2015-01-08 18:37:20 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2015-02-08 00:16:22 +01:00
|
|
|
Copyright (C) 2014 Christian Grothoff (and other contributing authors)
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
2015-01-28 15:03:47 +01:00
|
|
|
* @file key_io.c
|
|
|
|
* @brief I/O operations for the Mint's private keys
|
2015-01-08 18:37:20 +01:00
|
|
|
* @author Florian Dold
|
|
|
|
* @author Benedikt Mueller
|
|
|
|
* @author Sree Harsha Totakura
|
2015-01-28 15:03:47 +01:00
|
|
|
* @author Christian Grothoff
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2015-01-28 15:03:47 +01:00
|
|
|
#include "key_io.h"
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
struct SignkeysIterateContext
|
|
|
|
{
|
|
|
|
TALER_MINT_SignkeyIterator it;
|
|
|
|
void *it_cls;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct DenomkeysIterateContext
|
|
|
|
{
|
|
|
|
const char *alias;
|
|
|
|
TALER_MINT_DenomkeyIterator it;
|
|
|
|
void *it_cls;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
signkeys_iterate_dir_iter (void *cls,
|
|
|
|
const char *filename)
|
|
|
|
{
|
|
|
|
|
|
|
|
struct SignkeysIterateContext *skc = cls;
|
|
|
|
ssize_t nread;
|
2015-01-09 18:18:59 +01:00
|
|
|
struct TALER_MINT_SignKeyIssuePriv issue;
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
nread = GNUNET_DISK_fn_read (filename,
|
|
|
|
&issue,
|
2015-01-09 18:18:59 +01:00
|
|
|
sizeof (struct TALER_MINT_SignKeyIssuePriv));
|
|
|
|
if (nread != sizeof (struct TALER_MINT_SignKeyIssuePriv))
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Invalid signkey file: '%s'\n", filename);
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
return skc->it (skc->it_cls, &issue);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
TALER_MINT_signkeys_iterate (const char *mint_base_dir,
|
|
|
|
TALER_MINT_SignkeyIterator it, void *cls)
|
|
|
|
{
|
|
|
|
char *signkey_dir;
|
|
|
|
size_t len;
|
|
|
|
struct SignkeysIterateContext skc;
|
|
|
|
|
|
|
|
len = GNUNET_asprintf (&signkey_dir, ("%s" DIR_SEPARATOR_STR DIR_SIGNKEYS), mint_base_dir);
|
|
|
|
GNUNET_assert (len > 0);
|
|
|
|
|
|
|
|
skc.it = it;
|
|
|
|
skc.it_cls = cls;
|
|
|
|
|
|
|
|
return GNUNET_DISK_directory_scan (signkey_dir, &signkeys_iterate_dir_iter, &skc);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Import a denomination key from the given file
|
|
|
|
*
|
|
|
|
* @param filename the file to import the key from
|
|
|
|
* @param dki pointer to return the imported denomination key
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_read_denom_key (const char *filename,
|
2015-01-09 18:18:59 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
|
|
|
uint64_t size;
|
|
|
|
size_t offset;
|
|
|
|
void *data;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
|
2015-01-08 18:37:20 +01:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
data = NULL;
|
2015-01-09 18:18:59 +01:00
|
|
|
offset = sizeof (struct TALER_MINT_DenomKeyIssuePriv)
|
|
|
|
- offsetof (struct TALER_MINT_DenomKeyIssuePriv, issue.signature);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_OK != GNUNET_DISK_file_size (filename,
|
|
|
|
&size,
|
|
|
|
GNUNET_YES,
|
|
|
|
GNUNET_YES))
|
|
|
|
goto cleanup;
|
|
|
|
if (size <= offset)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
data = GNUNET_malloc (size);
|
|
|
|
if (size != GNUNET_DISK_fn_read (filename,
|
|
|
|
data,
|
|
|
|
size))
|
|
|
|
goto cleanup;
|
2015-01-26 12:22:26 +01:00
|
|
|
if (NULL == (priv = GNUNET_CRYPTO_rsa_private_key_decode (data + offset,
|
|
|
|
size - offset)))
|
2015-01-08 18:37:20 +01:00
|
|
|
goto cleanup;
|
|
|
|
dki->denom_priv = priv;
|
2015-01-09 18:18:59 +01:00
|
|
|
memcpy (&dki->issue.signature, data, offset);
|
2015-01-08 18:37:20 +01:00
|
|
|
ret = GNUNET_OK;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
GNUNET_free_non_null (data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Exports a denomination key to the given file
|
|
|
|
*
|
|
|
|
* @param filename the file where to write the denomination key
|
|
|
|
* @param dki the denomination key
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_write_denom_key (const char *filename,
|
2015-01-09 18:18:59 +01:00
|
|
|
const struct TALER_MINT_DenomKeyIssuePriv *dki)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-26 12:22:26 +01:00
|
|
|
char *priv_enc;
|
|
|
|
size_t priv_enc_size;
|
2015-01-08 18:37:20 +01:00
|
|
|
struct GNUNET_DISK_FileHandle *fh;
|
|
|
|
ssize_t wrote;
|
|
|
|
size_t wsize;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
fh = NULL;
|
2015-01-26 12:22:26 +01:00
|
|
|
priv_enc_size = GNUNET_CRYPTO_rsa_private_key_encode (dki->denom_priv,
|
|
|
|
&priv_enc);
|
2015-01-08 18:37:20 +01:00
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
if (NULL == (fh = GNUNET_DISK_file_open
|
|
|
|
(filename,
|
|
|
|
GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE | GNUNET_DISK_OPEN_TRUNCATE,
|
|
|
|
GNUNET_DISK_PERM_USER_READ | GNUNET_DISK_PERM_USER_WRITE)))
|
|
|
|
goto cleanup;
|
2015-01-09 18:18:59 +01:00
|
|
|
wsize = sizeof (struct TALER_MINT_DenomKeyIssuePriv)
|
|
|
|
- offsetof (struct TALER_MINT_DenomKeyIssuePriv, issue.signature);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_SYSERR == (wrote = GNUNET_DISK_file_write (fh,
|
2015-01-09 18:18:59 +01:00
|
|
|
&dki->issue.signature,
|
2015-01-08 18:37:20 +01:00
|
|
|
wsize)))
|
|
|
|
goto cleanup;
|
|
|
|
if (wrote != wsize)
|
|
|
|
goto cleanup;
|
|
|
|
if (GNUNET_SYSERR == (wrote = GNUNET_DISK_file_write (fh,
|
|
|
|
priv_enc,
|
2015-01-26 12:22:26 +01:00
|
|
|
priv_enc_size)))
|
2015-01-08 18:37:20 +01:00
|
|
|
goto cleanup;
|
2015-01-26 12:22:26 +01:00
|
|
|
if (wrote != priv_enc_size)
|
2015-01-08 18:37:20 +01:00
|
|
|
goto cleanup;
|
|
|
|
ret = GNUNET_OK;
|
|
|
|
cleanup:
|
|
|
|
GNUNET_free_non_null (priv_enc);
|
|
|
|
if (NULL != fh)
|
|
|
|
(void) GNUNET_DISK_file_close (fh);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
denomkeys_iterate_keydir_iter (void *cls,
|
|
|
|
const char *filename)
|
|
|
|
{
|
|
|
|
|
|
|
|
struct DenomkeysIterateContext *dic = cls;
|
2015-01-09 18:18:59 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv issue;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
if (GNUNET_OK != TALER_MINT_read_denom_key (filename, &issue))
|
|
|
|
{
|
2015-01-09 18:18:59 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Invalid denomkey file: '%s'\n",
|
|
|
|
filename);
|
2015-01-08 18:37:20 +01:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
return dic->it (dic->it_cls, dic->alias, &issue);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
denomkeys_iterate_topdir_iter (void *cls,
|
|
|
|
const char *filename)
|
|
|
|
{
|
|
|
|
struct DenomkeysIterateContext *dic = cls;
|
2015-01-28 15:03:47 +01:00
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
dic->alias = GNUNET_STRINGS_get_short_name (filename);
|
|
|
|
|
|
|
|
// FIXME: differentiate between error case and normal iteration abortion
|
|
|
|
if (0 > GNUNET_DISK_directory_scan (filename, &denomkeys_iterate_keydir_iter, dic))
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
TALER_MINT_denomkeys_iterate (const char *mint_base_dir,
|
|
|
|
TALER_MINT_DenomkeyIterator it, void *cls)
|
|
|
|
{
|
|
|
|
char *dir;
|
|
|
|
size_t len;
|
|
|
|
struct DenomkeysIterateContext dic;
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
len = GNUNET_asprintf (&dir,
|
|
|
|
"%s" DIR_SEPARATOR_STR DIR_DENOMKEYS,
|
2015-01-08 18:37:20 +01:00
|
|
|
mint_base_dir);
|
|
|
|
GNUNET_assert (len > 0);
|
|
|
|
|
|
|
|
dic.it = it;
|
|
|
|
dic.it_cls = cls;
|
|
|
|
|
|
|
|
// scan over alias dirs
|
2015-01-28 15:03:47 +01:00
|
|
|
return GNUNET_DISK_directory_scan (dir,
|
|
|
|
&denomkeys_iterate_topdir_iter,
|
|
|
|
&dic);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* end of mint_common.c */
|