Merge 15d8500f99012422be495b8e85e4e25e6a4419d8 into 5f4422d68dc3530c353af1f87499de1c864b60ad

This commit is contained in:
David Gumberg 2025-03-17 03:54:09 +01:00 committed by GitHub
commit f79bcbd524
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
8 changed files with 146 additions and 24 deletions

View File

@ -71,6 +71,7 @@ if(ENABLE_WALLET)
wallet_balance.cpp wallet_balance.cpp
wallet_create.cpp wallet_create.cpp
wallet_create_tx.cpp wallet_create_tx.cpp
wallet_encrypt.cpp
wallet_loading.cpp wallet_loading.cpp
wallet_ismine.cpp wallet_ismine.cpp
wallet_migration.cpp wallet_migration.cpp

View File

@ -0,0 +1,104 @@
// Copyright (c) 2025-present The Bitcoin Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or https://www.opensource.org/licenses/mit-license.php.
#include <bench/bench.h>
#include <outputtype.h>
#include <random.h>
#include <support/allocators/secure.h>
#include <test/util/setup_common.h>
#include <wallet/context.h>
#include <wallet/test/util.h>
#include <wallet/wallet.h>
#include <wallet/walletutil.h>
#include <cassert>
namespace wallet {
static void WalletEncrypt(benchmark::Bench& bench, bool legacy_wallet, bool measure_overhead)
{
auto test_setup = MakeNoLogFileContext<TestingSetup>();
FastRandomContext random;
auto password{random.randbytes(20)};
SecureString secure_pass{password.begin(), password.end()};
WalletContext context;
context.args = &test_setup->m_args;
context.chain = test_setup->m_node.chain.get();
uint64_t create_flags{0};
if(!legacy_wallet) {
create_flags = WALLET_FLAG_DESCRIPTORS;
}
auto database{CreateMockableWalletDatabase()};
auto wallet{TestLoadWallet(std::move(database), context, create_flags)};
int key_count{0};
if(!legacy_wallet) {
// Add destinations
for(auto type : OUTPUT_TYPES) {
for(int i = 0; i < 10'000; i++) {
CMutableTransaction mtx;
mtx.vout.emplace_back(COIN, GetScriptForDestination(*Assert(wallet->GetNewDestination(type, ""))));
mtx.vin.emplace_back();
wallet->AddToWallet(MakeTransactionRef(mtx), TxStateInactive{});
key_count++;
}
}
}
else {
LegacyDataSPKM* legacy_spkm = wallet->GetOrCreateLegacyDataSPKM();
/* legacy spkm */
for(size_t i = 0; i < 10'000 * OUTPUT_TYPES.size(); i++) {
CKey key = GenerateRandomKey();
CPubKey pubkey = key.GetPubKey();
// Load key, scripts and create address book record
Assert(legacy_spkm->LoadKey(key, pubkey));
CTxDestination dest{PKHash(pubkey)};
Assert(wallet->SetAddressBook(dest, strprintf("legacy_%d", i), /*purpose=*/std::nullopt));
CMutableTransaction mtx;
mtx.vout.emplace_back(COIN, GetScriptForDestination(dest));
mtx.vin.emplace_back();
wallet->AddToWallet(MakeTransactionRef(mtx), TxStateInactive{});
key_count++;
}
}
database = DuplicateMockDatabase(wallet->GetDatabase());
// reload the wallet for the actual benchmark
TestUnloadWallet(std::move(wallet));
bench.batch(key_count).unit("key").run([&] {
wallet = TestLoadWallet(std::move(database), context, create_flags);
// Save a copy of the db before encrypting
database = DuplicateMockDatabase(wallet->GetDatabase());
// Skip actually encrypting wallet on the overhead measuring run, so we
// can subtract the overhead from the results.
if(!measure_overhead) {
wallet->EncryptWallet(secure_pass, 25000);
}
// cleanup
TestUnloadWallet(std::move(wallet));
});
}
static void WalletEncryptDescriptors(benchmark::Bench& bench) { WalletEncrypt(bench, /*legacy_wallet=*/false, /*measure_overhead=*/false); }
static void WalletEncryptLegacy(benchmark::Bench& bench) { WalletEncrypt(bench, /*legacy_wallet=*/true, /*measure_overhead=*/false); }
BENCHMARK(WalletEncryptDescriptors, benchmark::PriorityLevel::HIGH);
BENCHMARK(WalletEncryptLegacy, benchmark::PriorityLevel::HIGH);
static void WalletEncryptDescriptorsBenchOverhead(benchmark::Bench& bench) { WalletEncrypt(bench, /*legacy_wallet=*/false, /*measure_overhead=*/true); }
static void WalletEncryptLegacyBenchOverhead(benchmark::Bench& bench) { WalletEncrypt(bench, /*legacy_wallet=*/true, /*measure_overhead=*/true); }
BENCHMARK(WalletEncryptDescriptorsBenchOverhead, benchmark::PriorityLevel::LOW);
BENCHMARK(WalletEncryptLegacyBenchOverhead, benchmark::PriorityLevel::LOW);
} // namespace wallet

View File

@ -20,6 +20,7 @@ add_library(bitcoin_crypto STATIC EXCLUDE_FROM_ALL
sha512.cpp sha512.cpp
siphash.cpp siphash.cpp
../support/cleanse.cpp ../support/cleanse.cpp
../support/lockedpool.cpp
) )
target_link_libraries(bitcoin_crypto target_link_libraries(bitcoin_crypto

View File

@ -12,32 +12,34 @@ extern "C" {
AES256Encrypt::AES256Encrypt(const unsigned char key[32]) AES256Encrypt::AES256Encrypt(const unsigned char key[32])
{ {
AES256_init(&ctx, key); ctx = allocator.allocate(1);
AES256_init(ctx, key);
} }
AES256Encrypt::~AES256Encrypt() AES256Encrypt::~AES256Encrypt()
{ {
memset(&ctx, 0, sizeof(ctx)); allocator.deallocate(ctx, 1);
} }
void AES256Encrypt::Encrypt(unsigned char ciphertext[16], const unsigned char plaintext[16]) const void AES256Encrypt::Encrypt(unsigned char ciphertext[16], const unsigned char plaintext[16]) const
{ {
AES256_encrypt(&ctx, 1, ciphertext, plaintext); AES256_encrypt(ctx, 1, ciphertext, plaintext);
} }
AES256Decrypt::AES256Decrypt(const unsigned char key[32]) AES256Decrypt::AES256Decrypt(const unsigned char key[32])
{ {
AES256_init(&ctx, key); ctx = allocator.allocate(1);
AES256_init(ctx, key);
} }
AES256Decrypt::~AES256Decrypt() AES256Decrypt::~AES256Decrypt()
{ {
memset(&ctx, 0, sizeof(ctx)); allocator.deallocate(ctx, 1);
} }
void AES256Decrypt::Decrypt(unsigned char plaintext[16], const unsigned char ciphertext[16]) const void AES256Decrypt::Decrypt(unsigned char plaintext[16], const unsigned char ciphertext[16]) const
{ {
AES256_decrypt(&ctx, 1, plaintext, ciphertext); AES256_decrypt(ctx, 1, plaintext, ciphertext);
} }
@ -121,6 +123,7 @@ static int CBCDecrypt(const T& dec, const unsigned char iv[AES_BLOCKSIZE], const
AES256CBCEncrypt::AES256CBCEncrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn) AES256CBCEncrypt::AES256CBCEncrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn)
: enc(key), pad(padIn) : enc(key), pad(padIn)
{ {
iv = allocator.allocate(AES_BLOCKSIZE);
memcpy(iv, ivIn, AES_BLOCKSIZE); memcpy(iv, ivIn, AES_BLOCKSIZE);
} }
@ -131,12 +134,13 @@ int AES256CBCEncrypt::Encrypt(const unsigned char* data, int size, unsigned char
AES256CBCEncrypt::~AES256CBCEncrypt() AES256CBCEncrypt::~AES256CBCEncrypt()
{ {
memset(iv, 0, sizeof(iv)); allocator.deallocate(iv, AES_BLOCKSIZE);
} }
AES256CBCDecrypt::AES256CBCDecrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn) AES256CBCDecrypt::AES256CBCDecrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn)
: dec(key), pad(padIn) : dec(key), pad(padIn)
{ {
iv = allocator.allocate(AES_BLOCKSIZE);
memcpy(iv, ivIn, AES_BLOCKSIZE); memcpy(iv, ivIn, AES_BLOCKSIZE);
} }
@ -148,5 +152,5 @@ int AES256CBCDecrypt::Decrypt(const unsigned char* data, int size, unsigned char
AES256CBCDecrypt::~AES256CBCDecrypt() AES256CBCDecrypt::~AES256CBCDecrypt()
{ {
memset(iv, 0, sizeof(iv)); allocator.deallocate(iv, AES_BLOCKSIZE);
} }

View File

@ -7,6 +7,7 @@
#ifndef BITCOIN_CRYPTO_AES_H #ifndef BITCOIN_CRYPTO_AES_H
#define BITCOIN_CRYPTO_AES_H #define BITCOIN_CRYPTO_AES_H
#include <support/allocators/secure.h>
extern "C" { extern "C" {
#include <crypto/ctaes/ctaes.h> #include <crypto/ctaes/ctaes.h>
} }
@ -18,7 +19,8 @@ static const int AES256_KEYSIZE = 32;
class AES256Encrypt class AES256Encrypt
{ {
private: private:
AES256_ctx ctx; secure_allocator<AES256_ctx> allocator;
AES256_ctx *ctx;
public: public:
explicit AES256Encrypt(const unsigned char key[32]); explicit AES256Encrypt(const unsigned char key[32]);
@ -30,7 +32,8 @@ public:
class AES256Decrypt class AES256Decrypt
{ {
private: private:
AES256_ctx ctx; secure_allocator<AES256_ctx> allocator;
AES256_ctx *ctx;
public: public:
explicit AES256Decrypt(const unsigned char key[32]); explicit AES256Decrypt(const unsigned char key[32]);
@ -46,9 +49,10 @@ public:
int Encrypt(const unsigned char* data, int size, unsigned char* out) const; int Encrypt(const unsigned char* data, int size, unsigned char* out) const;
private: private:
secure_allocator<unsigned char> allocator;
const AES256Encrypt enc; const AES256Encrypt enc;
const bool pad; const bool pad;
unsigned char iv[AES_BLOCKSIZE]; unsigned char *iv;
}; };
class AES256CBCDecrypt class AES256CBCDecrypt
@ -59,9 +63,10 @@ public:
int Decrypt(const unsigned char* data, int size, unsigned char* out) const; int Decrypt(const unsigned char* data, int size, unsigned char* out) const;
private: private:
secure_allocator<unsigned char> allocator;
const AES256Decrypt dec; const AES256Decrypt dec;
const bool pad; const bool pad;
unsigned char iv[AES_BLOCKSIZE]; unsigned char *iv;
}; };
#endif // BITCOIN_CRYPTO_AES_H #endif // BITCOIN_CRYPTO_AES_H

View File

@ -32,7 +32,6 @@ add_library(bitcoin_util STATIC EXCLUDE_FROM_ALL
../random.cpp ../random.cpp
../randomenv.cpp ../randomenv.cpp
../streams.cpp ../streams.cpp
../support/lockedpool.cpp
../sync.cpp ../sync.cpp
) )

View File

@ -807,7 +807,7 @@ void CWallet::AddToSpends(const CWalletTx& wtx, WalletBatch* batch)
AddToSpends(txin.prevout, wtx.GetHash(), batch); AddToSpends(txin.prevout, wtx.GetHash(), batch);
} }
bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase) bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase, std::optional<unsigned int> forceIterations)
{ {
if (IsCrypted()) if (IsCrypted())
return false; return false;
@ -823,17 +823,25 @@ bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
GetStrongRandBytes(kMasterKey.vchSalt); GetStrongRandBytes(kMasterKey.vchSalt);
CCrypter crypter; CCrypter crypter;
constexpr MillisecondsDouble target{100};
auto start{SteadyClock::now()};
crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, 25000, kMasterKey.nDerivationMethod);
kMasterKey.nDeriveIterations = static_cast<unsigned int>(25000 * target / (SteadyClock::now() - start));
start = SteadyClock::now(); // False by default, used by test or benchmarking code
crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod); if(forceIterations.has_value()) {
kMasterKey.nDeriveIterations = (kMasterKey.nDeriveIterations + static_cast<unsigned int>(kMasterKey.nDeriveIterations * target / (SteadyClock::now() - start))) / 2; kMasterKey.nDeriveIterations = forceIterations.value();
}
// Try to find an nDeriveIterations that takes about 100ms
else {
constexpr MillisecondsDouble target{100};
auto start{SteadyClock::now()};
crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, 25000, kMasterKey.nDerivationMethod);
kMasterKey.nDeriveIterations = static_cast<unsigned int>(25000 * target / (SteadyClock::now() - start));
if (kMasterKey.nDeriveIterations < 25000) start = SteadyClock::now();
kMasterKey.nDeriveIterations = 25000; crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod);
kMasterKey.nDeriveIterations = (kMasterKey.nDeriveIterations + static_cast<unsigned int>(kMasterKey.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
if (kMasterKey.nDeriveIterations < 25000)
kMasterKey.nDeriveIterations = 25000;
}
WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", kMasterKey.nDeriveIterations); WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", kMasterKey.nDeriveIterations);

View File

@ -581,7 +581,7 @@ public:
bool Unlock(const SecureString& strWalletPassphrase); bool Unlock(const SecureString& strWalletPassphrase);
bool ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase); bool ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase);
bool EncryptWallet(const SecureString& strWalletPassphrase); bool EncryptWallet(const SecureString& strWalletPassphrase, std::optional<unsigned int> forceIterations = std::nullopt);
void GetKeyBirthTimes(std::map<CKeyID, int64_t> &mapKeyBirth) const EXCLUSIVE_LOCKS_REQUIRED(cs_wallet); void GetKeyBirthTimes(std::map<CKeyID, int64_t> &mapKeyBirth) const EXCLUSIVE_LOCKS_REQUIRED(cs_wallet);
unsigned int ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const; unsigned int ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const;