mirror of
https://github.com/ton-blockchain/ton
synced 2025-02-12 11:12:16 +00:00
Improve creating channels in adnl (#1108)
* Improve creating channels in adnl * Improve handling of cryptographic keys
This commit is contained in:
parent
0cff1c88f7
commit
77a816e461
9 changed files with 109 additions and 80 deletions
|
@ -269,7 +269,11 @@ void AdnlPeerPairImpl::send_messages_in(std::vector<OutboundAdnlMessage> message
|
||||||
size_t ptr = 0;
|
size_t ptr = 0;
|
||||||
bool first = true;
|
bool first = true;
|
||||||
do {
|
do {
|
||||||
|
respond_with_nop_after_ = td::Timestamp::in(td::Random::fast(1.0, 2.0));
|
||||||
bool try_reinit = try_reinit_at_ && try_reinit_at_.is_in_past();
|
bool try_reinit = try_reinit_at_ && try_reinit_at_.is_in_past();
|
||||||
|
if (try_reinit) {
|
||||||
|
try_reinit_at_ = td::Timestamp::in(td::Random::fast(0.5, 1.5));
|
||||||
|
}
|
||||||
bool via_channel = channel_ready_ && !try_reinit;
|
bool via_channel = channel_ready_ && !try_reinit;
|
||||||
size_t s = (via_channel ? channel_packet_header_max_size() : packet_header_max_size());
|
size_t s = (via_channel ? channel_packet_header_max_size() : packet_header_max_size());
|
||||||
if (first) {
|
if (first) {
|
||||||
|
@ -504,12 +508,6 @@ void AdnlPeerPairImpl::create_channel(pubkeys::Ed25519 pub, td::uint32 date) {
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageCreateChannel &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageCreateChannel &message) {
|
||||||
create_channel(message.key(), message.date());
|
create_channel(message.key(), message.date());
|
||||||
if (respond_to_channel_create_after_.is_in_past()) {
|
|
||||||
respond_to_channel_create_after_ = td::Timestamp::in(td::Random::fast(1.0, 2.0));
|
|
||||||
std::vector<OutboundAdnlMessage> messages;
|
|
||||||
messages.emplace_back(adnlmessage::AdnlMessageNop{}, 0);
|
|
||||||
send_messages(std::move(messages));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageConfirmChannel &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageConfirmChannel &message) {
|
||||||
|
@ -526,6 +524,7 @@ void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageConfirmChan
|
||||||
}
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageCustom &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageCustom &message) {
|
||||||
|
respond_with_nop();
|
||||||
td::actor::send_closure(local_actor_, &AdnlLocalId::deliver, peer_id_short_, message.data());
|
td::actor::send_closure(local_actor_, &AdnlLocalId::deliver, peer_id_short_, message.data());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -538,6 +537,7 @@ void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageReinit &mes
|
||||||
}
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageQuery &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageQuery &message) {
|
||||||
|
respond_with_nop();
|
||||||
auto P = td::PromiseCreator::lambda([SelfId = actor_id(this), query_id = message.query_id(),
|
auto P = td::PromiseCreator::lambda([SelfId = actor_id(this), query_id = message.query_id(),
|
||||||
flags = static_cast<td::uint32>(0)](td::Result<td::BufferSlice> R) {
|
flags = static_cast<td::uint32>(0)](td::Result<td::BufferSlice> R) {
|
||||||
if (R.is_error()) {
|
if (R.is_error()) {
|
||||||
|
@ -556,6 +556,7 @@ void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageQuery &mess
|
||||||
}
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageAnswer &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageAnswer &message) {
|
||||||
|
respond_with_nop();
|
||||||
auto Q = out_queries_.find(message.query_id());
|
auto Q = out_queries_.find(message.query_id());
|
||||||
|
|
||||||
if (Q == out_queries_.end()) {
|
if (Q == out_queries_.end()) {
|
||||||
|
@ -573,6 +574,7 @@ void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessageAnswer &mes
|
||||||
}
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessagePart &message) {
|
void AdnlPeerPairImpl::process_message(const adnlmessage::AdnlMessagePart &message) {
|
||||||
|
respond_with_nop();
|
||||||
auto size = message.total_size();
|
auto size = message.total_size();
|
||||||
if (size > huge_packet_max_size()) {
|
if (size > huge_packet_max_size()) {
|
||||||
VLOG(ADNL_WARNING) << this << ": dropping too big huge message: size=" << size;
|
VLOG(ADNL_WARNING) << this << ": dropping too big huge message: size=" << size;
|
||||||
|
@ -635,6 +637,14 @@ void AdnlPeerPairImpl::delete_query(AdnlQueryId id) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void AdnlPeerPairImpl::respond_with_nop() {
|
||||||
|
if (respond_with_nop_after_.is_in_past()) {
|
||||||
|
std::vector<OutboundAdnlMessage> messages;
|
||||||
|
messages.emplace_back(adnlmessage::AdnlMessageNop{}, 0);
|
||||||
|
send_messages(std::move(messages));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
void AdnlPeerPairImpl::reinit(td::int32 date) {
|
void AdnlPeerPairImpl::reinit(td::int32 date) {
|
||||||
if (reinit_date_ == 0) {
|
if (reinit_date_ == 0) {
|
||||||
reinit_date_ = date;
|
reinit_date_ = date;
|
||||||
|
|
|
@ -122,6 +122,7 @@ class AdnlPeerPairImpl : public AdnlPeerPair {
|
||||||
}
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
void respond_with_nop();
|
||||||
void reinit(td::int32 date);
|
void reinit(td::int32 date);
|
||||||
td::Result<std::pair<td::actor::ActorId<AdnlNetworkConnection>, bool>> get_conn(bool direct_only);
|
td::Result<std::pair<td::actor::ActorId<AdnlNetworkConnection>, bool>> get_conn(bool direct_only);
|
||||||
void create_channel(pubkeys::Ed25519 pub, td::uint32 date);
|
void create_channel(pubkeys::Ed25519 pub, td::uint32 date);
|
||||||
|
@ -214,7 +215,7 @@ class AdnlPeerPairImpl : public AdnlPeerPair {
|
||||||
pubkeys::Ed25519 channel_pub_;
|
pubkeys::Ed25519 channel_pub_;
|
||||||
td::int32 channel_pk_date_;
|
td::int32 channel_pk_date_;
|
||||||
td::actor::ActorOwn<AdnlChannel> channel_;
|
td::actor::ActorOwn<AdnlChannel> channel_;
|
||||||
td::Timestamp respond_to_channel_create_after_;
|
td::Timestamp respond_with_nop_after_;
|
||||||
|
|
||||||
td::uint64 in_seqno_ = 0;
|
td::uint64 in_seqno_ = 0;
|
||||||
td::uint64 out_seqno_ = 0;
|
td::uint64 out_seqno_ = 0;
|
||||||
|
|
|
@ -27,6 +27,16 @@ namespace ton {
|
||||||
|
|
||||||
namespace keyring {
|
namespace keyring {
|
||||||
|
|
||||||
|
KeyringImpl::PrivateKeyDescr::PrivateKeyDescr(PrivateKey private_key, bool is_temp)
|
||||||
|
: public_key(private_key.compute_public_key()), is_temp(is_temp) {
|
||||||
|
auto D = private_key.create_decryptor_async();
|
||||||
|
D.ensure();
|
||||||
|
decryptor_sign = D.move_as_ok();
|
||||||
|
D = private_key.create_decryptor_async();
|
||||||
|
D.ensure();
|
||||||
|
decryptor_decrypt = D.move_as_ok();
|
||||||
|
}
|
||||||
|
|
||||||
void KeyringImpl::start_up() {
|
void KeyringImpl::start_up() {
|
||||||
if (db_root_.size() > 0) {
|
if (db_root_.size() > 0) {
|
||||||
td::mkdir(db_root_).ensure();
|
td::mkdir(db_root_).ensure();
|
||||||
|
@ -45,23 +55,19 @@ td::Result<KeyringImpl::PrivateKeyDescr *> KeyringImpl::load_key(PublicKeyHash k
|
||||||
|
|
||||||
auto name = db_root_ + "/" + key_hash.bits256_value().to_hex();
|
auto name = db_root_ + "/" + key_hash.bits256_value().to_hex();
|
||||||
|
|
||||||
auto R = td::read_file(td::CSlice{name});
|
auto R = td::read_file_secure(td::CSlice{name});
|
||||||
if (R.is_error()) {
|
if (R.is_error()) {
|
||||||
return R.move_as_error_prefix("key not in db: ");
|
return R.move_as_error_prefix("key not in db: ");
|
||||||
}
|
}
|
||||||
auto data = R.move_as_ok();
|
auto data = R.move_as_ok();
|
||||||
auto R2 = PrivateKey::import(td::SecureString(data));
|
auto R2 = PrivateKey::import(data);
|
||||||
R2.ensure();
|
R2.ensure();
|
||||||
|
|
||||||
auto key = R2.move_as_ok();
|
auto key = R2.move_as_ok();
|
||||||
auto pub = key.compute_public_key();
|
auto desc = std::make_unique<PrivateKeyDescr>(key, false);
|
||||||
auto short_id = pub.compute_short_id();
|
auto short_id = desc->public_key.compute_short_id();
|
||||||
CHECK(short_id == key_hash);
|
CHECK(short_id == key_hash);
|
||||||
|
return map_.emplace(short_id, std::move(desc)).first->second.get();
|
||||||
auto D = key.create_decryptor_async();
|
|
||||||
D.ensure();
|
|
||||||
|
|
||||||
return map_.emplace(short_id, std::make_unique<PrivateKeyDescr>(D.move_as_ok(), pub, false)).first->second.get();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void KeyringImpl::add_key(PrivateKey key, bool is_temp, td::Promise<td::Unit> promise) {
|
void KeyringImpl::add_key(PrivateKey key, bool is_temp, td::Promise<td::Unit> promise) {
|
||||||
|
@ -76,10 +82,7 @@ void KeyringImpl::add_key(PrivateKey key, bool is_temp, td::Promise<td::Unit> pr
|
||||||
if (db_root_.size() == 0) {
|
if (db_root_.size() == 0) {
|
||||||
CHECK(is_temp);
|
CHECK(is_temp);
|
||||||
}
|
}
|
||||||
auto D = key.create_decryptor_async();
|
map_.emplace(short_id, std::make_unique<PrivateKeyDescr>(key, is_temp));
|
||||||
D.ensure();
|
|
||||||
|
|
||||||
map_.emplace(short_id, std::make_unique<PrivateKeyDescr>(D.move_as_ok(), pub, is_temp));
|
|
||||||
|
|
||||||
if (!is_temp && key.exportable()) {
|
if (!is_temp && key.exportable()) {
|
||||||
auto S = key.export_as_slice();
|
auto S = key.export_as_slice();
|
||||||
|
@ -139,7 +142,7 @@ void KeyringImpl::sign_message(PublicKeyHash key_hash, td::BufferSlice data, td:
|
||||||
if (S.is_error()) {
|
if (S.is_error()) {
|
||||||
promise.set_error(S.move_as_error());
|
promise.set_error(S.move_as_error());
|
||||||
} else {
|
} else {
|
||||||
td::actor::send_closure(S.move_as_ok()->decryptor, &DecryptorAsync::sign, std::move(data), std::move(promise));
|
td::actor::send_closure(S.move_as_ok()->decryptor_sign, &DecryptorAsync::sign, std::move(data), std::move(promise));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -161,7 +164,7 @@ void KeyringImpl::sign_add_get_public_key(PublicKeyHash key_hash, td::BufferSlic
|
||||||
}
|
}
|
||||||
promise.set_value(std::pair<td::BufferSlice, PublicKey>{R.move_as_ok(), id});
|
promise.set_value(std::pair<td::BufferSlice, PublicKey>{R.move_as_ok(), id});
|
||||||
});
|
});
|
||||||
td::actor::send_closure(D->decryptor, &DecryptorAsync::sign, std::move(data), std::move(P));
|
td::actor::send_closure(D->decryptor_sign, &DecryptorAsync::sign, std::move(data), std::move(P));
|
||||||
}
|
}
|
||||||
|
|
||||||
void KeyringImpl::sign_messages(PublicKeyHash key_hash, std::vector<td::BufferSlice> data,
|
void KeyringImpl::sign_messages(PublicKeyHash key_hash, std::vector<td::BufferSlice> data,
|
||||||
|
@ -171,7 +174,7 @@ void KeyringImpl::sign_messages(PublicKeyHash key_hash, std::vector<td::BufferSl
|
||||||
if (S.is_error()) {
|
if (S.is_error()) {
|
||||||
promise.set_error(S.move_as_error());
|
promise.set_error(S.move_as_error());
|
||||||
} else {
|
} else {
|
||||||
td::actor::send_closure(S.move_as_ok()->decryptor, &DecryptorAsync::sign_batch, std::move(data),
|
td::actor::send_closure(S.move_as_ok()->decryptor_sign, &DecryptorAsync::sign_batch, std::move(data),
|
||||||
std::move(promise));
|
std::move(promise));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -182,7 +185,8 @@ void KeyringImpl::decrypt_message(PublicKeyHash key_hash, td::BufferSlice data,
|
||||||
if (S.is_error()) {
|
if (S.is_error()) {
|
||||||
promise.set_error(S.move_as_error());
|
promise.set_error(S.move_as_error());
|
||||||
} else {
|
} else {
|
||||||
td::actor::send_closure(S.move_as_ok()->decryptor, &DecryptorAsync::decrypt, std::move(data), std::move(promise));
|
td::actor::send_closure(S.move_as_ok()->decryptor_decrypt, &DecryptorAsync::decrypt, std::move(data),
|
||||||
|
std::move(promise));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -30,12 +30,11 @@ namespace keyring {
|
||||||
class KeyringImpl : public Keyring {
|
class KeyringImpl : public Keyring {
|
||||||
private:
|
private:
|
||||||
struct PrivateKeyDescr {
|
struct PrivateKeyDescr {
|
||||||
td::actor::ActorOwn<DecryptorAsync> decryptor;
|
td::actor::ActorOwn<DecryptorAsync> decryptor_sign;
|
||||||
|
td::actor::ActorOwn<DecryptorAsync> decryptor_decrypt;
|
||||||
PublicKey public_key;
|
PublicKey public_key;
|
||||||
bool is_temp;
|
bool is_temp;
|
||||||
PrivateKeyDescr(td::actor::ActorOwn<DecryptorAsync> decryptor, PublicKey public_key, bool is_temp)
|
PrivateKeyDescr(PrivateKey private_key, bool is_temp);
|
||||||
: decryptor(std::move(decryptor)), public_key(public_key), is_temp(is_temp) {
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
|
|
||||||
public:
|
public:
|
||||||
|
|
|
@ -29,28 +29,6 @@
|
||||||
|
|
||||||
namespace ton {
|
namespace ton {
|
||||||
|
|
||||||
td::Result<std::unique_ptr<Encryptor>> Encryptor::create(const ton_api::PublicKey *id) {
|
|
||||||
td::Result<std::unique_ptr<Encryptor>> res;
|
|
||||||
ton_api::downcast_call(
|
|
||||||
*const_cast<ton_api::PublicKey *>(id),
|
|
||||||
td::overloaded([&](const ton_api::pub_unenc &obj) { res = std::make_unique<EncryptorNone>(); },
|
|
||||||
[&](const ton_api::pub_ed25519 &obj) { res = std::make_unique<EncryptorEd25519>(obj.key_); },
|
|
||||||
[&](const ton_api::pub_overlay &obj) { res = std::make_unique<EncryptorOverlay>(); },
|
|
||||||
[&](const ton_api::pub_aes &obj) { res = std::make_unique<EncryptorAES>(obj.key_); }));
|
|
||||||
return res;
|
|
||||||
}
|
|
||||||
|
|
||||||
td::Result<std::unique_ptr<Decryptor>> Decryptor::create(const ton_api::PrivateKey *id) {
|
|
||||||
td::Result<std::unique_ptr<Decryptor>> res;
|
|
||||||
ton_api::downcast_call(
|
|
||||||
*const_cast<ton_api::PrivateKey *>(id),
|
|
||||||
td::overloaded([&](const ton_api::pk_unenc &obj) { res = std::make_unique<DecryptorNone>(); },
|
|
||||||
[&](const ton_api::pk_ed25519 &obj) { res = std::make_unique<DecryptorEd25519>(obj.key_); },
|
|
||||||
[&](const ton_api::pk_overlay &obj) { res = std::make_unique<DecryptorFail>(); },
|
|
||||||
[&](const ton_api::pk_aes &obj) { res = std::make_unique<DecryptorAES>(obj.key_); }));
|
|
||||||
return res;
|
|
||||||
}
|
|
||||||
|
|
||||||
td::Result<td::BufferSlice> EncryptorEd25519::encrypt(td::Slice data) {
|
td::Result<td::BufferSlice> EncryptorEd25519::encrypt(td::Slice data) {
|
||||||
TRY_RESULT_PREFIX(pk, td::Ed25519::generate_private_key(), "failed to generate private key: ");
|
TRY_RESULT_PREFIX(pk, td::Ed25519::generate_private_key(), "failed to generate private key: ");
|
||||||
TRY_RESULT_PREFIX(pubkey, pk.get_public_key(), "failed to get public key from private: ");
|
TRY_RESULT_PREFIX(pubkey, pk.get_public_key(), "failed to get public key from private: ");
|
||||||
|
|
|
@ -31,7 +31,6 @@ class Encryptor {
|
||||||
virtual td::Result<td::BufferSlice> encrypt(td::Slice data) = 0;
|
virtual td::Result<td::BufferSlice> encrypt(td::Slice data) = 0;
|
||||||
virtual td::Status check_signature(td::Slice message, td::Slice signature) = 0;
|
virtual td::Status check_signature(td::Slice message, td::Slice signature) = 0;
|
||||||
virtual ~Encryptor() = default;
|
virtual ~Encryptor() = default;
|
||||||
static td::Result<std::unique_ptr<Encryptor>> create(const ton_api::PublicKey *id);
|
|
||||||
};
|
};
|
||||||
|
|
||||||
class Decryptor {
|
class Decryptor {
|
||||||
|
@ -40,7 +39,6 @@ class Decryptor {
|
||||||
virtual td::Result<td::BufferSlice> sign(td::Slice data) = 0;
|
virtual td::Result<td::BufferSlice> sign(td::Slice data) = 0;
|
||||||
virtual std::vector<td::Result<td::BufferSlice>> sign_batch(std::vector<td::Slice> data);
|
virtual std::vector<td::Result<td::BufferSlice>> sign_batch(std::vector<td::Slice> data);
|
||||||
virtual ~Decryptor() = default;
|
virtual ~Decryptor() = default;
|
||||||
static td::Result<std::unique_ptr<Decryptor>> create(const ton_api::PrivateKey *id);
|
|
||||||
};
|
};
|
||||||
|
|
||||||
class EncryptorAsync : public td::actor::Actor {
|
class EncryptorAsync : public td::actor::Actor {
|
||||||
|
@ -61,16 +59,6 @@ class EncryptorAsync : public td::actor::Actor {
|
||||||
void encrypt(td::BufferSlice data, td::Promise<td::BufferSlice> promise) {
|
void encrypt(td::BufferSlice data, td::Promise<td::BufferSlice> promise) {
|
||||||
promise.set_result(encryptor_->encrypt(data.as_slice()));
|
promise.set_result(encryptor_->encrypt(data.as_slice()));
|
||||||
}
|
}
|
||||||
template <class T>
|
|
||||||
static td::Result<td::actor::ActorOwn<EncryptorAsync>> create(T &id) {
|
|
||||||
TRY_RESULT(d, Encryptor::create(id));
|
|
||||||
return td::actor::create_actor<EncryptorAsync>("encryptor", std::move(d));
|
|
||||||
}
|
|
||||||
template <class T>
|
|
||||||
static td::Result<td::actor::ActorOwn<EncryptorAsync>> create(T *id) {
|
|
||||||
TRY_RESULT(d, Encryptor::create(id));
|
|
||||||
return td::actor::create_actor<EncryptorAsync>("encryptor", std::move(d));
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
|
|
||||||
class DecryptorAsync : public td::actor::Actor {
|
class DecryptorAsync : public td::actor::Actor {
|
||||||
|
@ -94,16 +82,6 @@ class DecryptorAsync : public td::actor::Actor {
|
||||||
}
|
}
|
||||||
return decryptor_->sign_batch(v);
|
return decryptor_->sign_batch(v);
|
||||||
}
|
}
|
||||||
template <class T>
|
|
||||||
static td::Result<td::actor::ActorOwn<DecryptorAsync>> create(T &id) {
|
|
||||||
TRY_RESULT(d, Decryptor::create(id));
|
|
||||||
return td::actor::create_actor<DecryptorAsync>("decryptor", std::move(d));
|
|
||||||
}
|
|
||||||
template <class T>
|
|
||||||
static td::Result<td::actor::ActorOwn<DecryptorAsync>> create(T *id) {
|
|
||||||
TRY_RESULT(d, Decryptor::create(id));
|
|
||||||
return td::actor::create_actor<DecryptorAsync>("decryptor", std::move(d));
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace ton
|
} // namespace ton
|
||||||
|
|
|
@ -83,7 +83,7 @@ class EncryptorEd25519 : public Encryptor {
|
||||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||||||
td::Status check_signature(td::Slice message, td::Slice signature) override;
|
td::Status check_signature(td::Slice message, td::Slice signature) override;
|
||||||
|
|
||||||
EncryptorEd25519(td::Bits256 key) : pub_(td::SecureString(as_slice(key))) {
|
EncryptorEd25519(const td::Bits256& key) : pub_(td::SecureString(as_slice(key))) {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -94,7 +94,7 @@ class DecryptorEd25519 : public Decryptor {
|
||||||
public:
|
public:
|
||||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||||||
td::Result<td::BufferSlice> sign(td::Slice data) override;
|
td::Result<td::BufferSlice> sign(td::Slice data) override;
|
||||||
DecryptorEd25519(td::Bits256 key) : pk_(td::SecureString(as_slice(key))) {
|
DecryptorEd25519(const td::Bits256& key) : pk_(td::SecureString(as_slice(key))) {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -129,12 +129,15 @@ class EncryptorAES : public Encryptor {
|
||||||
td::Bits256 shared_secret_;
|
td::Bits256 shared_secret_;
|
||||||
|
|
||||||
public:
|
public:
|
||||||
|
~EncryptorAES() override {
|
||||||
|
shared_secret_.set_zero_s();
|
||||||
|
}
|
||||||
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
td::Result<td::BufferSlice> encrypt(td::Slice data) override;
|
||||||
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
td::Status check_signature(td::Slice message, td::Slice signature) override {
|
||||||
return td::Status::Error("can no sign channel messages");
|
return td::Status::Error("can no sign channel messages");
|
||||||
}
|
}
|
||||||
|
|
||||||
EncryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
EncryptorAES(const td::Bits256& shared_secret) : shared_secret_(shared_secret) {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -143,11 +146,14 @@ class DecryptorAES : public Decryptor {
|
||||||
td::Bits256 shared_secret_;
|
td::Bits256 shared_secret_;
|
||||||
|
|
||||||
public:
|
public:
|
||||||
|
~DecryptorAES() override {
|
||||||
|
shared_secret_.set_zero_s();
|
||||||
|
}
|
||||||
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
td::Result<td::BufferSlice> decrypt(td::Slice data) override;
|
||||||
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
td::Result<td::BufferSlice> sign(td::Slice data) override {
|
||||||
return td::Status::Error("can no sign channel messages");
|
return td::Status::Error("can no sign channel messages");
|
||||||
}
|
}
|
||||||
DecryptorAES(td::Bits256 shared_secret) : shared_secret_(shared_secret) {
|
DecryptorAES(const td::Bits256& shared_secret) : shared_secret_(shared_secret) {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -21,6 +21,7 @@
|
||||||
#include "td/utils/overloaded.h"
|
#include "td/utils/overloaded.h"
|
||||||
#include "tl-utils/tl-utils.hpp"
|
#include "tl-utils/tl-utils.hpp"
|
||||||
#include "encryptor.h"
|
#include "encryptor.h"
|
||||||
|
#include "encryptor.hpp"
|
||||||
#include "crypto/Ed25519.h"
|
#include "crypto/Ed25519.h"
|
||||||
|
|
||||||
namespace ton {
|
namespace ton {
|
||||||
|
@ -63,12 +64,31 @@ td::Result<PublicKey> PublicKey::import(td::Slice s) {
|
||||||
return PublicKey{x};
|
return PublicKey{x};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> pubkeys::Ed25519::create_encryptor() const {
|
||||||
|
return std::make_unique<EncryptorEd25519>(data_);
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> pubkeys::AES::create_encryptor() const {
|
||||||
|
return std::make_unique<EncryptorAES>(data_);
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> pubkeys::Unenc::create_encryptor() const {
|
||||||
|
return std::make_unique<EncryptorNone>();
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> pubkeys::Overlay::create_encryptor() const {
|
||||||
|
return std::make_unique<EncryptorOverlay>();
|
||||||
|
}
|
||||||
|
|
||||||
td::Result<std::unique_ptr<Encryptor>> PublicKey::create_encryptor() const {
|
td::Result<std::unique_ptr<Encryptor>> PublicKey::create_encryptor() const {
|
||||||
return Encryptor::create(tl().get());
|
td::Result<std::unique_ptr<Encryptor>> res;
|
||||||
|
pub_key_.visit([&](auto &obj) { res = obj.create_encryptor(); });
|
||||||
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
td::Result<td::actor::ActorOwn<EncryptorAsync>> PublicKey::create_encryptor_async() const {
|
td::Result<td::actor::ActorOwn<EncryptorAsync>> PublicKey::create_encryptor_async() const {
|
||||||
return EncryptorAsync::create(tl().get());
|
TRY_RESULT(encryptor, create_encryptor());
|
||||||
|
return td::actor::create_actor<EncryptorAsync>("encryptor", std::move(encryptor));
|
||||||
}
|
}
|
||||||
|
|
||||||
bool PublicKey::empty() const {
|
bool PublicKey::empty() const {
|
||||||
|
@ -109,6 +129,22 @@ privkeys::Ed25519::Ed25519(td::Ed25519::PrivateKey key) {
|
||||||
data_.as_slice().copy_from(td::Slice(s));
|
data_.as_slice().copy_from(td::Slice(s));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> privkeys::Ed25519::create_decryptor() const {
|
||||||
|
return std::make_unique<DecryptorEd25519>(data_);
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> privkeys::AES::create_decryptor() const {
|
||||||
|
return std::make_unique<DecryptorAES>(data_);
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> privkeys::Unenc::create_decryptor() const {
|
||||||
|
return std::make_unique<DecryptorNone>();
|
||||||
|
}
|
||||||
|
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> privkeys::Overlay::create_decryptor() const {
|
||||||
|
return std::make_unique<DecryptorFail>();
|
||||||
|
}
|
||||||
|
|
||||||
pubkeys::Ed25519::Ed25519(td::Ed25519::PublicKey key) {
|
pubkeys::Ed25519::Ed25519(td::Ed25519::PublicKey key) {
|
||||||
auto s = key.as_octet_string();
|
auto s = key.as_octet_string();
|
||||||
CHECK(s.length() == 32);
|
CHECK(s.length() == 32);
|
||||||
|
@ -188,11 +224,14 @@ tl_object_ptr<ton_api::PrivateKey> PrivateKey::tl() const {
|
||||||
}
|
}
|
||||||
|
|
||||||
td::Result<std::unique_ptr<Decryptor>> PrivateKey::create_decryptor() const {
|
td::Result<std::unique_ptr<Decryptor>> PrivateKey::create_decryptor() const {
|
||||||
return Decryptor::create(tl().get());
|
td::Result<std::unique_ptr<Decryptor>> res;
|
||||||
|
priv_key_.visit([&](auto &obj) { res = obj.create_decryptor(); });
|
||||||
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
td::Result<td::actor::ActorOwn<DecryptorAsync>> PrivateKey::create_decryptor_async() const {
|
td::Result<td::actor::ActorOwn<DecryptorAsync>> PrivateKey::create_decryptor_async() const {
|
||||||
return DecryptorAsync::create(tl().get());
|
TRY_RESULT(decryptor, create_decryptor());
|
||||||
|
return td::actor::create_actor<DecryptorAsync>("decryptor", std::move(decryptor));
|
||||||
}
|
}
|
||||||
|
|
||||||
} // namespace ton
|
} // namespace ton
|
||||||
|
|
|
@ -110,6 +110,7 @@ class Ed25519 {
|
||||||
tl_object_ptr<ton_api::pub_ed25519> tl() const {
|
tl_object_ptr<ton_api::pub_ed25519> tl() const {
|
||||||
return create_tl_object<ton_api::pub_ed25519>(data_);
|
return create_tl_object<ton_api::pub_ed25519>(data_);
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> create_encryptor() const;
|
||||||
bool operator==(const Ed25519 &with) const {
|
bool operator==(const Ed25519 &with) const {
|
||||||
return data_ == with.data_;
|
return data_ == with.data_;
|
||||||
}
|
}
|
||||||
|
@ -141,6 +142,7 @@ class AES {
|
||||||
tl_object_ptr<ton_api::pub_aes> tl() const {
|
tl_object_ptr<ton_api::pub_aes> tl() const {
|
||||||
return create_tl_object<ton_api::pub_aes>(data_);
|
return create_tl_object<ton_api::pub_aes>(data_);
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> create_encryptor() const;
|
||||||
bool operator==(const AES &with) const {
|
bool operator==(const AES &with) const {
|
||||||
return data_ == with.data_;
|
return data_ == with.data_;
|
||||||
}
|
}
|
||||||
|
@ -172,6 +174,7 @@ class Unenc {
|
||||||
tl_object_ptr<ton_api::pub_unenc> tl() const {
|
tl_object_ptr<ton_api::pub_unenc> tl() const {
|
||||||
return create_tl_object<ton_api::pub_unenc>(data_.clone_as_buffer_slice());
|
return create_tl_object<ton_api::pub_unenc>(data_.clone_as_buffer_slice());
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> create_encryptor() const;
|
||||||
bool operator==(const Unenc &with) const {
|
bool operator==(const Unenc &with) const {
|
||||||
return data_.as_slice() == with.data_.as_slice();
|
return data_.as_slice() == with.data_.as_slice();
|
||||||
}
|
}
|
||||||
|
@ -203,6 +206,7 @@ class Overlay {
|
||||||
tl_object_ptr<ton_api::pub_overlay> tl() const {
|
tl_object_ptr<ton_api::pub_overlay> tl() const {
|
||||||
return create_tl_object<ton_api::pub_overlay>(data_.clone_as_buffer_slice());
|
return create_tl_object<ton_api::pub_overlay>(data_.clone_as_buffer_slice());
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> create_encryptor() const;
|
||||||
bool operator==(const Overlay &with) const {
|
bool operator==(const Overlay &with) const {
|
||||||
return data_.as_slice() == with.data_.as_slice();
|
return data_.as_slice() == with.data_.as_slice();
|
||||||
}
|
}
|
||||||
|
@ -223,6 +227,9 @@ class PublicKey {
|
||||||
td::uint32 serialized_size() const {
|
td::uint32 serialized_size() const {
|
||||||
UNREACHABLE();
|
UNREACHABLE();
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Encryptor>> create_encryptor() const {
|
||||||
|
UNREACHABLE();
|
||||||
|
}
|
||||||
bool operator==(const Empty &with) const {
|
bool operator==(const Empty &with) const {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -316,6 +323,7 @@ class Ed25519 {
|
||||||
}
|
}
|
||||||
tl_object_ptr<ton_api::PublicKey> pub_tl() const;
|
tl_object_ptr<ton_api::PublicKey> pub_tl() const;
|
||||||
pubkeys::Ed25519 pub() const;
|
pubkeys::Ed25519 pub() const;
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> create_decryptor() const;
|
||||||
static Ed25519 random();
|
static Ed25519 random();
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -359,6 +367,7 @@ class AES {
|
||||||
pubkeys::AES pub() const {
|
pubkeys::AES pub() const {
|
||||||
return pubkeys::AES{data_};
|
return pubkeys::AES{data_};
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> create_decryptor() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
class Unenc {
|
class Unenc {
|
||||||
|
@ -393,6 +402,7 @@ class Unenc {
|
||||||
pubkeys::Unenc pub() const {
|
pubkeys::Unenc pub() const {
|
||||||
return pubkeys::Unenc{data_.clone()};
|
return pubkeys::Unenc{data_.clone()};
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> create_decryptor() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
class Overlay {
|
class Overlay {
|
||||||
|
@ -427,6 +437,7 @@ class Overlay {
|
||||||
pubkeys::Overlay pub() const {
|
pubkeys::Overlay pub() const {
|
||||||
return pubkeys::Overlay{data_.clone()};
|
return pubkeys::Overlay{data_.clone()};
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> create_decryptor() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace privkeys
|
} // namespace privkeys
|
||||||
|
@ -450,6 +461,9 @@ class PrivateKey {
|
||||||
PublicKey pub() const {
|
PublicKey pub() const {
|
||||||
UNREACHABLE();
|
UNREACHABLE();
|
||||||
}
|
}
|
||||||
|
td::Result<std::unique_ptr<Decryptor>> create_decryptor() const {
|
||||||
|
UNREACHABLE();
|
||||||
|
}
|
||||||
};
|
};
|
||||||
td::Variant<Empty, privkeys::Ed25519, privkeys::AES, privkeys::Unenc, privkeys::Overlay> priv_key_{Empty{}};
|
td::Variant<Empty, privkeys::Ed25519, privkeys::AES, privkeys::Unenc, privkeys::Overlay> priv_key_{Empty{}};
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue