exchange/src/mintdb/test_mintdb_keyio.c

87 lines
3.0 KiB
C
Raw Normal View History

2015-01-08 18:37:20 +01:00
/*
This file is part of TALER
Copyright (C) 2014 GNUnet e. V. (and other contributing authors)
2015-01-08 18:37:20 +01:00
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
* @file mint/test_mint_common.c
* @brief test cases for some functions in mint/mint_common.c
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
*/
#include "platform.h"
#include "gnunet/gnunet_util_lib.h"
2015-01-30 14:17:42 +01:00
#include "taler_signatures.h"
#include "key_io.h"
2015-01-08 18:37:20 +01:00
2015-01-27 21:48:50 +01:00
#define RSA_KEY_SIZE 1024
2015-01-08 18:37:20 +01:00
#define EXITIF(cond) \
do { \
if (cond) { GNUNET_break (0); goto EXITIF_exit; } \
} while (0)
2015-03-22 22:14:30 +01:00
2015-01-08 18:37:20 +01:00
int
2015-03-22 22:14:30 +01:00
main (int argc,
const char *const argv[])
2015-01-08 18:37:20 +01:00
{
struct TALER_DenominationKeyIssueInformation dki;
char *enc;
size_t enc_size;
struct TALER_DenominationKeyIssueInformation dki_read;
char *enc_read;
size_t enc_read_size;
2015-01-08 18:37:20 +01:00
char *tmpfile;
int ret;
ret = 1;
enc = NULL;
enc_read = NULL;
tmpfile = NULL;
2015-03-22 22:14:30 +01:00
dki.denom_priv.rsa_private_key = NULL;
dki_read.denom_priv.rsa_private_key = NULL;
2015-01-08 18:37:20 +01:00
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
&dki.issue.signature,
sizeof (dki) - offsetof (struct TALER_DenominationKeyValidityPS,
2015-01-08 18:37:20 +01:00
signature));
2015-03-22 22:14:30 +01:00
dki.denom_priv.rsa_private_key
= GNUNET_CRYPTO_rsa_private_key_create (RSA_KEY_SIZE);
enc_size = GNUNET_CRYPTO_rsa_private_key_encode (dki.denom_priv.rsa_private_key,
&enc);
2015-01-08 18:37:20 +01:00
EXITIF (NULL == (tmpfile = GNUNET_DISK_mktemp ("test_mint_common")));
EXITIF (GNUNET_OK != TALER_MINT_write_denom_key (tmpfile, &dki));
EXITIF (GNUNET_OK != TALER_MINT_read_denom_key (tmpfile, &dki_read));
2015-03-22 22:14:30 +01:00
enc_read_size = GNUNET_CRYPTO_rsa_private_key_encode (dki_read.denom_priv.rsa_private_key,
2015-01-27 21:48:50 +01:00
&enc_read);
EXITIF (enc_size != enc_read_size);
2015-01-08 18:37:20 +01:00
EXITIF (0 != memcmp (enc,
enc_read,
enc_size));
2015-01-08 18:37:20 +01:00
ret = 0;
EXITIF_exit:
GNUNET_free_non_null (enc);
if (NULL != tmpfile)
{
(void) unlink (tmpfile);
GNUNET_free (tmpfile);
}
GNUNET_free_non_null (enc_read);
2015-03-22 22:14:30 +01:00
if (NULL != dki.denom_priv.rsa_private_key)
GNUNET_CRYPTO_rsa_private_key_free (dki.denom_priv.rsa_private_key);
if (NULL != dki_read.denom_priv.rsa_private_key)
GNUNET_CRYPTO_rsa_private_key_free (dki_read.denom_priv.rsa_private_key);
2015-01-08 18:37:20 +01:00
return ret;
}