2015-03-05 15:59:22 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2016-01-21 15:29:07 +01:00
|
|
|
Copyright (C) 2014, 2015, 2016 GNUnet e.V.
|
2015-03-05 15:59:22 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
2015-06-11 13:02:57 +02:00
|
|
|
* @file mint/test_mintdb.c
|
2015-03-05 15:59:22 +01:00
|
|
|
* @brief test cases for DB interaction functions
|
|
|
|
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2015-03-28 12:29:35 +01:00
|
|
|
#include "taler_mintdb_lib.h"
|
|
|
|
#include "taler_mintdb_plugin.h"
|
2015-03-05 15:59:22 +01:00
|
|
|
|
|
|
|
static int result;
|
|
|
|
|
2015-03-06 01:15:46 +01:00
|
|
|
#define FAILIF(cond) \
|
|
|
|
do { \
|
|
|
|
if (!(cond)){ break;} \
|
|
|
|
GNUNET_break (0); \
|
|
|
|
goto drop; \
|
|
|
|
} while (0)
|
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
#define RND_BLK(ptr) \
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*ptr))
|
|
|
|
|
2015-03-07 14:03:01 +01:00
|
|
|
#define ZR_BLK(ptr) \
|
|
|
|
memset (ptr, 0, sizeof (*ptr))
|
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2015-03-09 17:05:35 +01:00
|
|
|
#define CURRENCY "EUR"
|
|
|
|
|
2015-03-28 12:29:35 +01:00
|
|
|
static struct TALER_MINTDB_Plugin *plugin;
|
|
|
|
|
2015-03-06 16:08:39 +01:00
|
|
|
/**
|
|
|
|
* Checks if the given reserve has the given amount of balance and expiry
|
|
|
|
*
|
2015-03-21 14:21:00 +01:00
|
|
|
* @param session the database connection
|
2015-03-06 16:08:39 +01:00
|
|
|
* @param pub the public key of the reserve
|
|
|
|
* @param value balance value
|
|
|
|
* @param fraction balance fraction
|
|
|
|
* @param currency currency of the reserve
|
|
|
|
* @return #GNUNET_OK if the given reserve has the same balance and expiration
|
|
|
|
* as the given parameters; #GNUNET_SYSERR if not
|
|
|
|
*/
|
2015-03-21 14:21:00 +01:00
|
|
|
static int
|
|
|
|
check_reserve (struct TALER_MINTDB_Session *session,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_ReservePublicKeyP *pub,
|
2015-03-26 19:29:03 +01:00
|
|
|
uint64_t value,
|
2015-03-21 14:21:00 +01:00
|
|
|
uint32_t fraction,
|
2015-06-11 13:14:59 +02:00
|
|
|
const char *currency)
|
2015-03-06 16:08:39 +01:00
|
|
|
{
|
2015-03-28 14:39:31 +01:00
|
|
|
struct TALER_MINTDB_Reserve reserve;
|
2015-03-22 22:14:30 +01:00
|
|
|
|
|
|
|
reserve.pub = *pub;
|
2015-03-06 16:08:39 +01:00
|
|
|
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->reserve_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve));
|
2015-03-06 16:08:39 +01:00
|
|
|
FAILIF (value != reserve.balance.value);
|
|
|
|
FAILIF (fraction != reserve.balance.fraction);
|
|
|
|
FAILIF (0 != strcmp (currency, reserve.balance.currency));
|
|
|
|
|
|
|
|
return GNUNET_OK;
|
|
|
|
drop:
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
struct DenomKeyPair
|
|
|
|
{
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationPrivateKey priv;
|
|
|
|
struct TALER_DenominationPublicKey pub;
|
2015-03-07 13:56:26 +01:00
|
|
|
};
|
|
|
|
|
2015-03-21 14:21:00 +01:00
|
|
|
|
2015-05-26 10:06:41 +02:00
|
|
|
/**
|
2015-08-17 23:07:32 +02:00
|
|
|
* Destroy a denomination key pair. The key is not necessarily removed from the DB.
|
2015-05-26 10:06:41 +02:00
|
|
|
*
|
2015-08-17 23:07:32 +02:00
|
|
|
* @param dkp the keypair to destroy
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
destroy_denom_key_pair (struct DenomKeyPair *dkp)
|
|
|
|
{
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (dkp->pub.rsa_public_key);
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dkp->priv.rsa_private_key);
|
|
|
|
GNUNET_free (dkp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a denominaiton key pair by registering the denomination in the DB.
|
|
|
|
*
|
|
|
|
* @param size the size of the denomination key
|
2015-05-26 10:06:41 +02:00
|
|
|
* @param session the DB session
|
2015-08-17 23:07:32 +02:00
|
|
|
* @return the denominaiton key pair; NULL upon error
|
2015-05-26 10:06:41 +02:00
|
|
|
*/
|
2015-08-17 23:07:32 +02:00
|
|
|
static struct DenomKeyPair *
|
|
|
|
create_denom_key_pair (unsigned int size,
|
|
|
|
struct TALER_MINTDB_Session *session,
|
|
|
|
const struct TALER_Amount *value,
|
|
|
|
const struct TALER_Amount *fee_withdraw,
|
|
|
|
const struct TALER_Amount *fee_deposit,
|
|
|
|
const struct TALER_Amount *fee_refresh)
|
2015-05-26 10:06:41 +02:00
|
|
|
{
|
2015-08-17 23:07:32 +02:00
|
|
|
struct DenomKeyPair *dkp;
|
2015-05-26 10:06:41 +02:00
|
|
|
struct TALER_MINTDB_DenominationKeyIssueInformation dki;
|
2015-06-11 14:58:23 +02:00
|
|
|
|
2015-08-17 23:07:32 +02:00
|
|
|
dkp = GNUNET_new (struct DenomKeyPair);
|
|
|
|
dkp->priv.rsa_private_key = GNUNET_CRYPTO_rsa_private_key_create (size);
|
|
|
|
GNUNET_assert (NULL != dkp->priv.rsa_private_key);
|
|
|
|
dkp->pub.rsa_public_key
|
|
|
|
= GNUNET_CRYPTO_rsa_private_key_get_public (dkp->priv.rsa_private_key);
|
|
|
|
|
2015-06-11 14:58:23 +02:00
|
|
|
/* Using memset() as fields like master key and signature
|
|
|
|
are not properly initialized for this test. */
|
|
|
|
memset (&dki,
|
|
|
|
0,
|
|
|
|
sizeof (struct TALER_MINTDB_DenominationKeyIssueInformation));
|
2015-08-17 23:07:32 +02:00
|
|
|
dki.denom_pub = dkp->pub;
|
2015-07-06 10:16:49 +02:00
|
|
|
dki.issue.properties.start = GNUNET_TIME_absolute_hton (GNUNET_TIME_absolute_get ());
|
|
|
|
dki.issue.properties.expire_withdraw = GNUNET_TIME_absolute_hton
|
2015-05-26 10:06:41 +02:00
|
|
|
(GNUNET_TIME_absolute_add (GNUNET_TIME_absolute_get (),
|
|
|
|
GNUNET_TIME_UNIT_HOURS));
|
2015-07-06 10:16:49 +02:00
|
|
|
dki.issue.properties.expire_spend = GNUNET_TIME_absolute_hton
|
2015-05-26 10:06:41 +02:00
|
|
|
(GNUNET_TIME_absolute_add
|
|
|
|
(GNUNET_TIME_absolute_get (),
|
|
|
|
GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_HOURS, 2)));
|
2015-07-06 10:16:49 +02:00
|
|
|
dki.issue.properties.expire_legal = GNUNET_TIME_absolute_hton
|
2015-05-26 10:06:41 +02:00
|
|
|
(GNUNET_TIME_absolute_add
|
|
|
|
(GNUNET_TIME_absolute_get (),
|
|
|
|
GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_HOURS, 3)));
|
2015-08-17 23:07:32 +02:00
|
|
|
TALER_amount_hton (&dki.issue.properties.value, value);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_withdraw, fee_withdraw);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_deposit, fee_deposit);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_refresh, fee_refresh);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&dki.issue.properties.denom_hash);
|
2015-05-26 10:06:41 +02:00
|
|
|
if (GNUNET_OK !=
|
2015-06-12 10:49:14 +02:00
|
|
|
plugin->insert_denomination_info (plugin->cls,
|
|
|
|
session,
|
2015-08-17 23:07:32 +02:00
|
|
|
&dki.denom_pub,
|
2015-06-12 10:49:14 +02:00
|
|
|
&dki.issue))
|
2015-05-26 10:06:41 +02:00
|
|
|
{
|
|
|
|
GNUNET_break(0);
|
2015-08-17 23:07:32 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return NULL;
|
2015-05-26 10:06:41 +02:00
|
|
|
}
|
2015-03-07 13:56:26 +01:00
|
|
|
return dkp;
|
|
|
|
}
|
|
|
|
|
2015-08-17 23:07:32 +02:00
|
|
|
static struct TALER_Amount value;
|
|
|
|
static struct TALER_Amount fee_withdraw;
|
|
|
|
static struct TALER_Amount fee_deposit;
|
|
|
|
static struct TALER_Amount fee_refresh;
|
|
|
|
static struct TALER_Amount amount_with_fee;
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2015-08-24 11:54:30 +02:00
|
|
|
static void
|
|
|
|
free_refresh_commit_coins_array(struct TALER_MINTDB_RefreshCommitCoin
|
|
|
|
*commit_coins,
|
|
|
|
unsigned int size)
|
|
|
|
{
|
|
|
|
unsigned int cnt;
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *ccoin;
|
|
|
|
struct TALER_RefreshLinkEncrypted *rlink;
|
|
|
|
|
|
|
|
for (cnt = 0; cnt < size; cnt++)
|
|
|
|
{
|
|
|
|
ccoin = &commit_coins[cnt];
|
|
|
|
GNUNET_free_non_null (ccoin->coin_ev);
|
|
|
|
rlink = (struct TALER_RefreshLinkEncrypted *) ccoin->refresh_link;
|
|
|
|
GNUNET_free_non_null (rlink);
|
|
|
|
}
|
|
|
|
GNUNET_free (commit_coins);
|
|
|
|
}
|
|
|
|
|
2015-08-25 11:01:15 +02:00
|
|
|
#define MELT_NEW_COINS 5
|
|
|
|
|
2015-08-24 11:54:30 +02:00
|
|
|
static int
|
2015-08-25 11:01:15 +02:00
|
|
|
test_refresh_commit_coins (struct TALER_MINTDB_Session *session,
|
|
|
|
struct TALER_MINTDB_RefreshSession *refresh_session,
|
|
|
|
const struct GNUNET_HashCode *session_hash)
|
2015-08-24 11:54:30 +02:00
|
|
|
{
|
2015-08-25 11:01:15 +02:00
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *commit_coins;
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *ret_commit_coins;
|
2015-08-24 11:54:30 +02:00
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *a_ccoin;
|
|
|
|
struct TALER_RefreshLinkEncrypted *a_rlink;
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *b_ccoin;
|
|
|
|
struct TALER_RefreshLinkEncrypted *b_rlink;
|
2015-08-25 11:01:15 +02:00
|
|
|
size_t size;
|
|
|
|
unsigned int cnt;
|
|
|
|
uint16_t cnc_index;
|
|
|
|
int ret;
|
2015-08-24 11:54:30 +02:00
|
|
|
|
2015-08-25 11:01:15 +02:00
|
|
|
#define COIN_ENC_MAX_SIZE 512
|
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
ret_commit_coins = NULL;
|
|
|
|
commit_coins = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin);
|
|
|
|
cnc_index = (uint16_t) GNUNET_CRYPTO_random_u32
|
|
|
|
(GNUNET_CRYPTO_QUALITY_WEAK, GNUNET_MIN (MELT_NEW_COINS, UINT16_MAX));
|
|
|
|
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
|
|
|
|
{
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin *ccoin;
|
|
|
|
struct TALER_RefreshLinkEncrypted *rlink;
|
|
|
|
ccoin = &commit_coins[cnt];
|
|
|
|
size = GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
COIN_ENC_MAX_SIZE);
|
|
|
|
rlink = GNUNET_malloc (sizeof (struct TALER_RefreshLinkEncrypted) + size);
|
|
|
|
ccoin->refresh_link = rlink;
|
|
|
|
ccoin->coin_ev_size = GNUNET_CRYPTO_random_u64
|
|
|
|
(GNUNET_CRYPTO_QUALITY_WEAK, COIN_ENC_MAX_SIZE);
|
|
|
|
ccoin->coin_ev = GNUNET_malloc (ccoin->coin_ev_size);
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
ccoin->coin_ev,
|
|
|
|
ccoin->coin_ev_size);
|
|
|
|
rlink->blinding_key_enc_size = size;
|
|
|
|
RND_BLK (&rlink->coin_priv_enc);
|
|
|
|
rlink->blinding_key_enc = (const char *) &rlink[1];
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
(void *)rlink->blinding_key_enc,
|
|
|
|
rlink->blinding_key_enc_size);
|
|
|
|
}
|
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->insert_refresh_commit_coins (plugin->cls,
|
|
|
|
session,
|
|
|
|
session_hash,
|
|
|
|
cnc_index,
|
|
|
|
MELT_NEW_COINS,
|
|
|
|
commit_coins));
|
|
|
|
ret_commit_coins = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_MINTDB_RefreshCommitCoin);
|
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->get_refresh_commit_coins (plugin->cls,
|
|
|
|
session,
|
|
|
|
session_hash,
|
|
|
|
cnc_index,
|
|
|
|
MELT_NEW_COINS,
|
|
|
|
ret_commit_coins));
|
|
|
|
/* compare the refresh commit coin arrays */
|
|
|
|
for (cnt = 0; cnt < MELT_NEW_COINS; cnt++)
|
2015-08-24 11:54:30 +02:00
|
|
|
{
|
2015-08-25 11:01:15 +02:00
|
|
|
a_ccoin = &commit_coins[cnt];
|
|
|
|
b_ccoin = &ret_commit_coins[cnt];
|
2015-08-24 11:54:30 +02:00
|
|
|
FAILIF (a_ccoin->coin_ev_size != b_ccoin->coin_ev_size);
|
|
|
|
FAILIF (0 != memcmp (a_ccoin->coin_ev,
|
|
|
|
a_ccoin->coin_ev,
|
|
|
|
a_ccoin->coin_ev_size));
|
|
|
|
a_rlink = a_ccoin->refresh_link;
|
|
|
|
b_rlink = b_ccoin->refresh_link;
|
|
|
|
FAILIF (a_rlink->blinding_key_enc_size != b_rlink->blinding_key_enc_size);
|
|
|
|
FAILIF (0 != memcmp (a_rlink->blinding_key_enc,
|
|
|
|
b_rlink->blinding_key_enc,
|
|
|
|
a_rlink->blinding_key_enc_size));
|
|
|
|
FAILIF (0 != memcmp (a_rlink->coin_priv_enc,
|
|
|
|
b_rlink->coin_priv_enc,
|
|
|
|
sizeof (a_rlink->coin_priv_enc)));
|
|
|
|
}
|
2015-08-25 11:01:15 +02:00
|
|
|
ret = GNUNET_OK;
|
|
|
|
|
2015-08-24 11:54:30 +02:00
|
|
|
drop:
|
2015-08-25 11:01:15 +02:00
|
|
|
if (NULL != ret_commit_coins)
|
|
|
|
free_refresh_commit_coins_array (ret_commit_coins, MELT_NEW_COINS);
|
|
|
|
if (NULL != commit_coins)
|
|
|
|
free_refresh_commit_coins_array (commit_coins, MELT_NEW_COINS);
|
|
|
|
return ret;
|
2015-08-24 11:54:30 +02:00
|
|
|
}
|
2015-05-26 10:06:41 +02:00
|
|
|
|
2015-08-16 23:06:28 +02:00
|
|
|
/**
|
|
|
|
* Function to test melting of coins as part of a refresh session
|
|
|
|
*
|
|
|
|
* @param session the database session
|
|
|
|
* @param refresh_session the refresh session
|
|
|
|
* @return #GNUNET_OK if everything went well; #GNUNET_SYSERR if not
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
test_melting (struct TALER_MINTDB_Session *session)
|
|
|
|
{
|
2015-08-17 23:07:32 +02:00
|
|
|
#define MELT_OLD_COINS 10
|
2015-08-16 23:06:28 +02:00
|
|
|
struct TALER_MINTDB_RefreshSession refresh_session;
|
|
|
|
struct TALER_MINTDB_RefreshSession ret_refresh_session;
|
|
|
|
struct GNUNET_HashCode session_hash;
|
|
|
|
struct DenomKeyPair *dkp;
|
2015-08-18 10:56:47 +02:00
|
|
|
struct DenomKeyPair **new_dkp;
|
2015-08-16 23:06:28 +02:00
|
|
|
/* struct TALER_CoinPublicInfo *coins; */
|
|
|
|
struct TALER_MINTDB_RefreshMelt *melts;
|
2015-08-18 11:09:07 +02:00
|
|
|
struct TALER_DenominationPublicKey *new_denom_pubs;
|
|
|
|
struct TALER_DenominationPublicKey *ret_denom_pubs;
|
2015-08-16 23:06:28 +02:00
|
|
|
unsigned int cnt;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
RND_BLK (&refresh_session);
|
|
|
|
RND_BLK (&session_hash);
|
|
|
|
melts = NULL;
|
2016-01-21 15:29:07 +01:00
|
|
|
dkp = NULL;
|
2015-08-18 10:56:47 +02:00
|
|
|
new_dkp = NULL;
|
2015-08-18 11:09:07 +02:00
|
|
|
new_denom_pubs = NULL;
|
2016-01-21 15:29:07 +01:00
|
|
|
ret_denom_pubs = NULL;
|
2015-08-16 23:06:28 +02:00
|
|
|
/* create and test a refresh session */
|
2015-08-17 23:07:32 +02:00
|
|
|
refresh_session.num_oldcoins = MELT_OLD_COINS;
|
2015-08-16 23:06:28 +02:00
|
|
|
refresh_session.num_newcoins = 1;
|
|
|
|
refresh_session.noreveal_index = 1;
|
|
|
|
FAILIF (GNUNET_OK != plugin->create_refresh_session (plugin->cls,
|
|
|
|
session,
|
|
|
|
&session_hash,
|
|
|
|
&refresh_session));
|
|
|
|
FAILIF (GNUNET_OK != plugin->get_refresh_session (plugin->cls,
|
|
|
|
session,
|
|
|
|
&session_hash,
|
|
|
|
&ret_refresh_session));
|
|
|
|
FAILIF (0 != memcmp (&ret_refresh_session,
|
|
|
|
&refresh_session,
|
|
|
|
sizeof (refresh_session)));
|
|
|
|
|
|
|
|
/* create a denomination (value: 1; fraction: 100) */
|
2016-01-21 15:29:07 +01:00
|
|
|
dkp = create_denom_key_pair (512, session,
|
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
|
|
|
&fee_refresh);
|
2015-08-17 23:07:32 +02:00
|
|
|
/* create MELT_OLD_COINS number of refresh melts */
|
|
|
|
melts = GNUNET_new_array (MELT_OLD_COINS, struct TALER_MINTDB_RefreshMelt);
|
|
|
|
for (cnt=0; cnt < MELT_OLD_COINS; cnt++)
|
2015-08-16 23:06:28 +02:00
|
|
|
{
|
|
|
|
RND_BLK (&melts[cnt].coin.coin_pub);
|
|
|
|
melts[cnt].coin.denom_sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_sign (dkp->priv.rsa_private_key,
|
|
|
|
&melts[cnt].coin.coin_pub,
|
|
|
|
sizeof (melts[cnt].coin.coin_pub));
|
|
|
|
melts[cnt].coin.denom_pub = dkp->pub;
|
|
|
|
RND_BLK (&melts[cnt].coin_sig);
|
|
|
|
melts[cnt].session_hash = session_hash;
|
|
|
|
melts[cnt].amount_with_fee = amount_with_fee;
|
2015-08-17 23:07:32 +02:00
|
|
|
melts[cnt].melt_fee = fee_refresh;
|
2015-08-16 23:06:28 +02:00
|
|
|
FAILIF (GNUNET_OK != plugin->insert_refresh_melt (plugin->cls,
|
|
|
|
session,
|
|
|
|
cnt,
|
|
|
|
&melts[cnt]));
|
|
|
|
}
|
2015-08-17 23:07:32 +02:00
|
|
|
for (cnt = 0; cnt < MELT_OLD_COINS; cnt++)
|
2015-08-17 10:19:08 +02:00
|
|
|
{
|
|
|
|
struct TALER_MINTDB_RefreshMelt ret_melt;
|
|
|
|
FAILIF (GNUNET_OK != plugin->get_refresh_melt (plugin->cls,
|
|
|
|
session,
|
|
|
|
&session_hash,
|
|
|
|
cnt,
|
|
|
|
&ret_melt));
|
|
|
|
FAILIF (0 != GNUNET_CRYPTO_rsa_signature_cmp
|
|
|
|
(ret_melt.coin.denom_sig.rsa_signature,
|
|
|
|
melts[cnt].coin.denom_sig.rsa_signature));
|
|
|
|
FAILIF (0 != memcmp (&ret_melt.coin.coin_pub,
|
|
|
|
&melts[cnt].coin.coin_pub,
|
|
|
|
sizeof (ret_melt.coin.coin_pub)));
|
|
|
|
FAILIF (0 != GNUNET_CRYPTO_rsa_public_key_cmp
|
|
|
|
(ret_melt.coin.denom_pub.rsa_public_key,
|
|
|
|
melts[cnt].coin.denom_pub.rsa_public_key));
|
|
|
|
FAILIF (0 != memcmp (&ret_melt.coin_sig,
|
|
|
|
&melts[cnt].coin_sig,
|
|
|
|
sizeof (ret_melt.coin_sig)));
|
|
|
|
FAILIF (0 != memcmp (&ret_melt.session_hash,
|
|
|
|
&melts[cnt].session_hash,
|
|
|
|
sizeof (ret_melt.session_hash)));
|
|
|
|
FAILIF (0 != TALER_amount_cmp (&ret_melt.amount_with_fee,
|
|
|
|
&melts[cnt].amount_with_fee));
|
|
|
|
FAILIF (0 != TALER_amount_cmp (&ret_melt.melt_fee,
|
|
|
|
&melts[cnt].melt_fee));
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (ret_melt.coin.denom_sig.rsa_signature);
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (ret_melt.coin.denom_pub.rsa_public_key);
|
|
|
|
}
|
2015-08-18 10:56:47 +02:00
|
|
|
new_dkp = GNUNET_new_array (MELT_NEW_COINS, struct DenomKeyPair *);
|
|
|
|
new_denom_pubs = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_DenominationPublicKey);
|
|
|
|
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
|
|
|
|
{
|
2015-08-18 11:09:07 +02:00
|
|
|
new_dkp[cnt] = create_denom_key_pair (128, session,
|
2015-08-18 10:56:47 +02:00
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
|
|
|
&fee_refresh);
|
|
|
|
new_denom_pubs[cnt]=new_dkp[cnt]->pub;
|
|
|
|
}
|
|
|
|
FAILIF (GNUNET_OK != plugin->insert_refresh_order (plugin->cls,
|
|
|
|
session,
|
|
|
|
&session_hash,
|
|
|
|
MELT_NEW_COINS,
|
|
|
|
new_denom_pubs));
|
2015-08-18 11:09:07 +02:00
|
|
|
ret_denom_pubs = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_DenominationPublicKey);
|
|
|
|
FAILIF (GNUNET_OK != plugin->get_refresh_order (plugin->cls,
|
|
|
|
session,
|
|
|
|
&session_hash,
|
|
|
|
MELT_NEW_COINS,
|
|
|
|
ret_denom_pubs));
|
|
|
|
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
|
|
|
|
{
|
|
|
|
FAILIF (0 != GNUNET_CRYPTO_rsa_public_key_cmp
|
|
|
|
(ret_denom_pubs[cnt].rsa_public_key,
|
|
|
|
new_denom_pubs[cnt].rsa_public_key));
|
|
|
|
}
|
2015-08-24 11:54:30 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
2015-08-25 11:01:15 +02:00
|
|
|
test_refresh_commit_coins (session,
|
|
|
|
&refresh_session,
|
|
|
|
&session_hash));
|
|
|
|
|
2015-08-16 23:06:28 +02:00
|
|
|
ret = GNUNET_OK;
|
|
|
|
|
|
|
|
drop:
|
2016-01-21 15:29:07 +01:00
|
|
|
if (NULL != dkp)
|
|
|
|
destroy_denom_key_pair (dkp);
|
2015-08-16 23:06:28 +02:00
|
|
|
if (NULL != melts)
|
|
|
|
{
|
2015-08-17 23:07:32 +02:00
|
|
|
for (cnt = 0; cnt < MELT_OLD_COINS; cnt++)
|
2015-08-16 23:06:28 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (melts[cnt].coin.denom_sig.rsa_signature);
|
|
|
|
GNUNET_free (melts);
|
|
|
|
}
|
2015-08-18 11:09:07 +02:00
|
|
|
for (cnt = 0;
|
|
|
|
(NULL != ret_denom_pubs) && (cnt < MELT_NEW_COINS)
|
|
|
|
&& (NULL != ret_denom_pubs[cnt].rsa_public_key);
|
|
|
|
cnt++)
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (ret_denom_pubs[cnt].rsa_public_key);
|
|
|
|
GNUNET_free_non_null (ret_denom_pubs);
|
2015-08-18 10:56:47 +02:00
|
|
|
GNUNET_free_non_null (new_denom_pubs);
|
|
|
|
for (cnt = 0;
|
|
|
|
(NULL != new_dkp) && (cnt < MELT_NEW_COINS) && (NULL != new_dkp[cnt]);
|
|
|
|
cnt++)
|
|
|
|
destroy_denom_key_pair (new_dkp[cnt]);
|
|
|
|
GNUNET_free_non_null (new_dkp);
|
2015-08-16 23:06:28 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
/**
|
|
|
|
* Main function that will be run by the scheduler.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param args remaining command-line arguments
|
|
|
|
* @param cfgfile name of the configuration file used (for saving, can be NULL!)
|
2015-03-21 14:21:00 +01:00
|
|
|
* @param cfg configuration
|
2015-03-05 15:59:22 +01:00
|
|
|
*/
|
|
|
|
static void
|
2015-03-21 14:21:00 +01:00
|
|
|
run (void *cls,
|
|
|
|
char *const *args,
|
|
|
|
const char *cfgfile,
|
|
|
|
const struct GNUNET_CONFIGURATION_Handle *cfg)
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2015-03-21 14:21:00 +01:00
|
|
|
struct TALER_MINTDB_Session *session;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
2015-03-07 13:56:26 +01:00
|
|
|
struct DenomKeyPair *dkp;
|
2015-03-28 14:39:31 +01:00
|
|
|
struct TALER_MINTDB_CollectableBlindcoin cbc;
|
|
|
|
struct TALER_MINTDB_CollectableBlindcoin cbc2;
|
|
|
|
struct TALER_MINTDB_ReserveHistory *rh;
|
|
|
|
struct TALER_MINTDB_ReserveHistory *rh_head;
|
|
|
|
struct TALER_MINTDB_BankTransfer *bt;
|
|
|
|
struct TALER_MINTDB_CollectableBlindcoin *withdraw;
|
|
|
|
struct TALER_MINTDB_Deposit deposit;
|
|
|
|
struct TALER_MINTDB_Deposit deposit2;
|
2015-06-11 13:38:47 +02:00
|
|
|
json_t *wire;
|
|
|
|
json_t *just;
|
2015-03-16 11:01:33 +01:00
|
|
|
const char * const json_wire_str =
|
|
|
|
"{ \"type\":\"SEPA\", \
|
|
|
|
\"IBAN\":\"DE67830654080004822650\", \
|
|
|
|
\"name\":\"GNUnet e.V.\", \
|
|
|
|
\"bic\":\"GENODEF1SLR\", \
|
|
|
|
\"edate\":\"1449930207000\", \
|
|
|
|
\"r\":123456789, \
|
|
|
|
\"address\": \"foobar\"}";
|
2015-03-09 17:05:35 +01:00
|
|
|
unsigned int cnt;
|
2015-03-05 15:59:22 +01:00
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
dkp = NULL;
|
2015-03-09 17:05:35 +01:00
|
|
|
rh = NULL;
|
2015-03-16 11:01:33 +01:00
|
|
|
wire = NULL;
|
2015-03-26 19:29:03 +01:00
|
|
|
session = NULL;
|
2015-03-09 15:35:35 +01:00
|
|
|
ZR_BLK (&cbc);
|
2015-03-07 14:03:01 +01:00
|
|
|
ZR_BLK (&cbc2);
|
2015-03-28 12:29:35 +01:00
|
|
|
if (NULL ==
|
|
|
|
(plugin = TALER_MINTDB_plugin_load (cfg)))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
|
|
|
result = 1;
|
|
|
|
return;
|
|
|
|
}
|
2015-03-21 14:21:00 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
plugin->create_tables (plugin->cls,
|
|
|
|
GNUNET_YES))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
|
|
|
result = 2;
|
|
|
|
goto drop;
|
|
|
|
}
|
2015-03-21 14:21:00 +01:00
|
|
|
if (NULL ==
|
|
|
|
(session = plugin->get_session (plugin->cls,
|
|
|
|
GNUNET_YES)))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
|
|
|
result = 3;
|
|
|
|
goto drop;
|
|
|
|
}
|
2015-03-07 13:56:26 +01:00
|
|
|
RND_BLK (&reserve_pub);
|
2015-06-12 11:57:10 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-08-17 23:07:32 +02:00
|
|
|
TALER_string_to_amount (CURRENCY ":1.000010",
|
|
|
|
&value));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_withdraw));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_deposit));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_refresh));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":1.000010",
|
|
|
|
&amount_with_fee));
|
|
|
|
|
2015-03-06 01:15:46 +01:00
|
|
|
result = 4;
|
2015-06-11 13:38:47 +02:00
|
|
|
just = json_loads ("{ \"justification\":\"1\" }", 0, NULL);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->reserves_in_insert (plugin->cls,
|
|
|
|
session,
|
2015-05-14 14:14:18 +02:00
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
&value,
|
2015-07-01 13:30:34 +02:00
|
|
|
GNUNET_TIME_absolute_get (),
|
2015-06-11 13:38:47 +02:00
|
|
|
just));
|
|
|
|
json_decref (just);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value,
|
|
|
|
value.fraction,
|
|
|
|
value.currency));
|
2015-06-11 13:38:47 +02:00
|
|
|
just = json_loads ("{ \"justification\":\"2\" }", 0, NULL);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->reserves_in_insert (plugin->cls,
|
|
|
|
session,
|
2015-05-14 14:14:18 +02:00
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
&value,
|
2015-07-01 13:30:34 +02:00
|
|
|
GNUNET_TIME_absolute_get (),
|
2015-06-11 13:38:47 +02:00
|
|
|
just));
|
|
|
|
json_decref (just);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value * 2,
|
|
|
|
value.fraction * 2,
|
|
|
|
value.currency));
|
|
|
|
dkp = create_denom_key_pair (1024, session,
|
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
|
|
|
&fee_refresh);
|
2015-06-11 13:02:57 +02:00
|
|
|
RND_BLK(&cbc.h_coin_envelope);
|
2015-03-07 13:56:26 +01:00
|
|
|
RND_BLK(&cbc.reserve_sig);
|
|
|
|
cbc.denom_pub = dkp->pub;
|
2015-03-22 22:14:30 +01:00
|
|
|
cbc.sig.rsa_signature
|
|
|
|
= GNUNET_CRYPTO_rsa_sign (dkp->priv.rsa_private_key,
|
2015-06-11 13:02:57 +02:00
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
sizeof (cbc.h_coin_envelope));
|
2016-01-21 16:14:40 +01:00
|
|
|
cbc.reserve_pub = reserve_pub;
|
2015-08-17 23:07:32 +02:00
|
|
|
cbc.amount_with_fee = value;
|
2015-06-11 13:02:57 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (CURRENCY, &cbc.withdraw_fee));
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
2015-06-11 12:30:14 +02:00
|
|
|
plugin->insert_withdraw_info (plugin->cls,
|
2015-06-11 13:02:57 +02:00
|
|
|
session,
|
|
|
|
&cbc));
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value,
|
|
|
|
value.fraction,
|
|
|
|
value.currency));
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_YES !=
|
2015-06-11 12:30:14 +02:00
|
|
|
plugin->get_withdraw_info (plugin->cls,
|
2015-06-11 13:02:57 +02:00
|
|
|
session,
|
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
&cbc2));
|
2015-03-22 22:14:30 +01:00
|
|
|
FAILIF (NULL == cbc2.denom_pub.rsa_public_key);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (0 != memcmp (&cbc2.reserve_sig,
|
|
|
|
&cbc.reserve_sig,
|
|
|
|
sizeof (cbc2.reserve_sig)));
|
|
|
|
FAILIF (0 != memcmp (&cbc2.reserve_pub,
|
|
|
|
&cbc.reserve_pub,
|
|
|
|
sizeof (cbc2.reserve_pub)));
|
|
|
|
FAILIF (GNUNET_OK !=
|
2015-06-11 13:02:57 +02:00
|
|
|
GNUNET_CRYPTO_rsa_verify (&cbc.h_coin_envelope,
|
2015-03-22 22:14:30 +01:00
|
|
|
cbc2.sig.rsa_signature,
|
|
|
|
dkp->pub.rsa_public_key));
|
2015-03-21 14:21:00 +01:00
|
|
|
rh = plugin->get_reserve_history (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve_pub);
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (NULL == rh);
|
2015-03-21 14:21:00 +01:00
|
|
|
rh_head = rh;
|
2015-03-09 17:05:35 +01:00
|
|
|
for (cnt=0; NULL != rh_head; rh_head=rh_head->next, cnt++)
|
|
|
|
{
|
|
|
|
switch (rh_head->type)
|
|
|
|
{
|
2015-03-28 14:39:31 +01:00
|
|
|
case TALER_MINTDB_RO_BANK_TO_MINT:
|
2015-03-09 17:05:35 +01:00
|
|
|
bt = rh_head->details.bank;
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (0 != memcmp (&bt->reserve_pub,
|
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
2015-08-17 23:07:32 +02:00
|
|
|
/* this is the amount we trasferred twice*/
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (1 != bt->amount.value);
|
2015-08-17 23:07:32 +02:00
|
|
|
FAILIF (10 != bt->amount.fraction);
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (0 != strcmp (CURRENCY, bt->amount.currency));
|
2015-06-11 13:38:47 +02:00
|
|
|
FAILIF (NULL == bt->wire);
|
2015-03-09 17:05:35 +01:00
|
|
|
break;
|
2015-03-28 14:39:31 +01:00
|
|
|
case TALER_MINTDB_RO_WITHDRAW_COIN:
|
2015-03-09 17:05:35 +01:00
|
|
|
withdraw = rh_head->details.withdraw;
|
|
|
|
FAILIF (0 != memcmp (&withdraw->reserve_pub,
|
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
|
|
|
FAILIF (0 != memcmp (&withdraw->h_coin_envelope,
|
2015-06-11 13:02:57 +02:00
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
sizeof (cbc.h_coin_envelope)));
|
2015-03-09 17:05:35 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
FAILIF (3 != cnt);
|
2015-03-16 11:01:33 +01:00
|
|
|
/* Tests for deposits */
|
2015-06-11 14:25:42 +02:00
|
|
|
memset (&deposit, 0, sizeof (deposit));
|
2015-03-16 11:01:33 +01:00
|
|
|
RND_BLK (&deposit.coin.coin_pub);
|
|
|
|
deposit.coin.denom_pub = dkp->pub;
|
|
|
|
deposit.coin.denom_sig = cbc.sig;
|
|
|
|
RND_BLK (&deposit.csig);
|
|
|
|
RND_BLK (&deposit.merchant_pub);
|
|
|
|
RND_BLK (&deposit.h_contract);
|
|
|
|
RND_BLK (&deposit.h_wire);
|
|
|
|
wire = json_loads (json_wire_str, 0, NULL);
|
|
|
|
deposit.wire = wire;
|
|
|
|
deposit.transaction_id =
|
|
|
|
GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK, UINT64_MAX);
|
2015-08-17 23:07:32 +02:00
|
|
|
deposit.amount_with_fee = value;
|
2015-06-11 14:25:42 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (CURRENCY, &deposit.deposit_fee));
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->insert_deposit (plugin->cls,
|
|
|
|
session, &deposit));
|
|
|
|
FAILIF (GNUNET_YES !=
|
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit));
|
2016-01-21 16:14:40 +01:00
|
|
|
deposit2 = deposit;
|
2015-03-16 11:01:33 +01:00
|
|
|
deposit2.transaction_id++; /* should fail if transaction id is different */
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_NO !=
|
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit2));
|
2015-03-16 11:01:33 +01:00
|
|
|
deposit2.transaction_id = deposit.transaction_id;
|
|
|
|
RND_BLK (&deposit2.merchant_pub); /* should fail if merchant is different */
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_NO !=
|
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit2));
|
2016-01-21 16:14:40 +01:00
|
|
|
deposit2.merchant_pub = deposit.merchant_pub;
|
2015-03-16 11:01:33 +01:00
|
|
|
RND_BLK (&deposit2.coin.coin_pub); /* should fail if coin is different */
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_NO !=
|
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit2));
|
2015-08-16 23:06:28 +02:00
|
|
|
FAILIF (GNUNET_OK != test_melting (session));
|
2015-03-05 15:59:22 +01:00
|
|
|
result = 0;
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
drop:
|
2015-03-16 11:01:33 +01:00
|
|
|
if (NULL != wire)
|
|
|
|
json_decref (wire);
|
2015-03-09 17:05:35 +01:00
|
|
|
if (NULL != rh)
|
2015-03-22 13:02:49 +01:00
|
|
|
plugin->free_reserve_history (plugin->cls,
|
|
|
|
rh);
|
2015-03-09 17:05:35 +01:00
|
|
|
rh = NULL;
|
2015-03-21 14:21:00 +01:00
|
|
|
if (NULL != session)
|
|
|
|
GNUNET_break (GNUNET_OK ==
|
|
|
|
plugin->drop_temporary (plugin->cls,
|
|
|
|
session));
|
2015-03-07 13:56:26 +01:00
|
|
|
if (NULL != dkp)
|
2015-04-12 17:16:21 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
2015-03-22 22:14:30 +01:00
|
|
|
if (NULL != cbc.sig.rsa_signature)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cbc.sig.rsa_signature);
|
|
|
|
if (NULL != cbc2.denom_pub.rsa_public_key)
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (cbc2.denom_pub.rsa_public_key);
|
|
|
|
if (NULL != cbc2.sig.rsa_signature)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cbc2.sig.rsa_signature);
|
2015-03-07 13:56:26 +01:00
|
|
|
dkp = NULL;
|
2015-03-28 12:29:35 +01:00
|
|
|
TALER_MINTDB_plugin_unload (plugin);
|
|
|
|
plugin = NULL;
|
2015-03-05 15:59:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
2015-03-21 14:21:00 +01:00
|
|
|
main (int argc,
|
|
|
|
char *const argv[])
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
|
|
|
static const struct GNUNET_GETOPT_CommandLineOption options[] = {
|
|
|
|
GNUNET_GETOPT_OPTION_END
|
|
|
|
};
|
2015-03-27 19:58:40 +01:00
|
|
|
char *argv2[] = {
|
2015-03-26 18:31:59 +01:00
|
|
|
"test-mint-db-<plugin_name>", /* will be replaced later */
|
|
|
|
"-c", "test-mint-db-<plugin_name>.conf", /* will be replaced later */
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
const char *plugin_name;
|
|
|
|
char *config_filename;
|
2015-03-26 18:36:52 +01:00
|
|
|
char *testname;
|
2015-03-05 15:59:22 +01:00
|
|
|
|
|
|
|
result = -1;
|
2015-03-26 18:31:59 +01:00
|
|
|
if (NULL == (plugin_name = strrchr (argv[0], (int) '-')))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
plugin_name++;
|
2015-03-26 18:36:52 +01:00
|
|
|
(void) GNUNET_asprintf (&testname,
|
|
|
|
"test-mint-db-%s", plugin_name);
|
2015-03-26 18:31:59 +01:00
|
|
|
(void) GNUNET_asprintf (&config_filename,
|
2015-03-26 18:36:52 +01:00
|
|
|
"%s.conf", testname);
|
2015-03-26 18:31:59 +01:00
|
|
|
argv2[0] = argv[0];
|
|
|
|
argv2[2] = config_filename;
|
2015-03-05 15:59:22 +01:00
|
|
|
if (GNUNET_OK !=
|
2015-03-26 18:31:59 +01:00
|
|
|
GNUNET_PROGRAM_run ((sizeof (argv2)/sizeof (char *)) - 1, argv2,
|
2015-03-26 18:36:52 +01:00
|
|
|
testname,
|
2015-03-05 15:59:22 +01:00
|
|
|
"Test cases for mint database helper functions.",
|
|
|
|
options, &run, NULL))
|
2015-03-26 18:31:59 +01:00
|
|
|
{
|
|
|
|
GNUNET_free (config_filename);
|
2015-03-26 18:36:52 +01:00
|
|
|
GNUNET_free (testname);
|
2015-03-05 15:59:22 +01:00
|
|
|
return 3;
|
2015-03-26 18:31:59 +01:00
|
|
|
}
|
|
|
|
GNUNET_free (config_filename);
|
2015-03-26 18:36:52 +01:00
|
|
|
GNUNET_free (testname);
|
2015-03-05 15:59:22 +01:00
|
|
|
return result;
|
|
|
|
}
|