aboutsummaryrefslogtreecommitdiff
path: root/src/multisig (follow)
AgeCommit message (Collapse)AuthorFilesLines
2024-07-16Merge pull request #9338luigi111113-13/+13
4a376d6 copyright: fix vector.h typo (hinto.janaiyo) d61e8e9 workflows: delete copyright.yml (plowsof) 341771a copyright: bump to 2024 (copyCat)
2024-07-16Merge pull request #9215luigi11111-1/+1
3837bb8 remove repetitive word (cuinix)
2024-05-21add key exchange round booster to multisig_accountkoe2-62/+156
2024-05-21copyright: bump to 2024copyCat13-13/+13
2024-05-20Merge pull request #9151luigi11112-3/+1
ff49444 @tobtoht: undo rebase changes tx.dsts -> tx_dsts (jeffro256) 38f354e Enforce Tx unlock_time is Zero by Relay Rule (jeffro256)
2024-05-20Merge pull request #7852luigi11111-0/+13
8d94d08 replace 'multisig()' with 'get_multisig_status()' using multisig_account_status and including '.kex_is_done' member (koe)
2024-04-20remove repetitive wordcuinix1-1/+1
Signed-off-by: cuinix <915115094@qq.com>
2024-02-24Enforce Tx unlock_time is Zero by Relay Rulejeffro2562-3/+1
Related to https://github.com/monero-project/research-lab/issues/78 Added a relay rule that enforces the `unlock_time` field is equal to 0 for non-coinbase transactions. UIs changed: * Removed `locked_transfer` and `locked_sweep_all` commands from `monero-wallet-cli` APIs changed: * Removed `unlock_time` parameters from `wallet2` transfer methods * Wallet RPC transfer endpoints send error codes when requested unlock time is not 0 * Removed `unlock_time` parameters from `construct_tx*` cryptonote core functions
2023-08-08multisig: better errors for small malformed kex msgsjeffro2561-3/+6
Resolves https://github.com/monero-project/monero/issues/8493
2023-02-28replace 'multisig()' with 'get_multisig_status()' using ↵koe1-0/+13
multisig_account_status and including '.kex_is_done' member
2023-01-16Copyright: Update to 2023mj-xmr13-13/+13
Co-authored-by: plowsof <plowsof@protonmail.com> extra files
2022-09-26Merge pull request #8329luigi11113-50/+120
4b0785f add an option to force-update multisig key exchange under some circumstances (koe)
2022-09-21add an option to force-update multisig key exchange under some circumstanceskoe3-50/+120
2022-09-06multisig: fix #8537 seed restore (suggestions by @UkoeHB)j-berman3-2/+18
- spend secret key is no longer the sum of multisig key shares; no need to check that is the case upon restore. - restoring a multisig wallet from multisig info means that the wallet must have already completed all setup rounds. Upon restore, set the number of rounds completed accordingly.
2022-07-13derive multisig tx secret keys from an entropy source plus the tx inputs' ↵koe2-13/+130
key images
2022-06-30multisig: fix critical vulnerabilities in signinganon5-1/+1460
2022-05-10Merge pull request #8302luigi11116-6/+6
41da2fe Update copyright to 2022 for Hardfork files (Akrit)
2022-05-10Merge pull request #8220luigi11113-141/+261
0d6ecb1 multisig: add post-kex verification round to check that all participants have completed the multisig address (koe)
2022-04-29multisig: add post-kex verification round to check that all participants ↵koe3-141/+261
have completed the multisig address
2022-04-29Update copyright to 2022 for Hardfork filesAkrit6-6/+6
Update Makefile and LICENSE
2022-04-06CMake: Add missing headers via monero_find_all_headers macromj-xmr1-4/+1
2022-03-04Copyright: Update to 2022mj-xmr3-3/+3
2022-02-22multisig key exchange update and refactorkoe9-147/+1733
2020-05-06Update copyright year to 2020SomaticFanatic3-3/+3
Update copyright year to 2020
2020-04-15use memwipe on secret k/alpha valuesmoneromooo-monero1-3/+4
Reported by UkoeHB_ and sarang
2020-04-01Hash domain separationSarang Noether1-2/+5
2019-03-05Update 2019 copyrightbinaryFate3-3/+3
2018-10-01Arbitrary M/N multisig schemes:naughtyfox2-2/+66
* support in wallet2 * support in monero-wallet-cli * support in monero-wallet-rpc * support in wallet api * support in monero-gen-trusted-multisig * unit tests for multisig wallets creation
2018-08-16Do memwipe for critical secret keys copied to rct::keystoffu1-1/+4
2018-03-14device: untangle cyclic depenencystoffu1-1/+0
When #3303 was merged, a cyclic dependency chain was generated: libdevice <- libcncrypto <- libringct <- libdevice This was because libdevice needs access to a set of basic crypto operations implemented in libringct such as scalarmultBase(), while libringct also needs access to abstracted crypto operations implemented in libdevice such as ecdhEncode(). To untangle this cyclic dependency chain, this patch splits libringct into libringct_basic and libringct, where the basic crypto ops previously in libringct are moved into libringct_basic. The cyclic dependency is now resolved thanks to this separation: libcncrypto <- libringct_basic <- libdevice <- libcryptonote_basic <- libringct This eliminates the need for crypto_device.cpp and rctOps_device.cpp. Also, many abstracted interfaces of hw::device such as encrypt_payment_id() and get_subaddress_secret_key() were previously implemented in libcryptonote_basic (cryptonote_format_utils.cpp) and were then called from hw::core::device_default, which is odd because libdevice is supposed to be independent of libcryptonote_basic. Therefore, those functions were moved to device_default.cpp.
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm1-1/+2
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.
2018-01-26Readd copyright starting datexmr-eric3-3/+3
2018-01-26Update 2018 copyrightxmr-eric3-3/+3
2017-12-17Match surae's recommendation to derive multisig keysmoneromooo-monero2-13/+21
2017-12-17make multisig work with subaddressesmoneromooo-monero2-27/+7
Thanks to kenshi84 for help getting this work
2017-12-17add multisig core test and factor multisig building blocksmoneromooo-monero3-0/+254