diff options
Diffstat (limited to 'src/reclaim/plugin_reclaim_credential_pabc.c')
-rw-r--r-- | src/reclaim/plugin_reclaim_credential_pabc.c | 572 |
1 files changed, 0 insertions, 572 deletions
diff --git a/src/reclaim/plugin_reclaim_credential_pabc.c b/src/reclaim/plugin_reclaim_credential_pabc.c deleted file mode 100644 index a906805fb..000000000 --- a/src/reclaim/plugin_reclaim_credential_pabc.c +++ /dev/null | |||
@@ -1,572 +0,0 @@ | |||
1 | /* | ||
2 | This file is part of GNUnet | ||
3 | Copyright (C) 2013, 2014, 2016 GNUnet e.V. | ||
4 | |||
5 | GNUnet is free software: you can redistribute it and/or modify it | ||
6 | under the terms of the GNU Affero General Public License as published | ||
7 | by the Free Software Foundation, either version 3 of the License, | ||
8 | or (at your option) any later version. | ||
9 | |||
10 | GNUnet is distributed in the hope that it will be useful, but | ||
11 | WITHOUT ANY WARRANTY; without even the implied warranty of | ||
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
13 | Affero General Public License for more details. | ||
14 | |||
15 | You should have received a copy of the GNU Affero General Public License | ||
16 | along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
17 | |||
18 | SPDX-License-Identifier: AGPL3.0-or-later | ||
19 | */ | ||
20 | |||
21 | /** | ||
22 | * @file reclaim/plugin_reclaim_credential_pabc.c | ||
23 | * @brief reclaim-credential-plugin-pabc attribute plugin to provide the API for | ||
24 | * pabc credentials. | ||
25 | * | ||
26 | * @author Martin Schanzenbach | ||
27 | */ | ||
28 | #include "platform.h" | ||
29 | #include "gnunet_util_lib.h" | ||
30 | #include "gnunet_reclaim_plugin.h" | ||
31 | #include <inttypes.h> | ||
32 | #include <jansson.h> | ||
33 | #include <pabc/pabc.h> | ||
34 | #include "pabc_helper.h" | ||
35 | |||
36 | /** | ||
37 | * Convert the 'value' of an credential to a string. | ||
38 | * | ||
39 | * @param cls closure, unused | ||
40 | * @param type type of the credential | ||
41 | * @param data value in binary encoding | ||
42 | * @param data_size number of bytes in @a data | ||
43 | * @return NULL on error, otherwise human-readable representation of the value | ||
44 | */ | ||
45 | static char * | ||
46 | pabc_value_to_string (void *cls, | ||
47 | uint32_t type, | ||
48 | const void *data, | ||
49 | size_t data_size) | ||
50 | { | ||
51 | switch (type) | ||
52 | { | ||
53 | case GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC: | ||
54 | return GNUNET_strndup (data, data_size); | ||
55 | |||
56 | default: | ||
57 | return NULL; | ||
58 | } | ||
59 | } | ||
60 | |||
61 | |||
62 | /** | ||
63 | * Convert human-readable version of a 'value' of an credential to the binary | ||
64 | * representation. | ||
65 | * | ||
66 | * @param cls closure, unused | ||
67 | * @param type type of the credential | ||
68 | * @param s human-readable string | ||
69 | * @param data set to value in binary encoding (will be allocated) | ||
70 | * @param data_size set to number of bytes in @a data | ||
71 | * @return #GNUNET_OK on success | ||
72 | */ | ||
73 | static int | ||
74 | pabc_string_to_value (void *cls, | ||
75 | uint32_t type, | ||
76 | const char *s, | ||
77 | void **data, | ||
78 | size_t *data_size) | ||
79 | { | ||
80 | if (NULL == s) | ||
81 | return GNUNET_SYSERR; | ||
82 | switch (type) | ||
83 | { | ||
84 | case GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC: | ||
85 | *data = GNUNET_strdup (s); | ||
86 | *data_size = strlen (s) + 1; | ||
87 | return GNUNET_OK; | ||
88 | |||
89 | default: | ||
90 | return GNUNET_SYSERR; | ||
91 | } | ||
92 | } | ||
93 | |||
94 | |||
95 | /** | ||
96 | * Mapping of credential type numbers to human-readable | ||
97 | * credential type names. | ||
98 | */ | ||
99 | static struct | ||
100 | { | ||
101 | const char *name; | ||
102 | uint32_t number; | ||
103 | } pabc_cred_name_map[] = { { "PABC", GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC }, | ||
104 | { NULL, UINT32_MAX } }; | ||
105 | |||
106 | /** | ||
107 | * Convert a type name to the corresponding number. | ||
108 | * | ||
109 | * @param cls closure, unused | ||
110 | * @param pabc_typename name to convert | ||
111 | * @return corresponding number, UINT32_MAX on error | ||
112 | */ | ||
113 | static uint32_t | ||
114 | pabc_typename_to_number (void *cls, const char *pabc_typename) | ||
115 | { | ||
116 | unsigned int i; | ||
117 | |||
118 | i = 0; | ||
119 | while ((NULL != pabc_cred_name_map[i].name) && | ||
120 | (0 != strcasecmp (pabc_typename, pabc_cred_name_map[i].name))) | ||
121 | i++; | ||
122 | return pabc_cred_name_map[i].number; | ||
123 | } | ||
124 | |||
125 | |||
126 | /** | ||
127 | * Convert a type number (i.e. 1) to the corresponding type string | ||
128 | * | ||
129 | * @param cls closure, unused | ||
130 | * @param type number of a type to convert | ||
131 | * @return corresponding typestring, NULL on error | ||
132 | */ | ||
133 | static const char * | ||
134 | pabc_number_to_typename (void *cls, uint32_t type) | ||
135 | { | ||
136 | unsigned int i; | ||
137 | |||
138 | i = 0; | ||
139 | while ((NULL != pabc_cred_name_map[i].name) && (type != | ||
140 | pabc_cred_name_map[i]. | ||
141 | number)) | ||
142 | i++; | ||
143 | return pabc_cred_name_map[i].name; | ||
144 | } | ||
145 | |||
146 | |||
147 | static void | ||
148 | inspect_attrs (char const *const key, | ||
149 | char const *const value, | ||
150 | void *ctx) | ||
151 | { | ||
152 | struct GNUNET_RECLAIM_AttributeList *attrs = ctx; | ||
153 | |||
154 | if (NULL == value) | ||
155 | return; | ||
156 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
157 | "Found attribute in PABC credential: `%s': `%s'\n", | ||
158 | key, value); | ||
159 | if (0 == strcmp (key, "expiration")) | ||
160 | return; | ||
161 | if (0 == strcmp (key, "issuer")) | ||
162 | return; | ||
163 | if (0 == strcmp (key, "subject")) | ||
164 | return; | ||
165 | GNUNET_RECLAIM_attribute_list_add (attrs, | ||
166 | key, | ||
167 | NULL, | ||
168 | GNUNET_RECLAIM_ATTRIBUTE_TYPE_STRING, | ||
169 | value, | ||
170 | strlen (value)); | ||
171 | } | ||
172 | |||
173 | |||
174 | /** | ||
175 | * Parse a pabc and return the respective claim value as Attribute | ||
176 | * | ||
177 | * @param cls the plugin | ||
178 | * @param cred the pabc credential | ||
179 | * @return a GNUNET_RECLAIM_Attribute, containing the new value | ||
180 | */ | ||
181 | struct GNUNET_RECLAIM_AttributeList * | ||
182 | pabc_parse_attributes (void *cls, | ||
183 | const char *data, | ||
184 | size_t data_size) | ||
185 | { | ||
186 | struct GNUNET_RECLAIM_AttributeList *attrs; | ||
187 | |||
188 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
189 | "Collecting PABC attributes...\n"); | ||
190 | attrs = GNUNET_new (struct GNUNET_RECLAIM_AttributeList); | ||
191 | GNUNET_assert (PABC_OK == | ||
192 | pabc_cred_inspect_credential (data, | ||
193 | &inspect_attrs, attrs)); | ||
194 | return attrs; | ||
195 | } | ||
196 | |||
197 | |||
198 | /** | ||
199 | * Parse a pabc and return the respective claim value as Attribute | ||
200 | * | ||
201 | * @param cls the plugin | ||
202 | * @param cred the pabc credential | ||
203 | * @return a GNUNET_RECLAIM_Attribute, containing the new value | ||
204 | */ | ||
205 | struct GNUNET_RECLAIM_AttributeList * | ||
206 | pabc_parse_attributes_c (void *cls, | ||
207 | const struct GNUNET_RECLAIM_Credential *cred) | ||
208 | { | ||
209 | if (cred->type != GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC) | ||
210 | return NULL; | ||
211 | return pabc_parse_attributes (cls, cred->data, cred->data_size); | ||
212 | } | ||
213 | |||
214 | |||
215 | /** | ||
216 | * Parse a pabc and return the respective claim value as Attribute | ||
217 | * | ||
218 | * @param cls the plugin | ||
219 | * @param cred the pabc credential | ||
220 | * @return a GNUNET_RECLAIM_Attribute, containing the new value | ||
221 | */ | ||
222 | struct GNUNET_RECLAIM_AttributeList * | ||
223 | pabc_parse_attributes_p (void *cls, | ||
224 | const struct GNUNET_RECLAIM_Presentation *cred) | ||
225 | { | ||
226 | if (cred->type != GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC) | ||
227 | return NULL; | ||
228 | return pabc_parse_attributes (cls, cred->data, cred->data_size); | ||
229 | } | ||
230 | |||
231 | |||
232 | /** | ||
233 | * Parse a pabc and return the issuer | ||
234 | * | ||
235 | * @param cls the plugin | ||
236 | * @param cred the pabc credential | ||
237 | * @return a string, containing the isser | ||
238 | */ | ||
239 | char* | ||
240 | pabc_get_issuer (void *cls, | ||
241 | const char *data, | ||
242 | size_t data_size) | ||
243 | { | ||
244 | char *res; | ||
245 | if (PABC_OK != pabc_cred_get_attr_by_name_from_cred (data, | ||
246 | "issuer", | ||
247 | &res)) | ||
248 | return NULL; | ||
249 | return res; | ||
250 | } | ||
251 | |||
252 | |||
253 | /** | ||
254 | * Parse a pabc and return the issuer | ||
255 | * | ||
256 | * @param cls the plugin | ||
257 | * @param cred the pabc credential | ||
258 | * @return a string, containing the isser | ||
259 | */ | ||
260 | char * | ||
261 | pabc_get_issuer_c (void *cls, | ||
262 | const struct GNUNET_RECLAIM_Credential *cred) | ||
263 | { | ||
264 | if (GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC != cred->type) | ||
265 | return NULL; | ||
266 | return pabc_get_issuer (cls, cred->data, cred->data_size); | ||
267 | } | ||
268 | |||
269 | |||
270 | /** | ||
271 | * Parse a pabc and return the issuer | ||
272 | * | ||
273 | * @param cls the plugin | ||
274 | * @param cred the pabc credential | ||
275 | * @return a string, containing the isser | ||
276 | */ | ||
277 | char * | ||
278 | pabc_get_issuer_p (void *cls, | ||
279 | const struct GNUNET_RECLAIM_Presentation *cred) | ||
280 | { | ||
281 | if (GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC != cred->type) | ||
282 | return NULL; | ||
283 | return pabc_get_issuer (cls, cred->data, cred->data_size); | ||
284 | } | ||
285 | |||
286 | |||
287 | /** | ||
288 | * Parse a pabc and return the expiration | ||
289 | * | ||
290 | * @param cls the plugin | ||
291 | * @param cred the pabc credential | ||
292 | * @return a string, containing the isser | ||
293 | */ | ||
294 | enum GNUNET_GenericReturnValue | ||
295 | pabc_get_expiration (void *cls, | ||
296 | const char *data, | ||
297 | size_t data_size, | ||
298 | struct GNUNET_TIME_Absolute *exp) | ||
299 | { | ||
300 | char *exp_str; | ||
301 | uint64_t exp_i; | ||
302 | |||
303 | if (PABC_OK != pabc_cred_get_attr_by_name_from_cred (data, | ||
304 | "expiration", | ||
305 | &exp_str)) | ||
306 | return GNUNET_SYSERR; | ||
307 | |||
308 | if (1 != sscanf (exp_str, "%llu", &exp_i)) | ||
309 | { | ||
310 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
311 | "Invalid expiration `%s'\n", exp_str); | ||
312 | GNUNET_free (exp_str); | ||
313 | return GNUNET_SYSERR; | ||
314 | } | ||
315 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
316 | "Converted expiration string `%s' to %llu", | ||
317 | exp_str, exp_i); | ||
318 | |||
319 | GNUNET_free (exp_str); | ||
320 | exp->abs_value_us = exp_i * 1000 * 1000; | ||
321 | return GNUNET_OK; | ||
322 | } | ||
323 | |||
324 | |||
325 | /** | ||
326 | * Parse a pabc and return the expiration | ||
327 | * | ||
328 | * @param cls the plugin | ||
329 | * @param cred the pabc credential | ||
330 | * @return a string, containing the isser | ||
331 | */ | ||
332 | enum GNUNET_GenericReturnValue | ||
333 | pabc_get_expiration_c (void *cls, | ||
334 | const struct GNUNET_RECLAIM_Credential *cred, | ||
335 | struct GNUNET_TIME_Absolute *exp) | ||
336 | { | ||
337 | if (cred->type != GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC) | ||
338 | return GNUNET_NO; | ||
339 | return pabc_get_expiration (cls, cred->data, cred->data_size, exp); | ||
340 | } | ||
341 | |||
342 | |||
343 | /** | ||
344 | * Parse a pabc and return the expiration | ||
345 | * | ||
346 | * @param cls the plugin | ||
347 | * @param cred the pabc credential | ||
348 | * @return a string, containing the isser | ||
349 | */ | ||
350 | enum GNUNET_GenericReturnValue | ||
351 | pabc_get_expiration_p (void *cls, | ||
352 | const struct GNUNET_RECLAIM_Presentation *cred, | ||
353 | struct GNUNET_TIME_Absolute *exp) | ||
354 | { | ||
355 | if (cred->type != GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC) | ||
356 | return GNUNET_NO; | ||
357 | return pabc_get_expiration (cls, cred->data, cred->data_size, exp); | ||
358 | } | ||
359 | |||
360 | |||
361 | int | ||
362 | pabc_create_presentation (void *cls, | ||
363 | const struct GNUNET_RECLAIM_Credential *credential, | ||
364 | const struct GNUNET_RECLAIM_AttributeList *attrs, | ||
365 | struct GNUNET_RECLAIM_Presentation **presentation) | ||
366 | { | ||
367 | struct pabc_context *ctx = NULL; | ||
368 | struct pabc_user_context *usr_ctx = NULL; | ||
369 | struct pabc_public_parameters *pp = NULL; | ||
370 | struct pabc_credential *cred = NULL; | ||
371 | struct pabc_blinded_proof *proof = NULL; | ||
372 | struct GNUNET_RECLAIM_AttributeListEntry *ale; | ||
373 | char *issuer; | ||
374 | char *subject; | ||
375 | enum pabc_status status; | ||
376 | |||
377 | if (GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC != credential->type) | ||
378 | return GNUNET_NO; | ||
379 | |||
380 | |||
381 | PABC_ASSERT (pabc_new_ctx (&ctx)); | ||
382 | issuer = pabc_get_issuer_c (cls, credential); | ||
383 | if (NULL == issuer) | ||
384 | { | ||
385 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
386 | "No issuer found in credential\n"); | ||
387 | pabc_free_ctx (&ctx); | ||
388 | return GNUNET_SYSERR; | ||
389 | } | ||
390 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
391 | "Got issuer for credential: %s\n", issuer); | ||
392 | status = PABC_load_public_parameters (ctx, issuer, &pp); | ||
393 | if (status != PABC_OK) | ||
394 | { | ||
395 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
396 | "Failed to read public parameters.\n"); | ||
397 | pabc_free_ctx (&ctx); | ||
398 | GNUNET_free (issuer); | ||
399 | return GNUNET_SYSERR; | ||
400 | } | ||
401 | if (PABC_OK != pabc_cred_get_attr_by_name_from_cred (credential->data, | ||
402 | "subject", | ||
403 | &subject)) | ||
404 | { | ||
405 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
406 | "Failed to get subject.\n"); | ||
407 | pabc_free_ctx (&ctx); | ||
408 | GNUNET_free (issuer); | ||
409 | return GNUNET_SYSERR; | ||
410 | } | ||
411 | status = PABC_read_usr_ctx (subject, issuer, ctx, pp, &usr_ctx); | ||
412 | GNUNET_free (issuer); | ||
413 | GNUNET_free (subject); | ||
414 | if (PABC_OK != status) | ||
415 | { | ||
416 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
417 | "Failed to read user context.\n"); | ||
418 | pabc_free_public_parameters (ctx, &pp); | ||
419 | return GNUNET_SYSERR; | ||
420 | } | ||
421 | |||
422 | status = pabc_new_credential (ctx, pp, &cred); | ||
423 | if (status != PABC_OK) | ||
424 | { | ||
425 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
426 | "Failed to allocate credential.\n"); | ||
427 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
428 | pabc_free_public_parameters (ctx, &pp); | ||
429 | return GNUNET_SYSERR; | ||
430 | } | ||
431 | |||
432 | status = pabc_decode_credential (ctx, pp, cred, credential->data); | ||
433 | if (status != PABC_OK) | ||
434 | { | ||
435 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
436 | "Failed to decode credential.\n"); | ||
437 | pabc_free_credential (ctx, pp, &cred); | ||
438 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
439 | pabc_free_public_parameters (ctx, &pp); | ||
440 | return GNUNET_SYSERR; | ||
441 | } | ||
442 | |||
443 | status = pabc_new_proof (ctx, pp, &proof); | ||
444 | if (status != PABC_OK) | ||
445 | { | ||
446 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
447 | "Failed to allocate proof.\n"); | ||
448 | pabc_free_credential (ctx, pp, &cred); | ||
449 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
450 | pabc_free_public_parameters (ctx, &pp); | ||
451 | return GNUNET_SYSERR; | ||
452 | } | ||
453 | |||
454 | // now we can parse the attributes to disclose and configure the proof | ||
455 | for (ale = attrs->list_head; NULL != ale; ale = ale->next) | ||
456 | { | ||
457 | status = pabc_set_disclosure_by_attribute_name (ctx, pp, proof, | ||
458 | ale->attribute->name, | ||
459 | PABC_DISCLOSED, cred); | ||
460 | if (status != PABC_OK) | ||
461 | { | ||
462 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
463 | "Failed to configure proof.\n"); | ||
464 | pabc_free_credential (ctx, pp, &cred); | ||
465 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
466 | pabc_free_public_parameters (ctx, &pp); | ||
467 | return GNUNET_SYSERR; | ||
468 | } | ||
469 | } | ||
470 | |||
471 | // and finally -> sign the proof | ||
472 | status = pabc_gen_proof (ctx, usr_ctx, pp, proof, cred); | ||
473 | if (status != PABC_OK) | ||
474 | { | ||
475 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
476 | "Failed to sign proof.\n"); | ||
477 | pabc_free_proof (ctx, pp, &proof); | ||
478 | pabc_free_credential (ctx, pp, &cred); | ||
479 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
480 | pabc_free_public_parameters (ctx, &pp); | ||
481 | return GNUNET_SYSERR; | ||
482 | } | ||
483 | // print the result | ||
484 | char *json = NULL; | ||
485 | char *ppid = NULL; | ||
486 | char *userid = NULL; | ||
487 | GNUNET_assert (PABC_OK == pabc_cred_get_userid_from_cred (credential->data, | ||
488 | &userid)); | ||
489 | GNUNET_assert (PABC_OK == pabc_cred_get_ppid_from_cred (credential->data, | ||
490 | &ppid)); | ||
491 | pabc_cred_encode_proof (ctx, pp, proof, userid, ppid, &json); | ||
492 | GNUNET_free (ppid); | ||
493 | GNUNET_free (userid); | ||
494 | if (PABC_OK != status) | ||
495 | { | ||
496 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
497 | "Failed to serialize proof.\n"); | ||
498 | pabc_free_proof (ctx, pp, &proof); | ||
499 | pabc_free_credential (ctx, pp, &cred); | ||
500 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
501 | pabc_free_public_parameters (ctx, &pp); | ||
502 | return GNUNET_SYSERR; | ||
503 | } | ||
504 | char *json_enc; | ||
505 | GNUNET_STRINGS_base64_encode (json, | ||
506 | strlen (json) + 1, | ||
507 | &json_enc); | ||
508 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
509 | "Presentation: %s\n", json_enc); | ||
510 | // clean up | ||
511 | *presentation = GNUNET_RECLAIM_presentation_new ( | ||
512 | GNUNET_RECLAIM_CREDENTIAL_TYPE_PABC, | ||
513 | json_enc, | ||
514 | strlen (json_enc) + 1); | ||
515 | GNUNET_free (json_enc); | ||
516 | PABC_FREE_NULL (json); | ||
517 | pabc_free_proof (ctx, pp, &proof); | ||
518 | pabc_free_credential (ctx, pp, &cred); | ||
519 | pabc_free_user_context (ctx, pp, &usr_ctx); | ||
520 | pabc_free_public_parameters (ctx, &pp); | ||
521 | return GNUNET_OK; | ||
522 | } | ||
523 | |||
524 | |||
525 | /** | ||
526 | * Entry point for the plugin. | ||
527 | * | ||
528 | * @param cls NULL | ||
529 | * @return the exported block API | ||
530 | */ | ||
531 | void * | ||
532 | libgnunet_plugin_reclaim_credential_pabc_init (void *cls) | ||
533 | { | ||
534 | struct GNUNET_RECLAIM_CredentialPluginFunctions *api; | ||
535 | |||
536 | api = GNUNET_new (struct GNUNET_RECLAIM_CredentialPluginFunctions); | ||
537 | api->value_to_string = &pabc_value_to_string; | ||
538 | api->string_to_value = &pabc_string_to_value; | ||
539 | api->typename_to_number = &pabc_typename_to_number; | ||
540 | api->number_to_typename = &pabc_number_to_typename; | ||
541 | api->get_attributes = &pabc_parse_attributes_c; | ||
542 | api->get_issuer = &pabc_get_issuer_c; | ||
543 | api->get_expiration = &pabc_get_expiration_c; | ||
544 | api->value_to_string_p = &pabc_value_to_string; | ||
545 | api->string_to_value_p = &pabc_string_to_value; | ||
546 | api->typename_to_number_p = &pabc_typename_to_number; | ||
547 | api->number_to_typename_p = &pabc_number_to_typename; | ||
548 | api->get_attributes_p = &pabc_parse_attributes_p; | ||
549 | api->get_issuer_p = &pabc_get_issuer_p; | ||
550 | api->get_expiration_p = &pabc_get_expiration_p; | ||
551 | api->create_presentation = &pabc_create_presentation; | ||
552 | return api; | ||
553 | } | ||
554 | |||
555 | |||
556 | /** | ||
557 | * Exit point from the plugin. | ||
558 | * | ||
559 | * @param cls the return value from #libgnunet_plugin_block_test_init() | ||
560 | * @return NULL | ||
561 | */ | ||
562 | void * | ||
563 | libgnunet_plugin_reclaim_credential_pabc_done (void *cls) | ||
564 | { | ||
565 | struct GNUNET_RECLAIM_CredentialPluginFunctions *api = cls; | ||
566 | |||
567 | GNUNET_free (api); | ||
568 | return NULL; | ||
569 | } | ||
570 | |||
571 | |||
572 | /* end of plugin_reclaim_credential_type_pabc.c */ | ||