2015-01-28 20:53:21 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2016-01-19 14:39:00 +01:00
|
|
|
Copyright (C) 2014, 2015 GNUnet e.V.
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file include/taler_crypto_lib.h
|
|
|
|
* @brief taler-specific crypto functions
|
|
|
|
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
|
2015-05-16 14:15:34 +02:00
|
|
|
* @author Christian Grothoff <christian@grothoff.org>
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
|
|
|
#ifndef TALER_CRYPTO_LIB_H
|
|
|
|
#define TALER_CRYPTO_LIB_H
|
|
|
|
|
2015-07-15 11:40:51 +02:00
|
|
|
#if HAVE_GNUNET_GNUNET_UTIL_LIB_H
|
2015-01-28 20:53:21 +01:00
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
2015-07-20 10:34:32 +02:00
|
|
|
#include "taler_util.h"
|
|
|
|
#elif HAVE_GNUNET_GNUNET_UTIL_TALER_WALLET_LIB_H
|
2015-07-15 11:40:51 +02:00
|
|
|
#include <gnunet/gnunet_util_taler_wallet_lib.h>
|
|
|
|
#include "taler_util_wallet.h"
|
2015-07-20 10:34:32 +02:00
|
|
|
#endif
|
2015-07-15 11:40:51 +02:00
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
#include <gcrypt.h>
|
|
|
|
|
|
|
|
|
|
|
|
/* ****************** Coin crypto primitives ************* */
|
|
|
|
|
2015-03-24 16:56:06 +01:00
|
|
|
GNUNET_NETWORK_STRUCT_BEGIN
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of public keys for Taler reserves.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_ReservePublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for reserves.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of private keys for Taler reserves.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_ReservePrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for reserves.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of signatures used with Taler reserves.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_ReserveSignatureP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for reserves.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of public keys to for merchant authorizations.
|
2015-03-22 22:14:30 +01:00
|
|
|
* Merchants can issue refunds using the corresponding
|
|
|
|
* private key.
|
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_MerchantPublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for merchants.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of private keys for merchant authorizations.
|
2015-03-22 22:14:30 +01:00
|
|
|
* Merchants can issue refunds using the corresponding
|
|
|
|
* private key.
|
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_MerchantPrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for merchants.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-12-09 15:36:34 +01:00
|
|
|
/**
|
|
|
|
* @brief Type of signatures made by merchants.
|
|
|
|
*/
|
|
|
|
struct TALER_MerchantSignatureP
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for merchants.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_sig;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of transfer public keys used during refresh
|
2015-03-22 22:14:30 +01:00
|
|
|
* operations.
|
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferPublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-05-16 14:15:34 +02:00
|
|
|
* Taler uses ECDHE for transfer keys.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-04-10 22:18:50 +02:00
|
|
|
struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub;
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of transfer public keys used during refresh
|
2015-03-22 22:14:30 +01:00
|
|
|
* operations.
|
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferPrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-05-16 14:15:34 +02:00
|
|
|
* Taler uses ECDHE for melting session keys.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-04-10 22:18:50 +02:00
|
|
|
struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv;
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of online public keys used by the exchange to sign
|
2015-03-22 22:14:30 +01:00
|
|
|
* messages.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_ExchangePublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Taler uses EdDSA for online exchange message signing.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of online public keys used by the exchange to
|
2015-03-22 22:14:30 +01:00
|
|
|
* sign messages.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_ExchangePrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for online signatures sessions.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of signatures used by the exchange to sign messages online.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_ExchangeSignatureP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for online signatures sessions.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of the offline master public key used by the exchange.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_MasterPublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for the long-term offline master key.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
2015-06-17 18:50:09 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Type of the public key used by the auditor.
|
|
|
|
*/
|
|
|
|
struct TALER_AuditorPublicKeyP
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for the auditor's signing key.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-09-16 19:18:48 +02:00
|
|
|
/**
|
2015-11-24 14:42:01 +01:00
|
|
|
* @brief Type of signatures used by the auditor.
|
2015-09-16 19:18:48 +02:00
|
|
|
*/
|
|
|
|
struct TALER_AuditorSignatureP
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA signatures for auditors.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_sig;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of the offline master public keys used by the exchange.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_MasterPrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for the long-term offline master key.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @brief Type of signatures by the offline master public key used by the exchange.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_MasterSignatureP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses EdDSA for the long-term offline master key.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of public keys for Taler coins. The same key material is used
|
2015-05-16 14:15:34 +02:00
|
|
|
* for EdDSA and ECDHE operations.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct TALER_CoinSpendPublicKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-05-16 14:15:34 +02:00
|
|
|
* Taler uses EdDSA for coins when signing deposit requests.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
|
2015-03-28 14:22:21 +01:00
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of private keys for Taler coins. The same key material is used
|
2015-05-16 14:15:34 +02:00
|
|
|
* for EdDSA and ECDHE operations.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct TALER_CoinSpendPrivateKeyP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-05-16 14:15:34 +02:00
|
|
|
* Taler uses EdDSA for coins when signing deposit requests.
|
2015-03-28 14:22:21 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of signatures made with Taler coins.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-03-28 14:22:21 +01:00
|
|
|
struct TALER_CoinSpendSignatureP
|
2015-03-22 22:14:30 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-05-16 14:15:34 +02:00
|
|
|
* Taler uses EdDSA for coins.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
|
2015-03-22 22:14:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-03-24 16:56:06 +01:00
|
|
|
GNUNET_NETWORK_STRUCT_END
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of blinding keys for Taler.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
|
|
|
struct TALER_DenominationBlindingKey
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses RSA for blinding.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_rsa_BlindingKey *rsa_blinding_key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of (unblinded) coin signatures for Taler.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
|
|
|
struct TALER_DenominationSignature
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses RSA for blinding.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_rsa_Signature *rsa_signature;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of public signing keys for verifying blindly signed coins.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
|
|
|
struct TALER_DenominationPublicKey
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses RSA for signing coins.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *rsa_public_key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Type of private signing keys for blind signing of coins.
|
2015-03-22 22:14:30 +01:00
|
|
|
*/
|
|
|
|
struct TALER_DenominationPrivateKey
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Taler uses RSA for signing coins.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CRYPTO_rsa_PrivateKey *rsa_private_key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Public information about a coin (including the public key
|
2015-01-28 20:53:21 +01:00
|
|
|
* of the coin, the denomination key and the signature with
|
|
|
|
* the denomination key).
|
|
|
|
*/
|
|
|
|
struct TALER_CoinPublicInfo
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* The coin's public key.
|
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Public key representing the denomination of the coin
|
|
|
|
* that is being deposited.
|
|
|
|
*/
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationPublicKey denom_pub;
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* (Unblinded) signature over @e coin_pub with @e denom_pub,
|
|
|
|
* which demonstrates that the coin is valid.
|
|
|
|
*/
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationSignature denom_sig;
|
2015-01-28 20:53:21 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if a coin is valid; that is, whether the denomination key exists,
|
|
|
|
* is not expired, and the signature is correct.
|
|
|
|
*
|
|
|
|
* @param coin_public_info the coin public info to check for validity
|
|
|
|
* @return #GNUNET_YES if the coin is valid,
|
|
|
|
* #GNUNET_NO if it is invalid
|
|
|
|
* #GNUNET_SYSERROR if an internal error occured
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_test_coin_valid (const struct TALER_CoinPublicInfo *coin_public_info);
|
|
|
|
|
|
|
|
|
|
|
|
/* ****************** Refresh crypto primitives ************* */
|
|
|
|
|
2015-03-24 16:56:06 +01:00
|
|
|
|
|
|
|
GNUNET_NETWORK_STRUCT_BEGIN
|
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Secret used to decrypt the key to decrypt link secrets.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferSecretP
|
2015-01-28 20:53:21 +01:00
|
|
|
{
|
|
|
|
/**
|
2015-03-27 19:58:40 +01:00
|
|
|
* Secret used to encrypt/decrypt the `struct TALER_LinkSecretP`.
|
2015-01-28 20:53:21 +01:00
|
|
|
* Must be (currently) a hash as this is what
|
|
|
|
* #GNUNET_CRYPTO_ecc_ecdh() returns to us.
|
|
|
|
*/
|
|
|
|
struct GNUNET_HashCode key;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Secret used to decrypt refresh links.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_LinkSecretP
|
2015-01-28 20:53:21 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Secret used to decrypt the refresh link data.
|
|
|
|
*/
|
|
|
|
char key[sizeof (struct GNUNET_HashCode)];
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Encrypted secret used to decrypt refresh links.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_EncryptedLinkSecretP
|
2015-01-28 20:53:21 +01:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Encrypted secret, must be the given size!
|
|
|
|
*/
|
2015-03-27 19:58:40 +01:00
|
|
|
char enc[sizeof (struct TALER_LinkSecretP)];
|
2015-01-28 20:53:21 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Representation of an refresh link in cleartext.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-04-13 18:42:39 +02:00
|
|
|
struct TALER_RefreshLinkDecrypted
|
2015-01-28 20:53:21 +01:00
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
2015-03-24 16:56:06 +01:00
|
|
|
* Private key of the coin.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
struct TALER_CoinSpendPrivateKeyP coin_priv;
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
/**
|
2015-03-24 16:56:06 +01:00
|
|
|
* Blinding key.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-24 16:56:06 +01:00
|
|
|
struct TALER_DenominationBlindingKey blinding_key;
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2016-01-17 18:19:09 +01:00
|
|
|
/**
|
2016-01-20 18:03:44 +01:00
|
|
|
* Length of the raw value in the Taler wire transfer identifier
|
|
|
|
* (in binary representation).
|
2016-01-17 18:19:09 +01:00
|
|
|
*/
|
2016-01-20 18:03:44 +01:00
|
|
|
#define TALER_WIRE_TRANSFER_IDENTIFIER_LEN 32
|
|
|
|
|
2016-01-21 08:44:45 +01:00
|
|
|
/**
|
|
|
|
* #TALER_WIRE_TRANSFER_IDENTIFIER_LEN as a string.
|
|
|
|
*/
|
|
|
|
#define TALER_WIRE_TRANSFER_IDENTIFIER_LEN_STR "32"
|
|
|
|
|
2016-01-20 18:03:44 +01:00
|
|
|
/**
|
|
|
|
* Raw value of a wire transfer subjects, without the checksum.
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierRawP
|
2016-01-17 18:19:09 +01:00
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Raw value. Note that typical payment systems (SEPA, ACH) support
|
|
|
|
* at least two lines of 27 ASCII characters to encode a transaction
|
|
|
|
* subject or "details", for a total of 54 characters. (The payment
|
|
|
|
* system protocols often support more lines, but the forms presented
|
|
|
|
* to customers are usually limited to 54 characters.)
|
|
|
|
*
|
|
|
|
* With a Base32-encoding of 5 bit per character, this gives us 270
|
|
|
|
* bits or (rounded down) 33 bytes. So we use the first 32 bytes to
|
|
|
|
* encode the actual value (i.e. a 256-bit / 32-byte public key or
|
|
|
|
* a hash code), and the last byte for a minimalistic checksum.
|
|
|
|
*/
|
2016-01-20 18:03:44 +01:00
|
|
|
uint8_t raw[TALER_WIRE_TRANSFER_IDENTIFIER_LEN];
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Binary information encoded in Crockford's Base32 in wire transfer
|
|
|
|
* subjects of transfers from Taler to a merchant. The actual value
|
2016-03-01 15:35:04 +01:00
|
|
|
* is chosen by the exchange and has no particular semantics, other than
|
|
|
|
* being unique so that the exchange can lookup details about the wire
|
2016-01-20 18:03:44 +01:00
|
|
|
* transfer when needed.
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierP
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Raw value.
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierRawP raw;
|
2016-01-17 18:19:09 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Checksum using CRC8 over the @e raw data.
|
|
|
|
*/
|
|
|
|
uint8_t crc8;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-03-24 16:56:06 +01:00
|
|
|
GNUNET_NETWORK_STRUCT_END
|
|
|
|
|
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Representation of an encrypted refresh link.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-24 16:56:06 +01:00
|
|
|
struct TALER_RefreshLinkEncrypted
|
2015-01-28 20:53:21 +01:00
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
2015-03-24 16:56:06 +01:00
|
|
|
* Encrypted blinding key with @e blinding_key_enc_size bytes,
|
|
|
|
* must be allocated at the end of this struct.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-24 16:56:06 +01:00
|
|
|
const char *blinding_key_enc;
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
/**
|
2015-03-24 16:56:06 +01:00
|
|
|
* Number of bytes in @e blinding_key_enc.
|
2015-01-28 20:53:21 +01:00
|
|
|
*/
|
2015-03-24 16:56:06 +01:00
|
|
|
size_t blinding_key_enc_size;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypted private key of the coin.
|
|
|
|
*/
|
2015-05-16 14:15:34 +02:00
|
|
|
char coin_priv_enc[sizeof (struct TALER_CoinSpendPrivateKeyP)];
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-04-15 18:12:21 +02:00
|
|
|
/**
|
|
|
|
* Decrypt the shared @a secret from the information in the
|
|
|
|
* encrypted link secret @e secret_enc using the transfer
|
|
|
|
* private key and the coin's public key.
|
2015-05-06 17:05:24 +02:00
|
|
|
*
|
2015-04-15 18:12:21 +02:00
|
|
|
* @param secret_enc encrypted link secret
|
2015-05-16 18:26:34 +02:00
|
|
|
* @param trans_priv transfer private key
|
2015-04-15 18:12:21 +02:00
|
|
|
* @param coin_pub coin public key
|
|
|
|
* @param[out] secret set to the shared secret
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_link_decrypt_secret (const struct TALER_EncryptedLinkSecretP *secret_enc,
|
|
|
|
const struct TALER_TransferPrivateKeyP *trans_priv,
|
2015-05-16 14:15:34 +02:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
2015-04-15 18:12:21 +02:00
|
|
|
struct TALER_LinkSecretP *secret);
|
|
|
|
|
|
|
|
|
2015-04-15 18:34:14 +02:00
|
|
|
/**
|
|
|
|
* Decrypt the shared @a secret from the information in the
|
|
|
|
* encrypted link secret @e secret_enc using the transfer
|
|
|
|
* public key and the coin's private key.
|
2015-05-06 17:05:24 +02:00
|
|
|
*
|
2015-04-15 18:34:14 +02:00
|
|
|
* @param secret_enc encrypted link secret
|
2015-05-16 18:26:34 +02:00
|
|
|
* @param trans_pub transfer public key
|
2015-04-15 18:34:14 +02:00
|
|
|
* @param coin_priv coin private key
|
|
|
|
* @param[out] secret set to the shared secret
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_link_decrypt_secret2 (const struct TALER_EncryptedLinkSecretP *secret_enc,
|
|
|
|
const struct TALER_TransferPublicKeyP *trans_pub,
|
2015-05-16 14:15:34 +02:00
|
|
|
const struct TALER_CoinSpendPrivateKeyP *coin_priv,
|
2015-04-15 18:34:14 +02:00
|
|
|
struct TALER_LinkSecretP *secret);
|
|
|
|
|
|
|
|
|
2015-08-08 19:52:05 +02:00
|
|
|
/**
|
|
|
|
* Given the coin and the transfer private keys, compute the
|
|
|
|
* transfer secret. (Technically, we only need one of the two
|
|
|
|
* private keys, but the caller currently trivially only has
|
|
|
|
* the two private keys, so we derive one of the public keys
|
|
|
|
* internally to this function.)
|
|
|
|
*
|
|
|
|
* @param coin_priv coin key
|
|
|
|
* @param trans_priv transfer private key
|
2015-08-09 15:40:16 +02:00
|
|
|
* @param[out] ts computed transfer secret
|
2015-08-08 19:52:05 +02:00
|
|
|
*/
|
|
|
|
void
|
|
|
|
TALER_link_derive_transfer_secret (const struct TALER_CoinSpendPrivateKeyP *coin_priv,
|
|
|
|
const struct TALER_TransferPrivateKeyP *trans_priv,
|
|
|
|
struct TALER_TransferSecretP *ts);
|
|
|
|
|
|
|
|
|
2015-04-15 18:12:21 +02:00
|
|
|
/**
|
|
|
|
* Encrypt the shared @a secret to generate the encrypted link secret.
|
|
|
|
* Also creates the transfer key.
|
2015-05-06 17:05:24 +02:00
|
|
|
*
|
|
|
|
* @param secret link secret to encrypt
|
2015-04-15 18:12:21 +02:00
|
|
|
* @param coin_pub coin public key
|
2015-05-16 18:26:34 +02:00
|
|
|
* @param[out] trans_priv set to transfer private key
|
|
|
|
* @param[out] trans_pub set to transfer public key
|
2015-04-15 18:12:21 +02:00
|
|
|
* @param[out] secret_enc set to the encryptd @a secret
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_link_encrypt_secret (const struct TALER_LinkSecretP *secret,
|
2015-05-16 14:15:34 +02:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
2015-04-15 18:12:21 +02:00
|
|
|
struct TALER_TransferPrivateKeyP *trans_priv,
|
|
|
|
struct TALER_TransferPublicKeyP *trans_pub,
|
|
|
|
struct TALER_EncryptedLinkSecretP *secret_enc);
|
|
|
|
|
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
/**
|
|
|
|
* Use the @a trans_sec (from ECDHE) to decrypt the @a secret_enc
|
|
|
|
* to obtain the @a secret to decrypt the linkage data.
|
|
|
|
*
|
|
|
|
* @param secret_enc encrypted secret
|
|
|
|
* @param trans_sec transfer secret
|
|
|
|
* @param secret shared secret for refresh link decryption
|
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_transfer_decrypt (const struct TALER_EncryptedLinkSecretP *secret_enc,
|
|
|
|
const struct TALER_TransferSecretP *trans_sec,
|
|
|
|
struct TALER_LinkSecretP *secret);
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Use the @a trans_sec (from ECDHE) to encrypt the @a secret
|
|
|
|
* to obtain the @a secret_enc.
|
|
|
|
*
|
|
|
|
* @param secret shared secret for refresh link decryption
|
|
|
|
* @param trans_sec transfer secret
|
2015-03-28 15:42:07 +01:00
|
|
|
* @param[out] secret_enc encrypted secret
|
2015-01-28 20:53:21 +01:00
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_transfer_encrypt (const struct TALER_LinkSecretP *secret,
|
|
|
|
const struct TALER_TransferSecretP *trans_sec,
|
|
|
|
struct TALER_EncryptedLinkSecretP *secret_enc);
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt refresh link information.
|
|
|
|
*
|
|
|
|
* @param input encrypted refresh link data
|
|
|
|
* @param secret shared secret to use for decryption
|
|
|
|
* @return NULL on error
|
|
|
|
*/
|
2015-04-13 18:42:39 +02:00
|
|
|
struct TALER_RefreshLinkDecrypted *
|
2015-01-28 20:53:21 +01:00
|
|
|
TALER_refresh_decrypt (const struct TALER_RefreshLinkEncrypted *input,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_LinkSecretP *secret);
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypt refresh link information.
|
|
|
|
*
|
|
|
|
* @param input plaintext refresh link data
|
|
|
|
* @param secret shared secret to use for encryption
|
|
|
|
* @return NULL on error (should never happen)
|
|
|
|
*/
|
|
|
|
struct TALER_RefreshLinkEncrypted *
|
2015-04-13 18:42:39 +02:00
|
|
|
TALER_refresh_encrypt (const struct TALER_RefreshLinkDecrypted *input,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_LinkSecretP *secret);
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
|
2015-01-29 17:34:37 +01:00
|
|
|
/**
|
|
|
|
* Decode encrypted refresh link information from buffer.
|
|
|
|
*
|
|
|
|
* @param buf buffer with refresh link data
|
|
|
|
* @param buf_len number of bytes in @a buf
|
|
|
|
* @return NULL on error (@a buf_len too small)
|
|
|
|
*/
|
|
|
|
struct TALER_RefreshLinkEncrypted *
|
|
|
|
TALER_refresh_link_encrypted_decode (const char *buf,
|
|
|
|
size_t buf_len);
|
|
|
|
|
|
|
|
|
2015-04-18 13:08:19 +02:00
|
|
|
/**
|
|
|
|
* Encode encrypted refresh link information to buffer.
|
|
|
|
*
|
|
|
|
* @param rle refresh link to encode
|
|
|
|
* @param[out] buf_len set number of bytes returned
|
|
|
|
* @return NULL on error, otherwise buffer with encoded @a rle
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
TALER_refresh_link_encrypted_encode (const struct TALER_RefreshLinkEncrypted *rle,
|
|
|
|
size_t *buf_len);
|
|
|
|
|
|
|
|
|
2015-01-28 20:53:21 +01:00
|
|
|
|
|
|
|
#endif
|