All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bitcoinj.wallet.AuthenticationKeyChain Maven / Gradle / Ivy

There is a newer version: 21.0.0
Show newest version
/*
 * Copyright 2023 Dash Core Group
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.bitcoinj.wallet;

import com.google.common.base.MoreObjects;
import com.google.common.base.Preconditions;
import com.google.common.collect.ImmutableList;
import org.bitcoinj.core.NetworkParameters;
import org.bitcoinj.crypto.ChildNumber;
import org.bitcoinj.crypto.IDeterministicKey;
import org.bitcoinj.crypto.IKey;
import org.bitcoinj.crypto.HDUtils;
import org.bitcoinj.crypto.KeyCrypter;
import org.bitcoinj.crypto.KeyCrypterException;
import org.bitcoinj.crypto.factory.BLSKeyFactory;
import org.bitcoinj.crypto.factory.ECKeyFactory;
import org.bitcoinj.crypto.factory.Ed25519KeyFactory;
import org.bitcoinj.crypto.factory.KeyFactory;
import org.bitcoinj.script.Script;
import org.bitcoinj.utils.ListenerRegistration;
import org.bitcoinj.wallet.listeners.KeyChainEventListener;
import org.bouncycastle.crypto.params.KeyParameter;

import javax.annotation.Nullable;
import java.security.SecureRandom;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;

import static com.google.common.base.Preconditions.checkArgument;
import static com.google.common.base.Preconditions.checkNotNull;
import static com.google.common.base.Preconditions.checkState;

public class AuthenticationKeyChain extends AnyExternalKeyChain {

    public enum KeyChainType {
        BLOCKCHAIN_IDENTITY,
        BLOCKCHAIN_IDENTITY_FUNDING,
        MASTERNODE_HOLDINGS,
        MASTERNODE_OWNER,
        MASTERNODE_OPERATOR,
        MASTERNODE_VOTING,
        BLOCKCHAIN_IDENTITY_TOPUP,
        INVITATION_FUNDING,
        MASTERNODE_PLATFORM_OPERATOR,
        INVALID_KEY_CHAIN
    }
    public static KeyFactory getKeyFactory(KeyChainType type) {
        KeyFactory keyFactory = null;
        switch (type) {
            case MASTERNODE_OWNER:
            case MASTERNODE_VOTING:
            case BLOCKCHAIN_IDENTITY:
            case BLOCKCHAIN_IDENTITY_FUNDING:
            case BLOCKCHAIN_IDENTITY_TOPUP:
            case INVITATION_FUNDING:
            case MASTERNODE_HOLDINGS:
                keyFactory = ECKeyFactory.get();
                break;
            case MASTERNODE_OPERATOR:
                keyFactory = BLSKeyFactory.get();
                break;
            case MASTERNODE_PLATFORM_OPERATOR:
                keyFactory = Ed25519KeyFactory.get();
                break;
            default:
                break;
        }
        return keyFactory;
    }

    public static boolean requiresHardenedKeys(KeyChainType type) {
        switch (type) {
            case BLOCKCHAIN_IDENTITY:
            case MASTERNODE_PLATFORM_OPERATOR:
                return true;
            default:
                return false;
        }
    }

    public static boolean isECDSA(KeyChainType type) {
        return !isBLS(type) && !isEDDSA(type);
    }

    public static boolean isBLS(KeyChainType type) {
        return type == KeyChainType.MASTERNODE_OPERATOR;
    }
    public static boolean isEDDSA(KeyChainType type) {
        return type == KeyChainType.MASTERNODE_PLATFORM_OPERATOR;
    }
    KeyChainType type;
    int currentIndex;

    public static class Builder> {
        protected SecureRandom random;
        protected int bits = DeterministicSeed.DEFAULT_SEED_ENTROPY_BITS;
        protected String passphrase;
        protected long creationTimeSecs = 0;
        protected byte[] entropy;
        protected DeterministicSeed seed;
        protected boolean isFollowing = false;
        protected IDeterministicKey spendingKey = null;
        protected ImmutableList accountPath = null;
        protected KeyChainType type = null;
        protected boolean hardenedChildren = false;
        protected KeyFactory keyFactory = null;

        protected Builder() {
        }

        @SuppressWarnings("unchecked")
        protected T self() {
            return (T)this;
        }

        /**
         * Creates a deterministic key chain starting from the given seed. All keys yielded by this chain will be the same
         * if the starting seed is the same.
         */
        public T seed(DeterministicSeed seed) {
            this.seed = seed;
            return self();
        }

        /**
         * Generates a new key chain with entropy selected randomly from the given {@link SecureRandom}
         * object and of the requested size in bits.  The derived seed is further protected with a user selected passphrase
         * (see BIP 39).
         * @param random the random number generator - use new SecureRandom().
         * @param bits The number of bits of entropy to use when generating entropy.  Either 128 (default), 192 or 256.
         */
        public T random(SecureRandom random, int bits) {
            this.random = random;
            this.bits = bits;
            return self();
        }

        /**
         * Generates a new key chain with 128 bits of entropy selected randomly from the given {@link SecureRandom}
         * object.  The derived seed is further protected with a user selected passphrase
         * (see BIP 39).
         * @param random the random number generator - use new SecureRandom().
         */
        public T random(SecureRandom random) {
            this.random = random;
            return self();
        }

        /**
         * Creates a key chain that can spend from the given account key.
         */
        public T spend(IDeterministicKey accountKey) {
            checkState(accountPath == null, "either spend or accountPath");
            this.spendingKey = accountKey;
            this.isFollowing = false;
            return self();
        }

        /** The passphrase to use with the generated mnemonic, or null if you would like to use the default empty string. Currently must be the empty string. */
        public T passphrase(String passphrase) {
            // FIXME support non-empty passphrase
            this.passphrase = passphrase;
            return self();
        }

        /**
         * Use an account path other than the default {@link DeterministicKeyChain#ACCOUNT_ZERO_PATH}.
         */
        public T accountPath(ImmutableList accountPath) {
            this.accountPath = checkNotNull(accountPath);
            return self();
        }

        public T type(KeyChainType type) {
            this.type = type;
            return self();
        }

        public T createHardenedChildren(boolean hardedChildren) {
            this.hardenedChildren = hardedChildren;
            return self();
        }

        public AuthenticationKeyChain build() {
            checkState(passphrase == null || seed == null, "Passphrase must not be specified with seed");
            hardenedChildren = AuthenticationKeyChain.requiresHardenedKeys(type);

            if (accountPath == null)
                accountPath = ACCOUNT_ZERO_PATH;
            if (type == null)
                type = KeyChainType.INVALID_KEY_CHAIN;

            if (random != null)
                // Default passphrase to "" if not specified
                return new AuthenticationKeyChain(new DeterministicSeed(random, bits, getPassphrase()), null,
                        accountPath, type, hardenedChildren);
            else if (entropy != null)
                return new AuthenticationKeyChain(new DeterministicSeed(entropy, getPassphrase(), creationTimeSecs),
                        null, accountPath, type, hardenedChildren);
            else if (seed != null)
                return new AuthenticationKeyChain(seed, null, accountPath, type, hardenedChildren);
            else if (spendingKey != null)
                return new AuthenticationKeyChain(spendingKey, type, hardenedChildren);
            else
                throw new IllegalStateException();
        }

        protected String getPassphrase() {
            return passphrase != null ? passphrase : DEFAULT_PASSPHRASE_FOR_MNEMONIC;
        }
    }



    public AuthenticationKeyChain(DeterministicSeed seed, ImmutableList path, KeyFactory keyFactory, boolean hardenedKeysOnly) {
        super(seed, null, path, keyFactory, hardenedKeysOnly);
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    public AuthenticationKeyChain(DeterministicSeed seed, KeyCrypter keyCrypter, ImmutableList path, KeyFactory factory, boolean hardenedKeysOnly) {
        super(seed, keyCrypter, path, factory, hardenedKeysOnly);
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    public AuthenticationKeyChain(IDeterministicKey key, boolean hardenedKeysOnly) {
        super(key, false, hardenedKeysOnly);
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    public AuthenticationKeyChain(DeterministicSeed seed, ImmutableList path, KeyChainType type, boolean hardenedChildren) {
        this(seed, path, getKeyFactory(type), hardenedChildren);
        this.type = type;
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    public AuthenticationKeyChain(DeterministicSeed seed, KeyCrypter keyCrypter, ImmutableList path, KeyChainType type, boolean hardenedChildren) {
        this(seed, keyCrypter, path, getKeyFactory(type), hardenedChildren);
        this.type = type;
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    public AuthenticationKeyChain(IDeterministicKey key, KeyChainType type, boolean hardenedChildren) {
        this(key, hardenedChildren);
        this.type = type;
        setLookaheadSize(hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(hardenedKeysOnly ? 0 : lookaheadSize);
    }

    /**
     * For use in encryption when {@link #toEncrypted(KeyCrypter, KeyParameter)} is called, so that
     * subclasses can override that method and create an instance of the right class.
     *
     * See also {@link #makeKeyChainFromSeed(DeterministicSeed, ImmutableList, Script.ScriptType)}
     */
    protected AuthenticationKeyChain(KeyCrypter crypter, KeyParameter aesKey, AuthenticationKeyChain chain) {
        super(crypter, aesKey, chain, chain.hardenedKeysOnly);
        this.type = chain.type;
        setLookaheadSize(chain.hardenedKeysOnly ? 0 : 5);
        setLookaheadThreshold(chain.hardenedKeysOnly ? 1 : lookaheadSize);
    }

    public static Builder authenticationBuilder() {
        return new Builder();
    }

    @Override
    public void setLookaheadThreshold(int num) {
        lock.lock();
        try {
            this.lookaheadThreshold = num;
        } finally {
            lock.unlock();
        }
    }

    /**
     * Sets the KeyChainType of this AuthenticationKeyChain.  Used by Wallet when loading from a protobuf
     * @param type the type of authentication key chain
     */
    /* package */
    public void setType(KeyChainType type) {
        this.type = type;
    }

    @Override
    public IDeterministicKey getKey(KeyChain.KeyPurpose purpose) {
        return getKeys(purpose, 1).get(0);
    }

    @Override
    public List getKeys(KeyChain.KeyPurpose purpose, int numberOfKeys) {
        checkArgument(numberOfKeys > 0);
        lock.lock();
        try {
            IDeterministicKey parentKey;
            int index;
            switch (purpose) {
                case AUTHENTICATION:
                    issuedExternalKeys += numberOfKeys;
                    index = issuedExternalKeys;
                    parentKey = getKeyByPath(getAccountPath());
                    break;
                default:
                    throw new UnsupportedOperationException();
            }

            //TODO: do we need to look ahead here, even for one key?  Does anything get saved?
            /** Optimization: see {@link DeterministicKeyChain.getKeys( KeyPurpose, int)} */

            List lookahead = maybeLookAhead(parentKey, index, 0, 0);
            basicKeyChain.importKeys(lookahead);
            List keys = new ArrayList<>(numberOfKeys);
            for (int i = 0; i < numberOfKeys; i++) {
                ImmutableList path = HDUtils.append(parentKey.getPath(), new ChildNumber(index - numberOfKeys + i, hardenedKeysOnly));
                IDeterministicKey k = hierarchy.get(path, false, false);
                keys.add(k);
            }
            return keys;
        } finally {
            lock.unlock();
        }
    }

    public IDeterministicKey getKey(int index, boolean isHardened) {
        return getKeyByPath(new ImmutableList.Builder().addAll(getAccountPath()).addAll(ImmutableList.of(new ChildNumber(index, isHardened))).build(), true);
    }

    public IDeterministicKey getKey(int index) {
        return getKeyByPath(new ImmutableList.Builder().addAll(getAccountPath()).addAll(ImmutableList.of(new ChildNumber(index, hasHardenedKeysOnly()))).build(), true);
    }

    public int getCurrentIndex() {
        return currentIndex;
    }

    public int getIssuedKeyCount() {
        return issuedExternalKeys;
    }

    public IDeterministicKey freshAuthenticationKey() {
        return getKeys(KeyChain.KeyPurpose.AUTHENTICATION, 1).get(0);
    }

    public IDeterministicKey currentAuthenticationKey() {
        return getKey(issuedExternalKeys, hardenedKeysOnly);
    }

    public IDeterministicKey getKeyByPubKeyHash(byte [] hash160) {
        Preconditions.checkState(hash160.length == 20);
        return (IDeterministicKey)basicKeyChain.findKeyFromPubHash(hash160);
    }

    @Override
    public String toString(boolean includeLookahead, boolean includePrivateKeys, @Nullable KeyParameter aesKey, NetworkParameters params) {
        return "Authentication Key Chain: " + (type != null ? type.toString() : "unknown") + "\n" +
                super.toString(includeLookahead, includePrivateKeys, aesKey, params);
    }

    @Override
    public AuthenticationKeyChain toEncrypted(KeyCrypter keyCrypter, KeyParameter aesKey) {
        return new AuthenticationKeyChain(keyCrypter, aesKey, this);
    }

    @Override
    public AuthenticationKeyChain toDecrypted(KeyParameter aesKey) {
        checkState(getKeyCrypter() != null, "Key chain not encrypted");
        checkState(getSeed() != null, "Can't decrypt a watching chain");
        checkState(getSeed().isEncrypted());
        String passphrase = DEFAULT_PASSPHRASE_FOR_MNEMONIC; // FIXME allow non-empty passphrase
        DeterministicSeed decSeed = getSeed().decrypt(getKeyCrypter(), passphrase, aesKey);
        AuthenticationKeyChain chain = new AuthenticationKeyChain(decSeed, getAccountPath(), type, hardenedKeysOnly);
        // Now double check that the keys match to catch the case where the key is wrong but padding didn't catch it.
        if (!chain.getWatchingKey().getPubKeyObject().equals(getWatchingKey().getPubKeyObject()) &&
            !Arrays.equals(chain.getWatchingKey().getPubKey(), getWatchingKey().getPubKey()))
            throw new KeyCrypterException.PublicPrivateMismatch("Provided AES key is wrong");
        chain.lookaheadSize = lookaheadSize;
        // Now copy the (pubkey only) leaf keys across to avoid rederiving them. The private key bytes are missing
        // anyway so there's nothing to decrypt.
        for (IKey eckey : basicKeyChain.getKeys()) {
            IDeterministicKey key = (IDeterministicKey) eckey;
            if (key.getPath().size() != getAccountPath().size() + 2) continue; // Not a leaf key.
            checkState(key.isEncrypted());
            IDeterministicKey parent = chain.hierarchy.get(checkNotNull(key.getParent()).getPath(), false, false);
            // Clone the key to the new decrypted hierarchy.
            key = keyFactory.fromChildAndParent(key.dropPrivateBytes(), parent);
            chain.hierarchy.putKey(key);
            chain.basicKeyChain.importKey(key);
        }
        chain.issuedExternalKeys = issuedExternalKeys;
        chain.issuedInternalKeys = issuedInternalKeys;
        for (ListenerRegistration listener : basicKeyChain.getListeners()) {
            chain.basicKeyChain.addEventListener(listener.listener);
        }
        return chain;
    }

    public KeyChainType getType() {
        return type;
    }

    @Override
    public String toString() {
        MoreObjects.ToStringHelper helper = MoreObjects.toStringHelper(this).omitNullValues();
        helper.addValue(type);
        helper.addValue(keyFactory.getKeyType());
        helper.addValue(getOutputScriptType());
        helper.add("accountPath", getAccountPath());
        helper.add("lookaheadSize", lookaheadSize);
        helper.add("lookaheadThreshold", lookaheadThreshold);
        if (isFollowing)
            helper.addValue("following");
        return helper.toString();
    }

    public boolean addNewKey(IDeterministicKey key) {
        checkArgument(hasKey(key.getParent()));
        if (!hasKey(key)) {
            basicKeyChain.importKey(key);
            hierarchy.putKey(key);
            issuedExternalKeys += 1;
            return true;
        } else if (issuedExternalKeys <= key.getChildNumber().num()) {
            // some keys may have been generated but not considered issued
            issuedExternalKeys += 1;
            return true;
        } else {
            return false;
        }
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy