summaryrefslogtreecommitdiff
path: root/src/mint-tools/taler-auditor-sign.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2015-09-19 16:34:27 +0200
committerChristian Grothoff <christian@grothoff.org>2015-09-19 16:34:27 +0200
commit37a84c5af7b466bef1d4ca4b18999e8b6ef590f2 (patch)
tree2b71b3b6f6371decf90065bb744c49f61582882d /src/mint-tools/taler-auditor-sign.c
parent00b697c405d3d1dfae102eb1223cb07509f680a9 (diff)
downloadexchange-37a84c5af7b466bef1d4ca4b18999e8b6ef590f2.tar.gz
exchange-37a84c5af7b466bef1d4ca4b18999e8b6ef590f2.tar.bz2
exchange-37a84c5af7b466bef1d4ca4b18999e8b6ef590f2.zip
finish implementing #3847
Diffstat (limited to 'src/mint-tools/taler-auditor-sign.c')
-rw-r--r--src/mint-tools/taler-auditor-sign.c82
1 files changed, 51 insertions, 31 deletions
diff --git a/src/mint-tools/taler-auditor-sign.c b/src/mint-tools/taler-auditor-sign.c
index 8d180790f..bd37e68de 100644
--- a/src/mint-tools/taler-auditor-sign.c
+++ b/src/mint-tools/taler-auditor-sign.c
@@ -50,11 +50,6 @@ static char *mint_request_file;
static char *output_file;
/**
- * Handle to the auditor's configuration
- */
-static struct GNUNET_CONFIGURATION_Handle *kcfg;
-
-/**
* Master public key of the mint.
*/
static struct TALER_MasterPublicKeyP master_public_key;
@@ -101,16 +96,16 @@ print_dk (const struct TALER_DenominationKeyValidityPS *dk)
fprintf (stdout,
"Validity start time: %s\n",
- GNUNET_TIME_absolute_to_string (GNUNET_TIME_absolute_ntoh (dk->start)));
+ GNUNET_STRINGS_absolute_time_to_string (GNUNET_TIME_absolute_ntoh (dk->start)));
fprintf (stdout,
"Withdraw end time: %s\n",
- GNUNET_TIME_absolute_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_withdraw)));
+ GNUNET_STRINGS_absolute_time_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_withdraw)));
fprintf (stdout,
"Deposit end time: %s\n",
- GNUNET_TIME_absolute_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_spend)));
+ GNUNET_STRINGS_absolute_time_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_spend)));
fprintf (stdout,
"Legal dispute end time: %s\n",
- GNUNET_TIME_absolute_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_legal)));
+ GNUNET_STRINGS_absolute_time_to_string (GNUNET_TIME_absolute_ntoh (dk->expire_legal)));
fprintf (stdout,
"\n");
@@ -150,12 +145,12 @@ main (int argc,
GNUNET_GETOPT_OPTION_END
};
struct GNUNET_CRYPTO_EddsaPrivateKey *eddsa_priv;
- struct TALER_AuditorSignatureP sig;
+ struct TALER_AuditorSignatureP *sigs;
struct TALER_AuditorPublicKeyP apub;
struct GNUNET_DISK_FileHandle *fh;
struct TALER_DenominationKeyValidityPS *dks;
unsigned int dks_len;
- struct TALER_MintKeyValidityPS *ap;
+ struct TALER_MintKeyValidityPS kv;
off_t in_size;
unsigned int i;
@@ -187,6 +182,7 @@ main (int argc,
{
fprintf (stderr,
"Mint public key not given\n");
+ GNUNET_free (eddsa_priv);
return 1;
}
if (GNUNET_OK !=
@@ -198,12 +194,14 @@ main (int argc,
fprintf (stderr,
"Public key `%s' malformed\n",
mint_public_key);
+ GNUNET_free (eddsa_priv);
return 1;
}
if (NULL == mint_request_file)
{
fprintf (stderr,
"Mint signing request not given\n");
+ GNUNET_free (eddsa_priv);
return 1;
}
fh = GNUNET_DISK_file_open (mint_request_file,
@@ -215,6 +213,7 @@ main (int argc,
"Failed to open file `%s': %s\n",
mint_request_file,
STRERROR (errno));
+ GNUNET_free (eddsa_priv);
return 1;
}
if (GNUNET_OK !=
@@ -226,6 +225,7 @@ main (int argc,
mint_request_file,
STRERROR (errno));
GNUNET_DISK_file_close (fh);
+ GNUNET_free (eddsa_priv);
return 1;
}
if (0 != (in_size % sizeof (struct TALER_DenominationKeyValidityPS)))
@@ -234,16 +234,17 @@ main (int argc,
"Input file size of file `%s' is invalid\n",
mint_request_file);
GNUNET_DISK_file_close (fh);
+ GNUNET_free (eddsa_priv);
return 1;
}
dks_len = in_size / sizeof (struct TALER_DenominationKeyValidityPS);
- ap = GNUNET_malloc (sizeof (struct TALER_MintKeyValidityPS) +
- in_size);
- ap.purpose.purpose = htonl (TALER_SIGNATURE_AUDITOR_MINT_KEYS);
- ap.purpose.size = htonl (sizeof (struct TALER_MintKeyValidityPS) +
- in_size);
- ap.master = master_public_key;
- dks = (struct TALER_DenominationKeyValidityPS *) &ap[1];
+ kv.purpose.purpose = htonl (TALER_SIGNATURE_AUDITOR_MINT_KEYS);
+ kv.purpose.size = htonl (sizeof (struct TALER_MintKeyValidityPS));
+ kv.master = master_public_key;
+ dks = GNUNET_new_array (dks_len,
+ struct TALER_DenominationKeyValidityPS);
+ sigs = GNUNET_new_array (dks_len,
+ struct TALER_AuditorSignatureP);
if (in_size !=
GNUNET_DISK_file_read (fh,
dks,
@@ -254,34 +255,51 @@ main (int argc,
mint_request_file,
STRERROR (errno));
GNUNET_DISK_file_close (fh);
- GNUNET_free (ap);
+ GNUNET_free (sigs);
+ GNUNET_free (dks);
+ GNUNET_free (eddsa_priv);
return 1;
}
GNUNET_DISK_file_close (fh);
- if (verbose)
+ for (i=0;i<dks_len;i++)
{
- for (i=0;i<dks_len;i++)
- print_dk (&dks[i]);
+ struct TALER_DenominationKeyValidityPS *dk = &dks[i];
+
+ if (verbose)
+ print_dk (dk);
+ kv.start = dk->start;
+ kv.expire_withdraw = dk->expire_withdraw;
+ kv.expire_spend = dk->expire_spend;
+ kv.expire_legal = dk->expire_legal;
+ kv.value = dk->value;
+ kv.fee_withdraw = dk->fee_withdraw;
+ kv.fee_deposit = dk->fee_deposit;
+ kv.fee_refresh = dk->fee_refresh;
+ kv.denom_hash = dk->denom_hash;
+
+ /* Finally sign ... */
+ GNUNET_CRYPTO_eddsa_sign (eddsa_priv,
+ &kv.purpose,
+ &sigs[i].eddsa_sig);
+
+
}
if (NULL == output_file)
{
fprintf (stderr,
"Output file not given\n");
- GNUNET_free (ap);
+ GNUNET_free (dks);
+ GNUNET_free (sigs);
+ GNUNET_free (eddsa_priv);
return 1;
}
- /* Finally sign ... */
- GNUNET_CRYPTO_eddsa_sign (eddsa_priv,
- &ap->purpose,
- &sig.eddsa_sig);
-
/* write result to disk */
if (GNUNET_OK !=
TALER_MINTDB_auditor_write (output_file,
&apub,
- &sig,
+ sigs,
&master_public_key,
dks_len,
dks))
@@ -290,10 +308,12 @@ main (int argc,
"Failed to write to file `%s': %s\n",
output_file,
STRERROR (errno));
- GNUNET_free (ap);
+ GNUNET_free (sigs);
+ GNUNET_free (dks);
return 1;
}
- GNUNET_free (ap);
+ GNUNET_free (sigs);
+ GNUNET_free (dks);
GNUNET_free (eddsa_priv);
return 0;
}