gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-donau] branch master updated: [header] rough implementation chari


From: gnunet
Subject: [taler-donau] branch master updated: [header] rough implementation charity get, adjust donau crypto header
Date: Thu, 19 Oct 2023 13:13:12 +0200

This is an automated email from the git hooks/post-receive script.

lukas-matyja pushed a commit to branch master
in repository donau.

The following commit(s) were added to refs/heads/master by this push:
     new 0c92b11  [header] rough implementation charity get, adjust donau 
crypto header
0c92b11 is described below

commit 0c92b119cae8da2eb033d98a494d084860f0fe2e
Author: Matyja Lukas Adam <lukas.matyja@students.bfh.ch>
AuthorDate: Thu Oct 19 13:13:20 2023 +0200

    [header] rough implementation charity get, adjust donau crypto header
---
 src/include/taler_donau_crypto_lib.h | 5702 +---------------------------------
 src/include/taler_donau_service.h    |  225 +-
 2 files changed, 199 insertions(+), 5728 deletions(-)

diff --git a/src/include/taler_donau_crypto_lib.h 
b/src/include/taler_donau_crypto_lib.h
index f979fe0..ae3f853 100644
--- a/src/include/taler_donau_crypto_lib.h
+++ b/src/include/taler_donau_crypto_lib.h
@@ -20,12 +20,12 @@
  * @author Christian Grothoff <christian@grothoff.org>
  * @author Özgür Kesim <oec-taler@kesim.org>
  */
-#if ! defined (__TALER_UTIL_LIB_H_INSIDE__)
-#error "Only <taler_util.h> can be included directly."
+#if ! defined (__TALER_DONAU_UTIL_LIB_H_INSIDE__)
+#error "Only <taler_donau_util.h> can be included directly."
 #endif
 
-#ifndef TALER_CRYPTO_LIB_H
-#define TALER_CRYPTO_LIB_H
+#ifndef TALER_DONAU_CRYPTO_LIB_H
+#define TALER_DONAU_CRYPTO_LIB_H
 
 #include <gnunet/gnunet_util_lib.h>
 #include "taler_error_codes.h"
@@ -33,5716 +33,56 @@
 #include <jansson.h>
 
 
-/**
- * Maximum number of donation units we allow per operation.
- */
-#define TALER_MAX_FRESH_DONATION_UNITS 256
-
-/* ****************** Coin crypto primitives ************* */
-
-GNUNET_NETWORK_STRUCT_BEGIN
-
-/**
- * @brief Type of public keys for Taler security modules (software or 
hardware).
- * Note that there are usually at least two security modules (RSA and EdDSA),
- * each with its own private key.
- */
-struct TALER_SecurityModulePublicKeyP
-{
-  /**
-   * Taler uses EdDSA for security modules.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-/**
- * @brief Set of the public keys of the security modules
- */
-struct TALER_SecurityModulePublicKeySetP
-{
-  /**
-   * Public key of the RSA security module
-   */
-  struct TALER_SecurityModulePublicKeyP rsa;
-
-  /**
-   * Public key of the CS security module
-   */
-  struct TALER_SecurityModulePublicKeyP cs;
-
-  /**
-   * Public key of the eddsa security module
-   */
-  struct TALER_SecurityModulePublicKeyP eddsa;
-};
-
-/**
- * @brief Type of private keys for Taler security modules (software or 
hardware).
- */
-struct TALER_SecurityModulePrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for security modules.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures used for Taler security modules (software or 
hardware).
- */
-struct TALER_SecurityModuleSignatureP
-{
-  /**
-   * Taler uses EdDSA for security modules.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * @brief Type of public keys for Taler reserves.
- */
-struct TALER_ReservePublicKeyP
-{
-  /**
-   * Taler uses EdDSA for reserves.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of private keys for Taler reserves.
- */
-struct TALER_ReservePrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for reserves.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures used with Taler reserves.
- */
-struct TALER_ReserveSignatureP
-{
-  /**
-   * Taler uses EdDSA for reserves.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * @brief Type of public keys to for charity authorizations.
- * Charities can issue refunds using the corresponding
- * private key.
- */
-struct TALER_CharityPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for charities.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of private keys for charity authorizations.
- * Charities can issue refunds using the corresponding
- * private key.
- */
-struct TALER_CharityPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for charities.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures made by charities.
- */
-struct TALER_CharitySignatureP
-{
-  /**
-   * Taler uses EdDSA for charities.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_sig;
-};
-
-
-/**
- * @brief Type of transfer public keys used during refresh
- * operations.
- */
-struct TALER_TransferPublicKeyP
-{
-  /**
-   * Taler uses ECDHE for transfer keys.
-   */
-  struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub;
-};
-
-
-/**
- * @brief Type of transfer private keys used during refresh
- * operations.
- */
-struct TALER_TransferPrivateKeyP
-{
-  /**
-   * Taler uses ECDHE for melting session keys.
-   */
-  struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv;
-};
 
+/* ****************** donau crypto primitives ************* */
 
 /**
- * @brief Type of public keys used for contract
- * encryption.
+ * Hash of a donation unit public key
  */
-struct TALER_ContractDiffiePublicP
+struct TALER_DonationUnitHashP
 {
-  /**
-   * Taler uses ECDHE for contract encryption.
-   */
-  struct GNUNET_CRYPTO_EcdhePublicKey ecdhe_pub;
+  struct GNUNET_HashCode hash;
 };
 
-
 /**
- * @brief Type of private keys used for contract
- * encryption.
- */
-struct TALER_ContractDiffiePrivateP
+  * Donor's hashed and salted unique donation identifier.
+  */
+struct TALER_DONAU_HashDonorTaxId
 {
-  /**
-   * Taler uses ECDHE for contract encryption.
-   */
-  struct GNUNET_CRYPTO_EcdhePrivateKey ecdhe_priv;
+  struct GNUNET_HashCode hash;
 };
 
-
 /**
- * @brief Type of online public keys used by the donau to sign
- * messages.
+ * blind signatures from the blinded donation envelopes.
  */
-struct TALER_DonauPublicKeyP
+struct TALER_BlindedDonationUnitSignature
 {
   /**
-   * Taler uses EdDSA for online donau message signing.
+   * The blinded signature
    */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
+  struct TALER_DenominationSignature b_sig;
 
-/**
- * @brief Type of online public keys used by the donau to
- * sign messages.
- */
-struct TALER_DonauPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for online signatures sessions.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
 };
 
-
 /**
- * @brief Type of signatures used by the donau to sign messages online.
+ * @brief Type of signature used by the donau for non-blind signatures.
  */
 struct TALER_DonauSignatureP
 {
   /**
-   * Taler uses EdDSA for online signatures sessions.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * @brief Type of the offline master public key used by the donau.
- */
-struct TALER_MasterPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for the long-term offline master key.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of the offline master public keys used by the donau.
- */
-struct TALER_MasterPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for the long-term offline master key.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures by the offline master public key used by the 
donau.
- */
-struct TALER_MasterSignatureP
-{
-  /**
-   * Taler uses EdDSA for the long-term offline master key.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * @brief Type of the private key used by the auditor.
- */
-struct TALER_AuditorPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for the auditor's signing key.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of the public key used by the auditor.
- */
-struct TALER_AuditorPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for the auditor's signing key.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of signatures used by the auditor.
- */
-struct TALER_AuditorSignatureP
-{
-  /**
-   * Taler uses EdDSA signatures for auditors.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_sig;
-};
-
-
-/**
- * @brief Type of public keys for Taler coins.  The same key material is used
- * for EdDSA and ECDHE operations.
- */
-struct TALER_CoinSpendPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for coins when signing deposit requests.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-
-};
-
-
-/**
- * @brief Type of private keys for Taler coins.  The same key material is used
- * for EdDSA and ECDHE operations.
- */
-struct TALER_CoinSpendPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for coins when signing deposit requests.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-/**
- * @brief Type of signatures made with Taler coins.
- */
-struct TALER_CoinSpendSignatureP
-{
-  /**
-   * Taler uses EdDSA for coins.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * @brief Type of online public keys used by the wallet to establish a purse 
and the associated contract meta data.
- */
-struct TALER_PurseContractPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for purse message signing.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of online private keys used by the wallet to
- * bind a purse to a particular contract (and other meta data).
- */
-struct TALER_PurseContractPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for online signatures sessions.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures used by the wallet to sign purse creation 
messages online.
- */
-struct TALER_PurseContractSignatureP
-{
-  /**
-   * Taler uses EdDSA for online signatures sessions.
+   * Donau uses EdDSA for for non-blind signatures.
    */
   struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
 };
 
-
-/**
- * @brief Type of online public keys used by the wallet to
- * sign a merge of a purse into an account.
- */
-struct TALER_PurseMergePublicKeyP
-{
-  /**
-   * Taler uses EdDSA for purse message signing.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of online private keys used by the wallet to
- * sign a merge of a purse into an account.
- */
-struct TALER_PurseMergePrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for online signatures sessions.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
 /**
- * @brief Type of signatures used by the wallet to sign purse merge requests 
online.
+ * @brief Type of signature used by charities
  */
-struct TALER_PurseMergeSignatureP
+struct TALER_DONAU_CharitySignatureP
 {
   /**
-   * Taler uses EdDSA for online signatures sessions.
+   * Charities use EdDSA signatures.
    */
   struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
 };
-
-
-/**
- * @brief Type of online public keys used by AML officers.
- */
-struct TALER_AmlOfficerPublicKeyP
-{
-  /**
-   * Taler uses EdDSA for AML decision signing.
-   */
-  struct GNUNET_CRYPTO_EddsaPublicKey eddsa_pub;
-};
-
-
-/**
- * @brief Type of online private keys used to identify
- * AML officers.
- */
-struct TALER_AmlOfficerPrivateKeyP
-{
-  /**
-   * Taler uses EdDSA for AML decision signing.
-   */
-  struct GNUNET_CRYPTO_EddsaPrivateKey eddsa_priv;
-};
-
-
-/**
- * @brief Type of signatures used by AML officers.
- */
-struct TALER_AmlOfficerSignatureP
-{
-  /**
-   * Taler uses EdDSA for AML decision signing.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
-
-/**
- * Possible AML decision states.
- */
-enum TALER_AmlDecisionState
-{
-
-  /**
-   * All AML requirements are currently satisfied.
-   */
-  TALER_AML_NORMAL = 0,
-
-  /**
-   * An AML investigation is pending.
-   */
-  TALER_AML_PENDING = 1,
-
-  /**
-   * An AML decision has concluded that the funds must be frozen.
-   */
-  TALER_AML_FROZEN = 2
-
-};
-
-
-/**
- * Possible algorithms for confirmation code generation.
- */
-enum TALER_CharityConfirmationAlgorithm
-{
-
-  /**
-   * No purchase confirmation.
-   */
-  TALER_MCA_NONE = 0,
-
-  /**
-   * Purchase confirmation without payment
-   */
-  TALER_MCA_WITHOUT_PRICE = 1,
-
-  /**
-   * Purchase confirmation with payment
-   */
-  TALER_MCA_WITH_PRICE = 2
-
-};
-
-
-/**
- * @brief Type of blinding keys for Taler.
- * must be 32 bytes (DB)
- */
-union TALER_DenominationBlindingKeyP
-{
-  /**
-   * Clause Schnorr Signatures have 2 blinding secrets, each containing two 
unpredictable values. (must be 32 bytes)
-   */
-  struct GNUNET_CRYPTO_CsNonce nonce;
-
-  /**
-   * Taler uses RSA for blind signatures.
-   */
-  struct GNUNET_CRYPTO_RsaBlindingKeySecret rsa_bks;
-};
-
-
-/**
- * Commitment value for the refresh protocol.
- * See #TALER_refresh_get_commitment().
- */
-struct TALER_RefreshCommitmentP
-{
-  /**
-   * The commitment is a hash code.
-   */
-  struct GNUNET_HashCode session_hash;
-};
-
-
-/**
- * Symmetric key we use to encrypt KYC attributes
- * in our database.
- */
-struct TALER_AttributeEncryptionKeyP
-{
-  /**
-   * The key is a hash code.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Token used for access control to the charity's unclaimed
- * orders.
- */
-struct TALER_ClaimTokenP
-{
-  /**
-   * The token is a 128-bit UUID.
-   */
-  struct GNUNET_Uuid token;
-};
-
-
-/**
- * Salt used to hash a charity's payto:// URI to
- * compute the "h_wire" (say for deposit requests).
- */
-struct TALER_WireSaltP
-{
-  /**
-   * Actual 128-bit salt value.
-   */
-  uint32_t salt[4];
-};
-
-
-/**
- * Hash used to represent an CS public key.  Does not include age
- * restrictions and is ONLY for CS.  Used ONLY for interactions with the CS
- * security module.
- */
-struct TALER_CsPubHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent an RSA public key.  Does not include age
- * restrictions and is ONLY for RSA.  Used ONLY for interactions with the RSA
- * security module.
- */
-struct TALER_RsaPubHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Master key material for the deriviation of
- * private coins and blinding factors during
- * withdraw or refresh.
- */
-struct TALER_PlanchetMasterSecretP
-{
-
-  /**
-   * Key material.
-   */
-  uint32_t key_data[8];
-
-};
-
-
-/**
- * Master key material for the deriviation of
- * private coins and blinding factors.
- */
-struct TALER_RefreshMasterSecretP
-{
-
-  /**
-   * Key material.
-   */
-  uint32_t key_data[8];
-
-};
-
-
-/**
- * Hash used to represent a denomination public key
- * and associated age restrictions (if any).
- */
-struct TALER_DenominationHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent the private part
- * of a contract between charity and consumer.
- */
-struct TALER_PrivateContractHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent the policy extension to a deposit
- */
-struct TALER_ExtensionPolicyHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent the salted hash of a
- * charity's bank account.
- */
-struct TALER_CharityWireHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent the unsalted hash of a
- * payto:// URI representing a bank account.
- */
-struct TALER_PaytoHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_ShortHashCode hash;
-};
-
-
-/**
- * Hash used to represent a commitment to a blinded
- * coin, i.e. the hash of the envelope.
- */
-struct TALER_BlindedCoinHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * Hash used to represent the hash of the public
- * key of a coin (without blinding).
- */
-struct TALER_CoinPubHashP
-{
-  /**
-   * Actual hash value.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * @brief Value that uniquely identifies a reward.
- */
-struct TALER_RewardIdentifierP
-{
-  /**
-   * The tip identifier is a SHA-512 hash code.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-
-/**
- * @brief Value that uniquely identifies a tip pick up operation.
- */
-struct TALER_PickupIdentifierP
-{
-  /**
-   * The pickup identifier is a SHA-512 hash code.
-   */
-  struct GNUNET_HashCode hash;
-};
-
-GNUNET_NETWORK_STRUCT_END
-
-
-/**
- * @brief Builds POS confirmation token to verify payment.
- *
- * @param pos_key encoded key for verification payment
- * @param pos_alg algorithm to compute the payment verification
- * @param total of the order paid
- * @param ts is the time given
- * @return POS token on success, NULL otherwise
- */
-char *
-TALER_build_pos_confirmation (const char *pos_key,
-                              enum TALER_CharityConfirmationAlgorithm pos_alg,
-                              const struct TALER_Amount *total,
-                              struct GNUNET_TIME_Timestamp ts);
-
-/**
- * Hash @a rsa.
- *
- * @param rsa key to hash
- * @param[out] h_rsa where to write the result
- */
-void
-TALER_rsa_pub_hash (const struct GNUNET_CRYPTO_RsaPublicKey *rsa,
-                    struct TALER_RsaPubHashP *h_rsa);
-
-/**
- * Hash @a cs.
- *DENOMINATION
- * @param cs key to hash
- * @param[out] h_cs where to write the result
- */
-void
-TALER_cs_pub_hash (const struct GNUNET_CRYPTO_CsPublicKey *cs,
-                   struct TALER_CsPubHashP *h_cs);
-
-
-/**
- * Types of public keys used for denominations in Taler.
- */
-enum TALER_DonationUnitCipher
-{
-
-  /**
-   * Invalid type of signature.
-   */
-  TALER_DONATION_UNIT_INVALID = 0,
-
-  /**
-   * RSA blind signature.
-   */
-  TALER_DONATION_UNIT_RSA = 1,
-
-  /**
-   * Clause Blind Schnorr signature.
-   */
-  TALER_DONATION_UNIT_CS = 2
-};
-
-
-/**
- * @brief Type of (unblinded) coin signatures for Taler.
- */
-struct TALER_DenominationSignature
-{
-
-  /**
-   * Type of the signature.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     */
-    struct GNUNET_CRYPTO_CsSignature cs_signature;
-
-    /**
-     * If we use #TALER_DENOMINATION_RSA in @a cipher.
-     */
-    struct GNUNET_CRYPTO_RsaSignature *rsa_signature;
-
-  } details;
-
-};
-
-/**
- * The Sign Answer for Clause Blind Schnorr signature.
- * The sign operation returns a parameter @param b and the signature
- * scalar @param s_scalar.
- */
-struct TALER_BlindedDenominationCsSignAnswer
-{
-  /**
-   * To make ROS problem harder, the signer chooses an unpredictable b and 
only calculates signature of c_b
-   */
-  unsigned int b;
-
-  /**
-   * The blinded s scalar calculated from c_b
-   */
-  struct GNUNET_CRYPTO_CsBlindS s_scalar;
-};
-
-/**
- * @brief Type for *blinded* denomination signatures for Taler.
- * Must be unblinded before it becomes valid.
- */
-struct TALER_BlindedDenominationSignature
-{
-
-  /**
-   * Type of the signature.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     * At this point only the blinded s scalar is used.
-     * The final signature consisting of r,s is built after unblinding.
-     */
-    struct TALER_BlindedDenominationCsSignAnswer blinded_cs_answer;
-
-    /**
-     * If we use #TALER_DENOMINATION_RSA in @a cipher.
-     */
-    struct GNUNET_CRYPTO_RsaSignature *blinded_rsa_signature;
-
-  } details;
-
-};
-
-/* *************** Age Restriction *********************************** */
-
-/*
- * @brief Type of a list of age groups, represented as bit mask.
- *
- * The bits set in the mask mark the edges at the beginning of a next age
- * group.  F.e. for the age groups
- *     0-7, 8-9, 10-11, 12-13, 14-15, 16-17, 18-21, 21-*
- * the following bits are set:
- *
- *   31     24        16        8         0
- *   |      |         |         |         |
- *   oooooooo  oo1oo1o1  o1o1o1o1  ooooooo1
- *
- * A value of 0 means that the donau does not support the extension for
- * age-restriction.
- *
- * For a non-0 age mask, the 0th bit always must be set, otherwise the age
- * mask is considered invalid.
- */
-struct TALER_AgeMask
-{
-  uint32_t bits;
-};
-
-/**
- * @brief Age commitment of a coin.
- */
-struct TALER_AgeCommitmentHash
-{
-  /**
-   * The commitment is a SHA-256 hash code.
-   */
-  struct GNUNET_ShortHashCode shash;
-};
-
-/**
- * @brief Signature of an age with the private key for the corresponding age 
group of an age commitment.
- */
-struct TALER_AgeAttestation
-{
-#ifdef AGE_RESTRICTION_WITH_ECDSA
-  struct GNUNET_CRYPTO_EcdsaSignature signature;
-#else
-  struct GNUNET_CRYPTO_Edx25519Signature signature;
-#endif
-};
-
-#define TALER_AgeCommitmentHash_isNullOrZero(ph) ((NULL == ph) || \
-                                                  GNUNET_is_zero (ph))
-
-/**
- * @brief Type of public signing keys for verifying blindly signed coins.
- */
-struct TALER_DenominationPublicKey
-{
-
-  /**
-   * Type of the public key.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Age restriction mask used for the key.
-   */
-  struct TALER_AgeMask age_mask;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     */
-    struct GNUNET_CRYPTO_CsPublicKey cs_public_key;
-
-    /**
-     * If we use #TALER_DENOMINATION_RSA in @a cipher.
-     */
-    struct GNUNET_CRYPTO_RsaPublicKey *rsa_public_key;
-
-  } details;
-};
-
-
-/**
- * @brief Type of private signing keys for blind signing of coins.
- */
-struct TALER_DenominationPrivateKey
-{
-
-  /**
-   * Type of the public key.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     */
-    struct GNUNET_CRYPTO_CsPrivateKey cs_private_key;
-
-    /**
-     * If we use #TALER_DENOMINATION_RSA in @a cipher.
-     */
-    struct GNUNET_CRYPTO_RsaPrivateKey *rsa_private_key;
-
-  } details;
-};
-
-/**
- * @brief RSA Parameters to create blinded signature
- *
- */
-struct TALER_BlindedRsaPlanchet
-{
-  /**
-   * Blinded message to be signed
-   * Note: is malloc()'ed!
-   */
-  void *blinded_msg;
-
-  /**
-   * Size of the @e blinded_msg to be signed.
-   */
-  size_t blinded_msg_size;
-};
-
-
-/**
- * Withdraw nonce for CS denominations
- */
-struct TALER_CsNonce
-{
-  /**
-   * 32 bit nonce to include in withdrawals when using CS.
-   */
-  struct GNUNET_CRYPTO_CsNonce nonce;
-};
-
-
-/**
- * @brief CS Parameters to create blinded signature
- */
-struct TALER_BlindedCsPlanchet
-{
-  /**
-   * The Clause Schnorr c_0 and c_1 containing the blinded message
-   */
-  struct GNUNET_CRYPTO_CsC c[2];
-
-  /**
-   * Public nonce.
-   */
-  struct TALER_CsNonce nonce;
-};
-
-
-/**
- * @brief Type including Parameters to create blinded signature
- */
-struct TALER_BlindedPlanchet
-{
-  /**
-   * Type of the sign blinded message
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     */
-    struct TALER_BlindedCsPlanchet cs_blinded_planchet;
-
-    /**
-     * If we use #TALER_DENOMINATION_RSA in @a cipher.
-     */
-    struct TALER_BlindedRsaPlanchet rsa_blinded_planchet;
-
-  } details;
-};
-
-
-/**
- * Pair of Public R values for Cs denominations
- */
-struct TALER_DenominationCSPublicRPairP
-{
-  struct GNUNET_CRYPTO_CsRPublic r_pub[2];
-};
-
-
-/**
- * Secret r for Cs denominations
- */
-struct TALER_DenominationCSPrivateRPairP
-{
-  struct GNUNET_CRYPTO_CsRSecret r[2];
-};
-
-
-/**
- * @brief Public information about a coin (including the public key
- * of the coin, the denomination key and the signature with
- * the denomination key).
- */
-struct TALER_CoinPublicInfo
-{
-  /**
-   * The coin's public key.
-   */
-  struct TALER_CoinSpendPublicKeyP coin_pub;
-
-  /**
-   * Hash of the public key representing the denomination of the coin that is
-   * being deposited.
-   */
-  struct TALER_DenominationHashP denom_pub_hash;
-
-  /**
-   * Hash of the age commitment.  If no age commitment was provided, it must be
-   * set to all zeroes.
-   */
-  struct TALER_AgeCommitmentHash h_age_commitment;
-
-  /**
-   * True, if age commitment is not applicable.
-   */
-  bool no_age_commitment;
-
-  /**
-   * (Unblinded) signature over @e coin_pub with @e denom_pub,
-   * which demonstrates that the coin is valid.
-   */
-  struct TALER_DenominationSignature denom_sig;
-};
-
-
-/**
- * Details for one of the /deposit operations that the
- * donau combined into a single wire transfer.
- */
-struct TALER_TrackTransferDetails
-{
-  /**
-   * Hash of the proposal data.
-   */
-  struct TALER_PrivateContractHashP h_contract_terms;
-
-  /**
-   * Which coin was deposited?
-   */
-  struct TALER_CoinSpendPublicKeyP coin_pub;
-
-  /**
-   * Value of the deposit (including fee).
-   */
-  struct TALER_Amount coin_value;
-
-  /**
-   * Fee charged by the donau for the deposit.
-   */
-  struct TALER_Amount coin_fee;
-
-};
-
-
-/**
- * @brief Type of algorithm specific Values for withdrawal
- */
-struct TALER_DonauWithdrawValues
-{
-
-  /**
-   * Type of the signature.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Details, depending on @e cipher.
-   */
-  union
-  {
-    /**
-     * If we use #TALER_DENOMINATION_CS in @a cipher.
-     */
-    struct TALER_DenominationCSPublicRPairP cs_values;
-
-  } details;
-
-};
-
-
-/**
- * Free internals of @a denom_pub, but not @a denom_pub itself.
- *
- * @param[in] denom_pub key to free
- */
-void
-TALER_denom_pub_free (struct TALER_DenominationPublicKey *denom_pub);
-
-
-/**
- * Create private key for a Taler coin.
- * @param ps planchet secret to derive coin priv key
- * @param alg_values includes algorithm specific values
- * @param[out] coin_priv private key to initialize
- */
-void
-TALER_planchet_setup_coin_priv (
-  const struct TALER_PlanchetMasterSecretP *ps,
-  const struct TALER_DonauWithdrawValues *alg_values,
-  struct TALER_CoinSpendPrivateKeyP *coin_priv);
-
-
-/**
- * @brief Method to derive withdraw /csr nonce
- *
- * @param ps planchet secrets of the coin
- * @param[out] nonce withdraw nonce included in the request to generate R_0 
and R_1
- */
-void
-TALER_cs_withdraw_nonce_derive (
-  const struct TALER_PlanchetMasterSecretP *ps,
-  struct TALER_CsNonce *nonce);
-
-
-/**
- * @brief Method to derive /csr nonce
- * to be used during refresh/melt operation.
- *
- * @param rms secret input for the refresh operation
- * @param idx index of the fresh coin
- * @param[out] nonce set to nonce included in the request to generate R_0 and 
R_1
- */
-void
-TALER_cs_refresh_nonce_derive (
-  const struct TALER_RefreshMasterSecretP *rms,
-  uint32_t idx,
-  struct TALER_CsNonce *nonce);
-
-
-/**
- * Initialize denomination public-private key pair.
- *
- * For #TALER_DENOMINATION_RSA, an additional "unsigned int"
- * argument with the number of bits for 'n' (e.g. 2048) must
- * be passed.
- *
- * @param[out] denom_priv where to write the private key
- * @param[out] denom_pub where to write the public key
- * @param cipher which type of cipher to use
- * @param ... RSA key size (eg. 2048/3072/4096)
- * @return #GNUNET_OK on success, #GNUNET_NO if parameters were invalid
- */
-enum GNUNET_GenericReturnValue
-TALER_denom_priv_create (struct TALER_DenominationPrivateKey *denom_priv,
-                         struct TALER_DenominationPublicKey *denom_pub,
-                         enum TALER_DenominationCipher cipher,
-                         ...);
-
-
-/**
- * Free internals of @a denom_priv, but not @a denom_priv itself.
- *
- * @param[in] denom_priv key to free
- */
-void
-TALER_denom_priv_free (struct TALER_DenominationPrivateKey *denom_priv);
-
-
-/**
- * Free internals of @a denom_sig, but not @a denom_sig itself.
- *
- * @param[in] denom_sig signature to free
- */
-void
-TALER_denom_sig_free (struct TALER_DenominationSignature *denom_sig);
-
-
-/**
- * Blind coin for blind signing with @a dk using blinding secret @a coin_bks.
- *
- * NOTE: As a particular oddity, the @a blinded_planchet is only partially
- * initialized by this function in the case of CS-denominations. Here, the
- * 'nonce' must be initialized separately!
- *
- * @param dk denomination public key to blind for
- * @param coin_bks blinding secret to use
- * @param age_commitment_hash hash of the age commitment to be used for the 
coin. NULL if no commitment is made.
- * @param coin_pub public key of the coin to blind
- * @param alg_values algorithm specific values to blind the planchet
- * @param[out] c_hash resulting hashed coin
- * @param[out] blinded_planchet planchet data to initialize
- * @return #GNUNET_OK on success
- */
-enum GNUNET_GenericReturnValue
-TALER_denom_blind (const struct TALER_DenominationPublicKey *dk,
-                   const union TALER_DenominationBlindingKeyP *coin_bks,
-                   const struct TALER_AgeCommitmentHash *age_commitment_hash,
-                   const struct TALER_CoinSpendPublicKeyP *coin_pub,
-                   const struct TALER_DonauWithdrawValues *alg_values,
-                   struct TALER_CoinPubHashP *c_hash,
-                   struct TALER_BlindedPlanchet *blinded_planchet);
-
-
-/**
- * Create blinded signature.
- *
- * @param[out] denom_sig where to write the signature
- * @param denom_priv private key to use for signing
- * @param for_melt true to use the HKDF for melt
- * @param blinded_planchet the planchet already blinded
- * @return #GNUNET_OK on success
- */
-enum GNUNET_GenericReturnValue
-TALER_denom_sign_blinded (struct TALER_BlindedDenominationSignature *denom_sig,
-                          const struct TALER_DenominationPrivateKey 
*denom_priv,
-                          bool for_melt,
-                          const struct TALER_BlindedPlanchet 
*blinded_planchet);
-
-
-/**
- * Unblind blinded signature.
- *
- * @param[out] denom_sig where to write the unblinded signature
- * @param bdenom_sig the blinded signature
- * @param bks blinding secret to use
- * @param c_hash hash of the coin's public key for verification of the 
signature
- * @param alg_values algorithm specific values
- * @param denom_pub public key used for signing
- * @return #GNUNET_OK on success
- */
-enum GNUNET_GenericReturnValue
-TALER_denom_sig_unblind (
-  struct TALER_DenominationSignature *denom_sig,
-  const struct TALER_BlindedDenominationSignature *bdenom_sig,
-  const union TALER_DenominationBlindingKeyP *bks,
-  const struct TALER_CoinPubHashP *c_hash,
-  const struct TALER_DonauWithdrawValues *alg_values,
-  const struct TALER_DenominationPublicKey *denom_pub);
-
-
-/**
- * Free internals of @a denom_sig, but not @a denom_sig itself.
- *
- * @param[in] denom_sig signature to free
- */
-void
-TALER_blinded_denom_sig_free (
-  struct TALER_BlindedDenominationSignature *denom_sig);
-
-
-/**
- * Compute the hash of the given @a denom_pub.
- *
- * @param denom_pub public key to hash
- * @param[out] denom_hash resulting hash value
- */
-void
-TALER_denom_pub_hash (const struct TALER_DenominationPublicKey *denom_pub,
-                      struct TALER_DenominationHashP *denom_hash);
-
-
-/**
- * Make a (deep) copy of the given @a denom_src to
- * @a denom_dst.
- *
- * @param[out] denom_dst target to copy to
- * @param denom_src public key to copy
- */
-void
-TALER_denom_pub_deep_copy (struct TALER_DenominationPublicKey *denom_dst,
-                           const struct TALER_DenominationPublicKey 
*denom_src);
-
-
-/**
- * Make a (deep) copy of the given @a denom_src to
- * @a denom_dst.
- *
- * @param[out] denom_dst target to copy to
- * @param denom_src public key to copy
- */
-void
-TALER_denom_sig_deep_copy (struct TALER_DenominationSignature *denom_dst,
-                           const struct TALER_DenominationSignature 
*denom_src);
-
-
-/**
- * Make a (deep) copy of the given @a denom_src to
- * @a denom_dst.
- *
- * @param[out] denom_dst target to copy to
- * @param denom_src public key to copy
- */
-void
-TALER_blinded_denom_sig_deep_copy (
-  struct TALER_BlindedDenominationSignature *denom_dst,
-  const struct TALER_BlindedDenominationSignature *denom_src);
-
-
-/**
- * Compare two denomination public keys.
- *
- * @param denom1 first key
- * @param denom2 second key
- * @return 0 if the keys are equal, otherwise -1 or 1
- */
-int
-TALER_denom_pub_cmp (const struct TALER_DenominationPublicKey *denom1,
-                     const struct TALER_DenominationPublicKey *denom2);
-
-
-/**
- * Compare two denomination signatures.
- *
- * @param sig1 first signature
- * @param sig2 second signature
- * @return 0 if the keys are equal, otherwise -1 or 1
- */
-int
-TALER_denom_sig_cmp (const struct TALER_DenominationSignature *sig1,
-                     const struct TALER_DenominationSignature *sig2);
-
-
-/**
- * Compare two blinded denomination signatures.
- *
- * @param sig1 first signature
- * @param sig2 second signature
- * @return 0 if the keys are equal, otherwise -1 or 1
- */
-int
-TALER_blinded_denom_sig_cmp (
-  const struct TALER_BlindedDenominationSignature *sig1,
-  const struct TALER_BlindedDenominationSignature *sig2);
-
-
-/**
- * Compare two blinded planchets.
- *
- * @param bp1 first blinded planchet
- * @param bp2 second blinded planchet
- * @return 0 if the keys are equal, otherwise -1 or 1
- */
-int
-TALER_blinded_planchet_cmp (
-  const struct TALER_BlindedPlanchet *bp1,
-  const struct TALER_BlindedPlanchet *bp2);
-
-
-/**
- * Obtain denomination public key from a denomination private key.
- *
- * @param denom_priv private key to convert
- * @param age_mask age mask to be applied
- * @param[out] denom_pub where to return the public key
- */
-void
-TALER_denom_priv_to_pub (const struct TALER_DenominationPrivateKey *denom_priv,
-                         const struct TALER_AgeMask age_mask,
-                         struct TALER_DenominationPublicKey *denom_pub);
-
-
-/**
- * Verify signature made with a denomination public key
- * over a coin.
- *
- * @param denom_pub public denomination key
- * @param denom_sig signature made with the private key
- * @param c_hash hash over the coin
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_denom_pub_verify (const struct TALER_DenominationPublicKey *denom_pub,
-                        const struct TALER_DenominationSignature *denom_sig,
-                        const struct TALER_CoinPubHashP *c_hash);
-
-
-/**
- * Encrypts KYC attributes for storage in the database.
- *
- * @param key encryption key to use
- * @param attr set of attributes to encrypt
- * @param[out] enc_attr encrypted attribute data
- * @param[out] enc_attr_size number of bytes in @a enc_attr
- */
-void
-TALER_CRYPTO_kyc_attributes_encrypt (
-  const struct TALER_AttributeEncryptionKeyP *key,
-  const json_t *attr,
-  void **enc_attr,
-  size_t *enc_attr_size);
-
-
-/**
- * Encrypts KYC attributes for storage in the database.
- *
- * @param key encryption key to use
- * @param enc_attr encrypted attribute data
- * @param enc_attr_size number of bytes in @a enc_attr
- * @return set of decrypted attributes, NULL on failure
- */
-json_t *
-TALER_CRYPTO_kyc_attributes_decrypt (
-  const struct TALER_AttributeEncryptionKeyP *key,
-  const void *enc_attr,
-  size_t enc_attr_size);
-
-
-/**
- * Takes a set of KYC attributes and extracts key
- * data that we use to detect similar / duplicate
- * entries in the database.
- *
- * @param attr set of KYC attributes
- * @param[out] kyc_prox set to the proximity hash
- */
-void
-TALER_CRYPTO_attributes_to_kyc_prox (
-  const json_t *attr,
-  struct GNUNET_ShortHashCode *kyc_prox);
-
-
-/**
- * Check if a coin is valid; that is, whether the denomination key exists,
- * is not expired, and the signature is correct.
- *
- * @param coin_public_info the coin public info to check for validity
- * @param denom_pub denomination key, must match @a coin_public_info's 
`denom_pub_hash`
- * @return #GNUNET_YES if the coin is valid,
- *         #GNUNET_NO if it is invalid
- *         #GNUNET_SYSERR if an internal error occurred
- */
-enum GNUNET_GenericReturnValue
-TALER_test_coin_valid (const struct TALER_CoinPublicInfo *coin_public_info,
-                       const struct TALER_DenominationPublicKey *denom_pub);
-
-
-/**
- * Compute the hash of a blinded coin.
- *
- * @param blinded_planchet blinded planchet
- * @param denom_hash hash of the denomination publick key
- * @param[out] bch where to write the hash
- * @return #GNUNET_OK when successful, #GNUNET_SYSERR if an internal error 
occurred
- */
-enum GNUNET_GenericReturnValue
-TALER_coin_ev_hash (const struct TALER_BlindedPlanchet *blinded_planchet,
-                    const struct TALER_DenominationHashP *denom_hash,
-                    struct TALER_BlindedCoinHashP *bch);
-
-
-/**
- * Compute the hash of a coin.
- *
- * @param coin_pub public key of the coin
- * @param age_commitment_hash hash of the age commitment vector. NULL, if no 
age commitment was set
- * @param[out] coin_h where to write the hash
- */
-void
-TALER_coin_pub_hash (const struct TALER_CoinSpendPublicKeyP *coin_pub,
-                     const struct TALER_AgeCommitmentHash *age_commitment_hash,
-                     struct TALER_CoinPubHashP *coin_h);
-
-
-/**
- * Compute the hash of a payto URI.
- *
- * @param payto URI to hash
- * @param[out] h_payto where to write the hash
- */
-void
-TALER_payto_hash (const char *payto,
-                  struct TALER_PaytoHashP *h_payto);
-
-
-/**
- * Details about a planchet that the donor wants to obtain
- * a withdrawal authorization.  This is the information that
- * will need to be sent to the donau to obtain the blind
- * signature required to turn a planchet into a coin.
- */
-struct TALER_PlanchetDetail
-{
-  /**
-   * Hash of the denomination public key.
-   */
-  struct TALER_DenominationHashP denom_pub_hash;
-
-  /**
-   * The blinded planchet
-   */
-  struct TALER_BlindedPlanchet blinded_planchet;
-};
-
-
-/**
- * Information about a (fresh) coin, returned from the API when we
- * finished creating a coin.  Note that @e sig needs to be freed
- * using the appropriate code.
- */
-struct TALER_FreshCoin
-{
-
-  /**
-   * The donau's signature over the coin's public key.
-   */
-  struct TALER_DenominationSignature sig;
-
-  /**
-   * The coin's private key.
-   */
-  struct TALER_CoinSpendPrivateKeyP coin_priv;
-
-  /**
-   * Optional hash of an age commitment bound to this coin, maybe NULL.
-   */
-  const struct TALER_AgeCommitmentHash *h_age_commitment;
-};
-
-
-GNUNET_NETWORK_STRUCT_BEGIN
-
-/**
- * @brief Secret used to decrypt the key to decrypt link secrets.
- */
-struct TALER_TransferSecretP
-{
-  /**
-   * Secret used to derive private inputs for refreshed coins.
-   * Must be (currently) a hash as this is what
-   * GNUNET_CRYPTO_ecc_ecdh() returns to us.
-   */
-  struct GNUNET_HashCode key;
-};
-
-
-/**
- * Length of the raw value in the Taler wire transfer identifier
- * (in binary representation).
- */
-#define TALER_BANK_TRANSFER_IDENTIFIER_LEN 32
-
-/**
- * #TALER_BANK_TRANSFER_IDENTIFIER_LEN as a string.
- */
-#define TALER_BANK_TRANSFER_IDENTIFIER_LEN_STR "32"
-
-
-/**
- * Raw value of a wire transfer subjects, without the checksum.
- */
-struct TALER_WireTransferIdentifierRawP
-{
-
-  /**
-   * Raw value.  Note that typical payment systems (SEPA, ACH) support
-   * at least two lines of 27 ASCII characters to encode a transaction
-   * subject or "details", for a total of 54 characters.  (The payment
-   * system protocols often support more lines, but the forms presented
-   * to donors are usually limited to 54 characters.)
-   *
-   * With a Base32-encoding of 5 bit per character, this gives us 270
-   * bits or (rounded down) 33 bytes.  So we use the first 32 bytes to
-   * encode the actual value (i.e. a 256-bit / 32-byte public key or
-   * a hash code), and the last byte for a minimalistic checksum.
-   */
-  uint8_t raw[TALER_BANK_TRANSFER_IDENTIFIER_LEN];
-};
-
-
-/**
- * Raw value of a wire transfer subject for a wad.
- */
-struct TALER_WadIdentifierP
-{
-
-  /**
-   * Wad identifier, in binary encoding.
-   */
-  uint8_t raw[24];
-};
-
-
-/**
- * Binary information encoded in Crockford's Base32 in wire transfer
- * subjects of transfers from Taler to a charity.  The actual value
- * is chosen by the donau and has no particular semantics, other than
- * being unique so that the donau can lookup details about the wire
- * transfer when needed.
- */
-struct TALER_WireTransferIdentifierP
-{
-
-  /**
-   * Raw value.
-   */
-  struct TALER_WireTransferIdentifierRawP raw;
-
-  /**
-   * Checksum using CRC8 over the @e raw data.
-   */
-  uint8_t crc8;
-};
-
-
-GNUNET_NETWORK_STRUCT_END
-
-
-/**
- * Setup information for a fresh coin, deriving the coin planchet secrets from
- * which we will later derive the private key and the blinding factor.  The
- * planchet secrets derivation is based on the @a secret_seed with a KDF
- * salted by the @a coin_num_salt.
- *
- * @param secret_seed seed to use for KDF to derive coin keys
- * @param coin_num_salt number of the coin to include in KDF
- * @param[out] ps value to initialize
- */
-void
-TALER_transfer_secret_to_planchet_secret (
-  const struct TALER_TransferSecretP *secret_seed,
-  uint32_t coin_num_salt,
-  struct TALER_PlanchetMasterSecretP *ps);
-
-
-/**
- * Derive the @a coin_num transfer private key @a tpriv from a refresh from
- * the @a rms seed and the @a old_coin_pub of the refresh operation.  The
- * transfer private key derivation is based on the @a ps with a KDF salted by
- * the @a coin_num.
- *
- * @param rms seed to use for KDF to derive transfer keys
- * @param old_coin_priv private key of the old coin
- * @param cnc_num cut and choose number to include in KDF
- * @param[out] tpriv value to initialize
- */
-void
-TALER_planchet_secret_to_transfer_priv (
-  const struct TALER_RefreshMasterSecretP *rms,
-  const struct TALER_CoinSpendPrivateKeyP *old_coin_priv,
-  uint32_t cnc_num,
-  struct TALER_TransferPrivateKeyP *tpriv);
-
-
-/**
- * Setup secret seed information for fresh coins to be
- * withdrawn.
- *
- * @param[out] ps value to initialize
- */
-void
-TALER_planchet_master_setup_random (
-  struct TALER_PlanchetMasterSecretP *ps);
-
-
-/**
- * Setup secret seed for fresh coins to be refreshed.
- *
- * @param[out] rms value to initialize
- */
-void
-TALER_refresh_master_setup_random (
-  struct TALER_RefreshMasterSecretP *rms);
-
-
-/**
- * Create a blinding secret @a bks given the client's @a ps and the alg_values
- * from the donau.
- *
- * @param ps secret to derive blindings from
- * @param alg_values withdraw values containing cipher and additional CS values
- * @param[out] bks blinding secrets
- */
-void
-TALER_planchet_blinding_secret_create (
-  const struct TALER_PlanchetMasterSecretP *ps,
-  const struct TALER_DonauWithdrawValues *alg_values,
-  union TALER_DenominationBlindingKeyP *bks);
-
-
-/**
- * Prepare a planchet for withdrawal.  Creates and blinds a coin.
- *
- * @param dk denomination key for the coin to be created
- * @param alg_values algorithm specific values
- * @param bks blinding secrets
- * @param coin_priv coin private key
- * @param ach hash of age commitment to bind to this coin, maybe NULL
- * @param[out] c_hash set to the hash of the public key of the coin (needed 
later)
- * @param[out] pd set to the planchet detail for TALER_CHARITY_tip_pickup() and
- *               other withdraw operations, `pd->blinded_planchet.cipher` will 
be set
- *               to cipher from @a dk
- * @return #GNUNET_OK on success
- */
-enum GNUNET_GenericReturnValue
-TALER_planchet_prepare (const struct TALER_DenominationPublicKey *dk,
-                        const struct TALER_DonauWithdrawValues *alg_values,
-                        const union TALER_DenominationBlindingKeyP *bks,
-                        const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-                        const struct TALER_AgeCommitmentHash *ach,
-                        struct TALER_CoinPubHashP *c_hash,
-                        struct TALER_PlanchetDetail *pd);
-
-
-/**
- * Frees blinded message inside blinded planchet depending on 
`blinded_planchet->cipher`.
- * Does not free the @a blinded_planchet itself!
- *
- * @param[in] blinded_planchet blinded planchet
- */
-void
-TALER_blinded_planchet_free (struct TALER_BlindedPlanchet *blinded_planchet);
-
-
-/**
- * Frees blinded message inside planchet detail @a pd.
- *
- * @param[in] pd planchet detail to free
- */
-void
-TALER_planchet_detail_free (struct TALER_PlanchetDetail *pd);
-
-
-/**
- * Obtain a coin from the planchet's secrets and the blind signature
- * of the donau.
- *
- * @param dk denomination key, must match what was given to 
#TALER_planchet_prepare()
- * @param blind_sig blind signature from the donau
- * @param bks blinding key secret
- * @param coin_priv private key of the coin
- * @param ach hash of age commitment that is bound to this coin, maybe NULL
- * @param c_hash hash of the coin's public key for verification of the 
signature
- * @param alg_values values obtained from the donau for the withdrawal
- * @param[out] coin set to the details of the fresh coin
- * @return #GNUNET_OK on success
- */
-enum GNUNET_GenericReturnValue
-TALER_planchet_to_coin (
-  const struct TALER_DenominationPublicKey *dk,
-  const struct TALER_BlindedDenominationSignature *blind_sig,
-  const union TALER_DenominationBlindingKeyP *bks,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  const struct TALER_AgeCommitmentHash *ach,
-  const struct TALER_CoinPubHashP *c_hash,
-  const struct TALER_DonauWithdrawValues *alg_values,
-  struct TALER_FreshCoin *coin);
-
-
-/**
- * Add the hash of the @a bp (in some canonicalized form)
- * to the @a hash_context.
- *
- * @param bp blinded planchet to hash
- * @param[in,out] hash_context hash context to use
- */
-void
-TALER_blinded_planchet_hash_ (const struct TALER_BlindedPlanchet *bp,
-                              struct GNUNET_HashContext *hash_context);
-
-
-/**
- * Given the coin and the transfer private keys, compute the
- * transfer secret.  (Technically, we only need one of the two
- * private keys, but the caller currently trivially only has
- * the two private keys, so we derive one of the public keys
- * internally to this function.)
- *
- * @param coin_priv coin key
- * @param trans_priv transfer private key
- * @param[out] ts computed transfer secret
- */
-void
-TALER_link_derive_transfer_secret (
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  const struct TALER_TransferPrivateKeyP *trans_priv,
-  struct TALER_TransferSecretP *ts);
-
-
-/**
- * Decrypt the shared @a secret from the information in the
- * @a trans_priv and @a coin_pub.
- *
- * @param trans_priv transfer private key
- * @param coin_pub coin public key
- * @param[out] transfer_secret set to the shared secret
- */
-void
-TALER_link_reveal_transfer_secret (
-  const struct TALER_TransferPrivateKeyP *trans_priv,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  struct TALER_TransferSecretP *transfer_secret);
-
-
-/**
- * Decrypt the shared @a secret from the information in the
- * @a trans_priv and @a coin_pub.
- *
- * @param trans_pub transfer private key
- * @param coin_priv coin public key
- * @param[out] transfer_secret set to the shared secret
- */
-void
-TALER_link_recover_transfer_secret (
-  const struct TALER_TransferPublicKeyP *trans_pub,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_TransferSecretP *transfer_secret);
-
-
-/**
- * Information about a coin to be created during a refresh operation.
- */
-struct TALER_RefreshCoinData
-{
-
-  /**
-   * The denomination's public key.
-   */
-  const struct TALER_DenominationPublicKey *dk;
-
-  /**
-   * The blinded planchet (details depend on cipher).
-   */
-  struct TALER_BlindedPlanchet blinded_planchet;
-
-};
-
-
-/**
- * One of the #TALER_CNC_KAPPA commitments.
- */
-struct TALER_RefreshCommitmentEntry
-{
-  /**
-   * Transfer public key of this commitment.
-   */
-  struct TALER_TransferPublicKeyP transfer_pub;
-
-  /**
-   * Array of @e num_new_coins new coins to be created.
-   */
-  struct TALER_RefreshCoinData *new_coins;
-};
-
-
-/**
- * Compute the commitment for a /refresh/melt operation from
- * the respective public inputs.
- *
- * @param[out] rc set to the value the wallet must commit to
- * @param kappa number of transfer public keys involved (must be 
#TALER_CNC_KAPPA)
- * @param rms refresh master secret to include, can be NULL!
- * @param num_new_coins number of new coins to be created
- * @param rcs array of @a kappa commitments
- * @param coin_pub public key of the coin to be melted
- * @param amount_with_fee amount to be melted, including fee
- */
-void
-TALER_refresh_get_commitment (struct TALER_RefreshCommitmentP *rc,
-                              uint32_t kappa,
-                              const struct TALER_RefreshMasterSecretP *rms,
-                              uint32_t num_new_coins,
-                              const struct TALER_RefreshCommitmentEntry *rcs,
-                              const struct TALER_CoinSpendPublicKeyP *coin_pub,
-                              const struct TALER_Amount *amount_with_fee);
-
-
-/**
- * Encrypt contract for transmission to a party that will
- * merge it into a reserve.
- *
- * @param purse_pub public key of the purse
- * @param contract_priv private key of the contract
- * @param merge_priv merge capability to include
- * @param contract_terms contract terms to encrypt
- * @param[out] econtract set to encrypted contract
- * @param[out] econtract_size set to number of bytes in @a econtract
- */
-void
-TALER_CRYPTO_contract_encrypt_for_merge (
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_ContractDiffiePrivateP *contract_priv,
-  const struct TALER_PurseMergePrivateKeyP *merge_priv,
-  const json_t *contract_terms,
-  void **econtract,
-  size_t *econtract_size);
-
-
-/**
- * Decrypt contract for the party that will
- * merge it into a reserve.
- *
- * @param purse_pub public key of the purse
- * @param contract_priv private key of the contract
- * @param econtract encrypted contract
- * @param econtract_size  number of bytes in @a econtract
- * @param[out] merge_priv set to merge capability
- * @return decrypted contract terms, or NULL on failure
- */
-json_t *
-TALER_CRYPTO_contract_decrypt_for_merge (
-  const struct TALER_ContractDiffiePrivateP *contract_priv,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const void *econtract,
-  size_t econtract_size,
-  struct TALER_PurseMergePrivateKeyP *merge_priv);
-
-
-/**
- * Encrypt contract for transmission to a party that will
- * pay for it.
- *
- * @param purse_pub public key of the purse
- * @param contract_priv private key of the contract
- * @param contract_terms contract terms to encrypt
- * @param[out] econtract set to encrypted contract
- * @param[out] econtract_size set to number of bytes in @a econtract
- */
-void
-TALER_CRYPTO_contract_encrypt_for_deposit (
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_ContractDiffiePrivateP *contract_priv,
-  const json_t *contract_terms,
-  void **econtract,
-  size_t *econtract_size);
-
-
-/**
- * Decrypt contract for the party that will pay for it.
- *
- * @param contract_priv private key of the contract
- * @param econtract encrypted contract
- * @param econtract_size  number of bytes in @a econtract
- * @return decrypted contract terms, or NULL on failure
- */
-json_t *
-TALER_CRYPTO_contract_decrypt_for_deposit (
-  const struct TALER_ContractDiffiePrivateP *contract_priv,
-  const void *econtract,
-  size_t econtract_size);
-
-
-/* **************** AML officer signatures **************** */
-
-/**
- * Sign AML query. Simple authentication, doesn't actually
- * sign anything.
- *
- * @param officer_priv private key of AML officer
- * @param[out] officer_sig where to write the signature
- */
-void
-TALER_officer_aml_query_sign (
-  const struct TALER_AmlOfficerPrivateKeyP *officer_priv,
-  struct TALER_AmlOfficerSignatureP *officer_sig);
-
-
-/**
- * Verify AML query authorization.
- *
- * @param officer_pub public key of AML officer
- * @param officer_sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_officer_aml_query_verify (
-  const struct TALER_AmlOfficerPublicKeyP *officer_pub,
-  const struct TALER_AmlOfficerSignatureP *officer_sig);
-
-
-/**
- * Sign AML decision.
- *
- * @param justification human-readable justification
- * @param decision_time when was the decision made
- * @param new_threshold at what monthly amount threshold
- *                      should a revision be triggered
- * @param h_payto payto URI hash of the account the
- *                      decision is about
- * @param new_state updated AML state
- * @param kyc_requirements additional KYC requirements to
- *           impose, can be NULL
- * @param officer_priv private key of AML officer
- * @param[out] officer_sig where to write the signature
- */
-void
-TALER_officer_aml_decision_sign (
-  const char *justification,
-  struct GNUNET_TIME_Timestamp decision_time,
-  const struct TALER_Amount *new_threshold,
-  const struct TALER_PaytoHashP *h_payto,
-  enum TALER_AmlDecisionState new_state,
-  const json_t *kyc_requirements,
-  const struct TALER_AmlOfficerPrivateKeyP *officer_priv,
-  struct TALER_AmlOfficerSignatureP *officer_sig);
-
-
-/**
- * Verify AML decision.
- *
- * @param justification human-readable justification
- * @param decision_time when was the decision made
- * @param new_threshold at what monthly amount threshold
- *                      should a revision be triggered
- * @param h_payto payto URI hash of the account the
- *                      decision is about
- * @param new_state updated AML state
- * @param kyc_requirements additional KYC requirements to
- *           impose, can be NULL
- * @param officer_pub public key of AML officer
- * @param officer_sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_officer_aml_decision_verify (
-  const char *justification,
-  struct GNUNET_TIME_Timestamp decision_time,
-  const struct TALER_Amount *new_threshold,
-  const struct TALER_PaytoHashP *h_payto,
-  enum TALER_AmlDecisionState new_state,
-  const json_t *kyc_requirements,
-  const struct TALER_AmlOfficerPublicKeyP *officer_pub,
-  const struct TALER_AmlOfficerSignatureP *officer_sig);
-
-
-/* **************** Helper-based RSA operations **************** */
-
-/**
- * Handle for talking to an Denomination key signing helper.
- */
-struct TALER_CRYPTO_RsaDenominationHelper;
-
-/**
- * Function called with information about available keys for signing.  Usually
- * only called once per key upon connect. Also called again in case a key is
- * being revoked, in that case with an @a end_time of zero.
- *
- * @param cls closure
- * @param section_name name of the denomination type in the configuration;
- *                 NULL if the key has been revoked or purged
- * @param start_time when does the key become available for signing;
- *                 zero if the key has been revoked or purged
- * @param validity_duration how long does the key remain available for signing;
- *                 zero if the key has been revoked or purged
- * @param h_rsa hash of the RSA @a denom_pub that is available (or was purged)
- * @param denom_pub the public key itself, NULL if the key was revoked or 
purged
- * @param sm_pub public key of the security module, NULL if the key was 
revoked or purged
- * @param sm_sig signature from the security module, NULL if the key was 
revoked or purged
- *               The signature was already verified against @a sm_pub.
- */
-typedef void
-(*TALER_CRYPTO_RsaDenominationKeyStatusCallback)(
-  void *cls,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Relative validity_duration,
-  const struct TALER_RsaPubHashP *h_rsa,
-  const struct TALER_DenominationPublicKey *denom_pub,
-  const struct TALER_SecurityModulePublicKeyP *sm_pub,
-  const struct TALER_SecurityModuleSignatureP *sm_sig);
-
-
-/**
- * Initiate connection to an denomination key helper.
- *
- * @param cfg configuration to use
- * @param dkc function to call with key information
- * @param dkc_cls closure for @a dkc
- * @return NULL on error (such as bad @a cfg).
- */
-struct TALER_CRYPTO_RsaDenominationHelper *
-TALER_CRYPTO_helper_rsa_connect (
-  const struct GNUNET_CONFIGURATION_Handle *cfg,
-  TALER_CRYPTO_RsaDenominationKeyStatusCallback dkc,
-  void *dkc_cls);
-
-
-/**
- * Function to call to 'poll' for updates to the available key material.
- * Should be called whenever it is important that the key material status is
- * current, like when handling a "/keys" request.  This function basically
- * briefly checks if there are messages from the helper announcing changes to
- * denomination keys.
- *
- * @param dh helper process connection
- */
-void
-TALER_CRYPTO_helper_rsa_poll (struct TALER_CRYPTO_RsaDenominationHelper *dh);
-
-
-/**
- * Information needed for an RSA signature request.
- */
-struct TALER_CRYPTO_RsaSignRequest
-{
-  /**
-   * Hash of the RSA public key.
-   */
-  const struct TALER_RsaPubHashP *h_rsa;
-
-  /**
-   * Message to be (blindly) signed.
-   */
-  const void *msg;
-
-  /**
-   * Number of bytes in @e msg.
-   */
-  size_t msg_size;
-};
-
-
-/**
- * Request helper @a dh to sign message in @a rsr using the public key
- * corresponding to the key in @a rsr.
- *
- * This operation will block until the signature has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param dh helper process connection
- * @param rsr details about the requested signature
- * @param[out] bs set to the blind signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_rsa_sign (
-  struct TALER_CRYPTO_RsaDenominationHelper *dh,
-  const struct TALER_CRYPTO_RsaSignRequest *rsr,
-  struct TALER_BlindedDenominationSignature *bs);
-
-
-/**
- * Request helper @a dh to batch sign messages in @a rsrs using the public key
- * corresponding to the keys in @a rsrs.
- *
- * This operation will block until all the signatures have been obtained.  
Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * Note that in case of errors, the @a bss array may still have been partially
- * filled with signatures, which in this case must be freed by the caller
- * (this is in contrast to the #TALER_CRYPTO_helper_rsa_sign() API which never
- * returns any signatures if there was an error).
- *
- * @param dh helper process connection
- * @param rsrs array with details about the requested signatures
- * @param rsrs_length length of the @a rsrs array
- * @param[out] bss array set to the blind signatures, must be of length @a 
rsrs_length!
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_rsa_batch_sign (
-  struct TALER_CRYPTO_RsaDenominationHelper *dh,
-  const struct TALER_CRYPTO_RsaSignRequest *rsrs,
-  unsigned int rsrs_length,
-  struct TALER_BlindedDenominationSignature *bss);
-
-
-/**
- * Ask the helper to revoke the public key associated with @a h_denom_pub.
- * Will cause the helper to tell all clients that the key is now unavailable,
- * and to create a replacement key.
- *
- * This operation will block until the revocation request has been
- * transmitted.  Should this process receive a signal (that is not ignored)
- * while the operation is pending, the operation may fail. If the key is
- * unknown, this function will also appear to have succeeded. To be sure that
- * the revocation worked, clients must watch the denomination key status
- * callback.
- *
- * @param dh helper to process connection
- * @param h_rsa hash of the RSA public key to revoke
- */
-void
-TALER_CRYPTO_helper_rsa_revoke (
-  struct TALER_CRYPTO_RsaDenominationHelper *dh,
-  const struct TALER_RsaPubHashP *h_rsa);
-
-
-/**
- * Close connection to @a dh.
- *
- * @param[in] dh connection to close
- */
-void
-TALER_CRYPTO_helper_rsa_disconnect (
-  struct TALER_CRYPTO_RsaDenominationHelper *dh);
-
-
-/* **************** Helper-based CS operations **************** */
-
-/**
- * Handle for talking to an Denomination key signing helper.
- */
-struct TALER_CRYPTO_CsDenominationHelper;
-
-/**
- * Function called with information about available keys for signing.  Usually
- * only called once per key upon connect. Also called again in case a key is
- * being revoked, in that case with an @a end_time of zero.
- *
- * @param cls closure
- * @param section_name name of the denomination type in the configuration;
- *                 NULL if the key has been revoked or purged
- * @param start_time when does the key become available for signing;
- *                 zero if the key has been revoked or purged
- * @param validity_duration how long does the key remain available for signing;
- *                 zero if the key has been revoked or purged
- * @param h_cs hash of the CS @a denom_pub that is available (or was purged)
- * @param denom_pub the public key itself, NULL if the key was revoked or 
purged
- * @param sm_pub public key of the security module, NULL if the key was 
revoked or purged
- * @param sm_sig signature from the security module, NULL if the key was 
revoked or purged
- *               The signature was already verified against @a sm_pub.
- */
-typedef void
-(*TALER_CRYPTO_CsDenominationKeyStatusCallback)(
-  void *cls,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Relative validity_duration,
-  const struct TALER_CsPubHashP *h_cs,
-  const struct TALER_DenominationPublicKey *denom_pub,
-  const struct TALER_SecurityModulePublicKeyP *sm_pub,
-  const struct TALER_SecurityModuleSignatureP *sm_sig);
-
-
-/**
- * Initiate connection to an denomination key helper.
- *
- * @param cfg configuration to use
- * @param dkc function to call with key information
- * @param dkc_cls closure for @a dkc
- * @return NULL on error (such as bad @a cfg).
- */
-struct TALER_CRYPTO_CsDenominationHelper *
-TALER_CRYPTO_helper_cs_connect (
-  const struct GNUNET_CONFIGURATION_Handle *cfg,
-  TALER_CRYPTO_CsDenominationKeyStatusCallback dkc,
-  void *dkc_cls);
-
-
-/**
- * Function to call to 'poll' for updates to the available key material.
- * Should be called whenever it is important that the key material status is
- * current, like when handling a "/keys" request.  This function basically
- * briefly checks if there are messages from the helper announcing changes to
- * denomination keys.
- *
- * @param dh helper process connection
- */
-void
-TALER_CRYPTO_helper_cs_poll (struct TALER_CRYPTO_CsDenominationHelper *dh);
-
-
-/**
- * Information about what we should sign over.
- */
-struct TALER_CRYPTO_CsSignRequest
-{
-  /**
-   * Hash of the CS public key to use to sign.
-   */
-  const struct TALER_CsPubHashP *h_cs;
-
-  /**
-   * Blinded planchet containing c and the nonce.
-   */
-  const struct TALER_BlindedCsPlanchet *blinded_planchet;
-};
-
-
-/**
- * Request helper @a dh to sign @a req.
- *
- * This operation will block until the signature has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param dh helper process connection
- * @param req information about the key to sign with and the value to sign
- * @param for_melt true if for melt operation
- * @param[out] bs set to the blind signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_cs_sign (
-  struct TALER_CRYPTO_CsDenominationHelper *dh,
-  const struct TALER_CRYPTO_CsSignRequest *req,
-  bool for_melt,
-  struct TALER_BlindedDenominationSignature *bs);
-
-
-/**
- * Request helper @a dh to sign batch of @a reqs requests.
- *
- * This operation will block until the signature has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param dh helper process connection
- * @param reqs information about the keys to sign with and the values to sign
- * @param reqs_length length of the @a reqs array
- * @param for_melt true if this is for a melt operation
- * @param[out] bss array set to the blind signatures, must be of length @a 
reqs_length!
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_cs_batch_sign (
-  struct TALER_CRYPTO_CsDenominationHelper *dh,
-  const struct TALER_CRYPTO_CsSignRequest *reqs,
-  unsigned int reqs_length,
-  bool for_melt,
-  struct TALER_BlindedDenominationSignature *bss);
-
-
-/**
- * Ask the helper to revoke the public key associated with @a h_cs.
- * Will cause the helper to tell all clients that the key is now unavailable,
- * and to create a replacement key.
- *
- * This operation will block until the revocation request has been
- * transmitted.  Should this process receive a signal (that is not ignored)
- * while the operation is pending, the operation may fail. If the key is
- * unknown, this function will also appear to have succeeded. To be sure that
- * the revocation worked, clients must watch the denomination key status
- * callback.
- *
- * @param dh helper to process connection
- * @param h_cs hash of the CS public key to revoke
- */
-void
-TALER_CRYPTO_helper_cs_revoke (
-  struct TALER_CRYPTO_CsDenominationHelper *dh,
-  const struct TALER_CsPubHashP *h_cs);
-
-
-/**
- * Information about what we should derive for.
- */
-struct TALER_CRYPTO_CsDeriveRequest
-{
-  /**
-   * Hash of the CS public key to use to sign.
-   */
-  const struct TALER_CsPubHashP *h_cs;
-
-  /**
-   * Nonce to use.
-   */
-  const struct TALER_CsNonce *nonce;
-};
-
-
-/**
- * Ask the helper to derive R using the information
- * from @a cdr.
- *
- * This operation will block until the R has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param dh helper to process connection
- * @param cdr derivation input data
- * @param for_melt true if this is for a melt operation
- * @param[out] crp set to the pair of R values
- * @return set to the error code (or #TALER_EC_NONE on success)
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_cs_r_derive (
-  struct TALER_CRYPTO_CsDenominationHelper *dh,
-  const struct TALER_CRYPTO_CsDeriveRequest *cdr,
-  bool for_melt,
-  struct TALER_DenominationCSPublicRPairP *crp);
-
-
-/**
- * Ask the helper to derive R using the information from @a cdrs.
- *
- * This operation will block until the R has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param dh helper to process connection
- * @param cdrs array with derivation input data
- * @param cdrs_length length of the @a cdrs array
- * @param for_melt true if this is for a melt operation
- * @param[out] crps array set to the pair of R values, must be of length @a 
cdrs_length
- * @return set to the error code (or #TALER_EC_NONE on success)
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_cs_r_batch_derive (
-  struct TALER_CRYPTO_CsDenominationHelper *dh,
-  const struct TALER_CRYPTO_CsDeriveRequest *cdrs,
-  unsigned int cdrs_length,
-  bool for_melt,
-  struct TALER_DenominationCSPublicRPairP *crps);
-
-
-/**
- * Close connection to @a dh.
- *
- * @param[in] dh connection to close
- */
-void
-TALER_CRYPTO_helper_cs_disconnect (
-  struct TALER_CRYPTO_CsDenominationHelper *dh);
-
-/**
- * Handle for talking to an online key signing helper.
- */
-struct TALER_CRYPTO_DonauSignHelper;
-
-/**
- * Function called with information about available keys for signing.  Usually
- * only called once per key upon connect. Also called again in case a key is
- * being revoked, in that case with an @a end_time of zero.
- *
- * @param cls closure
- * @param start_time when does the key become available for signing;
- *                 zero if the key has been revoked or purged
- * @param validity_duration how long does the key remain available for signing;
- *                 zero if the key has been revoked or purged
- * @param donau_pub the public key itself, NULL if the key was revoked or 
purged
- * @param sm_pub public key of the security module, NULL if the key was 
revoked or purged
- * @param sm_sig signature from the security module, NULL if the key was 
revoked or purged
- *               The signature was already verified against @a sm_pub.
- */
-typedef void
-(*TALER_CRYPTO_DonauKeyStatusCallback)(
-  void *cls,
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Relative validity_duration,
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_SecurityModulePublicKeyP *sm_pub,
-  const struct TALER_SecurityModuleSignatureP *sm_sig);
-
-
-/**
- * Initiate connection to an online signing key helper.
- *
- * @param cfg configuration to use
- * @param ekc function to call with key information
- * @param ekc_cls closure for @a ekc
- * @return NULL on error (such as bad @a cfg).
- */
-struct TALER_CRYPTO_DonauSignHelper *
-TALER_CRYPTO_helper_esign_connect (
-  const struct GNUNET_CONFIGURATION_Handle *cfg,
-  TALER_CRYPTO_DonauKeyStatusCallback ekc,
-  void *ekc_cls);
-
-
-/**
- * Function to call to 'poll' for updates to the available key material.
- * Should be called whenever it is important that the key material status is
- * current, like when handling a "/keys" request.  This function basically
- * briefly checks if there are messages from the helper announcing changes to
- * donau online signing keys.
- *
- * @param esh helper process connection
- */
-void
-TALER_CRYPTO_helper_esign_poll (struct TALER_CRYPTO_DonauSignHelper *esh);
-
-
-/**
- * Request helper @a esh to sign @a msg using the current online
- * signing key.
- *
- * This operation will block until the signature has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param esh helper process connection
- * @param purpose message to sign (must extend beyond the purpose)
- * @param[out] donau_pub set to the public key used for the signature upon 
success
- * @param[out] donau_sig set to the signature upon success
- * @return the error code (or #TALER_EC_NONE on success)
- */
-enum TALER_ErrorCode
-TALER_CRYPTO_helper_esign_sign_ (
-  struct TALER_CRYPTO_DonauSignHelper *esh,
-  const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose,
-  struct TALER_DonauPublicKeyP *donau_pub,
-  struct TALER_DonauSignatureP *donau_sig);
-
-
-/**
- * Request helper @a esh to sign @a msg using the current online
- * signing key.
- *
- * This operation will block until the signature has been obtained.  Should
- * this process receive a signal (that is not ignored) while the operation is
- * pending, the operation will fail.  Note that the helper may still believe
- * that it created the signature. Thus, signals may result in a small
- * differences in the signature counters.  Retrying in this case may work.
- *
- * @param esh helper process connection
- * @param ps message to sign (MUST begin with a purpose)
- * @param[out] epub set to the public key used for the signature upon success
- * @param[out] esig set to the signature upon success
- * @return the error code (or #TALER_EC_NONE on success)
- */
-#define TALER_CRYPTO_helper_esign_sign(esh,ps,epub,esig) (         \
-    /* check size is set correctly */                              \
-    GNUNET_assert (ntohl ((ps)->purpose.size) == sizeof (*ps)),    \
-    /* check 'ps' begins with the purpose */                       \
-    GNUNET_static_assert (((void*) (ps)) ==                        \
-                          ((void*) &(ps)->purpose)),               \
-    TALER_CRYPTO_helper_esign_sign_ (esh,                          \
-                                     &(ps)->purpose,               \
-                                     epub,                         \
-                                     esig) )
-
-
-/**
- * Ask the helper to revoke the public key @a donau_pub .
- * Will cause the helper to tell all clients that the key is now unavailable,
- * and to create a replacement key.
- *
- * This operation will block until the revocation request has been
- * transmitted.  Should this process receive a signal (that is not ignored)
- * while the operation is pending, the operation may fail. If the key is
- * unknown, this function will also appear to have succeeded. To be sure that
- * the revocation worked, clients must watch the signing key status callback.
- *
- * @param esh helper to process connection
- * @param donau_pub the public key to revoke
- */
-void
-TALER_CRYPTO_helper_esign_revoke (
-  struct TALER_CRYPTO_DonauSignHelper *esh,
-  const struct TALER_DonauPublicKeyP *donau_pub);
-
-
-/**
- * Close connection to @a esh.
- *
- * @param[in] esh connection to close
- */
-void
-TALER_CRYPTO_helper_esign_disconnect (
-  struct TALER_CRYPTO_DonauSignHelper *esh);
-
-
-/* ********************* wallet signing ************************** */
-
-
-/**
- * Sign a request to create a purse.
- *
- * @param purse_expiration when should the purse expire
- * @param h_contract_terms contract the two parties agree on
- * @param merge_pub public key defining the merge capability
- * @param min_age age restriction to apply for deposits into the purse
- * @param amount total amount in the purse (including fees)
- * @param purse_priv key identifying the purse
- * @param[out] purse_sig resulting signature
- */
-void
-TALER_wallet_purse_create_sign (
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_PurseMergePublicKeyP *merge_pub,
-  uint32_t min_age,
-  const struct TALER_Amount *amount,
-  const struct TALER_PurseContractPrivateKeyP *purse_priv,
-  struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Verify a purse creation request.
- *
- * @param purse_expiration when should the purse expire
- * @param h_contract_terms contract the two parties agree on
- * @param merge_pub public key defining the merge capability
- * @param min_age age restriction to apply for deposits into the purse
- * @param amount total amount in the purse (including fees)
- * @param purse_pub purse’s public key
- * @param purse_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_CREATE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_purse_create_verify (
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_PurseMergePublicKeyP *merge_pub,
-  uint32_t min_age,
-  const struct TALER_Amount *amount,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Sign a request to delete a purse.
- *
- * @param purse_priv key identifying the purse
- * @param[out] purse_sig resulting signature
- */
-void
-TALER_wallet_purse_delete_sign (
-  const struct TALER_PurseContractPrivateKeyP *purse_priv,
-  struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Verify a purse deletion request.
- *
- * @param purse_pub purse’s public key
- * @param purse_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_DELETE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_purse_delete_verify (
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Sign a request to upload an encrypted contract.
- *
- * @param econtract encrypted contract
- * @param econtract_size number of bytes in @a econtract
- * @param contract_pub public key for the DH-encryption
- * @param purse_priv key identifying the purse
- * @param[out] purse_sig resulting signature
- */
-void
-TALER_wallet_econtract_upload_sign (
-  const void *econtract,
-  size_t econtract_size,
-  const struct TALER_ContractDiffiePublicP *contract_pub,
-  const struct TALER_PurseContractPrivateKeyP *purse_priv,
-  struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Verify a signature over encrypted contract.
- *
- * @param econtract encrypted contract
- * @param econtract_size number of bytes in @a econtract
- * @param contract_pub public key for the DH-encryption
- * @param purse_pub purse’s public key
- * @param purse_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_CREATE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_econtract_upload_verify (
-  const void *econtract,
-  size_t econtract_size,
-  const struct TALER_ContractDiffiePublicP *contract_pub,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Verify a signature over encrypted contract.
- *
- * @param h_econtract hashed encrypted contract
- * @param contract_pub public key for the DH-encryption
- * @param purse_pub purse’s public key
- * @param purse_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_CREATE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_econtract_upload_verify2 (
-  const struct GNUNET_HashCode *h_econtract,
-  const struct TALER_ContractDiffiePublicP *contract_pub,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Sign a request to inquire about a purse's status.
- *
- * @param purse_priv key identifying the purse
- * @param[out] purse_sig resulting signature
- */
-void
-TALER_wallet_purse_status_sign (
-  const struct TALER_PurseContractPrivateKeyP *purse_priv,
-  struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Verify a purse status request signature.
- *
- * @param purse_pub purse’s public key
- * @param purse_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_STATUS
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_purse_status_verify (
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseContractSignatureP *purse_sig);
-
-
-/**
- * Sign a request to deposit a coin into a purse.
- *
- * @param donau_base_url URL of the donau hosting the purse
- * @param purse_pub purse’s public key
- * @param amount amount of the coin's value to transfer to the purse
- * @param h_denom_pub hash of the coin's denomination
- * @param h_age_commitment hash of the coin's age commitment
- * @param coin_priv key identifying the coin to be deposited
- * @param[out] coin_sig resulting signature
- */
-void
-TALER_wallet_purse_deposit_sign (
-  const char *donau_base_url,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_Amount *amount,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify a purse deposit request.
- *
- * @param donau_base_url URL of the donau hosting the purse
- * @param purse_pub purse’s public key
- * @param amount amount of the coin's value to transfer to the purse
- * @param h_denom_pub hash of the coin's denomination
- * @param h_age_commitment hash of the coin's age commitment
- * @param coin_pub key identifying the coin that is being deposited
- * @param[out] coin_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_purse_deposit_verify (
-  const char *donau_base_url,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_Amount *amount,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Sign a request by a purse to merge it into an account.
- *
- * @param reserve_uri identifies the location of the reserve
- * @param merge_timestamp time when the merge happened
- * @param purse_pub key identifying the purse
- * @param merge_priv key identifying the merge capability
- * @param[out] merge_sig resulting signature
- */
-void
-TALER_wallet_purse_merge_sign (
-  const char *reserve_uri,
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseMergePrivateKeyP *merge_priv,
-  struct TALER_PurseMergeSignatureP *merge_sig);
-
-
-/**
- * Verify a purse merge request.
- *
- * @param reserve_uri identifies the location of the reserve
- * @param merge_timestamp time when the merge happened
- * @param purse_pub public key of the purse to merge
- * @param merge_pub public key of the merge capability
- * @param merge_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_PURSE_MERGE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_purse_merge_verify (
-  const char *reserve_uri,
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PurseMergePublicKeyP *merge_pub,
-  const struct TALER_PurseMergeSignatureP *merge_sig);
-
-
-/**
- * Flags for a merge signature.
- */
-enum TALER_WalletAccountMergeFlags
-{
-
-  /**
-   * A mode must be set. None is not a legal mode!
-   */
-  TALER_WAMF_MODE_NONE = 0,
-
-  /**
-   * We are merging a fully paid-up purse into a reserve.
-   */
-  TALER_WAMF_MODE_MERGE_FULLY_PAID_PURSE = 1,
-
-  /**
-   * We are creating a fresh purse, from the contingent
-   * of free purses that our account brings.
-   */
-  TALER_WAMF_MODE_CREATE_FROM_PURSE_QUOTA = 2,
-
-  /**
-   * The account owner is willing to pay the purse_fee for the purse to be
-   * created from the account balance.
-   */
-  TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE = 3,
-
-  /**
-   * Bitmask to AND the full flags with to get the mode.
-   */
-  TALER_WAMF_MERGE_MODE_MASK = 3
-
-};
-
-
-/**
- * Sign a request by an account to merge a purse.
- *
- * @param merge_timestamp time when the merge happened
- * @param purse_pub public key of the purse to merge
- * @param purse_expiration when should the purse expire
- * @param h_contract_terms contract the two parties agree on
- * @param amount total amount in the purse (including fees)
- * @param purse_fee purse fee the reserve will pay,
- *        only used if @a flags is #TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE
- * @param min_age age restriction to apply for deposits into the purse
- * @param flags flags for the operation
- * @param reserve_priv key identifying the reserve
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_account_merge_sign (
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_Amount *amount,
-  const struct TALER_Amount *purse_fee,
-  uint32_t min_age,
-  enum TALER_WalletAccountMergeFlags flags,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify an account's request to merge a purse.
- *
- * @param merge_timestamp time when the merge happened
- * @param purse_pub public key of the purse to merge
- * @param purse_expiration when should the purse expire
- * @param h_contract_terms contract the two parties agree on
- * @param amount total amount in the purse (including fees)
- * @param purse_fee purse fee the reserve will pay,
- *        only used if @a flags is #TALER_WAMF_MODE_CREATE_WITH_PURSE_FEE
- * @param min_age age restriction to apply for deposits into the purse
- * @param flags flags for the operation
- * @param reserve_pub account’s public key
- * @param reserve_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_ACCOUNT_MERGE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_account_merge_verify (
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_Amount *amount,
-  const struct TALER_Amount *purse_fee,
-  uint32_t min_age,
-  enum TALER_WalletAccountMergeFlags flags,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign a request to keep a reserve open.
- *
- * @param reserve_payment how much to pay from the
- *        reserve's own balance for opening the reserve
- * @param request_timestamp when was the request created
- * @param reserve_expiration desired expiration time for the reserve
- * @param purse_limit minimum number of purses the client
- *       wants to have concurrently open for this reserve
- * @param reserve_priv key identifying the reserve
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_reserve_open_sign (
-  const struct TALER_Amount *reserve_payment,
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  struct GNUNET_TIME_Timestamp reserve_expiration,
-  uint32_t purse_limit,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify a request to keep a reserve open.
- *
- * @param reserve_payment how much to pay from the
- *        reserve's own balance for opening the reserve
- * @param request_timestamp when was the request created
- * @param reserve_expiration desired expiration time for the reserve
- * @param purse_limit minimum number of purses the client
- *       wants to have concurrently open for this reserve
- * @param reserve_pub key identifying the reserve
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_open_verify (
-  const struct TALER_Amount *reserve_payment,
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  struct GNUNET_TIME_Timestamp reserve_expiration,
-  uint32_t purse_limit,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign to deposit coin to pay for keeping a reserve open.
- *
- * @param coin_contribution how much the coin should contribute
- * @param reserve_sig signature over the reserve open operation
- * @param coin_priv private key of the coin
- * @param[out] coin_sig signature by the coin
- */
-void
-TALER_wallet_reserve_open_deposit_sign (
-  const struct TALER_Amount *coin_contribution,
-  const struct TALER_ReserveSignatureP *reserve_sig,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify signature that deposits coin to pay for keeping a reserve open.
- *
- * @param coin_contribution how much the coin should contribute
- * @param reserve_sig signature over the reserve open operation
- * @param coin_pub public key of the coin
- * @param coin_sig signature by the coin
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_open_deposit_verify (
-  const struct TALER_Amount *coin_contribution,
-  const struct TALER_ReserveSignatureP *reserve_sig,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Sign a request to close a reserve.
- *
- * @param request_timestamp when was the request created
- * @param h_payto where to send the funds (NULL allowed to send
- *        to origin of the reserve)
- * @param reserve_priv key identifying the reserve
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_reserve_close_sign (
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  const struct TALER_PaytoHashP *h_payto,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify wallet request to close an account.
- *
- * @param request_timestamp when was the request created
- * @param h_payto where to send the funds (NULL/all zeros
- *        allowed to send to origin of the reserve)
- * @param reserve_pub account’s public key
- * @param reserve_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_RESERVE_CLOSE
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_close_verify (
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  const struct TALER_PaytoHashP *h_payto,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign a request by a wallet to perform a KYC check.
- *
- * @param reserve_priv key identifying the wallet/account
- * @param balance_threshold the balance threshold the wallet is about to cross
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_account_setup_sign (
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  const struct TALER_Amount *balance_threshold,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify account setup request.
- *
- * @param reserve_pub reserve the setup request was for
- * @param balance_threshold the balance threshold the wallet is about to cross
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_account_setup_verify (
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_Amount *balance_threshold,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign request to the donau to confirm certain
- * @a details about the owner of a reserve.
- *
- * @param request_timestamp when was the request created
- * @param details which attributes are requested
- * @param reserve_priv private key of the reserve
- * @param[out] reserve_sig where to store the signature
- */
-void
-TALER_wallet_reserve_attest_request_sign (
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  const json_t *details,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify request to the donau to confirm certain
- * @a details about the owner of a reserve.
- *
- * @param request_timestamp when was the request created
- * @param details which attributes are requested
- * @param reserve_pub public key of the reserve
- * @param reserve_sig where to store the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_attest_request_verify (
-  struct GNUNET_TIME_Timestamp request_timestamp,
-  const json_t *details,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign a deposit permission.  Function for wallets.
- *
- * @param amount the amount to be deposited
- * @param deposit_fee the deposit fee we expect to pay
- * @param h_wire hash of the charity’s account details
- * @param h_contract_terms hash of the contact of the charity with the donor 
(further details are never disclosed to the donau)
- * @param wallet_data_hash hash over wallet inputs into the contract (maybe 
NULL)
- * @param h_age_commitment hash over the age commitment, if applicable to the 
denomination (maybe NULL)
- * @param h_policy hash over the policy extension
- * @param h_denom_pub hash of the coin denomination's public key
- * @param coin_priv coin’s private key
- * @param wallet_timestamp timestamp when the contract was finalized, must not 
be too far in the future
- * @param charity_pub the public key of the charity (used to identify the 
charity for refund requests)
- * @param refund_deadline date until which the charity can issue a refund to 
the donor via the donau (can be zero if refunds are not allowed); must not be 
after the @a wire_deadline
- * @param[out] coin_sig set to the signature made with purpose 
#TALER_SIGNATURE_WALLET_COIN_DEPOSIT
- */
-void
-TALER_wallet_deposit_sign (
-  const struct TALER_Amount *amount,
-  const struct TALER_Amount *deposit_fee,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct GNUNET_HashCode *wallet_data_hash,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_ExtensionPolicyHashP *h_policy,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  struct GNUNET_TIME_Timestamp wallet_timestamp,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  struct GNUNET_TIME_Timestamp refund_deadline,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify a deposit permission.
- *
- * @param amount the amount to be deposited
- * @param deposit_fee the deposit fee we expect to pay
- * @param h_wire hash of the charity’s account details
- * @param h_contract_terms hash of the contact of the charity with the donor 
(further details are never disclosed to the donau)
- * @param wallet_data_hash hash over wallet inputs into the contract (maybe 
NULL)
- * @param h_age_commitment hash over the age commitment (maybe all zeroes, if 
not applicable to the denomination)
- * @param h_policy hash over the policy extension
- * @param h_denom_pub hash of the coin denomination's public key
- * @param wallet_timestamp timestamp when the contract was finalized, must not 
be too far in the future
- * @param charity_pub the public key of the charity (used to identify the 
charity for refund requests)
- * @param refund_deadline date until which the charity can issue a refund to 
the donor via the donau (can be zero if refunds are not allowed); must not be 
after the @a wire_deadline
- * @param coin_pub coin’s public key
- * @param coin_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_COIN_DEPOSIT
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_deposit_verify (
-  const struct TALER_Amount *amount,
-  const struct TALER_Amount *deposit_fee,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct GNUNET_HashCode *wallet_data_hash,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_ExtensionPolicyHashP *h_policy,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  struct GNUNET_TIME_Timestamp wallet_timestamp,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  struct GNUNET_TIME_Timestamp refund_deadline,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Sign a melt request.
- *
- * @param amount_with_fee the amount to be melted (with fee)
- * @param melt_fee the melt fee we expect to pay
- * @param rc refresh session we are committed to
- * @param h_denom_pub hash of the coin denomination's public key
- * @param h_age_commitment hash of the age commitment (may be NULL)
- * @param coin_priv coin’s private key
- * @param[out] coin_sig set to the signature made with purpose 
#TALER_SIGNATURE_WALLET_COIN_MELT
- */
-void
-TALER_wallet_melt_sign (
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_Amount *melt_fee,
-  const struct TALER_RefreshCommitmentP *rc,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify a melt request.
- *
- * @param amount_with_fee the amount to be melted (with fee)
- * @param melt_fee the melt fee we expect to pay
- * @param rc refresh session we are committed to
- * @param h_denom_pub hash of the coin denomination's public key
- * @param h_age_commitment hash of the age commitment (may be NULL)
- * @param coin_pub coin’s public key
- * @param coin_sig the signature made with purpose 
#TALER_SIGNATURE_WALLET_COIN_MELT
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_melt_verify (
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_Amount *melt_fee,
-  const struct TALER_RefreshCommitmentP *rc,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_AgeCommitmentHash *h_age_commitment,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Sign link data.
- *
- * @param h_denom_pub hash of the denomiantion public key of the new coin
- * @param transfer_pub transfer public key
- * @param bch blinded coin hash
- * @param old_coin_priv private key to sign with
- * @param[out] coin_sig resulting signature
- */
-void
-TALER_wallet_link_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_TransferPublicKeyP *transfer_pub,
-  const struct TALER_BlindedCoinHashP *bch,
-  const struct TALER_CoinSpendPrivateKeyP *old_coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify link signature.
- *
- * @param h_denom_pub hash of the denomiantion public key of the new coin
- * @param transfer_pub transfer public key
- * @param h_coin_ev hash of the coin envelope
- * @param old_coin_pub old coin key that the link signature is for
- * @param coin_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_link_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_TransferPublicKeyP *transfer_pub,
-  const struct TALER_BlindedCoinHashP *h_coin_ev,
-  const struct TALER_CoinSpendPublicKeyP *old_coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Sign withdraw request.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin to 
withdraw
- * @param amount_with_fee amount to debit the reserve for
- * @param bch blinded coin hash
- * @param reserve_priv private key to sign with
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_withdraw_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_BlindedCoinHashP *bch,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify withdraw request.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin to 
withdraw
- * @param amount_with_fee amount to debit the reserve for
- * @param bch blinded coin hash
- * @param reserve_pub public key of the reserve
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_withdraw_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_BlindedCoinHashP *bch,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Sign age-withdraw request.
- *
- * @param h_commitment hash over all n*kappa blinded coins in the commitment 
for the age-withdraw
- * @param amount_with_fee amount to debit the reserve for
- * @param mask the mask that defines the age groups
- * @param max_age maximum age from which the age group is derived, that the 
withdrawn coins must be restricted to.
- * @param reserve_priv private key to sign with
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_age_withdraw_sign (
-  const struct TALER_AgeWithdrawCommitmentHashP *h_commitment,
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_AgeMask *mask,
-  uint8_t max_age,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-/**
- * Verify an age-withdraw request.
- *
- * @param h_commitment hash all n*kappa blinded coins in the commitment for 
the age-withdraw
- * @param amount_with_fee amount to debit the reserve for
- * @param mask the mask that defines the age groups
- * @param max_age maximum age from which the age group is derived, that the 
withdrawn coins must be restricted to.
- * @param reserve_pub public key of the reserve
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_age_withdraw_verify (
-  const struct TALER_AgeWithdrawCommitmentHashP *h_commitment,
-  const struct TALER_Amount *amount_with_fee,
-  const struct TALER_AgeMask *mask,
-  uint8_t max_age,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-/**
- * Verify donau melt confirmation.
- *
- * @param rc refresh session this is about
- * @param noreveal_index gamma value chosen by the donau
- * @param donau_pub public signing key used
- * @param donau_sig signature to check
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_melt_confirmation_verify (
-  const struct TALER_RefreshCommitmentP *rc,
-  uint32_t noreveal_index,
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_DonauSignatureP *donau_sig);
-
-
-/**
- * Verify recoup signature.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin
- * @param coin_bks blinding factor used when withdrawing the coin
- * @param coin_pub coin key of the coin to be recouped
- * @param coin_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_recoup_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const union TALER_DenominationBlindingKeyP *coin_bks,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Create recoup signature.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin
- * @param coin_bks blinding factor used when withdrawing the coin
- * @param coin_priv coin key of the coin to be recouped
- * @param[out] coin_sig resulting signature
- */
-void
-TALER_wallet_recoup_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const union TALER_DenominationBlindingKeyP *coin_bks,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify recoup-refresh signature.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin
- * @param coin_bks blinding factor used when withdrawing the coin
- * @param coin_pub coin key of the coin to be recouped
- * @param coin_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_recoup_refresh_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const union TALER_DenominationBlindingKeyP *coin_bks,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Create recoup-refresh signature.
- *
- * @param h_denom_pub hash of the denomiantion public key of the coin
- * @param coin_bks blinding factor used when withdrawing the coin
- * @param coin_priv coin key of the coin to be recouped
- * @param[out] coin_sig resulting signature
- */
-void
-TALER_wallet_recoup_refresh_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const union TALER_DenominationBlindingKeyP *coin_bks,
-  const struct TALER_CoinSpendPrivateKeyP *coin_priv,
-  struct TALER_CoinSpendSignatureP *coin_sig);
-
-
-/**
- * Verify reserve history request signature.
- *
- * @param ts timestamp used
- * @param history_fee how much did the wallet say it would pay
- * @param reserve_pub reserve the history request was for
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_history_verify (
-  const struct GNUNET_TIME_Timestamp ts,
-  const struct TALER_Amount *history_fee,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Create reserve history request signature.
- *
- * @param ts timestamp used
- * @param history_fee how much do we expect to pay
- * @param reserve_priv private key of the reserve the history request is for
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_reserve_history_sign (
-  const struct GNUNET_TIME_Timestamp ts,
-  const struct TALER_Amount *history_fee,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Verify reserve status request signature.
- *
- * @param ts timestamp used
- * @param reserve_pub reserve the status request was for
- * @param reserve_sig resulting signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_wallet_reserve_status_verify (
-  const struct GNUNET_TIME_Timestamp ts,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/**
- * Create reserve status request signature.
- *
- * @param ts timestamp used
- * @param reserve_priv private key of the reserve the status request is for
- * @param[out] reserve_sig resulting signature
- */
-void
-TALER_wallet_reserve_status_sign (
-  const struct GNUNET_TIME_Timestamp ts,
-  const struct TALER_ReservePrivateKeyP *reserve_priv,
-  struct TALER_ReserveSignatureP *reserve_sig);
-
-
-/* ********************* charity signing ************************** */
-
-
-/**
- * Create charity signature approving a refund.
- *
- * @param coin_pub coin to be refunded
- * @param h_contract_terms contract to be refunded
- * @param rtransaction_id unique ID for this (partial) refund
- * @param amount amount to be refunded
- * @param charity_priv private key to sign with
- * @param[out] charity_sig where to write the signature
- */
-void
-TALER_charity_refund_sign (
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  uint64_t rtransaction_id,
-  const struct TALER_Amount *amount,
-  const struct TALER_CharityPrivateKeyP *charity_priv,
-  struct TALER_CharitySignatureP *charity_sig);
-
-
-/**
- * Verify charity signature approving a refund.
- *
- * @param coin_pub coin to be refunded
- * @param h_contract_terms contract to be refunded
- * @param rtransaction_id unique ID for this (partial) refund
- * @param amount amount to be refunded
- * @param charity_pub public key of the charity
- * @param charity_sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_charity_refund_verify (
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  uint64_t rtransaction_id,
-  const struct TALER_Amount *amount,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  const struct TALER_CharitySignatureP *charity_sig);
-
-
-/* ********************* donau deposit signing ************************* */
-
-/**
- * Sign a deposit.
- *
- * @param h_contract_terms hash of contract terms
- * @param h_wire hash of the charity account details
- * @param coin_pub coin to be deposited
- * @param charity_priv private key to sign with
- * @param[out] charity_sig where to write the signature
- */
-void
-TALER_charity_deposit_sign (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CharityPrivateKeyP *charity_priv,
-  struct TALER_CharitySignatureP *charity_sig);
-
-
-/**
- * Verify a deposit.
- *
- * @param charity charity public key
- * @param coin_pub public key of the deposited coin
- * @param h_contract_terms hash of contract terms
- * @param h_wire hash of the charity account details
- * @param charity_sig signature of the charity
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_charity_deposit_verify (
-  const struct TALER_CharityPublicKeyP *charity,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_CharitySignatureP *charity_sig);
-
-
-/* ********************* donau online signing ************************** */
-
-
-/**
- * Signature of a function that signs the message in @a purpose with the
- * donau's signing key.
- *
- * The @a purpose data is the beginning of the data of which the signature is
- * to be created. The `size` field in @a purpose must correctly indicate the
- * number of bytes of the data structure, including its header. *
- * @param purpose the message to sign
- * @param[out] pub set to the current public signing key of the donau
- * @param[out] sig signature over purpose using current signing key
- * @return #TALER_EC_NONE on success
- */
-typedef enum TALER_ErrorCode
-(*TALER_DonauSignCallback)(
-  const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Signature of a function that signs the message in @a purpose with the
- * donau's signing key.
- *
- * The @a purpose data is the beginning of the data of which the signature is
- * to be created. The `size` field in @a purpose must correctly indicate the
- * number of bytes of the data structure, including its header. *
- * @param cls closure
- * @param purpose the message to sign
- * @param[out] pub set to the current public signing key of the donau
- * @param[out] sig signature over purpose using current signing key
- * @return #TALER_EC_NONE on success
- */
-typedef enum TALER_ErrorCode
-(*TALER_DonauSignCallback2)(
-  void *cls,
-  const struct GNUNET_CRYPTO_EccSignaturePurpose *purpose,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create deposit confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param h_contract_terms hash of the contact of the charity with the donor 
(further details are never disclosed to the donau)
- * @param h_wire hash of the charity’s account details
- * @param h_policy hash over the policy extension, can be NULL
- * @param donau_timestamp timestamp when the contract was finalized, must not 
be too far off
- * @param wire_deadline date until which the donau should wire the funds
- * @param refund_deadline date until which the charity can issue a refund to 
the donor via the donau (can be zero if refunds are not allowed); must not be 
after the @a wire_deadline
- * @param amount_without_fee the amount to be deposited after fees
- * @param coin_pub public key of the deposited coin
- * @param charity_pub the public key of the charity (used to identify the 
charity for refund requests)
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_deposit_confirmation_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_ExtensionPolicyHashP *h_policy,
-  struct GNUNET_TIME_Timestamp donau_timestamp,
-  struct GNUNET_TIME_Timestamp wire_deadline,
-  struct GNUNET_TIME_Timestamp refund_deadline,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify deposit confirmation signature.
- *
- * @param h_contract_terms hash of the contact of the charity with the donor 
(further details are never disclosed to the donau)
- * @param h_wire hash of the charity’s account details
- * @param h_policy hash over the policy extension, can be NULL
- * @param donau_timestamp timestamp when the contract was finalized, must not 
be too far off
- * @param wire_deadline date until which the donau should wire the funds
- * @param refund_deadline date until which the charity can issue a refund to 
the donor via the donau (can be zero if refunds are not allowed); must not be 
after the @a wire_deadline
- * @param amount_without_fee the amount to be deposited after fees
- * @param coin_pub public key of the deposited coin
- * @param charity_pub the public key of the charity (used to identify the 
charity for refund requests)
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_deposit_confirmation_verify (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_ExtensionPolicyHashP *h_policy,
-  struct GNUNET_TIME_Timestamp donau_timestamp,
-  struct GNUNET_TIME_Timestamp wire_deadline,
-  struct GNUNET_TIME_Timestamp refund_deadline,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create refund confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param h_contract_terms hash of contract being refunded
- * @param coin_pub public key of the coin receiving the refund
- * @param charity public key of the charity that granted the refund
- * @param rtransaction_id refund transaction ID used by the charity
- * @param refund_amount amount refunded
- * @param[out] pub where to write the donau public key
- * @param[out] sig where to write the donau signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_refund_confirmation_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CharityPublicKeyP *charity,
-  uint64_t rtransaction_id,
-  const struct TALER_Amount *refund_amount,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify refund confirmation signature.
- *
- * @param h_contract_terms hash of contract being refunded
- * @param coin_pub public key of the coin receiving the refund
- * @param charity public key of the charity that granted the refund
- * @param rtransaction_id refund transaction ID used by the charity
- * @param refund_amount amount refunded
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_refund_confirmation_verify (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CharityPublicKeyP *charity,
-  uint64_t rtransaction_id,
-  const struct TALER_Amount *refund_amount,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create refresh melt confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param rc refresh commitment that identifies the melt operation
- * @param noreveal_index gamma cut-and-choose value chosen by the donau
- * @param[out] pub where to write the donau public key
- * @param[out] sig where to write the donau signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_melt_confirmation_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_RefreshCommitmentP *rc,
-  uint32_t noreveal_index,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify refresh melt confirmation signature.
- *
- * @param rc refresh commitment that identifies the melt operation
- * @param noreveal_index gamma cut-and-choose value chosen by the donau
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_melt_confirmation_verify (
-  const struct TALER_RefreshCommitmentP *rc,
-  uint32_t noreveal_index,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create donau purse refund confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param amount_without_fee refunded amount
- * @param refund_fee refund fee charged
- * @param coin_pub coin that was refunded
- * @param purse_pub public key of the expired purse
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_purse_refund_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_Amount *refund_fee,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify signature of donau affirming purse refund
- * from purse expiration.
- *
- * @param amount_without_fee refunded amount
- * @param refund_fee refund fee charged
- * @param coin_pub coin that was refunded
- * @param purse_pub public key of the expired purse
- * @param pub public key to verify signature against
- * @param sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_purse_refund_verify (
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_Amount *refund_fee,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create donau key set signature.
- *
- * @param scb function to call to create the signature
- * @param cls closure for @a scb
- * @param timestamp time when the key set was issued
- * @param hc hash over all the keys
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_key_set_sign (
-  TALER_DonauSignCallback2 scb,
-  void *cls,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct GNUNET_HashCode *hc,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify key set signature.
- *
- * @param timestamp time when the key set was issued
- * @param hc hash over all the keys
- * @param pub public key to verify signature against
- * @param sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_key_set_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct GNUNET_HashCode *hc,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create account KYC setup success signature.
- *
- * @param scb function to call to create the signature
- * @param h_payto target of the KYC account
- * @param kyc JSON data describing which KYC checks
- *            were satisfied
- * @param timestamp time when the KYC was confirmed
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_account_setup_success_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_PaytoHashP *h_payto,
-  const json_t *kyc,
-  struct GNUNET_TIME_Timestamp timestamp,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify account KYC setup success signature.
- *
- * @param h_payto target of the KYC account
- * @param kyc JSON data describing which KYC checks
- *            were satisfied
- * @param timestamp time when the KYC was confirmed
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_account_setup_success_verify (
-  const struct TALER_PaytoHashP *h_payto,
-  const json_t *kyc,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Hash normalized @a j JSON object or array and
- * store the result in @a hc.
- *
- * @param j JSON to hash
- * @param[out] hc where to write the hash
- */
-void
-TALER_json_hash (const json_t *j,
-                 struct GNUNET_HashCode *hc);
-
-
-/**
- * Update the @a hash_context in the computation of the
- * h_details for a wire status signature.
- *
- * @param[in,out] hash_context context to update
- * @param h_contract_terms hash of the contract
- * @param execution_time when was the wire transfer initiated
- * @param coin_pub deposited coin
- * @param deposit_value contribution of the coin
- * @param deposit_fee how high was the deposit fee
- */
-void
-TALER_donau_online_wire_deposit_append (
-  struct GNUNET_HashContext *hash_context,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  struct GNUNET_TIME_Timestamp execution_time,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_Amount *deposit_value,
-  const struct TALER_Amount *deposit_fee);
-
-
-/**
- * Create wire deposit signature.
- *
- * @param scb function to call to create the signature
- * @param total amount the charity was credited
- * @param wire_fee fee charged by the donau for the wire transfer
- * @param charity_pub which charity was credited
- * @param payto payto://-URI of the charity account
- * @param h_details hash over the aggregation details
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_wire_deposit_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_Amount *total,
-  const struct TALER_Amount *wire_fee,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  const char *payto,
-  const struct GNUNET_HashCode *h_details,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify wire deposit signature.
- *
- * @param total amount the charity was credited
- * @param wire_fee fee charged by the donau for the wire transfer
- * @param charity_pub which charity was credited
- * @param h_payto hash of the payto://-URI of the charity account
- * @param h_details hash over the aggregation details
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_wire_deposit_verify (
-  const struct TALER_Amount *total,
-  const struct TALER_Amount *wire_fee,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  const struct TALER_PaytoHashP *h_payto,
-  const struct GNUNET_HashCode *h_details,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create wire confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param h_wire hash of the charity's account
- * @param h_contract_terms hash of the contract
- * @param wtid wire transfer this deposit was aggregated into
- * @param coin_pub public key of the deposited coin
- * @param execution_time when was wire transfer initiated
- * @param coin_contribution what was @a coin_pub's contribution to the wire 
transfer
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_confirm_wire_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  struct GNUNET_TIME_Timestamp execution_time,
-  const struct TALER_Amount *coin_contribution,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify confirm wire signature.
- *
- * @param h_wire hash of the charity's account
- * @param h_contract_terms hash of the contract
- * @param wtid wire transfer this deposit was aggregated into
- * @param coin_pub public key of the deposited coin
- * @param execution_time when was wire transfer initiated
- * @param coin_contribution what was @a coin_pub's contribution to the wire 
transfer
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_confirm_wire_verify (
-  const struct TALER_CharityWireHashP *h_wire,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  struct GNUNET_TIME_Timestamp execution_time,
-  const struct TALER_Amount *coin_contribution,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create confirm recoup signature.
- *
- * @param scb function to call to create the signature
- * @param timestamp when was the recoup done
- * @param recoup_amount how much was recouped
- * @param coin_pub coin that was recouped
- * @param reserve_pub reserve that was credited
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_confirm_recoup_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *recoup_amount,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify confirm recoup signature.
- *
- * @param timestamp when was the recoup done
- * @param recoup_amount how much was recouped
- * @param coin_pub coin that was recouped
- * @param reserve_pub reserve that was credited
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_confirm_recoup_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *recoup_amount,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create confirm recoup refresh signature.
- *
- * @param scb function to call to create the signature
- * @param timestamp when was the recoup done
- * @param recoup_amount how much was recouped
- * @param coin_pub coin that was recouped
- * @param old_coin_pub old coin that was credited
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_confirm_recoup_refresh_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *recoup_amount,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendPublicKeyP *old_coin_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify confirm recoup refresh signature.
- *
- * @param timestamp when was the recoup done
- * @param recoup_amount how much was recouped
- * @param coin_pub coin that was recouped
- * @param old_coin_pub old coin that was credited
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_confirm_recoup_refresh_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *recoup_amount,
-  const struct TALER_CoinSpendPublicKeyP *coin_pub,
-  const struct TALER_CoinSpendPublicKeyP *old_coin_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create denomination unknown signature.
- *
- * @param scb function to call to create the signature
- * @param timestamp when was the error created
- * @param h_denom_pub hash of denomination that is unknown
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_denomination_unknown_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify denomination unknown signature.
- *
- * @param timestamp when was the error created
- * @param h_denom_pub hash of denomination that is unknown
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_denomination_unknown_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create denomination expired signature.
- *
- * @param scb function to call to create the signature
- * @param timestamp when was the error created
- * @param h_denom_pub hash of denomination that is expired
- * @param op character string describing the operation for which
- *           the denomination is expired
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_denomination_expired_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const char *op,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify denomination expired signature.
- *
- * @param timestamp when was the error created
- * @param h_denom_pub hash of denomination that is expired
- * @param op character string describing the operation for which
- *           the denomination is expired
- * @param pub where to write the public key
- * @param sig where to write the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_denomination_expired_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const char *op,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create reserve closure signature.
- *
- * @param scb function to call to create the signature
- * @param timestamp time when the reserve was closed
- * @param closing_amount amount left in the reserve
- * @param closing_fee closing fee charged
- * @param payto target of the wire transfer
- * @param wtid wire transfer subject used
- * @param reserve_pub public key of the closed reserve
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_reserve_closed_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *closing_amount,
-  const struct TALER_Amount *closing_fee,
-  const char *payto,
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify reserve closure signature.
- *
- * @param timestamp time when the reserve was closed
- * @param closing_amount amount left in the reserve
- * @param closing_fee closing fee charged
- * @param payto target of the wire transfer
- * @param wtid wire transfer subject used
- * @param reserve_pub public key of the closed reserve
- * @param pub the public key of the donau to check against
- * @param sig the signature to check
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_reserve_closed_verify (
-  struct GNUNET_TIME_Timestamp timestamp,
-  const struct TALER_Amount *closing_amount,
-  const struct TALER_Amount *closing_fee,
-  const char *payto,
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create signature by donau affirming that a reserve
- * has had certain attributes verified via KYC.
- *
- * @param scb function to call to create the signature
- * @param attest_timestamp our time
- * @param expiration_time when does the KYC data expire
- * @param reserve_pub for which reserve are attributes attested
- * @param attributes JSON object with attributes being attested to
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_reserve_attest_details_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp attest_timestamp,
-  struct GNUNET_TIME_Timestamp expiration_time,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const json_t *attributes,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify signature by donau affirming that a reserve
- * has had certain attributes verified via KYC.
- *
- * @param attest_timestamp our time
- * @param expiration_time when does the KYC data expire
- * @param reserve_pub for which reserve are attributes attested
- * @param attributes JSON object with attributes being attested to
- * @param pub donau public key
- * @param sig donau signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_reserve_attest_details_verify (
-  struct GNUNET_TIME_Timestamp attest_timestamp,
-  struct GNUNET_TIME_Timestamp expiration_time,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const json_t *attributes,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Create signature by donau affirming that a purse was created.
- *
- * @param scb function to call to create the signature
- * @param donau_time our time
- * @param purse_expiration when will the purse expire
- * @param amount_without_fee total amount to be put into the purse (without 
deposit fees)
- * @param total_deposited total currently in the purse
- * @param purse_pub public key of the purse
- * @param h_contract_terms hash of the contract for the purse
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_purse_created_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp donau_time,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_Amount *total_deposited,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify donau signature about a purse creation and balance.
- *
- * @param donau_time our time
- * @param purse_expiration when will the purse expire
- * @param amount_without_fee total amount to be put into the purse (without 
deposit fees)
- * @param total_deposited total currently in the purse
- * @param purse_pub public key of the purse
- * @param h_contract_terms hash of the contract for the purse
- * @param pub the public key of the donau to check against
- * @param sig the signature to check
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_purse_created_verify (
-  struct GNUNET_TIME_Timestamp donau_time,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_Amount *total_deposited,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Sign affirmation that a purse was merged.
- *
- * @param scb function to call to create the signature
- * @param donau_time our time
- * @param purse_expiration when does the purse expire
- * @param amount_without_fee total amount that should be in the purse without 
deposit fees
- * @param purse_pub public key of the purse
- * @param h_contract_terms hash of the contract of the purse
- * @param reserve_pub reserve the purse will be merged into
- * @param donau_url donau at which the @a reserve_pub lives
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_purse_merged_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp donau_time,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const char *donau_url,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify affirmation that a purse will be merged.
- *
- * @param donau_time our time
- * @param purse_expiration when does the purse expire
- * @param amount_without_fee total amount that should be in the purse without 
deposit fees
- * @param purse_pub public key of the purse
- * @param h_contract_terms hash of the contract of the purse
- * @param reserve_pub reserve the purse will be merged into
- * @param donau_url donau at which the @a reserve_pub lives
- * @param pub the public key of the donau to check against
- * @param sig the signature to check
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_purse_merged_verify (
-  struct GNUNET_TIME_Timestamp donau_time,
-  struct GNUNET_TIME_Timestamp purse_expiration,
-  const struct TALER_Amount *amount_without_fee,
-  const struct TALER_PurseContractPublicKeyP *purse_pub,
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_ReservePublicKeyP *reserve_pub,
-  const char *donau_url,
-  const struct TALER_DonauPublicKeyP *pub,
-  const struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Sign information about the status of a purse.
- *
- * @param scb function to call to create the signature
- * @param merge_timestamp when was the purse merged (can be never)
- * @param deposit_timestamp when was the purse fully paid up (can be never)
- * @param balance current balance of the purse
- * @param[out] pub where to write the public key
- * @param[out] sig where to write the signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_purse_status_sign (
-  TALER_DonauSignCallback scb,
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  struct GNUNET_TIME_Timestamp deposit_timestamp,
-  const struct TALER_Amount *balance,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verify signature over information about the status of a purse.
- *
- * @param merge_timestamp when was the purse merged (can be never)
- * @param deposit_timestamp when was the purse fully paid up (can be never)
- * @param balance current balance of the purse
- * @param donau_pub the public key of the donau to check against
- * @param donau_sig the signature to check
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_purse_status_verify (
-  struct GNUNET_TIME_Timestamp merge_timestamp,
-  struct GNUNET_TIME_Timestamp deposit_timestamp,
-  const struct TALER_Amount *balance,
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_DonauSignatureP *donau_sig);
-
-
-/**
- * Create age-withdraw confirmation signature.
- *
- * @param scb function to call to create the signature
- * @param h_commitment age-withdraw commitment that identifies the n*kappa 
blinded coins
- * @param noreveal_index gamma cut-and-choose value chosen by the donau
- * @param[out] pub where to write the donau public key
- * @param[out] sig where to write the donau signature
- * @return #TALER_EC_NONE on success
- */
-enum TALER_ErrorCode
-TALER_donau_online_age_withdraw_confirmation_sign (
-  TALER_DonauSignCallback scb,
-  const struct TALER_AgeWithdrawCommitmentHashP *h_commitment,
-  uint32_t noreveal_index,
-  struct TALER_DonauPublicKeyP *pub,
-  struct TALER_DonauSignatureP *sig);
-
-
-/**
- * Verfiy an donau age-withdraw confirmation
- *
- * @param h_commitment Commitment over all n*kappa coin candidates from the 
original request to age-withdraw
- * @param noreveal_index The index returned by the donau
- * @param donau_pub The public key used for signing
- * @param donau_sig The signature from the donau
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_online_age_withdraw_confirmation_verify (
-  const struct TALER_AgeWithdrawCommitmentHashP *h_commitment,
-  uint32_t noreveal_index,
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_DonauSignatureP *donau_sig);
-
-
-/* ********************* offline signing ************************** */
-
-
-/**
- * Create AML officer status change signature.
- *
- * @param officer_pub public key of the AML officer
- * @param officer_name name of the officer
- * @param change_date when to affect the status change
- * @param is_active true to enable the officer
- * @param read_only true to only allow read-only access
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_aml_officer_status_sign (
-  const struct TALER_AmlOfficerPublicKeyP *officer_pub,
-  const char *officer_name,
-  struct GNUNET_TIME_Timestamp change_date,
-  bool is_active,
-  bool read_only,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify AML officer status change signature.
- *
- * @param officer_pub public key of the AML officer
- * @param officer_name name of the officer
- * @param change_date when to affect the status change
- * @param is_active true to enable the officer
- * @param read_only true to only allow read-only access
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_aml_officer_status_verify (
-  const struct TALER_AmlOfficerPublicKeyP *officer_pub,
-  const char *officer_name,
-  struct GNUNET_TIME_Timestamp change_date,
-  bool is_active,
-  bool read_only,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create auditor addition signature.
- *
- * @param auditor_pub public key of the auditor
- * @param auditor_url URL of the auditor
- * @param start_date when to enable the auditor (for replay detection)
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_auditor_add_sign (
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  const char *auditor_url,
-  struct GNUNET_TIME_Timestamp start_date,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify auditor add signature.
- *
- * @param auditor_pub public key of the auditor
- * @param auditor_url URL of the auditor
- * @param start_date when to enable the auditor (for replay detection)
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_auditor_add_verify (
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  const char *auditor_url,
-  struct GNUNET_TIME_Timestamp start_date,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create auditor deletion signature.
- *
- * @param auditor_pub public key of the auditor
- * @param end_date when to disable the auditor (for replay detection)
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_auditor_del_sign (
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  struct GNUNET_TIME_Timestamp end_date,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify auditor del signature.
- *
- * @param auditor_pub public key of the auditor
- * @param end_date when to disable the auditor (for replay detection)
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_auditor_del_verify (
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  struct GNUNET_TIME_Timestamp end_date,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create denomination revocation signature.
- *
- * @param h_denom_pub hash of public denomination key to revoke
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_denomination_revoke_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify denomination revocation signature.
- *
- * @param h_denom_pub hash of public denomination key to revoke
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_denomination_revoke_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create signkey revocation signature.
- *
- * @param donau_pub public signing key to revoke
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_signkey_revoke_sign (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify signkey revocation signature.
- *
- * @param donau_pub public signkey key to revoke
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_signkey_revoke_verify (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create signkey validity signature.
- *
- * @param donau_pub public signing key to validate
- * @param start_sign starting point of validity for signing
- * @param end_sign end point (exclusive) for validity for signing
- * @param end_legal legal end point of signature validity
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_signkey_validity_sign (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Timestamp end_sign,
-  struct GNUNET_TIME_Timestamp end_legal,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify signkey validitity signature.
- *
- * @param donau_pub public signkey key to validate
- * @param start_sign starting point of validity for signing
- * @param end_sign end point (exclusive) for validity for signing
- * @param end_legal legal end point of signature validity
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_signkey_validity_verify (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Timestamp end_sign,
-  struct GNUNET_TIME_Timestamp end_legal,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create denomination key validity signature.
- *
- * @param h_denom_pub hash of the denomination's public key
- * @param stamp_start when does the donau begin signing with this key
- * @param stamp_expire_withdraw when does the donau end signing with this key
- * @param stamp_expire_deposit how long does the donau accept the deposit of 
coins with this key
- * @param stamp_expire_legal how long does the donau preserve information for 
legal disputes with this key
- * @param coin_value what is the value of coins signed with this key
- * @param fees fees for this denomination
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_denom_validity_sign (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  struct GNUNET_TIME_Timestamp stamp_start,
-  struct GNUNET_TIME_Timestamp stamp_expire_withdraw,
-  struct GNUNET_TIME_Timestamp stamp_expire_deposit,
-  struct GNUNET_TIME_Timestamp stamp_expire_legal,
-  const struct TALER_Amount *coin_value,
-  const struct TALER_DenomFeeSet *fees,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify denomination key validity signature.
- *
- * @param h_denom_pub hash of the denomination's public key
- * @param stamp_start when does the donau begin signing with this key
- * @param stamp_expire_withdraw when does the donau end signing with this key
- * @param stamp_expire_deposit how long does the donau accept the deposit of 
coins with this key
- * @param stamp_expire_legal how long does the donau preserve information for 
legal disputes with this key
- * @param coin_value what is the value of coins signed with this key
- * @param fees fees for this denomination
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_denom_validity_verify (
-  const struct TALER_DenominationHashP *h_denom_pub,
-  struct GNUNET_TIME_Timestamp stamp_start,
-  struct GNUNET_TIME_Timestamp stamp_expire_withdraw,
-  struct GNUNET_TIME_Timestamp stamp_expire_deposit,
-  struct GNUNET_TIME_Timestamp stamp_expire_legal,
-  const struct TALER_Amount *coin_value,
-  const struct TALER_DenomFeeSet *fees,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create offline signature about an donau's partners.
- *
- * @param partner_pub master public key of the partner
- * @param start_date validity period start
- * @param end_date validity period end
- * @param wad_frequency how often will we do wad transfers to this partner
- * @param wad_fee what is the wad fee to this partner
- * @param partner_base_url what is the base URL of the @a partner_pub donau
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_partner_details_sign (
-  const struct TALER_MasterPublicKeyP *partner_pub,
-  struct GNUNET_TIME_Timestamp start_date,
-  struct GNUNET_TIME_Timestamp end_date,
-  struct GNUNET_TIME_Relative wad_frequency,
-  const struct TALER_Amount *wad_fee,
-  const char *partner_base_url,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify signature about an donau's partners.
- *
- * @param partner_pub master public key of the partner
- * @param start_date validity period start
- * @param end_date validity period end
- * @param wad_frequency how often will we do wad transfers to this partner
- * @param wad_fee what is the wad fee to this partner
- * @param partner_base_url what is the base URL of the @a partner_pub donau
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_partner_details_verify (
-  const struct TALER_MasterPublicKeyP *partner_pub,
-  struct GNUNET_TIME_Timestamp start_date,
-  struct GNUNET_TIME_Timestamp end_date,
-  struct GNUNET_TIME_Relative wad_frequency,
-  const struct TALER_Amount *wad_fee,
-  const char *partner_base_url,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create offline signature about wiring profits to a
- * regular non-escrowed account of the donau.
- *
- * @param wtid (random) wire transfer ID to be used
- * @param date when was the profit drain approved (not exact time of execution)
- * @param amount how much should be wired
- * @param account_section configuration section of the
- *        donau specifying the account to be debited
- * @param payto_uri target account to be credited
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_profit_drain_sign (
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  struct GNUNET_TIME_Timestamp date,
-  const struct TALER_Amount *amount,
-  const char *account_section,
-  const char *payto_uri,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify offline signature about wiring profits to a
- * regular non-escrowed account of the donau.
- *
- * @param wtid (random) wire transfer ID to be used
- * @param date when was the profit drain approved (not exact time of execution)
- * @param amount how much should be wired
- * @param account_section configuration section of the
- *        donau specifying the account to be debited
- * @param payto_uri target account to be credited
- * @param master_pub public key to verify signature against
- * @param master_sig the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_profit_drain_verify (
-  const struct TALER_WireTransferIdentifierRawP *wtid,
-  struct GNUNET_TIME_Timestamp date,
-  const struct TALER_Amount *amount,
-  const char *account_section,
-  const char *payto_uri,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create security module EdDSA signature.
- *
- * @param donau_pub public signing key to validate
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_priv security module key to sign with
- * @param[out] secm_sig where to write the signature
- */
-void
-TALER_donau_secmod_eddsa_sign (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePrivateKeyP *secm_priv,
-  struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Verify security module EdDSA signature.
- *
- * @param donau_pub public signing key to validate
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_pub public key to verify against
- * @param secm_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_secmod_eddsa_verify (
-  const struct TALER_DonauPublicKeyP *donau_pub,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePublicKeyP *secm_pub,
-  const struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Create security module denomination signature.
- *
- * @param h_rsa hash of the RSA public key to sign
- * @param section_name name of the section in the configuration
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_priv security module key to sign with
- * @param[out] secm_sig where to write the signature
- */
-void
-TALER_donau_secmod_rsa_sign (
-  const struct TALER_RsaPubHashP *h_rsa,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePrivateKeyP *secm_priv,
-  struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Verify security module denomination signature.
- *
- * @param h_rsa hash of the public key to validate
- * @param section_name name of the section in the configuration
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_pub public key to verify against
- * @param secm_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_secmod_rsa_verify (
-  const struct TALER_RsaPubHashP *h_rsa,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePublicKeyP *secm_pub,
-  const struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Create security module denomination signature.
- *
- * @param h_cs hash of the CS public key to sign
- * @param section_name name of the section in the configuration
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_priv security module key to sign with
- * @param[out] secm_sig where to write the signature
- */
-void
-TALER_donau_secmod_cs_sign (
-  const struct TALER_CsPubHashP *h_cs,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePrivateKeyP *secm_priv,
-  struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Verify security module denomination signature.
- *
- * @param h_cs hash of the public key to validate
- * @param section_name name of the section in the configuration
- * @param start_sign starting point of validity for signing
- * @param duration how long will the key be in use
- * @param secm_pub public key to verify against
- * @param secm_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_secmod_cs_verify (
-  const struct TALER_CsPubHashP *h_cs,
-  const char *section_name,
-  struct GNUNET_TIME_Timestamp start_sign,
-  struct GNUNET_TIME_Relative duration,
-  const struct TALER_SecurityModulePublicKeyP *secm_pub,
-  const struct TALER_SecurityModuleSignatureP *secm_sig);
-
-
-/**
- * Create denomination key validity signature by the auditor.
- *
- * @param auditor_url BASE URL of the auditor's API
- * @param h_denom_pub hash of the denomination's public key
- * @param master_pub master public key of the donau
- * @param stamp_start when does the donau begin signing with this key
- * @param stamp_expire_withdraw when does the donau end signing with this key
- * @param stamp_expire_deposit how long does the donau accept the deposit of 
coins with this key
- * @param stamp_expire_legal how long does the donau preserve information for 
legal disputes with this key
- * @param coin_value what is the value of coins signed with this key
- * @param fees fees the donau charges for this denomination
- * @param auditor_priv private key to sign with
- * @param[out] auditor_sig where to write the signature
- */
-void
-TALER_auditor_denom_validity_sign (
-  const char *auditor_url,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  struct GNUNET_TIME_Timestamp stamp_start,
-  struct GNUNET_TIME_Timestamp stamp_expire_withdraw,
-  struct GNUNET_TIME_Timestamp stamp_expire_deposit,
-  struct GNUNET_TIME_Timestamp stamp_expire_legal,
-  const struct TALER_Amount *coin_value,
-  const struct TALER_DenomFeeSet *fees,
-  const struct TALER_AuditorPrivateKeyP *auditor_priv,
-  struct TALER_AuditorSignatureP *auditor_sig);
-
-
-/**
- * Verify denomination key validity signature from auditor.
- *
- * @param auditor_url BASE URL of the auditor's API
- * @param h_denom_pub hash of the denomination's public key
- * @param master_pub master public key of the donau
- * @param stamp_start when does the donau begin signing with this key
- * @param stamp_expire_withdraw when does the donau end signing with this key
- * @param stamp_expire_deposit how long does the donau accept the deposit of 
coins with this key
- * @param stamp_expire_legal how long does the donau preserve information for 
legal disputes with this key
- * @param coin_value what is the value of coins signed with this key
- * @param fees fees the donau charges for this denomination
- * @param auditor_pub public key to verify against
- * @param auditor_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_auditor_denom_validity_verify (
-  const char *auditor_url,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  struct GNUNET_TIME_Timestamp stamp_start,
-  struct GNUNET_TIME_Timestamp stamp_expire_withdraw,
-  struct GNUNET_TIME_Timestamp stamp_expire_deposit,
-  struct GNUNET_TIME_Timestamp stamp_expire_legal,
-  const struct TALER_Amount *coin_value,
-  const struct TALER_DenomFeeSet *fees,
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  const struct TALER_AuditorSignatureP *auditor_sig);
-
-
-/* **************** /wire account offline signing **************** */
-
-
-/**
- * Create wire fee signature.
- *
- * @param payment_method the payment method
- * @param start_time when do the fees start to apply
- * @param end_time when do the fees start to apply
- * @param fees the wire fees
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_wire_fee_sign (
-  const char *payment_method,
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Timestamp end_time,
-  const struct TALER_WireFeeSet *fees,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify wire fee signature.
- *
- * @param payment_method the payment method
- * @param start_time when do the fees start to apply
- * @param end_time when do the fees start to apply
- * @param fees the wire fees
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_wire_fee_verify (
-  const char *payment_method,
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Timestamp end_time,
-  const struct TALER_WireFeeSet *fees,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create global fees signature.
- *
- * @param start_time when do the fees start to apply
- * @param end_time when do the fees start to apply
- * @param fees the global fees
- * @param purse_timeout how long do unmerged purses stay around
- * @param history_expiration how long do we keep the history of an account
- * @param purse_account_limit how many concurrent purses are free per account 
holder
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_global_fee_sign (
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Timestamp end_time,
-  const struct TALER_GlobalFeeSet *fees,
-  struct GNUNET_TIME_Relative purse_timeout,
-  struct GNUNET_TIME_Relative history_expiration,
-  uint32_t purse_account_limit,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify global fees signature.
- *
- * @param start_time when do the fees start to apply
- * @param end_time when do the fees start to apply
- * @param fees the global fees
- * @param purse_timeout how long do unmerged purses stay around
- * @param history_expiration how long do we keep the history of an account
- * @param purse_account_limit how many concurrent purses are free per account 
holder
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_global_fee_verify (
-  struct GNUNET_TIME_Timestamp start_time,
-  struct GNUNET_TIME_Timestamp end_time,
-  const struct TALER_GlobalFeeSet *fees,
-  struct GNUNET_TIME_Relative purse_timeout,
-  struct GNUNET_TIME_Relative history_expiration,
-  uint32_t purse_account_limit,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create wire account addition signature.
- *
- * @param payto_uri bank account
- * @param conversion_url URL of the conversion service, or NULL if none
- * @param debit_restrictions JSON encoding of debit restrictions on the 
account; see AccountRestriction in the spec
- * @param credit_restrictions JSON encoding of credit restrictions on the 
account; see AccountRestriction in the spec
- * @param now timestamp to use for the signature (rounded)
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_wire_add_sign (
-  const char *payto_uri,
-  const char *conversion_url,
-  const json_t *debit_restrictions,
-  const json_t *credit_restrictions,
-  struct GNUNET_TIME_Timestamp now,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify wire account addition signature.
- *
- * @param payto_uri bank account
- * @param conversion_url URL of the conversion service, or NULL if none
- * @param debit_restrictions JSON encoding of debit restrictions on the 
account; see AccountRestriction in the spec
- * @param credit_restrictions JSON encoding of credit restrictions on the 
account; see AccountRestriction in the spec
- * @param sign_time timestamp when signature was created
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_wire_add_verify (
-  const char *payto_uri,
-  const char *conversion_url,
-  const json_t *debit_restrictions,
-  const json_t *credit_restrictions,
-  struct GNUNET_TIME_Timestamp sign_time,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create wire account removal signature.
- *
- * @param payto_uri bank account
- * @param now timestamp to use for the signature (rounded)
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_wire_del_sign (
-  const char *payto_uri,
-  struct GNUNET_TIME_Timestamp now,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify wire account deletion signature.
- *
- * @param payto_uri bank account
- * @param sign_time timestamp when signature was created
- * @param master_pub public key to verify against
- * @param master_sig the signature the signature
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_wire_del_verify (
-  const char *payto_uri,
-  struct GNUNET_TIME_Timestamp sign_time,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Check the signature in @a master_sig.
- *
- * @param payto_uri URI that is signed
- * @param conversion_url URL of the conversion service, or NULL if none
- * @param debit_restrictions JSON encoding of debit restrictions on the 
account; see AccountRestriction in the spec
- * @param credit_restrictions JSON encoding of credit restrictions on the 
account; see AccountRestriction in the spec
- * @param master_pub master public key of the donau
- * @param master_sig signature of the donau
- * @return #GNUNET_OK if signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_wire_signature_check (
-  const char *payto_uri,
-  const char *conversion_url,
-  const json_t *debit_restrictions,
-  const json_t *credit_restrictions,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Create a signed wire statement for the given account.
- *
- * @param payto_uri account specification
- * @param conversion_url URL of the conversion service, or NULL if none
- * @param debit_restrictions JSON encoding of debit restrictions on the 
account; see AccountRestriction in the spec
- * @param credit_restrictions JSON encoding of credit restrictions on the 
account; see AccountRestriction in the spec
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_wire_signature_make (
-  const char *payto_uri,
-  const char *conversion_url,
-  const json_t *debit_restrictions,
-  const json_t *credit_restrictions,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Compute the hash of the given wire details.   The resulting
- * @a hc is what will be put into the contract between donor
- * and charity for signing by both parties.
- *
- * @param payto_uri bank account
- * @param salt salt used to eliminate brute-force inversion
- * @param[out] hc set to the hash
- */
-void
-TALER_charity_wire_signature_hash (const char *payto_uri,
-                                    const struct TALER_WireSaltP *salt,
-                                    struct TALER_CharityWireHashP *hc);
-
-
-/**
- * Check the signature in @a wire_s.
- *
- * @param payto_uri URL that is signed
- * @param salt the salt used to salt the @a payto_uri when hashing
- * @param merch_pub public key of the charity
- * @param merch_sig signature of the charity
- * @return #GNUNET_OK if signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_charity_wire_signature_check (
-  const char *payto_uri,
-  const struct TALER_WireSaltP *salt,
-  const struct TALER_CharityPublicKeyP *merch_pub,
-  const struct TALER_CharitySignatureP *merch_sig);
-
-
-/**
- * Create a signed wire statement for the given account.
- *
- * @param payto_uri account specification
- * @param salt the salt used to salt the @a payto_uri when hashing
- * @param merch_priv private key to sign with
- * @param[out] merch_sig where to write the signature
- */
-void
-TALER_charity_wire_signature_make (
-  const char *payto_uri,
-  const struct TALER_WireSaltP *salt,
-  const struct TALER_CharityPrivateKeyP *merch_priv,
-  struct TALER_CharitySignatureP *merch_sig);
-
-
-/**
- * Sign a payment confirmation.
- *
- * @param h_contract_terms hash of the contact of the charity with the donor
- * @param merch_priv private key to sign with
- * @param[out] merch_sig where to write the signature
- */
-void
-TALER_charity_pay_sign (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityPrivateKeyP *merch_priv,
-  struct GNUNET_CRYPTO_EddsaSignature *merch_sig);
-
-
-/**
- * Verify payment confirmation signature.
- *
- * @param h_contract_terms hash of the contact of the charity with the donor
- * @param charity_pub public key of the charity
- * @param charity_sig signature to verify
- * @return #GNUNET_OK if the signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_charity_pay_verify (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityPublicKeyP *charity_pub,
-  const struct TALER_CharitySignatureP *charity_sig);
-
-
-/**
- * Sign contract sent by the charity to the wallet.
- *
- * @param h_contract_terms hash of the contract terms
- * @param merch_priv private key to sign with
- * @param[out] merch_sig where to write the signature
- */
-void
-TALER_charity_contract_sign (
-  const struct TALER_PrivateContractHashP *h_contract_terms,
-  const struct TALER_CharityPrivateKeyP *merch_priv,
-  struct GNUNET_CRYPTO_EddsaSignature *merch_sig);
-
-
-/* **************** /management/extensions offline signing **************** */
-
-/**
- * Create a signature for the hash of the manifests of extensions
- *
- * @param h_manifests hash of the JSON object representing the manifests
- * @param master_priv private key to sign with
- * @param[out] master_sig where to write the signature
- */
-void
-TALER_donau_offline_extension_manifests_hash_sign (
-  const struct TALER_ExtensionManifestsHashP *h_manifests,
-  const struct TALER_MasterPrivateKeyP *master_priv,
-  struct TALER_MasterSignatureP *master_sig);
-
-
-/**
- * Verify the signature in @a master_sig of the given hash, taken over the JSON
- * blob representing the manifests of extensions
- *
- * @param h_manifest hash of the JSON blob of manifests of extensions
- * @param master_pub master public key of the donau
- * @param master_sig signature of the donau
- * @return #GNUNET_OK if signature is valid
- */
-enum GNUNET_GenericReturnValue
-TALER_donau_offline_extension_manifests_hash_verify (
-  const struct TALER_ExtensionManifestsHashP *h_manifest,
-  const struct TALER_MasterPublicKeyP *master_pub,
-  const struct TALER_MasterSignatureP *master_sig
-  );
-
-
-/**
- * @brief Representation of an age commitment:  one public key per age group.
- *
- * The number of keys must be be the same as the number of bits set in the
- * corresponding age mask.
- */
-struct TALER_AgeCommitment
-{
-
-  /**
-   * The age mask defines the age groups that were a parameter during the
-   * generation of this age commitment
-   */
-  struct TALER_AgeMask mask;
-
-  /**
-   * The number of public keys, which must be the same as the number of
-   * groups in the mask.
-   */
-  size_t num;
-
-  /**
-   * The list of @e num public keys.  In must have same size as the number of
-   * age groups defined in the mask.
-   *
-   * A hash of this list is the hashed commitment that goes into FDC
-   * calculation during the withdraw and refresh operations for new coins. That
-   * way, the particular age commitment becomes mandatory and bound to a coin.
-   *
-   * The list has been allocated via GNUNET_malloc().
-   */
-  struct TALER_AgeCommitmentPublicKeyP *keys;
-};
-
-
-/**
- * @brief Proof for a particular age commitment, used in age attestation
- *
- * This struct is used in a call to TALER_age_commitment_attest to create an
- * attestation for a minimum age (if that minimum age is less or equal to the
- * committed age for this proof).  It consists of a list private keys, one per
- * age group, for which the committed age is either lager or within that
- * particular group.
- */
-struct TALER_AgeProof
-{
-  /**
-   * The number of private keys, which must be at most num_pub_keys.  One minus
-   * this number corresponds to the largest age group that is supported with
-   * this age commitment.
-   * **Note**, that this and the next field are only relevant on the wallet
-   * side for attestation and derive operations.
-   */
-  size_t num;
-
-  /**
-   * List of @e num private keys.
-   *
-   * Note that the list can be _smaller_ than the corresponding list of public
-   * keys. In that case, the wallet can sign off only for a subset of the age
-   * groups.
-   *
-   * The list has been allocated via GNUNET_malloc.
-   */
-  struct TALER_AgeCommitmentPrivateKeyP *keys;
-};
-
-
-/**
- * @brief Commitment and Proof for a maximum age
- *
- * Calling TALER_age_restriction_commit on an (maximum) age value returns this
- * data structure.  It consists of the proof, which is used to create
- * attestations for compatible minimum ages, and the commitment, which is used
- * to verify the attestations and derived commitments.
- *
- * The hash value of the commitment is bound to a particular coin with age
- * restriction.
- */
-struct TALER_AgeCommitmentProof
-{
-  /**
-   * The commitment is used to verify a particular attestation.  Its hash value
-   * is bound to a particular coin with age restriction.  This structure is
-   * sent to the charity in order to verify a particular attestation for a
-   * minimum age.
-   * In itself, it does not convey any information about the maximum age that
-   * went into the call to TALER_age_restriction_commit.
-   */
-  struct TALER_AgeCommitment commitment;
-
-  /**
-   * The proof is used to create an attestation for a (compatible) minimum age.
-   */
-  struct TALER_AgeProof proof;
-};
-
-
-/**
- * @brief Generates a hash of the public keys in the age commitment.
- *
- * @param commitment the age commitment - one public key per age group
- * @param[out] hash resulting hash
- */
-void
-TALER_age_commitment_hash (
-  const struct TALER_AgeCommitment *commitment,
-  struct TALER_AgeCommitmentHash *hash);
-
-
-/**
- * @brief Generates an age commitent for the given age.
- *
- * @param mask The age mask the defines the age groups
- * @param age The actual age for which an age commitment is generated
- * @param seed The seed that goes into the key generation.  MUST be chosen 
uniformly random.
- * @param[out] comm_proof The generated age commitment, ->priv and ->pub 
allocated via GNUNET_malloc() on success
- * @return #GNUNET_OK on success, #GNUNET_SYSERR otherwise
- */
-enum GNUNET_GenericReturnValue
-TALER_age_restriction_commit (
-  const struct TALER_AgeMask *mask,
-  uint8_t age,
-  const struct GNUNET_HashCode *seed,
-  struct TALER_AgeCommitmentProof *comm_proof);
-
-
-/**
- * @brief Derives another, equivalent age commitment for a given one.
- *
- * @param orig Original age commitment
- * @param salt Salt to randomly move the points on the elliptic curve in order 
to generate another, equivalent commitment.
- * @param[out] derived The resulting age commitment, ->priv and ->pub 
allocated via GNUNET_malloc() on success.
- * @return #GNUNET_OK on success, #GNUNET_SYSERR otherwise
- */
-enum GNUNET_GenericReturnValue
-TALER_age_commitment_derive (
-  const struct TALER_AgeCommitmentProof *orig,
-  const struct GNUNET_HashCode *salt,
-  struct TALER_AgeCommitmentProof *derived);
-
-
-/**
- * @brief Provide attestation for a given age, from a given age commitment, if 
possible.
- *
- * @param comm_proof The age commitment to be used for attestation.  For 
successful attestation, it must contain the private key for the corresponding 
age group.
- * @param age Age (not age group) for which the an attestation should be done
- * @param[out] attest Signature of the age with the appropriate key from the 
age commitment for the corresponding age group, if applicaple.
- * @return #GNUNET_OK on success, #GNUNET_NO when no attestation can be made 
for that age with the given commitment, #GNUNET_SYSERR otherwise
- */
-enum GNUNET_GenericReturnValue
-TALER_age_commitment_attest (
-  const struct TALER_AgeCommitmentProof *comm_proof,
-  uint8_t age,
-  struct TALER_AgeAttestation *attest);
-
-
-/**
- * @brief Verify the attestation for an given age and age commitment
- *
- * @param commitment The age commitment that went into the attestation.  Only 
the public keys are needed.
- * @param age Age (not age group) for which the an attestation should be done
- * @param attest Signature of the age with the appropriate key from the age 
commitment for the corresponding age group, if applicaple.
- * @return #GNUNET_OK when the attestation was successful, #GNUNET_NO no 
attestation couldn't be verified, #GNUNET_SYSERR otherwise
- */
-enum GNUNET_GenericReturnValue
-TALER_age_commitment_verify (
-  const struct TALER_AgeCommitment *commitment,
-  uint8_t age,
-  const struct TALER_AgeAttestation *attest);
-
-
-/**
- * @brief helper function to free memory of a struct TALER_AgeCommitment
- *
- * @param ac the commitment from which all memory should be freed.
- */
-void
-TALER_age_commitment_free (
-  struct TALER_AgeCommitment *ac);
-
-
-/**
- * @brief helper function to free memory of a struct TALER_AgeProof
- *
- * @param ap the proof of commitment from which all memory should be freed.
- */
-void
-TALER_age_proof_free (
-  struct TALER_AgeProof *ap);
-
-
-/**
- * @brief helper function to free memory of a struct TALER_AgeCommitmentProof
- *
- * @param acp the commitment and its proof from which all memory should be 
freed.
- */
-void
-TALER_age_commitment_proof_free (
-  struct TALER_AgeCommitmentProof *acp);
-
-
-/**
- * @brief helper function to allocate and copy a struct 
TALER_AgeCommitmentProof
- *
- * @param[in] acp The original age commitment proof
- * @return The deep copy of @e acp, allocated
- */
-struct TALER_AgeCommitmentProof *
-TALER_age_commitment_proof_duplicate (
-  const struct TALER_AgeCommitmentProof *acp);
-
-/**
- * @brief helper function to copy a struct TALER_AgeCommitmentProof
- *
- * @param[in] acp The original age commitment proof
- * @param[out] nacp The struct to copy the data into, with freshly allocated 
and copied keys.
- */
-void
-TALER_age_commitment_proof_deep_copy (
-  const struct TALER_AgeCommitmentProof *acp,
-  struct TALER_AgeCommitmentProof *nacp);
-
-/**
- * @brief For age-withdraw, clients have to prove that the public keys for all
- * age groups larger than the allowed maximum age group are derived by scalar
- * multiplication from this Edx25519 public key (in Crockford Base32 encoding):
- *
- *       DZJRF6HXN520505XDAWM8NMH36QV9J3VH77265WQ09EBQ76QSKCG
- *
- * Its private key was chosen randomly and then deleted.
- */
-extern struct
-#ifndef AGE_RESTRICTION_WITH_ECDSA
-GNUNET_CRYPTO_Edx25519PublicKey
-#else
-GNUNET_CRYPTO_EcdsaPublicKey
-#endif
-TALER_age_commitment_base_public_key;
-
-/**
- * @brief Similar to TALER_age_restriction_commit, but takes the coin's
- * private key as seed input and calculates the public keys in the slots larger
- * than the given age as derived from TALER_age_commitment_base_public_key.
- *
- * See https://docs.taler.net/core/api-donau.html#withdraw-with-age-restriction
- *
- * @param secret The master secret of the coin from which we derive the age 
restriction
- * @param mask The age mask, defining the age groups
- * @param max_age The maximum age for this coin.
- * @param[out] comm_proof The commitment and proof for age restriction for age 
@a max_age
- */
-enum GNUNET_GenericReturnValue
-TALER_age_restriction_from_secret (
-  const struct TALER_PlanchetMasterSecretP *secret,
-  const struct TALER_AgeMask *mask,
-  const uint8_t max_age,
-  struct TALER_AgeCommitmentProof *comm_proof);
-
-
-/**
- * Group of Denominations.  These are the common fields of an array of
- * denominations.
- *
- * The corresponding JSON-blob will also contain an array of particular
- * denominations with only the timestamps, cipher-specific public key and the
- * master signature.
- */
-struct TALER_DenominationGroup
-{
-
-  /**
-   * XOR of all SHA-512 hashes of the public keys in this
-   * group.
-   */
-  struct GNUNET_HashCode hash;
-
-  /**
-   * Value of coins in this denomination group.
-   */
-  struct TALER_Amount value;
-
-  /**
-   * Fee structure for all coins in the group.
-   */
-  struct TALER_DenomFeeSet fees;
-
-  /**
-   * Cipher used for the denomination.
-   */
-  enum TALER_DenominationCipher cipher;
-
-  /**
-   * Age mask for the denomiation.
-   */
-  struct TALER_AgeMask age_mask;
-
-};
-
-
-/**
- * Compute a unique key for the meta data of a denomination group.
- *
- * @param dg denomination group to evaluate
- * @param[out] key key to set
- */
-void
-TALER_denomination_group_get_key (
-  const struct TALER_DenominationGroup *dg,
-  struct GNUNET_HashCode *key);
-
-
 #endif
diff --git a/src/include/taler_donau_service.h 
b/src/include/taler_donau_service.h
index 8febc5c..986743f 100644
--- a/src/include/taler_donau_service.h
+++ b/src/include/taler_donau_service.h
@@ -517,18 +517,6 @@ struct TALER_DONAU_BlindedUniqueDonationIdentifier
 
 };
 
-/**
- * blind signatures from the blinded donation envelopes.
- */
-struct TALER_BlindedDonationUnitSignature
-{
-  /**
-   * The blinded signature
-   */
-  struct TALER_DenominationSignature b_sig;
-
-};
-
 /**
  * @brief A Batch Submit Handle
  */
@@ -639,17 +627,6 @@ void
 TALER_DONAU_charity_issue_receipt_cancel (
   struct TALER_DONAU_BatchIssueReceiptHandle *);
 
-/**
- * @brief Type of signatures used by the donau for non-blind signatures.
- */
-struct TALER_DonauSignatureP
-{
-  /**
-   * Donau uses EdDSA for for non-blind signatures.
-   */
-  struct GNUNET_CRYPTO_EddsaSignature eddsa_signature;
-};
-
 /**
  * unblinded donation unit signature from Donau
  */
@@ -674,7 +651,7 @@ struct TALER_DONAU_DonationReceipt
   struct TALER_DonationUnitHashP h_donation_unit_pub;
 
   /**
-   * Donor's unique donation identifier.
+   * Donor's hashed and salted unique donation identifier.
    */
   struct TALER_DONAU_HashDonorTaxId donor_id;
 
@@ -767,7 +744,7 @@ TALER_DONAU_donor_receipts_to_statement_cancel (
 
 
 
-/* ********************* POST /csr batch-issue (equivalent to withdraw of 
exchange) *********************** */
+/* ********************* POST /csr batch-issue *********************** */
 
 
 /**
@@ -865,40 +842,193 @@ TALER_DONAU_csr_batch_issue_cancel (
 
 
 
-/* ********************* GET /charities/$CHARITY_ID *********************** */
+/* ********************* GET /charities/ *********************** */
 
 /**
  *  A Charity
  */
-struct Charity
+struct CharitySummary
 {
   /**
-   * Amount issued.
+   * charity id
    */
+   unsigned int charity_id;
+
+   /**
+    * charity name
+    */
+   char *name;
+
+   /**
+    * Max donation amout for this charitiy and year.
+    */
    struct TALER_Amount amount;
 
   /**
-   * Year of validity.
+   * Current donation amount for this charity and year.
    */
-   unsigned int year;
+   struct TALER_Amount amount;
+
+};
+
+
+/**
+ * @brief A /charities/ GET Handle
+ */
+struct TALER_DONAU_CharitiesGetHandle;
+
+
+/**
+ * @brief summary of every charity
+ */
+struct TALER_DONAU_GetCharitiesResponse
+{
 
   /**
-   * Charity's eddsa signature.
+   * High-level HTTP response details.
    */
-   struct TALER_DonauSignatureP donau_sig;
+  struct TALER_DONAU_HttpResponse hr;
+
+  /**
+   * Details depending on @e hr.http_status.
+   */
+  union
+  {
+
+    /**
+     * Information returned on success, if
+     * @e hr.http_status is #MHD_HTTP_OK
+     */
+    struct
+    {
+
+      /**
+       * Charity status information.
+       */
+      struct CharitySummary *charity;
+
+      /**
+       * Number of charities
+       */
+      unsigned int num_charity;
+
+    } ok;
+
+  } details;
+
+};
+
+
+/**
+ * Callbacks of this type are used to serve the result of
+ * charities status request to a donau.
+ *
+ * @param cls closure
+ * @param rs HTTP response data
+ */
+typedef void
+(*TALER_DONAU_GetCharitiesResponseCallback) (
+  void *cls,
+  const struct TALER_DONAU_GetCharitiesResponse *rs);
+
+
+/**
+ * Submit a request to obtain the transaction history of a charity
+ * from the donau.  Note that while we return the full response to the
+ * caller for further processing, we do already verify that the
+ * response is well-formed (i.e. that signatures included in the
+ * response are all valid and add up to the balance).  If the donau's
+ * reply is not well-formed, we return an HTTP status code of zero to
+ * @a cb.
+ *
+ * @param ctx curl context
+ * @param url donau base URL
+ * @param charity_pub public key of the charity to inspect
+ * @param timeout how long to wait for an affirmative reply
+ *        (enables long polling if the charity does not yet exist)
+ * @param cb the callback to call when a reply for this request is available
+ * @param cb_cls closure for the above callback
+ * @return a handle for this request; NULL if the inputs are invalid (i.e.
+ *         signatures fail to verify).  In this case, the callback is not 
called.
+ */
+struct TALER_DONAU_CharitiesGetHandle *
+TALER_DONAU_charities_get (
+  struct GNUNET_CURL_Context *ctx,
+  const char *url,
+  TALER_DONAU_GetCharitiesResponseCallback cb,
+  void *cb_cls);
+
+
+/**
+ * Cancel a charity GET request.  This function cannot be used
+ * on a request handle if a response is already served for it.
+ *
+ * @param rgh the charity request handle
+ */
+void
+TALER_DONAU_charities_get_cancel (
+  struct TALER_DONAU_charitiesGetHandle *rgh);
+
+
+/* ********************* GET /charities/$CHARITY_ID *********************** */
+
+struct CharityHistoryYear
+{
+  /**
+   * year
+   */
+  unsigned int year;
+
+  /**
+   * final donation amount at the end of @a year;
+   */
+   struct TALER_Amount amount;
+};
+
+
+/**
+ * information of a charity
+ */
+struct Charity
+{
+  /**
+   * name of the charity
+   */
+  char *name;
+
+  /**
+   * public key of the charity
+   */
+  struct TALER_DONAU_CharitySignatureP pub_key;
+
+  /**
+    * Max donation amout for this charitiy and year.
+    */
+  struct TALER_Amount amount;
+
+  /**
+   * donation history
+   */
+  struct CharityHistoryYear *history;
+
+  /**
+   * number of charity history years
+   */
+  unsigned int num_hist;
+
 };
 
 
 /**
  * @brief A /charities/ GET Handle
  */
-struct TALER_DONAU_charitysGetHandle;
+struct TALER_DONAU_CharityGetHandle;
 
 
 /**
- * @brief charity summary.
+ * @brief summary of a charity
  */
-struct TALER_DONAU_charitySummary
+struct TALER_DONAU_GetCharityResponse
 {
 
   /**
@@ -922,7 +1052,8 @@ struct TALER_DONAU_charitySummary
       /**
        * Charity status information.
        */
-      struct struct TALER_DONAU_CHARITY_YEAR charity_info;
+      struct CharitySummary charity;
+
 
     } ok;
 
@@ -932,16 +1063,16 @@ struct TALER_DONAU_charitySummary
 
 
 /**
- * Callbacks of this type are used to serve the result of submitting a
+ * Callbacks of this type are used to serve the result of a
  * charity status request to a donau.
  *
  * @param cls closure
  * @param rs HTTP response data
  */
 typedef void
-(*TALER_DONAU_charitysGetCallback) (
+(*TALER_DONAU_GetCharityResponseCallback) (
   void *cls,
-  const struct TALER_DONAU_charitySummary *rs);
+  const struct TALER_DONAU_GetCharityResponse *rs);
 
 
 /**
@@ -963,13 +1094,12 @@ typedef void
  * @return a handle for this request; NULL if the inputs are invalid (i.e.
  *         signatures fail to verify).  In this case, the callback is not 
called.
  */
-struct TALER_DONAU_charitysGetHandle *
-TALER_DONAU_charitys_get (
+struct TALER_DONAU_CharityGetHandle *
+TALER_DONAU_charity_get (
   struct GNUNET_CURL_Context *ctx,
   const char *url,
   const struct TALER_charityPublicKeyP *charity_pub,
-  struct GNUNET_TIME_Relative timeout,
-  TALER_DONAU_charitysGetCallback cb,
+  TALER_DONAU_GetCharityResponseCallback cb,
   void *cb_cls);
 
 
@@ -980,10 +1110,11 @@ TALER_DONAU_charitys_get (
  * @param rgh the charity request handle
  */
 void
-TALER_DONAU_charitys_get_cancel (
-  struct TALER_DONAU_charitysGetHandle *rgh);
+TALER_DONAU_charity_get_cancel (
+  struct TALER_DONAU_charitiesGetHandle *rgh);
+
 
-/* ********************* POST /charitys/$CHARITY_ID/batch-issue 
*********************** */
+/* ********************* POST /charities/$CHARITY_ID *********************** */
 
 /**
  * A BDID blinded unique donation identifier.
@@ -1000,7 +1131,7 @@ struct TALER_DONAU_BlindedDonationIdentifier
    * donation unit public key.
    */
   struct TALER_DONAU_BlindedUniqueIdentifier blinded_identifier;
-}
+};
 
 /**
  * @brief A /charitys/$CHARITY_ID/batch-issue Handle

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]