2015-01-19 21:04:58 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2015-02-08 00:16:22 +01:00
|
|
|
Copyright (C) 2014, 2015 Christian Grothoff (and other contributing authors)
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file taler-mint-httpd_db.c
|
2015-01-28 22:35:57 +01:00
|
|
|
* @brief High-level (transactional-layer) database operations for the mint.
|
2015-01-19 21:04:58 +01:00
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2015-01-19 21:53:23 +01:00
|
|
|
#include <pthread.h>
|
|
|
|
#include <jansson.h>
|
2015-01-19 21:04:58 +01:00
|
|
|
#include "taler-mint-httpd_db.h"
|
|
|
|
#include "taler_signatures.h"
|
|
|
|
#include "taler-mint-httpd_responses.h"
|
2015-01-28 20:55:15 +01:00
|
|
|
#include "taler_util.h"
|
2015-01-28 21:08:19 +01:00
|
|
|
#include "taler-mint-httpd_keystate.h"
|
2015-03-28 11:06:00 +01:00
|
|
|
#include "taler_mintdb_lib.h"
|
2015-01-19 21:04:58 +01:00
|
|
|
|
|
|
|
|
2015-03-22 16:09:01 +01:00
|
|
|
/**
|
|
|
|
* Calculate the total value of all transactions performed.
|
|
|
|
* Stores @a off plus the cost of all transactions in @a tl
|
|
|
|
* in @a ret.
|
|
|
|
*
|
|
|
|
* @param pos transaction list to process
|
|
|
|
* @param off offset to use as the starting value
|
|
|
|
* @param ret where the resulting total is to be stored
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on errors
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
calculate_transaction_list_totals (struct TALER_MINT_DB_TransactionList *tl,
|
|
|
|
const struct TALER_Amount *off,
|
|
|
|
struct TALER_Amount *ret)
|
|
|
|
{
|
|
|
|
struct TALER_Amount spent = *off;
|
|
|
|
struct TALER_MINT_DB_TransactionList *pos;
|
|
|
|
|
|
|
|
for (pos = tl; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_TT_DEPOSIT:
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_amount_add (&spent,
|
|
|
|
&spent,
|
|
|
|
&pos->details.deposit->amount_with_fee))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_TT_REFRESH_MELT:
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_amount_add (&spent,
|
|
|
|
&spent,
|
|
|
|
&pos->details.melt->amount_with_fee))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_TT_LOCK:
|
|
|
|
/* should check if lock is still active,
|
|
|
|
and if it is for THIS operation; if
|
|
|
|
lock is inactive, delete it; if lock
|
|
|
|
is for THIS operation, ignore it;
|
|
|
|
if lock is for another operation,
|
|
|
|
count it! */
|
|
|
|
GNUNET_assert (0); // FIXME: not implemented! (#3625)
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*ret = spent;
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-19 21:04:58 +01:00
|
|
|
/**
|
|
|
|
* Execute a deposit. The validity of the coin and signature
|
|
|
|
* have already been checked. The database must now check that
|
|
|
|
* the coin is not (double or over) spent, and execute the
|
|
|
|
* transaction (record details, generate success or failure response).
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param deposit information about the deposit
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_deposit (struct MHD_Connection *connection,
|
2015-01-19 21:04:58 +01:00
|
|
|
const struct Deposit *deposit)
|
|
|
|
{
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-01-28 22:18:53 +01:00
|
|
|
struct TALER_MINT_DB_TransactionList *tl;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct TALER_Amount spent;
|
|
|
|
struct TALER_Amount value;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TMH_KS_StateHandle *mks;
|
|
|
|
struct TALER_DenominationKeyIssueInformation *dki;
|
2015-01-29 00:09:48 +01:00
|
|
|
int ret;
|
2015-01-19 21:04:58 +01:00
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-19 21:04:58 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-28 22:18:53 +01:00
|
|
|
if (GNUNET_YES ==
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->have_deposit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
deposit))
|
2015-01-28 22:18:53 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_deposit_success (connection,
|
2015-01-28 22:18:53 +01:00
|
|
|
&deposit->coin.coin_pub,
|
|
|
|
&deposit->h_wire,
|
|
|
|
&deposit->h_contract,
|
|
|
|
deposit->transaction_id,
|
|
|
|
&deposit->merchant_pub,
|
2015-03-22 16:09:01 +01:00
|
|
|
&deposit->amount_with_fee);
|
2015-01-28 22:18:53 +01:00
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
mks = TMH_KS_acquire ();
|
|
|
|
dki = TMH_KS_denomination_key_lookup (mks,
|
2015-03-22 22:14:30 +01:00
|
|
|
&deposit->coin.denom_pub);
|
2015-03-18 18:55:41 +01:00
|
|
|
TALER_amount_ntoh (&value,
|
|
|
|
&dki->issue.value);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (mks);
|
2015-01-29 00:09:48 +01:00
|
|
|
|
2015-01-28 22:18:53 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->start (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-28 22:18:53 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-28 22:18:53 +01:00
|
|
|
}
|
2015-03-22 16:09:01 +01:00
|
|
|
/* fee for THIS transaction */
|
|
|
|
spent = deposit->amount_with_fee;
|
|
|
|
/* add cost of all previous transactions */
|
2015-03-28 11:06:00 +01:00
|
|
|
tl = TMH_plugin->get_coin_transactions (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
&deposit->coin.coin_pub);
|
2015-03-18 18:55:41 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-22 16:09:01 +01:00
|
|
|
calculate_transaction_list_totals (tl,
|
|
|
|
&spent,
|
|
|
|
&spent))
|
2015-03-18 18:55:41 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
tl);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-18 18:55:41 +01:00
|
|
|
}
|
2015-03-22 16:20:03 +01:00
|
|
|
/* Check that cost of all transactions is smaller than
|
|
|
|
the value of the coin. */
|
2015-03-18 18:55:41 +01:00
|
|
|
if (0 < TALER_amount_cmp (&spent,
|
|
|
|
&value))
|
2015-01-29 00:09:48 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
ret = TMH_RESPONSE_reply_deposit_insufficient_funds (connection,
|
2015-03-18 18:55:41 +01:00
|
|
|
tl);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
tl);
|
2015-01-29 00:09:48 +01:00
|
|
|
return ret;
|
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
tl);
|
2015-01-19 21:04:58 +01:00
|
|
|
|
2015-01-28 22:47:03 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_deposit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
deposit))
|
2015-01-28 22:47:03 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_LOG_WARNING ("Failed to store /deposit information in database\n");
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
|
|
|
|
2015-01-28 22:47:03 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->commit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-19 21:04:58 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_LOG_WARNING ("/deposit transaction commit failed\n");
|
|
|
|
return TMH_RESPONSE_reply_commit_error (connection);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_deposit_success (connection,
|
2015-01-28 15:35:41 +01:00
|
|
|
&deposit->coin.coin_pub,
|
|
|
|
&deposit->h_wire,
|
|
|
|
&deposit->h_contract,
|
|
|
|
deposit->transaction_id,
|
|
|
|
&deposit->merchant_pub,
|
2015-03-22 16:09:01 +01:00
|
|
|
&deposit->amount_with_fee);
|
2015-01-19 21:04:58 +01:00
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a /withdraw/status. Given the public key of a reserve,
|
|
|
|
* return the associated transaction history.
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param reserve_pub public key of the reserve to check
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_withdraw_status (struct MHD_Connection *connection,
|
|
|
|
const struct TALER_ReservePublicKeyP *reserve_pub)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct ReserveHistory *rh;
|
2015-01-19 21:53:23 +01:00
|
|
|
int res;
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
rh = TMH_plugin->get_reserve_history (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
reserve_pub);
|
2015-01-29 00:09:48 +01:00
|
|
|
if (NULL == rh)
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-19 21:53:23 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
2015-01-29 00:09:48 +01:00
|
|
|
"error", "Reserve not found");
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_withdraw_status_success (connection,
|
2015-01-29 00:09:48 +01:00
|
|
|
rh);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_reserve_history (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
rh);
|
2015-01-29 00:09:48 +01:00
|
|
|
return res;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/withdraw/sign". Given a reserve and a properly signed
|
|
|
|
* request to withdraw a coin, check the balance of the reserve and
|
|
|
|
* if it is sufficient, store the request and return the signed
|
|
|
|
* blinded envelope.
|
2015-01-19 21:53:23 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-01-26 12:22:26 +01:00
|
|
|
* @param reserve public key of the reserve
|
|
|
|
* @param denomination_pub public key of the denomination requested
|
|
|
|
* @param blinded_msg blinded message to be signed
|
|
|
|
* @param blinded_msg_len number of bytes in @a blinded_msg
|
|
|
|
* @param signature signature over the withdraw request, to be stored in DB
|
2015-01-19 21:53:23 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_withdraw_sign (struct MHD_Connection *connection,
|
|
|
|
const struct TALER_ReservePublicKeyP *reserve,
|
2015-03-22 22:14:30 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denomination_pub,
|
2015-01-26 12:22:26 +01:00
|
|
|
const char *blinded_msg,
|
|
|
|
size_t blinded_msg_len,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_ReserveSignatureP *signature)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-01-29 00:09:48 +01:00
|
|
|
struct ReserveHistory *rh;
|
2015-01-29 00:45:07 +01:00
|
|
|
const struct ReserveHistory *pos;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TMH_KS_StateHandle *key_state;
|
2015-01-19 21:53:23 +01:00
|
|
|
struct CollectableBlindcoin collectable;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_DenominationKeyIssueInformation *dki;
|
|
|
|
struct TALER_DenominationKeyIssueInformation *tdki;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_CRYPTO_rsa_Signature *sig;
|
2015-01-19 21:53:23 +01:00
|
|
|
struct TALER_Amount amount_required;
|
2015-01-29 00:45:07 +01:00
|
|
|
struct TALER_Amount deposit_total;
|
|
|
|
struct TALER_Amount withdraw_total;
|
|
|
|
struct TALER_Amount balance;
|
|
|
|
struct TALER_Amount value;
|
2015-03-18 18:55:41 +01:00
|
|
|
struct TALER_Amount fee_withdraw;
|
2015-01-26 12:22:26 +01:00
|
|
|
struct GNUNET_HashCode h_blind;
|
2015-01-19 21:53:23 +01:00
|
|
|
int res;
|
|
|
|
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_hash (blinded_msg,
|
|
|
|
blinded_msg_len,
|
|
|
|
&h_blind);
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
res = TMH_plugin->get_collectable_blindcoin (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
&h_blind,
|
|
|
|
&collectable);
|
2015-01-19 21:53:23 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't sign again if we have already signed the coin */
|
|
|
|
if (GNUNET_YES == res)
|
2015-01-26 12:22:26 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_withdraw_sign_success (connection,
|
2015-01-26 12:22:26 +01:00
|
|
|
&collectable);
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (collectable.sig.rsa_signature);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (collectable.denom_pub.rsa_public_key);
|
2015-01-26 12:22:26 +01:00
|
|
|
return res;
|
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
GNUNET_assert (GNUNET_NO == res);
|
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/* Check if balance is sufficient */
|
2015-03-27 19:58:40 +01:00
|
|
|
key_state = TMH_KS_acquire ();
|
|
|
|
dki = TMH_KS_denomination_key_lookup (key_state,
|
2015-01-26 12:22:26 +01:00
|
|
|
denomination_pub);
|
2015-01-19 21:53:23 +01:00
|
|
|
if (NULL == dki)
|
2015-01-29 00:45:07 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-19 21:53:23 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"Denomination not found");
|
2015-01-29 00:45:07 +01:00
|
|
|
}
|
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->start (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-29 00:45:07 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-29 00:45:07 +01:00
|
|
|
}
|
2015-01-19 21:53:23 +01:00
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
rh = TMH_plugin->get_reserve_history (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
reserve);
|
2015-01-29 00:45:07 +01:00
|
|
|
if (NULL == rh)
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-29 00:45:07 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
2015-01-19 21:53:23 +01:00
|
|
|
"{s:s}",
|
|
|
|
"error",
|
2015-01-29 00:45:07 +01:00
|
|
|
"Reserve not found");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* calculate amount required including fees */
|
2015-03-18 18:55:41 +01:00
|
|
|
TALER_amount_ntoh (&value,
|
|
|
|
&dki->issue.value);
|
|
|
|
TALER_amount_ntoh (&fee_withdraw,
|
|
|
|
&dki->issue.fee_withdraw);
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_amount_add (&amount_required,
|
|
|
|
&value,
|
|
|
|
&fee_withdraw))
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-18 18:55:41 +01:00
|
|
|
}
|
2015-01-26 12:22:26 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
/* calculate balance of the reserve */
|
|
|
|
res = 0;
|
|
|
|
for (pos = rh; NULL != pos; pos = pos->next)
|
|
|
|
{
|
|
|
|
switch (pos->type)
|
|
|
|
{
|
|
|
|
case TALER_MINT_DB_RO_BANK_TO_MINT:
|
|
|
|
if (0 == (res & 1))
|
|
|
|
deposit_total = pos->details.bank->amount;
|
|
|
|
else
|
2015-03-18 18:55:41 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_amount_add (&deposit_total,
|
|
|
|
&deposit_total,
|
|
|
|
&pos->details.bank->amount))
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-18 18:55:41 +01:00
|
|
|
}
|
2015-01-29 00:45:07 +01:00
|
|
|
res |= 1;
|
|
|
|
break;
|
|
|
|
case TALER_MINT_DB_RO_WITHDRAW_COIN:
|
2015-03-27 19:58:40 +01:00
|
|
|
tdki = TMH_KS_denomination_key_lookup (key_state,
|
2015-03-22 22:14:30 +01:00
|
|
|
&pos->details.withdraw->denom_pub);
|
2015-03-18 18:55:41 +01:00
|
|
|
TALER_amount_ntoh (&value,
|
|
|
|
&tdki->issue.value);
|
2015-01-29 00:45:07 +01:00
|
|
|
if (0 == (res & 2))
|
|
|
|
withdraw_total = value;
|
|
|
|
else
|
2015-03-18 18:55:41 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_amount_add (&withdraw_total,
|
|
|
|
&withdraw_total,
|
|
|
|
&value))
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-18 18:55:41 +01:00
|
|
|
}
|
2015-01-29 00:45:07 +01:00
|
|
|
res |= 2;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-03-18 18:55:41 +01:00
|
|
|
/* All reserve balances should be non-negative */
|
|
|
|
GNUNET_break (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&balance,
|
|
|
|
&deposit_total,
|
|
|
|
&withdraw_total));
|
|
|
|
if (0 < TALER_amount_cmp (&amount_required,
|
|
|
|
&balance))
|
2015-01-29 00:45:07 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_withdraw_sign_insufficient_funds (connection,
|
2015-01-29 00:45:07 +01:00
|
|
|
rh);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_reserve_history (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
rh);
|
2015-01-29 00:45:07 +01:00
|
|
|
return res;
|
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_reserve_history (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
rh);
|
2015-01-29 00:45:07 +01:00
|
|
|
|
|
|
|
/* Balance is good, sign the coin! */
|
2015-03-22 22:14:30 +01:00
|
|
|
sig = GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key,
|
2015-01-26 12:22:26 +01:00
|
|
|
blinded_msg,
|
|
|
|
blinded_msg_len);
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-01-26 12:22:26 +01:00
|
|
|
if (NULL == sig)
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_error (connection,
|
2015-01-26 12:22:26 +01:00
|
|
|
"Internal error");
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-03-22 22:14:30 +01:00
|
|
|
collectable.sig.rsa_signature = sig;
|
|
|
|
collectable.denom_pub = *denomination_pub;
|
2015-01-27 15:22:34 +01:00
|
|
|
collectable.reserve_pub = *reserve;
|
2015-03-09 13:04:51 +01:00
|
|
|
GNUNET_CRYPTO_hash (blinded_msg,
|
|
|
|
blinded_msg_len,
|
|
|
|
&collectable.h_coin_envelope);
|
2015-01-27 15:22:34 +01:00
|
|
|
collectable.reserve_sig = *signature;
|
2015-01-19 21:53:23 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_collectable_blindcoin (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
&h_blind,
|
|
|
|
amount_required,
|
|
|
|
&collectable))
|
2015-01-19 21:53:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (sig);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->commit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-29 00:45:07 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_LOG_WARNING ("/withdraw/sign transaction commit failed\n");
|
|
|
|
return TMH_RESPONSE_reply_commit_error (connection);
|
2015-01-29 00:45:07 +01:00
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_withdraw_sign_success (connection,
|
2015-01-29 00:45:07 +01:00
|
|
|
&collectable);
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (sig);
|
2015-01-29 00:45:07 +01:00
|
|
|
return res;
|
2015-01-19 21:53:23 +01:00
|
|
|
}
|
2015-01-21 12:46:14 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parse coin melt requests from a JSON object and write them to
|
|
|
|
* the database.
|
|
|
|
*
|
|
|
|
* @param connection the connection to send errors to
|
2015-03-20 23:51:28 +01:00
|
|
|
* @param session the database connection
|
2015-01-21 12:46:14 +01:00
|
|
|
* @param key_state the mint's key state
|
2015-03-24 16:56:06 +01:00
|
|
|
* @param session_hash hash identifying the refresh session
|
2015-01-30 15:34:01 +01:00
|
|
|
* @param coin_public_info the coin to melt
|
|
|
|
* @param coin_details details about the coin being melted
|
|
|
|
* @param oldcoin_index what is the number assigned to this coin
|
2015-01-21 12:46:14 +01:00
|
|
|
* @return #GNUNET_OK on success,
|
|
|
|
* #GNUNET_NO if an error message was generated,
|
|
|
|
* #GNUNET_SYSERR on internal errors (no response generated)
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
refresh_accept_melts (struct MHD_Connection *connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TMH_KS_StateHandle *key_state,
|
2015-03-24 16:56:06 +01:00
|
|
|
const struct GNUNET_HashCode *session_hash,
|
2015-01-30 15:34:01 +01:00
|
|
|
const struct TALER_CoinPublicInfo *coin_public_info,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TMH_DB_MeltDetails *coin_details,
|
2015-01-30 15:34:01 +01:00
|
|
|
uint16_t oldcoin_index)
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_DenominationKeyValidityPS *dki;
|
2015-01-30 15:34:01 +01:00
|
|
|
struct TALER_MINT_DB_TransactionList *tl;
|
2015-03-10 16:15:14 +01:00
|
|
|
struct TALER_Amount coin_value;
|
|
|
|
struct TALER_Amount coin_residual;
|
2015-03-22 16:09:01 +01:00
|
|
|
struct TALER_Amount spent;
|
2015-01-30 15:34:01 +01:00
|
|
|
struct RefreshMelt melt;
|
2015-03-10 16:15:14 +01:00
|
|
|
int res;
|
2015-01-21 12:46:14 +01:00
|
|
|
|
2015-03-27 19:58:40 +01:00
|
|
|
dki = &TMH_KS_denomination_key_lookup (key_state,
|
2015-03-22 22:14:30 +01:00
|
|
|
&coin_public_info->denom_pub)->issue;
|
2015-01-21 12:46:14 +01:00
|
|
|
|
2015-01-30 15:34:01 +01:00
|
|
|
if (NULL == dki)
|
|
|
|
return (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-30 15:34:01 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"denom not found"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
|
2015-03-18 18:55:41 +01:00
|
|
|
TALER_amount_ntoh (&coin_value,
|
|
|
|
&dki->value);
|
2015-03-22 16:09:01 +01:00
|
|
|
/* fee for THIS transaction; the melt amount includes the fee! */
|
|
|
|
spent = coin_details->melt_amount_with_fee;
|
|
|
|
/* add historic transaction costs of this coin */
|
2015-03-28 11:06:00 +01:00
|
|
|
tl = TMH_plugin->get_coin_transactions (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
&coin_public_info->coin_pub);
|
2015-03-22 16:09:01 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
calculate_transaction_list_totals (tl,
|
|
|
|
&spent,
|
|
|
|
&spent))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 16:09:01 +01:00
|
|
|
tl);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-22 16:09:01 +01:00
|
|
|
}
|
2015-03-22 16:17:22 +01:00
|
|
|
/* Refuse to refresh when the coin's value is insufficient
|
|
|
|
for the cost of all transactions. */
|
2015-03-22 16:09:01 +01:00
|
|
|
if (TALER_amount_cmp (&coin_value,
|
|
|
|
&spent) < 0)
|
2015-03-10 16:15:14 +01:00
|
|
|
{
|
2015-03-22 16:09:01 +01:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_subtract (&coin_residual,
|
|
|
|
&spent,
|
|
|
|
&coin_details->melt_amount_with_fee));
|
2015-03-10 16:15:14 +01:00
|
|
|
res = (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_refresh_melt_insufficient_funds (connection,
|
2015-03-10 16:15:14 +01:00
|
|
|
&coin_public_info->coin_pub,
|
|
|
|
coin_value,
|
|
|
|
tl,
|
2015-03-22 16:09:01 +01:00
|
|
|
coin_details->melt_amount_with_fee,
|
2015-03-10 16:15:14 +01:00
|
|
|
coin_residual))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
tl);
|
2015-03-10 16:15:14 +01:00
|
|
|
return res;
|
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_coin_transaction_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
tl);
|
2015-01-21 12:46:14 +01:00
|
|
|
|
2015-01-30 15:34:01 +01:00
|
|
|
melt.coin = *coin_public_info;
|
|
|
|
melt.coin_sig = coin_details->melt_sig;
|
2015-03-24 16:56:06 +01:00
|
|
|
melt.session_hash = *session_hash;
|
2015-03-22 16:09:01 +01:00
|
|
|
melt.amount_with_fee = coin_details->melt_amount_with_fee;
|
2015-01-30 15:34:01 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_refresh_melt (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
oldcoin_index,
|
|
|
|
&melt))
|
2015-01-30 15:34:01 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/melt". We have been given a list of valid
|
|
|
|
* coins and a request to melt them into the given
|
|
|
|
* @a refresh_session_pub. Check that the coins all have the
|
|
|
|
* required value left and if so, store that they have been
|
|
|
|
* melted and confirm the melting operation to the client.
|
2015-01-21 12:46:14 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-03-24 16:56:06 +01:00
|
|
|
* @param session_hash hash code of the session the coins are melted into
|
2015-03-10 16:25:23 +01:00
|
|
|
* @param num_new_denoms number of entries in @a denom_pubs, size of y-dimension of @commit_coin array
|
2015-01-29 18:46:34 +01:00
|
|
|
* @param denum_pubs public keys of the coins we want to withdraw in the end
|
2015-03-10 16:25:23 +01:00
|
|
|
* @param coin_count number of entries in @a coin_public_infos and @a coin_melt_details, size of y-dimension of @commit_link array
|
2015-01-21 12:46:14 +01:00
|
|
|
* @param coin_public_infos information about the coins to melt
|
2015-01-30 15:34:01 +01:00
|
|
|
* @param coin_melt_details signatures and (residual) value of the respective coin should be melted
|
2015-03-10 16:15:14 +01:00
|
|
|
* @param commit_coin 2d array of coin commitments (what the mint is to sign
|
2015-03-24 17:25:00 +01:00
|
|
|
* once the "/refres/reveal" of cut and choose is done),
|
2015-03-27 19:58:40 +01:00
|
|
|
* x-dimension must be #TALER_CNC_KAPPA
|
2015-03-10 16:15:14 +01:00
|
|
|
* @param commit_link 2d array of coin link commitments (what the mint is
|
|
|
|
* to return via "/refresh/link" to enable linkage in the
|
|
|
|
* future)
|
2015-03-27 19:58:40 +01:00
|
|
|
* x-dimension must be #TALER_CNC_KAPPA
|
2015-01-21 12:46:14 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_refresh_melt (struct MHD_Connection *connection,
|
2015-03-24 16:56:06 +01:00
|
|
|
const struct GNUNET_HashCode *session_hash,
|
2015-01-21 12:46:14 +01:00
|
|
|
unsigned int num_new_denoms,
|
2015-03-22 22:14:30 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pubs,
|
2015-01-21 12:46:14 +01:00
|
|
|
unsigned int coin_count,
|
2015-01-30 15:34:01 +01:00
|
|
|
const struct TALER_CoinPublicInfo *coin_public_infos,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TMH_DB_MeltDetails *coin_melt_details,
|
2015-03-10 16:15:14 +01:00
|
|
|
struct RefreshCommitCoin *const* commit_coin,
|
|
|
|
struct RefreshCommitLink *const* commit_link)
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TMH_KS_StateHandle *key_state;
|
2015-03-20 23:51:28 +01:00
|
|
|
struct RefreshSession refresh_session;
|
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-01-21 12:46:14 +01:00
|
|
|
int res;
|
2015-01-30 15:34:01 +01:00
|
|
|
unsigned int i;
|
2015-01-21 12:46:14 +01:00
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-21 12:46:14 +01:00
|
|
|
{
|
2015-01-21 14:21:58 +01:00
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
2015-01-29 20:00:21 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->start (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-29 20:00:21 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-29 20:00:21 +01:00
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
res = TMH_plugin->get_refresh_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
&refresh_session);
|
2015-01-21 12:46:14 +01:00
|
|
|
if (GNUNET_YES == res)
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_refresh_melt_success (connection,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
refresh_session.noreveal_index);
|
2015-03-10 16:15:14 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 12:46:14 +01:00
|
|
|
}
|
|
|
|
|
2015-01-30 15:34:01 +01:00
|
|
|
/* Melt old coins and check that they had enough residual value */
|
2015-03-27 19:58:40 +01:00
|
|
|
key_state = TMH_KS_acquire ();
|
2015-01-30 15:34:01 +01:00
|
|
|
for (i=0;i<coin_count;i++)
|
|
|
|
{
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = refresh_accept_melts (connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-01-30 15:34:01 +01:00
|
|
|
key_state,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-01-30 15:34:01 +01:00
|
|
|
&coin_public_infos[i],
|
|
|
|
&coin_melt_details[i],
|
|
|
|
i)))
|
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-01-30 15:34:01 +01:00
|
|
|
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
|
|
|
|
}
|
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-01-30 15:34:01 +01:00
|
|
|
|
|
|
|
/* store requested new denominations */
|
2015-03-22 14:21:16 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_refresh_order (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
num_new_denoms,
|
|
|
|
denom_pubs))
|
2015-01-30 15:34:01 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-30 15:34:01 +01:00
|
|
|
}
|
|
|
|
|
2015-03-27 19:58:40 +01:00
|
|
|
for (i = 0; i < TALER_CNC_KAPPA; i++)
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
2015-03-22 14:21:16 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_refresh_commit_coins (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
i,
|
|
|
|
num_new_denoms,
|
|
|
|
commit_coin[i]))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-29 20:18:04 +01:00
|
|
|
}
|
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
for (i = 0; i < TALER_CNC_KAPPA; i++)
|
2015-01-29 20:18:04 +01:00
|
|
|
{
|
2015-03-22 14:21:16 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_refresh_commit_links (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
i,
|
|
|
|
coin_count,
|
|
|
|
commit_link[i]))
|
2015-01-29 20:18:04 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-10 16:15:14 +01:00
|
|
|
/* store 'global' session data */
|
2015-03-20 23:51:28 +01:00
|
|
|
refresh_session.num_oldcoins = coin_count;
|
|
|
|
refresh_session.num_newcoins = num_new_denoms;
|
|
|
|
refresh_session.noreveal_index
|
2015-03-10 16:15:14 +01:00
|
|
|
= GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG,
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_CNC_KAPPA);
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
(res = TMH_plugin->create_refresh_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
&refresh_session)))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->rollback (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-10 16:15:14 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->commit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-21 13:31:05 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_LOG_WARNING ("/refresh/melt transaction commit failed\n");
|
|
|
|
return TMH_RESPONSE_reply_commit_error (connection);
|
2015-01-21 13:31:05 +01:00
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_refresh_melt_success (connection,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
refresh_session.noreveal_index);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-31 15:42:00 +01:00
|
|
|
/**
|
|
|
|
* Check if the given @a transfer_privs correspond to an honest
|
|
|
|
* commitment for the given session.
|
|
|
|
* Checks that the transfer private keys match their commitments.
|
2015-03-27 19:58:40 +01:00
|
|
|
* Then derives the shared secret for each #TALER_CNC_KAPPA, and check that they match.
|
2015-01-31 15:42:00 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-03-20 23:51:28 +01:00
|
|
|
* @param session database connection to use
|
2015-03-24 16:56:06 +01:00
|
|
|
* @param session_hash hash of session to query
|
2015-01-31 15:42:00 +01:00
|
|
|
* @param off commitment offset to check
|
|
|
|
* @param num_oldcoins size of the @a transfer_privs and @a melts arrays
|
|
|
|
* @param transfer_privs private transfer keys
|
|
|
|
* @param melts array of melted coins
|
2015-01-31 20:08:21 +01:00
|
|
|
* @param num_newcoins number of newcoins being generated
|
2015-03-22 22:14:30 +01:00
|
|
|
* @param denom_pubs array of @a num_newcoins keys for the new coins
|
2015-01-31 15:42:00 +01:00
|
|
|
* @return #GNUNET_OK if the committment was honest,
|
|
|
|
* #GNUNET_NO if there was a problem and we generated an error message
|
|
|
|
* #GNUNET_SYSERR if we could not even generate an error message
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
check_commitment (struct MHD_Connection *connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session,
|
2015-03-24 16:56:06 +01:00
|
|
|
const struct GNUNET_HashCode *session_hash,
|
2015-01-31 15:42:00 +01:00
|
|
|
unsigned int off,
|
|
|
|
unsigned int num_oldcoins,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_TransferPrivateKeyP *transfer_privs,
|
2015-01-31 20:08:21 +01:00
|
|
|
const struct RefreshMelt *melts,
|
|
|
|
unsigned int num_newcoins,
|
2015-03-22 22:14:30 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pubs)
|
2015-01-31 15:42:00 +01:00
|
|
|
{
|
|
|
|
unsigned int j;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_LinkSecretP last_shared_secret;
|
2015-01-31 15:42:00 +01:00
|
|
|
int secret_initialized = GNUNET_NO;
|
2015-03-19 14:23:43 +01:00
|
|
|
struct GNUNET_CRYPTO_EcdhePublicKey coin_ecdhe;
|
|
|
|
struct GNUNET_CRYPTO_EcdhePrivateKey transfer_ecdhe;
|
2015-03-22 14:21:16 +01:00
|
|
|
struct RefreshCommitLink *commit_links;
|
|
|
|
struct RefreshCommitCoin *commit_coins;
|
|
|
|
|
|
|
|
commit_links = GNUNET_malloc (num_oldcoins *
|
|
|
|
sizeof (struct RefreshCommitLink));
|
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->get_refresh_commit_links (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
off,
|
|
|
|
num_oldcoins,
|
|
|
|
commit_links))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (commit_links);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_db_error (connection))
|
2015-03-22 14:21:16 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
2015-01-31 15:42:00 +01:00
|
|
|
|
|
|
|
for (j = 0; j < num_oldcoins; j++)
|
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferSecretP transfer_secret;
|
|
|
|
struct TALER_LinkSecretP shared_secret;
|
|
|
|
struct TALER_TransferPublicKeyP transfer_pub_check;
|
2015-01-31 15:42:00 +01:00
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_ecdsa_key_get_public (&transfer_privs[j].ecdsa_priv,
|
|
|
|
&transfer_pub_check.ecdsa_pub);
|
2015-01-31 15:42:00 +01:00
|
|
|
if (0 !=
|
|
|
|
memcmp (&transfer_pub_check,
|
2015-03-22 14:21:16 +01:00
|
|
|
&commit_links[j].transfer_pub,
|
2015-03-27 19:58:40 +01:00
|
|
|
sizeof (struct TALER_TransferPublicKeyP)))
|
2015-01-31 15:42:00 +01:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"transfer keys do not match\n");
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_links);
|
2015-03-13 09:49:47 +01:00
|
|
|
/* FIXME: return more specific error with original signature (#3712) */
|
2015-03-15 15:40:07 +01:00
|
|
|
return (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_refresh_reveal_missmatch (connection,
|
2015-03-13 09:49:47 +01:00
|
|
|
off,
|
|
|
|
j,
|
|
|
|
"transfer key"))
|
2015-01-31 15:42:00 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We're converting key types here, which is not very nice
|
|
|
|
* but necessary and harmless (keys will be thrown away later). */
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_ecdsa_public_to_ecdhe (&melts[j].coin.coin_pub.ecdsa_pub,
|
2015-03-19 14:23:43 +01:00
|
|
|
&coin_ecdhe);
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_ecdsa_private_to_ecdhe (&transfer_privs[j].ecdsa_priv,
|
2015-03-19 14:23:43 +01:00
|
|
|
&transfer_ecdhe);
|
2015-01-31 15:42:00 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-19 14:23:43 +01:00
|
|
|
GNUNET_CRYPTO_ecc_ecdh (&transfer_ecdhe,
|
|
|
|
&coin_ecdhe,
|
2015-01-31 15:42:00 +01:00
|
|
|
&transfer_secret.key))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-19 14:23:43 +01:00
|
|
|
GNUNET_CRYPTO_ecdhe_key_clear (&transfer_ecdhe);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_links);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_error (connection,
|
2015-01-31 15:42:00 +01:00
|
|
|
"ECDH error"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
2015-03-19 14:23:43 +01:00
|
|
|
GNUNET_CRYPTO_ecdhe_key_clear (&transfer_ecdhe);
|
2015-01-31 15:42:00 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-22 14:21:16 +01:00
|
|
|
TALER_transfer_decrypt (&commit_links[j].shared_secret_enc,
|
2015-01-31 15:42:00 +01:00
|
|
|
&transfer_secret,
|
|
|
|
&shared_secret))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_links);
|
2015-03-15 15:40:07 +01:00
|
|
|
return (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_internal_error (connection,
|
2015-03-13 09:49:47 +01:00
|
|
|
"Decryption error"))
|
2015-01-31 15:42:00 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (GNUNET_NO == secret_initialized)
|
|
|
|
{
|
|
|
|
secret_initialized = GNUNET_YES;
|
|
|
|
last_shared_secret = shared_secret;
|
|
|
|
}
|
|
|
|
else if (0 != memcmp (&shared_secret,
|
|
|
|
&last_shared_secret,
|
|
|
|
sizeof (struct GNUNET_HashCode)))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"shared secrets do not match\n");
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_links);
|
2015-03-13 09:49:47 +01:00
|
|
|
/* FIXME: return more specific error with original signature (#3712) */
|
|
|
|
return (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_refresh_reveal_missmatch (connection,
|
2015-03-13 09:49:47 +01:00
|
|
|
off,
|
|
|
|
j,
|
|
|
|
"transfer secret"))
|
2015-01-31 15:42:00 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
GNUNET_break (GNUNET_YES == secret_initialized);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_links);
|
2015-01-31 15:42:00 +01:00
|
|
|
|
|
|
|
/* Check that the commitments for all new coins were correct */
|
2015-03-22 14:21:16 +01:00
|
|
|
commit_coins = GNUNET_malloc (num_newcoins *
|
|
|
|
sizeof (struct RefreshCommitCoin));
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->get_refresh_commit_coins (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
off,
|
|
|
|
num_newcoins,
|
|
|
|
commit_coins))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (commit_coins);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_db_error (connection))
|
2015-03-22 14:21:16 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
2015-01-31 15:42:00 +01:00
|
|
|
for (j = 0; j < num_newcoins; j++)
|
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_RefreshLinkDecryptedP *link_data;
|
|
|
|
union TALER_CoinSpendPublicKeyP coin_pub;
|
2015-01-31 15:42:00 +01:00
|
|
|
struct GNUNET_HashCode h_msg;
|
|
|
|
char *buf;
|
|
|
|
size_t buf_len;
|
|
|
|
|
2015-03-22 14:21:16 +01:00
|
|
|
link_data = TALER_refresh_decrypt (commit_coins[j].refresh_link,
|
2015-01-31 15:42:00 +01:00
|
|
|
&last_shared_secret);
|
|
|
|
if (NULL == link_data)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_error (connection,
|
2015-01-31 15:42:00 +01:00
|
|
|
"Decryption error"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_ecdsa_key_get_public (&link_data->coin_priv.ecdsa_priv,
|
|
|
|
&coin_pub.ecdsa_pub);
|
2015-01-31 15:42:00 +01:00
|
|
|
GNUNET_CRYPTO_hash (&coin_pub,
|
2015-03-27 19:58:40 +01:00
|
|
|
sizeof (union TALER_CoinSpendPublicKeyP),
|
2015-01-31 15:42:00 +01:00
|
|
|
&h_msg);
|
|
|
|
if (0 == (buf_len =
|
|
|
|
GNUNET_CRYPTO_rsa_blind (&h_msg,
|
2015-03-22 22:14:30 +01:00
|
|
|
link_data->blinding_key.rsa_blinding_key,
|
|
|
|
denom_pubs[j].rsa_public_key,
|
2015-01-31 15:42:00 +01:00
|
|
|
&buf)))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"blind failed\n");
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_error (connection,
|
2015-01-31 15:42:00 +01:00
|
|
|
"Blinding error"))
|
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
2015-03-22 14:21:16 +01:00
|
|
|
if ( (buf_len != commit_coins[j].coin_ev_size) ||
|
2015-01-31 15:42:00 +01:00
|
|
|
(0 != memcmp (buf,
|
2015-03-22 14:21:16 +01:00
|
|
|
commit_coins[j].coin_ev,
|
2015-01-31 15:42:00 +01:00
|
|
|
buf_len)) )
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
2015-03-24 17:25:00 +01:00
|
|
|
"blind envelope does not match for k=%u, old=%d\n",
|
2015-01-31 15:42:00 +01:00
|
|
|
off,
|
|
|
|
(int) j);
|
2015-03-13 09:49:47 +01:00
|
|
|
/* FIXME: return more specific error with original signature (#3712) */
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-03-13 09:49:47 +01:00
|
|
|
return (MHD_YES ==
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_RESPONSE_reply_refresh_reveal_missmatch (connection,
|
2015-03-13 09:49:47 +01:00
|
|
|
off,
|
|
|
|
j,
|
|
|
|
"envelope"))
|
2015-01-31 15:42:00 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
GNUNET_free (buf);
|
|
|
|
}
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-01-31 15:42:00 +01:00
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-31 20:08:21 +01:00
|
|
|
/**
|
|
|
|
* Mint a coin as part of a refresh operation. Obtains the
|
|
|
|
* envelope from the database and performs the signing operation.
|
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-03-20 23:51:28 +01:00
|
|
|
* @param session database connection to use
|
2015-03-24 16:56:06 +01:00
|
|
|
* @param session_hash hash of session to query
|
2015-01-31 20:08:21 +01:00
|
|
|
* @param key_state key state to lookup denomination pubs
|
|
|
|
* @param denom_pub denomination key for the coin to create
|
2015-03-22 14:21:16 +01:00
|
|
|
* @param commit_coin the coin that was committed
|
2015-01-31 20:08:21 +01:00
|
|
|
* @param coin_off number of the coin
|
|
|
|
* @return NULL on error, otherwise signature over the coin
|
|
|
|
*/
|
2015-03-22 22:14:30 +01:00
|
|
|
static struct TALER_DenominationSignature
|
2015-01-31 20:08:21 +01:00
|
|
|
refresh_mint_coin (struct MHD_Connection *connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session,
|
2015-03-24 16:56:06 +01:00
|
|
|
const struct GNUNET_HashCode *session_hash,
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TMH_KS_StateHandle *key_state,
|
2015-03-22 22:14:30 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2015-03-22 14:21:16 +01:00
|
|
|
const struct RefreshCommitCoin *commit_coin,
|
2015-01-31 20:08:21 +01:00
|
|
|
unsigned int coin_off)
|
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_DenominationKeyIssueInformation *dki;
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationSignature ev_sig;
|
2015-01-31 20:08:21 +01:00
|
|
|
|
2015-03-27 19:58:40 +01:00
|
|
|
dki = TMH_KS_denomination_key_lookup (key_state,
|
2015-03-22 22:14:30 +01:00
|
|
|
denom_pub);
|
2015-01-31 20:08:21 +01:00
|
|
|
if (NULL == dki)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-22 22:14:30 +01:00
|
|
|
ev_sig.rsa_signature = NULL;
|
|
|
|
return ev_sig;
|
2015-01-31 20:08:21 +01:00
|
|
|
}
|
2015-03-22 22:14:30 +01:00
|
|
|
ev_sig.rsa_signature
|
|
|
|
= GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key,
|
|
|
|
commit_coin->coin_ev,
|
|
|
|
commit_coin->coin_ev_size);
|
|
|
|
if (NULL == ev_sig.rsa_signature)
|
2015-01-31 20:08:21 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-22 22:14:30 +01:00
|
|
|
return ev_sig;
|
2015-01-31 20:08:21 +01:00
|
|
|
}
|
2015-01-31 20:53:19 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->insert_refresh_collectable (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
coin_off,
|
2015-03-22 22:14:30 +01:00
|
|
|
&ev_sig))
|
2015-01-31 20:53:19 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (ev_sig.rsa_signature);
|
|
|
|
ev_sig.rsa_signature = NULL;
|
2015-01-31 20:53:19 +01:00
|
|
|
}
|
2015-01-31 20:08:21 +01:00
|
|
|
return ev_sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/reveal". The client is revealing to us the
|
2015-03-27 19:58:40 +01:00
|
|
|
* transfer keys for @a #TALER_CNC_KAPPA-1 sets of coins. Verify that the
|
2015-01-29 18:46:34 +01:00
|
|
|
* revealed transfer keys would allow linkage to the blinded coins,
|
|
|
|
* and if so, return the signed coins for corresponding to the set of
|
|
|
|
* coins that was not chosen.
|
2015-01-21 14:46:33 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
2015-03-24 16:56:06 +01:00
|
|
|
* @param session_hash hash identifying the refresh session
|
2015-01-21 14:46:33 +01:00
|
|
|
* @param num_oldcoins size of y-dimension of @transfer_privs array
|
2015-03-24 17:25:00 +01:00
|
|
|
* @param transfer_pubs array with the revealed transfer keys,
|
2015-03-27 19:58:40 +01:00
|
|
|
* x-dimension must be #TALER_CNC_KAPPA - 1
|
2015-01-21 14:46:33 +01:00
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_refresh_reveal (struct MHD_Connection *connection,
|
2015-03-24 16:56:06 +01:00
|
|
|
const struct GNUNET_HashCode *session_hash,
|
2015-01-21 14:46:33 +01:00
|
|
|
unsigned int num_oldcoins,
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferPrivateKeyP **transfer_privs)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
int res;
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-01-21 14:46:33 +01:00
|
|
|
struct RefreshSession refresh_session;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TMH_KS_StateHandle *key_state;
|
2015-01-31 15:42:00 +01:00
|
|
|
struct RefreshMelt *melts;
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationPublicKey *denom_pubs;
|
|
|
|
struct TALER_DenominationSignature *ev_sigs;
|
2015-03-22 14:21:16 +01:00
|
|
|
struct RefreshCommitCoin *commit_coins;
|
2015-01-21 14:46:33 +01:00
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
|
|
|
unsigned int off;
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
res = TMH_plugin->get_refresh_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
&refresh_session);
|
2015-01-29 20:00:21 +01:00
|
|
|
if (GNUNET_NO == res)
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_arg_invalid (connection,
|
2015-03-24 16:56:06 +01:00
|
|
|
"session_hash");
|
2015-01-21 14:46:33 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-31 15:42:00 +01:00
|
|
|
if (0 == refresh_session.num_oldcoins)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-31 15:42:00 +01:00
|
|
|
}
|
2015-01-21 14:46:33 +01:00
|
|
|
|
2015-01-31 15:42:00 +01:00
|
|
|
melts = GNUNET_malloc (refresh_session.num_oldcoins *
|
|
|
|
sizeof (struct RefreshMelt));
|
2015-01-31 20:08:21 +01:00
|
|
|
for (j=0;j<refresh_session.num_oldcoins;j++)
|
2015-01-31 15:42:00 +01:00
|
|
|
{
|
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->get_refresh_melt (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-20 23:51:28 +01:00
|
|
|
j,
|
|
|
|
&melts[j]))
|
2015-01-31 15:42:00 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (melts);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-31 15:42:00 +01:00
|
|
|
}
|
|
|
|
}
|
2015-01-31 20:08:21 +01:00
|
|
|
denom_pubs = GNUNET_malloc (refresh_session.num_newcoins *
|
2015-03-22 22:14:30 +01:00
|
|
|
sizeof (struct TALER_DenominationPublicKey));
|
2015-03-22 14:21:16 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->get_refresh_order (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
refresh_session.num_newcoins,
|
|
|
|
denom_pubs))
|
2015-01-31 20:08:21 +01:00
|
|
|
{
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (denom_pubs);
|
|
|
|
GNUNET_free (melts);
|
2015-03-27 19:58:40 +01:00
|
|
|
return (MHD_YES == TMH_RESPONSE_reply_internal_db_error (connection))
|
2015-03-22 14:21:16 +01:00
|
|
|
? GNUNET_NO : GNUNET_SYSERR;
|
2015-01-31 20:08:21 +01:00
|
|
|
}
|
|
|
|
|
2015-01-21 14:46:33 +01:00
|
|
|
|
|
|
|
off = 0;
|
2015-03-27 19:58:40 +01:00
|
|
|
for (i=0;i<TALER_CNC_KAPPA - 1;i++)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
if (i == refresh_session.noreveal_index)
|
|
|
|
off = 1;
|
2015-01-31 15:42:00 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
(res = check_commitment (connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-01-31 15:42:00 +01:00
|
|
|
i + off,
|
|
|
|
refresh_session.num_oldcoins,
|
|
|
|
transfer_privs[i + off],
|
2015-01-31 20:08:21 +01:00
|
|
|
melts,
|
|
|
|
refresh_session.num_newcoins,
|
|
|
|
denom_pubs)))
|
|
|
|
{
|
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (denom_pubs);
|
|
|
|
GNUNET_free (melts);
|
2015-01-31 15:42:00 +01:00
|
|
|
return (GNUNET_NO == res) ? MHD_YES : MHD_NO;
|
2015-01-31 20:08:21 +01:00
|
|
|
}
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (melts);
|
2015-01-21 14:46:33 +01:00
|
|
|
|
2015-01-31 15:42:00 +01:00
|
|
|
/* Client request OK, start transaction */
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->start (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-01-31 20:08:21 +01:00
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (denom_pubs);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
2015-03-22 14:21:16 +01:00
|
|
|
commit_coins = GNUNET_malloc (refresh_session.num_newcoins *
|
|
|
|
sizeof (struct RefreshCommitCoin));
|
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->get_refresh_commit_coins (TMH_plugin->cls,
|
2015-03-22 14:21:16 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-03-22 14:21:16 +01:00
|
|
|
refresh_session.noreveal_index,
|
|
|
|
refresh_session.num_newcoins,
|
|
|
|
commit_coins))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (commit_coins);
|
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (denom_pubs);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-03-22 14:21:16 +01:00
|
|
|
}
|
2015-01-31 20:08:21 +01:00
|
|
|
ev_sigs = GNUNET_malloc (refresh_session.num_newcoins *
|
2015-03-22 22:14:30 +01:00
|
|
|
sizeof (struct TALER_DenominationSignature));
|
2015-03-27 19:58:40 +01:00
|
|
|
key_state = TMH_KS_acquire ();
|
2015-01-31 20:08:21 +01:00
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-01-31 20:08:21 +01:00
|
|
|
ev_sigs[j] = refresh_mint_coin (connection,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
2015-03-24 16:56:06 +01:00
|
|
|
session_hash,
|
2015-01-31 20:08:21 +01:00
|
|
|
key_state,
|
2015-03-22 22:14:30 +01:00
|
|
|
&denom_pubs[j],
|
2015-03-22 14:21:16 +01:00
|
|
|
&commit_coins[j],
|
2015-01-31 20:08:21 +01:00
|
|
|
j);
|
2015-03-22 22:14:30 +01:00
|
|
|
if (NULL == ev_sigs[j].rsa_signature)
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-01-31 20:08:21 +01:00
|
|
|
for (i=0;i<j;i++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (ev_sigs[i].rsa_signature);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (ev_sigs);
|
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (denom_pubs);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_KS_release (key_state);
|
2015-01-31 20:08:21 +01:00
|
|
|
for (j=0;j<refresh_session.num_newcoins;j++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (denom_pubs);
|
2015-03-22 14:21:16 +01:00
|
|
|
GNUNET_free (commit_coins);
|
2015-01-21 14:46:33 +01:00
|
|
|
|
2015-01-29 00:45:07 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->commit (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session))
|
2015-01-21 14:46:33 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
TALER_LOG_WARNING ("/refresh/reveal transaction commit failed\n");
|
2015-01-31 20:08:21 +01:00
|
|
|
for (i=0;i<refresh_session.num_newcoins;i++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (ev_sigs[i].rsa_signature);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (ev_sigs);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_commit_error (connection);
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
|
|
|
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_refresh_reveal_success (connection,
|
2015-01-31 20:08:21 +01:00
|
|
|
refresh_session.num_newcoins,
|
|
|
|
ev_sigs);
|
|
|
|
for (i=0;i<refresh_session.num_newcoins;i++)
|
2015-03-22 22:14:30 +01:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (ev_sigs[i].rsa_signature);
|
2015-01-31 20:08:21 +01:00
|
|
|
GNUNET_free (ev_sigs);
|
|
|
|
return res;
|
2015-01-21 14:46:33 +01:00
|
|
|
}
|
2015-01-21 13:46:05 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-01-29 18:46:34 +01:00
|
|
|
* Execute a "/refresh/link". Returns the linkage information that
|
|
|
|
* will allow the owner of a coin to follow the refresh trail to
|
|
|
|
* the refreshed coin.
|
2015-01-21 13:46:05 +01:00
|
|
|
*
|
|
|
|
* @param connection the MHD connection to handle
|
|
|
|
* @param coin_pub public key of the coin to link
|
|
|
|
* @return MHD result code
|
|
|
|
*/
|
|
|
|
int
|
2015-03-27 19:58:40 +01:00
|
|
|
TMH_DB_execute_refresh_link (struct MHD_Connection *connection,
|
|
|
|
const union TALER_CoinSpendPublicKeyP *coin_pub)
|
2015-01-21 13:46:05 +01:00
|
|
|
{
|
|
|
|
int res;
|
2015-03-20 23:51:28 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_TransferPublicKeyP transfer_pub;
|
|
|
|
struct TALER_EncryptedLinkSecretP shared_secret_enc;
|
2015-01-31 20:53:19 +01:00
|
|
|
struct LinkDataList *ldl;
|
2015-01-21 13:46:05 +01:00
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
if (NULL == (session = TMH_plugin->get_session (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
GNUNET_NO)))
|
2015-01-21 13:46:05 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 13:46:05 +01:00
|
|
|
}
|
2015-03-28 11:06:00 +01:00
|
|
|
res = TMH_plugin->get_transfer (TMH_plugin->cls,
|
2015-03-20 23:51:28 +01:00
|
|
|
session,
|
|
|
|
coin_pub,
|
|
|
|
&transfer_pub,
|
|
|
|
&shared_secret_enc);
|
2015-01-21 13:46:05 +01:00
|
|
|
if (GNUNET_SYSERR == res)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_internal_db_error (connection);
|
2015-01-21 13:46:05 +01:00
|
|
|
}
|
|
|
|
if (GNUNET_NO == res)
|
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-21 13:46:05 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"link data not found (transfer)");
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK == res);
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
ldl = TMH_plugin->get_link_data_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
session,
|
|
|
|
coin_pub);
|
2015-01-31 20:53:19 +01:00
|
|
|
if (NULL == ldl)
|
2015-01-21 13:46:05 +01:00
|
|
|
{
|
2015-03-27 19:58:40 +01:00
|
|
|
return TMH_RESPONSE_reply_json_pack (connection,
|
2015-01-21 13:46:05 +01:00
|
|
|
MHD_HTTP_NOT_FOUND,
|
|
|
|
"{s:s}",
|
|
|
|
"error",
|
|
|
|
"link data not found (link)");
|
|
|
|
}
|
2015-03-27 19:58:40 +01:00
|
|
|
res = TMH_RESPONSE_reply_refresh_link_success (connection,
|
2015-01-31 20:53:19 +01:00
|
|
|
&transfer_pub,
|
|
|
|
&shared_secret_enc,
|
|
|
|
ldl);
|
2015-03-28 11:06:00 +01:00
|
|
|
TMH_plugin->free_link_data_list (TMH_plugin->cls,
|
2015-03-22 13:02:11 +01:00
|
|
|
ldl);
|
2015-01-28 19:58:20 +01:00
|
|
|
return res;
|
2015-01-21 13:46:05 +01:00
|
|
|
}
|
2015-01-29 00:09:48 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* end of taler-mint-httpd_db.c */
|