mirror of
https://github.com/monero-project/monero.git
synced 2026-01-17 15:22:48 -08:00
use memwipe on secret k/alpha values
Reported by UkoeHB_ and sarang
This commit is contained in:
@@ -82,6 +82,7 @@ namespace cryptonote
|
||||
{
|
||||
rct::key sk = rct::scalarmultKey(rct::pk2rct(k), rct::sk2rct(blinded_skey));
|
||||
crypto::secret_key msk = get_multisig_blinded_secret_key(rct::rct2sk(sk));
|
||||
memwipe(&sk, sizeof(sk));
|
||||
multisig_keys.push_back(msk);
|
||||
sc_add(spend_skey.bytes, spend_skey.bytes, (const unsigned char*)msk.data);
|
||||
}
|
||||
@@ -126,10 +127,10 @@ namespace cryptonote
|
||||
//-----------------------------------------------------------------
|
||||
crypto::secret_key generate_multisig_view_secret_key(const crypto::secret_key &skey, const std::vector<crypto::secret_key> &skeys)
|
||||
{
|
||||
rct::key view_skey = rct::sk2rct(get_multisig_blinded_secret_key(skey));
|
||||
crypto::secret_key view_skey = get_multisig_blinded_secret_key(skey);
|
||||
for (const auto &k: skeys)
|
||||
sc_add(view_skey.bytes, view_skey.bytes, rct::sk2rct(k).bytes);
|
||||
return rct::rct2sk(view_skey);
|
||||
sc_add((unsigned char*)&view_skey, rct::sk2rct(view_skey).bytes, rct::sk2rct(k).bytes);
|
||||
return view_skey;
|
||||
}
|
||||
//-----------------------------------------------------------------
|
||||
crypto::public_key generate_multisig_M_N_spend_public_key(const std::vector<crypto::public_key> &pkeys)
|
||||
|
||||
Reference in New Issue
Block a user