/* This file is part of TALER (C) 2014 GNUnet e.V. TALER is free software; you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with TALER; see the file COPYING. If not, If not, see */ /** * @file taler-mint-httpd_refresh.c * @brief Handle /refresh/ requests * @author Florian Dold * @author Benedikt Mueller * @author Christian Grothoff * * TODO: * - split /refresh/reveal properly into parsing, DB-ops and response generation * - error handling * - document functions properly */ #include "platform.h" #include #include #include #include #include #include "mint.h" #include "mint_db.h" #include "taler_signatures.h" #include "taler_json_lib.h" #include "taler-mint-httpd_parsing.h" #include "taler-mint-httpd_keys.h" #include "taler-mint-httpd_mhd.h" #include "taler-mint-httpd_refresh.h" #include "taler-mint-httpd_responses.h" static int check_confirm_signature (struct MHD_Connection *connection, json_t *coin_info, const struct GNUNET_CRYPTO_EcdsaPublicKey *coin_pub, const struct GNUNET_CRYPTO_EddsaPublicKey *session_pub) { struct RefreshMeltConfirmSignRequestBody body; struct GNUNET_CRYPTO_EcdsaSignature sig; int res; body.purpose.size = htonl (sizeof (struct RefreshMeltConfirmSignRequestBody)); body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_MELT_CONFIRM); body.session_pub = *session_pub; res = GNUNET_MINT_parse_navigate_json (connection, coin_info, JNAV_FIELD, "confirm_sig", JNAV_RET_DATA, &sig, sizeof (struct GNUNET_CRYPTO_EcdsaSignature)); if (GNUNET_OK != res) { GNUNET_break (GNUNET_SYSERR != res); return res; } if (GNUNET_OK != GNUNET_CRYPTO_ecdsa_verify (TALER_SIGNATURE_REFRESH_MELT_CONFIRM, &body.purpose, &sig, coin_pub)) { if (MHD_YES != TALER_MINT_reply_json_pack (connection, MHD_HTTP_UNAUTHORIZED, "{s:s}", "error", "signature invalid")) return GNUNET_SYSERR; return GNUNET_NO; } return GNUNET_OK; } /** * Extract public coin information from a JSON object. * * @param connection the connection to send error responses to * @param root the JSON object to extract the coin info from * @return #GNUNET_YES if coin public info in JSON was valid * #GNUNET_NO JSON was invalid, response was generated * #GNUNET_SYSERR on internal error */ static int request_json_require_coin_public_info (struct MHD_Connection *connection, json_t *root, struct TALER_CoinPublicInfo *r_public_info) { int ret; struct GNUNET_CRYPTO_rsa_Signature *sig; struct GNUNET_CRYPTO_rsa_PublicKey *pk; struct GNUNET_MINT_ParseFieldSpec spec[] = { TALER_MINT_PARSE_FIXED("coin_pub", &r_public_info->coin_pub), TALER_MINT_PARSE_VARIABLE("denom_sig"), TALER_MINT_PARSE_VARIABLE("denom_pub"), TALER_MINT_PARSE_END }; ret = TALER_MINT_parse_json_data (connection, root, spec); if (GNUNET_OK != ret) return ret; sig = GNUNET_CRYPTO_rsa_signature_decode (spec[1].destination, spec[1].destination_size_out); pk = GNUNET_CRYPTO_rsa_public_key_decode (spec[2].destination, spec[2].destination_size_out); TALER_MINT_release_parsed_data (spec); if ( (NULL == pk) || (NULL == sig) ) { if (NULL != sig) GNUNET_CRYPTO_rsa_signature_free (sig); if (NULL != pk) GNUNET_CRYPTO_rsa_public_key_free (pk); // FIXME: send error reply... return GNUNET_NO; } r_public_info->denom_sig = sig; r_public_info->denom_pub = pk; return GNUNET_OK; } /** * Verify a signature that is encoded in a JSON object * * @param connection the connection to send errors to * @param root the JSON object with the signature * @param the public key that the signature was created with * @param purpose the signed message * @return #GNUNET_YES if the signature was valid * #GNUNET_NO if the signature was invalid * #GNUNET_SYSERR on internal error */ static int request_json_check_signature (struct MHD_Connection *connection, json_t *root, struct GNUNET_CRYPTO_EddsaPublicKey *pub, struct GNUNET_CRYPTO_EccSignaturePurpose *purpose) { struct GNUNET_CRYPTO_EddsaSignature signature; int size; uint32_t purpose_num; int res; json_t *el; res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "sig", JNAV_RET_DATA, &signature, sizeof (struct GNUNET_CRYPTO_EddsaSignature)); if (GNUNET_OK != res) return res; res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "purpose", JNAV_RET_TYPED_JSON, JSON_INTEGER, &el); if (GNUNET_OK != res) return res; purpose_num = json_integer_value (el); if (purpose_num != ntohl (purpose->purpose)) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (purpose wrong)\n"); return TALER_MINT_reply_json_pack (connection, MHD_HTTP_BAD_REQUEST, "{s:s}", "error", "signature invalid (purpose)"); } res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "size", JNAV_RET_TYPED_JSON, JSON_INTEGER, &el); if (GNUNET_OK != res) return res; size = json_integer_value (el); if (size != ntohl (purpose->size)) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (size wrong)\n"); return TALER_MINT_reply_json_pack (connection, MHD_HTTP_BAD_REQUEST, GNUNET_NO, GNUNET_SYSERR, "{s:s}", "error", "signature invalid (size)"); } if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify (purpose_num, purpose, &signature, pub)) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "signature invalid (did not verify)\n"); return TALER_MINT_reply_json_pack (connection, MHD_HTTP_UNAUTHORIZED, "{s:s}", "error", "invalid signature (verification)"); } return GNUNET_OK; } /** * Handle a "/refresh/melt" request * * @param rh context of the handler * @param connection the MHD connection to handle * @param[IN|OUT] connection_cls the connection's closure (can be updated) * @param upload_data upload data * @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data * @return MHD result code */ int TALER_MINT_handler_refresh_melt (struct RequestHandler *rh, struct MHD_Connection *connection, void **connection_cls, const char *upload_data, size_t *upload_data_size) { json_t *root; struct GNUNET_CRYPTO_EddsaPublicKey refresh_session_pub; int res; json_t *new_denoms; unsigned int num_new_denoms; unsigned int i; struct GNUNET_CRYPTO_rsa_PublicKey *denom_pubs; json_t *melt_coins; struct TALER_CoinPublicInfo *coin_public_infos; unsigned int coin_count; struct GNUNET_HashContext *hash_context; struct GNUNET_HashCode melt_hash; struct MintKeyState *key_state; struct RefreshMeltSignatureBody body; json_t *melt_sig_json; char *buf; size_t buf_size; res = TALER_MINT_parse_post_json (connection, connection_cls, upload_data, upload_data_size, &root); if (GNUNET_SYSERR == res) return MHD_NO; if ( (GNUNET_NO == res) || (NULL == root) ) return MHD_YES; /* session_pub field must always be present */ res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "session_pub", JNAV_RET_DATA, &refresh_session_pub, sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)); if (GNUNET_OK != res) { // FIXME: return 'internal error'? GNUNET_break (0); return MHD_NO; } if (GNUNET_NO == res) return MHD_YES; res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "new_denoms", JNAV_RET_TYPED_JSON, JSON_ARRAY, &new_denoms); if (GNUNET_OK != res) return res; num_new_denoms = json_array_size (new_denoms); denom_pubs = GNUNET_malloc (num_new_denoms * sizeof (struct GNUNET_CRYPTO_rsa_PublicKey *)); for (i=0;i kappa) { GNUNET_break_op (0); // FIXME: generate error message return MHD_NO; } res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "coin_evs", JNAV_INDEX, (int) 0, JNAV_RET_DATA, JSON_ARRAY, &coin_detail); if (GNUNET_OK != res) return res; num_newcoins = json_array_size (coin_detail); res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_pubs", JNAV_RET_TYPED_JSON, JSON_ARRAY, &transfer_pubs); if (GNUNET_OK != res) return res; if (json_array_size (transfer_pubs) != kappa) { GNUNET_break_op (0); // FIXME: generate error message return MHD_NO; } res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_pubs", JNAV_INDEX, (int) 0, JNAV_RET_DATA, JSON_ARRAY, &coin_detail); if (GNUNET_OK != res) return res; num_oldcoins = json_array_size (coin_detail); hash_context = GNUNET_CRYPTO_hash_context_start (); commit_coin = GNUNET_malloc (kappa * sizeof (struct RefreshCommitCoin *)); for (i = 0; i < kappa; i++) { commit_coin[i] = GNUNET_malloc (num_newcoins * sizeof (struct RefreshCommitCoin)); for (j = 0; j < num_newcoins; j++) { res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "coin_evs", JNAV_INDEX, (int) i, JNAV_INDEX, (int) j, JNAV_RET_DATA_VAR, &commit_coin[i][j].coin_ev, &commit_coin[i][j].coin_ev_size); if (GNUNET_OK != res) { // FIXME: return 'internal error'? GNUNET_break (0); GNUNET_CRYPTO_hash_context_abort (hash_context); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } GNUNET_CRYPTO_hash_context_read (hash_context, commit_coin[i][j].coin_ev, commit_coin[i][j].coin_ev_size); res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "link_encs", JNAV_INDEX, (int) i, JNAV_INDEX, (int) j, JNAV_RET_DATA, commit_coin[i][j].link_enc, TALER_REFRESH_LINK_LENGTH); if (GNUNET_OK != res) { // FIXME: return 'internal error'? GNUNET_break (0); GNUNET_CRYPTO_hash_context_abort (hash_context); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } GNUNET_CRYPTO_hash_context_read (hash_context, commit_coin[i][j].link_enc, TALER_REFRESH_LINK_LENGTH); commit_coin[i][j].cnc_index = i; commit_coin[i][j].newcoin_index = j; commit_coin[i][j].session_pub = refresh_session_pub; } } commit_link = GNUNET_malloc (kappa * sizeof (struct RefreshCommitLink *)); for (i = 0; i < kappa; i++) { commit_link[i] = GNUNET_malloc (num_oldcoins * sizeof (struct RefreshCommitLink)); for (j = 0; j < num_oldcoins; j++) { res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_pubs", JNAV_INDEX, (int) i, JNAV_INDEX, (int) j, JNAV_RET_DATA, &commit_link[i][j].transfer_pub, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)); if (GNUNET_OK != res) { GNUNET_break (GNUNET_SYSERR != res); GNUNET_CRYPTO_hash_context_abort (hash_context); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } GNUNET_CRYPTO_hash_context_read (hash_context, &commit_link[i][j].transfer_pub, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)); res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "secret_encs", JNAV_INDEX, (int) i, JNAV_INDEX, (int) j, JNAV_RET_DATA, commit_link[i][j].shared_secret_enc, TALER_REFRESH_SHARED_SECRET_LENGTH); if (GNUNET_OK != res) { GNUNET_break (GNUNET_SYSERR != res); GNUNET_CRYPTO_hash_context_abort (hash_context); return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } GNUNET_CRYPTO_hash_context_read (hash_context, commit_link[i][j].shared_secret_enc, TALER_REFRESH_SHARED_SECRET_LENGTH); commit_link[i][j].cnc_index = i; commit_link[i][j].oldcoin_index = j; commit_link[i][j].session_pub = refresh_session_pub; } } GNUNET_CRYPTO_hash_context_finish (hash_context, &commit_hash); commit_sig_json = json_object_get (root, "commit_signature"); if (NULL == commit_sig_json) { return TALER_MINT_reply_json_pack (connection, MHD_HTTP_BAD_REQUEST, "{s:s}", "error", "commit_signature missing"); } body.commit_hash = commit_hash; body.purpose.purpose = htonl (TALER_SIGNATURE_REFRESH_COMMIT); body.purpose.size = htonl (sizeof (struct RefreshCommitSignatureBody)); if (GNUNET_OK != (res = request_json_check_signature (connection, commit_sig_json, &refresh_session_pub, &body.purpose))) { return (GNUNET_SYSERR == res) ? MHD_NO : MHD_YES; } res = TALER_MINT_db_execute_refresh_commit (connection, &refresh_session_pub, kappa, num_oldcoins, num_newcoins, commit_coin, commit_link); // FIXME: free memory return res; } /** * Handle a "/refresh/reveal" request * * @param rh context of the handler * @param connection the MHD connection to handle * @param[IN|OUT] connection_cls the connection's closure (can be updated) * @param upload_data upload data * @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data * @return MHD result code */ int TALER_MINT_handler_refresh_reveal (struct RequestHandler *rh, struct MHD_Connection *connection, void **connection_cls, const char *upload_data, size_t *upload_data_size) { struct GNUNET_CRYPTO_EddsaPublicKey refresh_session_pub; int res; unsigned int kappa; unsigned int num_oldcoins; json_t *transfer_p; json_t *reveal_detail; unsigned int i; unsigned int j; json_t *root; struct GNUNET_CRYPTO_EcdsaPrivateKey **transfer_privs; res = TALER_MINT_parse_post_json (connection, connection_cls, upload_data, upload_data_size, &root); if (GNUNET_SYSERR == res) return MHD_NO; if ( (GNUNET_NO == res) || (NULL == root) ) return MHD_YES; res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "session_pub", JNAV_RET_DATA, &refresh_session_pub, sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)); if (GNUNET_OK != res) { GNUNET_break (GNUNET_SYSERR != res); return res; } /* Determine dimensionality of the request (kappa and #old coins) */ res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_privs", JNAV_RET_TYPED_JSON, JSON_ARRAY, &transfer_p); if (GNUNET_OK != res) return res; kappa = json_array_size (transfer_p) + 1; /* 1 row is missing */ if (3 > kappa) { GNUNET_break_op (0); // FIXME: generate error message return MHD_NO; } res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_privs", JNAV_INDEX, 0, JNAV_RET_TYPED_JSON, JSON_ARRAY, &reveal_detail); if (GNUNET_OK != res) return res; num_oldcoins = json_array_size (reveal_detail); transfer_privs = GNUNET_malloc ((kappa - 1) * sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey *)); for (i = 0; i < kappa - 1; i++) { transfer_privs[i] = GNUNET_malloc (num_oldcoins * sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey)); for (j = 0; j < num_oldcoins; j++) { res = GNUNET_MINT_parse_navigate_json (connection, root, JNAV_FIELD, "transfer_privs", JNAV_INDEX, (int) i, JNAV_INDEX, (int) j, JNAV_RET_DATA, &transfer_privs[i][j], sizeof (struct GNUNET_CRYPTO_EddsaPrivateKey)); if (GNUNET_OK != res) { GNUNET_break (0); // FIXME: return 'internal error'? return MHD_NO; } } } res = TALER_MINT_db_execute_refresh_reveal (connection, &refresh_session_pub, kappa, num_oldcoins, transfer_privs); // FIXME: free memory return res; } /** * Handle a "/refresh/link" request * * @param rh context of the handler * @param connection the MHD connection to handle * @param[IN|OUT] connection_cls the connection's closure (can be updated) * @param upload_data upload data * @param[IN|OUT] upload_data_size number of bytes (left) in @a upload_data * @return MHD result code */ int TALER_MINT_handler_refresh_link (struct RequestHandler *rh, struct MHD_Connection *connection, void **connection_cls, const char *upload_data, size_t *upload_data_size) { struct GNUNET_CRYPTO_EcdsaPublicKey coin_pub; int res; res = TALER_MINT_mhd_request_arg_data (connection, "coin_pub", &coin_pub, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)); if (GNUNET_SYSERR == res) { // FIXME: return 'internal error' GNUNET_break (0); return MHD_NO; } if (GNUNET_OK != res) return MHD_YES; return TALER_MINT_db_execute_refresh_link (connection, &coin_pub); } /* end of taler-mint-httpd_refresh.c */