exchange/src/lib/exchange_api_refresh_link.c

491 lines
15 KiB
C
Raw Normal View History

/*
This file is part of TALER
Copyright (C) 2015-2020 Taler Systems SA
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
2016-07-07 17:55:25 +02:00
TALER; see the file COPYING. If not, see
<http://www.gnu.org/licenses/>
*/
/**
2020-01-17 22:13:40 +01:00
* @file lib/exchange_api_refresh_link.c
2016-03-01 15:35:04 +01:00
* @brief Implementation of the /refresh/link request of the exchange's HTTP API
* @author Christian Grothoff
*/
#include "platform.h"
#include <microhttpd.h> /* just for HTTP status codes */
#include <gnunet/gnunet_util_lib.h>
#include <gnunet/gnunet_curl_lib.h>
2016-03-01 15:35:04 +01:00
#include "taler_exchange_service.h"
#include "taler_json_lib.h"
2016-03-01 15:35:04 +01:00
#include "exchange_api_handle.h"
#include "taler_signatures.h"
#include "exchange_api_curl_defaults.h"
/**
* @brief A /refresh/link Handle
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGE_RefreshLinkHandle
{
/**
2016-03-01 15:35:04 +01:00
* The connection to exchange this request handle will use
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGE_Handle *exchange;
/**
* The url for this request.
*/
char *url;
/**
* Handle for the request.
*/
struct GNUNET_CURL_Job *job;
/**
* Function to call with the result.
*/
2016-03-01 15:35:04 +01:00
TALER_EXCHANGE_RefreshLinkCallback link_cb;
/**
* Closure for @e cb.
*/
void *link_cb_cls;
2015-08-08 23:03:26 +02:00
/**
* Private key of the coin, required to decode link information.
*/
struct TALER_CoinSpendPrivateKeyP coin_priv;
};
2015-08-08 23:03:26 +02:00
/**
* Parse the provided linkage data from the "200 OK" response
* for one of the coins.
*
* @param rlh refresh link handle
* @param json json reply with the data for one coin
* @param coin_num number of the coin to decode
2015-08-08 23:03:26 +02:00
* @param trans_pub our transfer public key
* @param[out] coin_priv where to return private coin key
* @param[out] sig where to return private coin signature
* @param[out] pub where to return the public key for the coin
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
static int
2016-03-01 15:35:04 +01:00
parse_refresh_link_coin (const struct TALER_EXCHANGE_RefreshLinkHandle *rlh,
const json_t *json,
unsigned int coin_num,
2015-08-08 23:03:26 +02:00
const struct TALER_TransferPublicKeyP *trans_pub,
struct TALER_CoinSpendPrivateKeyP *coin_priv,
struct TALER_DenominationSignature *sig,
struct TALER_DenominationPublicKey *pub)
{
2016-03-21 14:40:57 +01:00
struct GNUNET_CRYPTO_RsaSignature *bsig;
struct GNUNET_CRYPTO_RsaPublicKey *rpub;
struct TALER_CoinSpendSignatureP link_sig;
struct GNUNET_JSON_Specification spec[] = {
GNUNET_JSON_spec_rsa_public_key ("denom_pub", &rpub),
GNUNET_JSON_spec_rsa_signature ("ev_sig", &bsig),
GNUNET_JSON_spec_fixed_auto ("link_sig", &link_sig),
2019-08-25 16:18:24 +02:00
GNUNET_JSON_spec_end ()
2015-08-08 23:03:26 +02:00
};
struct TALER_TransferSecretP secret;
struct TALER_PlanchetSecretsP fc;
2015-08-08 23:03:26 +02:00
/* parse reply */
if (GNUNET_OK !=
GNUNET_JSON_parse (json,
spec,
NULL, NULL))
2015-08-08 23:03:26 +02:00
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
TALER_link_recover_transfer_secret (trans_pub,
&rlh->coin_priv,
&secret);
TALER_planchet_setup_refresh (&secret,
coin_num,
&fc);
2015-08-08 23:03:26 +02:00
/* extract coin and signature */
*coin_priv = fc.coin_priv;
2015-08-08 23:03:26 +02:00
sig->rsa_signature
= GNUNET_CRYPTO_rsa_unblind (bsig,
&fc.blinding_key.bks,
rpub);
/* verify link_sig */
{
struct TALER_LinkDataPS ldp;
struct TALER_PlanchetDetail pd;
ldp.purpose.size = htonl (sizeof (ldp));
ldp.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_LINK);
GNUNET_CRYPTO_eddsa_key_get_public (&rlh->coin_priv.eddsa_priv,
&ldp.old_coin_pub.eddsa_pub);
ldp.transfer_pub = *trans_pub;
pub->rsa_public_key = rpub;
if (GNUNET_OK !=
TALER_planchet_prepare (pub,
&fc,
&pd))
{
GNUNET_break (0);
GNUNET_JSON_parse_free (spec);
return GNUNET_SYSERR;
}
ldp.h_denom_pub = pd.denom_pub_hash;
GNUNET_CRYPTO_hash (pd.coin_ev,
pd.coin_ev_size,
&ldp.coin_envelope_hash);
GNUNET_free (pd.coin_ev);
2019-08-25 16:18:24 +02:00
if (GNUNET_OK !=
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_LINK,
&ldp.purpose,
&link_sig.eddsa_signature,
&ldp.old_coin_pub.eddsa_pub))
{
GNUNET_break_op (0);
GNUNET_JSON_parse_free (spec);
return GNUNET_SYSERR;
}
}
2019-08-25 16:18:24 +02:00
2015-08-08 23:03:26 +02:00
/* clean up */
pub->rsa_public_key = GNUNET_CRYPTO_rsa_public_key_dup (rpub);
GNUNET_JSON_parse_free (spec);
2015-08-08 23:03:26 +02:00
return GNUNET_OK;
}
/**
* Parse the provided linkage data from the "200 OK" response
* for one of the coins.
*
* @param[in,out] rlh refresh link handle (callback may be zero'ed out)
* @param json json reply with the data for one coin
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
*/
static int
2016-03-01 15:35:04 +01:00
parse_refresh_link_ok (struct TALER_EXCHANGE_RefreshLinkHandle *rlh,
const json_t *json)
2015-08-08 23:03:26 +02:00
{
2015-08-17 03:24:10 +02:00
unsigned int session;
2015-08-08 23:03:26 +02:00
unsigned int num_coins;
int ret;
2015-08-17 03:24:10 +02:00
if (! json_is_array (json))
2015-08-08 23:03:26 +02:00
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
2015-08-17 03:24:10 +02:00
num_coins = 0;
/* Theoretically, a coin may have been melted repeatedly
into different sessions; so the response is an array
which contains information by melting session. That
array contains another array. However, our API returns
a single 1d array, so we flatten the 2d array that is
returned into a single array. Note that usually a coin
is melted at most once, and so we'll only run this
loop once for 'session=0' in most cases.
num_coins tracks the size of the 1d array we return,
2020-01-18 19:16:33 +01:00
whilst 'i' and 'session' track the 2d array. *///
for (session = 0; session<json_array_size (json); session++)
2015-08-08 23:03:26 +02:00
{
2015-08-17 03:24:10 +02:00
json_t *jsona;
struct GNUNET_JSON_Specification spec[] = {
GNUNET_JSON_spec_json ("new_coins", &jsona),
2019-08-25 16:18:24 +02:00
GNUNET_JSON_spec_end ()
2015-08-17 03:24:10 +02:00
};
if (GNUNET_OK !=
GNUNET_JSON_parse (json_array_get (json,
session),
spec,
NULL, NULL))
2015-08-17 03:24:10 +02:00
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
}
if (! json_is_array (jsona))
{
GNUNET_break_op (0);
GNUNET_JSON_parse_free (spec);
2015-08-17 03:24:10 +02:00
return GNUNET_SYSERR;
}
/* count all coins over all sessions */
num_coins += json_array_size (jsona);
GNUNET_JSON_parse_free (spec);
2015-08-08 23:03:26 +02:00
}
/* Now that we know how big the 1d array is, allocate
and fill it. */
2015-08-08 23:03:26 +02:00
{
unsigned int off_coin; /* index into 1d array */
2015-08-08 23:03:26 +02:00
unsigned int i;
2020-01-18 19:16:33 +01:00
struct TALER_CoinSpendPrivateKeyP coin_privs[GNUNET_NZL (num_coins)];
struct TALER_DenominationSignature sigs[GNUNET_NZL (num_coins)];
struct TALER_DenominationPublicKey pubs[GNUNET_NZL (num_coins)];
2016-01-20 16:21:32 +01:00
memset (sigs, 0, sizeof (sigs));
memset (pubs, 0, sizeof (pubs));
2015-08-17 03:24:10 +02:00
off_coin = 0;
2019-08-25 16:18:24 +02:00
for (session = 0; session<json_array_size (json); session++)
2015-08-08 23:03:26 +02:00
{
2015-08-17 03:24:10 +02:00
json_t *jsona;
struct TALER_TransferPublicKeyP trans_pub;
struct GNUNET_JSON_Specification spec[] = {
GNUNET_JSON_spec_json ("new_coins",
&jsona),
GNUNET_JSON_spec_fixed_auto ("transfer_pub",
&trans_pub),
2019-08-25 16:18:24 +02:00
GNUNET_JSON_spec_end ()
2015-08-17 03:24:10 +02:00
};
2015-08-08 23:03:26 +02:00
if (GNUNET_OK !=
GNUNET_JSON_parse (json_array_get (json,
session),
spec,
NULL, NULL))
2015-08-08 23:03:26 +02:00
{
GNUNET_break_op (0);
return GNUNET_SYSERR;
2015-08-08 23:03:26 +02:00
}
2015-08-17 03:24:10 +02:00
if (! json_is_array (jsona))
{
GNUNET_break_op (0);
GNUNET_JSON_parse_free (spec);
return GNUNET_SYSERR;
2015-08-17 03:24:10 +02:00
}
2016-01-20 16:21:32 +01:00
2015-08-17 03:24:10 +02:00
/* decode all coins */
2019-08-25 16:18:24 +02:00
for (i = 0; i<json_array_size (jsona); i++)
2015-08-17 03:24:10 +02:00
{
GNUNET_assert (i + off_coin < num_coins);
if (GNUNET_OK !=
parse_refresh_link_coin (rlh,
json_array_get (jsona,
i),
i,
&trans_pub,
2019-08-25 16:18:24 +02:00
&coin_privs[i + off_coin],
&sigs[i + off_coin],
&pubs[i + off_coin]))
{
GNUNET_break_op (0);
break;
}
2015-08-17 03:24:10 +02:00
}
/* check if we really got all, then invoke callback */
off_coin += i;
2015-08-17 03:24:10 +02:00
if (i != json_array_size (jsona))
{
GNUNET_break_op (0);
ret = GNUNET_SYSERR;
GNUNET_JSON_parse_free (spec);
break;
2015-08-17 03:24:10 +02:00
}
GNUNET_JSON_parse_free (spec);
2016-01-20 16:21:32 +01:00
} /* end of for (session) */
2015-08-17 03:24:10 +02:00
if (off_coin == num_coins)
2015-08-08 23:03:26 +02:00
{
rlh->link_cb (rlh->link_cb_cls,
MHD_HTTP_OK,
TALER_EC_NONE,
num_coins,
coin_privs,
sigs,
pubs,
json);
2015-08-08 23:03:26 +02:00
rlh->link_cb = NULL;
ret = GNUNET_OK;
}
2015-08-17 03:24:10 +02:00
else
{
GNUNET_break_op (0);
ret = GNUNET_SYSERR;
}
2015-08-08 23:03:26 +02:00
/* clean up */
GNUNET_assert (off_coin <= num_coins);
2019-08-25 16:18:24 +02:00
for (i = 0; i<off_coin; i++)
{
2015-08-08 23:03:26 +02:00
if (NULL != sigs[i].rsa_signature)
GNUNET_CRYPTO_rsa_signature_free (sigs[i].rsa_signature);
if (NULL != pubs[i].rsa_public_key)
GNUNET_CRYPTO_rsa_public_key_free (pubs[i].rsa_public_key);
}
2015-08-08 23:03:26 +02:00
}
return ret;
}
/**
* Function called when we're done processing the
* HTTP /refresh/link request.
*
2016-03-01 15:35:04 +01:00
* @param cls the `struct TALER_EXCHANGE_RefreshLinkHandle`
* @param response_code HTTP response code, 0 on error
* @param response parsed JSON result, NULL on error
*/
static void
handle_refresh_link_finished (void *cls,
long response_code,
const void *response)
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGE_RefreshLinkHandle *rlh = cls;
const json_t *j = response;
rlh->job = NULL;
switch (response_code)
{
case 0:
break;
case MHD_HTTP_OK:
2015-08-08 23:03:26 +02:00
if (GNUNET_OK !=
parse_refresh_link_ok (rlh,
j))
2015-08-08 23:03:26 +02:00
{
GNUNET_break_op (0);
response_code = 0;
}
break;
case MHD_HTTP_BAD_REQUEST:
2016-03-01 15:35:04 +01:00
/* This should never happen, either us or the exchange is buggy
(or API version conflict); just pass JSON reply to the application */
break;
case MHD_HTTP_NOT_FOUND:
2016-03-01 15:35:04 +01:00
/* Nothing really to verify, exchange says this coin was not melted; we
should pass the JSON reply to the application */
break;
case MHD_HTTP_INTERNAL_SERVER_ERROR:
/* Server had an internal issue; we should retry, but this API
leaves this to the application */
break;
default:
/* unexpected response code */
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
"Unexpected response code %u\n",
2016-05-04 13:21:22 +02:00
(unsigned int) response_code);
GNUNET_break (0);
response_code = 0;
break;
}
if (NULL != rlh->link_cb)
rlh->link_cb (rlh->link_cb_cls,
response_code,
TALER_JSON_get_error_code (j),
0,
NULL,
NULL,
NULL,
j);
2016-03-01 15:35:04 +01:00
TALER_EXCHANGE_refresh_link_cancel (rlh);
}
/**
2016-03-01 15:35:04 +01:00
* Submit a link request to the exchange and get the exchange's response.
*
* This API is typically not used by anyone, it is more a threat
* against those trying to receive a funds transfer by abusing the
* /refresh protocol.
*
2016-03-01 15:35:04 +01:00
* @param exchange the exchange handle; the exchange must be ready to operate
* @param coin_priv private key to request link data for
* @param link_cb the callback to call with the useful result of the
* refresh operation the @a coin_priv was involved in (if any)
* @param link_cb_cls closure for @a link_cb
* @return a handle for this request
*/
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGE_RefreshLinkHandle *
TALER_EXCHANGE_refresh_link (struct TALER_EXCHANGE_Handle *exchange,
2019-08-25 16:18:24 +02:00
const struct TALER_CoinSpendPrivateKeyP *coin_priv,
TALER_EXCHANGE_RefreshLinkCallback link_cb,
void *link_cb_cls)
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGE_RefreshLinkHandle *rlh;
CURL *eh;
struct GNUNET_CURL_Context *ctx;
2015-08-08 23:03:26 +02:00
struct TALER_CoinSpendPublicKeyP coin_pub;
char arg_str[sizeof (struct TALER_CoinSpendPublicKeyP) * 2 + 32];
if (GNUNET_YES !=
2018-11-25 14:40:03 +01:00
TEAH_handle_is_ready (exchange))
{
GNUNET_break (0);
return NULL;
}
2015-08-08 23:03:26 +02:00
GNUNET_CRYPTO_eddsa_key_get_public (&coin_priv->eddsa_priv,
&coin_pub.eddsa_pub);
{
char pub_str[sizeof (struct TALER_CoinSpendPublicKeyP) * 2];
char *end;
end = GNUNET_STRINGS_data_to_string (&coin_pub,
sizeof (struct
TALER_CoinSpendPublicKeyP),
pub_str,
sizeof (pub_str));
*end = '\0';
GNUNET_snprintf (arg_str,
sizeof (arg_str),
"/coins/%s/link",
pub_str);
}
2016-03-01 15:35:04 +01:00
rlh = GNUNET_new (struct TALER_EXCHANGE_RefreshLinkHandle);
rlh->exchange = exchange;
rlh->link_cb = link_cb;
rlh->link_cb_cls = link_cb_cls;
2015-08-08 23:03:26 +02:00
rlh->coin_priv = *coin_priv;
rlh->url = TEAH_path_to_url (exchange,
arg_str);
2018-09-22 01:21:55 +02:00
eh = TEL_curl_easy_get (rlh->url);
2018-11-25 14:40:03 +01:00
ctx = TEAH_handle_to_context (exchange);
rlh->job = GNUNET_CURL_job_add (ctx,
2019-08-25 16:18:24 +02:00
eh,
GNUNET_YES,
&handle_refresh_link_finished,
rlh);
return rlh;
}
/**
* Cancel a refresh link request. This function cannot be used
* on a request handle if the callback was already invoked.
*
* @param rlh the refresh link handle
*/
void
2019-08-25 16:18:24 +02:00
TALER_EXCHANGE_refresh_link_cancel (struct
TALER_EXCHANGE_RefreshLinkHandle *rlh)
{
if (NULL != rlh->job)
{
GNUNET_CURL_job_cancel (rlh->job);
rlh->job = NULL;
}
GNUNET_free (rlh->url);
GNUNET_free (rlh);
}
2016-03-01 15:35:04 +01:00
/* end of exchange_api_refresh_link.c */