aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
m---------contrib/gana0
-rw-r--r--src/exchange/taler-exchange-httpd_keys.c58
-rw-r--r--src/exchange/taler-exchange-httpd_keys.h17
3 files changed, 1 insertions, 74 deletions
diff --git a/contrib/gana b/contrib/gana
-Subproject 6c45f89a6434e7a10ef90503153aa487be9a3de
+Subproject c6caa0a91e01b0c74fd71fce71ee5207264a492
diff --git a/src/exchange/taler-exchange-httpd_keys.c b/src/exchange/taler-exchange-httpd_keys.c
index 913cd7343..4cefcf871 100644
--- a/src/exchange/taler-exchange-httpd_keys.c
+++ b/src/exchange/taler-exchange-httpd_keys.c
@@ -3500,64 +3500,6 @@ TEH_keys_denomination_by_hash_from_state (
enum TALER_ErrorCode
-TEH_keys_denomination_sign (
- const struct TEH_CoinSignData *csd,
- bool for_melt,
- struct TALER_BlindedDenominationSignature *bs)
-{
- struct TEH_KeyStateHandle *ksh;
- struct HelperDenomination *hd;
- const struct TALER_DenominationHashP *h_denom_pub = csd->h_denom_pub;
- const struct TALER_BlindedPlanchet *bp = csd->bp;
-
- ksh = TEH_keys_get_state ();
- if (NULL == ksh)
- return TALER_EC_EXCHANGE_GENERIC_KEYS_MISSING;
- hd = GNUNET_CONTAINER_multihashmap_get (ksh->helpers->denom_keys,
- &h_denom_pub->hash);
- if (NULL == hd)
- return TALER_EC_EXCHANGE_GENERIC_DENOMINATION_KEY_UNKNOWN;
- if (bp->blinded_message->cipher !=
- hd->denom_pub.bsign_pub_key->cipher)
- return TALER_EC_GENERIC_INTERNAL_INVARIANT_FAILURE;
- switch (hd->denom_pub.bsign_pub_key->cipher)
- {
- case GNUNET_CRYPTO_BSA_INVALID:
- break;
- case GNUNET_CRYPTO_BSA_RSA:
- TEH_METRICS_num_signatures[TEH_MT_SIGNATURE_RSA]++;
- {
- struct TALER_CRYPTO_RsaSignRequest rsr = {
- .h_rsa = &hd->h_details.h_rsa,
- .msg = bp->blinded_message->details.rsa_blinded_message.blinded_msg,
- .msg_size =
- bp->blinded_message->details.rsa_blinded_message.blinded_msg_size
- };
-
- return TALER_CRYPTO_helper_rsa_sign (
- ksh->helpers->rsadh,
- &rsr,
- bs);
- }
- case GNUNET_CRYPTO_BSA_CS:
- TEH_METRICS_num_signatures[TEH_MT_SIGNATURE_CS]++;
- {
- struct TALER_CRYPTO_CsSignRequest csr;
-
- csr.h_cs = &hd->h_details.h_cs;
- csr.blinded_planchet = &bp->blinded_message->details.cs_blinded_message;
- return TALER_CRYPTO_helper_cs_sign (
- ksh->helpers->csdh,
- &csr,
- for_melt,
- bs);
- }
- }
- return TALER_EC_GENERIC_INTERNAL_INVARIANT_FAILURE;
-}
-
-
-enum TALER_ErrorCode
TEH_keys_denomination_batch_sign (
unsigned int csds_length,
const struct TEH_CoinSignData csds[static csds_length],
diff --git a/src/exchange/taler-exchange-httpd_keys.h b/src/exchange/taler-exchange-httpd_keys.h
index 5e19ac2ff..e526385ff 100644
--- a/src/exchange/taler-exchange-httpd_keys.h
+++ b/src/exchange/taler-exchange-httpd_keys.h
@@ -300,22 +300,7 @@ struct TEH_CoinSignData
/**
- * Request to sign @a csd for melting.
- *
- * @param csd identifies data to blindly sign and key to sign with
- * @param for_melt true if this is for a melt operation
- * @param[out] bs set to the blind signature on success
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TEH_keys_denomination_sign (
- const struct TEH_CoinSignData *csd,
- bool for_melt,
- struct TALER_BlindedDenominationSignature *bs);
-
-
-/**
- * Request to sign @a csds for melting.
+ * Request to sign @a csds.
*
* @param csds array with data to blindly sign (and keys to sign with)
* @param csds_length length of @a csds array