2015-08-08 20:21:13 +02:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2020-04-03 20:47:51 +02:00
|
|
|
Copyright (C) 2015-2020 Taler Systems SA
|
2015-08-08 20:21:13 +02:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING. If not, see
|
2015-08-08 20:21:13 +02:00
|
|
|
<http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
2020-01-17 22:13:40 +01:00
|
|
|
* @file lib/exchange_api_common.c
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief common functions for the exchange API
|
2015-08-08 20:21:13 +02:00
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2016-03-19 15:54:21 +01:00
|
|
|
#include "taler_json_lib.h"
|
2016-04-17 17:45:15 +02:00
|
|
|
#include <gnunet/gnunet_curl_lib.h>
|
2016-03-01 15:35:04 +01:00
|
|
|
#include "exchange_api_handle.h"
|
2015-08-08 20:21:13 +02:00
|
|
|
#include "taler_signatures.h"
|
|
|
|
|
|
|
|
|
2020-02-29 16:42:10 +01:00
|
|
|
/**
|
|
|
|
* Parse history given in JSON format and return it in binary
|
|
|
|
* format.
|
|
|
|
*
|
|
|
|
* @param exchange connection to the exchange we can use
|
|
|
|
* @param history JSON array with the history
|
|
|
|
* @param reserve_pub public key of the reserve to inspect
|
|
|
|
* @param currency currency we expect the balance to be in
|
|
|
|
* @param[out] balance final balance
|
|
|
|
* @param history_length number of entries in @a history
|
|
|
|
* @param[out] rhistory array of length @a history_length, set to the
|
|
|
|
* parsed history entries
|
|
|
|
* @return #GNUNET_OK if history was valid and @a rhistory and @a balance
|
|
|
|
* were set,
|
|
|
|
* #GNUNET_SYSERR if there was a protocol violation in @a history
|
|
|
|
*/
|
|
|
|
int
|
2020-03-17 17:47:53 +01:00
|
|
|
TALER_EXCHANGE_parse_reserve_history (
|
|
|
|
struct TALER_EXCHANGE_Handle *exchange,
|
|
|
|
const json_t *history,
|
|
|
|
const struct TALER_ReservePublicKeyP *reserve_pub,
|
|
|
|
const char *currency,
|
|
|
|
struct TALER_Amount *balance,
|
|
|
|
unsigned int history_length,
|
|
|
|
struct TALER_EXCHANGE_ReserveHistory *rhistory)
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
struct GNUNET_HashCode uuid[history_length];
|
|
|
|
unsigned int uuid_off;
|
|
|
|
struct TALER_Amount total_in;
|
|
|
|
struct TALER_Amount total_out;
|
|
|
|
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
&total_in));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
&total_out));
|
|
|
|
uuid_off = 0;
|
2020-04-01 23:11:56 +02:00
|
|
|
for (unsigned int off = 0; off<history_length; off++)
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
2020-04-03 20:47:51 +02:00
|
|
|
struct TALER_EXCHANGE_ReserveHistory *rh = &rhistory[off];
|
2020-02-29 16:42:10 +01:00
|
|
|
json_t *transaction;
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
const char *type;
|
|
|
|
struct GNUNET_JSON_Specification hist_spec[] = {
|
2020-04-01 23:11:56 +02:00
|
|
|
GNUNET_JSON_spec_string ("type",
|
|
|
|
&type),
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_JSON_spec_amount ("amount",
|
|
|
|
&amount),
|
|
|
|
/* 'wire' and 'signature' are optional depending on 'type'! */
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
|
|
|
transaction = json_array_get (history,
|
|
|
|
off);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
hist_spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
rhistory[off].amount = amount;
|
2020-04-03 20:47:51 +02:00
|
|
|
if (GNUNET_YES !=
|
|
|
|
TALER_amount_cmp_currency (&amount,
|
|
|
|
&total_in))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-02-29 16:42:10 +01:00
|
|
|
if (0 == strcasecmp (type,
|
2020-03-30 18:09:47 +02:00
|
|
|
"CREDIT"))
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
const char *wire_url;
|
|
|
|
void *wire_reference;
|
|
|
|
size_t wire_reference_size;
|
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
|
|
|
|
|
|
|
struct GNUNET_JSON_Specification withdraw_spec[] = {
|
|
|
|
GNUNET_JSON_spec_varsize ("wire_reference",
|
|
|
|
&wire_reference,
|
|
|
|
&wire_reference_size),
|
2020-07-05 21:54:11 +02:00
|
|
|
TALER_JSON_spec_absolute_time ("timestamp",
|
|
|
|
×tamp),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_string ("sender_account_url",
|
|
|
|
&wire_url),
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->type = TALER_EXCHANGE_RTT_CREDIT;
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_add (&total_in,
|
|
|
|
&total_in,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
/* overflow in history already!? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
withdraw_spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.in_details.sender_url = GNUNET_strdup (wire_url);
|
|
|
|
rh->details.in_details.wire_reference = wire_reference;
|
|
|
|
rh->details.in_details.wire_reference_size =
|
2020-02-29 16:42:10 +01:00
|
|
|
wire_reference_size;
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.in_details.timestamp = timestamp;
|
2020-02-29 16:42:10 +01:00
|
|
|
/* end type==DEPOSIT */
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"WITHDRAW"))
|
|
|
|
{
|
|
|
|
struct TALER_ReserveSignatureP sig;
|
|
|
|
struct TALER_WithdrawRequestPS withdraw_purpose;
|
2020-05-01 19:22:32 +02:00
|
|
|
struct TALER_Amount withdraw_fee;
|
2020-02-29 16:42:10 +01:00
|
|
|
struct GNUNET_JSON_Specification withdraw_spec[] = {
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("reserve_sig",
|
|
|
|
&sig),
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_JSON_spec_amount ("withdraw_fee",
|
|
|
|
&withdraw_fee),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_denom_pub",
|
|
|
|
&withdraw_purpose.h_denomination_pub),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_coin_envelope",
|
|
|
|
&withdraw_purpose.h_coin_envelope),
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->type = TALER_EXCHANGE_RTT_WITHDRAWAL;
|
2020-02-29 16:42:10 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
withdraw_spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
withdraw_purpose.purpose.size
|
|
|
|
= htonl (sizeof (withdraw_purpose));
|
|
|
|
withdraw_purpose.purpose.purpose
|
|
|
|
= htonl (TALER_SIGNATURE_WALLET_RESERVE_WITHDRAW);
|
|
|
|
withdraw_purpose.reserve_pub = *reserve_pub;
|
|
|
|
TALER_amount_hton (&withdraw_purpose.amount_with_fee,
|
|
|
|
&amount);
|
|
|
|
/* Check that the signature is a valid withdraw request */
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_RESERVE_WITHDRAW,
|
2020-04-08 18:18:20 +02:00
|
|
|
&withdraw_purpose,
|
2020-02-29 16:42:10 +01:00
|
|
|
&sig.eddsa_signature,
|
|
|
|
&reserve_pub->eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_JSON_parse_free (withdraw_spec);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
/* check that withdraw fee matches expectations! */
|
|
|
|
{
|
|
|
|
const struct TALER_EXCHANGE_Keys *key_state;
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *dki;
|
|
|
|
|
|
|
|
key_state = TALER_EXCHANGE_get_keys (exchange);
|
|
|
|
dki = TALER_EXCHANGE_get_denomination_key_by_hash (key_state,
|
|
|
|
&withdraw_purpose.
|
|
|
|
h_denomination_pub);
|
|
|
|
if ( (GNUNET_YES !=
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_amount_cmp_currency (&withdraw_fee,
|
2020-02-29 16:42:10 +01:00
|
|
|
&dki->fee_withdraw)) ||
|
|
|
|
(0 !=
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_amount_cmp (&withdraw_fee,
|
2020-02-29 16:42:10 +01:00
|
|
|
&dki->fee_withdraw)) )
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_JSON_parse_free (withdraw_spec);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-05-01 19:22:32 +02:00
|
|
|
rh->details.withdraw.fee = withdraw_fee;
|
2020-02-29 16:42:10 +01:00
|
|
|
}
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.withdraw.out_authorization_sig
|
2020-02-29 16:42:10 +01:00
|
|
|
= json_object_get (transaction,
|
|
|
|
"signature");
|
|
|
|
/* Check check that the same withdraw transaction
|
|
|
|
isn't listed twice by the exchange. We use the
|
|
|
|
"uuid" array to remember the hashes of all
|
|
|
|
purposes, and compare the hashes to find
|
|
|
|
duplicates. *///
|
|
|
|
GNUNET_CRYPTO_hash (&withdraw_purpose,
|
|
|
|
ntohl (withdraw_purpose.purpose.size),
|
|
|
|
&uuid[uuid_off]);
|
|
|
|
for (unsigned int i = 0; i<uuid_off; i++)
|
|
|
|
{
|
|
|
|
if (0 == GNUNET_memcmp (&uuid[uuid_off],
|
|
|
|
&uuid[i]))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_JSON_parse_free (withdraw_spec);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
uuid_off++;
|
|
|
|
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_add (&total_out,
|
|
|
|
&total_out,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
/* overflow in history already!? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
GNUNET_JSON_parse_free (withdraw_spec);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
/* end type==WITHDRAW */
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"RECOUP"))
|
|
|
|
{
|
|
|
|
struct TALER_RecoupConfirmationPS pc;
|
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
|
|
|
const struct TALER_EXCHANGE_Keys *key_state;
|
|
|
|
struct GNUNET_JSON_Specification recoup_spec[] = {
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_pub",
|
|
|
|
&pc.coin_pub),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_sig",
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.recoup_details.exchange_sig),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_pub",
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.recoup_details.exchange_pub),
|
2020-07-05 21:54:11 +02:00
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&pc.timestamp),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->type = TALER_EXCHANGE_RTT_RECOUP;
|
|
|
|
rh->amount = amount;
|
2020-02-29 16:42:10 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
recoup_spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.recoup_details.coin_pub = pc.coin_pub;
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_hton (&pc.recoup_amount,
|
|
|
|
&amount);
|
|
|
|
pc.purpose.size = htonl (sizeof (pc));
|
|
|
|
pc.purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP);
|
|
|
|
pc.reserve_pub = *reserve_pub;
|
|
|
|
timestamp = GNUNET_TIME_absolute_ntoh (pc.timestamp);
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.recoup_details.timestamp = timestamp;
|
2020-02-29 16:42:10 +01:00
|
|
|
|
|
|
|
key_state = TALER_EXCHANGE_get_keys (exchange);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_EXCHANGE_test_signing_key (key_state,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.
|
2020-02-29 16:42:10 +01:00
|
|
|
recoup_details.exchange_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
2020-04-03 20:47:51 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_verify (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP,
|
2020-04-08 18:18:20 +02:00
|
|
|
&pc,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.recoup_details.exchange_sig.eddsa_signature,
|
|
|
|
&rh->details.recoup_details.exchange_pub.eddsa_pub))
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_add (&total_in,
|
|
|
|
&total_in,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->amount))
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
/* overflow in history already!? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
/* end type==RECOUP */
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"CLOSING"))
|
|
|
|
{
|
|
|
|
const struct TALER_EXCHANGE_Keys *key_state;
|
|
|
|
struct TALER_ReserveCloseConfirmationPS rcc;
|
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
|
|
|
struct GNUNET_JSON_Specification closing_spec[] = {
|
2020-04-03 20:47:51 +02:00
|
|
|
GNUNET_JSON_spec_string (
|
|
|
|
"receiver_account_details",
|
|
|
|
&rh->details.close_details.receiver_account_details),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("wtid",
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.close_details.wtid),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_sig",
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.close_details.exchange_sig),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_pub",
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.close_details.exchange_pub),
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_JSON_spec_amount_nbo ("closing_fee",
|
|
|
|
&rcc.closing_fee),
|
2020-07-05 21:54:11 +02:00
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&rcc.timestamp),
|
2020-02-29 16:42:10 +01:00
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->type = TALER_EXCHANGE_RTT_CLOSE;
|
|
|
|
rh->amount = amount;
|
2020-02-29 16:42:10 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
closing_spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
TALER_amount_hton (&rcc.closing_amount,
|
|
|
|
&amount);
|
|
|
|
GNUNET_CRYPTO_hash (
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.close_details.receiver_account_details,
|
|
|
|
strlen (rh->details.close_details.receiver_account_details) + 1,
|
2020-02-29 16:42:10 +01:00
|
|
|
&rcc.h_wire);
|
2020-04-03 20:47:51 +02:00
|
|
|
rcc.wtid = rh->details.close_details.wtid;
|
2020-02-29 16:42:10 +01:00
|
|
|
rcc.purpose.size = htonl (sizeof (rcc));
|
|
|
|
rcc.purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_RESERVE_CLOSED);
|
|
|
|
rcc.reserve_pub = *reserve_pub;
|
|
|
|
timestamp = GNUNET_TIME_absolute_ntoh (rcc.timestamp);
|
2020-04-03 20:47:51 +02:00
|
|
|
rh->details.close_details.timestamp = timestamp;
|
|
|
|
TALER_amount_ntoh (&rh->details.close_details.fee,
|
2020-03-28 20:46:57 +01:00
|
|
|
&rcc.closing_fee);
|
2020-02-29 16:42:10 +01:00
|
|
|
key_state = TALER_EXCHANGE_get_keys (exchange);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_EXCHANGE_test_signing_key (key_state,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.close_details.
|
2020-02-29 16:42:10 +01:00
|
|
|
exchange_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
2020-04-03 20:47:51 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_verify (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_RESERVE_CLOSED,
|
2020-04-08 18:18:20 +02:00
|
|
|
&rcc,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->details.close_details.exchange_sig.eddsa_signature,
|
|
|
|
&rh->details.close_details.exchange_pub.eddsa_pub))
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_add (&total_out,
|
|
|
|
&total_out,
|
2020-04-03 20:47:51 +02:00
|
|
|
&rh->amount))
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
/* overflow in history already!? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
/* end type==CLOSING */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* unexpected 'type', protocol incompatibility, complain! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check balance = total_in - total_out < withdraw-amount */
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2020-02-29 16:42:10 +01:00
|
|
|
TALER_amount_subtract (balance,
|
|
|
|
&total_in,
|
|
|
|
&total_out))
|
|
|
|
{
|
|
|
|
/* total_in < total_out, why did the exchange ever allow this!? */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Free memory (potentially) allocated by #TALER_EXCHANGE_parse_reserve_history().
|
|
|
|
*
|
|
|
|
* @param rhistory result to free
|
|
|
|
* @param len number of entries in @a rhistory
|
|
|
|
*/
|
|
|
|
void
|
2020-03-17 17:47:53 +01:00
|
|
|
TALER_EXCHANGE_free_reserve_history (
|
|
|
|
struct TALER_EXCHANGE_ReserveHistory *rhistory,
|
|
|
|
unsigned int len)
|
2020-02-29 16:42:10 +01:00
|
|
|
{
|
|
|
|
for (unsigned int i = 0; i<len; i++)
|
|
|
|
{
|
|
|
|
switch (rhistory[i].type)
|
|
|
|
{
|
2020-03-28 20:46:57 +01:00
|
|
|
case TALER_EXCHANGE_RTT_CREDIT:
|
2020-07-05 16:58:43 +02:00
|
|
|
GNUNET_free (rhistory[i].details.in_details.wire_reference);
|
|
|
|
GNUNET_free (rhistory[i].details.in_details.sender_url);
|
2020-02-29 16:42:10 +01:00
|
|
|
break;
|
|
|
|
case TALER_EXCHANGE_RTT_WITHDRAWAL:
|
|
|
|
break;
|
|
|
|
case TALER_EXCHANGE_RTT_RECOUP:
|
|
|
|
break;
|
|
|
|
case TALER_EXCHANGE_RTT_CLOSE:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
GNUNET_free (rhistory);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-08 20:21:13 +02:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Verify a coins transaction history as returned by the exchange.
|
2015-08-08 20:21:13 +02:00
|
|
|
*
|
2020-01-17 19:54:16 +01:00
|
|
|
* @param dk fee structure for the coin, NULL to skip verifying fees
|
2015-08-08 20:21:13 +02:00
|
|
|
* @param currency expected currency for the coin
|
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param history history of the coin in json encoding
|
2020-07-08 21:24:10 +02:00
|
|
|
* @param[out] h_denom_pub set to the hash of the coin's denomination (if available)
|
2015-08-08 20:21:13 +02:00
|
|
|
* @param[out] total how much of the coin has been spent according to @a history
|
|
|
|
* @return #GNUNET_OK if @a history is valid, #GNUNET_SYSERR if not
|
|
|
|
*/
|
|
|
|
int
|
2020-03-17 17:47:53 +01:00
|
|
|
TALER_EXCHANGE_verify_coin_history (
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *dk,
|
|
|
|
const char *currency,
|
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
json_t *history,
|
2020-07-08 21:24:10 +02:00
|
|
|
struct GNUNET_HashCode *h_denom_pub,
|
2020-03-17 17:47:53 +01:00
|
|
|
struct TALER_Amount *total)
|
2015-08-08 20:21:13 +02:00
|
|
|
{
|
|
|
|
size_t len;
|
2016-05-06 13:33:20 +02:00
|
|
|
struct TALER_Amount rtotal;
|
2020-01-17 20:02:25 +01:00
|
|
|
struct TALER_Amount fee;
|
2015-08-08 20:21:13 +02:00
|
|
|
|
|
|
|
if (NULL == history)
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
len = json_array_size (history);
|
|
|
|
if (0 == len)
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-10-06 20:54:42 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
total));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
&rtotal));
|
2019-08-25 16:18:24 +02:00
|
|
|
for (size_t off = 0; off<len; off++)
|
2015-08-08 20:21:13 +02:00
|
|
|
{
|
2019-06-18 13:20:43 +02:00
|
|
|
int add;
|
2015-08-08 20:21:13 +02:00
|
|
|
json_t *transaction;
|
|
|
|
struct TALER_Amount amount;
|
2015-11-11 14:44:08 +01:00
|
|
|
const char *type;
|
2017-04-03 22:45:48 +02:00
|
|
|
struct GNUNET_JSON_Specification spec_glob[] = {
|
2016-03-19 15:54:21 +01:00
|
|
|
TALER_JSON_spec_amount ("amount",
|
2017-04-03 22:45:48 +02:00
|
|
|
&amount),
|
2016-03-19 15:54:21 +01:00
|
|
|
GNUNET_JSON_spec_string ("type",
|
2017-04-03 22:45:48 +02:00
|
|
|
&type),
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_JSON_spec_end ()
|
2015-08-08 20:21:13 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
transaction = json_array_get (history,
|
|
|
|
off);
|
|
|
|
if (GNUNET_OK !=
|
2016-03-19 15:54:21 +01:00
|
|
|
GNUNET_JSON_parse (transaction,
|
2017-04-03 22:45:48 +02:00
|
|
|
spec_glob,
|
2016-03-19 15:54:21 +01:00
|
|
|
NULL, NULL))
|
2015-08-08 20:21:13 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-04-03 20:47:51 +02:00
|
|
|
if (GNUNET_YES !=
|
|
|
|
TALER_amount_cmp_currency (&amount,
|
|
|
|
&rtotal))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2016-05-06 13:33:20 +02:00
|
|
|
add = GNUNET_SYSERR;
|
2015-11-11 14:44:08 +01:00
|
|
|
if (0 == strcasecmp (type,
|
|
|
|
"DEPOSIT"))
|
2015-08-08 20:21:13 +02:00
|
|
|
{
|
2020-08-12 20:12:39 +02:00
|
|
|
struct TALER_DepositRequestPS dr = {
|
|
|
|
.purpose.size = htonl (sizeof (dr)),
|
|
|
|
.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_DEPOSIT),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
2017-04-03 22:45:48 +02:00
|
|
|
struct TALER_CoinSpendSignatureP sig;
|
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_sig",
|
2017-04-03 22:45:48 +02:00
|
|
|
&sig),
|
2017-05-29 01:15:41 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_contract_terms",
|
|
|
|
&dr.h_contract_terms),
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_wire",
|
|
|
|
&dr.h_wire),
|
2020-07-08 15:46:51 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_denom_pub",
|
|
|
|
&dr.h_denom_pub),
|
2020-07-05 21:54:11 +02:00
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&dr.wallet_timestamp),
|
|
|
|
TALER_JSON_spec_absolute_time_nbo ("refund_deadline",
|
|
|
|
&dr.refund_deadline),
|
2017-04-18 21:05:27 +02:00
|
|
|
TALER_JSON_spec_amount_nbo ("deposit_fee",
|
2019-08-25 16:18:24 +02:00
|
|
|
&dr.deposit_fee),
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("merchant_pub",
|
|
|
|
&dr.merchant),
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_JSON_spec_end ()
|
2017-04-03 22:45:48 +02:00
|
|
|
};
|
2015-08-08 20:21:13 +02:00
|
|
|
|
2017-04-03 22:45:48 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
2015-11-11 14:44:08 +01:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
2015-08-08 20:21:13 +02:00
|
|
|
}
|
2017-04-18 21:05:27 +02:00
|
|
|
TALER_amount_hton (&dr.amount_with_fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&amount);
|
2015-11-11 14:44:08 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_DEPOSIT,
|
2020-04-08 18:18:20 +02:00
|
|
|
&dr,
|
2015-11-11 14:44:08 +01:00
|
|
|
&sig.eddsa_signature,
|
|
|
|
&coin_pub->eddsa_pub))
|
2017-04-03 22:45:48 +02:00
|
|
|
{
|
2015-11-11 14:44:08 +01:00
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-07-08 21:24:10 +02:00
|
|
|
*h_denom_pub = dr.h_denom_pub;
|
2020-01-18 13:52:10 +01:00
|
|
|
if (NULL != dk)
|
2020-01-17 20:02:25 +01:00
|
|
|
{
|
2020-01-18 13:52:10 +01:00
|
|
|
/* check that deposit fee matches our expectations from /keys! */
|
|
|
|
TALER_amount_ntoh (&fee,
|
|
|
|
&dr.deposit_fee);
|
|
|
|
if ( (GNUNET_YES !=
|
|
|
|
TALER_amount_cmp_currency (&fee,
|
|
|
|
&dk->fee_deposit)) ||
|
|
|
|
(0 !=
|
|
|
|
TALER_amount_cmp (&fee,
|
|
|
|
&dk->fee_deposit)) )
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-01-17 20:02:25 +01:00
|
|
|
}
|
2016-05-06 13:33:20 +02:00
|
|
|
add = GNUNET_YES;
|
2015-11-11 14:44:08 +01:00
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"MELT"))
|
|
|
|
{
|
2017-04-03 22:45:48 +02:00
|
|
|
struct TALER_RefreshMeltCoinAffirmationPS rm;
|
|
|
|
struct TALER_CoinSpendSignatureP sig;
|
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_sig",
|
2017-04-03 22:45:48 +02:00
|
|
|
&sig),
|
2017-11-27 23:42:17 +01:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("rc",
|
|
|
|
&rm.rc),
|
2020-07-08 17:58:45 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_denom_pub",
|
|
|
|
&rm.h_denom_pub),
|
2017-04-18 21:05:27 +02:00
|
|
|
TALER_JSON_spec_amount_nbo ("melt_fee",
|
2019-08-25 16:18:24 +02:00
|
|
|
&rm.melt_fee),
|
|
|
|
GNUNET_JSON_spec_end ()
|
2017-04-03 22:45:48 +02:00
|
|
|
};
|
2015-11-11 14:44:08 +01:00
|
|
|
|
2017-04-03 22:45:48 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
2015-11-11 14:44:08 +01:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-04-18 21:05:27 +02:00
|
|
|
rm.purpose.size = htonl (sizeof (rm));
|
|
|
|
rm.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_MELT);
|
|
|
|
TALER_amount_hton (&rm.amount_with_fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&amount);
|
2017-04-18 21:05:27 +02:00
|
|
|
rm.coin_pub = *coin_pub;
|
2015-11-11 14:44:08 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_MELT,
|
2020-04-08 18:18:20 +02:00
|
|
|
&rm,
|
2015-11-11 14:44:08 +01:00
|
|
|
&sig.eddsa_signature,
|
|
|
|
&coin_pub->eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-07-08 21:24:10 +02:00
|
|
|
*h_denom_pub = rm.h_denom_pub;
|
2020-01-18 13:52:10 +01:00
|
|
|
if (NULL != dk)
|
2020-01-17 20:02:25 +01:00
|
|
|
{
|
2020-01-18 13:52:10 +01:00
|
|
|
/* check that melt fee matches our expectations from /keys! */
|
|
|
|
TALER_amount_ntoh (&fee,
|
|
|
|
&rm.melt_fee);
|
|
|
|
if ( (GNUNET_YES !=
|
|
|
|
TALER_amount_cmp_currency (&fee,
|
|
|
|
&dk->fee_refresh)) ||
|
|
|
|
(0 !=
|
|
|
|
TALER_amount_cmp (&fee,
|
|
|
|
&dk->fee_refresh)) )
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-01-17 20:02:25 +01:00
|
|
|
}
|
2016-05-06 13:33:20 +02:00
|
|
|
add = GNUNET_YES;
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"REFUND"))
|
|
|
|
{
|
2017-04-18 21:05:27 +02:00
|
|
|
struct TALER_MerchantSignatureP sig;
|
2020-05-01 19:22:32 +02:00
|
|
|
struct TALER_Amount refund_fee;
|
2020-08-13 00:45:02 +02:00
|
|
|
struct TALER_Amount sig_amount;
|
2020-05-01 19:22:32 +02:00
|
|
|
struct TALER_RefundRequestPS rr = {
|
|
|
|
.purpose.size = htonl (sizeof (rr)),
|
|
|
|
.purpose.purpose = htonl (TALER_SIGNATURE_MERCHANT_REFUND),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
2017-04-03 22:45:48 +02:00
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_JSON_spec_amount ("refund_fee",
|
|
|
|
&refund_fee),
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("merchant_sig",
|
2017-04-03 22:45:48 +02:00
|
|
|
&sig),
|
2017-05-29 01:15:41 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_contract_terms",
|
|
|
|
&rr.h_contract_terms),
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("merchant_pub",
|
|
|
|
&rr.merchant),
|
|
|
|
GNUNET_JSON_spec_uint64 ("rtransaction_id",
|
2020-08-13 00:45:02 +02:00
|
|
|
&rr.rtransaction_id),
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_JSON_spec_end ()
|
2017-04-03 22:45:48 +02:00
|
|
|
};
|
2016-05-06 13:33:20 +02:00
|
|
|
|
2017-04-03 22:45:48 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
2016-05-06 13:33:20 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-08-13 00:45:02 +02:00
|
|
|
if (0 >
|
|
|
|
TALER_amount_add (&sig_amount,
|
|
|
|
&refund_fee,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-04-18 21:05:27 +02:00
|
|
|
TALER_amount_hton (&rr.refund_amount,
|
2020-08-13 00:45:02 +02:00
|
|
|
&sig_amount);
|
|
|
|
rr.rtransaction_id = GNUNET_htonll (rr.rtransaction_id);
|
|
|
|
TALER_amount_hton (&rr.refund_amount,
|
|
|
|
&sig_amount);
|
2016-05-06 13:33:20 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_MERCHANT_REFUND,
|
2020-04-08 18:18:20 +02:00
|
|
|
&rr,
|
2017-04-18 21:05:27 +02:00
|
|
|
&sig.eddsa_sig,
|
2017-04-03 22:45:48 +02:00
|
|
|
&rr.merchant.eddsa_pub))
|
2016-05-06 13:33:20 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-04-03 22:45:48 +02:00
|
|
|
/* NOTE: theoretically, we could also check that the given
|
2017-05-29 01:15:41 +02:00
|
|
|
merchant_pub and h_contract_terms appear in the
|
2016-05-06 13:33:20 +02:00
|
|
|
history under deposits. However, there is really no benefit
|
|
|
|
for the exchange to lie here, so not checking is probably OK
|
|
|
|
(an auditor ought to check, though). Then again, we similarly
|
|
|
|
had no reason to check the merchant's signature (other than a
|
2020-01-17 19:36:20 +01:00
|
|
|
well-formendess check). *///
|
2020-01-17 20:02:25 +01:00
|
|
|
|
|
|
|
/* check that refund fee matches our expectations from /keys! */
|
2020-01-18 13:52:10 +01:00
|
|
|
if (NULL != dk)
|
2020-01-17 20:02:25 +01:00
|
|
|
{
|
2020-01-18 13:52:10 +01:00
|
|
|
if ( (GNUNET_YES !=
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_amount_cmp_currency (&refund_fee,
|
2020-01-18 13:52:10 +01:00
|
|
|
&dk->fee_refund)) ||
|
|
|
|
(0 !=
|
2020-05-01 19:22:32 +02:00
|
|
|
TALER_amount_cmp (&refund_fee,
|
2020-01-18 13:52:10 +01:00
|
|
|
&dk->fee_refund)) )
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-01-17 20:02:25 +01:00
|
|
|
}
|
2020-01-17 19:36:20 +01:00
|
|
|
add = GNUNET_NO;
|
2015-11-11 14:44:08 +01:00
|
|
|
}
|
2017-04-03 16:49:38 +02:00
|
|
|
else if (0 == strcasecmp (type,
|
2020-01-18 23:49:37 +01:00
|
|
|
"RECOUP"))
|
2017-04-03 16:49:38 +02:00
|
|
|
{
|
2020-07-08 21:24:10 +02:00
|
|
|
struct TALER_RecoupConfirmationPS pc = {
|
|
|
|
.purpose.size = htonl (sizeof (pc)),
|
|
|
|
.purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
|
|
|
struct TALER_RecoupRequestPS rr = {
|
|
|
|
.purpose.size = htonl (sizeof (pc)),
|
|
|
|
.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_RECOUP),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
2017-04-03 22:45:48 +02:00
|
|
|
struct TALER_ExchangePublicKeyP exchange_pub;
|
|
|
|
struct TALER_ExchangeSignatureP exchange_sig;
|
2020-07-08 21:24:10 +02:00
|
|
|
struct TALER_CoinSpendSignatureP coin_sig;
|
2017-04-03 22:45:48 +02:00
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
2020-07-08 21:24:10 +02:00
|
|
|
TALER_JSON_spec_amount_nbo ("amount",
|
|
|
|
&pc.recoup_amount),
|
2017-04-03 22:45:48 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_sig",
|
|
|
|
&exchange_sig),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_pub",
|
|
|
|
&exchange_pub),
|
2017-04-18 21:05:27 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("reserve_pub",
|
|
|
|
&pc.reserve_pub),
|
2020-07-08 21:24:10 +02:00
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_sig",
|
|
|
|
&coin_sig),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_blind",
|
|
|
|
&rr.coin_blind),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_denom_pub",
|
|
|
|
&rr.h_denom_pub),
|
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&pc.timestamp),
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
TALER_amount_hton (&pc.recoup_amount,
|
|
|
|
&amount);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP,
|
|
|
|
&pc,
|
|
|
|
&exchange_sig.eddsa_signature,
|
|
|
|
&exchange_pub.eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_RECOUP,
|
|
|
|
&rr,
|
|
|
|
&coin_sig.eddsa_signature,
|
|
|
|
&coin_pub->eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
*h_denom_pub = rr.h_denom_pub;
|
|
|
|
add = GNUNET_YES;
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"RECOUP-REFRESH"))
|
|
|
|
{
|
|
|
|
struct TALER_RecoupRefreshConfirmationPS pc = {
|
|
|
|
.purpose.size = htonl (sizeof (pc)),
|
|
|
|
.purpose.purpose = htonl (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
|
|
|
struct TALER_RecoupRequestPS rr = {
|
|
|
|
.purpose.size = htonl (sizeof (pc)),
|
|
|
|
.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_RECOUP),
|
|
|
|
.coin_pub = *coin_pub
|
|
|
|
};
|
|
|
|
struct TALER_ExchangePublicKeyP exchange_pub;
|
|
|
|
struct TALER_ExchangeSignatureP exchange_sig;
|
|
|
|
struct TALER_CoinSpendSignatureP coin_sig;
|
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
|
|
|
TALER_JSON_spec_amount_nbo ("amount",
|
|
|
|
&pc.recoup_amount),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_sig",
|
|
|
|
&exchange_sig),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_pub",
|
|
|
|
&exchange_pub),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_sig",
|
|
|
|
&coin_sig),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("old_coin_pub",
|
|
|
|
&pc.old_coin_pub),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_blind",
|
|
|
|
&rr.coin_blind),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("h_denom_pub",
|
|
|
|
&rr.h_denom_pub),
|
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&pc.timestamp),
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
TALER_amount_hton (&pc.recoup_amount,
|
|
|
|
&amount);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH,
|
|
|
|
&pc,
|
|
|
|
&exchange_sig.eddsa_signature,
|
|
|
|
&exchange_pub.eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_RECOUP,
|
|
|
|
&rr,
|
|
|
|
&coin_sig.eddsa_signature,
|
|
|
|
&coin_pub->eddsa_pub))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
*h_denom_pub = rr.h_denom_pub;
|
|
|
|
add = GNUNET_YES;
|
|
|
|
}
|
|
|
|
else if (0 == strcasecmp (type,
|
|
|
|
"OLD-COIN-RECOUP"))
|
|
|
|
{
|
|
|
|
struct TALER_RecoupRefreshConfirmationPS pc = {
|
|
|
|
.purpose.size = htonl (sizeof (pc)),
|
|
|
|
.purpose.purpose = htonl (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH),
|
|
|
|
.old_coin_pub = *coin_pub
|
|
|
|
};
|
|
|
|
struct TALER_ExchangePublicKeyP exchange_pub;
|
|
|
|
struct TALER_ExchangeSignatureP exchange_sig;
|
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
|
|
|
TALER_JSON_spec_amount_nbo ("amount",
|
|
|
|
&pc.recoup_amount),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_sig",
|
|
|
|
&exchange_sig),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("exchange_pub",
|
|
|
|
&exchange_pub),
|
|
|
|
GNUNET_JSON_spec_fixed_auto ("coin_pub",
|
|
|
|
&pc.coin_pub),
|
2020-07-05 21:54:11 +02:00
|
|
|
TALER_JSON_spec_absolute_time_nbo ("timestamp",
|
|
|
|
&pc.timestamp),
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_JSON_spec_end ()
|
2017-04-03 22:45:48 +02:00
|
|
|
};
|
2017-04-03 16:49:38 +02:00
|
|
|
|
2017-04-03 22:45:48 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (transaction,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-01-18 23:49:37 +01:00
|
|
|
TALER_amount_hton (&pc.recoup_amount,
|
2019-08-25 16:18:24 +02:00
|
|
|
&amount);
|
2017-04-03 22:45:48 +02:00
|
|
|
if (GNUNET_OK !=
|
2020-07-10 22:33:04 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_verify (
|
|
|
|
TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH,
|
|
|
|
&pc,
|
|
|
|
&exchange_sig.eddsa_signature,
|
|
|
|
&exchange_pub.eddsa_pub))
|
2017-04-03 22:45:48 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
add = GNUNET_YES;
|
2017-04-03 16:49:38 +02:00
|
|
|
}
|
2015-11-11 14:44:08 +01:00
|
|
|
else
|
|
|
|
{
|
2015-08-08 20:21:13 +02:00
|
|
|
/* signature not supported, new version on server? */
|
2015-11-11 14:44:08 +01:00
|
|
|
GNUNET_break_op (0);
|
2020-07-10 22:33:04 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected type `%s' in response\n",
|
|
|
|
type);
|
2020-01-18 19:16:33 +01:00
|
|
|
GNUNET_assert (GNUNET_SYSERR == add);
|
2015-08-08 20:21:13 +02:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-07-08 21:24:10 +02:00
|
|
|
|
2016-05-06 13:33:20 +02:00
|
|
|
if (GNUNET_YES == add)
|
2015-08-08 20:21:13 +02:00
|
|
|
{
|
2016-05-06 13:33:20 +02:00
|
|
|
/* This amount should be added to the total */
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2016-05-06 13:33:20 +02:00
|
|
|
TALER_amount_add (total,
|
|
|
|
total,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
/* overflow in history already!? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* This amount should be subtracted from the total.
|
|
|
|
|
|
|
|
However, for the implementation, we first *add* up all of
|
|
|
|
these negative amounts, as we might get refunds before
|
|
|
|
deposits from a semi-evil exchange. Then, at the end, we do
|
2019-10-31 12:59:50 +01:00
|
|
|
the subtraction by calculating "total = total - rtotal" */GNUNET_assert (GNUNET_NO == add);
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2016-05-06 13:33:20 +02:00
|
|
|
TALER_amount_add (&rtotal,
|
|
|
|
&rtotal,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
/* overflow in refund history? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2020-07-08 21:24:10 +02:00
|
|
|
|
2015-08-08 20:21:13 +02:00
|
|
|
}
|
|
|
|
}
|
2016-05-06 13:33:20 +02:00
|
|
|
|
2020-07-08 21:24:10 +02:00
|
|
|
|
2016-05-06 13:33:20 +02:00
|
|
|
/* Finally, subtract 'rtotal' from total to handle the subtractions */
|
2020-04-08 23:52:01 +02:00
|
|
|
if (0 >
|
2016-05-06 13:33:20 +02:00
|
|
|
TALER_amount_subtract (total,
|
|
|
|
total,
|
|
|
|
&rtotal))
|
|
|
|
{
|
|
|
|
/* underflow in history? inconceivable! Bad exchange! */
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
2015-08-08 20:21:13 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-11-17 16:11:47 +01:00
|
|
|
/**
|
|
|
|
* Obtain meta data about an exchange (online) signing
|
|
|
|
* key.
|
|
|
|
*
|
|
|
|
* @param keys from where to obtain the meta data
|
|
|
|
* @param exchange_pub public key to lookup
|
|
|
|
* @return NULL on error (@a exchange_pub not known)
|
|
|
|
*/
|
|
|
|
const struct TALER_EXCHANGE_SigningPublicKey *
|
2020-03-17 17:47:53 +01:00
|
|
|
TALER_EXCHANGE_get_signing_key_info (
|
|
|
|
const struct TALER_EXCHANGE_Keys *keys,
|
|
|
|
const struct TALER_ExchangePublicKeyP *exchange_pub)
|
2018-11-17 16:11:47 +01:00
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
for (unsigned int i = 0; i<keys->num_sign_keys; i++)
|
2018-11-17 16:11:47 +01:00
|
|
|
{
|
2020-02-27 23:46:53 +01:00
|
|
|
const struct TALER_EXCHANGE_SigningPublicKey *spk
|
|
|
|
= &keys->sign_keys[i];
|
2018-11-17 16:11:47 +01:00
|
|
|
|
2019-04-08 20:48:33 +02:00
|
|
|
if (0 == GNUNET_memcmp (exchange_pub,
|
|
|
|
&spk->key))
|
2018-11-17 16:11:47 +01:00
|
|
|
return spk;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-10-31 12:59:50 +01:00
|
|
|
|
2016-03-01 15:35:04 +01:00
|
|
|
/* end of exchange_api_common.c */
|