mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-22 03:30:35 +00:00
5a66807989
* First take at updating everything to v5 * Patch gRPC gateway to use prysm v5 Fix patch * Update go ssz --------- Co-authored-by: Preston Van Loon <pvanloon@offchainlabs.com>
189 lines
5.0 KiB
Go
189 lines
5.0 KiB
Go
// Copyright 2014 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// Modified by Prysmatic Labs 2018
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package keystore
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/pborman/uuid"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v5/io/file"
|
|
)
|
|
|
|
const (
|
|
keyHeaderKDF = "scrypt"
|
|
|
|
// LightScryptN is the N parameter of Scrypt encryption algorithm, using 4MB
|
|
// memory and taking approximately 100ms CPU time on a modern processor.
|
|
LightScryptN = 1 << 12
|
|
|
|
// LightScryptP is the P parameter of Scrypt encryption algorithm, using 4MB
|
|
// memory and taking approximately 100ms CPU time on a modern processor.
|
|
LightScryptP = 6
|
|
|
|
scryptR = 8
|
|
scryptDKLen = 32
|
|
)
|
|
|
|
// Key is the object that stores all the user data related to their public/secret keys.
|
|
type Key struct {
|
|
ID uuid.UUID // Version 4 "random" for unique id not derived from key data
|
|
|
|
PublicKey bls.PublicKey // Represents the public key of the user.
|
|
|
|
SecretKey bls.SecretKey // Represents the private key of the user.
|
|
}
|
|
|
|
type keyStore interface {
|
|
// GetKey loads and decrypts the key from disk.
|
|
GetKey(filename string, password string) (*Key, error)
|
|
// StoreKey writes and encrypts the key.
|
|
StoreKey(filename string, k *Key, auth string) error
|
|
// JoinPath joins filename with the key directory unless it is already absolute.
|
|
JoinPath(filename string) string
|
|
}
|
|
|
|
type plainKeyJSON struct {
|
|
PublicKey string `json:"address"`
|
|
SecretKey string `json:"privatekey"`
|
|
ID string `json:"id"`
|
|
}
|
|
|
|
type encryptedKeyJSON struct {
|
|
PublicKey string `json:"publickey"`
|
|
Crypto cryptoJSON `json:"crypto"`
|
|
ID string `json:"id"`
|
|
}
|
|
|
|
type cryptoJSON struct {
|
|
Cipher string `json:"cipher"`
|
|
CipherText string `json:"ciphertext"`
|
|
CipherParams cipherparamsJSON `json:"cipherparams"`
|
|
KDF string `json:"kdf"`
|
|
KDFParams map[string]interface{} `json:"kdfparams"`
|
|
MAC string `json:"mac"`
|
|
}
|
|
|
|
type cipherparamsJSON struct {
|
|
IV string `json:"iv"`
|
|
}
|
|
|
|
// MarshalJSON marshals a key struct into a JSON blob.
|
|
func (k *Key) MarshalJSON() (j []byte, err error) {
|
|
jStruct := plainKeyJSON{
|
|
hex.EncodeToString(k.PublicKey.Marshal()),
|
|
hex.EncodeToString(k.SecretKey.Marshal()),
|
|
k.ID.String(),
|
|
}
|
|
j, err = json.Marshal(jStruct)
|
|
return j, err
|
|
}
|
|
|
|
// UnmarshalJSON unmarshals a blob into a key struct.
|
|
func (k *Key) UnmarshalJSON(j []byte) (err error) {
|
|
keyJSON := new(plainKeyJSON)
|
|
err = json.Unmarshal(j, &keyJSON)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
u := new(uuid.UUID)
|
|
*u = uuid.Parse(keyJSON.ID)
|
|
k.ID = *u
|
|
pubkey, err := hex.DecodeString(keyJSON.PublicKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
seckey, err := hex.DecodeString(keyJSON.SecretKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
k.PublicKey, err = bls.PublicKeyFromBytes(pubkey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
k.SecretKey, err = bls.SecretKeyFromBytes(seckey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// NewKeyFromBLS creates a new keystore Key type using a BLS private key.
|
|
func NewKeyFromBLS(blsKey bls.SecretKey) (*Key, error) {
|
|
id := uuid.NewRandom()
|
|
pubkey := blsKey.PublicKey()
|
|
key := &Key{
|
|
ID: id,
|
|
PublicKey: pubkey,
|
|
SecretKey: blsKey,
|
|
}
|
|
return key, nil
|
|
}
|
|
|
|
// NewKey generates a new random key.
|
|
func NewKey() (*Key, error) {
|
|
secretKey, err := bls.RandKey()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return NewKeyFromBLS(secretKey)
|
|
}
|
|
|
|
func storeNewRandomKey(ks keyStore, password string) error {
|
|
key, err := NewKey()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return ks.StoreKey(ks.JoinPath(keyFileName(key.PublicKey)), key, password)
|
|
}
|
|
|
|
func writeKeyFile(fname string, content []byte) error {
|
|
// Create the keystore directory with appropriate permissions
|
|
// in case it is not present yet.
|
|
if err := file.MkdirAll(filepath.Dir(fname)); err != nil {
|
|
return err
|
|
}
|
|
// Atomic write: create a temporary hidden file first
|
|
// then move it into place. TempFile assigns mode 0600.
|
|
f, err := os.CreateTemp(filepath.Dir(fname), "."+filepath.Base(fname)+".tmp")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if _, err := f.Write(content); err != nil {
|
|
newErr := f.Close()
|
|
if newErr != nil {
|
|
err = newErr
|
|
}
|
|
newErr = os.Remove(f.Name())
|
|
if newErr != nil {
|
|
err = newErr
|
|
}
|
|
return err
|
|
}
|
|
if err := f.Close(); err != nil {
|
|
return err
|
|
}
|
|
return os.Rename(f.Name(), fname)
|
|
}
|