/* This file is part of TON Blockchain Library. TON Blockchain Library is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 2 of the License, or (at your option) any later version. TON Blockchain Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with TON Blockchain Library. If not, see . Copyright 2017-2020 Telegram Systems LLP */ #include "keyring.hpp" #include "common/errorcode.h" #include "common/io.hpp" #include "td/utils/port/path.h" #include "td/utils/filesystem.h" #include "td/utils/Random.h" namespace ton { namespace keyring { KeyringImpl::PrivateKeyDescr::PrivateKeyDescr(PrivateKey private_key, bool is_temp) : public_key(private_key.compute_public_key()), private_key(private_key), is_temp(is_temp) { auto D = private_key.create_decryptor_async(); D.ensure(); decryptor_sign = D.move_as_ok(); D = private_key.create_decryptor_async(); D.ensure(); decryptor_decrypt = D.move_as_ok(); } void KeyringImpl::start_up() { if (db_root_.size() > 0) { td::mkdir(db_root_).ensure(); } } td::Result KeyringImpl::load_key(PublicKeyHash key_hash) { auto it = map_.find(key_hash); if (it != map_.end()) { return it->second.get(); } if (db_root_.size() == 0) { return td::Status::Error(ErrorCode::notready, "key not in db"); } auto name = db_root_ + "/" + key_hash.bits256_value().to_hex(); auto R = td::read_file_secure(td::CSlice{name}); if (R.is_error()) { return R.move_as_error_prefix("key not in db: "); } auto data = R.move_as_ok(); auto R2 = PrivateKey::import(data); R2.ensure(); auto key = R2.move_as_ok(); auto desc = std::make_unique(key, false); auto short_id = desc->public_key.compute_short_id(); CHECK(short_id == key_hash); return map_.emplace(short_id, std::move(desc)).first->second.get(); } void KeyringImpl::add_key(PrivateKey key, bool is_temp, td::Promise promise) { auto pub = key.compute_public_key(); auto short_id = pub.compute_short_id(); if (map_.count(short_id)) { LOG(WARNING) << "duplicate key " << short_id; promise.set_value(td::Unit()); return; } if (db_root_.size() == 0) { CHECK(is_temp); } map_.emplace(short_id, std::make_unique(key, is_temp)); if (!is_temp && key.exportable()) { auto S = key.export_as_slice(); auto name = db_root_ + "/" + short_id.bits256_value().to_hex(); td::write_file(td::CSlice(name), S.as_slice()).ensure(); } promise.set_value(td::Unit()); } void KeyringImpl::check_key(PublicKeyHash key_hash, td::Promise promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { promise.set_value(td::Unit()); } } void KeyringImpl::add_key_short(PublicKeyHash key_hash, td::Promise promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { promise.set_result(map_[key_hash]->public_key); } } void KeyringImpl::del_key(PublicKeyHash key_hash, td::Promise promise) { map_.erase(key_hash); if (db_root_.size() == 0) { return promise.set_value(td::Unit()); } auto name = db_root_ + "/" + key_hash.bits256_value().to_hex(); td::BufferSlice d{256}; td::Random::secure_bytes(d.as_slice()); td::write_file(name, d.as_slice()).ensure(); td::unlink(name).ensure(); promise.set_value(td::Unit()); } void KeyringImpl::get_public_key(PublicKeyHash key_hash, td::Promise promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { promise.set_result(map_[key_hash]->public_key); } } void KeyringImpl::sign_message(PublicKeyHash key_hash, td::BufferSlice data, td::Promise promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { td::actor::send_closure(S.move_as_ok()->decryptor_sign, &DecryptorAsync::sign, std::move(data), std::move(promise)); } } void KeyringImpl::sign_add_get_public_key(PublicKeyHash key_hash, td::BufferSlice data, td::Promise> promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); return; } auto D = S.move_as_ok(); auto P = td::PromiseCreator::lambda( [promise = std::move(promise), id = D->public_key](td::Result R) mutable { if (R.is_error()) { promise.set_error(R.move_as_error()); return; } promise.set_value(std::pair{R.move_as_ok(), id}); }); td::actor::send_closure(D->decryptor_sign, &DecryptorAsync::sign, std::move(data), std::move(P)); } void KeyringImpl::sign_messages(PublicKeyHash key_hash, std::vector data, td::Promise>> promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { td::actor::send_closure(S.move_as_ok()->decryptor_sign, &DecryptorAsync::sign_batch, std::move(data), std::move(promise)); } } void KeyringImpl::decrypt_message(PublicKeyHash key_hash, td::BufferSlice data, td::Promise promise) { auto S = load_key(key_hash); if (S.is_error()) { promise.set_error(S.move_as_error()); } else { td::actor::send_closure(S.move_as_ok()->decryptor_decrypt, &DecryptorAsync::decrypt, std::move(data), std::move(promise)); } } void KeyringImpl::export_all_private_keys(td::Promise> promise) { std::vector keys; for (auto& [_, descr] : map_) { if (!descr->is_temp && descr->private_key.exportable()) { keys.push_back(descr->private_key); } } promise.set_value(std::move(keys)); } td::actor::ActorOwn Keyring::create(std::string db_root) { return td::actor::create_actor("keyring", db_root); } } // namespace keyring } // namespace ton