aboutsummaryrefslogtreecommitdiff
path: root/src/device/device_ledger.cpp (follow)
AgeCommit message (Collapse)AuthorFilesLines
2022-06-20cryptonote_basic: catch crypto api errorsmoneromooo-monero1-4/+8
2022-04-19Merge pull request #8232luigi11111-0/+1
0f7b20a Added support for Ledger Nano S Plus (Mathias Herberts)
2022-04-18Add view tags to outputs to reduce wallet scanning timej-berman1-2/+5
Implements view tags as proposed by @UkoeHB in MRL issue https://github.com/monero-project/research-lab/issues/73 At tx construction, the sender adds a 1-byte view tag to each output. The view tag is derived from the sender-receiver shared secret. When scanning for outputs, the receiver can check the view tag for a match, in order to reduce scanning time. When the view tag does not match, the wallet avoids the more expensive EC operations when deriving the output public key using the shared secret.
2022-03-31Added support for Ledger Nano S PlusMathias Herberts1-1/+2
2022-03-04Copyright: Update to 2022mj-xmr1-1/+1
2021-11-12device_ledger: fix incorrect macroselsta1-4/+4
The current code does work by accident, but it might break if someone uses ASSERT_SW in a different place, or if variables get renamed.
2021-11-03device: fix ledger error strings, add human friendly messagesselsta1-7/+3
2021-07-27Merge pull request #7745luigi11111-3/+2
d52d21b ledger: don't lock for software device (tobtoht)
2021-06-04ledger: don't lock for software devicetobtoht1-3/+2
2021-06-04ledger: use software device if we have view keytobtoht1-2/+12
2020-10-13device: Ledger - update status codesxiphon1-27/+16
2020-08-28Fix send scalar z in plaintextFrançois Colas1-4/+6
The scalar z has not been generated on the HW thus it can't be sent encrypted. The value is derived from the exported private view key.
2020-08-28Update protocol version with Ledger's HWFrançois Colas1-1/+1
2020-08-27draft support of clsagcslashm1-0/+152
2020-08-27Integrate CLSAGs into moneromoneromooo-monero1-3/+3
They are allowed from v12, and MLSAGs are rejected from v13.
2020-08-16Merge pull request #6661Alexander Blair1-1/+1
267ce5b71 avoid a couple needless copies (moneromooo-monero)
2020-07-19Merge pull request #6565Alexander Blair1-4/+4
72cdfa4a2 fix a few typos in error messages (moneromooo-monero)
2020-07-19Merge pull request #6512Alexander Blair1-1/+1
5ef0607da Update copyright year to 2020 (SomaticFanatic)
2020-06-14avoid a couple needless copiesmoneromooo-monero1-1/+1
2020-05-27Fix incorrect lenght of command INS_PREFIX_HASHFrançois Colas1-2/+2
buffer_send[4] (LC) is an unsigned char, len should not exceed 254 (255 - 1 for the option).
2020-05-19fix a few typos in error messagesmoneromooo-monero1-4/+4
Reported by adrelanos
2020-05-06Update copyright year to 2020SomaticFanatic1-1/+1
Update copyright year to 2020
2020-05-01Merge pull request #6436luigi11111-1/+77
688a3e8 Add timelock verification on device (cslashm)
2020-04-08Add timelock verification on devicecslashm1-1/+77
2020-02-08device_ledger: include status code name in error messagexiphon1-1/+69
2019-10-25device: bounds checking in Ledger send_secret/receive_secretxiphon1-0/+4
2019-10-03Fix debug featurecslashm1-0/+2
2019-10-03Revert PR #5835 (export view key)cslashm1-1/+1
2019-10-03Add display addresscslashm1-0/+23
2019-10-03Add hmac over encrypted value during transactioncslashm1-90/+145
2019-09-08Merge pull request #5835luigi11111-1/+1
26f7a26 device: fix ledger requesting secret keys export twice (xiphon)
2019-08-26device_ledger: add paranoid buffer overflow checkmoneromooo-monero1-1/+3
Coverity 200183
2019-08-20device: fix ledger requesting secret keys export twicexiphon1-1/+1
2019-06-09Fix GCC 9.1 build warningsmoneromooo-monero1-0/+14
GCC wants operator= aand copy ctor to be both defined, or neither
2019-04-01Add NanoX supportcslashm1-1/+6
2019-03-28Add get_tx_proof support, needed for new sanity checkcslashm1-19/+126
Enhance debug info
2019-03-28Add support for V11 protocol with BulletProofV2 and short amount.cslashm1-43/+78
New scheme key destination contrfol Fix dummy decryption in debug mode
2019-03-28Add application version compatibility check.cslashm1-2/+18
2019-03-05Update 2019 copyrightbinaryFate1-1/+1
2019-03-04various: remove unused variablesmoneromooo-monero1-5/+1
2019-02-08Add support for V10 protocol with BulletProofV2 and short amount.cslashm1-13/+34
2019-02-08fix log namespacecslashm1-45/+45
2019-02-08New scheme key destination contrfolcslashm1-7/+147
Implies protocol version management.
2019-01-28Merge pull request #5055Riccardo Spagni1-5/+34
6c060e6a device: proper handling of user input (selsta)
2019-01-28Merge pull request #5054Riccardo Spagni1-1/+1
93c21644 device_ledger: remove full_name variable (selsta)
2019-01-22ringct: encode 8 byte amount, saving 24 bytes per outputmoneromooo-monero1-4/+4
Found by knaccc
2019-01-09device: proper handling of user inputselsta1-5/+34
(1) If the user denies something on the Ledger, a proper error message is now shown. (2) Ledger doesn't time out anymore while waiting on user input. (3) Lower the timeout to 2 seconds, this is enough for normal Ledger <-> System communication.
2019-01-09device_ledger: remove full_name variableselsta1-1/+1
This variable was never set, resulting in the device name always showing as "disconnected".
2018-11-23remove some unused codemoneromooo-monero1-2/+0
Found by codacy.com
2018-10-23ringct: use dummy bulletproofs when in fake mode, for speedmoneromooo-monero1-1/+1
2018-10-18device: extended logging, refactored device selection codexiphon1-1/+1
2018-10-09device: increase ledger timeout to 2 minutesselsta1-1/+1
2018-10-08Remove last traces of libpcsc-litemoneromooo-monero1-9/+0
2018-09-24Replace USB-CCID (smartcard) by USB-HIDcslashm1-140/+60
Remove PCSC dependencies which is a bit hard (not user friendly) to install on linux and Mac Split Ledger logic and device IO
2018-09-13Add bulletproof supportcslashm1-1/+1
2018-09-11Bulletproof aggregated verification and testsmoneromooo-monero1-1/+1
Also constrains bulletproofs to simple rct, for simplicity
2018-08-23add and use constant time 32 byte equality functionmoneromooo-monero1-1/+2
2018-08-08wallet: allow adjusting number of rounds for the key derivation functionstoffu1-3/+3
2018-07-19Merge pull request #4032luigi11111-412/+58
87e158b device_ledger: factor the prologue code (moneromooo-monero)
2018-07-03Merge pull request #4043Riccardo Spagni1-5/+8
34de7bc2 device_ledger: fix buffer underflow on bad data from device (moneromooo-monero) 41e9cab4 device: misc cleanup (moneromooo-monero) 3b4dec2d device_ledger: fix potential buffer overflow from bad size calc (moneromooo-monero)
2018-06-25Merge pull request #3977luigi11111-1/+1
0309615 device_ledger: fix bad memory access on connect error (moneromooo-monero)
2018-06-25device_ledger: factor the prologue codemoneromooo-monero1-412/+58
2018-06-23device_ledger: fix buffer underflow on bad data from devicemoneromooo-monero1-0/+1
2018-06-23device: misc cleanupmoneromooo-monero1-3/+3
use snprintf "just in case" where appropriate consistently use unsigned for temp values pass std::string by const ref rather than by value add length check (which can't happen in practice) for memcpy
2018-06-23device_ledger: fix potential buffer overflow from bad size calcmoneromooo-monero1-2/+4
2018-06-09device_ledger: fix bad memory access on connect errormoneromooo-monero1-1/+1
2018-05-23Fix PCSC compilation under windowscslashm1-0/+9
PR3843 based on release-v0.12 => rebased on master
2018-04-12Fix sub-address tx scan.cslashm1-0/+23
When additional keys was needed, the TX scan failed because the derivation data was always recomputed with the main tx_key and not the corresponding additional one. Moreover this patch avoid perf decreasing when not using HW device.
2018-03-31Add the possibility to export private view key for fast scan.cslashm1-54/+117
On client startup the device asks for authorization to export the private view key. If user agree, the client hold the private view key allowing a fast blockchain scan. If the user does not agree, the blockchain scan is fully done via the device.
2018-03-31Change mutex lock model to avoid dead lock and ensure locks are always released.cslashm1-373/+157
Additional cosmetic fixes: move 'name' as protected remove unnecessary local var Fix debug log
2018-03-14chacha: call prehashed version explicitly as generate_chacha_key_prehashedstoffu1-2/+2
hash: add prehashed version cn_slow_hash_prehashed slow-hash: let cn_slow_hash take 4th parameter for deciding prehashed or not slow-hash: add support for prehashed version for the other 3 platforms
2018-03-14device: untangle cyclic depenencystoffu1-0/+2
When #3303 was merged, a cyclic dependency chain was generated: libdevice <- libcncrypto <- libringct <- libdevice This was because libdevice needs access to a set of basic crypto operations implemented in libringct such as scalarmultBase(), while libringct also needs access to abstracted crypto operations implemented in libdevice such as ecdhEncode(). To untangle this cyclic dependency chain, this patch splits libringct into libringct_basic and libringct, where the basic crypto ops previously in libringct are moved into libringct_basic. The cyclic dependency is now resolved thanks to this separation: libcncrypto <- libringct_basic <- libdevice <- libcryptonote_basic <- libringct This eliminates the need for crypto_device.cpp and rctOps_device.cpp. Also, many abstracted interfaces of hw::device such as encrypt_payment_id() and get_subaddress_secret_key() were previously implemented in libcryptonote_basic (cryptonote_format_utils.cpp) and were then called from hw::core::device_default, which is odd because libdevice is supposed to be independent of libcryptonote_basic. Therefore, those functions were moved to device_default.cpp.
2018-03-14device: made function prototypes consistent with pre-#3303 codebasestoffu1-12/+16
2018-03-12Ledger HW Bug fixesCédric1-71/+119
Fix the way the REAL mode is handle: Let create_transactions_2 and create_transactions_from construct the vector of transactions. Then iterate on it and resign. We just need to add 'outs' list in the TX struct for that. Fix default secret keys value when DEBUG_HWDEVICE mode is off The magic value (00...00 for view key and FF..FF for spend key) was not correctly set when DEBUG_HWDEVICE was off. Both was set to 00...00. Add sub-address info in ABP map in order to correctly display destination sub-address on device Fix DEBUG_HWDEVICE mode: - Fix compilation errors. - Fix control device init in ledger device. - Add more log. Fix sub addr control Fix debug Info
2018-03-05Monero Cryptonight variants, and add one for v7moneromooo-monero1-1/+1
This is the first variant of many, with the intent to improve Monero's resistance to ASICs and encourage mining decentralization.
2018-03-04Fix invalid device unique_ptr castMoroccanMalinois1-1/+1
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm1-0/+2069
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.