diff options
author | Christian Grothoff <christian@grothoff.org> | 2020-12-20 17:10:09 +0100 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2020-12-20 17:10:09 +0100 |
commit | 699916056b7aae5f8afda12968e0046e9cc7003e (patch) | |
tree | 03a0e11b0f7575026d1c9b4096c00b90fcc1d7cb /src/include | |
parent | 6a73629aee0f04c0ab9c26329250299d3457c97e (diff) | |
download | exchange-699916056b7aae5f8afda12968e0046e9cc7003e.tar.xz |
misc doxygen fixes
Diffstat (limited to 'src/include')
-rw-r--r-- | src/include/taler_crypto_lib.h | 44 | ||||
-rw-r--r-- | src/include/taler_exchange_service.h | 20 | ||||
-rw-r--r-- | src/include/taler_testing_lib.h | 8 |
3 files changed, 27 insertions, 45 deletions
diff --git a/src/include/taler_crypto_lib.h b/src/include/taler_crypto_lib.h index 2154479ac..70e49697c 100644 --- a/src/include/taler_crypto_lib.h +++ b/src/include/taler_crypto_lib.h @@ -463,7 +463,7 @@ struct TALER_TrackTransferDetails * #GNUNET_NO if it is invalid * #GNUNET_SYSERR if an internal error occurred */ -int +enum GNUNET_GenericReturnValue TALER_test_coin_valid (const struct TALER_CoinPublicInfo *coin_public_info, const struct TALER_DenominationPublicKey *denom_pub); @@ -650,7 +650,7 @@ TALER_planchet_setup_random (struct TALER_PlanchetSecretsP *ps); * other withdraw operations * @return #GNUNET_OK on success */ -int +enum GNUNET_GenericReturnValue TALER_planchet_prepare (const struct TALER_DenominationPublicKey *dk, const struct TALER_PlanchetSecretsP *ps, struct GNUNET_HashCode *c_hash, @@ -668,7 +668,7 @@ TALER_planchet_prepare (const struct TALER_DenominationPublicKey *dk, * @param[out] coin set to the details of the fresh coin * @return #GNUNET_OK on success */ -int +enum GNUNET_GenericReturnValue TALER_planchet_to_coin (const struct TALER_DenominationPublicKey *dk, const struct GNUNET_CRYPTO_RsaSignature *blind_sig, const struct TALER_PlanchetSecretsP *ps, @@ -1081,7 +1081,7 @@ TALER_exchange_offline_auditor_add_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_auditor_add_verify ( const struct TALER_AuditorPublicKeyP *auditor_pub, const char *auditor_url, @@ -1115,7 +1115,7 @@ TALER_exchange_offline_auditor_del_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_auditor_del_verify ( const struct TALER_AuditorPublicKeyP *auditor_pub, struct GNUNET_TIME_Absolute end_date, @@ -1145,7 +1145,7 @@ TALER_exchange_offline_denomination_revoke_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_denomination_revoke_verify ( const struct GNUNET_HashCode *h_denom_pub, const struct TALER_MasterPublicKeyP *master_pub, @@ -1174,7 +1174,7 @@ TALER_exchange_offline_signkey_revoke_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_signkey_revoke_verify ( const struct TALER_ExchangePublicKeyP *exchange_pub, const struct TALER_MasterPublicKeyP *master_pub, @@ -1212,7 +1212,7 @@ TALER_exchange_offline_signkey_validity_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_signkey_validity_verify ( const struct TALER_ExchangePublicKeyP *exchange_pub, struct GNUNET_TIME_Absolute start_sign, @@ -1271,7 +1271,7 @@ TALER_exchange_offline_denom_validity_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_denom_validity_verify ( const struct GNUNET_HashCode *h_denom_pub, struct GNUNET_TIME_Absolute stamp_start, @@ -1315,7 +1315,7 @@ TALER_exchange_secmod_eddsa_sign ( * @param secm_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_secmod_eddsa_verify ( const struct TALER_ExchangePublicKeyP *exchange_pub, struct GNUNET_TIME_Absolute start_sign, @@ -1347,7 +1347,7 @@ TALER_exchange_secmod_rsa_sign ( /** * Verify security module RSA signature. * - * @param h_ednom_pub hash of the public key to validate + * @param h_denom_pub hash of the public key to validate * @param section_name name of the section in the configuration * @param start_sign starting point of validity for signing * @param duration how long will the key be in use @@ -1355,7 +1355,7 @@ TALER_exchange_secmod_rsa_sign ( * @param secm_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_secmod_rsa_verify ( const struct GNUNET_HashCode *h_denom_pub, const char *section_name, @@ -1420,7 +1420,7 @@ TALER_auditor_denom_validity_sign ( * @param auditor_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_auditor_denom_validity_verify ( const char *auditor_url, const struct GNUNET_HashCode *h_denom_pub, @@ -1475,7 +1475,7 @@ TALER_exchange_offline_wire_fee_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_wire_fee_verify ( const char *payment_method, struct GNUNET_TIME_Absolute start_time, @@ -1511,7 +1511,7 @@ TALER_exchange_offline_wire_add_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_wire_add_verify ( const char *payto_uri, struct GNUNET_TIME_Absolute sign_time, @@ -1544,7 +1544,7 @@ TALER_exchange_offline_wire_del_sign ( * @param master_sig the signature the signature * @return #GNUNET_OK if the signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_offline_wire_del_verify ( const char *payto_uri, struct GNUNET_TIME_Absolute sign_time, @@ -1572,7 +1572,7 @@ TALER_exchange_wire_signature_hash (const char *payto_uri, * @param master_sig signature of the exchange * @return #GNUNET_OK if signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_exchange_wire_signature_check ( const char *payto_uri, const struct TALER_MasterPublicKeyP *master_pub, @@ -1617,7 +1617,7 @@ TALER_merchant_wire_signature_hash (const char *payto_uri, * @param merch_sig signature of the merchant * @return #GNUNET_OK if signature is valid */ -int +enum GNUNET_GenericReturnValue TALER_merchant_wire_signature_check ( const char *payto_uri, const char *salt, @@ -1645,13 +1645,13 @@ TALER_merchant_wire_signature_make ( * Blinds the given message with the given blinding key * * @param hash hash of the message to sign - * @param bkey the blinding key + * @param bks the blinding key * @param pkey the public key of the signer * @param[out] buf set to a buffer with the blinded message to be signed * @param[out] buf_size number of bytes stored in @a buf * @return #GNUNET_YES if successful, #GNUNET_NO if RSA key is malicious */ -int +enum GNUNET_GenericReturnValue TALER_rsa_blind (const struct GNUNET_HashCode *hash, const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks, struct GNUNET_CRYPTO_RsaPublicKey *pkey, @@ -1661,8 +1661,8 @@ TALER_rsa_blind (const struct GNUNET_HashCode *hash, /** * Unblind a blind-signed signature. The signature should have been generated - * with #GNUNET_CRYPTO_rsa_sign() using a hash that was blinded with - * #GNUNET_CRYPTO_rsa_blind(). + * with GNUNET_CRYPTO_rsa_sign() using a hash that was blinded with + * GNUNET_CRYPTO_rsa_blind(). * * @param sig the signature made on the blinded signature purpose * @param bks the blinding key secret used to blind the signature purpose diff --git a/src/include/taler_exchange_service.h b/src/include/taler_exchange_service.h index 5691e58de..557348dd5 100644 --- a/src/include/taler_exchange_service.h +++ b/src/include/taler_exchange_service.h @@ -473,26 +473,6 @@ TALER_EXCHANGE_get_keys (struct TALER_EXCHANGE_Handle *exchange); /** - * Set the fake now to be used when requesting "/keys". - * - * @param exchange exchange handle. - * @param now fake now to use. Note: this value will be - * used _until_ its use will be unset via @a TALER_EXCHANGE_unset_now() - */ -void -TALER_EXCHANGE_set_now (struct TALER_EXCHANGE_Handle *exchange, - struct GNUNET_TIME_Absolute now); - -/** - * Unset the fake now to be used when requesting "/keys". - * - * @param exchange exchange handle. - */ -void -TALER_EXCHANGE_unset_now (struct TALER_EXCHANGE_Handle *exchange); - - -/** * Let the user set the last valid denomination time manually. * * @param exchange the exchange handle. diff --git a/src/include/taler_testing_lib.h b/src/include/taler_testing_lib.h index 0900fac9b..fdc1e9bcb 100644 --- a/src/include/taler_testing_lib.h +++ b/src/include/taler_testing_lib.h @@ -1808,15 +1808,17 @@ TALER_TESTING_cmd_check_keys_pull_all_keys (const char *label, * of downloads is less than @a generation, the logic will * first make sure that @a generation downloads are done, * and _then_ execute the rest of the command. - * @param last_denom_date date to be set in the "last_denom_issue" - * URL parameter of /keys. + * @param last_denom_date_ref previous /keys command to use to + * obtain the "last_denom_date" value from; "zero" can be used + * as a special value to force an absolute time of zero to be + * given to as an argument * @return the command. */ struct TALER_TESTING_Command TALER_TESTING_cmd_check_keys_with_last_denom ( const char *label, unsigned int generation, - struct GNUNET_TIME_Absolute last_denom_date); + const char *last_denom_date_ref); /** |