2016-05-06 19:22:39 +02:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2019-03-03 00:35:21 +01:00
|
|
|
Copyright (C) 2014--2019 Taler Systems SA
|
2016-05-06 19:22:39 +02:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
|
2016-05-06 19:22:39 +02:00
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file exchangedb/exchangedb_auditorkeys.c
|
|
|
|
* @brief I/O operations for the Exchange's auditor data
|
|
|
|
* @author Florian Dold
|
|
|
|
* @author Benedikt Mueller
|
|
|
|
* @author Sree Harsha Totakura
|
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "taler_exchangedb_lib.h"
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Closure for #auditor_iter() and
|
|
|
|
*/
|
|
|
|
struct AuditorIterateContext
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function to call with the information for each auditor.
|
|
|
|
*/
|
|
|
|
TALER_EXCHANGEDB_AuditorIterator it;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Closure for @e it.
|
|
|
|
*/
|
|
|
|
void *it_cls;
|
2017-10-17 14:04:08 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Status of the iteration.
|
|
|
|
*/
|
|
|
|
int status;
|
2016-05-06 19:22:39 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
GNUNET_NETWORK_STRUCT_BEGIN
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Header of a file with auditing information.
|
|
|
|
*/
|
|
|
|
struct AuditorFileHeaderP
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Public key of the auditor.
|
|
|
|
*/
|
|
|
|
struct TALER_AuditorPublicKeyP apub;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Master public key of the exchange the auditor is signing
|
|
|
|
* information for.
|
|
|
|
*/
|
|
|
|
struct TALER_MasterPublicKeyP mpub;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of signatures and DKI entries in this file.
|
|
|
|
*/
|
|
|
|
uint32_t dki_len;
|
|
|
|
|
|
|
|
};
|
|
|
|
GNUNET_NETWORK_STRUCT_END
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Load the auditor signature and the information signed by the
|
|
|
|
* auditor and call the callback in @a cls with the information.
|
|
|
|
*
|
|
|
|
* @param cls the `struct AuditorIterateContext *`
|
|
|
|
* @param filename name of a file that should contain
|
|
|
|
* a denomination key
|
|
|
|
* @return #GNUNET_OK to continue to iterate
|
|
|
|
* #GNUNET_NO to abort iteration with success
|
|
|
|
* #GNUNET_SYSERR to abort iteration with failure
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
auditor_iter (void *cls,
|
|
|
|
const char *filename)
|
|
|
|
{
|
|
|
|
struct AuditorIterateContext *aic = cls;
|
|
|
|
uint64_t size;
|
|
|
|
struct AuditorFileHeaderP *af;
|
|
|
|
const struct TALER_AuditorSignatureP *sigs;
|
|
|
|
const struct TALER_DenominationKeyValidityPS *dki;
|
|
|
|
const char *auditor_url;
|
|
|
|
unsigned int dki_len;
|
|
|
|
size_t url_len;
|
2017-10-17 14:04:08 +02:00
|
|
|
int iret;
|
2016-05-06 19:22:39 +02:00
|
|
|
|
|
|
|
if (GNUNET_OK != GNUNET_DISK_file_size (filename,
|
|
|
|
&size,
|
|
|
|
GNUNET_YES,
|
|
|
|
GNUNET_YES))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Skipping inaccessable auditor information file `%s'\n",
|
|
|
|
filename);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
if (size < sizeof (struct AuditorFileHeaderP))
|
|
|
|
{
|
2018-11-19 23:02:37 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Unrecognized size for file `%s', skipping\n",
|
|
|
|
filename);
|
2017-05-24 10:49:20 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
af = GNUNET_malloc (size);
|
2019-10-29 18:04:04 +01:00
|
|
|
if (((ssize_t) size) !=
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_DISK_fn_read (filename,
|
|
|
|
af,
|
|
|
|
size))
|
|
|
|
{
|
|
|
|
GNUNET_log_strerror_file (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"read",
|
|
|
|
filename);
|
|
|
|
GNUNET_free (af);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
dki_len = ntohl (af->dki_len);
|
|
|
|
if (0 == dki_len)
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"No signed keys in %s\n",
|
|
|
|
filename);
|
|
|
|
GNUNET_free (af);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
if ( (size - sizeof (struct AuditorFileHeaderP)) / dki_len <
|
2019-08-25 16:18:24 +02:00
|
|
|
(sizeof (struct TALER_DenominationKeyValidityPS)
|
|
|
|
+ sizeof (struct TALER_AuditorSignatureP)) )
|
2016-05-06 19:22:39 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Malformed key file %s\n",
|
|
|
|
filename);
|
|
|
|
GNUNET_free (af);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
url_len = size
|
2019-08-25 16:18:24 +02:00
|
|
|
- sizeof (struct AuditorFileHeaderP)
|
|
|
|
- dki_len * (sizeof (struct TALER_DenominationKeyValidityPS)
|
|
|
|
+ sizeof (struct TALER_AuditorSignatureP));
|
2016-05-06 19:22:39 +02:00
|
|
|
sigs = (const struct TALER_AuditorSignatureP *) &af[1];
|
|
|
|
dki = (const struct TALER_DenominationKeyValidityPS *) &sigs[dki_len];
|
|
|
|
auditor_url = (const char *) &dki[dki_len];
|
|
|
|
if ( (0 == url_len) ||
|
|
|
|
('\0' != auditor_url[url_len - 1]) )
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Malformed key file %s\n",
|
|
|
|
filename);
|
|
|
|
GNUNET_free (af);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
2017-10-17 14:04:08 +02:00
|
|
|
/* Ignoring return value to not interrupt the iteration */
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(iret = aic->it (aic->it_cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
&af->apub,
|
|
|
|
auditor_url,
|
|
|
|
&af->mpub,
|
|
|
|
dki_len,
|
|
|
|
sigs,
|
|
|
|
dki)))
|
2017-10-17 14:04:08 +02:00
|
|
|
{
|
|
|
|
GNUNET_free (af);
|
|
|
|
if (GNUNET_SYSERR == iret)
|
|
|
|
aic->status = GNUNET_SYSERR;
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
aic->status++;
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_free (af);
|
2017-05-18 14:02:33 +02:00
|
|
|
return GNUNET_OK;
|
2016-05-06 19:22:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Call @a it with information for each auditor found in the @a exchange_base_dir.
|
|
|
|
*
|
|
|
|
* @param cfg configuration to use
|
|
|
|
* @param it function to call with auditor information
|
|
|
|
* @param it_cls closure for @a it
|
|
|
|
* @return -1 on error, 0 if no files were found, otherwise
|
|
|
|
* a positive number (however, even with a positive
|
|
|
|
* number it is possible that @a it was never called
|
|
|
|
* as maybe none of the files were well-formed)
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_auditor_iterate (const struct GNUNET_CONFIGURATION_Handle *cfg,
|
|
|
|
TALER_EXCHANGEDB_AuditorIterator it,
|
|
|
|
void *it_cls)
|
|
|
|
{
|
|
|
|
struct AuditorIterateContext aic;
|
|
|
|
int ret;
|
|
|
|
char *auditor_base_dir;
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CONFIGURATION_get_value_filename (cfg,
|
|
|
|
"exchangedb",
|
|
|
|
"AUDITOR_BASE_DIR",
|
|
|
|
&auditor_base_dir))
|
|
|
|
return -1;
|
|
|
|
aic.it = it;
|
|
|
|
aic.it_cls = it_cls;
|
2017-10-17 14:04:08 +02:00
|
|
|
aic.status = 0;
|
2016-05-06 19:22:39 +02:00
|
|
|
ret = GNUNET_DISK_directory_scan (auditor_base_dir,
|
|
|
|
&auditor_iter,
|
|
|
|
&aic);
|
|
|
|
GNUNET_free (auditor_base_dir);
|
2017-10-17 14:04:08 +02:00
|
|
|
if ( (0 != aic.status) ||
|
|
|
|
(GNUNET_OK == ret) )
|
|
|
|
return aic.status;
|
2016-05-06 19:22:39 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Write auditor information to the given file.
|
|
|
|
*
|
|
|
|
* @param filename the file where to write the auditor information to
|
|
|
|
* @param apub the auditor's public key
|
|
|
|
* @param auditor_url the URL of the auditor
|
|
|
|
* @param asigs the auditor's signatures, array of length @a dki_len
|
|
|
|
* @param mpub the exchange's public key (as expected by the auditor)
|
|
|
|
* @param dki_len length of @a dki
|
|
|
|
* @param dki array of denomination coin data signed by the auditor
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_auditor_write (const char *filename,
|
|
|
|
const struct TALER_AuditorPublicKeyP *apub,
|
|
|
|
const char *auditor_url,
|
|
|
|
const struct TALER_AuditorSignatureP *asigs,
|
|
|
|
const struct TALER_MasterPublicKeyP *mpub,
|
|
|
|
unsigned int dki_len,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_DenominationKeyValidityPS *dki)
|
2016-05-06 19:22:39 +02:00
|
|
|
{
|
|
|
|
struct AuditorFileHeaderP af;
|
|
|
|
struct GNUNET_DISK_FileHandle *fh;
|
|
|
|
ssize_t wrote;
|
|
|
|
size_t wsize;
|
|
|
|
int ret;
|
|
|
|
int eno;
|
|
|
|
|
|
|
|
af.apub = *apub;
|
|
|
|
af.mpub = *mpub;
|
|
|
|
af.dki_len = htonl ((uint32_t) dki_len);
|
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
if (NULL == (fh = GNUNET_DISK_file_open
|
2019-08-25 16:18:24 +02:00
|
|
|
(filename,
|
|
|
|
GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE
|
|
|
|
| GNUNET_DISK_OPEN_TRUNCATE,
|
|
|
|
GNUNET_DISK_PERM_USER_READ
|
|
|
|
| GNUNET_DISK_PERM_USER_WRITE)))
|
2016-05-06 19:22:39 +02:00
|
|
|
goto cleanup;
|
|
|
|
wsize = sizeof (struct AuditorFileHeaderP);
|
|
|
|
if (GNUNET_SYSERR == (wrote = GNUNET_DISK_file_write (fh,
|
|
|
|
&af,
|
|
|
|
wsize)))
|
|
|
|
goto cleanup;
|
2019-10-29 18:04:04 +01:00
|
|
|
if (wrote != (ssize_t) wsize)
|
2016-05-06 19:22:39 +02:00
|
|
|
goto cleanup;
|
|
|
|
wsize = dki_len * sizeof (struct TALER_AuditorSignatureP);
|
2019-10-29 18:04:04 +01:00
|
|
|
if (((ssize_t) wsize) ==
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_DISK_file_write (fh,
|
|
|
|
asigs,
|
|
|
|
wsize))
|
|
|
|
ret = GNUNET_OK;
|
|
|
|
wsize = dki_len * sizeof (struct TALER_DenominationKeyValidityPS);
|
2019-10-29 18:04:04 +01:00
|
|
|
if (((ssize_t) wsize) ==
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_DISK_file_write (fh,
|
|
|
|
dki,
|
|
|
|
wsize))
|
|
|
|
ret = GNUNET_OK;
|
|
|
|
wsize = strlen (auditor_url) + 1;
|
2019-10-29 18:04:04 +01:00
|
|
|
if (((ssize_t) wsize) ==
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_DISK_file_write (fh,
|
|
|
|
auditor_url,
|
|
|
|
wsize))
|
|
|
|
ret = GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
cleanup:
|
2016-05-06 19:22:39 +02:00
|
|
|
eno = errno;
|
|
|
|
if (NULL != fh)
|
|
|
|
(void) GNUNET_DISK_file_close (fh);
|
|
|
|
errno = eno;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-09-17 16:53:14 +02:00
|
|
|
/* end of exchangedb_auditorkeys.c */
|