Christian Grothoff
fb9ba5b1d2
-rename fest
2022-02-07 12:33:35 +01:00
Christian Grothoff
d850ed9ca1
-fix test_crypto
2022-02-07 11:23:53 +01:00
Christian Grothoff
2164c36f0f
got testing_api_cmd_refresh to compile
2022-02-07 10:09:12 +01:00
Christian Grothoff
62d8368b1b
-fix more FTBFS issues
2022-02-06 19:53:23 +01:00
Christian Grothoff
66abbcac3f
-fix more FTBFS issues
2022-02-06 19:44:05 +01:00
Christian Grothoff
f173296c3c
-fix refresh FTBFS
2022-02-06 18:39:28 +01:00
Gian Demarmels
9fc3b7a278
Merge branch 'master' of ssh://git.taler.net/exchange
2022-02-05 23:12:31 +01:00
Gian Demarmels
b280b1db04
fix src/util
2022-02-05 23:12:21 +01:00
Lucien Heuzeveldt
251f2b5987
implement csr max request elements
2022-02-05 22:46:36 +01:00
Gian Demarmels
c42376cf40
crypto implementation
2022-02-05 00:32:53 +01:00
Christian Grothoff
ed136c1f2d
sync
2022-02-04 20:02:16 +01:00
Christian Grothoff
03fd154a69
messing with CS/RSA fixes
2022-02-04 19:30:15 +01:00
Gian Demarmels
086cf05794
refactor TALER_coin_ev_hash
2022-02-04 15:37:34 +01:00
Gian Demarmels
2213012866
include denom_pub into coin_ev_hash
2022-02-04 15:37:34 +01:00
Gian Demarmels
be50c084f8
fixed nonce check, renamed WithdrawNonce
2022-02-04 15:37:33 +01:00
Gian Demarmels
bcc159de17
introduce new type for security module pubkeys
2022-02-04 15:37:32 +01:00
Lucien Heuzeveldt
8d85c8b5b6
implement feedback
2022-02-04 15:37:30 +01:00
Gian Demarmels
5b7e8f9ac5
refactoring
2022-02-04 15:36:11 +01:00
Gian Demarmels
9c2aefaa51
removed varargs
2022-02-04 15:36:08 +01:00
Gian Demarmels
2d70c8c6d0
secmod CS sign implementation
2022-02-04 15:34:21 +01:00
Lucien Heuzeveldt
36f551ff33
set planchet detail cipher, add cipher checks
2022-02-04 15:33:14 +01:00
Lucien Heuzeveldt
106664ed0c
implement TALER_CRYPTO_helper_cs_r_derive and related tests
2022-02-04 15:33:13 +01:00
Gian Demarmels
18db69be2d
initial cs_secmod implementation
2022-02-04 15:33:11 +01:00
Gian Demarmels
f239b01be1
secmod cs signatures implementation
2022-02-04 15:33:11 +01:00
Lucien Heuzeveldt
cf4fd36cc4
remove varargs in cs crypto implementation
2022-02-04 15:33:09 +01:00
Gian Demarmels
4bcbd704df
utility functions
2022-02-04 15:33:09 +01:00
Gian Demarmels
ca247f6f58
fixed CS signatures and cleanup/refactoring
2022-02-04 15:33:09 +01:00
Gian Demarmels
db9b84970d
add sign and verify implementation
2022-02-04 15:31:50 +01:00
Gian Demarmels
5d2157a8f6
sign_blinded implementation
2022-02-04 15:31:49 +01:00
Gian Demarmels
f1ec1e70a0
implemented planchet_prepare for CS
2022-02-04 15:31:49 +01:00
Gian Demarmels
a02ab8f81b
added CS get R functionality and planchet setup
2022-02-04 15:31:48 +01:00
Gian Demarmels
385eb51e93
CS planchet create and withdraw create
2022-02-04 15:31:48 +01:00
Gian Demarmels
f3fb7c29e6
added CS data structures, implemented CS keypair
2022-02-04 15:31:45 +01:00
0b56de6c99
[age restriction] progress 12/n
...
- taler-offline-tool now handles extensions
- command "extensions" added with subcommands "show" and "sign"
- parses extensions from taler config
- shows and signs of extensions and their configurations
- creates signed set of configurations for upload
- added test for retrieval of extension config
- simplified signature verification for extensions
- remove per-extension signatures, also from DB schema
- adjust prepared statements accordingly
- adjust DB event handler for extensions
- allow NULL for config for extension in DB schema
- handler for /management/extensions adjusted to new datastructures
- changed test for TALER_denom_blind/TALER_denom_sign_blinded with and
without TALER_AgeHash
- minor updates and various fixes
2022-01-21 15:41:02 +01:00
Christian Grothoff
e7aeec04f4
The current recoup API is broken. I guess this is another example where "trivial" API changes turn out to have (multiple!) unexpected consequences.
...
The current "/recoup" API does not have clear idempotency semantics, as we've discussed on the phone. This is already bad by itself, as it makes it hard to write down what the API does other than "whatever the implementation does".
However, it actually breaks correctness in this (admittedly kinda contrived, but not impossible) case:
Say that we have a coin A obtained via withdrawal and a coin B obtained via refreshing coin A. Now the denominations of A gets revoked..
The wallet does a recoup of A for EUR:1.
Now the denomination of B also gets revoked. The wallet recoups B (incidentally also for EUR:1) and now A can be recouped again for EUR:1. But now the exchange is in a state where it will refuse a legitimate recoup request for A because the detection for an idempotent request kicks in.
This is IMHO bad API design, and the exchange should simply always recoup the maximum amount.
Furthermore, we usually follow the principle of "API calls that take up DB space are paid". With the current recoup API, I can do many tiny recoup requests which the exchange then has to store, right?
I guess it would not be a big change to remove the "amount" value from the recoup/recoup-refresh request bodies, right?
- Florian
2022-01-11 12:47:35 +01:00
cc7d7707ab
[age restriction] progress 10/n
...
More work towards support for extensions:
- Prepared statements and DB-plugin-functions for setting and retrieving
configurations from the database added.
- primitive "registry" of extensions for age restrictions and peer2peer
(stub)
- TALER_Extensions now with FP for parsing, setting and converting a
configuration.
- /management/extensions handler now verifies signature of the (opaque)
json object for all extensions.
- /management/extensions handler calls the FP in the corrensponding
TALER_Extension for parsing and setting the configuration of a
particular extension
More work towards age restriction:
- TALER_Extensions interfaces for config-parser, -setter and converter
implemented for age restriction
- DB event handler now retrieves config from database, parses it and
sets it (the age mask) in the global extension.
- load_age_mask now loads age mask from the global extension (and not
from the config file)
- add age_restricted_denoms to /keys response
2022-01-08 14:40:20 +01:00
ef4238874f
[age restriction] progress 9/n
...
More worke towards support for extensions and age restriction:
- taler-exchange-httpd_management_extensions.c almost completed
- handling of request implemented
- stub "set_extensions" for database transaction added
- utility functions added
- TALER_exchange_offline_extension_agemask_{sign,verify}
- TALER_agemask_parse_json
2021-12-27 23:24:48 +01:00
Christian Grothoff
f6ecb6c895
-eliminate redundant hash operation on link signatures
2021-12-25 15:39:01 +01:00
Christian Grothoff
84c9adf5a6
v12: also do not sign over merchant_pub in REFUND signature, centralize logic
2021-12-25 14:58:04 +01:00
Christian Grothoff
87376e02eb
protocol v12 changes (/recoup split, signature changes) plus database sharding plus O(n^2)=>O(n) worst-case complexity reduction on coin balance checks
2021-12-25 13:56:40 +01:00
Christian Grothoff
2c14d33870
deduplicate melt signing logic, remove coin_pub from data being signed over
2021-12-25 13:56:40 +01:00
Christian Grothoff
527d903678
add new wrappers around merchant hash codes for tips and pickups
2021-12-19 11:54:07 +01:00
Christian Grothoff
1acc851deb
-fix recoup ugliness
2021-12-16 20:18:44 +01:00
Christian Grothoff
1a1fafbd43
introducing GNUNET_TIME_Timestamp, recoup now with amounts
2021-12-14 16:04:40 +01:00
54c62f3ab9
[age restriction] progress 6/n
...
lift logic for detection of age restriction of a denomination out from
taler-exchange-secmod-rsa.c to taler-exchange_httpd_keys.c
2021-12-01 15:25:33 +01:00
97bae4dd65
[age restriction] progress 5/n
...
- taler-exchange-secmod-rsa
- extracts AGE_RESTRICTED per denomination from config
- propagates flag for each denomination to server
- if age restriction is set for a denomination,
age _mask_ is taken (for now!) from config
2021-11-28 18:51:25 +01:00
Christian Grothoff
b61f601028
-use different hash for RSA vs. Denomination hashing
2021-11-17 23:02:05 +01:00
591cefd315
[age restriction] progress 3/n
...
- remove redundant struct members for age commitment hash
- undo pre-mature implementation in taler-exchange-secmod-rsa.c
- carry through age restriction parameter for TALER_denom_blind
2021-11-16 14:43:54 +01:00
Christian Grothoff
0325a79631
avoid duplication
2021-11-15 14:39:18 +01:00
c97979d00a
age restriction (load per denomination). 3/n
2021-11-14 16:39:42 +01:00
7c510388b9
age restriction progress 2/n
...
Signed-off-by: Özgür Kesim <oec-taler@kesim.org>
2021-11-10 17:27:49 +01:00
Christian Grothoff
016551dbb4
misc TODOs for KYC left
2021-11-09 20:36:30 +01:00
Christian Grothoff
9d6e104066
include h_extensions in deposit confirmation
2021-11-06 19:43:47 +01:00
Christian Grothoff
8175fdfa0f
introduce TALER_wallet_deposit_verify
2021-11-06 16:52:14 +01:00
Christian Grothoff
f01ab79015
RSA-despecialization
2021-11-06 15:29:10 +01:00
Christian Grothoff
c3e244322b
more crypto refactoring
2021-11-05 23:01:21 +01:00
Christian Grothoff
eaf9d728f5
more crypto refactoring
2021-11-05 22:48:11 +01:00
Christian Grothoff
ba627bf84c
-fixes
2021-11-05 22:22:47 +01:00
Christian Grothoff
ebbc250f8b
-brks
2021-11-05 21:37:46 +01:00
Christian Grothoff
c787e28e84
more denom key refactoring
2021-11-05 14:18:13 +01:00
Christian Grothoff
32da809fd6
abstract denomination keys a bit more
2021-11-05 14:00:10 +01:00
Christian Grothoff
1408e1587b
introduce invalid key type
2021-11-01 23:49:13 +01:00
Christian Grothoff
783d07b476
consistently distinguish blinded/unblinded denomination sigs
2021-10-31 18:12:54 +01:00
Christian Grothoff
3eae999efc
distinguish between blind and non-blind denomination signatures
2021-10-31 17:56:56 +01:00
Christian Grothoff
bc57abc3da
-more dB work
2021-10-30 20:49:23 +02:00
Christian Grothoff
382fb837bd
-work on testing FTBFS
2021-10-27 21:59:04 +02:00
Christian Grothoff
fd615f3e33
-fix exchange FTBFS
2021-10-27 09:23:14 +02:00
Christian Grothoff
74234f75a4
-work on FTBFS
2021-10-27 09:23:13 +02:00
Christian Grothoff
f0951d34dd
-fix more FTBFS
2021-10-27 09:23:13 +02:00
Christian Grothoff
58ea04167c
-fix misc FTBFS
2021-10-27 09:23:13 +02:00
Christian Grothoff
868a4ce76d
-resovling more FTBFS issues
2021-10-27 09:23:12 +02:00
Christian Grothoff
42bdb5aa6e
-fixing more FTBFS
2021-10-27 09:23:11 +02:00
Christian Grothoff
fc371ea18b
start to work on transformation
2021-10-27 09:23:11 +02:00
Christian Grothoff
55632b1fbf
brutally fixing types in src/include/, creating plenty of FTBFS issues
2021-10-27 09:23:11 +02:00
Christian Grothoff
d8922f82e5
-introduce 'struct TALER_WireSalt'
2021-10-09 16:11:04 +02:00
Christian Grothoff
4741f4ea02
implement duplicate reserve_pub detection in fakebank, add test (fails in pybank), for #6863
2021-05-20 12:31:27 +02:00
Christian Grothoff
4384c6ec85
fix misc doxygen issues
2021-04-21 20:28:30 +02:00
Christian Grothoff
ca66a1d1af
fix major bug with SQL statement missing ORDER BY freshcoin_index resulting in possible link failures (but usually lucky with old DB schema)
2021-01-10 00:54:12 +01:00
Christian Grothoff
699916056b
misc doxygen fixes
2020-12-20 17:10:09 +01:00
Christian Grothoff
96b4c139ee
add auditor-enable /-disable commands to taler-exchange-offline tool
2020-12-16 12:56:35 +01:00
Christian Grothoff
70b0839644
implement new taler-auditor-offline tool
2020-12-06 00:05:45 +01:00
Christian Grothoff
e0b62b0a49
towards offline tool uploading /management/keys
2020-12-05 21:33:30 +01:00
Christian Grothoff
8170e1e9ab
move all TALER_SIGNATURE_SM_-operations to secmod_signatures.c
2020-12-05 19:47:54 +01:00
Christian Grothoff
6cceb617af
centralize (most) offline signing/verifying operations into offline_signatures.c
2020-12-04 20:29:18 +01:00
d3b714922f
conditionally use (un)blinding implementation from libgnunetutil
2020-12-04 12:10:09 +01:00
Christian Grothoff
4b2504a3c3
doxygen fixes
2020-11-30 14:16:42 +01:00
Christian Grothoff
1c1d4d9974
cmd to add auditor
2020-11-26 22:49:42 +01:00
Christian Grothoff
77dbb83276
implement exchange online signing key client library
2020-11-23 20:30:10 +01:00
Christian Grothoff
3e37c63fbd
implement sm signing of key announcements
2020-11-23 16:36:07 +01:00
Christian Grothoff
9b68dbb8e6
implementing client library for talking to the crypto helper process
2020-11-21 23:58:00 +01:00
Christian Grothoff
e1fcb2b26c
define claim token
2020-07-27 10:42:41 +02:00
Christian Grothoff
00350bc228
remove c_hash from planchet detail where it does not logically belong
2020-04-12 16:44:28 +02:00
Christian Grothoff
3404fda463
typos
2020-03-31 20:57:11 +02:00
Christian Grothoff
c597af8334
adjust types to match latest GNUnet API
2020-03-17 01:09:16 +01:00
Christian Grothoff
ffcadbff8c
code cleanup (comments, scoping, naming, indentation)
2020-03-07 00:28:07 +01:00
Christian Grothoff
59398cfd76
separate util.c and url.c
2020-01-19 20:33:07 +01:00
Florian Dold
fc8bdb9b97
consistently use payto URI instead of URL
2020-01-19 17:03:19 +01:00
Christian Grothoff
5146d62b14
doxygen
2020-01-18 14:16:40 +01:00
Christian Grothoff
5abe350a05
doxygen
2020-01-18 12:34:17 +01:00
Florian Dold
a358360fb3
remove wallet-specific code
2020-01-16 13:48:35 +01:00
Christian Grothoff
4d6ef1da29
eliminate libtalerwire
2020-01-13 18:16:01 +01:00
Christian Grothoff
385b3e77df
tighten formatting rules
2019-10-31 12:59:50 +01:00
Florian Dold
eb55997084
re-format code
2019-08-25 16:18:24 +02:00
Christian Grothoff
ad34305942
expose blinding key in refresh-reveal API in preparation for #5777
2019-07-21 12:20:45 +02:00
Christian Grothoff
4785bcb4bb
towards #5777 , adding todos/notes
2019-07-15 22:01:06 +02:00
Christian Grothoff
de9fdf860a
replace denom_pub with denom_pub_hash in exchange API to reduce bandwidth
2019-05-02 21:16:51 +02:00
Christian Grothoff
a56e2e34bc
fix #5434 (no more salt in exchange wire replies)
2018-10-06 15:05:06 +02:00
Christian Grothoff
cb55c1a3af
Changing configuration structure to enable multiple accounts.
...
This change enables using multiple wire plugins at the same time.
Also, we now distinguish between the wire plugin (i.e. EBICS or
taler_bank) and the wire method (i.e. SEPA or x-taler-bank) that
the wire plugin is implementing. The "taler-bank" wire method
was renamed from "test" to "x-taler-bank".
This also changes the format of the /wire response of the exchange,
as we now need to return multiple accounts. Note that wire fees
are specified per wire method, not per wire account.
taler-exchange-keyup now automatically signs all of the /wire
responses in the location specified by the configuration.
Account identification in wire plugins was changed to use
payto://-URLs instead of method-specific JSON fields. Signing
and validation of /wire responses was moved from each wire
plugin to a generic validation method in libtalerutil (crypto)
or libtalerjson (for JSON-formatted inputs).
Convenience methods were added to generate JSON for wire accounts
(salting, signing).
Various section and option names were adjusted to streamline the
configuration and make it more consistent overall. Documentation
was updated as well.
2018-04-02 14:29:44 +02:00
Christian Grothoff
499247a480
fixing #5178
2017-11-29 20:23:08 +01:00
Christian Grothoff
2f2930f1ba
major API refactoring, adding planchet generation and coin extraction APIs to the Taler crypto library, thereby simplifying code in withdraw, refresh, tipping, payback and testcases; slight API incompatibilities to previous versions are introduced
2017-10-31 14:02:54 +01:00
Christian Grothoff
ec8146de92
rename: TALER_setup_planchet -> TALER_planchet_setup_refresh
2017-10-31 12:44:17 +01:00
Christian Grothoff
a491a4709a
rename: TALER_FreshCoinP -> TALER_PlanchetSecretsP, and TALER_setup_fresh_coin -> TALER_setup_planchet
2017-10-31 12:38:14 +01:00
Christian Grothoff
1e30d60a25
fixing misc doxygen issues
2017-06-04 11:30:43 +02:00
Florian Dold
85350ced32
rename proposal_data to contract_terms (see #4879 )
2017-05-29 01:15:41 +02:00
Christian Grothoff
487237381d
fix misc doxygen issues
2017-04-20 07:49:56 +02:00
Florian Dold
92246c3e88
remove transaction_id, only one payment per proposal allowed
2017-02-07 15:09:10 +01:00
Florian Dold
8c820b6916
contract terminology renaming ( #4877 )
2017-02-06 15:43:06 +01:00
Christian Grothoff
0fd6cf19af
mostly working migration of the DH-seeded refresh variant
2016-08-07 23:21:49 +02:00
Christian Grothoff
745719dbc1
first half of changing refresh protocol to derive all key data from DH
2016-08-05 16:08:19 +02:00
Marcello Stanisci
59c6856284
fixing #4594
2016-07-07 17:55:25 +02:00
Christian Grothoff
bb511560fe
move TALER_TrackTransferDetails to taler_crypto_lib.h as it is not exchange-specific
2016-06-09 21:03:07 +02:00
Christian Grothoff
32bb3b14bf
fix #4483
2016-05-24 20:13:31 +02:00
Christian Grothoff
763c8ab512
rename GNUNET_CRYPTO_rsa_BlindingKey to GNUNET_CRYPTO_RsaBlindingKey following GNUnet API change
2016-05-19 15:11:05 +02:00
Christian Grothoff
3cb188e8a7
rename to match GNUnet symbol change
2016-03-21 14:40:57 +01:00
Christian Grothoff
b5cba32510
renaming mint->exchange
2016-03-01 15:35:04 +01:00
Christian Grothoff
8f071e2200
adding aggregation_tracking table to postgres plugin
2016-01-21 08:44:45 +01:00
Christian Grothoff
d291788976
spelling out what information mint should sign for TALER_SIGNATURE_MINT_CONFIRM_WIRE
2016-01-20 18:03:44 +01:00
Christian Grothoff
80f6c4240e
-fix (C) notices
2016-01-19 14:39:00 +01:00
Christian Grothoff
c1f28638c9
working on #3888
2016-01-17 18:19:09 +01:00
Florian Dold
24bfedf04e
Merge branch 'master' of ssh://taler.net/var/git/mint
2015-12-22 11:26:10 +01:00
Christian Grothoff
c20f955ae4
towards /deposit/wtid handling (more skeleton work)
2015-12-09 15:36:34 +01:00
Florian Dold
57affb94fe
Fix wrong comment
2015-11-24 14:42:01 +01:00
Christian Grothoff
a8755be2b7
implement auditor signing tool
2015-09-16 19:18:48 +02:00
Christian Grothoff
c6f88ebd61
doxygen-fixes
2015-08-09 15:40:16 +02:00
Christian Grothoff
00d613728f
completing TALER_MINT_refresh_melt implementation
2015-08-08 19:52:05 +02:00
Christian Grothoff
beceb3bc16
implementing #3905
2015-07-20 10:34:32 +02:00
Christian Grothoff
3eddd802dc
-fix ftbfs in wallet-only mode
2015-07-15 11:40:51 +02:00
Christian Grothoff
5740506b24
refactoring mint API, mostly done (compiles again, /keys might even work)
2015-06-17 18:50:09 +02:00
Christian Grothoff
21da34a501
-fix doxygen errors
2015-05-16 18:26:34 +02:00
Christian Grothoff
f4a59d1ccc
eliminating ECDSA, replacing with EdDSA-ECDHE-combo in transfer protocol
2015-05-16 14:15:34 +02:00
Christian Grothoff
da9ab66d2e
simplify PG logic by having libtalerpq handle RSA signature/key encoding
2015-05-06 17:05:24 +02:00
Christian Grothoff
e226e5c350
implementing TALER_refresh_link_encrypted_encode, and adding test
2015-04-18 13:08:19 +02:00
Christian Grothoff
0a0feeea86
finish #3777 including testing
2015-04-15 18:34:14 +02:00
Christian Grothoff
97e403bb66
moving core refresh crypto logic to util -- towards fixing #3777
2015-04-15 18:12:21 +02:00
Christian Grothoff
2f6a4bb11c
rename TALER_RefreshLinkDecryptedP to TALER_RefreshLinkDecrypted as it contains a pointer and is thus not (P)acked
2015-04-13 18:42:39 +02:00
Christian Grothoff
5827630699
starting with tests for libtalerutil
2015-04-13 17:20:46 +02:00
Christian Grothoff
dd63d2f846
fix type of transfer keys
2015-04-10 22:18:50 +02:00
Christian Grothoff
708b463580
more doxygen fixes
2015-03-28 15:53:53 +01:00
Christian Grothoff
eca4f1a8fe
-doxygen fixes
2015-03-28 15:42:07 +01:00
Christian Grothoff
891018f69f
minor renaming of signature values and improved documentation of signatures, also adding a few missing fields to signatures to address #3631
2015-03-28 14:22:21 +01:00