2015-01-08 18:37:20 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
|
|
|
(C) 2014 GNUnet e.V.
|
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU Affero General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file taler-mint-httpd_refresh.c
|
|
|
|
* @brief Handle /refresh/ requests
|
|
|
|
* @author Florian Dold
|
|
|
|
* @author Benedikt Mueller
|
|
|
|
* @author Christian Grothoff
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
|
|
|
* TODO:
|
2015-01-21 13:47:34 +01:00
|
|
|
* - split /refresh/reveal properly into parsing, DB-ops and response generation
|
|
|
|
* - error handling
|
|
|
|
* - document functions properly
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
|
|
|
#include <jansson.h>
|
|
|
|
#include <microhttpd.h>
|
|
|
|
#include <libpq-fe.h>
|
|
|
|
#include <pthread.h>
|
|
|
|
#include "mint.h"
|
|
|
|
#include "mint_db.h"
|
|
|
|
#include "taler_signatures.h"
|
2015-01-28 20:55:15 +01:00
|
|
|
#include "taler_util.h"
|
2015-01-16 13:50:07 +01:00
|
|
|
#include "taler-mint-httpd_parsing.h"
|
2015-01-08 18:37:20 +01:00
|
|
|
#include "taler-mint-httpd_keys.h"
|
|
|
|
#include "taler-mint-httpd_mhd.h"
|
|
|
|
#include "taler-mint-httpd_refresh.h"
|
2015-01-16 13:50:07 +01:00
|
|
|
#include "taler-mint-httpd_responses.h"
|
2015-01-28 21:08:19 +01:00
|
|
|
#include "taler-mint-httpd_keystate.h"
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
check_confirm_signature (struct MHD_Connection *connection,
|
|
|
|
json_t *coin_info,
|
|
|
|
const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub,
|
|
|
|
const struct GNUNET_CRYPTO_EddsaPublicKey *session_pub)
|
|
|
|
{
|
|
|
|
struct RefreshMeltConfirmSignRequestBody body;
|
|
|
|
struct GNUNET_CRYPTO_EcdsaSignature sig;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
body.purpose.size = htonl (sizeof (struct RefreshMeltConfirmSignRequestBody));
|
|
|
|
body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_MELT_CONFIRM);
|
|
|
|
body.session_pub = *session_pub;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, coin_info,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "confirm_sig",
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&sig,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaSignature));
|
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_CRYPTO_ecdsa_verify (TALER_SIGNATURE_REFRESH_MELT_CONFIRM,
|
|
|
|
&body.purpose,
|
|
|
|
&sig,
|
|
|
|
coin_pub))
|
|
|
|
{
|
|
|
|
if (MHD_YES !=
|
2015-01-16 13:50:07 +01:00
|
|
|
TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_UNAUTHORIZED,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "signature invalid"))
|
2015-01-08 18:37:20 +01:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
return GNUNET_NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Extract public coin information from a JSON object.
|
|
|
|
*
|
|
|
|
* @param connection the connection to send error responses to
|
|
|
|
* @param root the JSON object to extract the coin info from
|
2015-01-19 21:53:23 +01:00
|
|
|
* @return #GNUNET_YES if coin public info in JSON was valid
|
2015-01-26 12:22:26 +01:00
|
|
|
* #GNUNET_NO JSON was invalid, response was generated
|
2015-01-19 21:53:23 +01:00
|
|
|
* #GNUNET_SYSERR on internal error
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
request_json_require_coin_public_info (struct MHD_Connection *connection,
|
|
|
|
json_t *root,
|
|
|
|
struct TALER_CoinPublicInfo *r_public_info)
|
|
|
|
{
|
|
|
|
int ret;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature *sig;
|
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey *pk;
|
|
|
|
struct GNUNET_MINT_ParseFieldSpec spec[] =
|
|
|
|
{
|
|
|
|
TALER_MINT_PARSE_FIXED("coin_pub", &r_public_info->coin_pub),
|
|
|
|
TALER_MINT_PARSE_VARIABLE("denom_sig"),
|
|
|
|
TALER_MINT_PARSE_VARIABLE("denom_pub"),
|
|
|
|
TALER_MINT_PARSE_END
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = TALER_MINT_parse_json_data (connection,
|
|
|
|
root,
|
|
|
|
spec);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_OK != ret)
|
|
|
|
return ret;
|
2015-01-26 12:22:26 +01:00
|
|
|
sig = GNUNET_CRYPTO_rsa_signature_decode (spec[1].destination,
|
|
|
|
spec[1].destination_size_out);
|
|
|
|
pk = GNUNET_CRYPTO_rsa_public_key_decode (spec[2].destination,
|
|
|
|
spec[2].destination_size_out);
|
|
|
|
TALER_MINT_release_parsed_data (spec);
|
|
|
|
if ( (NULL == pk) ||
|
|
|
|
(NULL == sig) )
|
|
|
|
{
|
|
|
|
if (NULL != sig)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (sig);
|
|
|
|
if (NULL != pk)
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (pk);
|
|
|
|
// FIXME: send error reply...
|
|
|
|
return GNUNET_NO;
|
|
|
|
}
|
|
|
|
r_public_info->denom_sig = sig;
|
|
|
|
r_public_info->denom_pub = pk;
|
2015-01-08 18:37:20 +01:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Verify a signature that is encoded in a JSON object
|
|
|
|
*
|
|
|
|
* @param connection the connection to send errors to
|
|
|
|
* @param root the JSON object with the signature
|
|
|
|
* @param the public key that the signature was created with
|
|
|
|
* @param purpose the signed message
|
2015-01-20 15:17:41 +01:00
|
|
|
* @return #GNUNET_YES if the signature was valid
|
|
|
|
* #GNUNET_NO if the signature was invalid
|
|
|
|
* #GNUNET_SYSERR on internal error
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
request_json_check_signature (struct MHD_Connection *connection,
|
|
|
|
json_t *root,
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey *pub,
|
|
|
|
struct GNUNET_CRYPTO_EccSignaturePurpose *purpose)
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaSignature signature;
|
|
|
|
int size;
|
|
|
|
uint32_t purpose_num;
|
|
|
|
int res;
|
|
|
|
json_t *el;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "sig",
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&signature,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaSignature));
|
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "purpose",
|
|
|
|
JNAV_RET_TYPED_JSON,
|
|
|
|
JSON_INTEGER,
|
|
|
|
&el);
|
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
|
|
|
|
purpose_num = json_integer_value (el);
|
|
|
|
|
|
|
|
if (purpose_num != ntohl (purpose->purpose))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (purpose wrong)\n");
|
2015-01-16 13:50:07 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "signature invalid (purpose)");
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "size",
|
|
|
|
JNAV_RET_TYPED_JSON,
|
|
|
|
JSON_INTEGER,
|
|
|
|
&el);
|
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
|
|
|
|
size = json_integer_value (el);
|
|
|
|
|
|
|
|
if (size != ntohl (purpose->size))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (size wrong)\n");
|
2015-01-16 13:50:07 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
GNUNET_NO, GNUNET_SYSERR,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "signature invalid (size)");
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify (purpose_num,
|
|
|
|
purpose,
|
|
|
|
&signature,
|
|
|
|
pub))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (did not verify)\n");
|
2015-01-16 13:50:07 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_UNAUTHORIZED,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"invalid signature (verification)");
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle a "/refresh/melt" request
|
|
|
|
*
|
|
|
|
* @param rh context of the handler
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param[IN|OUT] connection_cls the connection's closure (can be updated)
|
|
|
|
* @param upload_data upload data
|
|
|
|
* @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_handler_refresh_melt (struct RequestHandler *rh,
|
|
|
|
struct MHD_Connection *connection,
|
|
|
|
void **connection_cls,
|
|
|
|
const char *upload_data,
|
|
|
|
size_t *upload_data_size)
|
|
|
|
{
|
|
|
|
json_t *root;
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey refresh_session_pub;
|
|
|
|
int res;
|
2015-01-20 17:50:32 +01:00
|
|
|
json_t *new_denoms;
|
|
|
|
unsigned int num_new_denoms;
|
|
|
|
unsigned int i;
|
2015-01-27 18:57:29 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_PublicKey **denom_pubs;
|
2015-01-20 17:50:32 +01:00
|
|
|
json_t *melt_coins;
|
|
|
|
struct TALER_CoinPublicInfo *coin_public_infos;
|
|
|
|
unsigned int coin_count;
|
2015-01-21 12:46:14 +01:00
|
|
|
struct GNUNET_HashContext *hash_context;
|
|
|
|
struct GNUNET_HashCode melt_hash;
|
|
|
|
struct MintKeyState *key_state;
|
|
|
|
struct RefreshMeltSignatureBody body;
|
|
|
|
json_t *melt_sig_json;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *buf;
|
|
|
|
size_t buf_size;
|
2015-01-28 20:23:19 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv *dki;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-16 14:04:02 +01:00
|
|
|
res = TALER_MINT_parse_post_json (connection,
|
2015-01-16 14:27:42 +01:00
|
|
|
connection_cls,
|
|
|
|
upload_data,
|
|
|
|
upload_data_size,
|
|
|
|
&root);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
return MHD_NO;
|
2015-01-16 14:27:42 +01:00
|
|
|
if ( (GNUNET_NO == res) || (NULL == root) )
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_YES;
|
|
|
|
|
|
|
|
/* session_pub field must always be present */
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "session_pub",
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&refresh_session_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey));
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
if (GNUNET_NO == res)
|
|
|
|
return MHD_YES;
|
|
|
|
|
2015-01-20 17:50:32 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "new_denoms",
|
|
|
|
JNAV_RET_TYPED_JSON,
|
|
|
|
JSON_ARRAY,
|
|
|
|
&new_denoms);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
num_new_denoms = json_array_size (new_denoms);
|
|
|
|
denom_pubs = GNUNET_malloc (num_new_denoms *
|
2015-01-26 12:22:26 +01:00
|
|
|
sizeof (struct GNUNET_CRYPTO_rsa_PublicKey *));
|
2015-01-20 17:50:32 +01:00
|
|
|
|
|
|
|
for (i=0;i<num_new_denoms;i++)
|
|
|
|
{
|
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "new_denoms",
|
|
|
|
JNAV_INDEX, (int) i,
|
2015-01-26 12:22:26 +01:00
|
|
|
JNAV_RET_DATA_VAR,
|
|
|
|
&buf,
|
|
|
|
&buf_size);
|
2015-01-20 17:50:32 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_free (denom_pubs);
|
|
|
|
/* FIXME: proper cleanup! */
|
|
|
|
return res;
|
|
|
|
}
|
2015-01-26 12:22:26 +01:00
|
|
|
denom_pubs[i] = GNUNET_CRYPTO_rsa_public_key_decode (buf, buf_size);
|
|
|
|
GNUNET_free (buf);
|
|
|
|
if (NULL == denom_pubs[i])
|
|
|
|
{
|
|
|
|
GNUNET_free (denom_pubs);
|
|
|
|
/* FIXME: proper cleanup! */
|
|
|
|
/* FIXME: generate error reply */
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2015-01-20 17:50:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 12:46:14 +01:00
|
|
|
JNAV_FIELD, "melt_coins",
|
|
|
|
JNAV_RET_TYPED_JSON,
|
|
|
|
JSON_ARRAY,
|
|
|
|
&melt_coins);
|
2015-01-20 17:50:32 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
// FIXME: leaks!
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2015-01-21 12:46:14 +01:00
|
|
|
melt_sig_json = json_object_get (root,
|
|
|
|
"melt_signature");
|
|
|
|
if (NULL == melt_sig_json)
|
|
|
|
{
|
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"melt_signature missing");
|
|
|
|
}
|
|
|
|
|
2015-01-20 17:50:32 +01:00
|
|
|
coin_count = json_array_size (melt_coins);
|
|
|
|
coin_public_infos = GNUNET_malloc (coin_count *
|
|
|
|
sizeof (struct TALER_CoinPublicInfo));
|
|
|
|
key_state = TALER_MINT_key_state_acquire ();
|
|
|
|
for (i = 0; i < coin_count; i++)
|
|
|
|
{
|
|
|
|
/* decode JSON data on coin to melt */
|
|
|
|
res = request_json_require_coin_public_info (connection,
|
|
|
|
json_array_get (melt_coins, i),
|
|
|
|
&coin_public_infos[i]);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
|
|
|
// FIXME: leaks!
|
2015-01-28 20:23:19 +01:00
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-20 17:50:32 +01:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
/* check that this coin's private key was used to sign that
|
|
|
|
we should melt it */
|
2015-01-28 20:23:19 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = check_confirm_signature (connection,
|
|
|
|
json_array_get (melt_coins, i),
|
|
|
|
&coin_public_infos[i].coin_pub,
|
|
|
|
&refresh_session_pub)))
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
|
|
|
// FIXME: leaks!
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
/* check coin denomination is valid */
|
|
|
|
dki = TALER_MINT_get_denom_key (key_state,
|
|
|
|
coin_public_infos[i].denom_pub);
|
|
|
|
if (NULL == dki)
|
|
|
|
{
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
LOG_WARNING ("Unknown denomination key in /refresh/melt request\n");
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
return TALER_MINT_reply_arg_invalid (connection,
|
|
|
|
"melt_coins");
|
|
|
|
}
|
2015-01-20 17:50:32 +01:00
|
|
|
/* check mint signature on the coin */
|
2015-01-28 20:23:19 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_test_coin_valid (&coin_public_infos[i]))
|
2015-01-20 17:50:32 +01:00
|
|
|
{
|
|
|
|
// FIXME: leaks!
|
2015-01-28 20:23:19 +01:00
|
|
|
TALER_MINT_key_state_release (key_state);
|
2015-01-20 17:50:32 +01:00
|
|
|
return (MHD_YES ==
|
|
|
|
TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error", "coin invalid"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
TALER_MINT_key_state_release (key_state);
|
|
|
|
|
2015-01-21 12:46:14 +01:00
|
|
|
/* check that signature from the session public key is ok */
|
2015-01-09 17:26:02 +01:00
|
|
|
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
2015-01-21 12:46:14 +01:00
|
|
|
for (i = 0; i < num_new_denoms; i++)
|
2015-01-26 12:22:26 +01:00
|
|
|
{
|
|
|
|
buf_size = GNUNET_CRYPTO_rsa_public_key_encode (denom_pubs[i],
|
|
|
|
&buf);
|
2015-01-21 12:46:14 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
2015-01-26 12:22:26 +01:00
|
|
|
buf,
|
|
|
|
buf_size);
|
|
|
|
GNUNET_free (buf);
|
|
|
|
}
|
2015-01-21 12:46:14 +01:00
|
|
|
for (i = 0; i < coin_count; i++)
|
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
|
|
|
&coin_public_infos[i].coin_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey));
|
|
|
|
GNUNET_CRYPTO_hash_context_finish (hash_context,
|
|
|
|
&melt_hash);
|
|
|
|
|
|
|
|
body.melt_hash = melt_hash;
|
|
|
|
body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_MELT);
|
|
|
|
body.purpose.size = htonl (sizeof (struct RefreshMeltSignatureBody));
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-20 17:50:32 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-01-21 12:46:14 +01:00
|
|
|
(res = request_json_check_signature (connection,
|
|
|
|
melt_sig_json,
|
|
|
|
&refresh_session_pub,
|
|
|
|
&body.purpose)))
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 12:46:14 +01:00
|
|
|
// FIXME: generate proper error reply
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-21 12:46:14 +01:00
|
|
|
res = TALER_MINT_db_execute_refresh_melt (connection,
|
|
|
|
&refresh_session_pub,
|
|
|
|
num_new_denoms,
|
|
|
|
denom_pubs,
|
|
|
|
coin_count,
|
|
|
|
coin_public_infos);
|
2015-01-21 13:38:57 +01:00
|
|
|
// FIXME: free memory
|
2015-01-21 12:46:14 +01:00
|
|
|
return res;
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle a "/refresh/commit" request
|
|
|
|
*
|
|
|
|
* @param rh context of the handler
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param[IN|OUT] connection_cls the connection's closure (can be updated)
|
|
|
|
* @param upload_data upload data
|
|
|
|
* @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_handler_refresh_commit (struct RequestHandler *rh,
|
|
|
|
struct MHD_Connection *connection,
|
|
|
|
void **connection_cls,
|
|
|
|
const char *upload_data,
|
|
|
|
size_t *upload_data_size)
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey refresh_session_pub;
|
|
|
|
int res;
|
2015-01-21 13:31:05 +01:00
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
|
|
|
unsigned int kappa;
|
|
|
|
unsigned int num_oldcoins;
|
|
|
|
unsigned int num_newcoins;
|
2015-01-08 18:37:20 +01:00
|
|
|
struct GNUNET_HashCode commit_hash;
|
2015-01-09 17:26:02 +01:00
|
|
|
struct GNUNET_HashContext *hash_context;
|
2015-01-08 18:37:20 +01:00
|
|
|
json_t *root;
|
2015-01-21 13:31:05 +01:00
|
|
|
struct RefreshCommitSignatureBody body;
|
|
|
|
json_t *commit_sig_json;
|
|
|
|
struct RefreshCommitCoin **commit_coin;
|
|
|
|
struct RefreshCommitLink **commit_link;
|
|
|
|
json_t *coin_evs;
|
|
|
|
json_t *transfer_pubs;
|
|
|
|
json_t *coin_detail;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-16 14:04:02 +01:00
|
|
|
res = TALER_MINT_parse_post_json (connection,
|
2015-01-16 14:27:42 +01:00
|
|
|
connection_cls,
|
|
|
|
upload_data,
|
|
|
|
upload_data_size,
|
|
|
|
&root);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
return MHD_NO;
|
2015-01-16 14:27:42 +01:00
|
|
|
if ( (GNUNET_NO == res) || (NULL == root) )
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_YES;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_FIELD, "session_pub",
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&refresh_session_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey));
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
/* Determine dimensionality of the request (kappa, #old and #new coins) */
|
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "coin_evs",
|
|
|
|
JNAV_RET_TYPED_JSON, JSON_ARRAY, &coin_evs);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
kappa = json_array_size (coin_evs);
|
|
|
|
if (3 > kappa)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
GNUNET_break_op (0);
|
|
|
|
// FIXME: generate error message
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-21 13:31:05 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 14:46:33 +01:00
|
|
|
JNAV_FIELD, "coin_evs",
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_INDEX, (int) 0,
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
JSON_ARRAY, &coin_detail);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
num_newcoins = json_array_size (coin_detail);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "transfer_pubs",
|
|
|
|
JNAV_RET_TYPED_JSON, JSON_ARRAY, &transfer_pubs);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
if (json_array_size (transfer_pubs) != kappa)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
GNUNET_break_op (0);
|
|
|
|
// FIXME: generate error message
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-21 13:31:05 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 14:46:33 +01:00
|
|
|
JNAV_FIELD, "transfer_pubs",
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_INDEX, (int) 0,
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
JSON_ARRAY, &coin_detail);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
num_oldcoins = json_array_size (coin_detail);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
2015-01-09 17:26:02 +01:00
|
|
|
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
2015-01-21 13:31:05 +01:00
|
|
|
commit_coin = GNUNET_malloc (kappa *
|
|
|
|
sizeof (struct RefreshCommitCoin *));
|
|
|
|
for (i = 0; i < kappa; i++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
commit_coin[i] = GNUNET_malloc (num_newcoins *
|
|
|
|
sizeof (struct RefreshCommitCoin));
|
|
|
|
for (j = 0; j < num_newcoins; j++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-27 18:57:29 +01:00
|
|
|
char *link_enc;
|
2015-01-27 18:35:17 +01:00
|
|
|
size_t link_enc_size;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_FIELD, "coin_evs",
|
|
|
|
JNAV_INDEX, (int) i,
|
|
|
|
JNAV_INDEX, (int) j,
|
2015-01-26 12:22:26 +01:00
|
|
|
JNAV_RET_DATA_VAR,
|
|
|
|
&commit_coin[i][j].coin_ev,
|
|
|
|
&commit_coin[i][j].coin_ev_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_abort (hash_context);
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
2015-01-26 12:22:26 +01:00
|
|
|
commit_coin[i][j].coin_ev,
|
|
|
|
commit_coin[i][j].coin_ev_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_FIELD, "link_encs",
|
|
|
|
JNAV_INDEX, (int) i,
|
|
|
|
JNAV_INDEX, (int) j,
|
2015-01-27 18:35:17 +01:00
|
|
|
JNAV_RET_DATA_VAR,
|
|
|
|
&link_enc,
|
|
|
|
&link_enc_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'?
|
|
|
|
GNUNET_break (0);
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_abort (hash_context);
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
2015-01-27 18:35:17 +01:00
|
|
|
// FIXME: convert link_enc / link_enc_size to
|
|
|
|
// commit_coin[i][j].refresh_link!
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
2015-01-27 18:57:29 +01:00
|
|
|
link_enc,
|
|
|
|
link_enc_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
commit_link = GNUNET_malloc (kappa *
|
|
|
|
sizeof (struct RefreshCommitLink *));
|
|
|
|
for (i = 0; i < kappa; i++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
commit_link[i] = GNUNET_malloc (num_oldcoins *
|
|
|
|
sizeof (struct RefreshCommitLink));
|
|
|
|
for (j = 0; j < num_oldcoins; j++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_FIELD, "transfer_pubs",
|
|
|
|
JNAV_INDEX, (int) i,
|
|
|
|
JNAV_INDEX, (int) j,
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&commit_link[i][j].transfer_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey));
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_abort (hash_context);
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
2015-01-21 13:31:05 +01:00
|
|
|
&commit_link[i][j].transfer_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey));
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-21 13:31:05 +01:00
|
|
|
JNAV_FIELD, "secret_encs",
|
|
|
|
JNAV_INDEX, (int) i,
|
|
|
|
JNAV_INDEX, (int) j,
|
|
|
|
JNAV_RET_DATA,
|
2015-01-27 18:57:29 +01:00
|
|
|
&commit_link[i][j].shared_secret_enc,
|
2015-01-27 18:35:17 +01:00
|
|
|
sizeof (struct GNUNET_HashCode));
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_abort (hash_context);
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
2015-01-27 18:57:29 +01:00
|
|
|
&commit_link[i][j].shared_secret_enc,
|
2015-01-27 18:35:17 +01:00
|
|
|
sizeof (struct GNUNET_HashCode));
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
}
|
2015-01-09 17:26:02 +01:00
|
|
|
GNUNET_CRYPTO_hash_context_finish (hash_context, &commit_hash);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
commit_sig_json = json_object_get (root, "commit_signature");
|
|
|
|
if (NULL == commit_sig_json)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
return TALER_MINT_reply_json_pack (connection,
|
|
|
|
MHD_HTTP_BAD_REQUEST,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"commit_signature missing");
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
body.commit_hash = commit_hash;
|
|
|
|
body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_COMMIT);
|
|
|
|
body.purpose.size = htonl (sizeof (struct RefreshCommitSignatureBody));
|
|
|
|
|
|
|
|
if (GNUNET_OK != (res = request_json_check_signature (connection,
|
|
|
|
commit_sig_json,
|
|
|
|
&refresh_session_pub,
|
|
|
|
&body.purpose)))
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 13:31:05 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
2015-01-21 13:31:05 +01:00
|
|
|
res = TALER_MINT_db_execute_refresh_commit (connection,
|
|
|
|
&refresh_session_pub,
|
|
|
|
kappa,
|
|
|
|
num_oldcoins,
|
|
|
|
num_newcoins,
|
|
|
|
commit_coin,
|
|
|
|
commit_link);
|
|
|
|
// FIXME: free memory
|
|
|
|
return res;
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle a "/refresh/reveal" request
|
|
|
|
*
|
|
|
|
* @param rh context of the handler
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param[IN|OUT] connection_cls the connection's closure (can be updated)
|
|
|
|
* @param upload_data upload data
|
|
|
|
* @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_handler_refresh_reveal (struct RequestHandler *rh,
|
|
|
|
struct MHD_Connection *connection,
|
|
|
|
void **connection_cls,
|
|
|
|
const char *upload_data,
|
|
|
|
size_t *upload_data_size)
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPublicKey refresh_session_pub;
|
|
|
|
int res;
|
2015-01-21 14:46:33 +01:00
|
|
|
unsigned int kappa;
|
|
|
|
unsigned int num_oldcoins;
|
|
|
|
json_t *transfer_p;
|
|
|
|
json_t *reveal_detail;
|
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
2015-01-08 18:37:20 +01:00
|
|
|
json_t *root;
|
2015-01-21 14:46:33 +01:00
|
|
|
struct GNUNET_CRYPTO_EcdsaPrivateKey **transfer_privs;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-16 14:04:02 +01:00
|
|
|
res = TALER_MINT_parse_post_json (connection,
|
2015-01-16 14:27:42 +01:00
|
|
|
connection_cls,
|
|
|
|
upload_data,
|
|
|
|
upload_data_size,
|
|
|
|
&root);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
return MHD_NO;
|
2015-01-16 14:27:42 +01:00
|
|
|
if ( (GNUNET_NO == res) || (NULL == root) )
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_YES;
|
|
|
|
|
2015-01-16 15:04:47 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
2015-01-08 18:37:20 +01:00
|
|
|
JNAV_FIELD, "session_pub",
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&refresh_session_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey));
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (GNUNET_SYSERR != res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2015-01-21 13:46:05 +01:00
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
/* Determine dimensionality of the request (kappa and #old coins) */
|
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "transfer_privs",
|
|
|
|
JNAV_RET_TYPED_JSON, JSON_ARRAY, &transfer_p);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
kappa = json_array_size (transfer_p) + 1; /* 1 row is missing */
|
|
|
|
if (3 > kappa)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 14:46:33 +01:00
|
|
|
GNUNET_break_op (0);
|
|
|
|
// FIXME: generate error message
|
2015-01-08 18:37:20 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-21 14:46:33 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "transfer_privs",
|
|
|
|
JNAV_INDEX, 0,
|
|
|
|
JNAV_RET_TYPED_JSON, JSON_ARRAY, &reveal_detail);
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return res;
|
|
|
|
num_oldcoins = json_array_size (reveal_detail);
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
transfer_privs = GNUNET_malloc ((kappa - 1) *
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey *));
|
|
|
|
for (i = 0; i < kappa - 1; i++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 14:46:33 +01:00
|
|
|
transfer_privs[i] = GNUNET_malloc (num_oldcoins *
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey));
|
|
|
|
for (j = 0; j < num_oldcoins; j++)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-01-21 14:46:33 +01:00
|
|
|
res = GNUNET_MINT_parse_navigate_json (connection, root,
|
|
|
|
JNAV_FIELD, "transfer_privs",
|
|
|
|
JNAV_INDEX, (int) i,
|
|
|
|
JNAV_INDEX, (int) j,
|
|
|
|
JNAV_RET_DATA,
|
|
|
|
&transfer_privs[i][j],
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPrivateKey));
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-16 14:27:42 +01:00
|
|
|
// FIXME: return 'internal error'?
|
2015-01-21 14:46:33 +01:00
|
|
|
return MHD_NO;
|
|
|
|
}
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
res = TALER_MINT_db_execute_refresh_reveal (connection,
|
|
|
|
&refresh_session_pub,
|
|
|
|
kappa,
|
|
|
|
num_oldcoins,
|
|
|
|
transfer_privs);
|
|
|
|
// FIXME: free memory
|
|
|
|
return res;
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle a "/refresh/link" request
|
|
|
|
*
|
|
|
|
* @param rh context of the handler
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param[IN|OUT] connection_cls the connection's closure (can be updated)
|
|
|
|
* @param upload_data upload data
|
|
|
|
* @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_MINT_handler_refresh_link (struct RequestHandler *rh,
|
|
|
|
struct MHD_Connection *connection,
|
|
|
|
void **connection_cls,
|
|
|
|
const char *upload_data,
|
|
|
|
size_t *upload_data_size)
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EcdsaPublicKey coin_pub;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
res = TALER_MINT_mhd_request_arg_data (connection,
|
2015-01-16 14:27:42 +01:00
|
|
|
"coin_pub",
|
|
|
|
&coin_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey));
|
2015-01-08 18:37:20 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
// FIXME: return 'internal error'
|
|
|
|
GNUNET_break (0);
|
|
|
|
return MHD_NO;
|
|
|
|
}
|
|
|
|
if (GNUNET_OK != res)
|
|
|
|
return MHD_YES;
|
|
|
|
|
2015-01-21 13:46:05 +01:00
|
|
|
return TALER_MINT_db_execute_refresh_link (connection,
|
|
|
|
&coin_pub);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* end of taler-mint-httpd_refresh.c */
|