Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Help changed, need translations #39

Closed
gavinandresen opened this issue Jan 20, 2011 · 2 comments
Closed

Help changed, need translations #39

gavinandresen opened this issue Jan 20, 2011 · 2 comments
Labels

Comments

@gavinandresen
Copy link
Contributor

A few help options were changed/added, so new translations are needed.

@ptitfred
Copy link

Any french translation needed ?

@gavinandresen
Copy link
Contributor Author

Coordinate with folks here: http://www.bitcoin.org/smf/index.php?topic=3773.0

dexX7 pushed a commit to dexX7/bitcoin that referenced this issue Mar 2, 2015
…on-info

Application: isolate and replace version and build information
jonasschnelli pushed a commit to jonasschnelli/bitcoin that referenced this issue Jul 28, 2015
TheBlueMatt pushed a commit to TheBlueMatt/bitcoin that referenced this issue Oct 20, 2015
7b5d9e2 Update alpha-README to fix line formatting (erykwalder)
cryptapus added a commit to cryptapus/bitcoin that referenced this issue Sep 2, 2017
Update to 0.14.2, even with cryptapus/bitcoin.0.14.xmy fc07356
classesjack pushed a commit to classesjack/bitcoin that referenced this issue Jan 2, 2018
Update of block/block-header parameters for PoS
yes-maxheart referenced this issue in xpc-wg/xpchain Dec 16, 2018
…nting

Make strings in minting tab more clear
kallewoof pushed a commit to kallewoof/bitcoin that referenced this issue Oct 4, 2019
43dd1f4 Merge pull request bitcoin#40 from instagibbs/size_t
6532fa0 Merge pull request bitcoin#39 from instagibbs/more_builds
2b2429d rangeproof: reduce iteration count in unit tests
12b0e5d Enable more builds with rest of experimental flags
8c444ee use proper types for rangeproof min/max

git-subtree-dir: src/secp256k1
git-subtree-split: 43dd1f4fe732268734f0b4efd8e99ea4ff1e49a1
kallewoof pushed a commit to kallewoof/bitcoin that referenced this issue Oct 4, 2019
44db4d8 Merge pull request bitcoin#57 from apoelstra/2019-04-surjectionproof-stack
f7e4d08 surjection proof: Reject proofs with too many used inputs in reduced mode
112edb2 allow reducing surjection proof size (to lower generation stack usage)
d512d78 surjectionproof: introduce `SECP256K1_SURJECTIONPROOF_MAX_USED_INPUTS` constant and set it to 16
a118acc surjectionproof: reduce stack usage
e7f4ff4 Merge pull request bitcoin#70 from apoelstra/2019-06-surjection-count
f94d46e Merge pull request bitcoin#71 from real-or-random/fix-trailing-test
49a1e01 surjectionproof: fix malleability in surjection proof parsing
55311b0 Fix read of wrong buffer (and OOB) in surjectionproof tests
290a27b surjectionproof: add test vectors for "set padding bits"
7bc3daa surjectionproof: add fixed test vectors
6f3b0c0 Improve comments for surctionproof init+alloc/destroy funcs
250ebb3 work in progress: add _allocate_initialized/destroy funcs
4a77633 Improve explanation of key cancellation attack in whitelist.md
898c9f0 Clarify how to derive alternative generator H
15d9278 Add bench_generator and bench_rangeproof to .gitignore
86240b2 Clean up ./configure help strings (zkp extensions)
865b761 Fix a small typo in the generator parameter name
cd5ba5c generator: remove `CHECK` abort calls exposed by public API
ff16651 musig: add user documentation
0ad6b60 Add 3-of-3 MuSig example
b61a1a9 Add MuSig module which allows creating n-of-n multisignatures and adaptor signatures.
5d5374f Add schnorrsig module which implements BIP-schnorr [0] compatible signing, verification and batch verification.
a8ae6ba add chacha20 function
9a8a71e use proper types for rangeproof min/max
14769b9 rangeproof: reduce iteration count in unit tests
0593861 Enable more builds with rest of experimental flags
e9fea74 Add explanation about how BIP32 unhardened derivation can be used to simplify whitelisting
dec1b9c Add comment to explain effect of max_n_iterations in surjectionproof_init
ea62bfe add unit test for generator and pedersen commitment roundtripping
e32924f rangeproof: fix serialization of pedersen commintments
972d056 rangeproof: verify correctness of pedersen commitments when parsing
2cc4c6f generator: verify correctness of point when parsing
65ffea4 rangeproof: check that points deserialize correctly when verifying rangeproof
cb786d6 rangeproof: add fixed vector test case
b387ba0 Expose generator in shared library
8da4328 fix spelling in documentation
6f14fe4 Test for rejection of trailing bytes in range proofs
ab4fbc1 Test for rejection of trailing bytes in surjection proofs
c908c97 Reject surjection proofs with trailing garbage
f723bf5 Minor bugfix. Wrong length due to NUL character.
6872069 Add whitelisting benchmark
6ceccb7 add whitelist_impl.h to include for dist
a3ad4a8 generator: add API tests
e93e886 generator: remove unnecessary ARG_CHECK from generate()
f1d6e4b Fix generator makefile
68be611 Fix pedersen_blind_generator_blind_sum return value documentation
51fc58a Add n_keys argument to whitelist_verify
36b100c Fix checks of whitelist serialize/parse arguments
c8f54e1 whitelist: fix serialize/parse API to take serialized length
56fca50 Fix include/secp256k1_rangeproof.h function argument documentation.
4617f04 rangeproof: add API tests
cd4e438 surjectionproof: rename unit test functions to be more consistent with other modules
2cc7f1e surjectionproof: add API unit tests
c4097f7 surjectionproof: tests_impl.h s/assert/CHECK/g
5ee6bf3 rangeproof: fix memory leak in unit tests
94e81a2 add surjection proof module
a66ea35 Implement ring-signature based whitelist delegation scheme
2bb5133 rangeproof: several API changes
9b00b61 Expose generator in pedersen/rangeproof API
54fa263 Constant-time generator module
023aa86 rangeproof: expose sidechannel message field in the signing API
89e7451 [RANGEPROOF BREAK] Use quadratic residue for tie break and modularity cleanup
f126331 Pedersen commitments, borromean ring signatures, and ZK range proofs.
e1fb4af Add 64-bit integer utilities
e541a90 Merge bitcoin#629: Avoid calling _is_zero when _set_b32 fails.
f34b0c3 Merge bitcoin#630: Note intention of timing sidechannel freeness.
8d1563b Note intention of timing sidechannel freeness.
1669bb2 Merge bitcoin#628: Fix ability to compile tests without -DVERIFY.
ecc94ab Merge bitcoin#627: Guard memcmp in tests against mixed size inputs.
544435f Merge bitcoin#578: Avoid implementation-defined and undefined behavior when dealing with sizes
143dc6e Merge bitcoin#595: Allow to use external default callbacks
e49f799 Add missing #(un)defines to base-config.h
77defd2 Add secp256k1_ prefix to default callback functions
908bdce Include stdio.h and stdlib.h explicitly in secp256k1.c
5db782e Allow usage of external default callbacks
6095a86 Replace CHECKs for no_precomp ctx by ARG_CHECKs without a return
cd473e0 Avoid calling secp256k1_*_is_zero when secp256k1_*_set_b32 fails.
6c36de7 Merge bitcoin#600: scratch space: use single allocation
98836b1 scratch: replace frames with "checkpoint" system
7623cf2 scratch: save a couple bytes of unnecessarily-allocated memory
a7a164f scratch: rename `max_size` to `size`, document that extra will actually be allocated
5a4bc0b scratch: unify allocations
c2b028a scratch space: thread `error_callback` into all scratch space functions
0be1a4a scratch: add magic bytes to beginning of structure
92a48a7 scratch space: use single allocation
40839e2 Merge bitcoin#592: Use trivial algorithm in ecmult_multi if scratch space is small
dcf3920 Fix ability to compile tests without -DVERIFY.
a484e00 Merge bitcoin#566: Enable context creation in preallocated memory
0522caa Explain caller's obligations for preallocated memory
238305f Move _preallocated functions to separate header
695feb6 Export _preallocated functions
814cc78 Add tests for contexts in preallocated memory
ba12dd0 Check arguments of _preallocated functions
5feadde Support cloning a context into preallocated memory
c4fd5da Switch to a single malloc call
ef020de Add size constants for preallocated memory
1bf7c05 Prepare for manual memory management in preallocated memory
248bffb Guard memcmp in tests against mixed size inputs.
36698dc Merge bitcoin#596: Make WINDOW_G configurable
a61a93f Clean up ./configure help strings
2842dc5 Make WINDOW_G configurable
1a02d6c Merge bitcoin#626: Revert "Merge bitcoin#620: Install headers automatically"
662918c Revert "Merge bitcoin#620: Install headers automatically"
14c7dbd Simplify control flow in DER parsing
ec8f20b Avoid out-of-bound pointers and integer overflows in size comparisons
01ee1b3 Parse DER-enconded length into a size_t instead of an int
912680e Merge bitcoin#561: Respect LDFLAGS and #undef STATIC_PRECOMPUTATION if using basic config
91fae3a Merge bitcoin#620: Install headers automatically
5df77a0 Merge bitcoin#533: Make sure we're not using an uninitialized variable in secp256k1_wnaf_const(...)
975e51e Merge bitcoin#617: Pass scalar by reference in secp256k1_wnaf_const()
735fbde Merge bitcoin#619: Clear a copied secret key after negation
16e8615 Install headers automatically
069870d Clear a copied secret key after negation
8979ec0 Pass scalar by reference in secp256k1_wnaf_const()
84a8085 Merge bitcoin#612: Allow field_10x26_arm.s to compile for ARMv7 architecture
d4d270a Allow field_10x26_arm.s to compile for ARMv7 architecture
b19c000 Merge bitcoin#607: Use size_t shifts when computing a size_t
4d01bc2 Merge bitcoin#606: travis: Remove unused sudo:false
e6d01e9 Use size_t shifts when computing a size_t
7667532 travis: Remove unused sudo:false
248f046 Make sure we're not using an uninitialized variable in secp256k1_wnaf_const(...)
9ab96f7 Use trivial algorithm in ecmult_multi if scratch space is small
ee99f12 Merge bitcoin#599: Switch x86_64 asm to use "i" instead of "n" for immediate values.
d58bc93 Switch x86_64 asm to use "i" instead of "n" for immediate values.
05362ee Merge bitcoin#597: Add $(COMMON_LIB) to exhaustive tests to fix ARM asm build
8348386 Add $(COMMON_LIB) to exhaustive tests to fix ARM asm build
aa15154 Merge bitcoin#568: Fix integer overflow in ecmult_multi_var when n is large
2277af5 Fix integer overflow in ecmult_multi_var when n is large
dbed75d Undefine `STATIC_PRECOMPUTATION` if using the basic config
310111e Keep LDFLAGS if `--coverage`
85d0e1b Merge bitcoin#591: Make bench_internal obey secp256k1_fe_sqrt's contract wrt aliasing.
1419637 Merge bitcoin#580: Add trivial ecmult_multi algorithm which does not require a scratch space
a697d82 Add trivial ecmult_multi to the benchmark tool
bade617 Add trivial ecmult_multi algorithm. It is selected when no scratch space is given and just multiplies and adds the points.
5545e13 Merge bitcoin#584: configure: Use CFLAGS_FOR_BUILD when checking native compiler
20c5869 Merge bitcoin#516: improvements to random seed in src/tests.c
b76e45d Make bench_internal obey secp256k1_fe_sqrt's contract wrt aliasing.
870a977 Merge bitcoin#562: Make use of TAG_PUBKEY constants in secp256k1_eckey_pubkey_parse
be40c4d Fixup for C90 mixed declarations.
c71dd2c Merge bitcoin#509: Fix algorithm selection in bench_ecmult
6492bf8 Merge bitcoin#518: Summarize build options after running configure
0e9ada1 Merge bitcoin#567: Correct order of libs returned on pkg-config --libs --static libsecp2…
e96901a Merge bitcoin#587: Make randomization of a non-signing context a noop
58df8d0 Merge bitcoin#511: Portability fix for the configure scripts generated
2ebdad7 Merge bitcoin#552: Make constants static:
1c131af Merge bitcoin#551: secp256k1_fe_sqrt: Verify that the arguments don't alias.
ba698f8 Merge bitcoin#539: Assorted minor corrections
949e85b Merge bitcoin#550: Optimize secp256k1_fe_normalize_weak calls.
a34bcaa Actually pass CFLAGS_FOR_BUILD and LDFLAGS_FOR_BUILD to linker
2d5f4ce configure: Use CFLAGS_FOR_BUILD when checking native compiler
b408c6a Merge bitcoin#579: Use __GNUC_PREREQ for detecting __builtin_expect
6198375 Make randomization of a non-signing context a noop
c663397 Use __GNUC_PREREQ for detecting __builtin_expect
3cb057f Fix possible integer overflow in DER parsing
89a20a8 Correct order of libs returned on pkg-config --libs --static libsecp256k1 call.
d3cb1f9 Make use of TAG_PUBKEY constants in secp256k1_eckey_pubkey_parse
496c5b4 Make constants static: static const secp256k1_ge secp256k1_ge_const_g; static const int CURVE_B;
bf8b86c secp256k1_fe_sqrt: Verify that the arguments don't alias.
9bd89c8 Optimize secp256k1_fe_normalize_weak calls. Move secp256k1_fe_normalize_weak calls out of ECMULT_TABLE_GET_GE and ECMULT_TABLE_GET_GE_STORAGE and into secp256k1_ge_globalz_set_table_gej instead.
52ab96f clean dependendies in field_*_impl.h
deff5ed Correct math typos in field_*.h
4efb3f8 Add check that restrict pointers don't alias with all parameters.
3965027 Summarize build options in configure script
0f05173 Fix algorithm selection in bench_ecmult
8b3841c fix bug in fread() failure check
cddef0c tests: add warning message when /dev/urandom fails
270f6c8 Portability fix for the configure scripts generated
REVERT: 43dd1f4 Merge pull request bitcoin#40 from instagibbs/size_t
REVERT: 6532fa0 Merge pull request bitcoin#39 from instagibbs/more_builds
REVERT: 2b2429d rangeproof: reduce iteration count in unit tests
REVERT: 12b0e5d Enable more builds with rest of experimental flags
REVERT: 8c444ee use proper types for rangeproof min/max
REVERT: 53ad841 Add explanation about how BIP32 unhardened derivation can be used to simplify whitelisting
REVERT: 71c5fe0 Add comment to explain effect of max_n_iterations in surjectionproof_init
REVERT: 85fd42f add unit test for generator and pedersen commitment roundtripping
REVERT: 2ccf885 rangeproof: fix serialization of pedersen commintments
REVERT: 60c173b rangeproof: verify correctness of pedersen commitments when parsing
REVERT: 32d7526 generator: verify correctness of point when parsing
REVERT: ae14e8a rangeproof: check that points deserialize correctly when verifying rangeproof
REVERT: 44fe43d rangeproof: add fixed vector test case
REVERT: e065d7d Expose generator in shared library
REVERT: fb1ba32 fix spelling in documentation
REVERT: fb75faa Test for rejection of trailing bytes in range proofs
REVERT: 9b2cf17 Test for rejection of trailing bytes in surjection proofs
REVERT: a3a1800 Reject surjection proofs with trailing garbage
REVERT: 0c77ae9 Minor bugfix. Wrong length due to NUL character.
REVERT: b1f31bc Add whitelisting benchmark
REVERT: 52a9f8f add whitelist_impl.h to include for dist
REVERT: a707865 generator: add API tests
REVERT: ec1ef04 generator: remove unnecessary ARG_CHECK from generate()
REVERT: b0e9aa8 Fix generator makefile
REVERT: 526c654 Fix pedersen_blind_generator_blind_sum return value documentation
REVERT: b51886e Add n_keys argument to whitelist_verify
REVERT: 37c57de Fix checks of whitelist serialize/parse arguments
REVERT: 9b8a9d9 whitelist: fix serialize/parse API to take serialized length
REVERT: 7f17515 Fix include/secp256k1_rangeproof.h function argument documentation.
REVERT: 0d81702 rangeproof: add API tests
REVERT: 417bb06 surjectionproof: rename unit test functions to be more consistent with other modules
REVERT: 1e2d5c1 surjectionproof: add API unit tests
REVERT: 7878a29 surjectionproof: tests_impl.h s/assert/CHECK/g
REVERT: e609591 rangeproof: fix memory leak in unit tests
REVERT: 0c17f79 add surjection proof module
REVERT: c174f0c Implement ring-signature based whitelist delegation scheme
REVERT: a2bc660 rangeproof: several API changes
REVERT: 21bfb3c Expose generator in pedersen/rangeproof API
REVERT: f4620de Constant-time generator module
REVERT: d46fc3c rangeproof: expose sidechannel message field in the signing API
REVERT: cf40b1b [RANGEPROOF BREAK] Use quadratic residue for tie break and modularity cleanup
REVERT: 6d28767 Get rid of precomputed H tables (Pieter Wuille)
REVERT: ae1e576 Pedersen commitments, borromean ring signatures, and ZK range proofs.
REVERT: efc61dc Add 64-bit integer utilities

git-subtree-dir: src/secp256k1
git-subtree-split: 44db4d801fff3cd94105136cb443d603683baad2
Warchant referenced this issue in VeriBlock/vbk-ri-btc Dec 31, 2019
* Remove 'on release' from cd

* Feature/btc 70 (#36)

* add unit test for getpopdata

* add unit test for getpopdata

* add unit tets for the submitpop and integration tests for getpopdata and submitpop

* enable net_tests

* Add e2e setup, ensure nodes sync (#37)

* Set bips from 1, increase size of atv/vtb

* Make dummy commit into develop to trigger CD

* Refactor a bit (#40)

* Refactor a bit

* Fix functional

* Fix build
@holyangel250 holyangel250 mentioned this issue Apr 8, 2020
Closed
KolbyML pushed a commit to KolbyML/bitcoin that referenced this issue Sep 4, 2020
* Depencies, change to macOS and macOS version bump

* Update MacOSX to macOS

* Fix typo and unneeded var

* Added Make Deploy for Portable Installs

* Build System Fix(Gitain) 

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* Build System Fix(Gitain) (#31)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* Updates + crash fixes (#34)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* Sync develop with master (#35)

* Build System Fix(Gitain)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* Fix for supply --dirty

dirty fix for moneysupply

* Revert "Fix for supply --dirty"

This reverts commit 8060c6c1f840f477cb7803000e91be8a632aa03f.

* Another attempt at syncing master and develop (#36)

* Build System Fix(Gitain)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* Fix for supply --dirty

dirty fix for moneysupply

* Revert "Fix for supply --dirty"

This reverts commit 8060c6c1f840f477cb7803000e91be8a632aa03f.

* Mining Fixes (#37)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* testnet mining fixes

* Update developer-notes.md

* Update Copyright

* Fix compile error (#38)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* testnet mining fixes

* fix placement of utxo signer

* dont sign twice

* prevent logging twice

* random files updates

* Add Chacha20 crypto files

* Merge #643: [Crypto] Use stronger rand for key generation

b7dda924cfc2405386968b0eaa32aa0e546f322c [Log] Replace a string by the function name in a log (warrows)
977f089d0d2883ca3ca1648b14423b738c9248ef [Refactor] Use arrays instead of unic vars in Chacha20 (warrows)
d8abe323bd4f5cff3ca23fc00f0093ab7b143ead [Random] Add a missing include (warrows)
27663b8f16dfaac75bae1ab0e4a0c465b838c826 Do not permit copying FastRandomContexts (Pieter Wuille)
64e03e6de1a65c8d934d8df65af48e2b92bf887a Bugfix: randbytes should seed when needed (non reachable issue) (Pieter Wuille)
e8f12aa3621e98588b82533edb56ed4865645862 Check if sys/random.h is required for getentropy on OSX. (James Hilliard)
de85c7ae55681f8a9d322f4c48c6e9ba15ee0cf1 Add attribute [[noreturn]] (C++11) to functions that will not return (practicalswift)
df46c7ff5a2e6a71ba636fa39d77f58e018816a6 Fix resource leak (Dag Robole)
d426d856d23fe6c5d6ef3d57fe2c420b9a8e4e5e Clarify entropy source (Pieter Wuille)
30a320b3d12d3529dfca1daae0e477d76acd9ae7 Use cpuid intrinsics instead of asm code (Pieter Wuille)
0c21204e6dc714de6b917d9de12b1029d0bfb67b random: fix crash on some 64bit platforms (Cory Fields)
b8bbb9c68d996b1bea579956b3c91872d6d94b8f Use rdrand as entropy source on supported platforms (Pieter Wuille)
8e19443e41f748ad54d0f8aa25907bdad0815c19 [Tests] Fix compilation (warrows)
f53edec73901a91a6c4f595b248e4058e8be5468 [Rand/test] scripted-diff: Use new naming style for insecure_rand* functions (warrows)
272f3a5ac83ba0ab72a799ce524b6605b3555751 [Random / tests]  scripted-diff: Use randbits/bool instead of randrange (warrows)
0173ee3332990ac1eea134cca5c21cc451b81d92 Replace rand() & ((1 << N) - 1) with randbits(N) (Pieter Wuille)
250de7426e8317f86fc25fe60e960c2e9e903b69 Replace more rand() % NUM by randranges (Pieter Wuille)
d6904136030d94e844074fb75b9cafda46253ce0 [Random / tests] scripted-diff: use insecure_rand256/randrange more (warrows)
4a811ff9542439d43e3df3460114d9a24f849a36 Merge test_random.h into test_bitcoin.h (Pieter Wuille)
f275e638bf0a752d9f231f2e4a781432deafbfe8 Add various insecure_rand wrappers for tests (Pieter Wuille)
602af4fb3ef45a2a821f1b76d0dbd418ec852683 Add FastRandomContext::rand256() and ::randbytes() (Pieter Wuille)
90549785824f4c13ee8cf36e77f737b5d89d0f02 Add perf counter data to GetStrongRandBytes state in scheduler (Matt Corallo)
17dd13e746b567f44015fbefaa634b278010fccf Add internal method to add new random data to our internal RNG state (Matt Corallo)
c7a1602879aff2ae72bdefe959d4026ee8c0aefc Use sanity check timestamps as entropy (Pieter Wuille)
f671fe99994cb220dede903459307c61475aeef8 Test that GetPerformanceCounter() increments (Pieter Wuille)
dcb536fb2cef719abef9bb4104242410987bfd3d Use hardware timestamps in RNG seeding (Pieter Wuille)
7c3f290b50d32a3290a2c49542d72a3a7466da58 [Random] Fix compilation (warrows)
22b78957cc90252c958bc66439c098001d47b8fc random: only use getentropy on openbsd (Cory Fields)
e5750e5c9831edf01026643deed249e0efb28f0b Add a FastRandomContext::randrange and use it (Pieter Wuille)
2a0f6cd1ca2224e2ba30aea4ab312a1919dedc0c Switch FastRandomContext to ChaCha20 (Pieter Wuille)
401ca7db468939184681b73f4b346aebcfc378c6 Introduce FastRandomContext::randbool() (Pieter Wuille)
3d056d6ed478c5bbd42d7dde4f1ab0a75ffd42b1 Add ChaCha20 (Pieter Wuille)
3c97f3f2cb1b3dc2f5d642877d9a2de0a85c06bf Kill insecure_random and associated global state (Wladimir J. van der Laan)
68ba16c78593bf221844dae95fc5edacbf69ba62 Maintain state across GetStrongRandBytes calls (Pieter Wuille)
c3c399e199c2d25d10e782dca2ef17f55b6939d0 random: Add fallback if getrandom syscall not available (Wladimir J. van der Laan)
7a8111f915fc7ed23aaec86cd95904bf5d5972fd sanity: Move OS random to sanity check function (Wladimir J. van der Laan)
387c2e9574b56ae941b7723c561ed39488891782 squashme: comment that NUM_OS_RANDOM_BYTES should not be changed lightly (Wladimir J. van der Laan)
9e8c266b158c26b361d68a3cccdbcfd7bee0b376 util: Specific GetOSRandom for Linux/FreeBSD/OpenBSD (Wladimir J. van der Laan)
f989b865f215c797e77483a04cc7fe9026904517 Don't use assert for catching randomness failures (Pieter Wuille)
a15419e13204d96416b0cce9aad2ae4e35ea5ed5 Always require OS randomness when generating secret keys (Pieter Wuille)

Pull request description:

  Since #576 hasn't changed in over a month, here is a reworked version of it.
  So in this PR:
  -We add the memory_cleanse function from upstream, to remove a number of OpenSSL calls.
  -We use OS randomness in addition to OpenSSL randomness (see #576 for why it's needed).

ACKs for top commit:
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/643/commits/b7dda924cfc2405386968b0eaa32aa0e546f322c
  furszy:
    ACK [`b7dda92`](https://github.com/PIVX-Project/PIVX/commit/b7dda924cfc2405386968b0eaa32aa0e546f322c)

Tree-SHA512: d92cbc14d844263ced753248e646f5cd4f03ec37546f50ff1b558fc3076b6d777c7efcb899c0400bc510e21311b5bd93d9aca26d811033fedb370f8457204035

* Revert "Merge #643: [Crypto] Use stronger rand for key generation"

This reverts commit ae3e2562220577420e37a6367feeaa3cfedc67e9.

* Revert "Add Chacha20 crypto files"

This reverts commit ddd102fca86499062dac0ea3a40a8d8b26d039f5.

* Revert "random files updates"

This reverts commit f29e0844099487811d4f3c7af7f6d089adc2f6cf.

* Revert "random: fix crash on some 64bit platforms"

This reverts commit 5a5241452e1515fbd554ee99cc14e552fcb98051.

* Revert "random: Add fallback if getrandom syscall not available"

This reverts commit b46c1cb2b466f4bce60db364bf26f2cf791cdf38.

* fix redeclaration

* fix signing code

* do not return in void func

* remove unused funcs

* remove on error

* revert "Refactor miner"

* Fix name collision + mac crashes (#39)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* testnet mining fixes

* fix placement of utxo signer

* dont sign twice

* prevent logging twice

* random files updates

* Add Chacha20 crypto files

* Merge #643: [Crypto] Use stronger rand for key generation

b7dda924cfc2405386968b0eaa32aa0e546f322c [Log] Replace a string by the function name in a log (warrows)
977f089d0d2883ca3ca1648b14423b738c9248ef [Refactor] Use arrays instead of unic vars in Chacha20 (warrows)
d8abe323bd4f5cff3ca23fc00f0093ab7b143ead [Random] Add a missing include (warrows)
27663b8f16dfaac75bae1ab0e4a0c465b838c826 Do not permit copying FastRandomContexts (Pieter Wuille)
64e03e6de1a65c8d934d8df65af48e2b92bf887a Bugfix: randbytes should seed when needed (non reachable issue) (Pieter Wuille)
e8f12aa3621e98588b82533edb56ed4865645862 Check if sys/random.h is required for getentropy on OSX. (James Hilliard)
de85c7ae55681f8a9d322f4c48c6e9ba15ee0cf1 Add attribute [[noreturn]] (C++11) to functions that will not return (practicalswift)
df46c7ff5a2e6a71ba636fa39d77f58e018816a6 Fix resource leak (Dag Robole)
d426d856d23fe6c5d6ef3d57fe2c420b9a8e4e5e Clarify entropy source (Pieter Wuille)
30a320b3d12d3529dfca1daae0e477d76acd9ae7 Use cpuid intrinsics instead of asm code (Pieter Wuille)
0c21204e6dc714de6b917d9de12b1029d0bfb67b random: fix crash on some 64bit platforms (Cory Fields)
b8bbb9c68d996b1bea579956b3c91872d6d94b8f Use rdrand as entropy source on supported platforms (Pieter Wuille)
8e19443e41f748ad54d0f8aa25907bdad0815c19 [Tests] Fix compilation (warrows)
f53edec73901a91a6c4f595b248e4058e8be5468 [Rand/test] scripted-diff: Use new naming style for insecure_rand* functions (warrows)
272f3a5ac83ba0ab72a799ce524b6605b3555751 [Random / tests]  scripted-diff: Use randbits/bool instead of randrange (warrows)
0173ee3332990ac1eea134cca5c21cc451b81d92 Replace rand() & ((1 << N) - 1) with randbits(N) (Pieter Wuille)
250de7426e8317f86fc25fe60e960c2e9e903b69 Replace more rand() % NUM by randranges (Pieter Wuille)
d6904136030d94e844074fb75b9cafda46253ce0 [Random / tests] scripted-diff: use insecure_rand256/randrange more (warrows)
4a811ff9542439d43e3df3460114d9a24f849a36 Merge test_random.h into test_bitcoin.h (Pieter Wuille)
f275e638bf0a752d9f231f2e4a781432deafbfe8 Add various insecure_rand wrappers for tests (Pieter Wuille)
602af4fb3ef45a2a821f1b76d0dbd418ec852683 Add FastRandomContext::rand256() and ::randbytes() (Pieter Wuille)
90549785824f4c13ee8cf36e77f737b5d89d0f02 Add perf counter data to GetStrongRandBytes state in scheduler (Matt Corallo)
17dd13e746b567f44015fbefaa634b278010fccf Add internal method to add new random data to our internal RNG state (Matt Corallo)
c7a1602879aff2ae72bdefe959d4026ee8c0aefc Use sanity check timestamps as entropy (Pieter Wuille)
f671fe99994cb220dede903459307c61475aeef8 Test that GetPerformanceCounter() increments (Pieter Wuille)
dcb536fb2cef719abef9bb4104242410987bfd3d Use hardware timestamps in RNG seeding (Pieter Wuille)
7c3f290b50d32a3290a2c49542d72a3a7466da58 [Random] Fix compilation (warrows)
22b78957cc90252c958bc66439c098001d47b8fc random: only use getentropy on openbsd (Cory Fields)
e5750e5c9831edf01026643deed249e0efb28f0b Add a FastRandomContext::randrange and use it (Pieter Wuille)
2a0f6cd1ca2224e2ba30aea4ab312a1919dedc0c Switch FastRandomContext to ChaCha20 (Pieter Wuille)
401ca7db468939184681b73f4b346aebcfc378c6 Introduce FastRandomContext::randbool() (Pieter Wuille)
3d056d6ed478c5bbd42d7dde4f1ab0a75ffd42b1 Add ChaCha20 (Pieter Wuille)
3c97f3f2cb1b3dc2f5d642877d9a2de0a85c06bf Kill insecure_random and associated global state (Wladimir J. van der Laan)
68ba16c78593bf221844dae95fc5edacbf69ba62 Maintain state across GetStrongRandBytes calls (Pieter Wuille)
c3c399e199c2d25d10e782dca2ef17f55b6939d0 random: Add fallback if getrandom syscall not available (Wladimir J. van der Laan)
7a8111f915fc7ed23aaec86cd95904bf5d5972fd sanity: Move OS random to sanity check function (Wladimir J. van der Laan)
387c2e9574b56ae941b7723c561ed39488891782 squashme: comment that NUM_OS_RANDOM_BYTES should not be changed lightly (Wladimir J. van der Laan)
9e8c266b158c26b361d68a3cccdbcfd7bee0b376 util: Specific GetOSRandom for Linux/FreeBSD/OpenBSD (Wladimir J. van der Laan)
f989b865f215c797e77483a04cc7fe9026904517 Don't use assert for catching randomness failures (Pieter Wuille)
a15419e13204d96416b0cce9aad2ae4e35ea5ed5 Always require OS randomness when generating secret keys (Pieter Wuille)

Pull request description:

  Since #576 hasn't changed in over a month, here is a reworked version of it.
  So in this PR:
  -We add the memory_cleanse function from upstream, to remove a number of OpenSSL calls.
  -We use OS randomness in addition to OpenSSL randomness (see #576 for why it's needed).

ACKs for top commit:
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/643/commits/b7dda924cfc2405386968b0eaa32aa0e546f322c
  furszy:
    ACK [`b7dda92`](https://github.com/PIVX-Project/PIVX/commit/b7dda924cfc2405386968b0eaa32aa0e546f322c)

Tree-SHA512: d92cbc14d844263ced753248e646f5cd4f03ec37546f50ff1b558fc3076b6d777c7efcb899c0400bc510e21311b5bd93d9aca26d811033fedb370f8457204035

* Revert "Merge #643: [Crypto] Use stronger rand for key generation"

This reverts commit ae3e2562220577420e37a6367feeaa3cfedc67e9.

* Revert "Add Chacha20 crypto files"

This reverts commit ddd102fca86499062dac0ea3a40a8d8b26d039f5.

* Revert "random files updates"

This reverts commit f29e0844099487811d4f3c7af7f6d089adc2f6cf.

* Revert "random: fix crash on some 64bit platforms"

This reverts commit 5a5241452e1515fbd554ee99cc14e552fcb98051.

* Revert "random: Add fallback if getrandom syscall not available"

This reverts commit b46c1cb2b466f4bce60db364bf26f2cf791cdf38.

* fix redeclaration

* fix signing code

* do not return in void func

* remove unused funcs

* remove on error

* revert "Refactor miner"

* fix repeat of masternode in fundamental node payment log

* fix name collision

* [Wallet] Look at last CoinsView block for corruption fix process

* Fix crashes

* Merge #941: [Refactor] Move ThreadStakeMinter out of net.cpp

42fe4040acff08450168416ccf35413abdc1747a [Refactor] Move ThreadStakeMinter out of net.cpp (Fuzzbawls)

Pull request description:

  This moves the implementation function and thread creation to a more
  appropriate file (`miner.cpp`).

  Resolves #938

ACKs for top commit:
  CaveSpectre11:
    ACK https://github.com/PIVX-Project/PIVX/commit/42fe4040acff08450168416ccf35413abdc1747a
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/941/commits/42fe4040acff08450168416ccf35413abdc1747a
  furszy:
    utACK [42fe404](https://github.com/PIVX-Project/PIVX/pull/941/commits/42fe4040acff08450168416ccf35413abdc1747a)

Tree-SHA512: d3417f03cab63aa41b1ff0fb4d391d42f4448b83efe70391d4014407008af34eb265a23b5807ebecb90cf9637fb74e5b330b02c92e7038e5400a5f16608800ee

* Merge #865: [Main] Don't return an invalid state when shutting down the wallet

8126729 Don't return an invalid state when shutting down the wallet (Fuzzbawls)

Tree-SHA512: b7042df42af620faca5d415382ad0a6ae973e9dbad7e527957c2ac3c7d0cb5470fcca555b3fe262f5f06e334504ded657db879c2471ecc290247e0f7e2bbf5f3

* Merge #958: [Staking] Modify miner and staking thread for efficiency

b7a9a9cdb20cdee869906fb24e2bc984e8a93802 [Staking] Modify miner and staking thread for efficency (Cave Spectre)

Pull request description:

  ### **Release notes**
  - [Mining] Unnecessary mining threads now exit after PoS has begun
  - [Staking] The staking thread dormancy is more efficient during PoW
  - [Performance] Some unnecessary processing in the mining thread removed
  - [RPC] setgenerate errors if attempted to turn on after end of PoW
  - [Build] Wallet only routines conditionalized in miner.h
  - [Refactoring] Log messages with bitcoin named routines changed for easier rename of routines in the future.

  In order to better explain the changes in this PR, a review of the existing code would be helpful.

  ### **Backstory**
  When fixing a PIVX forked coin's transition from PoW to PoS, it was observed that mining threads go into tight infinite loops after the switch to proof of stake.  This can be seen with a  simple `pivx-qt -testnet -gen`, and watching the debug log.

  This observation triggered the below code review (re-written for the current release; some of the
  findings in the code originally reviewed had already been addressed in PIVX).

  ### **Code Review**

  _BitcoinMiner()_
  This routine is a worker routine for both staking and mining threads; fProofOfStake is set to true when running in the staking thread, false when running in the mining thread.  fGeneratedBitcoins is set when mining is started; and cleared on shutdown or when mining is stopped.

  _In the initial fProofOfStake section:_
  ```
              if ((GetTime() - nMintableLastCheck > 5 * 60)) // 5 minute check time
              {
                  nMintableLastCheck = GetTime();
                  fMintableCoins = pwallet->MintableCoins();
              }

              if (chainActive.Tip()->nHeight < Params().LAST_POW_BLOCK()) {
                  MilliSleep(5000);
                  continue;
              }
  ```
  Every 5 minutes this code will scan through the wallet and look to see if mintable coins exist.  After it's done that, it checks if the network is still in the proof of work phase.  It doesn't make sense to scan the wallet until after the proof of work phase is ending.

  If it is in the proof of work phase; the staking thread sleeps for 5 seconds  (`MilliSleep(5000)`).  This only makes sense if the block time is 5 seconds.  Technically the thread could determine the number of blocks remaining in the proof of work phase, and use that to calculate a hibernation of sorts.  Using the target spacing to wait for the block to pass is a 91% reduction in the number of passes through the loop  (12 vs. 1 when the target spacing is one minute), and doesn't run into issues where adjustments to the actual spacing throw the timing of a hibernation off.

  ```
                  if (!fMintableCoins) {
                      if (GetTime() - nMintableLastCheck > 1 * 60) // 1 minute check time
                      {
                          nMintableLastCheck = GetTime();
                          fMintableCoins = pwallet->MintableCoins();
                      }
                  }
                  MilliSleep(5000);
  ```

  We come to this section of code in the waiting while loop; if we don't have mintable coins yet, or our wallet is locked, or we're not synched; or a host of other potential things that would prevent staking.  However, we check again for mintable coins; and then we wait 5 seconds after that check before we come out.

  Since the first time we come into this loop; we have already checked mintable coins (within the last 5 minutes); we should sleep first, and then do the check closer to the time we're actually going to go around the loop again; so we're working with the most recent data.

  ```
                  if (!fGenerateBitcoins && !fProofOfStake)
                      continue;
  ```

  This check is buried in a `if (fProofOfStake)` conditional, where fProofOfStake is a parameter that is passed in by the caller to BitcoinMiner().  `!fProofOfStake` will never be true; so this condition will never be true.  Removing it we are left with !fGenerateBitcoins; which is unrelated to this section of code anyway.  If we're down to this point, we're not in PoW mode anymore, so there shouldn't be a mining thread (more on that later).  But the most compelling part of this condition,whether it passes or not, is that it "continues" the while loop it's in; and since it's at the end of the actual while loop, it's going to iterate into another round of the while loop as soon as it finishes with this conditional anyway.  Long story short; the code doesn't do anything.

  _Overall logic_
  The mining thread will run until mining is turned off (`setgenerate false`, or the mining flags taken off the invocation).  However, there is no need to continue to mine with proof of work after the proof of stake phase begins.  In fact, there really is no consideration of that at all; PoW will continue to try to generate blocks well after PoS has begun.  Yes, it's within the users control to stop mining; but it's within the power of the code to take care of that for the user, and stop the mining thread(s) after the transition to proof of stake.

  ### **This PR:**
  The logical issues above have been corrected.  The dormancy for the proof of stake thread is held for just one block rather than any extreme hibernation.  Combined with moving that code to be the first thing in the while loop; it also removes the processing done to search through the wallets looking for stakeable coins.

  Since a significant amount of code assumes there will not be a transition from PoS to PoW; code was added to BitcoinMiner() to exit the mining threads if it's transitioned into the PoS phase.  The threads will continue for a little bit, in case there is any rewind on the chain; but after 6 PoS blocks are accepted, the miner threads will exit.

  To prevent the PoW thread from trying to generate blocks after the PoS phase has begun, logic was added in CreateNewBlockWithKey() to return quickly.  Rather than create a situation where the mining thread ends up in a tight loop in the initial phases of PoS, the mining thread will be held for 1/2 of the target spacing before returning.

  Lastly; Some tweaks were made to the logging; removing hardcoded references to "BitcoinMiner()", in case refactoring in the future changes the name of the routine.  Similarly, since there is a log message when the mining thread starts "PIVXMiner started"; rather than reporting thread exits or errors as "ThreadBitcoinMiner", they have been changed to PIVXMiner to match.

  Much of this can be observed with an errant `pivx-qt -gen`.  With this PR, it simply tries to start the miner, and then exits.

  _With PR code - `pivx-qt -gen -testnet`_
  ```
  2019-07-21 20:04:22 PIVXMiner started
  2019-07-21 20:04:22 BitcoinMiner: Exiting Proof of Work Mining Thread at height: 1160732
  2019-07-21 20:04:22 PIVXMiner exiting
  ```

  _Current release:_
  ```
  2019-07-21 19:37:06 CreateNewBlock(): total size 1000
  2019-07-21 19:37:06 ERROR: CheckProofOfWork() : hash doesn't match nBits
  2019-07-21 19:37:06 ERROR: CheckBlockHeader() : proof of work failed
  2019-07-21 19:37:06 ERROR: CheckBlock() : CheckBlockHeader failed
  2019-07-21 19:37:06 CreateNewBlock() : TestBlockValidity failed
  ```
  is repeated in a tight loop.

ACKs for top commit:
  furszy:
    ACK [b7a9a9c](https://github.com/PIVX-Project/PIVX/commit/b7a9a9cdb20cdee869906fb24e2bc984e8a93802)
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/958/commits/b7a9a9cdb20cdee869906fb24e2bc984e8a93802 and merging...

Tree-SHA512: 064619ce1fde75f1baf35ddb202b4573f2a8c0effc5d2939a678612e3f1d56b08d5c5d7c7bb30ce919e5a648f3f406cca35093b9a3a04c799f746fff5c6a35b6

* remove duplicate stake thread code

* add missing include

* remove zvitae pos validator

* Refine signblock code

* revert zerocoin added check

* Miner reference updates

* revert miner changes

* fix fundamentalnode sync checker

* [Refactor] Move rpc files to its own folder

* update includes

* fix rpcserver include to rpc/server.h

* [Refactor] Move wallet files to wallet dir

* [Trivial] Fix db.h path

* Merge #982: [Miner] Don't create new keys when generating PoS blocks

74e7fc7d432c7f6d586d54ff276d6babad0fe505 [Miner] Don't create new keys when generating PoS blocks (random-zebra)

Pull request description:

  This fixes the calls to `CreateNewBlockWithKey` with PoS blocks, which are not needed.
  We simply call `CreateNewBlock` with an empy script for coinbase.

  It should prevent the problem described in https://github.com/PIVX-Project/PIVX/pull/956#issuecomment-520166966

ACKs for top commit:
  CaveSpectre11:
    utACK https://github.com/PIVX-Project/PIVX/pull/982/commits/74e7fc7d432c7f6d586d54ff276d6babad0fe505
  akshaynexus:
    utACK https://github.com/PIVX-Project/PIVX/commit/74e7fc7d432c7f6d586d54ff276d6babad0fe505
  furszy:
    utACK [74e7fc7](https://github.com/PIVX-Project/PIVX/pull/982/commits/74e7fc7d432c7f6d586d54ff276d6babad0fe505)
  Warrows:
    Pretty straightforward indeed, utACK 74e7fc7

Tree-SHA512: bcb9752a689a058b6c33317136d16afd694b5da66c69cdd32a8b89b71059c5b2c5dc20c88045c52429fae99d45f508ea223f1b7d1afa5db3c77eb59befd48d51

* Merge #549: [Crypto] Switch to libsecp256k1 signature verification and update the lib

f10439c [Crypto] Add ctx initialisation for bip38 (warrows)
21234db [Crypto] Bring back function CKey.SetPrivKey for zPIV (warrows)
65e009a [Tests] Add new auto generated script tests (warrows)
6839f3b [Crypto] Switch from openssl to secp256k1 for consensus (warrows)
8a901f9 Squashed 'src/secp256k1/' content from commit 452d8e4d2 (warrows)
d98a584 [Refactor] Delete secp256k1 folder for subtreefication (warrows)

Tree-SHA512: f0f6777be57777ba86f83af1b891a6c0f384e6b059afc9249599269c71e5d3bf46a6498325488878af71b6685c6dac6cb672d0147c2ebf43b36f6d786fc38a10

* fix keystore refs

* update libscepk265k1

*  [RPC/REST] Migrate to libevent based httpd server

* fix mempooltojson and misc erroros

* Merge #769: [Main] Unify shutdown proceedure in init rather than per-app

518542f [Main] Unify shutdown proceedure in init rather than per-app (Fuzzbawls)

Tree-SHA512: 6e734ce002e236c3c2c59c2e8e93d87f5fe577b3f5546804b117a71255266cc4012d847d6a1d9b019a7b763124b45987c2dc3f95294670489cac269beceb2e3a

* Merge #542: [Network] Remove vfReachable and modify IsReachable to only use vfLimited.

38ed737 Remove vfReachable and modify IsReachable to only use vfLimited. (Patrick Strateman)

Tree-SHA512: 8aa61f9abd8356522f3ba71b35497aac07e10333a39ff4b98bb635d1246e6b1be6b0ee0b236944fbfaa558af0e6c0cc219e540eacb2232bc05db393e4a72b088

* [Refactor] Refactor bignum header file into several files

* [zerocoin] Free memory from ToString()

Simple fix for a minor memory leak

* Revert "[Refactor] Refactor bignum header file into several files"

This reverts commit c9aa98fe451e27d2bb4564747ffb0768cce56d53.

* fix delays in mining code in testnet (#40)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* testnet mining fixes

* fix placement of utxo signer

* dont sign twice

* prevent logging twice

* random files updates

* Add Chacha20 crypto files

* Merge #643: [Crypto] Use stronger rand for key generation

b7dda924cfc2405386968b0eaa32aa0e546f322c [Log] Replace a string by the function name in a log (warrows)
977f089d0d2883ca3ca1648b14423b738c9248ef [Refactor] Use arrays instead of unic vars in Chacha20 (warrows)
d8abe323bd4f5cff3ca23fc00f0093ab7b143ead [Random] Add a missing include (warrows)
27663b8f16dfaac75bae1ab0e4a0c465b838c826 Do not permit copying FastRandomContexts (Pieter Wuille)
64e03e6de1a65c8d934d8df65af48e2b92bf887a Bugfix: randbytes should seed when needed (non reachable issue) (Pieter Wuille)
e8f12aa3621e98588b82533edb56ed4865645862 Check if sys/random.h is required for getentropy on OSX. (James Hilliard)
de85c7ae55681f8a9d322f4c48c6e9ba15ee0cf1 Add attribute [[noreturn]] (C++11) to functions that will not return (practicalswift)
df46c7ff5a2e6a71ba636fa39d77f58e018816a6 Fix resource leak (Dag Robole)
d426d856d23fe6c5d6ef3d57fe2c420b9a8e4e5e Clarify entropy source (Pieter Wuille)
30a320b3d12d3529dfca1daae0e477d76acd9ae7 Use cpuid intrinsics instead of asm code (Pieter Wuille)
0c21204e6dc714de6b917d9de12b1029d0bfb67b random: fix crash on some 64bit platforms (Cory Fields)
b8bbb9c68d996b1bea579956b3c91872d6d94b8f Use rdrand as entropy source on supported platforms (Pieter Wuille)
8e19443e41f748ad54d0f8aa25907bdad0815c19 [Tests] Fix compilation (warrows)
f53edec73901a91a6c4f595b248e4058e8be5468 [Rand/test] scripted-diff: Use new naming style for insecure_rand* functions (warrows)
272f3a5ac83ba0ab72a799ce524b6605b3555751 [Random / tests]  scripted-diff: Use randbits/bool instead of randrange (warrows)
0173ee3332990ac1eea134cca5c21cc451b81d92 Replace rand() & ((1 << N) - 1) with randbits(N) (Pieter Wuille)
250de7426e8317f86fc25fe60e960c2e9e903b69 Replace more rand() % NUM by randranges (Pieter Wuille)
d6904136030d94e844074fb75b9cafda46253ce0 [Random / tests] scripted-diff: use insecure_rand256/randrange more (warrows)
4a811ff9542439d43e3df3460114d9a24f849a36 Merge test_random.h into test_bitcoin.h (Pieter Wuille)
f275e638bf0a752d9f231f2e4a781432deafbfe8 Add various insecure_rand wrappers for tests (Pieter Wuille)
602af4fb3ef45a2a821f1b76d0dbd418ec852683 Add FastRandomContext::rand256() and ::randbytes() (Pieter Wuille)
90549785824f4c13ee8cf36e77f737b5d89d0f02 Add perf counter data to GetStrongRandBytes state in scheduler (Matt Corallo)
17dd13e746b567f44015fbefaa634b278010fccf Add internal method to add new random data to our internal RNG state (Matt Corallo)
c7a1602879aff2ae72bdefe959d4026ee8c0aefc Use sanity check timestamps as entropy (Pieter Wuille)
f671fe99994cb220dede903459307c61475aeef8 Test that GetPerformanceCounter() increments (Pieter Wuille)
dcb536fb2cef719abef9bb4104242410987bfd3d Use hardware timestamps in RNG seeding (Pieter Wuille)
7c3f290b50d32a3290a2c49542d72a3a7466da58 [Random] Fix compilation (warrows)
22b78957cc90252c958bc66439c098001d47b8fc random: only use getentropy on openbsd (Cory Fields)
e5750e5c9831edf01026643deed249e0efb28f0b Add a FastRandomContext::randrange and use it (Pieter Wuille)
2a0f6cd1ca2224e2ba30aea4ab312a1919dedc0c Switch FastRandomContext to ChaCha20 (Pieter Wuille)
401ca7db468939184681b73f4b346aebcfc378c6 Introduce FastRandomContext::randbool() (Pieter Wuille)
3d056d6ed478c5bbd42d7dde4f1ab0a75ffd42b1 Add ChaCha20 (Pieter Wuille)
3c97f3f2cb1b3dc2f5d642877d9a2de0a85c06bf Kill insecure_random and associated global state (Wladimir J. van der Laan)
68ba16c78593bf221844dae95fc5edacbf69ba62 Maintain state across GetStrongRandBytes calls (Pieter Wuille)
c3c399e199c2d25d10e782dca2ef17f55b6939d0 random: Add fallback if getrandom syscall not available (Wladimir J. van der Laan)
7a8111f915fc7ed23aaec86cd95904bf5d5972fd sanity: Move OS random to sanity check function (Wladimir J. van der Laan)
387c2e9574b56ae941b7723c561ed39488891782 squashme: comment that NUM_OS_RANDOM_BYTES should not be changed lightly (Wladimir J. van der Laan)
9e8c266b158c26b361d68a3cccdbcfd7bee0b376 util: Specific GetOSRandom for Linux/FreeBSD/OpenBSD (Wladimir J. van der Laan)
f989b865f215c797e77483a04cc7fe9026904517 Don't use assert for catching randomness failures (Pieter Wuille)
a15419e13204d96416b0cce9aad2ae4e35ea5ed5 Always require OS randomness when generating secret keys (Pieter Wuille)

Pull request description:

  Since #576 hasn't changed in over a month, here is a reworked version of it.
  So in this PR:
  -We add the memory_cleanse function from upstream, to remove a number of OpenSSL calls.
  -We use OS randomness in addition to OpenSSL randomness (see #576 for why it's needed).

ACKs for top commit:
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/643/commits/b7dda924cfc2405386968b0eaa32aa0e546f322c
  furszy:
    ACK [`b7dda92`](https://github.com/PIVX-Project/PIVX/commit/b7dda924cfc2405386968b0eaa32aa0e546f322c)

Tree-SHA512: d92cbc14d844263ced753248e646f5cd4f03ec37546f50ff1b558fc3076b6d777c7efcb899c0400bc510e21311b5bd93d9aca26d811033fedb370f8457204035

* Revert "Merge #643: [Crypto] Use stronger rand for key generation"

This reverts commit ae3e2562220577420e37a6367feeaa3cfedc67e9.

* Revert "Add Chacha20 crypto files"

This reverts commit ddd102fca86499062dac0ea3a40a8d8b26d039f5.

* Revert "random files updates"

This reverts commit f29e0844099487811d4f3c7af7f6d089adc2f6cf.

* Revert "random: fix crash on some 64bit platforms"

This reverts commit 5a5241452e1515fbd554ee99cc14e552fcb98051.

* Revert "random: Add fallback if getrandom syscall not available"

This reverts commit b46c1cb2b466f4bce60db364bf26f2cf791cdf38.

* fix redeclaration

* fix signing code

* do not return in void func

* remove unused funcs

* remove on error

* revert "Refactor miner"

* fix repeat of masternode in fundamental node payment log

* fix name collision

* [Wallet] Look at last CoinsView block for corruption fix process

* Fix crashes

* Merge #941: [Refactor] Move ThreadStakeMinter out of net.cpp

42fe4040acff08450168416ccf35413abdc1747a [Refactor] Move ThreadStakeMinter out of net.cpp (Fuzzbawls)

Pull request description:

  This moves the implementation function and thread creation to a more
  appropriate file (`miner.cpp`).

  Resolves #938

ACKs for top commit:
  CaveSpectre11:
    ACK https://github.com/PIVX-Project/PIVX/commit/42fe4040acff08450168416ccf35413abdc1747a
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/941/commits/42fe4040acff08450168416ccf35413abdc1747a
  furszy:
    utACK [42fe404](https://github.com/PIVX-Project/PIVX/pull/941/commits/42fe4040acff08450168416ccf35413abdc1747a)

Tree-SHA512: d3417f03cab63aa41b1ff0fb4d391d42f4448b83efe70391d4014407008af34eb265a23b5807ebecb90cf9637fb74e5b330b02c92e7038e5400a5f16608800ee

* Merge #865: [Main] Don't return an invalid state when shutting down the wallet

8126729 Don't return an invalid state when shutting down the wallet (Fuzzbawls)

Tree-SHA512: b7042df42af620faca5d415382ad0a6ae973e9dbad7e527957c2ac3c7d0cb5470fcca555b3fe262f5f06e334504ded657db879c2471ecc290247e0f7e2bbf5f3

* Merge #958: [Staking] Modify miner and staking thread for efficiency

b7a9a9cdb20cdee869906fb24e2bc984e8a93802 [Staking] Modify miner and staking thread for efficency (Cave Spectre)

Pull request description:

  ### **Release notes**
  - [Mining] Unnecessary mining threads now exit after PoS has begun
  - [Staking] The staking thread dormancy is more efficient during PoW
  - [Performance] Some unnecessary processing in the mining thread removed
  - [RPC] setgenerate errors if attempted to turn on after end of PoW
  - [Build] Wallet only routines conditionalized in miner.h
  - [Refactoring] Log messages with bitcoin named routines changed for easier rename of routines in the future.

  In order to better explain the changes in this PR, a review of the existing code would be helpful.

  ### **Backstory**
  When fixing a PIVX forked coin's transition from PoW to PoS, it was observed that mining threads go into tight infinite loops after the switch to proof of stake.  This can be seen with a  simple `pivx-qt -testnet -gen`, and watching the debug log.

  This observation triggered the below code review (re-written for the current release; some of the
  findings in the code originally reviewed had already been addressed in PIVX).

  ### **Code Review**

  _BitcoinMiner()_
  This routine is a worker routine for both staking and mining threads; fProofOfStake is set to true when running in the staking thread, false when running in the mining thread.  fGeneratedBitcoins is set when mining is started; and cleared on shutdown or when mining is stopped.

  _In the initial fProofOfStake section:_
  ```
              if ((GetTime() - nMintableLastCheck > 5 * 60)) // 5 minute check time
              {
                  nMintableLastCheck = GetTime();
                  fMintableCoins = pwallet->MintableCoins();
              }

              if (chainActive.Tip()->nHeight < Params().LAST_POW_BLOCK()) {
                  MilliSleep(5000);
                  continue;
              }
  ```
  Every 5 minutes this code will scan through the wallet and look to see if mintable coins exist.  After it's done that, it checks if the network is still in the proof of work phase.  It doesn't make sense to scan the wallet until after the proof of work phase is ending.

  If it is in the proof of work phase; the staking thread sleeps for 5 seconds  (`MilliSleep(5000)`).  This only makes sense if the block time is 5 seconds.  Technically the thread could determine the number of blocks remaining in the proof of work phase, and use that to calculate a hibernation of sorts.  Using the target spacing to wait for the block to pass is a 91% reduction in the number of passes through the loop  (12 vs. 1 when the target spacing is one minute), and doesn't run into issues where adjustments to the actual spacing throw the timing of a hibernation off.

  ```
                  if (!fMintableCoins) {
                      if (GetTime() - nMintableLastCheck > 1 * 60) // 1 minute check time
                      {
                          nMintableLastCheck = GetTime();
                          fMintableCoins = pwallet->MintableCoins();
                      }
                  }
                  MilliSleep(5000);
  ```

  We come to this section of code in the waiting while loop; if we don't have mintable coins yet, or our wallet is locked, or we're not synched; or a host of other potential things that would prevent staking.  However, we check again for mintable coins; and then we wait 5 seconds after that check before we come out.

  Since the first time we come into this loop; we have already checked mintable coins (within the last 5 minutes); we should sleep first, and then do the check closer to the time we're actually going to go around the loop again; so we're working with the most recent data.

  ```
                  if (!fGenerateBitcoins && !fProofOfStake)
                      continue;
  ```

  This check is buried in a `if (fProofOfStake)` conditional, where fProofOfStake is a parameter that is passed in by the caller to BitcoinMiner().  `!fProofOfStake` will never be true; so this condition will never be true.  Removing it we are left with !fGenerateBitcoins; which is unrelated to this section of code anyway.  If we're down to this point, we're not in PoW mode anymore, so there shouldn't be a mining thread (more on that later).  But the most compelling part of this condition,whether it passes or not, is that it "continues" the while loop it's in; and since it's at the end of the actual while loop, it's going to iterate into another round of the while loop as soon as it finishes with this conditional anyway.  Long story short; the code doesn't do anything.

  _Overall logic_
  The mining thread will run until mining is turned off (`setgenerate false`, or the mining flags taken off the invocation).  However, there is no need to continue to mine with proof of work after the proof of stake phase begins.  In fact, there really is no consideration of that at all; PoW will continue to try to generate blocks well after PoS has begun.  Yes, it's within the users control to stop mining; but it's within the power of the code to take care of that for the user, and stop the mining thread(s) after the transition to proof of stake.

  ### **This PR:**
  The logical issues above have been corrected.  The dormancy for the proof of stake thread is held for just one block rather than any extreme hibernation.  Combined with moving that code to be the first thing in the while loop; it also removes the processing done to search through the wallets looking for stakeable coins.

  Since a significant amount of code assumes there will not be a transition from PoS to PoW; code was added to BitcoinMiner() to exit the mining threads if it's transitioned into the PoS phase.  The threads will continue for a little bit, in case there is any rewind on the chain; but after 6 PoS blocks are accepted, the miner threads will exit.

  To prevent the PoW thread from trying to generate blocks after the PoS phase has begun, logic was added in CreateNewBlockWithKey() to return quickly.  Rather than create a situation where the mining thread ends up in a tight loop in the initial phases of PoS, the mining thread will be held for 1/2 of the target spacing before returning.

  Lastly; Some tweaks were made to the logging; removing hardcoded references to "BitcoinMiner()", in case refactoring in the future changes the name of the routine.  Similarly, since there is a log message when the mining thread starts "PIVXMiner started"; rather than reporting thread exits or errors as "ThreadBitcoinMiner", they have been changed to PIVXMiner to match.

  Much of this can be observed with an errant `pivx-qt -gen`.  With this PR, it simply tries to start the miner, and then exits.

  _With PR code - `pivx-qt -gen -testnet`_
  ```
  2019-07-21 20:04:22 PIVXMiner started
  2019-07-21 20:04:22 BitcoinMiner: Exiting Proof of Work Mining Thread at height: 1160732
  2019-07-21 20:04:22 PIVXMiner exiting
  ```

  _Current release:_
  ```
  2019-07-21 19:37:06 CreateNewBlock(): total size 1000
  2019-07-21 19:37:06 ERROR: CheckProofOfWork() : hash doesn't match nBits
  2019-07-21 19:37:06 ERROR: CheckBlockHeader() : proof of work failed
  2019-07-21 19:37:06 ERROR: CheckBlock() : CheckBlockHeader failed
  2019-07-21 19:37:06 CreateNewBlock() : TestBlockValidity failed
  ```
  is repeated in a tight loop.

ACKs for top commit:
  furszy:
    ACK [b7a9a9c](https://github.com/PIVX-Project/PIVX/commit/b7a9a9cdb20cdee869906fb24e2bc984e8a93802)
  random-zebra:
    ACK https://github.com/PIVX-Project/PIVX/pull/958/commits/b7a9a9cdb20cdee869906fb24e2bc984e8a93802 and merging...

Tree-SHA512: 064619ce1fde75f1baf35ddb202b4573f2a8c0effc5d2939a678612e3f1d56b08d5c5d7c7bb30ce919e5a648f3f406cca35093b9a3a04c799f746fff5c6a35b6

* remove duplicate stake thread code

* add missing include

* remove zvitae pos validator

* Refine signblock code

* revert zerocoin added check

* Miner reference updates

* revert miner changes

* fix fundamentalnode sync checker

* [Refactor] Move rpc files to its own folder

* update includes

* fix rpcserver include to rpc/server.h

* [Refactor] Move wallet files to wallet dir

* [Trivial] Fix db.h path

* Merge #982: [Miner] Don't create new keys when generating PoS blocks

74e7fc7d432c7f6d586d54ff276d6babad0fe505 [Miner] Don't create new keys when generating PoS blocks (random-zebra)

Pull request description:

  This fixes the calls to `CreateNewBlockWithKey` with PoS blocks, which are not needed.
  We simply call `CreateNewBlock` with an empy script for coinbase.

  It should prevent the problem described in https://github.com/PIVX-Project/PIVX/pull/956#issuecomment-520166966

ACKs for top commit:
  CaveSpectre11:
    utACK https://github.com/PIVX-Project/PIVX/pull/982/commits/74e7fc7d432c7f6d586d54ff276d6babad0fe505
  akshaynexus:
    utACK https://github.com/PIVX-Project/PIVX/commit/74e7fc7d432c7f6d586d54ff276d6babad0fe505
  furszy:
    utACK [74e7fc7](https://github.com/PIVX-Project/PIVX/pull/982/commits/74e7fc7d432c7f6d586d54ff276d6babad0fe505)
  Warrows:
    Pretty straightforward indeed, utACK 74e7fc7

Tree-SHA512: bcb9752a689a058b6c33317136d16afd694b5da66c69cdd32a8b89b71059c5b2c5dc20c88045c52429fae99d45f508ea223f1b7d1afa5db3c77eb59befd48d51

* Merge #549: [Crypto] Switch to libsecp256k1 signature verification and update the lib

f10439c [Crypto] Add ctx initialisation for bip38 (warrows)
21234db [Crypto] Bring back function CKey.SetPrivKey for zPIV (warrows)
65e009a [Tests] Add new auto generated script tests (warrows)
6839f3b [Crypto] Switch from openssl to secp256k1 for consensus (warrows)
8a901f9 Squashed 'src/secp256k1/' content from commit 452d8e4d2 (warrows)
d98a584 [Refactor] Delete secp256k1 folder for subtreefication (warrows)

Tree-SHA512: f0f6777be57777ba86f83af1b891a6c0f384e6b059afc9249599269c71e5d3bf46a6498325488878af71b6685c6dac6cb672d0147c2ebf43b36f6d786fc38a10

* fix keystore refs

* update libscepk265k1

*  [RPC/REST] Migrate to libevent based httpd server

* fix mempooltojson and misc erroros

* Merge #769: [Main] Unify shutdown proceedure in init rather than per-app

518542f [Main] Unify shutdown proceedure in init rather than per-app (Fuzzbawls)

Tree-SHA512: 6e734ce002e236c3c2c59c2e8e93d87f5fe577b3f5546804b117a71255266cc4012d847d6a1d9b019a7b763124b45987c2dc3f95294670489cac269beceb2e3a

* Merge #542: [Network] Remove vfReachable and modify IsReachable to only use vfLimited.

38ed737 Remove vfReachable and modify IsReachable to only use vfLimited. (Patrick Strateman)

Tree-SHA512: 8aa61f9abd8356522f3ba71b35497aac07e10333a39ff4b98bb635d1246e6b1be6b0ee0b236944fbfaa558af0e6c0cc219e540eacb2232bc05db393e4a72b088

* [Refactor] Refactor bignum header file into several files

* [zerocoin] Free memory from ToString()

Simple fix for a minor memory leak

* Revert "[Refactor] Refactor bignum header file into several files"

This reverts commit c9aa98fe451e27d2bb4564747ffb0768cce56d53.

* fix delay in mining blocks

* Vitaefy Debian Docs

* Fix error when trying to stop mining process (#41)

* Give error if pow phase is finished

* Force Sync to allow for staking without mnsync

* Fix error

* Update rpcmisc.cpp

* Update rpcmisc.cpp

* more ignore

* Update fundamentalnode-sync.cpp

* Add gitian build python script

* Update Univalue

* add missing gencpp

* Add missing includes

* Fix Gitian build

Update Univalue


add missing gencpp


Add missing includes

* Revert "Update fundamentalnode-sync.cpp"

This reverts commit 323b13fc599b03982b0ca7c3f32342537a6b992f

* Fix gitian build and minor updates

* remove forcesync

* [Model] Invalid iterator position crash fix.

* background loading crash fixed.

* random: fix crash on some 64bit platforms

rbx needs to be stashed in a 64bit register on 64bit platforms. With this crash
in particular, it was holding a stack canary which was not properly restored
after the cpuid.

Split out the x86+PIC case so that x86_64 doesn't have to worry about it.

* random: Add fallback if getrandom syscall not available

If the code was compiled with newer (>=3.17) kernel headers but executed
on a system without the system call, every use of random would crash the
program. Add a fallback for that case.

* Don't assert if we were beaten to the block

A timing window exists where a wallet could be creating a new block from within the miner thread when a new block is received to the wallet.  This window will create a situation where TestBlockValidity() fails because the chain tip has changed between the time it created the new block and the time it tested the validity of the block.

This situation would result in the wallet being asserted; however this is a little overkill.  rather than asserting if the tip has changed, it is better to throw the block away.

This problem was revealed during a testnet test of an altcoin, and very prevalent when multiple wallet existed with the exact same number of staking coins received in the same transaction; or when multiple wallets were staking the same coins via import private key.  The problem happens significantly less in more normal circumstances, but was still observed in a testing environment with fast blocks.

It is likely that this scenario has been encountered but never determined to be root cause, as a crashed wallet could be restarted, re-indexed and never investigated further.

* [Wallet] Add some LOCK to avoid crash

Github-Pull: #625
Rebased-From: ed23d0d62054156e0c2cb632fecbd65588c50e8c

* testnet mining fixes

* fix placement of utxo signer

* dont sign twice

* prevent logging twice

* random files updates

* Add Chacha20 crypto files

* Merge #643: [Crypto] Use stronger rand for key generation

b7dda924cfc2405386968b0eaa32aa0e546f322c [Log] Replace a string by the function name in a log (warrows)
977f089d0d2883ca3ca1648b14423b738c9248ef [Refactor] Use arrays instead of unic vars in Chacha20 (warrows)
d8abe323bd4f5cff3ca23fc00f0093ab7b143ead [Random] Add a missing include (warrows)
27663b8f16dfaac75bae1ab0e4a0c465b838c826 Do not permit copying FastRandomContexts (Pieter Wuille)
64e03e6de1a65c8d934d8df65af48e2b92bf887a Bugfix: randbytes should seed when needed (non reachable issue) (Pieter Wuille)
e8f12aa3621e98588b82533edb56ed4865645862 Check if sys/random.h is required for getentropy on OSX. (James Hilliard)
de85c7ae55681f8a9d322f4c48c6e9ba15ee0cf1 Add attribute [[noreturn]] (C++11) to functions that will not return (practicalswift)
df46c7ff5a2e6a71ba636fa39d77f58e018816a6 Fix resource leak (Dag Robole)
d426d856d23fe6c5d6ef3d57fe2c420b9a8e4e5e Clarify entropy source (Pieter Wuille)
30a320b3d12d3529dfca1daae0e477d76acd9ae7 Use cpuid intrinsics instead of asm code (Pieter Wuille)
0c21204e6dc714de6b917d9de12b1029d0bfb67b random: fix crash on some 64bit platforms (Cory Fields)
b8bbb9c68d996b1bea579956b3c91872d6d94b8f Use rdrand as entropy source on supported platforms (Pieter Wuille)
8e19443e41f748ad54d0f8aa25907bdad0815c19 [Tests] Fix compilation (warrows)
f53edec73901a91a6c4f595b248e4058e8be5468 [Rand/test] scripted-diff: Use new naming style for insecure_rand* functions (warrows)
272f3a5ac83ba0ab72a799ce524b6605b3555751 [Random / tests]  scripted-diff: Use randbits/bool instead of randrange (warrows)
0173ee3332990ac1eea134cca5c21cc451b81d92 Replace rand() & ((1 << N) - 1) with randbits(N) (Pieter Wuille)
250de7426e8317f86fc25fe60e960c2e9e903b69 Replace more rand() % NUM by randranges (Pieter Wuille)
d6904136030d94e844074fb75b9cafda46253ce0 [Random / tests] scripted-diff: use insecure_rand256/randrange more (warrows)
4a811ff9542439d43e3df3460114d9a24f849a36 Merge test_random.h into test_bitcoin.h (Pieter Wuille)
f275e638bf0a752d9f231f2e4a781432deafbfe8 Add various insecure_rand wrappers for tests (Pieter Wuille)
602af4fb3ef45a2a821f1b76d0dbd418ec852683 Add FastRandomContext::rand256() and ::randbytes() (Pieter Wuille)
90549785824f4c13ee8cf36e77f737b5d89d0f02 Add perf counter data to GetStrongRandBytes state in scheduler (Matt Corallo)
17dd13e746b567f44015fbefaa634b278010fccf Add internal method to add new random data to our internal RNG state (Matt Corallo)
c7a1602879aff2ae72bdefe959d4026ee8c0aefc Use sanity check timestamps as entropy (Pieter Wuille)
f671fe99994cb220dede903459307c61475aeef8 Test that GetPerformanceCounter() increments (Pieter Wuille)
dcb536fb2cef719abef9bb4104242410987bfd3d Use hardware timestamps in RNG seeding (Pieter Wuille)
7c3f290b50d32a3290a2c49542d72a3a7466da58 [Random] Fix compilation (warrows)
22b78957cc90252c958bc66439c098001d47b8fc random: only use getentropy on openbsd (Cory Fields)
e5750e5c9831edf01026643deed249e0efb28f0b Add a FastRandomContext::randrange and use it (Pieter Wuille)
2a0f6cd1ca2224e2ba30aea4ab312a1919dedc0c Switch FastRandomContext to ChaCha20 (Pieter Wuille)
401ca7db468939184681b73f4b346aebcfc378c6 Introduce FastRandomContext::randbool() (Pieter Wuille)
3d056d6ed478c5bbd42d7dde4f1ab0a75ffd42b1 Add ChaCha20 (Pieter Wuille)
3c97f3f2cb1b3dc2f5d642877d9a2de0a85c06bf Kill insecure_random and associated global state (Wladimir J. van der Laan)
68ba16c78593bf221844dae95fc5edacbf69ba62 Maintain state across GetStrongRandBytes calls (Pieter Wuille)
c3c399e199c2d25d10e782dca2ef17f55b6939d0 random: Add fallback if getrandom syscall not available (Wladimir J. van der Laan)
7a8111f915fc7ed23aaec86cd95904bf5d5972fd sanity: Move OS random to sanity check function (Wladimir J. van der Laan)
387c2e9574b56ae941b7723c561ed39488891782 squashme: comment that NUM_OS_RANDOM_BYTES should not be changed lightly (Wladimir J. van der Laan)
9e8c266b158c26b361d68a3cccdbcfd7bee0b376 util: Specific GetOSRandom for Linux/FreeBSD/OpenBSD (Wladimir J. van der Laan)
f989b865f2…
rajarshimaitra pushed a commit to rajarshimaitra/bitcoin that referenced this issue Mar 23, 2021
Making RGB-1 (fungible assets) amounts u64-based
satindergrewal pushed a commit to chips-blockchain/chipschain that referenced this issue Jun 22, 2021
This was referenced Jul 15, 2014
@bitcoin bitcoin locked as resolved and limited conversation to collaborators Sep 8, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants