diff options
| author | Pieter Wuille <[email protected]> | 2012-08-24 04:38:57 -0700 |
|---|---|---|
| committer | Pieter Wuille <[email protected]> | 2012-08-24 04:38:57 -0700 |
| commit | af1c6b93b70d2e404c5fc7ed4e1af084a0231eb9 (patch) | |
| tree | c60b532da0f15f8e9cb6d46fe21f6c1f5f9f9064 /src/crypter.cpp | |
| parent | Merge pull request #1672 from gmaxwell/filter_listunspent (diff) | |
| parent | Make CCrypter use LockedPageManager to manage locked pages (diff) | |
| download | discoin-af1c6b93b70d2e404c5fc7ed4e1af084a0231eb9.tar.xz discoin-af1c6b93b70d2e404c5fc7ed4e1af084a0231eb9.zip | |
Merge pull request #1699 from laanwj/2012_08_securealloc
Handle locked pages more robustly (Fixes issue #1462)
Diffstat (limited to 'src/crypter.cpp')
| -rw-r--r-- | src/crypter.cpp | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/src/crypter.cpp b/src/crypter.cpp index 411a1ee4c..181b8fa00 100644 --- a/src/crypter.cpp +++ b/src/crypter.cpp @@ -17,12 +17,6 @@ bool CCrypter::SetKeyFromPassphrase(const SecureString& strKeyData, const std::v if (nRounds < 1 || chSalt.size() != WALLET_CRYPTO_SALT_SIZE) return false; - // Try to keep the key data out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap) - // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) - // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. - mlock(&chKey[0], sizeof chKey); - mlock(&chIV[0], sizeof chIV); - int i = 0; if (nDerivationMethod == 0) i = EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha512(), &chSalt[0], @@ -44,12 +38,6 @@ bool CCrypter::SetKey(const CKeyingMaterial& chNewKey, const std::vector<unsigne if (chNewKey.size() != WALLET_CRYPTO_KEY_SIZE || chNewIV.size() != WALLET_CRYPTO_KEY_SIZE) return false; - // Try to keep the key data out of swap - // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) - // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. - mlock(&chKey[0], sizeof chKey); - mlock(&chIV[0], sizeof chIV); - memcpy(&chKey[0], &chNewKey[0], sizeof chKey); memcpy(&chIV[0], &chNewIV[0], sizeof chIV); |