mirror of
https://codeberg.org/anoncontributorxmr/monero.git
synced 2024-11-30 06:43:28 +01:00
Merge pull request #3350
4405e4fc
wallet2: check_tx_key() shouldn't require hardware encryption (stoffu)7dfa5e9e
chacha: call prehashed version explicitly as generate_chacha_key_prehashed hash: add prehashed version cn_slow_hash_prehashed slow-hash: let cn_slow_hash take 4th parameter for deciding prehashed or not slow-hash: add support for prehashed version for the other 3 platforms (stoffu)b2d23b18
crypto: revert odd namespace changes made in #3303 (stoffu)8705beaf
keypair::generate: always require hw::device to avoid possible mistake (stoffu)27a196b1
device: untangle cyclic depenency (stoffu)c9b38b47
device: made function prototypes consistent with pre-#3303 codebase (stoffu)
This commit is contained in:
commit
102a51bcd4
@ -33,7 +33,6 @@ set(crypto_sources
|
|||||||
crypto-ops-data.c
|
crypto-ops-data.c
|
||||||
crypto-ops.c
|
crypto-ops.c
|
||||||
crypto.cpp
|
crypto.cpp
|
||||||
crypto_device.cpp
|
|
||||||
groestl.c
|
groestl.c
|
||||||
hash-extra-blake.c
|
hash-extra-blake.c
|
||||||
hash-extra-groestl.c
|
hash-extra-groestl.c
|
||||||
@ -78,7 +77,6 @@ monero_add_library(cncrypto
|
|||||||
target_link_libraries(cncrypto
|
target_link_libraries(cncrypto
|
||||||
PUBLIC
|
PUBLIC
|
||||||
epee
|
epee
|
||||||
device
|
|
||||||
${Boost_SYSTEM_LIBRARY}
|
${Boost_SYSTEM_LIBRARY}
|
||||||
PRIVATE
|
PRIVATE
|
||||||
${EXTRA_LIBRARIES})
|
${EXTRA_LIBRARIES})
|
||||||
|
@ -69,10 +69,17 @@ namespace crypto {
|
|||||||
chacha20(data, length, key.data(), reinterpret_cast<const uint8_t*>(&iv), cipher);
|
chacha20(data, length, key.data(), reinterpret_cast<const uint8_t*>(&iv), cipher);
|
||||||
}
|
}
|
||||||
|
|
||||||
inline void generate_chacha_key(const void *data, size_t size, chacha_key& key, int cn_variant = 0, bool prehashed=false) {
|
inline void generate_chacha_key(const void *data, size_t size, chacha_key& key) {
|
||||||
static_assert(sizeof(chacha_key) <= sizeof(hash), "Size of hash must be at least that of chacha_key");
|
static_assert(sizeof(chacha_key) <= sizeof(hash), "Size of hash must be at least that of chacha_key");
|
||||||
tools::scrubbed_arr<char, HASH_SIZE> pwd_hash;
|
tools::scrubbed_arr<char, HASH_SIZE> pwd_hash;
|
||||||
crypto::cn_slow_hash_pre(data, size, pwd_hash.data(), cn_variant, prehashed);
|
crypto::cn_slow_hash(data, size, pwd_hash.data(), 0/*variant*/, 0/*prehashed*/);
|
||||||
|
memcpy(&key, pwd_hash.data(), sizeof(key));
|
||||||
|
}
|
||||||
|
|
||||||
|
inline void generate_chacha_key_prehashed(const void *data, size_t size, chacha_key& key) {
|
||||||
|
static_assert(sizeof(chacha_key) <= sizeof(hash), "Size of hash must be at least that of chacha_key");
|
||||||
|
tools::scrubbed_arr<char, HASH_SIZE> pwd_hash;
|
||||||
|
crypto::cn_slow_hash(data, size, pwd_hash.data(), 0/*variant*/, 1/*prehashed*/);
|
||||||
memcpy(&key, pwd_hash.data(), sizeof(key));
|
memcpy(&key, pwd_hash.data(), sizeof(key));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -436,7 +436,7 @@ namespace crypto {
|
|||||||
return sc_isnonzero(&c2) == 0;
|
return sc_isnonzero(&c2) == 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void crypto_ops::hash_to_ec(const public_key &key, ge_p3 &res) {
|
static void hash_to_ec(const public_key &key, ge_p3 &res) {
|
||||||
hash h;
|
hash h;
|
||||||
ge_p2 point;
|
ge_p2 point;
|
||||||
ge_p1p1 point2;
|
ge_p1p1 point2;
|
||||||
|
@ -46,10 +46,6 @@
|
|||||||
#include "hex.h"
|
#include "hex.h"
|
||||||
#include "span.h"
|
#include "span.h"
|
||||||
#include "hash.h"
|
#include "hash.h"
|
||||||
#include "device/device_declare.hpp"
|
|
||||||
extern "C" {
|
|
||||||
#include "crypto-ops.h"
|
|
||||||
}
|
|
||||||
|
|
||||||
namespace crypto {
|
namespace crypto {
|
||||||
|
|
||||||
@ -117,9 +113,6 @@ namespace crypto {
|
|||||||
void operator=(const crypto_ops &);
|
void operator=(const crypto_ops &);
|
||||||
~crypto_ops();
|
~crypto_ops();
|
||||||
|
|
||||||
static void hash_to_ec(const public_key &key, ge_p3 &res) ;
|
|
||||||
friend void hash_to_ec(const public_key &key, ge_p3 &res) ;
|
|
||||||
|
|
||||||
static secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key = secret_key(), bool recover = false);
|
static secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key = secret_key(), bool recover = false);
|
||||||
friend secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key, bool recover);
|
friend secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key, bool recover);
|
||||||
static bool check_key(const public_key &);
|
static bool check_key(const public_key &);
|
||||||
@ -156,17 +149,6 @@ namespace crypto {
|
|||||||
const public_key *const *, std::size_t, const signature *);
|
const public_key *const *, std::size_t, const signature *);
|
||||||
};
|
};
|
||||||
|
|
||||||
secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key, bool recover, hw::device &hwdev);
|
|
||||||
secret_key generate_keys(public_key &pub, secret_key &sec, hw::device &hwdev);
|
|
||||||
bool secret_key_to_public_key(const secret_key &sec, public_key &pub, hw::device &hwdev);
|
|
||||||
bool generate_key_derivation(const public_key &key1, const secret_key &key2, key_derivation &derivation, hw::device &hwdev);
|
|
||||||
void derivation_to_scalar(const key_derivation &derivation, size_t output_index, ec_scalar &res, hw::device &hwdev) ;
|
|
||||||
bool derive_public_key(const key_derivation &derivation, size_t output_index, const public_key &base, public_key &derived_key, hw::device &hwdev);
|
|
||||||
void derive_secret_key(const key_derivation &derivation, size_t output_index, const secret_key &base, secret_key &derived_key, hw::device &hwdev);
|
|
||||||
bool derive_subaddress_public_key(const public_key &out_key, const key_derivation &derivation, std::size_t output_index, public_key &derived_key, hw::device &hwdev);
|
|
||||||
void generate_key_image(const public_key &pub, const secret_key &sec, key_image &image, hw::device &hwdev);
|
|
||||||
|
|
||||||
|
|
||||||
/* Generate N random bytes
|
/* Generate N random bytes
|
||||||
*/
|
*/
|
||||||
inline void rand(size_t N, uint8_t *bytes) {
|
inline void rand(size_t N, uint8_t *bytes) {
|
||||||
@ -184,9 +166,6 @@ namespace crypto {
|
|||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
inline void hash_to_ec(const public_key &key, ge_p3 &res) {
|
|
||||||
crypto_ops::hash_to_ec(key,res);
|
|
||||||
}
|
|
||||||
/* Generate a new key pair
|
/* Generate a new key pair
|
||||||
*/
|
*/
|
||||||
inline secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key = secret_key(), bool recover = false) {
|
inline secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key = secret_key(), bool recover = false) {
|
||||||
|
@ -1,79 +0,0 @@
|
|||||||
// Copyright (c) 2014-2018, The Monero Project
|
|
||||||
//
|
|
||||||
// All rights reserved.
|
|
||||||
//
|
|
||||||
// Redistribution and use in source and binary forms, with or without modification, are
|
|
||||||
// permitted provided that the following conditions are met:
|
|
||||||
//
|
|
||||||
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
||||||
// conditions and the following disclaimer.
|
|
||||||
//
|
|
||||||
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
||||||
// of conditions and the following disclaimer in the documentation and/or other
|
|
||||||
// materials provided with the distribution.
|
|
||||||
//
|
|
||||||
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
||||||
// used to endorse or promote products derived from this software without specific
|
|
||||||
// prior written permission.
|
|
||||||
//
|
|
||||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
||||||
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
||||||
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
||||||
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
||||||
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
||||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
||||||
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
//
|
|
||||||
|
|
||||||
|
|
||||||
#include "crypto.h"
|
|
||||||
#include "device/device.hpp"
|
|
||||||
#include "device/log.hpp"
|
|
||||||
|
|
||||||
namespace crypto {
|
|
||||||
|
|
||||||
secret_key generate_keys(public_key &pub, secret_key &sec, const secret_key& recovery_key, bool recover, hw::device &hwdev) {
|
|
||||||
secret_key rng;
|
|
||||||
hwdev.generate_keys(pub, sec, recovery_key, recover, rng);
|
|
||||||
return rng;
|
|
||||||
}
|
|
||||||
|
|
||||||
secret_key generate_keys(public_key &pub, secret_key &sec, hw::device &hwdev) {
|
|
||||||
secret_key rng;
|
|
||||||
hwdev.generate_keys(pub, sec, secret_key(), false, rng);
|
|
||||||
return rng;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
bool secret_key_to_public_key(const secret_key &sec, public_key &pub, hw::device &hwdev) {
|
|
||||||
return hwdev.secret_key_to_public_key(sec, pub);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool generate_key_derivation(const public_key &key1, const secret_key &key2, key_derivation &derivation, hw::device &hwdev) {
|
|
||||||
return hwdev.generate_key_derivation(key1, key2, derivation);
|
|
||||||
}
|
|
||||||
|
|
||||||
void derivation_to_scalar(const key_derivation &derivation, size_t output_index, ec_scalar &res, hw::device &hwdev) {
|
|
||||||
hwdev.derivation_to_scalar(derivation, output_index, res);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool derive_public_key(const key_derivation &derivation, size_t output_index,
|
|
||||||
const public_key &base, public_key &derived_key, hw::device &hwdev) {
|
|
||||||
return hwdev.derive_public_key(derivation, output_index, base, derived_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
void derive_secret_key(const key_derivation &derivation, size_t output_index,
|
|
||||||
const secret_key &base, secret_key &derived_key, hw::device &hwdev) {
|
|
||||||
hwdev.derive_secret_key(derivation, output_index, base, derived_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool derive_subaddress_public_key(const public_key &out_key, const key_derivation &derivation, std::size_t output_index, public_key &derived_key, hw::device &hwdev) {
|
|
||||||
return hwdev.derive_subaddress_public_key(out_key, derivation, output_index, derived_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
void generate_key_image(const public_key &pub, const secret_key &sec, key_image &image, hw::device &hwdev) {
|
|
||||||
hwdev.generate_key_image(pub,sec,image);
|
|
||||||
}
|
|
||||||
}
|
|
@ -79,8 +79,7 @@ enum {
|
|||||||
};
|
};
|
||||||
|
|
||||||
void cn_fast_hash(const void *data, size_t length, char *hash);
|
void cn_fast_hash(const void *data, size_t length, char *hash);
|
||||||
void cn_slow_hash(const void *data, size_t length, char *hash, int variant);
|
void cn_slow_hash(const void *data, size_t length, char *hash, int variant, int prehashed);
|
||||||
void cn_slow_hash_pre(const void *data, size_t length, char *hash, int variant, bool pre);
|
|
||||||
|
|
||||||
void hash_extra_blake(const void *data, size_t length, char *hash);
|
void hash_extra_blake(const void *data, size_t length, char *hash);
|
||||||
void hash_extra_groestl(const void *data, size_t length, char *hash);
|
void hash_extra_groestl(const void *data, size_t length, char *hash);
|
||||||
|
@ -72,7 +72,11 @@ namespace crypto {
|
|||||||
}
|
}
|
||||||
|
|
||||||
inline void cn_slow_hash(const void *data, std::size_t length, hash &hash, int variant = 0) {
|
inline void cn_slow_hash(const void *data, std::size_t length, hash &hash, int variant = 0) {
|
||||||
cn_slow_hash(data, length, reinterpret_cast<char *>(&hash), variant);
|
cn_slow_hash(data, length, reinterpret_cast<char *>(&hash), variant, 0/*prehashed*/);
|
||||||
|
}
|
||||||
|
|
||||||
|
inline void cn_slow_hash_prehashed(const void *data, std::size_t length, hash &hash, int variant = 0) {
|
||||||
|
cn_slow_hash(data, length, reinterpret_cast<char *>(&hash), variant, 1/*prehashed*/);
|
||||||
}
|
}
|
||||||
|
|
||||||
inline void tree_hash(const hash *hashes, std::size_t count, hash &root_hash) {
|
inline void tree_hash(const hash *hashes, std::size_t count, hash &root_hash) {
|
||||||
|
@ -564,11 +564,7 @@ void slow_hash_free_state(void)
|
|||||||
* @param length the length in bytes of the data
|
* @param length the length in bytes of the data
|
||||||
* @param hash a pointer to a buffer in which the final 256 bit hash will be stored
|
* @param hash a pointer to a buffer in which the final 256 bit hash will be stored
|
||||||
*/
|
*/
|
||||||
void cn_slow_hash(const void *data, size_t length, char *hash, int variant) {
|
void cn_slow_hash(const void *data, size_t length, char *hash, int variant, int prehashed)
|
||||||
cn_slow_hash_pre(data,length,hash,variant,false);
|
|
||||||
}
|
|
||||||
|
|
||||||
void cn_slow_hash_pre(const void *data, size_t length, char *hash, int variant, bool prehashed)
|
|
||||||
{
|
{
|
||||||
RDATA_ALIGN16 uint8_t expandedKey[240]; /* These buffers are aligned to use later with SSE functions */
|
RDATA_ALIGN16 uint8_t expandedKey[240]; /* These buffers are aligned to use later with SSE functions */
|
||||||
|
|
||||||
@ -909,7 +905,7 @@ STATIC INLINE void aes_pseudo_round_xor(const uint8_t *in, uint8_t *out, const u
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void cn_slow_hash(const void *data, size_t length, char *hash, int variant)
|
void cn_slow_hash(const void *data, size_t length, char *hash, int variant, int prehashed)
|
||||||
{
|
{
|
||||||
RDATA_ALIGN16 uint8_t expandedKey[240];
|
RDATA_ALIGN16 uint8_t expandedKey[240];
|
||||||
RDATA_ALIGN16 uint8_t hp_state[MEMORY];
|
RDATA_ALIGN16 uint8_t hp_state[MEMORY];
|
||||||
@ -932,7 +928,11 @@ void cn_slow_hash(const void *data, size_t length, char *hash, int variant)
|
|||||||
|
|
||||||
/* CryptoNight Step 1: Use Keccak1600 to initialize the 'state' (and 'text') buffers from the data. */
|
/* CryptoNight Step 1: Use Keccak1600 to initialize the 'state' (and 'text') buffers from the data. */
|
||||||
|
|
||||||
|
if (prehashed) {
|
||||||
|
memcpy(&state.hs, data, length);
|
||||||
|
} else {
|
||||||
hash_process(&state.hs, data, length);
|
hash_process(&state.hs, data, length);
|
||||||
|
}
|
||||||
memcpy(text, state.init, INIT_SIZE_BYTE);
|
memcpy(text, state.init, INIT_SIZE_BYTE);
|
||||||
|
|
||||||
VARIANT1_INIT64();
|
VARIANT1_INIT64();
|
||||||
@ -1105,7 +1105,7 @@ STATIC INLINE void xor_blocks(uint8_t* a, const uint8_t* b)
|
|||||||
U64(a)[1] ^= U64(b)[1];
|
U64(a)[1] ^= U64(b)[1];
|
||||||
}
|
}
|
||||||
|
|
||||||
void cn_slow_hash(const void *data, size_t length, char *hash, int variant)
|
void cn_slow_hash(const void *data, size_t length, char *hash, int variant, int prehashed)
|
||||||
{
|
{
|
||||||
uint8_t text[INIT_SIZE_BYTE];
|
uint8_t text[INIT_SIZE_BYTE];
|
||||||
uint8_t a[AES_BLOCK_SIZE];
|
uint8_t a[AES_BLOCK_SIZE];
|
||||||
@ -1131,7 +1131,11 @@ void cn_slow_hash(const void *data, size_t length, char *hash, int variant)
|
|||||||
long_state = (uint8_t *)malloc(MEMORY);
|
long_state = (uint8_t *)malloc(MEMORY);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
if (prehashed) {
|
||||||
|
memcpy(&state.hs, data, length);
|
||||||
|
} else {
|
||||||
hash_process(&state.hs, data, length);
|
hash_process(&state.hs, data, length);
|
||||||
|
}
|
||||||
memcpy(text, state.init, INIT_SIZE_BYTE);
|
memcpy(text, state.init, INIT_SIZE_BYTE);
|
||||||
|
|
||||||
VARIANT1_INIT64();
|
VARIANT1_INIT64();
|
||||||
@ -1289,7 +1293,7 @@ union cn_slow_hash_state {
|
|||||||
};
|
};
|
||||||
#pragma pack(pop)
|
#pragma pack(pop)
|
||||||
|
|
||||||
void cn_slow_hash(const void *data, size_t length, char *hash, int variant) {
|
void cn_slow_hash(const void *data, size_t length, char *hash, int variant, int prehashed) {
|
||||||
uint8_t long_state[MEMORY];
|
uint8_t long_state[MEMORY];
|
||||||
union cn_slow_hash_state state;
|
union cn_slow_hash_state state;
|
||||||
uint8_t text[INIT_SIZE_BYTE];
|
uint8_t text[INIT_SIZE_BYTE];
|
||||||
@ -1301,7 +1305,11 @@ void cn_slow_hash(const void *data, size_t length, char *hash, int variant) {
|
|||||||
uint8_t aes_key[AES_KEY_SIZE];
|
uint8_t aes_key[AES_KEY_SIZE];
|
||||||
oaes_ctx *aes_ctx;
|
oaes_ctx *aes_ctx;
|
||||||
|
|
||||||
|
if (prehashed) {
|
||||||
|
memcpy(&state.hs, data, length);
|
||||||
|
} else {
|
||||||
hash_process(&state.hs, data, length);
|
hash_process(&state.hs, data, length);
|
||||||
|
}
|
||||||
memcpy(text, state.init, INIT_SIZE_BYTE);
|
memcpy(text, state.init, INIT_SIZE_BYTE);
|
||||||
memcpy(aes_key, state.hs.b, AES_KEY_SIZE);
|
memcpy(aes_key, state.hs.b, AES_KEY_SIZE);
|
||||||
aes_ctx = (oaes_ctx *) oaes_alloc();
|
aes_ctx = (oaes_ctx *) oaes_alloc();
|
||||||
|
@ -40,7 +40,6 @@ extern "C"
|
|||||||
}
|
}
|
||||||
#include "cryptonote_basic_impl.h"
|
#include "cryptonote_basic_impl.h"
|
||||||
#include "cryptonote_format_utils.h"
|
#include "cryptonote_format_utils.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
|
|
||||||
#undef MONERO_DEFAULT_LOG_CATEGORY
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
||||||
#define MONERO_DEFAULT_LOG_CATEGORY "account"
|
#define MONERO_DEFAULT_LOG_CATEGORY "account"
|
||||||
|
@ -33,7 +33,6 @@
|
|||||||
#include "cryptonote_basic.h"
|
#include "cryptonote_basic.h"
|
||||||
#include "crypto/crypto.h"
|
#include "crypto/crypto.h"
|
||||||
#include "serialization/keyvalue_serialization.h"
|
#include "serialization/keyvalue_serialization.h"
|
||||||
#include "device/device_declare.hpp"
|
|
||||||
|
|
||||||
namespace cryptonote
|
namespace cryptonote
|
||||||
{
|
{
|
||||||
|
@ -49,6 +49,7 @@
|
|||||||
#include "misc_language.h"
|
#include "misc_language.h"
|
||||||
#include "tx_extra.h"
|
#include "tx_extra.h"
|
||||||
#include "ringct/rctTypes.h"
|
#include "ringct/rctTypes.h"
|
||||||
|
#include "device/device.hpp"
|
||||||
|
|
||||||
namespace cryptonote
|
namespace cryptonote
|
||||||
{
|
{
|
||||||
@ -428,16 +429,10 @@ namespace cryptonote
|
|||||||
crypto::public_key pub;
|
crypto::public_key pub;
|
||||||
crypto::secret_key sec;
|
crypto::secret_key sec;
|
||||||
|
|
||||||
static inline keypair generate()
|
|
||||||
{
|
|
||||||
keypair k;
|
|
||||||
generate_keys(k.pub, k.sec);
|
|
||||||
return k;
|
|
||||||
}
|
|
||||||
static inline keypair generate(hw::device &hwdev)
|
static inline keypair generate(hw::device &hwdev)
|
||||||
{
|
{
|
||||||
keypair k;
|
keypair k;
|
||||||
generate_keys(k.pub, k.sec, hwdev);
|
hwdev.generate_keys(k.pub, k.sec);
|
||||||
return k;
|
return k;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -41,8 +41,6 @@ using namespace epee;
|
|||||||
#include "crypto/crypto.h"
|
#include "crypto/crypto.h"
|
||||||
#include "crypto/hash.h"
|
#include "crypto/hash.h"
|
||||||
#include "ringct/rctSigs.h"
|
#include "ringct/rctSigs.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
#include "device/log.hpp"
|
|
||||||
|
|
||||||
#undef MONERO_DEFAULT_LOG_CATEGORY
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
||||||
#define MONERO_DEFAULT_LOG_CATEGORY "cn"
|
#define MONERO_DEFAULT_LOG_CATEGORY "cn"
|
||||||
@ -106,16 +104,6 @@ namespace cryptonote
|
|||||||
ge_p1p1_to_p3(&A2, &tmp3);
|
ge_p1p1_to_p3(&A2, &tmp3);
|
||||||
ge_p3_tobytes(&AB, &A2);
|
ge_p3_tobytes(&AB, &A2);
|
||||||
}
|
}
|
||||||
|
|
||||||
// a copy of rct::scalarmultKey, since we can't link to libringct to avoid circular dependencies
|
|
||||||
static void secret_key_mult_public_key(crypto::public_key & aP, const crypto::public_key &P, const crypto::secret_key &a) {
|
|
||||||
ge_p3 A;
|
|
||||||
ge_p2 R;
|
|
||||||
//CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A, P.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
||||||
ge_frombytes_vartime(&A, (const unsigned char*)P.data);
|
|
||||||
ge_scalarmult(&R, (const unsigned char*)a.data, &A);
|
|
||||||
ge_tobytes((unsigned char*)aP.data, &R);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
namespace cryptonote
|
namespace cryptonote
|
||||||
@ -171,84 +159,18 @@ namespace cryptonote
|
|||||||
get_transaction_prefix_hash(tx, tx_prefix_hash);
|
get_transaction_prefix_hash(tx, tx_prefix_hash);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
//---------------------------------------------------------------
|
|
||||||
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key& a, const subaddress_index& index)
|
|
||||||
{
|
|
||||||
const char prefix[] = "SubAddr";
|
|
||||||
char data[sizeof(prefix) + sizeof(crypto::secret_key) + sizeof(subaddress_index)];
|
|
||||||
memcpy(data, prefix, sizeof(prefix));
|
|
||||||
memcpy(data + sizeof(prefix), &a, sizeof(crypto::secret_key));
|
|
||||||
memcpy(data + sizeof(prefix) + sizeof(crypto::secret_key), &index, sizeof(subaddress_index));
|
|
||||||
crypto::secret_key m;
|
|
||||||
crypto::hash_to_scalar(data, sizeof(data), m);
|
|
||||||
return m;
|
|
||||||
}
|
|
||||||
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key& a, const subaddress_index& index, hw::device &hwdev)
|
|
||||||
{
|
|
||||||
crypto::secret_key m;
|
|
||||||
hwdev.get_subaddress_secret_key(a, index, m);
|
|
||||||
return m;
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end)
|
|
||||||
{
|
|
||||||
CHECK_AND_ASSERT_THROW_MES(begin <= end, "begin > end");
|
|
||||||
|
|
||||||
std::vector<crypto::public_key> pkeys;
|
|
||||||
pkeys.reserve(end - begin);
|
|
||||||
cryptonote::subaddress_index index = {account, begin};
|
|
||||||
|
|
||||||
ge_p3 p3;
|
|
||||||
ge_cached cached;
|
|
||||||
CHECK_AND_ASSERT_THROW_MES(ge_frombytes_vartime(&p3, (const unsigned char*)keys.m_account_address.m_spend_public_key.data) == 0,
|
|
||||||
"ge_frombytes_vartime failed to convert spend public key");
|
|
||||||
ge_p3_to_cached(&cached, &p3);
|
|
||||||
|
|
||||||
for (uint32_t idx = begin; idx < end; ++idx)
|
|
||||||
{
|
|
||||||
index.minor = idx;
|
|
||||||
if (index.is_zero())
|
|
||||||
{
|
|
||||||
pkeys.push_back(keys.m_account_address.m_spend_public_key);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
const crypto::secret_key m = cryptonote::get_subaddress_secret_key(keys.m_view_secret_key, index);
|
|
||||||
|
|
||||||
// M = m*G
|
|
||||||
ge_scalarmult_base(&p3, (const unsigned char*)m.data);
|
|
||||||
|
|
||||||
// D = B + M
|
|
||||||
crypto::public_key D;
|
|
||||||
ge_p1p1 p1p1;
|
|
||||||
ge_add(&p1p1, &p3, &cached);
|
|
||||||
ge_p1p1_to_p3(&p3, &p1p1);
|
|
||||||
ge_p3_tobytes((unsigned char*)D.data, &p3);
|
|
||||||
|
|
||||||
pkeys.push_back(D);
|
|
||||||
}
|
|
||||||
return pkeys;
|
|
||||||
}
|
|
||||||
|
|
||||||
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, hw::device &hwdev)
|
|
||||||
{
|
|
||||||
std::vector<crypto::public_key> pkeys;
|
|
||||||
hwdev.get_subaddress_spend_public_keys(keys, account, begin, end, pkeys);
|
|
||||||
return pkeys;
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
//---------------------------------------------------------------
|
||||||
bool generate_key_image_helper(const account_keys& ack, const std::unordered_map<crypto::public_key, subaddress_index>& subaddresses, const crypto::public_key& out_key, const crypto::public_key& tx_public_key, const std::vector<crypto::public_key>& additional_tx_public_keys, size_t real_output_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev)
|
bool generate_key_image_helper(const account_keys& ack, const std::unordered_map<crypto::public_key, subaddress_index>& subaddresses, const crypto::public_key& out_key, const crypto::public_key& tx_public_key, const std::vector<crypto::public_key>& additional_tx_public_keys, size_t real_output_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev)
|
||||||
{
|
{
|
||||||
crypto::key_derivation recv_derivation = AUTO_VAL_INIT(recv_derivation);
|
crypto::key_derivation recv_derivation = AUTO_VAL_INIT(recv_derivation);
|
||||||
bool r = crypto::generate_key_derivation(tx_public_key, ack.m_view_secret_key, recv_derivation, hwdev);
|
bool r = hwdev.generate_key_derivation(tx_public_key, ack.m_view_secret_key, recv_derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "key image helper: failed to generate_key_derivation(" << tx_public_key << ", " << ack.m_view_secret_key << ")");
|
CHECK_AND_ASSERT_MES(r, false, "key image helper: failed to generate_key_derivation(" << tx_public_key << ", " << ack.m_view_secret_key << ")");
|
||||||
|
|
||||||
std::vector<crypto::key_derivation> additional_recv_derivations;
|
std::vector<crypto::key_derivation> additional_recv_derivations;
|
||||||
for (size_t i = 0; i < additional_tx_public_keys.size(); ++i)
|
for (size_t i = 0; i < additional_tx_public_keys.size(); ++i)
|
||||||
{
|
{
|
||||||
crypto::key_derivation additional_recv_derivation = AUTO_VAL_INIT(additional_recv_derivation);
|
crypto::key_derivation additional_recv_derivation = AUTO_VAL_INIT(additional_recv_derivation);
|
||||||
r = crypto::generate_key_derivation(additional_tx_public_keys[i], ack.m_view_secret_key, additional_recv_derivation, hwdev);
|
r = hwdev.generate_key_derivation(additional_tx_public_keys[i], ack.m_view_secret_key, additional_recv_derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "key image helper: failed to generate_key_derivation(" << additional_tx_public_keys[i] << ", " << ack.m_view_secret_key << ")");
|
CHECK_AND_ASSERT_MES(r, false, "key image helper: failed to generate_key_derivation(" << additional_tx_public_keys[i] << ", " << ack.m_view_secret_key << ")");
|
||||||
additional_recv_derivations.push_back(additional_recv_derivation);
|
additional_recv_derivations.push_back(additional_recv_derivation);
|
||||||
}
|
}
|
||||||
@ -271,7 +193,7 @@ namespace cryptonote
|
|||||||
{
|
{
|
||||||
// derive secret key with subaddress - step 1: original CN derivation
|
// derive secret key with subaddress - step 1: original CN derivation
|
||||||
crypto::secret_key scalar_step1;
|
crypto::secret_key scalar_step1;
|
||||||
crypto::derive_secret_key(recv_derivation, real_output_index, ack.m_spend_secret_key, scalar_step1, hwdev); // computes Hs(a*R || idx) + b
|
hwdev.derive_secret_key(recv_derivation, real_output_index, ack.m_spend_secret_key, scalar_step1); // computes Hs(a*R || idx) + b
|
||||||
|
|
||||||
// step 2: add Hs(a || index_major || index_minor)
|
// step 2: add Hs(a || index_major || index_minor)
|
||||||
crypto::secret_key subaddr_sk;
|
crypto::secret_key subaddr_sk;
|
||||||
@ -282,7 +204,7 @@ namespace cryptonote
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
hwdev.get_subaddress_secret_key(ack.m_view_secret_key, received_index, subaddr_sk);
|
subaddr_sk = hwdev.get_subaddress_secret_key(ack.m_view_secret_key, received_index);
|
||||||
hwdev.sc_secret_add(scalar_step2, scalar_step1,subaddr_sk);
|
hwdev.sc_secret_add(scalar_step2, scalar_step1,subaddr_sk);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -291,17 +213,17 @@ namespace cryptonote
|
|||||||
if (ack.m_multisig_keys.empty())
|
if (ack.m_multisig_keys.empty())
|
||||||
{
|
{
|
||||||
// when not in multisig, we know the full spend secret key, so the output pubkey can be obtained by scalarmultBase
|
// when not in multisig, we know the full spend secret key, so the output pubkey can be obtained by scalarmultBase
|
||||||
CHECK_AND_ASSERT_MES(crypto::secret_key_to_public_key(in_ephemeral.sec, in_ephemeral.pub, hwdev), false, "Failed to derive public key");
|
CHECK_AND_ASSERT_MES(hwdev.secret_key_to_public_key(in_ephemeral.sec, in_ephemeral.pub), false, "Failed to derive public key");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
// when in multisig, we only know the partial spend secret key. but we do know the full spend public key, so the output pubkey can be obtained by using the standard CN key derivation
|
// when in multisig, we only know the partial spend secret key. but we do know the full spend public key, so the output pubkey can be obtained by using the standard CN key derivation
|
||||||
CHECK_AND_ASSERT_MES(crypto::derive_public_key(recv_derivation, real_output_index, ack.m_account_address.m_spend_public_key, in_ephemeral.pub, hwdev), false, "Failed to derive public key");
|
CHECK_AND_ASSERT_MES(hwdev.derive_public_key(recv_derivation, real_output_index, ack.m_account_address.m_spend_public_key, in_ephemeral.pub), false, "Failed to derive public key");
|
||||||
// and don't forget to add the contribution from the subaddress part
|
// and don't forget to add the contribution from the subaddress part
|
||||||
if (!received_index.is_zero())
|
if (!received_index.is_zero())
|
||||||
{
|
{
|
||||||
crypto::public_key subaddr_pk;
|
crypto::public_key subaddr_pk;
|
||||||
CHECK_AND_ASSERT_MES(crypto::secret_key_to_public_key(subaddr_sk, subaddr_pk, hwdev), false, "Failed to derive public key");
|
CHECK_AND_ASSERT_MES(hwdev.secret_key_to_public_key(subaddr_sk, subaddr_pk), false, "Failed to derive public key");
|
||||||
add_public_key(in_ephemeral.pub, in_ephemeral.pub, subaddr_pk);
|
add_public_key(in_ephemeral.pub, in_ephemeral.pub, subaddr_pk);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -310,7 +232,7 @@ namespace cryptonote
|
|||||||
false, "key image helper precomp: given output pubkey doesn't match the derived one");
|
false, "key image helper precomp: given output pubkey doesn't match the derived one");
|
||||||
}
|
}
|
||||||
|
|
||||||
crypto::generate_key_image(in_ephemeral.pub, in_ephemeral.sec, ki, hwdev);
|
hwdev.generate_key_image(in_ephemeral.pub, in_ephemeral.sec, ki);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
//---------------------------------------------------------------
|
//---------------------------------------------------------------
|
||||||
@ -574,41 +496,6 @@ namespace cryptonote
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
//---------------------------------------------------------------
|
//---------------------------------------------------------------
|
||||||
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key)
|
|
||||||
{
|
|
||||||
crypto::key_derivation derivation;
|
|
||||||
crypto::hash hash;
|
|
||||||
char data[33]; /* A hash, and an extra byte */
|
|
||||||
|
|
||||||
if (!generate_key_derivation(public_key, secret_key, derivation))
|
|
||||||
return false;
|
|
||||||
|
|
||||||
memcpy(data, &derivation, 32);
|
|
||||||
data[32] = ENCRYPTED_PAYMENT_ID_TAIL;
|
|
||||||
cn_fast_hash(data, 33, hash);
|
|
||||||
|
|
||||||
for (size_t b = 0; b < 8; ++b)
|
|
||||||
payment_id.data[b] ^= hash.data[b];
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key)
|
|
||||||
{
|
|
||||||
// Encryption and decryption are the same operation (xor with a key)
|
|
||||||
return encrypt_payment_id(payment_id, public_key, secret_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key,hw::device &hwdev)
|
|
||||||
{
|
|
||||||
return hwdev.encrypt_payment_id(public_key, secret_key, payment_id);
|
|
||||||
}
|
|
||||||
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key, hw::device &hwdev)
|
|
||||||
{
|
|
||||||
// Encryption and decryption are the same operation (xor with a key)
|
|
||||||
return encrypt_payment_id(payment_id, public_key, secret_key, hwdev);
|
|
||||||
}
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
bool get_inputs_money_amount(const transaction& tx, uint64_t& money)
|
bool get_inputs_money_amount(const transaction& tx, uint64_t& money)
|
||||||
{
|
{
|
||||||
money = 0;
|
money = 0;
|
||||||
@ -708,10 +595,10 @@ namespace cryptonote
|
|||||||
bool is_out_to_acc(const account_keys& acc, const txout_to_key& out_key, const crypto::public_key& tx_pub_key, const std::vector<crypto::public_key>& additional_tx_pub_keys, size_t output_index)
|
bool is_out_to_acc(const account_keys& acc, const txout_to_key& out_key, const crypto::public_key& tx_pub_key, const std::vector<crypto::public_key>& additional_tx_pub_keys, size_t output_index)
|
||||||
{
|
{
|
||||||
crypto::key_derivation derivation;
|
crypto::key_derivation derivation;
|
||||||
bool r = generate_key_derivation(tx_pub_key, acc.m_view_secret_key, derivation, acc.get_device());
|
bool r = acc.get_device().generate_key_derivation(tx_pub_key, acc.m_view_secret_key, derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "Failed to generate key derivation");
|
CHECK_AND_ASSERT_MES(r, false, "Failed to generate key derivation");
|
||||||
crypto::public_key pk;
|
crypto::public_key pk;
|
||||||
r = derive_public_key(derivation, output_index, acc.m_account_address.m_spend_public_key, pk, acc.get_device());
|
r = acc.get_device().derive_public_key(derivation, output_index, acc.m_account_address.m_spend_public_key, pk);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "Failed to derive public key");
|
CHECK_AND_ASSERT_MES(r, false, "Failed to derive public key");
|
||||||
if (pk == out_key.key)
|
if (pk == out_key.key)
|
||||||
return true;
|
return true;
|
||||||
@ -719,9 +606,9 @@ namespace cryptonote
|
|||||||
if (!additional_tx_pub_keys.empty())
|
if (!additional_tx_pub_keys.empty())
|
||||||
{
|
{
|
||||||
CHECK_AND_ASSERT_MES(output_index < additional_tx_pub_keys.size(), false, "wrong number of additional tx pubkeys");
|
CHECK_AND_ASSERT_MES(output_index < additional_tx_pub_keys.size(), false, "wrong number of additional tx pubkeys");
|
||||||
r = generate_key_derivation(additional_tx_pub_keys[output_index], acc.m_view_secret_key, derivation, acc.get_device());
|
r = acc.get_device().generate_key_derivation(additional_tx_pub_keys[output_index], acc.m_view_secret_key, derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "Failed to generate key derivation");
|
CHECK_AND_ASSERT_MES(r, false, "Failed to generate key derivation");
|
||||||
r = derive_public_key(derivation, output_index, acc.m_account_address.m_spend_public_key, pk, acc.get_device());
|
r = acc.get_device().derive_public_key(derivation, output_index, acc.m_account_address.m_spend_public_key, pk);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "Failed to derive public key");
|
CHECK_AND_ASSERT_MES(r, false, "Failed to derive public key");
|
||||||
return pk == out_key.key;
|
return pk == out_key.key;
|
||||||
}
|
}
|
||||||
@ -732,7 +619,7 @@ namespace cryptonote
|
|||||||
{
|
{
|
||||||
// try the shared tx pubkey
|
// try the shared tx pubkey
|
||||||
crypto::public_key subaddress_spendkey;
|
crypto::public_key subaddress_spendkey;
|
||||||
derive_subaddress_public_key(out_key, derivation, output_index, subaddress_spendkey,hwdev);
|
hwdev.derive_subaddress_public_key(out_key, derivation, output_index, subaddress_spendkey);
|
||||||
auto found = subaddresses.find(subaddress_spendkey);
|
auto found = subaddresses.find(subaddress_spendkey);
|
||||||
if (found != subaddresses.end())
|
if (found != subaddresses.end())
|
||||||
return subaddress_receive_info{ found->second, derivation };
|
return subaddress_receive_info{ found->second, derivation };
|
||||||
@ -740,7 +627,7 @@ namespace cryptonote
|
|||||||
if (!additional_derivations.empty())
|
if (!additional_derivations.empty())
|
||||||
{
|
{
|
||||||
CHECK_AND_ASSERT_MES(output_index < additional_derivations.size(), boost::none, "wrong number of additional derivations");
|
CHECK_AND_ASSERT_MES(output_index < additional_derivations.size(), boost::none, "wrong number of additional derivations");
|
||||||
derive_subaddress_public_key(out_key, additional_derivations[output_index], output_index, subaddress_spendkey, hwdev);
|
hwdev.derive_subaddress_public_key(out_key, additional_derivations[output_index], output_index, subaddress_spendkey);
|
||||||
found = subaddresses.find(subaddress_spendkey);
|
found = subaddresses.find(subaddress_spendkey);
|
||||||
if (found != subaddresses.end())
|
if (found != subaddresses.end())
|
||||||
return subaddress_receive_info{ found->second, additional_derivations[output_index] };
|
return subaddress_receive_info{ found->second, additional_derivations[output_index] };
|
||||||
@ -1140,64 +1027,4 @@ namespace cryptonote
|
|||||||
sc_sub((unsigned char*)key.data, (const unsigned char*)key.data, (const unsigned char*)hash.data);
|
sc_sub((unsigned char*)key.data, (const unsigned char*)key.data, (const unsigned char*)hash.data);
|
||||||
return key;
|
return key;
|
||||||
}
|
}
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
#define CHACHA8_KEY_TAIL 0x8c
|
|
||||||
bool generate_chacha_key_from_secret_keys(const account_keys &keys, crypto::chacha_key &key)
|
|
||||||
{
|
|
||||||
const crypto::secret_key &view_key = keys.m_view_secret_key;
|
|
||||||
const crypto::secret_key &spend_key = keys.m_spend_secret_key;
|
|
||||||
tools::scrubbed_arr<char, sizeof(view_key) + sizeof(spend_key) + 1> data;
|
|
||||||
memcpy(data.data(), &view_key, sizeof(view_key));
|
|
||||||
memcpy(data.data() + sizeof(view_key), &spend_key, sizeof(spend_key));
|
|
||||||
data[sizeof(data) - 1] = CHACHA8_KEY_TAIL;
|
|
||||||
crypto::generate_chacha_key(data.data(), sizeof(data), key);
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index)
|
|
||||||
{
|
|
||||||
if (index.is_zero())
|
|
||||||
return keys.m_account_address.m_spend_public_key;
|
|
||||||
|
|
||||||
// m = Hs(a || index_major || index_minor)
|
|
||||||
crypto::secret_key m = cryptonote::get_subaddress_secret_key(keys.m_view_secret_key, index);
|
|
||||||
|
|
||||||
// M = m*G
|
|
||||||
crypto::public_key M;
|
|
||||||
crypto::secret_key_to_public_key(m, M);
|
|
||||||
|
|
||||||
// D = B + M
|
|
||||||
crypto::public_key D;
|
|
||||||
add_public_key(D, keys.m_account_address.m_spend_public_key, M); // could have defined add_public_key() under src/crypto
|
|
||||||
return D;
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index)
|
|
||||||
{
|
|
||||||
if (index.is_zero())
|
|
||||||
return keys.m_account_address;
|
|
||||||
|
|
||||||
crypto::public_key D = get_subaddress_spend_public_key(keys, index);
|
|
||||||
|
|
||||||
// C = a*D
|
|
||||||
crypto::public_key C;
|
|
||||||
secret_key_mult_public_key(C, D, keys.m_view_secret_key); // could have defined secret_key_mult_public_key() under src/crypto
|
|
||||||
|
|
||||||
// result: (C, D)
|
|
||||||
cryptonote::account_public_address address;
|
|
||||||
address.m_view_public_key = C;
|
|
||||||
address.m_spend_public_key = D;
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
//---------------------------------------------------------------
|
|
||||||
bool verify_keys(const crypto::secret_key& sec, const crypto::public_key& expected_pub)
|
|
||||||
{
|
|
||||||
crypto::public_key pub;
|
|
||||||
bool r = crypto::secret_key_to_public_key(sec, pub);
|
|
||||||
return r && expected_pub == pub;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -37,7 +37,6 @@
|
|||||||
#include "crypto/crypto.h"
|
#include "crypto/crypto.h"
|
||||||
#include "crypto/hash.h"
|
#include "crypto/hash.h"
|
||||||
#include <unordered_map>
|
#include <unordered_map>
|
||||||
#include "device/device_declare.hpp"
|
|
||||||
|
|
||||||
namespace epee
|
namespace epee
|
||||||
{
|
{
|
||||||
@ -52,10 +51,6 @@ namespace cryptonote
|
|||||||
bool parse_and_validate_tx_from_blob(const blobdata& tx_blob, transaction& tx, crypto::hash& tx_hash, crypto::hash& tx_prefix_hash);
|
bool parse_and_validate_tx_from_blob(const blobdata& tx_blob, transaction& tx, crypto::hash& tx_hash, crypto::hash& tx_prefix_hash);
|
||||||
bool parse_and_validate_tx_from_blob(const blobdata& tx_blob, transaction& tx);
|
bool parse_and_validate_tx_from_blob(const blobdata& tx_blob, transaction& tx);
|
||||||
bool parse_and_validate_tx_base_from_blob(const blobdata& tx_blob, transaction& tx);
|
bool parse_and_validate_tx_base_from_blob(const blobdata& tx_blob, transaction& tx);
|
||||||
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key);
|
|
||||||
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key, hw::device &hwdev);
|
|
||||||
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key);
|
|
||||||
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key, hw::device &hwdev);
|
|
||||||
|
|
||||||
template<typename T>
|
template<typename T>
|
||||||
bool find_tx_extra_field_by_type(const std::vector<tx_extra_field>& tx_extra_fields, T& field, size_t index = 0)
|
bool find_tx_extra_field_by_type(const std::vector<tx_extra_field>& tx_extra_fields, T& field, size_t index = 0)
|
||||||
@ -95,10 +90,6 @@ namespace cryptonote
|
|||||||
bool lookup_acc_outs(const account_keys& acc, const transaction& tx, std::vector<size_t>& outs, uint64_t& money_transfered);
|
bool lookup_acc_outs(const account_keys& acc, const transaction& tx, std::vector<size_t>& outs, uint64_t& money_transfered);
|
||||||
bool get_tx_fee(const transaction& tx, uint64_t & fee);
|
bool get_tx_fee(const transaction& tx, uint64_t & fee);
|
||||||
uint64_t get_tx_fee(const transaction& tx);
|
uint64_t get_tx_fee(const transaction& tx);
|
||||||
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key& a, const subaddress_index& index);
|
|
||||||
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key& a, const subaddress_index& index, hw::device &hwdev);
|
|
||||||
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end);
|
|
||||||
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, hw::device &hwdev);
|
|
||||||
bool generate_key_image_helper(const account_keys& ack, const std::unordered_map<crypto::public_key, subaddress_index>& subaddresses, const crypto::public_key& out_key, const crypto::public_key& tx_public_key, const std::vector<crypto::public_key>& additional_tx_public_keys, size_t real_output_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev);
|
bool generate_key_image_helper(const account_keys& ack, const std::unordered_map<crypto::public_key, subaddress_index>& subaddresses, const crypto::public_key& out_key, const crypto::public_key& tx_public_key, const std::vector<crypto::public_key>& additional_tx_public_keys, size_t real_output_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev);
|
||||||
bool generate_key_image_helper_precomp(const account_keys& ack, const crypto::public_key& out_key, const crypto::key_derivation& recv_derivation, size_t real_output_index, const subaddress_index& received_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev);
|
bool generate_key_image_helper_precomp(const account_keys& ack, const crypto::public_key& out_key, const crypto::key_derivation& recv_derivation, size_t real_output_index, const subaddress_index& received_index, keypair& in_ephemeral, crypto::key_image& ki, hw::device &hwdev);
|
||||||
void get_blob_hash(const blobdata& blob, crypto::hash& res);
|
void get_blob_hash(const blobdata& blob, crypto::hash& res);
|
||||||
@ -242,10 +233,4 @@ namespace cryptonote
|
|||||||
#define CHECKED_GET_SPECIFIC_VARIANT(variant_var, specific_type, variable_name, fail_return_val) \
|
#define CHECKED_GET_SPECIFIC_VARIANT(variant_var, specific_type, variable_name, fail_return_val) \
|
||||||
CHECK_AND_ASSERT_MES(variant_var.type() == typeid(specific_type), fail_return_val, "wrong variant type: " << variant_var.type().name() << ", expected " << typeid(specific_type).name()); \
|
CHECK_AND_ASSERT_MES(variant_var.type() == typeid(specific_type), fail_return_val, "wrong variant type: " << variant_var.type().name() << ", expected " << typeid(specific_type).name()); \
|
||||||
specific_type& variable_name = boost::get<specific_type>(variant_var);
|
specific_type& variable_name = boost::get<specific_type>(variant_var);
|
||||||
|
|
||||||
cryptonote::account_public_address get_subaddress(const cryptonote::account_keys &keys, const cryptonote::subaddress_index& index);
|
|
||||||
crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys &keys, const cryptonote::subaddress_index& index);
|
|
||||||
bool generate_chacha_key_from_secret_keys(const cryptonote::account_keys &keys, crypto::chacha_key &key);
|
|
||||||
bool verify_keys(const crypto::secret_key& sec, const crypto::public_key& expected_pub);
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -41,7 +41,6 @@ using namespace epee;
|
|||||||
#include "crypto/hash.h"
|
#include "crypto/hash.h"
|
||||||
#include "ringct/rctSigs.h"
|
#include "ringct/rctSigs.h"
|
||||||
#include "multisig/multisig.h"
|
#include "multisig/multisig.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
|
|
||||||
using namespace crypto;
|
using namespace crypto;
|
||||||
|
|
||||||
@ -79,7 +78,7 @@ namespace cryptonote
|
|||||||
tx.vout.clear();
|
tx.vout.clear();
|
||||||
tx.extra.clear();
|
tx.extra.clear();
|
||||||
|
|
||||||
keypair txkey = keypair::generate();
|
keypair txkey = keypair::generate(hw::get_device("default"));
|
||||||
add_tx_pub_key_to_extra(tx, txkey.pub);
|
add_tx_pub_key_to_extra(tx, txkey.pub);
|
||||||
if(!extra_nonce.empty())
|
if(!extra_nonce.empty())
|
||||||
if(!add_extra_nonce_to_tx_extra(tx.extra, extra_nonce))
|
if(!add_extra_nonce_to_tx_extra(tx.extra, extra_nonce))
|
||||||
@ -237,7 +236,7 @@ namespace cryptonote
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!encrypt_payment_id(payment_id, view_key_pub, tx_key, hwdev))
|
if (!hwdev.encrypt_payment_id(payment_id, view_key_pub, tx_key))
|
||||||
{
|
{
|
||||||
LOG_ERROR("Failed to encrypt payment id");
|
LOG_ERROR("Failed to encrypt payment id");
|
||||||
return false;
|
return false;
|
||||||
@ -343,11 +342,11 @@ namespace cryptonote
|
|||||||
// if this is a single-destination transfer to a subaddress, we set the tx pubkey to R=s*D
|
// if this is a single-destination transfer to a subaddress, we set the tx pubkey to R=s*D
|
||||||
if (num_stdaddresses == 0 && num_subaddresses == 1)
|
if (num_stdaddresses == 0 && num_subaddresses == 1)
|
||||||
{
|
{
|
||||||
txkey_pub = rct::rct2pk(rct::scalarmultKey(rct::pk2rct(single_dest_subaddress.m_spend_public_key), rct::sk2rct(tx_key), hwdev));
|
txkey_pub = rct::rct2pk(hwdev.scalarmultKey(rct::pk2rct(single_dest_subaddress.m_spend_public_key), rct::sk2rct(tx_key)));
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
txkey_pub = rct::rct2pk(rct::scalarmultBase(rct::sk2rct(tx_key), hwdev));
|
txkey_pub = rct::rct2pk(hwdev.scalarmultBase(rct::sk2rct(tx_key)));
|
||||||
}
|
}
|
||||||
remove_field_from_tx_extra(tx.extra, typeid(tx_extra_pub_key));
|
remove_field_from_tx_extra(tx.extra, typeid(tx_extra_pub_key));
|
||||||
add_tx_pub_key_to_extra(tx, txkey_pub);
|
add_tx_pub_key_to_extra(tx, txkey_pub);
|
||||||
@ -376,22 +375,22 @@ namespace cryptonote
|
|||||||
{
|
{
|
||||||
additional_txkey.sec = additional_tx_keys[output_index];
|
additional_txkey.sec = additional_tx_keys[output_index];
|
||||||
if (dst_entr.is_subaddress)
|
if (dst_entr.is_subaddress)
|
||||||
additional_txkey.pub = rct::rct2pk(rct::scalarmultKey(rct::pk2rct(dst_entr.addr.m_spend_public_key), rct::sk2rct(additional_txkey.sec),hwdev));
|
additional_txkey.pub = rct::rct2pk(hwdev.scalarmultKey(rct::pk2rct(dst_entr.addr.m_spend_public_key), rct::sk2rct(additional_txkey.sec)));
|
||||||
else
|
else
|
||||||
additional_txkey.pub = rct::rct2pk(rct::scalarmultBase(rct::sk2rct(additional_txkey.sec), hwdev));
|
additional_txkey.pub = rct::rct2pk(hwdev.scalarmultBase(rct::sk2rct(additional_txkey.sec)));
|
||||||
}
|
}
|
||||||
|
|
||||||
bool r;
|
bool r;
|
||||||
if (change_addr && dst_entr.addr == *change_addr)
|
if (change_addr && dst_entr.addr == *change_addr)
|
||||||
{
|
{
|
||||||
// sending change to yourself; derivation = a*R
|
// sending change to yourself; derivation = a*R
|
||||||
r = crypto::generate_key_derivation(txkey_pub, sender_account_keys.m_view_secret_key, derivation, hwdev);
|
r = hwdev.generate_key_derivation(txkey_pub, sender_account_keys.m_view_secret_key, derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to generate_key_derivation(" << txkey_pub << ", " << sender_account_keys.m_view_secret_key << ")");
|
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to generate_key_derivation(" << txkey_pub << ", " << sender_account_keys.m_view_secret_key << ")");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
// sending to the recipient; derivation = r*A (or s*C in the subaddress scheme)
|
// sending to the recipient; derivation = r*A (or s*C in the subaddress scheme)
|
||||||
r = crypto::generate_key_derivation(dst_entr.addr.m_view_public_key, dst_entr.is_subaddress && need_additional_txkeys ? additional_txkey.sec : tx_key, derivation, hwdev);
|
r = hwdev.generate_key_derivation(dst_entr.addr.m_view_public_key, dst_entr.is_subaddress && need_additional_txkeys ? additional_txkey.sec : tx_key, derivation);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to generate_key_derivation(" << dst_entr.addr.m_view_public_key << ", " << (dst_entr.is_subaddress && need_additional_txkeys ? additional_txkey.sec : tx_key) << ")");
|
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to generate_key_derivation(" << dst_entr.addr.m_view_public_key << ", " << (dst_entr.is_subaddress && need_additional_txkeys ? additional_txkey.sec : tx_key) << ")");
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -403,10 +402,10 @@ namespace cryptonote
|
|||||||
if (tx.version > 1)
|
if (tx.version > 1)
|
||||||
{
|
{
|
||||||
crypto::secret_key scalar1;
|
crypto::secret_key scalar1;
|
||||||
crypto::derivation_to_scalar(derivation, output_index, scalar1, hwdev);
|
hwdev.derivation_to_scalar(derivation, output_index, scalar1);
|
||||||
amount_keys.push_back(rct::sk2rct(scalar1));
|
amount_keys.push_back(rct::sk2rct(scalar1));
|
||||||
}
|
}
|
||||||
r = crypto::derive_public_key(derivation, output_index, dst_entr.addr.m_spend_public_key, out_eph_public_key, hwdev);
|
r = hwdev.derive_public_key(derivation, output_index, dst_entr.addr.m_spend_public_key, out_eph_public_key);
|
||||||
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to derive_public_key(" << derivation << ", " << output_index << ", "<< dst_entr.addr.m_spend_public_key << ")");
|
CHECK_AND_ASSERT_MES(r, false, "at creation outs: failed to derive_public_key(" << derivation << ", " << output_index << ", "<< dst_entr.addr.m_spend_public_key << ")");
|
||||||
|
|
||||||
hwdev.add_output_key_mapping(dst_entr.addr.m_view_public_key, dst_entr.addr.m_spend_public_key, dst_entr.is_subaddress, output_index, amount_keys.back(), out_eph_public_key);
|
hwdev.add_output_key_mapping(dst_entr.addr.m_view_public_key, dst_entr.addr.m_spend_public_key, dst_entr.is_subaddress, output_index, amount_keys.back(), out_eph_public_key);
|
||||||
|
@ -37,7 +37,6 @@ if(PCSC_FOUND)
|
|||||||
endif()
|
endif()
|
||||||
|
|
||||||
set(device_headers
|
set(device_headers
|
||||||
device_declare.hpp
|
|
||||||
device.hpp
|
device.hpp
|
||||||
device_default.hpp
|
device_default.hpp
|
||||||
log.hpp
|
log.hpp
|
||||||
@ -68,7 +67,7 @@ target_link_libraries(device
|
|||||||
PUBLIC
|
PUBLIC
|
||||||
${PCSC_LIBRARIES}
|
${PCSC_LIBRARIES}
|
||||||
cncrypto
|
cncrypto
|
||||||
ringct
|
ringct_basic
|
||||||
${OPENSSL_CRYPTO_LIBRARIES}
|
${OPENSSL_CRYPTO_LIBRARIES}
|
||||||
PRIVATE
|
PRIVATE
|
||||||
${Blocks}
|
${Blocks}
|
||||||
|
@ -44,9 +44,9 @@
|
|||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include "cryptonote_basic/cryptonote_basic.h"
|
#include "crypto/crypto.h"
|
||||||
#include "cryptonote_basic/account.h"
|
#include "crypto/chacha.h"
|
||||||
#include "cryptonote_basic/subaddress_index.h"
|
#include "ringct/rctTypes.h"
|
||||||
|
|
||||||
#ifndef USE_DEVICE_LEDGER
|
#ifndef USE_DEVICE_LEDGER
|
||||||
#define USE_DEVICE_LEDGER 1
|
#define USE_DEVICE_LEDGER 1
|
||||||
@ -61,6 +61,14 @@
|
|||||||
#define WITH_DEVICE_LEDGER
|
#define WITH_DEVICE_LEDGER
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
// forward declaration needed because this header is included by headers in libcryptonote_basic which depends on libdevice
|
||||||
|
namespace cryptonote
|
||||||
|
{
|
||||||
|
struct account_public_address;
|
||||||
|
struct account_keys;
|
||||||
|
struct subaddress_index;
|
||||||
|
}
|
||||||
|
|
||||||
namespace hw {
|
namespace hw {
|
||||||
namespace {
|
namespace {
|
||||||
//device funcion not supported
|
//device funcion not supported
|
||||||
@ -109,10 +117,10 @@ namespace hw {
|
|||||||
/* SUB ADDRESS */
|
/* SUB ADDRESS */
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
virtual bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) = 0;
|
virtual bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) = 0;
|
||||||
virtual bool get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index, crypto::public_key &D) = 0;
|
virtual crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index) = 0;
|
||||||
virtual bool get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, std::vector<crypto::public_key> &pkeys) = 0;
|
virtual std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) = 0;
|
||||||
virtual bool get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, cryptonote::account_public_address &address) = 0;
|
virtual cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) = 0;
|
||||||
virtual bool get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index, crypto::secret_key &sub_sec) = 0;
|
virtual crypto::secret_key get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) = 0;
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
/* DERIVATION & KEY */
|
/* DERIVATION & KEY */
|
||||||
@ -121,7 +129,7 @@ namespace hw {
|
|||||||
virtual bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) = 0;
|
virtual bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) = 0;
|
||||||
virtual bool scalarmultBase(rct::key &aG, const rct::key &a) = 0;
|
virtual bool scalarmultBase(rct::key &aG, const rct::key &a) = 0;
|
||||||
virtual bool sc_secret_add( crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) = 0;
|
virtual bool sc_secret_add( crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) = 0;
|
||||||
virtual bool generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover, crypto::secret_key &rng) = 0;
|
virtual crypto::secret_key generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false) = 0;
|
||||||
virtual bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) = 0;
|
virtual bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) = 0;
|
||||||
virtual bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) = 0;
|
virtual bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) = 0;
|
||||||
virtual bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) = 0;
|
virtual bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) = 0;
|
||||||
@ -129,6 +137,21 @@ namespace hw {
|
|||||||
virtual bool secret_key_to_public_key(const crypto::secret_key &sec, crypto::public_key &pub) = 0;
|
virtual bool secret_key_to_public_key(const crypto::secret_key &sec, crypto::public_key &pub) = 0;
|
||||||
virtual bool generate_key_image(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_image &image) = 0;
|
virtual bool generate_key_image(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_image &image) = 0;
|
||||||
|
|
||||||
|
// alternative prototypes available in libringct
|
||||||
|
rct::key scalarmultKey(const rct::key &P, const rct::key &a)
|
||||||
|
{
|
||||||
|
rct::key aP;
|
||||||
|
scalarmultKey(aP, P, a);
|
||||||
|
return aP;
|
||||||
|
}
|
||||||
|
|
||||||
|
rct::key scalarmultBase(const rct::key &a)
|
||||||
|
{
|
||||||
|
rct::key aG;
|
||||||
|
scalarmultBase(aG, a);
|
||||||
|
return aG;
|
||||||
|
}
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
/* TRANSACTION */
|
/* TRANSACTION */
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
@ -137,7 +160,12 @@ namespace hw {
|
|||||||
|
|
||||||
virtual bool set_signature_mode(unsigned int sig_mode) = 0;
|
virtual bool set_signature_mode(unsigned int sig_mode) = 0;
|
||||||
|
|
||||||
virtual bool encrypt_payment_id(const crypto::public_key &public_key, const crypto::secret_key &secret_key, crypto::hash8 &payment_id ) = 0;
|
virtual bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) = 0;
|
||||||
|
bool decrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key)
|
||||||
|
{
|
||||||
|
// Encryption and decryption are the same operation (xor with a key)
|
||||||
|
return encrypt_payment_id(payment_id, public_key, secret_key);
|
||||||
|
}
|
||||||
|
|
||||||
virtual bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) = 0;
|
virtual bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) = 0;
|
||||||
virtual bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) = 0;
|
virtual bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) = 0;
|
||||||
|
@ -1,37 +0,0 @@
|
|||||||
// Copyright (c) 2017-2018, The Monero Project
|
|
||||||
//
|
|
||||||
// All rights reserved.
|
|
||||||
//
|
|
||||||
// Redistribution and use in source and binary forms, with or without modification, are
|
|
||||||
// permitted provided that the following conditions are met:
|
|
||||||
//
|
|
||||||
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
||||||
// conditions and the following disclaimer.
|
|
||||||
//
|
|
||||||
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
||||||
// of conditions and the following disclaimer in the documentation and/or other
|
|
||||||
// materials provided with the distribution.
|
|
||||||
//
|
|
||||||
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
||||||
// used to endorse or promote products derived from this software without specific
|
|
||||||
// prior written permission.
|
|
||||||
//
|
|
||||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
||||||
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
||||||
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
||||||
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
||||||
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
||||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
||||||
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
//
|
|
||||||
|
|
||||||
#pragma once
|
|
||||||
|
|
||||||
namespace hw {
|
|
||||||
class device;
|
|
||||||
|
|
||||||
device& get_device(std::string device_descriptor);
|
|
||||||
}
|
|
||||||
|
|
@ -31,10 +31,13 @@
|
|||||||
|
|
||||||
|
|
||||||
#include "device_default.hpp"
|
#include "device_default.hpp"
|
||||||
|
#include "cryptonote_basic/account.h"
|
||||||
#include "cryptonote_basic/cryptonote_format_utils.h"
|
#include "cryptonote_basic/subaddress_index.h"
|
||||||
#include "ringct/rctOps.h"
|
#include "ringct/rctOps.h"
|
||||||
|
|
||||||
|
#define ENCRYPTED_PAYMENT_ID_TAIL 0x8d
|
||||||
|
#define CHACHA8_KEY_TAIL 0x8c
|
||||||
|
|
||||||
namespace hw {
|
namespace hw {
|
||||||
|
|
||||||
namespace core {
|
namespace core {
|
||||||
@ -83,7 +86,14 @@ namespace hw {
|
|||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
|
|
||||||
bool device_default::generate_chacha_key(const cryptonote::account_keys &keys, crypto::chacha_key &key) {
|
bool device_default::generate_chacha_key(const cryptonote::account_keys &keys, crypto::chacha_key &key) {
|
||||||
return cryptonote::generate_chacha_key_from_secret_keys(keys, key);
|
const crypto::secret_key &view_key = keys.m_view_secret_key;
|
||||||
|
const crypto::secret_key &spend_key = keys.m_spend_secret_key;
|
||||||
|
tools::scrubbed_arr<char, sizeof(view_key) + sizeof(spend_key) + 1> data;
|
||||||
|
memcpy(data.data(), &view_key, sizeof(view_key));
|
||||||
|
memcpy(data.data() + sizeof(view_key), &spend_key, sizeof(spend_key));
|
||||||
|
data[sizeof(data) - 1] = CHACHA8_KEY_TAIL;
|
||||||
|
crypto::generate_chacha_key(data.data(), sizeof(data), key);
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
bool device_default::get_public_address(cryptonote::account_public_address &pubkey) {
|
bool device_default::get_public_address(cryptonote::account_public_address &pubkey) {
|
||||||
dfns();
|
dfns();
|
||||||
@ -99,24 +109,85 @@ namespace hw {
|
|||||||
return crypto::derive_subaddress_public_key(out_key, derivation, output_index,derived_key);
|
return crypto::derive_subaddress_public_key(out_key, derivation, output_index,derived_key);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, crypto::public_key &D) {
|
crypto::public_key device_default::get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) {
|
||||||
D = cryptonote::get_subaddress_spend_public_key(keys,index);
|
if (index.is_zero())
|
||||||
return true;
|
return keys.m_account_address.m_spend_public_key;
|
||||||
|
|
||||||
|
// m = Hs(a || index_major || index_minor)
|
||||||
|
crypto::secret_key m = get_subaddress_secret_key(keys.m_view_secret_key, index);
|
||||||
|
|
||||||
|
// M = m*G
|
||||||
|
crypto::public_key M;
|
||||||
|
crypto::secret_key_to_public_key(m, M);
|
||||||
|
|
||||||
|
// D = B + M
|
||||||
|
crypto::public_key D = rct::rct2pk(rct::addKeys(rct::pk2rct(keys.m_account_address.m_spend_public_key), rct::pk2rct(M)));
|
||||||
|
return D;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, std::vector<crypto::public_key> &pkeys) {
|
std::vector<crypto::public_key> device_default::get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) {
|
||||||
pkeys = cryptonote::get_subaddress_spend_public_keys(keys, account, begin, end);
|
CHECK_AND_ASSERT_THROW_MES(begin <= end, "begin > end");
|
||||||
return true;
|
|
||||||
|
std::vector<crypto::public_key> pkeys;
|
||||||
|
pkeys.reserve(end - begin);
|
||||||
|
cryptonote::subaddress_index index = {account, begin};
|
||||||
|
|
||||||
|
ge_p3 p3;
|
||||||
|
ge_cached cached;
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(ge_frombytes_vartime(&p3, (const unsigned char*)keys.m_account_address.m_spend_public_key.data) == 0,
|
||||||
|
"ge_frombytes_vartime failed to convert spend public key");
|
||||||
|
ge_p3_to_cached(&cached, &p3);
|
||||||
|
|
||||||
|
for (uint32_t idx = begin; idx < end; ++idx)
|
||||||
|
{
|
||||||
|
index.minor = idx;
|
||||||
|
if (index.is_zero())
|
||||||
|
{
|
||||||
|
pkeys.push_back(keys.m_account_address.m_spend_public_key);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
crypto::secret_key m = get_subaddress_secret_key(keys.m_view_secret_key, index);
|
||||||
|
|
||||||
|
// M = m*G
|
||||||
|
ge_scalarmult_base(&p3, (const unsigned char*)m.data);
|
||||||
|
|
||||||
|
// D = B + M
|
||||||
|
crypto::public_key D;
|
||||||
|
ge_p1p1 p1p1;
|
||||||
|
ge_add(&p1p1, &p3, &cached);
|
||||||
|
ge_p1p1_to_p3(&p3, &p1p1);
|
||||||
|
ge_p3_tobytes((unsigned char*)D.data, &p3);
|
||||||
|
|
||||||
|
pkeys.push_back(D);
|
||||||
|
}
|
||||||
|
return pkeys;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, cryptonote::account_public_address &address) {
|
cryptonote::account_public_address device_default::get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) {
|
||||||
address = cryptonote::get_subaddress(keys,index);
|
if (index.is_zero())
|
||||||
return true;
|
return keys.m_account_address;
|
||||||
|
|
||||||
|
crypto::public_key D = get_subaddress_spend_public_key(keys, index);
|
||||||
|
|
||||||
|
// C = a*D
|
||||||
|
crypto::public_key C = rct::rct2pk(rct::scalarmultKey(rct::pk2rct(D), rct::sk2rct(keys.m_view_secret_key)));
|
||||||
|
|
||||||
|
// result: (C, D)
|
||||||
|
cryptonote::account_public_address address;
|
||||||
|
address.m_view_public_key = C;
|
||||||
|
address.m_spend_public_key = D;
|
||||||
|
return address;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::get_subaddress_secret_key(const crypto::secret_key &a, const cryptonote::subaddress_index &index, crypto::secret_key &m) {
|
crypto::secret_key device_default::get_subaddress_secret_key(const crypto::secret_key &a, const cryptonote::subaddress_index &index) {
|
||||||
m = cryptonote::get_subaddress_secret_key(a,index);
|
const char prefix[] = "SubAddr";
|
||||||
return true;
|
char data[sizeof(prefix) + sizeof(crypto::secret_key) + sizeof(cryptonote::subaddress_index)];
|
||||||
|
memcpy(data, prefix, sizeof(prefix));
|
||||||
|
memcpy(data + sizeof(prefix), &a, sizeof(crypto::secret_key));
|
||||||
|
memcpy(data + sizeof(prefix) + sizeof(crypto::secret_key), &index, sizeof(cryptonote::subaddress_index));
|
||||||
|
crypto::secret_key m;
|
||||||
|
crypto::hash_to_scalar(data, sizeof(data), m);
|
||||||
|
return m;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
@ -124,7 +195,9 @@ namespace hw {
|
|||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
|
|
||||||
bool device_default::verify_keys(const crypto::secret_key &secret_key, const crypto::public_key &public_key) {
|
bool device_default::verify_keys(const crypto::secret_key &secret_key, const crypto::public_key &public_key) {
|
||||||
return cryptonote::verify_keys(secret_key, public_key);
|
crypto::public_key calculated_pub;
|
||||||
|
bool r = crypto::secret_key_to_public_key(secret_key, calculated_pub);
|
||||||
|
return r && public_key == calculated_pub;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) {
|
bool device_default::scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) {
|
||||||
@ -142,9 +215,8 @@ namespace hw {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover, crypto::secret_key &rng) {
|
crypto::secret_key device_default::generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover) {
|
||||||
rng = crypto::generate_keys(pub, sec, recovery_key, recover);
|
return crypto::generate_keys(pub, sec, recovery_key, recover);
|
||||||
return true;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::generate_key_derivation(const crypto::public_key &key1, const crypto::secret_key &key2, crypto::key_derivation &derivation) {
|
bool device_default::generate_key_derivation(const crypto::public_key &key1, const crypto::secret_key &key2, crypto::key_derivation &derivation) {
|
||||||
@ -179,7 +251,7 @@ namespace hw {
|
|||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
|
|
||||||
bool device_default::open_tx(crypto::secret_key &tx_key) {
|
bool device_default::open_tx(crypto::secret_key &tx_key) {
|
||||||
cryptonote::keypair txkey = cryptonote::keypair::generate();
|
cryptonote::keypair txkey = cryptonote::keypair::generate(*this);
|
||||||
tx_key = txkey.sec;
|
tx_key = txkey.sec;
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
@ -194,8 +266,22 @@ namespace hw {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::encrypt_payment_id(const crypto::public_key &public_key, const crypto::secret_key &secret_key, crypto::hash8 &payment_id ) {
|
bool device_default::encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) {
|
||||||
return cryptonote::encrypt_payment_id(payment_id, public_key, secret_key);
|
crypto::key_derivation derivation;
|
||||||
|
crypto::hash hash;
|
||||||
|
char data[33]; /* A hash, and an extra byte */
|
||||||
|
|
||||||
|
if (!generate_key_derivation(public_key, secret_key, derivation))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
memcpy(data, &derivation, 32);
|
||||||
|
data[32] = ENCRYPTED_PAYMENT_ID_TAIL;
|
||||||
|
cn_fast_hash(data, 33, hash);
|
||||||
|
|
||||||
|
for (size_t b = 0; b < 8; ++b)
|
||||||
|
payment_id.data[b] ^= hash.data[b];
|
||||||
|
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_default::ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) {
|
bool device_default::ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) {
|
||||||
|
@ -70,10 +70,10 @@ namespace hw {
|
|||||||
/* SUB ADDRESS */
|
/* SUB ADDRESS */
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) override;
|
bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) override;
|
||||||
bool get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index, crypto::public_key &D) override;
|
crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index) override;
|
||||||
bool get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, std::vector<crypto::public_key> &pkeys) override;
|
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) override;
|
||||||
bool get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, cryptonote::account_public_address &address) override;
|
cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) override;
|
||||||
bool get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index, crypto::secret_key &sub_sec) override;
|
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) override;
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
/* DERIVATION & KEY */
|
/* DERIVATION & KEY */
|
||||||
@ -82,7 +82,7 @@ namespace hw {
|
|||||||
bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) override;
|
bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) override;
|
||||||
bool scalarmultBase(rct::key &aG, const rct::key &a) override;
|
bool scalarmultBase(rct::key &aG, const rct::key &a) override;
|
||||||
bool sc_secret_add(crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) override;
|
bool sc_secret_add(crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) override;
|
||||||
bool generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover, crypto::secret_key &rng) override;
|
crypto::secret_key generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false) override;
|
||||||
bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) override;
|
bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) override;
|
||||||
bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) override;
|
bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) override;
|
||||||
bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) override;
|
bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) override;
|
||||||
@ -100,7 +100,7 @@ namespace hw {
|
|||||||
//bool get_additional_key(const bool subaddr, cryptonote::keypair &additional_txkey) override;
|
//bool get_additional_key(const bool subaddr, cryptonote::keypair &additional_txkey) override;
|
||||||
bool set_signature_mode(unsigned int sig_mode) override;
|
bool set_signature_mode(unsigned int sig_mode) override;
|
||||||
|
|
||||||
bool encrypt_payment_id(const crypto::public_key &public_key, const crypto::secret_key &secret_key, crypto::hash8 &payment_id ) override;
|
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) override;
|
||||||
|
|
||||||
bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) override;
|
bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) override;
|
||||||
bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) override;
|
bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) override;
|
||||||
|
@ -30,6 +30,8 @@
|
|||||||
#include "device_ledger.hpp"
|
#include "device_ledger.hpp"
|
||||||
#include "log.hpp"
|
#include "log.hpp"
|
||||||
#include "ringct/rctOps.h"
|
#include "ringct/rctOps.h"
|
||||||
|
#include "cryptonote_basic/account.h"
|
||||||
|
#include "cryptonote_basic/subaddress_index.h"
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -511,10 +513,10 @@ namespace hw {
|
|||||||
|
|
||||||
char prekey[200];
|
char prekey[200];
|
||||||
memmove(prekey, &this->buffer_recv[0], 200);
|
memmove(prekey, &this->buffer_recv[0], 200);
|
||||||
crypto::generate_chacha_key(&prekey[0], sizeof(prekey), key, 0, true);
|
crypto::generate_chacha_key_prehashed(&prekey[0], sizeof(prekey), key);
|
||||||
|
|
||||||
#ifdef DEBUG_HWDEVICE
|
#ifdef DEBUG_HWDEVICE
|
||||||
hw::ledger::check32("generate_chacha_key", "key", (char*)key_x.data(), (char*)key.data());
|
hw::ledger::check32("generate_chacha_key_prehashed", "key", (char*)key_x.data(), (char*)key.data());
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
unlock_device();
|
unlock_device();
|
||||||
@ -593,7 +595,8 @@ namespace hw {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, crypto::public_key &D) {
|
crypto::public_key device_ledger::get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) {
|
||||||
|
crypto::public_key D;
|
||||||
lock_device();
|
lock_device();
|
||||||
try {
|
try {
|
||||||
int offset =0;
|
int offset =0;
|
||||||
@ -646,21 +649,23 @@ namespace hw {
|
|||||||
unlock_device();
|
unlock_device();
|
||||||
throw;
|
throw;
|
||||||
}
|
}
|
||||||
return true;
|
return D;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, std::vector<crypto::public_key> &pkeys) {
|
std::vector<crypto::public_key> device_ledger::get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) {
|
||||||
|
std::vector<crypto::public_key> pkeys;
|
||||||
cryptonote::subaddress_index index = {account, begin};
|
cryptonote::subaddress_index index = {account, begin};
|
||||||
crypto::public_key D;
|
crypto::public_key D;
|
||||||
for (uint32_t idx = begin; idx < end; ++idx) {
|
for (uint32_t idx = begin; idx < end; ++idx) {
|
||||||
index.minor = idx;
|
index.minor = idx;
|
||||||
this->get_subaddress_spend_public_key(keys, index, D);
|
D = this->get_subaddress_spend_public_key(keys, index);
|
||||||
pkeys.push_back(D);
|
pkeys.push_back(D);
|
||||||
}
|
}
|
||||||
return true;
|
return pkeys;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, cryptonote::account_public_address &address) {
|
cryptonote::account_public_address device_ledger::get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) {
|
||||||
|
cryptonote::account_public_address address;
|
||||||
lock_device();
|
lock_device();
|
||||||
try {
|
try {
|
||||||
int offset =0;
|
int offset =0;
|
||||||
@ -717,10 +722,11 @@ namespace hw {
|
|||||||
unlock_device();
|
unlock_device();
|
||||||
throw;
|
throw;
|
||||||
}
|
}
|
||||||
return true;
|
return address;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index, crypto::secret_key &sub_sec) {
|
crypto::secret_key device_ledger::get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) {
|
||||||
|
crypto::secret_key sub_sec;
|
||||||
lock_device();
|
lock_device();
|
||||||
try {
|
try {
|
||||||
int offset =0;
|
int offset =0;
|
||||||
@ -771,7 +777,7 @@ namespace hw {
|
|||||||
unlock_device();
|
unlock_device();
|
||||||
throw;
|
throw;
|
||||||
}
|
}
|
||||||
return true;
|
return sub_sec;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
@ -979,7 +985,7 @@ namespace hw {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover, crypto::secret_key &rng) {
|
crypto::secret_key device_ledger::generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover) {
|
||||||
if (recover) {
|
if (recover) {
|
||||||
throw std::runtime_error("device generate key does not support recover");
|
throw std::runtime_error("device generate key does not support recover");
|
||||||
}
|
}
|
||||||
@ -1030,7 +1036,7 @@ namespace hw {
|
|||||||
unlock_device();
|
unlock_device();
|
||||||
throw;
|
throw;
|
||||||
}
|
}
|
||||||
return true;
|
return sec;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1457,7 +1463,7 @@ namespace hw {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool device_ledger::encrypt_payment_id(const crypto::public_key &public_key, const crypto::secret_key &secret_key, crypto::hash8 &payment_id) {
|
bool device_ledger::encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) {
|
||||||
lock_device();
|
lock_device();
|
||||||
try {
|
try {
|
||||||
int offset =0;
|
int offset =0;
|
||||||
|
@ -142,10 +142,10 @@ namespace hw {
|
|||||||
/* SUB ADDRESS */
|
/* SUB ADDRESS */
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) override;
|
bool derive_subaddress_public_key(const crypto::public_key &pub, const crypto::key_derivation &derivation, const std::size_t output_index, crypto::public_key &derived_pub) override;
|
||||||
bool get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index, crypto::public_key &D) override;
|
crypto::public_key get_subaddress_spend_public_key(const cryptonote::account_keys& keys, const cryptonote::subaddress_index& index) override;
|
||||||
bool get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end, std::vector<crypto::public_key> &pkeys) override;
|
std::vector<crypto::public_key> get_subaddress_spend_public_keys(const cryptonote::account_keys &keys, uint32_t account, uint32_t begin, uint32_t end) override;
|
||||||
bool get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index, cryptonote::account_public_address &address) override;
|
cryptonote::account_public_address get_subaddress(const cryptonote::account_keys& keys, const cryptonote::subaddress_index &index) override;
|
||||||
bool get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index, crypto::secret_key &sub_sec) override;
|
crypto::secret_key get_subaddress_secret_key(const crypto::secret_key &sec, const cryptonote::subaddress_index &index) override;
|
||||||
|
|
||||||
/* ======================================================================= */
|
/* ======================================================================= */
|
||||||
/* DERIVATION & KEY */
|
/* DERIVATION & KEY */
|
||||||
@ -154,7 +154,7 @@ namespace hw {
|
|||||||
bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) override;
|
bool scalarmultKey(rct::key & aP, const rct::key &P, const rct::key &a) override;
|
||||||
bool scalarmultBase(rct::key &aG, const rct::key &a) override;
|
bool scalarmultBase(rct::key &aG, const rct::key &a) override;
|
||||||
bool sc_secret_add(crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) override;
|
bool sc_secret_add(crypto::secret_key &r, const crypto::secret_key &a, const crypto::secret_key &b) override;
|
||||||
bool generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key, bool recover, crypto::secret_key &rng) override;
|
crypto::secret_key generate_keys(crypto::public_key &pub, crypto::secret_key &sec, const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false) override;
|
||||||
bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) override;
|
bool generate_key_derivation(const crypto::public_key &pub, const crypto::secret_key &sec, crypto::key_derivation &derivation) override;
|
||||||
bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) override;
|
bool derivation_to_scalar(const crypto::key_derivation &derivation, const size_t output_index, crypto::ec_scalar &res) override;
|
||||||
bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) override;
|
bool derive_secret_key(const crypto::key_derivation &derivation, const std::size_t output_index, const crypto::secret_key &sec, crypto::secret_key &derived_sec) override;
|
||||||
@ -170,7 +170,7 @@ namespace hw {
|
|||||||
|
|
||||||
bool set_signature_mode(unsigned int sig_mode) override;
|
bool set_signature_mode(unsigned int sig_mode) override;
|
||||||
|
|
||||||
bool encrypt_payment_id(const crypto::public_key &public_key, const crypto::secret_key &secret_key, crypto::hash8 &payment_id ) override;
|
bool encrypt_payment_id(crypto::hash8 &payment_id, const crypto::public_key &public_key, const crypto::secret_key &secret_key) override;
|
||||||
|
|
||||||
bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) override;
|
bool ecdhEncode(rct::ecdhTuple & unmasked, const rct::key & sharedSec) override;
|
||||||
bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) override;
|
bool ecdhDecode(rct::ecdhTuple & masked, const rct::key & sharedSec) override;
|
||||||
|
@ -33,7 +33,6 @@
|
|||||||
#include "cryptonote_basic/account.h"
|
#include "cryptonote_basic/account.h"
|
||||||
#include "cryptonote_basic/cryptonote_format_utils.h"
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
||||||
#include "multisig.h"
|
#include "multisig.h"
|
||||||
#include "device/device_default.hpp"
|
|
||||||
|
|
||||||
#undef MONERO_DEFAULT_LOG_CATEGORY
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
||||||
#define MONERO_DEFAULT_LOG_CATEGORY "multisig"
|
#define MONERO_DEFAULT_LOG_CATEGORY "multisig"
|
||||||
|
@ -26,21 +26,39 @@
|
|||||||
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||||
# THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
set(ringct_sources
|
set(ringct_basic_sources
|
||||||
rctOps.cpp
|
rctOps.cpp
|
||||||
rctOps_device.cpp
|
|
||||||
rctSigs.cpp
|
|
||||||
rctTypes.cpp
|
rctTypes.cpp
|
||||||
rctCryptoOps.c
|
rctCryptoOps.c
|
||||||
bulletproofs.cc)
|
bulletproofs.cc)
|
||||||
|
|
||||||
|
set(ringct_basic_private_headers
|
||||||
|
rctOps.h
|
||||||
|
rctTypes.h
|
||||||
|
bulletproofs.h)
|
||||||
|
|
||||||
|
monero_private_headers(ringct_basic
|
||||||
|
${crypto_private_headers})
|
||||||
|
monero_add_library(ringct_basic
|
||||||
|
${ringct_basic_sources}
|
||||||
|
${ringct_basic_private_headers})
|
||||||
|
target_link_libraries(ringct_basic
|
||||||
|
PUBLIC
|
||||||
|
common
|
||||||
|
cncrypto
|
||||||
|
PRIVATE
|
||||||
|
${OPENSSL_LIBRARIES}
|
||||||
|
${EXTRA_LIBRARIES})
|
||||||
|
|
||||||
|
set(ringct_sources
|
||||||
|
rctSigs.cpp
|
||||||
|
)
|
||||||
|
|
||||||
set(ringct_headers)
|
set(ringct_headers)
|
||||||
|
|
||||||
set(ringct_private_headers
|
set(ringct_private_headers
|
||||||
rctOps.h
|
|
||||||
rctSigs.h
|
rctSigs.h
|
||||||
rctTypes.h
|
)
|
||||||
bulletproofs.h)
|
|
||||||
|
|
||||||
monero_private_headers(ringct
|
monero_private_headers(ringct
|
||||||
${crypto_private_headers})
|
${crypto_private_headers})
|
||||||
|
@ -112,14 +112,10 @@ namespace rct {
|
|||||||
|
|
||||||
//does a * G where a is a scalar and G is the curve basepoint
|
//does a * G where a is a scalar and G is the curve basepoint
|
||||||
void scalarmultBase(key & aG, const key &a);
|
void scalarmultBase(key & aG, const key &a);
|
||||||
void scalarmultBase(key & aG, const key &a, hw::device &hwdev);
|
|
||||||
key scalarmultBase(const key & a);
|
key scalarmultBase(const key & a);
|
||||||
key scalarmultBase(const key & a, hw::device &hwdev);
|
|
||||||
//does a * P where a is a scalar and P is an arbitrary point
|
//does a * P where a is a scalar and P is an arbitrary point
|
||||||
void scalarmultKey(key &aP, const key &P, const key &a);
|
void scalarmultKey(key &aP, const key &P, const key &a);
|
||||||
void scalarmultKey(key &aP, const key &P, const key &a, hw::device &hwdev);
|
|
||||||
key scalarmultKey(const key &P, const key &a);
|
key scalarmultKey(const key &P, const key &a);
|
||||||
key scalarmultKey(const key &P, const key &a, hw::device &hwdev);
|
|
||||||
//Computes aH where H= toPoint(cn_fast_hash(G)), G the basepoint
|
//Computes aH where H= toPoint(cn_fast_hash(G)), G the basepoint
|
||||||
key scalarmultH(const key & a);
|
key scalarmultH(const key & a);
|
||||||
|
|
||||||
@ -178,8 +174,6 @@ namespace rct {
|
|||||||
//Elliptic Curve Diffie Helman: encodes and decodes the amount b and mask a
|
//Elliptic Curve Diffie Helman: encodes and decodes the amount b and mask a
|
||||||
// where C= aG + bH
|
// where C= aG + bH
|
||||||
void ecdhEncode(ecdhTuple & unmasked, const key & sharedSec);
|
void ecdhEncode(ecdhTuple & unmasked, const key & sharedSec);
|
||||||
void ecdhEncode(ecdhTuple & unmasked, const key & sharedSec, hw::device &hwdev);
|
|
||||||
void ecdhDecode(ecdhTuple & masked, const key & sharedSec);
|
void ecdhDecode(ecdhTuple & masked, const key & sharedSec);
|
||||||
void ecdhDecode(ecdhTuple & masked, const key & sharedSec, hw::device &hwdev);
|
|
||||||
}
|
}
|
||||||
#endif /* RCTOPS_H */
|
#endif /* RCTOPS_H */
|
||||||
|
@ -1,66 +0,0 @@
|
|||||||
// Copyright (c) 2017-2018, The Monero Project
|
|
||||||
//
|
|
||||||
// All rights reserved.
|
|
||||||
//
|
|
||||||
// Redistribution and use in source and binary forms, with or without modification, are
|
|
||||||
// permitted provided that the following conditions are met:
|
|
||||||
//
|
|
||||||
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
||||||
// conditions and the following disclaimer.
|
|
||||||
//
|
|
||||||
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
||||||
// of conditions and the following disclaimer in the documentation and/or other
|
|
||||||
// materials provided with the distribution.
|
|
||||||
//
|
|
||||||
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
||||||
// used to endorse or promote products derived from this software without specific
|
|
||||||
// prior written permission.
|
|
||||||
//
|
|
||||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
||||||
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
||||||
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
||||||
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
||||||
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
||||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
||||||
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
//
|
|
||||||
|
|
||||||
#include "misc_log_ex.h"
|
|
||||||
#include "rctOps.h"
|
|
||||||
#include "device/device.hpp"
|
|
||||||
using namespace crypto;
|
|
||||||
using namespace std;
|
|
||||||
|
|
||||||
|
|
||||||
namespace rct
|
|
||||||
{
|
|
||||||
void scalarmultKey(key & aP, const key &P, const key &a, hw::device &hwdev) {
|
|
||||||
hwdev.scalarmultKey(aP, P, a);
|
|
||||||
}
|
|
||||||
|
|
||||||
key scalarmultKey(const key & P, const key & a, hw::device &hwdev) {
|
|
||||||
key aP;
|
|
||||||
hwdev.scalarmultKey(aP, P, a);
|
|
||||||
return aP;
|
|
||||||
}
|
|
||||||
|
|
||||||
void scalarmultBase(key &aG, const key &a, hw::device &hwdev) {
|
|
||||||
hwdev.scalarmultBase(aG, a);
|
|
||||||
}
|
|
||||||
|
|
||||||
key scalarmultBase(const key & a, hw::device &hwdev) {
|
|
||||||
key aG;
|
|
||||||
hwdev.scalarmultBase(aG, a);
|
|
||||||
return aG;
|
|
||||||
}
|
|
||||||
|
|
||||||
void ecdhDecode(ecdhTuple & masked, const key & sharedSec, hw::device &hwdev) {
|
|
||||||
hwdev.ecdhDecode(masked, sharedSec);
|
|
||||||
}
|
|
||||||
|
|
||||||
void ecdhEncode(ecdhTuple & unmasked, const key & sharedSec, hw::device &hwdev) {
|
|
||||||
hwdev.ecdhEncode(unmasked, sharedSec);
|
|
||||||
}
|
|
||||||
}
|
|
@ -35,9 +35,6 @@
|
|||||||
#include "rctSigs.h"
|
#include "rctSigs.h"
|
||||||
#include "bulletproofs.h"
|
#include "bulletproofs.h"
|
||||||
#include "cryptonote_basic/cryptonote_format_utils.h"
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
||||||
#include "cryptonote_basic/cryptonote_basic.h"
|
|
||||||
#include "cryptonote_basic/subaddress_index.h"
|
|
||||||
#include "device/device.hpp"
|
|
||||||
|
|
||||||
using namespace crypto;
|
using namespace crypto;
|
||||||
using namespace std;
|
using namespace std;
|
||||||
@ -669,7 +666,7 @@ namespace rct {
|
|||||||
//mask amount and mask
|
//mask amount and mask
|
||||||
rv.ecdhInfo[i].mask = copy(outSk[i].mask);
|
rv.ecdhInfo[i].mask = copy(outSk[i].mask);
|
||||||
rv.ecdhInfo[i].amount = d2h(amounts[i]);
|
rv.ecdhInfo[i].amount = d2h(amounts[i]);
|
||||||
ecdhEncode(rv.ecdhInfo[i], amount_keys[i], hwdev);
|
hwdev.ecdhEncode(rv.ecdhInfo[i], amount_keys[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
//set txn fee
|
//set txn fee
|
||||||
@ -750,7 +747,7 @@ namespace rct {
|
|||||||
//mask amount and mask
|
//mask amount and mask
|
||||||
rv.ecdhInfo[i].mask = copy(outSk[i].mask);
|
rv.ecdhInfo[i].mask = copy(outSk[i].mask);
|
||||||
rv.ecdhInfo[i].amount = d2h(outamounts[i]);
|
rv.ecdhInfo[i].amount = d2h(outamounts[i]);
|
||||||
ecdhEncode(rv.ecdhInfo[i], amount_keys[i],hwdev);
|
hwdev.ecdhEncode(rv.ecdhInfo[i], amount_keys[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
//set txn fee
|
//set txn fee
|
||||||
@ -1007,7 +1004,7 @@ namespace rct {
|
|||||||
|
|
||||||
//mask amount and mask
|
//mask amount and mask
|
||||||
ecdhTuple ecdh_info = rv.ecdhInfo[i];
|
ecdhTuple ecdh_info = rv.ecdhInfo[i];
|
||||||
ecdhDecode(ecdh_info, sk, hwdev);
|
hwdev.ecdhDecode(ecdh_info, sk);
|
||||||
mask = ecdh_info.mask;
|
mask = ecdh_info.mask;
|
||||||
key amount = ecdh_info.amount;
|
key amount = ecdh_info.amount;
|
||||||
key C = rv.outPk[i].mask;
|
key C = rv.outPk[i].mask;
|
||||||
@ -1035,7 +1032,7 @@ namespace rct {
|
|||||||
|
|
||||||
//mask amount and mask
|
//mask amount and mask
|
||||||
ecdhTuple ecdh_info = rv.ecdhInfo[i];
|
ecdhTuple ecdh_info = rv.ecdhInfo[i];
|
||||||
ecdhDecode(ecdh_info, sk, hwdev);
|
hwdev.ecdhDecode(ecdh_info, sk);
|
||||||
mask = ecdh_info.mask;
|
mask = ecdh_info.mask;
|
||||||
key amount = ecdh_info.amount;
|
key amount = ecdh_info.amount;
|
||||||
key C = rv.outPk[i].mask;
|
key C = rv.outPk[i].mask;
|
||||||
|
@ -50,8 +50,6 @@ extern "C" {
|
|||||||
|
|
||||||
#include "rctTypes.h"
|
#include "rctTypes.h"
|
||||||
#include "rctOps.h"
|
#include "rctOps.h"
|
||||||
#include "cryptonote_basic/cryptonote_basic.h"
|
|
||||||
#include "device/device_declare.hpp"
|
|
||||||
|
|
||||||
//Define this flag when debugging to get additional info on the console
|
//Define this flag when debugging to get additional info on the console
|
||||||
#ifdef DBG
|
#ifdef DBG
|
||||||
@ -60,6 +58,9 @@ extern "C" {
|
|||||||
#define DP(x)
|
#define DP(x)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
namespace hw {
|
||||||
|
class device;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
namespace rct {
|
namespace rct {
|
||||||
|
@ -62,7 +62,6 @@
|
|||||||
#include "ringct/rctSigs.h"
|
#include "ringct/rctSigs.h"
|
||||||
#include "multisig/multisig.h"
|
#include "multisig/multisig.h"
|
||||||
#include "wallet/wallet_args.h"
|
#include "wallet/wallet_args.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
#include <stdexcept>
|
#include <stdexcept>
|
||||||
|
|
||||||
#ifdef WIN32
|
#ifdef WIN32
|
||||||
|
@ -113,6 +113,7 @@ if (BUILD_GUI_DEPS)
|
|||||||
cncrypto
|
cncrypto
|
||||||
device
|
device
|
||||||
ringct
|
ringct
|
||||||
|
ringct_basic
|
||||||
checkpoints
|
checkpoints
|
||||||
version)
|
version)
|
||||||
|
|
||||||
|
@ -37,7 +37,6 @@
|
|||||||
#include "common/updates.h"
|
#include "common/updates.h"
|
||||||
#include "version.h"
|
#include "version.h"
|
||||||
#include "net/http_client.h"
|
#include "net/http_client.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
#include <boost/filesystem.hpp>
|
#include <boost/filesystem.hpp>
|
||||||
#include <boost/regex.hpp>
|
#include <boost/regex.hpp>
|
||||||
|
|
||||||
|
@ -66,7 +66,6 @@ using namespace epee;
|
|||||||
#include "memwipe.h"
|
#include "memwipe.h"
|
||||||
#include "common/base58.h"
|
#include "common/base58.h"
|
||||||
#include "ringct/rctSigs.h"
|
#include "ringct/rctSigs.h"
|
||||||
#include "device/device.hpp"
|
|
||||||
|
|
||||||
extern "C"
|
extern "C"
|
||||||
{
|
{
|
||||||
@ -561,7 +560,7 @@ crypto::hash8 get_short_payment_id(const tools::wallet2::pending_tx &ptx, hw::de
|
|||||||
MWARNING("Encrypted payment id found, but no destinations public key, cannot decrypt");
|
MWARNING("Encrypted payment id found, but no destinations public key, cannot decrypt");
|
||||||
return crypto::null_hash8;
|
return crypto::null_hash8;
|
||||||
}
|
}
|
||||||
decrypt_payment_id(payment_id8, ptx.dests[0].addr.m_view_public_key, ptx.tx_key, hwdev);
|
hwdev.decrypt_payment_id(payment_id8, ptx.dests[0].addr.m_view_public_key, ptx.tx_key);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return payment_id8;
|
return payment_id8;
|
||||||
@ -840,18 +839,14 @@ void wallet2::set_seed_language(const std::string &language)
|
|||||||
//----------------------------------------------------------------------------------------------------
|
//----------------------------------------------------------------------------------------------------
|
||||||
cryptonote::account_public_address wallet2::get_subaddress(const cryptonote::subaddress_index& index) const
|
cryptonote::account_public_address wallet2::get_subaddress(const cryptonote::subaddress_index& index) const
|
||||||
{
|
{
|
||||||
cryptonote::account_public_address address;
|
|
||||||
hw::device &hwdev = m_account.get_device();
|
hw::device &hwdev = m_account.get_device();
|
||||||
hwdev.get_subaddress(m_account.get_keys(), index,address);
|
return hwdev.get_subaddress(m_account.get_keys(), index);
|
||||||
return address;
|
|
||||||
}
|
}
|
||||||
//----------------------------------------------------------------------------------------------------
|
//----------------------------------------------------------------------------------------------------
|
||||||
crypto::public_key wallet2::get_subaddress_spend_public_key(const cryptonote::subaddress_index& index) const
|
crypto::public_key wallet2::get_subaddress_spend_public_key(const cryptonote::subaddress_index& index) const
|
||||||
{
|
{
|
||||||
crypto::public_key D ;
|
|
||||||
hw::device &hwdev = m_account.get_device();
|
hw::device &hwdev = m_account.get_device();
|
||||||
hwdev.get_subaddress_spend_public_key(m_account.get_keys(), index, D);
|
return hwdev.get_subaddress_spend_public_key(m_account.get_keys(), index);
|
||||||
return D;
|
|
||||||
}
|
}
|
||||||
//----------------------------------------------------------------------------------------------------
|
//----------------------------------------------------------------------------------------------------
|
||||||
std::string wallet2::get_subaddress_as_str(const cryptonote::subaddress_index& index) const
|
std::string wallet2::get_subaddress_as_str(const cryptonote::subaddress_index& index) const
|
||||||
@ -891,7 +886,7 @@ void wallet2::expand_subaddresses(const cryptonote::subaddress_index& index)
|
|||||||
for (index2.major = m_subaddress_labels.size(); index2.major < major_end; ++index2.major)
|
for (index2.major = m_subaddress_labels.size(); index2.major < major_end; ++index2.major)
|
||||||
{
|
{
|
||||||
const uint32_t end = get_subaddress_clamped_sum((index2.major == index.major ? index.minor : 0), m_subaddress_lookahead_minor);
|
const uint32_t end = get_subaddress_clamped_sum((index2.major == index.major ? index.minor : 0), m_subaddress_lookahead_minor);
|
||||||
const std::vector<crypto::public_key> pkeys = cryptonote::get_subaddress_spend_public_keys(m_account.get_keys(), index2.major, 0, end, hwdev);
|
const std::vector<crypto::public_key> pkeys = hwdev.get_subaddress_spend_public_keys(m_account.get_keys(), index2.major, 0, end);
|
||||||
for (index2.minor = 0; index2.minor < end; ++index2.minor)
|
for (index2.minor = 0; index2.minor < end; ++index2.minor)
|
||||||
{
|
{
|
||||||
const crypto::public_key &D = pkeys[index2.minor];
|
const crypto::public_key &D = pkeys[index2.minor];
|
||||||
@ -907,7 +902,7 @@ void wallet2::expand_subaddresses(const cryptonote::subaddress_index& index)
|
|||||||
const uint32_t end = get_subaddress_clamped_sum(index.minor, m_subaddress_lookahead_minor);
|
const uint32_t end = get_subaddress_clamped_sum(index.minor, m_subaddress_lookahead_minor);
|
||||||
const uint32_t begin = m_subaddress_labels[index.major].size();
|
const uint32_t begin = m_subaddress_labels[index.major].size();
|
||||||
cryptonote::subaddress_index index2 = {index.major, begin};
|
cryptonote::subaddress_index index2 = {index.major, begin};
|
||||||
const std::vector<crypto::public_key> pkeys = cryptonote::get_subaddress_spend_public_keys(m_account.get_keys(), index2.major, index2.minor, end, hwdev);
|
const std::vector<crypto::public_key> pkeys = hwdev.get_subaddress_spend_public_keys(m_account.get_keys(), index2.major, index2.minor, end);
|
||||||
for (; index2.minor < end; ++index2.minor)
|
for (; index2.minor < end; ++index2.minor)
|
||||||
{
|
{
|
||||||
const crypto::public_key &D = pkeys[index2.minor - begin];
|
const crypto::public_key &D = pkeys[index2.minor - begin];
|
||||||
@ -989,7 +984,7 @@ void wallet2::check_acc_out_precomp(const tx_out &o, const crypto::key_derivatio
|
|||||||
static uint64_t decodeRct(const rct::rctSig & rv, const crypto::key_derivation &derivation, unsigned int i, rct::key & mask, hw::device &hwdev)
|
static uint64_t decodeRct(const rct::rctSig & rv, const crypto::key_derivation &derivation, unsigned int i, rct::key & mask, hw::device &hwdev)
|
||||||
{
|
{
|
||||||
crypto::secret_key scalar1;
|
crypto::secret_key scalar1;
|
||||||
crypto::derivation_to_scalar(derivation, i, scalar1, hwdev);
|
hwdev.derivation_to_scalar(derivation, i, scalar1);
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
switch (rv.type)
|
switch (rv.type)
|
||||||
@ -1082,7 +1077,7 @@ void wallet2::process_new_transaction(const crypto::hash &txid, const cryptonote
|
|||||||
const cryptonote::account_keys& keys = m_account.get_keys();
|
const cryptonote::account_keys& keys = m_account.get_keys();
|
||||||
hw::device &hwdev = m_account.get_device();
|
hw::device &hwdev = m_account.get_device();
|
||||||
crypto::key_derivation derivation;
|
crypto::key_derivation derivation;
|
||||||
if (!generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation, hwdev))
|
if (!hwdev.generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation))
|
||||||
{
|
{
|
||||||
MWARNING("Failed to generate key derivation from tx pubkey, skipping");
|
MWARNING("Failed to generate key derivation from tx pubkey, skipping");
|
||||||
static_assert(sizeof(derivation) == sizeof(rct::key), "Mismatched sizes of key_derivation and rct::key");
|
static_assert(sizeof(derivation) == sizeof(rct::key), "Mismatched sizes of key_derivation and rct::key");
|
||||||
@ -1095,7 +1090,7 @@ void wallet2::process_new_transaction(const crypto::hash &txid, const cryptonote
|
|||||||
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
||||||
{
|
{
|
||||||
additional_derivations.push_back({});
|
additional_derivations.push_back({});
|
||||||
if (!generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back(),hwdev))
|
if (!hwdev.generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back()))
|
||||||
{
|
{
|
||||||
MWARNING("Failed to generate key derivation from tx pubkey, skipping");
|
MWARNING("Failed to generate key derivation from tx pubkey, skipping");
|
||||||
additional_derivations.pop_back();
|
additional_derivations.pop_back();
|
||||||
@ -1387,7 +1382,7 @@ void wallet2::process_new_transaction(const crypto::hash &txid, const cryptonote
|
|||||||
LOG_PRINT_L2("Found encrypted payment ID: " << payment_id8);
|
LOG_PRINT_L2("Found encrypted payment ID: " << payment_id8);
|
||||||
if (tx_pub_key != null_pkey)
|
if (tx_pub_key != null_pkey)
|
||||||
{
|
{
|
||||||
if (!decrypt_payment_id(payment_id8, tx_pub_key, m_account.get_keys().m_view_secret_key, m_account.get_device()))
|
if (!m_account.get_device().decrypt_payment_id(payment_id8, tx_pub_key, m_account.get_keys().m_view_secret_key))
|
||||||
{
|
{
|
||||||
LOG_PRINT_L0("Failed to decrypt payment ID: " << payment_id8);
|
LOG_PRINT_L0("Failed to decrypt payment ID: " << payment_id8);
|
||||||
}
|
}
|
||||||
@ -4351,7 +4346,7 @@ crypto::hash wallet2::get_payment_id(const pending_tx &ptx) const
|
|||||||
MWARNING("Encrypted payment id found, but no destinations public key, cannot decrypt");
|
MWARNING("Encrypted payment id found, but no destinations public key, cannot decrypt");
|
||||||
return crypto::null_hash;
|
return crypto::null_hash;
|
||||||
}
|
}
|
||||||
if (decrypt_payment_id(payment_id8, ptx.dests[0].addr.m_view_public_key, ptx.tx_key, m_account.get_device()))
|
if (m_account.get_device().decrypt_payment_id(payment_id8, ptx.dests[0].addr.m_view_public_key, ptx.tx_key))
|
||||||
{
|
{
|
||||||
memcpy(payment_id.data, payment_id8.data, 8);
|
memcpy(payment_id.data, payment_id8.data, 8);
|
||||||
}
|
}
|
||||||
@ -7859,13 +7854,13 @@ bool wallet2::check_spend_proof(const crypto::hash &txid, const std::string &mes
|
|||||||
void wallet2::check_tx_key(const crypto::hash &txid, const crypto::secret_key &tx_key, const std::vector<crypto::secret_key> &additional_tx_keys, const cryptonote::account_public_address &address, uint64_t &received, bool &in_pool, uint64_t &confirmations)
|
void wallet2::check_tx_key(const crypto::hash &txid, const crypto::secret_key &tx_key, const std::vector<crypto::secret_key> &additional_tx_keys, const cryptonote::account_public_address &address, uint64_t &received, bool &in_pool, uint64_t &confirmations)
|
||||||
{
|
{
|
||||||
crypto::key_derivation derivation;
|
crypto::key_derivation derivation;
|
||||||
THROW_WALLET_EXCEPTION_IF(!crypto::generate_key_derivation(address.m_view_public_key, tx_key, derivation, m_account.get_device()), error::wallet_internal_error,
|
THROW_WALLET_EXCEPTION_IF(!crypto::generate_key_derivation(address.m_view_public_key, tx_key, derivation), error::wallet_internal_error,
|
||||||
"Failed to generate key derivation from supplied parameters");
|
"Failed to generate key derivation from supplied parameters");
|
||||||
|
|
||||||
std::vector<crypto::key_derivation> additional_derivations;
|
std::vector<crypto::key_derivation> additional_derivations;
|
||||||
additional_derivations.resize(additional_tx_keys.size());
|
additional_derivations.resize(additional_tx_keys.size());
|
||||||
for (size_t i = 0; i < additional_tx_keys.size(); ++i)
|
for (size_t i = 0; i < additional_tx_keys.size(); ++i)
|
||||||
THROW_WALLET_EXCEPTION_IF(!crypto::generate_key_derivation(address.m_view_public_key, additional_tx_keys[i], additional_derivations[i], m_account.get_device()), error::wallet_internal_error,
|
THROW_WALLET_EXCEPTION_IF(!crypto::generate_key_derivation(address.m_view_public_key, additional_tx_keys[i], additional_derivations[i]), error::wallet_internal_error,
|
||||||
"Failed to generate key derivation from supplied parameters");
|
"Failed to generate key derivation from supplied parameters");
|
||||||
|
|
||||||
check_tx_key_helper(txid, derivation, additional_derivations, address, received, in_pool, confirmations);
|
check_tx_key_helper(txid, derivation, additional_derivations, address, received, in_pool, confirmations);
|
||||||
@ -7907,13 +7902,13 @@ void wallet2::check_tx_key_helper(const crypto::hash &txid, const crypto::key_de
|
|||||||
continue;
|
continue;
|
||||||
|
|
||||||
crypto::public_key derived_out_key;
|
crypto::public_key derived_out_key;
|
||||||
bool r = derive_public_key(derivation, n, address.m_spend_public_key, derived_out_key, hwdev);
|
bool r = hwdev.derive_public_key(derivation, n, address.m_spend_public_key, derived_out_key);
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to derive public key");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to derive public key");
|
||||||
bool found = out_key->key == derived_out_key;
|
bool found = out_key->key == derived_out_key;
|
||||||
crypto::key_derivation found_derivation = derivation;
|
crypto::key_derivation found_derivation = derivation;
|
||||||
if (!found && !additional_derivations.empty())
|
if (!found && !additional_derivations.empty())
|
||||||
{
|
{
|
||||||
r = derive_public_key(additional_derivations[n], n, address.m_spend_public_key, derived_out_key,hwdev);
|
r = hwdev.derive_public_key(additional_derivations[n], n, address.m_spend_public_key, derived_out_key);
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to derive public key");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to derive public key");
|
||||||
found = out_key->key == derived_out_key;
|
found = out_key->key == derived_out_key;
|
||||||
found_derivation = additional_derivations[n];
|
found_derivation = additional_derivations[n];
|
||||||
@ -7929,9 +7924,9 @@ void wallet2::check_tx_key_helper(const crypto::hash &txid, const crypto::key_de
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
crypto::secret_key scalar1;
|
crypto::secret_key scalar1;
|
||||||
crypto::derivation_to_scalar(found_derivation, n, scalar1, hwdev);
|
hwdev.derivation_to_scalar(found_derivation, n, scalar1);
|
||||||
rct::ecdhTuple ecdh_info = tx.rct_signatures.ecdhInfo[n];
|
rct::ecdhTuple ecdh_info = tx.rct_signatures.ecdhInfo[n];
|
||||||
rct::ecdhDecode(ecdh_info, rct::sk2rct(scalar1), hwdev);
|
hwdev.ecdhDecode(ecdh_info, rct::sk2rct(scalar1));
|
||||||
const rct::key C = tx.rct_signatures.outPk[n].mask;
|
const rct::key C = tx.rct_signatures.outPk[n].mask;
|
||||||
rct::key Ctmp;
|
rct::key Ctmp;
|
||||||
rct::addKeys2(Ctmp, ecdh_info.mask, ecdh_info.amount, rct::H);
|
rct::addKeys2(Ctmp, ecdh_info.mask, ecdh_info.amount, rct::H);
|
||||||
@ -8301,7 +8296,7 @@ std::string wallet2::get_reserve_proof(const boost::optional<std::pair<uint32_t,
|
|||||||
crypto::secret_key subaddr_spend_skey = m_account.get_keys().m_spend_secret_key;
|
crypto::secret_key subaddr_spend_skey = m_account.get_keys().m_spend_secret_key;
|
||||||
if (!index.is_zero())
|
if (!index.is_zero())
|
||||||
{
|
{
|
||||||
crypto::secret_key m = cryptonote::get_subaddress_secret_key(m_account.get_keys().m_view_secret_key, index);
|
crypto::secret_key m = m_account.get_device().get_subaddress_secret_key(m_account.get_keys().m_view_secret_key, index);
|
||||||
crypto::secret_key tmp = subaddr_spend_skey;
|
crypto::secret_key tmp = subaddr_spend_skey;
|
||||||
sc_add((unsigned char*)&subaddr_spend_skey, (unsigned char*)&m, (unsigned char*)&tmp);
|
sc_add((unsigned char*)&subaddr_spend_skey, (unsigned char*)&m, (unsigned char*)&tmp);
|
||||||
}
|
}
|
||||||
@ -8666,14 +8661,14 @@ crypto::public_key wallet2::get_tx_pub_key_from_received_outs(const tools::walle
|
|||||||
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
||||||
{
|
{
|
||||||
additional_derivations.push_back({});
|
additional_derivations.push_back({});
|
||||||
bool r = generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back(), hwdev);
|
bool r = hwdev.generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back());
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
||||||
}
|
}
|
||||||
|
|
||||||
while (find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, pk_index++)) {
|
while (find_tx_extra_field_by_type(tx_extra_fields, pub_key_field, pk_index++)) {
|
||||||
const crypto::public_key tx_pub_key = pub_key_field.pub_key;
|
const crypto::public_key tx_pub_key = pub_key_field.pub_key;
|
||||||
crypto::key_derivation derivation;
|
crypto::key_derivation derivation;
|
||||||
bool r = generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation, hwdev);
|
bool r = hwdev.generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation);
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
||||||
|
|
||||||
for (size_t i = 0; i < td.m_tx.vout.size(); ++i)
|
for (size_t i = 0; i < td.m_tx.vout.size(); ++i)
|
||||||
@ -8962,14 +8957,14 @@ uint64_t wallet2::import_key_images(const std::vector<std::pair<crypto::key_imag
|
|||||||
const cryptonote::account_keys& keys = m_account.get_keys();
|
const cryptonote::account_keys& keys = m_account.get_keys();
|
||||||
const crypto::public_key tx_pub_key = get_tx_pub_key_from_extra(spent_tx);
|
const crypto::public_key tx_pub_key = get_tx_pub_key_from_extra(spent_tx);
|
||||||
crypto::key_derivation derivation;
|
crypto::key_derivation derivation;
|
||||||
bool r = generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation, hwdev);
|
bool r = hwdev.generate_key_derivation(tx_pub_key, keys.m_view_secret_key, derivation);
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
||||||
const std::vector<crypto::public_key> additional_tx_pub_keys = get_additional_tx_pub_keys_from_extra(spent_tx);
|
const std::vector<crypto::public_key> additional_tx_pub_keys = get_additional_tx_pub_keys_from_extra(spent_tx);
|
||||||
std::vector<crypto::key_derivation> additional_derivations;
|
std::vector<crypto::key_derivation> additional_derivations;
|
||||||
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
for (size_t i = 0; i < additional_tx_pub_keys.size(); ++i)
|
||||||
{
|
{
|
||||||
additional_derivations.push_back({});
|
additional_derivations.push_back({});
|
||||||
r = generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back(), hwdev);
|
r = hwdev.generate_key_derivation(additional_tx_pub_keys[i], keys.m_view_secret_key, additional_derivations.back());
|
||||||
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
THROW_WALLET_EXCEPTION_IF(!r, error::wallet_internal_error, "Failed to generate key derivation");
|
||||||
}
|
}
|
||||||
size_t output_index = 0;
|
size_t output_index = 0;
|
||||||
|
@ -521,7 +521,7 @@ bool construct_miner_tx_manually(size_t height, uint64_t already_generated_coins
|
|||||||
keypair* p_txkey/* = 0*/)
|
keypair* p_txkey/* = 0*/)
|
||||||
{
|
{
|
||||||
keypair txkey;
|
keypair txkey;
|
||||||
txkey = keypair::generate();
|
txkey = keypair::generate(hw::get_device("default"));
|
||||||
add_tx_pub_key_to_extra(tx, txkey.pub);
|
add_tx_pub_key_to_extra(tx, txkey.pub);
|
||||||
|
|
||||||
if (0 != p_txkey)
|
if (0 != p_txkey)
|
||||||
|
@ -49,7 +49,7 @@ namespace
|
|||||||
m_tx.version = version;
|
m_tx.version = version;
|
||||||
m_tx.unlock_time = unlock_time;
|
m_tx.unlock_time = unlock_time;
|
||||||
|
|
||||||
m_tx_key = keypair::generate();
|
m_tx_key = keypair::generate(hw::get_device("default"));
|
||||||
add_tx_pub_key_to_extra(m_tx, m_tx_key.pub);
|
add_tx_pub_key_to_extra(m_tx, m_tx_key.pub);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -518,7 +518,7 @@ bool gen_tx_key_image_not_derive_from_tx_key::generate(std::vector<test_event_en
|
|||||||
builder.step2_fill_inputs(miner_account.get_keys(), sources);
|
builder.step2_fill_inputs(miner_account.get_keys(), sources);
|
||||||
|
|
||||||
txin_to_key& in_to_key = boost::get<txin_to_key>(builder.m_tx.vin.front());
|
txin_to_key& in_to_key = boost::get<txin_to_key>(builder.m_tx.vin.front());
|
||||||
keypair kp = keypair::generate();
|
keypair kp = keypair::generate(hw::get_device("default"));
|
||||||
key_image another_ki;
|
key_image another_ki;
|
||||||
crypto::generate_key_image(kp.pub, kp.sec, another_ki);
|
crypto::generate_key_image(kp.pub, kp.sec, another_ki);
|
||||||
in_to_key.k_image = another_ki;
|
in_to_key.k_image = another_ki;
|
||||||
|
@ -42,10 +42,7 @@ add_executable(cncrypto-tests
|
|||||||
${crypto_headers})
|
${crypto_headers})
|
||||||
target_link_libraries(cncrypto-tests
|
target_link_libraries(cncrypto-tests
|
||||||
PRIVATE
|
PRIVATE
|
||||||
wallet
|
|
||||||
cryptonote_core
|
|
||||||
common
|
common
|
||||||
device
|
|
||||||
${Boost_SYSTEM_LIBRARY}
|
${Boost_SYSTEM_LIBRARY}
|
||||||
${EXTRA_LIBRARIES})
|
${EXTRA_LIBRARIES})
|
||||||
set_property(TARGET cncrypto-tests
|
set_property(TARGET cncrypto-tests
|
||||||
|
@ -33,7 +33,7 @@
|
|||||||
#include "crypto-tests.h"
|
#include "crypto-tests.h"
|
||||||
|
|
||||||
bool check_scalar(const crypto::ec_scalar &scalar) {
|
bool check_scalar(const crypto::ec_scalar &scalar) {
|
||||||
return sc_check(crypto::operator &(scalar)) == 0;
|
return crypto::sc_check(crypto::operator &(scalar)) == 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void random_scalar(crypto::ec_scalar &res) {
|
void random_scalar(crypto::ec_scalar &res) {
|
||||||
@ -45,13 +45,13 @@ void hash_to_scalar(const void *data, std::size_t length, crypto::ec_scalar &res
|
|||||||
}
|
}
|
||||||
|
|
||||||
void hash_to_point(const crypto::hash &h, crypto::ec_point &res) {
|
void hash_to_point(const crypto::hash &h, crypto::ec_point &res) {
|
||||||
ge_p2 point;
|
crypto::ge_p2 point;
|
||||||
ge_fromfe_frombytes_vartime(&point, reinterpret_cast<const unsigned char *>(&h));
|
crypto::ge_fromfe_frombytes_vartime(&point, reinterpret_cast<const unsigned char *>(&h));
|
||||||
ge_tobytes(crypto::operator &(res), &point);
|
crypto::ge_tobytes(crypto::operator &(res), &point);
|
||||||
}
|
}
|
||||||
|
|
||||||
void hash_to_ec(const crypto::public_key &key, crypto::ec_point &res) {
|
void hash_to_ec(const crypto::public_key &key, crypto::ec_point &res) {
|
||||||
ge_p3 tmp;
|
crypto::ge_p3 tmp;
|
||||||
crypto::hash_to_ec(key, tmp);
|
crypto::hash_to_ec(key, tmp);
|
||||||
ge_p3_tobytes(crypto::operator &(res), &tmp);
|
crypto::ge_p3_tobytes(crypto::operator &(res), &tmp);
|
||||||
}
|
}
|
||||||
|
@ -52,10 +52,10 @@ extern "C" {
|
|||||||
tree_hash((const char (*)[32]) data, length >> 5, hash);
|
tree_hash((const char (*)[32]) data, length >> 5, hash);
|
||||||
}
|
}
|
||||||
static void cn_slow_hash_0(const void *data, size_t length, char *hash) {
|
static void cn_slow_hash_0(const void *data, size_t length, char *hash) {
|
||||||
return cn_slow_hash(data, length, hash, 0);
|
return cn_slow_hash(data, length, hash, 0/*variant*/, 0/*prehashed*/);
|
||||||
}
|
}
|
||||||
static void cn_slow_hash_1(const void *data, size_t length, char *hash) {
|
static void cn_slow_hash_1(const void *data, size_t length, char *hash) {
|
||||||
return cn_slow_hash(data, length, hash, 1);
|
return cn_slow_hash(data, length, hash, 1/*variant*/, 0/*prehashed*/);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
POP_WARNINGS
|
POP_WARNINGS
|
||||||
|
@ -45,7 +45,7 @@ public:
|
|||||||
|
|
||||||
bool test()
|
bool test()
|
||||||
{
|
{
|
||||||
cryptonote::keypair::generate();
|
cryptonote::keypair::generate(hw::get_device("default"));
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
Loading…
Reference in New Issue
Block a user