diff options
author | Christian Grothoff <christian@grothoff.org> | 2015-03-13 09:49:47 +0100 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2015-03-13 09:49:47 +0100 |
commit | 968e4aa68f4185d24466bb3ba8bfaba8d9c27ef1 (patch) | |
tree | a29d92350a3b9a8c38986e55bb08b23c9d9d3aa3 /src/mint/taler-mint-httpd_responses.h | |
parent | 2f70806cfaff445880639857fef45fd7bdd7f8a5 (diff) | |
download | exchange-968e4aa68f4185d24466bb3ba8bfaba8d9c27ef1.tar.xz |
slightly better error generation on /refresh/reveal errors
Diffstat (limited to 'src/mint/taler-mint-httpd_responses.h')
-rw-r--r-- | src/mint/taler-mint-httpd_responses.h | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/src/mint/taler-mint-httpd_responses.h b/src/mint/taler-mint-httpd_responses.h index 7d0824c88..d42aa29b6 100644 --- a/src/mint/taler-mint-httpd_responses.h +++ b/src/mint/taler-mint-httpd_responses.h @@ -298,6 +298,30 @@ TALER_MINT_reply_refresh_reveal_success (struct MHD_Connection *connection, /** + * Send a response for a failed "/refresh/reveal", where the + * revealed value(s) do not match the original commitment. + * + * FIXME: should also include the client's signature over + * the original reveal operation and the data that was signed + * over eventually... (#3712) + * + * @param connection the connection to send the response to + * @param off offset in the array of kappa-commitments where + * the missmatch was detected + * @param j index of the coin for which the missmatch was + * detected + * @param missmatch_object name of the object that was + * bogus (i.e. "transfer key"). + * @return a MHD result code + */ +int +TALER_MINT_reply_refresh_reveal_missmatch (struct MHD_Connection *connection, + unsigned int off, + unsigned int j, + const char *missmatch_object); + + +/** * Send a response for "/refresh/link". * * @param connection the connection to send the response to |