2015-01-08 18:37:20 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
|
|
|
(C) 2014 GNUnet e. V. (and other contributing authors)
|
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file mint/test_mint_common.c
|
|
|
|
* @brief test cases for some functions in mint/mint_common.c
|
|
|
|
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "gnunet/gnunet_util_lib.h"
|
2015-01-30 14:17:42 +01:00
|
|
|
#include "taler_signatures.h"
|
|
|
|
#include "key_io.h"
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-27 21:48:50 +01:00
|
|
|
#define RSA_KEY_SIZE 1024
|
|
|
|
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
#define EXITIF(cond) \
|
|
|
|
do { \
|
|
|
|
if (cond) { GNUNET_break (0); goto EXITIF_exit; } \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
int
|
|
|
|
main (int argc, const char *const argv[])
|
|
|
|
{
|
2015-01-09 18:18:59 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv dki;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *enc;
|
|
|
|
size_t enc_size;
|
2015-01-09 18:18:59 +01:00
|
|
|
struct TALER_MINT_DenomKeyIssuePriv dki_read;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *enc_read;
|
|
|
|
size_t enc_read_size;
|
2015-01-08 18:37:20 +01:00
|
|
|
char *tmpfile;
|
|
|
|
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
enc = NULL;
|
|
|
|
enc_read = NULL;
|
|
|
|
tmpfile = NULL;
|
|
|
|
dki.denom_priv = NULL;
|
|
|
|
dki_read.denom_priv = NULL;
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
2015-01-09 18:18:59 +01:00
|
|
|
&dki.issue.signature,
|
2015-01-08 18:37:20 +01:00
|
|
|
sizeof (dki) - offsetof (struct TALER_MINT_DenomKeyIssue,
|
|
|
|
signature));
|
2015-01-27 21:48:50 +01:00
|
|
|
dki.denom_priv = GNUNET_CRYPTO_rsa_private_key_create (RSA_KEY_SIZE);
|
2015-01-26 12:22:26 +01:00
|
|
|
enc_size = GNUNET_CRYPTO_rsa_private_key_encode (dki.denom_priv, &enc);
|
2015-01-08 18:37:20 +01:00
|
|
|
EXITIF (NULL == (tmpfile = GNUNET_DISK_mktemp ("test_mint_common")));
|
|
|
|
EXITIF (GNUNET_OK != TALER_MINT_write_denom_key (tmpfile, &dki));
|
|
|
|
EXITIF (GNUNET_OK != TALER_MINT_read_denom_key (tmpfile, &dki_read));
|
2015-01-27 21:48:50 +01:00
|
|
|
enc_read_size = GNUNET_CRYPTO_rsa_private_key_encode (dki_read.denom_priv,
|
|
|
|
&enc_read);
|
2015-01-26 12:22:26 +01:00
|
|
|
EXITIF (enc_size != enc_read_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
EXITIF (0 != memcmp (enc,
|
|
|
|
enc_read,
|
2015-01-26 12:22:26 +01:00
|
|
|
enc_size));
|
2015-01-08 18:37:20 +01:00
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
EXITIF_exit:
|
|
|
|
GNUNET_free_non_null (enc);
|
|
|
|
if (NULL != tmpfile)
|
|
|
|
{
|
|
|
|
(void) unlink (tmpfile);
|
|
|
|
GNUNET_free (tmpfile);
|
|
|
|
}
|
|
|
|
GNUNET_free_non_null (enc_read);
|
|
|
|
if (NULL != dki.denom_priv)
|
2015-01-26 12:22:26 +01:00
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dki.denom_priv);
|
2015-01-08 18:37:20 +01:00
|
|
|
if (NULL != dki_read.denom_priv)
|
2015-01-27 21:48:50 +01:00
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dki_read.denom_priv);
|
2015-01-08 18:37:20 +01:00
|
|
|
return ret;
|
|
|
|
}
|