Christian Grothoff
56efe31c40
Merge branch 'master' of ssh://taler.net:/var/git/exchange
2016-10-07 02:52:39 +02:00
Christian Grothoff
f5a2134da8
move taler-auditor-sign tool to auditor/ direcotory
2016-10-06 16:38:42 +02:00
Christian Grothoff
26478f0f1f
fix having multiple primary keys
2016-10-06 16:33:07 +02:00
Christian Grothoff
0394080600
first draft for an auditor table structure
2016-10-06 16:30:19 +02:00
Christian Grothoff
b68adb93c6
adding skeleton code for auditor
2016-10-06 15:17:10 +02:00
Marcello Stanisci
a42155d552
Adding struct to be signed over related to #4702
2016-10-03 14:08:14 +02:00
Marcello Stanisci
9cea8197b5
defining merchant's signature for successful payments
2016-10-03 10:32:17 +02:00
Christian Grothoff
f1a71f180c
mint->exchange leftovers
2016-09-30 23:19:18 +02:00
Marcello Stanisci
f00a49e40c
fixing aggregator hanging after bank's error
2016-09-30 13:47:46 +02:00
Christian Grothoff
e72a7188ac
-stylistic improvement: use numbers for counters instead of GNUNET_OK, etc.
2016-09-29 16:30:57 +02:00
Marcello Stanisci
6082645d12
removing garbage from config file (made testcase fail)
2016-09-28 20:39:37 +02:00
Marcello Stanisci
81148fb6df
typo
2016-09-28 20:32:34 +02:00
Marcello Stanisci
0b8081fe22
Adding receiver in TALER_ContractPS ( #4651 )
2016-09-26 16:55:10 +02:00
Christian Grothoff
77f11bcfac
include execution time in signed message for /track/transfer ( #4578 )
2016-09-26 15:08:00 +02:00
Christian Grothoff
df8c011b95
return execution time also from exchange C API ( #4578 )
2016-09-26 14:58:44 +02:00
Christian Grothoff
302a08b701
implement that /track/transaction returns execution time ( #4578 )
2016-09-26 14:50:49 +02:00
Christian Grothoff
265fc74b65
check return values, fix use of uninit memory on certain error handling paths
2016-09-23 16:52:13 +02:00
Christian Grothoff
f43bac5894
fix #4673
2016-09-23 15:56:44 +02:00
Christian Grothoff
7234e063a7
Merge branch 'master' of git+ssh://git.taler.net/var/git/exchange
2016-09-23 14:07:12 +02:00
Christian Grothoff
dc4cbbc060
reduce log level
2016-09-23 14:07:08 +02:00
Marcello Stanisci
64b7126234
strtol -> strtoll, which made the anchor (see signkey generation algorithm)
...
always point to the 70s, so new signkeys were always generated
2016-09-20 14:30:38 +02:00
Marcello Stanisci
b3c4803c55
renaming local variable
2016-09-20 13:11:39 +02:00
Marcello Stanisci
54862377d6
fixing taler.conf.5
2016-09-19 15:06:30 +02:00
Jeff Burdges
937d7f48b9
Start making the protocol more explicit
2016-09-12 15:53:20 +02:00
Jeff Burdges
b1ec11e492
Mention extortion in first paragraph and refunds with refresh
2016-09-12 14:37:34 +02:00
Jeff Burdges
7409a6d1b9
Mention refresh protocol in abstract
2016-09-12 14:36:38 +02:00
Florian Dold
1078a42847
Regenerate keys before withdraw period is over.
...
Before, we only would create new denomination keys when
the spending period is over.
2016-09-07 17:41:07 +02:00
Christian Grothoff
5a6a3da8e4
updating DB schema to profit from new KDF-based refresh variant
2016-08-11 23:28:33 +02:00
Christian Grothoff
dd724c009d
finished implementing session-hash based reveal checking
2016-08-11 22:43:26 +02:00
Christian Grothoff
bcd5a51a7e
Merge branch 'master' of git+ssh://taler.net/var/git/exchange
2016-08-11 22:19:14 +02:00
Christian Grothoff
0bfc7bcbf9
re-compute refresh session hash in reveal step
2016-08-11 22:19:12 +02:00
Jeff Burdges
3115c6acc6
Kinda seems to work
2016-08-11 22:18:04 +02:00
Jeff Burdges
1f39f7e92b
This might fix the compile error
2016-08-11 21:28:48 +02:00
Christian Grothoff
cc20319a1a
fix minor issues introduced in last reformulation of refresh
2016-08-10 01:01:21 +02:00
Jeff Burdges
bbeef4560d
Switch to X for exchanges
2016-08-09 00:48:08 +02:00
Jeff Burdges
1a2ecef44b
%s/K_i/L_i/g
2016-08-09 00:37:14 +02:00
Jeff Burdges
0155774136
Notational cleanups
2016-08-09 00:35:33 +02:00
Jeff Burdges
eb28eaf320
Update taler.tex to refresh protocol with new coin derivation
...
I made usages of the FDH explicit too, but did not realyl explain it.
2016-08-08 14:57:34 +02:00
Jeff Burdges
cdcd67a27d
Use KDF better
...
We now send the secret_seed to the skm variable, while sending the
counter salt to the xts variable. I have not check this with
http://eprint.iacr.org/2010/264 but it seems correct.
Indeed rsa_blinding_key_derive places the strong source of
randomness in skm too, and uses a constant string for xts.
2016-08-08 12:43:59 +02:00
Jeff Burdges
7958464696
Copy bit twiddling from libgcrypt/cipher/ecc.c
...
Reversed order buisness agrees with KC's experence from gnunet-rs
2016-08-08 10:38:07 +02:00
Christian Grothoff
0fd6cf19af
mostly working migration of the DH-seeded refresh variant
2016-08-07 23:21:49 +02:00
Christian Grothoff
745719dbc1
first half of changing refresh protocol to derive all key data from DH
2016-08-05 16:08:19 +02:00
Christian Grothoff
e800772c85
Merge branch 'master' of git+ssh://git.taler.net/var/git/exchange
2016-07-13 16:02:13 +02:00
Christian Grothoff
0973bca1e4
-be explicit about transaction mode
2016-07-13 16:02:08 +02:00
Marcello Stanisci
59c6856284
fixing #4594
2016-07-07 17:55:25 +02:00
Christian Grothoff
5b86e59eac
authors
2016-07-03 12:20:41 +02:00
Christian Grothoff
c5ed59aca2
cutting down to 16 pages main content
2016-07-03 12:13:18 +02:00
Christian Grothoff
fec688d8bf
introduce AML
2016-07-03 12:01:39 +02:00
Christian Grothoff
855b78f837
fix #4591
2016-06-26 13:44:22 +02:00
Christian Grothoff
9035b9d324
-distfix
2016-06-20 17:45:02 +02:00