2015-01-19 21:04:58 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2015-01-29 00:46:08 +01:00
|
|
|
(C) 2014, 2015 Christian Grothoff (and other contributing authors)
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file taler-mint-httpd_db.c
|
2015-01-28 22:35:57 +01:00
|
|
|
* @brief High-level (transactional-layer) database operations for the mint.
|
2015-01-19 21:04:58 +01:00
|
|
|
* @author Christian Grothoff
|
2015-01-19 21:09:47 +01:00
|
|
|
*
|
|
|
|
* TODO:
|
|
|
|
* - actually abstract DB implementation (i.e. via plugin logic)
|
2015-01-28 22:35:57 +01:00
|
|
|
* (this file should remain largely unchanged with the exception
|
|
|
|
* of the PQ-specific DB handle types)
|
2015-01-29 00:09:48 +01:00
|
|
|
* - /refresh/melt: all
|
|
|
|
* + properly check all conditions and handle errors
|
|
|
|
* + properly check transaction logic
|
|
|
|
* + check for leaks
|
|
|
|
* + check low-level API
|
|
|
|
* - /refresh/commit: all
|
|
|
|
* + properly check all conditions and handle errors
|
|
|
|
* + properly check transaction logic
|
|
|
|
* + check for leaks
|
|
|
|
* + check low-level API
|
|
|
|
* - /refresh/reveal: all
|
|
|
|
* + properly check all conditions and handle errors
|
|
|
|
* + properly check transaction logic
|
|
|
|
* + check for leaks
|
|
|
|
* + check low-level API
|
|
|
|
* - /refresh/link: all
|
|
|
|
* + properly check all conditions and handle errors
|
|
|
|
* + properly check transaction logic
|
|
|
|
* + check for leaks
|
|
|
|
* + check low-level API
|
2015-01-19 21:04:58 +01:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2015-01-19 21:53:23 +01:00
|
|
|
#include <pthread.h>
|
|
|
|
#include <jansson.h>
|
2015-01-19 21:04:58 +01:00
|
|
|
#include "taler-mint-httpd_db.h"
|
|
|
|
#include "taler_signatures.h"
|
2015-01-19 21:53:23 +01:00
|
|
|
#include "taler-mint-httpd_keys.h"
|
2015-01-19 21:04:58 +01:00
|
|
|
#include "taler-mint-httpd_responses.h"
|
|
|
|
#include "mint_db.h"
|
|
|
|
#include "mint.h"
|
2015-01-28 20:55:15 +01:00
|
|
|
#include "taler_util.h"
|
2015-01-28 21:08:19 +01:00
|
|
|
#include "taler-mint-httpd_keystate.h"
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
|
2015-01-29 00:09:48 +01:00
|
|
|
/**
|
|
|
|
* Get an amount in the mint's currency that is zero.
|
|
|
|
*
|
|
|
|
* @return zero amount in the mint's currency
|
|
|
|
*/
|
|
|
|
static struct TALER_Amount
|
|
|
|
mint_amount_native_zero ()
|
|
|
|
{
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
|
|
|
|
memset (&amount,
|
|
|
|
0,
|
|
|
|
sizeof (amount));
|
|
|
|
memcpy (amount.currency,
|
|
|
|
MINT_CURRENCY,
|
|
|
|
strlen (MINT_CURRENCY) + 1);
|
|
|
|
return amount;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-19 21:04:58 +01:00
|
|
|
/**
|
|
|
|
* Execute a deposit. The validity of the coin and signature
|
|
|
|
* have already been checked. The database must now check that
|
|
|
|
* the coin is not (double or over) spent, and execute the
|
|
|
|
* transaction (record details, generate success or failure response).
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param deposit information about the deposit
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_deposit (struct MHD_Connection *connection,
|
|
|
|
const struct Deposit *deposit)
|
|
|
|
{
|
|
|
|
PGconn *db_conn;
|
2015-01-28 22:18:53 +01:00
|
|
|
struct TALER_MINT_DB_TransactionList *tl;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct TALER_MINT_DB_TransactionList *pos;
|
|
|
|
struct TALER_Amount spent;
|
|
|
|
struct TALER_Amount value;
|
|
|
|
struct TALER_Amount fee_deposit;
|
|
|
|
struct TALER_Amount fee_withdraw;
|
|
|
|
struct TALER_Amount fee_refresh;
|
|
|
|
struct MintKeyState *mks;
|
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki;
|
|
|
|
int ret;
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:21:58 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-28 22:18:53 +01:00
|
|
|
if (GNUNET_YES ==
|
|
|
|
TALER_MINT_DB_have_deposit (db_conn,
|
|
|
|
deposit))
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_deposit_success (connection,
|
|
|
|
&deposit->coin.coin_pub,
|
|
|
|
&deposit->h_wire,
|
|
|
|
&deposit->h_contract,
|
|
|
|
deposit->transaction_id,
|
|
|
|
&deposit->merchant_pub,
|
|
|
|
&deposit->amount);
|
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
mks = TALER_MINT_key_state_acquire ();
|
|
|
|
dki = TALER_MINT_get_denom_key (mks,
|
|
|
|
deposit->coin.denom_pub);
|
|
|
|
value = TALER_amount_ntoh (dki->issue.value);
|
|
|
|
fee_deposit = TALER_amount_ntoh (dki->issue.fee_deposit);
|
|
|
|
fee_refresh = TALER_amount_ntoh (dki->issue.fee_refresh);
|
|
|
|
TALER_MINT_key_state_release (mks);
|
|
|
|
|
2015-01-28 22:18:53 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_transaction (db_conn))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
|
|
|
}
|
|
|
|
tl = TALER_MINT_DB_get_coin_transactions (db_conn,
|
|
|
|
&deposit->coin.coin_pub);
|
2015-01-29 00:09:48 +01:00
|
|
|
spent = fee_withdraw; /* fee for THIS transaction */
|
|
|
|
/* FIXME: need to deal better with integer overflows
|
|
|
|
in the logic that follows! (change amount.c API!) */
|
|
|
|
spent = TALER_amount_add (spent,
|
|
|
|
deposit->amount);
|
|
|
|
|
|
|
|
for (pos = tl; NULL != pos; pos = pos->next)
|
2015-01-19 21:04:58 +01:00
|
|
|
{
|
2015-01-29 00:09:48 +01:00
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_TT_DEPOSIT:
|
|
|
|
spent = TALER_amount_add (spent,
|
|
|
|
pos->details.deposit->amount);
|
|
|
|
spent = TALER_amount_add (spent,
|
|
|
|
fee_deposit);
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_TT_REFRESH_MELT:
|
|
|
|
spent = TALER_amount_add (spent,
|
|
|
|
pos->details.melt->amount);
|
|
|
|
spent = TALER_amount_add (spent,
|
|
|
|
fee_refresh);
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_TT_LOCK:
|
|
|
|
/* should check if lock is still active,
|
|
|
|
and if it is for THIS operation; if
|
|
|
|
lock is inactive, delete it; if lock
|
|
|
|
is for THIS operation, ignore it;
|
|
|
|
if lock is for another operation,
|
|
|
|
count it! */
|
|
|
|
GNUNET_assert (0); // FIXME: not implemented!
|
|
|
|
break;
|
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-19 21:04:58 +01:00
|
|
|
|
2015-01-29 00:09:48 +01:00
|
|
|
if (0 < TALER_amount_cmp (spent, value))
|
|
|
|
{
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
ret = TALER_MINT_reply_insufficient_funds (connection,
|
|
|
|
tl);
|
|
|
|
TALER_MINT_DB_free_coin_transaction_list (tl);
|
|
|
|
return ret;
|
|
|
|
}
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_free_coin_transaction_list (tl);
|
2015-01-19 21:04:58 +01:00
|
|
|
|
2015-01-28 22:47:03 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_insert_deposit (db_conn,
|
|
|
|
deposit))
|
|
|
|
{
|
|
|
|
LOG_WARNING ("Failed to store /deposit information in database\n");
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
|
|
|
|
2015-01-28 22:47:03 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_commit (db_conn))
|
2015-01-19 21:04:58 +01:00
|
|
|
{
|
2015-01-28 22:47:03 +01:00
|
|
|
LOG_WARNING ("/deposit transaction commit failed\n");
|
|
|
|
return TALER_MINT_reply_commit_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-28 15:35:41 +01:00
|
|
|
return TALER_MINT_reply_deposit_success (connection,
|
|
|
|
&deposit->coin.coin_pub,
|
|
|
|
&deposit->h_wire,
|
|
|
|
&deposit->h_contract,
|
|
|
|
deposit->transaction_id,
|
|
|
|
&deposit->merchant_pub,
|
|
|
|
&deposit->amount);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /withdraw/status.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param reserve_pub public key of the reserve to check
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_withdraw_status (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *reserve_pub)
|
|
|
|
{
|
|
|
|
PGconn *db_conn;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct ReserveHistory *rh;
|
2015-01-19 21:53:23 +01:00
|
|
|
int res;
|
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:21:58 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
rh = TALER_MINT_DB_get_reserve_history (db_conn,
|
|
|
|
reserve_pub);
|
|
|
|
if (NULL == rh)
|
2015-01-19 21:53:23 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
2015-01-29 00:09:48 +01:00
|
|
|
"error", "Reserve not found");
|
|
|
|
res = TALER_MINT_reply_withdraw_status_success (connection,
|
|
|
|
rh);
|
|
|
|
TALER_MINT_DB_free_reserve_history (rh);
|
|
|
|
return res;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /withdraw/sign.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-01-26 12:22:26 +01:00
|
|
|
* @param reserve public key of the reserve
|
|
|
|
* @param denomination_pub public key of the denomination requested
|
|
|
|
* @param blinded_msg blinded message to be signed
|
|
|
|
* @param blinded_msg_len number of bytes in @a blinded_msg
|
|
|
|
* @param signature signature over the withdraw request, to be stored in DB
|
2015-01-19 21:53:23 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_withdraw_sign (struct MHD_Connection *connection,
|
2015-01-26 12:22:26 +01:00
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *reserve,
|
|
|
|
const struct GNUNET_CRYPTO_rsa_PublicKey *denomination_pub,
|
|
|
|
const char *blinded_msg,
|
|
|
|
size_t blinded_msg_len,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaSignature *signature)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
PGconn *db_conn;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct ReserveHistory *rh;
|
2015-01-29 00:45:07 +01:00
|
|
|
const struct ReserveHistory *pos;
|
2015-01-19 21:53:23 +01:00
|
|
|
struct MintKeyState *key_state;
|
|
|
|
struct CollectableBlindcoin collectable;
|
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki;
|
2015-01-29 00:45:07 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *tdki;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature *sig;
|
2015-01-19 21:53:23 +01:00
|
|
|
struct TALER_Amount amount_required;
|
2015-01-29 00:45:07 +01:00
|
|
|
struct TALER_Amount deposit_total;
|
|
|
|
struct TALER_Amount withdraw_total;
|
|
|
|
struct TALER_Amount balance;
|
|
|
|
struct TALER_Amount value;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_HashCode h_blind;
|
2015-01-19 21:53:23 +01:00
|
|
|
int res;
|
|
|
|
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_hash (blinded_msg,
|
|
|
|
blinded_msg_len,
|
|
|
|
&h_blind);
|
|
|
|
|
2015-01-19 21:53:23 +01:00
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:21:58 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
res = TALER_MINT_DB_get_collectable_blindcoin (db_conn,
|
2015-01-26 12:22:26 +01:00
|
|
|
&h_blind,
|
2015-01-19 21:53:23 +01:00
|
|
|
&collectable);
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-26 12:22:26 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't sign again if we have already signed the coin */
|
|
|
|
if (GNUNET_YES == res)
|
2015-01-26 12:22:26 +01:00
|
|
|
{
|
|
|
|
res = TALER_MINT_reply_withdraw_sign_success (connection,
|
|
|
|
&collectable);
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (collectable.sig);
|
|
|
|
return res;
|
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
GNUNET_assert (GNUNET_NO == res);
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/* Check if balance is sufficient */
|
2015-01-19 21:53:23 +01:00
|
|
|
key_state = TALER_MINT_key_state_acquire ();
|
|
|
|
dki = TALER_MINT_get_denom_key (key_state,
|
2015-01-26 12:22:26 +01:00
|
|
|
denomination_pub);
|
2015-01-19 21:53:23 +01:00
|
|
|
if (NULL == dki)
|
2015-01-29 00:45:07 +01:00
|
|
|
{
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-19 21:53:23 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"Denomination not found");
|
2015-01-29 00:45:07 +01:00
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_transaction (db_conn))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
rh = TALER_MINT_DB_get_reserve_history (db_conn,
|
|
|
|
reserve);
|
|
|
|
if (NULL == rh)
|
|
|
|
{
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-19 21:53:23 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
2015-01-29 00:45:07 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
2015-01-19 21:53:23 +01:00
|
|
|
"{s:s}",
|
|
|
|
"error",
|
2015-01-29 00:45:07 +01:00
|
|
|
"Reserve not found");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* calculate amount required including fees */
|
|
|
|
amount_required = TALER_amount_add (TALER_amount_ntoh (dki->issue.value),
|
|
|
|
TALER_amount_ntoh (dki->issue.fee_withdraw));
|
2015-01-26 12:22:26 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/* calculate balance of the reserve */
|
|
|
|
res = 0;
|
|
|
|
for (pos = rh; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_RO_BANK_TO_MINT:
|
|
|
|
if (0 == (res & 1))
|
|
|
|
deposit_total = pos->details.bank->amount;
|
|
|
|
else
|
|
|
|
deposit_total = TALER_amount_add (deposit_total,
|
|
|
|
pos->details.bank->amount);
|
|
|
|
res |= 1;
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_RO_WITHDRAW_COIN:
|
|
|
|
tdki = TALER_MINT_get_denom_key (key_state,
|
|
|
|
pos->details.withdraw->denom_pub);
|
|
|
|
value = TALER_amount_ntoh (tdki->issue.value);
|
|
|
|
if (0 == (res & 2))
|
|
|
|
withdraw_total = value;
|
|
|
|
else
|
|
|
|
withdraw_total = TALER_amount_add (withdraw_total,
|
|
|
|
value);
|
|
|
|
res |= 2;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-01-26 12:22:26 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/* FIXME: good place to assert deposit_total > withdraw_total... */
|
|
|
|
balance = TALER_amount_subtract (deposit_total,
|
|
|
|
withdraw_total);
|
|
|
|
if (0 < TALER_amount_cmp (amount_required,
|
|
|
|
balance))
|
|
|
|
{
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
res = TALER_MINT_reply_withdraw_sign_insufficient_funds (connection,
|
|
|
|
rh);
|
|
|
|
TALER_MINT_DB_free_reserve_history (rh);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
TALER_MINT_DB_free_reserve_history (rh);
|
|
|
|
|
|
|
|
/* Balance is good, sign the coin! */
|
2015-01-26 12:22:26 +01:00
|
|
|
sig = GNUNET_CRYPTO_rsa_sign (dki->denom_priv,
|
|
|
|
blinded_msg,
|
|
|
|
blinded_msg_len);
|
2015-01-29 00:45:07 +01:00
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-26 12:22:26 +01:00
|
|
|
if (NULL == sig)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-29 00:45:07 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-26 12:22:26 +01:00
|
|
|
return TALER_MINT_reply_internal_error (connection,
|
|
|
|
"Internal error");
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
// FIXME: can we avoid the cast?
|
2015-01-27 15:22:34 +01:00
|
|
|
collectable.denom_pub = (struct GNUNET_CRYPTO_rsa_PublicKey *) denomination_pub;
|
2015-01-26 12:22:26 +01:00
|
|
|
collectable.sig = sig;
|
2015-01-27 15:22:34 +01:00
|
|
|
collectable.reserve_pub = *reserve;
|
|
|
|
collectable.reserve_sig = *signature;
|
2015-01-19 21:53:23 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_insert_collectable_blindcoin (db_conn,
|
2015-01-26 12:22:26 +01:00
|
|
|
&h_blind,
|
2015-01-19 21:53:23 +01:00
|
|
|
&collectable))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (sig);
|
2015-01-29 00:45:07 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-26 12:22:26 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_commit (db_conn))
|
|
|
|
{
|
|
|
|
LOG_WARNING ("/withdraw/sign transaction commit failed\n");
|
|
|
|
return TALER_MINT_reply_commit_error (connection);
|
|
|
|
}
|
|
|
|
res = TALER_MINT_reply_withdraw_sign_success (connection,
|
|
|
|
&collectable);
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (sig);
|
2015-01-29 00:45:07 +01:00
|
|
|
return res;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-21 12:46:14 +01:00
|
|
|
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
2015-01-21 12:46:14 +01:00
|
|
|
/**
|
2015-01-29 00:45:07 +01:00
|
|
|
* Insert all requested denominations into the DB, and compute the
|
2015-01-21 12:46:14 +01:00
|
|
|
* required cost of the denominations, including fees.
|
|
|
|
*
|
|
|
|
* @param connection the connection to send an error response to
|
|
|
|
* @param db_conn the database connection
|
|
|
|
* @param key_state the mint's key state to use
|
|
|
|
* @param session_pub the refresh session public key
|
|
|
|
* @param denom_pubs_count number of entries in @a denom_pubs
|
|
|
|
* @param denom_pubs array of public keys for the refresh
|
|
|
|
* @param r_amount the sum of the cost (value+fee) for
|
|
|
|
* all requested coins
|
|
|
|
* @return FIXME!
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
refresh_accept_denoms (struct MHD_Connection *connection,
|
|
|
|
PGconn *db_conn,
|
|
|
|
const struct MintKeyState *key_state,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *session_pub,
|
|
|
|
unsigned int denom_pubs_count,
|
2015-01-27 18:57:29 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *const*denom_pubs,
|
2015-01-21 12:46:14 +01:00
|
|
|
struct TALER_Amount *r_amount)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
int res;
|
|
|
|
struct TALER_MINT_DenomKeyIssue *dki;
|
|
|
|
struct TALER_Amount cost;
|
|
|
|
|
|
|
|
memset (r_amount, 0, sizeof (struct TALER_Amount));
|
|
|
|
for (i = 0; i < denom_pubs_count; i++)
|
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
dki = &(TALER_MINT_get_denom_key (key_state,
|
|
|
|
denom_pubs[i])->issue);
|
2015-01-21 12:46:14 +01:00
|
|
|
cost = TALER_amount_add (TALER_amount_ntoh (dki->value),
|
|
|
|
TALER_amount_ntoh (dki->fee_withdraw));
|
|
|
|
*r_amount = TALER_amount_add (cost, *r_amount);
|
|
|
|
|
|
|
|
|
|
|
|
/* Insert the requested coin into the DB, so we'll know later
|
|
|
|
* what denomination the request had */
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = TALER_MINT_DB_insert_refresh_order (db_conn,
|
|
|
|
i,
|
|
|
|
session_pub,
|
2015-01-27 15:22:34 +01:00
|
|
|
denom_pubs[i])))
|
2015-01-21 12:46:14 +01:00
|
|
|
return res; // ???
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parse coin melt requests from a JSON object and write them to
|
|
|
|
* the database.
|
|
|
|
*
|
|
|
|
* @param connection the connection to send errors to
|
|
|
|
* @param db_conn the database connection
|
|
|
|
* @param key_state the mint's key state
|
|
|
|
* @param session_pub the refresh session's public key
|
|
|
|
* @param coin_count number of coins in @a coin_public_infos to melt
|
|
|
|
* @param coin_public_infos the coins to melt
|
|
|
|
* @param r_melt_balance FIXME
|
|
|
|
* @return #GNUNET_OK on success,
|
|
|
|
* #GNUNET_NO if an error message was generated,
|
|
|
|
* #GNUNET_SYSERR on internal errors (no response generated)
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
refresh_accept_melts (struct MHD_Connection *connection,
|
|
|
|
PGconn *db_conn,
|
|
|
|
const struct MintKeyState *key_state,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *session_pub,
|
|
|
|
unsigned int coin_count,
|
|
|
|
const struct TALER_CoinPublicInfo *coin_public_infos,
|
|
|
|
struct TALER_Amount *r_melt_balance)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
memset (r_melt_balance, 0, sizeof (struct TALER_Amount));
|
|
|
|
|
|
|
|
for (i = 0; i < coin_count; i++)
|
|
|
|
{
|
|
|
|
struct TALER_MINT_DenomKeyIssue *dki;
|
|
|
|
struct KnownCoin known_coin;
|
|
|
|
// money the customer gets by melting the current coin
|
|
|
|
struct TALER_Amount coin_gain;
|
2015-01-28 22:18:53 +01:00
|
|
|
struct RefreshMelt melt;
|
2015-01-21 12:46:14 +01:00
|
|
|
|
2015-01-27 15:22:34 +01:00
|
|
|
dki = &(TALER_MINT_get_denom_key (key_state,
|
|
|
|
coin_public_infos[i].denom_pub)->issue);
|
2015-01-21 12:46:14 +01:00
|
|
|
|
|
|
|
if (NULL == dki)
|
|
|
|
return (MHD_YES ==
|
|
|
|
TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "denom not found"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_known_coin (db_conn,
|
|
|
|
&coin_public_infos[i].coin_pub,
|
|
|
|
&known_coin);
|
|
|
|
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_YES == res)
|
|
|
|
{
|
|
|
|
if (GNUNET_YES == known_coin.is_refreshed)
|
|
|
|
return (MHD_YES ==
|
|
|
|
TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"coin already refreshed"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
known_coin.expended_balance = mint_amount_native_zero ();
|
|
|
|
known_coin.public_info = coin_public_infos[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
known_coin.is_refreshed = GNUNET_YES;
|
|
|
|
known_coin.refresh_session_pub = *session_pub;
|
|
|
|
|
|
|
|
if (GNUNET_OK != TALER_MINT_DB_upsert_known_coin (db_conn, &known_coin))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
2015-01-28 22:18:53 +01:00
|
|
|
// FIXME: test first if coin was already melted
|
|
|
|
// in this session, etc.
|
|
|
|
|
|
|
|
melt.coin = coin_public_infos[i];
|
|
|
|
melt.session_pub = *session_pub;
|
|
|
|
// melt.coin_sig = FIXME;
|
|
|
|
// melt.amount = FIXME;
|
|
|
|
melt.oldcoin_index = i;
|
2015-01-27 15:22:34 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-01-28 22:18:53 +01:00
|
|
|
TALER_MINT_DB_insert_refresh_melt (db_conn,
|
|
|
|
&melt))
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
coin_gain = TALER_amount_ntoh (dki->value);
|
|
|
|
coin_gain = TALER_amount_subtract (coin_gain, known_coin.expended_balance);
|
|
|
|
|
|
|
|
/* Refuse to refresh when the coin does not have enough money left to
|
|
|
|
* pay the refreshing fees of the coin. */
|
|
|
|
|
|
|
|
if (TALER_amount_cmp (coin_gain, TALER_amount_ntoh (dki->fee_refresh)) < 0)
|
|
|
|
return (MHD_YES ==
|
|
|
|
TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "depleted")) ? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
|
|
|
|
coin_gain = TALER_amount_subtract (coin_gain, TALER_amount_ntoh (dki->fee_refresh));
|
|
|
|
|
|
|
|
*r_melt_balance = TALER_amount_add (*r_melt_balance, coin_gain);
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /refresh/melt.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param refresh_session_pub public key of the refresh session
|
|
|
|
* @param num_new_denoms number of entries in @a denom_pubs
|
|
|
|
* @param denum_pubs ???
|
|
|
|
* @param coin_count number of entries in @a coin_public_infos
|
|
|
|
* @param coin_public_infos information about the coins to melt
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_melt (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
|
|
|
unsigned int num_new_denoms,
|
2015-01-27 18:57:29 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *const*denom_pubs,
|
2015-01-21 12:46:14 +01:00
|
|
|
unsigned int coin_count,
|
|
|
|
const struct TALER_CoinPublicInfo *coin_public_infos)
|
|
|
|
{
|
|
|
|
struct TALER_Amount requested_cost;
|
|
|
|
struct TALER_Amount melt_balance;
|
|
|
|
struct MintKeyState *key_state;
|
|
|
|
struct RefreshSession session;
|
|
|
|
PGconn *db_conn;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
/* We incrementally update the db with other parameters in a transaction.
|
|
|
|
* The transaction is aborted if some parameter does not validate. */
|
|
|
|
|
|
|
|
/* Send response immediately if we already know the session.
|
|
|
|
* Do _not_ care about fields other than session_pub in this case. */
|
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
2015-01-21 14:21:58 +01:00
|
|
|
GNUNET_break (0);
|
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
NULL);
|
|
|
|
if (GNUNET_YES == res)
|
|
|
|
{
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
&session)))
|
|
|
|
{
|
|
|
|
// FIXME: send internal error
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
return TALER_MINT_reply_refresh_melt_success (connection,
|
|
|
|
&session,
|
|
|
|
refresh_session_pub);
|
|
|
|
}
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_transaction (db_conn))
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-29 00:45:07 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_OK != TALER_MINT_DB_create_refresh_session (db_conn,
|
|
|
|
refresh_session_pub))
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The next two operations must see the same key state,
|
|
|
|
* thus we acquire it here. */
|
|
|
|
|
|
|
|
key_state = TALER_MINT_key_state_acquire ();
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = refresh_accept_denoms (connection, db_conn, key_state,
|
|
|
|
refresh_session_pub,
|
|
|
|
num_new_denoms,
|
|
|
|
denom_pubs,
|
|
|
|
&requested_cost)))
|
|
|
|
{
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write old coins to db and sum their value */
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = refresh_accept_melts (connection, db_conn, key_state,
|
|
|
|
refresh_session_pub,
|
|
|
|
coin_count,
|
|
|
|
coin_public_infos,
|
|
|
|
&melt_balance)))
|
|
|
|
{
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-21 12:46:14 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
|
|
|
|
|
|
|
|
/* Request is only ok if cost of requested coins
|
|
|
|
* does not exceed value of melted coins. */
|
|
|
|
|
|
|
|
// FIXME: also, consider fees?
|
|
|
|
if (TALER_amount_cmp (melt_balance, requested_cost) < 0)
|
|
|
|
{
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-21 12:46:14 +01:00
|
|
|
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_FORBIDDEN,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"not enough coins melted");
|
|
|
|
}
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_commit (db_conn))
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
2015-01-29 00:45:07 +01:00
|
|
|
LOG_WARNING ("/refresh/melt transaction commit failed\n");
|
|
|
|
return TALER_MINT_reply_commit_error (connection);
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
&session)))
|
|
|
|
{
|
|
|
|
// FIXME: send internal error
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
return TALER_MINT_reply_refresh_melt_success (connection,
|
|
|
|
&session,
|
|
|
|
refresh_session_pub);
|
|
|
|
|
|
|
|
|
|
|
|
}
|
2015-01-21 13:31:05 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /refresh/commit.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param kappa size of x-dimension of @commit_coin and @commit_link arrays
|
2015-01-27 18:35:17 +01:00
|
|
|
* @param num_oldcoins size of y-dimension of @commit_link array
|
|
|
|
* @param num_newcoins size of y-dimension of @commit_coin array
|
|
|
|
* @param commit_coin
|
|
|
|
* @param commit_link
|
2015-01-21 13:31:05 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_commit (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
|
|
|
unsigned int kappa,
|
|
|
|
unsigned int num_oldcoins,
|
|
|
|
unsigned int num_newcoins,
|
|
|
|
struct RefreshCommitCoin *const*commit_coin,
|
|
|
|
struct RefreshCommitLink *const*commit_link)
|
|
|
|
|
|
|
|
{
|
|
|
|
PGconn *db_conn;
|
|
|
|
struct RefreshSession refresh_session;
|
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:21:58 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Send response immediately if we already know the session.
|
|
|
|
* Do _not_ care about fields other than session_pub in this case. */
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
&refresh_session);
|
|
|
|
// FIXME: this should check that kappa and num_newcoins match
|
|
|
|
// our expectations from refresh_session!
|
|
|
|
|
|
|
|
for (i = 0; i < refresh_session.kappa; i++)
|
|
|
|
{
|
|
|
|
for (j = 0; j < refresh_session.num_newcoins; j++)
|
|
|
|
{
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_insert_refresh_commit_coin (db_conn,
|
2015-01-27 18:35:17 +01:00
|
|
|
refresh_session_pub,
|
|
|
|
i,
|
|
|
|
j,
|
2015-01-21 13:31:05 +01:00
|
|
|
&commit_coin[i][j]))
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-21 13:31:05 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
2015-01-27 18:35:17 +01:00
|
|
|
TALER_MINT_DB_insert_refresh_commit_link (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
i,
|
|
|
|
j,
|
|
|
|
&commit_link[i][j]))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-21 13:31:05 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if ( (GNUNET_YES == res) &&
|
|
|
|
(GNUNET_YES == refresh_session.has_commit_sig) )
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"sending cached commit response\n");
|
|
|
|
res = TALER_MINT_reply_refresh_commit_success (connection,
|
|
|
|
&refresh_session);
|
|
|
|
GNUNET_break (res != GNUNET_SYSERR);
|
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_transaction (db_conn))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-29 00:45:07 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Re-fetch the session information from the database,
|
|
|
|
* in case a concurrent transaction modified it. */
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
&refresh_session);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
2015-01-28 22:47:03 +01:00
|
|
|
TALER_MINT_DB_rollback (db_conn);
|
2015-01-21 13:31:05 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_commit (db_conn))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
2015-01-29 00:45:07 +01:00
|
|
|
LOG_WARNING ("/refresh/commit transaction commit failed\n");
|
|
|
|
return TALER_MINT_reply_commit_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return TALER_MINT_reply_refresh_commit_success (connection, &refresh_session);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send response for "/refresh/reveal".
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection
|
|
|
|
* @param db_conn the connection to the mint's db
|
|
|
|
* @param refresh_session_pub the refresh session's public key
|
|
|
|
* @return a MHD result code
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
helper_refresh_reveal_send_response (struct MHD_Connection *connection,
|
|
|
|
PGconn *db_conn,
|
2015-01-21 14:52:41 +01:00
|
|
|
const struct RefreshSession *refresh_session,
|
2015-01-21 14:46:33 +01:00
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub)
|
|
|
|
{
|
|
|
|
int res;
|
2015-01-21 14:52:41 +01:00
|
|
|
unsigned int newcoin_index;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature **sigs;
|
2015-01-21 14:46:33 +01:00
|
|
|
|
2015-01-21 14:52:41 +01:00
|
|
|
sigs = GNUNET_malloc (refresh_session->num_newcoins *
|
2015-01-26 12:22:26 +01:00
|
|
|
sizeof (struct GNUNET_CRYPTO_rsa_Signature *));
|
2015-01-21 14:52:41 +01:00
|
|
|
for (newcoin_index = 0; newcoin_index < refresh_session->num_newcoins; newcoin_index++)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 14:55:05 +01:00
|
|
|
sigs[newcoin_index] = TALER_MINT_DB_get_refresh_collectable (db_conn,
|
|
|
|
newcoin_index,
|
|
|
|
refresh_session_pub);
|
|
|
|
if (NULL == sigs[newcoin_index])
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'
|
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (sigs);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
res = TALER_MINT_reply_refresh_reveal_success (connection,
|
2015-01-21 14:52:41 +01:00
|
|
|
refresh_session->num_newcoins,
|
2015-01-21 14:46:33 +01:00
|
|
|
sigs);
|
|
|
|
GNUNET_free (sigs);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /refresh/reveal.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param refresh_session_pub public key of the refresh session
|
|
|
|
* @param kappa size of x-dimension of @transfer_privs array plus one (!)
|
|
|
|
* @param num_oldcoins size of y-dimension of @transfer_privs array
|
|
|
|
* @param transfer_pubs array with the revealed transfer keys
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_reveal (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *refresh_session_pub,
|
|
|
|
unsigned int kappa,
|
|
|
|
unsigned int num_oldcoins,
|
|
|
|
struct GNUNET_CRYPTO_EcdsaPrivateKey *const*transfer_privs)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
PGconn *db_conn;
|
|
|
|
struct RefreshSession refresh_session;
|
|
|
|
struct MintKeyState *key_state;
|
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
|
|
|
unsigned int off;
|
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:52:41 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Send response immediately if we already know the session,
|
|
|
|
* and the session commited already.
|
|
|
|
* Do _not_ care about fields other than session_pub in this case. */
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_session (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
&refresh_session);
|
|
|
|
if (GNUNET_YES == res && 0 != refresh_session.reveal_ok)
|
|
|
|
return helper_refresh_reveal_send_response (connection,
|
|
|
|
db_conn,
|
2015-01-21 14:52:41 +01:00
|
|
|
&refresh_session,
|
2015-01-21 14:46:33 +01:00
|
|
|
refresh_session_pub);
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the transfer private keys match their commitments.
|
|
|
|
* Then derive the shared secret for each kappa, and check that they match. */
|
|
|
|
|
|
|
|
off = 0;
|
|
|
|
for (i = 0; i < refresh_session.kappa - 1; i++)
|
|
|
|
{
|
2015-01-27 22:01:08 +01:00
|
|
|
struct TALER_LinkSecret last_shared_secret;
|
2015-01-21 14:46:33 +01:00
|
|
|
int secret_initialized = GNUNET_NO;
|
|
|
|
|
|
|
|
if (i == refresh_session.noreveal_index)
|
|
|
|
off = 1;
|
|
|
|
|
|
|
|
for (j = 0; j < refresh_session.num_oldcoins; j++)
|
|
|
|
{
|
|
|
|
struct RefreshCommitLink commit_link;
|
2015-01-27 22:05:31 +01:00
|
|
|
struct TALER_TransferSecret transfer_secret;
|
2015-01-27 22:01:08 +01:00
|
|
|
struct TALER_LinkSecret shared_secret;
|
2015-01-28 22:18:53 +01:00
|
|
|
struct RefreshMelt melt;
|
2015-01-21 14:46:33 +01:00
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_commit_link (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
i + off, j,
|
|
|
|
&commit_link);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-28 22:18:53 +01:00
|
|
|
res = TALER_MINT_DB_get_refresh_melt (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
j,
|
|
|
|
&melt);
|
2015-01-21 14:46:33 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We're converting key types here, which is not very nice
|
|
|
|
* but necessary and harmless (keys will be thrown away later). */
|
2015-01-27 15:22:34 +01:00
|
|
|
/* FIXME: ECDHE/ECDSA-key type confusion! Can we reduce/avoid this? */
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_ecc_ecdh ((const struct GNUNET_CRYPTO_EcdhePrivateKey *) &transfer_privs[i+off][j],
|
2015-01-28 22:18:53 +01:00
|
|
|
(const struct GNUNET_CRYPTO_EcdhePublicKey *) &melt.coin.coin_pub,
|
2015-01-27 22:05:31 +01:00
|
|
|
&transfer_secret.key))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-27 18:49:02 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_transfer_decrypt (&commit_link.shared_secret_enc,
|
|
|
|
&transfer_secret,
|
|
|
|
&shared_secret))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"decryption failed\n");
|
2015-01-21 14:46:33 +01:00
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_NO == secret_initialized)
|
|
|
|
{
|
|
|
|
secret_initialized = GNUNET_YES;
|
|
|
|
last_shared_secret = shared_secret;
|
|
|
|
}
|
2015-01-27 15:22:34 +01:00
|
|
|
else if (0 != memcmp (&shared_secret,
|
|
|
|
&last_shared_secret,
|
|
|
|
sizeof (struct GNUNET_HashCode)))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"shared secrets do not match\n");
|
2015-01-21 14:46:33 +01:00
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EcdsaPublicKey transfer_pub_check;
|
2015-01-27 15:22:34 +01:00
|
|
|
|
|
|
|
GNUNET_CRYPTO_ecdsa_key_get_public (&transfer_privs[i+off][j],
|
|
|
|
&transfer_pub_check);
|
|
|
|
if (0 !=
|
|
|
|
memcmp (&transfer_pub_check,
|
|
|
|
&commit_link.transfer_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"transfer keys do not match\n");
|
|
|
|
// FIXME: return error code!
|
2015-01-21 14:46:33 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the commitments for all new coins were correct */
|
|
|
|
for (j = 0; j < refresh_session.num_newcoins; j++)
|
|
|
|
{
|
|
|
|
struct RefreshCommitCoin commit_coin;
|
2015-01-27 18:49:02 +01:00
|
|
|
struct TALER_RefreshLinkDecrypted *link_data;
|
2015-01-26 12:22:26 +01:00
|
|
|
// struct BlindedSignaturePurpose *coin_ev_check;
|
2015-01-21 14:46:33 +01:00
|
|
|
struct GNUNET_CRYPTO_EcdsaPublicKey coin_pub;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *denom_pub;
|
2015-01-27 15:22:34 +01:00
|
|
|
struct GNUNET_HashCode h_msg;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *buf;
|
|
|
|
size_t buf_len;
|
2015-01-21 14:46:33 +01:00
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_commit_coin (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
i+off, j,
|
|
|
|
&commit_coin);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-27 15:22:34 +01:00
|
|
|
// FIXME: return error code!
|
2015-01-21 14:46:33 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-27 18:49:02 +01:00
|
|
|
link_data = TALER_refresh_decrypt (commit_coin.refresh_link,
|
|
|
|
&last_shared_secret);
|
|
|
|
if (NULL == link_data)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"decryption failed\n");
|
|
|
|
// FIXME: return error code!
|
2015-01-21 14:46:33 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-27 18:49:02 +01:00
|
|
|
GNUNET_CRYPTO_ecdsa_key_get_public (&link_data->coin_priv,
|
2015-01-27 15:22:34 +01:00
|
|
|
&coin_pub);
|
|
|
|
denom_pub = TALER_MINT_DB_get_refresh_order (db_conn,
|
|
|
|
j,
|
|
|
|
refresh_session_pub);
|
2015-01-27 14:55:05 +01:00
|
|
|
if (NULL == denom_pub)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-27 15:22:34 +01:00
|
|
|
/* FIXME: we had envisioned a more complex scheme to derive
|
|
|
|
the message to sign for a blinded coin... */
|
|
|
|
GNUNET_CRYPTO_hash (&coin_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey),
|
|
|
|
&h_msg);
|
|
|
|
if (0 == (buf_len =
|
|
|
|
GNUNET_CRYPTO_rsa_blind (&h_msg,
|
2015-01-27 18:49:02 +01:00
|
|
|
link_data->blinding_key,
|
2015-01-27 15:22:34 +01:00
|
|
|
denom_pub,
|
|
|
|
&buf)))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"blind failed\n");
|
2015-01-21 14:46:33 +01:00
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-26 12:22:26 +01:00
|
|
|
if ( (buf_len != commit_coin.coin_ev_size) ||
|
|
|
|
(0 != memcmp (buf,
|
|
|
|
commit_coin.coin_ev,
|
|
|
|
buf_len)) )
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"blind envelope does not match for kappa=%d, old=%d\n",
|
2015-01-21 14:46:33 +01:00
|
|
|
(int) (i+off), (int) j);
|
|
|
|
// FIXME: return error code!
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_free (buf);
|
2015-01-21 14:46:33 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_free (buf);
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_transaction (db_conn))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-29 00:45:07 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
for (j = 0; j < refresh_session.num_newcoins; j++)
|
|
|
|
{
|
|
|
|
struct RefreshCommitCoin commit_coin;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *denom_pub;
|
2015-01-21 14:46:33 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature *ev_sig;
|
2015-01-21 14:46:33 +01:00
|
|
|
|
|
|
|
res = TALER_MINT_DB_get_refresh_commit_coin (db_conn,
|
|
|
|
refresh_session_pub,
|
|
|
|
refresh_session.noreveal_index % refresh_session.kappa,
|
|
|
|
j,
|
|
|
|
&commit_coin);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-27 15:22:34 +01:00
|
|
|
denom_pub = TALER_MINT_DB_get_refresh_order (db_conn, j, refresh_session_pub);
|
|
|
|
if (NULL == denom_pub)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
key_state = TALER_MINT_key_state_acquire ();
|
2015-01-27 15:22:34 +01:00
|
|
|
dki = TALER_MINT_get_denom_key (key_state, denom_pub);
|
2015-01-21 14:46:33 +01:00
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
if (NULL == dki)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-26 12:22:26 +01:00
|
|
|
ev_sig = GNUNET_CRYPTO_rsa_sign (dki->denom_priv,
|
|
|
|
commit_coin.coin_ev,
|
2015-01-27 18:49:02 +01:00
|
|
|
commit_coin.coin_ev_size);
|
2015-01-26 12:22:26 +01:00
|
|
|
if (NULL == ev_sig)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_insert_refresh_collectable (db_conn,
|
|
|
|
j,
|
|
|
|
refresh_session_pub,
|
2015-01-27 15:22:34 +01:00
|
|
|
ev_sig);
|
2015-01-21 14:46:33 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* mark that reveal was successful */
|
|
|
|
|
|
|
|
res = TALER_MINT_DB_set_reveal_ok (db_conn, refresh_session_pub);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_MINT_DB_commit (db_conn))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-29 00:45:07 +01:00
|
|
|
LOG_WARNING ("/refresh/reveal transaction commit failed\n");
|
|
|
|
return TALER_MINT_reply_commit_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
2015-01-21 14:52:41 +01:00
|
|
|
return helper_refresh_reveal_send_response (connection,
|
|
|
|
db_conn,
|
|
|
|
&refresh_session,
|
|
|
|
refresh_session_pub);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* FIXME: move into response generation logic!
|
|
|
|
* FIXME: need to separate this from DB logic!
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
link_iter (void *cls,
|
2015-01-27 18:49:02 +01:00
|
|
|
const struct TALER_RefreshLinkEncrypted *link_data_enc,
|
2015-01-26 12:22:26 +01:00
|
|
|
const struct GNUNET_CRYPTO_rsa_PublicKey *denom_pub,
|
|
|
|
const struct GNUNET_CRYPTO_rsa_Signature *ev_sig)
|
2015-01-21 13:46:05 +01:00
|
|
|
{
|
|
|
|
json_t *list = cls;
|
|
|
|
json_t *obj = json_object ();
|
2015-01-26 12:22:26 +01:00
|
|
|
char *buf;
|
|
|
|
size_t buf_len;
|
|
|
|
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
json_array_append_new (list, obj);
|
|
|
|
|
|
|
|
json_object_set_new (obj, "link_enc",
|
2015-01-27 18:49:02 +01:00
|
|
|
TALER_JSON_from_data (link_data_enc->coin_priv_enc,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey) +
|
|
|
|
link_data_enc->blinding_key_enc_size));
|
2015-01-21 13:46:05 +01:00
|
|
|
|
2015-01-26 12:22:26 +01:00
|
|
|
buf_len = GNUNET_CRYPTO_rsa_public_key_encode (denom_pub,
|
|
|
|
&buf);
|
2015-01-21 13:46:05 +01:00
|
|
|
json_object_set_new (obj, "denom_pub",
|
2015-01-26 12:22:26 +01:00
|
|
|
TALER_JSON_from_data (buf,
|
|
|
|
buf_len));
|
|
|
|
GNUNET_free (buf);
|
|
|
|
buf_len = GNUNET_CRYPTO_rsa_signature_encode (ev_sig,
|
|
|
|
&buf);
|
2015-01-21 13:46:05 +01:00
|
|
|
json_object_set_new (obj, "ev_sig",
|
2015-01-26 12:22:26 +01:00
|
|
|
TALER_JSON_from_data (buf,
|
|
|
|
buf_len));
|
2015-01-27 15:22:34 +01:00
|
|
|
GNUNET_free (buf);
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a /refresh/link.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param coin_pub public key of the coin to link
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_db_execute_refresh_link (struct MHD_Connection *connection,
|
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
json_t *root;
|
|
|
|
json_t *list;
|
|
|
|
PGconn *db_conn;
|
|
|
|
struct GNUNET_CRYPTO_EcdsaPublicKey transfer_pub;
|
2015-01-27 18:49:02 +01:00
|
|
|
struct GNUNET_HashCode shared_secret_enc;
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
if (NULL == (db_conn = TALER_MINT_DB_get_connection ()))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-21 14:21:58 +01:00
|
|
|
return TALER_MINT_reply_internal_db_error (connection);
|
2015-01-21 13:46:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
res = TALER_db_get_transfer (db_conn,
|
|
|
|
coin_pub,
|
|
|
|
&transfer_pub,
|
|
|
|
&shared_secret_enc);
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
if (GNUNET_NO == res)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"link data not found (transfer)");
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK == res);
|
|
|
|
|
|
|
|
/* FIXME: separate out response generation logic! */
|
|
|
|
|
|
|
|
list = json_array ();
|
|
|
|
root = json_object ();
|
|
|
|
json_object_set_new (root, "new_coins", list);
|
|
|
|
|
|
|
|
res = TALER_db_get_link (db_conn, coin_pub,
|
|
|
|
&link_iter, list);
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
// FIXME: return error code!
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
if (GNUNET_NO == res)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"link data not found (link)");
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK == res);
|
|
|
|
json_object_set_new (root, "transfer_pub",
|
|
|
|
TALER_JSON_from_data (&transfer_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)));
|
|
|
|
json_object_set_new (root, "secret_enc",
|
|
|
|
TALER_JSON_from_data (&shared_secret_enc,
|
2015-01-27 18:49:02 +01:00
|
|
|
sizeof (struct GNUNET_HashCode)));
|
2015-01-28 19:58:20 +01:00
|
|
|
res = TALER_MINT_reply_json (connection,
|
|
|
|
root,
|
|
|
|
MHD_HTTP_OK);
|
|
|
|
json_decref (root);
|
|
|
|
return res;
|
2015-01-21 13:46:05 +01:00
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* end of taler-mint-httpd_db.c */
|