exchange/src/mintdb/mintdb_keyio.c

556 lines
16 KiB
C
Raw Normal View History

2015-01-08 18:37:20 +01:00
/*
This file is part of TALER
2015-03-15 17:21:18 +01:00
Copyright (C) 2014, 2015 Christian Grothoff (and other contributing authors)
2015-01-08 18:37:20 +01:00
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
2015-03-28 11:06:00 +01:00
* @file mintdb/mintdb_keyio.c
* @brief I/O operations for the Mint's private keys
2015-01-08 18:37:20 +01:00
* @author Florian Dold
* @author Benedikt Mueller
* @author Sree Harsha Totakura
* @author Christian Grothoff
2015-01-08 18:37:20 +01:00
*/
#include "platform.h"
2015-03-28 11:06:00 +01:00
#include "taler_mintdb_lib.h"
2015-03-15 17:39:44 +01:00
/**
* Closure for the #signkeys_iterate_dir_iter().
2015-03-15 17:39:44 +01:00
*/
2015-01-08 18:37:20 +01:00
struct SignkeysIterateContext
{
2015-03-15 17:39:44 +01:00
/**
* Function to call on each signing key.
2015-03-15 17:39:44 +01:00
*/
2015-03-28 12:29:35 +01:00
TALER_MINTDB_SigningKeyIterator it;
2015-03-15 17:39:44 +01:00
/**
* Closure for @e it.
2015-03-15 17:39:44 +01:00
*/
2015-01-08 18:37:20 +01:00
void *it_cls;
};
2015-03-15 17:39:44 +01:00
/**
* Function called on each file in the directory with our signing
* keys. Parses the file and calls the iterator from @a cls.
2015-03-15 17:39:44 +01:00
*
* @param cls the `struct SignkeysIterateContext *`
* @param filename name of the file to parse
* @return #GNUNET_OK to continue,
* #GNUNET_NO to stop iteration without error,
* #GNUNET_SYSERR to stop iteration with error
2015-03-15 17:39:44 +01:00
*/
2015-01-08 18:37:20 +01:00
static int
signkeys_iterate_dir_iter (void *cls,
const char *filename)
{
struct SignkeysIterateContext *skc = cls;
ssize_t nread;
2015-03-28 12:29:35 +01:00
struct TALER_MINTDB_PrivateSigningKeyInformationP issue;
2015-01-08 18:37:20 +01:00
nread = GNUNET_DISK_fn_read (filename,
&issue,
2015-03-28 12:29:35 +01:00
sizeof (struct TALER_MINTDB_PrivateSigningKeyInformationP));
if (nread != sizeof (struct TALER_MINTDB_PrivateSigningKeyInformationP))
2015-01-08 18:37:20 +01:00
{
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
"Invalid signkey file `%s': wrong size (%d, expected %u)\n",
filename,
(int) nread,
sizeof (struct TALER_MINTDB_PrivateSigningKeyInformationP));
2015-01-08 18:37:20 +01:00
return GNUNET_OK;
}
return skc->it (skc->it_cls,
filename,
&issue);
2015-01-08 18:37:20 +01:00
}
/**
* Call @a it for each signing key found in the @a mint_base_dir.
*
* @param mint_base_dir base directory for the mint,
2015-03-28 12:29:35 +01:00
* the signing keys must be in the #TALER_MINTDB_DIR_SIGNING_KEYS
* subdirectory
* @param it function to call on each signing key
* @param it_cls closure for @a it
* @return number of files found (may not match
* number of keys given to @a it as malformed
* files are simply skipped), -1 on error
*/
2015-01-08 18:37:20 +01:00
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_signing_keys_iterate (const char *mint_base_dir,
TALER_MINTDB_SigningKeyIterator it,
void *it_cls)
2015-01-08 18:37:20 +01:00
{
char *signkey_dir;
struct SignkeysIterateContext skc;
2015-03-15 17:21:18 +01:00
int ret;
2015-01-08 18:37:20 +01:00
2015-03-15 17:21:18 +01:00
GNUNET_asprintf (&signkey_dir,
2015-03-28 12:29:35 +01:00
"%s" DIR_SEPARATOR_STR TALER_MINTDB_DIR_SIGNING_KEYS,
2015-03-15 17:21:18 +01:00
mint_base_dir);
2015-01-08 18:37:20 +01:00
skc.it = it;
2015-03-15 17:21:18 +01:00
skc.it_cls = it_cls;
ret = GNUNET_DISK_directory_scan (signkey_dir,
&signkeys_iterate_dir_iter,
&skc);
GNUNET_free (signkey_dir);
return ret;
2015-01-08 18:37:20 +01:00
}
/**
* Import a denomination key from the given file.
2015-01-08 18:37:20 +01:00
*
* @param filename the file to import the key from
2015-03-28 15:42:07 +01:00
* @param[out] dki set to the imported denomination key
* @return #GNUNET_OK upon success;
* #GNUNET_SYSERR upon failure
2015-01-08 18:37:20 +01:00
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_key_read (const char *filename,
struct TALER_MINTDB_DenominationKeyIssueInformation *dki)
2015-01-08 18:37:20 +01:00
{
uint64_t size;
size_t offset;
void *data;
struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != GNUNET_DISK_file_size (filename,
&size,
GNUNET_YES,
GNUNET_YES))
{
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Skipping inaccessable denomination key file `%s'\n",
filename);
return GNUNET_SYSERR;
}
2015-07-06 14:04:11 +02:00
offset = sizeof (struct TALER_MINTDB_DenominationKeyInformationP);
2015-01-08 18:37:20 +01:00
if (size <= offset)
{
GNUNET_break (0);
return GNUNET_SYSERR;
2015-01-08 18:37:20 +01:00
}
data = GNUNET_malloc (size);
if (size !=
GNUNET_DISK_fn_read (filename,
data,
size))
{
GNUNET_log_strerror_file (GNUNET_ERROR_TYPE_WARNING,
"read",
filename);
GNUNET_free (data);
return GNUNET_SYSERR;
}
if (NULL ==
(priv = GNUNET_CRYPTO_rsa_private_key_decode (data + offset,
size - offset)))
{
GNUNET_free (data);
return GNUNET_SYSERR;
}
GNUNET_assert (NULL == dki->denom_priv.rsa_private_key);
2015-03-22 22:14:30 +01:00
dki->denom_priv.rsa_private_key = priv;
dki->denom_pub.rsa_public_key
= GNUNET_CRYPTO_rsa_private_key_get_public (priv);
memcpy (&dki->issue,
data,
offset);
GNUNET_free (data);
return GNUNET_OK;
2015-01-08 18:37:20 +01:00
}
/**
* Exports a denomination key to the given file.
2015-01-08 18:37:20 +01:00
*
* @param filename the file where to write the denomination key
* @param dki the denomination key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_key_write (const char *filename,
const struct TALER_MINTDB_DenominationKeyIssueInformation *dki)
2015-01-08 18:37:20 +01:00
{
char *priv_enc;
size_t priv_enc_size;
2015-01-08 18:37:20 +01:00
struct GNUNET_DISK_FileHandle *fh;
ssize_t wrote;
size_t wsize;
int ret;
fh = NULL;
2015-03-22 22:14:30 +01:00
priv_enc_size
= GNUNET_CRYPTO_rsa_private_key_encode (dki->denom_priv.rsa_private_key,
&priv_enc);
2015-01-08 18:37:20 +01:00
ret = GNUNET_SYSERR;
if (NULL == (fh = GNUNET_DISK_file_open
(filename,
GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE | GNUNET_DISK_OPEN_TRUNCATE,
GNUNET_DISK_PERM_USER_READ | GNUNET_DISK_PERM_USER_WRITE)))
goto cleanup;
2015-07-06 14:04:11 +02:00
wsize = sizeof (struct TALER_MINTDB_DenominationKeyInformationP);
2015-01-08 18:37:20 +01:00
if (GNUNET_SYSERR == (wrote = GNUNET_DISK_file_write (fh,
2015-06-19 11:16:55 +02:00
&dki->issue,
2015-01-08 18:37:20 +01:00
wsize)))
goto cleanup;
if (wrote != wsize)
goto cleanup;
2015-03-15 17:21:18 +01:00
if (GNUNET_SYSERR ==
(wrote = GNUNET_DISK_file_write (fh,
priv_enc,
priv_enc_size)))
2015-01-08 18:37:20 +01:00
goto cleanup;
if (wrote != priv_enc_size)
2015-01-08 18:37:20 +01:00
goto cleanup;
ret = GNUNET_OK;
cleanup:
GNUNET_free_non_null (priv_enc);
if (NULL != fh)
(void) GNUNET_DISK_file_close (fh);
return ret;
}
2015-03-15 17:39:44 +01:00
/**
* Closure for #denomkeys_iterate_keydir_iter() and
* #denomkeys_iterate_topdir_iter().
2015-03-15 17:39:44 +01:00
*/
2015-03-15 17:21:18 +01:00
struct DenomkeysIterateContext
{
2015-03-15 17:39:44 +01:00
/**
* Set to the name of the directory below the top-level directory
* during the call to #denomkeys_iterate_keydir_iter().
2015-03-15 17:39:44 +01:00
*/
2015-03-15 17:21:18 +01:00
const char *alias;
2015-03-15 17:39:44 +01:00
/**
* Function to call on each denomination key.
2015-03-15 17:39:44 +01:00
*/
2015-03-28 12:29:35 +01:00
TALER_MINTDB_DenominationKeyIterator it;
2015-03-15 17:39:44 +01:00
/**
* Closure for @e it.
2015-03-15 17:39:44 +01:00
*/
2015-03-15 17:21:18 +01:00
void *it_cls;
};
2015-03-15 17:39:44 +01:00
/**
* Decode the denomination key in the given file @a filename and call
* the callback in @a cls with the information.
2015-03-15 17:39:44 +01:00
*
* @param cls the `struct DenomkeysIterateContext *`
* @param filename name of a file that should contain
* a denomination key
* @return #GNUNET_OK to continue to iterate
* #GNUNET_NO to abort iteration with success
* #GNUNET_SYSERR to abort iteration with failure
2015-03-15 17:39:44 +01:00
*/
2015-01-08 18:37:20 +01:00
static int
denomkeys_iterate_keydir_iter (void *cls,
const char *filename)
{
struct DenomkeysIterateContext *dic = cls;
2015-03-28 12:29:35 +01:00
struct TALER_MINTDB_DenominationKeyIssueInformation issue;
2015-07-11 18:25:30 +02:00
int ret;
2015-01-08 18:37:20 +01:00
memset (&issue, 0, sizeof (issue));
2015-03-15 17:21:18 +01:00
if (GNUNET_OK !=
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_key_read (filename,
&issue))
2015-01-08 18:37:20 +01:00
{
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
"Invalid denomkey file: '%s'\n",
filename);
2015-01-08 18:37:20 +01:00
return GNUNET_OK;
}
2015-07-11 18:25:30 +02:00
ret = dic->it (dic->it_cls,
dic->alias,
&issue);
GNUNET_CRYPTO_rsa_private_key_free (issue.denom_priv.rsa_private_key);
GNUNET_CRYPTO_rsa_public_key_free (issue.denom_pub.rsa_public_key);
return ret;
2015-01-08 18:37:20 +01:00
}
2015-03-15 17:39:44 +01:00
/**
2015-03-28 12:29:35 +01:00
* Function called on each subdirectory in the #TALER_MINTDB_DIR_DENOMINATION_KEYS. Will
* call the #denomkeys_iterate_keydir_iter() on each file in the
* subdirectory.
2015-03-15 17:39:44 +01:00
*
* @param cls the `struct DenomkeysIterateContext *`
* @param filename name of the subdirectory to scan
* @return #GNUNET_OK on success,
* #GNUNET_SYSERR if we need to abort
2015-03-15 17:39:44 +01:00
*/
2015-01-08 18:37:20 +01:00
static int
denomkeys_iterate_topdir_iter (void *cls,
const char *filename)
{
struct DenomkeysIterateContext *dic = cls;
2015-01-08 18:37:20 +01:00
dic->alias = GNUNET_STRINGS_get_short_name (filename);
2015-03-15 17:21:18 +01:00
if (0 > GNUNET_DISK_directory_scan (filename,
&denomkeys_iterate_keydir_iter,
dic))
2015-01-08 18:37:20 +01:00
return GNUNET_SYSERR;
return GNUNET_OK;
}
/**
* Call @a it for each denomination key found in the @a mint_base_dir.
*
* @param mint_base_dir base directory for the mint,
2015-03-28 12:29:35 +01:00
* the signing keys must be in the #TALER_MINTDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param it function to call on each denomination key found
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
2015-01-08 18:37:20 +01:00
int
2015-03-28 12:29:35 +01:00
TALER_MINTDB_denomination_keys_iterate (const char *mint_base_dir,
TALER_MINTDB_DenominationKeyIterator it,
void *it_cls)
2015-01-08 18:37:20 +01:00
{
char *dir;
struct DenomkeysIterateContext dic;
int ret;
GNUNET_asprintf (&dir,
2015-03-28 12:29:35 +01:00
"%s" DIR_SEPARATOR_STR TALER_MINTDB_DIR_DENOMINATION_KEYS,
mint_base_dir);
2015-01-08 18:37:20 +01:00
dic.it = it;
2015-03-15 17:39:44 +01:00
dic.it_cls = it_cls;
ret = GNUNET_DISK_directory_scan (dir,
&denomkeys_iterate_topdir_iter,
&dic);
GNUNET_free (dir);
return ret;
2015-01-08 18:37:20 +01:00
}
/**
* Closure for #auditor_iter() and
*/
struct AuditorIterateContext
{
/**
* Function to call with the information for each auditor.
*/
TALER_MINTDB_AuditorIterator it;
/**
* Closure for @e it.
*/
void *it_cls;
};
GNUNET_NETWORK_STRUCT_BEGIN
/**
* Header of a file with auditing information.
*/
struct AuditorFileHeaderP
{
/**
* Public key of the auditor.
*/
struct TALER_AuditorPublicKeyP apub;
/**
* Signature from the auditor.
*/
struct TALER_AuditorSignatureP asig;
/**
* Master public key of the mint the auditor is signing
* information for.
*/
struct TALER_MasterPublicKeyP mpub;
};
GNUNET_NETWORK_STRUCT_END
/**
* Load the auditor signature and the information signed by the
* auditor and call the callback in @a cls with the information.
*
* @param cls the `struct AuditorIterateContext *`
* @param filename name of a file that should contain
* a denomination key
* @return #GNUNET_OK to continue to iterate
* #GNUNET_NO to abort iteration with success
* #GNUNET_SYSERR to abort iteration with failure
*/
static int
auditor_iter (void *cls,
const char *filename)
{
struct AuditorIterateContext *aic = cls;
uint64_t size;
struct AuditorFileHeaderP *af;
const struct TALER_DenominationKeyValidityPS *dki;
unsigned int len;
int ret;
if (GNUNET_OK != GNUNET_DISK_file_size (filename,
&size,
GNUNET_YES,
GNUNET_YES))
{
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Skipping inaccessable auditor information file `%s'\n",
filename);
return GNUNET_SYSERR;
}
if ( (size < sizeof (struct AuditorFileHeaderP)) ||
(0 != (len = ((size - sizeof (struct AuditorFileHeaderP)) %
sizeof (struct TALER_DenominationKeyValidityPS)))) )
{
GNUNET_break (0);
return GNUNET_SYSERR;
}
af = GNUNET_malloc (size);
if (size !=
GNUNET_DISK_fn_read (filename,
af,
size))
{
GNUNET_log_strerror_file (GNUNET_ERROR_TYPE_WARNING,
"read",
filename);
GNUNET_free (af);
return GNUNET_SYSERR;
}
dki = (const struct TALER_DenominationKeyValidityPS *) &af[1];
ret = aic->it (aic->it_cls,
&af->apub,
&af->asig,
&af->mpub,
len,
dki);
GNUNET_free (af);
return ret;
}
/**
* Call @a it with information for each auditor found in the @a mint_base_dir.
*
* @param mint_base_dir base directory for the mint,
* the signing keys must be in the #TALER_MINTDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param it function to call with auditor information
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
int
TALER_MINTDB_auditor_iterate (const char *mint_base_dir,
TALER_MINTDB_AuditorIterator it,
void *it_cls)
{
char *dir;
struct AuditorIterateContext aic;
int ret;
GNUNET_asprintf (&dir,
"%s" DIR_SEPARATOR_STR TALER_MINTDB_DIR_AUDITORS,
mint_base_dir);
aic.it = it;
aic.it_cls = it_cls;
ret = GNUNET_DISK_directory_scan (dir,
&auditor_iter,
&aic);
GNUNET_free (dir);
return ret;
}
/**
* Write auditor information to the given file.
*
* @param filename the file where to write the auditor information to
* @param apub the auditor's public key
* @param asig the auditor's signature
* @param mpub the mint's public key (as expected by the auditor)
* @param dki_len length of @a dki
* @param dki array of denomination coin data signed by the auditor
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
TALER_MINTDB_auditor_write (const char *filename,
const struct TALER_AuditorPublicKeyP *apub,
const struct TALER_AuditorSignatureP *asig,
const struct TALER_MasterPublicKeyP *mpub,
unsigned int dki_len,
const struct TALER_DenominationKeyValidityPS *dki)
{
struct AuditorFileHeaderP af;
struct GNUNET_DISK_FileHandle *fh;
ssize_t wrote;
size_t wsize;
int ret;
int eno;
af.apub = *apub;
af.asig = *asig;
af.mpub = *mpub;
ret = GNUNET_SYSERR;
if (NULL == (fh = GNUNET_DISK_file_open
(filename,
GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE | GNUNET_DISK_OPEN_TRUNCATE,
GNUNET_DISK_PERM_USER_READ | GNUNET_DISK_PERM_USER_WRITE)))
goto cleanup;
wsize = sizeof (struct AuditorFileHeaderP);
if (GNUNET_SYSERR == (wrote = GNUNET_DISK_file_write (fh,
&af,
wsize)))
goto cleanup;
if (wrote != wsize)
goto cleanup;
wsize = dki_len * sizeof (struct TALER_DenominationKeyValidityPS);
if (wsize ==
GNUNET_DISK_file_write (fh,
dki,
wsize))
ret = GNUNET_OK;
cleanup:
eno = errno;
if (NULL != fh)
(void) GNUNET_DISK_file_close (fh);
errno = eno;
return ret;
}
2015-03-28 12:29:35 +01:00
/* end of mintdb_keyio.c */