
|
right_network = streq(bip173, chainparams->bip173_name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Insert other parsers that accept null-terminated string here. */
|
|
|
|
|
|
|
|
tal_free(addrz);
|
|
|
|
|
|
|
|
if (parsed) {
|
|
|
|
if (right_network)
|
|
|
|
return ADDRESS_PARSE_SUCCESS;
|
|
|
|
else
|
|
|
|
return ADDRESS_PARSE_WRONG_NETWORK;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ADDRESS_PARSE_UNRECOGNIZED;
|
|
|
|
}
|
2020-07-07 22:50:28 +02:00
|
|
|
|
|
|
|
struct command_result *param_txid(struct command *cmd,
|
|
|
|
const char *name,
|
|
|
|
const char *buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
struct bitcoin_txid **txid)
|
|
|
|
{
|
|
|
|
*txid = tal(cmd, struct bitcoin_txid);
|
|
|
|
if (json_to_txid(buffer, tok, *txid))
|
|
|
|
return NULL;
|
2020-08-25 23:20:50 +02:00
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"should be a txid");
|
2020-07-07 22:50:28 +02:00
|
|
|
}
|
2020-08-07 03:21:33 +02:00
|
|
|
|
|
|
|
struct command_result *param_bitcoin_address(struct command *cmd,
|
|
|
|
const char *name,
|
|
|
|
const char *buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
const u8 **scriptpubkey)
|
|
|
|
{
|
|
|
|
/* Parse address. */
|
|
|
|
switch (json_to_address_scriptpubkey(cmd,
|
|
|
|
chainparams,
|
|
|
|
buffer, tok,
|
|
|
|
scriptpubkey)) {
|
|
|
|
case ADDRESS_PARSE_UNRECOGNIZED:
|
|
|
|
return command_fail(cmd, LIGHTNINGD,
|
|
|
|
"Could not parse destination address, "
|
|
|
|
"%s should be a valid address",
|
|
|
|
name ? name : "address field");
|
|
|
|
case ADDRESS_PARSE_WRONG_NETWORK:
|
|
|
|
return command_fail(cmd, LIGHTNINGD,
|
|
|
|
"Destination address is not on network %s",
|
|
|
|
chainparams->network_name);
|
|
|
|
case ADDRESS_PARSE_SUCCESS:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
2020-09-03 19:59:55 +02:00
|
|
|
|
|
|
|
struct command_result *param_psbt(struct command *cmd,
|
|
|
|
const char *name,
|
|
|
|
const char *buffer,
|
|
|
|
const jsmntok_t *tok,
|
|
|
|
struct wally_psbt **psbt)
|
|
|
|
{
|
|
|
|
*psbt = psbt_from_b64(cmd, buffer + tok->start, tok->end - tok->start);
|
|
|
|
if (*psbt)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return command_fail_badparam(cmd, name, buffer, tok,
|
|
|
|
"Expected a PSBT");
|
|
|
|
}
|