mirror of
https://github.com/monero-project/monero.git
synced 2025-03-26 15:18:12 -04:00

- When background syncing, the wallet wipes the spend key from memory and processes all new transactions. The wallet saves all receives, spends, and "plausible" spends of receives the wallet does not know key images for. - When background sync disabled, the wallet processes all background synced txs and then clears the background sync cache. - Adding "plausible" spends to the background sync cache ensures that the wallet does not need to query the daemon to see if any received outputs were spent while background sync was enabled. This would harm privacy especially for users of 3rd party daemons. - To enable the feature in the CLI wallet, the user can set background-sync to reuse-wallet-password or custom-background-password and the wallet automatically syncs in the background when the wallet locks, then processes all background synced txs when the wallet is unlocked. - The custom-background-password option enables the user to open a distinct background wallet that only has a view key saved and can be opened/closed/synced separately from the main wallet. When the main wallet opens, it processes the background wallet's cache. - To enable the feature in the RPC wallet, there is a new `/setup_background_sync` endpoint. - HW, multsig and view-only wallets cannot background sync.
124 lines
5.3 KiB
C++
124 lines
5.3 KiB
C++
// Copyright (c) 2014-2023, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#pragma once
|
|
|
|
#include "cryptonote_basic.h"
|
|
#include "crypto/crypto.h"
|
|
#include "serialization/keyvalue_serialization.h"
|
|
|
|
namespace cryptonote
|
|
{
|
|
|
|
struct account_keys
|
|
{
|
|
account_public_address m_account_address;
|
|
crypto::secret_key m_spend_secret_key;
|
|
crypto::secret_key m_view_secret_key;
|
|
std::vector<crypto::secret_key> m_multisig_keys;
|
|
hw::device *m_device = &hw::get_device("default");
|
|
crypto::chacha_iv m_encryption_iv;
|
|
|
|
BEGIN_KV_SERIALIZE_MAP()
|
|
KV_SERIALIZE(m_account_address)
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_FORCE(m_spend_secret_key)
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_FORCE(m_view_secret_key)
|
|
KV_SERIALIZE_CONTAINER_POD_AS_BLOB(m_multisig_keys)
|
|
const crypto::chacha_iv default_iv{{0, 0, 0, 0, 0, 0, 0, 0}};
|
|
KV_SERIALIZE_VAL_POD_AS_BLOB_OPT(m_encryption_iv, default_iv)
|
|
END_KV_SERIALIZE_MAP()
|
|
|
|
void encrypt(const crypto::chacha_key &key);
|
|
void decrypt(const crypto::chacha_key &key);
|
|
void encrypt_viewkey(const crypto::chacha_key &key);
|
|
void decrypt_viewkey(const crypto::chacha_key &key);
|
|
|
|
hw::device& get_device() const ;
|
|
void set_device( hw::device &hwdev) ;
|
|
|
|
private:
|
|
void xor_with_key_stream(const crypto::chacha_key &key);
|
|
};
|
|
|
|
/************************************************************************/
|
|
/* */
|
|
/************************************************************************/
|
|
class account_base
|
|
{
|
|
public:
|
|
account_base();
|
|
crypto::secret_key generate(const crypto::secret_key& recovery_key = crypto::secret_key(), bool recover = false, bool two_random = false);
|
|
void create_from_device(const std::string &device_name);
|
|
void create_from_device(hw::device &hwdev);
|
|
void create_from_keys(const cryptonote::account_public_address& address, const crypto::secret_key& spendkey, const crypto::secret_key& viewkey);
|
|
void create_from_viewkey(const cryptonote::account_public_address& address, const crypto::secret_key& viewkey);
|
|
bool make_multisig(const crypto::secret_key &view_secret_key, const crypto::secret_key &spend_secret_key, const crypto::public_key &spend_public_key, const std::vector<crypto::secret_key> &multisig_keys);
|
|
const account_keys& get_keys() const;
|
|
std::string get_public_address_str(network_type nettype) const;
|
|
std::string get_public_integrated_address_str(const crypto::hash8 &payment_id, network_type nettype) const;
|
|
|
|
hw::device& get_device() const {return m_keys.get_device();}
|
|
void set_device( hw::device &hwdev) {m_keys.set_device(hwdev);}
|
|
void deinit();
|
|
|
|
uint64_t get_createtime() const { return m_creation_timestamp; }
|
|
void set_createtime(uint64_t val) { m_creation_timestamp = val; }
|
|
|
|
bool load(const std::string& file_path);
|
|
bool store(const std::string& file_path);
|
|
|
|
void forget_spend_key();
|
|
void set_spend_key(const crypto::secret_key& spend_secret_key);
|
|
const std::vector<crypto::secret_key> &get_multisig_keys() const { return m_keys.m_multisig_keys; }
|
|
|
|
void encrypt_keys(const crypto::chacha_key &key) { m_keys.encrypt(key); }
|
|
void decrypt_keys(const crypto::chacha_key &key) { m_keys.decrypt(key); }
|
|
void encrypt_viewkey(const crypto::chacha_key &key) { m_keys.encrypt_viewkey(key); }
|
|
void decrypt_viewkey(const crypto::chacha_key &key) { m_keys.decrypt_viewkey(key); }
|
|
|
|
template <class t_archive>
|
|
inline void serialize(t_archive &a, const unsigned int /*ver*/)
|
|
{
|
|
a & m_keys;
|
|
a & m_creation_timestamp;
|
|
}
|
|
|
|
BEGIN_KV_SERIALIZE_MAP()
|
|
KV_SERIALIZE(m_keys)
|
|
KV_SERIALIZE(m_creation_timestamp)
|
|
END_KV_SERIALIZE_MAP()
|
|
|
|
private:
|
|
void set_null();
|
|
account_keys m_keys;
|
|
uint64_t m_creation_timestamp;
|
|
};
|
|
}
|