X-Git-Url: https://git.novaco.in/?a=blobdiff_plain;f=src%2Fkeystore.h;h=36149ba66bb2d8305e59b104d6bffcf5bf5a7649;hb=63e4509c569f16145ab861717baf865fc6d05af1;hp=fa4f33c9048e5f95b52f5fb32e48e45c01ad6144;hpb=7f910f05a59a13fc96b8a4cafa4e6fdd5de725e4;p=novacoin.git diff --git a/src/keystore.h b/src/keystore.h index fa4f33c..36149ba 100644 --- a/src/keystore.h +++ b/src/keystore.h @@ -40,7 +40,7 @@ public: virtual bool AddKey(const CKey& key) =0; // Add a malleable key to store. - virtual bool AddMalleableKey(const CMalleableKey& mKey) =0; + virtual bool AddMalleableKey(const CMalleableKeyView &keyView, const CSecret &vchSecretH) =0; virtual bool GetMalleableKey(const CMalleableKeyView &keyView, CMalleableKey &mKey) const =0; // Check whether a key corresponding to a given address is present in the store. @@ -78,7 +78,7 @@ public: typedef std::map > KeyMap; typedef std::map ScriptMap; typedef std::set WatchOnlySet; -typedef std::map MalleableKeyMap; +typedef std::map MalleableKeyMap; /** Basic key store, that keeps keys in an address->secret map */ class CBasicKeyStore : public CKeyStore @@ -92,7 +92,7 @@ protected: public: bool AddKey(const CKey& key); - bool AddMalleableKey(const CMalleableKey& mKey); + bool AddMalleableKey(const CMalleableKeyView& keyView, const CSecret &vchSecretH); bool GetMalleableKey(const CMalleableKeyView &keyView, CMalleableKey &mKey) const { { @@ -100,7 +100,7 @@ public: MalleableKeyMap::const_iterator mi = mapMalleableKeys.find(keyView); if (mi != mapMalleableKeys.end()) { - mKey = mi->second; + mKey = mi->first.GetMalleableKey(mi->second); return true; } } @@ -132,7 +132,6 @@ public: KeyMap::const_iterator mi = mapKeys.find(address); if (mi != mapKeys.end()) { - keyOut.Reset(); keyOut.SetSecret((*mi).second.first, (*mi).second.second); return true; } @@ -183,8 +182,11 @@ public: LOCK(cs_KeyStore); for (MalleableKeyMap::const_iterator mi = mapMalleableKeys.begin(); mi != mapMalleableKeys.end(); mi++) { - if (mi->second.CheckKeyVariant(R, pubKeyVariant, privKey)) - return true; + if (mi->first.CheckKeyVariant(R, pubKeyVariant)) + { + CMalleableKey mKey = mi->first.GetMalleableKey(mi->second); + return mKey.CheckKeyVariant(R, pubKeyVariant, privKey); + } } } return false; @@ -193,7 +195,6 @@ public: void ListMalleableViews(std::list &malleableViewList) const { malleableViewList.clear(); - { LOCK(cs_KeyStore); for (MalleableKeyMap::const_iterator mi = mapMalleableKeys.begin(); mi != mapMalleableKeys.end(); mi++) @@ -219,6 +220,7 @@ public: }; typedef std::map > > CryptedKeyMap; +typedef std::map > CryptedMalleableKeyMap; /** Keystore which keeps the private keys encrypted. * It derives from the basic key store, which is used if no encryption is active. @@ -227,6 +229,7 @@ class CCryptoKeyStore : public CBasicKeyStore { private: CryptedKeyMap mapCryptedKeys; + CryptedMalleableKeyMap mapCryptedMalleableKeys; CKeyingMaterial vMasterKey; @@ -266,7 +269,10 @@ public: bool Lock(); virtual bool AddCryptedKey(const CPubKey &vchPubKey, const std::vector &vchCryptedSecret); + virtual bool AddCryptedMalleableKey(const CMalleableKeyView& keyView, const std::vector &vchCryptedSecretH); + bool AddKey(const CKey& key); + bool AddMalleableKey(const CMalleableKeyView& keyView, const CSecret &vchSecretH); bool HaveKey(const CKeyID &address) const { { @@ -294,6 +300,79 @@ public: } } + bool GetMalleableKey(const CMalleableKeyView &keyView, CMalleableKey &mKey) const; + + bool CheckOwnership(const CPubKey &pubKeyVariant, const CPubKey &R) const + { + { + LOCK(cs_KeyStore); + if (!IsCrypted()) + return CBasicKeyStore::CheckOwnership(pubKeyVariant, R); + for (CryptedMalleableKeyMap::const_iterator mi = mapCryptedMalleableKeys.begin(); mi != mapCryptedMalleableKeys.end(); mi++) + { + if (mi->first.CheckKeyVariant(R, pubKeyVariant)) + return true; + } + } + return false; + } + + bool CheckOwnership(const CPubKey &pubKeyVariant, const CPubKey &R, CMalleableKeyView &view) const + { + { + LOCK(cs_KeyStore); + if (!IsCrypted()) + return CBasicKeyStore::CheckOwnership(pubKeyVariant, R, view); + for (CryptedMalleableKeyMap::const_iterator mi = mapCryptedMalleableKeys.begin(); mi != mapCryptedMalleableKeys.end(); mi++) + { + if (mi->first.CheckKeyVariant(R, pubKeyVariant)) + { + view = mi->first; + return true; + } + } + } + return false; + } + + bool CheckOwnership(const CMalleablePubKey &mpk) + { + CMalleableKeyView view; + return GetMalleableView(mpk, view); + } + + bool CreatePrivKey(const CPubKey &pubKeyVariant, const CPubKey &R, CKey &privKey) const; + + void ListMalleableViews(std::list &malleableViewList) const + { + malleableViewList.clear(); + { + LOCK(cs_KeyStore); + if (!IsCrypted()) + return CBasicKeyStore::ListMalleableViews(malleableViewList); + for (CryptedMalleableKeyMap::const_iterator mi = mapCryptedMalleableKeys.begin(); mi != mapCryptedMalleableKeys.end(); mi++) + malleableViewList.push_back(CMalleableKeyView(mi->first)); + } + } + + bool GetMalleableView(const CMalleablePubKey &mpk, CMalleableKeyView &view) + { + const CKeyID &mpkID = mpk.GetID(); + { + LOCK(cs_KeyStore); + if (!IsCrypted()) + return CBasicKeyStore::GetMalleableView(mpk, view); + for (CryptedMalleableKeyMap::const_iterator mi = mapCryptedMalleableKeys.begin(); mi != mapCryptedMalleableKeys.end(); mi++) + if (mi->first.GetID() == mpkID) + { + view = CMalleableKeyView(mi->first); + return true; + } + } + + return false; + } + /* Wallet status (encrypted, locked) changed. * Note: Called without locks held. */