mirror of
https://github.com/oxen-io/oxen-core.git
synced 2023-12-14 02:22:56 +01:00
b717d34557
- rename INS_STEALTH to INS_ENCRYPT_PAYMENT_ID - remove no-longer-valid (and unused) INS_MANAGE_SEEDWORDS - hard-code CLSAG rct type prehashing and remove pre-CLSAG code paths - remove unused decrypt(rct key vector) - use a constexpr rather than memset & loop for dummy view/spend key values - fix speeling mistacks - fix shitty code formatting
138 lines
4.7 KiB
C++
138 lines
4.7 KiB
C++
// Copyright (c) 2017-2019, The Monero Project
|
|
// Copyright (c) 2018, The Loki Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
|
|
#include <lokimq/hex.h>
|
|
#include "epee/misc_log_ex.h"
|
|
#include "log.hpp"
|
|
|
|
namespace hw {
|
|
|
|
#undef LOKI_DEFAULT_LOG_CATEGORY
|
|
#define LOKI_DEFAULT_LOG_CATEGORY "device"
|
|
|
|
void log_hexbuffer(std::string_view msg, const void* buff, size_t len) {
|
|
MDEBUG(msg << ": " << lokimq::to_hex(std::string_view{reinterpret_cast<const char*>(buff), len}));
|
|
}
|
|
|
|
void log_message(std::string_view msg, std::string_view info) {
|
|
MDEBUG(msg << ": " << info);
|
|
}
|
|
|
|
|
|
#ifdef WITH_DEVICE_LEDGER
|
|
namespace ledger {
|
|
|
|
#undef LOKI_DEFAULT_LOG_CATEGORY
|
|
#define LOKI_DEFAULT_LOG_CATEGORY "device.ledger"
|
|
|
|
|
|
#ifdef DEBUG_HWDEVICE
|
|
|
|
void decrypt(char* buf, size_t len) {
|
|
#if defined(IODUMMYCRYPT_HWDEVICE) || defined(IONOCRYPT_HWDEVICE)
|
|
|
|
if (len == 32 && memcmp(dummy_view_key, buf, 32) == 0) {
|
|
memmove(buf, hw::ledger::dbg_viewkey.data, 32);
|
|
return;
|
|
}
|
|
if (len == 32 && memcmp(dummy_spend_key, buf, 32) == 0) {
|
|
memmove(buf, hw::ledger::dbg_spendkey.data, 32);
|
|
return;
|
|
}
|
|
#if defined(IODUMMYCRYPT_HWDEVICE)
|
|
//std decrypt: XOR.55h
|
|
for (size_t i = 0; i < len; i++)
|
|
buf[i] ^= 0x55;
|
|
#endif
|
|
#endif
|
|
}
|
|
|
|
crypto::key_derivation decrypt(const crypto::key_derivation &derivation) {
|
|
crypto::key_derivation x = derivation;
|
|
decrypt(x.data, 32);
|
|
return x;
|
|
}
|
|
|
|
cryptonote::account_keys decrypt(const cryptonote::account_keys& keys) {
|
|
cryptonote::account_keys x = keys;
|
|
decrypt(x.m_view_secret_key.data, 32);
|
|
decrypt(x.m_spend_secret_key.data, 32);
|
|
return x;
|
|
}
|
|
|
|
|
|
crypto::secret_key decrypt(const crypto::secret_key &sec) {
|
|
crypto::secret_key x = sec;
|
|
decrypt(x.data, 32);
|
|
return x;
|
|
}
|
|
|
|
rct::key decrypt(const rct::key &sec) {
|
|
rct::key x = sec;
|
|
decrypt((char*)x.bytes, 32);
|
|
return x;
|
|
}
|
|
|
|
crypto::ec_scalar decrypt(const crypto::ec_scalar &res) {
|
|
crypto::ec_scalar x = res;
|
|
decrypt((char*)x.data, 32);
|
|
return x;
|
|
}
|
|
|
|
static void check(const std::string &msg, const std::string &info, const char *h, const char *d, size_t len, bool crypted) {
|
|
char dd[32];
|
|
if (crypted) {
|
|
CHECK_AND_ASSERT_THROW_MES(len <= 32, "encrypted data greater than 32");
|
|
decrypt(dd, len);
|
|
d = dd;
|
|
}
|
|
|
|
if (memcmp(h, d, len)) {
|
|
log_message("ASSERT EQ FAIL", msg + ": " + info);
|
|
log_hexbuffer(" host ", h, len);
|
|
log_hexbuffer(" device", d, len);
|
|
} else {
|
|
log_message("ASSERT EQ OK", msg + ": " + info + ": " + lokimq::to_hex(d, d+len));
|
|
}
|
|
}
|
|
|
|
void check32(const std::string &msg, const std::string &info, const void *h, const void *d, bool crypted) {
|
|
check(msg, info, reinterpret_cast<const char*>(h), reinterpret_cast<const char*>(d), 32, crypted);
|
|
}
|
|
|
|
void check8(const std::string &msg, const std::string &info, const void *h, const void *d, bool crypted) {
|
|
check(msg, info, reinterpret_cast<const char*>(h), reinterpret_cast<const char*>(d), 8, crypted);
|
|
}
|
|
#endif
|
|
|
|
}
|
|
#endif //WITH_DEVICE_LEDGER
|
|
|
|
}
|