[WIP] hash and signature verification of /keys works again
- Hashes of (normal) denominations and age-restricted denominations are calculated seperately - The hash of the age-restricted ones will then be added to the other hash - The total hash is signed/verified So far: test_exchange_api runs, including withdraw_age! However, test_auditor_api fails and another is in a endless loop!
This commit is contained in:
parent
632d17f642
commit
1b1a6c142a
@ -157,6 +157,12 @@ TEH_extensions_init ()
|
|||||||
it = it->next)
|
it = it->next)
|
||||||
extension_update_event_cb (NULL, &it->type, sizeof(it->type));
|
extension_update_event_cb (NULL, &it->type, sizeof(it->type));
|
||||||
|
|
||||||
|
/* FIXME: shall we load the extensions from the config right away?
|
||||||
|
* We do have to for now, as otherwise denominations with age restriction
|
||||||
|
* will not have the age mask set right upon initial generation.
|
||||||
|
*/
|
||||||
|
TALER_extensions_load_taler_config (TEH_cfg);
|
||||||
|
|
||||||
return GNUNET_OK;
|
return GNUNET_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1590,7 +1590,7 @@ setup_general_response_headers (struct TEH_KeyStateHandle *ksh,
|
|||||||
* @a recoup and @a denoms.
|
* @a recoup and @a denoms.
|
||||||
*
|
*
|
||||||
* @param[in,out] ksh key state handle we build @a krd for
|
* @param[in,out] ksh key state handle we build @a krd for
|
||||||
* @param[in] denom_keys_hash hash over all the denominatoin keys in @a denoms
|
* @param[in] denom_keys_hash hash over all the denominatoin keys in @a denoms and age_restricted_denoms
|
||||||
* @param last_cpd timestamp to use
|
* @param last_cpd timestamp to use
|
||||||
* @param signkeys list of sign keys to return
|
* @param signkeys list of sign keys to return
|
||||||
* @param recoup list of revoked keys to return
|
* @param recoup list of revoked keys to return
|
||||||
@ -1846,9 +1846,11 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh)
|
|||||||
json_t *age_restricted_denoms = NULL;
|
json_t *age_restricted_denoms = NULL;
|
||||||
struct GNUNET_TIME_Timestamp last_cpd;
|
struct GNUNET_TIME_Timestamp last_cpd;
|
||||||
struct GNUNET_CONTAINER_Heap *heap;
|
struct GNUNET_CONTAINER_Heap *heap;
|
||||||
struct GNUNET_HashContext *hash_context;
|
struct GNUNET_HashContext *hash_context = NULL;
|
||||||
|
struct GNUNET_HashContext *hash_context_restricted = NULL;
|
||||||
bool age_restriction_active =
|
bool age_restriction_active =
|
||||||
TALER_extensions_is_enabled_type (TALER_Extension_AgeRestriction);
|
TALER_extensions_is_enabled_type (TALER_Extension_AgeRestriction);
|
||||||
|
bool have_age_restricted_denoms = false;
|
||||||
|
|
||||||
sctx.signkeys = json_array ();
|
sctx.signkeys = json_array ();
|
||||||
GNUNET_assert (NULL != sctx.signkeys);
|
GNUNET_assert (NULL != sctx.signkeys);
|
||||||
@ -1873,19 +1875,24 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh)
|
|||||||
= GNUNET_TIME_relative_min (dkc.min_dk_frequency,
|
= GNUNET_TIME_relative_min (dkc.min_dk_frequency,
|
||||||
sctx.min_sk_frequency);
|
sctx.min_sk_frequency);
|
||||||
}
|
}
|
||||||
|
|
||||||
denoms = json_array ();
|
denoms = json_array ();
|
||||||
GNUNET_assert (NULL != denoms);
|
GNUNET_assert (NULL != denoms);
|
||||||
|
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
||||||
|
|
||||||
// If age restriction is enabled, initialize the array of age restricted denoms.
|
/* If age restriction is enabled, initialize the array of age restricted
|
||||||
/* TODO: optimize by putting this into global? */
|
denoms and prepare a hash for them, separate from the others. We will join
|
||||||
|
those hashes afterwards.*/
|
||||||
if (age_restriction_active)
|
if (age_restriction_active)
|
||||||
{
|
{
|
||||||
age_restricted_denoms = json_array ();
|
age_restricted_denoms = json_array ();
|
||||||
GNUNET_assert (NULL != age_restricted_denoms);
|
GNUNET_assert (NULL != age_restricted_denoms);
|
||||||
|
|
||||||
|
hash_context_restricted = GNUNET_CRYPTO_hash_context_start ();
|
||||||
}
|
}
|
||||||
|
|
||||||
last_cpd = GNUNET_TIME_UNIT_ZERO_TS;
|
last_cpd = GNUNET_TIME_UNIT_ZERO_TS;
|
||||||
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
|
||||||
{
|
{
|
||||||
struct TEH_DenominationKey *dk;
|
struct TEH_DenominationKey *dk;
|
||||||
|
|
||||||
@ -1927,14 +1934,14 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh)
|
|||||||
return GNUNET_SYSERR;
|
return GNUNET_SYSERR;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
last_cpd = dk->meta.start;
|
last_cpd = dk->meta.start;
|
||||||
GNUNET_CRYPTO_hash_context_read (hash_context,
|
|
||||||
&dk->h_denom_pub,
|
|
||||||
sizeof (struct GNUNET_HashCode));
|
|
||||||
|
|
||||||
{
|
{
|
||||||
json_t *denom;
|
json_t *denom;
|
||||||
json_t *array;
|
json_t *array;
|
||||||
|
struct GNUNET_HashContext *hc;
|
||||||
|
|
||||||
|
|
||||||
denom =
|
denom =
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1961,13 +1968,25 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh)
|
|||||||
TALER_JSON_pack_amount ("fee_refund",
|
TALER_JSON_pack_amount ("fee_refund",
|
||||||
&dk->meta.fee_refund));
|
&dk->meta.fee_refund));
|
||||||
|
|
||||||
/* Put the denom into the correct array - denoms or age_restricted_denoms -
|
/* Put the denom into the correct array depending on the settings and
|
||||||
* depending on the settings and the properties of the denomination */
|
* the properties of the denomination. Also, we build up the right
|
||||||
|
* hash for the corresponding array. */
|
||||||
if (age_restriction_active &&
|
if (age_restriction_active &&
|
||||||
(0 != dk->denom_pub.age_mask.mask))
|
(0 != dk->denom_pub.age_mask.mask))
|
||||||
|
{
|
||||||
|
have_age_restricted_denoms = true;
|
||||||
array = age_restricted_denoms;
|
array = age_restricted_denoms;
|
||||||
|
hc = hash_context_restricted;
|
||||||
|
}
|
||||||
else
|
else
|
||||||
|
{
|
||||||
array = denoms;
|
array = denoms;
|
||||||
|
hc = hash_context;
|
||||||
|
}
|
||||||
|
|
||||||
|
GNUNET_CRYPTO_hash_context_read (hc,
|
||||||
|
&dk->h_denom_pub,
|
||||||
|
sizeof (struct GNUNET_HashCode));
|
||||||
|
|
||||||
GNUNET_assert (
|
GNUNET_assert (
|
||||||
0 ==
|
0 ==
|
||||||
@ -1983,8 +2002,21 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh)
|
|||||||
{
|
{
|
||||||
struct GNUNET_HashCode hc;
|
struct GNUNET_HashCode hc;
|
||||||
|
|
||||||
|
/* If age restriction is active and we had at least one denomination of
|
||||||
|
* that sort, we simply add the hash of all age restricted denominations at
|
||||||
|
* the end of the others. */
|
||||||
|
if (age_restriction_active && have_age_restricted_denoms)
|
||||||
|
{
|
||||||
|
struct GNUNET_HashCode hcr;
|
||||||
|
GNUNET_CRYPTO_hash_context_finish (hash_context_restricted, &hcr);
|
||||||
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
||||||
|
&hcr,
|
||||||
|
sizeof (struct GNUNET_HashCode));
|
||||||
|
}
|
||||||
|
|
||||||
GNUNET_CRYPTO_hash_context_finish (hash_context,
|
GNUNET_CRYPTO_hash_context_finish (hash_context,
|
||||||
&hc);
|
&hc);
|
||||||
|
|
||||||
if (GNUNET_OK !=
|
if (GNUNET_OK !=
|
||||||
create_krd (ksh,
|
create_krd (ksh,
|
||||||
&hc,
|
&hc,
|
||||||
|
@ -67,7 +67,7 @@
|
|||||||
/**
|
/**
|
||||||
* Set to 1 for extra debug logging.
|
* Set to 1 for extra debug logging.
|
||||||
*/
|
*/
|
||||||
#define DEBUG 1 /* FIXME-oec */
|
#define DEBUG 0
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Log error related to CURL operations.
|
* Log error related to CURL operations.
|
||||||
@ -364,9 +364,6 @@ parse_json_denomkey (struct TALER_EXCHANGE_DenomPublicKey *denom_key,
|
|||||||
sizeof (struct GNUNET_HashCode));
|
sizeof (struct GNUNET_HashCode));
|
||||||
if (! check_sigs)
|
if (! check_sigs)
|
||||||
return GNUNET_OK;
|
return GNUNET_OK;
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
||||||
"XXXXX checking validity of %s with age_mask %d\n", GNUNET_h2s (
|
|
||||||
&denom_key->h_key.hash), denom_key->key.age_mask.mask);
|
|
||||||
EXITIF (GNUNET_SYSERR ==
|
EXITIF (GNUNET_SYSERR ==
|
||||||
TALER_exchange_offline_denom_validity_verify (
|
TALER_exchange_offline_denom_validity_verify (
|
||||||
&denom_key->h_key,
|
&denom_key->h_key,
|
||||||
@ -381,8 +378,6 @@ parse_json_denomkey (struct TALER_EXCHANGE_DenomPublicKey *denom_key,
|
|||||||
&denom_key->fee_refund,
|
&denom_key->fee_refund,
|
||||||
master_key,
|
master_key,
|
||||||
&denom_key->master_sig));
|
&denom_key->master_sig));
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "XXXXX validity of %s OK\n",
|
|
||||||
GNUNET_h2s (&denom_key->h_key.hash));
|
|
||||||
return GNUNET_OK;
|
return GNUNET_OK;
|
||||||
EXITIF_exit:
|
EXITIF_exit:
|
||||||
/* invalidate denom_key, just to be sure */
|
/* invalidate denom_key, just to be sure */
|
||||||
@ -672,7 +667,9 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
enum TALER_EXCHANGE_VersionCompatibility *vc)
|
enum TALER_EXCHANGE_VersionCompatibility *vc)
|
||||||
{
|
{
|
||||||
struct TALER_ExchangeSignatureP sig;
|
struct TALER_ExchangeSignatureP sig;
|
||||||
struct GNUNET_HashContext *hash_context;
|
struct GNUNET_HashContext *hash_context = NULL;
|
||||||
|
struct GNUNET_HashContext *hash_context_restricted = NULL;
|
||||||
|
bool have_age_restricted_denom = false;
|
||||||
struct TALER_ExchangePublicKeyP pub;
|
struct TALER_ExchangePublicKeyP pub;
|
||||||
const char *currency;
|
const char *currency;
|
||||||
struct GNUNET_JSON_Specification mspec[] = {
|
struct GNUNET_JSON_Specification mspec[] = {
|
||||||
@ -751,7 +748,6 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
key_data->version = GNUNET_strdup (ver);
|
key_data->version = GNUNET_strdup (ver);
|
||||||
}
|
}
|
||||||
|
|
||||||
hash_context = NULL;
|
|
||||||
EXITIF (GNUNET_OK !=
|
EXITIF (GNUNET_OK !=
|
||||||
GNUNET_JSON_parse (resp_obj,
|
GNUNET_JSON_parse (resp_obj,
|
||||||
(check_sig) ? mspec : &mspec[2],
|
(check_sig) ? mspec : &mspec[2],
|
||||||
@ -771,7 +767,10 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
|
|
||||||
/* parse the master public key and issue date of the response */
|
/* parse the master public key and issue date of the response */
|
||||||
if (check_sig)
|
if (check_sig)
|
||||||
|
{
|
||||||
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
hash_context = GNUNET_CRYPTO_hash_context_start ();
|
||||||
|
hash_context_restricted = GNUNET_CRYPTO_hash_context_start ();
|
||||||
|
}
|
||||||
|
|
||||||
/* parse the signing keys */
|
/* parse the signing keys */
|
||||||
{
|
{
|
||||||
@ -847,10 +846,15 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
*/
|
*/
|
||||||
struct
|
struct
|
||||||
{ char *name;
|
{ char *name;
|
||||||
|
struct GNUNET_HashContext *hc;
|
||||||
bool is_optional_age_restriction;}
|
bool is_optional_age_restriction;}
|
||||||
hive[2] = {
|
hive[2] = {
|
||||||
{ "denoms", false },
|
{ "denoms",
|
||||||
{ "age_restricted_denoms", true }
|
hash_context,
|
||||||
|
false },
|
||||||
|
{ "age_restricted_denoms",
|
||||||
|
hash_context_restricted,
|
||||||
|
true }
|
||||||
};
|
};
|
||||||
|
|
||||||
for (size_t s = 0; s < sizeof(hive) / sizeof(hive[0]); s++)
|
for (size_t s = 0; s < sizeof(hive) / sizeof(hive[0]); s++)
|
||||||
@ -881,6 +885,8 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
struct TALER_EXCHANGE_DenomPublicKey dk;
|
struct TALER_EXCHANGE_DenomPublicKey dk;
|
||||||
bool found = false;
|
bool found = false;
|
||||||
|
|
||||||
|
have_age_restricted_denom = true;
|
||||||
|
|
||||||
memset (&dk,
|
memset (&dk,
|
||||||
0,
|
0,
|
||||||
sizeof (dk));
|
sizeof (dk));
|
||||||
@ -889,7 +895,7 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
check_sig,
|
check_sig,
|
||||||
denom_key_obj,
|
denom_key_obj,
|
||||||
&key_data->master_pub,
|
&key_data->master_pub,
|
||||||
hash_context));
|
hive[s].hc));
|
||||||
|
|
||||||
/* Mark age restriction according where we got this denomination from,
|
/* Mark age restriction according where we got this denomination from,
|
||||||
* "denoms" or "age_restricted_denoms" */
|
* "denoms" or "age_restricted_denoms" */
|
||||||
@ -1057,6 +1063,18 @@ decode_keys_json (const json_t *resp_obj,
|
|||||||
.list_issue_date = GNUNET_TIME_timestamp_hton (key_data->list_issue_date)
|
.list_issue_date = GNUNET_TIME_timestamp_hton (key_data->list_issue_date)
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/* If we had any age restricted denominations, add their hash to the end of
|
||||||
|
* the normal denominations. */
|
||||||
|
if (have_age_restricted_denom)
|
||||||
|
{
|
||||||
|
struct GNUNET_HashCode hcr;
|
||||||
|
GNUNET_CRYPTO_hash_context_finish (hash_context_restricted,
|
||||||
|
&hcr);
|
||||||
|
GNUNET_CRYPTO_hash_context_read (hash_context,
|
||||||
|
&hcr,
|
||||||
|
sizeof(struct GNUNET_HashCode));
|
||||||
|
}
|
||||||
|
|
||||||
GNUNET_CRYPTO_hash_context_finish (hash_context,
|
GNUNET_CRYPTO_hash_context_finish (hash_context,
|
||||||
&ks.hc);
|
&ks.hc);
|
||||||
hash_context = NULL;
|
hash_context = NULL;
|
||||||
|
@ -355,6 +355,7 @@ TALER_EXCHANGE_refresh_prepare (
|
|||||||
struct MeltData md;
|
struct MeltData md;
|
||||||
json_t *ret;
|
json_t *ret;
|
||||||
struct TALER_Amount total;
|
struct TALER_Amount total;
|
||||||
|
struct TALER_AgeCommitmentHash ach = {0};
|
||||||
struct TALER_CoinSpendPublicKeyP coin_pub;
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
||||||
struct TALER_TransferSecretP trans_sec[TALER_CNC_KAPPA];
|
struct TALER_TransferSecretP trans_sec[TALER_CNC_KAPPA];
|
||||||
struct TALER_RefreshCommitmentEntry rce[TALER_CNC_KAPPA];
|
struct TALER_RefreshCommitmentEntry rce[TALER_CNC_KAPPA];
|
||||||
@ -372,6 +373,7 @@ TALER_EXCHANGE_refresh_prepare (
|
|||||||
md.melted_coin.original_value = melt_pk->value;
|
md.melted_coin.original_value = melt_pk->value;
|
||||||
md.melted_coin.expire_deposit
|
md.melted_coin.expire_deposit
|
||||||
= melt_pk->expire_deposit;
|
= melt_pk->expire_deposit;
|
||||||
|
md.melted_coin.h_age_commitment = ach;
|
||||||
TALER_age_commitment_hash (age_commitment,
|
TALER_age_commitment_hash (age_commitment,
|
||||||
&md.melted_coin.h_age_commitment);
|
&md.melted_coin.h_age_commitment);
|
||||||
|
|
||||||
|
@ -470,6 +470,8 @@ withdraw_run (void *cls,
|
|||||||
ac));
|
ac));
|
||||||
|
|
||||||
ws->age_commitment = ac;
|
ws->age_commitment = ac;
|
||||||
|
ws->h_age_commitment = GNUNET_malloc (sizeof(struct
|
||||||
|
TALER_AgeCommitmentHash));
|
||||||
TALER_age_commitment_hash (
|
TALER_age_commitment_hash (
|
||||||
ac,
|
ac,
|
||||||
ws->h_age_commitment);
|
ws->h_age_commitment);
|
||||||
|
Loading…
Reference in New Issue
Block a user