diff options
| author | Christian Grothoff <christian@grothoff.org> | 2015-01-08 18:37:20 +0100 | 
|---|---|---|
| committer | Christian Grothoff <christian@grothoff.org> | 2015-01-08 18:37:20 +0100 | 
| commit | 57d1f08dbca256f5fe16d57b29bfa523dec8f6c4 (patch) | |
| tree | 3b3ee5f3b8c174887217e5c465048dea4e79bae2 /src/mint/taler-mint-httpd_keys.h | |
-initial import for mint
Diffstat (limited to 'src/mint/taler-mint-httpd_keys.h')
| -rw-r--r-- | src/mint/taler-mint-httpd_keys.h | 155 | 
1 files changed, 155 insertions, 0 deletions
diff --git a/src/mint/taler-mint-httpd_keys.h b/src/mint/taler-mint-httpd_keys.h new file mode 100644 index 00000000..640a9c91 --- /dev/null +++ b/src/mint/taler-mint-httpd_keys.h @@ -0,0 +1,155 @@ +/* +  This file is part of TALER +  (C) 2014 GNUnet e.V. + +  TALER is free software; you can redistribute it and/or modify it under the +  terms of the GNU Affero General Public License as published by the Free Software +  Foundation; either version 3, or (at your option) any later version. + +  TALER is distributed in the hope that it will be useful, but WITHOUT ANY +  WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR +  A PARTICULAR PURPOSE.  See the GNU Affero General Public License for more details. + +  You should have received a copy of the GNU Affero General Public License along with +  TALER; see the file COPYING.  If not, If not, see <http://www.gnu.org/licenses/> +*/ +/** + * @file taler-mint-httpd_keys.h + * @brief Handle /keys requests and manage key state + * @author Florian Dold + * @author Benedikt Mueller + * @author Christian Grothoff + */ +#ifndef TALER_MINT_HTTPD_KEYS_H +#define TALER_MINT_HTTPD_KEYS_H + +#include <gnunet/gnunet_util_lib.h> +#include <microhttpd.h> +#include "taler-mint-httpd.h" + + +/** + * Snapshot of the (coin and signing) + * keys (including private keys) of the mint. + */ +struct MintKeyState +{ +  /** +   * When did we initiate the key reloading? +   */ +  struct GNUNET_TIME_Absolute reload_time; + +  /** +   * JSON array with denomination keys. +   */ +  json_t *denom_keys_array; + +  /** +   * JSON array with signing keys. +   */ +  json_t *sign_keys_array; + +  /** +   * Mapping from denomination keys to denomination key issue struct. +   */ +  struct GNUNET_CONTAINER_MultiHashMap *denomkey_map; + +  /** +   * When is the next key invalid and we have to reload? +   */ +  struct GNUNET_TIME_Absolute next_reload; + +  /** +   * Mint signing key that should be used currently. +   */ +  struct TALER_MINT_SignKeyIssue current_sign_key_issue; + +  /** +   * Cached JSON text that the mint will send for +   * a /keys request. +   */ +  char *keys_json; + +  /** +   * Reference count. +   */ +  unsigned int refcnt; +}; + + +/** + * Release key state, free if necessary (if reference count gets to zero). + * + * @param key_state the key state to release + */ +void +TALER_MINT_key_state_release (struct MintKeyState *key_state); + + +/** + * Acquire the key state of the mint.  Updates keys if necessary. + * For every call to #TALER_MINT_key_state_acquire, a matching call + * to #TALER_MINT_key_state_release must be made. + * + * @return the key state + */ +struct MintKeyState * +TALER_MINT_key_state_acquire (void); + + +/** + * Look up the issue for a denom public key. + * + * @param key state to look in + * @param denom_pub denomination public key + * @return the denomination key issue, + *         or NULL if denom_pub could not be found + */ +struct TALER_MINT_DenomKeyIssue * +TALER_MINT_get_denom_key (const struct MintKeyState *key_state, +                          const struct TALER_RSA_PublicKeyBinaryEncoded *denom_pub); + + +/** + * Check if a coin is valid; that is, whether the denomination key exists, + * is not expired, and the signature is correct. + * + * @param key_state the key state to use for checking the coin's validity + * @param coin_public_info the coin public info to check for validity + * @return GNUNET_YES if the coin is valid, + *         GNUNET_NO if it is invalid + *         GNUNET_SYSERROR if an internal error occured + */ +int +TALER_MINT_test_coin_valid (const struct MintKeyState *key_state, +                            struct TALER_CoinPublicInfo *coin_public_info); + + +/** + * Read signals from a pipe in a loop, and reload keys from disk if + * SIGUSR1 is read from the pipe. + * + * @return GNUNET_OK if we terminated normally, GNUNET_SYSERR on error + */ +int +TALER_MINT_key_reload_loop (void); + + +/** + * Handle a "/keys" request + * + * @param rh context of the handler + * @param connection the MHD connection to handle + * @param[IN|OUT] connection_cls the connection's closure (can be updated) + * @param upload_data upload data + * @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data + * @return MHD result code +  */ +int +TALER_MINT_handler_keys (struct RequestHandler *rh, +                         struct MHD_Connection *connection, +                         void **connection_cls, +                         const char *upload_data, +                         size_t *upload_data_size); + +#endif  | 
