mirror of
https://git.wownero.com/wownero/wownero.git
synced 2024-08-15 01:03:23 +00:00
e9ffa91257
The secret spend key is kept encrypted in memory, and decrypted on the fly when needed. Both spend and view secret keys are kept encrypted in a JSON field in the keys file. This avoids leaving the keys in memory due to being manipulated by the JSON I/O API.
123 lines
5.3 KiB
C++
123 lines
5.3 KiB
C++
// Copyright (c) 2014-2018, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#pragma once
|
|
|
|
#include "cryptonote_basic.h"
|
|
#include "crypto/crypto.h"
|
|
#include "serialization/keyvalue_serialization.h"
|
|
|
|
namespace cryptonote
|
|
{
|
|
|
|
struct account_keys
|
|
{
|
|
account_public_address m_account_address;
|
|
crypto::secret_key m_spend_secret_key;
|
|
crypto::secret_key m_view_secret_key;
|
|
std::vector<crypto::secret_key> m_multisig_keys;
|
|
hw::device *m_device = &hw::get_device("default");
|
|
crypto::chacha_iv m_encryption_iv;
|
|
|
|
BEGIN_KV_SERIALIZE_MAP()
|
|
KV_SERIALIZE(m_account_address)
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_FORCE(m_spend_secret_key)
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_FORCE(m_view_secret_key)
|
|
KV_SERIALIZE_CONTAINER_POD_AS_BLOB(m_multisig_keys)
|
|
const crypto::chacha_iv default_iv{{0, 0, 0, 0, 0, 0, 0, 0}};
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_OPT(m_encryption_iv, default_iv)
|
|
END_KV_SERIALIZE_MAP()
|
|
|
|
account_keys& operator=(account_keys const&) = default;
|
|
|
|
void encrypt(const crypto::chacha_key &key);
|
|
void decrypt(const crypto::chacha_key &key);
|
|
void encrypt_viewkey(const crypto::chacha_key &key);
|
|
void decrypt_viewkey(const crypto::chacha_key &key);
|
|
|
|
hw::device& get_device() const ;
|
|
void set_device( hw::device &hwdev) ;
|
|
|
|
private:
|
|
void xor_with_key_stream(const crypto::chacha_key &key);
|
|
};
|
|
|
|
/************************************************************************/
|
|
/* */
|
|
/************************************************************************/
|
|
class account_base
|
|
{
|
|
public:
|
|
account_base();
|
|
crypto::secret_key generate(const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false, bool two_random = false);
|
|
void create_from_device(const std::string &device_name) ;
|
|
void create_from_keys(const cryptonote::account_public_address& address, const crypto::secret_key& spendkey, const crypto::secret_key& viewkey);
|
|
void create_from_viewkey(const cryptonote::account_public_address& address, const crypto::secret_key& viewkey);
|
|
bool make_multisig(const crypto::secret_key &view_secret_key, const crypto::secret_key &spend_secret_key, const crypto::public_key &spend_public_key, const std::vector<crypto::secret_key> &multisig_keys);
|
|
void finalize_multisig(const crypto::public_key &spend_public_key);
|
|
const account_keys& get_keys() const;
|
|
std::string get_public_address_str(network_type nettype) const;
|
|
std::string get_public_integrated_address_str(const crypto::hash8 &payment_id, network_type nettype) const;
|
|
|
|
hw::device& get_device() const {return m_keys.get_device();}
|
|
void set_device( hw::device &hwdev) {m_keys.set_device(hwdev);}
|
|
|
|
uint64_t get_createtime() const { return m_creation_timestamp; }
|
|
void set_createtime(uint64_t val) { m_creation_timestamp = val; }
|
|
|
|
bool load(const std::string& file_path);
|
|
bool store(const std::string& file_path);
|
|
|
|
void forget_spend_key();
|
|
const std::vector<crypto::secret_key> &get_multisig_keys() const { return m_keys.m_multisig_keys; }
|
|
|
|
void encrypt_keys(const crypto::chacha_key &key) { m_keys.encrypt(key); }
|
|
void decrypt_keys(const crypto::chacha_key &key) { m_keys.decrypt(key); }
|
|
void encrypt_viewkey(const crypto::chacha_key &key) { m_keys.encrypt_viewkey(key); }
|
|
void decrypt_viewkey(const crypto::chacha_key &key) { m_keys.decrypt_viewkey(key); }
|
|
|
|
template <class t_archive>
|
|
inline void serialize(t_archive &a, const unsigned int /*ver*/)
|
|
{
|
|
a & m_keys;
|
|
a & m_creation_timestamp;
|
|
}
|
|
|
|
BEGIN_KV_SERIALIZE_MAP()
|
|
KV_SERIALIZE(m_keys)
|
|
KV_SERIALIZE(m_creation_timestamp)
|
|
END_KV_SERIALIZE_MAP()
|
|
|
|
private:
|
|
void set_null();
|
|
account_keys m_keys;
|
|
uint64_t m_creation_timestamp;
|
|
};
|
|
}
|