2015-01-08 18:37:20 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2017-04-07 22:46:30 +02:00
|
|
|
Copyright (C) 2014-2017 GNUnet e. V. (and other contributing authors)
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
/**
|
2016-05-06 19:22:39 +02:00
|
|
|
* @file exchangedb/test_exchangedb_denomkeys.c
|
|
|
|
* @brief test cases for some functions in exchangedb/exchangedb_denomkeys.c
|
2015-01-08 18:37:20 +01:00
|
|
|
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "gnunet/gnunet_util_lib.h"
|
2015-01-30 14:17:42 +01:00
|
|
|
#include "taler_signatures.h"
|
2016-03-01 15:35:04 +01:00
|
|
|
#include "taler_exchangedb_lib.h"
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-01-27 21:48:50 +01:00
|
|
|
#define RSA_KEY_SIZE 1024
|
|
|
|
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
#define EXITIF(cond) \
|
|
|
|
do { \
|
|
|
|
if (cond) { GNUNET_break (0); goto EXITIF_exit; } \
|
|
|
|
} while (0)
|
|
|
|
|
2017-04-07 22:46:30 +02:00
|
|
|
|
2016-05-06 18:33:02 +02:00
|
|
|
/**
|
|
|
|
* @brief Iterator called on denomination key.
|
|
|
|
*
|
|
|
|
* @param cls closure with expected DKI
|
|
|
|
* @param dki the denomination key
|
|
|
|
* @param alias coin alias
|
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
dki_iter (void *cls,
|
|
|
|
const char *alias,
|
2019-02-23 14:47:44 +01:00
|
|
|
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki)
|
2016-05-06 18:33:02 +02:00
|
|
|
{
|
|
|
|
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *exp = cls;
|
|
|
|
|
2019-04-08 22:42:05 +02:00
|
|
|
if (0 != GNUNET_memcmp (&exp->issue,
|
|
|
|
&dki->issue))
|
2017-04-09 20:51:19 +02:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (0 !=
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_cmp (exp->denom_priv.rsa_private_key,
|
|
|
|
dki->denom_priv.rsa_private_key))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
if (0 !=
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_cmp (exp->denom_pub.rsa_public_key,
|
|
|
|
dki->denom_pub.rsa_public_key))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Iterator called on revoked denomination key.
|
|
|
|
*
|
|
|
|
* @param cls closure with expected DKI
|
2019-02-23 14:47:44 +01:00
|
|
|
* @param denom_hash hash of the revoked denomination key
|
2017-04-09 20:51:19 +02:00
|
|
|
* @param revocation_master_sig non-NULL if @a dki was revoked
|
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
dki_iter_revoked (void *cls,
|
2019-02-23 14:47:44 +01:00
|
|
|
const struct GNUNET_HashCode *denom_hash,
|
2017-04-09 20:51:19 +02:00
|
|
|
const struct TALER_MasterSignatureP *revocation_master_sig)
|
|
|
|
{
|
|
|
|
const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *exp = cls;
|
|
|
|
|
|
|
|
if (NULL == revocation_master_sig)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2019-04-10 22:49:27 +02:00
|
|
|
if (0 != GNUNET_memcmp (denom_hash,
|
|
|
|
&exp->issue.properties.denom_hash))
|
2016-05-06 18:33:02 +02:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
2015-03-22 22:14:30 +01:00
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
int
|
2015-03-22 22:14:30 +01:00
|
|
|
main (int argc,
|
|
|
|
const char *const argv[])
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_DenominationKeyIssueInformation dki;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *enc;
|
|
|
|
size_t enc_size;
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_DenominationKeyIssueInformation dki_read;
|
2017-04-09 20:51:19 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *pk;
|
|
|
|
struct TALER_MasterPrivateKeyP master_priv;
|
2017-04-07 22:46:30 +02:00
|
|
|
struct TALER_MasterPublicKeyP master_pub;
|
2015-01-26 12:22:26 +01:00
|
|
|
char *enc_read;
|
|
|
|
size_t enc_read_size;
|
2015-01-08 18:37:20 +01:00
|
|
|
char *tmpfile;
|
2016-05-06 19:22:39 +02:00
|
|
|
char *tmpdir;
|
2019-02-23 14:47:44 +01:00
|
|
|
char *revdir;
|
2015-01-08 18:37:20 +01:00
|
|
|
int ret;
|
2017-04-09 20:51:19 +02:00
|
|
|
struct GNUNET_TIME_Absolute start;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
ret = 1;
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_log_setup ("test-exchangedb-denomkeys",
|
|
|
|
"WARNING",
|
|
|
|
NULL);
|
2015-01-08 18:37:20 +01:00
|
|
|
enc = NULL;
|
|
|
|
enc_read = NULL;
|
|
|
|
tmpfile = NULL;
|
2015-03-22 22:14:30 +01:00
|
|
|
dki.denom_priv.rsa_private_key = NULL;
|
|
|
|
dki_read.denom_priv.rsa_private_key = NULL;
|
2017-04-09 20:51:19 +02:00
|
|
|
pk = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
master_priv.eddsa_priv = *pk;
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (pk,
|
|
|
|
&master_pub.eddsa_pub);
|
|
|
|
GNUNET_free (pk);
|
2015-01-08 18:37:20 +01:00
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
2016-05-06 19:22:39 +02:00
|
|
|
&dki.issue,
|
2019-08-25 16:18:24 +02:00
|
|
|
sizeof (struct
|
|
|
|
TALER_EXCHANGEDB_DenominationKeyInformationP));
|
2015-03-22 22:14:30 +01:00
|
|
|
dki.denom_priv.rsa_private_key
|
|
|
|
= GNUNET_CRYPTO_rsa_private_key_create (RSA_KEY_SIZE);
|
2016-05-06 19:22:39 +02:00
|
|
|
dki.denom_pub.rsa_public_key
|
|
|
|
= GNUNET_CRYPTO_rsa_private_key_get_public (dki.denom_priv.rsa_private_key);
|
2019-08-25 16:18:24 +02:00
|
|
|
enc_size = GNUNET_CRYPTO_rsa_private_key_encode (
|
|
|
|
dki.denom_priv.rsa_private_key,
|
|
|
|
&enc);
|
2016-05-06 19:22:39 +02:00
|
|
|
EXITIF (NULL == (tmpdir = GNUNET_DISK_mkdtemp ("test_exchangedb_dki")));
|
2017-04-09 20:51:19 +02:00
|
|
|
start = GNUNET_TIME_absolute_ntoh (dki.issue.properties.start);
|
2016-05-06 19:22:39 +02:00
|
|
|
GNUNET_asprintf (&tmpfile,
|
2017-04-09 20:51:19 +02:00
|
|
|
"%s/%s/%s/%llu",
|
2016-05-06 19:22:39 +02:00
|
|
|
tmpdir,
|
|
|
|
TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS,
|
|
|
|
"cur-unit-uuid",
|
2017-04-09 20:51:19 +02:00
|
|
|
(unsigned long long) start.abs_value_us);
|
2019-02-23 14:47:44 +01:00
|
|
|
GNUNET_asprintf (&revdir,
|
|
|
|
"%s/revocations/",
|
|
|
|
tmpdir,
|
|
|
|
TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS);
|
2016-05-06 18:33:02 +02:00
|
|
|
EXITIF (GNUNET_OK !=
|
|
|
|
TALER_EXCHANGEDB_denomination_key_write (tmpfile,
|
|
|
|
&dki));
|
|
|
|
EXITIF (GNUNET_OK !=
|
|
|
|
TALER_EXCHANGEDB_denomination_key_read (tmpfile,
|
|
|
|
&dki_read));
|
|
|
|
EXITIF (1 !=
|
2016-05-06 19:22:39 +02:00
|
|
|
TALER_EXCHANGEDB_denomination_keys_iterate (tmpdir,
|
2016-05-06 18:33:02 +02:00
|
|
|
&dki_iter,
|
|
|
|
&dki));
|
|
|
|
|
2017-04-09 20:51:19 +02:00
|
|
|
EXITIF (GNUNET_OK !=
|
2019-02-23 14:47:44 +01:00
|
|
|
TALER_EXCHANGEDB_denomination_key_revoke (revdir,
|
2019-08-25 16:18:24 +02:00
|
|
|
&dki.issue.properties.
|
|
|
|
denom_hash,
|
2017-04-09 20:51:19 +02:00
|
|
|
&master_priv));
|
|
|
|
EXITIF (1 !=
|
2019-02-23 14:47:44 +01:00
|
|
|
TALER_EXCHANGEDB_revocations_iterate (revdir,
|
2019-08-25 16:18:24 +02:00
|
|
|
&master_pub,
|
|
|
|
&dki_iter_revoked,
|
|
|
|
&dki));
|
2019-02-23 14:47:44 +01:00
|
|
|
GNUNET_free (revdir);
|
2016-05-06 18:33:02 +02:00
|
|
|
|
2019-08-25 16:18:24 +02:00
|
|
|
enc_read_size = GNUNET_CRYPTO_rsa_private_key_encode (
|
|
|
|
dki_read.denom_priv.rsa_private_key,
|
|
|
|
&enc_read);
|
2015-01-26 12:22:26 +01:00
|
|
|
EXITIF (enc_size != enc_read_size);
|
2015-01-08 18:37:20 +01:00
|
|
|
EXITIF (0 != memcmp (enc,
|
|
|
|
enc_read,
|
2015-01-26 12:22:26 +01:00
|
|
|
enc_size));
|
2015-01-08 18:37:20 +01:00
|
|
|
ret = 0;
|
|
|
|
|
2019-08-25 16:18:24 +02:00
|
|
|
EXITIF_exit:
|
2015-01-08 18:37:20 +01:00
|
|
|
GNUNET_free_non_null (enc);
|
2017-04-10 17:01:20 +02:00
|
|
|
GNUNET_free_non_null (tmpfile);
|
|
|
|
if (NULL != tmpdir)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2017-04-10 17:01:20 +02:00
|
|
|
(void) GNUNET_DISK_directory_remove (tmpdir);
|
|
|
|
GNUNET_free (tmpdir);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
GNUNET_free_non_null (enc_read);
|
2015-03-22 22:14:30 +01:00
|
|
|
if (NULL != dki.denom_priv.rsa_private_key)
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dki.denom_priv.rsa_private_key);
|
2016-05-06 19:22:39 +02:00
|
|
|
if (NULL != dki.denom_pub.rsa_public_key)
|
|
|
|
GNUNET_CRYPTO_rsa_public_key_free (dki.denom_pub.rsa_public_key);
|
2015-03-22 22:14:30 +01:00
|
|
|
if (NULL != dki_read.denom_priv.rsa_private_key)
|
|
|
|
GNUNET_CRYPTO_rsa_private_key_free (dki_read.denom_priv.rsa_private_key);
|
2015-01-08 18:37:20 +01:00
|
|
|
return ret;
|
|
|
|
}
|