2015-06-09 17:35:33 +02:00
|
|
|
/*
|
2015-06-10 14:59:14 +02:00
|
|
|
This file is part of TALER
|
|
|
|
Copyright (C) 2014, 2015 Christian Grothoff (and other contributing authors)
|
2015-06-09 17:35:33 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
2015-06-09 17:35:33 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
2015-06-09 17:35:33 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
2015-06-09 17:35:33 +02:00
|
|
|
/**
|
|
|
|
* @file mintdb/perf_taler_mintdb_init.c
|
|
|
|
* @brief Interpreter library for mint database performance analysis
|
|
|
|
* @author Nicolas Fournier
|
|
|
|
*/
|
2015-06-12 09:09:42 +02:00
|
|
|
#include "platform.h"
|
|
|
|
#include "perf_taler_mintdb_init.h"
|
2015-06-09 13:03:37 +02:00
|
|
|
#include <gnunet/gnunet_signatures.h>
|
2015-06-12 09:09:42 +02:00
|
|
|
#include "taler_signatures.h"
|
|
|
|
#include "taler_amount_lib.h"
|
2015-06-09 13:03:37 +02:00
|
|
|
|
|
|
|
|
2015-06-09 17:35:33 +02:00
|
|
|
#define CURRENCY "EUR"
|
2015-06-17 17:24:08 +02:00
|
|
|
#define PERF_TALER_MINTDB_RSA_SIZE 256
|
2015-06-09 13:03:37 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
|
2015-06-11 15:55:46 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Generate a dummy DenominationKeyInformation for testing purposes
|
|
|
|
* @return a dummy denomination key
|
2015-06-11 15:55:46 +02:00
|
|
|
*/
|
2015-06-30 09:23:04 +02:00
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation *
|
|
|
|
PERF_TALER_MINTDB_denomination_init ()
|
2015-06-09 13:55:05 +02:00
|
|
|
{
|
2015-06-30 09:23:04 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *master_prvt;
|
2015-07-15 15:49:39 +02:00
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation *dki;
|
|
|
|
struct TALER_DenominationPrivateKey denom_priv;
|
|
|
|
struct TALER_DenominationPublicKey denom_pub;
|
|
|
|
struct TALER_MINTDB_DenominationKeyInformationP issue;
|
|
|
|
|
|
|
|
master_prvt = GNUNET_CRYPTO_eddsa_key_create();
|
2015-06-09 13:55:05 +02:00
|
|
|
|
2015-07-16 17:21:25 +02:00
|
|
|
dki = GNUNET_new (struct TALER_MINTDB_DenominationKeyIssueInformation);
|
|
|
|
GNUNET_assert (NULL != dki);
|
|
|
|
denom_priv.rsa_private_key
|
|
|
|
= GNUNET_CRYPTO_rsa_private_key_create (PERF_TALER_MINTDB_RSA_SIZE);
|
|
|
|
GNUNET_assert (NULL != denom_priv.rsa_private_key);
|
|
|
|
denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_get_public (denom_priv.rsa_private_key);
|
|
|
|
GNUNET_assert (NULL != denom_pub.rsa_public_key);
|
2015-07-15 15:49:39 +02:00
|
|
|
{/* issue */
|
|
|
|
struct TALER_MasterSignatureP signature;
|
|
|
|
struct TALER_DenominationKeyValidityPS properties;
|
|
|
|
|
|
|
|
{/* properties */
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
|
|
|
|
properties.purpose.purpose = htonl (TALER_SIGNATURE_MASTER_SIGNING_KEY_VALIDITY);
|
|
|
|
properties.purpose.size = htonl (sizeof (struct TALER_DenominationKeyValidityPS));
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (master_prvt,
|
|
|
|
&properties.master.eddsa_pub);
|
|
|
|
properties.start = GNUNET_TIME_absolute_hton (GNUNET_TIME_absolute_get());
|
|
|
|
properties.expire_withdraw = GNUNET_TIME_absolute_hton (GNUNET_TIME_absolute_get_forever_());
|
|
|
|
properties.expire_spend = GNUNET_TIME_absolute_hton (GNUNET_TIME_absolute_get_forever_());
|
|
|
|
properties.expire_legal = GNUNET_TIME_absolute_hton (GNUNET_TIME_absolute_get_forever_());
|
|
|
|
TALER_string_to_amount (CURRENCY ":1.1", &amount);
|
|
|
|
TALER_amount_hton (&properties.value, &amount);
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.1", &amount);
|
|
|
|
TALER_amount_hton (&properties.fee_withdraw, &amount);
|
|
|
|
TALER_amount_hton (&properties.fee_deposit, &amount);
|
|
|
|
TALER_amount_hton (&properties.fee_refresh, &amount);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (denom_pub.rsa_public_key,
|
|
|
|
&properties.denom_hash);
|
|
|
|
issue.properties = properties;
|
|
|
|
}
|
|
|
|
{/* signature */
|
|
|
|
GNUNET_CRYPTO_eddsa_sign (master_prvt,
|
|
|
|
&properties.purpose,
|
|
|
|
&signature.eddsa_signature);
|
|
|
|
issue.signature = signature;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
dki->denom_priv = denom_priv;
|
|
|
|
dki->denom_pub = denom_pub;
|
|
|
|
dki->issue = issue;
|
2015-06-30 09:23:04 +02:00
|
|
|
GNUNET_free (master_prvt);
|
|
|
|
return dki;
|
2015-06-09 13:03:37 +02:00
|
|
|
}
|
|
|
|
|
2015-06-26 15:32:20 +02:00
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
/**
|
|
|
|
* Copies the given denomination
|
|
|
|
* @param reserve the deposit copy
|
|
|
|
* @return a copy of @a deposit; NULL if error
|
|
|
|
*/
|
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation *
|
|
|
|
PERF_TALER_MINTDB_denomination_copy (const struct TALER_MINTDB_DenominationKeyIssueInformation *dki)
|
2015-06-26 15:32:20 +02:00
|
|
|
{
|
2015-06-30 09:23:04 +02:00
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation *copy;
|
2015-06-26 15:32:20 +02:00
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(copy = GNUNET_new (struct TALER_MINTDB_DenominationKeyIssueInformation)));
|
2015-07-15 15:49:39 +02:00
|
|
|
{/* denom_priv */
|
|
|
|
copy->denom_priv.rsa_private_key =
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_dup ( dki->denom_priv.rsa_private_key);
|
|
|
|
}
|
|
|
|
{/* denom_pub */
|
|
|
|
copy->denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (dki->denom_pub.rsa_public_key);
|
|
|
|
}
|
|
|
|
{/* issue */
|
|
|
|
copy->issue.properties = dki->issue.properties;
|
|
|
|
copy->issue.signature = dki->issue.signature;
|
|
|
|
}
|
2015-06-26 15:32:20 +02:00
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
|
2015-06-09 17:35:33 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Free memory of a DenominationKeyIssueInformation
|
|
|
|
* @param dki pointer to the struct to free
|
2015-06-09 17:35:33 +02:00
|
|
|
*/
|
|
|
|
int
|
2015-06-30 09:23:04 +02:00
|
|
|
PERF_TALER_MINTDB_denomination_free (struct TALER_MINTDB_DenominationKeyIssueInformation *dki)
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-06-30 09:23:04 +02:00
|
|
|
if (NULL ==dki)
|
2015-06-11 15:55:46 +02:00
|
|
|
return GNUNET_OK;
|
2015-06-30 09:23:04 +02:00
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dki->denom_priv.rsa_private_key);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (dki->denom_pub.rsa_public_key);
|
2015-06-12 11:14:32 +02:00
|
|
|
|
2015-06-09 17:35:33 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
2015-06-09 13:03:37 +02:00
|
|
|
|
2015-06-09 17:35:33 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Generate a dummy reserve for testing
|
|
|
|
* @return a reserve with 1000 EUR in it
|
2015-06-09 17:35:33 +02:00
|
|
|
*/
|
2015-07-15 16:28:12 +02:00
|
|
|
struct PERF_TALER_MINTDB_Reserve *
|
2015-06-12 12:09:14 +02:00
|
|
|
PERF_TALER_MINTDB_reserve_init ()
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-07-15 16:28:12 +02:00
|
|
|
struct PERF_TALER_MINTDB_Reserve *reserve;
|
2015-06-11 15:55:46 +02:00
|
|
|
|
2015-06-12 09:09:42 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-07-15 16:28:12 +02:00
|
|
|
(reserve = GNUNET_new (struct PERF_TALER_MINTDB_Reserve)));
|
|
|
|
{/* private */
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *private;
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(private = GNUNET_CRYPTO_eddsa_key_create ()));
|
|
|
|
reserve->private = *private;
|
|
|
|
}
|
|
|
|
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&reserve->private,
|
|
|
|
&reserve->reserve.pub.eddsa_pub);
|
2015-06-12 09:09:42 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-07-15 16:28:12 +02:00
|
|
|
TALER_string_to_amount (CURRENCY ":1000", &reserve->reserve.balance));
|
|
|
|
reserve->reserve.expiry = GNUNET_TIME_absolute_get_forever_ ();
|
2015-06-10 14:59:14 +02:00
|
|
|
return reserve;
|
|
|
|
}
|
2015-06-09 13:03:37 +02:00
|
|
|
|
2015-06-11 15:55:46 +02:00
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
/**
|
|
|
|
* Copies the given reserve
|
|
|
|
* @param reserve the reserve to copy
|
|
|
|
* @return a copy of @a reserve; NULL if error
|
|
|
|
*/
|
2015-07-15 16:28:12 +02:00
|
|
|
struct PERF_TALER_MINTDB_Reserve *
|
|
|
|
PERF_TALER_MINTDB_reserve_copy (const struct PERF_TALER_MINTDB_Reserve *reserve)
|
2015-06-26 15:32:20 +02:00
|
|
|
{
|
2015-07-15 16:28:12 +02:00
|
|
|
struct PERF_TALER_MINTDB_Reserve *copy;
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(copy = GNUNET_new (struct PERF_TALER_MINTDB_Reserve)));
|
2015-06-26 15:32:20 +02:00
|
|
|
*copy = *reserve;
|
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
2015-07-09 10:46:33 +02:00
|
|
|
|
2015-06-11 15:55:46 +02:00
|
|
|
/**
|
|
|
|
* Free memory of a reserve
|
2015-06-30 09:23:04 +02:00
|
|
|
* @param reserve pointer to the structure to be freed
|
2015-06-11 15:55:46 +02:00
|
|
|
*/
|
2015-06-10 14:59:14 +02:00
|
|
|
int
|
2015-07-15 16:28:12 +02:00
|
|
|
PERF_TALER_MINTDB_reserve_free (struct PERF_TALER_MINTDB_Reserve *reserve)
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-06-26 15:32:20 +02:00
|
|
|
if (NULL == reserve)
|
|
|
|
return GNUNET_OK;
|
2015-06-10 14:59:14 +02:00
|
|
|
return GNUNET_OK;
|
2015-06-09 13:03:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Generate a dummy deposit for testing purposes
|
|
|
|
* @param dki the denomination key used to sign the key
|
2015-06-10 14:59:14 +02:00
|
|
|
*/
|
|
|
|
struct TALER_MINTDB_Deposit *
|
2015-07-15 18:06:50 +02:00
|
|
|
PERF_TALER_MINTDB_deposit_init (const struct PERF_TALER_MINTDB_Coin *coin)
|
2015-06-10 14:59:14 +02:00
|
|
|
{
|
2015-06-12 09:09:42 +02:00
|
|
|
struct TALER_MINTDB_Deposit *deposit;
|
2015-06-17 15:08:40 +02:00
|
|
|
struct TALER_CoinSpendSignatureP csig;
|
|
|
|
struct TALER_MerchantPublicKeyP merchant_pub;
|
|
|
|
struct GNUNET_HashCode h_contract;
|
|
|
|
struct GNUNET_HashCode h_wire;
|
|
|
|
const char wire[] = "{"
|
|
|
|
"\"type\":\"SEPA\","
|
|
|
|
"\"IBAN\":\"DE67830654080004822650\","
|
|
|
|
"\"NAME\":\"GNUNET E.\","
|
|
|
|
"\"BIC\":\"GENODEF1SRL\""
|
|
|
|
"}";
|
|
|
|
static uint64_t transaction_id = 0;
|
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
|
|
|
struct GNUNET_TIME_Absolute refund_deadline;
|
|
|
|
struct TALER_Amount amount_with_fee;
|
|
|
|
struct TALER_Amount deposit_fee;
|
2015-06-09 13:55:05 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-06-17 15:08:40 +02:00
|
|
|
(deposit = GNUNET_malloc (sizeof (struct TALER_MINTDB_Deposit) + sizeof (wire))));
|
2015-07-16 17:21:25 +02:00
|
|
|
GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&h_contract);
|
|
|
|
GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&h_wire);
|
2015-06-17 15:08:40 +02:00
|
|
|
{ //csig
|
2015-06-10 14:59:14 +02:00
|
|
|
struct u32_presign
|
2015-06-09 13:03:37 +02:00
|
|
|
{
|
2015-06-10 14:59:14 +02:00
|
|
|
struct GNUNET_CRYPTO_EccSignaturePurpose purpose;
|
2015-07-16 17:21:25 +02:00
|
|
|
struct GNUNET_HashCode h_wire;
|
|
|
|
struct GNUNET_HashCode h_contract;
|
2015-06-10 14:59:14 +02:00
|
|
|
} unsigned_data;
|
2015-06-11 15:55:46 +02:00
|
|
|
|
2015-07-16 17:21:25 +02:00
|
|
|
unsigned_data.h_contract = h_contract;
|
|
|
|
unsigned_data.h_wire = h_wire;
|
2015-06-12 09:09:42 +02:00
|
|
|
unsigned_data.purpose.size = htonl (sizeof (struct u32_presign));
|
|
|
|
unsigned_data.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
|
2015-06-10 14:59:14 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-07-15 18:06:50 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_sign (&coin->priv,
|
2015-06-12 11:14:32 +02:00
|
|
|
&unsigned_data.purpose,
|
2015-06-17 15:08:40 +02:00
|
|
|
&csig.eddsa_signature));
|
2015-06-10 14:59:14 +02:00
|
|
|
}
|
2015-06-17 15:08:40 +02:00
|
|
|
{ //merchant_pub
|
2015-06-12 09:09:42 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *eddsa_prv;
|
2015-06-10 14:59:14 +02:00
|
|
|
|
2015-07-16 17:21:25 +02:00
|
|
|
eddsa_prv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
GNUNET_assert(NULL != eddsa_prv);
|
2015-06-10 14:59:14 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (
|
2015-06-30 09:23:04 +02:00
|
|
|
eddsa_prv,
|
|
|
|
&merchant_pub.eddsa_pub);
|
2015-06-12 11:14:32 +02:00
|
|
|
GNUNET_free (eddsa_prv);
|
2015-06-10 14:59:14 +02:00
|
|
|
}
|
2015-06-17 15:08:40 +02:00
|
|
|
timestamp = GNUNET_TIME_absolute_get ();
|
|
|
|
refund_deadline = GNUNET_TIME_absolute_get ();
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":1.1",
|
|
|
|
&amount_with_fee));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.1",
|
|
|
|
&deposit_fee));
|
2015-07-16 17:21:25 +02:00
|
|
|
{
|
|
|
|
deposit->coin.coin_pub = coin->public_info.coin_pub;
|
|
|
|
deposit->coin.denom_pub.rsa_public_key = GNUNET_CRYPTO_rsa_public_key_dup (
|
|
|
|
coin->public_info.denom_pub.rsa_public_key);
|
|
|
|
GNUNET_assert (NULL != coin->public_info.denom_pub.rsa_public_key);
|
|
|
|
deposit->coin.denom_sig.rsa_signature = GNUNET_CRYPTO_rsa_signature_dup (
|
|
|
|
coin->public_info.denom_sig.rsa_signature);
|
|
|
|
GNUNET_assert (NULL != coin->public_info.denom_sig.rsa_signature);
|
|
|
|
}
|
2015-06-17 15:08:40 +02:00
|
|
|
deposit->csig = csig;
|
|
|
|
deposit->h_contract = h_contract;
|
|
|
|
deposit->h_wire = h_wire;
|
|
|
|
deposit->wire = json_loads (wire, 0, NULL);
|
|
|
|
deposit->transaction_id = transaction_id++;
|
|
|
|
deposit->timestamp = timestamp;
|
|
|
|
deposit->refund_deadline = refund_deadline;
|
|
|
|
deposit->amount_with_fee = amount_with_fee;
|
|
|
|
deposit->deposit_fee = deposit_fee;
|
2015-06-10 14:59:14 +02:00
|
|
|
return deposit;
|
2015-06-09 13:03:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
/**
|
|
|
|
* Copies the given deposit
|
|
|
|
* @param reserve the deposit copy
|
|
|
|
* @return a copy of @a deposit; NULL if error
|
|
|
|
*/
|
2015-06-26 15:32:20 +02:00
|
|
|
struct TALER_MINTDB_Deposit *
|
|
|
|
PERF_TALER_MINTDB_deposit_copy (const struct TALER_MINTDB_Deposit *deposit)
|
|
|
|
{
|
|
|
|
struct TALER_MINTDB_Deposit *copy;
|
|
|
|
|
|
|
|
GNUNET_assert (NULL != (copy = GNUNET_new (struct TALER_MINTDB_Deposit)));
|
|
|
|
*copy = *deposit;
|
|
|
|
json_incref (copy->wire);
|
2015-07-16 17:21:25 +02:00
|
|
|
copy->coin.denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (deposit->coin.denom_pub.rsa_public_key);
|
|
|
|
copy->coin.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (deposit->coin.denom_sig.rsa_signature);
|
|
|
|
|
2015-06-26 15:32:20 +02:00
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
/**
|
|
|
|
* Free memory of a deposit
|
2015-06-30 09:23:04 +02:00
|
|
|
* @param deposit pointer to the structure to free
|
2015-06-10 14:59:14 +02:00
|
|
|
*/
|
2015-06-09 17:35:33 +02:00
|
|
|
int
|
2015-06-12 12:09:14 +02:00
|
|
|
PERF_TALER_MINTDB_deposit_free (struct TALER_MINTDB_Deposit *deposit)
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-06-11 15:55:46 +02:00
|
|
|
if ( NULL == deposit)
|
|
|
|
return GNUNET_OK;
|
2015-06-10 14:59:14 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (deposit->coin.denom_pub.rsa_public_key);
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (deposit->coin.denom_sig.rsa_signature);
|
2015-06-17 17:24:08 +02:00
|
|
|
json_decref (deposit->wire);
|
2015-06-09 17:35:33 +02:00
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Generate a CollectableBlindcoin for testing purpuses
|
|
|
|
* @param dki denomination key used to sign the coin
|
|
|
|
* @param reserve reserve providing the money for the coin
|
|
|
|
* @return a randomly generated CollectableBlindcoin
|
2015-06-10 14:59:14 +02:00
|
|
|
*/
|
2015-07-15 17:46:49 +02:00
|
|
|
struct PERF_TALER_MINTDB_Coin *
|
|
|
|
PERF_TALER_MINTDB_coin_init (
|
2015-06-30 09:23:04 +02:00
|
|
|
const struct TALER_MINTDB_DenominationKeyIssueInformation *dki,
|
2015-07-15 16:28:12 +02:00
|
|
|
const struct PERF_TALER_MINTDB_Reserve *reserve)
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-07-15 17:46:49 +02:00
|
|
|
struct PERF_TALER_MINTDB_Coin *coin;
|
2015-07-16 17:21:25 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
|
|
|
|
|
|
|
coin = GNUNET_new (struct PERF_TALER_MINTDB_Coin);
|
|
|
|
GNUNET_assert (NULL != coin);
|
|
|
|
/* priv */
|
2015-06-10 14:59:14 +02:00
|
|
|
|
2015-07-16 17:21:25 +02:00
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create();
|
|
|
|
GNUNET_assert (NULL != priv);
|
|
|
|
coin->priv = *priv;
|
|
|
|
GNUNET_free (priv);
|
|
|
|
|
|
|
|
/* public_info */
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&coin->priv,
|
|
|
|
&coin->public_info.coin_pub.eddsa_pub);
|
2015-06-12 09:09:42 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-07-16 17:21:25 +02:00
|
|
|
(coin->public_info.denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (dki->denom_pub.rsa_public_key)));
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(coin->public_info.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key,
|
|
|
|
&coin->public_info.coin_pub,
|
|
|
|
sizeof (struct TALER_CoinSpendPublicKeyP))));
|
|
|
|
|
|
|
|
/* blind */
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(coin->blind.sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (coin->public_info.denom_sig.rsa_signature)));
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(coin->blind.denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (dki->denom_pub.rsa_public_key)));
|
|
|
|
TALER_amount_ntoh (&coin->blind.amount_with_fee,
|
|
|
|
&dki->issue.properties.value);
|
|
|
|
TALER_amount_ntoh (&coin->blind.withdraw_fee,
|
|
|
|
&dki->issue.properties.fee_withdraw);
|
|
|
|
coin->blind.reserve_pub = reserve->reserve.pub;
|
|
|
|
GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&coin->blind.h_coin_envelope);
|
|
|
|
{
|
|
|
|
struct {
|
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
|
|
|
struct GNUNET_HashCode hash;
|
|
|
|
} data;
|
|
|
|
|
|
|
|
data.reserve_pub = reserve->reserve.pub;
|
|
|
|
data.hash = coin->blind.h_coin_envelope;
|
2015-07-15 17:46:49 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-07-16 17:21:25 +02:00
|
|
|
(coin->blind.sig.rsa_signature =
|
2015-07-15 17:46:49 +02:00
|
|
|
GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key,
|
2015-07-16 17:21:25 +02:00
|
|
|
&data,
|
|
|
|
sizeof (data))));
|
2015-06-30 09:23:04 +02:00
|
|
|
}
|
|
|
|
return coin;
|
2015-06-09 13:03:37 +02:00
|
|
|
}
|
|
|
|
|
2015-06-11 15:55:46 +02:00
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
/**
|
|
|
|
* Copies the given coin
|
|
|
|
* @param coin the coin to copy
|
|
|
|
* @return a copy of coin; NULL if error
|
|
|
|
*/
|
2015-07-15 17:46:49 +02:00
|
|
|
struct PERF_TALER_MINTDB_Coin *
|
|
|
|
PERF_TALER_MINTDB_coin_copy (const struct PERF_TALER_MINTDB_Coin *coin)
|
2015-06-26 15:32:20 +02:00
|
|
|
{
|
2015-07-15 17:46:49 +02:00
|
|
|
struct PERF_TALER_MINTDB_Coin *copy;
|
2015-06-26 15:32:20 +02:00
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-07-15 17:46:49 +02:00
|
|
|
(copy = GNUNET_new (struct PERF_TALER_MINTDB_Coin)));
|
2015-07-16 17:21:25 +02:00
|
|
|
/* priv */
|
2015-07-15 17:46:49 +02:00
|
|
|
copy->priv = coin->priv;
|
2015-07-16 17:21:25 +02:00
|
|
|
/* public_info */
|
|
|
|
copy->public_info.coin_pub = coin->public_info.coin_pub;
|
|
|
|
copy->public_info.denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (coin->public_info.denom_pub.rsa_public_key);
|
|
|
|
GNUNET_assert (NULL != copy->public_info.denom_pub.rsa_public_key);
|
|
|
|
copy->public_info.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (coin->public_info.denom_sig.rsa_signature);
|
|
|
|
GNUNET_assert (NULL != coin->public_info.denom_sig.rsa_signature);
|
|
|
|
|
|
|
|
/* blind */
|
|
|
|
copy->blind.sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (coin->blind.sig.rsa_signature);
|
|
|
|
GNUNET_assert (NULL != copy->blind.sig.rsa_signature);
|
|
|
|
copy->blind.denom_pub.rsa_public_key =
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_dup (coin->blind.denom_pub.rsa_public_key);
|
|
|
|
GNUNET_assert (NULL != copy->blind.denom_pub.rsa_public_key);
|
|
|
|
copy->blind.amount_with_fee = coin->blind.amount_with_fee;
|
|
|
|
copy->blind.withdraw_fee = coin->blind.withdraw_fee;
|
|
|
|
copy->blind.reserve_pub = coin->blind.reserve_pub;
|
|
|
|
copy->blind.h_coin_envelope = coin->blind.h_coin_envelope;
|
|
|
|
copy->blind.reserve_sig = coin->blind.reserve_sig;
|
|
|
|
|
2015-06-26 15:32:20 +02:00
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
2015-07-09 10:46:33 +02:00
|
|
|
|
2015-06-10 14:59:14 +02:00
|
|
|
/**
|
2015-06-30 09:23:04 +02:00
|
|
|
* Liberate memory of @a coin
|
|
|
|
* @param coin pointer to the structure to free
|
2015-06-10 14:59:14 +02:00
|
|
|
*/
|
2015-06-09 13:03:37 +02:00
|
|
|
int
|
2015-07-15 17:46:49 +02:00
|
|
|
PERF_TALER_MINTDB_coin_free (struct PERF_TALER_MINTDB_Coin *coin)
|
2015-06-09 17:35:33 +02:00
|
|
|
{
|
2015-06-30 09:23:04 +02:00
|
|
|
if (NULL == coin)
|
2015-06-11 15:55:46 +02:00
|
|
|
return GNUNET_OK;
|
2015-07-15 17:46:49 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (coin->public_info.denom_pub.rsa_public_key);
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (coin->public_info.denom_sig.rsa_signature);
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (coin->blind.sig.rsa_signature);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (coin->blind.denom_pub.rsa_public_key);
|
2015-06-30 09:23:04 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return a randomly generated refresh session
|
|
|
|
*/
|
|
|
|
struct TALER_MINTDB_RefreshSession *
|
|
|
|
PERF_TALER_MINTDB_refresh_session_init ()
|
|
|
|
{
|
|
|
|
struct TALER_MINTDB_RefreshSession *refresh_session;
|
|
|
|
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(refresh_session = GNUNET_new (struct TALER_MINTDB_RefreshSession)));
|
|
|
|
refresh_session->noreveal_index = 1;
|
|
|
|
refresh_session->num_oldcoins = 1;
|
|
|
|
refresh_session->num_newcoins = 1;
|
|
|
|
|
|
|
|
return refresh_session;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-09 10:46:33 +02:00
|
|
|
/**
|
|
|
|
* @return #GNUNET_OK if the copy was successful, #GNUNET_SYSERR if it wasn't
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
PERF_TALER_MINTDB_refresh_session_copy (struct TALER_MINTDB_RefreshSession *session,
|
|
|
|
struct TALER_MINTDB_RefreshSession *copy)
|
|
|
|
{
|
|
|
|
*copy = *session;
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-30 09:23:04 +02:00
|
|
|
/**
|
|
|
|
* Free a refresh session
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
PERF_TALER_MINTDB_refresh_session_free (struct TALER_MINTDB_RefreshSession *refresh_session)
|
|
|
|
{
|
2015-07-09 10:46:33 +02:00
|
|
|
if (NULL == refresh_session)
|
|
|
|
return GNUNET_OK;
|
2015-06-09 13:03:37 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
2015-06-12 12:09:14 +02:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Generate a random CoinPublicInfo
|
|
|
|
*/
|
|
|
|
struct TALER_CoinPublicInfo *
|
|
|
|
PERF_TALER_MINTDB_coin_public_info_init ()
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *coin_spent_prv;
|
|
|
|
struct GNUNET_CRYPTO_rsa_PrivateKey *denom_prv;
|
|
|
|
struct TALER_CoinPublicInfo *cpi;
|
2015-06-17 15:08:40 +02:00
|
|
|
|
2015-06-12 12:09:14 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-06-17 17:24:08 +02:00
|
|
|
(denom_prv = GNUNET_CRYPTO_rsa_private_key_create (PERF_TALER_MINTDB_RSA_SIZE)));
|
2015-06-12 12:09:14 +02:00
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(coin_spent_prv = GNUNET_CRYPTO_eddsa_key_create ()));
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(cpi = GNUNET_new (struct TALER_CoinPublicInfo)));
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (coin_spent_prv, &cpi->coin_pub.eddsa_pub);
|
|
|
|
GNUNET_assert (NULL !=
|
2015-06-17 15:08:40 +02:00
|
|
|
(cpi->denom_pub.rsa_public_key = GNUNET_CRYPTO_rsa_private_key_get_public (denom_prv)));
|
2015-06-12 12:09:14 +02:00
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(cpi->denom_sig.rsa_signature = GNUNET_CRYPTO_rsa_sign (denom_prv,
|
|
|
|
&cpi->coin_pub,
|
|
|
|
sizeof (struct TALER_CoinSpendPublicKeyP))));
|
|
|
|
GNUNET_free (coin_spent_prv);
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (denom_prv);
|
|
|
|
return cpi;
|
|
|
|
}
|
|
|
|
|
2015-07-09 10:46:33 +02:00
|
|
|
|
2015-06-12 12:09:14 +02:00
|
|
|
/**
|
|
|
|
* Free a CoinPublicInfo
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
PERF_TALER_MINTDB_coin_public_info_free (struct TALER_CoinPublicInfo *cpi)
|
|
|
|
{
|
2015-07-09 10:46:33 +02:00
|
|
|
|
2015-06-12 15:28:49 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cpi->denom_sig.rsa_signature);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (cpi->denom_pub.rsa_public_key);
|
2015-07-09 10:46:33 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a melt operation
|
|
|
|
*
|
|
|
|
* @param session the refresh session
|
|
|
|
* @param dki the denomination the melted coin uses
|
|
|
|
* @return a pointer to a #TALER_MINTDB_RefreshMelt
|
|
|
|
*/
|
|
|
|
struct TALER_MINTDB_RefreshMelt *
|
|
|
|
PERF_TALER_MINTDB_refresh_melt_init (struct GNUNET_HashCode *session,
|
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation *dki)
|
|
|
|
{
|
|
|
|
struct TALER_MINTDB_RefreshMelt *melt;
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *coin_key;
|
|
|
|
struct TALER_CoinPublicInfo cpi;
|
|
|
|
struct TALER_CoinSpendSignatureP coin_spent;
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
struct TALER_Amount amount_with_fee;
|
|
|
|
|
|
|
|
coin_key = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
cpi.denom_pub = dki->denom_pub;
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (coin_key,
|
|
|
|
&cpi.coin_pub.eddsa_pub);
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
(cpi.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key,
|
|
|
|
&cpi.coin_pub.eddsa_pub,
|
|
|
|
sizeof (struct GNUNET_CRYPTO_EddsaPublicKey))));
|
|
|
|
{
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EccSignaturePurpose purpose;
|
|
|
|
struct GNUNET_HashCode session;
|
|
|
|
} to_sign;
|
|
|
|
|
|
|
|
to_sign.purpose.purpose = GNUNET_SIGNATURE_PURPOSE_TEST;
|
|
|
|
to_sign.purpose.size = htonl (sizeof (to_sign));
|
|
|
|
to_sign.session = *session;
|
|
|
|
GNUNET_CRYPTO_eddsa_sign (coin_key,
|
|
|
|
&to_sign.purpose,
|
|
|
|
&coin_spent.eddsa_signature);
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK == TALER_string_to_amount (CURRENCY ":10.0",
|
|
|
|
&amount));
|
|
|
|
GNUNET_assert (GNUNET_OK == TALER_string_to_amount (CURRENCY ":0.1",
|
|
|
|
&amount_with_fee));
|
|
|
|
melt = GNUNET_new (struct TALER_MINTDB_RefreshMelt);
|
|
|
|
melt->coin = cpi;
|
|
|
|
melt->coin_sig = coin_spent;
|
|
|
|
melt->session_hash = *session;
|
|
|
|
melt->amount_with_fee = amount;
|
|
|
|
melt->melt_fee = amount_with_fee;
|
|
|
|
|
|
|
|
GNUNET_free (coin_key);
|
|
|
|
return melt;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Copies the internals of a #TALER_MINTDB_RefreshMelt
|
|
|
|
*
|
|
|
|
* @param melt the refresh melt to copy
|
|
|
|
* @return an copy of @ melt
|
|
|
|
*/
|
|
|
|
struct TALER_MINTDB_RefreshMelt *
|
|
|
|
PERF_TALER_MINTDB_refresh_melt_copy (const struct TALER_MINTDB_RefreshMelt *melt)
|
|
|
|
{
|
|
|
|
struct TALER_MINTDB_RefreshMelt *copy;
|
|
|
|
|
|
|
|
copy = GNUNET_new (struct TALER_MINTDB_RefreshMelt);
|
|
|
|
*copy = *melt;
|
|
|
|
GNUNET_assert (NULL !=
|
2015-07-15 11:43:31 +02:00
|
|
|
(copy->coin.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (melt->coin.denom_sig.rsa_signature)));
|
2015-07-09 10:46:33 +02:00
|
|
|
|
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Free the internal memory of a #TALER_MINTDB_RefreshMelt
|
|
|
|
*
|
|
|
|
* @param melt the #TALER_MINTDB_RefreshMelt to free
|
|
|
|
* @return #GNUNET_OK if the operation was successful, #GNUNET_SYSERROR
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
PERF_TALER_MINTDB_refresh_melt_free (struct TALER_MINTDB_RefreshMelt *melt)
|
|
|
|
{
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (melt->coin.denom_sig.rsa_signature);
|
2015-06-12 12:09:14 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|