mirror of
https://github.com/OpenCoin/oc-mint-cpp.git
synced 2025-07-02 21:29:41 +02:00
Compare commits
15 Commits
d093370713
...
feature/ad
Author | SHA1 | Date | |
---|---|---|---|
2a33e41376 | |||
96d25a0a9a | |||
f385ad9757 | |||
76965de11f | |||
6a68f1cc45 | |||
e3fd9cb576 | |||
84cbb34391 | |||
a2747b6934 | |||
ed525909bb | |||
bdab59a507 | |||
fa746dd925 | |||
0e4c094eed | |||
87386e1b65 | |||
0d3ffa0e5d | |||
24adaebd07 |
13
.github/FUNDING.yml
vendored
Normal file
13
.github/FUNDING.yml
vendored
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# These are supported funding model platforms
|
||||||
|
|
||||||
|
github: [gittiver] # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2]
|
||||||
|
patreon: # Replace with a single Patreon username
|
||||||
|
open_collective: # Replace with a single Open Collective username
|
||||||
|
ko_fi: # Replace with a single Ko-fi username
|
||||||
|
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
|
||||||
|
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
|
||||||
|
liberapay: # Replace with a single Liberapay username
|
||||||
|
issuehunt: # Replace with a single IssueHunt username
|
||||||
|
otechie: # Replace with a single Otechie username
|
||||||
|
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
|
||||||
|
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
|
11
.github/dependabot.yml
vendored
Normal file
11
.github/dependabot.yml
vendored
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# To get started with Dependabot version updates, you'll need to specify which
|
||||||
|
# package ecosystems to update and where the package manifests are located.
|
||||||
|
# Please see the documentation for all configuration options:
|
||||||
|
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
|
||||||
|
|
||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
- package-ecosystem: "" # See documentation for possible values
|
||||||
|
directory: "/" # Location of package manifests
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
39
.github/workflows/cmake.yaml
vendored
39
.github/workflows/cmake.yaml
vendored
@ -1,4 +1,4 @@
|
|||||||
name: CMake
|
name: Build and test (cmake based build)
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
@ -19,34 +19,35 @@ jobs:
|
|||||||
strategy:
|
strategy:
|
||||||
fail-fast: false
|
fail-fast: false
|
||||||
matrix:
|
matrix:
|
||||||
os: [ubuntu-latest, macos-latest, windows-latest]
|
os: [ubuntu-latest,
|
||||||
|
macos-latest,
|
||||||
|
windows-latest]
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- name: Prepare dependencies
|
- name: Prepare dependencies
|
||||||
run: |
|
run: |
|
||||||
if [ "$RUNNER_OS" == "Linux" ]; then
|
if [ "$RUNNER_OS" == "Linux" ]; then
|
||||||
sudo apt-get update && \
|
sudo apt-get update && \
|
||||||
sudo apt-get install -yq \
|
sudo apt-get install -yq \
|
||||||
libboost-system-dev \
|
libasio-dev \
|
||||||
libboost-date-time-dev \
|
libssl-dev zlib1g-dev \
|
||||||
cmake \
|
cmake graphviz doxygen
|
||||||
graphviz doxygen
|
elif [ "$RUNNER_OS" == "Windows" ]; then
|
||||||
elif [ "$RUNNER_OS" == "Windows" ]; then
|
VCPKG_DEFAULT_TRIPLET=x64-windows vcpkg install
|
||||||
choco install boost-msvc-14.3 graphviz doxygen.install
|
elif [ "$RUNNER_OS" == "macOS" ]; then
|
||||||
elif [ "$RUNNER_OS" == "macOS" ]; then
|
brew install asio openssl zlib doxygen graphviz
|
||||||
brew install boost graphviz doxygen
|
else
|
||||||
else
|
echo "$RUNNER_OS not supported"
|
||||||
echo "$RUNNER_OS not supported"
|
exit 1
|
||||||
exit 1
|
fi
|
||||||
fi
|
|
||||||
shell: bash
|
shell: bash
|
||||||
- name: Configure CMake
|
- name: Configure CMake
|
||||||
run: cmake -B ${{github.workspace}}/build -D CMAKE_BUILD_TYPE=${{env.BUILD_TYPE}}
|
run: cmake -B build
|
||||||
shell: bash
|
shell: bash
|
||||||
- name: Build
|
- name: Build
|
||||||
# Build your program with the given configuration
|
# Build your program with the given configuration
|
||||||
run: cmake --build ${{github.workspace}}/build --config ${{env.BUILD_TYPE}}
|
run: cmake --build build --config ${{env.BUILD_TYPE}}
|
||||||
shell: bash
|
shell: bash
|
||||||
|
|
||||||
- name: Test
|
- name: Test
|
||||||
|
2
.github/workflows/doxygen-gh-pages.yml
vendored
2
.github/workflows/doxygen-gh-pages.yml
vendored
@ -1,4 +1,4 @@
|
|||||||
name: Doxygen Github Pages Deploy action
|
name: Deploy Doxygen results to Github Pages
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
|
@ -1,20 +1,25 @@
|
|||||||
cmake_minimum_required(VERSION 3.1.3)
|
cmake_minimum_required(VERSION 3.15.0 FATAL_ERROR)
|
||||||
|
|
||||||
|
project(oc-issuer VERSION 0.0.2 LANGUAGES CXX)
|
||||||
|
|
||||||
enable_language(C)
|
enable_language(C)
|
||||||
enable_language(CXX)
|
enable_language(CXX)
|
||||||
set(CMAKE_CXX_STANDARD 17)
|
set(CMAKE_CXX_STANDARD 17)
|
||||||
|
set(CMAKE_EXPORT_COMPILE_COMMANDS On)
|
||||||
|
|
||||||
|
set(CMAKE_POLICY_DEFAULT_CMP0077 NEW)
|
||||||
if(POLICY CMP0077)
|
if(POLICY CMP0077)
|
||||||
cmake_policy(SET CMP0077 NEW)
|
cmake_policy(SET CMP0077 NEW)
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if (MSVC)
|
if (MSVC)
|
||||||
add_compile_options(/W4 /WX)
|
add_compile_options(/W4)
|
||||||
else()
|
else()
|
||||||
add_compile_options(-Wall -Wextra -pedantic)
|
add_compile_options(-Wall -Wextra -pedantic)
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
project(oc-mint VERSION 0.0.1 LANGUAGES CXX)
|
|
||||||
|
set(CMAKE_EXPORT_COMPILE_COMMANDS ON)
|
||||||
|
|
||||||
include(FetchContent)
|
include(FetchContent)
|
||||||
|
|
||||||
@ -25,11 +30,12 @@ set(CROW_BUILD_EXAMPLES Off)
|
|||||||
set(CROW_BUILD_TOOLS Off)
|
set(CROW_BUILD_TOOLS Off)
|
||||||
set(CROW_BUILD_TESTS Off)
|
set(CROW_BUILD_TESTS Off)
|
||||||
set(CROW_BUILD_DOCS Off)
|
set(CROW_BUILD_DOCS Off)
|
||||||
|
set(CROW_FEATURES "ssl;compression")
|
||||||
|
|
||||||
# add crow project to the build
|
# add crow project to the build
|
||||||
FetchContent_Declare(crow
|
FetchContent_Declare(crow
|
||||||
GIT_REPOSITORY https://github.com/CrowCpp/Crow.git
|
GIT_REPOSITORY https://github.com/CrowCpp/Crow.git
|
||||||
GIT_TAG v1.0+5
|
GIT_TAG v1.2.0
|
||||||
)
|
)
|
||||||
|
|
||||||
if(NOT crow_POPULATED)
|
if(NOT crow_POPULATED)
|
||||||
@ -46,6 +52,18 @@ if(NOT expected_POPULATED)
|
|||||||
FetchContent_Populate(expected)
|
FetchContent_Populate(expected)
|
||||||
endif(NOT expected_POPULATED)
|
endif(NOT expected_POPULATED)
|
||||||
|
|
||||||
|
# add crypt++ (+cmake) library
|
||||||
|
#set(CRYPTOPP_BUILD_TESTING Off)
|
||||||
|
#set(CRYPTOPP_INSTALL Off)
|
||||||
|
|
||||||
|
#if(NOT cryptopp_POPULATED)
|
||||||
|
# FetchContent_Declare(cryptopp
|
||||||
|
# GIT_REPOSITORY https://github.com/abdes/cryptopp-cmake.git
|
||||||
|
# GIT_TAG CRYPTOPP_8_7_0_1)
|
||||||
|
# FetchContent_Populate(cryptopp)
|
||||||
|
# add_subdirectory(${cryptopp_SOURCE_DIR} ${cryptopp_BINARY_DIR})
|
||||||
|
#endif(NOT cryptopp_POPULATED)
|
||||||
|
|
||||||
include(CTest)
|
include(CTest)
|
||||||
enable_testing()
|
enable_testing()
|
||||||
|
|
||||||
@ -54,7 +72,7 @@ set(CATCH_INSTALL_EXTRAS Off)
|
|||||||
FetchContent_Declare(
|
FetchContent_Declare(
|
||||||
Catch2
|
Catch2
|
||||||
GIT_REPOSITORY https://github.com/catchorg/Catch2.git
|
GIT_REPOSITORY https://github.com/catchorg/Catch2.git
|
||||||
GIT_TAG v3.2.0
|
GIT_TAG v3.6.0
|
||||||
)
|
)
|
||||||
|
|
||||||
FetchContent_MakeAvailable(Catch2)
|
FetchContent_MakeAvailable(Catch2)
|
||||||
@ -64,23 +82,30 @@ find_package(Doxygen
|
|||||||
REQUIRED dot
|
REQUIRED dot
|
||||||
OPTIONAL_COMPONENTS mscgen dia)
|
OPTIONAL_COMPONENTS mscgen dia)
|
||||||
set(DOXYGEN_HAVE_DOT YES)
|
set(DOXYGEN_HAVE_DOT YES)
|
||||||
doxygen_add_docs(
|
doxygen_add_docs( doc
|
||||||
doc
|
README.md
|
||||||
src
|
src
|
||||||
COMMENT "Generate documentation"
|
COMMENT "Generate documentation"
|
||||||
)
|
)
|
||||||
|
|
||||||
# build common library
|
# build common library
|
||||||
set(LIB_SOURCES src/model.cpp src/model.hpp)
|
set(LIB_SOURCES
|
||||||
|
src/model.cpp src/model.hpp
|
||||||
|
src/json_serialisation.cpp
|
||||||
|
src/big_int.hpp src/big_int.cpp )
|
||||||
|
|
||||||
add_library(oc-mint-lib ${LIB_SOURCES})
|
add_library(oc-mint-lib ${LIB_SOURCES})
|
||||||
target_link_libraries(oc-mint-lib PUBLIC Crow::Crow)
|
target_link_libraries(oc-mint-lib PUBLIC Crow::Crow) # cryptopp::cryptopp)
|
||||||
target_include_directories(oc-mint-lib PUBLIC ${expected_SOURCE_DIR}/include src)
|
target_include_directories(oc-mint-lib PUBLIC ${expected_SOURCE_DIR}/include src)
|
||||||
|
|
||||||
add_executable(oc-mint src/main.cpp)
|
add_executable(${PROJECT_NAME} src/main.cpp)
|
||||||
target_link_libraries(oc-mint PRIVATE oc-mint-lib INTERFACE tl::expected::expected)
|
target_link_libraries(${PROJECT_NAME} PRIVATE oc-mint-lib INTERFACE tl::expected::expected)
|
||||||
|
|
||||||
## these are unittests that can be run on any platform
|
## these are unittests that can be run on any platform
|
||||||
add_executable(tests test/test.cpp)
|
add_executable(tests test/test_big_int.cpp
|
||||||
|
test/test_json_s8n.cpp
|
||||||
|
test/test_crypto.cpp)
|
||||||
|
|
||||||
target_link_libraries(tests
|
target_link_libraries(tests
|
||||||
oc-mint-lib
|
oc-mint-lib
|
||||||
Catch2::Catch2WithMain)
|
Catch2::Catch2WithMain)
|
||||||
|
49
README.md
49
README.md
@ -1,11 +1,40 @@
|
|||||||

|
opencoin-issuer-cpp - a C++ OpenCoin Issuer REST-API implementation {#mainpage}
|
||||||
|
=============================================================
|
||||||
|
|
||||||
# oc mint sample
|

|
||||||
|
[](https://github.com/OpenCoin/opencoin-issuer-cpp/actions/workflows/doxygen-gh-pages.yml)
|
||||||
|
|
||||||
this is a C++ implementation of the opencoin protocol
|
# opencoin issuer
|
||||||
as mapping to some kind of REST interface
|
|
||||||
|
|
||||||
actually it is a work in progress.
|
this is a C++ implementation of the [opencoin protocol](https://opencoin.org/OpenCoin.html)
|
||||||
|
done as mapping to some kind of REST interface.
|
||||||
|
|
||||||
|
As all issuer related interactions of the protocol follows a request/response mechanism we are able to map all of them to Http-Requests.
|
||||||
|
|
||||||
|
We decided to use POST-Requests in all cases,
|
||||||
|
as the protocol uses JSON-formatted messages for requests.
|
||||||
|
|
||||||
|
The following table gives an overview of the mapping of requests to URLs:
|
||||||
|
|
||||||
|
| Request | URL | Response | C++ Interface Method |
|
||||||
|
|:------------------|:-------------|:------------------------------|:---------------------------------------------------|
|
||||||
|
| RequestCDDCSerial | /cddc/serial | ResponseCDDCSerial | cdd.cdd_serial of Model::get_current_cddc() |
|
||||||
|
| RequestCDDC | /cddc | ResponseCDDC | Model::get_current_cddc() |
|
||||||
|
| RequestMKCs | /mkcs | ResponseMKCs | Model::getMKCs |
|
||||||
|
| RequestMint | /mint | ResponseMint | Model::mint |
|
||||||
|
| RequestRenew | /renew | ResponseMint or ResponseDelay | ? |
|
||||||
|
| RequestResume | /resume | ResponseMint or ResponseDelay | ? |
|
||||||
|
| RequestRedeem | /redeem | ResponseRedeem | Model::redeem |
|
||||||
|
|
||||||
|
actually the implementation is a work in progress.
|
||||||
|
|
||||||
|
## TODO
|
||||||
|
|
||||||
|
- [ ] select crypto library
|
||||||
|
+ https://en.wikipedia.org/wiki/Comparison_of_cryptography_libraries
|
||||||
|
+ [ ] blinding utilizing crypto++
|
||||||
|
+ [ ] integrate session and login to make transactions account based
|
||||||
|
+ [ ] bookkeeping for accounts
|
||||||
|
|
||||||
## Protocol Questions
|
## Protocol Questions
|
||||||
|
|
||||||
@ -14,11 +43,6 @@ or also the key?
|
|||||||
+ the weighted URL as array has a different js encoding as other elements
|
+ the weighted URL as array has a different js encoding as other elements
|
||||||
+ Clarify PSS usage (see https://crypto.stackexchange.com/questions/12707/usability-of-padding-scheme-in-blinded-rsa-signature)
|
+ Clarify PSS usage (see https://crypto.stackexchange.com/questions/12707/usability-of-padding-scheme-in-blinded-rsa-signature)
|
||||||
|
|
||||||
## TODO
|
|
||||||
|
|
||||||
+ [ ] bigint type for big integers encoded as string
|
|
||||||
+ [ ] blinding utilizing crypto++
|
|
||||||
|
|
||||||
### Blinding Notes
|
### Blinding Notes
|
||||||
|
|
||||||
https://stackoverflow.com/questions/47860570/how-to-create-and-verify-blind-rsa-signatures-with-crypto
|
https://stackoverflow.com/questions/47860570/how-to-create-and-verify-blind-rsa-signatures-with-crypto
|
||||||
@ -27,3 +51,8 @@ https://crypto.stackexchange.com/questions/12707/usability-of-padding-scheme-in-
|
|||||||
|
|
||||||
https://crypto.stackexchange.com/questions/54085/is-there-a-standard-padding-format-for-rsa-blind-signatures/60728#60728
|
https://crypto.stackexchange.com/questions/54085/is-there-a-standard-padding-format-for-rsa-blind-signatures/60728#60728
|
||||||
https://crypto.stackexchange.com/questions/5626/rsa-blind-signatures-in-practice
|
https://crypto.stackexchange.com/questions/5626/rsa-blind-signatures-in-practice
|
||||||
|
|
||||||
|
<https://cfrg.github.io/draft-irtf-cfrg-blind-signatures/draft-irtf-cfrg-rsa-blind-signatures.html>
|
||||||
|
|
||||||
|
alternative implementation using openssl
|
||||||
|
https://github.com/jedisct1/blind-rsa-signatures
|
||||||
|
104
src/big_int.cpp
Normal file
104
src/big_int.cpp
Normal file
@ -0,0 +1,104 @@
|
|||||||
|
#include "big_int.hpp"
|
||||||
|
#include "tl/expected.hpp"
|
||||||
|
#include <charconv>
|
||||||
|
|
||||||
|
#pragma clang diagnostic push
|
||||||
|
#pragma ide diagnostic ignored "clion-misra-cpp2008-6-4-5"
|
||||||
|
inline uint8_t hex(char c) {
|
||||||
|
switch(c) {
|
||||||
|
case '0': return 0U;
|
||||||
|
case '1': return 1U;
|
||||||
|
case '2': return 2U;
|
||||||
|
case '3': return 3U;
|
||||||
|
case '4': return 4U;
|
||||||
|
case '5': return 5U;
|
||||||
|
case '6': return 6U;
|
||||||
|
case '7': return 7U;
|
||||||
|
case '8': return 8U;
|
||||||
|
case '9': return 9U;
|
||||||
|
case 'a': return 10U;
|
||||||
|
case 'b': return 11U;
|
||||||
|
case 'c': return 12U;
|
||||||
|
case 'd': return 13U;
|
||||||
|
case 'e': return 14U;
|
||||||
|
case 'f': return 15U;
|
||||||
|
case 'A': return 10U;
|
||||||
|
case 'B': return 11U;
|
||||||
|
case 'C': return 12U;
|
||||||
|
case 'D': return 13U;
|
||||||
|
case 'E': return 14U;
|
||||||
|
case 'F': return 15U;
|
||||||
|
default:
|
||||||
|
return 0xffU;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#pragma clang diagnostic pop
|
||||||
|
|
||||||
|
tl::expected<BigInt,BigInt::eError>
|
||||||
|
BigInt::from_string(const std::string& str) {
|
||||||
|
BigInt b;
|
||||||
|
|
||||||
|
uint8_t hval=0U;
|
||||||
|
uint8_t nibble;
|
||||||
|
size_t i = str.size()+1U;
|
||||||
|
|
||||||
|
for(auto c : str) {
|
||||||
|
nibble = hex(c);
|
||||||
|
if (nibble ==0xFFU) {
|
||||||
|
return tl::make_unexpected(eError::PARSE_ERROR);
|
||||||
|
}
|
||||||
|
if ( i%2U != 0U ) {
|
||||||
|
hval = nibble << 4U;
|
||||||
|
} else {
|
||||||
|
hval |= nibble;
|
||||||
|
b.data[256U - (i/2U)]= hval;
|
||||||
|
hval = 0U;
|
||||||
|
}
|
||||||
|
i--;
|
||||||
|
}
|
||||||
|
|
||||||
|
return b;
|
||||||
|
}
|
||||||
|
|
||||||
|
BigInt BigInt::from_int(uint64_t value)
|
||||||
|
{
|
||||||
|
BigInt b;
|
||||||
|
b.data[248U]=static_cast<uint8_t>(value >> 56 & 0xffU);
|
||||||
|
b.data[249U]=static_cast<uint8_t>(value >> 48 & 0xffU);
|
||||||
|
b.data[250U]=static_cast<uint8_t>(value >> 40U & 0xffU);
|
||||||
|
b.data[251U]=static_cast<uint8_t>(value >> 32U & 0xffU);
|
||||||
|
b.data[252U]=static_cast<uint8_t>(value >> 24U & 0xffU);
|
||||||
|
b.data[253U]=static_cast<uint8_t>(value >> 16U & 0xffU);
|
||||||
|
b.data[254U]=static_cast<uint8_t>(value >> 8U & 0xffU);
|
||||||
|
b.data[255U]=static_cast<uint8_t>(value & 0xffU);
|
||||||
|
return b;
|
||||||
|
}
|
||||||
|
|
||||||
|
constexpr char hex_char [] = "0123456789abcdef";
|
||||||
|
std::string BigInt::to_string() const
|
||||||
|
{
|
||||||
|
std::string s;
|
||||||
|
uint8_t b;
|
||||||
|
uint8_t first_digit = 0U;
|
||||||
|
for (size_t i = 0U; i<256U;i++) {
|
||||||
|
b = data[i];
|
||||||
|
if (first_digit==0U) {
|
||||||
|
if (b==0U) {
|
||||||
|
continue;
|
||||||
|
} else if (b>0xfU) {
|
||||||
|
s.push_back(hex_char[b >> 4]);
|
||||||
|
} else {
|
||||||
|
/* nothing to do here */
|
||||||
|
}
|
||||||
|
s.push_back(hex_char[b & 0xf]);
|
||||||
|
first_digit = b;
|
||||||
|
} else {
|
||||||
|
s.push_back(hex_char[b >> 4]);
|
||||||
|
s.push_back(hex_char[b & 0xf]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return s;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool operator == (const BigInt& rhs, const BigInt& lhs)
|
||||||
|
{ return rhs.data == lhs.data; }
|
27
src/big_int.hpp
Normal file
27
src/big_int.hpp
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
#ifndef OC_ISSUER_BIG_INT_HPP
|
||||||
|
#define OC_ISSUER_BIG_INT_HPP
|
||||||
|
|
||||||
|
#include <string>
|
||||||
|
#include <array>
|
||||||
|
|
||||||
|
#include "tl/expected.hpp"
|
||||||
|
|
||||||
|
struct BigInt {
|
||||||
|
|
||||||
|
BigInt() : data() {}
|
||||||
|
virtual ~BigInt() = default;
|
||||||
|
|
||||||
|
enum class eError : uint8_t { PARSE_ERROR };
|
||||||
|
static tl::expected<BigInt, eError> from_string(const std::string &str);
|
||||||
|
|
||||||
|
static BigInt from_int(uint64_t value);
|
||||||
|
[[nodiscard]] std::string to_string() const;
|
||||||
|
|
||||||
|
friend bool operator == (const BigInt& rhs, const BigInt& lhs);
|
||||||
|
private:
|
||||||
|
std::array<uint8_t,256U> data;
|
||||||
|
};
|
||||||
|
|
||||||
|
bool operator==(const BigInt &rhs, const BigInt &lhs);
|
||||||
|
|
||||||
|
#endif // #ifndef #ifndef OC_ISSUER_BIG_INT_HPP
|
474
src/json_serialisation.cpp
Normal file
474
src/json_serialisation.cpp
Normal file
@ -0,0 +1,474 @@
|
|||||||
|
#include "model.hpp"
|
||||||
|
#include "crow/json.h"
|
||||||
|
#include "tl/expected.hpp"
|
||||||
|
|
||||||
|
#define TO_JSON(name) r[#name]=name
|
||||||
|
#define BIGINT_TO_JSON(name) r[#name]=name.to_string()
|
||||||
|
#define TO_JSON_JSON(name) r[#name]=name.to_json()
|
||||||
|
#define TO_JSON_ARRAY(name) r[#name]=list_to_json(name)
|
||||||
|
|
||||||
|
template <class T>
|
||||||
|
crow::json::wvalue list_to_json(const std::vector<T> &array) {
|
||||||
|
crow::json::wvalue::list l;
|
||||||
|
for (const auto& item : array) {
|
||||||
|
l.push_back(item.to_json());
|
||||||
|
}
|
||||||
|
return {l};
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue list_to_json(const std::vector<unsigned int> &array) {
|
||||||
|
crow::json::wvalue::list l;
|
||||||
|
for (auto item : array) {
|
||||||
|
l.emplace_back(item);
|
||||||
|
}
|
||||||
|
return {l};
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue PublicKey::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
BIGINT_TO_JSON(modulus);
|
||||||
|
BIGINT_TO_JSON(public_exponent);
|
||||||
|
r["type"]="rsa public key";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue WeightedUrl::to_json() const {
|
||||||
|
crow::json::wvalue::list l;
|
||||||
|
crow::json::wvalue w(weight);
|
||||||
|
|
||||||
|
l.push_back(w);
|
||||||
|
l.emplace_back(url);
|
||||||
|
return l;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue CDD::to_json() const {
|
||||||
|
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON(additional_info);
|
||||||
|
TO_JSON(cdd_expiry_date);
|
||||||
|
TO_JSON(cdd_location);
|
||||||
|
TO_JSON(cdd_serial);
|
||||||
|
TO_JSON(cdd_signing_date);
|
||||||
|
TO_JSON(currency_divisor);
|
||||||
|
TO_JSON(currency_name);
|
||||||
|
TO_JSON_ARRAY(denominations);
|
||||||
|
BIGINT_TO_JSON(id);
|
||||||
|
TO_JSON_ARRAY(info_service);
|
||||||
|
TO_JSON(issuer_cipher_suite);
|
||||||
|
TO_JSON_JSON(issuer_public_master_key);
|
||||||
|
TO_JSON_ARRAY(mint_service);
|
||||||
|
TO_JSON(protocol_version);
|
||||||
|
TO_JSON_ARRAY(redeem_service);
|
||||||
|
TO_JSON_ARRAY(renew_service);
|
||||||
|
|
||||||
|
r["type"] = "cdd";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue CDDC::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON_JSON(cdd);
|
||||||
|
TO_JSON(signature);
|
||||||
|
r["type"] = "cdd certificate";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue MintKey::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
|
||||||
|
TO_JSON(cdd_serial);
|
||||||
|
TO_JSON(coins_expiry_date);
|
||||||
|
TO_JSON(denomination);
|
||||||
|
BIGINT_TO_JSON(id);
|
||||||
|
BIGINT_TO_JSON(issuer_id);
|
||||||
|
TO_JSON_JSON(public_mint_key);
|
||||||
|
|
||||||
|
TO_JSON(sign_coins_not_after);
|
||||||
|
TO_JSON(sign_coins_not_before);
|
||||||
|
|
||||||
|
r["type"] = "mint key";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue MintKeyCert::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON_JSON(mint_key);
|
||||||
|
TO_JSON(signature);
|
||||||
|
r["type"] = "mint key certificate";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue Response::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON(message_reference);
|
||||||
|
TO_JSON(status_code);
|
||||||
|
TO_JSON(status_description);
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseCDDCSerial::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
TO_JSON(cdd_serial);
|
||||||
|
|
||||||
|
r["type"] = "response cdd serial";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestCDDCSerial, eError>
|
||||||
|
RequestCDDCSerial::from_string(const std::string &str) {
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!json.has("type") || !json.has("message_reference")) {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else if (json["type"] != "request cdd serial") {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else {
|
||||||
|
RequestCDDCSerial r;
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseCDDC::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
TO_JSON_JSON(cddc);
|
||||||
|
r["type"] = "response cdd serial";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestCDDC, eError>
|
||||||
|
RequestCDDC::from_string(const std::string &str) {
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("type") && json.has("message_reference") &&
|
||||||
|
json.has("cdd_serial"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
||||||
|
} else if (json["type"] != "request cddc") {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
RequestCDDC r;
|
||||||
|
r.cdd_serial = json["cdd_serial"].u();
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestMKCs, eError>
|
||||||
|
RequestMKCs::from_string(const std::string &str) {
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("denominations") && json.has("message_reference") &&
|
||||||
|
json.has("mint_key_ids") && json.has("type"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
||||||
|
} else if (json["type"] != "request mint key certificates") {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
RequestMKCs r;
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
|
||||||
|
auto denominations = json["denominations"];
|
||||||
|
if (denominations.t() != crow::json::type::List) {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
for (const auto& d : denominations.lo()) {
|
||||||
|
r.denominations.push_back(d.u());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
auto mint_key_ids = json["mint_key_ids"];
|
||||||
|
if (mint_key_ids.t() != crow::json::type::List) {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
for (const auto& k: mint_key_ids.lo()) {
|
||||||
|
auto kv = BigInt::from_string(k.s());
|
||||||
|
if (!kv.has_value()) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else {
|
||||||
|
r.mint_key_ids.push_back(*kv);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseMKCs::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
TO_JSON_ARRAY(keys);
|
||||||
|
r["type"] = "response mint key certificates";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue Blind::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
BIGINT_TO_JSON(blinded_payload_hash);
|
||||||
|
BIGINT_TO_JSON(mint_key_id);
|
||||||
|
TO_JSON(reference);
|
||||||
|
r["type"] = "blinded payload hash";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<Blind, eError> Blind::from_json(const crow::json::rvalue &json) {
|
||||||
|
if (!(json.has("type")
|
||||||
|
&& json.has("blinded_payload_hash")
|
||||||
|
&& json.has("mint_key_id")
|
||||||
|
&& json.has("reference"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else if (json["type"] != "blinded payload hash") {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else {
|
||||||
|
Blind r;
|
||||||
|
|
||||||
|
auto hash = BigInt::from_string(json["blinded_payload_hash"].s());
|
||||||
|
if (!hash) {
|
||||||
|
// std::cout << "invalid hash : " << json["blinded_payload_hash"].s()
|
||||||
|
// << std::endl;
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
}
|
||||||
|
r.blinded_payload_hash = hash.value();
|
||||||
|
|
||||||
|
auto key_id = BigInt::from_string(json["mint_key_id"].s());
|
||||||
|
if (!key_id) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
}
|
||||||
|
r.mint_key_id = key_id.value();
|
||||||
|
r.reference = json["reference"].s();
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue BlindSignature::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
BIGINT_TO_JSON(blind_signature);
|
||||||
|
TO_JSON(reference);
|
||||||
|
r["type"] = "blind signature";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestMint, eError>
|
||||||
|
RequestMint::from_string(const std::string &str) {
|
||||||
|
std::vector<Blind> blinds;
|
||||||
|
// "type": "request mint"
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("type") && json.has("message_reference") &&
|
||||||
|
json.has("transaction_reference") && json.has("blinds"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else if (json["type"] != "request mint") {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else {
|
||||||
|
RequestMint r;
|
||||||
|
r.message_reference= json["message_reference"].u();
|
||||||
|
auto tr = BigInt::from_string(json["transaction_reference"].s());
|
||||||
|
if (!tr)
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
|
||||||
|
r.transaction_reference = *tr;
|
||||||
|
if (json["blinds"].t()!=crow::json::type::List) {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
||||||
|
}
|
||||||
|
|
||||||
|
for (const auto& item : json["blinds"]) {
|
||||||
|
auto b = Blind::from_json(item);
|
||||||
|
if (!b.has_value()) {
|
||||||
|
return tl::make_unexpected(b.error());
|
||||||
|
} else {
|
||||||
|
r.blinds.push_back(b.value());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseMint::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
TO_JSON_ARRAY(blind_signatures);
|
||||||
|
r["type"] = "response mint";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue Coin::Payload::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON(cdd_location);
|
||||||
|
TO_JSON(denomination);
|
||||||
|
BIGINT_TO_JSON(issuer_id);
|
||||||
|
BIGINT_TO_JSON(mint_key_id);
|
||||||
|
TO_JSON(protocol_version);
|
||||||
|
BIGINT_TO_JSON(serial);
|
||||||
|
|
||||||
|
r["type"] = "payload";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue Coin::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON_JSON(payload);
|
||||||
|
TO_JSON(signature);
|
||||||
|
r["type"] = "coin";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<Coin::Payload, eError>
|
||||||
|
Coin::Payload::from_json(const crow::json::rvalue &json) {
|
||||||
|
if (!(json.has("cdd_location") && json.has("denomination") &&
|
||||||
|
json.has("issuer_id") && json.has("mint_key_id") &&
|
||||||
|
json.has("protocol_version") && json.has("serial") &&
|
||||||
|
json.has("type"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else if (json["type"] != "payload") {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else {
|
||||||
|
Coin::Payload payload;
|
||||||
|
payload.cdd_location = json["cdd_location"].s();
|
||||||
|
payload.denomination = json["denomination"].u();
|
||||||
|
auto id = BigInt::from_string(json["issuer_id"].s());
|
||||||
|
if (!id)
|
||||||
|
tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
payload.issuer_id = *id;
|
||||||
|
|
||||||
|
id = BigInt::from_string(json["mint_key_id"].s());
|
||||||
|
if (!id)
|
||||||
|
tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
payload.mint_key_id = *id;
|
||||||
|
payload.protocol_version = json["protocol_version"].s();
|
||||||
|
id = BigInt::from_string(json["serial"].s());
|
||||||
|
if (!id)
|
||||||
|
tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
payload.serial = *id;
|
||||||
|
return payload;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<Coin, eError> Coin::from_json(const crow::json::rvalue &json) {
|
||||||
|
if (!(json.has("type") && json.has("payload") && json.has("signature"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else if (json["type"] != "coin") {
|
||||||
|
return tl::make_unexpected(eError::JSON_ERROR);
|
||||||
|
} else {
|
||||||
|
auto pl = Payload::from_json(json["payload"]);
|
||||||
|
if (!pl.has_value()) {
|
||||||
|
return tl::make_unexpected(pl.error());
|
||||||
|
} else {
|
||||||
|
Coin c;
|
||||||
|
c.payload = pl.value();
|
||||||
|
c.signature = json["signature"].s();
|
||||||
|
return c;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue CoinStack::to_json() const {
|
||||||
|
crow::json::wvalue r;
|
||||||
|
TO_JSON_ARRAY(coins);
|
||||||
|
TO_JSON(subject);
|
||||||
|
r["type"] = "coinstack";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestRenew, eError>
|
||||||
|
RequestRenew::from_string(const std::string &str) {
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("blinds") && json.has("coins") &&
|
||||||
|
json.has("transaction_reference") &&
|
||||||
|
json.has("message_reference") && json.has("type"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
||||||
|
} else if (json["type"] != "request renew") {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else if ((json["coins"].t() != crow::json::type::List) ||
|
||||||
|
(json["blinds"].t() != crow::json::type::List)) {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
||||||
|
} else {
|
||||||
|
RequestRenew r;
|
||||||
|
|
||||||
|
for (const auto& item : json["coins"]) {
|
||||||
|
auto coin = Coin::from_json(item);
|
||||||
|
if (!coin.has_value()) {
|
||||||
|
return tl::make_unexpected(coin.error());
|
||||||
|
} else {
|
||||||
|
r.coins.push_back(coin.value());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for (const auto& item : json["blinds"]) {
|
||||||
|
auto blind = Blind::from_json(item);
|
||||||
|
if (!blind.has_value()) {
|
||||||
|
return tl::make_unexpected(blind.error());
|
||||||
|
} else {
|
||||||
|
r.blinds.push_back(blind.value());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
r.transaction_reference = json["transaction_reference"].s();
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseDelay::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
r["type"] = "response delay";
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestResume, eError>
|
||||||
|
RequestResume::from_string(const std::string &str) {
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("transaction_reference") &&
|
||||||
|
json.has("message_reference") && json.has("type"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
||||||
|
} else if (json["type"] != "request resume") {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
RequestResume r;
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
auto tr = BigInt::from_string(json["transaction_reference"].s());
|
||||||
|
if (!tr)
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
r.transaction_reference = *tr;
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tl::expected<RequestRedeem, eError>
|
||||||
|
RequestRedeem::from_string(const std::string &str) {
|
||||||
|
// "type":
|
||||||
|
auto json = crow::json::load(str);
|
||||||
|
if (!json) {
|
||||||
|
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
||||||
|
} else if (!(json.has("coins") && json.has("message_reference") &&
|
||||||
|
json.has("type"))) {
|
||||||
|
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
||||||
|
} else if (json["type"] != "request redeem") {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
||||||
|
} else {
|
||||||
|
RequestRedeem r;
|
||||||
|
r.message_reference = json["message_reference"].u();
|
||||||
|
if (json["coins"].t() != crow::json::type::List) {
|
||||||
|
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
||||||
|
}
|
||||||
|
|
||||||
|
for (const auto& item : json["coins"]) {
|
||||||
|
auto coin = Coin::from_json(item);
|
||||||
|
if (!coin.has_value()) {
|
||||||
|
return tl::make_unexpected(coin.error());
|
||||||
|
} else {
|
||||||
|
r.coins.push_back(coin.value());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
crow::json::wvalue ResponseRedeem::to_json() const {
|
||||||
|
crow::json::wvalue r = Response::to_json();
|
||||||
|
r["type"] = "response redeem";
|
||||||
|
return r;
|
||||||
|
}
|
26
src/main.cpp
26
src/main.cpp
@ -1,22 +1,22 @@
|
|||||||
#include "crow.h"
|
#include "crow.h"
|
||||||
#include "crow/common.h"
|
#include "crow/common.h"
|
||||||
#include "crow/http_parser_merged.h"
|
|
||||||
#include "crow/http_response.h"
|
#include "crow/http_response.h"
|
||||||
#include "model.hpp"
|
#include "model.hpp"
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
crow::SimpleApp app;
|
crow::SimpleApp app;
|
||||||
std::shared_ptr<Model> model = Model::getModel("simple");
|
std::shared_ptr<Model> model = Model::get_model("simple");
|
||||||
|
|
||||||
CROW_ROUTE(app, "/cddc")
|
CROW_ROUTE(app, "/cddc")
|
||||||
.methods(crow::HTTPMethod::POST)([&model](const crow::request &req) {
|
.methods(crow::HTTPMethod::POST)
|
||||||
|
([&model](const crow::request &req) {
|
||||||
auto req_cddc = RequestCDDC::from_string(req.body);
|
auto req_cddc = RequestCDDC::from_string(req.body);
|
||||||
if (!req_cddc) {
|
if (!req_cddc) {
|
||||||
return crow::response(crow::status::BAD_REQUEST);
|
return crow::response(crow::status::BAD_REQUEST);
|
||||||
} else {
|
} else {
|
||||||
ResponseCDDC res;
|
ResponseCDDC res;
|
||||||
res.message_reference = req_cddc->message_reference;
|
res.message_reference = req_cddc->message_reference;
|
||||||
auto cddc = model->getCDDC(req_cddc->cdd_serial);
|
auto cddc = model->get_cddc(req_cddc->cdd_serial);
|
||||||
if (!cddc) {
|
if (!cddc) {
|
||||||
res.status_code = crow::status::NOT_FOUND;
|
res.status_code = crow::status::NOT_FOUND;
|
||||||
} else {
|
} else {
|
||||||
@ -29,14 +29,14 @@ int main() {
|
|||||||
|
|
||||||
CROW_ROUTE(app, "/cddc/serial")
|
CROW_ROUTE(app, "/cddc/serial")
|
||||||
.methods(crow::HTTPMethod::POST)([&model](const crow::request &request) {
|
.methods(crow::HTTPMethod::POST)([&model](const crow::request &request) {
|
||||||
auto req = RequestCDDSerial::from_string(request.body);
|
auto req = RequestCDDCSerial::from_string(request.body);
|
||||||
if (!req) {
|
if (!req) {
|
||||||
return crow::response(crow::status::BAD_REQUEST);
|
return crow::response(crow::status::BAD_REQUEST);
|
||||||
} else {
|
} else {
|
||||||
ResponseCDDSerial res;
|
ResponseCDDCSerial res;
|
||||||
res.message_reference = req->message_reference;
|
res.message_reference = req->message_reference;
|
||||||
|
|
||||||
auto cddc = model->getCurrentCDDC();
|
auto cddc = model->get_current_cddc();
|
||||||
if (!cddc) {
|
if (!cddc) {
|
||||||
res.status_code = crow::status::NOT_FOUND;
|
res.status_code = crow::status::NOT_FOUND;
|
||||||
} else {
|
} else {
|
||||||
@ -47,8 +47,8 @@ int main() {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
CROW_ROUTE(app, "/mkcs")
|
CROW_ROUTE(app, "/mkcs").methods(crow::HTTPMethod::POST)
|
||||||
.methods(crow::HTTPMethod::POST)([&model](const crow::request &request) {
|
([&model](const crow::request &request) {
|
||||||
auto req = RequestMKCs::from_string(request.body);
|
auto req = RequestMKCs::from_string(request.body);
|
||||||
if (!req) {
|
if (!req) {
|
||||||
return crow::response(crow::status::BAD_REQUEST);
|
return crow::response(crow::status::BAD_REQUEST);
|
||||||
@ -61,8 +61,8 @@ int main() {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
CROW_ROUTE(app, "/mint")
|
CROW_ROUTE(app, "/mint").methods(crow::HTTPMethod::POST)
|
||||||
.methods(crow::HTTPMethod::POST)([&model](const crow::request &request) {
|
([&model](const crow::request &request) {
|
||||||
auto req = RequestMint::from_string(request.body);
|
auto req = RequestMint::from_string(request.body);
|
||||||
if (!req) {
|
if (!req) {
|
||||||
return crow::response(crow::status::BAD_REQUEST);
|
return crow::response(crow::status::BAD_REQUEST);
|
||||||
@ -70,7 +70,9 @@ int main() {
|
|||||||
ResponseMint res;
|
ResponseMint res;
|
||||||
res.message_reference = req->message_reference;
|
res.message_reference = req->message_reference;
|
||||||
|
|
||||||
auto minted = model->mint(req->transaction_reference, req->blinds);
|
/// \todo change argument transaction_reference to bigint
|
||||||
|
auto minted =
|
||||||
|
model->mint(req->transaction_reference.to_string(), req->blinds);
|
||||||
|
|
||||||
res.blind_signatures = minted;
|
res.blind_signatures = minted;
|
||||||
res.status_code = crow::status::OK;
|
res.status_code = crow::status::OK;
|
||||||
|
504
src/model.cpp
504
src/model.cpp
@ -1,484 +1,56 @@
|
|||||||
#include "model.hpp"
|
#include "model.hpp"
|
||||||
#include "crow/json.h"
|
#include "tl/expected.hpp"
|
||||||
|
|
||||||
#define TO_JSON(name) r[#name] = name
|
|
||||||
#define TO_JSON_JSON(name) r[#name] = name.to_json()
|
|
||||||
#define TO_JSON_ARRAY(name) r[#name] = list_to_json(name)
|
|
||||||
|
|
||||||
template <class T>
|
|
||||||
crow::json::wvalue list_to_json(const std::vector<T> &array) {
|
|
||||||
crow::json::wvalue::list l;
|
|
||||||
for (auto item : array)
|
|
||||||
l.push_back(item.to_json());
|
|
||||||
return crow::json::wvalue(l);
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue list_to_json(const std::vector<unsigned int> &array) {
|
|
||||||
crow::json::wvalue::list l;
|
|
||||||
for (auto item : array)
|
|
||||||
l.push_back(item);
|
|
||||||
return crow::json::wvalue(l);
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue PublicKey::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(modulus);
|
|
||||||
TO_JSON(public_exponent);
|
|
||||||
r["type"] = "rsa public key";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue WeightedUrl::to_json() const {
|
|
||||||
crow::json::wvalue::list l;
|
|
||||||
crow::json::wvalue w(weight);
|
|
||||||
|
|
||||||
l.push_back(w);
|
|
||||||
l.push_back(url);
|
|
||||||
return l;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue CDD::to_json() const {
|
|
||||||
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(additional_info);
|
|
||||||
TO_JSON(cdd_expiry_date);
|
|
||||||
TO_JSON(cdd_location);
|
|
||||||
TO_JSON(cdd_serial);
|
|
||||||
TO_JSON(cdd_signing_date);
|
|
||||||
TO_JSON(currency_divisor);
|
|
||||||
TO_JSON(currency_name);
|
|
||||||
TO_JSON_ARRAY(denominations);
|
|
||||||
TO_JSON(id);
|
|
||||||
TO_JSON_ARRAY(info_service);
|
|
||||||
TO_JSON(issuer_cipher_suite);
|
|
||||||
TO_JSON_JSON(issuer_public_master_key);
|
|
||||||
TO_JSON_ARRAY(mint_service);
|
|
||||||
TO_JSON(protocol_version);
|
|
||||||
TO_JSON_ARRAY(redeem_service);
|
|
||||||
TO_JSON_ARRAY(renew_service);
|
|
||||||
|
|
||||||
r["type"] = "cdd";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue CDDC::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON_JSON(cdd);
|
|
||||||
TO_JSON(signature);
|
|
||||||
r["type"] = "cdd certificate";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue MintKey::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
|
|
||||||
TO_JSON(cdd_serial);
|
|
||||||
TO_JSON(coins_expiry_date);
|
|
||||||
TO_JSON(denomination);
|
|
||||||
TO_JSON(id);
|
|
||||||
TO_JSON(issuer_id);
|
|
||||||
TO_JSON_JSON(public_mint_key);
|
|
||||||
|
|
||||||
TO_JSON(sign_coins_not_after);
|
|
||||||
TO_JSON(sign_coins_not_before);
|
|
||||||
|
|
||||||
r["type"] = "mint key";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue MintKeyCert::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON_JSON(mint_key);
|
|
||||||
TO_JSON(signature);
|
|
||||||
r["type"] = "mint key certificate";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue Response::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(message_reference);
|
|
||||||
TO_JSON(status_code);
|
|
||||||
TO_JSON(status_description);
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseCDDSerial::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
TO_JSON(cdd_serial);
|
|
||||||
|
|
||||||
r["type"] = "response cdd serial";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestCDDSerial, eError>
|
|
||||||
RequestCDDSerial::from_string(const std::string &str) {
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!json.has("type") || !json.has("message_reference")) {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else if (json["type"] != "request cdd serial") {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else {
|
|
||||||
RequestCDDSerial r;
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseCDDC::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
TO_JSON_JSON(cddc);
|
|
||||||
r["type"] = "response cdd serial";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestCDDC, eError>
|
|
||||||
RequestCDDC::from_string(const std::string &str) {
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("type") && json.has("message_reference") &&
|
|
||||||
json.has("cdd_serial"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
|
||||||
} else if (json["type"] != "request cddc") {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
RequestCDDC r;
|
|
||||||
r.cdd_serial = json["cdd_serial"].u();
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestMKCs, eError>
|
|
||||||
RequestMKCs::from_string(const std::string &str) {
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("denominations") && json.has("message_reference") &&
|
|
||||||
json.has("mint_key_ids") && json.has("type"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
|
||||||
} else if (json["type"] != "request mint key certificates") {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
RequestMKCs r;
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
|
|
||||||
auto denominations = json["denominations"];
|
|
||||||
if (denominations.t() != crow::json::type::List) {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
for (auto d : denominations.lo()) {
|
|
||||||
r.denominations.push_back(d.u());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
auto mint_key_ids = json["mint_key_ids"];
|
|
||||||
if (mint_key_ids.t() != crow::json::type::List) {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
for (auto k : mint_key_ids.lo()) {
|
|
||||||
r.mint_key_ids.push_back(k.u());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseMKCs::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
TO_JSON_ARRAY(keys);
|
|
||||||
r["type"] = "response mint key certificates";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue Blind::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(blinded_payload_hash);
|
|
||||||
TO_JSON(mint_key_id);
|
|
||||||
TO_JSON(reference);
|
|
||||||
r["type"] = "blinded payload hash";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<Blind, eError> Blind::from_json(const crow::json::rvalue &json) {
|
|
||||||
if (!(json.has("type") && json.has("blinded_payload_hash") &&
|
|
||||||
json.has("mint_key_id") && json.has("reference"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else if (json["type"] != "blinded payload hash") {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else {
|
|
||||||
Blind r;
|
|
||||||
r.blinded_payload_hash = json["blinded_payload_hash"].s();
|
|
||||||
r.mint_key_id = json["mint_key_id"].s();
|
|
||||||
r.reference = json["reference"].s();
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue BlindSignature::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(blind_signature);
|
|
||||||
TO_JSON(reference);
|
|
||||||
r["type"] = "blind signature";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestMint, eError>
|
|
||||||
RequestMint::from_string(const std::string &str) {
|
|
||||||
std::vector<Blind> blinds;
|
|
||||||
// "type": "request mint"
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("type") && json.has("message_reference") &&
|
|
||||||
json.has("transaction_reference") && json.has("blinds"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else if (json["type"] != "request mint") {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else {
|
|
||||||
RequestMint r;
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
r.transaction_reference = json["transaction_reference"].s();
|
|
||||||
if (json["blinds"].t() != crow::json::type::List) {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
|
||||||
}
|
|
||||||
|
|
||||||
for (auto item : json["blinds"]) {
|
|
||||||
auto b = Blind::from_json(item);
|
|
||||||
if (!b.has_value()) {
|
|
||||||
return tl::make_unexpected(b.error());
|
|
||||||
} else {
|
|
||||||
r.blinds.push_back(b.value());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseMint::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
TO_JSON_ARRAY(blind_signatures);
|
|
||||||
r["type"] = "response mint";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue Coin::Payload::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON(cdd_location);
|
|
||||||
TO_JSON(denomination);
|
|
||||||
TO_JSON(issuer_id);
|
|
||||||
TO_JSON(mint_key_id);
|
|
||||||
TO_JSON(protocol_version);
|
|
||||||
TO_JSON(serial);
|
|
||||||
|
|
||||||
r["type"] = "payload";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue Coin::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON_JSON(payload);
|
|
||||||
TO_JSON(signature);
|
|
||||||
r["type"] = "coin";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<Coin::Payload, eError>
|
|
||||||
Coin::Payload::from_json(const crow::json::rvalue &json) {
|
|
||||||
if (!(json.has("cdd_location") && json.has("denomination") &&
|
|
||||||
json.has("issuer_id") && json.has("mint_key_id") &&
|
|
||||||
json.has("protocol_version") && json.has("serial") &&
|
|
||||||
json.has("type"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else if (json["type"] != "payload") {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else {
|
|
||||||
Coin::Payload payload;
|
|
||||||
payload.cdd_location = json["cdd_location"].s();
|
|
||||||
payload.denomination = json["denomination"].u();
|
|
||||||
payload.issuer_id = json["issuer_id"].s();
|
|
||||||
payload.mint_key_id = json["mint_key_id"].s();
|
|
||||||
payload.protocol_version = json["protocol_version"].s();
|
|
||||||
payload.serial = json["serial"].s();
|
|
||||||
return payload;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<Coin, eError> Coin::from_json(const crow::json::rvalue &json) {
|
|
||||||
if (!(json.has("type") && json.has("payload") && json.has("signature"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else if (json["type"] != "coin") {
|
|
||||||
return tl::make_unexpected(eError::JSON_ERROR);
|
|
||||||
} else {
|
|
||||||
auto pl = Payload::from_json(json["payload"]);
|
|
||||||
if (!pl.has_value()) {
|
|
||||||
return tl::make_unexpected(pl.error());
|
|
||||||
} else {
|
|
||||||
Coin c;
|
|
||||||
c.payload = pl.value();
|
|
||||||
c.signature = json["signature"].s();
|
|
||||||
return c;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue CoinStack::to_json() const {
|
|
||||||
crow::json::wvalue r;
|
|
||||||
TO_JSON_ARRAY(coins);
|
|
||||||
TO_JSON(subject);
|
|
||||||
r["type"] = "coinstack";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestRenew, eError>
|
|
||||||
RequestRenew::from_string(const std::string &str) {
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("blinds") && json.has("coins") &&
|
|
||||||
json.has("transaction_reference") &&
|
|
||||||
json.has("message_reference") && json.has("type"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
|
||||||
} else if (json["type"] != "request renew") {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else if ((json["coins"].t() != crow::json::type::List) ||
|
|
||||||
(json["blinds"].t() != crow::json::type::List)) {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
|
||||||
} else {
|
|
||||||
RequestRenew r;
|
|
||||||
|
|
||||||
for (auto item : json["coins"]) {
|
|
||||||
auto coin = Coin::from_json(item);
|
|
||||||
if (!coin.has_value()) {
|
|
||||||
return tl::make_unexpected(coin.error());
|
|
||||||
} else {
|
|
||||||
r.coins.push_back(coin.value());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
for (auto item : json["blinds"]) {
|
|
||||||
auto blind = Blind::from_json(item);
|
|
||||||
if (!blind.has_value()) {
|
|
||||||
return tl::make_unexpected(blind.error());
|
|
||||||
} else {
|
|
||||||
r.blinds.push_back(blind.value());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
r.transaction_reference = json["transaction_reference"].s();
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseDelay::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
r["type"] = "response delay";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestResume, eError>
|
|
||||||
RequestResume::from_string(const std::string &str) {
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("transaction_reference") &&
|
|
||||||
json.has("message_reference") && json.has("type"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
|
||||||
} else if (json["type"] != "request resume") {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
RequestResume r;
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
r.transaction_reference = json["transaction_reference"].s();
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tl::expected<RequestRedeem, eError>
|
|
||||||
RequestRedeem::from_string(const std::string &str) {
|
|
||||||
// "type":
|
|
||||||
auto json = crow::json::load(str);
|
|
||||||
if (!json) {
|
|
||||||
return tl::make_unexpected(eError::JSON_PARSE_ERROR);
|
|
||||||
} else if (!(json.has("coins") && json.has("message_reference") &&
|
|
||||||
json.has("type"))) {
|
|
||||||
return tl::make_unexpected(eError::JSON_MISSING_KEY);
|
|
||||||
} else if (json["type"] != "request redeem") {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_REQUEST_TYPE);
|
|
||||||
} else {
|
|
||||||
RequestRedeem r;
|
|
||||||
r.message_reference = json["message_reference"].u();
|
|
||||||
if (json["coins"].t() != crow::json::type::List) {
|
|
||||||
return tl::make_unexpected(eError::JSON_WRONG_VALUE_TYPE);
|
|
||||||
}
|
|
||||||
|
|
||||||
for (auto item : json["coins"]) {
|
|
||||||
auto coin = Coin::from_json(item);
|
|
||||||
if (!coin.has_value()) {
|
|
||||||
return tl::make_unexpected(coin.error());
|
|
||||||
} else {
|
|
||||||
r.coins.push_back(coin.value());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
crow::json::wvalue ResponseRedeem::to_json() const {
|
|
||||||
crow::json::wvalue r = Response::to_json();
|
|
||||||
r["type"] = "response redeem";
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
using std::cout;
|
using std::cout;
|
||||||
using std::endl;
|
using std::endl;
|
||||||
|
#define UNUSED(s) /* s */
|
||||||
|
|
||||||
/** this is for now our sample model */
|
/** this is for now our sample model */
|
||||||
class DefaultModel : public Model {
|
class DefaultModel : public Model {
|
||||||
public:
|
public:
|
||||||
DefaultModel() {}
|
DefaultModel() = default;
|
||||||
tl::expected<CDDC *, bool> getCDDC(unsigned int cdd_serial) override {
|
|
||||||
cout << __FUNCTION__ << "(" << cdd_serial << ")" << endl;
|
|
||||||
return &m_cddc;
|
|
||||||
};
|
|
||||||
|
|
||||||
tl::expected<CDDC *, bool> getCurrentCDDC() override {
|
tl::expected<CDDC *, bool> get_cddc(unsigned int cdd_serial) override {
|
||||||
cout << __FUNCTION__ << "()" << endl;
|
cout << __FUNCTION__ << "(" << cdd_serial << ")" << endl; // NOLINT(clion-misra-cpp2008-5-2-12)
|
||||||
|
return &m_cddc;
|
||||||
|
};
|
||||||
|
|
||||||
return &m_cddc;
|
tl::expected<CDDC *, bool> get_current_cddc() override {
|
||||||
}
|
cout << __FUNCTION__ << "()" << endl;
|
||||||
|
|
||||||
std::vector<BlindSignature> mint(const std::string &transaction_reference,
|
return &m_cddc;
|
||||||
const std::vector<Blind> &blinds) override {
|
}
|
||||||
std::vector<BlindSignature> res;
|
|
||||||
cout << __FUNCTION__ << "("
|
|
||||||
<< ")" << endl;
|
|
||||||
|
|
||||||
return res;
|
std::vector<BlindSignature>
|
||||||
}
|
mint(const std::string & UNUSED(transaction_reference),
|
||||||
|
const std::vector<Blind> &UNUSED(blinds)) override {
|
||||||
|
std::vector<BlindSignature> res;
|
||||||
|
cout << __FUNCTION__ << "("
|
||||||
|
<< ")" << endl;
|
||||||
|
|
||||||
const std::vector<MintKeyCert>
|
return res;
|
||||||
getMKCs(const std::vector<unsigned int> &denominations,
|
}
|
||||||
const std::vector<unsigned int> &mint_key_ids) override {
|
|
||||||
std::vector<MintKeyCert> res;
|
std::vector<MintKeyCert>
|
||||||
cout << __FUNCTION__ << endl;
|
getMKCs(const std::vector<unsigned int> & UNUSED(denominations),
|
||||||
return res;
|
const std::vector<BigInt> & UNUSED(mint_key_ids)) override {
|
||||||
}
|
std::vector<MintKeyCert> res;
|
||||||
bool redeem(const std::vector<Coin> &coins) override {
|
cout << __FUNCTION__ << endl;
|
||||||
cout << __FUNCTION__ << endl;
|
return res;
|
||||||
return false;
|
}
|
||||||
}
|
|
||||||
|
bool redeem(const std::vector<Coin> &UNUSED(coins)) override {
|
||||||
|
cout << __FUNCTION__ << endl;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
CDDC m_cddc;
|
CDDC m_cddc;
|
||||||
};
|
};
|
||||||
|
|
||||||
std::unique_ptr<Model> Model::getModel(const std::string & /*backend_name*/) {
|
std::unique_ptr<Model> Model::get_model(const std::string & /*backend_name*/) {
|
||||||
cout << __FUNCTION__ << endl;
|
cout << __FUNCTION__ << endl;
|
||||||
//:wq
|
//:wq
|
||||||
// if (backend_name=="default")
|
// if (backend_name=="default")
|
||||||
return std::make_unique<DefaultModel>();
|
return std::make_unique<DefaultModel>();
|
||||||
}
|
}
|
||||||
|
184
src/model.hpp
184
src/model.hpp
@ -1,5 +1,5 @@
|
|||||||
#ifndef MODEL_HPP
|
#ifndef OC_ISSUER_MODEL_HPP
|
||||||
#define MODEL_HPP
|
#define OC_ISSUER_MODEL_HPP
|
||||||
|
|
||||||
#include <chrono>
|
#include <chrono>
|
||||||
#include <memory>
|
#include <memory>
|
||||||
@ -9,76 +9,84 @@
|
|||||||
#include "crow/json.h"
|
#include "crow/json.h"
|
||||||
|
|
||||||
#include "tl/expected.hpp"
|
#include "tl/expected.hpp"
|
||||||
|
#include "big_int.hpp"
|
||||||
|
|
||||||
struct PublicKey {
|
struct PublicKey {
|
||||||
std::string modulus; //: "daaa63ddda38c189b8c49020c8276adbe0a695685a...",
|
BigInt modulus; //: "daaa63ddda38c189b8c49020c8276adbe0a695685a...",
|
||||||
std::string public_exponent; //: 65537,
|
BigInt public_exponent;//: 65537,
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct WeightedUrl {
|
struct WeightedUrl {
|
||||||
uint32_t weight;
|
uint32_t weight;
|
||||||
std::string url;
|
std::string url;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
/** currency description document */
|
/** @brief currency description document
|
||||||
|
*
|
||||||
|
* this structure describes a currency based on opencoin protocol.
|
||||||
|
* It can be converted to json to provide the specified currency
|
||||||
|
* description document.
|
||||||
|
*/
|
||||||
struct CDD {
|
struct CDD {
|
||||||
|
|
||||||
std::string additional_info;
|
std::string additional_info;
|
||||||
time_t cdd_expiry_date; //: 2023-07-22T15:45:53.164685
|
time_t cdd_expiry_date; /// expiry date of this document (e.g.
|
||||||
std::string cdd_location; //: https://opencent.org,
|
///2023-07-22T15:45:53.164685)
|
||||||
size_t cdd_serial; //: 1,
|
std::string cdd_location; /// URL of location of this document (e.g
|
||||||
time_t cdd_signing_date; //: 2022-07-22T15:45:53.164685,
|
///https://opencent.org)
|
||||||
size_t currency_divisor; //: 100,
|
size_t cdd_serial; /// serial number of currency description document
|
||||||
std::string currency_name; //: OpenCent,
|
time_t cdd_signing_date; /// date of signing this document (e.g.
|
||||||
std::vector<unsigned> denominations; //: [1, 2, 5],
|
///2022-07-22T15:45:53.164685)
|
||||||
std::string id; //: 23ed956e629ba35f0002eaf833ea436aea7db5c2,
|
size_t currency_divisor; /// divisor used for coins of this currency
|
||||||
|
std::string currency_name; /// name of the currency (e.g. OpenCent)
|
||||||
|
std::vector<unsigned>
|
||||||
|
denominations; /// the available denominations of this currency
|
||||||
|
BigInt id; /// an identity for this currency
|
||||||
|
|
||||||
std::vector<WeightedUrl> info_service;
|
std::vector<WeightedUrl> info_service;
|
||||||
/* eCipherSuite*/ std::string issuer_cipher_suite; //: RSA-SHA256-PSS-CHAUM82,
|
/* eCipherSuite*/
|
||||||
PublicKey
|
std::string issuer_cipher_suite; /// the cipher suite used for this currencey
|
||||||
issuer_public_master_key; //: {
|
/// (currently only RSA-SHA256-PSS-CHAUM82
|
||||||
// modulus:
|
/// is supported)
|
||||||
// daaa63ddda38c189b8c49020c8276adbe0a695685a...,
|
PublicKey issuer_public_master_key; /// the public key of this currency
|
||||||
// public_exponent: 65537,
|
|
||||||
// type: rsa public key
|
|
||||||
//},
|
|
||||||
std::vector<WeightedUrl> mint_service;
|
std::vector<WeightedUrl> mint_service;
|
||||||
std::string protocol_version; //: https://opencoin.org/1.0,
|
std::string protocol_version; // e.g. https://opencoin.org/1.0
|
||||||
std::vector<WeightedUrl> redeem_service;
|
std::vector<WeightedUrl> redeem_service;
|
||||||
std::vector<WeightedUrl> renew_service;
|
std::vector<WeightedUrl> renew_service;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct CDDC {
|
struct CDDC {
|
||||||
CDD cdd;
|
CDD cdd;
|
||||||
std::string signature;
|
std::string signature;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct MintKey {
|
struct MintKey {
|
||||||
unsigned int cdd_serial;
|
unsigned int cdd_serial;
|
||||||
std::string coins_expiry_date; //": "2023-10-30T15:45:53.164685",
|
std::string coins_expiry_date; //": "2023-10-30T15:45:53.164685",
|
||||||
unsigned int denomination; //": 1,
|
unsigned int denomination; //": 1,
|
||||||
std::string id; // "1ceb977bb531c65f133ab8b0d60862b17369d96",
|
BigInt id; // "1ceb977bb531c65f133ab8b0d60862b17369d96",
|
||||||
std::string issuer_id; //": "23ed956e629ba35f0002eaf833ea436aea7db5c2",
|
BigInt issuer_id; //": "23ed956e629ba35f0002eaf833ea436aea7db5c2",
|
||||||
PublicKey public_mint_key;
|
PublicKey public_mint_key;
|
||||||
|
|
||||||
std::string sign_coins_not_after;
|
std::string sign_coins_not_after;
|
||||||
std::string sign_coins_not_before;
|
std::string sign_coins_not_before;
|
||||||
// "type": "mint key"
|
// "type": "mint key"
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct MintKeyCert {
|
struct MintKeyCert {
|
||||||
MintKey mint_key;
|
MintKey mint_key;
|
||||||
std::string signature;
|
std::string signature;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
enum class eError {
|
enum class eError {
|
||||||
@ -95,20 +103,20 @@ struct Response {
|
|||||||
unsigned int status_code;
|
unsigned int status_code;
|
||||||
std::string status_description;
|
std::string status_description;
|
||||||
|
|
||||||
virtual crow::json::wvalue to_json() const;
|
[[nodiscard]] virtual crow::json::wvalue to_json() const=0;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestCDDSerial {
|
struct RequestCDDCSerial {
|
||||||
unsigned int message_reference; /// Client internal message reference.
|
unsigned int message_reference; /// Client internal message reference.
|
||||||
/// (Integer)
|
/// (Integer)
|
||||||
static tl::expected<RequestCDDSerial, eError>
|
static tl::expected<RequestCDDCSerial, eError>
|
||||||
from_string(const std::string &str);
|
from_string(const std::string &str);
|
||||||
};
|
};
|
||||||
|
|
||||||
struct ResponseCDDSerial : Response {
|
struct ResponseCDDCSerial : Response {
|
||||||
unsigned int cdd_serial;
|
unsigned int cdd_serial{0U};
|
||||||
|
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestCDDC {
|
struct RequestCDDC {
|
||||||
@ -121,14 +129,14 @@ struct RequestCDDC {
|
|||||||
struct ResponseCDDC : Response {
|
struct ResponseCDDC : Response {
|
||||||
CDDC cddc;
|
CDDC cddc;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestMKCs {
|
struct RequestMKCs {
|
||||||
std::vector<unsigned int> denominations;
|
std::vector<unsigned int> denominations;
|
||||||
unsigned int message_reference; /// Client internal message reference.
|
unsigned int message_reference; /// Client internal message reference.
|
||||||
/// (Integer)
|
/// (Integer)
|
||||||
std::vector<unsigned int> mint_key_ids;
|
std::vector<BigInt> mint_key_ids;
|
||||||
// "type": "request mint key certificates"
|
// "type": "request mint key certificates"
|
||||||
static tl::expected<RequestMKCs, eError> from_string(const std::string &str);
|
static tl::expected<RequestMKCs, eError> from_string(const std::string &str);
|
||||||
};
|
};
|
||||||
@ -136,27 +144,27 @@ struct RequestMKCs {
|
|||||||
struct ResponseMKCs : Response {
|
struct ResponseMKCs : Response {
|
||||||
std::vector<MintKeyCert> keys;
|
std::vector<MintKeyCert> keys;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct Blind {
|
struct Blind {
|
||||||
std::string blinded_payload_hash; // bigint
|
BigInt blinded_payload_hash; //bigint
|
||||||
std::string mint_key_id; // bigint
|
BigInt mint_key_id; //bigint
|
||||||
std::string reference;
|
std::string reference;
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
static tl::expected<Blind, eError> from_json(const crow::json::rvalue &json);
|
static tl::expected<Blind, eError> from_json(const crow::json::rvalue &json);
|
||||||
};
|
};
|
||||||
|
|
||||||
struct BlindSignature {
|
struct BlindSignature {
|
||||||
std::string blind_signature;
|
BigInt blind_signature;
|
||||||
std::string reference;
|
std::string reference;
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestMint {
|
struct RequestMint {
|
||||||
unsigned int message_reference; /// Client internal message reference.
|
unsigned int message_reference; /// Client internal message reference.
|
||||||
/// (Integer)
|
/// (Integer)
|
||||||
std::string transaction_reference;
|
BigInt transaction_reference;
|
||||||
std::vector<Blind> blinds;
|
std::vector<Blind> blinds;
|
||||||
// "type": "request mint"
|
// "type": "request mint"
|
||||||
static tl::expected<RequestMint, eError> from_string(const std::string &str);
|
static tl::expected<RequestMint, eError> from_string(const std::string &str);
|
||||||
@ -165,27 +173,26 @@ struct RequestMint {
|
|||||||
struct ResponseMint : Response {
|
struct ResponseMint : Response {
|
||||||
std::vector<BlindSignature> blind_signatures;
|
std::vector<BlindSignature> blind_signatures;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct Coin {
|
struct Coin {
|
||||||
struct Payload {
|
struct Payload {
|
||||||
std::string cdd_location;
|
std::string cdd_location;
|
||||||
unsigned int denomination;
|
unsigned int denomination;
|
||||||
std::string issuer_id;
|
BigInt issuer_id;
|
||||||
std::string mint_key_id;
|
BigInt mint_key_id;
|
||||||
std::string protocol_version;
|
std::string protocol_version;
|
||||||
std::string serial;
|
BigInt serial;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
static tl::expected<Payload, eError>
|
static tl::expected<Payload,eError> from_json(const crow::json::rvalue& json);
|
||||||
from_json(const crow::json::rvalue &json);
|
|
||||||
};
|
};
|
||||||
|
|
||||||
Payload payload;
|
Payload payload;
|
||||||
std::string signature;
|
std::string signature;
|
||||||
|
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
static tl::expected<Coin, eError> from_json(const crow::json::rvalue &json);
|
static tl::expected<Coin, eError> from_json(const crow::json::rvalue &json);
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -193,7 +200,7 @@ struct CoinStack {
|
|||||||
std::vector<Coin> coins;
|
std::vector<Coin> coins;
|
||||||
std::string subject;
|
std::string subject;
|
||||||
// "type": "coinstack"
|
// "type": "coinstack"
|
||||||
crow::json::wvalue to_json() const;
|
[[nodiscard]] crow::json::wvalue to_json() const;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestRenew {
|
struct RequestRenew {
|
||||||
@ -207,13 +214,13 @@ struct RequestRenew {
|
|||||||
};
|
};
|
||||||
|
|
||||||
struct ResponseDelay : Response {
|
struct ResponseDelay : Response {
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct RequestResume {
|
struct RequestResume {
|
||||||
unsigned int message_reference; /// Client internal message reference.
|
unsigned int message_reference; /// Client internal message reference.
|
||||||
/// (Integer)
|
/// (Integer)
|
||||||
std::string transaction_reference;
|
BigInt transaction_reference;
|
||||||
// "type": "request resume"
|
// "type": "request resume"
|
||||||
static tl::expected<RequestResume, eError>
|
static tl::expected<RequestResume, eError>
|
||||||
from_string(const std::string &str);
|
from_string(const std::string &str);
|
||||||
@ -229,28 +236,73 @@ struct RequestRedeem {
|
|||||||
};
|
};
|
||||||
|
|
||||||
struct ResponseRedeem : Response {
|
struct ResponseRedeem : Response {
|
||||||
crow::json::wvalue to_json() const override;
|
[[nodiscard]] crow::json::wvalue to_json() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
class Model {
|
class Model {
|
||||||
public:
|
public:
|
||||||
virtual ~Model(){};
|
virtual ~Model()=default;
|
||||||
|
|
||||||
virtual tl::expected<CDDC *, bool> getCDDC(unsigned int cdd_serial) = 0;
|
/**
|
||||||
virtual tl::expected<CDDC *, bool> getCurrentCDDC() = 0;
|
* return the CurrencyDocumentDescription certifikate for a specific
|
||||||
|
* serial version number of it.
|
||||||
|
* [see spec](https://opencoin.org/0.4/schemata.html#cddc)
|
||||||
|
* @return returns a pointer to the CDDC if successful, false otherwise
|
||||||
|
*/
|
||||||
|
virtual tl::expected<CDDC *, bool> get_cddc(unsigned int cdd_serial) = 0;
|
||||||
|
|
||||||
virtual const std::vector<MintKeyCert>
|
/**
|
||||||
|
* return the CurrencyDocumentDescription certifikate
|
||||||
|
* [see spec](https://opencoin.org/0.4/schemata.html#cddc)
|
||||||
|
* @return returns a pointer to the CDDC if successful, false otherwise
|
||||||
|
*/virtual tl::expected<CDDC *, bool> get_current_cddc() = 0;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* return the MintKey certificates for a given list of denominations
|
||||||
|
* and mint key ids
|
||||||
|
*
|
||||||
|
* @param denominations
|
||||||
|
* @param mint_key_ids
|
||||||
|
*
|
||||||
|
* @return mint key certificates for given denominations and mint_key_ids
|
||||||
|
*/
|
||||||
|
virtual std::vector<MintKeyCert>
|
||||||
getMKCs(const std::vector<unsigned int> &denominations,
|
getMKCs(const std::vector<unsigned int> &denominations,
|
||||||
const std::vector<unsigned int> &mint_key_ids) = 0;
|
const std::vector<BigInt> &mint_key_ids) = 0;
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* returns the vector of blind signatures for a given vector of blinds
|
||||||
|
*
|
||||||
|
* @param transaction_reference reference to a transaction (send from client)
|
||||||
|
* @param blinds the vector of blinds to sign
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
*/
|
||||||
virtual std::vector<BlindSignature>
|
virtual std::vector<BlindSignature>
|
||||||
mint(const std::string &transaction_reference,
|
mint(std::string const& transaction_reference,
|
||||||
const std::vector<Blind> &blinds) = 0;
|
const std::vector<Blind> &blinds) = 0;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* redeem valid coins into real money
|
||||||
|
*
|
||||||
|
* @param coins the coins to redeem
|
||||||
|
*
|
||||||
|
* @return true if successful, false on error
|
||||||
|
*/
|
||||||
virtual bool redeem(const std::vector<Coin> &coins) = 0;
|
virtual bool redeem(const std::vector<Coin> &coins) = 0;
|
||||||
|
|
||||||
static std::unique_ptr<Model> getModel(const std::string &backend_name);
|
/**
|
||||||
|
* factory function returning a concrete backend for Opencoin API handling.
|
||||||
|
* based on backend_name a concrete backend will be returned
|
||||||
|
* or in case of error null.
|
||||||
|
* @param backend_name
|
||||||
|
*
|
||||||
|
* @return pointer to backend instance or null on invalid backend name
|
||||||
|
*/
|
||||||
|
static std::unique_ptr<Model> get_model(const std::string &backend_name);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
};
|
};
|
||||||
|
|
||||||
#endif // #ifndef MODEL_HPP
|
#endif // #ifndef OC_ISSUER_MODEL_HPP
|
||||||
|
37
test/test_big_int.cpp
Normal file
37
test/test_big_int.cpp
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
#include "big_int.hpp"
|
||||||
|
#include <catch2/catch_test_macros.hpp>
|
||||||
|
|
||||||
|
TEST_CASE("BigInt::from_string", "[big_int]") {
|
||||||
|
const std::string VALID [] = {
|
||||||
|
"1",
|
||||||
|
"12",
|
||||||
|
"123",
|
||||||
|
"1234",
|
||||||
|
"12345",
|
||||||
|
"123456",
|
||||||
|
"120456",
|
||||||
|
"123056",
|
||||||
|
"120345",
|
||||||
|
"1234560abc",
|
||||||
|
"aabbcc",
|
||||||
|
"abcdef1"
|
||||||
|
};
|
||||||
|
|
||||||
|
for (const auto & i : VALID) {
|
||||||
|
auto b = BigInt::from_string(i);
|
||||||
|
REQUIRE(b.has_value());
|
||||||
|
REQUIRE(b->to_string() == i);
|
||||||
|
}
|
||||||
|
|
||||||
|
auto invalid_hex = "aabbcc..";
|
||||||
|
{
|
||||||
|
auto b = BigInt::from_string(invalid_hex);
|
||||||
|
REQUIRE(!b);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_CASE("BigInt::from_int", "[big_int]") {
|
||||||
|
auto b = BigInt::from_int(0xaabbccdd);
|
||||||
|
REQUIRE(b.to_string()=="aabbccdd");
|
||||||
|
}
|
250
test/test_crypto.cpp
Normal file
250
test/test_crypto.cpp
Normal file
@ -0,0 +1,250 @@
|
|||||||
|
|
||||||
|
#include <catch2/catch_test_macros.hpp>
|
||||||
|
|
||||||
|
//#include "cryptlib.h"
|
||||||
|
//#include "integer.h"
|
||||||
|
//#include "nbtheory.h"
|
||||||
|
//#include "osrng.h"
|
||||||
|
//#include "rsa.h"
|
||||||
|
//#include "sha.h"
|
||||||
|
|
||||||
|
#include <iostream>
|
||||||
|
#include <stdexcept>
|
||||||
|
|
||||||
|
/*
|
||||||
|
CryptoPP::Integer blind_signature(const CryptoPP::SecByteBlock &orig,
|
||||||
|
const CryptoPP::Integer &r,
|
||||||
|
const CryptoPP::RSA::PublicKey &pub_key,
|
||||||
|
const CryptoPP::RSA::PrivateKey &priv_key) {
|
||||||
|
using namespace CryptoPP;
|
||||||
|
using std::cout;
|
||||||
|
using std::endl;
|
||||||
|
|
||||||
|
// Convenience
|
||||||
|
const Integer &n = pub_key.GetModulus();
|
||||||
|
const Integer &e = pub_key.GetPublicExponent();
|
||||||
|
// const Integer &d = priv_key.GetPrivateExponent();
|
||||||
|
|
||||||
|
// For sizing the hashed message buffer. This should be SHA256 size.
|
||||||
|
const size_t sig_size = UnsignedMin(SHA256::BLOCKSIZE, n.ByteCount());
|
||||||
|
// Scratch
|
||||||
|
SecByteBlock buff_1, buff_2, buff_3;
|
||||||
|
|
||||||
|
Integer m(orig.data(), orig.size());
|
||||||
|
cout << "Message: " << std::hex << m << endl;
|
||||||
|
|
||||||
|
// Hash message per Rabin (1979)
|
||||||
|
buff_1.resize(sig_size);
|
||||||
|
SHA256 hash_1;
|
||||||
|
hash_1.CalculateTruncatedDigest(buff_1, buff_1.size(), orig, orig.size());
|
||||||
|
|
||||||
|
// H(m) as Integer
|
||||||
|
Integer hm(buff_1.data(), buff_1.size());
|
||||||
|
cout << "H(m): " << std::hex << hm << endl;
|
||||||
|
|
||||||
|
// Blinding factor
|
||||||
|
Integer b = a_exp_b_mod_c(r, e, n);
|
||||||
|
cout << "Random: " << std::hex << b << endl;
|
||||||
|
|
||||||
|
// Alice blinded message
|
||||||
|
Integer mm = a_times_b_mod_c(hm, b, n);
|
||||||
|
cout << "Blind msg: " << std::hex << mm << endl;
|
||||||
|
|
||||||
|
AutoSeededRandomPool prng;
|
||||||
|
|
||||||
|
// Bob sign
|
||||||
|
Integer ss = priv_key.CalculateInverse(prng, mm);
|
||||||
|
cout << "Blind sign: " << ss << endl;
|
||||||
|
|
||||||
|
return ss;
|
||||||
|
}
|
||||||
|
|
||||||
|
CryptoPP::Integer unblind_signature(const CryptoPP::Integer &ss,
|
||||||
|
const CryptoPP::Integer &r,
|
||||||
|
const CryptoPP::RSA::PublicKey &pub_key) {
|
||||||
|
|
||||||
|
const CryptoPP::Integer &n = pub_key.GetModulus();
|
||||||
|
CryptoPP::Integer s = a_times_b_mod_c(ss, r.InverseMod(n), n);
|
||||||
|
return s;
|
||||||
|
}
|
||||||
|
|
||||||
|
CryptoPP::Integer verify(CryptoPP::Integer const &ss,
|
||||||
|
const CryptoPP::Integer &r,
|
||||||
|
const CryptoPP::RSA::PublicKey &pub_key) {
|
||||||
|
CryptoPP::Integer s = unblind_signature(ss, r, pub_key);
|
||||||
|
CryptoPP::Integer v = pub_key.ApplyFunction(s);
|
||||||
|
return v;
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_CASE("cryptopp1", "[crypto]") {
|
||||||
|
using namespace CryptoPP;
|
||||||
|
using std::cout;
|
||||||
|
using std::endl;
|
||||||
|
using std::runtime_error;
|
||||||
|
|
||||||
|
// Bob artificially small key pair
|
||||||
|
AutoSeededRandomPool prng;
|
||||||
|
RSA::PrivateKey priv_key;
|
||||||
|
|
||||||
|
priv_key.GenerateRandomWithKeySize(prng, 64U);
|
||||||
|
RSA::PublicKey pub_key(priv_key);
|
||||||
|
|
||||||
|
// Convenience
|
||||||
|
const Integer &n = pub_key.GetModulus();
|
||||||
|
const Integer &e = pub_key.GetPublicExponent();
|
||||||
|
const Integer &d = priv_key.GetPrivateExponent();
|
||||||
|
|
||||||
|
// Print params
|
||||||
|
cout << "Pub mod: " << std::hex << pub_key.GetModulus() << endl;
|
||||||
|
cout << "Pub exp: " << std::hex << e << endl;
|
||||||
|
cout << "Priv mod: " << std::hex << priv_key.GetModulus() << endl;
|
||||||
|
cout << "Priv exp: " << std::hex << d << endl;
|
||||||
|
const char *MESSAGE = "secret";
|
||||||
|
SecByteBlock orig((const byte *) MESSAGE, 6U);
|
||||||
|
|
||||||
|
// Alice blinding
|
||||||
|
Integer r;
|
||||||
|
do {
|
||||||
|
r.Randomize(prng, Integer::One(), n - Integer::One());
|
||||||
|
} while (!RelativelyPrime(r, n));
|
||||||
|
CryptoPP::Integer ss = blind_signature(orig,
|
||||||
|
r,
|
||||||
|
pub_key,
|
||||||
|
priv_key);
|
||||||
|
// Alice checks s(s'(x)) = x. This is from Chaum's paper
|
||||||
|
Integer c = pub_key.ApplyFunction(ss);
|
||||||
|
cout << "Check sign: " << c << endl;
|
||||||
|
//if (c != mm) {
|
||||||
|
// throw runtime_error("Alice cross-check failed");
|
||||||
|
// }
|
||||||
|
// Alice remove blinding
|
||||||
|
Integer s = unblind_signature(ss, r, pub_key);
|
||||||
|
cout << "Unblind sign: " << s << endl;
|
||||||
|
|
||||||
|
// Eve verifies
|
||||||
|
Integer v = verify(ss, r, pub_key);
|
||||||
|
cout << "Verify: " << std::hex << v << endl;
|
||||||
|
|
||||||
|
// Scratch
|
||||||
|
SecByteBlock buff_2, buff_3;
|
||||||
|
|
||||||
|
// Convert to a string
|
||||||
|
size_t req = v.MinEncodedSize();
|
||||||
|
buff_2.resize(req);
|
||||||
|
v.Encode(&buff_2[0], buff_2.size());
|
||||||
|
|
||||||
|
// Hash message per Rabin (1979)
|
||||||
|
const size_t sig_size = UnsignedMin(SHA256::BLOCKSIZE, n.ByteCount());
|
||||||
|
buff_3.resize(sig_size);
|
||||||
|
SHA256 hash_2;
|
||||||
|
hash_2.CalculateTruncatedDigest(buff_3, buff_3.size(), orig, orig.size());
|
||||||
|
|
||||||
|
// Constant time compare
|
||||||
|
bool equal = buff_2.size() == buff_3.size() &&
|
||||||
|
VerifyBufsEqual(buff_2.data(), buff_3.data(), buff_3.size());
|
||||||
|
|
||||||
|
if (!equal) {
|
||||||
|
throw runtime_error("Eve verified failed");
|
||||||
|
}
|
||||||
|
cout << "Verified signature" << endl;
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
*/
|
||||||
|
/*
|
||||||
|
TEST_CASE("cryptopp", "[crypto]") {
|
||||||
|
using namespace CryptoPP;
|
||||||
|
using std::cout;
|
||||||
|
using std::endl;
|
||||||
|
using std::runtime_error;
|
||||||
|
|
||||||
|
// Bob artificially small key pair
|
||||||
|
AutoSeededRandomPool prng;
|
||||||
|
RSA::PrivateKey priv_key;
|
||||||
|
|
||||||
|
priv_key.GenerateRandomWithKeySize(prng, 64U);
|
||||||
|
RSA::PublicKey pub_key(priv_key);
|
||||||
|
|
||||||
|
// Convenience
|
||||||
|
const Integer &n = pub_key.GetModulus();
|
||||||
|
const Integer &e = pub_key.GetPublicExponent();
|
||||||
|
const Integer &d = priv_key.GetPrivateExponent();
|
||||||
|
|
||||||
|
// Print params
|
||||||
|
cout << "Pub mod: " << std::hex << pub_key.GetModulus() << endl;
|
||||||
|
cout << "Pub exp: " << std::hex << e << endl;
|
||||||
|
cout << "Priv mod: " << std::hex << priv_key.GetModulus() << endl;
|
||||||
|
cout << "Priv exp: " << std::hex << d << endl;
|
||||||
|
|
||||||
|
// For sizing the hashed message buffer. This should be SHA256 size.
|
||||||
|
const size_t sig_size = UnsignedMin(SHA256::BLOCKSIZE, n.ByteCount());
|
||||||
|
|
||||||
|
// Scratch
|
||||||
|
SecByteBlock buff_1, buff_2, buff_3;
|
||||||
|
|
||||||
|
// Alice original message to be signed by Bob
|
||||||
|
SecByteBlock orig((const byte *) "secret", 6U);
|
||||||
|
Integer m(orig.data(), orig.size());
|
||||||
|
cout << "Message: " << std::hex << m << endl;
|
||||||
|
|
||||||
|
// Hash message per Rabin (1979)
|
||||||
|
buff_1.resize(sig_size);
|
||||||
|
SHA256 hash_1;
|
||||||
|
hash_1.CalculateTruncatedDigest(buff_1, buff_1.size(), orig, orig.size());
|
||||||
|
|
||||||
|
// H(m) as Integer
|
||||||
|
Integer hm(buff_1.data(), buff_1.size());
|
||||||
|
cout << "H(m): " << std::hex << hm << endl;
|
||||||
|
|
||||||
|
// Alice blinding
|
||||||
|
Integer r;
|
||||||
|
do {
|
||||||
|
r.Randomize(prng, Integer::One(), n - Integer::One());
|
||||||
|
} while (!RelativelyPrime(r, n));
|
||||||
|
|
||||||
|
// Blinding factor
|
||||||
|
Integer b = a_exp_b_mod_c(r, e, n);
|
||||||
|
cout << "Random: " << std::hex << b << endl;
|
||||||
|
|
||||||
|
// Alice blinded message
|
||||||
|
Integer mm = a_times_b_mod_c(hm, b, n);
|
||||||
|
cout << "Blind msg: " << std::hex << mm << endl;
|
||||||
|
|
||||||
|
// Bob sign
|
||||||
|
Integer ss = priv_key.CalculateInverse(prng, mm);
|
||||||
|
cout << "Blind sign: " << ss << endl;
|
||||||
|
|
||||||
|
// Alice checks s(s'(x)) = x. This is from Chaum's paper
|
||||||
|
Integer c = pub_key.ApplyFunction(ss);
|
||||||
|
cout << "Check sign: " << c << endl;
|
||||||
|
if (c != mm) {
|
||||||
|
throw runtime_error("Alice cross-check failed");
|
||||||
|
}
|
||||||
|
// Alice remove blinding
|
||||||
|
Integer s = a_times_b_mod_c(ss, r.InverseMod(n), n);
|
||||||
|
cout << "Unblind sign: " << s << endl;
|
||||||
|
|
||||||
|
// Eve verifies
|
||||||
|
Integer v = pub_key.ApplyFunction(s);
|
||||||
|
cout << "Verify: " << std::hex << v << endl;
|
||||||
|
|
||||||
|
// Convert to a string
|
||||||
|
size_t req = v.MinEncodedSize();
|
||||||
|
buff_2.resize(req);
|
||||||
|
v.Encode(&buff_2[0], buff_2.size());
|
||||||
|
|
||||||
|
// Hash message per Rabin (1979)
|
||||||
|
buff_3.resize(sig_size);
|
||||||
|
SHA256 hash_2;
|
||||||
|
hash_2.CalculateTruncatedDigest(buff_3, buff_3.size(), orig, orig.size());
|
||||||
|
|
||||||
|
// Constant time compare
|
||||||
|
bool equal = buff_2.size() == buff_3.size() &&
|
||||||
|
VerifyBufsEqual(buff_2.data(), buff_3.data(), buff_3.size());
|
||||||
|
|
||||||
|
if (!equal) {
|
||||||
|
throw runtime_error("Eve verified failed");
|
||||||
|
}
|
||||||
|
cout << "Verified signature" << endl;
|
||||||
|
}
|
||||||
|
*/
|
@ -2,43 +2,45 @@
|
|||||||
#include "model.hpp"
|
#include "model.hpp"
|
||||||
#include <catch2/catch_test_macros.hpp>
|
#include <catch2/catch_test_macros.hpp>
|
||||||
|
|
||||||
TEST_CASE("PublicKey::to_json", "[to_json]") {
|
TEST_CASE( "PublicKey::to_json", "[to_json]" ) {
|
||||||
PublicKey k{"daaa63ddda38c189b8c49020c8276adbe0a695685a...", "65537"};
|
|
||||||
|
|
||||||
|
PublicKey k //{ BigInt::from_string("daaa63ddda38c189b8c49020c8276adbe0a695685a...").value(),
|
||||||
|
// BigInt::from_int(65537UL) };
|
||||||
|
;
|
||||||
auto json = k.to_json();
|
auto json = k.to_json();
|
||||||
|
|
||||||
REQUIRE(json["modulus"].dump() == "\"" + k.modulus + "\"");
|
REQUIRE( json["modulus"].dump() == "\"" + k.modulus.to_string() + "\"" );
|
||||||
REQUIRE(json["public_exponent"].dump() == "\"" + k.public_exponent + "\"");
|
REQUIRE( json["public_exponent"].dump() == "\"" + k.public_exponent.to_string()+"\"" );
|
||||||
REQUIRE(json["type"].dump() == "\"rsa public key\"");
|
REQUIRE( json["type"].dump() == "\"rsa public key\"" );
|
||||||
REQUIRE(json.keys().size() == 3);
|
REQUIRE( json.keys().size() == 3U );
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST_CASE("RequestCDDSerial::from_string", "[from_string]") {
|
TEST_CASE("RequestCDDCSerial::from_string", "[from_string]") {
|
||||||
// good case
|
// good case
|
||||||
std::string good = "{"
|
std::string good = "{"
|
||||||
"\"message_reference\": 100000,"
|
"\"message_reference\": 100000,"
|
||||||
"\"type\": \"request cdd serial\""
|
"\"type\": \"request cdd serial\""
|
||||||
"}";
|
"}";
|
||||||
|
|
||||||
auto res = RequestCDDSerial::from_string(good);
|
auto res = RequestCDDCSerial::from_string(good);
|
||||||
REQUIRE(res.has_value() == true);
|
REQUIRE(res.has_value() == true);
|
||||||
REQUIRE(res->message_reference == 100000);
|
REQUIRE(res->message_reference == 100000);
|
||||||
|
|
||||||
// bad cases
|
// bad cases
|
||||||
res = RequestCDDSerial::from_string("");
|
res = RequestCDDCSerial::from_string("");
|
||||||
REQUIRE(res.has_value() == false);
|
REQUIRE(res.has_value() == false);
|
||||||
|
|
||||||
// invalid type
|
// invalid type
|
||||||
res = RequestCDDSerial::from_string("{"
|
res = RequestCDDCSerial::from_string("{"
|
||||||
"\"message_reference\": 100000,"
|
"\"message_reference\": 100000,"
|
||||||
"\"type\": \"request something wrong\""
|
"\"type\": \"request something wrong\""
|
||||||
"}");
|
"}");
|
||||||
REQUIRE(res.has_value() == false);
|
REQUIRE(res.has_value() == false);
|
||||||
|
|
||||||
// invalid attribute name
|
// invalid attribute name
|
||||||
res = RequestCDDSerial::from_string("{"
|
res = RequestCDDCSerial::from_string("{"
|
||||||
"\"x_message_reference\": 100000,"
|
"\"x_message_reference\": 100000,"
|
||||||
"}");
|
"}");
|
||||||
REQUIRE(res.has_value() == false);
|
REQUIRE(res.has_value() == false);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -76,15 +78,14 @@ TEST_CASE("RequestCDDC::from_string", "[from_string]") {
|
|||||||
|
|
||||||
TEST_CASE("RequestMKCs::from_string", "[from_string]") {
|
TEST_CASE("RequestMKCs::from_string", "[from_string]") {
|
||||||
// good case
|
// good case
|
||||||
auto res =
|
auto res = RequestMKCs::from_string( "{"
|
||||||
RequestMKCs::from_string("{"
|
"\"denominations\": [1, 2, 5],"
|
||||||
"\"denominations\": [1, 2, 5],"
|
"\"message_reference\": 100002,"
|
||||||
"\"message_reference\": 100002,"
|
"\"mint_key_ids\": [],"
|
||||||
"\"mint_key_ids\": [],"
|
"\"type\": \"request mint key certificates\""
|
||||||
"\"type\": \"request mint key certificates\""
|
"}");
|
||||||
"}");
|
const std::vector<uint32_t> EXPECTED_DENOMINATIONS = {1,2,5};
|
||||||
const std::vector<uint32_t> EXPECTED_DENOMINATIONS = {1, 2, 5};
|
const std::vector<BigInt> EXPECTED_MINT_KEY_IDS = {};
|
||||||
const std::vector<uint32_t> EXPECTED_MINT_KEY_IDS = {};
|
|
||||||
|
|
||||||
REQUIRE(res.has_value() == true);
|
REQUIRE(res.has_value() == true);
|
||||||
REQUIRE(res->denominations == EXPECTED_DENOMINATIONS);
|
REQUIRE(res->denominations == EXPECTED_DENOMINATIONS);
|
||||||
@ -129,62 +130,59 @@ TEST_CASE("Blind::from_json", "[from_string]") {
|
|||||||
auto good = crow::json::load(
|
auto good = crow::json::load(
|
||||||
"{"
|
"{"
|
||||||
"\"blinded_payload_hash\": "
|
"\"blinded_payload_hash\": "
|
||||||
"\"924edb672c3345492f38341ff86b57181da4c673ef...\","
|
"\"924edb672c3345492f38341ff86b57181da4c673efd5fd76c0f64e369974c678f89ffcb1c5f77bf04911a9a63831b52675b70c06548a4d945ec5dd1d825ab08\","
|
||||||
"\"mint_key_id\": \"1ceb977bb531c65f133ab8b0d60862b17369d96\","
|
"\"mint_key_id\": \"1ceb977bb531c65f133ab8b0d60862b17369d96\","
|
||||||
"\"reference\": \"a0\","
|
"\"reference\": \"a0\","
|
||||||
"\"type\": \"blinded payload hash\""
|
"\"type\": \"blinded payload hash\""
|
||||||
"}");
|
"}");
|
||||||
|
|
||||||
auto res = Blind::from_json(good);
|
auto res = Blind::from_json(good);
|
||||||
REQUIRE(res.has_value() == true);
|
REQUIRE(res.has_value()==true);
|
||||||
REQUIRE(res->blinded_payload_hash ==
|
REQUIRE(res->blinded_payload_hash.to_string()==
|
||||||
"924edb672c3345492f38341ff86b57181da4c673ef...");
|
"924edb672c3345492f38341ff86b57181da4c673efd5fd76c0f64e369974c678f89ffcb1c5f77bf04911a9a63831b52675b70c06548a4d945ec5dd1d825ab08");
|
||||||
REQUIRE(res->mint_key_id == "1ceb977bb531c65f133ab8b0d60862b17369d96");
|
REQUIRE(res->mint_key_id.to_string()=="1ceb977bb531c65f133ab8b0d60862b17369d96");
|
||||||
REQUIRE(res->reference == "a0");
|
REQUIRE(res->reference=="a0");
|
||||||
// bad cases
|
// bad cases
|
||||||
// wrong_type["blinded_payload_hash"]=
|
// wrong_type["blinded_payload_hash"]= "924edb672c3345492f38341ff86b57181da4c673ef...";
|
||||||
// "924edb672c3345492f38341ff86b57181da4c673ef..."; wrong_type["mint_key_id"]=
|
// wrong_type["mint_key_id"]= "1ceb977bb531c65f133ab8b0d60862b17369d96";
|
||||||
// "1ceb977bb531c65f133ab8b0d60862b17369d96"; wrong_type["reference"] = "a0";
|
// wrong_type["reference"] = "a0";
|
||||||
// wrong_type["type"]= "wrong type";
|
// wrong_type["type"]= "wrong type";
|
||||||
|
|
||||||
// res = Blind::from_json(wrong_type);
|
// res = Blind::from_json(wrong_type);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST_CASE("RequestMint::from_string", "[from_string]") {
|
TEST_CASE("RequestMint::from_string", "[from_string]") {
|
||||||
// good case
|
|
||||||
auto res = RequestMint::from_string(
|
|
||||||
"{"
|
|
||||||
"\"blinds\": ["
|
|
||||||
"{"
|
|
||||||
"\"blinded_payload_hash\": "
|
|
||||||
"\"924edb672c3345492f38341ff86b57181da4c673ef...\","
|
|
||||||
"\"mint_key_id\": \"1ceb977bb531c65f133ab8b0d60862b17369d96\","
|
|
||||||
"\"reference\": \"a0\","
|
|
||||||
"\"type\": \"blinded payload hash\""
|
|
||||||
"},"
|
|
||||||
"{"
|
|
||||||
"\"blinded_payload_hash\": "
|
|
||||||
"\"95db92e1c46ebea5edec5e508a831263de6fb78b4c...\","
|
|
||||||
"\"mint_key_id\": \"f2864e5cd937dbaa4825e73a81062de162143682\","
|
|
||||||
"\"reference\": \"a1\","
|
|
||||||
"\"type\": \"blinded payload hash\""
|
|
||||||
"},"
|
|
||||||
"{"
|
|
||||||
"\"blinded_payload_hash\": "
|
|
||||||
"\"10afac98ac43eb40e996c621d5db4d2238348e3f74...\","
|
|
||||||
"\"mint_key_id\": \"897a16bf12bd9ba474ef7be0e3a53553a7b4ece8\","
|
|
||||||
"\"reference\": \"a2\","
|
|
||||||
"\"type\": \"blinded payload hash\""
|
|
||||||
"}"
|
|
||||||
"],"
|
|
||||||
"\"message_reference\": 100003,"
|
|
||||||
"\"transaction_reference\": \"b2221a58008a05a6c4647159c324c985\","
|
|
||||||
"\"type\": \"request mint\""
|
|
||||||
"}");
|
|
||||||
|
|
||||||
REQUIRE(res.has_value() == true);
|
// good case
|
||||||
REQUIRE(res->message_reference == 100003);
|
auto res = RequestMint::from_string( "{"
|
||||||
REQUIRE(res->transaction_reference == "b2221a58008a05a6c4647159c324c985");
|
"\"blinds\": ["
|
||||||
|
"{"
|
||||||
|
"\"blinded_payload_hash\": \"924edb672c3345492f38341ff86b57181da4c673efd5fd76c0f64e369974c678f89ffcb1c5f77bf04911a9a63831b52675b70c06548a4d945ec5dd1d825ab08\","
|
||||||
|
"\"mint_key_id\": \"1ceb977bb531c65f133ab8b0d60862b17369d96\","
|
||||||
|
"\"reference\": \"a0\","
|
||||||
|
"\"type\": \"blinded payload hash\""
|
||||||
|
"},"
|
||||||
|
"{"
|
||||||
|
"\"blinded_payload_hash\": \"95db92e1c46ebea5edec5e508a831263de6fb78b4cf9187593f6af815b51db9db35ad5eaf2c0c83bd7e13c999df4f0f1af65b367eb7c2b6addb9735dce156b5\","
|
||||||
|
"\"mint_key_id\": \"f2864e5cd937dbaa4825e73a81062de162143682\","
|
||||||
|
"\"reference\": \"a1\","
|
||||||
|
"\"type\": \"blinded payload hash\""
|
||||||
|
"},"
|
||||||
|
"{"
|
||||||
|
"\"blinded_payload_hash\": \"10afac98ac43eb40e996c621d5db4d2238348e3f74850856d940955da0fd24fa4d3aee79da1e9da24e85cf9cefd96feaca5b26a9353a3d9fcb4bd34145046ce8\","
|
||||||
|
"\"mint_key_id\": \"897a16bf12bd9ba474ef7be0e3a53553a7b4ece8\","
|
||||||
|
"\"reference\": \"a2\","
|
||||||
|
"\"type\": \"blinded payload hash\""
|
||||||
|
"}"
|
||||||
|
"],"
|
||||||
|
"\"message_reference\": 100003,"
|
||||||
|
"\"transaction_reference\": \"b2221a58008a05a6c4647159c324c985\","
|
||||||
|
"\"type\": \"request mint\""
|
||||||
|
"}");
|
||||||
|
|
||||||
|
REQUIRE(res.has_value()==true);
|
||||||
|
REQUIRE(res->message_reference==100003);
|
||||||
|
REQUIRE(res->transaction_reference.to_string() == "b2221a58008a05a6c4647159c324c985");
|
||||||
/// \todo check blinds
|
/// \todo check blinds
|
||||||
|
|
||||||
// bad cases
|
// bad cases
|
||||||
@ -228,7 +226,7 @@ TEST_CASE("RequestRenew::from_string", "[from_string]") {
|
|||||||
" \"blinds\": ["
|
" \"blinds\": ["
|
||||||
" {"
|
" {"
|
||||||
" \"blinded_payload_hash\": "
|
" \"blinded_payload_hash\": "
|
||||||
"\"7ed0cda1c1b36f544514b12848b8436974b7b9f6c7...\","
|
"\"7ed0cda1c1b36f544514b12848b8436974b7b9f6c7231ebcc566678e3478d3279db03872e4710413ad20a55d56ef12fb1800ac187195322535a626e178931cf9\","
|
||||||
" \"mint_key_id\": \"f2864e5cd937dbaa4825e73a81062de162143682\","
|
" \"mint_key_id\": \"f2864e5cd937dbaa4825e73a81062de162143682\","
|
||||||
" \"reference\": \"b0\","
|
" \"reference\": \"b0\","
|
||||||
" \"type\": \"blinded payload hash\""
|
" \"type\": \"blinded payload hash\""
|
||||||
@ -280,16 +278,15 @@ TEST_CASE("RequestRenew::from_string", "[from_string]") {
|
|||||||
|
|
||||||
TEST_CASE("RequestResume::from_string", "[from_string]") {
|
TEST_CASE("RequestResume::from_string", "[from_string]") {
|
||||||
// good case
|
// good case
|
||||||
auto res = RequestResume::from_string(
|
auto res = RequestResume::from_string( "{"
|
||||||
"{"
|
"\"message_reference\": 100005,"
|
||||||
"\"message_reference\": 100005,"
|
"\"transaction_reference\": \"ad45f23d3b1a11df587fd2803bab6c39\","
|
||||||
"\"transaction_reference\": \"ad45f23d3b1a11df587fd2803bab6c39\","
|
"\"type\": \"request resume\""
|
||||||
"\"type\": \"request resume\""
|
"}");
|
||||||
"}");
|
|
||||||
|
|
||||||
REQUIRE(res.has_value() == true);
|
REQUIRE(res.has_value()==true);
|
||||||
REQUIRE(res->message_reference == 100005);
|
REQUIRE(res->message_reference==100005);
|
||||||
REQUIRE(res->transaction_reference == "ad45f23d3b1a11df587fd2803bab6c39");
|
REQUIRE(res->transaction_reference.to_string()=="ad45f23d3b1a11df587fd2803bab6c39");
|
||||||
|
|
||||||
// bad cases
|
// bad cases
|
||||||
res = RequestResume::from_string("");
|
res = RequestResume::from_string("");
|
9
vcpkg.json
Normal file
9
vcpkg.json
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
"name": "crow",
|
||||||
|
"version-string": "master",
|
||||||
|
"dependencies": [
|
||||||
|
"asio",
|
||||||
|
"openssl",
|
||||||
|
"zlib"
|
||||||
|
]
|
||||||
|
}
|
Reference in New Issue
Block a user