summaryrefslogtreecommitdiff
path: root/src/util/secmod_signatures.c
blob: e7542c1e1ba9402604ddc45147e26a88f088a444 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
/*
  This file is part of TALER
  Copyright (C) 2020 Taler Systems SA

  TALER is free software; you can redistribute it and/or modify it under the
  terms of the GNU General Public License as published by the Free Software
  Foundation; either version 3, or (at your option) any later version.

  TALER is distributed in the hope that it will be useful, but WITHOUT ANY
  WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
  A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

  You should have received a copy of the GNU General Public License along with
  TALER; see the file COPYING.  If not, see <http://www.gnu.org/licenses/>
*/
/**
 * @file secmod_signatures.c
 * @brief Utility functions for Taler security module signatures
 * @author Christian Grothoff
 */
#include "platform.h"
#include "taler_util.h"
#include "taler_signatures.h"


void
TALER_exchange_secmod_eddsa_sign (
  const struct TALER_ExchangePublicKeyP *exchange_pub,
  struct GNUNET_TIME_Absolute start_sign,
  struct GNUNET_TIME_Relative duration,
  const struct TALER_SecurityModulePrivateKeyP *secm_priv,
  struct TALER_SecurityModuleSignatureP *secm_sig)
{
  struct TALER_SigningKeyAnnouncementPS ska = {
    .purpose.purpose = htonl (TALER_SIGNATURE_SM_SIGNING_KEY),
    .purpose.size = htonl (sizeof (ska)),
    .exchange_pub = *exchange_pub,
    .anchor_time = GNUNET_TIME_absolute_hton (start_sign),
    .duration = GNUNET_TIME_relative_hton (duration)
  };

  GNUNET_CRYPTO_eddsa_sign (&secm_priv->eddsa_priv,
                            &ska,
                            &secm_sig->eddsa_signature);
}


int
TALER_exchange_secmod_eddsa_verify (
  const struct TALER_ExchangePublicKeyP *exchange_pub,
  struct GNUNET_TIME_Absolute start_sign,
  struct GNUNET_TIME_Relative duration,
  const struct TALER_SecurityModulePublicKeyP *secm_pub,
  const struct TALER_SecurityModuleSignatureP *secm_sig)
{
  struct TALER_SigningKeyAnnouncementPS ska = {
    .purpose.purpose = htonl (TALER_SIGNATURE_SM_SIGNING_KEY),
    .purpose.size = htonl (sizeof (ska)),
    .exchange_pub = *exchange_pub,
    .anchor_time = GNUNET_TIME_absolute_hton (start_sign),
    .duration = GNUNET_TIME_relative_hton (duration)
  };

  return
    GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_SM_SIGNING_KEY,
                                &ska,
                                &secm_sig->eddsa_signature,
                                &secm_pub->eddsa_pub);
}


void
TALER_exchange_secmod_rsa_sign (
  const struct GNUNET_HashCode *h_denom_pub,
  const char *section_name,
  struct GNUNET_TIME_Absolute start_sign,
  struct GNUNET_TIME_Relative duration,
  const struct TALER_SecurityModulePrivateKeyP *secm_priv,
  struct TALER_SecurityModuleSignatureP *secm_sig)
{
  struct TALER_DenominationKeyAnnouncementPS dka = {
    .purpose.purpose = htonl (TALER_SIGNATURE_SM_DENOMINATION_KEY),
    .purpose.size = htonl (sizeof (dka)),
    .h_denom_pub = *h_denom_pub,
    .anchor_time = GNUNET_TIME_absolute_hton (start_sign),
    .duration_withdraw = GNUNET_TIME_relative_hton (duration)
  };

  GNUNET_CRYPTO_hash (section_name,
                      strlen (section_name) + 1,
                      &dka.h_section_name);
  GNUNET_CRYPTO_eddsa_sign (&secm_priv->eddsa_priv,
                            &dka,
                            &secm_sig->eddsa_signature);

}


int
TALER_exchange_secmod_rsa_verify (
  const struct GNUNET_HashCode *h_denom_pub,
  const char *section_name,
  struct GNUNET_TIME_Absolute start_sign,
  struct GNUNET_TIME_Relative duration,
  const struct TALER_SecurityModulePublicKeyP *secm_pub,
  const struct TALER_SecurityModuleSignatureP *secm_sig)
{
  struct TALER_DenominationKeyAnnouncementPS dka = {
    .purpose.purpose = htonl (TALER_SIGNATURE_SM_DENOMINATION_KEY),
    .purpose.size = htonl (sizeof (dka)),
    .h_denom_pub = *h_denom_pub,
    .anchor_time = GNUNET_TIME_absolute_hton (start_sign),
    .duration_withdraw = GNUNET_TIME_relative_hton (duration)
  };

  GNUNET_CRYPTO_hash (section_name,
                      strlen (section_name) + 1,
                      &dka.h_section_name);
  return
    GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_SM_DENOMINATION_KEY,
                                &dka,
                                &secm_sig->eddsa_signature,
                                &secm_pub->eddsa_pub);
}


/* end of secmod_signatures.c */