exchange/src/mint/taler-mint-httpd_refresh.c

911 lines
34 KiB
C
Raw Normal View History

2015-01-08 18:37:20 +01:00
/*
This file is part of TALER
Copyright (C) 2014, 2015 GNUnet e.V.
2015-01-08 18:37:20 +01:00
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU Affero General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
* @file taler-mint-httpd_refresh.c
* @brief Handle /refresh/ requests
* @author Florian Dold
* @author Benedikt Mueller
* @author Christian Grothoff
*/
#include "platform.h"
#include <gnunet/gnunet_util_lib.h>
#include <jansson.h>
#include <microhttpd.h>
#include "taler_mintdb_plugin.h"
2015-01-08 18:37:20 +01:00
#include "taler_signatures.h"
2015-01-28 20:55:15 +01:00
#include "taler_util.h"
#include "taler-mint-httpd_parsing.h"
2015-01-08 18:37:20 +01:00
#include "taler-mint-httpd_mhd.h"
#include "taler-mint-httpd_refresh.h"
#include "taler-mint-httpd_responses.h"
2015-01-28 21:08:19 +01:00
#include "taler-mint-httpd_keystate.h"
2015-01-08 18:37:20 +01:00
/**
* Handle a "/refresh/melt" request after the main JSON parsing has happened.
* We now need to validate the coins being melted and the session signature
* and then hand things of to execute the melt operation.
2015-01-08 18:37:20 +01:00
*
* @param connection the MHD connection to handle
2015-03-28 15:42:07 +01:00
* @param num_new_denoms number of coins to be created, size of y-dimension of @a commit_link array
2015-01-30 15:34:01 +01:00
* @param denom_pubs array of @a num_new_denoms keys
2015-03-28 15:42:07 +01:00
* @param coin_count number of coins to be melted, size of y-dimension of @a commit_coin array
2015-01-30 15:34:01 +01:00
* @param coin_melt_details array with @a coin_count entries with melting details
* @param session_hash hash over the data that the client commits to
2015-03-10 16:15:14 +01:00
* @param commit_coin 2d array of coin commitments (what the mint is to sign
* once the "/refres/reveal" of cut and choose is done)
* @param commit_link 2d array of coin link commitments (what the mint is
* to return via "/refresh/link" to enable linkage in the
* future)
2015-01-08 18:37:20 +01:00
* @return MHD result code
*/
static int
handle_refresh_melt_binary (struct MHD_Connection *connection,
unsigned int num_new_denoms,
2015-03-22 22:14:30 +01:00
const struct TALER_DenominationPublicKey *denom_pubs,
unsigned int coin_count,
const struct TMH_DB_MeltDetails *coin_melt_details,
const struct GNUNET_HashCode *session_hash,
struct TALER_MINTDB_RefreshCommitCoin *const* commit_coin,
struct TALER_MINTDB_RefreshCommitLinkP *const* commit_link)
2015-03-10 16:15:14 +01:00
2015-01-08 18:37:20 +01:00
{
unsigned int i;
struct TMH_KS_StateHandle *key_state;
struct TALER_DenominationKeyValidityPS *dki;
2015-01-29 19:01:29 +01:00
struct TALER_Amount cost;
struct TALER_Amount total_cost;
struct TALER_Amount melt;
struct TALER_Amount value;
struct TALER_Amount fee_withdraw;
2015-03-22 16:58:15 +01:00
struct TALER_Amount fee_melt;
2015-01-29 19:01:29 +01:00
struct TALER_Amount total_melt;
2015-03-22 16:58:15 +01:00
GNUNET_assert (GNUNET_OK ==
TALER_amount_get_zero (TMH_MINT_CURRENCY,
2015-03-22 16:58:15 +01:00
&total_cost));
key_state = TMH_KS_acquire ();
2015-01-29 19:01:29 +01:00
for (i=0;i<num_new_denoms;i++)
{
dki = &TMH_KS_denomination_key_lookup (key_state,
2015-03-22 22:14:30 +01:00
&denom_pubs[i])->issue;
TALER_amount_ntoh (&value,
&dki->value);
TALER_amount_ntoh (&fee_withdraw,
&dki->fee_withdraw);
if ( (GNUNET_OK !=
TALER_amount_add (&cost,
&value,
&fee_withdraw)) ||
(GNUNET_OK !=
TALER_amount_add (&total_cost,
&cost,
&total_cost)) )
{
TMH_KS_release (key_state);
return TMH_RESPONSE_reply_internal_error (connection,
2015-03-22 16:58:15 +01:00
"cost calculation failure");
}
2015-01-29 19:01:29 +01:00
}
2015-03-22 16:58:15 +01:00
GNUNET_assert (GNUNET_OK ==
TALER_amount_get_zero (TMH_MINT_CURRENCY,
2015-03-22 16:58:15 +01:00
&total_melt));
2015-01-29 19:01:29 +01:00
for (i=0;i<coin_count;i++)
{
2015-03-22 16:58:15 +01:00
/* calculate contribution of the i-th melt by subtracting
the fee; add the rest to the total_melt value */
dki = &TMH_KS_denomination_key_lookup (key_state,
2015-03-29 13:48:15 +02:00
&coin_melt_details[i].coin_info.denom_pub)->issue;
2015-03-22 16:58:15 +01:00
TALER_amount_ntoh (&fee_melt,
&dki->fee_refresh);
if (GNUNET_OK !=
TALER_amount_subtract (&melt,
&coin_melt_details->melt_amount_with_fee,
&fee_melt))
{
TMH_KS_release (key_state);
return TMH_RESPONSE_reply_external_error (connection,
2015-03-22 16:58:15 +01:00
"Melt contribution below melting fee");
}
if (GNUNET_OK !=
TALER_amount_add (&total_melt,
&melt,
&total_melt))
{
TMH_KS_release (key_state);
return TMH_RESPONSE_reply_internal_error (connection,
2015-03-22 16:58:15 +01:00
"balance calculation failure");
}
2015-01-29 19:01:29 +01:00
}
TMH_KS_release (key_state);
2015-01-29 19:01:29 +01:00
if (0 !=
TALER_amount_cmp (&total_cost,
2015-03-22 16:58:15 +01:00
&total_melt))
2015-01-29 19:01:29 +01:00
{
/* We require total value of coins being melted and
total value of coins being generated to match! */
return TMH_RESPONSE_reply_json_pack (connection,
MHD_HTTP_BAD_REQUEST,
"{s:s}",
"error", "value mismatch");
2015-01-29 19:01:29 +01:00
}
return TMH_DB_execute_refresh_melt (connection,
2015-03-29 13:48:15 +02:00
session_hash,
num_new_denoms,
denom_pubs,
coin_count,
coin_melt_details,
commit_coin,
commit_link);
}
/**
* Extract public coin information from a JSON object.
*
* @param connection the connection to send error responses to
* @param coin_info the JSON object to extract the coin info from
2015-03-28 15:42:07 +01:00
* @param[out] r_melt_detail set to details about the coin's melting permission (if valid)
* @return #GNUNET_YES if coin public info in JSON was valid
* #GNUNET_NO JSON was invalid, response was generated
* #GNUNET_SYSERR on internal error
*/
static int
get_coin_public_info (struct MHD_Connection *connection,
json_t *coin_info,
struct TMH_DB_MeltDetails *r_melt_detail)
{
int ret;
struct TALER_CoinSpendSignatureP melt_sig;
2015-03-22 22:14:30 +01:00
struct TALER_DenominationSignature sig;
struct TALER_DenominationPublicKey pk;
2015-01-30 15:34:01 +01:00
struct TALER_Amount amount;
struct TMH_PARSE_FieldSpecification spec[] = {
2015-03-29 13:48:15 +02:00
TMH_PARSE_MEMBER_FIXED ("coin_pub", &r_melt_detail->coin_info.coin_pub),
TMH_PARSE_MEMBER_DENOMINATION_SIGNATURE ("denom_sig", &sig.rsa_signature),
TMH_PARSE_MEMBER_DENOMINATION_PUBLIC_KEY ("denom_pub", &pk.rsa_public_key),
TMH_PARSE_MEMBER_FIXED ("confirm_sig", &melt_sig),
TMH_PARSE_MEMBER_AMOUNT ("value_with_fee", &amount),
TMH_PARSE_MEMBER_END
};
ret = TMH_PARSE_json_data (connection,
2015-03-29 13:48:15 +02:00
coin_info,
spec);
if (GNUNET_OK != ret)
return ret;
/* check mint signature on the coin */
2015-03-29 13:48:15 +02:00
r_melt_detail->coin_info.denom_sig = sig;
r_melt_detail->coin_info.denom_pub = pk;
if (GNUNET_OK !=
2015-03-29 13:48:15 +02:00
TALER_test_coin_valid (&r_melt_detail->coin_info))
{
TMH_PARSE_release_data (spec);
2015-03-29 13:48:15 +02:00
r_melt_detail->coin_info.denom_sig.rsa_signature = NULL;
r_melt_detail->coin_info.denom_pub.rsa_public_key = NULL;
return (MHD_YES ==
TMH_RESPONSE_reply_json_pack (connection,
2015-03-29 13:48:15 +02:00
MHD_HTTP_NOT_FOUND,
"{s:s}",
"error", "coin invalid"))
? GNUNET_NO : GNUNET_SYSERR;
}
r_melt_detail->melt_sig = melt_sig;
r_melt_detail->melt_amount_with_fee = amount;
TMH_PARSE_release_data (spec);
return GNUNET_OK;
}
/**
* Verify that the signature shows that this coin is to be melted into
* the given @a session_pub melting session, and that this is a valid
* coin (we know the denomination key and the signature on it is
* valid). Essentially, this does all of the per-coin checks that can
* be done before the transaction starts.
*
* @param connection the connection to send error responses to
* @param session_hash hash over refresh session the coin is melted into
2015-03-29 13:48:15 +02:00
* @param melt_detail details about the coin's melting permission (if valid)
* @return #GNUNET_YES if coin public info in JSON was valid
* #GNUNET_NO JSON was invalid, response was generated
* #GNUNET_SYSERR on internal error
*/
static int
verify_coin_public_info (struct MHD_Connection *connection,
const struct GNUNET_HashCode *session_hash,
2015-03-29 13:48:15 +02:00
const struct TMH_DB_MeltDetails *melt_detail)
{
struct TALER_RefreshMeltCoinAffirmationPS body;
struct TMH_KS_StateHandle *key_state;
2015-03-28 12:29:35 +01:00
struct TALER_MINTDB_DenominationKeyIssueInformation *dki;
2015-03-22 16:17:22 +01:00
struct TALER_Amount fee_refresh;
key_state = TMH_KS_acquire ();
dki = TMH_KS_denomination_key_lookup (key_state,
2015-03-29 13:48:15 +02:00
&melt_detail->coin_info.denom_pub);
if (NULL == dki)
{
TMH_KS_release (key_state);
TALER_LOG_WARNING ("Unknown denomination key in /refresh/melt request\n");
return TMH_RESPONSE_reply_arg_invalid (connection,
"denom_pub");
2015-01-08 18:37:20 +01:00
}
2015-03-22 16:17:22 +01:00
/* FIXME: need to check if denomination key is still
valid for issuing! (#3634) */
TALER_amount_ntoh (&fee_refresh,
&dki->issue.fee_refresh);
body.purpose.size = htonl (sizeof (struct TALER_RefreshMeltCoinAffirmationPS));
body.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_MELT);
body.session_hash = *session_hash;
TALER_amount_hton (&body.amount_with_fee,
2015-03-29 13:48:15 +02:00
&melt_detail->melt_amount_with_fee);
TALER_amount_hton (&body.melt_fee,
&fee_refresh);
2015-03-29 13:48:15 +02:00
body.coin_pub = melt_detail->coin_info.coin_pub;
2015-03-22 16:17:22 +01:00
if (TALER_amount_cmp (&fee_refresh,
2015-03-29 13:48:15 +02:00
&melt_detail->melt_amount_with_fee) < 0)
2015-03-22 16:17:22 +01:00
{
TMH_KS_release (key_state);
2015-03-22 16:17:22 +01:00
return (MHD_YES ==
TMH_RESPONSE_reply_external_error (connection,
"melt amount smaller than melting fee"))
2015-03-22 16:17:22 +01:00
? GNUNET_NO : GNUNET_SYSERR;
}
TMH_KS_release (key_state);
if (GNUNET_OK !=
GNUNET_CRYPTO_ecdsa_verify (TALER_SIGNATURE_WALLET_COIN_MELT,
&body.purpose,
2015-03-29 13:48:15 +02:00
&melt_detail->melt_sig.ecdsa_signature,
&melt_detail->coin_info.coin_pub.ecdsa_pub))
{
if (MHD_YES !=
TMH_RESPONSE_reply_json_pack (connection,
MHD_HTTP_UNAUTHORIZED,
"{s:s}",
"error", "signature invalid"))
return GNUNET_SYSERR;
return GNUNET_NO;
}
return GNUNET_OK;
}
2015-01-08 18:37:20 +01:00
2015-03-10 16:15:14 +01:00
/**
* Release memory from the @a commit_coin array.
*
* @param commit_coin array to release
* @param kappa size of 1st dimension
* @param num_new_coins size of 2nd dimension
*/
static void
free_commit_coins (struct TALER_MINTDB_RefreshCommitCoin **commit_coin,
2015-03-10 16:15:14 +01:00
unsigned int kappa,
unsigned int num_new_coins)
{
unsigned int i;
unsigned int j;
for (i=0;i<kappa;i++)
{
if (NULL == commit_coin[i])
break;
for (j=0;j<num_new_coins;j++)
{
GNUNET_free_non_null (commit_coin[i][j].coin_ev);
GNUNET_free_non_null (commit_coin[i][j].refresh_link);
}
GNUNET_free (commit_coin[i]);
}
}
/**
* Release memory from the @a commit_link array.
*
2015-03-28 15:42:07 +01:00
* @param commit_link array to release
2015-03-10 16:15:14 +01:00
* @param kappa size of 1st dimension
* @param num_old_coins size of 2nd dimension
*/
static void
free_commit_links (struct TALER_MINTDB_RefreshCommitLinkP **commit_link,
2015-03-10 16:15:14 +01:00
unsigned int kappa,
unsigned int num_old_coins)
{
unsigned int i;
for (i=0;i<kappa;i++)
{
if (NULL == commit_link[i])
break;
GNUNET_free (commit_link[i]);
}
}
/**
* Handle a "/refresh/melt" request after the first parsing has happened.
* We now need to validate the coins being melted and the session signature
* and then hand things of to execute the melt operation. This function
* parses the JSON arrays and then passes processing on to
* #handle_refresh_melt_binary().
*
* @param connection the MHD connection to handle
* @param new_denoms array of denomination keys
* @param melt_coins array of coins to melt
2015-03-10 16:15:14 +01:00
* @param num_oldcoins number of coins that are being melted
* @param transfer_pubs #TALER_CNC_KAPPA-dimensional array of @a num_oldcoins transfer keys
* @param secret_encs #TALER_CNC_KAPPA-dimensional array of @a num_oldcoins secrets
2015-03-10 16:15:14 +01:00
* @param num_newcoins number of coins that the refresh will generate
2015-03-28 15:42:07 +01:00
* @param coin_evs #TALER_CNC_KAPPA-dimensional array of @a num_newcoins envelopes to sign
* @param link_encs #TALER_CNC_KAPPA-dimensional array of @a num_newcoins encrypted links
* @return MHD result code
*/
static int
handle_refresh_melt_json (struct MHD_Connection *connection,
const json_t *new_denoms,
const json_t *melt_coins,
2015-03-10 16:15:14 +01:00
unsigned int num_oldcoins,
const json_t *transfer_pubs,
const json_t *secret_encs,
unsigned int num_newcoins,
const json_t *coin_evs,
const json_t *link_encs)
{
int res;
unsigned int i;
unsigned int j;
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPublicKey *denom_pubs;
unsigned int num_new_denoms;
struct TMH_DB_MeltDetails *coin_melt_details;
unsigned int coin_count;
struct GNUNET_HashCode session_hash;
2015-03-10 16:15:14 +01:00
struct GNUNET_HashContext *hash_context;
struct TALER_MINTDB_RefreshCommitCoin *commit_coin[TALER_CNC_KAPPA];
struct TALER_MINTDB_RefreshCommitLinkP *commit_link[TALER_CNC_KAPPA];
/* For the signature check, we hash most of the inputs together
(except for the signatures on the coins). */
hash_context = GNUNET_CRYPTO_hash_context_start ();
num_new_denoms = json_array_size (new_denoms);
denom_pubs = GNUNET_malloc (num_new_denoms *
2015-03-22 22:14:30 +01:00
sizeof (struct TALER_DenominationPublicKey));
for (i=0;i<num_new_denoms;i++)
{
char *buf;
size_t buf_size;
res = TMH_PARSE_navigate_json (connection,
new_denoms,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_RET_RSA_PUBLIC_KEY,
&denom_pubs[i].rsa_public_key);
if (GNUNET_OK != res)
{
for (j=0;j<i;j++)
2015-03-22 22:14:30 +01:00
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
GNUNET_free (denom_pubs);
return res;
}
buf_size = GNUNET_CRYPTO_rsa_public_key_encode (denom_pubs[i].rsa_public_key,
&buf);
GNUNET_CRYPTO_hash_context_read (hash_context,
buf,
buf_size);
GNUNET_free (buf);
}
coin_count = json_array_size (melt_coins);
2015-01-30 15:34:01 +01:00
coin_melt_details = GNUNET_malloc (coin_count *
sizeof (struct TMH_DB_MeltDetails));
for (i=0;i<coin_count;i++)
{
/* decode JSON data on coin to melt */
struct TALER_AmountNBO melt_amount;
res = get_coin_public_info (connection,
json_array_get (melt_coins, i),
&coin_melt_details[i]);
if (GNUNET_OK != res)
{
for (j=0;j<i;j++)
{
2015-03-29 13:48:15 +02:00
GNUNET_CRYPTO_rsa_public_key_free (coin_melt_details[j].coin_info.denom_pub.rsa_public_key);
GNUNET_CRYPTO_rsa_signature_free (coin_melt_details[j].coin_info.denom_sig.rsa_signature);
}
for (j=0;j<num_new_denoms;j++)
2015-03-22 22:14:30 +01:00
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
2015-01-30 15:34:01 +01:00
GNUNET_free (coin_melt_details);
GNUNET_free (denom_pubs);
return (GNUNET_NO == res) ? MHD_YES : MHD_NO;
}
2015-03-22 17:14:47 +01:00
/* Check that the client does not try to melt the same coin twice
into the same session! */
for (j=0;j<i;j++)
{
2015-03-29 13:48:15 +02:00
if (0 == memcmp (&coin_melt_details[i].coin_info.coin_pub,
&coin_melt_details[j].coin_info.coin_pub,
sizeof (union TALER_CoinSpendPublicKeyP)))
2015-03-22 17:14:47 +01:00
{
for (j=0;j<i;j++)
{
2015-03-29 13:48:15 +02:00
GNUNET_CRYPTO_rsa_public_key_free (coin_melt_details[j].coin_info.denom_pub.rsa_public_key);
GNUNET_CRYPTO_rsa_signature_free (coin_melt_details[j].coin_info.denom_sig.rsa_signature);
2015-03-22 17:14:47 +01:00
}
for (j=0;j<num_new_denoms;j++)
2015-03-22 22:14:30 +01:00
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
2015-03-22 17:14:47 +01:00
GNUNET_free (coin_melt_details);
GNUNET_free (denom_pubs);
return TMH_RESPONSE_reply_external_error (connection,
2015-03-22 17:14:47 +01:00
"melting same coin twice in same session is not allowed");
}
}
TALER_amount_hton (&melt_amount,
&coin_melt_details[i].melt_amount_with_fee);
GNUNET_CRYPTO_hash_context_read (hash_context,
2015-03-29 13:48:15 +02:00
&coin_melt_details[i].coin_info.coin_pub,
sizeof (union TALER_CoinSpendPublicKeyP));
GNUNET_CRYPTO_hash_context_read (hash_context,
&melt_amount,
sizeof (struct TALER_AmountNBO));
}
/* parse JSON arrays into 2d binary arrays and hash everything
together for the signature check */
memset (commit_coin, 0, sizeof (commit_coin));
memset (commit_link, 0, sizeof (commit_link));
for (i = 0; i < TALER_CNC_KAPPA; i++)
2015-01-08 18:37:20 +01:00
{
commit_coin[i] = GNUNET_malloc (num_newcoins *
sizeof (struct TALER_MINTDB_RefreshCommitCoin));
for (j = 0; j < num_newcoins; j++)
2015-01-08 18:37:20 +01:00
{
2015-01-27 18:57:29 +01:00
char *link_enc;
2015-01-27 18:35:17 +01:00
size_t link_enc_size;
struct TALER_MINTDB_RefreshCommitCoin *rcc = &commit_coin[i][j];
2015-01-27 18:35:17 +01:00
res = TMH_PARSE_navigate_json (connection,
2015-03-28 15:42:07 +01:00
coin_evs,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_INDEX, (int) j,
TMH_PARSE_JNC_RET_DATA_VAR,
&rcc->coin_ev,
&rcc->coin_ev_size);
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != res)
{
GNUNET_CRYPTO_hash_context_abort (hash_context);
free_commit_coins (commit_coin,
TALER_CNC_KAPPA,
num_newcoins);
2015-01-08 18:37:20 +01:00
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
GNUNET_CRYPTO_hash_context_read (hash_context,
rcc->coin_ev,
rcc->coin_ev_size);
res = TMH_PARSE_navigate_json (connection,
2015-03-29 13:48:15 +02:00
link_encs,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_INDEX, (int) j,
TMH_PARSE_JNC_RET_DATA_VAR,
&link_enc,
&link_enc_size);
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != res)
{
GNUNET_CRYPTO_hash_context_abort (hash_context);
free_commit_coins (commit_coin,
TALER_CNC_KAPPA,
num_newcoins);
2015-01-08 18:37:20 +01:00
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
rcc->refresh_link
= TALER_refresh_link_encrypted_decode (link_enc,
link_enc_size);
GNUNET_CRYPTO_hash_context_read (hash_context,
2015-01-27 18:57:29 +01:00
link_enc,
link_enc_size);
2015-01-08 18:37:20 +01:00
}
}
for (i = 0; i < TALER_CNC_KAPPA; i++)
2015-01-08 18:37:20 +01:00
{
commit_link[i] = GNUNET_malloc (num_oldcoins *
sizeof (struct TALER_MINTDB_RefreshCommitLinkP));
for (j = 0; j < num_oldcoins; j++)
2015-01-08 18:37:20 +01:00
{
struct TALER_MINTDB_RefreshCommitLinkP *rcl = &commit_link[i][j];
res = TMH_PARSE_navigate_json (connection,
2015-03-29 13:48:15 +02:00
transfer_pubs,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_INDEX, (int) j,
TMH_PARSE_JNC_RET_DATA,
&rcl->transfer_pub,
sizeof (struct TALER_TransferPublicKeyP));
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != res)
{
GNUNET_break (GNUNET_SYSERR != res);
GNUNET_CRYPTO_hash_context_abort (hash_context);
free_commit_coins (commit_coin,
TALER_CNC_KAPPA,
num_newcoins);
free_commit_links (commit_link,
TALER_CNC_KAPPA,
num_oldcoins);
2015-01-08 18:37:20 +01:00
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
res = TMH_PARSE_navigate_json (connection,
2015-03-29 13:48:15 +02:00
secret_encs,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_INDEX, (int) j,
TMH_PARSE_JNC_RET_DATA,
&rcl->shared_secret_enc,
sizeof (struct GNUNET_HashCode));
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != res)
{
GNUNET_break (GNUNET_SYSERR != res);
GNUNET_CRYPTO_hash_context_abort (hash_context);
free_commit_coins (commit_coin,
TALER_CNC_KAPPA,
num_newcoins);
free_commit_links (commit_link,
TALER_CNC_KAPPA,
num_oldcoins);
2015-01-08 18:37:20 +01:00
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
GNUNET_CRYPTO_hash_context_read (hash_context,
rcl,
sizeof (struct TALER_MINTDB_RefreshCommitLinkP));
2015-01-08 18:37:20 +01:00
}
}
GNUNET_CRYPTO_hash_context_finish (hash_context,
&session_hash);
for (i=0;i<coin_count;i++)
2015-01-08 18:37:20 +01:00
{
/* verify signatures on coins to melt */
res = verify_coin_public_info (connection,
&session_hash,
&coin_melt_details[i]);
if (GNUNET_OK != res)
{
res = (GNUNET_NO == res) ? MHD_YES : MHD_NO;
goto cleanup;
}
2015-01-08 18:37:20 +01:00
}
/* execute commit */
2015-03-10 16:15:14 +01:00
res = handle_refresh_melt_binary (connection,
num_new_denoms,
denom_pubs,
coin_count,
coin_melt_details,
&session_hash,
2015-03-10 16:15:14 +01:00
commit_coin,
commit_link);
cleanup:
free_commit_coins (commit_coin,
TALER_CNC_KAPPA,
num_newcoins);
free_commit_links (commit_link,
TALER_CNC_KAPPA,
num_oldcoins);
2015-03-10 16:15:14 +01:00
for (j=0;j<coin_count;j++)
{
2015-03-29 13:48:15 +02:00
GNUNET_CRYPTO_rsa_public_key_free (coin_melt_details[j].coin_info.denom_pub.rsa_public_key);
GNUNET_CRYPTO_rsa_signature_free (coin_melt_details[j].coin_info.denom_sig.rsa_signature);
2015-03-10 16:15:14 +01:00
}
for (j=0;j<num_new_denoms;j++)
2015-03-22 22:14:30 +01:00
GNUNET_CRYPTO_rsa_public_key_free (denom_pubs[j].rsa_public_key);
2015-03-10 16:15:14 +01:00
GNUNET_free (coin_melt_details);
GNUNET_free (denom_pubs);
return res;
}
/**
2015-03-10 16:15:14 +01:00
* Handle a "/refresh/melt" request. Parses the request into the JSON
2015-03-28 15:43:06 +01:00
* components and then hands things of to #handle_refresh_melt_json()
2015-03-10 16:15:14 +01:00
* to validate the melted coins, the signature and execute the melt
* using TMH_DB_execute_refresh_melt().
*
* @param rh context of the handler
* @param connection the MHD connection to handle
2015-03-28 15:42:07 +01:00
* @param[in,out] connection_cls the connection's closure (can be updated)
* @param upload_data upload data
2015-03-28 15:42:07 +01:00
* @param[in,out] upload_data_size number of bytes (left) in @a upload_data
* @return MHD result code
2015-03-10 16:15:14 +01:00
*/
int
TMH_REFRESH_handler_refresh_melt (struct TMH_RequestHandler *rh,
struct MHD_Connection *connection,
void **connection_cls,
const char *upload_data,
size_t *upload_data_size)
{
json_t *root;
2015-03-10 16:15:14 +01:00
json_t *new_denoms;
json_t *melt_coins;
json_t *coin_evs;
json_t *link_encs;
json_t *transfer_pubs;
json_t *secret_encs;
2015-03-10 16:15:14 +01:00
unsigned int num_oldcoins;
unsigned int num_newcoins;
json_t *coin_detail;
int res;
struct TMH_PARSE_FieldSpecification spec[] = {
TMH_PARSE_MEMBER_ARRAY ("new_denoms", &new_denoms),
TMH_PARSE_MEMBER_ARRAY ("melt_coins", &melt_coins),
TMH_PARSE_MEMBER_ARRAY ("coin_evs", &coin_evs),
TMH_PARSE_MEMBER_ARRAY ("link_encs", &link_encs),
TMH_PARSE_MEMBER_ARRAY ("transfer_pubs", &transfer_pubs),
TMH_PARSE_MEMBER_ARRAY ("secret_encs", &secret_encs),
TMH_PARSE_MEMBER_END
};
res = TMH_PARSE_post_json (connection,
connection_cls,
upload_data,
upload_data_size,
&root);
if (GNUNET_SYSERR == res)
return MHD_NO;
if ( (GNUNET_NO == res) || (NULL == root) )
return MHD_YES;
res = TMH_PARSE_json_data (connection,
root,
spec);
json_decref (root);
if (GNUNET_OK != res)
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
/* Determine dimensionality of the request (kappa, #old and #new coins) */
if (TALER_CNC_KAPPA != json_array_size (coin_evs))
{
GNUNET_break_op (0);
TMH_PARSE_release_data (spec);
return TMH_RESPONSE_reply_arg_invalid (connection,
"coin_evs");
}
if (TALER_CNC_KAPPA != json_array_size (transfer_pubs))
{
GNUNET_break_op (0);
TMH_PARSE_release_data (spec);
return TMH_RESPONSE_reply_arg_invalid (connection,
"transfer_pubs");
}
res = TMH_PARSE_navigate_json (connection, coin_evs,
TMH_PARSE_JNC_INDEX, (int) 0,
TMH_PARSE_JNC_RET_DATA,
JSON_ARRAY, &coin_detail);
if (GNUNET_OK != res)
{
TMH_PARSE_release_data (spec);
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
num_newcoins = json_array_size (coin_detail);
res = TMH_PARSE_navigate_json (connection,
transfer_pubs,
TMH_PARSE_JNC_INDEX, (int) 0,
TMH_PARSE_JNC_RET_DATA,
JSON_ARRAY, &coin_detail);
if (GNUNET_OK != res)
{
TMH_PARSE_release_data (spec);
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
}
num_oldcoins = json_array_size (coin_detail);
2015-03-10 16:15:14 +01:00
res = handle_refresh_melt_json (connection,
new_denoms,
melt_coins,
num_oldcoins,
transfer_pubs,
secret_encs,
num_newcoins,
coin_evs,
link_encs);
TMH_PARSE_release_data (spec);
return res;
2015-01-08 18:37:20 +01:00
}
/**
* Handle a "/refresh/reveal" request. Parses the given JSON
* transfer private keys and if successful, passes everything to
* #TMH_DB_execute_refresh_reveal() which will verify that the
* revealed information is valid then returns the signed refreshed
* coins.
*
* @param connection the MHD connection to handle
* @param session_hash hash identifying the melting session
* @param num_oldcoins length of the 2nd dimension of @a transfer_privs array
* @param tp_json private transfer keys in JSON format
* @return MHD result code
*/
static int
handle_refresh_reveal_json (struct MHD_Connection *connection,
const struct GNUNET_HashCode *session_hash,
unsigned int num_oldcoins,
const json_t *tp_json)
{
struct TALER_TransferPrivateKeyP *transfer_privs[TALER_CNC_KAPPA - 1];
unsigned int i;
unsigned int j;
int res;
for (i = 0; i < TALER_CNC_KAPPA - 1; i++)
transfer_privs[i] = GNUNET_malloc (num_oldcoins *
sizeof (struct TALER_TransferPrivateKeyP));
res = GNUNET_OK;
for (i = 0; i < TALER_CNC_KAPPA - 1; i++)
{
if (GNUNET_OK != res)
break;
for (j = 0; j < num_oldcoins; j++)
{
if (GNUNET_OK != res)
break;
res = TMH_PARSE_navigate_json (connection,
tp_json,
TMH_PARSE_JNC_INDEX, (int) i,
TMH_PARSE_JNC_INDEX, (int) j,
TMH_PARSE_JNC_RET_DATA,
&transfer_privs[i][j],
sizeof (struct TALER_TransferPrivateKeyP));
}
}
if (GNUNET_OK != res)
res = (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
else
res = TMH_DB_execute_refresh_reveal (connection,
session_hash,
num_oldcoins,
transfer_privs);
for (i = 0; i < TALER_CNC_KAPPA - 1; i++)
GNUNET_free (transfer_privs[i]);
return res;
}
/**
* Handle a "/refresh/reveal" request. This time, the client reveals
* the private transfer keys except for the cut-and-choose value
2015-03-10 16:15:14 +01:00
* returned from "/refresh/melt". This function parses the revealed
* keys and secrets and ultimately passes everything to
* #TMH_DB_execute_refresh_reveal() which will verify that the
* revealed information is valid then returns the signed refreshed
* coins.
2015-01-08 18:37:20 +01:00
*
* @param rh context of the handler
* @param connection the MHD connection to handle
2015-03-28 15:42:07 +01:00
* @param[in,out] connection_cls the connection's closure (can be updated)
2015-01-08 18:37:20 +01:00
* @param upload_data upload data
2015-03-28 15:42:07 +01:00
* @param[in,out] upload_data_size number of bytes (left) in @a upload_data
2015-01-08 18:37:20 +01:00
* @return MHD result code
*/
int
TMH_REFRESH_handler_refresh_reveal (struct TMH_RequestHandler *rh,
struct MHD_Connection *connection,
void **connection_cls,
const char *upload_data,
size_t *upload_data_size)
2015-01-08 18:37:20 +01:00
{
struct GNUNET_HashCode session_hash;
2015-01-08 18:37:20 +01:00
int res;
unsigned int num_oldcoins;
json_t *reveal_detail;
2015-01-08 18:37:20 +01:00
json_t *root;
json_t *transfer_privs;
struct TMH_PARSE_FieldSpecification spec[] = {
TMH_PARSE_MEMBER_FIXED ("session_hash", &session_hash),
TMH_PARSE_MEMBER_ARRAY ("transfer_privs", &transfer_privs),
TMH_PARSE_MEMBER_END
};
2015-01-08 18:37:20 +01:00
res = TMH_PARSE_post_json (connection,
connection_cls,
upload_data,
upload_data_size,
&root);
2015-01-08 18:37:20 +01:00
if (GNUNET_SYSERR == res)
return MHD_NO;
if ( (GNUNET_NO == res) || (NULL == root) )
2015-01-08 18:37:20 +01:00
return MHD_YES;
res = TMH_PARSE_json_data (connection,
root,
spec);
json_decref (root);
2015-01-08 18:37:20 +01:00
if (GNUNET_OK != res)
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
2015-01-08 18:37:20 +01:00
/* Determine dimensionality of the request (kappa and #old coins) */
if (TALER_CNC_KAPPA != json_array_size (transfer_privs) + 1)
2015-01-08 18:37:20 +01:00
{
TMH_PARSE_release_data (spec);
return TMH_RESPONSE_reply_arg_invalid (connection,
"transfer_privs");
2015-01-08 18:37:20 +01:00
}
/* Note we do +1 as 1 row (cut-and-choose!) is missing! */
res = TMH_PARSE_navigate_json (connection,
transfer_privs,
TMH_PARSE_JNC_INDEX, 0,
TMH_PARSE_JNC_RET_TYPED_JSON,
JSON_ARRAY,
&reveal_detail);
if (GNUNET_OK != res)
2015-01-08 18:37:20 +01:00
{
TMH_PARSE_release_data (spec);
return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES;
2015-01-08 18:37:20 +01:00
}
num_oldcoins = json_array_size (reveal_detail);
res = handle_refresh_reveal_json (connection,
&session_hash,
num_oldcoins,
transfer_privs);
TMH_PARSE_release_data (spec);
return res;
2015-01-08 18:37:20 +01:00
}
/**
* Handle a "/refresh/link" request. Note that for "/refresh/link"
* we do use a simple HTTP GET, and a HTTP POST!
2015-01-08 18:37:20 +01:00
*
* @param rh context of the handler
* @param connection the MHD connection to handle
2015-03-28 15:42:07 +01:00
* @param[in,out] connection_cls the connection's closure (can be updated)
2015-01-08 18:37:20 +01:00
* @param upload_data upload data
2015-03-28 15:42:07 +01:00
* @param[in,out] upload_data_size number of bytes (left) in @a upload_data
2015-01-08 18:37:20 +01:00
* @return MHD result code
*/
int
TMH_REFRESH_handler_refresh_link (struct TMH_RequestHandler *rh,
struct MHD_Connection *connection,
void **connection_cls,
const char *upload_data,
size_t *upload_data_size)
2015-01-08 18:37:20 +01:00
{
union TALER_CoinSpendPublicKeyP coin_pub;
2015-01-08 18:37:20 +01:00
int res;
res = TMH_PARSE_mhd_request_arg_data (connection,
"coin_pub",
&coin_pub,
sizeof (union TALER_CoinSpendPublicKeyP));
2015-01-08 18:37:20 +01:00
if (GNUNET_SYSERR == res)
return MHD_NO;
if (GNUNET_OK != res)
return MHD_YES;
return TMH_DB_execute_refresh_link (connection,
&coin_pub);
2015-01-08 18:37:20 +01:00
}
/* end of taler-mint-httpd_refresh.c */