2015-03-05 15:59:22 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2018-04-02 14:24:45 +02:00
|
|
|
Copyright (C) 2014-2018 Taler Systems SA
|
2015-03-05 15:59:22 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
|
2015-03-05 15:59:22 +01:00
|
|
|
*/
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @file exchangedb/test_exchangedb.c
|
2015-03-05 15:59:22 +01:00
|
|
|
* @brief test cases for DB interaction functions
|
2016-04-20 01:50:26 +02:00
|
|
|
* @author Sree Harsha Totakura
|
|
|
|
* @author Christian Grothoff
|
2016-10-20 23:28:36 +02:00
|
|
|
* @author Marcello Stanisci
|
2015-03-05 15:59:22 +01:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2016-03-01 15:35:04 +01:00
|
|
|
#include "taler_exchangedb_lib.h"
|
2016-04-06 10:22:09 +02:00
|
|
|
#include "taler_json_lib.h"
|
2016-03-01 15:35:04 +01:00
|
|
|
#include "taler_exchangedb_plugin.h"
|
2015-03-05 15:59:22 +01:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Global result from the testcase.
|
|
|
|
*/
|
2015-03-05 15:59:22 +01:00
|
|
|
static int result;
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Report line of error if @a cond is true, and jump to label "drop".
|
|
|
|
*/
|
2015-03-06 01:15:46 +01:00
|
|
|
#define FAILIF(cond) \
|
|
|
|
do { \
|
2019-08-25 16:18:24 +02:00
|
|
|
if (! (cond)) { break;} \
|
2015-03-06 01:15:46 +01:00
|
|
|
GNUNET_break (0); \
|
|
|
|
goto drop; \
|
|
|
|
} while (0)
|
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Initializes @a ptr with random data.
|
|
|
|
*/
|
2015-03-07 13:56:26 +01:00
|
|
|
#define RND_BLK(ptr) \
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*ptr))
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Initializes @a ptr with zeros.
|
|
|
|
*/
|
2015-03-07 14:03:01 +01:00
|
|
|
#define ZR_BLK(ptr) \
|
|
|
|
memset (ptr, 0, sizeof (*ptr))
|
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
2019-08-17 21:35:21 +02:00
|
|
|
* Currency we use. Must match test-exchange-db-*.conf.
|
2016-05-08 15:44:44 +02:00
|
|
|
*/
|
2015-03-09 17:05:35 +01:00
|
|
|
#define CURRENCY "EUR"
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Database plugin under test.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
static struct TALER_EXCHANGEDB_Plugin *plugin;
|
2015-03-28 12:29:35 +01:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
|
2016-05-08 15:51:40 +02:00
|
|
|
/**
|
|
|
|
* Callback that should never be called.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
dead_prepare_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2016-05-08 15:51:40 +02:00
|
|
|
const char *wire_method,
|
|
|
|
const char *buf,
|
|
|
|
size_t buf_size)
|
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) rowid;
|
|
|
|
(void) wire_method;
|
|
|
|
(void) buf;
|
|
|
|
(void) buf_size;
|
2016-05-08 15:51:40 +02:00
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
|
2016-11-17 14:31:44 +01:00
|
|
|
|
2016-05-08 15:51:40 +02:00
|
|
|
/**
|
|
|
|
* Callback that is called with wire prepare data
|
|
|
|
* and then marks it as finished.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
mark_prepare_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2016-05-08 15:51:40 +02:00
|
|
|
const char *wire_method,
|
|
|
|
const char *buf,
|
|
|
|
size_t buf_size)
|
|
|
|
{
|
|
|
|
struct TALER_EXCHANGEDB_Session *session = cls;
|
|
|
|
|
|
|
|
GNUNET_assert (11 == buf_size);
|
|
|
|
GNUNET_assert (0 == strcasecmp (wire_method,
|
|
|
|
"testcase"));
|
|
|
|
GNUNET_assert (0 == memcmp (buf,
|
|
|
|
"hello world",
|
|
|
|
buf_size));
|
2017-06-24 16:15:42 +02:00
|
|
|
GNUNET_break (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT ==
|
2016-05-08 15:51:40 +02:00
|
|
|
plugin->wire_prepare_data_mark_finished (plugin->cls,
|
|
|
|
session,
|
|
|
|
rowid));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Test API relating to persisting the wire plugins preparation data.
|
|
|
|
*
|
|
|
|
* @param session database session to use for the test
|
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
test_wire_prepare (struct TALER_EXCHANGEDB_Session *session)
|
|
|
|
{
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-08 15:51:40 +02:00
|
|
|
plugin->wire_prepare_data_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&dead_prepare_cb,
|
|
|
|
NULL));
|
2017-06-24 00:41:41 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-08 15:51:40 +02:00
|
|
|
plugin->wire_prepare_data_insert (plugin->cls,
|
|
|
|
session,
|
|
|
|
"testcase",
|
|
|
|
"hello world",
|
|
|
|
11));
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-08 15:51:40 +02:00
|
|
|
plugin->wire_prepare_data_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&mark_prepare_cb,
|
|
|
|
session));
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-08 15:51:40 +02:00
|
|
|
plugin->wire_prepare_data_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&dead_prepare_cb,
|
|
|
|
NULL));
|
2016-05-08 15:44:44 +02:00
|
|
|
return GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2016-05-08 15:51:40 +02:00
|
|
|
return GNUNET_SYSERR;
|
2016-05-08 15:44:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-06 16:08:39 +01:00
|
|
|
/**
|
|
|
|
* Checks if the given reserve has the given amount of balance and expiry
|
|
|
|
*
|
2015-03-21 14:21:00 +01:00
|
|
|
* @param session the database connection
|
2015-03-06 16:08:39 +01:00
|
|
|
* @param pub the public key of the reserve
|
|
|
|
* @param value balance value
|
|
|
|
* @param fraction balance fraction
|
|
|
|
* @param currency currency of the reserve
|
|
|
|
* @return #GNUNET_OK if the given reserve has the same balance and expiration
|
|
|
|
* as the given parameters; #GNUNET_SYSERR if not
|
|
|
|
*/
|
2015-03-21 14:21:00 +01:00
|
|
|
static int
|
2016-03-01 15:35:04 +01:00
|
|
|
check_reserve (struct TALER_EXCHANGEDB_Session *session,
|
2015-03-27 19:58:40 +01:00
|
|
|
const struct TALER_ReservePublicKeyP *pub,
|
2015-03-26 19:29:03 +01:00
|
|
|
uint64_t value,
|
2015-03-21 14:21:00 +01:00
|
|
|
uint32_t fraction,
|
2015-06-11 13:14:59 +02:00
|
|
|
const char *currency)
|
2015-03-06 16:08:39 +01:00
|
|
|
{
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_Reserve reserve;
|
2015-03-22 22:14:30 +01:00
|
|
|
|
|
|
|
reserve.pub = *pub;
|
2017-06-11 02:12:56 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2020-03-05 23:02:38 +01:00
|
|
|
plugin->reserves_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve));
|
2015-03-06 16:08:39 +01:00
|
|
|
FAILIF (value != reserve.balance.value);
|
|
|
|
FAILIF (fraction != reserve.balance.fraction);
|
|
|
|
FAILIF (0 != strcmp (currency, reserve.balance.currency));
|
|
|
|
|
|
|
|
return GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2015-03-06 16:08:39 +01:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
struct DenomKeyPair
|
|
|
|
{
|
2015-03-22 22:14:30 +01:00
|
|
|
struct TALER_DenominationPrivateKey priv;
|
|
|
|
struct TALER_DenominationPublicKey pub;
|
2015-03-07 13:56:26 +01:00
|
|
|
};
|
|
|
|
|
2015-03-21 14:21:00 +01:00
|
|
|
|
2015-05-26 10:06:41 +02:00
|
|
|
/**
|
2015-08-17 23:07:32 +02:00
|
|
|
* Destroy a denomination key pair. The key is not necessarily removed from the DB.
|
2015-05-26 10:06:41 +02:00
|
|
|
*
|
2015-08-17 23:07:32 +02:00
|
|
|
* @param dkp the keypair to destroy
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
destroy_denom_key_pair (struct DenomKeyPair *dkp)
|
|
|
|
{
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (dkp->pub.rsa_public_key);
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dkp->priv.rsa_private_key);
|
|
|
|
GNUNET_free (dkp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a denominaiton key pair by registering the denomination in the DB.
|
|
|
|
*
|
|
|
|
* @param size the size of the denomination key
|
2015-05-26 10:06:41 +02:00
|
|
|
* @param session the DB session
|
2016-05-31 10:39:11 +02:00
|
|
|
* @param now time to use for key generation, legal expiration will be 3h later.
|
|
|
|
* @param fee_withdraw withdraw fee to use
|
|
|
|
* @param fee_deposit deposit fee to use
|
|
|
|
* @param fee_refresh refresh fee to use
|
|
|
|
* @param fee_refund refund fee to use
|
2015-08-17 23:07:32 +02:00
|
|
|
* @return the denominaiton key pair; NULL upon error
|
2015-05-26 10:06:41 +02:00
|
|
|
*/
|
2015-08-17 23:07:32 +02:00
|
|
|
static struct DenomKeyPair *
|
|
|
|
create_denom_key_pair (unsigned int size,
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_Session *session,
|
2016-05-31 10:39:11 +02:00
|
|
|
struct GNUNET_TIME_Absolute now,
|
2015-08-17 23:07:32 +02:00
|
|
|
const struct TALER_Amount *value,
|
|
|
|
const struct TALER_Amount *fee_withdraw,
|
|
|
|
const struct TALER_Amount *fee_deposit,
|
2016-04-20 01:50:26 +02:00
|
|
|
const struct TALER_Amount *fee_refresh,
|
|
|
|
const struct TALER_Amount *fee_refund)
|
2015-05-26 10:06:41 +02:00
|
|
|
{
|
2015-08-17 23:07:32 +02:00
|
|
|
struct DenomKeyPair *dkp;
|
2020-03-04 11:51:00 +01:00
|
|
|
struct TALER_EXCHANGEDB_DenominationKey dki;
|
2016-05-06 23:51:15 +02:00
|
|
|
struct TALER_EXCHANGEDB_DenominationKeyInformationP issue2;
|
2015-06-11 14:58:23 +02:00
|
|
|
|
2015-08-17 23:07:32 +02:00
|
|
|
dkp = GNUNET_new (struct DenomKeyPair);
|
|
|
|
dkp->priv.rsa_private_key = GNUNET_CRYPTO_rsa_private_key_create (size);
|
|
|
|
GNUNET_assert (NULL != dkp->priv.rsa_private_key);
|
|
|
|
dkp->pub.rsa_public_key
|
|
|
|
= GNUNET_CRYPTO_rsa_private_key_get_public (dkp->priv.rsa_private_key);
|
|
|
|
|
2015-06-11 14:58:23 +02:00
|
|
|
/* Using memset() as fields like master key and signature
|
|
|
|
are not properly initialized for this test. */
|
|
|
|
memset (&dki,
|
|
|
|
0,
|
2020-03-04 11:51:00 +01:00
|
|
|
sizeof (struct TALER_EXCHANGEDB_DenominationKey));
|
2015-08-17 23:07:32 +02:00
|
|
|
dki.denom_pub = dkp->pub;
|
2016-05-06 23:51:15 +02:00
|
|
|
GNUNET_TIME_round_abs (&now);
|
|
|
|
dki.issue.properties.start = GNUNET_TIME_absolute_hton (now);
|
2015-07-06 10:16:49 +02:00
|
|
|
dki.issue.properties.expire_withdraw = GNUNET_TIME_absolute_hton
|
2019-08-25 16:18:24 +02:00
|
|
|
(GNUNET_TIME_absolute_add (now,
|
|
|
|
GNUNET_TIME_UNIT_HOURS));
|
2016-05-02 05:10:40 +02:00
|
|
|
dki.issue.properties.expire_deposit = GNUNET_TIME_absolute_hton
|
2019-08-25 16:18:24 +02:00
|
|
|
(GNUNET_TIME_absolute_add
|
|
|
|
(now,
|
|
|
|
GNUNET_TIME_relative_multiply (
|
|
|
|
GNUNET_TIME_UNIT_HOURS, 2)));
|
2015-07-06 10:16:49 +02:00
|
|
|
dki.issue.properties.expire_legal = GNUNET_TIME_absolute_hton
|
2019-08-25 16:18:24 +02:00
|
|
|
(GNUNET_TIME_absolute_add
|
|
|
|
(now,
|
|
|
|
GNUNET_TIME_relative_multiply (
|
|
|
|
GNUNET_TIME_UNIT_HOURS, 3)));
|
2015-08-17 23:07:32 +02:00
|
|
|
TALER_amount_hton (&dki.issue.properties.value, value);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_withdraw, fee_withdraw);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_deposit, fee_deposit);
|
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_refresh, fee_refresh);
|
2016-04-20 01:50:26 +02:00
|
|
|
TALER_amount_hton (&dki.issue.properties.fee_refund, fee_refund);
|
2015-08-17 23:07:32 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&dki.issue.properties.denom_hash);
|
2016-05-06 23:51:15 +02:00
|
|
|
|
2019-08-25 16:18:24 +02:00
|
|
|
dki.issue.properties.purpose.size = htonl (sizeof (struct
|
|
|
|
TALER_DenominationKeyValidityPS));
|
|
|
|
dki.issue.properties.purpose.purpose = htonl (
|
|
|
|
TALER_SIGNATURE_MASTER_DENOMINATION_KEY_VALIDITY);
|
2017-06-15 22:10:12 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-06-12 10:49:14 +02:00
|
|
|
plugin->insert_denomination_info (plugin->cls,
|
|
|
|
session,
|
2015-08-17 23:07:32 +02:00
|
|
|
&dki.denom_pub,
|
2015-06-12 10:49:14 +02:00
|
|
|
&dki.issue))
|
2015-05-26 10:06:41 +02:00
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_break (0);
|
2015-08-17 23:07:32 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return NULL;
|
2015-05-26 10:06:41 +02:00
|
|
|
}
|
2017-06-23 13:16:12 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->get_denomination_info (plugin->cls,
|
|
|
|
session,
|
2019-05-02 21:16:51 +02:00
|
|
|
&dki.issue.properties.denom_hash,
|
2016-05-06 23:51:15 +02:00
|
|
|
&issue2))
|
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_break (0);
|
2016-05-06 23:51:15 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return NULL;
|
|
|
|
}
|
2019-04-08 20:15:16 +02:00
|
|
|
if (0 != GNUNET_memcmp (&dki.issue,
|
|
|
|
&issue2))
|
2016-05-06 23:51:15 +02:00
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_break (0);
|
2016-05-06 23:51:15 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-03-07 13:56:26 +01:00
|
|
|
return dkp;
|
|
|
|
}
|
|
|
|
|
2019-10-31 12:59:50 +01:00
|
|
|
|
2015-08-17 23:07:32 +02:00
|
|
|
static struct TALER_Amount value;
|
|
|
|
static struct TALER_Amount fee_withdraw;
|
|
|
|
static struct TALER_Amount fee_deposit;
|
|
|
|
static struct TALER_Amount fee_refresh;
|
2016-04-20 01:50:26 +02:00
|
|
|
static struct TALER_Amount fee_refund;
|
2017-04-20 09:04:20 +02:00
|
|
|
static struct TALER_Amount fee_closing;
|
2015-08-17 23:07:32 +02:00
|
|
|
static struct TALER_Amount amount_with_fee;
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2016-05-02 01:30:13 +02:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Number of newly minted coins to use in the test.
|
|
|
|
*/
|
2015-08-25 11:01:15 +02:00
|
|
|
#define MELT_NEW_COINS 5
|
|
|
|
|
2016-05-19 17:47:27 +02:00
|
|
|
/**
|
|
|
|
* Which index was 'randomly' chosen for the reveal for the test?
|
|
|
|
*/
|
|
|
|
#define MELT_NOREVEAL_INDEX 1
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
2017-11-27 23:42:17 +01:00
|
|
|
* How big do we make the coin envelopes?
|
2016-05-08 15:44:44 +02:00
|
|
|
*/
|
2016-04-20 01:50:26 +02:00
|
|
|
#define COIN_ENC_MAX_SIZE 512
|
2016-08-11 23:28:33 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
static struct TALER_EXCHANGEDB_RefreshRevealedCoin *revealed_coins;
|
2015-05-26 10:06:41 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
static struct TALER_TransferPrivateKeyP tprivs[TALER_CNC_KAPPA];
|
2016-05-02 01:30:13 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
static struct TALER_TransferPublicKeyP tpub;
|
2016-05-19 17:11:35 +02:00
|
|
|
|
|
|
|
|
2016-05-08 16:07:17 +02:00
|
|
|
/**
|
2017-11-27 23:42:17 +01:00
|
|
|
* Function called with information about a refresh order. This
|
|
|
|
* one should not be called in a successful test.
|
2016-05-08 16:07:17 +02:00
|
|
|
*
|
2017-11-27 23:42:17 +01:00
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the row in our database
|
2020-03-05 23:49:47 +01:00
|
|
|
* @param num_freshcoins size of the @a rrcs array
|
|
|
|
* @param rrcs array of @a num_freshcoins information about coins to be created
|
2017-11-27 23:42:17 +01:00
|
|
|
* @param num_tprivs number of entries in @a tprivs, should be #TALER_CNC_KAPPA - 1
|
|
|
|
* @param tprivs array of @e num_tprivs transfer private keys
|
|
|
|
* @param tp transfer public key information
|
2016-05-08 16:07:17 +02:00
|
|
|
*/
|
2017-11-27 23:42:17 +01:00
|
|
|
static void
|
|
|
|
never_called_cb (void *cls,
|
2020-03-05 23:49:47 +01:00
|
|
|
uint32_t num_freshcoins,
|
2017-11-27 23:42:17 +01:00
|
|
|
const struct TALER_EXCHANGEDB_RefreshRevealedCoin *rrcs,
|
|
|
|
unsigned int num_tprivs,
|
|
|
|
const struct TALER_TransferPrivateKeyP *tprivs,
|
|
|
|
const struct TALER_TransferPublicKeyP *tp)
|
2016-05-08 16:07:17 +02:00
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) num_freshcoins;
|
|
|
|
(void) rrcs;
|
|
|
|
(void) num_tprivs;
|
|
|
|
(void) tprivs;
|
|
|
|
(void) tp;
|
2017-11-27 23:42:17 +01:00
|
|
|
GNUNET_assert (0); /* should never be called! */
|
2016-05-08 16:07:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-19 17:47:27 +02:00
|
|
|
/**
|
2017-11-27 23:42:17 +01:00
|
|
|
* Function called with information about a refresh order.
|
|
|
|
* Checks that the response matches what we expect to see.
|
2016-05-19 17:47:27 +02:00
|
|
|
*
|
|
|
|
* @param cls closure
|
2017-11-27 23:42:17 +01:00
|
|
|
* @param rowid unique serial ID for the row in our database
|
2020-03-05 23:49:47 +01:00
|
|
|
* @param num_freshcoins size of the @a rrcs array
|
|
|
|
* @param rrcs array of @a num_freshcoins information about coins to be created
|
2017-11-27 23:42:17 +01:00
|
|
|
* @param num_tprivs number of entries in @a tprivs, should be #TALER_CNC_KAPPA - 1
|
|
|
|
* @param tprivsr array of @e num_tprivs transfer private keys
|
|
|
|
* @param tpr transfer public key information
|
2016-05-19 17:47:27 +02:00
|
|
|
*/
|
|
|
|
static void
|
2020-03-27 17:28:33 +01:00
|
|
|
check_refresh_reveal_cb (
|
|
|
|
void *cls,
|
|
|
|
uint32_t num_freshcoins,
|
|
|
|
const struct TALER_EXCHANGEDB_RefreshRevealedCoin *rrcs,
|
|
|
|
unsigned int num_tprivs,
|
|
|
|
const struct TALER_TransferPrivateKeyP *tprivsr,
|
|
|
|
const struct TALER_TransferPublicKeyP *tpr)
|
2016-05-19 17:47:27 +02:00
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
2017-11-27 23:42:17 +01:00
|
|
|
/* compare the refresh commit coin arrays */
|
2020-03-05 23:49:47 +01:00
|
|
|
for (unsigned int cnt = 0; cnt < num_freshcoins; cnt++)
|
2017-11-27 23:42:17 +01:00
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct TALER_EXCHANGEDB_RefreshRevealedCoin *acoin =
|
|
|
|
&revealed_coins[cnt];
|
2017-11-27 23:42:17 +01:00
|
|
|
const struct TALER_EXCHANGEDB_RefreshRevealedCoin *bcoin = &rrcs[cnt];
|
|
|
|
|
|
|
|
GNUNET_assert (acoin->coin_ev_size == bcoin->coin_ev_size);
|
|
|
|
GNUNET_assert (0 ==
|
2019-04-08 20:15:16 +02:00
|
|
|
GNUNET_memcmp (acoin->coin_ev,
|
|
|
|
bcoin->coin_ev));
|
2017-11-27 23:42:17 +01:00
|
|
|
GNUNET_assert (0 ==
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_cmp (
|
|
|
|
acoin->denom_pub.rsa_public_key,
|
|
|
|
bcoin->denom_pub.
|
|
|
|
rsa_public_key));
|
2017-11-27 23:42:17 +01:00
|
|
|
}
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (&tpub, tpr));
|
|
|
|
GNUNET_assert (0 == memcmp (tprivs, tprivsr,
|
|
|
|
sizeof(struct TALER_TransferPrivateKeyP)
|
|
|
|
* (TALER_CNC_KAPPA - 1)));
|
2016-05-19 17:47:27 +02:00
|
|
|
}
|
|
|
|
|
2017-03-17 14:09:58 +01:00
|
|
|
|
2017-03-18 02:40:27 +01:00
|
|
|
/**
|
|
|
|
* Counter used in auditor-related db functions. Used to count
|
|
|
|
* expected rows.
|
|
|
|
*/
|
|
|
|
static unsigned int auditor_row_cnt;
|
|
|
|
|
|
|
|
|
2016-10-20 23:28:36 +02:00
|
|
|
/**
|
|
|
|
* Function called with details about coins that were melted,
|
|
|
|
* with the goal of auditing the refresh's execution.
|
|
|
|
*
|
2017-03-17 14:09:58 +01:00
|
|
|
*
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the refresh session in our DB
|
2017-03-19 01:55:37 +01:00
|
|
|
* @param denom_pub denomination of the @a coin_pub
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param coin_sig signature from the coin
|
|
|
|
* @param amount_with_fee amount that was deposited including fee
|
2020-03-05 23:49:47 +01:00
|
|
|
* @param num_freshcoins how many coins were issued
|
2017-03-17 14:09:58 +01:00
|
|
|
* @param noreveal_index which index was picked by the exchange in cut-and-choose
|
2017-11-27 23:42:17 +01:00
|
|
|
* @param rc what is the session hash
|
2016-10-20 23:28:36 +02:00
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
2017-03-17 14:09:58 +01:00
|
|
|
static int
|
2016-10-20 23:28:36 +02:00
|
|
|
audit_refresh_session_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2017-03-19 01:55:37 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_CoinSpendSignatureP *coin_sig,
|
|
|
|
const struct TALER_Amount *amount_with_fee,
|
2017-11-27 23:42:17 +01:00
|
|
|
uint32_t noreveal_index,
|
|
|
|
const struct TALER_RefreshCommitmentP *rc)
|
2016-10-20 23:28:36 +02:00
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) rowid;
|
|
|
|
(void) denom_pub;
|
|
|
|
(void) coin_sig;
|
|
|
|
(void) amount_with_fee;
|
|
|
|
(void) noreveal_index;
|
|
|
|
(void) rc;
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt++;
|
2016-10-20 23:28:36 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
2016-05-19 17:47:27 +02:00
|
|
|
|
2017-03-18 02:40:27 +01:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
/**
|
|
|
|
* Denomination keys used for fresh coins in melt test.
|
|
|
|
*/
|
|
|
|
static struct DenomKeyPair **new_dkp;
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with the session hashes and transfer secret
|
|
|
|
* information for a given coin.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param transfer_pub public transfer key for the session
|
|
|
|
* @param ldl link data for @a transfer_pub
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
handle_link_data_cb (void *cls,
|
|
|
|
const struct TALER_TransferPublicKeyP *transfer_pub,
|
2020-03-04 12:10:11 +01:00
|
|
|
const struct TALER_EXCHANGEDB_LinkList *ldl)
|
2017-11-27 23:42:17 +01:00
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) transfer_pub;
|
2020-03-04 12:10:11 +01:00
|
|
|
for (const struct TALER_EXCHANGEDB_LinkList *ldlp = ldl;
|
2017-11-27 23:42:17 +01:00
|
|
|
NULL != ldlp;
|
|
|
|
ldlp = ldlp->next)
|
|
|
|
{
|
|
|
|
int found;
|
|
|
|
|
|
|
|
found = GNUNET_NO;
|
2019-08-25 16:18:24 +02:00
|
|
|
for (unsigned int cnt = 0; cnt < MELT_NEW_COINS; cnt++)
|
2017-11-27 23:42:17 +01:00
|
|
|
{
|
|
|
|
GNUNET_assert (NULL != ldlp->ev_sig.rsa_signature);
|
|
|
|
if ( (0 ==
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_cmp (ldlp->denom_pub.rsa_public_key,
|
2019-08-25 16:18:24 +02:00
|
|
|
new_dkp[cnt]->pub.rsa_public_key))
|
|
|
|
&&
|
2017-11-27 23:42:17 +01:00
|
|
|
(0 ==
|
|
|
|
GNUNET_CRYPTO_rsa_signature_cmp (ldlp->ev_sig.rsa_signature,
|
2019-08-25 16:18:24 +02:00
|
|
|
revealed_coins[cnt].coin_sig.
|
|
|
|
rsa_signature)) )
|
2017-11-27 23:42:17 +01:00
|
|
|
{
|
|
|
|
found = GNUNET_YES;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_NO != found);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-16 23:06:28 +02:00
|
|
|
/**
|
|
|
|
* Function to test melting of coins as part of a refresh session
|
|
|
|
*
|
|
|
|
* @param session the database session
|
|
|
|
* @param refresh_session the refresh session
|
|
|
|
* @return #GNUNET_OK if everything went well; #GNUNET_SYSERR if not
|
|
|
|
*/
|
|
|
|
static int
|
2016-03-01 15:35:04 +01:00
|
|
|
test_melting (struct TALER_EXCHANGEDB_Session *session)
|
2015-08-16 23:06:28 +02:00
|
|
|
{
|
2020-03-04 12:10:11 +01:00
|
|
|
struct TALER_EXCHANGEDB_Refresh refresh_session;
|
|
|
|
struct TALER_EXCHANGEDB_Melt ret_refresh_session;
|
2015-08-16 23:06:28 +02:00
|
|
|
struct DenomKeyPair *dkp;
|
2015-08-18 11:09:07 +02:00
|
|
|
struct TALER_DenominationPublicKey *new_denom_pubs;
|
2015-08-16 23:06:28 +02:00
|
|
|
int ret;
|
2017-06-20 13:40:17 +02:00
|
|
|
enum GNUNET_DB_QueryStatus qs;
|
2017-11-30 17:17:37 +01:00
|
|
|
struct GNUNET_TIME_Absolute now;
|
2015-08-16 23:06:28 +02:00
|
|
|
|
|
|
|
ret = GNUNET_SYSERR;
|
|
|
|
RND_BLK (&refresh_session);
|
2016-01-21 15:29:07 +01:00
|
|
|
dkp = NULL;
|
2015-08-18 10:56:47 +02:00
|
|
|
new_dkp = NULL;
|
2015-08-18 11:09:07 +02:00
|
|
|
new_denom_pubs = NULL;
|
2015-08-16 23:06:28 +02:00
|
|
|
/* create and test a refresh session */
|
2016-05-19 17:47:27 +02:00
|
|
|
refresh_session.noreveal_index = MELT_NOREVEAL_INDEX;
|
2015-08-16 23:06:28 +02:00
|
|
|
/* create a denomination (value: 1; fraction: 100) */
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
GNUNET_TIME_round_abs (&now);
|
2016-05-16 11:55:47 +02:00
|
|
|
dkp = create_denom_key_pair (512,
|
|
|
|
session,
|
2017-11-30 17:17:37 +01:00
|
|
|
now,
|
2016-01-21 15:29:07 +01:00
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
2016-04-20 01:50:26 +02:00
|
|
|
&fee_refresh,
|
2019-08-25 16:18:24 +02:00
|
|
|
&fee_refund);
|
2017-10-06 22:19:13 +02:00
|
|
|
GNUNET_assert (NULL != dkp);
|
2016-05-16 11:55:47 +02:00
|
|
|
/* initialize refresh session melt data */
|
2015-08-16 23:06:28 +02:00
|
|
|
{
|
2016-04-01 20:18:18 +02:00
|
|
|
struct GNUNET_HashCode hc;
|
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
RND_BLK (&refresh_session.coin.coin_pub);
|
|
|
|
GNUNET_CRYPTO_hash (&refresh_session.coin.coin_pub,
|
|
|
|
sizeof (refresh_session.coin.coin_pub),
|
2016-04-01 20:18:18 +02:00
|
|
|
&hc);
|
2017-11-27 23:42:17 +01:00
|
|
|
refresh_session.coin.denom_sig.rsa_signature =
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
|
|
|
|
&hc);
|
2017-11-27 23:42:17 +01:00
|
|
|
GNUNET_assert (NULL != refresh_session.coin.denom_sig.rsa_signature);
|
2019-05-02 21:16:51 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&refresh_session.coin.denom_pub_hash);
|
2017-11-27 23:42:17 +01:00
|
|
|
refresh_session.amount_with_fee = amount_with_fee;
|
2015-08-16 23:06:28 +02:00
|
|
|
}
|
2016-05-16 11:55:47 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
/* test insert_melt & get_melt */
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
|
|
|
plugin->get_melt (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.rc,
|
|
|
|
&ret_refresh_session));
|
2018-08-19 16:01:57 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->ensure_coin_known (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.coin));
|
2017-06-22 11:49:40 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2019-08-25 16:18:24 +02:00
|
|
|
plugin->insert_melt (plugin->cls,
|
2017-11-27 23:42:17 +01:00
|
|
|
session,
|
|
|
|
&refresh_session));
|
2017-06-20 22:30:15 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2019-08-25 16:18:24 +02:00
|
|
|
plugin->get_melt (plugin->cls,
|
2017-11-27 23:42:17 +01:00
|
|
|
session,
|
|
|
|
&refresh_session.rc,
|
|
|
|
&ret_refresh_session));
|
|
|
|
FAILIF (refresh_session.noreveal_index !=
|
|
|
|
ret_refresh_session.session.noreveal_index);
|
|
|
|
FAILIF (0 !=
|
|
|
|
TALER_amount_cmp (&refresh_session.amount_with_fee,
|
|
|
|
&ret_refresh_session.session.amount_with_fee));
|
|
|
|
FAILIF (0 !=
|
|
|
|
TALER_amount_cmp (&fee_refresh,
|
|
|
|
&ret_refresh_session.melt_fee));
|
|
|
|
FAILIF (0 !=
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_memcmp (&refresh_session.rc, &ret_refresh_session.session.rc));
|
|
|
|
FAILIF (0 != GNUNET_memcmp (&refresh_session.coin_sig,
|
|
|
|
&ret_refresh_session.session.coin_sig));
|
2019-09-15 12:39:15 +02:00
|
|
|
FAILIF (NULL !=
|
|
|
|
ret_refresh_session.session.coin.denom_sig.rsa_signature);
|
2017-11-27 23:42:17 +01:00
|
|
|
FAILIF (0 != memcmp (&refresh_session.coin.coin_pub,
|
|
|
|
&ret_refresh_session.session.coin.coin_pub,
|
|
|
|
sizeof (refresh_session.coin.coin_pub)));
|
|
|
|
FAILIF (0 !=
|
2019-05-02 21:16:51 +02:00
|
|
|
GNUNET_memcmp (&refresh_session.coin.denom_pub_hash,
|
|
|
|
&ret_refresh_session.session.coin.denom_pub_hash));
|
2016-10-20 23:28:36 +02:00
|
|
|
|
2020-03-05 23:02:38 +01:00
|
|
|
/* test 'select_refreshes_above_serial_id' */
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt = 0;
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2020-03-05 23:02:38 +01:00
|
|
|
plugin->select_refreshes_above_serial_id (plugin->cls,
|
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_refresh_session_cb,
|
|
|
|
NULL));
|
2016-10-20 23:55:19 +02:00
|
|
|
FAILIF (1 != auditor_row_cnt);
|
2016-05-16 11:55:47 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
new_dkp = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct DenomKeyPair *);
|
2015-08-18 10:56:47 +02:00
|
|
|
new_denom_pubs = GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_DenominationPublicKey);
|
2017-11-27 23:42:17 +01:00
|
|
|
revealed_coins
|
|
|
|
= GNUNET_new_array (MELT_NEW_COINS,
|
|
|
|
struct TALER_EXCHANGEDB_RefreshRevealedCoin);
|
2019-08-25 16:18:24 +02:00
|
|
|
for (unsigned int cnt = 0; cnt < MELT_NEW_COINS; cnt++)
|
2015-08-18 10:56:47 +02:00
|
|
|
{
|
2017-11-27 23:42:17 +01:00
|
|
|
struct TALER_EXCHANGEDB_RefreshRevealedCoin *ccoin;
|
|
|
|
struct GNUNET_HashCode hc;
|
2017-11-30 17:17:37 +01:00
|
|
|
struct GNUNET_TIME_Absolute now;
|
2017-11-27 23:42:17 +01:00
|
|
|
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
GNUNET_TIME_round_abs (&now);
|
2016-05-19 17:31:15 +02:00
|
|
|
new_dkp[cnt] = create_denom_key_pair (1024,
|
|
|
|
session,
|
2017-11-30 17:17:37 +01:00
|
|
|
now,
|
2015-08-18 10:56:47 +02:00
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
2016-04-20 01:50:26 +02:00
|
|
|
&fee_refresh,
|
2019-08-25 16:18:24 +02:00
|
|
|
&fee_refund);
|
2017-10-06 22:19:13 +02:00
|
|
|
GNUNET_assert (NULL != new_dkp[cnt]);
|
2016-05-19 17:11:35 +02:00
|
|
|
new_denom_pubs[cnt] = new_dkp[cnt]->pub;
|
2017-11-27 23:42:17 +01:00
|
|
|
ccoin = &revealed_coins[cnt];
|
2019-08-25 16:18:24 +02:00
|
|
|
ccoin->coin_ev_size = (size_t) GNUNET_CRYPTO_random_u64 (
|
|
|
|
GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
COIN_ENC_MAX_SIZE);
|
2017-11-27 23:42:17 +01:00
|
|
|
ccoin->coin_ev = GNUNET_malloc (ccoin->coin_ev_size);
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
ccoin->coin_ev,
|
|
|
|
ccoin->coin_ev_size);
|
2016-05-19 17:31:15 +02:00
|
|
|
RND_BLK (&hc);
|
2017-11-27 23:42:17 +01:00
|
|
|
ccoin->denom_pub = new_dkp[cnt]->pub;
|
|
|
|
ccoin->coin_sig.rsa_signature
|
2016-05-19 17:31:15 +02:00
|
|
|
= GNUNET_CRYPTO_rsa_sign_fdh (new_dkp[cnt]->priv.rsa_private_key,
|
|
|
|
&hc);
|
|
|
|
}
|
2017-11-27 23:42:17 +01:00
|
|
|
RND_BLK (&tprivs);
|
|
|
|
RND_BLK (&tpub);
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
|
|
|
plugin->get_refresh_reveal (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.rc,
|
|
|
|
&never_called_cb,
|
|
|
|
NULL));
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->insert_refresh_reveal (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.rc,
|
|
|
|
MELT_NEW_COINS,
|
|
|
|
revealed_coins,
|
|
|
|
TALER_CNC_KAPPA - 1,
|
|
|
|
tprivs,
|
|
|
|
&tpub));
|
|
|
|
FAILIF (0 >=
|
|
|
|
plugin->get_refresh_reveal (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.rc,
|
|
|
|
&check_refresh_reveal_cb,
|
|
|
|
NULL));
|
2016-05-19 17:11:35 +02:00
|
|
|
|
2016-05-19 16:24:29 +02:00
|
|
|
|
2017-11-27 23:42:17 +01:00
|
|
|
qs = plugin->get_link_data (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refresh_session.coin.coin_pub,
|
|
|
|
&handle_link_data_cb,
|
|
|
|
NULL);
|
|
|
|
FAILIF (0 >= qs);
|
2017-04-09 21:28:45 +02:00
|
|
|
{
|
|
|
|
/* Just to test fetching a coin with melt history */
|
|
|
|
struct TALER_EXCHANGEDB_TransactionList *tl;
|
2017-06-19 16:07:34 +02:00
|
|
|
enum GNUNET_DB_QueryStatus qs;
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2017-06-19 16:07:34 +02:00
|
|
|
qs = plugin->get_coin_transactions (plugin->cls,
|
2017-04-09 21:28:45 +02:00
|
|
|
session,
|
2017-11-27 23:42:17 +01:00
|
|
|
&refresh_session.coin.coin_pub,
|
2018-08-19 17:19:27 +02:00
|
|
|
GNUNET_YES,
|
2019-08-25 16:18:24 +02:00
|
|
|
&tl);
|
2017-06-19 16:07:34 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT != qs);
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->free_coin_transaction_list (plugin->cls,
|
|
|
|
tl);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-16 23:06:28 +02:00
|
|
|
ret = GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2017-11-27 23:42:17 +01:00
|
|
|
if (NULL != revealed_coins)
|
2016-08-11 23:28:33 +02:00
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
for (unsigned int cnt = 0; cnt < MELT_NEW_COINS; cnt++)
|
2017-11-27 23:42:17 +01:00
|
|
|
{
|
|
|
|
if (NULL != revealed_coins[cnt].coin_sig.rsa_signature)
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (
|
|
|
|
revealed_coins[cnt].coin_sig.rsa_signature);
|
2017-11-27 23:42:17 +01:00
|
|
|
GNUNET_free (revealed_coins[cnt].coin_ev);
|
|
|
|
}
|
|
|
|
GNUNET_free (revealed_coins);
|
|
|
|
revealed_coins = NULL;
|
2016-08-11 23:28:33 +02:00
|
|
|
}
|
2016-06-02 08:59:18 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (
|
|
|
|
refresh_session.coin.denom_sig.rsa_signature);
|
2015-08-18 10:56:47 +02:00
|
|
|
GNUNET_free_non_null (new_denom_pubs);
|
2017-11-27 23:42:17 +01:00
|
|
|
for (unsigned int cnt = 0;
|
2015-08-18 10:56:47 +02:00
|
|
|
(NULL != new_dkp) && (cnt < MELT_NEW_COINS) && (NULL != new_dkp[cnt]);
|
|
|
|
cnt++)
|
|
|
|
destroy_denom_key_pair (new_dkp[cnt]);
|
|
|
|
GNUNET_free_non_null (new_dkp);
|
2015-08-16 23:06:28 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-01-22 13:45:32 +01:00
|
|
|
/**
|
|
|
|
* Callback that should never be called.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
cb_wt_never (void *cls,
|
2017-03-18 17:47:44 +01:00
|
|
|
uint64_t serial_id,
|
2016-01-22 13:45:32 +01:00
|
|
|
const struct TALER_MerchantPublicKeyP *merchant_pub,
|
|
|
|
const struct GNUNET_HashCode *h_wire,
|
2018-04-02 14:24:45 +02:00
|
|
|
const json_t *wire,
|
2016-09-26 14:58:44 +02:00
|
|
|
struct GNUNET_TIME_Absolute exec_time,
|
2017-05-29 01:15:41 +02:00
|
|
|
const struct GNUNET_HashCode *h_contract_terms,
|
2019-07-27 20:43:52 +02:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2016-01-22 13:45:32 +01:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_Amount *coin_value,
|
2016-02-07 15:02:49 +01:00
|
|
|
const struct TALER_Amount *coin_fee)
|
2016-01-22 13:45:32 +01:00
|
|
|
{
|
|
|
|
GNUNET_assert (0); /* this statement should be unreachable */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Callback that should never be called.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
cb_wtid_never (void *cls,
|
|
|
|
const struct TALER_WireTransferIdentifierRawP *wtid,
|
|
|
|
const struct TALER_Amount *coin_contribution,
|
|
|
|
const struct TALER_Amount *coin_fee,
|
|
|
|
struct GNUNET_TIME_Absolute execution_time)
|
|
|
|
{
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct TALER_MerchantPublicKeyP merchant_pub_wt;
|
|
|
|
static struct GNUNET_HashCode h_wire_wt;
|
2017-05-29 01:15:41 +02:00
|
|
|
static struct GNUNET_HashCode h_contract_terms_wt;
|
2016-01-22 13:45:32 +01:00
|
|
|
static struct TALER_CoinSpendPublicKeyP coin_pub_wt;
|
|
|
|
static struct TALER_Amount coin_value_wt;
|
|
|
|
static struct TALER_Amount coin_fee_wt;
|
|
|
|
static struct TALER_Amount transfer_value_wt;
|
2017-03-19 01:36:15 +01:00
|
|
|
static struct GNUNET_TIME_Absolute wire_out_date;
|
|
|
|
static struct TALER_WireTransferIdentifierRawP wire_out_wtid;
|
2016-01-22 13:45:32 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Callback that should be called with the WT data.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
cb_wt_check (void *cls,
|
2017-03-18 17:47:44 +01:00
|
|
|
uint64_t rowid,
|
2016-01-22 13:45:32 +01:00
|
|
|
const struct TALER_MerchantPublicKeyP *merchant_pub,
|
|
|
|
const struct GNUNET_HashCode *h_wire,
|
2018-04-02 14:24:45 +02:00
|
|
|
const json_t *wire,
|
2016-09-26 14:58:44 +02:00
|
|
|
struct GNUNET_TIME_Absolute exec_time,
|
2017-05-29 01:15:41 +02:00
|
|
|
const struct GNUNET_HashCode *h_contract_terms,
|
2019-07-27 20:43:52 +02:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2016-01-22 13:45:32 +01:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_Amount *coin_value,
|
2016-02-07 15:02:49 +01:00
|
|
|
const struct TALER_Amount *coin_fee)
|
2016-01-22 13:45:32 +01:00
|
|
|
{
|
|
|
|
GNUNET_assert (cls == &cb_wt_never);
|
2019-04-09 18:59:02 +02:00
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (merchant_pub,
|
|
|
|
&merchant_pub_wt));
|
2018-04-02 14:24:45 +02:00
|
|
|
GNUNET_assert (0 == strcmp (json_string_value (json_object_get (wire,
|
2020-01-19 17:03:19 +01:00
|
|
|
"payto_uri")),
|
2018-04-02 14:24:45 +02:00
|
|
|
"payto://sepa/DE67830654080004822650"));
|
2019-04-09 18:59:02 +02:00
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (h_wire,
|
|
|
|
&h_wire_wt));
|
2017-03-19 01:36:15 +01:00
|
|
|
GNUNET_assert (exec_time.abs_value_us == wire_out_date.abs_value_us);
|
2019-04-09 18:59:02 +02:00
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (h_contract_terms,
|
|
|
|
&h_contract_terms_wt));
|
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (coin_pub,
|
|
|
|
&coin_pub_wt));
|
2016-01-22 13:45:32 +01:00
|
|
|
GNUNET_assert (0 == TALER_amount_cmp (coin_value,
|
|
|
|
&coin_value_wt));
|
|
|
|
GNUNET_assert (0 == TALER_amount_cmp (coin_fee,
|
|
|
|
&coin_fee_wt));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Callback that should be called with the WT data.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
cb_wtid_check (void *cls,
|
|
|
|
const struct TALER_WireTransferIdentifierRawP *wtid,
|
|
|
|
const struct TALER_Amount *coin_contribution,
|
|
|
|
const struct TALER_Amount *coin_fee,
|
|
|
|
struct GNUNET_TIME_Absolute execution_time)
|
|
|
|
{
|
|
|
|
GNUNET_assert (cls == &cb_wtid_never);
|
2019-04-09 18:59:02 +02:00
|
|
|
GNUNET_assert (0 == GNUNET_memcmp (wtid,
|
|
|
|
&wire_out_wtid));
|
2016-01-22 13:45:32 +01:00
|
|
|
GNUNET_assert (execution_time.abs_value_us ==
|
2017-03-19 01:36:15 +01:00
|
|
|
wire_out_date.abs_value_us);
|
2016-01-22 13:45:32 +01:00
|
|
|
GNUNET_assert (0 == TALER_amount_cmp (coin_contribution,
|
|
|
|
&coin_value_wt));
|
|
|
|
GNUNET_assert (0 == TALER_amount_cmp (coin_fee,
|
|
|
|
&coin_fee_wt));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
/**
|
|
|
|
* Here #deposit_cb() will store the row ID of the deposit.
|
|
|
|
*/
|
2016-11-17 14:31:44 +01:00
|
|
|
static uint64_t deposit_rowid;
|
2016-05-06 23:51:15 +02:00
|
|
|
|
|
|
|
|
2016-04-06 10:22:09 +02:00
|
|
|
/**
|
|
|
|
* Function called with details about deposits that
|
|
|
|
* have been made. Called in the test on the
|
|
|
|
* deposit given in @a cls.
|
|
|
|
*
|
|
|
|
* @param cls closure a `struct TALER_EXCHANGEDB_Deposit *`
|
|
|
|
* @param rowid unique ID for the deposit in our DB, used for marking
|
|
|
|
* it as 'tiny' or 'done'
|
|
|
|
* @param merchant_pub public key of the merchant
|
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param amount_with_fee amount that was deposited including fee
|
|
|
|
* @param deposit_fee amount the exchange gets to keep as transaction fees
|
2017-05-29 01:15:41 +02:00
|
|
|
* @param h_contract_terms hash of the proposal data known to merchant and customer
|
2016-04-06 10:22:09 +02:00
|
|
|
* @param wire_deadline by which the merchant adviced that he would like the
|
|
|
|
* wire transfer to be executed
|
|
|
|
* @param wire wire details for the merchant, NULL from iterate_matching_deposits()
|
2017-06-24 12:15:11 +02:00
|
|
|
* @return transaction status code, #GNUNET_DB_STATUS_SUCCESS_ONE_RESULT to continue to iterate
|
2016-04-06 10:22:09 +02:00
|
|
|
*/
|
2017-06-24 12:15:11 +02:00
|
|
|
static enum GNUNET_DB_QueryStatus
|
2016-04-06 10:22:09 +02:00
|
|
|
deposit_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2016-04-06 10:22:09 +02:00
|
|
|
const struct TALER_MerchantPublicKeyP *merchant_pub,
|
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_Amount *amount_with_fee,
|
|
|
|
const struct TALER_Amount *deposit_fee,
|
2017-05-29 01:15:41 +02:00
|
|
|
const struct GNUNET_HashCode *h_contract_terms,
|
2016-04-06 10:22:09 +02:00
|
|
|
struct GNUNET_TIME_Absolute wire_deadline,
|
|
|
|
const json_t *wire)
|
|
|
|
{
|
|
|
|
struct TALER_EXCHANGEDB_Deposit *deposit = cls;
|
|
|
|
struct GNUNET_HashCode h_wire;
|
|
|
|
|
2016-05-06 23:51:15 +02:00
|
|
|
deposit_rowid = rowid;
|
2016-04-06 10:22:09 +02:00
|
|
|
if (NULL != wire)
|
2017-10-06 20:02:28 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2018-10-06 15:05:06 +02:00
|
|
|
TALER_JSON_merchant_wire_signature_hash (wire,
|
|
|
|
&h_wire));
|
2019-04-09 18:59:02 +02:00
|
|
|
if ( (0 != GNUNET_memcmp (merchant_pub,
|
|
|
|
&deposit->merchant_pub)) ||
|
2016-04-06 10:22:09 +02:00
|
|
|
(0 != TALER_amount_cmp (amount_with_fee,
|
|
|
|
&deposit->amount_with_fee)) ||
|
|
|
|
(0 != TALER_amount_cmp (deposit_fee,
|
|
|
|
&deposit->deposit_fee)) ||
|
2019-04-09 18:59:02 +02:00
|
|
|
(0 != GNUNET_memcmp (h_contract_terms,
|
|
|
|
&deposit->h_contract_terms)) ||
|
2016-04-06 10:22:09 +02:00
|
|
|
(0 != memcmp (coin_pub,
|
|
|
|
&deposit->coin.coin_pub,
|
|
|
|
sizeof (struct TALER_CoinSpendPublicKeyP))) ||
|
|
|
|
( (NULL != wire) &&
|
2019-04-09 18:59:02 +02:00
|
|
|
(0 != GNUNET_memcmp (&h_wire,
|
|
|
|
&deposit->h_wire)) ) )
|
2016-04-06 10:22:09 +02:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2017-06-24 12:15:11 +02:00
|
|
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
2016-04-06 10:22:09 +02:00
|
|
|
}
|
|
|
|
|
2017-06-24 12:15:11 +02:00
|
|
|
return GNUNET_DB_STATUS_SUCCESS_ONE_RESULT;
|
2016-04-06 10:22:09 +02:00
|
|
|
}
|
|
|
|
|
2017-03-04 23:01:25 +01:00
|
|
|
|
2016-10-20 23:28:36 +02:00
|
|
|
/**
|
|
|
|
* Callback for #select_deposits_above_serial_id ()
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the deposit in our DB
|
2017-03-17 14:09:58 +01:00
|
|
|
* @param timestamp when did the deposit happen
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param merchant_pub public key of the merchant
|
2017-03-19 01:55:37 +01:00
|
|
|
* @param denom_pub denomination of the @a coin_pub
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param coin_sig signature from the coin
|
|
|
|
* @param amount_with_fee amount that was deposited including fee
|
2017-05-29 01:15:41 +02:00
|
|
|
* @param h_contract_terms hash of the proposal data known to merchant and customer
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param refund_deadline by which the merchant adviced that he might want
|
|
|
|
* to get a refund
|
|
|
|
* @param wire_deadline by which the merchant adviced that he would like the
|
|
|
|
* wire transfer to be executed
|
|
|
|
* @param receiver_wire_account wire details for the merchant, NULL from iterate_matching_deposits()
|
|
|
|
* @param done flag set if the deposit was already executed (or not)
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
2016-11-17 14:31:44 +01:00
|
|
|
*/
|
2017-03-04 23:01:25 +01:00
|
|
|
static int
|
2016-10-20 23:28:36 +02:00
|
|
|
audit_deposit_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2017-03-17 14:09:58 +01:00
|
|
|
struct GNUNET_TIME_Absolute timestamp,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct TALER_MerchantPublicKeyP *merchant_pub,
|
2017-03-19 01:55:37 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_CoinSpendSignatureP *coin_sig,
|
|
|
|
const struct TALER_Amount *amount_with_fee,
|
2017-05-29 01:15:41 +02:00
|
|
|
const struct GNUNET_HashCode *h_contract_terms,
|
2016-10-20 23:28:36 +02:00
|
|
|
struct GNUNET_TIME_Absolute refund_deadline,
|
|
|
|
struct GNUNET_TIME_Absolute wire_deadline,
|
|
|
|
const json_t *receiver_wire_account,
|
|
|
|
int done)
|
|
|
|
{
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt++;
|
2016-10-20 23:28:36 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with details about coins that were refunding,
|
|
|
|
* with the goal of auditing the refund's execution.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the refund in our DB
|
2017-03-19 01:55:37 +01:00
|
|
|
* @param denom_pub denomination of the @a coin_pub
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param merchant_pub public key of the merchant
|
|
|
|
* @param merchant_sig signature of the merchant
|
2017-05-29 01:15:41 +02:00
|
|
|
* @param h_contract_terms hash of the proposal data in
|
2017-02-06 15:41:39 +01:00
|
|
|
* the contract between merchant and customer
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param rtransaction_id refund transaction ID chosen by the merchant
|
|
|
|
* @param amount_with_fee amount that was deposited including fee
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
2017-03-04 23:01:25 +01:00
|
|
|
static int
|
2016-10-20 23:28:36 +02:00
|
|
|
audit_refund_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2017-03-19 01:55:37 +01:00
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_MerchantPublicKeyP *merchant_pub,
|
|
|
|
const struct TALER_MerchantSignatureP *merchant_sig,
|
2017-05-29 01:15:41 +02:00
|
|
|
const struct GNUNET_HashCode *h_contract_terms,
|
2016-10-20 23:28:36 +02:00
|
|
|
uint64_t rtransaction_id,
|
|
|
|
const struct TALER_Amount *amount_with_fee)
|
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) rowid;
|
|
|
|
(void) denom_pub;
|
|
|
|
(void) coin_pub;
|
|
|
|
(void) merchant_pub;
|
|
|
|
(void) merchant_sig;
|
|
|
|
(void) h_contract_terms;
|
|
|
|
(void) rtransaction_id;
|
|
|
|
(void) amount_with_fee;
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt++;
|
2016-10-20 23:28:36 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with details about incoming wire transfers.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the refresh session in our DB
|
|
|
|
* @param reserve_pub public key of the reserve (also the WTID)
|
|
|
|
* @param credit amount that was received
|
|
|
|
* @param sender_account_details information about the sender's bank account
|
2020-01-11 15:19:56 +01:00
|
|
|
* @param wire_reference unique reference identifying the wire transfer
|
2016-10-20 23:28:36 +02:00
|
|
|
* @param execution_date when did we receive the funds
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
2017-03-04 23:01:25 +01:00
|
|
|
static int
|
2016-10-20 23:28:36 +02:00
|
|
|
audit_reserve_in_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct TALER_ReservePublicKeyP *reserve_pub,
|
|
|
|
const struct TALER_Amount *credit,
|
2018-04-02 14:24:45 +02:00
|
|
|
const char *sender_account_details,
|
2020-01-11 15:19:56 +01:00
|
|
|
uint64_t wire_reference,
|
2016-10-20 23:28:36 +02:00
|
|
|
struct GNUNET_TIME_Absolute execution_date)
|
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) rowid;
|
|
|
|
(void) reserve_pub;
|
|
|
|
(void) credit;
|
|
|
|
(void) sender_account_details;
|
|
|
|
(void) wire_reference;
|
|
|
|
(void) execution_date;
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt++;
|
2016-10-20 23:28:36 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
2017-03-04 23:01:25 +01:00
|
|
|
|
2016-10-20 23:28:36 +02:00
|
|
|
/**
|
|
|
|
* Function called with details about withdraw operations.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param rowid unique serial ID for the refresh session in our DB
|
|
|
|
* @param h_blind_ev blinded hash of the coin's public key
|
|
|
|
* @param denom_pub public denomination key of the deposited coin
|
|
|
|
* @param reserve_pub public key of the reserve
|
|
|
|
* @param reserve_sig signature over the withdraw operation
|
|
|
|
* @param execution_date when did the wallet withdraw the coin
|
|
|
|
* @param amount_with_fee amount that was withdrawn
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
2017-03-04 23:01:25 +01:00
|
|
|
static int
|
2016-10-20 23:28:36 +02:00
|
|
|
audit_reserve_out_cb (void *cls,
|
2016-11-17 14:31:44 +01:00
|
|
|
uint64_t rowid,
|
2016-10-20 23:28:36 +02:00
|
|
|
const struct GNUNET_HashCode *h_blind_ev,
|
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
|
|
|
const struct TALER_ReservePublicKeyP *reserve_pub,
|
|
|
|
const struct TALER_ReserveSignatureP *reserve_sig,
|
|
|
|
struct GNUNET_TIME_Absolute execution_date,
|
|
|
|
const struct TALER_Amount *amount_with_fee)
|
|
|
|
{
|
2020-03-27 17:28:33 +01:00
|
|
|
(void) cls;
|
|
|
|
(void) rowid;
|
|
|
|
(void) h_blind_ev;
|
|
|
|
(void) denom_pub;
|
|
|
|
(void) reserve_pub;
|
|
|
|
(void) reserve_sig;
|
|
|
|
(void) execution_date;
|
|
|
|
(void) amount_with_fee;
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt++;
|
2016-10-20 23:28:36 +02:00
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
2016-04-06 10:22:09 +02:00
|
|
|
|
2017-03-04 23:01:25 +01:00
|
|
|
|
2016-05-31 10:39:11 +02:00
|
|
|
/**
|
|
|
|
* Test garbage collection.
|
|
|
|
*
|
|
|
|
* @param session DB session to use
|
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
test_gc (struct TALER_EXCHANGEDB_Session *session)
|
|
|
|
{
|
|
|
|
struct DenomKeyPair *dkp;
|
|
|
|
struct GNUNET_TIME_Absolute now;
|
|
|
|
struct GNUNET_TIME_Absolute past;
|
|
|
|
struct TALER_EXCHANGEDB_DenominationKeyInformationP issue2;
|
2019-05-02 21:16:51 +02:00
|
|
|
struct GNUNET_HashCode denom_hash;
|
2016-05-31 10:39:11 +02:00
|
|
|
|
|
|
|
now = GNUNET_TIME_absolute_get ();
|
2017-11-30 17:17:37 +01:00
|
|
|
GNUNET_TIME_round_abs (&now);
|
2016-05-31 10:39:11 +02:00
|
|
|
past = GNUNET_TIME_absolute_subtract (now,
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_TIME_relative_multiply (
|
|
|
|
GNUNET_TIME_UNIT_HOURS,
|
|
|
|
4));
|
2016-05-31 10:39:11 +02:00
|
|
|
dkp = create_denom_key_pair (1024,
|
|
|
|
session,
|
|
|
|
past,
|
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
|
|
|
&fee_refresh,
|
|
|
|
&fee_refund);
|
2017-10-06 22:19:13 +02:00
|
|
|
GNUNET_assert (NULL != dkp);
|
2016-05-31 10:39:11 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
plugin->gc (plugin->cls))
|
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_break (0);
|
2016-05-31 10:39:11 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&denom_hash);
|
2019-05-02 21:16:51 +02:00
|
|
|
|
2017-06-23 13:16:12 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-31 10:39:11 +02:00
|
|
|
plugin->get_denomination_info (plugin->cls,
|
|
|
|
session,
|
2019-05-02 21:16:51 +02:00
|
|
|
&denom_hash,
|
2016-05-31 10:39:11 +02:00
|
|
|
&issue2))
|
|
|
|
{
|
2019-08-25 16:18:24 +02:00
|
|
|
GNUNET_break (0);
|
2016-05-31 10:39:11 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
destroy_denom_key_pair (dkp);
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-03-04 23:01:25 +01:00
|
|
|
/**
|
|
|
|
* Test wire fee storage.
|
|
|
|
*
|
|
|
|
* @param session DB session to use
|
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
test_wire_fees (struct TALER_EXCHANGEDB_Session *session)
|
|
|
|
{
|
|
|
|
struct GNUNET_TIME_Absolute start_date;
|
|
|
|
struct GNUNET_TIME_Absolute end_date;
|
|
|
|
struct TALER_Amount wire_fee;
|
2018-01-04 00:41:19 +01:00
|
|
|
struct TALER_Amount closing_fee;
|
2017-03-04 23:01:25 +01:00
|
|
|
struct TALER_MasterSignatureP master_sig;
|
|
|
|
struct GNUNET_TIME_Absolute sd;
|
|
|
|
struct GNUNET_TIME_Absolute ed;
|
|
|
|
struct TALER_Amount fee;
|
2018-01-04 00:41:19 +01:00
|
|
|
struct TALER_Amount fee2;
|
2017-03-04 23:01:25 +01:00
|
|
|
struct TALER_MasterSignatureP ms;
|
|
|
|
|
|
|
|
start_date = GNUNET_TIME_absolute_get ();
|
2017-11-30 17:17:37 +01:00
|
|
|
GNUNET_TIME_round_abs (&start_date);
|
2017-03-04 23:01:25 +01:00
|
|
|
end_date = GNUNET_TIME_relative_to_absolute (GNUNET_TIME_UNIT_MINUTES);
|
2017-11-30 17:17:37 +01:00
|
|
|
GNUNET_TIME_round_abs (&end_date);
|
2017-03-04 23:01:25 +01:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":1.424242",
|
|
|
|
&wire_fee));
|
2018-01-04 00:41:19 +01:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":2.424242",
|
|
|
|
&closing_fee));
|
2017-03-04 23:01:25 +01:00
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&master_sig,
|
|
|
|
sizeof (master_sig));
|
2017-06-24 12:15:11 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-03-04 23:01:25 +01:00
|
|
|
plugin->insert_wire_fee (plugin->cls,
|
|
|
|
session,
|
|
|
|
"wire-method",
|
|
|
|
start_date,
|
|
|
|
end_date,
|
|
|
|
&wire_fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&closing_fee,
|
2017-03-04 23:01:25 +01:00
|
|
|
&master_sig))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-06-24 12:15:11 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-03-04 23:01:25 +01:00
|
|
|
plugin->insert_wire_fee (plugin->cls,
|
|
|
|
session,
|
|
|
|
"wire-method",
|
|
|
|
start_date,
|
|
|
|
end_date,
|
|
|
|
&wire_fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&closing_fee,
|
2017-03-04 23:01:25 +01:00
|
|
|
&master_sig))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
/* This must fail as 'end_date' is NOT in the
|
|
|
|
half-open interval [start_date,end_date) */
|
2017-06-19 20:12:00 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-03-04 23:01:25 +01:00
|
|
|
plugin->get_wire_fee (plugin->cls,
|
|
|
|
session,
|
|
|
|
"wire-method",
|
|
|
|
end_date,
|
|
|
|
&sd,
|
|
|
|
&ed,
|
|
|
|
&fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&fee2,
|
2017-03-04 23:01:25 +01:00
|
|
|
&ms))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-06-19 20:12:00 +02:00
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-03-04 23:01:25 +01:00
|
|
|
plugin->get_wire_fee (plugin->cls,
|
|
|
|
session,
|
|
|
|
"wire-method",
|
|
|
|
start_date,
|
|
|
|
&sd,
|
|
|
|
&ed,
|
|
|
|
&fee,
|
2019-08-25 16:18:24 +02:00
|
|
|
&fee2,
|
2017-03-04 23:01:25 +01:00
|
|
|
&ms))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if ( (sd.abs_value_us != start_date.abs_value_us) ||
|
|
|
|
(ed.abs_value_us != end_date.abs_value_us) ||
|
|
|
|
(0 != TALER_amount_cmp (&fee,
|
|
|
|
&wire_fee)) ||
|
2018-01-04 00:41:19 +01:00
|
|
|
(0 != TALER_amount_cmp (&fee2,
|
|
|
|
&closing_fee)) ||
|
2019-04-09 18:59:02 +02:00
|
|
|
(0 != GNUNET_memcmp (&ms,
|
|
|
|
&master_sig)) )
|
2017-03-04 23:01:25 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-08-25 16:18:24 +02:00
|
|
|
static struct TALER_Amount wire_out_amount;
|
2017-03-18 02:40:27 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Callback with data about an executed wire transfer.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param rowid identifier of the respective row in the database
|
|
|
|
* @param date timestamp of the wire transfer (roughly)
|
|
|
|
* @param wtid wire transfer subject
|
|
|
|
* @param wire wire transfer details of the receiver
|
|
|
|
* @param amount amount that was wired
|
2017-04-04 15:38:58 +02:00
|
|
|
* @return #GNUNET_OK to continue, #GNUNET_SYSERR to stop iteration
|
2017-03-18 02:40:27 +01:00
|
|
|
*/
|
2017-04-04 15:38:58 +02:00
|
|
|
static int
|
2017-03-18 02:40:27 +01:00
|
|
|
audit_wire_cb (void *cls,
|
|
|
|
uint64_t rowid,
|
|
|
|
struct GNUNET_TIME_Absolute date,
|
|
|
|
const struct TALER_WireTransferIdentifierRawP *wtid,
|
|
|
|
const json_t *wire,
|
|
|
|
const struct TALER_Amount *amount)
|
|
|
|
{
|
|
|
|
auditor_row_cnt++;
|
|
|
|
GNUNET_assert (0 ==
|
|
|
|
TALER_amount_cmp (amount,
|
|
|
|
&wire_out_amount));
|
|
|
|
GNUNET_assert (0 ==
|
2019-04-09 18:59:02 +02:00
|
|
|
GNUNET_memcmp (wtid,
|
|
|
|
&wire_out_wtid));
|
2017-03-18 02:40:27 +01:00
|
|
|
GNUNET_assert (date.abs_value_us == wire_out_date.abs_value_us);
|
2017-04-04 15:38:58 +02:00
|
|
|
return GNUNET_OK;
|
2017-03-18 02:40:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test API relating to wire_out handling.
|
|
|
|
*
|
|
|
|
* @param session database session to use for the test
|
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
test_wire_out (struct TALER_EXCHANGEDB_Session *session,
|
|
|
|
const struct TALER_EXCHANGEDB_Deposit *deposit)
|
|
|
|
{
|
|
|
|
auditor_row_cnt = 0;
|
2018-04-02 14:24:45 +02:00
|
|
|
memset (&wire_out_wtid,
|
|
|
|
42,
|
|
|
|
sizeof (wire_out_wtid));
|
2017-03-18 02:40:27 +01:00
|
|
|
wire_out_date = GNUNET_TIME_absolute_get ();
|
|
|
|
(void) GNUNET_TIME_round_abs (&wire_out_date);
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":1",
|
|
|
|
&wire_out_amount));
|
2017-03-18 03:44:59 +01:00
|
|
|
|
|
|
|
/* we will transiently violate the wtid constraint on
|
|
|
|
the aggregation table, so we need to start the special
|
|
|
|
transaction where this is allowed... */
|
2017-03-18 02:40:27 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
2017-03-18 03:44:59 +01:00
|
|
|
plugin->start_deferred_wire_out (plugin->cls,
|
|
|
|
session));
|
2017-03-18 02:40:27 +01:00
|
|
|
|
|
|
|
/* setup values for wire transfer aggregation data */
|
|
|
|
merchant_pub_wt = deposit->merchant_pub;
|
|
|
|
h_wire_wt = deposit->h_wire;
|
2017-05-29 01:15:41 +02:00
|
|
|
h_contract_terms_wt = deposit->h_contract_terms;
|
2017-03-18 02:40:27 +01:00
|
|
|
coin_pub_wt = deposit->coin.coin_pub;
|
2017-03-19 01:36:15 +01:00
|
|
|
|
2017-03-18 02:40:27 +01:00
|
|
|
coin_value_wt = deposit->amount_with_fee;
|
|
|
|
coin_fee_wt = fee_deposit;
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_subtract (&transfer_value_wt,
|
|
|
|
&coin_value_wt,
|
|
|
|
&coin_fee_wt));
|
2017-06-19 20:12:00 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-03-18 02:40:27 +01:00
|
|
|
plugin->lookup_wire_transfer (plugin->cls,
|
|
|
|
session,
|
2017-03-19 01:36:15 +01:00
|
|
|
&wire_out_wtid,
|
2017-03-18 02:40:27 +01:00
|
|
|
&cb_wt_never,
|
|
|
|
NULL));
|
|
|
|
|
|
|
|
{
|
2017-05-29 01:15:41 +02:00
|
|
|
struct GNUNET_HashCode h_contract_terms_wt2 = h_contract_terms_wt;
|
2017-03-18 02:40:27 +01:00
|
|
|
|
2017-05-29 01:15:41 +02:00
|
|
|
h_contract_terms_wt2.bits[0]++;
|
2017-06-19 20:46:24 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2020-03-05 23:49:47 +01:00
|
|
|
plugin->lookup_transfer_by_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&h_contract_terms_wt2,
|
|
|
|
&h_wire_wt,
|
|
|
|
&coin_pub_wt,
|
|
|
|
&merchant_pub_wt,
|
|
|
|
&cb_wtid_never,
|
|
|
|
NULL));
|
2017-03-18 02:40:27 +01:00
|
|
|
}
|
|
|
|
/* insert WT data */
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-03-18 02:40:27 +01:00
|
|
|
plugin->insert_aggregation_tracking (plugin->cls,
|
|
|
|
session,
|
2017-03-19 01:36:15 +01:00
|
|
|
&wire_out_wtid,
|
|
|
|
deposit_rowid));
|
|
|
|
|
|
|
|
/* Now let's fix the transient constraint violation by
|
|
|
|
putting in the WTID into the wire_out table */
|
2018-04-02 14:24:45 +02:00
|
|
|
{
|
|
|
|
json_t *wire_out_account;
|
|
|
|
|
|
|
|
wire_out_account = json_pack ("{s:s,s:s}",
|
2020-01-19 17:03:19 +01:00
|
|
|
"payto_uri",
|
2019-08-25 16:18:24 +02:00
|
|
|
"payto://x-taler-bank/localhost:8080/1",
|
2018-04-02 14:24:45 +02:00
|
|
|
"salt", "this-is-my-salt");
|
|
|
|
if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->store_wire_transfer_out (plugin->cls,
|
|
|
|
session,
|
|
|
|
wire_out_date,
|
|
|
|
&wire_out_wtid,
|
|
|
|
wire_out_account,
|
2018-04-02 21:12:18 +02:00
|
|
|
"my-config-section",
|
2018-04-02 14:24:45 +02:00
|
|
|
&wire_out_amount))
|
|
|
|
{
|
|
|
|
json_decref (wire_out_account);
|
|
|
|
FAILIF (1);
|
|
|
|
}
|
|
|
|
json_decref (wire_out_account);
|
|
|
|
}
|
2017-03-19 01:36:15 +01:00
|
|
|
/* And now the commit should still succeed! */
|
2017-06-11 01:59:09 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-03-19 01:36:15 +01:00
|
|
|
plugin->commit (plugin->cls,
|
|
|
|
session));
|
|
|
|
|
2017-06-19 20:12:00 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-03-18 02:40:27 +01:00
|
|
|
plugin->lookup_wire_transfer (plugin->cls,
|
|
|
|
session,
|
2017-03-19 01:36:15 +01:00
|
|
|
&wire_out_wtid,
|
2017-03-18 02:40:27 +01:00
|
|
|
&cb_wt_check,
|
|
|
|
&cb_wt_never));
|
2017-06-19 20:46:24 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2020-03-05 23:49:47 +01:00
|
|
|
plugin->lookup_transfer_by_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&h_contract_terms_wt,
|
|
|
|
&h_wire_wt,
|
|
|
|
&coin_pub_wt,
|
|
|
|
&merchant_pub_wt,
|
|
|
|
&cb_wtid_check,
|
|
|
|
&cb_wtid_never));
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-03-18 03:44:59 +01:00
|
|
|
plugin->select_wire_out_above_serial_id (plugin->cls,
|
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_wire_cb,
|
|
|
|
NULL));
|
|
|
|
FAILIF (1 != auditor_row_cnt);
|
|
|
|
|
2017-03-18 02:40:27 +01:00
|
|
|
return GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2017-03-18 02:40:27 +01:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-09 21:28:45 +02:00
|
|
|
/**
|
2020-01-18 23:49:37 +01:00
|
|
|
* Function called about recoups the exchange has to perform.
|
2017-04-09 21:28:45 +02:00
|
|
|
*
|
|
|
|
* @param cls closure with the expected value for @a coin_blind
|
2020-01-18 23:49:37 +01:00
|
|
|
* @param rowid row identifier used to uniquely identify the recoup operation
|
|
|
|
* @param timestamp when did we receive the recoup request
|
2017-04-09 21:28:45 +02:00
|
|
|
* @param amount how much should be added back to the reserve
|
|
|
|
* @param reserve_pub public key of the reserve
|
|
|
|
* @param coin public information about the coin
|
2020-03-26 20:54:41 +01:00
|
|
|
* @param denom_pub denomination key of @a coin
|
2020-01-18 23:49:37 +01:00
|
|
|
* @param coin_sig signature with @e coin_pub of type #TALER_SIGNATURE_WALLET_COIN_RECOUP
|
2017-04-09 21:28:45 +02:00
|
|
|
* @param coin_blind blinding factor used to blind the coin
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
|
|
|
static int
|
2020-01-18 23:49:37 +01:00
|
|
|
recoup_cb (void *cls,
|
|
|
|
uint64_t rowid,
|
|
|
|
struct GNUNET_TIME_Absolute timestamp,
|
|
|
|
const struct TALER_Amount *amount,
|
|
|
|
const struct TALER_ReservePublicKeyP *reserve_pub,
|
|
|
|
const struct TALER_CoinPublicInfo *coin,
|
|
|
|
const struct TALER_DenominationPublicKey *denom_pub,
|
|
|
|
const struct TALER_CoinSpendSignatureP *coin_sig,
|
|
|
|
const struct TALER_DenominationBlindingKeyP *coin_blind)
|
2017-04-09 21:28:45 +02:00
|
|
|
{
|
|
|
|
const struct TALER_DenominationBlindingKeyP *cb = cls;
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2020-02-24 12:21:46 +01:00
|
|
|
FAILIF (NULL == cb);
|
2019-04-09 18:59:02 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (cb,
|
|
|
|
coin_blind));
|
2017-04-09 21:28:45 +02:00
|
|
|
return GNUNET_OK;
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2017-04-09 21:28:45 +02:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2017-04-02 22:34:45 +02:00
|
|
|
|
|
|
|
|
2017-11-19 22:01:17 +01:00
|
|
|
/**
|
|
|
|
* Function called on deposits that are past their due date
|
|
|
|
* and have not yet seen a wire transfer.
|
|
|
|
*
|
|
|
|
* @param cls closure a `struct TALER_EXCHANGEDB_Deposit *`
|
|
|
|
* @param rowid deposit table row of the coin's deposit
|
|
|
|
* @param coin_pub public key of the coin
|
|
|
|
* @param amount value of the deposit, including fee
|
|
|
|
* @param wire where should the funds be wired
|
|
|
|
* @param deadline what was the requested wire transfer deadline
|
|
|
|
* @param tiny did the exchange defer this transfer because it is too small?
|
|
|
|
* @param done did the exchange claim that it made a transfer?
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
wire_missing_cb (void *cls,
|
|
|
|
uint64_t rowid,
|
|
|
|
const struct TALER_CoinSpendPublicKeyP *coin_pub,
|
|
|
|
const struct TALER_Amount *amount,
|
|
|
|
const json_t *wire,
|
|
|
|
struct GNUNET_TIME_Absolute deadline,
|
|
|
|
/* bool? */ int tiny,
|
|
|
|
/* bool? */ int done)
|
|
|
|
{
|
2017-11-27 23:42:17 +01:00
|
|
|
const struct TALER_EXCHANGEDB_Deposit *deposit = cls;
|
2017-11-19 22:01:17 +01:00
|
|
|
struct GNUNET_HashCode h_wire;
|
|
|
|
|
2020-03-27 18:11:19 +01:00
|
|
|
(void) done;
|
2017-11-19 22:01:17 +01:00
|
|
|
if (NULL != wire)
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2018-10-06 15:05:06 +02:00
|
|
|
TALER_JSON_merchant_wire_signature_hash (wire,
|
|
|
|
&h_wire));
|
2017-11-19 22:01:17 +01:00
|
|
|
else
|
|
|
|
memset (&h_wire,
|
|
|
|
0,
|
|
|
|
sizeof (h_wire));
|
2017-11-30 17:17:37 +01:00
|
|
|
if (GNUNET_NO != tiny)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
|
|
|
if (GNUNET_NO != done)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
|
|
|
if (0 != TALER_amount_cmp (amount,
|
|
|
|
&deposit->amount_with_fee))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
2019-04-09 18:59:02 +02:00
|
|
|
if (0 != GNUNET_memcmp (coin_pub,
|
|
|
|
&deposit->coin.coin_pub))
|
2017-11-30 17:17:37 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
2019-04-09 18:59:02 +02:00
|
|
|
if (0 != GNUNET_memcmp (&h_wire,
|
|
|
|
&deposit->h_wire))
|
2017-11-19 22:01:17 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-01-03 01:10:23 +01:00
|
|
|
/**
|
|
|
|
* Callback invoked with information about refunds applicable
|
|
|
|
* to a particular coin.
|
|
|
|
*
|
|
|
|
* @param cls closure with the `struct TALER_EXCHANGEDB_Refund *` we expect to get
|
|
|
|
* @param amount_with_fee amount being refunded
|
|
|
|
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
check_refund_cb (void *cls,
|
2020-01-17 15:43:04 +01:00
|
|
|
const struct TALER_Amount *amount_with_fee)
|
2018-01-03 01:10:23 +01:00
|
|
|
{
|
|
|
|
const struct TALER_EXCHANGEDB_Refund *refund = cls;
|
|
|
|
|
|
|
|
if (0 != TALER_amount_cmp (amount_with_fee,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund->details.refund_amount))
|
2018-01-03 01:10:23 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
result = 66;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
/**
|
|
|
|
* Main function that will be run by the scheduler.
|
|
|
|
*
|
2016-04-01 20:27:57 +02:00
|
|
|
* @param cls closure with config
|
2015-03-05 15:59:22 +01:00
|
|
|
*/
|
|
|
|
static void
|
2016-04-10 00:57:20 +02:00
|
|
|
run (void *cls)
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2016-04-01 20:27:57 +02:00
|
|
|
struct GNUNET_CONFIGURATION_Handle *cfg = cls;
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_Session *session;
|
2017-04-02 22:34:45 +02:00
|
|
|
struct TALER_CoinSpendSignatureP coin_sig;
|
|
|
|
struct GNUNET_TIME_Absolute deadline;
|
|
|
|
struct TALER_DenominationBlindingKeyP coin_blind;
|
2015-03-27 19:58:40 +01:00
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
2017-04-09 21:28:45 +02:00
|
|
|
struct TALER_ReservePublicKeyP reserve_pub2;
|
2015-03-07 13:56:26 +01:00
|
|
|
struct DenomKeyPair *dkp;
|
2017-04-09 21:28:45 +02:00
|
|
|
struct GNUNET_HashCode dkp_pub_hash;
|
|
|
|
struct TALER_MasterSignatureP master_sig;
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_CollectableBlindcoin cbc;
|
|
|
|
struct TALER_EXCHANGEDB_CollectableBlindcoin cbc2;
|
|
|
|
struct TALER_EXCHANGEDB_ReserveHistory *rh;
|
|
|
|
struct TALER_EXCHANGEDB_ReserveHistory *rh_head;
|
|
|
|
struct TALER_EXCHANGEDB_BankTransfer *bt;
|
|
|
|
struct TALER_EXCHANGEDB_CollectableBlindcoin *withdraw;
|
|
|
|
struct TALER_EXCHANGEDB_Deposit deposit;
|
|
|
|
struct TALER_EXCHANGEDB_Deposit deposit2;
|
2016-05-08 15:44:44 +02:00
|
|
|
struct TALER_EXCHANGEDB_Refund refund;
|
|
|
|
struct TALER_EXCHANGEDB_TransactionList *tl;
|
|
|
|
struct TALER_EXCHANGEDB_TransactionList *tlp;
|
2015-06-11 13:38:47 +02:00
|
|
|
json_t *wire;
|
2018-04-02 14:24:45 +02:00
|
|
|
const char *sndr = "payto://x-taler-bank/localhost:8080/1";
|
2016-05-08 15:44:44 +02:00
|
|
|
unsigned int matched;
|
2015-03-09 17:05:35 +01:00
|
|
|
unsigned int cnt;
|
2020-01-11 15:19:56 +01:00
|
|
|
uint64_t rr;
|
2017-06-18 22:48:54 +02:00
|
|
|
enum GNUNET_DB_QueryStatus qs;
|
2017-11-30 17:17:37 +01:00
|
|
|
struct GNUNET_TIME_Absolute now;
|
2015-03-05 15:59:22 +01:00
|
|
|
|
2015-03-07 13:56:26 +01:00
|
|
|
dkp = NULL;
|
2015-03-09 17:05:35 +01:00
|
|
|
rh = NULL;
|
2015-03-26 19:29:03 +01:00
|
|
|
session = NULL;
|
2017-04-04 16:27:27 +02:00
|
|
|
deposit.coin.denom_sig.rsa_signature = NULL;
|
2018-04-02 14:24:45 +02:00
|
|
|
wire = json_pack ("{s:s, s:s}",
|
2020-01-19 17:03:19 +01:00
|
|
|
"payto_uri", "payto://sepa/DE67830654080004822650",
|
2018-04-02 14:24:45 +02:00
|
|
|
"salt", "this-is-a-salt-value");
|
2015-03-09 15:35:35 +01:00
|
|
|
ZR_BLK (&cbc);
|
2015-03-07 14:03:01 +01:00
|
|
|
ZR_BLK (&cbc2);
|
2015-03-28 12:29:35 +01:00
|
|
|
if (NULL ==
|
2016-03-01 15:35:04 +01:00
|
|
|
(plugin = TALER_EXCHANGEDB_plugin_load (cfg)))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2016-05-02 01:30:13 +02:00
|
|
|
result = 77;
|
2015-03-05 15:59:22 +01:00
|
|
|
return;
|
|
|
|
}
|
2016-05-18 17:19:32 +02:00
|
|
|
(void) plugin->drop_tables (plugin->cls);
|
2015-03-21 14:21:00 +01:00
|
|
|
if (GNUNET_OK !=
|
2016-05-02 06:36:58 +02:00
|
|
|
plugin->create_tables (plugin->cls))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2016-05-02 01:30:13 +02:00
|
|
|
result = 77;
|
2015-03-05 15:59:22 +01:00
|
|
|
goto drop;
|
|
|
|
}
|
2015-03-21 14:21:00 +01:00
|
|
|
if (NULL ==
|
2016-05-02 06:36:58 +02:00
|
|
|
(session = plugin->get_session (plugin->cls)))
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2016-05-02 06:36:58 +02:00
|
|
|
result = 77;
|
2015-03-05 15:59:22 +01:00
|
|
|
goto drop;
|
|
|
|
}
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2017-06-23 14:13:54 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
2018-03-12 11:33:10 +01:00
|
|
|
session,
|
|
|
|
"test-1"));
|
2017-06-23 14:13:54 +02:00
|
|
|
|
2017-04-09 21:28:45 +02:00
|
|
|
/* test DB is empty */
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2020-01-18 23:49:37 +01:00
|
|
|
plugin->select_recoup_above_serial_id (plugin->cls,
|
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&recoup_cb,
|
|
|
|
NULL));
|
2015-03-07 13:56:26 +01:00
|
|
|
RND_BLK (&reserve_pub);
|
2015-06-12 11:57:10 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-08-17 23:07:32 +02:00
|
|
|
TALER_string_to_amount (CURRENCY ":1.000010",
|
|
|
|
&value));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_withdraw));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_deposit));
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_refresh));
|
2016-04-20 01:50:26 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_refund));
|
2015-08-17 23:07:32 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":1.000010",
|
|
|
|
&amount_with_fee));
|
|
|
|
|
2015-03-06 01:15:46 +01:00
|
|
|
result = 4;
|
2017-06-23 14:37:53 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-05-08 13:31:28 +02:00
|
|
|
plugin->get_latest_reserve_in_reference (plugin->cls,
|
|
|
|
session,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2020-01-11 15:19:56 +01:00
|
|
|
&rr));
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
(void) GNUNET_TIME_round_abs (&now);
|
2017-06-23 14:13:54 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->reserves_in_insert (plugin->cls,
|
|
|
|
session,
|
2015-05-14 14:14:18 +02:00
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
&value,
|
2017-11-30 17:17:37 +01:00
|
|
|
now,
|
2016-05-26 16:38:59 +02:00
|
|
|
sndr,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2017-05-08 13:18:36 +02:00
|
|
|
4));
|
2017-06-23 14:37:53 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-05-08 13:31:28 +02:00
|
|
|
plugin->get_latest_reserve_in_reference (plugin->cls,
|
|
|
|
session,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2020-01-11 15:19:56 +01:00
|
|
|
&rr));
|
|
|
|
FAILIF (4 != rr);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value,
|
|
|
|
value.fraction,
|
|
|
|
value.currency));
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
(void) GNUNET_TIME_round_abs (&now);
|
2017-06-23 14:13:54 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->reserves_in_insert (plugin->cls,
|
|
|
|
session,
|
2015-05-14 14:14:18 +02:00
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
&value,
|
2017-11-30 17:17:37 +01:00
|
|
|
now,
|
2019-08-25 16:18:24 +02:00
|
|
|
sndr,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2017-05-08 13:18:36 +02:00
|
|
|
5));
|
2017-06-23 14:37:53 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-05-08 13:31:28 +02:00
|
|
|
plugin->get_latest_reserve_in_reference (plugin->cls,
|
|
|
|
session,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2020-01-11 15:19:56 +01:00
|
|
|
&rr));
|
2017-06-23 14:37:53 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-05-08 13:31:28 +02:00
|
|
|
plugin->get_latest_reserve_in_reference (plugin->cls,
|
|
|
|
session,
|
2020-01-19 18:48:14 +01:00
|
|
|
"exchange-account-1",
|
2020-01-11 15:19:56 +01:00
|
|
|
&rr));
|
|
|
|
FAILIF (5 != rr);
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value * 2,
|
|
|
|
value.fraction * 2,
|
|
|
|
value.currency));
|
2016-04-01 20:27:57 +02:00
|
|
|
result = 5;
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
(void) GNUNET_TIME_round_abs (&now);
|
2016-05-31 10:39:11 +02:00
|
|
|
dkp = create_denom_key_pair (1024,
|
|
|
|
session,
|
2017-11-30 17:17:37 +01:00
|
|
|
now,
|
2015-08-17 23:07:32 +02:00
|
|
|
&value,
|
|
|
|
&fee_withdraw,
|
|
|
|
&fee_deposit,
|
2016-04-20 01:50:26 +02:00
|
|
|
&fee_refresh,
|
2019-08-25 16:18:24 +02:00
|
|
|
&fee_refund);
|
2017-10-06 22:19:13 +02:00
|
|
|
GNUNET_assert (NULL != dkp);
|
2017-04-09 21:28:45 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&dkp_pub_hash);
|
2019-08-25 16:18:24 +02:00
|
|
|
RND_BLK (&cbc.h_coin_envelope);
|
|
|
|
RND_BLK (&cbc.reserve_sig);
|
2019-05-02 21:16:51 +02:00
|
|
|
cbc.denom_pub_hash = dkp_pub_hash;
|
2015-03-22 22:14:30 +01:00
|
|
|
cbc.sig.rsa_signature
|
2016-03-20 21:30:10 +01:00
|
|
|
= GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
|
2016-04-01 20:27:57 +02:00
|
|
|
&cbc.h_coin_envelope);
|
2016-01-21 16:14:40 +01:00
|
|
|
cbc.reserve_pub = reserve_pub;
|
2015-08-17 23:07:32 +02:00
|
|
|
cbc.amount_with_fee = value;
|
2015-06-11 13:02:57 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (CURRENCY, &cbc.withdraw_fee));
|
2017-06-19 00:00:21 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-06-11 12:30:14 +02:00
|
|
|
plugin->insert_withdraw_info (plugin->cls,
|
2015-06-11 13:02:57 +02:00
|
|
|
session,
|
|
|
|
&cbc));
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2015-08-17 23:07:32 +02:00
|
|
|
value.value,
|
|
|
|
value.fraction,
|
|
|
|
value.currency));
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2017-06-19 17:53:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->get_reserve_by_h_blind (plugin->cls,
|
|
|
|
session,
|
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
&reserve_pub2));
|
2019-04-09 18:59:02 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&reserve_pub,
|
|
|
|
&reserve_pub2));
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2017-06-19 00:00:21 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-06-11 12:30:14 +02:00
|
|
|
plugin->get_withdraw_info (plugin->cls,
|
2015-06-11 13:02:57 +02:00
|
|
|
session,
|
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
&cbc2));
|
2019-08-25 16:18:24 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&cbc2.reserve_sig, &cbc.reserve_sig));
|
|
|
|
FAILIF (0 != GNUNET_memcmp (&cbc2.reserve_pub, &cbc.reserve_pub));
|
2016-04-01 20:27:57 +02:00
|
|
|
result = 6;
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
2015-06-11 13:02:57 +02:00
|
|
|
GNUNET_CRYPTO_rsa_verify (&cbc.h_coin_envelope,
|
2015-03-22 22:14:30 +01:00
|
|
|
cbc2.sig.rsa_signature,
|
|
|
|
dkp->pub.rsa_public_key));
|
2017-04-02 22:34:45 +02:00
|
|
|
|
|
|
|
|
|
|
|
RND_BLK (&coin_sig);
|
|
|
|
RND_BLK (&coin_blind);
|
2017-04-04 16:27:27 +02:00
|
|
|
RND_BLK (&deposit.coin.coin_pub);
|
2019-05-02 21:16:51 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&deposit.coin.denom_pub_hash);
|
2017-04-04 16:27:27 +02:00
|
|
|
deposit.coin.denom_sig = cbc.sig;
|
2017-04-03 16:40:31 +02:00
|
|
|
deadline = GNUNET_TIME_absolute_get ();
|
2017-11-19 22:01:17 +01:00
|
|
|
(void) GNUNET_TIME_round_abs (&deadline);
|
2018-08-19 16:01:57 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->ensure_coin_known (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit.coin));
|
2020-03-14 19:45:43 +01:00
|
|
|
{
|
|
|
|
struct TALER_EXCHANGEDB_Reserve pre_reserve;
|
|
|
|
struct TALER_EXCHANGEDB_Reserve post_reserve;
|
|
|
|
struct TALER_Amount delta;
|
|
|
|
|
|
|
|
pre_reserve.pub = reserve_pub;
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->reserves_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&pre_reserve));
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->insert_recoup_request (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve_pub,
|
|
|
|
&deposit.coin,
|
|
|
|
&coin_sig,
|
|
|
|
&coin_blind,
|
|
|
|
&value,
|
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
deadline));
|
|
|
|
post_reserve.pub = reserve_pub;
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->reserves_get (plugin->cls,
|
|
|
|
session,
|
|
|
|
&post_reserve));
|
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
TALER_amount_subtract (&delta,
|
|
|
|
&post_reserve.balance,
|
|
|
|
&pre_reserve.balance));
|
|
|
|
FAILIF (0 !=
|
|
|
|
TALER_amount_cmp (&delta,
|
|
|
|
&value));
|
|
|
|
}
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2020-01-18 23:49:37 +01:00
|
|
|
plugin->select_recoup_above_serial_id (plugin->cls,
|
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&recoup_cb,
|
|
|
|
&coin_blind));
|
2017-04-20 21:38:02 +02:00
|
|
|
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2019-08-25 16:18:24 +02:00
|
|
|
TALER_amount_add (&amount_with_fee,
|
|
|
|
&value,
|
|
|
|
&value));
|
2017-04-20 09:04:20 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (CURRENCY ":0.000010",
|
|
|
|
&fee_closing));
|
2017-11-30 17:17:37 +01:00
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
(void) GNUNET_TIME_round_abs (&now);
|
2017-06-24 00:41:41 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2019-08-25 16:18:24 +02:00
|
|
|
plugin->insert_reserve_closed (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve_pub,
|
|
|
|
now,
|
|
|
|
sndr,
|
|
|
|
&wire_out_wtid,
|
|
|
|
&amount_with_fee,
|
|
|
|
&fee_closing));
|
2017-04-20 21:38:02 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
check_reserve (session,
|
|
|
|
&reserve_pub,
|
2019-08-25 16:18:24 +02:00
|
|
|
0,
|
|
|
|
0,
|
2017-04-20 21:38:02 +02:00
|
|
|
value.currency));
|
2017-05-05 13:41:32 +02:00
|
|
|
|
2016-04-01 20:27:57 +02:00
|
|
|
result = 7;
|
2017-06-18 22:48:54 +02:00
|
|
|
qs = plugin->get_reserve_history (plugin->cls,
|
2015-03-21 14:21:00 +01:00
|
|
|
session,
|
2017-06-18 22:48:54 +02:00
|
|
|
&reserve_pub,
|
2019-08-25 16:18:24 +02:00
|
|
|
&rh);
|
2017-06-18 22:48:54 +02:00
|
|
|
FAILIF (0 > qs);
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (NULL == rh);
|
2015-03-21 14:21:00 +01:00
|
|
|
rh_head = rh;
|
2019-08-25 16:18:24 +02:00
|
|
|
for (cnt = 0; NULL != rh_head; rh_head = rh_head->next, cnt++)
|
2015-03-09 17:05:35 +01:00
|
|
|
{
|
|
|
|
switch (rh_head->type)
|
|
|
|
{
|
2016-03-01 15:35:04 +01:00
|
|
|
case TALER_EXCHANGEDB_RO_BANK_TO_EXCHANGE:
|
2015-03-09 17:05:35 +01:00
|
|
|
bt = rh_head->details.bank;
|
2015-03-21 14:21:00 +01:00
|
|
|
FAILIF (0 != memcmp (&bt->reserve_pub,
|
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
2015-08-17 23:07:32 +02:00
|
|
|
/* this is the amount we trasferred twice*/
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (1 != bt->amount.value);
|
2016-11-18 16:34:00 +01:00
|
|
|
FAILIF (1000 != bt->amount.fraction);
|
2015-03-09 17:05:35 +01:00
|
|
|
FAILIF (0 != strcmp (CURRENCY, bt->amount.currency));
|
2016-05-26 16:38:59 +02:00
|
|
|
FAILIF (NULL == bt->sender_account_details);
|
2015-03-09 17:05:35 +01:00
|
|
|
break;
|
2016-03-01 15:35:04 +01:00
|
|
|
case TALER_EXCHANGEDB_RO_WITHDRAW_COIN:
|
2015-03-09 17:05:35 +01:00
|
|
|
withdraw = rh_head->details.withdraw;
|
|
|
|
FAILIF (0 != memcmp (&withdraw->reserve_pub,
|
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
|
|
|
FAILIF (0 != memcmp (&withdraw->h_coin_envelope,
|
2015-06-11 13:02:57 +02:00
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
sizeof (cbc.h_coin_envelope)));
|
2015-03-09 17:05:35 +01:00
|
|
|
break;
|
2020-01-18 23:49:37 +01:00
|
|
|
case TALER_EXCHANGEDB_RO_RECOUP_COIN:
|
2017-04-02 22:34:45 +02:00
|
|
|
{
|
2020-01-18 23:49:37 +01:00
|
|
|
struct TALER_EXCHANGEDB_Recoup *recoup = rh_head->details.recoup;
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != memcmp (&recoup->coin_sig,
|
2017-04-02 22:34:45 +02:00
|
|
|
&coin_sig,
|
|
|
|
sizeof (coin_sig)));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != memcmp (&recoup->coin_blind,
|
2017-04-02 22:34:45 +02:00
|
|
|
&coin_blind,
|
|
|
|
sizeof (coin_blind)));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != memcmp (&recoup->reserve_pub,
|
2017-04-02 22:34:45 +02:00
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != memcmp (&recoup->coin.coin_pub,
|
2017-04-02 22:34:45 +02:00
|
|
|
&deposit.coin.coin_pub,
|
|
|
|
sizeof (deposit.coin.coin_pub)));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != TALER_amount_cmp (&recoup->value,
|
2017-04-02 22:34:45 +02:00
|
|
|
&value));
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case TALER_EXCHANGEDB_RO_EXCHANGE_TO_BANK:
|
2017-04-20 09:04:20 +02:00
|
|
|
{
|
|
|
|
struct TALER_EXCHANGEDB_ClosingTransfer *closing
|
2019-08-25 16:18:24 +02:00
|
|
|
= rh_head->details.closing;
|
2017-04-20 09:04:20 +02:00
|
|
|
|
|
|
|
FAILIF (0 != memcmp (&closing->reserve_pub,
|
|
|
|
&reserve_pub,
|
|
|
|
sizeof (reserve_pub)));
|
|
|
|
FAILIF (0 != TALER_amount_cmp (&closing->amount,
|
|
|
|
&amount_with_fee));
|
|
|
|
FAILIF (0 != TALER_amount_cmp (&closing->closing_fee,
|
|
|
|
&fee_closing));
|
|
|
|
}
|
2017-04-02 22:34:45 +02:00
|
|
|
break;
|
2015-03-09 17:05:35 +01:00
|
|
|
}
|
|
|
|
}
|
2017-04-20 09:04:20 +02:00
|
|
|
FAILIF (5 != cnt);
|
2016-10-20 23:28:36 +02:00
|
|
|
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt = 0;
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (0 >=
|
2016-10-20 23:28:36 +02:00
|
|
|
plugin->select_reserves_in_above_serial_id (plugin->cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_reserve_in_cb,
|
|
|
|
NULL));
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (0 >=
|
2020-03-05 23:02:38 +01:00
|
|
|
plugin->select_withdrawals_above_serial_id (plugin->cls,
|
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_reserve_out_cb,
|
|
|
|
NULL));
|
2016-10-20 23:55:19 +02:00
|
|
|
FAILIF (3 != auditor_row_cnt);
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2015-03-16 11:01:33 +01:00
|
|
|
/* Tests for deposits */
|
2018-04-02 14:24:45 +02:00
|
|
|
memset (&deposit,
|
|
|
|
0,
|
|
|
|
sizeof (deposit));
|
2015-03-16 11:01:33 +01:00
|
|
|
RND_BLK (&deposit.coin.coin_pub);
|
2019-05-02 21:16:51 +02:00
|
|
|
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
|
|
|
|
&deposit.coin.denom_pub_hash);
|
2015-03-16 11:01:33 +01:00
|
|
|
deposit.coin.denom_sig = cbc.sig;
|
|
|
|
RND_BLK (&deposit.csig);
|
|
|
|
RND_BLK (&deposit.merchant_pub);
|
2017-05-29 01:15:41 +02:00
|
|
|
RND_BLK (&deposit.h_contract_terms);
|
2017-10-06 20:02:28 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2018-10-06 15:05:06 +02:00
|
|
|
TALER_JSON_merchant_wire_signature_hash (wire,
|
|
|
|
&deposit.h_wire));
|
2016-05-26 16:38:59 +02:00
|
|
|
deposit.receiver_wire_account = wire;
|
2015-08-17 23:07:32 +02:00
|
|
|
deposit.amount_with_fee = value;
|
2016-05-27 14:04:29 +02:00
|
|
|
deposit.deposit_fee = fee_deposit;
|
2017-11-19 22:01:17 +01:00
|
|
|
|
|
|
|
deposit.refund_deadline = deadline;
|
|
|
|
deposit.wire_deadline = deadline;
|
2016-04-06 10:22:09 +02:00
|
|
|
result = 8;
|
2018-08-19 16:01:57 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->ensure_coin_known (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit.coin));
|
2017-06-18 15:13:13 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->insert_deposit (plugin->cls,
|
2017-04-02 22:34:45 +02:00
|
|
|
session,
|
|
|
|
&deposit));
|
2017-06-18 21:47:05 +02:00
|
|
|
FAILIF (1 !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
2018-11-19 23:02:37 +01:00
|
|
|
&deposit,
|
|
|
|
GNUNET_YES));
|
2017-11-19 22:01:17 +01:00
|
|
|
{
|
|
|
|
struct GNUNET_TIME_Absolute start_range;
|
|
|
|
struct GNUNET_TIME_Absolute end_range;
|
|
|
|
|
|
|
|
start_range = GNUNET_TIME_absolute_subtract (deadline,
|
|
|
|
GNUNET_TIME_UNIT_SECONDS);
|
|
|
|
end_range = GNUNET_TIME_absolute_add (deadline,
|
|
|
|
GNUNET_TIME_UNIT_SECONDS);
|
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
|
|
|
plugin->select_deposits_missing_wire (plugin->cls,
|
|
|
|
session,
|
|
|
|
start_range,
|
|
|
|
end_range,
|
|
|
|
&wire_missing_cb,
|
|
|
|
&deposit));
|
|
|
|
FAILIF (8 != result);
|
|
|
|
}
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt = 0;
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-10-20 23:28:36 +02:00
|
|
|
plugin->select_deposits_above_serial_id (plugin->cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_deposit_cb,
|
|
|
|
NULL));
|
2016-10-20 23:55:19 +02:00
|
|
|
FAILIF (1 != auditor_row_cnt);
|
2016-04-06 10:22:09 +02:00
|
|
|
result = 9;
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-04-06 10:22:09 +02:00
|
|
|
plugin->iterate_matching_deposits (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit.h_wire,
|
|
|
|
&deposit.merchant_pub,
|
2018-04-02 14:24:45 +02:00
|
|
|
&deposit_cb,
|
|
|
|
&deposit,
|
2016-04-06 10:22:09 +02:00
|
|
|
2));
|
2017-11-30 17:17:37 +01:00
|
|
|
sleep (2); /* giv deposit time to be ready */
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->get_ready_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit_cb,
|
|
|
|
&deposit));
|
2017-06-23 14:13:54 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
|
|
|
plugin->commit (plugin->cls,
|
|
|
|
session));
|
2016-05-06 23:51:15 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
2018-03-12 11:33:10 +01:00
|
|
|
session,
|
|
|
|
"test-2"));
|
2017-06-18 15:02:35 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->mark_deposit_tiny (plugin->cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
session,
|
2016-05-06 23:51:15 +02:00
|
|
|
deposit_rowid));
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->get_ready_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit_cb,
|
|
|
|
&deposit));
|
|
|
|
plugin->rollback (plugin->cls,
|
|
|
|
session);
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->get_ready_deposit (plugin->cls,
|
|
|
|
session,
|
|
|
|
&deposit_cb,
|
|
|
|
&deposit));
|
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
2018-03-12 11:33:10 +01:00
|
|
|
session,
|
|
|
|
"test-3"));
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->test_deposit_done (plugin->cls,
|
|
|
|
session,
|
2020-01-16 23:49:34 +01:00
|
|
|
&deposit.coin.coin_pub,
|
|
|
|
&deposit.merchant_pub,
|
|
|
|
&deposit.h_contract_terms,
|
|
|
|
&deposit.h_wire));
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->mark_deposit_done (plugin->cls,
|
|
|
|
session,
|
|
|
|
deposit_rowid));
|
2017-06-11 01:59:09 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->commit (plugin->cls,
|
|
|
|
session));
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-06 23:51:15 +02:00
|
|
|
plugin->test_deposit_done (plugin->cls,
|
|
|
|
session,
|
2020-01-16 23:49:34 +01:00
|
|
|
&deposit.coin.coin_pub,
|
|
|
|
&deposit.merchant_pub,
|
|
|
|
&deposit.h_contract_terms,
|
|
|
|
&deposit.h_wire));
|
2016-05-06 23:51:15 +02:00
|
|
|
|
2016-04-06 10:22:09 +02:00
|
|
|
result = 10;
|
2016-01-21 16:14:40 +01:00
|
|
|
deposit2 = deposit;
|
2019-06-05 21:26:27 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
|
|
|
session,
|
|
|
|
"test-2"));
|
2015-03-16 11:01:33 +01:00
|
|
|
RND_BLK (&deposit2.merchant_pub); /* should fail if merchant is different */
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
2018-11-19 23:02:37 +01:00
|
|
|
&deposit2,
|
|
|
|
GNUNET_YES));
|
2016-01-21 16:14:40 +01:00
|
|
|
deposit2.merchant_pub = deposit.merchant_pub;
|
2015-03-16 11:01:33 +01:00
|
|
|
RND_BLK (&deposit2.coin.coin_pub); /* should fail if coin is different */
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2015-03-21 14:21:00 +01:00
|
|
|
plugin->have_deposit (plugin->cls,
|
|
|
|
session,
|
2018-11-19 23:02:37 +01:00
|
|
|
&deposit2,
|
|
|
|
GNUNET_YES));
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
2019-08-25 16:18:24 +02:00
|
|
|
test_melting (session));
|
2019-06-05 21:26:27 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
|
|
|
plugin->commit (plugin->cls,
|
|
|
|
session));
|
2016-01-22 13:45:32 +01:00
|
|
|
|
2016-05-08 15:44:44 +02:00
|
|
|
|
|
|
|
/* test insert_refund! */
|
|
|
|
refund.coin = deposit.coin;
|
2020-01-16 23:49:34 +01:00
|
|
|
refund.details.merchant_pub = deposit.merchant_pub;
|
|
|
|
RND_BLK (&refund.details.merchant_sig);
|
|
|
|
refund.details.h_contract_terms = deposit.h_contract_terms;
|
|
|
|
refund.details.rtransaction_id
|
|
|
|
= GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
UINT64_MAX);
|
|
|
|
refund.details.refund_amount = deposit.amount_with_fee;
|
|
|
|
refund.details.refund_fee = fee_refund;
|
2017-06-18 21:47:05 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-05-08 15:44:44 +02:00
|
|
|
plugin->insert_refund (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refund));
|
2018-01-03 01:10:23 +01:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2019-08-25 16:18:24 +02:00
|
|
|
plugin->select_refunds_by_coin (plugin->cls,
|
|
|
|
session,
|
|
|
|
&refund.coin.coin_pub,
|
2020-01-17 15:43:04 +01:00
|
|
|
&refund.details.merchant_pub,
|
|
|
|
&refund.details.h_contract_terms,
|
2019-08-25 16:18:24 +02:00
|
|
|
&check_refund_cb,
|
|
|
|
&refund));
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2020-01-18 23:49:37 +01:00
|
|
|
/* test recoup / revocation */
|
2017-04-09 21:28:45 +02:00
|
|
|
RND_BLK (&master_sig);
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->insert_denomination_revocation (plugin->cls,
|
|
|
|
session,
|
|
|
|
&dkp_pub_hash,
|
|
|
|
&master_sig));
|
2017-06-11 01:59:09 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->commit (plugin->cls,
|
|
|
|
session));
|
2018-03-12 11:33:10 +01:00
|
|
|
plugin->preflight (plugin->cls,
|
|
|
|
session);
|
2017-04-09 21:28:45 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
2018-03-12 11:33:10 +01:00
|
|
|
session,
|
|
|
|
"test-4"));
|
2017-06-24 12:15:11 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->insert_denomination_revocation (plugin->cls,
|
|
|
|
session,
|
|
|
|
&dkp_pub_hash,
|
|
|
|
&master_sig));
|
|
|
|
plugin->rollback (plugin->cls,
|
|
|
|
session);
|
2018-03-12 11:33:10 +01:00
|
|
|
plugin->preflight (plugin->cls,
|
|
|
|
session);
|
2017-04-09 21:28:45 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
plugin->start (plugin->cls,
|
2018-03-12 11:33:10 +01:00
|
|
|
session,
|
|
|
|
"test-5"));
|
2017-04-09 21:28:45 +02:00
|
|
|
{
|
|
|
|
struct TALER_MasterSignatureP msig;
|
2017-04-16 17:21:26 +02:00
|
|
|
uint64_t rev_rowid;
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2017-06-23 13:16:12 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2017-04-09 21:28:45 +02:00
|
|
|
plugin->get_denomination_revocation (plugin->cls,
|
|
|
|
session,
|
|
|
|
&dkp_pub_hash,
|
2017-04-16 17:21:26 +02:00
|
|
|
&msig,
|
2019-08-25 16:18:24 +02:00
|
|
|
&rev_rowid));
|
2019-04-15 22:23:53 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&msig,
|
|
|
|
&master_sig));
|
2017-04-09 21:28:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-02 22:34:45 +02:00
|
|
|
RND_BLK (&coin_sig);
|
|
|
|
RND_BLK (&coin_blind);
|
2017-06-19 17:53:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2020-01-18 23:49:37 +01:00
|
|
|
plugin->insert_recoup_request (plugin->cls,
|
|
|
|
session,
|
|
|
|
&reserve_pub,
|
|
|
|
&deposit.coin,
|
|
|
|
&coin_sig,
|
|
|
|
&coin_blind,
|
|
|
|
&value,
|
|
|
|
&cbc.h_coin_envelope,
|
|
|
|
deadline));
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2016-10-20 23:55:19 +02:00
|
|
|
auditor_row_cnt = 0;
|
2017-06-24 16:15:42 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
|
2016-10-20 23:28:36 +02:00
|
|
|
plugin->select_refunds_above_serial_id (plugin->cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
session,
|
|
|
|
0,
|
|
|
|
&audit_refund_cb,
|
|
|
|
NULL));
|
2016-05-08 15:44:44 +02:00
|
|
|
|
2016-10-20 23:55:19 +02:00
|
|
|
FAILIF (1 != auditor_row_cnt);
|
2017-06-19 16:07:34 +02:00
|
|
|
qs = plugin->get_coin_transactions (plugin->cls,
|
2016-05-08 15:44:44 +02:00
|
|
|
session,
|
2017-06-19 16:07:34 +02:00
|
|
|
&refund.coin.coin_pub,
|
2018-08-19 17:19:27 +02:00
|
|
|
GNUNET_YES,
|
2019-08-25 16:18:24 +02:00
|
|
|
&tl);
|
2017-06-19 16:07:34 +02:00
|
|
|
FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT != qs);
|
2016-05-08 15:44:44 +02:00
|
|
|
GNUNET_assert (NULL != tl);
|
|
|
|
matched = 0;
|
|
|
|
for (tlp = tl; NULL != tlp; tlp = tlp->next)
|
|
|
|
{
|
|
|
|
switch (tlp->type)
|
|
|
|
{
|
|
|
|
case TALER_EXCHANGEDB_TT_DEPOSIT:
|
|
|
|
{
|
2020-01-16 23:49:34 +01:00
|
|
|
struct TALER_EXCHANGEDB_DepositListEntry *have = tlp->details.deposit;
|
2016-05-08 15:44:44 +02:00
|
|
|
|
|
|
|
/* Note: we're not comparing the denomination keys, as there is
|
|
|
|
still the question of whether we should even bother exporting
|
|
|
|
them here. */
|
|
|
|
FAILIF (0 != memcmp (&have->csig,
|
|
|
|
&deposit.csig,
|
|
|
|
sizeof (struct TALER_CoinSpendSignatureP)));
|
|
|
|
FAILIF (0 != memcmp (&have->merchant_pub,
|
|
|
|
&deposit.merchant_pub,
|
|
|
|
sizeof (struct TALER_MerchantPublicKeyP)));
|
2017-05-29 01:15:41 +02:00
|
|
|
FAILIF (0 != memcmp (&have->h_contract_terms,
|
|
|
|
&deposit.h_contract_terms,
|
2016-05-08 15:44:44 +02:00
|
|
|
sizeof (struct GNUNET_HashCode)));
|
|
|
|
FAILIF (0 != memcmp (&have->h_wire,
|
|
|
|
&deposit.h_wire,
|
|
|
|
sizeof (struct GNUNET_HashCode)));
|
|
|
|
/* Note: not comparing 'wire', seems truly redundant and would be tricky */
|
|
|
|
FAILIF (have->timestamp.abs_value_us != deposit.timestamp.abs_value_us);
|
2019-08-25 16:18:24 +02:00
|
|
|
FAILIF (have->refund_deadline.abs_value_us !=
|
|
|
|
deposit.refund_deadline.abs_value_us);
|
|
|
|
FAILIF (have->wire_deadline.abs_value_us !=
|
|
|
|
deposit.wire_deadline.abs_value_us);
|
2016-05-08 15:44:44 +02:00
|
|
|
FAILIF (0 != TALER_amount_cmp (&have->amount_with_fee,
|
|
|
|
&deposit.amount_with_fee));
|
|
|
|
FAILIF (0 != TALER_amount_cmp (&have->deposit_fee,
|
|
|
|
&deposit.deposit_fee));
|
|
|
|
matched |= 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#if 0
|
2019-08-25 16:18:24 +02:00
|
|
|
/* this coin pub was actually never melted... */
|
2020-03-04 11:47:22 +01:00
|
|
|
case TALER_EXCHANGEDB_TT_MELT:
|
2016-05-08 15:44:44 +02:00
|
|
|
FAILIF (0 != memcmp (&melt,
|
|
|
|
&tlp->details.melt,
|
2020-03-04 12:10:11 +01:00
|
|
|
sizeof (struct TALER_EXCHANGEDB_Melt)));
|
2016-05-08 15:44:44 +02:00
|
|
|
matched |= 2;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
case TALER_EXCHANGEDB_TT_REFUND:
|
|
|
|
{
|
2020-01-16 23:49:34 +01:00
|
|
|
struct TALER_EXCHANGEDB_RefundListEntry *have = tlp->details.refund;
|
2016-05-08 15:44:44 +02:00
|
|
|
|
|
|
|
/* Note: we're not comparing the denomination keys, as there is
|
|
|
|
still the question of whether we should even bother exporting
|
|
|
|
them here. */
|
2019-04-15 22:23:53 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&have->merchant_pub,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund.details.merchant_pub));
|
2019-04-15 22:23:53 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&have->merchant_sig,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund.details.merchant_sig));
|
2019-04-15 22:23:53 +02:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&have->h_contract_terms,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund.details.h_contract_terms));
|
|
|
|
FAILIF (have->rtransaction_id != refund.details.rtransaction_id);
|
2016-05-08 15:44:44 +02:00
|
|
|
FAILIF (0 != TALER_amount_cmp (&have->refund_amount,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund.details.refund_amount));
|
2016-05-08 15:44:44 +02:00
|
|
|
FAILIF (0 != TALER_amount_cmp (&have->refund_fee,
|
2020-01-16 23:49:34 +01:00
|
|
|
&refund.details.refund_fee));
|
2016-05-08 15:44:44 +02:00
|
|
|
matched |= 4;
|
|
|
|
break;
|
|
|
|
}
|
2020-01-18 23:49:37 +01:00
|
|
|
case TALER_EXCHANGEDB_TT_RECOUP:
|
2017-04-02 22:34:45 +02:00
|
|
|
{
|
2020-01-18 23:49:37 +01:00
|
|
|
struct TALER_EXCHANGEDB_RecoupListEntry *recoup =
|
|
|
|
tlp->details.recoup;
|
2017-04-02 22:34:45 +02:00
|
|
|
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&recoup->coin_sig,
|
2019-04-15 22:23:53 +02:00
|
|
|
&coin_sig));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&recoup->coin_blind,
|
2019-04-15 22:23:53 +02:00
|
|
|
&coin_blind));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != GNUNET_memcmp (&recoup->reserve_pub,
|
2019-04-15 22:23:53 +02:00
|
|
|
&reserve_pub));
|
2020-01-18 23:49:37 +01:00
|
|
|
FAILIF (0 != TALER_amount_cmp (&recoup->value,
|
2017-04-02 22:34:45 +02:00
|
|
|
&value));
|
|
|
|
matched |= 8;
|
|
|
|
break;
|
|
|
|
}
|
2016-05-08 15:44:44 +02:00
|
|
|
default:
|
|
|
|
FAILIF (1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-04-02 22:34:45 +02:00
|
|
|
FAILIF (13 != matched);
|
2016-05-08 15:44:44 +02:00
|
|
|
|
|
|
|
plugin->free_coin_transaction_list (plugin->cls,
|
|
|
|
tl);
|
|
|
|
|
2018-08-19 18:40:13 +02:00
|
|
|
plugin->rollback (plugin->cls,
|
|
|
|
session);
|
2016-01-22 13:45:32 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
2017-03-18 02:40:27 +01:00
|
|
|
test_wire_prepare (session));
|
2016-01-22 13:45:32 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
2017-03-18 02:40:27 +01:00
|
|
|
test_wire_out (session,
|
|
|
|
&deposit));
|
2016-05-31 10:39:11 +02:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
test_gc (session));
|
2017-03-04 23:01:25 +01:00
|
|
|
FAILIF (GNUNET_OK !=
|
|
|
|
test_wire_fees (session));
|
2016-05-31 10:39:11 +02:00
|
|
|
|
2018-03-12 11:33:10 +01:00
|
|
|
plugin->preflight (plugin->cls,
|
|
|
|
session);
|
2017-04-09 21:28:45 +02:00
|
|
|
|
2015-03-05 15:59:22 +01:00
|
|
|
result = 0;
|
2015-03-07 13:56:26 +01:00
|
|
|
|
2019-10-05 15:42:08 +02:00
|
|
|
drop:
|
2018-04-02 21:12:18 +02:00
|
|
|
if ( (0 != result) &&
|
|
|
|
(NULL != session) )
|
2018-04-02 14:24:45 +02:00
|
|
|
plugin->rollback (plugin->cls,
|
|
|
|
session);
|
2015-03-09 17:05:35 +01:00
|
|
|
if (NULL != rh)
|
2015-03-22 13:02:49 +01:00
|
|
|
plugin->free_reserve_history (plugin->cls,
|
|
|
|
rh);
|
2015-03-09 17:05:35 +01:00
|
|
|
rh = NULL;
|
2016-05-18 17:19:32 +02:00
|
|
|
GNUNET_break (GNUNET_OK ==
|
|
|
|
plugin->drop_tables (plugin->cls));
|
2015-03-07 13:56:26 +01:00
|
|
|
if (NULL != dkp)
|
2015-04-12 17:16:21 +02:00
|
|
|
destroy_denom_key_pair (dkp);
|
2015-03-22 22:14:30 +01:00
|
|
|
if (NULL != cbc.sig.rsa_signature)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cbc.sig.rsa_signature);
|
|
|
|
if (NULL != cbc2.sig.rsa_signature)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cbc2.sig.rsa_signature);
|
2015-03-07 13:56:26 +01:00
|
|
|
dkp = NULL;
|
2018-04-02 14:24:45 +02:00
|
|
|
json_decref (wire);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_plugin_unload (plugin);
|
2015-03-28 12:29:35 +01:00
|
|
|
plugin = NULL;
|
2015-03-05 15:59:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
2015-03-21 14:21:00 +01:00
|
|
|
main (int argc,
|
|
|
|
char *const argv[])
|
2015-03-05 15:59:22 +01:00
|
|
|
{
|
2016-03-30 22:56:17 +02:00
|
|
|
const char *plugin_name;
|
|
|
|
char *config_filename;
|
|
|
|
char *testname;
|
2016-04-01 20:27:57 +02:00
|
|
|
struct GNUNET_CONFIGURATION_Handle *cfg;
|
2016-03-30 22:56:17 +02:00
|
|
|
|
|
|
|
result = -1;
|
|
|
|
if (NULL == (plugin_name = strrchr (argv[0], (int) '-')))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return -1;
|
|
|
|
}
|
2016-04-06 10:22:09 +02:00
|
|
|
GNUNET_log_setup (argv[0],
|
|
|
|
"WARNING",
|
|
|
|
NULL);
|
2016-03-30 22:56:17 +02:00
|
|
|
plugin_name++;
|
|
|
|
(void) GNUNET_asprintf (&testname,
|
2018-01-04 00:41:19 +01:00
|
|
|
"test-exchange-db-%s",
|
2019-08-25 16:18:24 +02:00
|
|
|
plugin_name);
|
2016-03-30 22:56:17 +02:00
|
|
|
(void) GNUNET_asprintf (&config_filename,
|
2018-01-04 00:41:19 +01:00
|
|
|
"%s.conf",
|
2019-08-25 16:18:24 +02:00
|
|
|
testname);
|
2016-04-01 20:27:57 +02:00
|
|
|
cfg = GNUNET_CONFIGURATION_create ();
|
2015-03-05 15:59:22 +01:00
|
|
|
if (GNUNET_OK !=
|
2016-04-01 20:27:57 +02:00
|
|
|
GNUNET_CONFIGURATION_parse (cfg,
|
|
|
|
config_filename))
|
2015-03-26 18:31:59 +01:00
|
|
|
{
|
2016-04-01 20:27:57 +02:00
|
|
|
GNUNET_break (0);
|
2015-03-26 18:31:59 +01:00
|
|
|
GNUNET_free (config_filename);
|
2015-03-26 18:36:52 +01:00
|
|
|
GNUNET_free (testname);
|
2016-04-01 20:27:57 +02:00
|
|
|
return 2;
|
2015-03-26 18:31:59 +01:00
|
|
|
}
|
2018-01-04 00:41:19 +01:00
|
|
|
GNUNET_SCHEDULER_run (&run,
|
2019-08-25 16:18:24 +02:00
|
|
|
cfg);
|
2016-04-01 20:27:57 +02:00
|
|
|
GNUNET_CONFIGURATION_destroy (cfg);
|
2015-03-26 18:31:59 +01:00
|
|
|
GNUNET_free (config_filename);
|
2015-03-26 18:36:52 +01:00
|
|
|
GNUNET_free (testname);
|
2015-03-05 15:59:22 +01:00
|
|
|
return result;
|
|
|
|
}
|
2017-06-24 16:15:42 +02:00
|
|
|
|
2019-10-31 12:59:50 +01:00
|
|
|
|
2017-06-24 16:15:42 +02:00
|
|
|
/* end of test_exchangedb.c */
|