aboutsummaryrefslogtreecommitdiff
path: root/src/include/taler_crypto_lib.h
AgeCommit message (Collapse)Author
2022-02-06-fix more FTBFS issuesChristian Grothoff
2022-02-06-fix more FTBFS issuesChristian Grothoff
2022-02-06-fix refresh FTBFSChristian Grothoff
2022-02-05Merge branch 'master' of ssh://git.taler.net/exchangeGian Demarmels
2022-02-05fix src/utilGian Demarmels
2022-02-05implement csr max request elementsLucien Heuzeveldt
2022-02-05crypto implementationGian Demarmels
2022-02-04syncChristian Grothoff
2022-02-04messing with CS/RSA fixesChristian Grothoff
2022-02-04refactor TALER_coin_ev_hashGian Demarmels
2022-02-04include denom_pub into coin_ev_hashGian Demarmels
2022-02-04fixed nonce check, renamed WithdrawNonceGian Demarmels
2022-02-04introduce new type for security module pubkeysGian Demarmels
2022-02-04implement feedbackLucien Heuzeveldt
2022-02-04refactoringGian Demarmels
2022-02-04removed varargsGian Demarmels
2022-02-04secmod CS sign implementationGian Demarmels
2022-02-04set planchet detail cipher, add cipher checksLucien Heuzeveldt
2022-02-04implement TALER_CRYPTO_helper_cs_r_derive and related testsLucien Heuzeveldt
2022-02-04initial cs_secmod implementationGian Demarmels
2022-02-04secmod cs signatures implementationGian Demarmels
2022-02-04remove varargs in cs crypto implementationLucien Heuzeveldt
2022-02-04utility functionsGian Demarmels
2022-02-04fixed CS signatures and cleanup/refactoringGian Demarmels
2022-02-04add sign and verify implementationGian Demarmels
2022-02-04sign_blinded implementationGian Demarmels
2022-02-04implemented planchet_prepare for CSGian Demarmels
2022-02-04added CS get R functionality and planchet setupGian Demarmels
2022-02-04CS planchet create and withdraw createGian Demarmels
2022-02-04added CS data structures, implemented CS keypairGian Demarmels
2022-01-21[age restriction] progress 12/nÖzgür Kesim
- taler-offline-tool now handles extensions - command "extensions" added with subcommands "show" and "sign" - parses extensions from taler config - shows and signs of extensions and their configurations - creates signed set of configurations for upload - added test for retrieval of extension config - simplified signature verification for extensions - remove per-extension signatures, also from DB schema - adjust prepared statements accordingly - adjust DB event handler for extensions - allow NULL for config for extension in DB schema - handler for /management/extensions adjusted to new datastructures - changed test for TALER_denom_blind/TALER_denom_sign_blinded with and without TALER_AgeHash - minor updates and various fixes
2022-01-11The current recoup API is broken. I guess this is another example where ↵Christian Grothoff
"trivial" API changes turn out to have (multiple!) unexpected consequences. The current "/recoup" API does not have clear idempotency semantics, as we've discussed on the phone. This is already bad by itself, as it makes it hard to write down what the API does other than "whatever the implementation does". However, it actually breaks correctness in this (admittedly kinda contrived, but not impossible) case: Say that we have a coin A obtained via withdrawal and a coin B obtained via refreshing coin A. Now the denominations of A gets revoked.. The wallet does a recoup of A for EUR:1. Now the denomination of B also gets revoked. The wallet recoups B (incidentally also for EUR:1) and now A can be recouped again for EUR:1. But now the exchange is in a state where it will refuse a legitimate recoup request for A because the detection for an idempotent request kicks in. This is IMHO bad API design, and the exchange should simply always recoup the maximum amount. Furthermore, we usually follow the principle of "API calls that take up DB space are paid". With the current recoup API, I can do many tiny recoup requests which the exchange then has to store, right? I guess it would not be a big change to remove the "amount" value from the recoup/recoup-refresh request bodies, right? - Florian
2022-01-08[age restriction] progress 10/nÖzgür Kesim
More work towards support for extensions: - Prepared statements and DB-plugin-functions for setting and retrieving configurations from the database added. - primitive "registry" of extensions for age restrictions and peer2peer (stub) - TALER_Extensions now with FP for parsing, setting and converting a configuration. - /management/extensions handler now verifies signature of the (opaque) json object for all extensions. - /management/extensions handler calls the FP in the corrensponding TALER_Extension for parsing and setting the configuration of a particular extension More work towards age restriction: - TALER_Extensions interfaces for config-parser, -setter and converter implemented for age restriction - DB event handler now retrieves config from database, parses it and sets it (the age mask) in the global extension. - load_age_mask now loads age mask from the global extension (and not from the config file) - add age_restricted_denoms to /keys response
2021-12-27[age restriction] progress 9/nÖzgür Kesim
More worke towards support for extensions and age restriction: - taler-exchange-httpd_management_extensions.c almost completed - handling of request implemented - stub "set_extensions" for database transaction added - utility functions added - TALER_exchange_offline_extension_agemask_{sign,verify} - TALER_agemask_parse_json
2021-12-25-eliminate redundant hash operation on link signaturesChristian Grothoff
2021-12-25v12: also do not sign over merchant_pub in REFUND signature, centralize logicChristian Grothoff
2021-12-25protocol v12 changes (/recoup split, signature changes) plus database ↵Christian Grothoff
sharding plus O(n^2)=>O(n) worst-case complexity reduction on coin balance checks
2021-12-25deduplicate melt signing logic, remove coin_pub from data being signed overChristian Grothoff
2021-12-19add new wrappers around merchant hash codes for tips and pickupsChristian Grothoff
2021-12-16-fix recoup uglinessChristian Grothoff
2021-12-14introducing GNUNET_TIME_Timestamp, recoup now with amountsChristian Grothoff
2021-12-01[age restriction] progress 6/nÖzgür Kesim
lift logic for detection of age restriction of a denomination out from taler-exchange-secmod-rsa.c to taler-exchange_httpd_keys.c
2021-11-28[age restriction] progress 5/nÖzgür Kesim
- taler-exchange-secmod-rsa - extracts AGE_RESTRICTED per denomination from config - propagates flag for each denomination to server - if age restriction is set for a denomination, age _mask_ is taken (for now!) from config
2021-11-17-use different hash for RSA vs. Denomination hashingChristian Grothoff
2021-11-16[age restriction] progress 3/nÖzgür Kesim
- remove redundant struct members for age commitment hash - undo pre-mature implementation in taler-exchange-secmod-rsa.c - carry through age restriction parameter for TALER_denom_blind
2021-11-15avoid duplicationChristian Grothoff
2021-11-14age restriction (load per denomination). 3/nÖzgür Kesim
2021-11-10age restriction progress 2/nÖzgür Kesim
Signed-off-by: Özgür Kesim <oec-taler@kesim.org>
2021-11-09misc TODOs for KYC leftChristian Grothoff
2021-11-06include h_extensions in deposit confirmationChristian Grothoff