summaryrefslogtreecommitdiff
path: root/core
diff options
context:
space:
mode:
Diffstat (limited to 'core')
-rw-r--r--core/api-exchange.rst206
1 files changed, 0 insertions, 206 deletions
diff --git a/core/api-exchange.rst b/core/api-exchange.rst
index eb5eb1fb..0d4fff4e 100644
--- a/core/api-exchange.rst
+++ b/core/api-exchange.rst
@@ -1345,209 +1345,3 @@ Refunds
// which signing key was used.
pub: EddsaPublicKey;
}
-
-
-------------
-The Test API
-------------
-
-The test API is not there to test the exchange, but to allow
-clients of the exchange (merchant and wallet implementations)
-to test if their implemenation of the cryptography is
-binary-compatible with the implementation of the exchange.
-
-.. http:POST:: /test/base32
-
- Test hashing and Crockford :ref:`base32` encoding.
-
- **Request:**
-
- .. ts:def:: TestBase32Request
-
- interface TestBase32Request {
- // some base32-encoded value
- input: Base32;
- }
-
- **Response:**
-
- .. code-block:: tsref
-
- {
- // the base32_-encoded hash of the input value
- output: Base32;
- }
-
-.. http:POST:: /test/encrypt
-
- Test symmetric encryption.
-
- **Request:**
-
- .. code-block:: tsref
-
- {
- // Some `base32`-encoded value
- input: Base32;
-
- // some `base32`-encoded hash that is used to derive the symmetric key and
- // initialization vector for the encryption using the HKDF with "skey" and
- // "iv" as the salt.
- key_hash: Base32;
- }
-
- **Response:**
-
-
- .. code-block:: tsref
-
- {
- // the encrypted value
- output: Base32;
- }
-
-.. http:POST:: /test/hkdf
-
- Test Hash Key Deriviation Function.
-
- **Request:**
-
-
- .. code-block:: tsref
-
- {
- // Some `base32`-encoded value
- input: Base32;
- }
-
- **Response:**
-
-
- .. code-block:: tsref
-
- {
- // the HKDF of the input using "salty" as salt
- output: Base32;
- }
-
-.. http:POST:: /test/ecdhe
-
- Test ECDHE.
-
- **Request:**
-
- .. code-block:: tsref
-
- {
- ecdhe_pub: EcdhePublicKey;
- ecdhe_priv: EcdhePrivateKey;
- }
-
- **Response:**
-
- .. code-block:: tsref
-
- {
- // ECDH result from the two keys
- ecdhe_hash: HashCode;
- }
-
-
-.. http:POST:: /test/eddsa
-
- Test EdDSA.
-
- **Request:**
-
- .. code-block:: tsref
-
- {
- eddsa_pub: EddsaPublicKey;
-
- // EdDSA signature using purpose TALER_SIGNATURE_CLIENT_TEST_EDDSA. Note:
- // the signed payload must be empty, we sign just the purpose here.
- eddsa_sig: EddsaSignature;
- }
-
- **Response:**
-
- :status 200: the signature was valid
- :status 401 Unauthorized: the signature was invalid
-
- The exchange responds with another valid signature, which gives the
- client the opportunity to test its signature verification implementation.
-
- .. code-block:: tsref
-
- {
- // Another EdDSA public key
- eddsa_pub: EddsaPublicKey;
-
- // EdDSA signature using purpose TALER_SIGNATURE_EXCHANGE_TEST_EDDSA
- eddsa_sig: EddsaSignature;
- }
-
-
-.. http:GET:: /test/rsa/get
-
- Obtain the RSA public key used for signing in /test/rsa/sign.
-
- **Response:**
-
- .. code-block:: tsref
-
- {
- // The RSA public key the client should use when blinding a value for the /test/rsa/sign API.
- rsa_pub: RsaPublicKey;
- }
-
-.. http:POST:: /test/rsa/sign
-
- Test RSA blind signatures.
-
- **Request:**
-
- .. code-block:: tsref
-
- {
- // Blinded value to sign.
- blind_ev: BlindedRsaSignature;
- }
-
- **Response:**
-
-
- .. code-block:: tsref
-
- {
- // Blind RSA signature over the ``blind_ev`` using the private key
- // corresponding to the RSA public key returned by /test/rsa/get.
- rsa_blind_sig: BlindedRsaSignature;
- }
-
-.. http:POST:: /test/transfer
-
- Test Transfer decryption.
-
- **Request:**
-
- .. code-block:: tsref
-
- {
- // Private transfer key
- trans_priv: string;
-
- // `Coin public key._
- coin_pub: EddsaPublicKey;
- }
-
- **Response:**
-
- :status 200: the operation succeeded
-
- .. code-block:: tsref
-
- {
- // Decrypted transfer secret
- secret: string;
- }