From 2d2ba48b7d4c9f2b8dfabd725b4f078a5314f29c Mon Sep 17 00:00:00 2001 From: moneroexamples Date: Thu, 17 Nov 2016 13:30:03 +0800 Subject: [PATCH] key images file magick numbers updated and viewkey input filed added to key images checker --- src/monero_headers.h | 3 ++- src/page.h | 8 ++++---- src/templates/rawkeyimgs.html | 5 ++++- 3 files changed, 10 insertions(+), 6 deletions(-) diff --git a/src/monero_headers.h b/src/monero_headers.h index 9d6f526..50377b3 100644 --- a/src/monero_headers.h +++ b/src/monero_headers.h @@ -9,9 +9,10 @@ #define BLOCKCHAIN_DB DB_LMDB -#define KEY_IMAGE_EXPORT_FILE_MAGIC "Monero key image export\001" #define UNSIGNED_TX_PREFIX "Monero unsigned tx set\002" #define SIGNED_TX_PREFIX "Monero signed tx set\002" +#define KEY_IMAGE_EXPORT_FILE_MAGIC "Monero key image export\002" +#define OUTPUT_EXPORT_FILE_MAGIC "Monero output export\002" #include "net/http_base.h" diff --git a/src/page.h b/src/page.h index 4f36130..0c3777f 100644 --- a/src/page.h +++ b/src/page.h @@ -2018,7 +2018,7 @@ namespace xmreg { } // header is magic + public spend and keys - const size_t header_lenght = magiclen + 2 * sizeof(crypto::public_key); + const size_t header_lenght = 2 * sizeof(crypto::public_key); const size_t key_img_size = sizeof(crypto::key_image); const size_t record_lenght = key_img_size + sizeof(crypto::signature); @@ -2035,11 +2035,11 @@ namespace xmreg { // initalize page template context map mstch::map context { - {"testnet" , testnet}, - {"address" , xmreg::print_address(*xmr_address, testnet)}, + {"testnet" , testnet}, + {"address" , xmreg::print_address(*xmr_address, testnet)}, {"has_total_xmr" , false}, {"total_xmr" , string{}}, - {"key_imgs" , mstch::array{}} + {"key_imgs" , mstch::array{}} }; unique_ptr mylmdb; diff --git a/src/templates/rawkeyimgs.html b/src/templates/rawkeyimgs.html index 555f395..a3e91e2 100644 --- a/src/templates/rawkeyimgs.html +++ b/src/templates/rawkeyimgs.html @@ -25,7 +25,10 @@
Paste base64 encoded, signed key images data here
(In Linux, can get base64 signed raw tx data: base64 signed_key_images | xclip -selection clipboard)
- +

+ Viewkey (key image file data is encoded using your viewkey. Thus is needed for decryption) +
+