2015-01-16 13:50:07 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2015-02-08 00:16:22 +01:00
|
|
|
Copyright (C) 2014, 2015 GNUnet e.V.
|
2015-01-16 13:50:07 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU Affero General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file taler-mint-httpd_responses.c
|
|
|
|
* @brief API for generating the various replies of the mint; these
|
|
|
|
* functions are called TALER_MINT_reply_ and they generate
|
|
|
|
* and queue MHD response objects for a given connection.
|
|
|
|
* @author Florian Dold
|
|
|
|
* @author Benedikt Mueller
|
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "taler-mint-httpd_responses.h"
|
2015-01-28 20:55:15 +01:00
|
|
|
#include "taler_util.h"
|
2015-01-27 14:55:05 +01:00
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
2015-01-28 21:08:19 +01:00
|
|
|
#include "taler-mint-httpd_keystate.h"
|
2015-01-16 13:50:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-28 19:58:20 +01:00
|
|
|
* Send JSON object as response.
|
2015-01-16 13:50:07 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection
|
|
|
|
* @param json the json object
|
|
|
|
* @param response_code the http response code
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_json (struct MHD_Connection *connection,
|
2015-01-28 19:58:20 +01:00
|
|
|
const json_t *json,
|
2015-01-16 13:50:07 +01:00
|
|
|
unsigned int response_code)
|
|
|
|
{
|
|
|
|
struct MHD_Response *resp;
|
|
|
|
char *json_str;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
json_str = json_dumps (json, JSON_INDENT(2));
|
|
|
|
resp = MHD_create_response_from_buffer (strlen (json_str), json_str,
|
|
|
|
MHD_RESPMEM_MUST_FREE);
|
|
|
|
if (NULL == resp)
|
|
|
|
return MHD_NO;
|
|
|
|
(void) MHD_add_response_header (resp,
|
|
|
|
MHD_HTTP_HEADER_CONTENT_TYPE,
|
|
|
|
"application/json");
|
|
|
|
ret = MHD_queue_response (connection, response_code, resp);
|
|
|
|
MHD_destroy_response (resp);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function to call to handle the request by building a JSON
|
|
|
|
* reply from a format string and varargs.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param response_code HTTP response code to use
|
|
|
|
* @param fmt format string for pack
|
|
|
|
* @param ... varargs
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_json_pack (struct MHD_Connection *connection,
|
|
|
|
unsigned int response_code,
|
|
|
|
const char *fmt,
|
|
|
|
...)
|
|
|
|
{
|
|
|
|
json_t *json;
|
|
|
|
va_list argp;
|
2015-01-28 19:58:20 +01:00
|
|
|
int ret;
|
2015-01-16 13:50:07 +01:00
|
|
|
|
|
|
|
va_start (argp, fmt);
|
|
|
|
json = json_vpack_ex (NULL, 0, fmt, argp);
|
|
|
|
va_end (argp);
|
|
|
|
if (NULL == json)
|
|
|
|
return MHD_NO;
|
2015-01-28 19:58:20 +01:00
|
|
|
ret = TALER_MINT_reply_json (connection,
|
|
|
|
json,
|
|
|
|
response_code);
|
|
|
|
json_decref (json);
|
|
|
|
return ret;
|
2015-01-16 13:50:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send a response indicating an invalid argument.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @param param_name the parameter that is invalid
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_arg_invalid (struct MHD_Connection *connection,
|
|
|
|
const char *param_name)
|
|
|
|
{
|
2015-01-28 19:58:20 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s, s:s}",
|
|
|
|
"error", "invalid parameter",
|
|
|
|
"parameter", param_name);
|
2015-01-16 13:50:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-28 14:55:25 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating an invalid coin. (I.e. the signature
|
|
|
|
* over the public key of the coin does not match a valid signing key
|
|
|
|
* of this mint).
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_coin_invalid (struct MHD_Connection *connection)
|
|
|
|
{
|
|
|
|
/* TODO: may want to be more precise in the future and
|
|
|
|
distinguish bogus signatures from bogus public keys. */
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "Coin is not valid");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-16 13:50:07 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating a missing argument.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @param param_name the parameter that is missing
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_arg_missing (struct MHD_Connection *connection,
|
|
|
|
const char *param_name)
|
|
|
|
{
|
2015-01-28 19:58:20 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{ s:s, s:s}",
|
|
|
|
"error", "missing parameter",
|
|
|
|
"parameter", param_name);
|
2015-01-16 13:50:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-16 14:27:42 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating an internal error.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @param hint hint about the internal error's nature
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_internal_error (struct MHD_Connection *connection,
|
|
|
|
const char *hint)
|
|
|
|
{
|
2015-01-28 19:58:20 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s, s:s}",
|
|
|
|
"error", "internal error",
|
|
|
|
"hint", hint);
|
2015-01-16 14:27:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-31 15:42:00 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating an external error.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @param hint hint about the error's nature
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_external_error (struct MHD_Connection *connection,
|
|
|
|
const char *hint)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s, s:s}",
|
|
|
|
"error", "client error",
|
|
|
|
"hint", hint);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-28 22:47:03 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating an error committing a
|
|
|
|
* transaction (concurrent interference).
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_commit_error (struct MHD_Connection *connection)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "commit failure");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-21 14:21:58 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating a failure to talk to the Mint's
|
|
|
|
* database.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_internal_db_error (struct MHD_Connection *connection)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_internal_error (connection,
|
|
|
|
"Failed to connect to database");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-16 14:27:42 +01:00
|
|
|
/**
|
|
|
|
* Send a response indicating that the request was too big.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_request_too_large (struct MHD_Connection *connection)
|
|
|
|
{
|
|
|
|
struct MHD_Response *resp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
resp = MHD_create_response_from_buffer (0,
|
|
|
|
NULL,
|
|
|
|
MHD_RESPMEM_PERSISTENT);
|
|
|
|
if (NULL == resp)
|
|
|
|
return MHD_NO;
|
|
|
|
ret = MHD_queue_response (connection,
|
|
|
|
MHD_HTTP_REQUEST_ENTITY_TOO_LARGE,
|
|
|
|
resp);
|
|
|
|
MHD_destroy_response (resp);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send a response indicating that the JSON was malformed.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to use
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_invalid_json (struct MHD_Connection *connection)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"invalid json");
|
|
|
|
}
|
|
|
|
|
2015-01-16 13:50:07 +01:00
|
|
|
|
2015-01-19 21:04:58 +01:00
|
|
|
/**
|
2015-01-28 15:35:41 +01:00
|
|
|
* Send confirmation of deposit success to client. This function
|
|
|
|
* will create a signed message affirming the given information
|
|
|
|
* and return it to the client. By this, the mint affirms that
|
|
|
|
* the coin had sufficient (residual) value for the specified
|
|
|
|
* transaction and that it will execute the requested deposit
|
|
|
|
* operation with the given wiring details.
|
2015-01-19 21:04:58 +01:00
|
|
|
*
|
|
|
|
* @param connection connection to the client
|
2015-01-28 15:35:41 +01:00
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param h_wire hash of wire details
|
|
|
|
* @param h_contract hash of contract details
|
|
|
|
* @param transaction_id transaction ID
|
|
|
|
* @param merchant merchant public key
|
|
|
|
* @param amount fraction of coin value to deposit
|
2015-01-19 21:04:58 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_deposit_success (struct MHD_Connection *connection,
|
2015-01-28 15:35:41 +01:00
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub,
|
|
|
|
const struct GNUNET_HashCode *h_wire,
|
|
|
|
const struct GNUNET_HashCode *h_contract,
|
|
|
|
uint64_t transaction_id,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *merchant,
|
|
|
|
const struct TALER_Amount *amount)
|
2015-01-19 21:04:58 +01:00
|
|
|
{
|
2015-01-28 19:48:41 +01:00
|
|
|
struct TALER_DepositConfirmation dc;
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature sig;
|
|
|
|
json_t *sig_json;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
dc.purpose.purpose = htonl (TALER_SIGNATURE_MINT_DEPOSIT);
|
|
|
|
dc.purpose.size = htonl (sizeof (struct TALER_DepositConfirmation));
|
|
|
|
dc.h_contract = *h_contract;
|
|
|
|
dc.h_wire = *h_wire;
|
|
|
|
dc.transaction_id = GNUNET_htonll (transaction_id);
|
|
|
|
dc.amount = TALER_amount_hton (*amount);
|
|
|
|
dc.coin_pub = *coin_pub;
|
|
|
|
dc.merchant = *merchant;
|
2015-01-30 14:08:43 +01:00
|
|
|
TALER_MINT_keys_sign (&dc.purpose,
|
|
|
|
&sig);
|
2015-03-09 12:29:41 +01:00
|
|
|
sig_json = TALER_JSON_from_eddsa_sig (&dc.purpose, &sig);
|
2015-01-28 19:48:41 +01:00
|
|
|
ret = TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_OK,
|
|
|
|
"{s:s, s:o}",
|
|
|
|
"status", "DEPOSIT_OK",
|
|
|
|
"signature", sig_json);
|
|
|
|
json_decref (sig_json);
|
|
|
|
return ret;
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-16 13:50:07 +01:00
|
|
|
|
2015-01-29 00:09:48 +01:00
|
|
|
/**
|
2015-03-10 16:15:14 +01:00
|
|
|
* Compile the transaction history of a coin into a JSON object.
|
2015-01-29 00:09:48 +01:00
|
|
|
*
|
2015-03-10 16:15:14 +01:00
|
|
|
* @param tl transaction history to JSON-ify
|
|
|
|
* @return json representation of the @a rh
|
2015-01-29 00:09:48 +01:00
|
|
|
*/
|
2015-03-10 16:15:14 +01:00
|
|
|
static json_t *
|
|
|
|
compile_transaction_history (const struct TALER_MINT_DB_TransactionList *tl)
|
2015-01-29 00:09:48 +01:00
|
|
|
{
|
2015-03-09 12:29:41 +01:00
|
|
|
json_t *transaction;
|
|
|
|
const char *type;
|
|
|
|
struct TALER_Amount value;
|
2015-03-10 16:15:14 +01:00
|
|
|
json_t *history;
|
|
|
|
const struct TALER_MINT_DB_TransactionList *pos;
|
2015-01-29 00:09:48 +01:00
|
|
|
|
2015-03-09 12:29:41 +01:00
|
|
|
history = json_array ();
|
2015-01-29 00:09:48 +01:00
|
|
|
for (pos = tl; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_TT_DEPOSIT:
|
2015-03-09 12:29:41 +01:00
|
|
|
{
|
|
|
|
struct TALER_DepositRequest dr;
|
|
|
|
const struct Deposit *deposit = pos->details.deposit;
|
|
|
|
|
|
|
|
type = "deposit";
|
|
|
|
value = deposit->amount;
|
|
|
|
dr.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_DEPOSIT);
|
|
|
|
dr.purpose.size = htonl (sizeof (struct TALER_DepositRequest));
|
|
|
|
dr.h_contract = deposit->h_contract;
|
|
|
|
dr.h_wire = deposit->h_wire;
|
|
|
|
dr.transaction_id = GNUNET_htonll (deposit->transaction_id);
|
|
|
|
dr.amount = TALER_amount_hton (deposit->amount);
|
|
|
|
dr.coin_pub = deposit->coin.coin_pub;
|
|
|
|
transaction = TALER_JSON_from_ecdsa_sig (&dr.purpose,
|
|
|
|
&deposit->csig);
|
|
|
|
break;
|
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
case TALER_MINT_DB_TT_REFRESH_MELT:
|
2015-03-09 12:29:41 +01:00
|
|
|
{
|
2015-03-10 17:00:12 +01:00
|
|
|
struct RefreshMeltCoinSignature ms;
|
2015-03-09 12:29:41 +01:00
|
|
|
const struct RefreshMelt *melt = pos->details.melt;
|
|
|
|
|
|
|
|
type = "melt";
|
|
|
|
value = melt->amount;
|
2015-03-10 17:00:12 +01:00
|
|
|
ms.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_MELT_COIN);
|
|
|
|
ms.purpose.size = htonl (sizeof (struct RefreshMeltCoinSignature));
|
2015-03-09 12:29:41 +01:00
|
|
|
ms.melt_hash = melt->melt_hash;
|
|
|
|
ms.amount = TALER_amount_hton (melt->amount);
|
2015-03-10 17:00:12 +01:00
|
|
|
ms.coin_pub = melt->coin.coin_pub;
|
2015-03-09 12:29:41 +01:00
|
|
|
transaction = TALER_JSON_from_ecdsa_sig (&ms.purpose,
|
|
|
|
&melt->coin_sig);
|
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_TT_LOCK:
|
2015-03-09 12:29:41 +01:00
|
|
|
{
|
|
|
|
type = "lock";
|
|
|
|
value = pos->details.lock->amount;
|
|
|
|
transaction = NULL;
|
|
|
|
GNUNET_break (0); /* #3625: Lock NOT implemented! */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
GNUNET_assert (0);
|
2015-01-29 00:09:48 +01:00
|
|
|
}
|
2015-03-09 12:29:41 +01:00
|
|
|
json_array_append_new (history,
|
|
|
|
json_pack ("{s:s, s:o}",
|
|
|
|
"type", type,
|
|
|
|
"amount", TALER_JSON_from_amount (value),
|
|
|
|
"signature", transaction));
|
2015-01-29 00:09:48 +01:00
|
|
|
}
|
2015-03-10 16:15:14 +01:00
|
|
|
return history;
|
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
|
2015-03-10 16:15:14 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Send proof that a /withdraw request is invalid to client. This
|
|
|
|
* function will create a message with all of the operations affecting
|
|
|
|
* the coin that demonstrate that the coin has insufficient value.
|
|
|
|
*
|
|
|
|
* @param connection connection to the client
|
|
|
|
* @param tl transaction list to use to build reply
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_deposit_insufficient_funds (struct MHD_Connection *connection,
|
|
|
|
const struct TALER_MINT_DB_TransactionList *tl)
|
|
|
|
{
|
|
|
|
json_t *history;
|
|
|
|
|
|
|
|
history = compile_transaction_history (tl);
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_FORBIDDEN,
|
|
|
|
"{s:s, s:o}",
|
|
|
|
"error", "insufficient funds",
|
|
|
|
"history", history);
|
2015-01-29 00:09:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-19 21:53:23 +01:00
|
|
|
/**
|
2015-01-29 00:45:07 +01:00
|
|
|
* Compile the history of a reserve into a JSON object
|
|
|
|
* and calculate the total balance.
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
2015-01-29 00:45:07 +01:00
|
|
|
* @param rh reserve history to JSON-ify
|
|
|
|
* @param balance[OUT] set to current reserve balance
|
|
|
|
* @return json representation of the @a rh
|
2015-01-19 21:53:23 +01:00
|
|
|
*/
|
2015-01-29 00:45:07 +01:00
|
|
|
static json_t *
|
|
|
|
compile_reserve_history (const struct ReserveHistory *rh,
|
|
|
|
struct TALER_Amount *balance)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
2015-01-29 00:09:48 +01:00
|
|
|
struct TALER_Amount deposit_total;
|
|
|
|
struct TALER_Amount withdraw_total;
|
|
|
|
struct TALER_Amount value;
|
|
|
|
json_t *json_history;
|
2015-03-09 13:04:51 +01:00
|
|
|
json_t *transaction;
|
2015-01-28 19:58:20 +01:00
|
|
|
int ret;
|
2015-01-29 00:09:48 +01:00
|
|
|
const struct ReserveHistory *pos;
|
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki;
|
2015-01-29 00:45:07 +01:00
|
|
|
struct MintKeyState *key_state;
|
2015-03-09 13:04:51 +01:00
|
|
|
struct TALER_WithdrawRequest wr;
|
2015-01-29 00:09:48 +01:00
|
|
|
|
|
|
|
json_history = json_array ();
|
|
|
|
ret = 0;
|
|
|
|
for (pos = rh; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_RO_BANK_TO_MINT:
|
|
|
|
if (0 == ret)
|
|
|
|
deposit_total = pos->details.bank->amount;
|
|
|
|
else
|
|
|
|
deposit_total = TALER_amount_add (deposit_total,
|
|
|
|
pos->details.bank->amount);
|
|
|
|
ret = 1;
|
|
|
|
json_array_append_new (json_history,
|
|
|
|
json_pack ("{s:s, s:o, s:o}",
|
|
|
|
"type", "DEPOSIT",
|
|
|
|
"wire", pos->details.bank->wire,
|
|
|
|
"amount", TALER_JSON_from_amount (pos->details.bank->amount)));
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_RO_WITHDRAW_COIN:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
key_state = TALER_MINT_key_state_acquire ();
|
|
|
|
ret = 0;
|
|
|
|
for (pos = rh; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_RO_BANK_TO_MINT:
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_RO_WITHDRAW_COIN:
|
2015-03-09 13:04:51 +01:00
|
|
|
|
2015-01-29 00:09:48 +01:00
|
|
|
dki = TALER_MINT_get_denom_key (key_state,
|
|
|
|
pos->details.withdraw->denom_pub);
|
|
|
|
value = TALER_amount_ntoh (dki->issue.value);
|
|
|
|
if (0 == ret)
|
|
|
|
withdraw_total = value;
|
|
|
|
else
|
|
|
|
withdraw_total = TALER_amount_add (withdraw_total,
|
|
|
|
value);
|
|
|
|
ret = 1;
|
2015-03-09 13:04:51 +01:00
|
|
|
wr.purpose.purpose = htonl (TALER_SIGNATURE_WITHDRAW);
|
|
|
|
wr.purpose.size = htonl (sizeof (struct TALER_WithdrawRequest));
|
|
|
|
wr.reserve_pub = pos->details.withdraw->reserve_pub;
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (pos->details.withdraw->denom_pub,
|
|
|
|
&wr.h_denomination_pub);
|
|
|
|
wr.h_coin_envelope = pos->details.withdraw->h_coin_envelope;
|
|
|
|
|
|
|
|
transaction = TALER_JSON_from_eddsa_sig (&wr.purpose,
|
|
|
|
&pos->details.withdraw->reserve_sig);
|
|
|
|
|
2015-01-29 00:09:48 +01:00
|
|
|
json_array_append_new (json_history,
|
|
|
|
json_pack ("{s:s, s:o, s:o}",
|
|
|
|
"type", "WITHDRAW",
|
2015-03-09 13:04:51 +01:00
|
|
|
"signature", transaction,
|
2015-01-29 00:09:48 +01:00
|
|
|
"amount", TALER_JSON_from_amount (value)));
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-19 21:53:23 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
*balance = TALER_amount_subtract (deposit_total,
|
|
|
|
withdraw_total);
|
|
|
|
return json_history;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send reserve status information to client.
|
|
|
|
*
|
|
|
|
* @param connection connection to the client
|
|
|
|
* @param rh reserve history to return
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_withdraw_status_success (struct MHD_Connection *connection,
|
|
|
|
const struct ReserveHistory *rh)
|
|
|
|
{
|
|
|
|
json_t *json_balance;
|
|
|
|
json_t *json_history;
|
|
|
|
struct TALER_Amount balance;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
json_history = compile_reserve_history (rh,
|
|
|
|
&balance);
|
2015-01-28 19:58:20 +01:00
|
|
|
json_balance = TALER_JSON_from_amount (balance);
|
|
|
|
ret = TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_OK,
|
|
|
|
"{s:o, s:o}",
|
|
|
|
"balance", json_balance,
|
2015-01-29 00:09:48 +01:00
|
|
|
"history", json_history);
|
|
|
|
json_decref (json_history);
|
2015-01-28 19:58:20 +01:00
|
|
|
json_decref (json_balance);
|
|
|
|
return ret;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/**
|
|
|
|
* Send reserve status information to client with the
|
|
|
|
* message that we have insufficient funds for the
|
|
|
|
* requested /withdraw/sign operation.
|
|
|
|
*
|
|
|
|
* @param connection connection to the client
|
|
|
|
* @param rh reserve history to return
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_withdraw_sign_insufficient_funds (struct MHD_Connection *connection,
|
|
|
|
const struct ReserveHistory *rh)
|
|
|
|
{
|
|
|
|
json_t *json_balance;
|
|
|
|
json_t *json_history;
|
|
|
|
struct TALER_Amount balance;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
json_history = compile_reserve_history (rh,
|
|
|
|
&balance);
|
|
|
|
json_balance = TALER_JSON_from_amount (balance);
|
|
|
|
ret = TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_PAYMENT_REQUIRED,
|
|
|
|
"{s:s, s:o, s:o}",
|
|
|
|
"error", "Insufficient funds"
|
|
|
|
"balance", json_balance,
|
|
|
|
"history", json_history);
|
|
|
|
json_decref (json_history);
|
|
|
|
json_decref (json_balance);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-19 21:53:23 +01:00
|
|
|
/**
|
|
|
|
* Send blinded coin information to client.
|
|
|
|
*
|
|
|
|
* @param connection connection to the client
|
|
|
|
* @param collectable blinded coin to return
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_withdraw_sign_success (struct MHD_Connection *connection,
|
|
|
|
const struct CollectableBlindcoin *collectable)
|
|
|
|
{
|
2015-01-28 19:58:20 +01:00
|
|
|
json_t *sig_json;
|
2015-01-26 12:22:26 +01:00
|
|
|
size_t sig_buf_size;
|
|
|
|
char *sig_buf;
|
2015-01-28 19:58:20 +01:00
|
|
|
int ret;
|
2015-01-19 21:53:23 +01:00
|
|
|
|
2015-01-26 12:22:26 +01:00
|
|
|
sig_buf_size = GNUNET_CRYPTO_rsa_signature_encode (collectable->sig,
|
|
|
|
&sig_buf);
|
2015-01-28 19:58:20 +01:00
|
|
|
sig_json = TALER_JSON_from_data (sig_buf,
|
|
|
|
sig_buf_size);
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_free (sig_buf);
|
2015-01-28 19:58:20 +01:00
|
|
|
ret = TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_OK,
|
|
|
|
"{s:o}",
|
|
|
|
"ev_sig", sig_json);
|
|
|
|
json_decref (sig_json);
|
|
|
|
return ret;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-20 17:12:51 +01:00
|
|
|
/**
|
2015-03-10 16:15:14 +01:00
|
|
|
* Send a response for a failed "/refresh/melt" request. The
|
|
|
|
* transaction history of the given coin demonstrates that the
|
|
|
|
* @a residual value of the coin is below the @a requested
|
|
|
|
* contribution of the coin for the melt. Thus, the mint
|
|
|
|
* refuses the melt operation.
|
2015-01-20 17:12:51 +01:00
|
|
|
*
|
|
|
|
* @param connection the connection to send the response to
|
2015-03-10 16:15:14 +01:00
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param coin_value original value of the coin
|
|
|
|
* @param tl transaction history for the coin
|
|
|
|
* @param requested how much this coin was supposed to contribute
|
|
|
|
* @param residual remaining value of the coin (after subtracting @a tl)
|
2015-01-20 17:12:51 +01:00
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-10 16:15:14 +01:00
|
|
|
TALER_MINT_reply_refresh_melt_insufficient_funds (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub,
|
|
|
|
struct TALER_Amount coin_value,
|
|
|
|
struct TALER_MINT_DB_TransactionList *tl,
|
|
|
|
struct TALER_Amount requested,
|
|
|
|
struct TALER_Amount residual)
|
2015-01-20 17:12:51 +01:00
|
|
|
{
|
2015-03-10 16:15:14 +01:00
|
|
|
json_t *history;
|
2015-01-20 17:12:51 +01:00
|
|
|
|
2015-03-10 16:15:14 +01:00
|
|
|
history = compile_transaction_history (tl);
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s, s:o, s:o, s:o, s:o, s:o}",
|
|
|
|
"error", "insufficient funds",
|
|
|
|
"coin-pub", TALER_JSON_from_data (coin_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)),
|
|
|
|
"original-value", TALER_JSON_from_amount (coin_value),
|
|
|
|
"residual-value", TALER_JSON_from_amount (residual),
|
|
|
|
"requested-value", TALER_JSON_from_amount (requested),
|
|
|
|
"history", history);
|
2015-01-20 17:12:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-20 15:17:41 +01:00
|
|
|
/**
|
2015-03-10 16:15:14 +01:00
|
|
|
* Send a response to a "/refresh/melt" request.
|
2015-01-20 15:17:41 +01:00
|
|
|
*
|
|
|
|
* @param connection the connection to send the response to
|
2015-03-09 13:21:55 +01:00
|
|
|
* @param session_hash hash of the refresh session
|
|
|
|
* @param noreveal_index which index will the client not have to reveal
|
2015-01-20 15:17:41 +01:00
|
|
|
* @return a MHD status code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-10 16:15:14 +01:00
|
|
|
TALER_MINT_reply_refresh_melt_success (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_HashCode *session_hash,
|
|
|
|
uint16_t noreveal_index)
|
2015-01-20 15:17:41 +01:00
|
|
|
{
|
2015-03-10 16:15:14 +01:00
|
|
|
struct RefreshMeltResponseSignatureBody body;
|
2015-01-20 15:17:41 +01:00
|
|
|
struct GNUNET_CRYPTO_EddsaSignature sig;
|
|
|
|
json_t *sig_json;
|
2015-01-28 19:58:20 +01:00
|
|
|
int ret;
|
2015-01-20 15:17:41 +01:00
|
|
|
|
2015-03-10 16:15:14 +01:00
|
|
|
body.purpose.size = htonl (sizeof (struct RefreshMeltResponseSignatureBody));
|
|
|
|
body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_MELT_RESPONSE);
|
2015-03-09 13:21:55 +01:00
|
|
|
body.session_hash = *session_hash;
|
|
|
|
body.noreveal_index = htons (noreveal_index);
|
2015-01-20 15:17:41 +01:00
|
|
|
TALER_MINT_keys_sign (&body.purpose,
|
|
|
|
&sig);
|
2015-03-09 13:21:55 +01:00
|
|
|
sig_json = TALER_JSON_from_eddsa_sig (&body.purpose,
|
|
|
|
&sig);
|
2015-01-20 15:17:41 +01:00
|
|
|
GNUNET_assert (NULL != sig_json);
|
2015-01-28 19:58:20 +01:00
|
|
|
ret = TALER_MINT_reply_json_pack (connection,
|
2015-01-20 15:17:41 +01:00
|
|
|
MHD_HTTP_OK,
|
|
|
|
"{s:i, s:o}",
|
2015-03-09 13:21:55 +01:00
|
|
|
"noreveal_index", (int) noreveal_index,
|
2015-01-20 15:17:41 +01:00
|
|
|
"signature", sig_json);
|
2015-01-28 19:58:20 +01:00
|
|
|
json_decref (sig_json);
|
|
|
|
return ret;
|
2015-01-20 15:17:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-21 13:38:57 +01:00
|
|
|
/**
|
|
|
|
* Send a response for "/refresh/reveal".
|
|
|
|
*
|
|
|
|
* @param connection the connection to send the response to
|
|
|
|
* @param num_newcoins number of new coins for which we reveal data
|
|
|
|
* @param sigs array of @a num_newcoins signatures revealed
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_refresh_reveal_success (struct MHD_Connection *connection,
|
|
|
|
unsigned int num_newcoins,
|
2015-01-27 15:22:34 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature **sigs)
|
2015-01-21 13:38:57 +01:00
|
|
|
{
|
|
|
|
int newcoin_index;
|
|
|
|
json_t *root;
|
|
|
|
json_t *list;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *buf;
|
|
|
|
size_t buf_size;
|
2015-01-28 19:58:20 +01:00
|
|
|
int ret;
|
2015-01-21 13:38:57 +01:00
|
|
|
|
|
|
|
root = json_object ();
|
|
|
|
list = json_array ();
|
|
|
|
json_object_set_new (root, "ev_sigs", list);
|
|
|
|
for (newcoin_index = 0; newcoin_index < num_newcoins; newcoin_index++)
|
2015-01-26 12:22:26 +01:00
|
|
|
{
|
2015-01-27 14:55:05 +01:00
|
|
|
buf_size = GNUNET_CRYPTO_rsa_signature_encode (sigs[newcoin_index],
|
2015-01-26 12:22:26 +01:00
|
|
|
&buf);
|
2015-01-21 13:38:57 +01:00
|
|
|
json_array_append_new (list,
|
2015-01-26 12:22:26 +01:00
|
|
|
TALER_JSON_from_data (buf,
|
|
|
|
buf_size));
|
|
|
|
GNUNET_free (buf);
|
|
|
|
}
|
2015-01-28 19:58:20 +01:00
|
|
|
ret = TALER_MINT_reply_json (connection,
|
|
|
|
root,
|
|
|
|
MHD_HTTP_OK);
|
|
|
|
json_decref (root);
|
|
|
|
return ret;
|
2015-01-21 13:38:57 +01:00
|
|
|
}
|
2015-01-20 15:17:41 +01:00
|
|
|
|
|
|
|
|
2015-03-13 09:49:47 +01:00
|
|
|
/**
|
|
|
|
* Send a response for a failed "/refresh/reveal", where the
|
|
|
|
* revealed value(s) do not match the original commitment.
|
|
|
|
*
|
|
|
|
* FIXME: should also include the client's signature over
|
|
|
|
* the original reveal operation and the data that was signed
|
|
|
|
* over eventually... (#3712)
|
|
|
|
*
|
|
|
|
* @param connection the connection to send the response to
|
|
|
|
* @param off offset in the array of kappa-commitments where
|
|
|
|
* the missmatch was detected
|
|
|
|
* @param j index of the coin for which the missmatch was
|
|
|
|
* detected
|
|
|
|
* @param missmatch_object name of the object that was
|
|
|
|
* bogus (i.e. "transfer key").
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_refresh_reveal_missmatch (struct MHD_Connection *connection,
|
|
|
|
unsigned int off,
|
|
|
|
unsigned int j,
|
|
|
|
const char *missmatch_object)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s, s:i, s:i, s:s}",
|
|
|
|
"error", "commitment violation",
|
|
|
|
"offset", (int) off,
|
|
|
|
"index", (int) j,
|
|
|
|
"object", missmatch_object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-31 20:53:19 +01:00
|
|
|
/**
|
|
|
|
* Send a response for "/refresh/link".
|
|
|
|
*
|
|
|
|
* @param connection the connection to send the response to
|
|
|
|
* @param transfer_pub transfer public key
|
|
|
|
* @param shared_secret_enc encrypted shared secret
|
|
|
|
* @param ldl linked list with link data
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_reply_refresh_link_success (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *transfer_pub,
|
|
|
|
const struct TALER_EncryptedLinkSecret *shared_secret_enc,
|
|
|
|
const struct LinkDataList *ldl)
|
|
|
|
{
|
|
|
|
const struct LinkDataList *pos;
|
|
|
|
json_t *root;
|
|
|
|
json_t *list;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
list = json_array ();
|
|
|
|
for (pos = ldl; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
json_t *obj;
|
|
|
|
char *buf;
|
|
|
|
size_t buf_len;
|
|
|
|
|
|
|
|
obj = json_object ();
|
|
|
|
json_object_set_new (obj, "link_enc",
|
|
|
|
TALER_JSON_from_data (ldl->link_data_enc->coin_priv_enc,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey) +
|
|
|
|
ldl->link_data_enc->blinding_key_enc_size));
|
|
|
|
buf_len = GNUNET_CRYPTO_rsa_public_key_encode (ldl->denom_pub,
|
|
|
|
&buf);
|
|
|
|
json_object_set_new (obj, "denom_pub",
|
|
|
|
TALER_JSON_from_data (buf,
|
|
|
|
buf_len));
|
|
|
|
GNUNET_free (buf);
|
|
|
|
buf_len = GNUNET_CRYPTO_rsa_signature_encode (ldl->ev_sig,
|
|
|
|
&buf);
|
|
|
|
json_object_set_new (obj, "ev_sig",
|
|
|
|
TALER_JSON_from_data (buf,
|
|
|
|
buf_len));
|
|
|
|
GNUNET_free (buf);
|
|
|
|
json_array_append_new (list, obj);
|
|
|
|
}
|
|
|
|
|
|
|
|
root = json_object ();
|
|
|
|
json_object_set_new (root,
|
|
|
|
"new_coins",
|
|
|
|
list);
|
|
|
|
json_object_set_new (root,
|
|
|
|
"transfer_pub",
|
|
|
|
TALER_JSON_from_data (transfer_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)));
|
|
|
|
json_object_set_new (root,
|
|
|
|
"secret_enc",
|
|
|
|
TALER_JSON_from_data (shared_secret_enc,
|
|
|
|
sizeof (struct TALER_EncryptedLinkSecret)));
|
|
|
|
res = TALER_MINT_reply_json (connection,
|
|
|
|
root,
|
|
|
|
MHD_HTTP_OK);
|
|
|
|
json_decref (root);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2015-01-19 21:53:23 +01:00
|
|
|
|
2015-01-16 13:50:07 +01:00
|
|
|
/* end of taler-mint-httpd_responses.c */
|