exchange/src/include/taler_crypto_lib.h

561 lines
13 KiB
C
Raw Normal View History

/*
This file is part of TALER
Copyright (C) 2014, 2015 Christian Grothoff (and other contributing authors)
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
* @file include/taler_crypto_lib.h
* @brief taler-specific crypto functions
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
*/
#ifndef TALER_CRYPTO_LIB_H
#define TALER_CRYPTO_LIB_H
#include <gnunet/gnunet_util_lib.h>
#include <gcrypt.h>
/* ****************** Coin crypto primitives ************* */
GNUNET_NETWORK_STRUCT_BEGIN
2015-03-22 22:14:30 +01:00
/**
2015-03-28 15:53:53 +01:00
* @brief Type of public keys for Taler reserves.
2015-03-22 22:14:30 +01:00
*/
struct TALER_ReservePublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for reserves.
*/
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of private keys for Taler reserves.
2015-03-22 22:14:30 +01:00
*/
struct TALER_ReservePrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for reserves.
*/
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of signatures used with Taler reserves.
2015-03-22 22:14:30 +01:00
*/
struct TALER_ReserveSignatureP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for reserves.
*/
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of public keys to for merchant authorizations.
2015-03-22 22:14:30 +01:00
* Merchants can issue refunds using the corresponding
* private key.
*/
struct TALER_MerchantPublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for merchants.
*/
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of private keys for merchant authorizations.
2015-03-22 22:14:30 +01:00
* Merchants can issue refunds using the corresponding
* private key.
*/
struct TALER_MerchantPrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for merchants.
*/
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of transfer public keys used during refresh
2015-03-22 22:14:30 +01:00
* operations.
*/
struct TALER_TransferPublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses ECDSA for transfer keys.
*/
2015-04-10 22:18:50 +02:00
struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub;
2015-03-22 22:14:30 +01:00
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of transfer public keys used during refresh
2015-03-22 22:14:30 +01:00
* operations.
*/
struct TALER_TransferPrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses ECDSA for melting session keys.
*/
2015-04-10 22:18:50 +02:00
struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv;
2015-03-22 22:14:30 +01:00
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of online public keys used by the mint to sign
2015-03-22 22:14:30 +01:00
* messages.
*/
struct TALER_MintPublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for online mint message signing.
*/
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of online public keys used by the mint to
2015-03-22 22:14:30 +01:00
* sign messages.
*/
struct TALER_MintPrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for online signatures sessions.
*/
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of signatures used by the mint to sign messages online.
2015-03-22 22:14:30 +01:00
*/
struct TALER_MintSignatureP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for online signatures sessions.
*/
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of the offline master public key used by the mint.
2015-03-22 22:14:30 +01:00
*/
struct TALER_MasterPublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for the long-term offline master key.
*/
struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of the offline master public keys used by the mint.
2015-03-22 22:14:30 +01:00
*/
struct TALER_MasterPrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for the long-term offline master key.
*/
struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of signatures by the offline master public key used by the mint.
2015-03-22 22:14:30 +01:00
*/
struct TALER_MasterSignatureP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses EdDSA for the long-term offline master key.
*/
struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of public keys for Taler coins. The same key material is used
* for ECDSA and ECDHE operations.
2015-03-22 22:14:30 +01:00
*/
union TALER_CoinSpendPublicKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses ECDSA for coins when signing deposit requests.
2015-03-22 22:14:30 +01:00
*/
struct GNUNET_CRYPTO_EcdsaPublicKey ecdsa_pub;
/**
* Taler uses ECDH(E) for coin linkage during refresh operations.
*/
struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub;
2015-03-22 22:14:30 +01:00
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of private keys for Taler coins. The same key material is used
* for ECDSA and ECDHE operations.
2015-03-22 22:14:30 +01:00
*/
union TALER_CoinSpendPrivateKeyP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses ECDSA for coins when signing deposit requests.
2015-03-22 22:14:30 +01:00
*/
struct GNUNET_CRYPTO_EcdsaPrivateKey ecdsa_priv;
/**
* Taler uses ECDHE for coin linkage during refresh operations.
*/
struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv;
2015-03-22 22:14:30 +01:00
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of signatures made with Taler coins.
2015-03-22 22:14:30 +01:00
*/
struct TALER_CoinSpendSignatureP
2015-03-22 22:14:30 +01:00
{
/**
* Taler uses ECDSA for coins.
*/
struct GNUNET_CRYPTO_EcdsaSignature ecdsa_signature;
};
GNUNET_NETWORK_STRUCT_END
2015-03-22 22:14:30 +01:00
/**
2015-03-28 15:53:53 +01:00
* @brief Type of blinding keys for Taler.
2015-03-22 22:14:30 +01:00
*/
struct TALER_DenominationBlindingKey
{
/**
* Taler uses RSA for blinding.
*/
struct GNUNET_CRYPTO_rsa_BlindingKey *rsa_blinding_key;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of (unblinded) coin signatures for Taler.
2015-03-22 22:14:30 +01:00
*/
struct TALER_DenominationSignature
{
/**
* Taler uses RSA for blinding.
*/
struct GNUNET_CRYPTO_rsa_Signature *rsa_signature;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of public signing keys for verifying blindly signed coins.
2015-03-22 22:14:30 +01:00
*/
struct TALER_DenominationPublicKey
{
/**
* Taler uses RSA for signing coins.
*/
struct GNUNET_CRYPTO_rsa_PublicKey *rsa_public_key;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Type of private signing keys for blind signing of coins.
2015-03-22 22:14:30 +01:00
*/
struct TALER_DenominationPrivateKey
{
/**
* Taler uses RSA for signing coins.
*/
struct GNUNET_CRYPTO_rsa_PrivateKey *rsa_private_key;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Public information about a coin (including the public key
* of the coin, the denomination key and the signature with
* the denomination key).
*/
struct TALER_CoinPublicInfo
{
/**
* The coin's public key.
*/
union TALER_CoinSpendPublicKeyP coin_pub;
/**
* Public key representing the denomination of the coin
* that is being deposited.
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPublicKey denom_pub;
/**
* (Unblinded) signature over @e coin_pub with @e denom_pub,
* which demonstrates that the coin is valid.
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationSignature denom_sig;
};
/**
* Check if a coin is valid; that is, whether the denomination key exists,
* is not expired, and the signature is correct.
*
* @param coin_public_info the coin public info to check for validity
* @return #GNUNET_YES if the coin is valid,
* #GNUNET_NO if it is invalid
* #GNUNET_SYSERROR if an internal error occured
*/
int
TALER_test_coin_valid (const struct TALER_CoinPublicInfo *coin_public_info);
/* ****************** Refresh crypto primitives ************* */
GNUNET_NETWORK_STRUCT_BEGIN
/**
2015-03-28 15:53:53 +01:00
* @brief Secret used to decrypt the key to decrypt link secrets.
*/
struct TALER_TransferSecretP
{
/**
* Secret used to encrypt/decrypt the `struct TALER_LinkSecretP`.
* Must be (currently) a hash as this is what
* #GNUNET_CRYPTO_ecc_ecdh() returns to us.
*/
struct GNUNET_HashCode key;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Secret used to decrypt refresh links.
*/
struct TALER_LinkSecretP
{
/**
* Secret used to decrypt the refresh link data.
*/
char key[sizeof (struct GNUNET_HashCode)];
};
/**
2015-03-28 15:53:53 +01:00
* @brief Encrypted secret used to decrypt refresh links.
*/
struct TALER_EncryptedLinkSecretP
{
/**
* Encrypted secret, must be the given size!
*/
char enc[sizeof (struct TALER_LinkSecretP)];
};
/**
2015-03-28 15:53:53 +01:00
* @brief Representation of an refresh link in cleartext.
*/
struct TALER_RefreshLinkDecrypted
{
/**
* Private key of the coin.
*/
union TALER_CoinSpendPrivateKeyP coin_priv;
/**
* Blinding key.
*/
struct TALER_DenominationBlindingKey blinding_key;
};
GNUNET_NETWORK_STRUCT_END
/**
2015-03-28 15:53:53 +01:00
* @brief Representation of an encrypted refresh link.
*/
struct TALER_RefreshLinkEncrypted
{
/**
* Encrypted blinding key with @e blinding_key_enc_size bytes,
* must be allocated at the end of this struct.
*/
const char *blinding_key_enc;
/**
* Number of bytes in @e blinding_key_enc.
*/
size_t blinding_key_enc_size;
/**
* Encrypted private key of the coin.
*/
char coin_priv_enc[sizeof (union TALER_CoinSpendPrivateKeyP)];
};
/**
* Decrypt the shared @a secret from the information in the
* encrypted link secret @e secret_enc using the transfer
* private key and the coin's public key.
*
* @param secret_enc encrypted link secret
* @param transfer_priv transfer private key
* @param coin_pub coin public key
* @param[out] secret set to the shared secret
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
int
TALER_link_decrypt_secret (const struct TALER_EncryptedLinkSecretP *secret_enc,
const struct TALER_TransferPrivateKeyP *trans_priv,
const union TALER_CoinSpendPublicKeyP *coin_pub,
struct TALER_LinkSecretP *secret);
2015-04-15 18:34:14 +02:00
/**
* Decrypt the shared @a secret from the information in the
* encrypted link secret @e secret_enc using the transfer
* public key and the coin's private key.
*
* @param secret_enc encrypted link secret
* @param transfer_pub transfer public key
* @param coin_priv coin private key
* @param[out] secret set to the shared secret
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
int
TALER_link_decrypt_secret2 (const struct TALER_EncryptedLinkSecretP *secret_enc,
const struct TALER_TransferPublicKeyP *trans_pub,
const union TALER_CoinSpendPrivateKeyP *coin_priv,
struct TALER_LinkSecretP *secret);
/**
* Encrypt the shared @a secret to generate the encrypted link secret.
* Also creates the transfer key.
*
* @param secret link secret to encrypt
* @param coin_pub coin public key
* @param transfer_priv[out] set to transfer private key
* @param transfer_pub[out] set to transfer public key
* @param[out] secret_enc set to the encryptd @a secret
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
int
TALER_link_encrypt_secret (const struct TALER_LinkSecretP *secret,
const union TALER_CoinSpendPublicKeyP *coin_pub,
struct TALER_TransferPrivateKeyP *trans_priv,
struct TALER_TransferPublicKeyP *trans_pub,
struct TALER_EncryptedLinkSecretP *secret_enc);
/**
* Use the @a trans_sec (from ECDHE) to decrypt the @a secret_enc
* to obtain the @a secret to decrypt the linkage data.
*
* @param secret_enc encrypted secret
* @param trans_sec transfer secret
* @param secret shared secret for refresh link decryption
* @return #GNUNET_OK on success
*/
int
TALER_transfer_decrypt (const struct TALER_EncryptedLinkSecretP *secret_enc,
const struct TALER_TransferSecretP *trans_sec,
struct TALER_LinkSecretP *secret);
/**
* Use the @a trans_sec (from ECDHE) to encrypt the @a secret
* to obtain the @a secret_enc.
*
* @param secret shared secret for refresh link decryption
* @param trans_sec transfer secret
2015-03-28 15:42:07 +01:00
* @param[out] secret_enc encrypted secret
* @return #GNUNET_OK on success
*/
int
TALER_transfer_encrypt (const struct TALER_LinkSecretP *secret,
const struct TALER_TransferSecretP *trans_sec,
struct TALER_EncryptedLinkSecretP *secret_enc);
/**
* Decrypt refresh link information.
*
* @param input encrypted refresh link data
* @param secret shared secret to use for decryption
* @return NULL on error
*/
struct TALER_RefreshLinkDecrypted *
TALER_refresh_decrypt (const struct TALER_RefreshLinkEncrypted *input,
const struct TALER_LinkSecretP *secret);
/**
* Encrypt refresh link information.
*
* @param input plaintext refresh link data
* @param secret shared secret to use for encryption
* @return NULL on error (should never happen)
*/
struct TALER_RefreshLinkEncrypted *
TALER_refresh_encrypt (const struct TALER_RefreshLinkDecrypted *input,
const struct TALER_LinkSecretP *secret);
/**
* Decode encrypted refresh link information from buffer.
*
* @param buf buffer with refresh link data
* @param buf_len number of bytes in @a buf
* @return NULL on error (@a buf_len too small)
*/
struct TALER_RefreshLinkEncrypted *
TALER_refresh_link_encrypted_decode (const char *buf,
size_t buf_len);
/**
* Encode encrypted refresh link information to buffer.
*
* @param rle refresh link to encode
* @param[out] buf_len set number of bytes returned
* @return NULL on error, otherwise buffer with encoded @a rle
*/
char *
TALER_refresh_link_encrypted_encode (const struct TALER_RefreshLinkEncrypted *rle,
size_t *buf_len);
#endif