diff options
author | Christian Grothoff <christian@grothoff.org> | 2020-12-05 19:47:54 +0100 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2020-12-05 19:47:54 +0100 |
commit | 8170e1e9abaf00b9c27c8758998c4df37d77e757 (patch) | |
tree | d8dba0a93e22056b3b1410f9a3a824a829550312 /src/include | |
parent | c898ff53a24aa469bf7958081f7835bd515d7dc3 (diff) |
move all TALER_SIGNATURE_SM_-operations to secmod_signatures.c
Diffstat (limited to 'src/include')
-rw-r--r-- | src/include/taler_crypto_lib.h | 78 |
1 files changed, 78 insertions, 0 deletions
diff --git a/src/include/taler_crypto_lib.h b/src/include/taler_crypto_lib.h index 8203bb9af..b6c7ac72c 100644 --- a/src/include/taler_crypto_lib.h +++ b/src/include/taler_crypto_lib.h @@ -1151,6 +1151,84 @@ TALER_exchange_offline_signkey_validity_verify ( const struct TALER_MasterSignatureP *master_sig); +/** + * Create security module EdDSA signature. + * + * @param exchange_pub public signing key to validate + * @param start_sign starting point of validity for signing + * @param duration how long will the key be in use + * @param secm_priv security module key to sign with + * @param[out] secm_sig where to write the signature + */ +void +TALER_exchange_secmod_eddsa_sign ( + const struct TALER_ExchangePublicKeyP *exchange_pub, + struct GNUNET_TIME_Absolute start_sign, + struct GNUNET_TIME_Relative duration, + const struct TALER_SecurityModulePrivateKeyP *secm_priv, + struct TALER_SecurityModuleSignatureP *secm_sig); + + +/** + * Verify security module EdDSA signature. + * + * @param exchange_pub public signing key to validate + * @param start_sign starting point of validity for signing + * @param duration how long will the key be in use + * @param secm_pub public key to verify against + * @param secm_sig the signature the signature + * @return #GNUNET_OK if the signature is valid + */ +int +TALER_exchange_secmod_eddsa_verify ( + const struct TALER_ExchangePublicKeyP *exchange_pub, + struct GNUNET_TIME_Absolute start_sign, + struct GNUNET_TIME_Relative duration, + const struct TALER_SecurityModulePublicKeyP *secm_pub, + const struct TALER_SecurityModuleSignatureP *secm_sig); + + +/** + * Create security module RSA signature. + * + * @param h_denom_pub hash of the public key to validate + * @param section_name name of the section in the configuration + * @param start_sign starting point of validity for signing + * @param duration how long will the key be in use + * @param secm_priv security module key to sign with + * @param[out] secm_sig where to write the signature + */ +void +TALER_exchange_secmod_rsa_sign ( + const struct GNUNET_HashCode *h_denom_pub, + const char *section_name, + struct GNUNET_TIME_Absolute start_sign, + struct GNUNET_TIME_Relative duration, + const struct TALER_SecurityModulePrivateKeyP *secm_priv, + struct TALER_SecurityModuleSignatureP *secm_sig); + + +/** + * Verify security module RSA signature. + * + * @param h_ednom_pub hash of the public key to validate + * @param section_name name of the section in the configuration + * @param start_sign starting point of validity for signing + * @param duration how long will the key be in use + * @param secm_pub public key to verify against + * @param secm_sig the signature the signature + * @return #GNUNET_OK if the signature is valid + */ +int +TALER_exchange_secmod_rsa_verify ( + const struct GNUNET_HashCode *h_denom_pub, + const char *section_name, + struct GNUNET_TIME_Absolute start_sign, + struct GNUNET_TIME_Relative duration, + const struct TALER_SecurityModulePublicKeyP *secm_pub, + const struct TALER_SecurityModuleSignatureP *secm_sig); + + /* **************** /wire account offline signing **************** */ |