Open-Transactions  0.93.0-ge03d287
 All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Friends Macros Pages
OTCachedKey.hpp
Go to the documentation of this file.
1 /************************************************************
2  *
3  * OTCachedKey.hpp
4  *
5  */
6 
7 /************************************************************
8  -----BEGIN PGP SIGNED MESSAGE-----
9  Hash: SHA1
10 
11  * OPEN TRANSACTIONS
12  *
13  * Financial Cryptography and Digital Cash
14  * Library, Protocol, API, Server, CLI, GUI
15  *
16  * -- Anonymous Numbered Accounts.
17  * -- Untraceable Digital Cash.
18  * -- Triple-Signed Receipts.
19  * -- Cheques, Vouchers, Transfers, Inboxes.
20  * -- Basket Currencies, Markets, Payment Plans.
21  * -- Signed, XML, Ricardian-style Contracts.
22  * -- Scripted smart contracts.
23  *
24  * Copyright (C) 2010-2013 by "Fellow Traveler" (A pseudonym)
25  *
26  * EMAIL:
28  *
29  * BITCOIN: 1NtTPVVjDsUfDWybS4BwvHpG2pdS9RnYyQ
30  *
31  * KEY FINGERPRINT (PGP Key in license file):
32  * 9DD5 90EB 9292 4B48 0484 7910 0308 00ED F951 BB8E
33  *
34  * OFFICIAL PROJECT WIKI(s):
35  * https://github.com/FellowTraveler/Moneychanger
36  * https://github.com/FellowTraveler/Open-Transactions/wiki
37  *
38  * WEBSITE:
39  * http://www.OpenTransactions.org/
40  *
41  * Components and licensing:
42  * -- Moneychanger..A Java client GUI.....LICENSE:.....GPLv3
43  * -- otlib.........A class library.......LICENSE:...LAGPLv3
44  * -- otapi.........A client API..........LICENSE:...LAGPLv3
45  * -- opentxs/ot....Command-line client...LICENSE:...LAGPLv3
46  * -- otserver......Server Application....LICENSE:....AGPLv3
47  * Github.com/FellowTraveler/Open-Transactions/wiki/Components
48  *
49  * All of the above OT components were designed and written by
50  * Fellow Traveler, with the exception of Moneychanger, which
51  * was contracted out to Vicky C ([email protected]).
52  * The open-source community has since actively contributed.
53  *
54  * -----------------------------------------------------
55  *
56  * LICENSE:
57  * This program is free software: you can redistribute it
58  * and/or modify it under the terms of the GNU Affero
59  * General Public License as published by the Free Software
60  * Foundation, either version 3 of the License, or (at your
61  * option) any later version.
62  *
63  * ADDITIONAL PERMISSION under the GNU Affero GPL version 3
64  * section 7: (This paragraph applies only to the LAGPLv3
65  * components listed above.) If you modify this Program, or
66  * any covered work, by linking or combining it with other
67  * code, such other code is not for that reason alone subject
68  * to any of the requirements of the GNU Affero GPL version 3.
69  * (==> This means if you are only using the OT API, then you
70  * don't have to open-source your code--only your changes to
71  * Open-Transactions itself must be open source. Similar to
72  * LGPLv3, except it applies to software-as-a-service, not
73  * just to distributing binaries.)
74  *
75  * Extra WAIVER for OpenSSL, Lucre, and all other libraries
76  * used by Open Transactions: This program is released under
77  * the AGPL with the additional exemption that compiling,
78  * linking, and/or using OpenSSL is allowed. The same is true
79  * for any other open source libraries included in this
80  * project: complete waiver from the AGPL is hereby granted to
81  * compile, link, and/or use them with Open-Transactions,
82  * according to their own terms, as long as the rest of the
83  * Open-Transactions terms remain respected, with regard to
84  * the Open-Transactions code itself.
85  *
86  * Lucre License:
87  * This code is also "dual-license", meaning that Ben Lau-
88  * rie's license must also be included and respected, since
89  * the code for Lucre is also included with Open Transactions.
90  * See Open-Transactions/src/otlib/lucre/LUCRE_LICENSE.txt
91  * The Laurie requirements are light, but if there is any
92  * problem with his license, simply remove the Lucre code.
93  * Although there are no other blind token algorithms in Open
94  * Transactions (yet. credlib is coming), the other functions
95  * will continue to operate.
96  * See Lucre on Github: https://github.com/benlaurie/lucre
97  * -----------------------------------------------------
98  * You should have received a copy of the GNU Affero General
99  * Public License along with this program. If not, see:
100  * http://www.gnu.org/licenses/
101  *
102  * If you would like to use this software outside of the free
103  * software license, please contact FellowTraveler.
104  * (Unfortunately many will run anonymously and untraceably,
105  * so who could really stop them?)
106  *
107  * DISCLAIMER:
108  * This program is distributed in the hope that it will be
109  * useful, but WITHOUT ANY WARRANTY; without even the implied
110  * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
111  * PURPOSE. See the GNU Affero General Public License for
112  * more details.
113 
114  -----BEGIN PGP SIGNATURE-----
115  Version: GnuPG v1.4.9 (Darwin)
116 
117  iQIcBAEBAgAGBQJRSsfJAAoJEAMIAO35UbuOQT8P/RJbka8etf7wbxdHQNAY+2cC
118  vDf8J3X8VI+pwMqv6wgTVy17venMZJa4I4ikXD/MRyWV1XbTG0mBXk/7AZk7Rexk
119  KTvL/U1kWiez6+8XXLye+k2JNM6v7eej8xMrqEcO0ZArh/DsLoIn1y8p8qjBI7+m
120  aE7lhstDiD0z8mwRRLKFLN2IH5rAFaZZUvj5ERJaoYUKdn4c+RcQVei2YOl4T0FU
121  LWND3YLoH8naqJXkaOKEN4UfJINCwxhe5Ke9wyfLWLUO7NamRkWD2T7CJ0xocnD1
122  sjAzlVGNgaFDRflfIF4QhBx1Ddl6wwhJfw+d08bjqblSq8aXDkmFA7HeunSFKkdn
123  oIEOEgyj+veuOMRJC5pnBJ9vV+7qRdDKQWaCKotynt4sWJDGQ9kWGWm74SsNaduN
124  TPMyr9kNmGsfR69Q2Zq/FLcLX/j8ESxU+HYUB4vaARw2xEOu2xwDDv6jt0j3Vqsg
125  x7rWv4S/Eh18FDNDkVRChiNoOIilLYLL6c38uMf1pnItBuxP3uhgY6COm59kVaRh
126  nyGTYCDYD2TK+fI9o89F1297uDCwEJ62U0Q7iTDp5QuXCoxkPfv8/kX6lS6T3y9G
127  M9mqIoLbIQ1EDntFv7/t6fUTS2+46uCrdZWbQ5RjYXdrzjij02nDmJAm2BngnZvd
128  kamH0Y/n11lCvo1oQxM+
129  =uSzz
130  -----END PGP SIGNATURE-----
131  **************************************************************/
132 
133 #ifndef OPENTXS_CORE_CRYPTO_OTCACHEDKEY_HPP
134 #define OPENTXS_CORE_CRYPTO_OTCACHEDKEY_HPP
135 
136 #include <string>
137 #include <memory>
138 #include <map>
139 #include <mutex>
140 #include <thread>
141 
142 namespace opentxs
143 {
144 
145 class OTASCIIArmor;
146 class OTCachedKey;
147 class OTIdentifier;
148 class OTPassword;
149 class OTString;
150 class OTSymmetricKey;
151 
158 
306 // This is only the hard-coded default; it's also configurable in the opt file.
307 #define OT_MASTER_KEY_TIMEOUT 300
308 
309 typedef std::map<std::string, std::shared_ptr<OTCachedKey>> mapOfCachedKeys;
310 
312 {
313 private:
314  std::thread* m_pThread; // The thread used for destroying the password
315  // after the timeout period.
316  int32_t m_nTimeoutSeconds; // The master password will be stored internally
317  // for X seconds, and then destroyed.
318  OTPassword* m_pMasterPassword; // Created when password is passed in;
319  // destroyed by Timer after X seconds.
320 
321  bool m_bUse_System_Keyring; // if set to true, then additionally use the
322  // local OS's standard API for
323  // storing/retrieving secrets. (Store the master
324  // key here whenever it's decrypted, and try to
325  // retrieve from here whenever it's needed,
326  // before resorting to asking the user to type
327  // his passphrase.) This is configurable in the
328  // config file.
329 
330  OTSymmetricKey* m_pSymmetricKey; // Encrypted form of the master key.
331  // Serialized by OTWallet or OTServer.
332  std::mutex m_Mutex; // Mutex used for serializing access to this
333  // instance.
334  bool m_bPaused; // If you want to force the old system, PAUSE the master key
335  // (REMEMBER to Unpause when done!)
336  OTCachedKey(int32_t nTimeoutSeconds = OT_MASTER_KEY_TIMEOUT);
337  static std::mutex s_mutexThreadTimeout;
338  static std::mutex s_mutexCachedKeys;
339  static mapOfCachedKeys s_mapCachedKeys; // Now we have many "master keys,"
340  // mapped by their symmetric key ID.
341  // These are actually temps, just so
342  // we can safely cache the
343  // passphrases for various symmetric
344  // keys, between uses of that
345  // symmetric key. Such as Pop'ing
346  // tokens off of a purse, over and
347  // over again. Normally in the API,
348  // this would have to load the key
349  // each time. By caching here, we
350  // can exploit all the cool master
351  // key code, with its security, and
352  // threads, and timeouts, etc for
353  // every symmetric key we use. Just
354  // pass an ID into It() and if it's
355  // on the map, a pointer will be
356  // returned. Pass nullptr into It() (no
357  // arguments) to get a pointer to
358  // the global Master Key (for Nyms.)
359 public:
360  std::mutex* GetMutex()
361  {
362  return &m_Mutex;
363  } // So static functions using this CachedKey can also lock its mutex.
364  EXPORT OTCachedKey(const OTASCIIArmor& ascCachedKey);
365  EXPORT ~OTCachedKey();
366 
367  // if you pass in a master key ID, it will look it up on an existing cached
368  // map of master keys. Otherwise it will use "the" global Master Key
369  // (the one used for the Nyms.)
370  EXPORT static std::shared_ptr<OTCachedKey> It(
371  OTIdentifier* pIdentifier = nullptr);
372 
373  // if you pass in a master key, it will look it up on an existing cached map
374  // of master keys, based on the ID of the master key passed in. If not
375  // there, it copies the one passed in, and returns a pointer to the copy.
376  // (Do NOT delete it.)
377  EXPORT static std::shared_ptr<OTCachedKey> It(OTCachedKey& theSourceKey);
378 
379  EXPORT static void Cleanup(); // Call on application shutdown. Called in
380  // CleanupOTAPI and also in OTServer wherever
381  // it cleans up.
382  EXPORT bool GetIdentifier(OTIdentifier& theIdentifier) const;
383  EXPORT bool GetIdentifier(OTString& strIdentifier) const;
384  EXPORT bool IsGenerated();
385  EXPORT bool HasHashCheck();
386  EXPORT bool IsUsingSystemKeyring() const
387  {
388  return m_bUse_System_Keyring;
389  }
390  EXPORT void UseSystemKeyring(bool bUsing = true)
391  {
392  m_bUse_System_Keyring = bUsing;
393  } // Start using system keyring.
394  EXPORT bool Pause();
395  EXPORT bool Unpause();
396  EXPORT bool isPaused();
397  EXPORT bool SerializeTo(OTASCIIArmor& ascOutput);
398  EXPORT bool SerializeFrom(const OTASCIIArmor& ascInput);
399 
400  // These two functions are used by the OTServer or OTWallet that actually
401  // keeps
402  // the master key. The owner sets the master key pointer on initialization,
403  // and then
404  // later when the password callback code in OTAsymmetricKey needs to access
405  // the master
406  // key, it can use GetMasterPassword to access it.
407  //
408  EXPORT void SetCachedKey(
409  const OTASCIIArmor& ascCachedKey); // OTServer/OTWallet calls this, I
410  // instantiate.
411 
412  EXPORT int32_t GetTimeoutSeconds();
413  EXPORT void SetTimeoutSeconds(int32_t nTimeoutSeconds); // So we can load
414  // from the config
415  // file.
416 
417  // For Nyms, which have a global master key serving as their "passphrase"
418  // (for that wallet),
419  // The password callback uses OTCachedKey::It() to get the instance, and
420  // then GetMasterPassword
421  // to get the passphrase for any individual Nym. Otherwise,
422  // OTCachedKey::It(OTSymmetricKey *) looks
423  // up a cached master key based on the ID of the key passed in. For example,
424  // OTPurse has a symmetric
425  // key and master key (optionally, vs using a Nym.) The symmetric key
426  // contains the actual key for the
427  // tokens, and the master key is used for the passphrase, which may be
428  // cached, or may have timed out,
429  // and then re-retrieved from the user (either way). The purse, rather than
430  // using the global
431  // master key to get the passphrase, (which _would_ happen if the purse is
432  // encrypted to a nym) will
433  // instead use its own internal master key to get its passphrase (also
434  // retrieving from the user if
435  // necessary.)
436  EXPORT bool GetMasterPassword(std::shared_ptr<OTCachedKey>& mySharedPtr,
437  OTPassword& theOutput,
438  const char* szDisplay = nullptr,
439  bool bVerifyTwice = false);
440  // Caller must delete!
441  EXPORT static std::shared_ptr<OTCachedKey> CreateMasterPassword(
442  OTPassword& theOutput, const char* szDisplay = nullptr,
443  int32_t nTimeoutSeconds = OT_MASTER_KEY_TIMEOUT);
444 
445  EXPORT void DestroyMasterPassword(); // The thread, when the time comes,
446  // calls this method using the instance
447  // pointer that was passed into the
448  // thread originally. The actual
449  // encrypted version is kept -- only
450  // the temporary cleartext version is
451  // destroyed.
452 
453  EXPORT void ResetMasterPassword(); // If you actually want to create a new
454  // key, and a new passphrase, then use
455  // this to destroy every last vestige of
456  // the old one. (Which will cause a new
457  // one to be automatically generated the
458  // next time OT requests the master key.)
459  // NOTE: Make SURE you have all your Nyms
460  // loaded up and unlocked before you call
461  // this. Then Save them all again so they
462  // will be properly stored with the new
463  // master key.
464 
465  EXPORT void LowLevelReleaseThread();
466 
467  // The cleartext version (m_pMasterPassword) is deleted and set nullptr
468  // after a
469  // Timer of X seconds. (Timer thread calls this.)
470  // The INSTANCE that owns the thread also passes a pointer to ITSELF.
471  // (So we can access password, mutex, timeout value, etc.) This function
472  // calls DestroyMasterPassword.
473  //
474  EXPORT static void ThreadTimeout(void* pArg);
475 };
476 
477 } // namespace opentxs
478 
479 #endif // OPENTXS_CORE_CRYPTO_OTCACHEDKEY_HPP
static EXPORT void Cleanup()
EXPORT void ResetMasterPassword()
static EXPORT std::shared_ptr< OTCachedKey > CreateMasterPassword(OTPassword &theOutput, const char *szDisplay=nullptr, int32_t nTimeoutSeconds=OT_MASTER_KEY_TIMEOUT)
EXPORT void LowLevelReleaseThread()
EXPORT bool IsUsingSystemKeyring() const
EXPORT void SetCachedKey(const OTASCIIArmor &ascCachedKey)
EXPORT bool Pause()
std::map< std::string, std::shared_ptr< OTCachedKey > > mapOfCachedKeys
EXPORT void DestroyMasterPassword()
static EXPORT std::shared_ptr< OTCachedKey > It(OTIdentifier *pIdentifier=nullptr)
EXPORT void SetTimeoutSeconds(int32_t nTimeoutSeconds)
EXPORT void UseSystemKeyring(bool bUsing=true)
EXPORT bool IsGenerated()
EXPORT bool GetIdentifier(OTIdentifier &theIdentifier) const
EXPORT bool HasHashCheck()
EXPORT bool Unpause()
static EXPORT void ThreadTimeout(void *pArg)
EXPORT bool SerializeFrom(const OTASCIIArmor &ascInput)
EXPORT int32_t GetTimeoutSeconds()
EXPORT bool isPaused()
#define OT_MASTER_KEY_TIMEOUT
EXPORT bool SerializeTo(OTASCIIArmor &ascOutput)
std::mutex * GetMutex()
EXPORT bool GetMasterPassword(std::shared_ptr< OTCachedKey > &mySharedPtr, OTPassword &theOutput, const char *szDisplay=nullptr, bool bVerifyTwice=false)