2015-01-19 21:04:58 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2015-01-29 18:46:34 +01:00
|
|
|
(C) 2014, 2015 Christian Grothoff (and other contributing authors)
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file mint/taler-mint_httpd_db.h
|
2015-01-28 22:35:57 +01:00
|
|
|
* @brief High-level (transactional-layer) database operations for the mint
|
2015-01-19 21:04:58 +01:00
|
|
|
* @author Chrisitan Grothoff
|
|
|
|
*/
|
|
|
|
#ifndef TALER_MINT_HTTPD_DB_H
|
|
|
|
#define TALER_MINT_HTTPD_DB_H
|
|
|
|
|
|
|
|
#include <libpq-fe.h>
|
|
|
|
#include <microhttpd.h>
|
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
|
|
|
#include "taler_util.h"
|
2015-01-19 21:53:23 +01:00
|
|
|
#include "taler-mint-httpd_keys.h"
|
2015-01-28 15:35:41 +01:00
|
|
|
#include "mint_db.h"
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/deposit". The validity of the coin and signature
|
2015-01-19 21:04:58 +01:00
|
|
|
* have already been checked. The database must now check that
|
|
|
|
* the coin is not (double or over) spent, and execute the
|
|
|
|
* transaction (record details, generate success or failure response).
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param deposit information about the deposit
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_deposit (struct MHD_Connection *connection,
|
|
|
|
const struct Deposit *deposit);
|
|
|
|
|
|
|
|
|
2015-01-19 21:53:23 +01:00
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/withdraw/status". Given the public key of a reserve,
|
|
|
|
* return the associated transaction history.
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param reserve_pub public key of the reserve to check
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_withdraw_status (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *reserve_pub);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/withdraw/sign". Given a reserve and a properly signed
|
|
|
|
* request to withdraw a coin, check the balance of the reserve and
|
|
|
|
* if it is sufficient, store the request and return the signed
|
|
|
|
* blinded envelope.
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-01-26 12:22:26 +01:00
|
|
|
* @param reserve public key of the reserve
|
|
|
|
* @param denomination_pub public key of the denomination requested
|
|
|
|
* @param blinded_msg blinded message to be signed
|
|
|
|
* @param blinded_msg_len number of bytes in @a blinded_msg
|
|
|
|
* @param signature signature over the withdraw request, to be stored in DB
|
2015-01-19 21:53:23 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_withdraw_sign (struct MHD_Connection *connection,
|
2015-01-26 12:22:26 +01:00
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *reserve,
|
|
|
|
const struct GNUNET_CRYPTO_rsa_PublicKey *denomination_pub,
|
|
|
|
const char *blinded_msg,
|
|
|
|
size_t blinded_msg_len,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaSignature *signature);
|
2015-01-19 21:53:23 +01:00
|
|
|
|
|
|
|
|
2015-01-21 12:46:14 +01:00
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/melt". We have been given a list of valid
|
|
|
|
* coins and a request to melt them into the given
|
|
|
|
* @a refresh_session_pub. Check that the coins all have the
|
|
|
|
* required value left and if so, store that they have been
|
|
|
|
* melted and confirm the melting operation to the client.
|
2015-01-21 12:46:14 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param refresh_session_pub public key of the refresh session
|
2015-01-29 20:00:21 +01:00
|
|
|
* @param client_signature signature of the client (matching @a refresh_session_pub)
|
|
|
|
* over the melting request
|
2015-01-21 12:46:14 +01:00
|
|
|
* @param num_new_denoms number of entries in @a denom_pubs
|
2015-01-27 15:22:34 +01:00
|
|
|
* @param denum_pubs array of public denomination keys for the refresh (?)
|
2015-01-21 12:46:14 +01:00
|
|
|
* @param coin_count number of entries in @a coin_public_infos
|
|
|
|
* @param coin_public_infos information about the coins to melt
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_melt (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
2015-01-29 20:00:21 +01:00
|
|
|
const struct GNUNET_CRYPTO_EddsaSignature *client_signature,
|
2015-01-21 12:46:14 +01:00
|
|
|
unsigned int num_new_denoms,
|
2015-01-27 18:57:29 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *const*denom_pubs,
|
2015-01-21 12:46:14 +01:00
|
|
|
unsigned int coin_count,
|
|
|
|
const struct TALER_CoinPublicInfo *coin_public_infos);
|
|
|
|
|
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/commit". The client is committing to @a kappa
|
|
|
|
* sets of transfer keys, and linkage information for a refresh
|
|
|
|
* operation. Confirm that the commit matches the melts of an
|
|
|
|
* existing @a refresh_session_pub, store the refresh session commit
|
|
|
|
* data and then return the client a challenge specifying which of the
|
|
|
|
* @a kappa sets of private transfer keys should not be revealed.
|
2015-01-21 13:31:05 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-01-29 20:00:21 +01:00
|
|
|
* @param refresh_session public key of the session
|
|
|
|
* @param commit_client_sig signature of the client over this commitment
|
2015-01-21 13:31:05 +01:00
|
|
|
* @param kappa size of x-dimension of @commit_coin and @commit_link arrays
|
2015-01-27 18:35:17 +01:00
|
|
|
* @param num_oldcoins size of y-dimension of @commit_coin array
|
|
|
|
* @param num_newcoins size of y-dimension of @commit_link array
|
2015-01-29 18:46:34 +01:00
|
|
|
* @param commit_coin 2d array of coin commitments (what the mint is to sign
|
|
|
|
* once the "/refres/reveal" of cut and choose is done)
|
|
|
|
* @param commit_link 2d array of coin link commitments (what the mint is
|
|
|
|
* to return via "/refresh/link" to enable linkage in the
|
|
|
|
* future)
|
2015-01-21 13:31:05 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
2015-01-29 18:46:34 +01:00
|
|
|
// FIXME: see #3635.
|
2015-01-21 13:31:05 +01:00
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_commit (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
2015-01-29 20:00:21 +01:00
|
|
|
const struct GNUNET_CRYPTO_EddsaSignature *commit_client_sig,
|
2015-01-21 13:31:05 +01:00
|
|
|
unsigned int kappa,
|
|
|
|
unsigned int num_oldcoins,
|
|
|
|
unsigned int num_newcoins,
|
|
|
|
struct RefreshCommitCoin *const* commit_coin,
|
|
|
|
struct RefreshCommitLink *const* commit_link);
|
|
|
|
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/reveal". The client is revealing to us the
|
|
|
|
* transfer keys for @a kappa-1 sets of coins. Verify that the
|
|
|
|
* revealed transfer keys would allow linkage to the blinded coins,
|
|
|
|
* and if so, return the signed coins for corresponding to the set of
|
|
|
|
* coins that was not chosen.
|
2015-01-21 14:46:33 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param refresh_session_pub public key of the refresh session
|
|
|
|
* @param kappa size of x-dimension of @transfer_privs array plus one (!)
|
|
|
|
* @param num_oldcoins size of y-dimension of @transfer_privs array
|
|
|
|
* @param transfer_pubs array with the revealed transfer keys
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_reveal (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
|
|
|
unsigned int kappa,
|
|
|
|
unsigned int num_oldcoins,
|
|
|
|
struct GNUNET_CRYPTO_EcdsaPrivateKey *const*transfer_privs);
|
|
|
|
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/link". Returns the linkage information that
|
|
|
|
* will allow the owner of a coin to follow the refresh trail to the
|
|
|
|
* refreshed coin.
|
2015-01-21 13:46:05 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param coin_pub public key of the coin to link
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_link (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub);
|
|
|
|
|
|
|
|
|
2015-01-29 18:46:34 +01:00
|
|
|
#endif
|
|
|
|
/* TALER_MINT_HTTPD_DB_H */
|