// Copyright 2015-2018 Parity Technologies (UK) Ltd. // This file is part of Parity. // Parity is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity. If not, see . //! SecretStore-specific rpc implementation. use std::collections::BTreeSet; use std::sync::Arc; use crypto::DEFAULT_MAC; use ethkey::Secret; use ethcore::account_provider::AccountProvider; use jsonrpc_core::Result; use v1::helpers::errors; use v1::helpers::secretstore::{generate_document_key, encrypt_document, decrypt_document, decrypt_document_with_shadow, ordered_servers_keccak}; use v1::traits::SecretStore; use v1::types::{H160, H256, H512, Bytes, EncryptedDocumentKey}; use ethkey::Password; /// Parity implementation. pub struct SecretStoreClient { accounts: Arc, } impl SecretStoreClient { /// Creates new SecretStoreClient pub fn new(store: &Arc) -> Self { SecretStoreClient { accounts: store.clone(), } } /// Decrypt public key using account' private key fn decrypt_key(&self, address: H160, password: Password, key: Bytes) -> Result> { self.accounts.decrypt(address.into(), Some(password), &DEFAULT_MAC, &key.0) .map_err(|e| errors::account("Could not decrypt key.", e)) } /// Decrypt secret key using account' private key fn decrypt_secret(&self, address: H160, password: Password, key: Bytes) -> Result { self.decrypt_key(address, password, key) .and_then(|s| Secret::from_unsafe_slice(&s).map_err(|e| errors::account("invalid secret", e))) } } impl SecretStore for SecretStoreClient { fn generate_document_key(&self, address: H160, password: Password, server_key_public: H512) -> Result { let account_public = self.accounts.account_public(address.into(), &password) .map_err(|e| errors::account("Could not read account public.", e))?; generate_document_key(account_public, server_key_public.into()) } fn encrypt(&self, address: H160, password: Password, key: Bytes, data: Bytes) -> Result { encrypt_document(self.decrypt_key(address, password, key)?, data.0) .map(Into::into) } fn decrypt(&self, address: H160, password: Password, key: Bytes, data: Bytes) -> Result { decrypt_document(self.decrypt_key(address, password, key)?, data.0) .map(Into::into) } fn shadow_decrypt(&self, address: H160, password: Password, decrypted_secret: H512, common_point: H512, decrypt_shadows: Vec, data: Bytes) -> Result { let mut shadows = Vec::with_capacity(decrypt_shadows.len()); for decrypt_shadow in decrypt_shadows { shadows.push(self.decrypt_secret(address.clone(), password.clone(), decrypt_shadow)?); } decrypt_document_with_shadow(decrypted_secret.into(), common_point.into(), shadows, data.0) .map(Into::into) } fn servers_set_hash(&self, servers_set: BTreeSet) -> Result { Ok(ordered_servers_keccak(servers_set)) } fn sign_raw_hash(&self, address: H160, password: Password, raw_hash: H256) -> Result { self.accounts .sign(address.into(), Some(password), raw_hash.into()) .map(|s| Bytes::new((*s).to_vec())) .map_err(|e| errors::account("Could not sign raw hash.", e)) } }