From 968e4aa68f4185d24466bb3ba8bfaba8d9c27ef1 Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Fri, 13 Mar 2015 09:49:47 +0100 Subject: slightly better error generation on /refresh/reveal errors --- src/mint/taler-mint-httpd_responses.h | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) (limited to 'src/mint/taler-mint-httpd_responses.h') diff --git a/src/mint/taler-mint-httpd_responses.h b/src/mint/taler-mint-httpd_responses.h index 7d0824c88..d42aa29b6 100644 --- a/src/mint/taler-mint-httpd_responses.h +++ b/src/mint/taler-mint-httpd_responses.h @@ -297,6 +297,30 @@ TALER_MINT_reply_refresh_reveal_success (struct MHD_Connection *connection, struct GNUNET_CRYPTO_rsa_Signature **sigs); +/** + * Send a response for a failed "/refresh/reveal", where the + * revealed value(s) do not match the original commitment. + * + * FIXME: should also include the client's signature over + * the original reveal operation and the data that was signed + * over eventually... (#3712) + * + * @param connection the connection to send the response to + * @param off offset in the array of kappa-commitments where + * the missmatch was detected + * @param j index of the coin for which the missmatch was + * detected + * @param missmatch_object name of the object that was + * bogus (i.e. "transfer key"). + * @return a MHD result code + */ +int +TALER_MINT_reply_refresh_reveal_missmatch (struct MHD_Connection *connection, + unsigned int off, + unsigned int j, + const char *missmatch_object); + + /** * Send a response for "/refresh/link". * -- cgit v1.2.3