exchange/src/include/taler_mintdb_lib.h

292 lines
9.1 KiB
C
Raw Normal View History

/*
This file is part of TALER
2015-03-15 17:21:18 +01:00
Copyright (C) 2014, 2015 Christian Grothoff (and other contributing authors)
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
2015-03-28 11:06:00 +01:00
* @file include/taler_mintdb_lib.h
* @brief IO operations for the mint's private keys
* @author Florian Dold
* @author Benedikt Mueller
* @author Christian Grothoff
*/
2015-03-28 11:06:00 +01:00
#ifndef TALER_MINTDB_LIB_H
#define TALER_MINTDB_LIB_H
#include "taler_signatures.h"
2015-03-15 17:39:44 +01:00
/**
* Subdirectroy under the mint's base directory which contains
* the mint's signing keys.
2015-03-15 17:39:44 +01:00
*/
2015-03-28 12:29:35 +01:00
#define TALER_MINTDB_DIR_SIGNING_KEYS "signkeys"
2015-03-15 17:39:44 +01:00
/**
* Subdirectory under the mint's base directory which contains
* the mint's denomination keys.
2015-03-15 17:39:44 +01:00
*/
2015-03-28 12:29:35 +01:00
#define TALER_MINTDB_DIR_DENOMINATION_KEYS "denomkeys"
/**
* Subdirectory under the mint's base directory which contains
* the mint's auditing information.
*/
#define TALER_MINTDB_DIR_AUDITORS "auditors"
2015-03-15 17:39:44 +01:00
GNUNET_NETWORK_STRUCT_BEGIN
/**
2015-03-28 15:53:53 +01:00
* @brief On disk format used for a mint signing key. Signing keys are used
* by the mint to affirm its messages, but not to create coins.
* Includes the private key followed by the public information about
* the signing key.
*/
2015-03-28 12:29:35 +01:00
struct TALER_MINTDB_PrivateSigningKeyInformationP
{
/**
* Private key part of the mint's signing key.
*/
struct TALER_MintPrivateKeyP signkey_priv;
/**
* Public information about a mint signing key.
*/
struct TALER_MintSigningKeyValidityPS issue;
};
/**
* Information about a denomination key.
*/
struct TALER_MINTDB_DenominationKeyInformationP
{
/**
* Signature over this struct to affirm the validity of the key.
*/
struct TALER_MasterSignatureP signature;
/**
* Signed properties of the denomination key.
*/
struct TALER_DenominationKeyValidityPS properties;
};
GNUNET_NETWORK_STRUCT_END
/**
2015-03-28 15:53:53 +01:00
* @brief All information about a denomination key (which is used to
* sign coins into existence).
*/
2015-03-28 12:29:35 +01:00
struct TALER_MINTDB_DenominationKeyIssueInformation
{
/**
* The private key of the denomination. Will be NULL if the private
* key is not available (this is the case after the key has expired
* for signing coins, but is still valid for depositing coins).
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPrivateKey denom_priv;
/**
* Decoded denomination public key (the hash of it is in
* @e issue, but we sometimes need the full public key as well).
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPublicKey denom_pub;
/**
* Signed public information about a denomination key.
*/
struct TALER_MINTDB_DenominationKeyInformationP issue;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Iterator over signing keys.
*
* @param cls closure
* @param filename name of the file the key came from
* @param ski the sign key
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
2015-03-28 12:29:35 +01:00
(*TALER_MINTDB_SigningKeyIterator)(void *cls,
const char *filename,
const struct TALER_MINTDB_PrivateSigningKeyInformationP *ski);
/**
* Call @a it for each signing key found in the @a mint_base_dir.
2015-03-15 17:39:44 +01:00
*
* @param mint_base_dir base directory for the mint,
2015-03-28 12:29:35 +01:00
* the signing keys must be in the #TALER_MINTDB_DIR_SIGNING_KEYS
* subdirectory
* @param it function to call on each signing key
2015-03-15 17:39:44 +01:00
* @param it_cls closure for @a it
* @return number of files found (may not match
* number of keys given to @a it as malformed
* files are simply skipped), -1 on error
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_signing_keys_iterate (const char *mint_base_dir,
2015-03-28 15:42:07 +01:00
TALER_MINTDB_SigningKeyIterator it,
void *it_cls);
/**
* @brief Iterator over denomination keys.
*
* @param cls closure
* @param dki the denomination key
* @param alias coin alias
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
(*TALER_MINTDB_DenominationKeyIterator)(void *cls,
const char *alias,
const struct TALER_MINTDB_DenominationKeyIssueInformation *dki);
/**
* Call @a it for each denomination key found in the @a mint_base_dir.
2015-03-15 17:39:44 +01:00
*
* @param mint_base_dir base directory for the mint,
2015-03-28 12:29:35 +01:00
* the signing keys must be in the #TALER_MINTDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param it function to call on each denomination key found
2015-03-15 17:39:44 +01:00
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_keys_iterate (const char *mint_base_dir,
2015-03-28 15:42:07 +01:00
TALER_MINTDB_DenominationKeyIterator it,
void *it_cls);
/**
* Exports a denomination key to the given file.
*
* @param filename the file where to write the denomination key
* @param dki the denomination key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_key_write (const char *filename,
2015-03-28 15:42:07 +01:00
const struct TALER_MINTDB_DenominationKeyIssueInformation *dki);
/**
* Import a denomination key from the given file.
*
* @param filename the file to import the key from
2015-03-28 15:42:07 +01:00
* @param[out] dki set to the imported denomination key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_key_read (const char *filename,
2015-03-28 15:42:07 +01:00
struct TALER_MINTDB_DenominationKeyIssueInformation *dki);
/**
* @brief Iterator over auditor information.
*
* @param cls closure
* @param apub the auditor's public key
* @param asig the auditor's signature
* @param mpub the mint's public key (as expected by the auditor)
* @param dki_len length of @a dki
* @param dki array of denomination coin data signed by the auditor
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
(*TALER_MINTDB_AuditorIterator)(void *cls,
const struct TALER_AuditorPublicKeyP *apub,
const struct TALER_AuditorSignatureP *asig,
const struct TALER_MasterPublicKeyP *mpub,
unsigned int dki_len,
const struct TALER_DenominationKeyValidityPS *dki);
/**
* Call @a it with information for each auditor found in the @a mint_base_dir.
*
* @param mint_base_dir base directory for the mint,
* the signing keys must be in the #TALER_MINTDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param it function to call with auditor information
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
int
TALER_MINTDB_auditor_iterate (const char *mint_base_dir,
TALER_MINTDB_AuditorIterator it,
void *it_cls);
/**
* Write auditor information to the given file.
*
* @param filename the file where to write the auditor information to
* @param apub the auditor's public key
* @param asig the auditor's signature
* @param mpub the mint's public key (as expected by the auditor)
* @param dki_len length of @a dki
* @param dki array of denomination coin data signed by the auditor
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
TALER_MINTDB_auditor_write (const char *filename,
const struct TALER_AuditorPublicKeyP *apub,
const struct TALER_AuditorSignatureP *asig,
const struct TALER_MasterPublicKeyP *mpub,
unsigned int dki_len,
const struct TALER_DenominationKeyValidityPS *dki);
2015-03-28 11:06:00 +01:00
/**
* Initialize the plugin.
*
* @param cfg configuration to use
* @return NULL on failure
*/
struct TALER_MINTDB_Plugin *
2015-03-28 12:29:35 +01:00
TALER_MINTDB_plugin_load (const struct GNUNET_CONFIGURATION_Handle *cfg);
2015-03-28 11:06:00 +01:00
/**
* Shutdown the plugin.
*
* @param plugin plugin to unload
*/
void
2015-03-28 12:29:35 +01:00
TALER_MINTDB_plugin_unload (struct TALER_MINTDB_Plugin *plugin);
2015-03-28 11:06:00 +01:00
#endif