donau

Donation authority for GNU Taler (experimental)
Log | Files | Refs | Submodules | README | LICENSE

commit 0c92b119cae8da2eb033d98a494d084860f0fe2e
parent 093dce0f0f3fbfe3abafb8645d21a3fab2c9dc90
Author: Matyja Lukas Adam <lukas.matyja@students.bfh.ch>
Date:   Thu, 19 Oct 2023 13:13:20 +0200

[header] rough implementation charity get, adjust donau crypto header

Diffstat:
Msrc/include/taler_donau_crypto_lib.h | 5702+------------------------------------------------------------------------------
Msrc/include/taler_donau_service.h | 225++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-----------------
2 files changed, 199 insertions(+), 5728 deletions(-)

diff --git a/src/include/taler_donau_crypto_lib.h b/src/include/taler_donau_crypto_lib.h @@ -20,12 +20,12 @@ * @author Christian Grothoff <christian@grothoff.org> * @author Özgür Kesim <oec-taler@kesim.org> */ -#if ! defined (__TALER_UTIL_LIB_H_INSIDE__) -#error "Only <taler_util.h> can be included directly." +#if ! defined (__TALER_DONAU_UTIL_LIB_H_INSIDE__) +#error "Only <taler_donau_util.h> can be included directly." #endif -#ifndef TALER_CRYPTO_LIB_H -#define TALER_CRYPTO_LIB_H +#ifndef TALER_DONAU_CRYPTO_LIB_H +#define TALER_DONAU_CRYPTO_LIB_H #include <gnunet/gnunet_util_lib.h> #include "taler_error_codes.h" @@ -33,5716 +33,56 @@ #include <jansson.h> -/** - * Maximum number of donation units we allow per operation. - */ -#define TALER_MAX_FRESH_DONATION_UNITS 256 - -/* ****************** Coin crypto primitives ************* */ - -GNUNET_NETWORK_STRUCT_BEGIN - -/** - * @brief Type of public keys for Taler security modules (software or hardware). - * Note that there are usually at least two security modules (RSA and EdDSA), - * each with its own private key. - */ -struct TALER_SecurityModulePublicKeyP -{ - /** - * Taler uses EdDSA for security modules. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - -/** - * @brief Set of the public keys of the security modules - */ -struct TALER_SecurityModulePublicKeySetP -{ - /** - * Public key of the RSA security module - */ - struct TALER_SecurityModulePublicKeyP rsa; - - /** - * Public key of the CS security module - */ - struct TALER_SecurityModulePublicKeyP cs; - - /** - * Public key of the eddsa security module - */ - struct TALER_SecurityModulePublicKeyP eddsa; -}; - -/** - * @brief Type of private keys for Taler security modules (software or hardware). - */ -struct TALER_SecurityModulePrivateKeyP -{ - /** - * Taler uses EdDSA for security modules. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures used for Taler security modules (software or hardware). - */ -struct TALER_SecurityModuleSignatureP -{ - /** - * Taler uses EdDSA for security modules. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * @brief Type of public keys for Taler reserves. - */ -struct TALER_ReservePublicKeyP -{ - /** - * Taler uses EdDSA for reserves. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of private keys for Taler reserves. - */ -struct TALER_ReservePrivateKeyP -{ - /** - * Taler uses EdDSA for reserves. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures used with Taler reserves. - */ -struct TALER_ReserveSignatureP -{ - /** - * Taler uses EdDSA for reserves. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * @brief Type of public keys to for charity authorizations. - * Charities can issue refunds using the corresponding - * private key. - */ -struct TALER_CharityPublicKeyP -{ - /** - * Taler uses EdDSA for charities. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of private keys for charity authorizations. - * Charities can issue refunds using the corresponding - * private key. - */ -struct TALER_CharityPrivateKeyP -{ - /** - * Taler uses EdDSA for charities. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures made by charities. - */ -struct TALER_CharitySignatureP -{ - /** - * Taler uses EdDSA for charities. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_sig; -}; - - -/** - * @brief Type of transfer public keys used during refresh - * operations. - */ -struct TALER_TransferPublicKeyP -{ - /** - * Taler uses ECDHE for transfer keys. - */ - struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub; -}; - - -/** - * @brief Type of transfer private keys used during refresh - * operations. - */ -struct TALER_TransferPrivateKeyP -{ - /** - * Taler uses ECDHE for melting session keys. - */ - struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv; -}; +/* ****************** donau crypto primitives ************* */ /** - * @brief Type of public keys used for contract - * encryption. + * Hash of a donation unit public key */ -struct TALER_ContractDiffiePublicP +struct TALER_DonationUnitHashP { - /** - * Taler uses ECDHE for contract encryption. - */ - struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub; + struct GNUNET_HashCode hash; }; - /** - * @brief Type of private keys used for contract - * encryption. - */ -struct TALER_ContractDiffiePrivateP + * Donor's hashed and salted unique donation identifier. + */ +struct TALER_DONAU_HashDonorTaxId { - /** - * Taler uses ECDHE for contract encryption. - */ - struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv; + struct GNUNET_HashCode hash; }; - /** - * @brief Type of online public keys used by the donau to sign - * messages. + * blind signatures from the blinded donation envelopes. */ -struct TALER_DonauPublicKeyP +struct TALER_BlindedDonationUnitSignature { /** - * Taler uses EdDSA for online donau message signing. + * The blinded signature */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - + struct TALER_DenominationSignature b_sig; -/** - * @brief Type of online public keys used by the donau to - * sign messages. - */ -struct TALER_DonauPrivateKeyP -{ - /** - * Taler uses EdDSA for online signatures sessions. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; }; - /** - * @brief Type of signatures used by the donau to sign messages online. + * @brief Type of signature used by the donau for non-blind signatures. */ struct TALER_DonauSignatureP { /** - * Taler uses EdDSA for online signatures sessions. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * @brief Type of the offline master public key used by the donau. - */ -struct TALER_MasterPublicKeyP -{ - /** - * Taler uses EdDSA for the long-term offline master key. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of the offline master public keys used by the donau. - */ -struct TALER_MasterPrivateKeyP -{ - /** - * Taler uses EdDSA for the long-term offline master key. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures by the offline master public key used by the donau. - */ -struct TALER_MasterSignatureP -{ - /** - * Taler uses EdDSA for the long-term offline master key. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * @brief Type of the private key used by the auditor. - */ -struct TALER_AuditorPrivateKeyP -{ - /** - * Taler uses EdDSA for the auditor's signing key. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of the public key used by the auditor. - */ -struct TALER_AuditorPublicKeyP -{ - /** - * Taler uses EdDSA for the auditor's signing key. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of signatures used by the auditor. - */ -struct TALER_AuditorSignatureP -{ - /** - * Taler uses EdDSA signatures for auditors. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_sig; -}; - - -/** - * @brief Type of public keys for Taler coins. The same key material is used - * for EdDSA and ECDHE operations. - */ -struct TALER_CoinSpendPublicKeyP -{ - /** - * Taler uses EdDSA for coins when signing deposit requests. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; - -}; - - -/** - * @brief Type of private keys for Taler coins. The same key material is used - * for EdDSA and ECDHE operations. - */ -struct TALER_CoinSpendPrivateKeyP -{ - /** - * Taler uses EdDSA for coins when signing deposit requests. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - -/** - * @brief Type of signatures made with Taler coins. - */ -struct TALER_CoinSpendSignatureP -{ - /** - * Taler uses EdDSA for coins. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * @brief Type of online public keys used by the wallet to establish a purse and the associated contract meta data. - */ -struct TALER_PurseContractPublicKeyP -{ - /** - * Taler uses EdDSA for purse message signing. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of online private keys used by the wallet to - * bind a purse to a particular contract (and other meta data). - */ -struct TALER_PurseContractPrivateKeyP -{ - /** - * Taler uses EdDSA for online signatures sessions. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures used by the wallet to sign purse creation messages online. - */ -struct TALER_PurseContractSignatureP -{ - /** - * Taler uses EdDSA for online signatures sessions. + * Donau uses EdDSA for for non-blind signatures. */ struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; }; - -/** - * @brief Type of online public keys used by the wallet to - * sign a merge of a purse into an account. - */ -struct TALER_PurseMergePublicKeyP -{ - /** - * Taler uses EdDSA for purse message signing. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of online private keys used by the wallet to - * sign a merge of a purse into an account. - */ -struct TALER_PurseMergePrivateKeyP -{ - /** - * Taler uses EdDSA for online signatures sessions. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - /** - * @brief Type of signatures used by the wallet to sign purse merge requests online. + * @brief Type of signature used by charities */ -struct TALER_PurseMergeSignatureP +struct TALER_DONAU_CharitySignatureP { /** - * Taler uses EdDSA for online signatures sessions. + * Charities use EdDSA signatures. */ struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; }; - - -/** - * @brief Type of online public keys used by AML officers. - */ -struct TALER_AmlOfficerPublicKeyP -{ - /** - * Taler uses EdDSA for AML decision signing. - */ - struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub; -}; - - -/** - * @brief Type of online private keys used to identify - * AML officers. - */ -struct TALER_AmlOfficerPrivateKeyP -{ - /** - * Taler uses EdDSA for AML decision signing. - */ - struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv; -}; - - -/** - * @brief Type of signatures used by AML officers. - */ -struct TALER_AmlOfficerSignatureP -{ - /** - * Taler uses EdDSA for AML decision signing. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - - -/** - * Possible AML decision states. - */ -enum TALER_AmlDecisionState -{ - - /** - * All AML requirements are currently satisfied. - */ - TALER_AML_NORMAL = 0, - - /** - * An AML investigation is pending. - */ - TALER_AML_PENDING = 1, - - /** - * An AML decision has concluded that the funds must be frozen. - */ - TALER_AML_FROZEN = 2 - -}; - - -/** - * Possible algorithms for confirmation code generation. - */ -enum TALER_CharityConfirmationAlgorithm -{ - - /** - * No purchase confirmation. - */ - TALER_MCA_NONE = 0, - - /** - * Purchase confirmation without payment - */ - TALER_MCA_WITHOUT_PRICE = 1, - - /** - * Purchase confirmation with payment - */ - TALER_MCA_WITH_PRICE = 2 - -}; - - -/** - * @brief Type of blinding keys for Taler. - * must be 32 bytes (DB) - */ -union TALER_DenominationBlindingKeyP -{ - /** - * Clause Schnorr Signatures have 2 blinding secrets, each containing two unpredictable values. (must be 32 bytes) - */ - struct GNUNET_CRYPTO_CsNonce nonce; - - /** - * Taler uses RSA for blind signatures. - */ - struct GNUNET_CRYPTO_RsaBlindingKeySecret rsa_bks; -}; - - -/** - * Commitment value for the refresh protocol. - * See #TALER_refresh_get_commitment(). - */ -struct TALER_RefreshCommitmentP -{ - /** - * The commitment is a hash code. - */ - struct GNUNET_HashCode session_hash; -}; - - -/** - * Symmetric key we use to encrypt KYC attributes - * in our database. - */ -struct TALER_AttributeEncryptionKeyP -{ - /** - * The key is a hash code. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Token used for access control to the charity's unclaimed - * orders. - */ -struct TALER_ClaimTokenP -{ - /** - * The token is a 128-bit UUID. - */ - struct GNUNET_Uuid token; -}; - - -/** - * Salt used to hash a charity's payto:// URI to - * compute the "h_wire" (say for deposit requests). - */ -struct TALER_WireSaltP -{ - /** - * Actual 128-bit salt value. - */ - uint32_t salt[4]; -}; - - -/** - * Hash used to represent an CS public key. Does not include age - * restrictions and is ONLY for CS. Used ONLY for interactions with the CS - * security module. - */ -struct TALER_CsPubHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent an RSA public key. Does not include age - * restrictions and is ONLY for RSA. Used ONLY for interactions with the RSA - * security module. - */ -struct TALER_RsaPubHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Master key material for the deriviation of - * private coins and blinding factors during - * withdraw or refresh. - */ -struct TALER_PlanchetMasterSecretP -{ - - /** - * Key material. - */ - uint32_t key_data[8]; - -}; - - -/** - * Master key material for the deriviation of - * private coins and blinding factors. - */ -struct TALER_RefreshMasterSecretP -{ - - /** - * Key material. - */ - uint32_t key_data[8]; - -}; - - -/** - * Hash used to represent a denomination public key - * and associated age restrictions (if any). - */ -struct TALER_DenominationHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent the private part - * of a contract between charity and consumer. - */ -struct TALER_PrivateContractHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent the policy extension to a deposit - */ -struct TALER_ExtensionPolicyHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent the salted hash of a - * charity's bank account. - */ -struct TALER_CharityWireHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent the unsalted hash of a - * payto:// URI representing a bank account. - */ -struct TALER_PaytoHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_ShortHashCode hash; -}; - - -/** - * Hash used to represent a commitment to a blinded - * coin, i.e. the hash of the envelope. - */ -struct TALER_BlindedCoinHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * Hash used to represent the hash of the public - * key of a coin (without blinding). - */ -struct TALER_CoinPubHashP -{ - /** - * Actual hash value. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * @brief Value that uniquely identifies a reward. - */ -struct TALER_RewardIdentifierP -{ - /** - * The tip identifier is a SHA-512 hash code. - */ - struct GNUNET_HashCode hash; -}; - - -/** - * @brief Value that uniquely identifies a tip pick up operation. - */ -struct TALER_PickupIdentifierP -{ - /** - * The pickup identifier is a SHA-512 hash code. - */ - struct GNUNET_HashCode hash; -}; - -GNUNET_NETWORK_STRUCT_END - - -/** - * @brief Builds POS confirmation token to verify payment. - * - * @param pos_key encoded key for verification payment - * @param pos_alg algorithm to compute the payment verification - * @param total of the order paid - * @param ts is the time given - * @return POS token on success, NULL otherwise - */ -char * -TALER_build_pos_confirmation (const char *pos_key, - enum TALER_CharityConfirmationAlgorithm pos_alg, - const struct TALER_Amount *total, - struct GNUNET_TIME_Timestamp ts); - -/** - * Hash @a rsa. - * - * @param rsa key to hash - * @param[out] h_rsa where to write the result - */ -void -TALER_rsa_pub_hash (const struct GNUNET_CRYPTO_RsaPublicKey *rsa, - struct TALER_RsaPubHashP *h_rsa); - -/** - * Hash @a cs. - *DENOMINATION - * @param cs key to hash - * @param[out] h_cs where to write the result - */ -void -TALER_cs_pub_hash (const struct GNUNET_CRYPTO_CsPublicKey *cs, - struct TALER_CsPubHashP *h_cs); - - -/** - * Types of public keys used for denominations in Taler. - */ -enum TALER_DonationUnitCipher -{ - - /** - * Invalid type of signature. - */ - TALER_DONATION_UNIT_INVALID = 0, - - /** - * RSA blind signature. - */ - TALER_DONATION_UNIT_RSA = 1, - - /** - * Clause Blind Schnorr signature. - */ - TALER_DONATION_UNIT_CS = 2 -}; - - -/** - * @brief Type of (unblinded) coin signatures for Taler. - */ -struct TALER_DenominationSignature -{ - - /** - * Type of the signature. - */ - enum TALER_DenominationCipher cipher; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - */ - struct GNUNET_CRYPTO_CsSignature cs_signature; - - /** - * If we use #TALER_DENOMINATION_RSA in @a cipher. - */ - struct GNUNET_CRYPTO_RsaSignature *rsa_signature; - - } details; - -}; - -/** - * The Sign Answer for Clause Blind Schnorr signature. - * The sign operation returns a parameter @param b and the signature - * scalar @param s_scalar. - */ -struct TALER_BlindedDenominationCsSignAnswer -{ - /** - * To make ROS problem harder, the signer chooses an unpredictable b and only calculates signature of c_b - */ - unsigned int b; - - /** - * The blinded s scalar calculated from c_b - */ - struct GNUNET_CRYPTO_CsBlindS s_scalar; -}; - -/** - * @brief Type for *blinded* denomination signatures for Taler. - * Must be unblinded before it becomes valid. - */ -struct TALER_BlindedDenominationSignature -{ - - /** - * Type of the signature. - */ - enum TALER_DenominationCipher cipher; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - * At this point only the blinded s scalar is used. - * The final signature consisting of r,s is built after unblinding. - */ - struct TALER_BlindedDenominationCsSignAnswer blinded_cs_answer; - - /** - * If we use #TALER_DENOMINATION_RSA in @a cipher. - */ - struct GNUNET_CRYPTO_RsaSignature *blinded_rsa_signature; - - } details; - -}; - -/* *************** Age Restriction *********************************** */ - -/* - * @brief Type of a list of age groups, represented as bit mask. - * - * The bits set in the mask mark the edges at the beginning of a next age - * group. F.e. for the age groups - * 0-7, 8-9, 10-11, 12-13, 14-15, 16-17, 18-21, 21-* - * the following bits are set: - * - * 31 24 16 8 0 - * | | | | | - * oooooooo oo1oo1o1 o1o1o1o1 ooooooo1 - * - * A value of 0 means that the donau does not support the extension for - * age-restriction. - * - * For a non-0 age mask, the 0th bit always must be set, otherwise the age - * mask is considered invalid. - */ -struct TALER_AgeMask -{ - uint32_t bits; -}; - -/** - * @brief Age commitment of a coin. - */ -struct TALER_AgeCommitmentHash -{ - /** - * The commitment is a SHA-256 hash code. - */ - struct GNUNET_ShortHashCode shash; -}; - -/** - * @brief Signature of an age with the private key for the corresponding age group of an age commitment. - */ -struct TALER_AgeAttestation -{ -#ifdef AGE_RESTRICTION_WITH_ECDSA - struct GNUNET_CRYPTO_EcdsaSignature signature; -#else - struct GNUNET_CRYPTO_Edx25519Signature signature; -#endif -}; - -#define TALER_AgeCommitmentHash_isNullOrZero(ph) ((NULL == ph) || \ - GNUNET_is_zero (ph)) - -/** - * @brief Type of public signing keys for verifying blindly signed coins. - */ -struct TALER_DenominationPublicKey -{ - - /** - * Type of the public key. - */ - enum TALER_DenominationCipher cipher; - - /** - * Age restriction mask used for the key. - */ - struct TALER_AgeMask age_mask; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - */ - struct GNUNET_CRYPTO_CsPublicKey cs_public_key; - - /** - * If we use #TALER_DENOMINATION_RSA in @a cipher. - */ - struct GNUNET_CRYPTO_RsaPublicKey *rsa_public_key; - - } details; -}; - - -/** - * @brief Type of private signing keys for blind signing of coins. - */ -struct TALER_DenominationPrivateKey -{ - - /** - * Type of the public key. - */ - enum TALER_DenominationCipher cipher; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - */ - struct GNUNET_CRYPTO_CsPrivateKey cs_private_key; - - /** - * If we use #TALER_DENOMINATION_RSA in @a cipher. - */ - struct GNUNET_CRYPTO_RsaPrivateKey *rsa_private_key; - - } details; -}; - -/** - * @brief RSA Parameters to create blinded signature - * - */ -struct TALER_BlindedRsaPlanchet -{ - /** - * Blinded message to be signed - * Note: is malloc()'ed! - */ - void *blinded_msg; - - /** - * Size of the @e blinded_msg to be signed. - */ - size_t blinded_msg_size; -}; - - -/** - * Withdraw nonce for CS denominations - */ -struct TALER_CsNonce -{ - /** - * 32 bit nonce to include in withdrawals when using CS. - */ - struct GNUNET_CRYPTO_CsNonce nonce; -}; - - -/** - * @brief CS Parameters to create blinded signature - */ -struct TALER_BlindedCsPlanchet -{ - /** - * The Clause Schnorr c_0 and c_1 containing the blinded message - */ - struct GNUNET_CRYPTO_CsC c[2]; - - /** - * Public nonce. - */ - struct TALER_CsNonce nonce; -}; - - -/** - * @brief Type including Parameters to create blinded signature - */ -struct TALER_BlindedPlanchet -{ - /** - * Type of the sign blinded message - */ - enum TALER_DenominationCipher cipher; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - */ - struct TALER_BlindedCsPlanchet cs_blinded_planchet; - - /** - * If we use #TALER_DENOMINATION_RSA in @a cipher. - */ - struct TALER_BlindedRsaPlanchet rsa_blinded_planchet; - - } details; -}; - - -/** - * Pair of Public R values for Cs denominations - */ -struct TALER_DenominationCSPublicRPairP -{ - struct GNUNET_CRYPTO_CsRPublic r_pub[2]; -}; - - -/** - * Secret r for Cs denominations - */ -struct TALER_DenominationCSPrivateRPairP -{ - struct GNUNET_CRYPTO_CsRSecret r[2]; -}; - - -/** - * @brief Public information about a coin (including the public key - * of the coin, the denomination key and the signature with - * the denomination key). - */ -struct TALER_CoinPublicInfo -{ - /** - * The coin's public key. - */ - struct TALER_CoinSpendPublicKeyP coin_pub; - - /** - * Hash of the public key representing the denomination of the coin that is - * being deposited. - */ - struct TALER_DenominationHashP denom_pub_hash; - - /** - * Hash of the age commitment. If no age commitment was provided, it must be - * set to all zeroes. - */ - struct TALER_AgeCommitmentHash h_age_commitment; - - /** - * True, if age commitment is not applicable. - */ - bool no_age_commitment; - - /** - * (Unblinded) signature over @e coin_pub with @e denom_pub, - * which demonstrates that the coin is valid. - */ - struct TALER_DenominationSignature denom_sig; -}; - - -/** - * Details for one of the /deposit operations that the - * donau combined into a single wire transfer. - */ -struct TALER_TrackTransferDetails -{ - /** - * Hash of the proposal data. - */ - struct TALER_PrivateContractHashP h_contract_terms; - - /** - * Which coin was deposited? - */ - struct TALER_CoinSpendPublicKeyP coin_pub; - - /** - * Value of the deposit (including fee). - */ - struct TALER_Amount coin_value; - - /** - * Fee charged by the donau for the deposit. - */ - struct TALER_Amount coin_fee; - -}; - - -/** - * @brief Type of algorithm specific Values for withdrawal - */ -struct TALER_DonauWithdrawValues -{ - - /** - * Type of the signature. - */ - enum TALER_DenominationCipher cipher; - - /** - * Details, depending on @e cipher. - */ - union - { - /** - * If we use #TALER_DENOMINATION_CS in @a cipher. - */ - struct TALER_DenominationCSPublicRPairP cs_values; - - } details; - -}; - - -/** - * Free internals of @a denom_pub, but not @a denom_pub itself. - * - * @param[in] denom_pub key to free - */ -void -TALER_denom_pub_free (struct TALER_DenominationPublicKey *denom_pub); - - -/** - * Create private key for a Taler coin. - * @param ps planchet secret to derive coin priv key - * @param alg_values includes algorithm specific values - * @param[out] coin_priv private key to initialize - */ -void -TALER_planchet_setup_coin_priv ( - const struct TALER_PlanchetMasterSecretP *ps, - const struct TALER_DonauWithdrawValues *alg_values, - struct TALER_CoinSpendPrivateKeyP *coin_priv); - - -/** - * @brief Method to derive withdraw /csr nonce - * - * @param ps planchet secrets of the coin - * @param[out] nonce withdraw nonce included in the request to generate R_0 and R_1 - */ -void -TALER_cs_withdraw_nonce_derive ( - const struct TALER_PlanchetMasterSecretP *ps, - struct TALER_CsNonce *nonce); - - -/** - * @brief Method to derive /csr nonce - * to be used during refresh/melt operation. - * - * @param rms secret input for the refresh operation - * @param idx index of the fresh coin - * @param[out] nonce set to nonce included in the request to generate R_0 and R_1 - */ -void -TALER_cs_refresh_nonce_derive ( - const struct TALER_RefreshMasterSecretP *rms, - uint32_t idx, - struct TALER_CsNonce *nonce); - - -/** - * Initialize denomination public-private key pair. - * - * For #TALER_DENOMINATION_RSA, an additional "unsigned int" - * argument with the number of bits for 'n' (e.g. 2048) must - * be passed. - * - * @param[out] denom_priv where to write the private key - * @param[out] denom_pub where to write the public key - * @param cipher which type of cipher to use - * @param ... RSA key size (eg. 2048/3072/4096) - * @return #GNUNET_OK on success, #GNUNET_NO if parameters were invalid - */ -enum GNUNET_GenericReturnValue -TALER_denom_priv_create (struct TALER_DenominationPrivateKey *denom_priv, - struct TALER_DenominationPublicKey *denom_pub, - enum TALER_DenominationCipher cipher, - ...); - - -/** - * Free internals of @a denom_priv, but not @a denom_priv itself. - * - * @param[in] denom_priv key to free - */ -void -TALER_denom_priv_free (struct TALER_DenominationPrivateKey *denom_priv); - - -/** - * Free internals of @a denom_sig, but not @a denom_sig itself. - * - * @param[in] denom_sig signature to free - */ -void -TALER_denom_sig_free (struct TALER_DenominationSignature *denom_sig); - - -/** - * Blind coin for blind signing with @a dk using blinding secret @a coin_bks. - * - * NOTE: As a particular oddity, the @a blinded_planchet is only partially - * initialized by this function in the case of CS-denominations. Here, the - * 'nonce' must be initialized separately! - * - * @param dk denomination public key to blind for - * @param coin_bks blinding secret to use - * @param age_commitment_hash hash of the age commitment to be used for the coin. NULL if no commitment is made. - * @param coin_pub public key of the coin to blind - * @param alg_values algorithm specific values to blind the planchet - * @param[out] c_hash resulting hashed coin - * @param[out] blinded_planchet planchet data to initialize - * @return #GNUNET_OK on success - */ -enum GNUNET_GenericReturnValue -TALER_denom_blind (const struct TALER_DenominationPublicKey *dk, - const union TALER_DenominationBlindingKeyP *coin_bks, - const struct TALER_AgeCommitmentHash *age_commitment_hash, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_DonauWithdrawValues *alg_values, - struct TALER_CoinPubHashP *c_hash, - struct TALER_BlindedPlanchet *blinded_planchet); - - -/** - * Create blinded signature. - * - * @param[out] denom_sig where to write the signature - * @param denom_priv private key to use for signing - * @param for_melt true to use the HKDF for melt - * @param blinded_planchet the planchet already blinded - * @return #GNUNET_OK on success - */ -enum GNUNET_GenericReturnValue -TALER_denom_sign_blinded (struct TALER_BlindedDenominationSignature *denom_sig, - const struct TALER_DenominationPrivateKey *denom_priv, - bool for_melt, - const struct TALER_BlindedPlanchet *blinded_planchet); - - -/** - * Unblind blinded signature. - * - * @param[out] denom_sig where to write the unblinded signature - * @param bdenom_sig the blinded signature - * @param bks blinding secret to use - * @param c_hash hash of the coin's public key for verification of the signature - * @param alg_values algorithm specific values - * @param denom_pub public key used for signing - * @return #GNUNET_OK on success - */ -enum GNUNET_GenericReturnValue -TALER_denom_sig_unblind ( - struct TALER_DenominationSignature *denom_sig, - const struct TALER_BlindedDenominationSignature *bdenom_sig, - const union TALER_DenominationBlindingKeyP *bks, - const struct TALER_CoinPubHashP *c_hash, - const struct TALER_DonauWithdrawValues *alg_values, - const struct TALER_DenominationPublicKey *denom_pub); - - -/** - * Free internals of @a denom_sig, but not @a denom_sig itself. - * - * @param[in] denom_sig signature to free - */ -void -TALER_blinded_denom_sig_free ( - struct TALER_BlindedDenominationSignature *denom_sig); - - -/** - * Compute the hash of the given @a denom_pub. - * - * @param denom_pub public key to hash - * @param[out] denom_hash resulting hash value - */ -void -TALER_denom_pub_hash (const struct TALER_DenominationPublicKey *denom_pub, - struct TALER_DenominationHashP *denom_hash); - - -/** - * Make a (deep) copy of the given @a denom_src to - * @a denom_dst. - * - * @param[out] denom_dst target to copy to - * @param denom_src public key to copy - */ -void -TALER_denom_pub_deep_copy (struct TALER_DenominationPublicKey *denom_dst, - const struct TALER_DenominationPublicKey *denom_src); - - -/** - * Make a (deep) copy of the given @a denom_src to - * @a denom_dst. - * - * @param[out] denom_dst target to copy to - * @param denom_src public key to copy - */ -void -TALER_denom_sig_deep_copy (struct TALER_DenominationSignature *denom_dst, - const struct TALER_DenominationSignature *denom_src); - - -/** - * Make a (deep) copy of the given @a denom_src to - * @a denom_dst. - * - * @param[out] denom_dst target to copy to - * @param denom_src public key to copy - */ -void -TALER_blinded_denom_sig_deep_copy ( - struct TALER_BlindedDenominationSignature *denom_dst, - const struct TALER_BlindedDenominationSignature *denom_src); - - -/** - * Compare two denomination public keys. - * - * @param denom1 first key - * @param denom2 second key - * @return 0 if the keys are equal, otherwise -1 or 1 - */ -int -TALER_denom_pub_cmp (const struct TALER_DenominationPublicKey *denom1, - const struct TALER_DenominationPublicKey *denom2); - - -/** - * Compare two denomination signatures. - * - * @param sig1 first signature - * @param sig2 second signature - * @return 0 if the keys are equal, otherwise -1 or 1 - */ -int -TALER_denom_sig_cmp (const struct TALER_DenominationSignature *sig1, - const struct TALER_DenominationSignature *sig2); - - -/** - * Compare two blinded denomination signatures. - * - * @param sig1 first signature - * @param sig2 second signature - * @return 0 if the keys are equal, otherwise -1 or 1 - */ -int -TALER_blinded_denom_sig_cmp ( - const struct TALER_BlindedDenominationSignature *sig1, - const struct TALER_BlindedDenominationSignature *sig2); - - -/** - * Compare two blinded planchets. - * - * @param bp1 first blinded planchet - * @param bp2 second blinded planchet - * @return 0 if the keys are equal, otherwise -1 or 1 - */ -int -TALER_blinded_planchet_cmp ( - const struct TALER_BlindedPlanchet *bp1, - const struct TALER_BlindedPlanchet *bp2); - - -/** - * Obtain denomination public key from a denomination private key. - * - * @param denom_priv private key to convert - * @param age_mask age mask to be applied - * @param[out] denom_pub where to return the public key - */ -void -TALER_denom_priv_to_pub (const struct TALER_DenominationPrivateKey *denom_priv, - const struct TALER_AgeMask age_mask, - struct TALER_DenominationPublicKey *denom_pub); - - -/** - * Verify signature made with a denomination public key - * over a coin. - * - * @param denom_pub public denomination key - * @param denom_sig signature made with the private key - * @param c_hash hash over the coin - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_denom_pub_verify (const struct TALER_DenominationPublicKey *denom_pub, - const struct TALER_DenominationSignature *denom_sig, - const struct TALER_CoinPubHashP *c_hash); - - -/** - * Encrypts KYC attributes for storage in the database. - * - * @param key encryption key to use - * @param attr set of attributes to encrypt - * @param[out] enc_attr encrypted attribute data - * @param[out] enc_attr_size number of bytes in @a enc_attr - */ -void -TALER_CRYPTO_kyc_attributes_encrypt ( - const struct TALER_AttributeEncryptionKeyP *key, - const json_t *attr, - void **enc_attr, - size_t *enc_attr_size); - - -/** - * Encrypts KYC attributes for storage in the database. - * - * @param key encryption key to use - * @param enc_attr encrypted attribute data - * @param enc_attr_size number of bytes in @a enc_attr - * @return set of decrypted attributes, NULL on failure - */ -json_t * -TALER_CRYPTO_kyc_attributes_decrypt ( - const struct TALER_AttributeEncryptionKeyP *key, - const void *enc_attr, - size_t enc_attr_size); - - -/** - * Takes a set of KYC attributes and extracts key - * data that we use to detect similar / duplicate - * entries in the database. - * - * @param attr set of KYC attributes - * @param[out] kyc_prox set to the proximity hash - */ -void -TALER_CRYPTO_attributes_to_kyc_prox ( - const json_t *attr, - struct GNUNET_ShortHashCode *kyc_prox); - - -/** - * Check if a coin is valid; that is, whether the denomination key exists, - * is not expired, and the signature is correct. - * - * @param coin_public_info the coin public info to check for validity - * @param denom_pub denomination key, must match @a coin_public_info's `denom_pub_hash` - * @return #GNUNET_YES if the coin is valid, - * #GNUNET_NO if it is invalid - * #GNUNET_SYSERR if an internal error occurred - */ -enum GNUNET_GenericReturnValue -TALER_test_coin_valid (const struct TALER_CoinPublicInfo *coin_public_info, - const struct TALER_DenominationPublicKey *denom_pub); - - -/** - * Compute the hash of a blinded coin. - * - * @param blinded_planchet blinded planchet - * @param denom_hash hash of the denomination publick key - * @param[out] bch where to write the hash - * @return #GNUNET_OK when successful, #GNUNET_SYSERR if an internal error occurred - */ -enum GNUNET_GenericReturnValue -TALER_coin_ev_hash (const struct TALER_BlindedPlanchet *blinded_planchet, - const struct TALER_DenominationHashP *denom_hash, - struct TALER_BlindedCoinHashP *bch); - - -/** - * Compute the hash of a coin. - * - * @param coin_pub public key of the coin - * @param age_commitment_hash hash of the age commitment vector. NULL, if no age commitment was set - * @param[out] coin_h where to write the hash - */ -void -TALER_coin_pub_hash (const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_AgeCommitmentHash *age_commitment_hash, - struct TALER_CoinPubHashP *coin_h); - - -/** - * Compute the hash of a payto URI. - * - * @param payto URI to hash - * @param[out] h_payto where to write the hash - */ -void -TALER_payto_hash (const char *payto, - struct TALER_PaytoHashP *h_payto); - - -/** - * Details about a planchet that the donor wants to obtain - * a withdrawal authorization. This is the information that - * will need to be sent to the donau to obtain the blind - * signature required to turn a planchet into a coin. - */ -struct TALER_PlanchetDetail -{ - /** - * Hash of the denomination public key. - */ - struct TALER_DenominationHashP denom_pub_hash; - - /** - * The blinded planchet - */ - struct TALER_BlindedPlanchet blinded_planchet; -}; - - -/** - * Information about a (fresh) coin, returned from the API when we - * finished creating a coin. Note that @e sig needs to be freed - * using the appropriate code. - */ -struct TALER_FreshCoin -{ - - /** - * The donau's signature over the coin's public key. - */ - struct TALER_DenominationSignature sig; - - /** - * The coin's private key. - */ - struct TALER_CoinSpendPrivateKeyP coin_priv; - - /** - * Optional hash of an age commitment bound to this coin, maybe NULL. - */ - const struct TALER_AgeCommitmentHash *h_age_commitment; -}; - - -GNUNET_NETWORK_STRUCT_BEGIN - -/** - * @brief Secret used to decrypt the key to decrypt link secrets. - */ -struct TALER_TransferSecretP -{ - /** - * Secret used to derive private inputs for refreshed coins. - * Must be (currently) a hash as this is what - * GNUNET_CRYPTO_ecc_ecdh() returns to us. - */ - struct GNUNET_HashCode key; -}; - - -/** - * Length of the raw value in the Taler wire transfer identifier - * (in binary representation). - */ -#define TALER_BANK_TRANSFER_IDENTIFIER_LEN 32 - -/** - * #TALER_BANK_TRANSFER_IDENTIFIER_LEN as a string. - */ -#define TALER_BANK_TRANSFER_IDENTIFIER_LEN_STR "32" - - -/** - * Raw value of a wire transfer subjects, without the checksum. - */ -struct TALER_WireTransferIdentifierRawP -{ - - /** - * Raw value. Note that typical payment systems (SEPA, ACH) support - * at least two lines of 27 ASCII characters to encode a transaction - * subject or "details", for a total of 54 characters. (The payment - * system protocols often support more lines, but the forms presented - * to donors are usually limited to 54 characters.) - * - * With a Base32-encoding of 5 bit per character, this gives us 270 - * bits or (rounded down) 33 bytes. So we use the first 32 bytes to - * encode the actual value (i.e. a 256-bit / 32-byte public key or - * a hash code), and the last byte for a minimalistic checksum. - */ - uint8_t raw[TALER_BANK_TRANSFER_IDENTIFIER_LEN]; -}; - - -/** - * Raw value of a wire transfer subject for a wad. - */ -struct TALER_WadIdentifierP -{ - - /** - * Wad identifier, in binary encoding. - */ - uint8_t raw[24]; -}; - - -/** - * Binary information encoded in Crockford's Base32 in wire transfer - * subjects of transfers from Taler to a charity. The actual value - * is chosen by the donau and has no particular semantics, other than - * being unique so that the donau can lookup details about the wire - * transfer when needed. - */ -struct TALER_WireTransferIdentifierP -{ - - /** - * Raw value. - */ - struct TALER_WireTransferIdentifierRawP raw; - - /** - * Checksum using CRC8 over the @e raw data. - */ - uint8_t crc8; -}; - - -GNUNET_NETWORK_STRUCT_END - - -/** - * Setup information for a fresh coin, deriving the coin planchet secrets from - * which we will later derive the private key and the blinding factor. The - * planchet secrets derivation is based on the @a secret_seed with a KDF - * salted by the @a coin_num_salt. - * - * @param secret_seed seed to use for KDF to derive coin keys - * @param coin_num_salt number of the coin to include in KDF - * @param[out] ps value to initialize - */ -void -TALER_transfer_secret_to_planchet_secret ( - const struct TALER_TransferSecretP *secret_seed, - uint32_t coin_num_salt, - struct TALER_PlanchetMasterSecretP *ps); - - -/** - * Derive the @a coin_num transfer private key @a tpriv from a refresh from - * the @a rms seed and the @a old_coin_pub of the refresh operation. The - * transfer private key derivation is based on the @a ps with a KDF salted by - * the @a coin_num. - * - * @param rms seed to use for KDF to derive transfer keys - * @param old_coin_priv private key of the old coin - * @param cnc_num cut and choose number to include in KDF - * @param[out] tpriv value to initialize - */ -void -TALER_planchet_secret_to_transfer_priv ( - const struct TALER_RefreshMasterSecretP *rms, - const struct TALER_CoinSpendPrivateKeyP *old_coin_priv, - uint32_t cnc_num, - struct TALER_TransferPrivateKeyP *tpriv); - - -/** - * Setup secret seed information for fresh coins to be - * withdrawn. - * - * @param[out] ps value to initialize - */ -void -TALER_planchet_master_setup_random ( - struct TALER_PlanchetMasterSecretP *ps); - - -/** - * Setup secret seed for fresh coins to be refreshed. - * - * @param[out] rms value to initialize - */ -void -TALER_refresh_master_setup_random ( - struct TALER_RefreshMasterSecretP *rms); - - -/** - * Create a blinding secret @a bks given the client's @a ps and the alg_values - * from the donau. - * - * @param ps secret to derive blindings from - * @param alg_values withdraw values containing cipher and additional CS values - * @param[out] bks blinding secrets - */ -void -TALER_planchet_blinding_secret_create ( - const struct TALER_PlanchetMasterSecretP *ps, - const struct TALER_DonauWithdrawValues *alg_values, - union TALER_DenominationBlindingKeyP *bks); - - -/** - * Prepare a planchet for withdrawal. Creates and blinds a coin. - * - * @param dk denomination key for the coin to be created - * @param alg_values algorithm specific values - * @param bks blinding secrets - * @param coin_priv coin private key - * @param ach hash of age commitment to bind to this coin, maybe NULL - * @param[out] c_hash set to the hash of the public key of the coin (needed later) - * @param[out] pd set to the planchet detail for TALER_CHARITY_tip_pickup() and - * other withdraw operations, `pd->blinded_planchet.cipher` will be set - * to cipher from @a dk - * @return #GNUNET_OK on success - */ -enum GNUNET_GenericReturnValue -TALER_planchet_prepare (const struct TALER_DenominationPublicKey *dk, - const struct TALER_DonauWithdrawValues *alg_values, - const union TALER_DenominationBlindingKeyP *bks, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - const struct TALER_AgeCommitmentHash *ach, - struct TALER_CoinPubHashP *c_hash, - struct TALER_PlanchetDetail *pd); - - -/** - * Frees blinded message inside blinded planchet depending on `blinded_planchet->cipher`. - * Does not free the @a blinded_planchet itself! - * - * @param[in] blinded_planchet blinded planchet - */ -void -TALER_blinded_planchet_free (struct TALER_BlindedPlanchet *blinded_planchet); - - -/** - * Frees blinded message inside planchet detail @a pd. - * - * @param[in] pd planchet detail to free - */ -void -TALER_planchet_detail_free (struct TALER_PlanchetDetail *pd); - - -/** - * Obtain a coin from the planchet's secrets and the blind signature - * of the donau. - * - * @param dk denomination key, must match what was given to #TALER_planchet_prepare() - * @param blind_sig blind signature from the donau - * @param bks blinding key secret - * @param coin_priv private key of the coin - * @param ach hash of age commitment that is bound to this coin, maybe NULL - * @param c_hash hash of the coin's public key for verification of the signature - * @param alg_values values obtained from the donau for the withdrawal - * @param[out] coin set to the details of the fresh coin - * @return #GNUNET_OK on success - */ -enum GNUNET_GenericReturnValue -TALER_planchet_to_coin ( - const struct TALER_DenominationPublicKey *dk, - const struct TALER_BlindedDenominationSignature *blind_sig, - const union TALER_DenominationBlindingKeyP *bks, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - const struct TALER_AgeCommitmentHash *ach, - const struct TALER_CoinPubHashP *c_hash, - const struct TALER_DonauWithdrawValues *alg_values, - struct TALER_FreshCoin *coin); - - -/** - * Add the hash of the @a bp (in some canonicalized form) - * to the @a hash_context. - * - * @param bp blinded planchet to hash - * @param[in,out] hash_context hash context to use - */ -void -TALER_blinded_planchet_hash_ (const struct TALER_BlindedPlanchet *bp, - struct GNUNET_HashContext *hash_context); - - -/** - * Given the coin and the transfer private keys, compute the - * transfer secret. (Technically, we only need one of the two - * private keys, but the caller currently trivially only has - * the two private keys, so we derive one of the public keys - * internally to this function.) - * - * @param coin_priv coin key - * @param trans_priv transfer private key - * @param[out] ts computed transfer secret - */ -void -TALER_link_derive_transfer_secret ( - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - const struct TALER_TransferPrivateKeyP *trans_priv, - struct TALER_TransferSecretP *ts); - - -/** - * Decrypt the shared @a secret from the information in the - * @a trans_priv and @a coin_pub. - * - * @param trans_priv transfer private key - * @param coin_pub coin public key - * @param[out] transfer_secret set to the shared secret - */ -void -TALER_link_reveal_transfer_secret ( - const struct TALER_TransferPrivateKeyP *trans_priv, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - struct TALER_TransferSecretP *transfer_secret); - - -/** - * Decrypt the shared @a secret from the information in the - * @a trans_priv and @a coin_pub. - * - * @param trans_pub transfer private key - * @param coin_priv coin public key - * @param[out] transfer_secret set to the shared secret - */ -void -TALER_link_recover_transfer_secret ( - const struct TALER_TransferPublicKeyP *trans_pub, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_TransferSecretP *transfer_secret); - - -/** - * Information about a coin to be created during a refresh operation. - */ -struct TALER_RefreshCoinData -{ - - /** - * The denomination's public key. - */ - const struct TALER_DenominationPublicKey *dk; - - /** - * The blinded planchet (details depend on cipher). - */ - struct TALER_BlindedPlanchet blinded_planchet; - -}; - - -/** - * One of the #TALER_CNC_KAPPA commitments. - */ -struct TALER_RefreshCommitmentEntry -{ - /** - * Transfer public key of this commitment. - */ - struct TALER_TransferPublicKeyP transfer_pub; - - /** - * Array of @e num_new_coins new coins to be created. - */ - struct TALER_RefreshCoinData *new_coins; -}; - - -/** - * Compute the commitment for a /refresh/melt operation from - * the respective public inputs. - * - * @param[out] rc set to the value the wallet must commit to - * @param kappa number of transfer public keys involved (must be #TALER_CNC_KAPPA) - * @param rms refresh master secret to include, can be NULL! - * @param num_new_coins number of new coins to be created - * @param rcs array of @a kappa commitments - * @param coin_pub public key of the coin to be melted - * @param amount_with_fee amount to be melted, including fee - */ -void -TALER_refresh_get_commitment (struct TALER_RefreshCommitmentP *rc, - uint32_t kappa, - const struct TALER_RefreshMasterSecretP *rms, - uint32_t num_new_coins, - const struct TALER_RefreshCommitmentEntry *rcs, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_Amount *amount_with_fee); - - -/** - * Encrypt contract for transmission to a party that will - * merge it into a reserve. - * - * @param purse_pub public key of the purse - * @param contract_priv private key of the contract - * @param merge_priv merge capability to include - * @param contract_terms contract terms to encrypt - * @param[out] econtract set to encrypted contract - * @param[out] econtract_size set to number of bytes in @a econtract - */ -void -TALER_CRYPTO_contract_encrypt_for_merge ( - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_ContractDiffiePrivateP *contract_priv, - const struct TALER_PurseMergePrivateKeyP *merge_priv, - const json_t *contract_terms, - void **econtract, - size_t *econtract_size); - - -/** - * Decrypt contract for the party that will - * merge it into a reserve. - * - * @param purse_pub public key of the purse - * @param contract_priv private key of the contract - * @param econtract encrypted contract - * @param econtract_size number of bytes in @a econtract - * @param[out] merge_priv set to merge capability - * @return decrypted contract terms, or NULL on failure - */ -json_t * -TALER_CRYPTO_contract_decrypt_for_merge ( - const struct TALER_ContractDiffiePrivateP *contract_priv, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const void *econtract, - size_t econtract_size, - struct TALER_PurseMergePrivateKeyP *merge_priv); - - -/** - * Encrypt contract for transmission to a party that will - * pay for it. - * - * @param purse_pub public key of the purse - * @param contract_priv private key of the contract - * @param contract_terms contract terms to encrypt - * @param[out] econtract set to encrypted contract - * @param[out] econtract_size set to number of bytes in @a econtract - */ -void -TALER_CRYPTO_contract_encrypt_for_deposit ( - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_ContractDiffiePrivateP *contract_priv, - const json_t *contract_terms, - void **econtract, - size_t *econtract_size); - - -/** - * Decrypt contract for the party that will pay for it. - * - * @param contract_priv private key of the contract - * @param econtract encrypted contract - * @param econtract_size number of bytes in @a econtract - * @return decrypted contract terms, or NULL on failure - */ -json_t * -TALER_CRYPTO_contract_decrypt_for_deposit ( - const struct TALER_ContractDiffiePrivateP *contract_priv, - const void *econtract, - size_t econtract_size); - - -/* **************** AML officer signatures **************** */ - -/** - * Sign AML query. Simple authentication, doesn't actually - * sign anything. - * - * @param officer_priv private key of AML officer - * @param[out] officer_sig where to write the signature - */ -void -TALER_officer_aml_query_sign ( - const struct TALER_AmlOfficerPrivateKeyP *officer_priv, - struct TALER_AmlOfficerSignatureP *officer_sig); - - -/** - * Verify AML query authorization. - * - * @param officer_pub public key of AML officer - * @param officer_sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_officer_aml_query_verify ( - const struct TALER_AmlOfficerPublicKeyP *officer_pub, - const struct TALER_AmlOfficerSignatureP *officer_sig); - - -/** - * Sign AML decision. - * - * @param justification human-readable justification - * @param decision_time when was the decision made - * @param new_threshold at what monthly amount threshold - * should a revision be triggered - * @param h_payto payto URI hash of the account the - * decision is about - * @param new_state updated AML state - * @param kyc_requirements additional KYC requirements to - * impose, can be NULL - * @param officer_priv private key of AML officer - * @param[out] officer_sig where to write the signature - */ -void -TALER_officer_aml_decision_sign ( - const char *justification, - struct GNUNET_TIME_Timestamp decision_time, - const struct TALER_Amount *new_threshold, - const struct TALER_PaytoHashP *h_payto, - enum TALER_AmlDecisionState new_state, - const json_t *kyc_requirements, - const struct TALER_AmlOfficerPrivateKeyP *officer_priv, - struct TALER_AmlOfficerSignatureP *officer_sig); - - -/** - * Verify AML decision. - * - * @param justification human-readable justification - * @param decision_time when was the decision made - * @param new_threshold at what monthly amount threshold - * should a revision be triggered - * @param h_payto payto URI hash of the account the - * decision is about - * @param new_state updated AML state - * @param kyc_requirements additional KYC requirements to - * impose, can be NULL - * @param officer_pub public key of AML officer - * @param officer_sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_officer_aml_decision_verify ( - const char *justification, - struct GNUNET_TIME_Timestamp decision_time, - const struct TALER_Amount *new_threshold, - const struct TALER_PaytoHashP *h_payto, - enum TALER_AmlDecisionState new_state, - const json_t *kyc_requirements, - const struct TALER_AmlOfficerPublicKeyP *officer_pub, - const struct TALER_AmlOfficerSignatureP *officer_sig); - - -/* **************** Helper-based RSA operations **************** */ - -/** - * Handle for talking to an Denomination key signing helper. - */ -struct TALER_CRYPTO_RsaDenominationHelper; - -/** - * Function called with information about available keys for signing. Usually - * only called once per key upon connect. Also called again in case a key is - * being revoked, in that case with an @a end_time of zero. - * - * @param cls closure - * @param section_name name of the denomination type in the configuration; - * NULL if the key has been revoked or purged - * @param start_time when does the key become available for signing; - * zero if the key has been revoked or purged - * @param validity_duration how long does the key remain available for signing; - * zero if the key has been revoked or purged - * @param h_rsa hash of the RSA @a denom_pub that is available (or was purged) - * @param denom_pub the public key itself, NULL if the key was revoked or purged - * @param sm_pub public key of the security module, NULL if the key was revoked or purged - * @param sm_sig signature from the security module, NULL if the key was revoked or purged - * The signature was already verified against @a sm_pub. - */ -typedef void -(*TALER_CRYPTO_RsaDenominationKeyStatusCallback)( - void *cls, - const char *section_name, - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Relative validity_duration, - const struct TALER_RsaPubHashP *h_rsa, - const struct TALER_DenominationPublicKey *denom_pub, - const struct TALER_SecurityModulePublicKeyP *sm_pub, - const struct TALER_SecurityModuleSignatureP *sm_sig); - - -/** - * Initiate connection to an denomination key helper. - * - * @param cfg configuration to use - * @param dkc function to call with key information - * @param dkc_cls closure for @a dkc - * @return NULL on error (such as bad @a cfg). - */ -struct TALER_CRYPTO_RsaDenominationHelper * -TALER_CRYPTO_helper_rsa_connect ( - const struct GNUNET_CONFIGURATION_Handle *cfg, - TALER_CRYPTO_RsaDenominationKeyStatusCallback dkc, - void *dkc_cls); - - -/** - * Function to call to 'poll' for updates to the available key material. - * Should be called whenever it is important that the key material status is - * current, like when handling a "/keys" request. This function basically - * briefly checks if there are messages from the helper announcing changes to - * denomination keys. - * - * @param dh helper process connection - */ -void -TALER_CRYPTO_helper_rsa_poll (struct TALER_CRYPTO_RsaDenominationHelper *dh); - - -/** - * Information needed for an RSA signature request. - */ -struct TALER_CRYPTO_RsaSignRequest -{ - /** - * Hash of the RSA public key. - */ - const struct TALER_RsaPubHashP *h_rsa; - - /** - * Message to be (blindly) signed. - */ - const void *msg; - - /** - * Number of bytes in @e msg. - */ - size_t msg_size; -}; - - -/** - * Request helper @a dh to sign message in @a rsr using the public key - * corresponding to the key in @a rsr. - * - * This operation will block until the signature has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param dh helper process connection - * @param rsr details about the requested signature - * @param[out] bs set to the blind signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_rsa_sign ( - struct TALER_CRYPTO_RsaDenominationHelper *dh, - const struct TALER_CRYPTO_RsaSignRequest *rsr, - struct TALER_BlindedDenominationSignature *bs); - - -/** - * Request helper @a dh to batch sign messages in @a rsrs using the public key - * corresponding to the keys in @a rsrs. - * - * This operation will block until all the signatures have been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * Note that in case of errors, the @a bss array may still have been partially - * filled with signatures, which in this case must be freed by the caller - * (this is in contrast to the #TALER_CRYPTO_helper_rsa_sign() API which never - * returns any signatures if there was an error). - * - * @param dh helper process connection - * @param rsrs array with details about the requested signatures - * @param rsrs_length length of the @a rsrs array - * @param[out] bss array set to the blind signatures, must be of length @a rsrs_length! - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_rsa_batch_sign ( - struct TALER_CRYPTO_RsaDenominationHelper *dh, - const struct TALER_CRYPTO_RsaSignRequest *rsrs, - unsigned int rsrs_length, - struct TALER_BlindedDenominationSignature *bss); - - -/** - * Ask the helper to revoke the public key associated with @a h_denom_pub. - * Will cause the helper to tell all clients that the key is now unavailable, - * and to create a replacement key. - * - * This operation will block until the revocation request has been - * transmitted. Should this process receive a signal (that is not ignored) - * while the operation is pending, the operation may fail. If the key is - * unknown, this function will also appear to have succeeded. To be sure that - * the revocation worked, clients must watch the denomination key status - * callback. - * - * @param dh helper to process connection - * @param h_rsa hash of the RSA public key to revoke - */ -void -TALER_CRYPTO_helper_rsa_revoke ( - struct TALER_CRYPTO_RsaDenominationHelper *dh, - const struct TALER_RsaPubHashP *h_rsa); - - -/** - * Close connection to @a dh. - * - * @param[in] dh connection to close - */ -void -TALER_CRYPTO_helper_rsa_disconnect ( - struct TALER_CRYPTO_RsaDenominationHelper *dh); - - -/* **************** Helper-based CS operations **************** */ - -/** - * Handle for talking to an Denomination key signing helper. - */ -struct TALER_CRYPTO_CsDenominationHelper; - -/** - * Function called with information about available keys for signing. Usually - * only called once per key upon connect. Also called again in case a key is - * being revoked, in that case with an @a end_time of zero. - * - * @param cls closure - * @param section_name name of the denomination type in the configuration; - * NULL if the key has been revoked or purged - * @param start_time when does the key become available for signing; - * zero if the key has been revoked or purged - * @param validity_duration how long does the key remain available for signing; - * zero if the key has been revoked or purged - * @param h_cs hash of the CS @a denom_pub that is available (or was purged) - * @param denom_pub the public key itself, NULL if the key was revoked or purged - * @param sm_pub public key of the security module, NULL if the key was revoked or purged - * @param sm_sig signature from the security module, NULL if the key was revoked or purged - * The signature was already verified against @a sm_pub. - */ -typedef void -(*TALER_CRYPTO_CsDenominationKeyStatusCallback)( - void *cls, - const char *section_name, - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Relative validity_duration, - const struct TALER_CsPubHashP *h_cs, - const struct TALER_DenominationPublicKey *denom_pub, - const struct TALER_SecurityModulePublicKeyP *sm_pub, - const struct TALER_SecurityModuleSignatureP *sm_sig); - - -/** - * Initiate connection to an denomination key helper. - * - * @param cfg configuration to use - * @param dkc function to call with key information - * @param dkc_cls closure for @a dkc - * @return NULL on error (such as bad @a cfg). - */ -struct TALER_CRYPTO_CsDenominationHelper * -TALER_CRYPTO_helper_cs_connect ( - const struct GNUNET_CONFIGURATION_Handle *cfg, - TALER_CRYPTO_CsDenominationKeyStatusCallback dkc, - void *dkc_cls); - - -/** - * Function to call to 'poll' for updates to the available key material. - * Should be called whenever it is important that the key material status is - * current, like when handling a "/keys" request. This function basically - * briefly checks if there are messages from the helper announcing changes to - * denomination keys. - * - * @param dh helper process connection - */ -void -TALER_CRYPTO_helper_cs_poll (struct TALER_CRYPTO_CsDenominationHelper *dh); - - -/** - * Information about what we should sign over. - */ -struct TALER_CRYPTO_CsSignRequest -{ - /** - * Hash of the CS public key to use to sign. - */ - const struct TALER_CsPubHashP *h_cs; - - /** - * Blinded planchet containing c and the nonce. - */ - const struct TALER_BlindedCsPlanchet *blinded_planchet; -}; - - -/** - * Request helper @a dh to sign @a req. - * - * This operation will block until the signature has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param dh helper process connection - * @param req information about the key to sign with and the value to sign - * @param for_melt true if for melt operation - * @param[out] bs set to the blind signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_cs_sign ( - struct TALER_CRYPTO_CsDenominationHelper *dh, - const struct TALER_CRYPTO_CsSignRequest *req, - bool for_melt, - struct TALER_BlindedDenominationSignature *bs); - - -/** - * Request helper @a dh to sign batch of @a reqs requests. - * - * This operation will block until the signature has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param dh helper process connection - * @param reqs information about the keys to sign with and the values to sign - * @param reqs_length length of the @a reqs array - * @param for_melt true if this is for a melt operation - * @param[out] bss array set to the blind signatures, must be of length @a reqs_length! - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_cs_batch_sign ( - struct TALER_CRYPTO_CsDenominationHelper *dh, - const struct TALER_CRYPTO_CsSignRequest *reqs, - unsigned int reqs_length, - bool for_melt, - struct TALER_BlindedDenominationSignature *bss); - - -/** - * Ask the helper to revoke the public key associated with @a h_cs. - * Will cause the helper to tell all clients that the key is now unavailable, - * and to create a replacement key. - * - * This operation will block until the revocation request has been - * transmitted. Should this process receive a signal (that is not ignored) - * while the operation is pending, the operation may fail. If the key is - * unknown, this function will also appear to have succeeded. To be sure that - * the revocation worked, clients must watch the denomination key status - * callback. - * - * @param dh helper to process connection - * @param h_cs hash of the CS public key to revoke - */ -void -TALER_CRYPTO_helper_cs_revoke ( - struct TALER_CRYPTO_CsDenominationHelper *dh, - const struct TALER_CsPubHashP *h_cs); - - -/** - * Information about what we should derive for. - */ -struct TALER_CRYPTO_CsDeriveRequest -{ - /** - * Hash of the CS public key to use to sign. - */ - const struct TALER_CsPubHashP *h_cs; - - /** - * Nonce to use. - */ - const struct TALER_CsNonce *nonce; -}; - - -/** - * Ask the helper to derive R using the information - * from @a cdr. - * - * This operation will block until the R has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param dh helper to process connection - * @param cdr derivation input data - * @param for_melt true if this is for a melt operation - * @param[out] crp set to the pair of R values - * @return set to the error code (or #TALER_EC_NONE on success) - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_cs_r_derive ( - struct TALER_CRYPTO_CsDenominationHelper *dh, - const struct TALER_CRYPTO_CsDeriveRequest *cdr, - bool for_melt, - struct TALER_DenominationCSPublicRPairP *crp); - - -/** - * Ask the helper to derive R using the information from @a cdrs. - * - * This operation will block until the R has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param dh helper to process connection - * @param cdrs array with derivation input data - * @param cdrs_length length of the @a cdrs array - * @param for_melt true if this is for a melt operation - * @param[out] crps array set to the pair of R values, must be of length @a cdrs_length - * @return set to the error code (or #TALER_EC_NONE on success) - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_cs_r_batch_derive ( - struct TALER_CRYPTO_CsDenominationHelper *dh, - const struct TALER_CRYPTO_CsDeriveRequest *cdrs, - unsigned int cdrs_length, - bool for_melt, - struct TALER_DenominationCSPublicRPairP *crps); - - -/** - * Close connection to @a dh. - * - * @param[in] dh connection to close - */ -void -TALER_CRYPTO_helper_cs_disconnect ( - struct TALER_CRYPTO_CsDenominationHelper *dh); - -/** - * Handle for talking to an online key signing helper. - */ -struct TALER_CRYPTO_DonauSignHelper; - -/** - * Function called with information about available keys for signing. Usually - * only called once per key upon connect. Also called again in case a key is - * being revoked, in that case with an @a end_time of zero. - * - * @param cls closure - * @param start_time when does the key become available for signing; - * zero if the key has been revoked or purged - * @param validity_duration how long does the key remain available for signing; - * zero if the key has been revoked or purged - * @param donau_pub the public key itself, NULL if the key was revoked or purged - * @param sm_pub public key of the security module, NULL if the key was revoked or purged - * @param sm_sig signature from the security module, NULL if the key was revoked or purged - * The signature was already verified against @a sm_pub. - */ -typedef void -(*TALER_CRYPTO_DonauKeyStatusCallback)( - void *cls, - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Relative validity_duration, - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_SecurityModulePublicKeyP *sm_pub, - const struct TALER_SecurityModuleSignatureP *sm_sig); - - -/** - * Initiate connection to an online signing key helper. - * - * @param cfg configuration to use - * @param ekc function to call with key information - * @param ekc_cls closure for @a ekc - * @return NULL on error (such as bad @a cfg). - */ -struct TALER_CRYPTO_DonauSignHelper * -TALER_CRYPTO_helper_esign_connect ( - const struct GNUNET_CONFIGURATION_Handle *cfg, - TALER_CRYPTO_DonauKeyStatusCallback ekc, - void *ekc_cls); - - -/** - * Function to call to 'poll' for updates to the available key material. - * Should be called whenever it is important that the key material status is - * current, like when handling a "/keys" request. This function basically - * briefly checks if there are messages from the helper announcing changes to - * donau online signing keys. - * - * @param esh helper process connection - */ -void -TALER_CRYPTO_helper_esign_poll (struct TALER_CRYPTO_DonauSignHelper *esh); - - -/** - * Request helper @a esh to sign @a msg using the current online - * signing key. - * - * This operation will block until the signature has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param esh helper process connection - * @param purpose message to sign (must extend beyond the purpose) - * @param[out] donau_pub set to the public key used for the signature upon success - * @param[out] donau_sig set to the signature upon success - * @return the error code (or #TALER_EC_NONE on success) - */ -enum TALER_ErrorCode -TALER_CRYPTO_helper_esign_sign_ ( - struct TALER_CRYPTO_DonauSignHelper *esh, - const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose, - struct TALER_DonauPublicKeyP *donau_pub, - struct TALER_DonauSignatureP *donau_sig); - - -/** - * Request helper @a esh to sign @a msg using the current online - * signing key. - * - * This operation will block until the signature has been obtained. Should - * this process receive a signal (that is not ignored) while the operation is - * pending, the operation will fail. Note that the helper may still believe - * that it created the signature. Thus, signals may result in a small - * differences in the signature counters. Retrying in this case may work. - * - * @param esh helper process connection - * @param ps message to sign (MUST begin with a purpose) - * @param[out] epub set to the public key used for the signature upon success - * @param[out] esig set to the signature upon success - * @return the error code (or #TALER_EC_NONE on success) - */ -#define TALER_CRYPTO_helper_esign_sign(esh,ps,epub,esig) ( \ - /* check size is set correctly */ \ - GNUNET_assert (ntohl ((ps)->purpose.size) == sizeof (*ps)), \ - /* check 'ps' begins with the purpose */ \ - GNUNET_static_assert (((void*) (ps)) == \ - ((void*) &(ps)->purpose)), \ - TALER_CRYPTO_helper_esign_sign_ (esh, \ - &(ps)->purpose, \ - epub, \ - esig) ) - - -/** - * Ask the helper to revoke the public key @a donau_pub . - * Will cause the helper to tell all clients that the key is now unavailable, - * and to create a replacement key. - * - * This operation will block until the revocation request has been - * transmitted. Should this process receive a signal (that is not ignored) - * while the operation is pending, the operation may fail. If the key is - * unknown, this function will also appear to have succeeded. To be sure that - * the revocation worked, clients must watch the signing key status callback. - * - * @param esh helper to process connection - * @param donau_pub the public key to revoke - */ -void -TALER_CRYPTO_helper_esign_revoke ( - struct TALER_CRYPTO_DonauSignHelper *esh, - const struct TALER_DonauPublicKeyP *donau_pub); - - -/** - * Close connection to @a esh. - * - * @param[in] esh connection to close - */ -void -TALER_CRYPTO_helper_esign_disconnect ( - struct TALER_CRYPTO_DonauSignHelper *esh); - - -/* ********************* wallet signing ************************** */ - - -/** - * Sign a request to create a purse. - * - * @param purse_expiration when should the purse expire - * @param h_contract_terms contract the two parties agree on - * @param merge_pub public key defining the merge capability - * @param min_age age restriction to apply for deposits into the purse - * @param amount total amount in the purse (including fees) - * @param purse_priv key identifying the purse - * @param[out] purse_sig resulting signature - */ -void -TALER_wallet_purse_create_sign ( - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_PurseMergePublicKeyP *merge_pub, - uint32_t min_age, - const struct TALER_Amount *amount, - const struct TALER_PurseContractPrivateKeyP *purse_priv, - struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Verify a purse creation request. - * - * @param purse_expiration when should the purse expire - * @param h_contract_terms contract the two parties agree on - * @param merge_pub public key defining the merge capability - * @param min_age age restriction to apply for deposits into the purse - * @param amount total amount in the purse (including fees) - * @param purse_pub purse’s public key - * @param purse_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_CREATE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_purse_create_verify ( - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_PurseMergePublicKeyP *merge_pub, - uint32_t min_age, - const struct TALER_Amount *amount, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Sign a request to delete a purse. - * - * @param purse_priv key identifying the purse - * @param[out] purse_sig resulting signature - */ -void -TALER_wallet_purse_delete_sign ( - const struct TALER_PurseContractPrivateKeyP *purse_priv, - struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Verify a purse deletion request. - * - * @param purse_pub purse’s public key - * @param purse_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_DELETE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_purse_delete_verify ( - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Sign a request to upload an encrypted contract. - * - * @param econtract encrypted contract - * @param econtract_size number of bytes in @a econtract - * @param contract_pub public key for the DH-encryption - * @param purse_priv key identifying the purse - * @param[out] purse_sig resulting signature - */ -void -TALER_wallet_econtract_upload_sign ( - const void *econtract, - size_t econtract_size, - const struct TALER_ContractDiffiePublicP *contract_pub, - const struct TALER_PurseContractPrivateKeyP *purse_priv, - struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Verify a signature over encrypted contract. - * - * @param econtract encrypted contract - * @param econtract_size number of bytes in @a econtract - * @param contract_pub public key for the DH-encryption - * @param purse_pub purse’s public key - * @param purse_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_CREATE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_econtract_upload_verify ( - const void *econtract, - size_t econtract_size, - const struct TALER_ContractDiffiePublicP *contract_pub, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Verify a signature over encrypted contract. - * - * @param h_econtract hashed encrypted contract - * @param contract_pub public key for the DH-encryption - * @param purse_pub purse’s public key - * @param purse_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_CREATE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_econtract_upload_verify2 ( - const struct GNUNET_HashCode *h_econtract, - const struct TALER_ContractDiffiePublicP *contract_pub, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Sign a request to inquire about a purse's status. - * - * @param purse_priv key identifying the purse - * @param[out] purse_sig resulting signature - */ -void -TALER_wallet_purse_status_sign ( - const struct TALER_PurseContractPrivateKeyP *purse_priv, - struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Verify a purse status request signature. - * - * @param purse_pub purse’s public key - * @param purse_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_STATUS - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_purse_status_verify ( - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseContractSignatureP *purse_sig); - - -/** - * Sign a request to deposit a coin into a purse. - * - * @param donau_base_url URL of the donau hosting the purse - * @param purse_pub purse’s public key - * @param amount amount of the coin's value to transfer to the purse - * @param h_denom_pub hash of the coin's denomination - * @param h_age_commitment hash of the coin's age commitment - * @param coin_priv key identifying the coin to be deposited - * @param[out] coin_sig resulting signature - */ -void -TALER_wallet_purse_deposit_sign ( - const char *donau_base_url, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_Amount *amount, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify a purse deposit request. - * - * @param donau_base_url URL of the donau hosting the purse - * @param purse_pub purse’s public key - * @param amount amount of the coin's value to transfer to the purse - * @param h_denom_pub hash of the coin's denomination - * @param h_age_commitment hash of the coin's age commitment - * @param coin_pub key identifying the coin that is being deposited - * @param[out] coin_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_purse_deposit_verify ( - const char *donau_base_url, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_Amount *amount, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Sign a request by a purse to merge it into an account. - * - * @param reserve_uri identifies the location of the reserve - * @param merge_timestamp time when the merge happened - * @param purse_pub key identifying the purse - * @param merge_priv key identifying the merge capability - * @param[out] merge_sig resulting signature - */ -void -TALER_wallet_purse_merge_sign ( - const char *reserve_uri, - struct GNUNET_TIME_Timestamp merge_timestamp, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseMergePrivateKeyP *merge_priv, - struct TALER_PurseMergeSignatureP *merge_sig); - - -/** - * Verify a purse merge request. - * - * @param reserve_uri identifies the location of the reserve - * @param merge_timestamp time when the merge happened - * @param purse_pub public key of the purse to merge - * @param merge_pub public key of the merge capability - * @param merge_sig the signature made with purpose #TALER_SIGNATURE_WALLET_PURSE_MERGE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_purse_merge_verify ( - const char *reserve_uri, - struct GNUNET_TIME_Timestamp merge_timestamp, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PurseMergePublicKeyP *merge_pub, - const struct TALER_PurseMergeSignatureP *merge_sig); - - -/** - * Flags for a merge signature. - */ -enum TALER_WalletAccountMergeFlags -{ - - /** - * A mode must be set. None is not a legal mode! - */ - TALER_WAMF_MODE_NONE = 0, - - /** - * We are merging a fully paid-up purse into a reserve. - */ - TALER_WAMF_MODE_MERGE_FULLY_PAID_PURSE = 1, - - /** - * We are creating a fresh purse, from the contingent - * of free purses that our account brings. - */ - TALER_WAMF_MODE_CREATE_FROM_PURSE_QUOTA = 2, - - /** - * The account owner is willing to pay the purse_fee for the purse to be - * created from the account balance. - */ - TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE = 3, - - /** - * Bitmask to AND the full flags with to get the mode. - */ - TALER_WAMF_MERGE_MODE_MASK = 3 - -}; - - -/** - * Sign a request by an account to merge a purse. - * - * @param merge_timestamp time when the merge happened - * @param purse_pub public key of the purse to merge - * @param purse_expiration when should the purse expire - * @param h_contract_terms contract the two parties agree on - * @param amount total amount in the purse (including fees) - * @param purse_fee purse fee the reserve will pay, - * only used if @a flags is #TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE - * @param min_age age restriction to apply for deposits into the purse - * @param flags flags for the operation - * @param reserve_priv key identifying the reserve - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_account_merge_sign ( - struct GNUNET_TIME_Timestamp merge_timestamp, - const struct TALER_PurseContractPublicKeyP *purse_pub, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_Amount *amount, - const struct TALER_Amount *purse_fee, - uint32_t min_age, - enum TALER_WalletAccountMergeFlags flags, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify an account's request to merge a purse. - * - * @param merge_timestamp time when the merge happened - * @param purse_pub public key of the purse to merge - * @param purse_expiration when should the purse expire - * @param h_contract_terms contract the two parties agree on - * @param amount total amount in the purse (including fees) - * @param purse_fee purse fee the reserve will pay, - * only used if @a flags is #TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE - * @param min_age age restriction to apply for deposits into the purse - * @param flags flags for the operation - * @param reserve_pub account’s public key - * @param reserve_sig the signature made with purpose #TALER_SIGNATURE_WALLET_ACCOUNT_MERGE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_account_merge_verify ( - struct GNUNET_TIME_Timestamp merge_timestamp, - const struct TALER_PurseContractPublicKeyP *purse_pub, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_Amount *amount, - const struct TALER_Amount *purse_fee, - uint32_t min_age, - enum TALER_WalletAccountMergeFlags flags, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign a request to keep a reserve open. - * - * @param reserve_payment how much to pay from the - * reserve's own balance for opening the reserve - * @param request_timestamp when was the request created - * @param reserve_expiration desired expiration time for the reserve - * @param purse_limit minimum number of purses the client - * wants to have concurrently open for this reserve - * @param reserve_priv key identifying the reserve - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_reserve_open_sign ( - const struct TALER_Amount *reserve_payment, - struct GNUNET_TIME_Timestamp request_timestamp, - struct GNUNET_TIME_Timestamp reserve_expiration, - uint32_t purse_limit, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify a request to keep a reserve open. - * - * @param reserve_payment how much to pay from the - * reserve's own balance for opening the reserve - * @param request_timestamp when was the request created - * @param reserve_expiration desired expiration time for the reserve - * @param purse_limit minimum number of purses the client - * wants to have concurrently open for this reserve - * @param reserve_pub key identifying the reserve - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_open_verify ( - const struct TALER_Amount *reserve_payment, - struct GNUNET_TIME_Timestamp request_timestamp, - struct GNUNET_TIME_Timestamp reserve_expiration, - uint32_t purse_limit, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign to deposit coin to pay for keeping a reserve open. - * - * @param coin_contribution how much the coin should contribute - * @param reserve_sig signature over the reserve open operation - * @param coin_priv private key of the coin - * @param[out] coin_sig signature by the coin - */ -void -TALER_wallet_reserve_open_deposit_sign ( - const struct TALER_Amount *coin_contribution, - const struct TALER_ReserveSignatureP *reserve_sig, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify signature that deposits coin to pay for keeping a reserve open. - * - * @param coin_contribution how much the coin should contribute - * @param reserve_sig signature over the reserve open operation - * @param coin_pub public key of the coin - * @param coin_sig signature by the coin - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_open_deposit_verify ( - const struct TALER_Amount *coin_contribution, - const struct TALER_ReserveSignatureP *reserve_sig, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Sign a request to close a reserve. - * - * @param request_timestamp when was the request created - * @param h_payto where to send the funds (NULL allowed to send - * to origin of the reserve) - * @param reserve_priv key identifying the reserve - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_reserve_close_sign ( - struct GNUNET_TIME_Timestamp request_timestamp, - const struct TALER_PaytoHashP *h_payto, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify wallet request to close an account. - * - * @param request_timestamp when was the request created - * @param h_payto where to send the funds (NULL/all zeros - * allowed to send to origin of the reserve) - * @param reserve_pub account’s public key - * @param reserve_sig the signature made with purpose #TALER_SIGNATURE_WALLET_RESERVE_CLOSE - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_close_verify ( - struct GNUNET_TIME_Timestamp request_timestamp, - const struct TALER_PaytoHashP *h_payto, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign a request by a wallet to perform a KYC check. - * - * @param reserve_priv key identifying the wallet/account - * @param balance_threshold the balance threshold the wallet is about to cross - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_account_setup_sign ( - const struct TALER_ReservePrivateKeyP *reserve_priv, - const struct TALER_Amount *balance_threshold, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify account setup request. - * - * @param reserve_pub reserve the setup request was for - * @param balance_threshold the balance threshold the wallet is about to cross - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_account_setup_verify ( - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_Amount *balance_threshold, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign request to the donau to confirm certain - * @a details about the owner of a reserve. - * - * @param request_timestamp when was the request created - * @param details which attributes are requested - * @param reserve_priv private key of the reserve - * @param[out] reserve_sig where to store the signature - */ -void -TALER_wallet_reserve_attest_request_sign ( - struct GNUNET_TIME_Timestamp request_timestamp, - const json_t *details, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify request to the donau to confirm certain - * @a details about the owner of a reserve. - * - * @param request_timestamp when was the request created - * @param details which attributes are requested - * @param reserve_pub public key of the reserve - * @param reserve_sig where to store the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_attest_request_verify ( - struct GNUNET_TIME_Timestamp request_timestamp, - const json_t *details, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign a deposit permission. Function for wallets. - * - * @param amount the amount to be deposited - * @param deposit_fee the deposit fee we expect to pay - * @param h_wire hash of the charity’s account details - * @param h_contract_terms hash of the contact of the charity with the donor (further details are never disclosed to the donau) - * @param wallet_data_hash hash over wallet inputs into the contract (maybe NULL) - * @param h_age_commitment hash over the age commitment, if applicable to the denomination (maybe NULL) - * @param h_policy hash over the policy extension - * @param h_denom_pub hash of the coin denomination's public key - * @param coin_priv coin’s private key - * @param wallet_timestamp timestamp when the contract was finalized, must not be too far in the future - * @param charity_pub the public key of the charity (used to identify the charity for refund requests) - * @param refund_deadline date until which the charity can issue a refund to the donor via the donau (can be zero if refunds are not allowed); must not be after the @a wire_deadline - * @param[out] coin_sig set to the signature made with purpose #TALER_SIGNATURE_WALLET_COIN_DEPOSIT - */ -void -TALER_wallet_deposit_sign ( - const struct TALER_Amount *amount, - const struct TALER_Amount *deposit_fee, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct GNUNET_HashCode *wallet_data_hash, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_ExtensionPolicyHashP *h_policy, - const struct TALER_DenominationHashP *h_denom_pub, - struct GNUNET_TIME_Timestamp wallet_timestamp, - const struct TALER_CharityPublicKeyP *charity_pub, - struct GNUNET_TIME_Timestamp refund_deadline, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify a deposit permission. - * - * @param amount the amount to be deposited - * @param deposit_fee the deposit fee we expect to pay - * @param h_wire hash of the charity’s account details - * @param h_contract_terms hash of the contact of the charity with the donor (further details are never disclosed to the donau) - * @param wallet_data_hash hash over wallet inputs into the contract (maybe NULL) - * @param h_age_commitment hash over the age commitment (maybe all zeroes, if not applicable to the denomination) - * @param h_policy hash over the policy extension - * @param h_denom_pub hash of the coin denomination's public key - * @param wallet_timestamp timestamp when the contract was finalized, must not be too far in the future - * @param charity_pub the public key of the charity (used to identify the charity for refund requests) - * @param refund_deadline date until which the charity can issue a refund to the donor via the donau (can be zero if refunds are not allowed); must not be after the @a wire_deadline - * @param coin_pub coin’s public key - * @param coin_sig the signature made with purpose #TALER_SIGNATURE_WALLET_COIN_DEPOSIT - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_deposit_verify ( - const struct TALER_Amount *amount, - const struct TALER_Amount *deposit_fee, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct GNUNET_HashCode *wallet_data_hash, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_ExtensionPolicyHashP *h_policy, - const struct TALER_DenominationHashP *h_denom_pub, - struct GNUNET_TIME_Timestamp wallet_timestamp, - const struct TALER_CharityPublicKeyP *charity_pub, - struct GNUNET_TIME_Timestamp refund_deadline, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Sign a melt request. - * - * @param amount_with_fee the amount to be melted (with fee) - * @param melt_fee the melt fee we expect to pay - * @param rc refresh session we are committed to - * @param h_denom_pub hash of the coin denomination's public key - * @param h_age_commitment hash of the age commitment (may be NULL) - * @param coin_priv coin’s private key - * @param[out] coin_sig set to the signature made with purpose #TALER_SIGNATURE_WALLET_COIN_MELT - */ -void -TALER_wallet_melt_sign ( - const struct TALER_Amount *amount_with_fee, - const struct TALER_Amount *melt_fee, - const struct TALER_RefreshCommitmentP *rc, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify a melt request. - * - * @param amount_with_fee the amount to be melted (with fee) - * @param melt_fee the melt fee we expect to pay - * @param rc refresh session we are committed to - * @param h_denom_pub hash of the coin denomination's public key - * @param h_age_commitment hash of the age commitment (may be NULL) - * @param coin_pub coin’s public key - * @param coin_sig the signature made with purpose #TALER_SIGNATURE_WALLET_COIN_MELT - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_melt_verify ( - const struct TALER_Amount *amount_with_fee, - const struct TALER_Amount *melt_fee, - const struct TALER_RefreshCommitmentP *rc, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_AgeCommitmentHash *h_age_commitment, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Sign link data. - * - * @param h_denom_pub hash of the denomiantion public key of the new coin - * @param transfer_pub transfer public key - * @param bch blinded coin hash - * @param old_coin_priv private key to sign with - * @param[out] coin_sig resulting signature - */ -void -TALER_wallet_link_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_TransferPublicKeyP *transfer_pub, - const struct TALER_BlindedCoinHashP *bch, - const struct TALER_CoinSpendPrivateKeyP *old_coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify link signature. - * - * @param h_denom_pub hash of the denomiantion public key of the new coin - * @param transfer_pub transfer public key - * @param h_coin_ev hash of the coin envelope - * @param old_coin_pub old coin key that the link signature is for - * @param coin_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_link_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_TransferPublicKeyP *transfer_pub, - const struct TALER_BlindedCoinHashP *h_coin_ev, - const struct TALER_CoinSpendPublicKeyP *old_coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Sign withdraw request. - * - * @param h_denom_pub hash of the denomiantion public key of the coin to withdraw - * @param amount_with_fee amount to debit the reserve for - * @param bch blinded coin hash - * @param reserve_priv private key to sign with - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_withdraw_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_Amount *amount_with_fee, - const struct TALER_BlindedCoinHashP *bch, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify withdraw request. - * - * @param h_denom_pub hash of the denomiantion public key of the coin to withdraw - * @param amount_with_fee amount to debit the reserve for - * @param bch blinded coin hash - * @param reserve_pub public key of the reserve - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_withdraw_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_Amount *amount_with_fee, - const struct TALER_BlindedCoinHashP *bch, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Sign age-withdraw request. - * - * @param h_commitment hash over all n*kappa blinded coins in the commitment for the age-withdraw - * @param amount_with_fee amount to debit the reserve for - * @param mask the mask that defines the age groups - * @param max_age maximum age from which the age group is derived, that the withdrawn coins must be restricted to. - * @param reserve_priv private key to sign with - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_age_withdraw_sign ( - const struct TALER_AgeWithdrawCommitmentHashP *h_commitment, - const struct TALER_Amount *amount_with_fee, - const struct TALER_AgeMask *mask, - uint8_t max_age, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - -/** - * Verify an age-withdraw request. - * - * @param h_commitment hash all n*kappa blinded coins in the commitment for the age-withdraw - * @param amount_with_fee amount to debit the reserve for - * @param mask the mask that defines the age groups - * @param max_age maximum age from which the age group is derived, that the withdrawn coins must be restricted to. - * @param reserve_pub public key of the reserve - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_age_withdraw_verify ( - const struct TALER_AgeWithdrawCommitmentHashP *h_commitment, - const struct TALER_Amount *amount_with_fee, - const struct TALER_AgeMask *mask, - uint8_t max_age, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - -/** - * Verify donau melt confirmation. - * - * @param rc refresh session this is about - * @param noreveal_index gamma value chosen by the donau - * @param donau_pub public signing key used - * @param donau_sig signature to check - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_melt_confirmation_verify ( - const struct TALER_RefreshCommitmentP *rc, - uint32_t noreveal_index, - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_DonauSignatureP *donau_sig); - - -/** - * Verify recoup signature. - * - * @param h_denom_pub hash of the denomiantion public key of the coin - * @param coin_bks blinding factor used when withdrawing the coin - * @param coin_pub coin key of the coin to be recouped - * @param coin_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_recoup_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - const union TALER_DenominationBlindingKeyP *coin_bks, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Create recoup signature. - * - * @param h_denom_pub hash of the denomiantion public key of the coin - * @param coin_bks blinding factor used when withdrawing the coin - * @param coin_priv coin key of the coin to be recouped - * @param[out] coin_sig resulting signature - */ -void -TALER_wallet_recoup_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - const union TALER_DenominationBlindingKeyP *coin_bks, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify recoup-refresh signature. - * - * @param h_denom_pub hash of the denomiantion public key of the coin - * @param coin_bks blinding factor used when withdrawing the coin - * @param coin_pub coin key of the coin to be recouped - * @param coin_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_recoup_refresh_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - const union TALER_DenominationBlindingKeyP *coin_bks, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Create recoup-refresh signature. - * - * @param h_denom_pub hash of the denomiantion public key of the coin - * @param coin_bks blinding factor used when withdrawing the coin - * @param coin_priv coin key of the coin to be recouped - * @param[out] coin_sig resulting signature - */ -void -TALER_wallet_recoup_refresh_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - const union TALER_DenominationBlindingKeyP *coin_bks, - const struct TALER_CoinSpendPrivateKeyP *coin_priv, - struct TALER_CoinSpendSignatureP *coin_sig); - - -/** - * Verify reserve history request signature. - * - * @param ts timestamp used - * @param history_fee how much did the wallet say it would pay - * @param reserve_pub reserve the history request was for - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_history_verify ( - const struct GNUNET_TIME_Timestamp ts, - const struct TALER_Amount *history_fee, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Create reserve history request signature. - * - * @param ts timestamp used - * @param history_fee how much do we expect to pay - * @param reserve_priv private key of the reserve the history request is for - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_reserve_history_sign ( - const struct GNUNET_TIME_Timestamp ts, - const struct TALER_Amount *history_fee, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Verify reserve status request signature. - * - * @param ts timestamp used - * @param reserve_pub reserve the status request was for - * @param reserve_sig resulting signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_wallet_reserve_status_verify ( - const struct GNUNET_TIME_Timestamp ts, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_ReserveSignatureP *reserve_sig); - - -/** - * Create reserve status request signature. - * - * @param ts timestamp used - * @param reserve_priv private key of the reserve the status request is for - * @param[out] reserve_sig resulting signature - */ -void -TALER_wallet_reserve_status_sign ( - const struct GNUNET_TIME_Timestamp ts, - const struct TALER_ReservePrivateKeyP *reserve_priv, - struct TALER_ReserveSignatureP *reserve_sig); - - -/* ********************* charity signing ************************** */ - - -/** - * Create charity signature approving a refund. - * - * @param coin_pub coin to be refunded - * @param h_contract_terms contract to be refunded - * @param rtransaction_id unique ID for this (partial) refund - * @param amount amount to be refunded - * @param charity_priv private key to sign with - * @param[out] charity_sig where to write the signature - */ -void -TALER_charity_refund_sign ( - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - uint64_t rtransaction_id, - const struct TALER_Amount *amount, - const struct TALER_CharityPrivateKeyP *charity_priv, - struct TALER_CharitySignatureP *charity_sig); - - -/** - * Verify charity signature approving a refund. - * - * @param coin_pub coin to be refunded - * @param h_contract_terms contract to be refunded - * @param rtransaction_id unique ID for this (partial) refund - * @param amount amount to be refunded - * @param charity_pub public key of the charity - * @param charity_sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_charity_refund_verify ( - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - uint64_t rtransaction_id, - const struct TALER_Amount *amount, - const struct TALER_CharityPublicKeyP *charity_pub, - const struct TALER_CharitySignatureP *charity_sig); - - -/* ********************* donau deposit signing ************************* */ - -/** - * Sign a deposit. - * - * @param h_contract_terms hash of contract terms - * @param h_wire hash of the charity account details - * @param coin_pub coin to be deposited - * @param charity_priv private key to sign with - * @param[out] charity_sig where to write the signature - */ -void -TALER_charity_deposit_sign ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CharityPrivateKeyP *charity_priv, - struct TALER_CharitySignatureP *charity_sig); - - -/** - * Verify a deposit. - * - * @param charity charity public key - * @param coin_pub public key of the deposited coin - * @param h_contract_terms hash of contract terms - * @param h_wire hash of the charity account details - * @param charity_sig signature of the charity - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_charity_deposit_verify ( - const struct TALER_CharityPublicKeyP *charity, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_CharitySignatureP *charity_sig); - - -/* ********************* donau online signing ************************** */ - - -/** - * Signature of a function that signs the message in @a purpose with the - * donau's signing key. - * - * The @a purpose data is the beginning of the data of which the signature is - * to be created. The `size` field in @a purpose must correctly indicate the - * number of bytes of the data structure, including its header. * - * @param purpose the message to sign - * @param[out] pub set to the current public signing key of the donau - * @param[out] sig signature over purpose using current signing key - * @return #TALER_EC_NONE on success - */ -typedef enum TALER_ErrorCode -(*TALER_DonauSignCallback)( - const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Signature of a function that signs the message in @a purpose with the - * donau's signing key. - * - * The @a purpose data is the beginning of the data of which the signature is - * to be created. The `size` field in @a purpose must correctly indicate the - * number of bytes of the data structure, including its header. * - * @param cls closure - * @param purpose the message to sign - * @param[out] pub set to the current public signing key of the donau - * @param[out] sig signature over purpose using current signing key - * @return #TALER_EC_NONE on success - */ -typedef enum TALER_ErrorCode -(*TALER_DonauSignCallback2)( - void *cls, - const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Create deposit confirmation signature. - * - * @param scb function to call to create the signature - * @param h_contract_terms hash of the contact of the charity with the donor (further details are never disclosed to the donau) - * @param h_wire hash of the charity’s account details - * @param h_policy hash over the policy extension, can be NULL - * @param donau_timestamp timestamp when the contract was finalized, must not be too far off - * @param wire_deadline date until which the donau should wire the funds - * @param refund_deadline date until which the charity can issue a refund to the donor via the donau (can be zero if refunds are not allowed); must not be after the @a wire_deadline - * @param amount_without_fee the amount to be deposited after fees - * @param coin_pub public key of the deposited coin - * @param charity_pub the public key of the charity (used to identify the charity for refund requests) - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_deposit_confirmation_sign ( - TALER_DonauSignCallback scb, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_ExtensionPolicyHashP *h_policy, - struct GNUNET_TIME_Timestamp donau_timestamp, - struct GNUNET_TIME_Timestamp wire_deadline, - struct GNUNET_TIME_Timestamp refund_deadline, - const struct TALER_Amount *amount_without_fee, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CharityPublicKeyP *charity_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify deposit confirmation signature. - * - * @param h_contract_terms hash of the contact of the charity with the donor (further details are never disclosed to the donau) - * @param h_wire hash of the charity’s account details - * @param h_policy hash over the policy extension, can be NULL - * @param donau_timestamp timestamp when the contract was finalized, must not be too far off - * @param wire_deadline date until which the donau should wire the funds - * @param refund_deadline date until which the charity can issue a refund to the donor via the donau (can be zero if refunds are not allowed); must not be after the @a wire_deadline - * @param amount_without_fee the amount to be deposited after fees - * @param coin_pub public key of the deposited coin - * @param charity_pub the public key of the charity (used to identify the charity for refund requests) - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_deposit_confirmation_verify ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_ExtensionPolicyHashP *h_policy, - struct GNUNET_TIME_Timestamp donau_timestamp, - struct GNUNET_TIME_Timestamp wire_deadline, - struct GNUNET_TIME_Timestamp refund_deadline, - const struct TALER_Amount *amount_without_fee, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CharityPublicKeyP *charity_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create refund confirmation signature. - * - * @param scb function to call to create the signature - * @param h_contract_terms hash of contract being refunded - * @param coin_pub public key of the coin receiving the refund - * @param charity public key of the charity that granted the refund - * @param rtransaction_id refund transaction ID used by the charity - * @param refund_amount amount refunded - * @param[out] pub where to write the donau public key - * @param[out] sig where to write the donau signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_refund_confirmation_sign ( - TALER_DonauSignCallback scb, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CharityPublicKeyP *charity, - uint64_t rtransaction_id, - const struct TALER_Amount *refund_amount, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify refund confirmation signature. - * - * @param h_contract_terms hash of contract being refunded - * @param coin_pub public key of the coin receiving the refund - * @param charity public key of the charity that granted the refund - * @param rtransaction_id refund transaction ID used by the charity - * @param refund_amount amount refunded - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_refund_confirmation_verify ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CharityPublicKeyP *charity, - uint64_t rtransaction_id, - const struct TALER_Amount *refund_amount, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create refresh melt confirmation signature. - * - * @param scb function to call to create the signature - * @param rc refresh commitment that identifies the melt operation - * @param noreveal_index gamma cut-and-choose value chosen by the donau - * @param[out] pub where to write the donau public key - * @param[out] sig where to write the donau signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_melt_confirmation_sign ( - TALER_DonauSignCallback scb, - const struct TALER_RefreshCommitmentP *rc, - uint32_t noreveal_index, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify refresh melt confirmation signature. - * - * @param rc refresh commitment that identifies the melt operation - * @param noreveal_index gamma cut-and-choose value chosen by the donau - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_melt_confirmation_verify ( - const struct TALER_RefreshCommitmentP *rc, - uint32_t noreveal_index, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create donau purse refund confirmation signature. - * - * @param scb function to call to create the signature - * @param amount_without_fee refunded amount - * @param refund_fee refund fee charged - * @param coin_pub coin that was refunded - * @param purse_pub public key of the expired purse - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_purse_refund_sign ( - TALER_DonauSignCallback scb, - const struct TALER_Amount *amount_without_fee, - const struct TALER_Amount *refund_fee, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_PurseContractPublicKeyP *purse_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify signature of donau affirming purse refund - * from purse expiration. - * - * @param amount_without_fee refunded amount - * @param refund_fee refund fee charged - * @param coin_pub coin that was refunded - * @param purse_pub public key of the expired purse - * @param pub public key to verify signature against - * @param sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_purse_refund_verify ( - const struct TALER_Amount *amount_without_fee, - const struct TALER_Amount *refund_fee, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create donau key set signature. - * - * @param scb function to call to create the signature - * @param cls closure for @a scb - * @param timestamp time when the key set was issued - * @param hc hash over all the keys - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_key_set_sign ( - TALER_DonauSignCallback2 scb, - void *cls, - struct GNUNET_TIME_Timestamp timestamp, - const struct GNUNET_HashCode *hc, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify key set signature. - * - * @param timestamp time when the key set was issued - * @param hc hash over all the keys - * @param pub public key to verify signature against - * @param sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_key_set_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct GNUNET_HashCode *hc, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create account KYC setup success signature. - * - * @param scb function to call to create the signature - * @param h_payto target of the KYC account - * @param kyc JSON data describing which KYC checks - * were satisfied - * @param timestamp time when the KYC was confirmed - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_account_setup_success_sign ( - TALER_DonauSignCallback scb, - const struct TALER_PaytoHashP *h_payto, - const json_t *kyc, - struct GNUNET_TIME_Timestamp timestamp, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify account KYC setup success signature. - * - * @param h_payto target of the KYC account - * @param kyc JSON data describing which KYC checks - * were satisfied - * @param timestamp time when the KYC was confirmed - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_account_setup_success_verify ( - const struct TALER_PaytoHashP *h_payto, - const json_t *kyc, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Hash normalized @a j JSON object or array and - * store the result in @a hc. - * - * @param j JSON to hash - * @param[out] hc where to write the hash - */ -void -TALER_json_hash (const json_t *j, - struct GNUNET_HashCode *hc); - - -/** - * Update the @a hash_context in the computation of the - * h_details for a wire status signature. - * - * @param[in,out] hash_context context to update - * @param h_contract_terms hash of the contract - * @param execution_time when was the wire transfer initiated - * @param coin_pub deposited coin - * @param deposit_value contribution of the coin - * @param deposit_fee how high was the deposit fee - */ -void -TALER_donau_online_wire_deposit_append ( - struct GNUNET_HashContext *hash_context, - const struct TALER_PrivateContractHashP *h_contract_terms, - struct GNUNET_TIME_Timestamp execution_time, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_Amount *deposit_value, - const struct TALER_Amount *deposit_fee); - - -/** - * Create wire deposit signature. - * - * @param scb function to call to create the signature - * @param total amount the charity was credited - * @param wire_fee fee charged by the donau for the wire transfer - * @param charity_pub which charity was credited - * @param payto payto://-URI of the charity account - * @param h_details hash over the aggregation details - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_wire_deposit_sign ( - TALER_DonauSignCallback scb, - const struct TALER_Amount *total, - const struct TALER_Amount *wire_fee, - const struct TALER_CharityPublicKeyP *charity_pub, - const char *payto, - const struct GNUNET_HashCode *h_details, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify wire deposit signature. - * - * @param total amount the charity was credited - * @param wire_fee fee charged by the donau for the wire transfer - * @param charity_pub which charity was credited - * @param h_payto hash of the payto://-URI of the charity account - * @param h_details hash over the aggregation details - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_wire_deposit_verify ( - const struct TALER_Amount *total, - const struct TALER_Amount *wire_fee, - const struct TALER_CharityPublicKeyP *charity_pub, - const struct TALER_PaytoHashP *h_payto, - const struct GNUNET_HashCode *h_details, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create wire confirmation signature. - * - * @param scb function to call to create the signature - * @param h_wire hash of the charity's account - * @param h_contract_terms hash of the contract - * @param wtid wire transfer this deposit was aggregated into - * @param coin_pub public key of the deposited coin - * @param execution_time when was wire transfer initiated - * @param coin_contribution what was @a coin_pub's contribution to the wire transfer - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_confirm_wire_sign ( - TALER_DonauSignCallback scb, - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_WireTransferIdentifierRawP *wtid, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - struct GNUNET_TIME_Timestamp execution_time, - const struct TALER_Amount *coin_contribution, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify confirm wire signature. - * - * @param h_wire hash of the charity's account - * @param h_contract_terms hash of the contract - * @param wtid wire transfer this deposit was aggregated into - * @param coin_pub public key of the deposited coin - * @param execution_time when was wire transfer initiated - * @param coin_contribution what was @a coin_pub's contribution to the wire transfer - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_confirm_wire_verify ( - const struct TALER_CharityWireHashP *h_wire, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_WireTransferIdentifierRawP *wtid, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - struct GNUNET_TIME_Timestamp execution_time, - const struct TALER_Amount *coin_contribution, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create confirm recoup signature. - * - * @param scb function to call to create the signature - * @param timestamp when was the recoup done - * @param recoup_amount how much was recouped - * @param coin_pub coin that was recouped - * @param reserve_pub reserve that was credited - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_confirm_recoup_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *recoup_amount, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_ReservePublicKeyP *reserve_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify confirm recoup signature. - * - * @param timestamp when was the recoup done - * @param recoup_amount how much was recouped - * @param coin_pub coin that was recouped - * @param reserve_pub reserve that was credited - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_confirm_recoup_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *recoup_amount, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create confirm recoup refresh signature. - * - * @param scb function to call to create the signature - * @param timestamp when was the recoup done - * @param recoup_amount how much was recouped - * @param coin_pub coin that was recouped - * @param old_coin_pub old coin that was credited - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_confirm_recoup_refresh_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *recoup_amount, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendPublicKeyP *old_coin_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify confirm recoup refresh signature. - * - * @param timestamp when was the recoup done - * @param recoup_amount how much was recouped - * @param coin_pub coin that was recouped - * @param old_coin_pub old coin that was credited - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_confirm_recoup_refresh_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *recoup_amount, - const struct TALER_CoinSpendPublicKeyP *coin_pub, - const struct TALER_CoinSpendPublicKeyP *old_coin_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create denomination unknown signature. - * - * @param scb function to call to create the signature - * @param timestamp when was the error created - * @param h_denom_pub hash of denomination that is unknown - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_denomination_unknown_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_DenominationHashP *h_denom_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify denomination unknown signature. - * - * @param timestamp when was the error created - * @param h_denom_pub hash of denomination that is unknown - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_denomination_unknown_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create denomination expired signature. - * - * @param scb function to call to create the signature - * @param timestamp when was the error created - * @param h_denom_pub hash of denomination that is expired - * @param op character string describing the operation for which - * the denomination is expired - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_denomination_expired_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_DenominationHashP *h_denom_pub, - const char *op, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify denomination expired signature. - * - * @param timestamp when was the error created - * @param h_denom_pub hash of denomination that is expired - * @param op character string describing the operation for which - * the denomination is expired - * @param pub where to write the public key - * @param sig where to write the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_denomination_expired_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_DenominationHashP *h_denom_pub, - const char *op, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create reserve closure signature. - * - * @param scb function to call to create the signature - * @param timestamp time when the reserve was closed - * @param closing_amount amount left in the reserve - * @param closing_fee closing fee charged - * @param payto target of the wire transfer - * @param wtid wire transfer subject used - * @param reserve_pub public key of the closed reserve - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_reserve_closed_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *closing_amount, - const struct TALER_Amount *closing_fee, - const char *payto, - const struct TALER_WireTransferIdentifierRawP *wtid, - const struct TALER_ReservePublicKeyP *reserve_pub, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify reserve closure signature. - * - * @param timestamp time when the reserve was closed - * @param closing_amount amount left in the reserve - * @param closing_fee closing fee charged - * @param payto target of the wire transfer - * @param wtid wire transfer subject used - * @param reserve_pub public key of the closed reserve - * @param pub the public key of the donau to check against - * @param sig the signature to check - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_reserve_closed_verify ( - struct GNUNET_TIME_Timestamp timestamp, - const struct TALER_Amount *closing_amount, - const struct TALER_Amount *closing_fee, - const char *payto, - const struct TALER_WireTransferIdentifierRawP *wtid, - const struct TALER_ReservePublicKeyP *reserve_pub, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Create signature by donau affirming that a reserve - * has had certain attributes verified via KYC. - * - * @param scb function to call to create the signature - * @param attest_timestamp our time - * @param expiration_time when does the KYC data expire - * @param reserve_pub for which reserve are attributes attested - * @param attributes JSON object with attributes being attested to - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_reserve_attest_details_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp attest_timestamp, - struct GNUNET_TIME_Timestamp expiration_time, - const struct TALER_ReservePublicKeyP *reserve_pub, - const json_t *attributes, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify signature by donau affirming that a reserve - * has had certain attributes verified via KYC. - * - * @param attest_timestamp our time - * @param expiration_time when does the KYC data expire - * @param reserve_pub for which reserve are attributes attested - * @param attributes JSON object with attributes being attested to - * @param pub donau public key - * @param sig donau signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_reserve_attest_details_verify ( - struct GNUNET_TIME_Timestamp attest_timestamp, - struct GNUNET_TIME_Timestamp expiration_time, - const struct TALER_ReservePublicKeyP *reserve_pub, - const json_t *attributes, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Create signature by donau affirming that a purse was created. - * - * @param scb function to call to create the signature - * @param donau_time our time - * @param purse_expiration when will the purse expire - * @param amount_without_fee total amount to be put into the purse (without deposit fees) - * @param total_deposited total currently in the purse - * @param purse_pub public key of the purse - * @param h_contract_terms hash of the contract for the purse - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_purse_created_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp donau_time, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_Amount *amount_without_fee, - const struct TALER_Amount *total_deposited, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify donau signature about a purse creation and balance. - * - * @param donau_time our time - * @param purse_expiration when will the purse expire - * @param amount_without_fee total amount to be put into the purse (without deposit fees) - * @param total_deposited total currently in the purse - * @param purse_pub public key of the purse - * @param h_contract_terms hash of the contract for the purse - * @param pub the public key of the donau to check against - * @param sig the signature to check - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_purse_created_verify ( - struct GNUNET_TIME_Timestamp donau_time, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_Amount *amount_without_fee, - const struct TALER_Amount *total_deposited, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Sign affirmation that a purse was merged. - * - * @param scb function to call to create the signature - * @param donau_time our time - * @param purse_expiration when does the purse expire - * @param amount_without_fee total amount that should be in the purse without deposit fees - * @param purse_pub public key of the purse - * @param h_contract_terms hash of the contract of the purse - * @param reserve_pub reserve the purse will be merged into - * @param donau_url donau at which the @a reserve_pub lives - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_purse_merged_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp donau_time, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_Amount *amount_without_fee, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_ReservePublicKeyP *reserve_pub, - const char *donau_url, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify affirmation that a purse will be merged. - * - * @param donau_time our time - * @param purse_expiration when does the purse expire - * @param amount_without_fee total amount that should be in the purse without deposit fees - * @param purse_pub public key of the purse - * @param h_contract_terms hash of the contract of the purse - * @param reserve_pub reserve the purse will be merged into - * @param donau_url donau at which the @a reserve_pub lives - * @param pub the public key of the donau to check against - * @param sig the signature to check - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_purse_merged_verify ( - struct GNUNET_TIME_Timestamp donau_time, - struct GNUNET_TIME_Timestamp purse_expiration, - const struct TALER_Amount *amount_without_fee, - const struct TALER_PurseContractPublicKeyP *purse_pub, - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_ReservePublicKeyP *reserve_pub, - const char *donau_url, - const struct TALER_DonauPublicKeyP *pub, - const struct TALER_DonauSignatureP *sig); - - -/** - * Sign information about the status of a purse. - * - * @param scb function to call to create the signature - * @param merge_timestamp when was the purse merged (can be never) - * @param deposit_timestamp when was the purse fully paid up (can be never) - * @param balance current balance of the purse - * @param[out] pub where to write the public key - * @param[out] sig where to write the signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_purse_status_sign ( - TALER_DonauSignCallback scb, - struct GNUNET_TIME_Timestamp merge_timestamp, - struct GNUNET_TIME_Timestamp deposit_timestamp, - const struct TALER_Amount *balance, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verify signature over information about the status of a purse. - * - * @param merge_timestamp when was the purse merged (can be never) - * @param deposit_timestamp when was the purse fully paid up (can be never) - * @param balance current balance of the purse - * @param donau_pub the public key of the donau to check against - * @param donau_sig the signature to check - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_purse_status_verify ( - struct GNUNET_TIME_Timestamp merge_timestamp, - struct GNUNET_TIME_Timestamp deposit_timestamp, - const struct TALER_Amount *balance, - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_DonauSignatureP *donau_sig); - - -/** - * Create age-withdraw confirmation signature. - * - * @param scb function to call to create the signature - * @param h_commitment age-withdraw commitment that identifies the n*kappa blinded coins - * @param noreveal_index gamma cut-and-choose value chosen by the donau - * @param[out] pub where to write the donau public key - * @param[out] sig where to write the donau signature - * @return #TALER_EC_NONE on success - */ -enum TALER_ErrorCode -TALER_donau_online_age_withdraw_confirmation_sign ( - TALER_DonauSignCallback scb, - const struct TALER_AgeWithdrawCommitmentHashP *h_commitment, - uint32_t noreveal_index, - struct TALER_DonauPublicKeyP *pub, - struct TALER_DonauSignatureP *sig); - - -/** - * Verfiy an donau age-withdraw confirmation - * - * @param h_commitment Commitment over all n*kappa coin candidates from the original request to age-withdraw - * @param noreveal_index The index returned by the donau - * @param donau_pub The public key used for signing - * @param donau_sig The signature from the donau - */ -enum GNUNET_GenericReturnValue -TALER_donau_online_age_withdraw_confirmation_verify ( - const struct TALER_AgeWithdrawCommitmentHashP *h_commitment, - uint32_t noreveal_index, - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_DonauSignatureP *donau_sig); - - -/* ********************* offline signing ************************** */ - - -/** - * Create AML officer status change signature. - * - * @param officer_pub public key of the AML officer - * @param officer_name name of the officer - * @param change_date when to affect the status change - * @param is_active true to enable the officer - * @param read_only true to only allow read-only access - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_aml_officer_status_sign ( - const struct TALER_AmlOfficerPublicKeyP *officer_pub, - const char *officer_name, - struct GNUNET_TIME_Timestamp change_date, - bool is_active, - bool read_only, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify AML officer status change signature. - * - * @param officer_pub public key of the AML officer - * @param officer_name name of the officer - * @param change_date when to affect the status change - * @param is_active true to enable the officer - * @param read_only true to only allow read-only access - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_aml_officer_status_verify ( - const struct TALER_AmlOfficerPublicKeyP *officer_pub, - const char *officer_name, - struct GNUNET_TIME_Timestamp change_date, - bool is_active, - bool read_only, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create auditor addition signature. - * - * @param auditor_pub public key of the auditor - * @param auditor_url URL of the auditor - * @param start_date when to enable the auditor (for replay detection) - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_auditor_add_sign ( - const struct TALER_AuditorPublicKeyP *auditor_pub, - const char *auditor_url, - struct GNUNET_TIME_Timestamp start_date, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify auditor add signature. - * - * @param auditor_pub public key of the auditor - * @param auditor_url URL of the auditor - * @param start_date when to enable the auditor (for replay detection) - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_auditor_add_verify ( - const struct TALER_AuditorPublicKeyP *auditor_pub, - const char *auditor_url, - struct GNUNET_TIME_Timestamp start_date, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create auditor deletion signature. - * - * @param auditor_pub public key of the auditor - * @param end_date when to disable the auditor (for replay detection) - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_auditor_del_sign ( - const struct TALER_AuditorPublicKeyP *auditor_pub, - struct GNUNET_TIME_Timestamp end_date, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify auditor del signature. - * - * @param auditor_pub public key of the auditor - * @param end_date when to disable the auditor (for replay detection) - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_auditor_del_verify ( - const struct TALER_AuditorPublicKeyP *auditor_pub, - struct GNUNET_TIME_Timestamp end_date, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create denomination revocation signature. - * - * @param h_denom_pub hash of public denomination key to revoke - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_denomination_revoke_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify denomination revocation signature. - * - * @param h_denom_pub hash of public denomination key to revoke - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_denomination_revoke_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create signkey revocation signature. - * - * @param donau_pub public signing key to revoke - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_signkey_revoke_sign ( - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify signkey revocation signature. - * - * @param donau_pub public signkey key to revoke - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_signkey_revoke_verify ( - const struct TALER_DonauPublicKeyP *donau_pub, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create signkey validity signature. - * - * @param donau_pub public signing key to validate - * @param start_sign starting point of validity for signing - * @param end_sign end point (exclusive) for validity for signing - * @param end_legal legal end point of signature validity - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_signkey_validity_sign ( - const struct TALER_DonauPublicKeyP *donau_pub, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Timestamp end_sign, - struct GNUNET_TIME_Timestamp end_legal, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify signkey validitity signature. - * - * @param donau_pub public signkey key to validate - * @param start_sign starting point of validity for signing - * @param end_sign end point (exclusive) for validity for signing - * @param end_legal legal end point of signature validity - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_signkey_validity_verify ( - const struct TALER_DonauPublicKeyP *donau_pub, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Timestamp end_sign, - struct GNUNET_TIME_Timestamp end_legal, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create denomination key validity signature. - * - * @param h_denom_pub hash of the denomination's public key - * @param stamp_start when does the donau begin signing with this key - * @param stamp_expire_withdraw when does the donau end signing with this key - * @param stamp_expire_deposit how long does the donau accept the deposit of coins with this key - * @param stamp_expire_legal how long does the donau preserve information for legal disputes with this key - * @param coin_value what is the value of coins signed with this key - * @param fees fees for this denomination - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_denom_validity_sign ( - const struct TALER_DenominationHashP *h_denom_pub, - struct GNUNET_TIME_Timestamp stamp_start, - struct GNUNET_TIME_Timestamp stamp_expire_withdraw, - struct GNUNET_TIME_Timestamp stamp_expire_deposit, - struct GNUNET_TIME_Timestamp stamp_expire_legal, - const struct TALER_Amount *coin_value, - const struct TALER_DenomFeeSet *fees, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify denomination key validity signature. - * - * @param h_denom_pub hash of the denomination's public key - * @param stamp_start when does the donau begin signing with this key - * @param stamp_expire_withdraw when does the donau end signing with this key - * @param stamp_expire_deposit how long does the donau accept the deposit of coins with this key - * @param stamp_expire_legal how long does the donau preserve information for legal disputes with this key - * @param coin_value what is the value of coins signed with this key - * @param fees fees for this denomination - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_denom_validity_verify ( - const struct TALER_DenominationHashP *h_denom_pub, - struct GNUNET_TIME_Timestamp stamp_start, - struct GNUNET_TIME_Timestamp stamp_expire_withdraw, - struct GNUNET_TIME_Timestamp stamp_expire_deposit, - struct GNUNET_TIME_Timestamp stamp_expire_legal, - const struct TALER_Amount *coin_value, - const struct TALER_DenomFeeSet *fees, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create offline signature about an donau's partners. - * - * @param partner_pub master public key of the partner - * @param start_date validity period start - * @param end_date validity period end - * @param wad_frequency how often will we do wad transfers to this partner - * @param wad_fee what is the wad fee to this partner - * @param partner_base_url what is the base URL of the @a partner_pub donau - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_partner_details_sign ( - const struct TALER_MasterPublicKeyP *partner_pub, - struct GNUNET_TIME_Timestamp start_date, - struct GNUNET_TIME_Timestamp end_date, - struct GNUNET_TIME_Relative wad_frequency, - const struct TALER_Amount *wad_fee, - const char *partner_base_url, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify signature about an donau's partners. - * - * @param partner_pub master public key of the partner - * @param start_date validity period start - * @param end_date validity period end - * @param wad_frequency how often will we do wad transfers to this partner - * @param wad_fee what is the wad fee to this partner - * @param partner_base_url what is the base URL of the @a partner_pub donau - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_partner_details_verify ( - const struct TALER_MasterPublicKeyP *partner_pub, - struct GNUNET_TIME_Timestamp start_date, - struct GNUNET_TIME_Timestamp end_date, - struct GNUNET_TIME_Relative wad_frequency, - const struct TALER_Amount *wad_fee, - const char *partner_base_url, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create offline signature about wiring profits to a - * regular non-escrowed account of the donau. - * - * @param wtid (random) wire transfer ID to be used - * @param date when was the profit drain approved (not exact time of execution) - * @param amount how much should be wired - * @param account_section configuration section of the - * donau specifying the account to be debited - * @param payto_uri target account to be credited - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_profit_drain_sign ( - const struct TALER_WireTransferIdentifierRawP *wtid, - struct GNUNET_TIME_Timestamp date, - const struct TALER_Amount *amount, - const char *account_section, - const char *payto_uri, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify offline signature about wiring profits to a - * regular non-escrowed account of the donau. - * - * @param wtid (random) wire transfer ID to be used - * @param date when was the profit drain approved (not exact time of execution) - * @param amount how much should be wired - * @param account_section configuration section of the - * donau specifying the account to be debited - * @param payto_uri target account to be credited - * @param master_pub public key to verify signature against - * @param master_sig the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_profit_drain_verify ( - const struct TALER_WireTransferIdentifierRawP *wtid, - struct GNUNET_TIME_Timestamp date, - const struct TALER_Amount *amount, - const char *account_section, - const char *payto_uri, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create security module EdDSA signature. - * - * @param donau_pub public signing key to validate - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_priv security module key to sign with - * @param[out] secm_sig where to write the signature - */ -void -TALER_donau_secmod_eddsa_sign ( - const struct TALER_DonauPublicKeyP *donau_pub, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePrivateKeyP *secm_priv, - struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Verify security module EdDSA signature. - * - * @param donau_pub public signing key to validate - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_pub public key to verify against - * @param secm_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_secmod_eddsa_verify ( - const struct TALER_DonauPublicKeyP *donau_pub, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePublicKeyP *secm_pub, - const struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Create security module denomination signature. - * - * @param h_rsa hash of the RSA public key to sign - * @param section_name name of the section in the configuration - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_priv security module key to sign with - * @param[out] secm_sig where to write the signature - */ -void -TALER_donau_secmod_rsa_sign ( - const struct TALER_RsaPubHashP *h_rsa, - const char *section_name, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePrivateKeyP *secm_priv, - struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Verify security module denomination signature. - * - * @param h_rsa hash of the public key to validate - * @param section_name name of the section in the configuration - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_pub public key to verify against - * @param secm_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_secmod_rsa_verify ( - const struct TALER_RsaPubHashP *h_rsa, - const char *section_name, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePublicKeyP *secm_pub, - const struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Create security module denomination signature. - * - * @param h_cs hash of the CS public key to sign - * @param section_name name of the section in the configuration - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_priv security module key to sign with - * @param[out] secm_sig where to write the signature - */ -void -TALER_donau_secmod_cs_sign ( - const struct TALER_CsPubHashP *h_cs, - const char *section_name, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePrivateKeyP *secm_priv, - struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Verify security module denomination signature. - * - * @param h_cs hash of the public key to validate - * @param section_name name of the section in the configuration - * @param start_sign starting point of validity for signing - * @param duration how long will the key be in use - * @param secm_pub public key to verify against - * @param secm_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_secmod_cs_verify ( - const struct TALER_CsPubHashP *h_cs, - const char *section_name, - struct GNUNET_TIME_Timestamp start_sign, - struct GNUNET_TIME_Relative duration, - const struct TALER_SecurityModulePublicKeyP *secm_pub, - const struct TALER_SecurityModuleSignatureP *secm_sig); - - -/** - * Create denomination key validity signature by the auditor. - * - * @param auditor_url BASE URL of the auditor's API - * @param h_denom_pub hash of the denomination's public key - * @param master_pub master public key of the donau - * @param stamp_start when does the donau begin signing with this key - * @param stamp_expire_withdraw when does the donau end signing with this key - * @param stamp_expire_deposit how long does the donau accept the deposit of coins with this key - * @param stamp_expire_legal how long does the donau preserve information for legal disputes with this key - * @param coin_value what is the value of coins signed with this key - * @param fees fees the donau charges for this denomination - * @param auditor_priv private key to sign with - * @param[out] auditor_sig where to write the signature - */ -void -TALER_auditor_denom_validity_sign ( - const char *auditor_url, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_MasterPublicKeyP *master_pub, - struct GNUNET_TIME_Timestamp stamp_start, - struct GNUNET_TIME_Timestamp stamp_expire_withdraw, - struct GNUNET_TIME_Timestamp stamp_expire_deposit, - struct GNUNET_TIME_Timestamp stamp_expire_legal, - const struct TALER_Amount *coin_value, - const struct TALER_DenomFeeSet *fees, - const struct TALER_AuditorPrivateKeyP *auditor_priv, - struct TALER_AuditorSignatureP *auditor_sig); - - -/** - * Verify denomination key validity signature from auditor. - * - * @param auditor_url BASE URL of the auditor's API - * @param h_denom_pub hash of the denomination's public key - * @param master_pub master public key of the donau - * @param stamp_start when does the donau begin signing with this key - * @param stamp_expire_withdraw when does the donau end signing with this key - * @param stamp_expire_deposit how long does the donau accept the deposit of coins with this key - * @param stamp_expire_legal how long does the donau preserve information for legal disputes with this key - * @param coin_value what is the value of coins signed with this key - * @param fees fees the donau charges for this denomination - * @param auditor_pub public key to verify against - * @param auditor_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_auditor_denom_validity_verify ( - const char *auditor_url, - const struct TALER_DenominationHashP *h_denom_pub, - const struct TALER_MasterPublicKeyP *master_pub, - struct GNUNET_TIME_Timestamp stamp_start, - struct GNUNET_TIME_Timestamp stamp_expire_withdraw, - struct GNUNET_TIME_Timestamp stamp_expire_deposit, - struct GNUNET_TIME_Timestamp stamp_expire_legal, - const struct TALER_Amount *coin_value, - const struct TALER_DenomFeeSet *fees, - const struct TALER_AuditorPublicKeyP *auditor_pub, - const struct TALER_AuditorSignatureP *auditor_sig); - - -/* **************** /wire account offline signing **************** */ - - -/** - * Create wire fee signature. - * - * @param payment_method the payment method - * @param start_time when do the fees start to apply - * @param end_time when do the fees start to apply - * @param fees the wire fees - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_wire_fee_sign ( - const char *payment_method, - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Timestamp end_time, - const struct TALER_WireFeeSet *fees, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify wire fee signature. - * - * @param payment_method the payment method - * @param start_time when do the fees start to apply - * @param end_time when do the fees start to apply - * @param fees the wire fees - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_wire_fee_verify ( - const char *payment_method, - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Timestamp end_time, - const struct TALER_WireFeeSet *fees, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create global fees signature. - * - * @param start_time when do the fees start to apply - * @param end_time when do the fees start to apply - * @param fees the global fees - * @param purse_timeout how long do unmerged purses stay around - * @param history_expiration how long do we keep the history of an account - * @param purse_account_limit how many concurrent purses are free per account holder - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_global_fee_sign ( - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Timestamp end_time, - const struct TALER_GlobalFeeSet *fees, - struct GNUNET_TIME_Relative purse_timeout, - struct GNUNET_TIME_Relative history_expiration, - uint32_t purse_account_limit, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify global fees signature. - * - * @param start_time when do the fees start to apply - * @param end_time when do the fees start to apply - * @param fees the global fees - * @param purse_timeout how long do unmerged purses stay around - * @param history_expiration how long do we keep the history of an account - * @param purse_account_limit how many concurrent purses are free per account holder - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_global_fee_verify ( - struct GNUNET_TIME_Timestamp start_time, - struct GNUNET_TIME_Timestamp end_time, - const struct TALER_GlobalFeeSet *fees, - struct GNUNET_TIME_Relative purse_timeout, - struct GNUNET_TIME_Relative history_expiration, - uint32_t purse_account_limit, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create wire account addition signature. - * - * @param payto_uri bank account - * @param conversion_url URL of the conversion service, or NULL if none - * @param debit_restrictions JSON encoding of debit restrictions on the account; see AccountRestriction in the spec - * @param credit_restrictions JSON encoding of credit restrictions on the account; see AccountRestriction in the spec - * @param now timestamp to use for the signature (rounded) - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_wire_add_sign ( - const char *payto_uri, - const char *conversion_url, - const json_t *debit_restrictions, - const json_t *credit_restrictions, - struct GNUNET_TIME_Timestamp now, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify wire account addition signature. - * - * @param payto_uri bank account - * @param conversion_url URL of the conversion service, or NULL if none - * @param debit_restrictions JSON encoding of debit restrictions on the account; see AccountRestriction in the spec - * @param credit_restrictions JSON encoding of credit restrictions on the account; see AccountRestriction in the spec - * @param sign_time timestamp when signature was created - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_wire_add_verify ( - const char *payto_uri, - const char *conversion_url, - const json_t *debit_restrictions, - const json_t *credit_restrictions, - struct GNUNET_TIME_Timestamp sign_time, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create wire account removal signature. - * - * @param payto_uri bank account - * @param now timestamp to use for the signature (rounded) - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_wire_del_sign ( - const char *payto_uri, - struct GNUNET_TIME_Timestamp now, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify wire account deletion signature. - * - * @param payto_uri bank account - * @param sign_time timestamp when signature was created - * @param master_pub public key to verify against - * @param master_sig the signature the signature - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_wire_del_verify ( - const char *payto_uri, - struct GNUNET_TIME_Timestamp sign_time, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Check the signature in @a master_sig. - * - * @param payto_uri URI that is signed - * @param conversion_url URL of the conversion service, or NULL if none - * @param debit_restrictions JSON encoding of debit restrictions on the account; see AccountRestriction in the spec - * @param credit_restrictions JSON encoding of credit restrictions on the account; see AccountRestriction in the spec - * @param master_pub master public key of the donau - * @param master_sig signature of the donau - * @return #GNUNET_OK if signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_wire_signature_check ( - const char *payto_uri, - const char *conversion_url, - const json_t *debit_restrictions, - const json_t *credit_restrictions, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig); - - -/** - * Create a signed wire statement for the given account. - * - * @param payto_uri account specification - * @param conversion_url URL of the conversion service, or NULL if none - * @param debit_restrictions JSON encoding of debit restrictions on the account; see AccountRestriction in the spec - * @param credit_restrictions JSON encoding of credit restrictions on the account; see AccountRestriction in the spec - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_wire_signature_make ( - const char *payto_uri, - const char *conversion_url, - const json_t *debit_restrictions, - const json_t *credit_restrictions, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Compute the hash of the given wire details. The resulting - * @a hc is what will be put into the contract between donor - * and charity for signing by both parties. - * - * @param payto_uri bank account - * @param salt salt used to eliminate brute-force inversion - * @param[out] hc set to the hash - */ -void -TALER_charity_wire_signature_hash (const char *payto_uri, - const struct TALER_WireSaltP *salt, - struct TALER_CharityWireHashP *hc); - - -/** - * Check the signature in @a wire_s. - * - * @param payto_uri URL that is signed - * @param salt the salt used to salt the @a payto_uri when hashing - * @param merch_pub public key of the charity - * @param merch_sig signature of the charity - * @return #GNUNET_OK if signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_charity_wire_signature_check ( - const char *payto_uri, - const struct TALER_WireSaltP *salt, - const struct TALER_CharityPublicKeyP *merch_pub, - const struct TALER_CharitySignatureP *merch_sig); - - -/** - * Create a signed wire statement for the given account. - * - * @param payto_uri account specification - * @param salt the salt used to salt the @a payto_uri when hashing - * @param merch_priv private key to sign with - * @param[out] merch_sig where to write the signature - */ -void -TALER_charity_wire_signature_make ( - const char *payto_uri, - const struct TALER_WireSaltP *salt, - const struct TALER_CharityPrivateKeyP *merch_priv, - struct TALER_CharitySignatureP *merch_sig); - - -/** - * Sign a payment confirmation. - * - * @param h_contract_terms hash of the contact of the charity with the donor - * @param merch_priv private key to sign with - * @param[out] merch_sig where to write the signature - */ -void -TALER_charity_pay_sign ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityPrivateKeyP *merch_priv, - struct GNUNET_CRYPTO_EddsaSignature *merch_sig); - - -/** - * Verify payment confirmation signature. - * - * @param h_contract_terms hash of the contact of the charity with the donor - * @param charity_pub public key of the charity - * @param charity_sig signature to verify - * @return #GNUNET_OK if the signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_charity_pay_verify ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityPublicKeyP *charity_pub, - const struct TALER_CharitySignatureP *charity_sig); - - -/** - * Sign contract sent by the charity to the wallet. - * - * @param h_contract_terms hash of the contract terms - * @param merch_priv private key to sign with - * @param[out] merch_sig where to write the signature - */ -void -TALER_charity_contract_sign ( - const struct TALER_PrivateContractHashP *h_contract_terms, - const struct TALER_CharityPrivateKeyP *merch_priv, - struct GNUNET_CRYPTO_EddsaSignature *merch_sig); - - -/* **************** /management/extensions offline signing **************** */ - -/** - * Create a signature for the hash of the manifests of extensions - * - * @param h_manifests hash of the JSON object representing the manifests - * @param master_priv private key to sign with - * @param[out] master_sig where to write the signature - */ -void -TALER_donau_offline_extension_manifests_hash_sign ( - const struct TALER_ExtensionManifestsHashP *h_manifests, - const struct TALER_MasterPrivateKeyP *master_priv, - struct TALER_MasterSignatureP *master_sig); - - -/** - * Verify the signature in @a master_sig of the given hash, taken over the JSON - * blob representing the manifests of extensions - * - * @param h_manifest hash of the JSON blob of manifests of extensions - * @param master_pub master public key of the donau - * @param master_sig signature of the donau - * @return #GNUNET_OK if signature is valid - */ -enum GNUNET_GenericReturnValue -TALER_donau_offline_extension_manifests_hash_verify ( - const struct TALER_ExtensionManifestsHashP *h_manifest, - const struct TALER_MasterPublicKeyP *master_pub, - const struct TALER_MasterSignatureP *master_sig - ); - - -/** - * @brief Representation of an age commitment: one public key per age group. - * - * The number of keys must be be the same as the number of bits set in the - * corresponding age mask. - */ -struct TALER_AgeCommitment -{ - - /** - * The age mask defines the age groups that were a parameter during the - * generation of this age commitment - */ - struct TALER_AgeMask mask; - - /** - * The number of public keys, which must be the same as the number of - * groups in the mask. - */ - size_t num; - - /** - * The list of @e num public keys. In must have same size as the number of - * age groups defined in the mask. - * - * A hash of this list is the hashed commitment that goes into FDC - * calculation during the withdraw and refresh operations for new coins. That - * way, the particular age commitment becomes mandatory and bound to a coin. - * - * The list has been allocated via GNUNET_malloc(). - */ - struct TALER_AgeCommitmentPublicKeyP *keys; -}; - - -/** - * @brief Proof for a particular age commitment, used in age attestation - * - * This struct is used in a call to TALER_age_commitment_attest to create an - * attestation for a minimum age (if that minimum age is less or equal to the - * committed age for this proof). It consists of a list private keys, one per - * age group, for which the committed age is either lager or within that - * particular group. - */ -struct TALER_AgeProof -{ - /** - * The number of private keys, which must be at most num_pub_keys. One minus - * this number corresponds to the largest age group that is supported with - * this age commitment. - * **Note**, that this and the next field are only relevant on the wallet - * side for attestation and derive operations. - */ - size_t num; - - /** - * List of @e num private keys. - * - * Note that the list can be _smaller_ than the corresponding list of public - * keys. In that case, the wallet can sign off only for a subset of the age - * groups. - * - * The list has been allocated via GNUNET_malloc. - */ - struct TALER_AgeCommitmentPrivateKeyP *keys; -}; - - -/** - * @brief Commitment and Proof for a maximum age - * - * Calling TALER_age_restriction_commit on an (maximum) age value returns this - * data structure. It consists of the proof, which is used to create - * attestations for compatible minimum ages, and the commitment, which is used - * to verify the attestations and derived commitments. - * - * The hash value of the commitment is bound to a particular coin with age - * restriction. - */ -struct TALER_AgeCommitmentProof -{ - /** - * The commitment is used to verify a particular attestation. Its hash value - * is bound to a particular coin with age restriction. This structure is - * sent to the charity in order to verify a particular attestation for a - * minimum age. - * In itself, it does not convey any information about the maximum age that - * went into the call to TALER_age_restriction_commit. - */ - struct TALER_AgeCommitment commitment; - - /** - * The proof is used to create an attestation for a (compatible) minimum age. - */ - struct TALER_AgeProof proof; -}; - - -/** - * @brief Generates a hash of the public keys in the age commitment. - * - * @param commitment the age commitment - one public key per age group - * @param[out] hash resulting hash - */ -void -TALER_age_commitment_hash ( - const struct TALER_AgeCommitment *commitment, - struct TALER_AgeCommitmentHash *hash); - - -/** - * @brief Generates an age commitent for the given age. - * - * @param mask The age mask the defines the age groups - * @param age The actual age for which an age commitment is generated - * @param seed The seed that goes into the key generation. MUST be chosen uniformly random. - * @param[out] comm_proof The generated age commitment, ->priv and ->pub allocated via GNUNET_malloc() on success - * @return #GNUNET_OK on success, #GNUNET_SYSERR otherwise - */ -enum GNUNET_GenericReturnValue -TALER_age_restriction_commit ( - const struct TALER_AgeMask *mask, - uint8_t age, - const struct GNUNET_HashCode *seed, - struct TALER_AgeCommitmentProof *comm_proof); - - -/** - * @brief Derives another, equivalent age commitment for a given one. - * - * @param orig Original age commitment - * @param salt Salt to randomly move the points on the elliptic curve in order to generate another, equivalent commitment. - * @param[out] derived The resulting age commitment, ->priv and ->pub allocated via GNUNET_malloc() on success. - * @return #GNUNET_OK on success, #GNUNET_SYSERR otherwise - */ -enum GNUNET_GenericReturnValue -TALER_age_commitment_derive ( - const struct TALER_AgeCommitmentProof *orig, - const struct GNUNET_HashCode *salt, - struct TALER_AgeCommitmentProof *derived); - - -/** - * @brief Provide attestation for a given age, from a given age commitment, if possible. - * - * @param comm_proof The age commitment to be used for attestation. For successful attestation, it must contain the private key for the corresponding age group. - * @param age Age (not age group) for which the an attestation should be done - * @param[out] attest Signature of the age with the appropriate key from the age commitment for the corresponding age group, if applicaple. - * @return #GNUNET_OK on success, #GNUNET_NO when no attestation can be made for that age with the given commitment, #GNUNET_SYSERR otherwise - */ -enum GNUNET_GenericReturnValue -TALER_age_commitment_attest ( - const struct TALER_AgeCommitmentProof *comm_proof, - uint8_t age, - struct TALER_AgeAttestation *attest); - - -/** - * @brief Verify the attestation for an given age and age commitment - * - * @param commitment The age commitment that went into the attestation. Only the public keys are needed. - * @param age Age (not age group) for which the an attestation should be done - * @param attest Signature of the age with the appropriate key from the age commitment for the corresponding age group, if applicaple. - * @return #GNUNET_OK when the attestation was successful, #GNUNET_NO no attestation couldn't be verified, #GNUNET_SYSERR otherwise - */ -enum GNUNET_GenericReturnValue -TALER_age_commitment_verify ( - const struct TALER_AgeCommitment *commitment, - uint8_t age, - const struct TALER_AgeAttestation *attest); - - -/** - * @brief helper function to free memory of a struct TALER_AgeCommitment - * - * @param ac the commitment from which all memory should be freed. - */ -void -TALER_age_commitment_free ( - struct TALER_AgeCommitment *ac); - - -/** - * @brief helper function to free memory of a struct TALER_AgeProof - * - * @param ap the proof of commitment from which all memory should be freed. - */ -void -TALER_age_proof_free ( - struct TALER_AgeProof *ap); - - -/** - * @brief helper function to free memory of a struct TALER_AgeCommitmentProof - * - * @param acp the commitment and its proof from which all memory should be freed. - */ -void -TALER_age_commitment_proof_free ( - struct TALER_AgeCommitmentProof *acp); - - -/** - * @brief helper function to allocate and copy a struct TALER_AgeCommitmentProof - * - * @param[in] acp The original age commitment proof - * @return The deep copy of @e acp, allocated - */ -struct TALER_AgeCommitmentProof * -TALER_age_commitment_proof_duplicate ( - const struct TALER_AgeCommitmentProof *acp); - -/** - * @brief helper function to copy a struct TALER_AgeCommitmentProof - * - * @param[in] acp The original age commitment proof - * @param[out] nacp The struct to copy the data into, with freshly allocated and copied keys. - */ -void -TALER_age_commitment_proof_deep_copy ( - const struct TALER_AgeCommitmentProof *acp, - struct TALER_AgeCommitmentProof *nacp); - -/** - * @brief For age-withdraw, clients have to prove that the public keys for all - * age groups larger than the allowed maximum age group are derived by scalar - * multiplication from this Edx25519 public key (in Crockford Base32 encoding): - * - * DZJRF6HXN520505XDAWM8NMH36QV9J3VH77265WQ09EBQ76QSKCG - * - * Its private key was chosen randomly and then deleted. - */ -extern struct -#ifndef AGE_RESTRICTION_WITH_ECDSA -GNUNET_CRYPTO_Edx25519PublicKey -#else -GNUNET_CRYPTO_EcdsaPublicKey -#endif -TALER_age_commitment_base_public_key; - -/** - * @brief Similar to TALER_age_restriction_commit, but takes the coin's - * private key as seed input and calculates the public keys in the slots larger - * than the given age as derived from TALER_age_commitment_base_public_key. - * - * See https://docs.taler.net/core/api-donau.html#withdraw-with-age-restriction - * - * @param secret The master secret of the coin from which we derive the age restriction - * @param mask The age mask, defining the age groups - * @param max_age The maximum age for this coin. - * @param[out] comm_proof The commitment and proof for age restriction for age @a max_age - */ -enum GNUNET_GenericReturnValue -TALER_age_restriction_from_secret ( - const struct TALER_PlanchetMasterSecretP *secret, - const struct TALER_AgeMask *mask, - const uint8_t max_age, - struct TALER_AgeCommitmentProof *comm_proof); - - -/** - * Group of Denominations. These are the common fields of an array of - * denominations. - * - * The corresponding JSON-blob will also contain an array of particular - * denominations with only the timestamps, cipher-specific public key and the - * master signature. - */ -struct TALER_DenominationGroup -{ - - /** - * XOR of all SHA-512 hashes of the public keys in this - * group. - */ - struct GNUNET_HashCode hash; - - /** - * Value of coins in this denomination group. - */ - struct TALER_Amount value; - - /** - * Fee structure for all coins in the group. - */ - struct TALER_DenomFeeSet fees; - - /** - * Cipher used for the denomination. - */ - enum TALER_DenominationCipher cipher; - - /** - * Age mask for the denomiation. - */ - struct TALER_AgeMask age_mask; - -}; - - -/** - * Compute a unique key for the meta data of a denomination group. - * - * @param dg denomination group to evaluate - * @param[out] key key to set - */ -void -TALER_denomination_group_get_key ( - const struct TALER_DenominationGroup *dg, - struct GNUNET_HashCode *key); - - #endif diff --git a/src/include/taler_donau_service.h b/src/include/taler_donau_service.h @@ -518,18 +518,6 @@ struct TALER_DONAU_BlindedUniqueDonationIdentifier }; /** - * blind signatures from the blinded donation envelopes. - */ -struct TALER_BlindedDonationUnitSignature -{ - /** - * The blinded signature - */ - struct TALER_DenominationSignature b_sig; - -}; - -/** * @brief A Batch Submit Handle */ struct TALER_DONAU_BatchIssueReceiptHandle; @@ -640,17 +628,6 @@ TALER_DONAU_charity_issue_receipt_cancel ( struct TALER_DONAU_BatchIssueReceiptHandle *); /** - * @brief Type of signatures used by the donau for non-blind signatures. - */ -struct TALER_DonauSignatureP -{ - /** - * Donau uses EdDSA for for non-blind signatures. - */ - struct GNUNET_CRYPTO_EddsaSignature eddsa_signature; -}; - -/** * unblinded donation unit signature from Donau */ struct TALER_DonationUnitSignature @@ -674,7 +651,7 @@ struct TALER_DONAU_DonationReceipt struct TALER_DonationUnitHashP h_donation_unit_pub; /** - * Donor's unique donation identifier. + * Donor's hashed and salted unique donation identifier. */ struct TALER_DONAU_HashDonorTaxId donor_id; @@ -767,7 +744,7 @@ TALER_DONAU_donor_receipts_to_statement_cancel ( -/* ********************* POST /csr batch-issue (equivalent to withdraw of exchange) *********************** */ +/* ********************* POST /csr batch-issue *********************** */ /** @@ -865,40 +842,193 @@ TALER_DONAU_csr_batch_issue_cancel ( -/* ********************* GET /charities/$CHARITY_ID *********************** */ +/* ********************* GET /charities/ *********************** */ /** * A Charity */ -struct Charity +struct CharitySummary { /** - * Amount issued. + * charity id */ + unsigned int charity_id; + + /** + * charity name + */ + char *name; + + /** + * Max donation amout for this charitiy and year. + */ struct TALER_Amount amount; /** - * Year of validity. + * Current donation amount for this charity and year. */ - unsigned int year; + struct TALER_Amount amount; + +}; + + +/** + * @brief A /charities/ GET Handle + */ +struct TALER_DONAU_CharitiesGetHandle; + + +/** + * @brief summary of every charity + */ +struct TALER_DONAU_GetCharitiesResponse +{ /** - * Charity's eddsa signature. + * High-level HTTP response details. */ - struct TALER_DonauSignatureP donau_sig; + struct TALER_DONAU_HttpResponse hr; + + /** + * Details depending on @e hr.http_status. + */ + union + { + + /** + * Information returned on success, if + * @e hr.http_status is #MHD_HTTP_OK + */ + struct + { + + /** + * Charity status information. + */ + struct CharitySummary *charity; + + /** + * Number of charities + */ + unsigned int num_charity; + + } ok; + + } details; + +}; + + +/** + * Callbacks of this type are used to serve the result of + * charities status request to a donau. + * + * @param cls closure + * @param rs HTTP response data + */ +typedef void +(*TALER_DONAU_GetCharitiesResponseCallback) ( + void *cls, + const struct TALER_DONAU_GetCharitiesResponse *rs); + + +/** + * Submit a request to obtain the transaction history of a charity + * from the donau. Note that while we return the full response to the + * caller for further processing, we do already verify that the + * response is well-formed (i.e. that signatures included in the + * response are all valid and add up to the balance). If the donau's + * reply is not well-formed, we return an HTTP status code of zero to + * @a cb. + * + * @param ctx curl context + * @param url donau base URL + * @param charity_pub public key of the charity to inspect + * @param timeout how long to wait for an affirmative reply + * (enables long polling if the charity does not yet exist) + * @param cb the callback to call when a reply for this request is available + * @param cb_cls closure for the above callback + * @return a handle for this request; NULL if the inputs are invalid (i.e. + * signatures fail to verify). In this case, the callback is not called. + */ +struct TALER_DONAU_CharitiesGetHandle * +TALER_DONAU_charities_get ( + struct GNUNET_CURL_Context *ctx, + const char *url, + TALER_DONAU_GetCharitiesResponseCallback cb, + void *cb_cls); + + +/** + * Cancel a charity GET request. This function cannot be used + * on a request handle if a response is already served for it. + * + * @param rgh the charity request handle + */ +void +TALER_DONAU_charities_get_cancel ( + struct TALER_DONAU_charitiesGetHandle *rgh); + + +/* ********************* GET /charities/$CHARITY_ID *********************** */ + +struct CharityHistoryYear +{ + /** + * year + */ + unsigned int year; + + /** + * final donation amount at the end of @a year; + */ + struct TALER_Amount amount; +}; + + +/** + * information of a charity + */ +struct Charity +{ + /** + * name of the charity + */ + char *name; + + /** + * public key of the charity + */ + struct TALER_DONAU_CharitySignatureP pub_key; + + /** + * Max donation amout for this charitiy and year. + */ + struct TALER_Amount amount; + + /** + * donation history + */ + struct CharityHistoryYear *history; + + /** + * number of charity history years + */ + unsigned int num_hist; + }; /** * @brief A /charities/ GET Handle */ -struct TALER_DONAU_charitysGetHandle; +struct TALER_DONAU_CharityGetHandle; /** - * @brief charity summary. + * @brief summary of a charity */ -struct TALER_DONAU_charitySummary +struct TALER_DONAU_GetCharityResponse { /** @@ -922,7 +1052,8 @@ struct TALER_DONAU_charitySummary /** * Charity status information. */ - struct struct TALER_DONAU_CHARITY_YEAR charity_info; + struct CharitySummary charity; + } ok; @@ -932,16 +1063,16 @@ struct TALER_DONAU_charitySummary /** - * Callbacks of this type are used to serve the result of submitting a + * Callbacks of this type are used to serve the result of a * charity status request to a donau. * * @param cls closure * @param rs HTTP response data */ typedef void -(*TALER_DONAU_charitysGetCallback) ( +(*TALER_DONAU_GetCharityResponseCallback) ( void *cls, - const struct TALER_DONAU_charitySummary *rs); + const struct TALER_DONAU_GetCharityResponse *rs); /** @@ -963,13 +1094,12 @@ typedef void * @return a handle for this request; NULL if the inputs are invalid (i.e. * signatures fail to verify). In this case, the callback is not called. */ -struct TALER_DONAU_charitysGetHandle * -TALER_DONAU_charitys_get ( +struct TALER_DONAU_CharityGetHandle * +TALER_DONAU_charity_get ( struct GNUNET_CURL_Context *ctx, const char *url, const struct TALER_charityPublicKeyP *charity_pub, - struct GNUNET_TIME_Relative timeout, - TALER_DONAU_charitysGetCallback cb, + TALER_DONAU_GetCharityResponseCallback cb, void *cb_cls); @@ -980,10 +1110,11 @@ TALER_DONAU_charitys_get ( * @param rgh the charity request handle */ void -TALER_DONAU_charitys_get_cancel ( - struct TALER_DONAU_charitysGetHandle *rgh); +TALER_DONAU_charity_get_cancel ( + struct TALER_DONAU_charitiesGetHandle *rgh); + -/* ********************* POST /charitys/$CHARITY_ID/batch-issue *********************** */ +/* ********************* POST /charities/$CHARITY_ID *********************** */ /** * A BDID blinded unique donation identifier. @@ -1000,7 +1131,7 @@ struct TALER_DONAU_BlindedDonationIdentifier * donation unit public key. */ struct TALER_DONAU_BlindedUniqueIdentifier blinded_identifier; -} +}; /** * @brief A /charitys/$CHARITY_ID/batch-issue Handle