2015-12-31 06:39:56 +00:00
|
|
|
// Copyright (c) 2014-2016, The Monero Project
|
2014-07-23 13:03:52 +00:00
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
2014-03-03 22:07:58 +00:00
|
|
|
|
2014-06-27 21:07:03 +00:00
|
|
|
#pragma once
|
|
|
|
|
2014-05-25 17:06:40 +00:00
|
|
|
#include <vector>
|
|
|
|
|
2014-03-03 22:07:58 +00:00
|
|
|
#include "serialization.h"
|
|
|
|
#include "debug_archive.h"
|
|
|
|
#include "crypto/chacha8.h"
|
|
|
|
#include "crypto/crypto.h"
|
|
|
|
#include "crypto/hash.h"
|
2016-05-27 15:05:24 +00:00
|
|
|
#include "ringct/rctTypes.h"
|
2014-03-03 22:07:58 +00:00
|
|
|
|
|
|
|
// read
|
|
|
|
template <template <bool> class Archive>
|
|
|
|
bool do_serialize(Archive<false> &ar, std::vector<crypto::signature> &v)
|
|
|
|
{
|
|
|
|
size_t cnt = v.size();
|
|
|
|
v.clear();
|
|
|
|
|
|
|
|
// very basic sanity check
|
|
|
|
if (ar.remaining_bytes() < cnt*sizeof(crypto::signature)) {
|
|
|
|
ar.stream().setstate(std::ios::failbit);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
v.reserve(cnt);
|
|
|
|
for (size_t i = 0; i < cnt; i++) {
|
|
|
|
v.resize(i+1);
|
|
|
|
ar.serialize_blob(&(v[i]), sizeof(crypto::signature), "");
|
|
|
|
if (!ar.stream().good())
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// write
|
|
|
|
template <template <bool> class Archive>
|
|
|
|
bool do_serialize(Archive<true> &ar, std::vector<crypto::signature> &v)
|
|
|
|
{
|
|
|
|
if (0 == v.size()) return true;
|
|
|
|
ar.begin_string();
|
|
|
|
size_t cnt = v.size();
|
|
|
|
for (size_t i = 0; i < cnt; i++) {
|
|
|
|
ar.serialize_blob(&(v[i]), sizeof(crypto::signature), "");
|
|
|
|
if (!ar.stream().good())
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
ar.end_string();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
BLOB_SERIALIZER(crypto::chacha8_iv);
|
|
|
|
BLOB_SERIALIZER(crypto::hash);
|
2015-08-09 09:09:39 +00:00
|
|
|
BLOB_SERIALIZER(crypto::hash8);
|
2014-03-03 22:07:58 +00:00
|
|
|
BLOB_SERIALIZER(crypto::public_key);
|
|
|
|
BLOB_SERIALIZER(crypto::secret_key);
|
|
|
|
BLOB_SERIALIZER(crypto::key_derivation);
|
|
|
|
BLOB_SERIALIZER(crypto::key_image);
|
|
|
|
BLOB_SERIALIZER(crypto::signature);
|
|
|
|
VARIANT_TAG(debug_archive, crypto::hash, "hash");
|
2015-08-09 09:09:39 +00:00
|
|
|
VARIANT_TAG(debug_archive, crypto::hash8, "hash8");
|
2014-03-03 22:07:58 +00:00
|
|
|
VARIANT_TAG(debug_archive, crypto::public_key, "public_key");
|
|
|
|
VARIANT_TAG(debug_archive, crypto::secret_key, "secret_key");
|
|
|
|
VARIANT_TAG(debug_archive, crypto::key_derivation, "key_derivation");
|
|
|
|
VARIANT_TAG(debug_archive, crypto::key_image, "key_image");
|
|
|
|
VARIANT_TAG(debug_archive, crypto::signature, "signature");
|
2016-05-27 15:05:24 +00:00
|
|
|
|
|
|
|
BLOB_SERIALIZER(rct::key);
|
|
|
|
BLOB_SERIALIZER(rct::key64);
|
|
|
|
BLOB_SERIALIZER(rct::ctkey);
|
|
|
|
BLOB_SERIALIZER(rct::ecdhTuple);
|
|
|
|
BLOB_SERIALIZER(rct::asnlSig);
|
|
|
|
|
|
|
|
VARIANT_TAG(debug_archive, rct::key, "rct::key");
|
|
|
|
VARIANT_TAG(debug_archive, rct::key64, "rct::key64");
|
|
|
|
VARIANT_TAG(debug_archive, rct::ctkey, "rct::ctkey");
|
|
|
|
VARIANT_TAG(debug_archive, rct::ecdhTuple, "rct::ecdhTuple");
|
|
|
|
VARIANT_TAG(debug_archive, rct::asnlSig, "rct::asnlSig");
|
|
|
|
VARIANT_TAG(debug_archive, rct::rctSig, "rct::rctSig");
|
|
|
|
|
|
|
|
VARIANT_TAG(binary_archive, rct::key, 0x90);
|
|
|
|
VARIANT_TAG(binary_archive, rct::key64, 0x91);
|
|
|
|
VARIANT_TAG(binary_archive, rct::ctkey, 0x92);
|
|
|
|
VARIANT_TAG(binary_archive, rct::ecdhTuple, 0x93);
|
|
|
|
VARIANT_TAG(binary_archive, rct::asnlSig, 0x94);
|
|
|
|
VARIANT_TAG(binary_archive, rct::rctSig, 0x95);
|
|
|
|
|
|
|
|
VARIANT_TAG(json_archive, rct::key, "rct_key");
|
|
|
|
VARIANT_TAG(json_archive, rct::key64, "rct_key64");
|
|
|
|
VARIANT_TAG(json_archive, rct::ctkey, "rct_ctkey");
|
|
|
|
VARIANT_TAG(json_archive, rct::ecdhTuple, "rct_ecdhTuple");
|
|
|
|
VARIANT_TAG(json_archive, rct::asnlSig, "rct_asnlSig");
|
|
|
|
VARIANT_TAG(json_archive, rct::rctSig, "rct_rctSig");
|
|
|
|
|