/* This file is part of TALER Copyright (C) 2014-2017 GNUnet e.V. TALER is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with TALER; see the file COPYING. If not, see */ /** * @file taler-exchange-httpd_db.c * @brief High-level (transactional-layer) database operations for the exchange. * @author Christian Grothoff */ #include "platform.h" #include #include #include #include "taler_json_lib.h" #include "taler-exchange-httpd_responses.h" #include "taler-exchange-httpd_keystate.h" /** * How often should we retry a transaction before giving up * (for transactions resulting in serialization/dead locks only). */ #define MAX_TRANSACTION_COMMIT_RETRIES 3 /** * Code to begin a transaction, must be inline as we define a block * that ends with #COMMIT_TRANSACTION() within which we perform a number * of retries. Note that this code may call "return" internally, so * it must be called within a function where any cleanup will be done * by the caller. Furthermore, the function's return value must * match that of a #TEH_RESPONSE_reply_internal_db_error() status code. * * @param session session handle * @param connection connection handle */ #define START_TRANSACTION(session,connection) \ { /* start new scope, will be ended by COMMIT_TRANSACTION() */\ unsigned int transaction_retries = 0; \ int transaction_commit_result; \ transaction_start_label: /* we will use goto for retries */ \ if (GNUNET_OK != \ TEH_plugin->start (TEH_plugin->cls, \ session)) \ { \ GNUNET_break (0); \ return TEH_RESPONSE_reply_internal_db_error (connection, \ TALER_EC_DB_START_FAILED); \ } /** * Code to conclude a transaction, dual to #START_TRANSACTION(). Note * that this code may call "return" internally, so it must be called * within a function where any cleanup will be done by the caller. * Furthermore, the function's return value must match that of a * #TEH_RESPONSE_reply_internal_db_error() status code. * * @param session session handle * @param connection connection handle */ #define COMMIT_TRANSACTION(session,connection) \ transaction_commit_result = \ TEH_plugin->commit (TEH_plugin->cls, \ session); \ if (GNUNET_SYSERR == transaction_commit_result) \ { \ TALER_LOG_WARNING ("Transaction commit failed in %s\n", __FUNCTION__); \ return TEH_RESPONSE_reply_commit_error (connection, \ TALER_EC_DB_COMMIT_FAILED_HARD); \ } \ if (GNUNET_NO == transaction_commit_result) \ { \ TALER_LOG_WARNING ("Transaction commit failed in %s\n", __FUNCTION__); \ if (transaction_retries++ <= MAX_TRANSACTION_COMMIT_RETRIES) \ goto transaction_start_label; \ TALER_LOG_WARNING ("Transaction commit failed %u times in %s\n", \ transaction_retries, \ __FUNCTION__); \ return TEH_RESPONSE_reply_commit_error (connection, \ TALER_EC_DB_COMMIT_FAILED_ON_RETRY); \ } \ } /* end of scope opened by BEGIN_TRANSACTION */ /** * Code to include to retry a transaction, must only be used in between * #START_TRANSACTION and #COMMIT_TRANSACTION. * * @param session session handle * @param connection connection handle */ #define RETRY_TRANSACTION(session,connection) \ do { \ TEH_plugin->rollback (TEH_plugin->cls, \ session); \ if (transaction_retries++ <= MAX_TRANSACTION_COMMIT_RETRIES) \ goto transaction_start_label; \ TALER_LOG_WARNING ("Transaction commit failed %u times in %s\n", \ transaction_retries, \ __FUNCTION__); \ return TEH_RESPONSE_reply_commit_error (connection, \ TALER_EC_DB_COMMIT_FAILED_ON_RETRY); \ } while (0) /** * Calculate the total value of all transactions performed. * Stores @a off plus the cost of all transactions in @a tl * in @a ret. * * @param tl transaction list to process * @param off offset to use as the starting value * @param ret where the resulting total is to be stored * @return #GNUNET_OK on success, #GNUNET_SYSERR on errors */ static int calculate_transaction_list_totals (struct TALER_EXCHANGEDB_TransactionList *tl, const struct TALER_Amount *off, struct TALER_Amount *ret) { struct TALER_Amount spent = *off; struct TALER_EXCHANGEDB_TransactionList *pos; struct TALER_Amount refunded; TALER_amount_get_zero (spent.currency, &refunded); for (pos = tl; NULL != pos; pos = pos->next) { switch (pos->type) { case TALER_EXCHANGEDB_TT_DEPOSIT: /* spent += pos->amount_with_fee */ if (GNUNET_OK != TALER_amount_add (&spent, &spent, &pos->details.deposit->amount_with_fee)) { GNUNET_break (0); return GNUNET_SYSERR; } break; case TALER_EXCHANGEDB_TT_REFRESH_MELT: /* spent += pos->amount_with_fee */ if (GNUNET_OK != TALER_amount_add (&spent, &spent, &pos->details.melt->amount_with_fee)) { GNUNET_break (0); return GNUNET_SYSERR; } break; case TALER_EXCHANGEDB_TT_REFUND: /* refunded += pos->refund_amount - pos->refund_fee */ if (GNUNET_OK != TALER_amount_add (&refunded, &refunded, &pos->details.refund->refund_amount)) { GNUNET_break (0); return GNUNET_SYSERR; } if (GNUNET_OK != TALER_amount_subtract (&refunded, &refunded, &pos->details.refund->refund_fee)) { GNUNET_break (0); return GNUNET_SYSERR; } break; case TALER_EXCHANGEDB_TT_PAYBACK: /* spent += pos->value */ if (GNUNET_OK != TALER_amount_add (&spent, &spent, &pos->details.payback->value)) { GNUNET_break (0); return GNUNET_SYSERR; } break; } } /* spent = spent - refunded */ if (GNUNET_SYSERR == TALER_amount_subtract (&spent, &spent, &refunded)) { GNUNET_break (0); return GNUNET_SYSERR; } *ret = spent; return GNUNET_OK; } /** * Execute a deposit. The validity of the coin and signature * have already been checked. The database must now check that * the coin is not (double or over) spent, and execute the * transaction (record details, generate success or failure response). * * @param connection the MHD connection to handle * @param deposit information about the deposit * @return MHD result code */ int TEH_DB_execute_deposit (struct MHD_Connection *connection, const struct TALER_EXCHANGEDB_Deposit *deposit) { struct TALER_EXCHANGEDB_Session *session; struct TALER_EXCHANGEDB_TransactionList *tl; struct TALER_Amount spent; struct TALER_Amount value; struct TALER_Amount amount_without_fee; struct TEH_KS_StateHandle *mks; struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki; int ret; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } if (GNUNET_YES == TEH_plugin->have_deposit (TEH_plugin->cls, session, deposit)) { GNUNET_assert (GNUNET_OK == TALER_amount_subtract (&amount_without_fee, &deposit->amount_with_fee, &deposit->deposit_fee)); return TEH_RESPONSE_reply_deposit_success (connection, &deposit->coin.coin_pub, &deposit->h_wire, &deposit->h_contract_terms, deposit->timestamp, deposit->refund_deadline, &deposit->merchant_pub, &amount_without_fee); } /* FIXME: move the 'mks'-logic outside of _db.c? */ mks = TEH_KS_acquire (); dki = TEH_KS_denomination_key_lookup (mks, &deposit->coin.denom_pub, TEH_KS_DKU_DEPOSIT); if (NULL == dki) { TEH_KS_release (mks); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DEPOSIT_DB_DENOMINATION_KEY_UNKNOWN); } TALER_amount_ntoh (&value, &dki->issue.properties.value); TEH_KS_release (mks); START_TRANSACTION (session, connection); /* fee for THIS transaction */ spent = deposit->amount_with_fee; /* add cost of all previous transactions */ tl = TEH_plugin->get_coin_transactions (TEH_plugin->cls, session, &deposit->coin.coin_pub); if (GNUNET_OK != calculate_transaction_list_totals (tl, &spent, &spent)) { TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DEPOSIT_HISTORY_DB_ERROR); } /* Check that cost of all transactions is smaller than the value of the coin. */ if (0 < TALER_amount_cmp (&spent, &value)) { TEH_plugin->rollback (TEH_plugin->cls, session); ret = TEH_RESPONSE_reply_coin_insufficient_funds (connection, TALER_EC_DEPOSIT_INSUFFICIENT_FUNDS, tl); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return ret; } TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); if (GNUNET_OK != TEH_plugin->insert_deposit (TEH_plugin->cls, session, deposit)) { TALER_LOG_WARNING ("Failed to store /deposit information in database\n"); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DEPOSIT_STORE_DB_ERROR); } COMMIT_TRANSACTION(session, connection); GNUNET_assert (GNUNET_SYSERR != TALER_amount_subtract (&amount_without_fee, &deposit->amount_with_fee, &deposit->deposit_fee)); return TEH_RESPONSE_reply_deposit_success (connection, &deposit->coin.coin_pub, &deposit->h_wire, &deposit->h_contract_terms, deposit->timestamp, deposit->refund_deadline, &deposit->merchant_pub, &amount_without_fee); } /** * Execute a "/refund". Returns a confirmation that the refund * was successful, or a failure if we are not aware of a matching * /deposit or if it is too late to do the refund. * * @param connection the MHD connection to handle * @param refund refund details * @return MHD result code */ int TEH_DB_execute_refund (struct MHD_Connection *connection, const struct TALER_EXCHANGEDB_Refund *refund) { struct TALER_EXCHANGEDB_Session *session; struct TALER_EXCHANGEDB_TransactionList *tl; struct TALER_EXCHANGEDB_TransactionList *tlp; const struct TALER_EXCHANGEDB_Deposit *dep; const struct TALER_EXCHANGEDB_Refund *ref; struct TEH_KS_StateHandle *mks; struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki; struct TALER_Amount expect_fee; int ret; int deposit_found; int refund_found; int done; int fee_cmp; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } dep = NULL; ref = NULL; START_TRANSACTION (session, connection); tl = TEH_plugin->get_coin_transactions (TEH_plugin->cls, session, &refund->coin.coin_pub); if (NULL == tl) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_refund_failure (connection, MHD_HTTP_NOT_FOUND, TALER_EC_REFUND_COIN_NOT_FOUND); } deposit_found = GNUNET_NO; refund_found = GNUNET_NO; for (tlp = tl; NULL != tlp; tlp = tlp->next) { switch (tlp->type) { case TALER_EXCHANGEDB_TT_DEPOSIT: if (GNUNET_NO == deposit_found) { if ( (0 == memcmp (&tlp->details.deposit->merchant_pub, &refund->merchant_pub, sizeof (struct TALER_MerchantPublicKeyP))) && (0 == memcmp (&tlp->details.deposit->h_contract_terms, &refund->h_contract_terms, sizeof (struct GNUNET_HashCode))) ) { dep = tlp->details.deposit; deposit_found = GNUNET_YES; break; } } break; case TALER_EXCHANGEDB_TT_REFRESH_MELT: /* Melts cannot be refunded, ignore here */ break; case TALER_EXCHANGEDB_TT_REFUND: if (GNUNET_NO == refund_found) { /* First, check if existing refund request is identical */ if ( (0 == memcmp (&tlp->details.refund->merchant_pub, &refund->merchant_pub, sizeof (struct TALER_MerchantPublicKeyP))) && (0 == memcmp (&tlp->details.refund->h_contract_terms, &refund->h_contract_terms, sizeof (struct GNUNET_HashCode))) && (tlp->details.refund->rtransaction_id == refund->rtransaction_id) ) { ref = tlp->details.refund; refund_found = GNUNET_YES; break; } /* Second, check if existing refund request conflicts */ if ( (0 == memcmp (&tlp->details.refund->merchant_pub, &refund->merchant_pub, sizeof (struct TALER_MerchantPublicKeyP))) && (0 == memcmp (&tlp->details.refund->h_contract_terms, &refund->h_contract_terms, sizeof (struct GNUNET_HashCode))) && (tlp->details.refund->rtransaction_id != refund->rtransaction_id) ) { GNUNET_break_op (0); /* conflicting refund found */ refund_found = GNUNET_SYSERR; /* NOTE: Alternatively we could total up all existing refunds and check if the sum still permits the refund requested (thus allowing multiple, partial refunds). Fow now, we keep it simple. */ break; } } break; case TALER_EXCHANGEDB_TT_PAYBACK: /* Paybacks cannot be refunded, ignore here */ break; } } /* handle if deposit was NOT found */ if (GNUNET_NO == deposit_found) { TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_transaction_unknown (connection, TALER_EC_REFUND_DEPOSIT_NOT_FOUND); } /* handle if conflicting refund found */ if (GNUNET_SYSERR == refund_found) { TEH_plugin->rollback (TEH_plugin->cls, session); ret = TEH_RESPONSE_reply_refund_conflict (connection, tl); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return ret; } /* handle if identical refund found */ if (GNUNET_YES == refund_found) { /* /refund already done, simply re-transmit confirmation */ TEH_plugin->rollback (TEH_plugin->cls, session); ret = TEH_RESPONSE_reply_refund_success (connection, ref); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return ret; } /* check currency is compatible */ if ( (GNUNET_YES != TALER_amount_cmp_currency (&refund->refund_amount, &dep->amount_with_fee)) || (GNUNET_YES != TALER_amount_cmp_currency (&refund->refund_fee, &dep->deposit_fee)) ) { GNUNET_break_op (0); /* currency missmatch */ TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_refund_failure (connection, MHD_HTTP_PRECONDITION_FAILED, TALER_EC_REFUND_CURRENCY_MISSMATCH); } /* check if we already send the money for the /deposit */ done = TEH_plugin->test_deposit_done (TEH_plugin->cls, session, dep); if (GNUNET_SYSERR == done) { /* Internal error, we first had the deposit in the history, but now it is gone? */ GNUNET_break (0); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_error (connection, TALER_EC_REFUND_DB_INCONSISTENT, "database inconsistent"); } if (GNUNET_YES == done) { /* money was already transferred to merchant, can no longer refund */ TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_refund_failure (connection, MHD_HTTP_GONE, TALER_EC_REFUND_MERCHANT_ALREADY_PAID); } /* check refund amount is sufficiently low */ if (1 == TALER_amount_cmp (&refund->refund_amount, &dep->amount_with_fee) ) { GNUNET_break_op (0); /* cannot refund more than original value */ TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_refund_failure (connection, MHD_HTTP_PRECONDITION_FAILED, TALER_EC_REFUND_INSUFFICIENT_FUNDS); } /* Check refund fee matches fee of denomination key! */ mks = TEH_KS_acquire (); dki = TEH_KS_denomination_key_lookup (mks, &dep->coin.denom_pub, TEH_KS_DKU_DEPOSIT); if (NULL == dki) { /* DKI not found, but we do have a coin with this DK in our database; not good... */ GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); TEH_KS_release (mks); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_internal_error (connection, TALER_EC_REFUND_DENOMINATION_KEY_NOT_FOUND, "denomination key not found"); } TALER_amount_ntoh (&expect_fee, &dki->issue.properties.fee_refund); fee_cmp = TALER_amount_cmp (&refund->refund_fee, &expect_fee); TEH_KS_release (mks); if (-1 == fee_cmp) { TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_arg_invalid (connection, TALER_EC_REFUND_FEE_TOO_LOW, "refund_fee"); } if (1 == fee_cmp) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Refund fee proposed by merchant is higher than necessary.\n"); } TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); /* Finally, store new refund data */ if (GNUNET_OK != TEH_plugin->insert_refund (TEH_plugin->cls, session, refund)) { TALER_LOG_WARNING ("Failed to store /refund information in database\n"); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFUND_STORE_DB_ERROR); } COMMIT_TRANSACTION (session, connection); return TEH_RESPONSE_reply_refund_success (connection, refund); } /** * Execute a /reserve/status. Given the public key of a reserve, * return the associated transaction history. * * @param connection the MHD connection to handle * @param reserve_pub public key of the reserve to check * @return MHD result code */ int TEH_DB_execute_reserve_status (struct MHD_Connection *connection, const struct TALER_ReservePublicKeyP *reserve_pub) { struct TALER_EXCHANGEDB_Session *session; struct TALER_EXCHANGEDB_ReserveHistory *rh; int res; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } START_TRANSACTION (session, connection); rh = TEH_plugin->get_reserve_history (TEH_plugin->cls, session, reserve_pub); COMMIT_TRANSACTION (session, connection); if (NULL == rh) return TEH_RESPONSE_reply_json_pack (connection, MHD_HTTP_NOT_FOUND, "{s:s, s:s}", "error", "Reserve not found", "parameter", "withdraw_pub"); res = TEH_RESPONSE_reply_reserve_status_success (connection, rh); TEH_plugin->free_reserve_history (TEH_plugin->cls, rh); return res; } /** * Try to execute /reserve/withdraw transaction. * * @param connection request we are handling * @param session database session we are using * @param key_state key state to lookup denomination pubs * @param reserve reserve to withdraw from * @param denomination_pub public key of the denomination requested * @param dki denomination to withdraw * @param blinded_msg blinded message to be signed * @param blinded_msg_len number of bytes in @a blinded_msg * @param h_blind hash of @a blinded_msg * @param signature signature over the withdraw request, to be stored in DB * @param[out] denom_sig where to write the resulting signature * (used to release memory in case of transaction failure * @return MHD result code */ static int execute_reserve_withdraw_transaction (struct MHD_Connection *connection, struct TALER_EXCHANGEDB_Session *session, struct TEH_KS_StateHandle *key_state, const struct TALER_ReservePublicKeyP *reserve, const struct TALER_DenominationPublicKey *denomination_pub, const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki, const char *blinded_msg, size_t blinded_msg_len, const struct GNUNET_HashCode *h_blind, const struct TALER_ReserveSignatureP *signature, struct TALER_DenominationSignature *denom_sig) { struct TALER_EXCHANGEDB_ReserveHistory *rh; const struct TALER_EXCHANGEDB_ReserveHistory *pos; struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *tdki; struct TALER_EXCHANGEDB_CollectableBlindcoin collectable; struct TALER_Amount amount_required; struct TALER_Amount deposit_total; struct TALER_Amount withdraw_total; struct TALER_Amount balance; struct TALER_Amount value; struct TALER_Amount fee_withdraw; int res; int ret; /* Check if balance is sufficient */ START_TRANSACTION (session, connection); rh = TEH_plugin->get_reserve_history (TEH_plugin->cls, session, reserve); if (NULL == rh) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_arg_unknown (connection, TALER_EC_WITHDRAW_RESERVE_UNKNOWN, "reserve_pub"); } /* calculate amount required including fees */ TALER_amount_ntoh (&value, &dki->issue.properties.value); TALER_amount_ntoh (&fee_withdraw, &dki->issue.properties.fee_withdraw); if (GNUNET_OK != TALER_amount_add (&amount_required, &value, &fee_withdraw)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_AMOUNT_FEE_OVERFLOW); } /* calculate balance of the reserve */ res = 0; for (pos = rh; NULL != pos; pos = pos->next) { switch (pos->type) { case TALER_EXCHANGEDB_RO_BANK_TO_EXCHANGE: if (0 == (res & 1)) deposit_total = pos->details.bank->amount; else if (GNUNET_OK != TALER_amount_add (&deposit_total, &deposit_total, &pos->details.bank->amount)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_AMOUNT_DEPOSITS_OVERFLOW); } res |= 1; break; case TALER_EXCHANGEDB_RO_WITHDRAW_COIN: tdki = TEH_KS_denomination_key_lookup (key_state, &pos->details.withdraw->denom_pub, TEH_KS_DKU_WITHDRAW); if (NULL == tdki) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_HISTORIC_DENOMINATION_KEY_NOT_FOUND); } TALER_amount_ntoh (&value, &tdki->issue.properties.value); if (0 == (res & 2)) withdraw_total = value; else if (GNUNET_OK != TALER_amount_add (&withdraw_total, &withdraw_total, &value)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_AMOUNT_WITHDRAWALS_OVERFLOW); } res |= 2; break; case TALER_EXCHANGEDB_RO_PAYBACK_COIN: if (0 == (res & 1)) deposit_total = pos->details.payback->value; else if (GNUNET_OK != TALER_amount_add (&deposit_total, &deposit_total, &pos->details.payback->value)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_AMOUNT_DEPOSITS_OVERFLOW); } res |= 1; break; case TALER_EXCHANGEDB_RO_EXCHANGE_TO_BANK: if (0 == (res & 2)) withdraw_total = pos->details.bank->amount; else if (GNUNET_OK != TALER_amount_add (&withdraw_total, &withdraw_total, &pos->details.bank->amount)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_AMOUNT_WITHDRAWALS_OVERFLOW); } res |= 2; break; } } if (0 == (res & 1)) { /* did not encounter any wire transfer operations, how can we have a reserve? */ GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_RESERVE_WITHOUT_WIRE_TRANSFER); } if (0 == (res & 2)) { /* did not encounter any withdraw operations, set to zero */ TALER_amount_get_zero (deposit_total.currency, &withdraw_total); } /* All reserve balances should be non-negative */ if (GNUNET_SYSERR == TALER_amount_subtract (&balance, &deposit_total, &withdraw_total)) { GNUNET_break (0); /* database inconsistent */ TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_RESERVE_HISTORY_IMPOSSIBLE); } if (0 < TALER_amount_cmp (&amount_required, &balance)) { TEH_plugin->rollback (TEH_plugin->cls, session); res = TEH_RESPONSE_reply_reserve_withdraw_insufficient_funds (connection, rh); TEH_plugin->free_reserve_history (TEH_plugin->cls, rh); return res; } TEH_plugin->free_reserve_history (TEH_plugin->cls, rh); /* Balance is good, sign the coin! */ denom_sig->rsa_signature = GNUNET_CRYPTO_rsa_sign_blinded (dki->denom_priv.rsa_private_key, blinded_msg, blinded_msg_len); if (NULL == denom_sig->rsa_signature) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_error (connection, TALER_EC_WITHDRAW_SIGNATURE_FAILED, "Internal error"); } collectable.sig = *denom_sig; collectable.denom_pub = *denomination_pub; collectable.amount_with_fee = amount_required; collectable.withdraw_fee = fee_withdraw; collectable.reserve_pub = *reserve; collectable.h_coin_envelope = *h_blind; collectable.reserve_sig = *signature; ret = TEH_plugin->insert_withdraw_info (TEH_plugin->cls, session, &collectable); if (GNUNET_SYSERR == ret) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_DB_STORE_ERROR); } if (GNUNET_NO == ret) RETRY_TRANSACTION(session, connection); COMMIT_TRANSACTION (session, connection); return TEH_RESPONSE_reply_reserve_withdraw_success (connection, &collectable); } /** * Execute a "/reserve/withdraw". Given a reserve and a properly signed * request to withdraw a coin, check the balance of the reserve and * if it is sufficient, store the request and return the signed * blinded envelope. * * @param connection the MHD connection to handle * @param reserve public key of the reserve * @param denomination_pub public key of the denomination requested * @param blinded_msg blinded message to be signed * @param blinded_msg_len number of bytes in @a blinded_msg * @param signature signature over the withdraw request, to be stored in DB * @return MHD result code */ int TEH_DB_execute_reserve_withdraw (struct MHD_Connection *connection, const struct TALER_ReservePublicKeyP *reserve, const struct TALER_DenominationPublicKey *denomination_pub, const char *blinded_msg, size_t blinded_msg_len, const struct TALER_ReserveSignatureP *signature) { struct TALER_EXCHANGEDB_Session *session; struct TEH_KS_StateHandle *key_state; struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki; struct TALER_EXCHANGEDB_CollectableBlindcoin collectable; struct TALER_DenominationSignature denom_sig; struct GNUNET_HashCode h_blind; int res; GNUNET_CRYPTO_hash (blinded_msg, blinded_msg_len, &h_blind); if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } res = TEH_plugin->get_withdraw_info (TEH_plugin->cls, session, &h_blind, &collectable); if (GNUNET_SYSERR == res) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_WITHDRAW_DB_FETCH_ERROR); } /* Don't sign again if we have already signed the coin */ if (GNUNET_YES == res) { res = TEH_RESPONSE_reply_reserve_withdraw_success (connection, &collectable); GNUNET_CRYPTO_rsa_signature_free (collectable.sig.rsa_signature); GNUNET_CRYPTO_rsa_public_key_free (collectable.denom_pub.rsa_public_key); return res; } GNUNET_assert (GNUNET_NO == res); /* FIXME: do we have to do this a second time here? */ key_state = TEH_KS_acquire (); dki = TEH_KS_denomination_key_lookup (key_state, denomination_pub, TEH_KS_DKU_WITHDRAW); if (NULL == dki) { TEH_KS_release (key_state); return TEH_RESPONSE_reply_json_pack (connection, MHD_HTTP_NOT_FOUND, "{s:s, s:I}", "error", "Denomination not found", "code", (json_int_t) TALER_EC_WITHDRAW_DENOMINATION_KEY_NOT_FOUND); } denom_sig.rsa_signature = NULL; res = execute_reserve_withdraw_transaction (connection, session, key_state, reserve, denomination_pub, dki, blinded_msg, blinded_msg_len, &h_blind, signature, &denom_sig); if (NULL != denom_sig.rsa_signature) GNUNET_CRYPTO_rsa_signature_free (denom_sig.rsa_signature); TEH_KS_release (key_state); return res; } /** * Parse coin melt requests from a JSON object and write them to * the database. * * @param connection the connection to send errors to * @param session the database connection * @param key_state the exchange's key state * @param session_hash hash identifying the refresh session * @param coin_details details about the coin being melted * @param[out] meltp on success, set to melt details * @return #GNUNET_OK on success, * #GNUNET_NO if an error message was generated, * #GNUNET_SYSERR on internal errors (no response generated) */ static int refresh_check_melt (struct MHD_Connection *connection, struct TALER_EXCHANGEDB_Session *session, const struct TEH_KS_StateHandle *key_state, const struct GNUNET_HashCode *session_hash, const struct TEH_DB_MeltDetails *coin_details, struct TALER_EXCHANGEDB_RefreshMelt *meltp) { struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dk; struct TALER_EXCHANGEDB_DenominationKeyInformationP *dki; struct TALER_EXCHANGEDB_TransactionList *tl; struct TALER_Amount coin_value; struct TALER_Amount coin_residual; struct TALER_Amount spent; int res; dk = TEH_KS_denomination_key_lookup (key_state, &coin_details->coin_info.denom_pub, TEH_KS_DKU_DEPOSIT); if (NULL == dk) return (MHD_YES == TEH_RESPONSE_reply_internal_error (connection, TALER_EC_REFRESH_MELT_DB_DENOMINATION_KEY_NOT_FOUND, "denomination key no longer available while executing transaction")) ? GNUNET_NO : GNUNET_SYSERR; dki = &dk->issue; TALER_amount_ntoh (&coin_value, &dki->properties.value); /* fee for THIS transaction; the melt amount includes the fee! */ spent = coin_details->melt_amount_with_fee; /* add historic transaction costs of this coin */ tl = TEH_plugin->get_coin_transactions (TEH_plugin->cls, session, &coin_details->coin_info.coin_pub); if (GNUNET_OK != calculate_transaction_list_totals (tl, &spent, &spent)) { GNUNET_break (0); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return (MHD_YES == TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_COIN_HISTORY_COMPUTATION_FAILED)) ? GNUNET_NO : GNUNET_SYSERR; } /* Refuse to refresh when the coin's value is insufficient for the cost of all transactions. */ if (TALER_amount_cmp (&coin_value, &spent) < 0) { GNUNET_assert (GNUNET_SYSERR != TALER_amount_subtract (&coin_residual, &spent, &coin_details->melt_amount_with_fee)); res = (MHD_YES == TEH_RESPONSE_reply_refresh_melt_insufficient_funds (connection, &coin_details->coin_info.coin_pub, coin_value, tl, coin_details->melt_amount_with_fee, coin_residual)) ? GNUNET_NO : GNUNET_SYSERR; TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return res; } TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); meltp->coin = coin_details->coin_info; meltp->coin_sig = coin_details->melt_sig; meltp->session_hash = *session_hash; meltp->amount_with_fee = coin_details->melt_amount_with_fee; meltp->melt_fee = coin_details->melt_fee; return GNUNET_OK; } /** * Execute a "/refresh/melt". We have been given a list of valid * coins and a request to melt them into the given * @a refresh_session_pub. Check that the coins all have the * required value left and if so, store that they have been * melted and confirm the melting operation to the client. * * @param connection the MHD connection to handle * @param session_hash hash code of the session the coins are melted into * @param num_new_denoms number of entries in @a denom_pubs, size of y-dimension of @a commit_coin array * @param denom_pubs public keys of the coins we want to withdraw in the end * @param coin_melt_detail signature and (residual) value of the respective coin should be melted * @param commit_coin 2d array of coin commitments (what the exchange is to sign * once the "/refres/reveal" of cut and choose is done), * x-dimension must be #TALER_CNC_KAPPA * @param transfer_pubs array of transfer public keys (what the exchange is * to return via "/refresh/link" to enable linkage in the * future) of length #TALER_CNC_KAPPA * @return MHD result code */ int TEH_DB_execute_refresh_melt (struct MHD_Connection *connection, const struct GNUNET_HashCode *session_hash, unsigned int num_new_denoms, const struct TALER_DenominationPublicKey *denom_pubs, const struct TEH_DB_MeltDetails *coin_melt_detail, struct TALER_EXCHANGEDB_RefreshCommitCoin *const* commit_coin, const struct TALER_TransferPublicKeyP *transfer_pubs) { struct TEH_KS_StateHandle *key_state; struct TALER_EXCHANGEDB_RefreshSession refresh_session; struct TALER_EXCHANGEDB_Session *session; int res; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } START_TRANSACTION (session, connection); res = TEH_plugin->get_refresh_session (TEH_plugin->cls, session, session_hash, &refresh_session); if (GNUNET_YES == res) { TEH_plugin->rollback (TEH_plugin->cls, session); res = TEH_RESPONSE_reply_refresh_melt_success (connection, session_hash, refresh_session.noreveal_index); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } if (GNUNET_SYSERR == res) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_DB_FETCH_ERROR); } /* store 'global' session data */ refresh_session.num_newcoins = num_new_denoms; refresh_session.noreveal_index = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_STRONG, TALER_CNC_KAPPA); key_state = TEH_KS_acquire (); if (GNUNET_OK != (res = refresh_check_melt (connection, session, key_state, session_hash, coin_melt_detail, &refresh_session.melt))) { TEH_KS_release (key_state); TEH_plugin->rollback (TEH_plugin->cls, session); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } TEH_KS_release (key_state); if (GNUNET_OK != (res = TEH_plugin->create_refresh_session (TEH_plugin->cls, session, session_hash, &refresh_session))) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_DB_STORE_SESSION_ERROR); } /* store requested new denominations */ if (GNUNET_OK != TEH_plugin->insert_refresh_order (TEH_plugin->cls, session, session_hash, num_new_denoms, denom_pubs)) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_DB_STORE_ORDER_ERROR); } if (GNUNET_OK != TEH_plugin->insert_refresh_commit_coins (TEH_plugin->cls, session, session_hash, num_new_denoms, commit_coin[refresh_session.noreveal_index])) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_DB_STORE_ORDER_ERROR); } if (GNUNET_OK != TEH_plugin->insert_refresh_transfer_public_key (TEH_plugin->cls, session, session_hash, &transfer_pubs[refresh_session.noreveal_index])) { TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_MELT_DB_STORE_TRANSFER_ERROR); } COMMIT_TRANSACTION (session, connection); return TEH_RESPONSE_reply_refresh_melt_success (connection, session_hash, refresh_session.noreveal_index); } /** * Check if the given @a transfer_privs correspond to an honest * commitment for the given session. * Checks that the transfer private keys match their commitments. * Then derives the shared secret for each #TALER_CNC_KAPPA, and check that they match. * * @param connection the MHD connection to handle * @param session database connection to use * @param session_hash hash of session to query * @param off commitment offset to check * @param transfer_priv private transfer key * @param melt information about the melted coin * @param num_newcoins number of newcoins being generated * @param denom_pubs array of @a num_newcoins keys for the new coins * @param hash_context hash context to update by hashing in the data * from this offset * @return #GNUNET_OK if the committment was honest, * #GNUNET_NO if there was a problem and we generated an error message * #GNUNET_SYSERR if we could not even generate an error message */ static int check_commitment (struct MHD_Connection *connection, struct TALER_EXCHANGEDB_Session *session, const struct GNUNET_HashCode *session_hash, unsigned int off, const struct TALER_TransferPrivateKeyP *transfer_priv, const struct TALER_EXCHANGEDB_RefreshMelt *melt, unsigned int num_newcoins, const struct TALER_DenominationPublicKey *denom_pubs, struct GNUNET_HashContext *hash_context) { struct TALER_TransferSecretP transfer_secret; unsigned int j; TALER_link_reveal_transfer_secret (transfer_priv, &melt->coin.coin_pub, &transfer_secret); /* Check that the commitments for all new coins were correct */ for (j = 0; j < num_newcoins; j++) { struct TALER_FreshCoinP fc; struct TALER_CoinSpendPublicKeyP coin_pub; struct GNUNET_HashCode h_msg; char *buf; size_t buf_len; TALER_setup_fresh_coin (&transfer_secret, j, &fc); GNUNET_CRYPTO_eddsa_key_get_public (&fc.coin_priv.eddsa_priv, &coin_pub.eddsa_pub); GNUNET_CRYPTO_hash (&coin_pub, sizeof (struct TALER_CoinSpendPublicKeyP), &h_msg); if (GNUNET_YES != GNUNET_CRYPTO_rsa_blind (&h_msg, &fc.blinding_key.bks, denom_pubs[j].rsa_public_key, &buf, &buf_len)) { GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Blind failed (bad denomination key!?)\n"); return (MHD_YES == TEH_RESPONSE_reply_internal_error (connection, TALER_EC_REFRESH_REVEAL_BLINDING_ERROR, "Blinding error")) ? GNUNET_NO : GNUNET_SYSERR; } GNUNET_CRYPTO_hash_context_read (hash_context, buf, buf_len); GNUNET_free (buf); } return GNUNET_OK; } /** * Exchange a coin as part of a refresh operation. Obtains the * envelope from the database and performs the signing operation. * * @param connection the MHD connection to handle * @param session database connection to use * @param session_hash hash of session to query * @param key_state key state to lookup denomination pubs * @param denom_pub denomination key for the coin to create * @param commit_coin the coin that was committed * @param coin_off number of the coin * @return NULL on error, otherwise signature over the coin */ static struct TALER_DenominationSignature refresh_exchange_coin (struct MHD_Connection *connection, struct TALER_EXCHANGEDB_Session *session, const struct GNUNET_HashCode *session_hash, struct TEH_KS_StateHandle *key_state, const struct TALER_DenominationPublicKey *denom_pub, const struct TALER_EXCHANGEDB_RefreshCommitCoin *commit_coin, unsigned int coin_off) { struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki; struct TALER_DenominationSignature ev_sig; dki = TEH_KS_denomination_key_lookup (key_state, denom_pub, TEH_KS_DKU_WITHDRAW); if (NULL == dki) { GNUNET_break (0); ev_sig.rsa_signature = NULL; return ev_sig; } if (GNUNET_OK == TEH_plugin->get_refresh_out (TEH_plugin->cls, session, session_hash, coin_off, &ev_sig)) { GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Returning cashed reply for /refresh/reveal signature\n"); return ev_sig; } ev_sig.rsa_signature = GNUNET_CRYPTO_rsa_sign_blinded (dki->denom_priv.rsa_private_key, commit_coin->coin_ev, commit_coin->coin_ev_size); if (NULL == ev_sig.rsa_signature) { GNUNET_break (0); return ev_sig; } if (GNUNET_SYSERR == TEH_plugin->insert_refresh_out (TEH_plugin->cls, session, session_hash, coin_off, &ev_sig)) { GNUNET_break (0); GNUNET_CRYPTO_rsa_signature_free (ev_sig.rsa_signature); ev_sig.rsa_signature = NULL; } return ev_sig; } /** * The client request was well-formed, now execute the DB transaction * of a "/refresh/reveal" operation. We use the @a ev_sigs and * @a commit_coins to clean up resources after this function returns * as we might experience retries of the database transaction. * * @param connection the MHD connection to handle * @param session database session * @param session_hash hash identifying the refresh session * @param refresh_session information about the refresh operation we are doing * @param denom_pubs array of "num_newcoins" denomination keys for the new coins * @param[out] ev_sigs where to store generated signatures for the new coins, * array of length "num_newcoins", memory released by the * caller * @param[out] commit_coins array of length "num_newcoins" to be used for * information about the new coins from the commitment. * @return MHD result code */ static int execute_refresh_reveal_transaction (struct MHD_Connection *connection, struct TALER_EXCHANGEDB_Session *session, const struct GNUNET_HashCode *session_hash, const struct TALER_EXCHANGEDB_RefreshSession *refresh_session, const struct TALER_DenominationPublicKey *denom_pubs, struct TALER_DenominationSignature *ev_sigs, struct TALER_EXCHANGEDB_RefreshCommitCoin *commit_coins) { unsigned int j; struct TEH_KS_StateHandle *key_state; int ret; START_TRANSACTION (session, connection); key_state = TEH_KS_acquire (); for (j=0;jnum_newcoins;j++) { if (NULL == ev_sigs[j].rsa_signature) /* could be non-NULL during retries */ ev_sigs[j] = refresh_exchange_coin (connection, session, session_hash, key_state, &denom_pubs[j], &commit_coins[j], j); if (NULL == ev_sigs[j].rsa_signature) { TEH_plugin->rollback (TEH_plugin->cls, session); ret = TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_SIGNING_ERROR); goto cleanup; } } COMMIT_TRANSACTION (session, connection); ret = TEH_RESPONSE_reply_refresh_reveal_success (connection, refresh_session->num_newcoins, ev_sigs); cleanup: TEH_KS_release (key_state); return ret; } /** * Execute a "/refresh/reveal". The client is revealing to us the * transfer keys for @a #TALER_CNC_KAPPA-1 sets of coins. Verify that the * revealed transfer keys would allow linkage to the blinded coins, * and if so, return the signed coins for corresponding to the set of * coins that was not chosen. * * @param connection the MHD connection to handle * @param session_hash hash identifying the refresh session * @param transfer_privs array with the revealed transfer keys, * length must be #TALER_CNC_KAPPA - 1 * @return MHD result code */ int TEH_DB_execute_refresh_reveal (struct MHD_Connection *connection, const struct GNUNET_HashCode *session_hash, struct TALER_TransferPrivateKeyP *transfer_privs) { int res; struct TALER_EXCHANGEDB_Session *session; struct TALER_EXCHANGEDB_RefreshSession refresh_session; struct TALER_DenominationPublicKey *denom_pubs; struct TALER_DenominationSignature *ev_sigs; struct TALER_EXCHANGEDB_RefreshCommitCoin *commit_coins; unsigned int i; unsigned int j; unsigned int off; struct GNUNET_HashContext *hash_context; struct GNUNET_HashCode sh_check; int ret; struct TALER_TransferPublicKeyP gamma_tp; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } res = TEH_plugin->get_refresh_session (TEH_plugin->cls, session, session_hash, &refresh_session); if (GNUNET_NO == res) return TEH_RESPONSE_reply_arg_invalid (connection, TALER_EC_REFRESH_REVEAL_SESSION_UNKNOWN, "session_hash"); if ( (GNUNET_SYSERR == res) || (refresh_session.noreveal_index >= TALER_CNC_KAPPA) ) return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_DB_FETCH_SESSION_ERROR); denom_pubs = GNUNET_new_array (refresh_session.num_newcoins, struct TALER_DenominationPublicKey); if (GNUNET_OK != TEH_plugin->get_refresh_order (TEH_plugin->cls, session, session_hash, refresh_session.num_newcoins, denom_pubs)) { GNUNET_break (0); GNUNET_free (denom_pubs); GNUNET_CRYPTO_rsa_signature_free (refresh_session.melt.coin.denom_sig.rsa_signature); GNUNET_CRYPTO_rsa_public_key_free (refresh_session.melt.coin.denom_pub.rsa_public_key); return (MHD_YES == TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_DB_FETCH_ORDER_ERROR)) ? GNUNET_NO : GNUNET_SYSERR; } hash_context = GNUNET_CRYPTO_hash_context_start (); /* first, iterate over transfer public keys for hash_context */ off = 0; for (i=0;iget_refresh_transfer_public_key (TEH_plugin->cls, session, session_hash, &gamma_tp)) { GNUNET_break (0); GNUNET_free (denom_pubs); GNUNET_CRYPTO_rsa_signature_free (refresh_session.melt.coin.denom_sig.rsa_signature); GNUNET_CRYPTO_rsa_public_key_free (refresh_session.melt.coin.denom_pub.rsa_public_key); GNUNET_CRYPTO_hash_context_abort (hash_context); return (MHD_YES == TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_DB_FETCH_TRANSFER_ERROR)) ? GNUNET_NO : GNUNET_SYSERR; } GNUNET_CRYPTO_hash_context_read (hash_context, &gamma_tp, sizeof (struct TALER_TransferPublicKeyP)); } else { /* compute tp from private key */ struct TALER_TransferPublicKeyP tp; GNUNET_CRYPTO_ecdhe_key_get_public (&transfer_privs[i - off].ecdhe_priv, &tp.ecdhe_pub); GNUNET_CRYPTO_hash_context_read (hash_context, &tp, sizeof (struct TALER_TransferPublicKeyP)); } } /* next, add all of the hashes from the denomination keys to the hash_context */ { struct TALER_DenominationPublicKey denom_pubs[refresh_session.num_newcoins]; if (GNUNET_OK != TEH_plugin->get_refresh_order (TEH_plugin->cls, session, session_hash, refresh_session.num_newcoins, denom_pubs)) { GNUNET_break (0); GNUNET_free (denom_pubs); GNUNET_CRYPTO_rsa_signature_free (refresh_session.melt.coin.denom_sig.rsa_signature); GNUNET_CRYPTO_rsa_public_key_free (refresh_session.melt.coin.denom_pub.rsa_public_key); GNUNET_CRYPTO_hash_context_abort (hash_context); return (MHD_YES == TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_DB_FETCH_ORDER_ERROR)) ? GNUNET_NO : GNUNET_SYSERR; } for (i=0;iget_refresh_commit_coins (TEH_plugin->cls, session, session_hash, refresh_session.num_newcoins, commit_coins)) { GNUNET_break (0); GNUNET_free (denom_pubs); GNUNET_CRYPTO_rsa_signature_free (refresh_session.melt.coin.denom_sig.rsa_signature); GNUNET_CRYPTO_rsa_public_key_free (refresh_session.melt.coin.denom_pub.rsa_public_key); GNUNET_CRYPTO_hash_context_abort (hash_context); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_REFRESH_REVEAL_DB_FETCH_COMMIT_ERROR); } /* add envelopes to hash_context */ for (j=0;jstatus) return; ldl = TEH_plugin->get_link_data_list (TEH_plugin->cls, ctx->session, session_hash); if (NULL == ldl) { ctx->status = GNUNET_NO; if (MHD_NO == TEH_RESPONSE_reply_json_pack (ctx->connection, MHD_HTTP_NOT_FOUND, "{s:s}", "error", "link data not found (link)")) ctx->status = GNUNET_SYSERR; return; } GNUNET_array_grow (ctx->sessions, ctx->num_sessions, ctx->num_sessions + 1); lsi = &ctx->sessions[ctx->num_sessions - 1]; lsi->transfer_pub = *transfer_pub; lsi->ldl = ldl; } /** * Execute a "/refresh/link". Returns the linkage information that * will allow the owner of a coin to follow the refresh trail to * the refreshed coin. * * @param connection the MHD connection to handle * @param coin_pub public key of the coin to link * @return MHD result code */ int TEH_DB_execute_refresh_link (struct MHD_Connection *connection, const struct TALER_CoinSpendPublicKeyP *coin_pub) { struct HTD_Context ctx; int res; unsigned int i; if (NULL == (ctx.session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } ctx.connection = connection; ctx.num_sessions = 0; ctx.sessions = NULL; ctx.status = GNUNET_OK; res = TEH_plugin->get_transfer (TEH_plugin->cls, ctx.session, coin_pub, &handle_transfer_data, &ctx); if (GNUNET_SYSERR == ctx.status) { res = MHD_NO; goto cleanup; } if (GNUNET_NO == ctx.status) { res = MHD_YES; goto cleanup; } GNUNET_assert (GNUNET_OK == ctx.status); if (0 == ctx.num_sessions) return TEH_RESPONSE_reply_arg_unknown (connection, TALER_EC_REFRESH_LINK_COIN_UNKNOWN, "coin_pub"); res = TEH_RESPONSE_reply_refresh_link_success (connection, ctx.num_sessions, ctx.sessions); cleanup: for (i=0;ifree_link_data_list (TEH_plugin->cls, ctx.sessions[i].ldl); GNUNET_free_non_null (ctx.sessions); return res; } /** * Add an incoming transaction to the database. Checks if the * transaction is fresh (not a duplicate) and if so adds it to * the database. * * @param connection the MHD connection to handle * @param reserve_pub public key of the reserve * @param amount amount to add to the reserve * @param execution_time when did we receive the wire transfer * @param sender_account_details which account send the funds * @param transfer_details information that uniquely identifies the transfer * @return MHD result code */ int TEH_DB_execute_admin_add_incoming (struct MHD_Connection *connection, const struct TALER_ReservePublicKeyP *reserve_pub, const struct TALER_Amount *amount, struct GNUNET_TIME_Absolute execution_time, const json_t *sender_account_details, const json_t *transfer_details) { struct TALER_EXCHANGEDB_Session *session; int ret; void *json_str; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } json_str = json_dumps (transfer_details, JSON_INDENT(2)); if (NULL == json_str) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_PARSER_OUT_OF_MEMORY); } ret = TEH_plugin->reserves_in_insert (TEH_plugin->cls, session, reserve_pub, amount, execution_time, sender_account_details, json_str, strlen (json_str)); free (json_str); if (GNUNET_SYSERR == ret) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_ADMIN_ADD_INCOMING_DB_STORE); } return TEH_RESPONSE_reply_json_pack (connection, MHD_HTTP_OK, "{s:s}", "status", (GNUNET_OK == ret) ? "NEW" : "DUP"); } /** * Closure for #handle_transaction_data. */ struct WtidTransactionContext { /** * Total amount of the wire transfer, as calculated by * summing up the individual amounts. To be rounded down * to calculate the real transfer amount at the end. * Only valid if @e is_valid is #GNUNET_YES. */ struct TALER_Amount total; /** * Public key of the merchant, only valid if @e is_valid * is #GNUNET_YES. */ struct TALER_MerchantPublicKeyP merchant_pub; /** * Which method was used to wire the funds? */ char *wire_method; /** * Hash of the wire details of the merchant (identical for all * deposits), only valid if @e is_valid is #GNUNET_YES. */ struct GNUNET_HashCode h_wire; /** * Execution time of the wire transfer */ struct GNUNET_TIME_Absolute exec_time; /** * Head of DLL with details for /wire/deposit response. */ struct TEH_TrackTransferDetail *wdd_head; /** * Head of DLL with details for /wire/deposit response. */ struct TEH_TrackTransferDetail *wdd_tail; /** * JSON array with details about the individual deposits. */ json_t *deposits; /** * Initially #GNUNET_NO, if we found no deposits so far. Set to * #GNUNET_YES if we got transaction data, and the database replies * remained consistent with respect to @e merchant_pub and @e h_wire * (as they should). Set to #GNUNET_SYSERR if we encountered an * internal error. */ int is_valid; }; /** * Function called with the results of the lookup of the * transaction data for the given wire transfer identifier. * * @param cls our context for transmission * @param rowid which row in the DB is the information from (for diagnostics) * @param merchant_pub public key of the merchant (should be same for all callbacks with the same @e cls) * @param wire_method which wire plugin was used * @param h_wire hash of wire transfer details of the merchant (should be same for all callbacks with the same @e cls) * @param exec_time execution time of the wire transfer (should be same for all callbacks with the same @e cls) * @param h_contract_terms which proposal was this payment about * @param coin_pub which public key was this payment about * @param deposit_value amount contributed by this coin in total * @param deposit_fee deposit fee charged by exchange for this coin */ static void handle_transaction_data (void *cls, uint64_t rowid, const struct TALER_MerchantPublicKeyP *merchant_pub, const char *wire_method, const struct GNUNET_HashCode *h_wire, struct GNUNET_TIME_Absolute exec_time, const struct GNUNET_HashCode *h_contract_terms, const struct TALER_CoinSpendPublicKeyP *coin_pub, const struct TALER_Amount *deposit_value, const struct TALER_Amount *deposit_fee) { struct WtidTransactionContext *ctx = cls; struct TALER_Amount delta; struct TEH_TrackTransferDetail *wdd; if (GNUNET_SYSERR == ctx->is_valid) return; if (GNUNET_NO == ctx->is_valid) { ctx->merchant_pub = *merchant_pub; ctx->h_wire = *h_wire; ctx->exec_time = exec_time; ctx->wire_method = GNUNET_strdup (wire_method); ctx->is_valid = GNUNET_YES; if (GNUNET_OK != TALER_amount_subtract (&ctx->total, deposit_value, deposit_fee)) { GNUNET_break (0); ctx->is_valid = GNUNET_SYSERR; return; } } else { if ( (0 != memcmp (&ctx->merchant_pub, merchant_pub, sizeof (struct TALER_MerchantPublicKeyP))) || (0 != strcmp (wire_method, ctx->wire_method)) || (0 != memcmp (&ctx->h_wire, h_wire, sizeof (struct GNUNET_HashCode))) ) { GNUNET_break (0); ctx->is_valid = GNUNET_SYSERR; return; } if (GNUNET_OK != TALER_amount_subtract (&delta, deposit_value, deposit_fee)) { GNUNET_break (0); ctx->is_valid = GNUNET_SYSERR; return; } if (GNUNET_OK != TALER_amount_add (&ctx->total, &ctx->total, &delta)) { GNUNET_break (0); ctx->is_valid = GNUNET_SYSERR; return; } } wdd = GNUNET_new (struct TEH_TrackTransferDetail); wdd->deposit_value = *deposit_value; wdd->deposit_fee = *deposit_fee; wdd->h_contract_terms = *h_contract_terms; wdd->coin_pub = *coin_pub; GNUNET_CONTAINER_DLL_insert (ctx->wdd_head, ctx->wdd_tail, wdd); } /** * Execute a "/track/transfer". Returns the transaction information * associated with the given wire transfer identifier. * * @param connection the MHD connection to handle * @param wtid wire transfer identifier to resolve * @return MHD result code */ int TEH_DB_execute_track_transfer (struct MHD_Connection *connection, const struct TALER_WireTransferIdentifierRawP *wtid) { int ret; struct WtidTransactionContext ctx; struct TALER_EXCHANGEDB_Session *session; struct TEH_TrackTransferDetail *wdd; struct GNUNET_TIME_Absolute wire_fee_start_date; struct GNUNET_TIME_Absolute wire_fee_end_date; struct TALER_Amount wire_fee; struct TALER_MasterSignatureP wire_fee_master_sig; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } ctx.is_valid = GNUNET_NO; ctx.wdd_head = NULL; ctx.wdd_tail = NULL; ctx.wire_method = NULL; ret = TEH_plugin->lookup_wire_transfer (TEH_plugin->cls, session, wtid, &handle_transaction_data, &ctx); if (GNUNET_SYSERR == ret) { GNUNET_break (0); ret = TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_TRACK_TRANSFER_DB_FETCH_FAILED); goto cleanup; } if (GNUNET_SYSERR == ctx.is_valid) { GNUNET_break (0); ret = TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_TRACK_TRANSFER_DB_INCONSISTENT); goto cleanup; } if (GNUNET_NO == ctx.is_valid) { ret = TEH_RESPONSE_reply_arg_unknown (connection, TALER_EC_TRACK_TRANSFER_WTID_NOT_FOUND, "wtid"); goto cleanup; } if (GNUNET_OK != TEH_plugin->get_wire_fee (TEH_plugin->cls, session, ctx.wire_method, ctx.exec_time, &wire_fee_start_date, &wire_fee_end_date, &wire_fee, &wire_fee_master_sig)) { GNUNET_break (0); ret = TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_TRACK_TRANSFER_WIRE_FEE_NOT_FOUND); goto cleanup; } if (GNUNET_OK != TALER_amount_subtract (&ctx.total, &ctx.total, &wire_fee)) { GNUNET_break (0); ret = TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_TRACK_TRANSFER_WIRE_FEE_INCONSISTENT); goto cleanup; } ret = TEH_RESPONSE_reply_track_transfer_details (connection, &ctx.total, &ctx.merchant_pub, &ctx.h_wire, &wire_fee, ctx.exec_time, ctx.wdd_head); cleanup: while (NULL != (wdd = ctx.wdd_head)) { GNUNET_CONTAINER_DLL_remove (ctx.wdd_head, ctx.wdd_tail, wdd); GNUNET_free (wdd); } GNUNET_free_non_null (ctx.wire_method); return ret; } /** * Closure for #handle_wtid_data. */ struct DepositWtidContext { /** * Where should we send the reply? */ struct MHD_Connection *connection; /** * Hash of the proposal data we are looking up. */ struct GNUNET_HashCode h_contract_terms; /** * Hash of the wire transfer details we are looking up. */ struct GNUNET_HashCode h_wire; /** * Public key we are looking up. */ struct TALER_CoinSpendPublicKeyP coin_pub; /** * MHD result code to return. */ int res; }; /** * Function called with the results of the lookup of the * wire transfer identifier information. * * @param cls our context for transmission * @param wtid raw wire transfer identifier, NULL * if the transaction was not yet done * @param coin_contribution how much did the coin we asked about * contribute to the total transfer value? (deposit value including fee) * @param coin_fee how much did the exchange charge for the deposit fee * @param execution_time when was the transaction done, or * when we expect it to be done (if @a wtid was NULL); * #GNUNET_TIME_UNIT_FOREVER_ABS if the /deposit is unknown * to the exchange */ static void handle_wtid_data (void *cls, const struct TALER_WireTransferIdentifierRawP *wtid, const struct TALER_Amount *coin_contribution, const struct TALER_Amount *coin_fee, struct GNUNET_TIME_Absolute execution_time) { struct DepositWtidContext *ctx = cls; struct TALER_Amount coin_delta; if (NULL == wtid) { ctx->res = TEH_RESPONSE_reply_transfer_pending (ctx->connection, execution_time); } else { if (GNUNET_SYSERR == TALER_amount_subtract (&coin_delta, coin_contribution, coin_fee)) { GNUNET_break (0); ctx->res = TEH_RESPONSE_reply_internal_db_error (ctx->connection, TALER_EC_TRACK_TRANSACTION_DB_FEE_INCONSISTENT); } else { ctx->res = TEH_RESPONSE_reply_track_transaction (ctx->connection, &ctx->h_contract_terms, &ctx->h_wire, &ctx->coin_pub, &coin_delta, wtid, execution_time); } } } /** * Execute a "/track/transaction". Returns the transfer information * associated with the given deposit. * * @param connection the MHD connection to handle * @param h_contract_terms hash of the proposal data * @param h_wire hash of the wire details * @param coin_pub public key of the coin to link * @param merchant_pub public key of the merchant * @return MHD result code */ int TEH_DB_execute_track_transaction (struct MHD_Connection *connection, const struct GNUNET_HashCode *h_contract_terms, const struct GNUNET_HashCode *h_wire, const struct TALER_CoinSpendPublicKeyP *coin_pub, const struct TALER_MerchantPublicKeyP *merchant_pub) { int ret; struct DepositWtidContext ctx; struct TALER_EXCHANGEDB_Session *session; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } ctx.connection = connection; ctx.h_contract_terms = *h_contract_terms; ctx.h_wire = *h_wire; ctx.coin_pub = *coin_pub; ctx.res = GNUNET_SYSERR; ret = TEH_plugin->wire_lookup_deposit_wtid (TEH_plugin->cls, session, h_contract_terms, h_wire, coin_pub, merchant_pub, &handle_wtid_data, &ctx); if (GNUNET_SYSERR == ret) { GNUNET_break (0); GNUNET_break (GNUNET_SYSERR == ctx.res); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_TRACK_TRANSACTION_DB_FETCH_FAILED); } if (GNUNET_NO == ret) { GNUNET_break (GNUNET_SYSERR == ctx.res); return TEH_RESPONSE_reply_transaction_unknown (connection, TALER_EC_TRACK_TRANSACTION_NOT_FOUND); } if (GNUNET_SYSERR == ctx.res) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_error (connection, TALER_EC_TRACK_TRANSACTION_WTID_RESOLUTION_ERROR, "bug resolving deposit wtid"); } return ctx.res; } /** * Execute a "/payback". The validity of the coin and signature have * already been checked. The database must now check that the coin is * not (double) spent, and execute the transaction (record details, * generate success or failure response). * * @param connection the MHD connection to handle * @param coin information about the coin * @param value how much are coins of the @a coin's denomination worth? * @param h_blind blinded coin to use for the lookup * @param coin_blind blinding factor used (for later verification by the auditor) * @param coin_sig signature of the coin (to be stored) * @return MHD result code */ int TEH_DB_execute_payback (struct MHD_Connection *connection, const struct TALER_CoinPublicInfo *coin, const struct TALER_Amount *value, const struct GNUNET_HashCode *h_blind, const struct TALER_DenominationBlindingKeyP *coin_blind, const struct TALER_CoinSpendSignatureP *coin_sig) { int ret; struct TALER_EXCHANGEDB_Session *session; struct TALER_EXCHANGEDB_TransactionList *tl; struct TALER_ReservePublicKeyP reserve_pub; struct TALER_Amount amount; struct TALER_Amount spent; struct GNUNET_TIME_Absolute now; if (NULL == (session = TEH_plugin->get_session (TEH_plugin->cls))) { GNUNET_break (0); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_DB_SETUP_FAILED); } START_TRANSACTION (session, connection); /* Check whether a payback is allowed, and if so, to which reserve / account the money should go */ ret = TEH_plugin->get_reserve_by_h_blind (TEH_plugin->cls, session, h_blind, &reserve_pub); if (GNUNET_SYSERR == ret) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_PAYBACK_DB_FETCH_FAILED); } if (GNUNET_NO == ret) { GNUNET_break_op (0); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_payback_unknown (connection, TALER_EC_PAYBACK_WITHDRAW_NOT_FOUND); } /* Calculate remaining balance. */ tl = TEH_plugin->get_coin_transactions (TEH_plugin->cls, session, &coin->coin_pub); TALER_amount_get_zero (value->currency, &spent); if (GNUNET_OK != calculate_transaction_list_totals (tl, &spent, &spent)) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_PAYBACK_HISTORY_DB_ERROR); } if (GNUNET_SYSERR == TALER_amount_subtract (&amount, value, &spent)) { GNUNET_break (0); TEH_plugin->rollback (TEH_plugin->cls, session); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_PAYBACK_COIN_BALANCE_NEGATIVE); } if ( (0 == amount.fraction) && (0 == amount.value) ) { TEH_plugin->rollback (TEH_plugin->cls, session); ret = TEH_RESPONSE_reply_coin_insufficient_funds (connection, TALER_EC_PAYBACK_COIN_BALANCE_ZERO, tl); TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); return ret; } TEH_plugin->free_coin_transaction_list (TEH_plugin->cls, tl); now = GNUNET_TIME_absolute_get (); (void) GNUNET_TIME_round_abs (&now); /* add coin to list of wire transfers for payback */ ret = TEH_plugin->insert_payback_request (TEH_plugin->cls, session, &reserve_pub, coin, coin_sig, coin_blind, &amount, h_blind, now); if (GNUNET_SYSERR == ret) { TALER_LOG_WARNING ("Failed to store /payback information in database\n"); TEH_plugin->rollback (TEH_plugin->cls, session); return TEH_RESPONSE_reply_internal_db_error (connection, TALER_EC_PAYBACK_DB_PUT_FAILED); } COMMIT_TRANSACTION(session, connection); return TEH_RESPONSE_reply_payback_success (connection, &coin->coin_pub, &reserve_pub, &amount, now); } /* end of taler-exchange-httpd_db.c */