Coverage Report

Created: 2026-04-29 19:21

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/tmp/bitcoin/src/wallet/walletdb.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <bitcoin-build-config.h> // IWYU pragma: keep
7
8
#include <wallet/walletdb.h>
9
10
#include <common/system.h>
11
#include <key_io.h>
12
#include <primitives/transaction_identifier.h>
13
#include <protocol.h>
14
#include <script/script.h>
15
#include <serialize.h>
16
#include <sync.h>
17
#include <util/bip32.h>
18
#include <util/check.h>
19
#include <util/fs.h>
20
#include <util/time.h>
21
#include <util/translation.h>
22
#include <wallet/migrate.h>
23
#include <wallet/sqlite.h>
24
#include <wallet/wallet.h>
25
26
#include <atomic>
27
#include <optional>
28
#include <string>
29
30
namespace wallet {
31
namespace DBKeys {
32
const std::string ACENTRY{"acentry"};
33
const std::string ACTIVEEXTERNALSPK{"activeexternalspk"};
34
const std::string ACTIVEINTERNALSPK{"activeinternalspk"};
35
const std::string BESTBLOCK_NOMERKLE{"bestblock_nomerkle"};
36
const std::string BESTBLOCK{"bestblock"};
37
const std::string CRYPTED_KEY{"ckey"};
38
const std::string CSCRIPT{"cscript"};
39
const std::string DEFAULTKEY{"defaultkey"};
40
const std::string DESTDATA{"destdata"};
41
const std::string FLAGS{"flags"};
42
const std::string HDCHAIN{"hdchain"};
43
const std::string KEYMETA{"keymeta"};
44
const std::string KEY{"key"};
45
const std::string LOCKED_UTXO{"lockedutxo"};
46
const std::string MASTER_KEY{"mkey"};
47
const std::string MINVERSION{"minversion"};
48
const std::string NAME{"name"};
49
const std::string OLD_KEY{"wkey"};
50
const std::string ORDERPOSNEXT{"orderposnext"};
51
const std::string POOL{"pool"};
52
const std::string PURPOSE{"purpose"};
53
const std::string SETTINGS{"settings"};
54
const std::string TX{"tx"};
55
const std::string VERSION{"version"};
56
const std::string WALLETDESCRIPTOR{"walletdescriptor"};
57
const std::string WALLETDESCRIPTORCACHE{"walletdescriptorcache"};
58
const std::string WALLETDESCRIPTORLHCACHE{"walletdescriptorlhcache"};
59
const std::string WALLETDESCRIPTORCKEY{"walletdescriptorckey"};
60
const std::string WALLETDESCRIPTORKEY{"walletdescriptorkey"};
61
const std::string WATCHMETA{"watchmeta"};
62
const std::string WATCHS{"watchs"};
63
const std::unordered_set<std::string> LEGACY_TYPES{CRYPTED_KEY, CSCRIPT, DEFAULTKEY, HDCHAIN, KEYMETA, KEY, OLD_KEY, POOL, WATCHMETA, WATCHS};
64
} // namespace DBKeys
65
66
void LogDBInfo()
67
392
{
68
    // Add useful DB information here. This will be printed during startup.
69
392
    LogInfo("Using SQLite Version %s", SQLiteDatabaseVersion());
70
392
}
71
72
//
73
// WalletBatch
74
//
75
76
bool WalletBatch::WriteName(const std::string& strAddress, const std::string& strName)
77
28.0k
{
78
28.0k
    return WriteIC(std::make_pair(DBKeys::NAME, strAddress), strName);
79
28.0k
}
80
81
bool WalletBatch::EraseName(const std::string& strAddress)
82
27
{
83
    // This should only be used for sending addresses, never for receiving addresses,
84
    // receiving addresses must always have an address book entry if they're not change return.
85
27
    return EraseIC(std::make_pair(DBKeys::NAME, strAddress));
86
27
}
87
88
bool WalletBatch::WritePurpose(const std::string& strAddress, const std::string& strPurpose)
89
28.0k
{
90
28.0k
    return WriteIC(std::make_pair(DBKeys::PURPOSE, strAddress), strPurpose);
91
28.0k
}
92
93
bool WalletBatch::ErasePurpose(const std::string& strAddress)
94
27
{
95
27
    return EraseIC(std::make_pair(DBKeys::PURPOSE, strAddress));
96
27
}
97
98
bool WalletBatch::WriteTx(const CWalletTx& wtx)
99
23.2k
{
100
23.2k
    return WriteIC(std::make_pair(DBKeys::TX, wtx.GetHash()), wtx);
101
23.2k
}
102
103
bool WalletBatch::EraseTx(Txid hash)
104
17
{
105
17
    return EraseIC(std::make_pair(DBKeys::TX, hash.ToUint256()));
106
17
}
107
108
bool WalletBatch::WriteKeyMetadata(const CKeyMetadata& meta, const CPubKey& pubkey, const bool overwrite)
109
0
{
110
0
    return WriteIC(std::make_pair(DBKeys::KEYMETA, pubkey), meta, overwrite);
111
0
}
112
113
bool WalletBatch::WriteKey(const CPubKey& vchPubKey, const CPrivKey& vchPrivKey, const CKeyMetadata& keyMeta)
114
0
{
115
0
    if (!WriteKeyMetadata(keyMeta, vchPubKey, false)) {
116
0
        return false;
117
0
    }
118
119
    // hash pubkey/privkey to accelerate wallet load
120
0
    const auto keypair_hash = Hash(vchPubKey, vchPrivKey);
121
122
0
    return WriteIC(std::make_pair(DBKeys::KEY, vchPubKey), std::make_pair(vchPrivKey, keypair_hash), false);
123
0
}
124
125
bool WalletBatch::WriteCryptedKey(const CPubKey& vchPubKey,
126
                                const std::vector<unsigned char>& vchCryptedSecret,
127
                                const CKeyMetadata &keyMeta)
128
0
{
129
0
    if (!WriteKeyMetadata(keyMeta, vchPubKey, true)) {
130
0
        return false;
131
0
    }
132
133
    // Compute a checksum of the encrypted key
134
0
    uint256 checksum = Hash(vchCryptedSecret);
135
136
0
    const auto key = std::make_pair(DBKeys::CRYPTED_KEY, vchPubKey);
137
0
    if (!WriteIC(key, std::make_pair(vchCryptedSecret, checksum), false)) {
138
        // It may already exist, so try writing just the checksum
139
0
        std::vector<unsigned char> val;
140
0
        if (!m_batch->Read(key, val)) {
141
0
            return false;
142
0
        }
143
0
        if (!WriteIC(key, std::make_pair(val, checksum), true)) {
144
0
            return false;
145
0
        }
146
0
    }
147
0
    EraseIC(std::make_pair(DBKeys::KEY, vchPubKey));
148
0
    return true;
149
0
}
150
151
bool WalletBatch::WriteMasterKey(unsigned int nID, const CMasterKey& kMasterKey)
152
26
{
153
26
    return WriteIC(std::make_pair(DBKeys::MASTER_KEY, nID), kMasterKey, true);
154
26
}
155
156
bool WalletBatch::EraseMasterKey(unsigned int id)
157
1
{
158
1
    return EraseIC(std::make_pair(DBKeys::MASTER_KEY, id));
159
1
}
160
161
bool WalletBatch::WriteWatchOnly(const CScript &dest, const CKeyMetadata& keyMeta)
162
0
{
163
0
    if (!WriteIC(std::make_pair(DBKeys::WATCHMETA, dest), keyMeta)) {
164
0
        return false;
165
0
    }
166
0
    return WriteIC(std::make_pair(DBKeys::WATCHS, dest), uint8_t{'1'});
167
0
}
168
169
bool WalletBatch::EraseWatchOnly(const CScript &dest)
170
0
{
171
0
    if (!EraseIC(std::make_pair(DBKeys::WATCHMETA, dest))) {
172
0
        return false;
173
0
    }
174
0
    return EraseIC(std::make_pair(DBKeys::WATCHS, dest));
175
0
}
176
177
bool WalletBatch::WriteBestBlock(const CBlockLocator& locator)
178
13.5k
{
179
13.5k
    WriteIC(DBKeys::BESTBLOCK, CBlockLocator()); // Write empty block locator so versions that require a merkle branch automatically rescan
180
13.5k
    return WriteIC(DBKeys::BESTBLOCK_NOMERKLE, locator);
181
13.5k
}
182
183
bool WalletBatch::ReadBestBlock(CBlockLocator& locator)
184
1.80k
{
185
1.80k
    if (m_batch->Read(DBKeys::BESTBLOCK, locator) && !locator.vHave.empty()) return true;
186
1.80k
    return m_batch->Read(DBKeys::BESTBLOCK_NOMERKLE, locator);
187
1.80k
}
188
189
bool WalletBatch::IsEncrypted()
190
0
{
191
0
    DataStream prefix;
192
0
    prefix << DBKeys::MASTER_KEY;
193
0
    if (auto cursor = m_batch->GetNewPrefixCursor(prefix)) {
194
0
        DataStream k, v;
195
0
        if (cursor->Next(k, v) == DatabaseCursor::Status::MORE) return true;
196
0
    }
197
0
    return false;
198
0
}
199
200
bool WalletBatch::WriteOrderPosNext(int64_t nOrderPosNext)
201
17.6k
{
202
17.6k
    return WriteIC(DBKeys::ORDERPOSNEXT, nOrderPosNext);
203
17.6k
}
204
205
bool WalletBatch::WriteActiveScriptPubKeyMan(uint8_t type, const uint256& id, bool internal)
206
4.03k
{
207
4.03k
    std::string key = internal ? DBKeys::ACTIVEINTERNALSPK : DBKeys::ACTIVEEXTERNALSPK;
208
4.03k
    return WriteIC(make_pair(key, type), id);
209
4.03k
}
210
211
bool WalletBatch::EraseActiveScriptPubKeyMan(uint8_t type, bool internal)
212
1
{
213
1
    const std::string key{internal ? DBKeys::ACTIVEINTERNALSPK : DBKeys::ACTIVEEXTERNALSPK};
214
1
    return EraseIC(make_pair(key, type));
215
1
}
216
217
bool WalletBatch::WriteDescriptorKey(const uint256& desc_id, const CPubKey& pubkey, const CPrivKey& privkey)
218
4.24k
{
219
    // hash pubkey/privkey to accelerate wallet load
220
4.24k
    const auto keypair_hash = Hash(pubkey, privkey);
221
222
4.24k
    return WriteIC(std::make_pair(DBKeys::WALLETDESCRIPTORKEY, std::make_pair(desc_id, pubkey)), std::make_pair(privkey, keypair_hash), false);
223
4.24k
}
224
225
bool WalletBatch::WriteCryptedDescriptorKey(const uint256& desc_id, const CPubKey& pubkey, const std::vector<unsigned char>& secret)
226
265
{
227
265
    if (!WriteIC(std::make_pair(DBKeys::WALLETDESCRIPTORCKEY, std::make_pair(desc_id, pubkey)), secret, false)) {
228
0
        return false;
229
0
    }
230
265
    EraseIC(std::make_pair(DBKeys::WALLETDESCRIPTORKEY, std::make_pair(desc_id, pubkey)));
231
265
    return true;
232
265
}
233
234
bool WalletBatch::WriteDescriptor(const uint256& desc_id, const WalletDescriptor& descriptor)
235
102k
{
236
102k
    return WriteIC(make_pair(DBKeys::WALLETDESCRIPTOR, desc_id), descriptor);
237
102k
}
238
239
bool WalletBatch::WriteDescriptorDerivedCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index, uint32_t der_index)
240
10.0k
{
241
10.0k
    std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE);
242
10.0k
    xpub.Encode(ser_xpub.data());
243
10.0k
    return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORCACHE, desc_id), std::make_pair(key_exp_index, der_index)), ser_xpub);
244
10.0k
}
245
246
bool WalletBatch::WriteDescriptorParentCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index)
247
5.05k
{
248
5.05k
    std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE);
249
5.05k
    xpub.Encode(ser_xpub.data());
250
5.05k
    return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORCACHE, desc_id), key_exp_index), ser_xpub);
251
5.05k
}
252
253
bool WalletBatch::WriteDescriptorLastHardenedCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index)
254
3.83k
{
255
3.83k
    std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE);
256
3.83k
    xpub.Encode(ser_xpub.data());
257
3.83k
    return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORLHCACHE, desc_id), key_exp_index), ser_xpub);
258
3.83k
}
259
260
bool WalletBatch::WriteDescriptorCacheItems(const uint256& desc_id, const DescriptorCache& cache)
261
412k
{
262
412k
    for (const auto& parent_xpub_pair : cache.GetCachedParentExtPubKeys()) {
263
5.05k
        if (!WriteDescriptorParentCache(parent_xpub_pair.second, desc_id, parent_xpub_pair.first)) {
264
0
            return false;
265
0
        }
266
5.05k
    }
267
412k
    for (const auto& derived_xpub_map_pair : cache.GetCachedDerivedExtPubKeys()) {
268
10.0k
        for (const auto& derived_xpub_pair : derived_xpub_map_pair.second) {
269
10.0k
            if (!WriteDescriptorDerivedCache(derived_xpub_pair.second, desc_id, derived_xpub_map_pair.first, derived_xpub_pair.first)) {
270
0
                return false;
271
0
            }
272
10.0k
        }
273
10.0k
    }
274
412k
    for (const auto& lh_xpub_pair : cache.GetCachedLastHardenedExtPubKeys()) {
275
3.83k
        if (!WriteDescriptorLastHardenedCache(lh_xpub_pair.second, desc_id, lh_xpub_pair.first)) {
276
0
            return false;
277
0
        }
278
3.83k
    }
279
412k
    return true;
280
412k
}
281
282
bool WalletBatch::WriteLockedUTXO(const COutPoint& output)
283
1
{
284
1
    return WriteIC(std::make_pair(DBKeys::LOCKED_UTXO, std::make_pair(output.hash, output.n)), uint8_t{'1'});
285
1
}
286
287
bool WalletBatch::EraseLockedUTXO(const COutPoint& output)
288
1
{
289
1
    return EraseIC(std::make_pair(DBKeys::LOCKED_UTXO, std::make_pair(output.hash, output.n)));
290
1
}
291
292
bool LoadKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr)
293
193
{
294
193
    LOCK(pwallet->cs_wallet);
295
193
    try {
296
193
        CPubKey vchPubKey;
297
193
        ssKey >> vchPubKey;
298
193
        if (!vchPubKey.IsValid())
299
0
        {
300
0
            strErr = "Error reading wallet database: CPubKey corrupt";
301
0
            return false;
302
0
        }
303
193
        CKey key;
304
193
        CPrivKey pkey;
305
193
        uint256 hash;
306
307
193
        ssValue >> pkey;
308
309
        // Old wallets store keys as DBKeys::KEY [pubkey] => [privkey]
310
        // ... which was slow for wallets with lots of keys, because the public key is re-derived from the private key
311
        // using EC operations as a checksum.
312
        // Newer wallets store keys as DBKeys::KEY [pubkey] => [privkey][hash(pubkey,privkey)], which is much faster while
313
        // remaining backwards-compatible.
314
193
        try
315
193
        {
316
193
            ssValue >> hash;
317
193
        }
318
193
        catch (const std::ios_base::failure&) {}
319
320
193
        bool fSkipCheck = false;
321
322
193
        if (!hash.IsNull())
323
193
        {
324
            // hash pubkey/privkey to accelerate wallet load
325
193
            const auto keypair_hash = Hash(vchPubKey, pkey);
326
327
193
            if (keypair_hash != hash)
328
0
            {
329
0
                strErr = "Error reading wallet database: CPubKey/CPrivKey corrupt";
330
0
                return false;
331
0
            }
332
333
193
            fSkipCheck = true;
334
193
        }
335
336
193
        if (!key.Load(pkey, vchPubKey, fSkipCheck))
337
0
        {
338
0
            strErr = "Error reading wallet database: CPrivKey corrupt";
339
0
            return false;
340
0
        }
341
193
        if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadKey(key, vchPubKey))
342
0
        {
343
0
            strErr = "Error reading wallet database: LegacyDataSPKM::LoadKey failed";
344
0
            return false;
345
0
        }
346
193
    } catch (const std::exception& e) {
347
0
        if (strErr.empty()) {
348
0
            strErr = e.what();
349
0
        }
350
0
        return false;
351
0
    }
352
193
    return true;
353
193
}
354
355
bool LoadCryptedKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr)
356
24
{
357
24
    LOCK(pwallet->cs_wallet);
358
24
    try {
359
24
        CPubKey vchPubKey;
360
24
        ssKey >> vchPubKey;
361
24
        if (!vchPubKey.IsValid())
362
0
        {
363
0
            strErr = "Error reading wallet database: CPubKey corrupt";
364
0
            return false;
365
0
        }
366
24
        std::vector<unsigned char> vchPrivKey;
367
24
        ssValue >> vchPrivKey;
368
369
        // Get the checksum and check it
370
24
        bool checksum_valid = false;
371
24
        if (!ssValue.empty()) {
372
24
            uint256 checksum;
373
24
            ssValue >> checksum;
374
24
            if (!(checksum_valid = Hash(vchPrivKey) == checksum)) {
375
0
                strErr = "Error reading wallet database: Encrypted key corrupt";
376
0
                return false;
377
0
            }
378
24
        }
379
380
24
        if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadCryptedKey(vchPubKey, vchPrivKey, checksum_valid))
381
0
        {
382
0
            strErr = "Error reading wallet database: LegacyDataSPKM::LoadCryptedKey failed";
383
0
            return false;
384
0
        }
385
24
    } catch (const std::exception& e) {
386
0
        if (strErr.empty()) {
387
0
            strErr = e.what();
388
0
        }
389
0
        return false;
390
0
    }
391
24
    return true;
392
24
}
393
394
bool LoadEncryptionKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr)
395
17
{
396
17
    LOCK(pwallet->cs_wallet);
397
17
    try {
398
        // Master encryption key is loaded into only the wallet and not any of the ScriptPubKeyMans.
399
17
        unsigned int nID;
400
17
        ssKey >> nID;
401
17
        CMasterKey kMasterKey;
402
17
        ssValue >> kMasterKey;
403
17
        if(pwallet->mapMasterKeys.contains(nID))
404
0
        {
405
0
            strErr = strprintf("Error reading wallet database: duplicate CMasterKey id %u", nID);
406
0
            return false;
407
0
        }
408
17
        pwallet->mapMasterKeys[nID] = kMasterKey;
409
17
        if (pwallet->nMasterKeyMaxID < nID)
410
17
            pwallet->nMasterKeyMaxID = nID;
411
412
17
    } catch (const std::exception& e) {
413
0
        if (strErr.empty()) {
414
0
            strErr = e.what();
415
0
        }
416
0
        return false;
417
0
    }
418
17
    return true;
419
17
}
420
421
bool LoadHDChain(CWallet* pwallet, DataStream& ssValue, std::string& strErr)
422
33
{
423
33
    LOCK(pwallet->cs_wallet);
424
33
    try {
425
33
        CHDChain chain;
426
33
        ssValue >> chain;
427
33
        pwallet->GetOrCreateLegacyDataSPKM()->LoadHDChain(chain);
428
33
    } catch (const std::exception& e) {
429
0
        if (strErr.empty()) {
430
0
            strErr = e.what();
431
0
        }
432
0
        return false;
433
0
    }
434
33
    return true;
435
33
}
436
437
static DBErrors LoadWalletFlags(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
438
360
{
439
360
    AssertLockHeld(pwallet->cs_wallet);
440
360
    uint64_t flags;
441
360
    if (batch.Read(DBKeys::FLAGS, flags)) {
442
354
        if (!pwallet->LoadWalletFlags(flags)) {
443
0
            pwallet->WalletLogPrintf("Error reading wallet database: Unknown non-tolerable wallet flags found\n");
444
0
            return DBErrors::TOO_NEW;
445
0
        }
446
        // All wallets must be descriptor wallets unless opened with a bdb_ro db
447
        // bdb_ro is only used for legacy to descriptor migration.
448
354
        if (pwallet->GetDatabase().Format() != "bdb_ro" && !pwallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
449
0
            return DBErrors::LEGACY_WALLET;
450
0
        }
451
354
    }
452
360
    return DBErrors::LOAD_OK;
453
360
}
454
455
struct LoadResult
456
{
457
    DBErrors m_result{DBErrors::LOAD_OK};
458
    int m_records{0};
459
};
460
461
using LoadFunc = std::function<DBErrors(CWallet* pwallet, DataStream& key, DataStream& value, std::string& err)>;
462
static LoadResult LoadRecords(CWallet* pwallet, DatabaseBatch& batch, const std::string& key, DataStream& prefix, LoadFunc load_func)
463
14.0k
{
464
14.0k
    LoadResult result;
465
14.0k
    DataStream ssKey;
466
14.0k
    DataStream ssValue{};
467
468
14.0k
    Assume(!prefix.empty());
469
14.0k
    std::unique_ptr<DatabaseCursor> cursor = batch.GetNewPrefixCursor(prefix);
470
14.0k
    if (!cursor) {
471
0
        pwallet->WalletLogPrintf("Error getting database cursor for '%s' records\n", key);
472
0
        result.m_result = DBErrors::CORRUPT;
473
0
        return result;
474
0
    }
475
476
38.5k
    while (true) {
477
38.5k
        DatabaseCursor::Status status = cursor->Next(ssKey, ssValue);
478
38.5k
        if (status == DatabaseCursor::Status::DONE) {
479
14.0k
            break;
480
24.5k
        } else if (status == DatabaseCursor::Status::FAIL) {
481
0
            pwallet->WalletLogPrintf("Error reading next '%s' record for wallet database\n", key);
482
0
            result.m_result = DBErrors::CORRUPT;
483
0
            return result;
484
0
        }
485
24.5k
        std::string type;
486
24.5k
        ssKey >> type;
487
24.5k
        assert(type == key);
488
24.5k
        std::string error;
489
24.5k
        DBErrors record_res = load_func(pwallet, ssKey, ssValue, error);
490
24.5k
        if (record_res != DBErrors::LOAD_OK) {
491
3
            pwallet->WalletLogPrintf("%s\n", error);
492
3
        }
493
24.5k
        result.m_result = std::max(result.m_result, record_res);
494
24.5k
        ++result.m_records;
495
24.5k
    }
496
14.0k
    return result;
497
14.0k
}
498
499
static LoadResult LoadRecords(CWallet* pwallet, DatabaseBatch& batch, const std::string& key, LoadFunc load_func)
500
4.05k
{
501
4.05k
    DataStream prefix;
502
4.05k
    prefix << key;
503
4.05k
    return LoadRecords(pwallet, batch, key, prefix, load_func);
504
4.05k
}
505
506
bool HasLegacyRecords(CWallet& wallet)
507
43
{
508
43
    const auto& batch = wallet.GetDatabase().MakeBatch();
509
43
    return HasLegacyRecords(wallet, *batch);
510
43
}
511
512
bool HasLegacyRecords(CWallet& wallet, DatabaseBatch& batch)
513
351
{
514
3.18k
    for (const auto& type : DBKeys::LEGACY_TYPES) {
515
3.18k
        DataStream key;
516
3.18k
        DataStream value{};
517
3.18k
        DataStream prefix;
518
519
3.18k
        prefix << type;
520
3.18k
        std::unique_ptr<DatabaseCursor> cursor = batch.GetNewPrefixCursor(prefix);
521
3.18k
        if (!cursor) {
522
            // Could only happen on a closed db, which means there is an error in the code flow.
523
0
            throw std::runtime_error(strprintf("Error getting database cursor for '%s' records", type));
524
0
        }
525
526
3.18k
        DatabaseCursor::Status status = cursor->Next(key, value);
527
3.18k
        if (status != DatabaseCursor::Status::DONE) {
528
41
            return true;
529
41
        }
530
3.18k
    }
531
310
    return false;
532
351
}
533
534
static DBErrors LoadLegacyWalletRecords(CWallet* pwallet, DatabaseBatch& batch, int last_client) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
535
360
{
536
360
    AssertLockHeld(pwallet->cs_wallet);
537
360
    DBErrors result = DBErrors::LOAD_OK;
538
539
    // Make sure descriptor wallets don't have any legacy records
540
360
    if (pwallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
541
308
        if (HasLegacyRecords(*pwallet, batch)) {
542
1
            pwallet->WalletLogPrintf("Error: Unexpected legacy entry found in descriptor wallet %s. The wallet might have been tampered with or created with malicious intent.\n", pwallet->GetName());
543
1
            return DBErrors::UNEXPECTED_LEGACY_ENTRY;
544
1
        }
545
546
307
        return DBErrors::LOAD_OK;
547
308
    }
548
549
    // Load HD Chain
550
    // Note: There should only be one HDCHAIN record with no data following the type
551
52
    LoadResult hd_chain_res = LoadRecords(pwallet, batch, DBKeys::HDCHAIN,
552
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
553
33
        return LoadHDChain(pwallet, value, err) ? DBErrors:: LOAD_OK : DBErrors::CORRUPT;
554
33
    });
555
52
    result = std::max(result, hd_chain_res.m_result);
556
557
    // Load unencrypted keys
558
52
    LoadResult key_res = LoadRecords(pwallet, batch, DBKeys::KEY,
559
193
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
560
193
        return LoadKey(pwallet, key, value, err) ? DBErrors::LOAD_OK : DBErrors::CORRUPT;
561
193
    });
562
52
    result = std::max(result, key_res.m_result);
563
564
    // Load encrypted keys
565
52
    LoadResult ckey_res = LoadRecords(pwallet, batch, DBKeys::CRYPTED_KEY,
566
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
567
24
        return LoadCryptedKey(pwallet, key, value, err) ? DBErrors::LOAD_OK : DBErrors::CORRUPT;
568
24
    });
569
52
    result = std::max(result, ckey_res.m_result);
570
571
    // Load scripts
572
52
    LoadResult script_res = LoadRecords(pwallet, batch, DBKeys::CSCRIPT,
573
88
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) {
574
88
        uint160 hash;
575
88
        key >> hash;
576
88
        CScript script;
577
88
        value >> script;
578
88
        if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadCScript(script))
579
0
        {
580
0
            strErr = "Error reading wallet database: LegacyDataSPKM::LoadCScript failed";
581
0
            return DBErrors::NONCRITICAL_ERROR;
582
0
        }
583
88
        return DBErrors::LOAD_OK;
584
88
    });
585
52
    result = std::max(result, script_res.m_result);
586
587
    // Load keymeta
588
52
    std::map<uint160, CHDChain> hd_chains;
589
52
    LoadResult keymeta_res = LoadRecords(pwallet, batch, DBKeys::KEYMETA,
590
221
        [&hd_chains] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) {
591
221
        CPubKey vchPubKey;
592
221
        key >> vchPubKey;
593
221
        CKeyMetadata keyMeta;
594
221
        value >> keyMeta;
595
221
        pwallet->GetOrCreateLegacyDataSPKM()->LoadKeyMetadata(vchPubKey.GetID(), keyMeta);
596
597
        // Extract some CHDChain info from this metadata if it has any
598
221
        if (keyMeta.nVersion >= CKeyMetadata::VERSION_WITH_HDDATA && !keyMeta.hd_seed_id.IsNull() && keyMeta.hdKeypath.size() > 0) {
599
            // Get the path from the key origin or from the path string
600
            // Not applicable when path is "s" or "m" as those indicate a seed
601
            // See https://github.com/bitcoin/bitcoin/pull/12924
602
212
            bool internal = false;
603
212
            uint32_t index = 0;
604
212
            if (keyMeta.hdKeypath != "s" && keyMeta.hdKeypath != "m") {
605
173
                std::vector<uint32_t> path;
606
173
                if (keyMeta.has_key_origin) {
607
                    // We have a key origin, so pull it from its path vector
608
173
                    path = keyMeta.key_origin.path;
609
173
                } else {
610
                    // No key origin, have to parse the string
611
0
                    if (!ParseHDKeypath(keyMeta.hdKeypath, path)) {
612
0
                        strErr = "Error reading wallet database: keymeta with invalid HD keypath";
613
0
                        return DBErrors::NONCRITICAL_ERROR;
614
0
                    }
615
0
                }
616
617
                // Extract the index and internal from the path
618
                // Path string is m/0'/k'/i'
619
                // Path vector is [0', k', i'] (but as ints OR'd with the hardened bit
620
                // k == 0 for external, 1 for internal. i is the index
621
173
                if (path.size() != 3) {
622
1
                    strErr = "Error reading wallet database: keymeta found with unexpected path";
623
1
                    return DBErrors::NONCRITICAL_ERROR;
624
1
                }
625
172
                if (path[0] != 0x80000000) {
626
0
                    strErr = strprintf("Unexpected path index of 0x%08x (expected 0x80000000) for the element at index 0", path[0]);
627
0
                    return DBErrors::NONCRITICAL_ERROR;
628
0
                }
629
172
                if (path[1] != 0x80000000 && path[1] != (1 | 0x80000000)) {
630
0
                    strErr = strprintf("Unexpected path index of 0x%08x (expected 0x80000000 or 0x80000001) for the element at index 1", path[1]);
631
0
                    return DBErrors::NONCRITICAL_ERROR;
632
0
                }
633
172
                if ((path[2] & 0x80000000) == 0) {
634
0
                    strErr = strprintf("Unexpected path index of 0x%08x (expected to be greater than or equal to 0x80000000)", path[2]);
635
0
                    return DBErrors::NONCRITICAL_ERROR;
636
0
                }
637
172
                internal = path[1] == (1 | 0x80000000);
638
172
                index = path[2] & ~0x80000000;
639
172
            }
640
641
            // Insert a new CHDChain, or get the one that already exists
642
211
            auto [ins, inserted] = hd_chains.emplace(keyMeta.hd_seed_id, CHDChain());
643
211
            CHDChain& chain = ins->second;
644
211
            if (inserted) {
645
                // For new chains, we want to default to VERSION_HD_BASE until we see an internal
646
39
                chain.nVersion = CHDChain::VERSION_HD_BASE;
647
39
                chain.seed_id = keyMeta.hd_seed_id;
648
39
            }
649
211
            if (internal) {
650
69
                chain.nVersion = CHDChain::VERSION_HD_CHAIN_SPLIT;
651
69
                chain.nInternalChainCounter = std::max(chain.nInternalChainCounter, index + 1);
652
142
            } else {
653
142
                chain.nExternalChainCounter = std::max(chain.nExternalChainCounter, index + 1);
654
142
            }
655
211
        }
656
220
        return DBErrors::LOAD_OK;
657
221
    });
658
52
    result = std::max(result, keymeta_res.m_result);
659
660
    // Set inactive chains
661
52
    if (!hd_chains.empty()) {
662
33
        LegacyDataSPKM* legacy_spkm = pwallet->GetLegacyDataSPKM();
663
33
        if (legacy_spkm) {
664
39
            for (const auto& [hd_seed_id, chain] : hd_chains) {
665
39
                if (hd_seed_id != legacy_spkm->GetHDChain().seed_id) {
666
6
                    legacy_spkm->AddInactiveHDChain(chain);
667
6
                }
668
39
            }
669
33
        } else {
670
0
            pwallet->WalletLogPrintf("Inactive HD Chains found but no Legacy ScriptPubKeyMan\n");
671
0
            result = DBErrors::CORRUPT;
672
0
        }
673
33
    }
674
675
    // Load watchonly scripts
676
52
    LoadResult watch_script_res = LoadRecords(pwallet, batch, DBKeys::WATCHS,
677
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
678
50
        CScript script;
679
50
        key >> script;
680
50
        uint8_t fYes;
681
50
        value >> fYes;
682
50
        if (fYes == '1') {
683
50
            pwallet->GetOrCreateLegacyDataSPKM()->LoadWatchOnly(script);
684
50
        }
685
50
        return DBErrors::LOAD_OK;
686
50
    });
687
52
    result = std::max(result, watch_script_res.m_result);
688
689
    // Load watchonly meta
690
52
    LoadResult watch_meta_res = LoadRecords(pwallet, batch, DBKeys::WATCHMETA,
691
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
692
50
        CScript script;
693
50
        key >> script;
694
50
        CKeyMetadata keyMeta;
695
50
        value >> keyMeta;
696
50
        pwallet->GetOrCreateLegacyDataSPKM()->LoadScriptMetadata(CScriptID(script), keyMeta);
697
50
        return DBErrors::LOAD_OK;
698
50
    });
699
52
    result = std::max(result, watch_meta_res.m_result);
700
701
    // Deal with old "wkey" and "defaultkey" records.
702
    // These are not actually loaded, but we need to check for them
703
704
    // We don't want or need the default key, but if there is one set,
705
    // we want to make sure that it is valid so that we can detect corruption
706
    // Note: There should only be one DEFAULTKEY with nothing trailing the type
707
52
    LoadResult default_key_res = LoadRecords(pwallet, batch, DBKeys::DEFAULTKEY,
708
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
709
0
        CPubKey default_pubkey;
710
0
        try {
711
0
            value >> default_pubkey;
712
0
        } catch (const std::exception& e) {
713
0
            err = e.what();
714
0
            return DBErrors::CORRUPT;
715
0
        }
716
0
        if (!default_pubkey.IsValid()) {
717
0
            err = "Error reading wallet database: Default Key corrupt";
718
0
            return DBErrors::CORRUPT;
719
0
        }
720
0
        return DBErrors::LOAD_OK;
721
0
    });
722
52
    result = std::max(result, default_key_res.m_result);
723
724
    // "wkey" records are unsupported, if we see any, throw an error
725
52
    LoadResult wkey_res = LoadRecords(pwallet, batch, DBKeys::OLD_KEY,
726
52
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
727
0
        err = "Found unsupported 'wkey' record, try loading with version 0.18";
728
0
        return DBErrors::LOAD_FAIL;
729
0
    });
730
52
    result = std::max(result, wkey_res.m_result);
731
732
52
    if (result <= DBErrors::NONCRITICAL_ERROR) {
733
        // Only do logging and time first key update if there were no critical errors
734
52
        pwallet->WalletLogPrintf("Legacy Wallet Keys: %u plaintext, %u encrypted, %u w/ metadata, %u total.\n",
735
52
               key_res.m_records, ckey_res.m_records, keymeta_res.m_records, key_res.m_records + ckey_res.m_records);
736
52
    }
737
738
52
    return result;
739
360
}
740
741
template<typename... Args>
742
static DataStream PrefixStream(const Args&... args)
743
10.0k
{
744
10.0k
    DataStream prefix;
745
10.0k
    SerializeMany(prefix, args...);
746
10.0k
    return prefix;
747
10.0k
}
748
749
static DBErrors LoadDescriptorWalletRecords(CWallet* pwallet, DatabaseBatch& batch, int last_client) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
750
360
{
751
360
    AssertLockHeld(pwallet->cs_wallet);
752
753
    // Load descriptor record
754
360
    int num_keys = 0;
755
360
    int num_ckeys= 0;
756
360
    LoadResult desc_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTOR,
757
2.50k
        [&batch, &num_keys, &num_ckeys, &last_client] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) {
758
2.50k
        DBErrors result = DBErrors::LOAD_OK;
759
760
2.50k
        uint256 id;
761
2.50k
        key >> id;
762
2.50k
        WalletDescriptor desc;
763
2.50k
        try {
764
2.50k
            value >> desc;
765
2.50k
        } catch (const std::ios_base::failure& e) {
766
1
            strErr = strprintf("Error: Unrecognized descriptor found in wallet %s. ", pwallet->GetName());
767
1
            strErr += (last_client > CLIENT_VERSION) ? "The wallet might have been created on a newer version. " :
768
1
                    "The database might be corrupted or the software version is not compatible with one of your wallet descriptors. ";
769
1
            strErr += "Please try running the latest software version";
770
            // Also include error details
771
1
            strErr = strprintf("%s\nDetails: %s", strErr, e.what());
772
1
            return DBErrors::UNKNOWN_DESCRIPTOR;
773
1
        }
774
2.50k
        DescriptorScriptPubKeyMan& spkm = pwallet->LoadDescriptorScriptPubKeyMan(id, desc);
775
776
        // Prior to doing anything with this spkm, verify ID compatibility
777
2.50k
        if (id != spkm.GetID()) {
778
1
            strErr = "The descriptor ID calculated by the wallet differs from the one in DB";
779
1
            return DBErrors::CORRUPT;
780
1
        }
781
782
2.50k
        DescriptorCache cache;
783
784
        // Get key cache for this descriptor
785
2.50k
        DataStream prefix = PrefixStream(DBKeys::WALLETDESCRIPTORCACHE, id);
786
2.50k
        LoadResult key_cache_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORCACHE, prefix,
787
2.50k
            [&id, &cache] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
788
2.38k
            bool parent = true;
789
2.38k
            uint256 desc_id;
790
2.38k
            uint32_t key_exp_index;
791
2.38k
            uint32_t der_index;
792
2.38k
            key >> desc_id;
793
2.38k
            assert(desc_id == id);
794
2.38k
            key >> key_exp_index;
795
796
            // if the der_index exists, it's a derived xpub
797
2.38k
            try
798
2.38k
            {
799
2.38k
                key >> der_index;
800
2.38k
                parent = false;
801
2.38k
            }
802
2.38k
            catch (...) {}
803
804
2.38k
            std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE);
805
2.38k
            value >> ser_xpub;
806
2.38k
            CExtPubKey xpub;
807
2.38k
            xpub.Decode(ser_xpub.data());
808
2.38k
            if (parent) {
809
2.20k
                cache.CacheParentExtPubKey(key_exp_index, xpub);
810
2.20k
            } else {
811
183
                cache.CacheDerivedExtPubKey(key_exp_index, der_index, xpub);
812
183
            }
813
2.38k
            return DBErrors::LOAD_OK;
814
2.38k
        });
815
2.50k
        result = std::max(result, key_cache_res.m_result);
816
817
        // Get last hardened cache for this descriptor
818
2.50k
        prefix = PrefixStream(DBKeys::WALLETDESCRIPTORLHCACHE, id);
819
2.50k
        LoadResult lh_cache_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORLHCACHE, prefix,
820
2.50k
            [&id, &cache] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
821
2.17k
            uint256 desc_id;
822
2.17k
            uint32_t key_exp_index;
823
2.17k
            key >> desc_id;
824
2.17k
            assert(desc_id == id);
825
2.17k
            key >> key_exp_index;
826
827
2.17k
            std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE);
828
2.17k
            value >> ser_xpub;
829
2.17k
            CExtPubKey xpub;
830
2.17k
            xpub.Decode(ser_xpub.data());
831
2.17k
            cache.CacheLastHardenedExtPubKey(key_exp_index, xpub);
832
2.17k
            return DBErrors::LOAD_OK;
833
2.17k
        });
834
2.50k
        result = std::max(result, lh_cache_res.m_result);
835
836
        // Set the cache for this descriptor
837
2.50k
        auto spk_man = (DescriptorScriptPubKeyMan*)pwallet->GetScriptPubKeyMan(id);
838
2.50k
        assert(spk_man);
839
2.50k
        spk_man->SetCache(cache);
840
841
        // Get unencrypted keys
842
2.50k
        prefix = PrefixStream(DBKeys::WALLETDESCRIPTORKEY, id);
843
2.50k
        LoadResult key_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORKEY, prefix,
844
2.50k
            [&id, &spk_man] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) {
845
2.21k
            uint256 desc_id;
846
2.21k
            CPubKey pubkey;
847
2.21k
            key >> desc_id;
848
2.21k
            assert(desc_id == id);
849
2.21k
            key >> pubkey;
850
2.21k
            if (!pubkey.IsValid())
851
0
            {
852
0
                strErr = "Error reading wallet database: descriptor unencrypted key CPubKey corrupt";
853
0
                return DBErrors::CORRUPT;
854
0
            }
855
2.21k
            CKey privkey;
856
2.21k
            CPrivKey pkey;
857
2.21k
            uint256 hash;
858
859
2.21k
            value >> pkey;
860
2.21k
            value >> hash;
861
862
            // hash pubkey/privkey to accelerate wallet load
863
2.21k
            const auto keypair_hash = Hash(pubkey, pkey);
864
865
2.21k
            if (keypair_hash != hash)
866
0
            {
867
0
                strErr = "Error reading wallet database: descriptor unencrypted key CPubKey/CPrivKey corrupt";
868
0
                return DBErrors::CORRUPT;
869
0
            }
870
871
2.21k
            if (!privkey.Load(pkey, pubkey, true))
872
0
            {
873
0
                strErr = "Error reading wallet database: descriptor unencrypted key CPrivKey corrupt";
874
0
                return DBErrors::CORRUPT;
875
0
            }
876
2.21k
            spk_man->AddKey(pubkey.GetID(), privkey);
877
2.21k
            return DBErrors::LOAD_OK;
878
2.21k
        });
879
2.50k
        result = std::max(result, key_res.m_result);
880
2.50k
        num_keys = key_res.m_records;
881
882
        // Get encrypted keys
883
2.50k
        prefix = PrefixStream(DBKeys::WALLETDESCRIPTORCKEY, id);
884
2.50k
        LoadResult ckey_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORCKEY, prefix,
885
2.50k
            [&id, &spk_man] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
886
197
            uint256 desc_id;
887
197
            CPubKey pubkey;
888
197
            key >> desc_id;
889
197
            assert(desc_id == id);
890
197
            key >> pubkey;
891
197
            if (!pubkey.IsValid())
892
0
            {
893
0
                err = "Error reading wallet database: descriptor encrypted key CPubKey corrupt";
894
0
                return DBErrors::CORRUPT;
895
0
            }
896
197
            std::vector<unsigned char> privkey;
897
197
            value >> privkey;
898
899
197
            spk_man->AddCryptedKey(pubkey.GetID(), pubkey, privkey);
900
197
            return DBErrors::LOAD_OK;
901
197
        });
902
2.50k
        result = std::max(result, ckey_res.m_result);
903
2.50k
        num_ckeys = ckey_res.m_records;
904
905
2.50k
        return result;
906
2.50k
    });
907
908
360
    if (desc_res.m_result <= DBErrors::NONCRITICAL_ERROR) {
909
        // Only log if there are no critical errors
910
358
        pwallet->WalletLogPrintf("Descriptors: %u, Descriptor Keys: %u plaintext, %u encrypted, %u total.\n",
911
358
               desc_res.m_records, num_keys, num_ckeys, num_keys + num_ckeys);
912
358
    }
913
914
360
    return desc_res.m_result;
915
360
}
916
917
static DBErrors LoadAddressBookRecords(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
918
359
{
919
359
    AssertLockHeld(pwallet->cs_wallet);
920
359
    DBErrors result = DBErrors::LOAD_OK;
921
922
    // Load name record
923
359
    LoadResult name_res = LoadRecords(pwallet, batch, DBKeys::NAME,
924
2.15k
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
925
2.15k
        std::string strAddress;
926
2.15k
        key >> strAddress;
927
2.15k
        std::string label;
928
2.15k
        value >> label;
929
2.15k
        pwallet->m_address_book[DecodeDestination(strAddress)].SetLabel(label);
930
2.15k
        return DBErrors::LOAD_OK;
931
2.15k
    });
932
359
    result = std::max(result, name_res.m_result);
933
934
    // Load purpose record
935
359
    LoadResult purpose_res = LoadRecords(pwallet, batch, DBKeys::PURPOSE,
936
2.15k
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
937
2.15k
        std::string strAddress;
938
2.15k
        key >> strAddress;
939
2.15k
        std::string purpose_str;
940
2.15k
        value >> purpose_str;
941
2.15k
        std::optional<AddressPurpose> purpose{PurposeFromString(purpose_str)};
942
2.15k
        if (!purpose) {
943
0
            pwallet->WalletLogPrintf("Warning: nonstandard purpose string '%s' for address '%s'\n", purpose_str, strAddress);
944
0
        }
945
2.15k
        pwallet->m_address_book[DecodeDestination(strAddress)].purpose = purpose;
946
2.15k
        return DBErrors::LOAD_OK;
947
2.15k
    });
948
359
    result = std::max(result, purpose_res.m_result);
949
950
    // Load destination data record
951
359
    LoadResult dest_res = LoadRecords(pwallet, batch, DBKeys::DESTDATA,
952
359
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
953
10
        std::string strAddress, strKey, strValue;
954
10
        key >> strAddress;
955
10
        key >> strKey;
956
10
        value >> strValue;
957
10
        const CTxDestination& dest{DecodeDestination(strAddress)};
958
10
        if (strKey.compare("used") == 0) {
959
            // Load "used" key indicating if an IsMine address has
960
            // previously been spent from with avoid_reuse option enabled.
961
            // The strValue is not used for anything currently, but could
962
            // hold more information in the future. Current values are just
963
            // "1" or "p" for present (which was written prior to
964
            // f5ba424cd44619d9b9be88b8593d69a7ba96db26).
965
7
            pwallet->LoadAddressPreviouslySpent(dest);
966
7
        } else if (strKey.starts_with("rr")) {
967
            // Load "rr##" keys where ## is a decimal number, and strValue
968
            // is a serialized RecentRequestEntry object.
969
3
            pwallet->LoadAddressReceiveRequest(dest, strKey.substr(2), strValue);
970
3
        }
971
10
        return DBErrors::LOAD_OK;
972
10
    });
973
359
    result = std::max(result, dest_res.m_result);
974
975
359
    return result;
976
359
}
977
978
static DBErrors LoadTxRecords(CWallet* pwallet, DatabaseBatch& batch, bool& any_unordered) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
979
359
{
980
359
    AssertLockHeld(pwallet->cs_wallet);
981
359
    DBErrors result = DBErrors::LOAD_OK;
982
983
    // Load tx record
984
359
    any_unordered = false;
985
359
    LoadResult tx_res = LoadRecords(pwallet, batch, DBKeys::TX,
986
7.75k
        [&any_unordered] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
987
7.75k
        DBErrors result = DBErrors::LOAD_OK;
988
7.75k
        Txid hash;
989
7.75k
        key >> hash;
990
        // LoadToWallet call below creates a new CWalletTx that fill_wtx
991
        // callback fills with transaction metadata.
992
7.75k
        auto fill_wtx = [&](CWalletTx& wtx, bool new_tx) {
993
7.75k
            if(!new_tx) {
994
                // There's some corruption here since the tx we just tried to load was already in the wallet.
995
0
                err = "Error: Corrupt transaction found. This can be fixed by removing transactions from wallet and rescanning.";
996
0
                result = DBErrors::CORRUPT;
997
0
                return false;
998
0
            }
999
7.75k
            value >> wtx;
1000
7.75k
            if (wtx.GetHash() != hash)
1001
0
                return false;
1002
1003
7.75k
            if (wtx.nOrderPos == -1)
1004
0
                any_unordered = true;
1005
1006
7.75k
            return true;
1007
7.75k
        };
1008
7.75k
        if (!pwallet->LoadToWallet(hash, fill_wtx)) {
1009
            // Use std::max as fill_wtx may have already set result to CORRUPT
1010
0
            result = std::max(result, DBErrors::NEED_RESCAN);
1011
0
        }
1012
7.75k
        return result;
1013
7.75k
    });
1014
359
    result = std::max(result, tx_res.m_result);
1015
1016
    // Load locked utxo record
1017
359
    LoadResult locked_utxo_res = LoadRecords(pwallet, batch, DBKeys::LOCKED_UTXO,
1018
359
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
1019
2
        Txid hash;
1020
2
        uint32_t n;
1021
2
        key >> hash;
1022
2
        key >> n;
1023
2
        pwallet->LoadLockedCoin(COutPoint(hash, n), /*persistent=*/true);
1024
2
        return DBErrors::LOAD_OK;
1025
2
    });
1026
359
    result = std::max(result, locked_utxo_res.m_result);
1027
1028
    // Load orderposnext record
1029
    // Note: There should only be one ORDERPOSNEXT record with nothing trailing the type
1030
359
    LoadResult order_pos_res = LoadRecords(pwallet, batch, DBKeys::ORDERPOSNEXT,
1031
359
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) {
1032
190
        try {
1033
190
            value >> pwallet->nOrderPosNext;
1034
190
        } catch (const std::exception& e) {
1035
0
            err = e.what();
1036
0
            return DBErrors::NONCRITICAL_ERROR;
1037
0
        }
1038
190
        return DBErrors::LOAD_OK;
1039
190
    });
1040
359
    result = std::max(result, order_pos_res.m_result);
1041
1042
    // After loading all tx records, abandon any coinbase that is no longer in the active chain.
1043
    // This could happen during an external wallet load, or if the user replaced the chain data.
1044
7.75k
    for (auto& [id, wtx] : pwallet->mapWallet) {
1045
7.75k
        if (wtx.IsCoinBase() && wtx.isInactive()) {
1046
432
            pwallet->AbandonTransaction(wtx);
1047
432
        }
1048
7.75k
    }
1049
1050
359
    return result;
1051
359
}
1052
1053
static DBErrors LoadActiveSPKMs(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
1054
359
{
1055
359
    AssertLockHeld(pwallet->cs_wallet);
1056
359
    DBErrors result = DBErrors::LOAD_OK;
1057
1058
    // Load spk records
1059
359
    std::set<std::pair<OutputType, bool>> seen_spks;
1060
718
    for (const auto& spk_key : {DBKeys::ACTIVEEXTERNALSPK, DBKeys::ACTIVEINTERNALSPK}) {
1061
718
        LoadResult spkm_res = LoadRecords(pwallet, batch, spk_key,
1062
2.10k
            [&seen_spks, &spk_key] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) {
1063
2.10k
            uint8_t output_type;
1064
2.10k
            key >> output_type;
1065
2.10k
            uint256 id;
1066
2.10k
            value >> id;
1067
1068
2.10k
            bool internal = spk_key == DBKeys::ACTIVEINTERNALSPK;
1069
2.10k
            auto [it, insert] = seen_spks.emplace(static_cast<OutputType>(output_type), internal);
1070
2.10k
            if (!insert) {
1071
0
                strErr = "Multiple ScriptpubKeyMans specified for a single type";
1072
0
                return DBErrors::CORRUPT;
1073
0
            }
1074
2.10k
            pwallet->LoadActiveScriptPubKeyMan(id, static_cast<OutputType>(output_type), /*internal=*/internal);
1075
2.10k
            return DBErrors::LOAD_OK;
1076
2.10k
        });
1077
718
        result = std::max(result, spkm_res.m_result);
1078
718
    }
1079
359
    return result;
1080
359
}
1081
1082
static DBErrors LoadDecryptionKeys(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet)
1083
359
{
1084
359
    AssertLockHeld(pwallet->cs_wallet);
1085
1086
    // Load decryption key (mkey) records
1087
359
    LoadResult mkey_res = LoadRecords(pwallet, batch, DBKeys::MASTER_KEY,
1088
359
        [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) {
1089
17
        if (!LoadEncryptionKey(pwallet, key, value, err)) {
1090
0
            return DBErrors::CORRUPT;
1091
0
        }
1092
17
        return DBErrors::LOAD_OK;
1093
17
    });
1094
359
    return mkey_res.m_result;
1095
359
}
1096
1097
DBErrors WalletBatch::LoadWallet(CWallet* pwallet)
1098
360
{
1099
360
    DBErrors result = DBErrors::LOAD_OK;
1100
360
    bool any_unordered = false;
1101
1102
360
    LOCK(pwallet->cs_wallet);
1103
1104
    // Last client version to open this wallet
1105
360
    int last_client = CLIENT_VERSION;
1106
360
    bool has_last_client = m_batch->Read(DBKeys::VERSION, last_client);
1107
360
    if (has_last_client) pwallet->WalletLogPrintf("Last client version = %d\n", last_client);
1108
1109
360
    try {
1110
        // Load wallet flags, so they are known when processing other records.
1111
        // The FLAGS key is absent during wallet creation.
1112
360
        if ((result = LoadWalletFlags(pwallet, *m_batch)) != DBErrors::LOAD_OK) return result;
1113
1114
#ifndef ENABLE_EXTERNAL_SIGNER
1115
        if (pwallet->IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
1116
            pwallet->WalletLogPrintf("Error: External signer wallet being loaded without external signer support compiled\n");
1117
            return DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED;
1118
        }
1119
#endif
1120
1121
        // Load legacy wallet keys
1122
360
        result = std::max(LoadLegacyWalletRecords(pwallet, *m_batch, last_client), result);
1123
1124
        // Load descriptors
1125
360
        result = std::max(LoadDescriptorWalletRecords(pwallet, *m_batch, last_client), result);
1126
        // Early return if there are unknown descriptors. Later loading of ACTIVEINTERNALSPK and ACTIVEEXTERNALEXPK
1127
        // may reference the unknown descriptor's ID which can result in a misleading corruption error
1128
        // when in reality the wallet is simply too new.
1129
360
        if (result == DBErrors::UNKNOWN_DESCRIPTOR) return result;
1130
1131
        // Load address book
1132
359
        result = std::max(LoadAddressBookRecords(pwallet, *m_batch), result);
1133
1134
        // Load SPKMs
1135
359
        result = std::max(LoadActiveSPKMs(pwallet, *m_batch), result);
1136
1137
        // Load decryption keys
1138
359
        result = std::max(LoadDecryptionKeys(pwallet, *m_batch), result);
1139
1140
        // Load tx records
1141
359
        result = std::max(LoadTxRecords(pwallet, *m_batch, any_unordered), result);
1142
359
    } catch (std::runtime_error& e) {
1143
        // Exceptions that can be ignored or treated as non-critical are handled by the individual loading functions.
1144
        // Any uncaught exceptions will be caught here and treated as critical.
1145
        // Catch std::runtime_error specifically as many functions throw these and they at least have some message that
1146
        // we can log
1147
0
        pwallet->WalletLogPrintf("%s\n", e.what());
1148
0
        result = DBErrors::CORRUPT;
1149
0
    } catch (...) {
1150
        // All other exceptions are still problematic, but we can't log them
1151
0
        result = DBErrors::CORRUPT;
1152
0
    }
1153
1154
    // Any wallet corruption at all: skip any rewriting or
1155
    // upgrading, we don't want to make it worse.
1156
359
    if (result != DBErrors::LOAD_OK)
1157
3
        return result;
1158
1159
356
    if (!has_last_client || last_client != CLIENT_VERSION) // Update
1160
92
        this->WriteVersion(CLIENT_VERSION);
1161
1162
356
    if (any_unordered)
1163
0
        result = pwallet->ReorderTransactions();
1164
1165
    // Upgrade all of the descriptor caches to cache the last hardened xpub
1166
    // This operation is not atomic, but if it fails, only new entries are added so it is backwards compatible
1167
356
    try {
1168
356
        pwallet->UpgradeDescriptorCache();
1169
356
    } catch (...) {
1170
0
        result = DBErrors::CORRUPT;
1171
0
    }
1172
1173
    // Since it was accidentally possible to "encrypt" a wallet with private keys disabled, we should check if this is
1174
    // such a wallet and remove the encryption key records to avoid any future issues.
1175
    // Although wallets without private keys should not have *ckey records, we should double check that.
1176
    // Removing the mkey records is only safe if there are no *ckey records.
1177
356
    if (pwallet->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) && pwallet->HasEncryptionKeys() && !pwallet->HaveCryptedKeys()) {
1178
1
        pwallet->WalletLogPrintf("Detected extraneous encryption keys in this wallet without private keys. Removing extraneous encryption keys.\n");
1179
1
        for (const auto& [id, _] : pwallet->mapMasterKeys) {
1180
1
            if (!EraseMasterKey(id)) {
1181
0
                pwallet->WalletLogPrintf("Error: Unable to remove extraneous encryption key '%u'. Wallet corrupt.\n", id);
1182
0
                return DBErrors::CORRUPT;
1183
0
            }
1184
1
        }
1185
1
        pwallet->mapMasterKeys.clear();
1186
1
    }
1187
1188
356
    return result;
1189
356
}
1190
1191
static bool RunWithinTxn(WalletBatch& batch, std::string_view process_desc, const std::function<bool(WalletBatch&)>& func)
1192
467
{
1193
467
    if (!batch.TxnBegin()) {
1194
0
        LogDebug(BCLog::WALLETDB, "Error: cannot create db txn for %s\n", process_desc);
1195
0
        return false;
1196
0
    }
1197
1198
    // Run procedure
1199
467
    if (!func(batch)) {
1200
1
        LogDebug(BCLog::WALLETDB, "Error: %s failed\n", process_desc);
1201
1
        batch.TxnAbort();
1202
1
        return false;
1203
1
    }
1204
1205
466
    if (!batch.TxnCommit()) {
1206
0
        LogDebug(BCLog::WALLETDB, "Error: cannot commit db txn for %s\n", process_desc);
1207
0
        return false;
1208
0
    }
1209
1210
    // All good
1211
466
    return true;
1212
466
}
1213
1214
bool RunWithinTxn(WalletDatabase& database, std::string_view process_desc, const std::function<bool(WalletBatch&)>& func)
1215
467
{
1216
467
    WalletBatch batch(database);
1217
467
    return RunWithinTxn(batch, process_desc, func);
1218
467
}
1219
1220
bool WalletBatch::WriteAddressPreviouslySpent(const CTxDestination& dest, bool previously_spent)
1221
24
{
1222
24
    auto key{std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), std::string("used")))};
1223
24
    return previously_spent ? WriteIC(key, std::string("1")) : EraseIC(key);
1224
24
}
1225
1226
bool WalletBatch::WriteAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& receive_request)
1227
4
{
1228
4
    return WriteIC(std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), "rr" + id)), receive_request);
1229
4
}
1230
1231
bool WalletBatch::EraseAddressReceiveRequest(const CTxDestination& dest, const std::string& id)
1232
1
{
1233
1
    return EraseIC(std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), "rr" + id)));
1234
1
}
1235
1236
bool WalletBatch::EraseAddressData(const CTxDestination& dest)
1237
28
{
1238
28
    DataStream prefix;
1239
28
    prefix << DBKeys::DESTDATA << EncodeDestination(dest);
1240
28
    return m_batch->ErasePrefix(prefix);
1241
28
}
1242
1243
bool WalletBatch::WriteWalletFlags(const uint64_t flags)
1244
4.36k
{
1245
4.36k
    return WriteIC(DBKeys::FLAGS, flags);
1246
4.36k
}
1247
1248
bool WalletBatch::EraseRecords(const std::unordered_set<std::string>& types)
1249
34
{
1250
340
    return std::all_of(types.begin(), types.end(), [&](const std::string& type) {
1251
340
        return m_batch->ErasePrefix(DataStream() << type);
1252
340
    });
1253
34
}
1254
1255
bool WalletBatch::TxnBegin()
1256
75.2k
{
1257
75.2k
    return m_batch->TxnBegin();
1258
75.2k
}
1259
1260
bool WalletBatch::TxnCommit()
1261
75.2k
{
1262
75.2k
    bool res = m_batch->TxnCommit();
1263
75.2k
    if (res) {
1264
75.2k
        for (const auto& listener : m_txn_listeners) {
1265
12
            listener.on_commit();
1266
12
        }
1267
        // txn finished, clear listeners
1268
75.2k
        m_txn_listeners.clear();
1269
75.2k
    }
1270
75.2k
    return res;
1271
75.2k
}
1272
1273
bool WalletBatch::TxnAbort()
1274
1
{
1275
1
    bool res = m_batch->TxnAbort();
1276
1
    if (res) {
1277
1
        for (const auto& listener : m_txn_listeners) {
1278
0
            listener.on_abort();
1279
0
        }
1280
        // txn finished, clear listeners
1281
1
        m_txn_listeners.clear();
1282
1
    }
1283
1
    return res;
1284
1
}
1285
1286
void WalletBatch::RegisterTxnListener(const DbTxnListener& l)
1287
12
{
1288
12
    assert(m_batch->HasActiveTxn());
1289
12
    m_txn_listeners.emplace_back(l);
1290
12
}
1291
1292
std::unique_ptr<WalletDatabase> MakeDatabase(const fs::path& path, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error)
1293
1.42k
{
1294
1.42k
    bool exists;
1295
1.42k
    try {
1296
1.42k
        exists = fs::symlink_status(path).type() != fs::file_type::not_found;
1297
1.42k
    } catch (const fs::filesystem_error& e) {
1298
0
        error = Untranslated(strprintf("Failed to access database path '%s': %s", fs::PathToString(path), e.code().message()));
1299
0
        status = DatabaseStatus::FAILED_BAD_PATH;
1300
0
        return nullptr;
1301
0
    }
1302
1303
1.42k
    std::optional<DatabaseFormat> format;
1304
1.42k
    if (exists) {
1305
810
        if (IsBDBFile(BDBDataFile(path))) {
1306
60
            format = DatabaseFormat::BERKELEY_RO;
1307
60
        }
1308
810
        if (IsSQLiteFile(SQLiteDataFile(path))) {
1309
418
            if (format) {
1310
0
                error = Untranslated(strprintf("Failed to load database path '%s'. Data is in ambiguous format.", fs::PathToString(path)));
1311
0
                status = DatabaseStatus::FAILED_BAD_FORMAT;
1312
0
                return nullptr;
1313
0
            }
1314
418
            format = DatabaseFormat::SQLITE;
1315
418
        }
1316
810
    } else if (options.require_existing) {
1317
3
        error = Untranslated(strprintf("Failed to load database path '%s'. Path does not exist.", fs::PathToString(path)));
1318
3
        status = DatabaseStatus::FAILED_NOT_FOUND;
1319
3
        return nullptr;
1320
3
    }
1321
1322
1.41k
    if (!format && options.require_existing) {
1323
285
        error = Untranslated(strprintf("Failed to load database path '%s'. Data is not in recognized format.", fs::PathToString(path)));
1324
285
        status = DatabaseStatus::FAILED_BAD_FORMAT;
1325
285
        return nullptr;
1326
285
    }
1327
1328
1.13k
    if (format && options.require_create) {
1329
9
        error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(path)));
1330
9
        status = DatabaseStatus::FAILED_ALREADY_EXISTS;
1331
9
        return nullptr;
1332
9
    }
1333
1334
    // BERKELEY_RO can only be opened if require_format was set, which only occurs in migration.
1335
1.12k
    if (format && format == DatabaseFormat::BERKELEY_RO && (!options.require_format || options.require_format != DatabaseFormat::BERKELEY_RO)) {
1336
8
        error = Untranslated(strprintf("Failed to open database path '%s'. The wallet appears to be a Legacy wallet, please use the wallet migration tool (migratewallet RPC or the GUI option).", fs::PathToString(path)));
1337
8
        status = DatabaseStatus::FAILED_LEGACY_DISABLED;
1338
8
        return nullptr;
1339
8
    }
1340
1341
    // A db already exists so format is set, but options also specifies the format, so make sure they agree
1342
1.11k
    if (format && options.require_format && format != options.require_format) {
1343
0
        error = Untranslated(strprintf("Failed to load database path '%s'. Data is not in required format.", fs::PathToString(path)));
1344
0
        status = DatabaseStatus::FAILED_BAD_FORMAT;
1345
0
        return nullptr;
1346
0
    }
1347
1348
    // Format is not set when a db doesn't already exist, so use the format specified by the options if it is set.
1349
1.11k
    if (!format && options.require_format) format = options.require_format;
1350
1351
1.11k
    if (!format) {
1352
3
        format = DatabaseFormat::SQLITE;
1353
3
    }
1354
1355
1.11k
    if (format == DatabaseFormat::SQLITE) {
1356
1.07k
        return MakeSQLiteDatabase(path, options, status, error);
1357
1.07k
    }
1358
1359
46
    if (format == DatabaseFormat::BERKELEY_RO) {
1360
46
        return MakeBerkeleyRODatabase(path, options, status, error);
1361
46
    }
1362
1363
0
    error = Untranslated(STR_INTERNAL_BUG("Could not determine wallet format"));
1364
0
    status = DatabaseStatus::FAILED_BAD_FORMAT;
1365
0
    return nullptr;
1366
46
}
1367
} // namespace wallet