2019-01-07 11:33:07 +01:00
|
|
|
// Copyright 2015-2019 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of Parity Ethereum.
|
2017-05-05 15:57:29 +02:00
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is free software: you can redistribute it and/or modify
|
2017-05-05 15:57:29 +02:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is distributed in the hope that it will be useful,
|
2017-05-05 15:57:29 +02:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2019-01-07 11:33:07 +01:00
|
|
|
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
|
2017-05-05 15:57:29 +02:00
|
|
|
|
|
|
|
//! SecretStore-specific rpc implementation.
|
|
|
|
|
2017-11-16 17:34:23 +01:00
|
|
|
use std::collections::BTreeSet;
|
2017-05-28 14:40:36 +02:00
|
|
|
use std::sync::Arc;
|
2017-05-05 15:57:29 +02:00
|
|
|
|
|
|
|
use crypto::DEFAULT_MAC;
|
|
|
|
use ethkey::Secret;
|
2019-02-07 14:34:24 +01:00
|
|
|
use accounts::AccountProvider;
|
2017-05-05 15:57:29 +02:00
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
use jsonrpc_core::Result;
|
2017-05-05 15:57:29 +02:00
|
|
|
use v1::helpers::errors;
|
2018-03-01 10:00:44 +01:00
|
|
|
use v1::helpers::secretstore::{generate_document_key, encrypt_document,
|
|
|
|
decrypt_document, decrypt_document_with_shadow, ordered_servers_keccak};
|
2017-05-05 15:57:29 +02:00
|
|
|
use v1::traits::SecretStore;
|
2018-03-01 10:00:44 +01:00
|
|
|
use v1::types::{H160, H256, H512, Bytes, EncryptedDocumentKey};
|
2018-06-22 15:09:15 +02:00
|
|
|
use ethkey::Password;
|
2017-05-05 15:57:29 +02:00
|
|
|
|
|
|
|
/// Parity implementation.
|
|
|
|
pub struct SecretStoreClient {
|
2018-06-01 16:49:55 +02:00
|
|
|
accounts: Arc<AccountProvider>,
|
2017-05-05 15:57:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
impl SecretStoreClient {
|
|
|
|
/// Creates new SecretStoreClient
|
2018-06-01 16:49:55 +02:00
|
|
|
pub fn new(store: &Arc<AccountProvider>) -> Self {
|
2017-05-05 15:57:29 +02:00
|
|
|
SecretStoreClient {
|
2017-05-28 14:40:36 +02:00
|
|
|
accounts: store.clone(),
|
2017-05-05 15:57:29 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Decrypt public key using account' private key
|
2018-06-22 15:09:15 +02:00
|
|
|
fn decrypt_key(&self, address: H160, password: Password, key: Bytes) -> Result<Vec<u8>> {
|
2018-06-04 11:26:30 +02:00
|
|
|
self.accounts.decrypt(address.into(), Some(password), &DEFAULT_MAC, &key.0)
|
2017-05-05 15:57:29 +02:00
|
|
|
.map_err(|e| errors::account("Could not decrypt key.", e))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Decrypt secret key using account' private key
|
2018-06-22 15:09:15 +02:00
|
|
|
fn decrypt_secret(&self, address: H160, password: Password, key: Bytes) -> Result<Secret> {
|
2017-05-05 15:57:29 +02:00
|
|
|
self.decrypt_key(address, password, key)
|
2017-05-19 17:06:36 +02:00
|
|
|
.and_then(|s| Secret::from_unsafe_slice(&s).map_err(|e| errors::account("invalid secret", e)))
|
2017-05-05 15:57:29 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SecretStore for SecretStoreClient {
|
2018-06-22 15:09:15 +02:00
|
|
|
fn generate_document_key(&self, address: H160, password: Password, server_key_public: H512) -> Result<EncryptedDocumentKey> {
|
2018-06-04 11:26:30 +02:00
|
|
|
let account_public = self.accounts.account_public(address.into(), &password)
|
2018-03-01 10:00:44 +01:00
|
|
|
.map_err(|e| errors::account("Could not read account public.", e))?;
|
|
|
|
generate_document_key(account_public, server_key_public.into())
|
|
|
|
}
|
|
|
|
|
2018-06-22 15:09:15 +02:00
|
|
|
fn encrypt(&self, address: H160, password: Password, key: Bytes, data: Bytes) -> Result<Bytes> {
|
2017-05-05 15:57:29 +02:00
|
|
|
encrypt_document(self.decrypt_key(address, password, key)?, data.0)
|
|
|
|
.map(Into::into)
|
|
|
|
}
|
|
|
|
|
2018-06-22 15:09:15 +02:00
|
|
|
fn decrypt(&self, address: H160, password: Password, key: Bytes, data: Bytes) -> Result<Bytes> {
|
2017-05-05 15:57:29 +02:00
|
|
|
decrypt_document(self.decrypt_key(address, password, key)?, data.0)
|
|
|
|
.map(Into::into)
|
|
|
|
}
|
|
|
|
|
2018-06-22 15:09:15 +02:00
|
|
|
fn shadow_decrypt(&self, address: H160, password: Password, decrypted_secret: H512, common_point: H512, decrypt_shadows: Vec<Bytes>, data: Bytes) -> Result<Bytes> {
|
2017-05-05 15:57:29 +02:00
|
|
|
let mut shadows = Vec::with_capacity(decrypt_shadows.len());
|
|
|
|
for decrypt_shadow in decrypt_shadows {
|
|
|
|
shadows.push(self.decrypt_secret(address.clone(), password.clone(), decrypt_shadow)?);
|
|
|
|
}
|
|
|
|
|
|
|
|
decrypt_document_with_shadow(decrypted_secret.into(), common_point.into(), shadows, data.0)
|
|
|
|
.map(Into::into)
|
|
|
|
}
|
2017-11-16 17:34:23 +01:00
|
|
|
|
2017-12-19 14:59:37 +01:00
|
|
|
fn servers_set_hash(&self, servers_set: BTreeSet<H512>) -> Result<H256> {
|
|
|
|
Ok(ordered_servers_keccak(servers_set))
|
|
|
|
}
|
|
|
|
|
2018-06-22 15:09:15 +02:00
|
|
|
fn sign_raw_hash(&self, address: H160, password: Password, raw_hash: H256) -> Result<Bytes> {
|
2018-06-04 11:26:30 +02:00
|
|
|
self.accounts
|
2017-12-19 14:59:37 +01:00
|
|
|
.sign(address.into(), Some(password), raw_hash.into())
|
2017-11-16 17:34:23 +01:00
|
|
|
.map(|s| Bytes::new((*s).to_vec()))
|
2017-12-19 14:59:37 +01:00
|
|
|
.map_err(|e| errors::account("Could not sign raw hash.", e))
|
2017-11-16 17:34:23 +01:00
|
|
|
}
|
2017-05-05 15:57:29 +02:00
|
|
|
}
|