exchange/src/include/taler_exchangedb_lib.h

404 lines
13 KiB
C
Raw Normal View History

/*
This file is part of TALER
Copyright (C) 2014-2017 Inria & GNUnet e.V.
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
2016-07-07 17:55:25 +02:00
TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
*/
/**
2016-03-01 15:35:04 +01:00
* @file include/taler_exchangedb_lib.h
* @brief IO operations for the exchange's private keys
* @author Florian Dold
* @author Benedikt Mueller
* @author Christian Grothoff
*/
2016-03-01 15:35:04 +01:00
#ifndef TALER_EXCHANGEDB_LIB_H
#define TALER_EXCHANGEDB_LIB_H
#include "taler_signatures.h"
2015-03-15 17:39:44 +01:00
/**
2016-03-01 15:35:04 +01:00
* Subdirectroy under the exchange's base directory which contains
* the exchange's signing keys.
2015-03-15 17:39:44 +01:00
*/
2016-03-01 15:35:04 +01:00
#define TALER_EXCHANGEDB_DIR_SIGNING_KEYS "signkeys"
2015-03-15 17:39:44 +01:00
/**
2016-03-01 15:35:04 +01:00
* Subdirectory under the exchange's base directory which contains
* the exchange's denomination keys.
2015-03-15 17:39:44 +01:00
*/
2016-03-01 15:35:04 +01:00
#define TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS "denomkeys"
2015-03-15 17:39:44 +01:00
GNUNET_NETWORK_STRUCT_BEGIN
/**
2016-03-01 15:35:04 +01:00
* @brief On disk format used for a exchange signing key. Signing keys are used
* by the exchange to affirm its messages, but not to create coins.
* Includes the private key followed by the public information about
* the signing key.
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_PrivateSigningKeyInformationP
{
/**
2016-03-01 15:35:04 +01:00
* Private key part of the exchange's signing key.
*/
2016-03-01 15:35:04 +01:00
struct TALER_ExchangePrivateKeyP signkey_priv;
/**
2016-03-01 15:35:04 +01:00
* Public information about a exchange signing key.
*/
2016-03-01 15:35:04 +01:00
struct TALER_ExchangeSigningKeyValidityPS issue;
};
/**
* Information about a denomination key.
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_DenominationKeyInformationP
{
/**
* Signature over this struct to affirm the validity of the key.
*/
struct TALER_MasterSignatureP signature;
/**
* Signed properties of the denomination key.
*/
struct TALER_DenominationKeyValidityPS properties;
};
GNUNET_NETWORK_STRUCT_END
/**
2015-03-28 15:53:53 +01:00
* @brief All information about a denomination key (which is used to
* sign coins into existence).
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_DenominationKeyIssueInformation
{
/**
* The private key of the denomination. Will be NULL if the private
* key is not available (this is the case after the key has expired
* for signing coins, but is still valid for depositing coins).
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPrivateKey denom_priv;
/**
* Decoded denomination public key (the hash of it is in
* @e issue, but we sometimes need the full public key as well).
*/
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPublicKey denom_pub;
/**
* Signed public information about a denomination key.
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_DenominationKeyInformationP issue;
};
/**
2015-03-28 15:53:53 +01:00
* @brief Iterator over signing keys.
*
* @param cls closure
* @param filename name of the file the key came from
* @param ski the sign key
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
2016-03-01 15:35:04 +01:00
(*TALER_EXCHANGEDB_SigningKeyIterator)(void *cls,
2016-03-21 01:45:53 +01:00
const char *filename,
const struct TALER_EXCHANGEDB_PrivateSigningKeyInformationP *ski);
/**
2016-03-01 15:35:04 +01:00
* Call @a it for each signing key found in the @a exchange_base_dir.
2015-03-15 17:39:44 +01:00
*
2016-03-01 15:35:04 +01:00
* @param exchange_base_dir base directory for the exchange,
* the signing keys must be in the #TALER_EXCHANGEDB_DIR_SIGNING_KEYS
* subdirectory
* @param it function to call on each signing key
2015-03-15 17:39:44 +01:00
* @param it_cls closure for @a it
* @return number of files found (may not match
* number of keys given to @a it as malformed
* files are simply skipped), -1 on error
*/
int
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_signing_keys_iterate (const char *exchange_base_dir,
2016-03-21 01:45:53 +01:00
TALER_EXCHANGEDB_SigningKeyIterator it,
void *it_cls);
/**
* Exports a signing key to the given file.
*
* @param exchange_base_dir base directory for the keys
* @param start start time of the validity for the key
* @param ski the signing key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
TALER_EXCHANGEDB_signing_key_write (const char *exchange_base_dir,
struct GNUNET_TIME_Absolute start,
const struct TALER_EXCHANGEDB_PrivateSigningKeyInformationP *ski);
/**
* @brief Iterator over denomination keys.
*
* @param cls closure
* @param alias coin alias
* @param dki the denomination key
* @param was_revoked #GNUNET_YES if the @a dki was revoked and wallets should trigger /payback
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
2016-03-01 15:35:04 +01:00
(*TALER_EXCHANGEDB_DenominationKeyIterator)(void *cls,
2016-03-21 01:45:53 +01:00
const char *alias,
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki,
int was_revoked);
/**
2016-03-01 15:35:04 +01:00
* Call @a it for each denomination key found in the @a exchange_base_dir.
2015-03-15 17:39:44 +01:00
*
2016-03-01 15:35:04 +01:00
* @param exchange_base_dir base directory for the exchange,
* the signing keys must be in the #TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param master_pub master public key (used to check revocations)
* @param it function to call on each denomination key found
2015-03-15 17:39:44 +01:00
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
int
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_denomination_keys_iterate (const char *exchange_base_dir,
const struct TALER_MasterPublicKeyP *master_pub,
2016-03-21 01:45:53 +01:00
TALER_EXCHANGEDB_DenominationKeyIterator it,
void *it_cls);
/**
* Mark the given denomination key as revoked and request the wallets
* to initiate /payback.
*
* @param exchange_base_dir base directory for the exchange,
* the signing keys must be in the #TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS
* subdirectory
* @param alias coin alias
* @param dki the denomination key to revoke
* @param mpriv master private key to sign
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
TALER_EXCHANGEDB_denomination_key_revoke (const char *exchange_base_dir,
const char *alias,
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki,
const struct TALER_MasterPrivateKeyP *mpriv);
/**
* Exports a denomination key to the given file.
*
* @param filename the file where to write the denomination key
* @param dki the denomination key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_denomination_key_write (const char *filename,
2016-03-21 01:45:53 +01:00
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki);
/**
* Import a denomination key from the given file.
*
* @param filename the file to import the key from
2015-03-28 15:42:07 +01:00
* @param[out] dki set to the imported denomination key
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure
*/
int
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_denomination_key_read (const char *filename,
2016-03-21 01:45:53 +01:00
struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki);
/**
* @brief Iterator over auditor information.
*
* @param cls closure
* @param apub the auditor's public key
2016-03-21 01:45:53 +01:00
* @param auditor_url URL of the auditor
2016-03-01 15:35:04 +01:00
* @param mpub the exchange's public key (as expected by the auditor)
2015-09-19 16:34:27 +02:00
* @param dki_len length of @a asig and @a dki arrays
* @param asigs array of the auditor's signatures over the @a dks, of length @a dki_len
* @param dki array of denomination coin data signed by the auditor, of length @a dki_len
* @return #GNUNET_OK to continue to iterate,
* #GNUNET_NO to stop iteration with no error,
* #GNUNET_SYSERR to abort iteration with error!
*/
typedef int
2016-03-01 15:35:04 +01:00
(*TALER_EXCHANGEDB_AuditorIterator)(void *cls,
2016-03-21 01:45:53 +01:00
const struct TALER_AuditorPublicKeyP *apub,
const char *auditor_url,
const struct TALER_MasterPublicKeyP *mpub,
unsigned int dki_len,
const struct TALER_AuditorSignatureP *asigs,
const struct TALER_DenominationKeyValidityPS *dki);
/**
2016-05-06 19:39:31 +02:00
* Call @a it with information for each auditor found in the
* directory with auditor information as specified in @a cfg.
*
* @param cfg configuration to use
* @param it function to call with auditor information
* @param it_cls closure for @a it
* @return -1 on error, 0 if no files were found, otherwise
* a positive number (however, even with a positive
* number it is possible that @a it was never called
* as maybe none of the files were well-formed)
*/
int
TALER_EXCHANGEDB_auditor_iterate (const struct GNUNET_CONFIGURATION_Handle *cfg,
2016-03-21 01:45:53 +01:00
TALER_EXCHANGEDB_AuditorIterator it,
void *it_cls);
/**
* Write auditor information to the given file.
*
* @param filename the file where to write the auditor information to
* @param apub the auditor's public key
2016-03-21 01:45:53 +01:00
* @param auditor_url the URL of the auditor
2015-09-19 16:34:27 +02:00
* @param asigs the auditor's signatures, array of length @a dki_len
2016-03-01 15:35:04 +01:00
* @param mpub the exchange's public key (as expected by the auditor)
2015-09-19 16:34:27 +02:00
* @param dki_len length of @a dki and @a asigs arrays
* @param dki array of denomination coin data signed by the auditor
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
*/
int
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_auditor_write (const char *filename,
2016-03-21 01:45:53 +01:00
const struct TALER_AuditorPublicKeyP *apub,
const char *auditor_url,
const struct TALER_AuditorSignatureP *asigs,
const struct TALER_MasterPublicKeyP *mpub,
unsigned int dki_len,
const struct TALER_DenominationKeyValidityPS *dki);
2015-03-28 11:06:00 +01:00
/**
* Initialize the plugin.
*
* @param cfg configuration to use
* @return NULL on failure
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_Plugin *
TALER_EXCHANGEDB_plugin_load (const struct GNUNET_CONFIGURATION_Handle *cfg);
2015-03-28 11:06:00 +01:00
/**
* Shutdown the plugin.
*
* @param plugin plugin to unload
*/
void
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_plugin_unload (struct TALER_EXCHANGEDB_Plugin *plugin);
2015-03-28 11:06:00 +01:00
/**
* Sorted list of fees to be paid for aggregate wire transfers.
*/
struct TALER_EXCHANGEDB_AggregateFees
{
/**
* This is a linked list.
*/
struct TALER_EXCHANGEDB_AggregateFees *next;
/**
* Fee to be paid.
*/
struct TALER_Amount wire_fee;
/**
* Time when this fee goes into effect (inclusive)
*/
struct GNUNET_TIME_Absolute start_date;
/**
* Time when this fee stops being in effect (exclusive).
*/
struct GNUNET_TIME_Absolute end_date;
/**
* Signature affirming the above fee structure.
*/
struct TALER_MasterSignatureP master_sig;
};
/**
* Read the current fee structure from disk.
*
* @param cfg configuration to use
* @param wireplugin name of the wire plugin to read fees for
* @return sorted list of aggregation fees, NULL on error
*/
struct TALER_EXCHANGEDB_AggregateFees *
TALER_EXCHANGEDB_fees_read (const struct GNUNET_CONFIGURATION_Handle *cfg,
const char *wireplugin);
/**
* Convert @a af to @a wf.
*
2017-03-04 18:09:39 +01:00
* @param wireplugin name of the wire plugin the fees are for
* @param[in,out] af aggregate fees, host format (updated to round time)
* @param[out] wf aggregate fees, disk / signature format
*/
void
2017-03-04 18:09:39 +01:00
TALER_EXCHANGEDB_fees_2_wf (const char *wireplugin,
struct TALER_EXCHANGEDB_AggregateFees *af,
struct TALER_MasterWireFeePS *wf);
/**
* Write given fee structure to disk.
*
* @param filename where to write the fees
2017-03-04 18:09:39 +01:00
* @param wireplugin name of the plugin for which we write the fees
* @param af fee structure to write
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
int
TALER_EXCHANGEDB_fees_write (const char *filename,
2017-03-04 18:09:39 +01:00
const char *wireplugin,
struct TALER_EXCHANGEDB_AggregateFees *af);
/**
* Free @a af data structure
*
* @param af list to free
*/
void
TALER_EXCHANGEDB_fees_free (struct TALER_EXCHANGEDB_AggregateFees *af);
#endif