exchange/src/exchangedb/test_exchangedb.c

1107 lines
41 KiB
C
Raw Normal View History

2015-03-05 15:59:22 +01:00
/*
This file is part of TALER
2016-01-21 15:29:07 +01:00
Copyright (C) 2014, 2015, 2016 GNUnet e.V.
2015-03-05 15:59:22 +01:00
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
2016-03-01 15:35:04 +01:00
* @file exchangedb/test_exchangedb.c
2015-03-05 15:59:22 +01:00
* @brief test cases for DB interaction functions
2016-04-20 01:50:26 +02:00
* @author Sree Harsha Totakura
* @author Christian Grothoff
2015-03-05 15:59:22 +01:00
*/
#include "platform.h"
2016-03-01 15:35:04 +01:00
#include "taler_exchangedb_lib.h"
#include "taler_json_lib.h"
2016-03-01 15:35:04 +01:00
#include "taler_exchangedb_plugin.h"
2015-03-05 15:59:22 +01:00
static int result;
#define FAILIF(cond) \
do { \
if (!(cond)){ break;} \
GNUNET_break (0); \
goto drop; \
} while (0)
2015-03-05 15:59:22 +01:00
#define RND_BLK(ptr) \
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*ptr))
#define ZR_BLK(ptr) \
memset (ptr, 0, sizeof (*ptr))
2015-03-09 17:05:35 +01:00
#define CURRENCY "EUR"
2016-03-01 15:35:04 +01:00
static struct TALER_EXCHANGEDB_Plugin *plugin;
2015-03-28 12:29:35 +01:00
2015-03-06 16:08:39 +01:00
/**
* Checks if the given reserve has the given amount of balance and expiry
*
2015-03-21 14:21:00 +01:00
* @param session the database connection
2015-03-06 16:08:39 +01:00
* @param pub the public key of the reserve
* @param value balance value
* @param fraction balance fraction
* @param currency currency of the reserve
* @return #GNUNET_OK if the given reserve has the same balance and expiration
* as the given parameters; #GNUNET_SYSERR if not
*/
2015-03-21 14:21:00 +01:00
static int
2016-03-01 15:35:04 +01:00
check_reserve (struct TALER_EXCHANGEDB_Session *session,
const struct TALER_ReservePublicKeyP *pub,
2015-03-26 19:29:03 +01:00
uint64_t value,
2015-03-21 14:21:00 +01:00
uint32_t fraction,
const char *currency)
2015-03-06 16:08:39 +01:00
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_Reserve reserve;
2015-03-22 22:14:30 +01:00
reserve.pub = *pub;
2015-03-06 16:08:39 +01:00
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
plugin->reserve_get (plugin->cls,
session,
&reserve));
2015-03-06 16:08:39 +01:00
FAILIF (value != reserve.balance.value);
FAILIF (fraction != reserve.balance.fraction);
FAILIF (0 != strcmp (currency, reserve.balance.currency));
return GNUNET_OK;
drop:
return GNUNET_SYSERR;
}
struct DenomKeyPair
{
2015-03-22 22:14:30 +01:00
struct TALER_DenominationPrivateKey priv;
struct TALER_DenominationPublicKey pub;
};
2015-03-21 14:21:00 +01:00
2015-05-26 10:06:41 +02:00
/**
* Destroy a denomination key pair. The key is not necessarily removed from the DB.
2015-05-26 10:06:41 +02:00
*
* @param dkp the keypair to destroy
*/
static void
destroy_denom_key_pair (struct DenomKeyPair *dkp)
{
GNUNET_CRYPTO_rsa_public_key_free (dkp->pub.rsa_public_key);
GNUNET_CRYPTO_rsa_private_key_free (dkp->priv.rsa_private_key);
GNUNET_free (dkp);
}
/**
* Create a denominaiton key pair by registering the denomination in the DB.
*
* @param size the size of the denomination key
2015-05-26 10:06:41 +02:00
* @param session the DB session
* @return the denominaiton key pair; NULL upon error
2015-05-26 10:06:41 +02:00
*/
static struct DenomKeyPair *
create_denom_key_pair (unsigned int size,
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_Session *session,
const struct TALER_Amount *value,
const struct TALER_Amount *fee_withdraw,
const struct TALER_Amount *fee_deposit,
2016-04-20 01:50:26 +02:00
const struct TALER_Amount *fee_refresh,
const struct TALER_Amount *fee_refund)
2015-05-26 10:06:41 +02:00
{
struct DenomKeyPair *dkp;
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_DenominationKeyIssueInformation dki;
struct TALER_EXCHANGEDB_DenominationKeyInformationP issue2;
struct GNUNET_TIME_Absolute now;
2015-06-11 14:58:23 +02:00
dkp = GNUNET_new (struct DenomKeyPair);
dkp->priv.rsa_private_key = GNUNET_CRYPTO_rsa_private_key_create (size);
GNUNET_assert (NULL != dkp->priv.rsa_private_key);
dkp->pub.rsa_public_key
= GNUNET_CRYPTO_rsa_private_key_get_public (dkp->priv.rsa_private_key);
2015-06-11 14:58:23 +02:00
/* Using memset() as fields like master key and signature
are not properly initialized for this test. */
memset (&dki,
0,
2016-03-01 15:35:04 +01:00
sizeof (struct TALER_EXCHANGEDB_DenominationKeyIssueInformation));
dki.denom_pub = dkp->pub;
now = GNUNET_TIME_absolute_get ();
GNUNET_TIME_round_abs (&now);
dki.issue.properties.start = GNUNET_TIME_absolute_hton (now);
dki.issue.properties.expire_withdraw = GNUNET_TIME_absolute_hton
(GNUNET_TIME_absolute_add (now,
GNUNET_TIME_UNIT_HOURS));
2016-05-02 05:10:40 +02:00
dki.issue.properties.expire_deposit = GNUNET_TIME_absolute_hton
2015-05-26 10:06:41 +02:00
(GNUNET_TIME_absolute_add
(now,
2015-05-26 10:06:41 +02:00
GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_HOURS, 2)));
dki.issue.properties.expire_legal = GNUNET_TIME_absolute_hton
2015-05-26 10:06:41 +02:00
(GNUNET_TIME_absolute_add
(now,
2015-05-26 10:06:41 +02:00
GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_HOURS, 3)));
TALER_amount_hton (&dki.issue.properties.value, value);
TALER_amount_hton (&dki.issue.properties.fee_withdraw, fee_withdraw);
TALER_amount_hton (&dki.issue.properties.fee_deposit, fee_deposit);
TALER_amount_hton (&dki.issue.properties.fee_refresh, fee_refresh);
2016-04-20 01:50:26 +02:00
TALER_amount_hton (&dki.issue.properties.fee_refund, fee_refund);
GNUNET_CRYPTO_rsa_public_key_hash (dkp->pub.rsa_public_key,
&dki.issue.properties.denom_hash);
dki.issue.properties.purpose.size = htonl (sizeof (struct TALER_DenominationKeyValidityPS));
dki.issue.properties.purpose.purpose = htonl (TALER_SIGNATURE_MASTER_DENOMINATION_KEY_VALIDITY);
2015-05-26 10:06:41 +02:00
if (GNUNET_OK !=
2015-06-12 10:49:14 +02:00
plugin->insert_denomination_info (plugin->cls,
session,
&dki.denom_pub,
2015-06-12 10:49:14 +02:00
&dki.issue))
2015-05-26 10:06:41 +02:00
{
GNUNET_break(0);
destroy_denom_key_pair (dkp);
return NULL;
2015-05-26 10:06:41 +02:00
}
if (GNUNET_OK !=
plugin->get_denomination_info (plugin->cls,
session,
&dki.denom_pub,
&issue2))
{
GNUNET_break(0);
destroy_denom_key_pair (dkp);
return NULL;
}
if (0 != memcmp (&dki.issue,
&issue2,
sizeof (issue2)))
{
GNUNET_break(0);
destroy_denom_key_pair (dkp);
return NULL;
}
return dkp;
}
static struct TALER_Amount value;
static struct TALER_Amount fee_withdraw;
static struct TALER_Amount fee_deposit;
static struct TALER_Amount fee_refresh;
2016-04-20 01:50:26 +02:00
static struct TALER_Amount fee_refund;
static struct TALER_Amount amount_with_fee;
2016-05-02 01:30:13 +02:00
static void
2016-05-02 01:30:13 +02:00
free_refresh_commit_coins_array (struct TALER_EXCHANGEDB_RefreshCommitCoin *commit_coins,
unsigned int size)
{
unsigned int cnt;
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin *ccoin;
struct TALER_RefreshLinkEncrypted *rlink;
for (cnt = 0; cnt < size; cnt++)
{
ccoin = &commit_coins[cnt];
GNUNET_free_non_null (ccoin->coin_ev);
rlink = (struct TALER_RefreshLinkEncrypted *) ccoin->refresh_link;
GNUNET_free_non_null (rlink);
}
GNUNET_free (commit_coins);
}
#define MELT_NEW_COINS 5
static int
2016-03-01 15:35:04 +01:00
test_refresh_commit_coins (struct TALER_EXCHANGEDB_Session *session,
struct TALER_EXCHANGEDB_RefreshSession *refresh_session,
const struct GNUNET_HashCode *session_hash)
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin *commit_coins;
struct TALER_EXCHANGEDB_RefreshCommitCoin *ret_commit_coins;
struct TALER_EXCHANGEDB_RefreshCommitCoin *a_ccoin;
struct TALER_RefreshLinkEncrypted *a_rlink;
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin *b_ccoin;
struct TALER_RefreshLinkEncrypted *b_rlink;
size_t size;
unsigned int cnt;
uint16_t cnc_index;
int ret;
2016-04-20 01:50:26 +02:00
#define COIN_ENC_MAX_SIZE 512
ret = GNUNET_SYSERR;
ret_commit_coins = NULL;
commit_coins = GNUNET_new_array (MELT_NEW_COINS,
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin);
cnc_index = (uint16_t) GNUNET_CRYPTO_random_u32
(GNUNET_CRYPTO_QUALITY_WEAK, GNUNET_MIN (MELT_NEW_COINS, UINT16_MAX));
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin *ccoin;
struct TALER_RefreshLinkEncrypted *rlink;
ccoin = &commit_coins[cnt];
size = GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
COIN_ENC_MAX_SIZE);
rlink = GNUNET_malloc (sizeof (struct TALER_RefreshLinkEncrypted) + size);
ccoin->refresh_link = rlink;
ccoin->coin_ev_size = GNUNET_CRYPTO_random_u64
(GNUNET_CRYPTO_QUALITY_WEAK, COIN_ENC_MAX_SIZE);
ccoin->coin_ev = GNUNET_malloc (ccoin->coin_ev_size);
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
ccoin->coin_ev,
ccoin->coin_ev_size);
rlink->blinding_key_enc_size = size;
RND_BLK (&rlink->coin_priv_enc);
rlink->blinding_key_enc = (const char *) &rlink[1];
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
(void *)rlink->blinding_key_enc,
rlink->blinding_key_enc_size);
}
FAILIF (GNUNET_OK !=
plugin->insert_refresh_commit_coins (plugin->cls,
session,
session_hash,
cnc_index,
MELT_NEW_COINS,
commit_coins));
ret_commit_coins = GNUNET_new_array (MELT_NEW_COINS,
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshCommitCoin);
FAILIF (GNUNET_OK !=
plugin->get_refresh_commit_coins (plugin->cls,
session,
session_hash,
cnc_index,
MELT_NEW_COINS,
ret_commit_coins));
/* compare the refresh commit coin arrays */
for (cnt = 0; cnt < MELT_NEW_COINS; cnt++)
{
a_ccoin = &commit_coins[cnt];
b_ccoin = &ret_commit_coins[cnt];
FAILIF (a_ccoin->coin_ev_size != b_ccoin->coin_ev_size);
FAILIF (0 != memcmp (a_ccoin->coin_ev,
a_ccoin->coin_ev,
a_ccoin->coin_ev_size));
a_rlink = a_ccoin->refresh_link;
b_rlink = b_ccoin->refresh_link;
FAILIF (a_rlink->blinding_key_enc_size != b_rlink->blinding_key_enc_size);
FAILIF (0 != memcmp (a_rlink->blinding_key_enc,
b_rlink->blinding_key_enc,
a_rlink->blinding_key_enc_size));
FAILIF (0 != memcmp (a_rlink->coin_priv_enc,
b_rlink->coin_priv_enc,
sizeof (a_rlink->coin_priv_enc)));
}
ret = GNUNET_OK;
drop:
if (NULL != ret_commit_coins)
free_refresh_commit_coins_array (ret_commit_coins, MELT_NEW_COINS);
if (NULL != commit_coins)
free_refresh_commit_coins_array (commit_coins, MELT_NEW_COINS);
return ret;
}
2015-05-26 10:06:41 +02:00
2016-05-02 01:30:13 +02:00
/**
* Function to test melting of coins as part of a refresh session
*
* @param session the database session
* @param refresh_session the refresh session
* @return #GNUNET_OK if everything went well; #GNUNET_SYSERR if not
*/
static int
2016-03-01 15:35:04 +01:00
test_melting (struct TALER_EXCHANGEDB_Session *session)
{
#define MELT_OLD_COINS 10
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshSession refresh_session;
struct TALER_EXCHANGEDB_RefreshSession ret_refresh_session;
struct GNUNET_HashCode session_hash;
struct DenomKeyPair *dkp;
struct DenomKeyPair **new_dkp;
/* struct TALER_CoinPublicInfo *coins; */
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshMelt *melts;
struct TALER_DenominationPublicKey *new_denom_pubs;
struct TALER_DenominationPublicKey *ret_denom_pubs;
unsigned int cnt;
int ret;
ret = GNUNET_SYSERR;
RND_BLK (&refresh_session);
RND_BLK (&session_hash);
melts = NULL;
2016-01-21 15:29:07 +01:00
dkp = NULL;
new_dkp = NULL;
new_denom_pubs = NULL;
2016-01-21 15:29:07 +01:00
ret_denom_pubs = NULL;
/* create and test a refresh session */
refresh_session.num_oldcoins = MELT_OLD_COINS;
refresh_session.num_newcoins = 1;
refresh_session.noreveal_index = 1;
FAILIF (GNUNET_OK != plugin->create_refresh_session (plugin->cls,
session,
&session_hash,
&refresh_session));
FAILIF (GNUNET_OK != plugin->get_refresh_session (plugin->cls,
session,
&session_hash,
&ret_refresh_session));
FAILIF (0 != memcmp (&ret_refresh_session,
&refresh_session,
sizeof (refresh_session)));
/* create a denomination (value: 1; fraction: 100) */
2016-01-21 15:29:07 +01:00
dkp = create_denom_key_pair (512, session,
&value,
&fee_withdraw,
&fee_deposit,
2016-04-20 01:50:26 +02:00
&fee_refresh,
&fee_refund);
/* create MELT_OLD_COINS number of refresh melts */
2016-03-01 15:35:04 +01:00
melts = GNUNET_new_array (MELT_OLD_COINS, struct TALER_EXCHANGEDB_RefreshMelt);
for (cnt=0; cnt < MELT_OLD_COINS; cnt++)
{
struct GNUNET_HashCode hc;
RND_BLK (&melts[cnt].coin.coin_pub);
GNUNET_CRYPTO_hash (&melts[cnt].coin.coin_pub,
sizeof (melts[cnt].coin.coin_pub),
&hc);
melts[cnt].coin.denom_sig.rsa_signature =
GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
&hc);
melts[cnt].coin.denom_pub = dkp->pub;
RND_BLK (&melts[cnt].coin_sig);
melts[cnt].session_hash = session_hash;
melts[cnt].amount_with_fee = amount_with_fee;
melts[cnt].melt_fee = fee_refresh;
FAILIF (GNUNET_OK != plugin->insert_refresh_melt (plugin->cls,
session,
cnt,
&melts[cnt]));
}
for (cnt = 0; cnt < MELT_OLD_COINS; cnt++)
{
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_RefreshMelt ret_melt;
FAILIF (GNUNET_OK != plugin->get_refresh_melt (plugin->cls,
session,
&session_hash,
cnt,
&ret_melt));
FAILIF (0 != GNUNET_CRYPTO_rsa_signature_cmp
(ret_melt.coin.denom_sig.rsa_signature,
melts[cnt].coin.denom_sig.rsa_signature));
FAILIF (0 != memcmp (&ret_melt.coin.coin_pub,
&melts[cnt].coin.coin_pub,
sizeof (ret_melt.coin.coin_pub)));
FAILIF (0 != GNUNET_CRYPTO_rsa_public_key_cmp
(ret_melt.coin.denom_pub.rsa_public_key,
melts[cnt].coin.denom_pub.rsa_public_key));
FAILIF (0 != memcmp (&ret_melt.coin_sig,
&melts[cnt].coin_sig,
sizeof (ret_melt.coin_sig)));
FAILIF (0 != memcmp (&ret_melt.session_hash,
&melts[cnt].session_hash,
sizeof (ret_melt.session_hash)));
FAILIF (0 != TALER_amount_cmp (&ret_melt.amount_with_fee,
&melts[cnt].amount_with_fee));
FAILIF (0 != TALER_amount_cmp (&ret_melt.melt_fee,
&melts[cnt].melt_fee));
GNUNET_CRYPTO_rsa_signature_free (ret_melt.coin.denom_sig.rsa_signature);
GNUNET_CRYPTO_rsa_public_key_free (ret_melt.coin.denom_pub.rsa_public_key);
}
new_dkp = GNUNET_new_array (MELT_NEW_COINS, struct DenomKeyPair *);
new_denom_pubs = GNUNET_new_array (MELT_NEW_COINS,
struct TALER_DenominationPublicKey);
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
{
new_dkp[cnt] = create_denom_key_pair (128, session,
&value,
&fee_withdraw,
&fee_deposit,
2016-04-20 01:50:26 +02:00
&fee_refresh,
&fee_refund);
new_denom_pubs[cnt]=new_dkp[cnt]->pub;
}
FAILIF (GNUNET_OK != plugin->insert_refresh_order (plugin->cls,
session,
&session_hash,
MELT_NEW_COINS,
new_denom_pubs));
ret_denom_pubs = GNUNET_new_array (MELT_NEW_COINS,
struct TALER_DenominationPublicKey);
FAILIF (GNUNET_OK != plugin->get_refresh_order (plugin->cls,
session,
&session_hash,
MELT_NEW_COINS,
ret_denom_pubs));
for (cnt=0; cnt < MELT_NEW_COINS; cnt++)
{
FAILIF (0 != GNUNET_CRYPTO_rsa_public_key_cmp
(ret_denom_pubs[cnt].rsa_public_key,
new_denom_pubs[cnt].rsa_public_key));
}
FAILIF (GNUNET_OK !=
test_refresh_commit_coins (session,
&refresh_session,
&session_hash));
ret = GNUNET_OK;
drop:
2016-01-21 15:29:07 +01:00
if (NULL != dkp)
destroy_denom_key_pair (dkp);
if (NULL != melts)
{
for (cnt = 0; cnt < MELT_OLD_COINS; cnt++)
GNUNET_CRYPTO_rsa_signature_free (melts[cnt].coin.denom_sig.rsa_signature);
GNUNET_free (melts);
}
for (cnt = 0;
(NULL != ret_denom_pubs) && (cnt < MELT_NEW_COINS)
&& (NULL != ret_denom_pubs[cnt].rsa_public_key);
cnt++)
GNUNET_CRYPTO_rsa_public_key_free (ret_denom_pubs[cnt].rsa_public_key);
GNUNET_free_non_null (ret_denom_pubs);
GNUNET_free_non_null (new_denom_pubs);
for (cnt = 0;
(NULL != new_dkp) && (cnt < MELT_NEW_COINS) && (NULL != new_dkp[cnt]);
cnt++)
destroy_denom_key_pair (new_dkp[cnt]);
GNUNET_free_non_null (new_dkp);
return ret;
}
2016-01-22 13:45:32 +01:00
/**
* Callback that should never be called.
*/
static void
cb_wt_never (void *cls,
const struct TALER_MerchantPublicKeyP *merchant_pub,
const struct GNUNET_HashCode *h_wire,
const struct GNUNET_HashCode *h_contract,
uint64_t transaction_id,
const struct TALER_CoinSpendPublicKeyP *coin_pub,
const struct TALER_Amount *coin_value,
const struct TALER_Amount *coin_fee)
2016-01-22 13:45:32 +01:00
{
GNUNET_assert (0); /* this statement should be unreachable */
}
/**
* Callback that should never be called.
*/
static void
cb_wtid_never (void *cls,
const struct TALER_WireTransferIdentifierRawP *wtid,
const struct TALER_Amount *coin_contribution,
const struct TALER_Amount *coin_fee,
struct GNUNET_TIME_Absolute execution_time)
{
GNUNET_assert (0);
}
static struct TALER_MerchantPublicKeyP merchant_pub_wt;
static struct GNUNET_HashCode h_wire_wt;
static struct GNUNET_HashCode h_contract_wt;
static uint64_t transaction_id_wt;
static struct TALER_CoinSpendPublicKeyP coin_pub_wt;
static struct TALER_Amount coin_value_wt;
static struct TALER_Amount coin_fee_wt;
static struct TALER_Amount transfer_value_wt;
static struct GNUNET_TIME_Absolute execution_time_wt;
static struct TALER_WireTransferIdentifierRawP wtid_wt;
/**
* Callback that should be called with the WT data.
*/
static void
cb_wt_check (void *cls,
const struct TALER_MerchantPublicKeyP *merchant_pub,
const struct GNUNET_HashCode *h_wire,
const struct GNUNET_HashCode *h_contract,
uint64_t transaction_id,
const struct TALER_CoinSpendPublicKeyP *coin_pub,
const struct TALER_Amount *coin_value,
const struct TALER_Amount *coin_fee)
2016-01-22 13:45:32 +01:00
{
GNUNET_assert (cls == &cb_wt_never);
GNUNET_assert (0 == memcmp (merchant_pub,
&merchant_pub_wt,
sizeof (struct TALER_MerchantPublicKeyP)));
GNUNET_assert (0 == memcmp (h_wire,
&h_wire_wt,
sizeof (struct GNUNET_HashCode)));
GNUNET_assert (0 == memcmp (h_contract,
&h_contract_wt,
sizeof (struct GNUNET_HashCode)));
GNUNET_assert (transaction_id == transaction_id_wt);
GNUNET_assert (0 == memcmp (coin_pub,
&coin_pub_wt,
sizeof (struct TALER_CoinSpendPublicKeyP)));
GNUNET_assert (0 == TALER_amount_cmp (coin_value,
&coin_value_wt));
GNUNET_assert (0 == TALER_amount_cmp (coin_fee,
&coin_fee_wt));
}
/**
* Callback that should be called with the WT data.
*/
static void
cb_wtid_check (void *cls,
const struct TALER_WireTransferIdentifierRawP *wtid,
const struct TALER_Amount *coin_contribution,
const struct TALER_Amount *coin_fee,
struct GNUNET_TIME_Absolute execution_time)
{
GNUNET_assert (cls == &cb_wtid_never);
GNUNET_assert (0 == memcmp (wtid,
&wtid_wt,
sizeof (struct TALER_WireTransferIdentifierRawP)));
GNUNET_assert (execution_time.abs_value_us ==
execution_time_wt.abs_value_us);
GNUNET_assert (0 == TALER_amount_cmp (coin_contribution,
&coin_value_wt));
GNUNET_assert (0 == TALER_amount_cmp (coin_fee,
&coin_fee_wt));
}
static unsigned long long deposit_rowid;
/**
* Function called with details about deposits that
* have been made. Called in the test on the
* deposit given in @a cls.
*
* @param cls closure a `struct TALER_EXCHANGEDB_Deposit *`
* @param rowid unique ID for the deposit in our DB, used for marking
* it as 'tiny' or 'done'
* @param merchant_pub public key of the merchant
* @param coin_pub public key of the coin
* @param amount_with_fee amount that was deposited including fee
* @param deposit_fee amount the exchange gets to keep as transaction fees
* @param transaction_id unique transaction ID chosen by the merchant
* @param h_contract hash of the contract between merchant and customer
* @param wire_deadline by which the merchant adviced that he would like the
* wire transfer to be executed
* @param wire wire details for the merchant, NULL from iterate_matching_deposits()
* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR if deposit does
* not match our expectations
*/
static int
deposit_cb (void *cls,
unsigned long long rowid,
const struct TALER_MerchantPublicKeyP *merchant_pub,
const struct TALER_CoinSpendPublicKeyP *coin_pub,
const struct TALER_Amount *amount_with_fee,
const struct TALER_Amount *deposit_fee,
uint64_t transaction_id,
const struct GNUNET_HashCode *h_contract,
struct GNUNET_TIME_Absolute wire_deadline,
const json_t *wire)
{
struct TALER_EXCHANGEDB_Deposit *deposit = cls;
struct GNUNET_HashCode h_wire;
deposit_rowid = rowid;
if (NULL != wire)
TALER_JSON_hash (wire, &h_wire);
if ( (0 != memcmp (merchant_pub,
&deposit->merchant_pub,
sizeof (struct TALER_MerchantPublicKeyP))) ||
(0 != TALER_amount_cmp (amount_with_fee,
&deposit->amount_with_fee)) ||
(0 != TALER_amount_cmp (deposit_fee,
&deposit->deposit_fee)) ||
(0 != memcmp (h_contract,
&deposit->h_contract,
sizeof (struct GNUNET_HashCode))) ||
(0 != memcmp (coin_pub,
&deposit->coin.coin_pub,
sizeof (struct TALER_CoinSpendPublicKeyP))) ||
(transaction_id != deposit->transaction_id) ||
( (NULL != wire) &&
(0 != memcmp (&h_wire,
&deposit->h_wire,
sizeof (struct GNUNET_HashCode))) ) )
{
GNUNET_break (0);
return GNUNET_SYSERR;
}
return GNUNET_OK;
}
static struct TALER_EXCHANGEDB_Refund refund;
2015-03-05 15:59:22 +01:00
/**
* Main function that will be run by the scheduler.
*
2016-04-01 20:27:57 +02:00
* @param cls closure with config
2015-03-05 15:59:22 +01:00
*/
static void
run (void *cls)
2015-03-05 15:59:22 +01:00
{
2016-04-01 20:27:57 +02:00
struct GNUNET_CONFIGURATION_Handle *cfg = cls;
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_Session *session;
struct TALER_ReservePublicKeyP reserve_pub;
struct DenomKeyPair *dkp;
2016-03-01 15:35:04 +01:00
struct TALER_EXCHANGEDB_CollectableBlindcoin cbc;
struct TALER_EXCHANGEDB_CollectableBlindcoin cbc2;
struct TALER_EXCHANGEDB_ReserveHistory *rh;
struct TALER_EXCHANGEDB_ReserveHistory *rh_head;
struct TALER_EXCHANGEDB_BankTransfer *bt;
struct TALER_EXCHANGEDB_CollectableBlindcoin *withdraw;
struct TALER_EXCHANGEDB_Deposit deposit;
struct TALER_EXCHANGEDB_Deposit deposit2;
2016-01-22 13:45:32 +01:00
struct TALER_WireTransferIdentifierRawP wtid;
2015-06-11 13:38:47 +02:00
json_t *wire;
json_t *just;
const char * const json_wire_str =
"{ \"type\":\"SEPA\", \
\"IBAN\":\"DE67830654080004822650\", \
\"name\":\"GNUnet e.V.\", \
\"bic\":\"GENODEF1SLR\", \
\"edate\":\"1449930207000\", \
\"r\":123456789, \
\"address\": \"foobar\"}";
2015-03-09 17:05:35 +01:00
unsigned int cnt;
2015-03-05 15:59:22 +01:00
dkp = NULL;
2015-03-09 17:05:35 +01:00
rh = NULL;
wire = NULL;
2015-03-26 19:29:03 +01:00
session = NULL;
2015-03-09 15:35:35 +01:00
ZR_BLK (&cbc);
ZR_BLK (&cbc2);
2015-03-28 12:29:35 +01:00
if (NULL ==
2016-03-01 15:35:04 +01:00
(plugin = TALER_EXCHANGEDB_plugin_load (cfg)))
2015-03-05 15:59:22 +01:00
{
2016-05-02 01:30:13 +02:00
result = 77;
2015-03-05 15:59:22 +01:00
return;
}
if (GNUNET_OK !=
plugin->create_tables (plugin->cls))
{
result = 77;
goto drop;
}
if (NULL !=
(session = plugin->get_session (plugin->cls)))
{
if (GNUNET_OK !=
plugin->drop_tables (plugin->cls,
session))
{
result = 77;
goto drop;
}
}
2015-03-21 14:21:00 +01:00
if (GNUNET_OK !=
plugin->create_tables (plugin->cls))
2015-03-05 15:59:22 +01:00
{
2016-05-02 01:30:13 +02:00
result = 77;
2015-03-05 15:59:22 +01:00
goto drop;
}
2015-03-21 14:21:00 +01:00
if (NULL ==
(session = plugin->get_session (plugin->cls)))
2015-03-05 15:59:22 +01:00
{
result = 77;
2015-03-05 15:59:22 +01:00
goto drop;
}
RND_BLK (&reserve_pub);
2015-06-12 11:57:10 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":1.000010",
&value));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":0.000010",
&fee_withdraw));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":0.000010",
&fee_deposit));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":0.000010",
&fee_refresh));
2016-04-20 01:50:26 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":0.000010",
&fee_refund));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY ":1.000010",
&amount_with_fee));
result = 4;
2015-06-11 13:38:47 +02:00
just = json_loads ("{ \"justification\":\"1\" }", 0, NULL);
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
plugin->reserves_in_insert (plugin->cls,
session,
2015-05-14 14:14:18 +02:00
&reserve_pub,
&value,
2015-07-01 13:30:34 +02:00
GNUNET_TIME_absolute_get (),
2015-06-11 13:38:47 +02:00
just));
json_decref (just);
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
check_reserve (session,
&reserve_pub,
value.value,
value.fraction,
value.currency));
2015-06-11 13:38:47 +02:00
just = json_loads ("{ \"justification\":\"2\" }", 0, NULL);
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
plugin->reserves_in_insert (plugin->cls,
session,
2015-05-14 14:14:18 +02:00
&reserve_pub,
&value,
2015-07-01 13:30:34 +02:00
GNUNET_TIME_absolute_get (),
2015-06-11 13:38:47 +02:00
just));
json_decref (just);
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
check_reserve (session,
&reserve_pub,
value.value * 2,
value.fraction * 2,
value.currency));
2016-04-01 20:27:57 +02:00
result = 5;
dkp = create_denom_key_pair (1024, session,
&value,
&fee_withdraw,
&fee_deposit,
2016-04-20 01:50:26 +02:00
&fee_refresh,
&fee_refund);
2015-06-11 13:02:57 +02:00
RND_BLK(&cbc.h_coin_envelope);
RND_BLK(&cbc.reserve_sig);
cbc.denom_pub = dkp->pub;
2015-03-22 22:14:30 +01:00
cbc.sig.rsa_signature
= GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
2016-04-01 20:27:57 +02:00
&cbc.h_coin_envelope);
2016-01-21 16:14:40 +01:00
cbc.reserve_pub = reserve_pub;
cbc.amount_with_fee = value;
2015-06-11 13:02:57 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_amount_get_zero (CURRENCY, &cbc.withdraw_fee));
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
2015-06-11 12:30:14 +02:00
plugin->insert_withdraw_info (plugin->cls,
2015-06-11 13:02:57 +02:00
session,
&cbc));
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
check_reserve (session,
&reserve_pub,
value.value,
value.fraction,
value.currency));
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_YES !=
2015-06-11 12:30:14 +02:00
plugin->get_withdraw_info (plugin->cls,
2015-06-11 13:02:57 +02:00
session,
&cbc.h_coin_envelope,
&cbc2));
2015-03-22 22:14:30 +01:00
FAILIF (NULL == cbc2.denom_pub.rsa_public_key);
2015-03-21 14:21:00 +01:00
FAILIF (0 != memcmp (&cbc2.reserve_sig,
&cbc.reserve_sig,
sizeof (cbc2.reserve_sig)));
FAILIF (0 != memcmp (&cbc2.reserve_pub,
&cbc.reserve_pub,
sizeof (cbc2.reserve_pub)));
2016-04-01 20:27:57 +02:00
result = 6;
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
2015-06-11 13:02:57 +02:00
GNUNET_CRYPTO_rsa_verify (&cbc.h_coin_envelope,
2015-03-22 22:14:30 +01:00
cbc2.sig.rsa_signature,
dkp->pub.rsa_public_key));
2016-04-01 20:27:57 +02:00
result = 7;
2015-03-21 14:21:00 +01:00
rh = plugin->get_reserve_history (plugin->cls,
session,
&reserve_pub);
2015-03-09 17:05:35 +01:00
FAILIF (NULL == rh);
2015-03-21 14:21:00 +01:00
rh_head = rh;
2015-03-09 17:05:35 +01:00
for (cnt=0; NULL != rh_head; rh_head=rh_head->next, cnt++)
{
switch (rh_head->type)
{
2016-03-01 15:35:04 +01:00
case TALER_EXCHANGEDB_RO_BANK_TO_EXCHANGE:
2015-03-09 17:05:35 +01:00
bt = rh_head->details.bank;
2015-03-21 14:21:00 +01:00
FAILIF (0 != memcmp (&bt->reserve_pub,
&reserve_pub,
sizeof (reserve_pub)));
/* this is the amount we trasferred twice*/
2015-03-09 17:05:35 +01:00
FAILIF (1 != bt->amount.value);
FAILIF (10 != bt->amount.fraction);
2015-03-09 17:05:35 +01:00
FAILIF (0 != strcmp (CURRENCY, bt->amount.currency));
2015-06-11 13:38:47 +02:00
FAILIF (NULL == bt->wire);
2015-03-09 17:05:35 +01:00
break;
2016-03-01 15:35:04 +01:00
case TALER_EXCHANGEDB_RO_WITHDRAW_COIN:
2015-03-09 17:05:35 +01:00
withdraw = rh_head->details.withdraw;
FAILIF (0 != memcmp (&withdraw->reserve_pub,
&reserve_pub,
sizeof (reserve_pub)));
FAILIF (0 != memcmp (&withdraw->h_coin_envelope,
2015-06-11 13:02:57 +02:00
&cbc.h_coin_envelope,
sizeof (cbc.h_coin_envelope)));
2015-03-09 17:05:35 +01:00
break;
}
}
FAILIF (3 != cnt);
/* Tests for deposits */
2015-06-11 14:25:42 +02:00
memset (&deposit, 0, sizeof (deposit));
RND_BLK (&deposit.coin.coin_pub);
deposit.coin.denom_pub = dkp->pub;
deposit.coin.denom_sig = cbc.sig;
RND_BLK (&deposit.csig);
RND_BLK (&deposit.merchant_pub);
RND_BLK (&deposit.h_contract);
wire = json_loads (json_wire_str, 0, NULL);
TALER_JSON_hash (wire,
&deposit.h_wire);
deposit.wire = wire;
deposit.transaction_id =
GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK, UINT64_MAX);
deposit.amount_with_fee = value;
2015-06-11 14:25:42 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_amount_get_zero (CURRENCY, &deposit.deposit_fee));
result = 8;
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_OK !=
plugin->insert_deposit (plugin->cls,
session, &deposit));
FAILIF (GNUNET_YES !=
plugin->have_deposit (plugin->cls,
session,
&deposit));
result = 9;
FAILIF (1 !=
plugin->iterate_matching_deposits (plugin->cls,
session,
&deposit.h_wire,
&deposit.merchant_pub,
&deposit_cb, &deposit,
2));
FAILIF (1 !=
plugin->get_ready_deposit (plugin->cls,
session,
&deposit_cb,
&deposit));
FAILIF (GNUNET_OK !=
plugin->start (plugin->cls,
session));
FAILIF (GNUNET_OK !=
plugin->mark_deposit_tiny (plugin->cls,
session,
deposit_rowid));
FAILIF (0 !=
plugin->get_ready_deposit (plugin->cls,
session,
&deposit_cb,
&deposit));
plugin->rollback (plugin->cls,
session);
FAILIF (1 !=
plugin->get_ready_deposit (plugin->cls,
session,
&deposit_cb,
&deposit));
FAILIF (GNUNET_OK !=
plugin->start (plugin->cls,
session));
FAILIF (GNUNET_NO !=
plugin->test_deposit_done (plugin->cls,
session,
&deposit));
FAILIF (GNUNET_OK !=
plugin->mark_deposit_done (plugin->cls,
session,
deposit_rowid));
FAILIF (GNUNET_OK !=
plugin->commit (plugin->cls,
session));
FAILIF (GNUNET_YES !=
plugin->test_deposit_done (plugin->cls,
session,
&deposit));
result = 10;
2016-01-21 16:14:40 +01:00
deposit2 = deposit;
deposit2.transaction_id++; /* should fail if transaction id is different */
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_NO !=
plugin->have_deposit (plugin->cls,
session,
&deposit2));
deposit2.transaction_id = deposit.transaction_id;
RND_BLK (&deposit2.merchant_pub); /* should fail if merchant is different */
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_NO !=
plugin->have_deposit (plugin->cls,
session,
&deposit2));
2016-01-21 16:14:40 +01:00
deposit2.merchant_pub = deposit.merchant_pub;
RND_BLK (&deposit2.coin.coin_pub); /* should fail if coin is different */
2015-03-21 14:21:00 +01:00
FAILIF (GNUNET_NO !=
plugin->have_deposit (plugin->cls,
session,
&deposit2));
FAILIF (GNUNET_OK != test_melting (session));
2016-01-22 13:45:32 +01:00
/* setup values for wire transfer aggregation data */
memset (&wtid, 42, sizeof (wtid));
memset (&merchant_pub_wt, 43, sizeof (merchant_pub_wt));
memset (&h_wire_wt, 44, sizeof (h_wire_wt));
memset (&h_contract_wt, 45, sizeof (h_contract_wt));
memset (&coin_pub_wt, 46, sizeof (coin_pub_wt));
transaction_id_wt = 47;
execution_time_wt = GNUNET_TIME_absolute_get ();
memset (&merchant_pub_wt, 48, sizeof (merchant_pub_wt));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY "KUDOS:1.000010",
&coin_value_wt));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY "KUDOS:0.000010",
&coin_fee_wt));
GNUNET_assert (GNUNET_OK ==
TALER_string_to_amount (CURRENCY "KUDOS:1.000000",
&transfer_value_wt));
#if 0
/* FIXME: test insert_refund! */
refund.FOO = bar;
FAILIF (GNUNET_OK !=
plugin->insert_refund (plugin->cls,
session,
&refund));
#endif
/* FIXME: test: insert_refresh_commit_links
FIXME: test: get_refresh_commit_links
FIXME: test: get_melt_commitment
FIXME: test: free_melt_commitment
FIXME: test: insert_refresh_out
FIXME: test: get_link_data_list
FIXME: test: free_link_data_list
FIXME: test: get_transfer
FIXME: test: get_coin_transactions
FIXME: test: free_coin_transaction_list
FIXME: test: wire_prepare_data_insert
FIXME: test: wire_prepare_data_mark_finished
FIXME: test: wire_prepare_data_get
*/
2016-01-22 13:45:32 +01:00
FAILIF (GNUNET_NO !=
plugin->lookup_wire_transfer (plugin->cls,
session,
&wtid_wt,
&cb_wt_never,
NULL));
FAILIF (GNUNET_NO !=
plugin->wire_lookup_deposit_wtid (plugin->cls,
session,
&h_contract_wt,
&h_wire_wt,
&coin_pub_wt,
&merchant_pub_wt,
transaction_id_wt,
&cb_wtid_never,
NULL));
/* insert WT data */
FAILIF (GNUNET_OK !=
plugin->insert_aggregation_tracking (plugin->cls,
session,
&wtid_wt,
&merchant_pub_wt,
&h_wire_wt,
&h_contract_wt,
transaction_id_wt,
execution_time_wt,
&coin_pub_wt,
&coin_value_wt,
&coin_fee_wt));
2016-01-22 13:45:32 +01:00
FAILIF (GNUNET_OK !=
plugin->lookup_wire_transfer (plugin->cls,
session,
&wtid_wt,
&cb_wt_check,
&cb_wt_never));
FAILIF (GNUNET_OK !=
plugin->wire_lookup_deposit_wtid (plugin->cls,
session,
&h_contract_wt,
&h_wire_wt,
&coin_pub_wt,
&merchant_pub_wt,
transaction_id_wt,
&cb_wtid_check,
&cb_wtid_never));
2015-03-05 15:59:22 +01:00
result = 0;
2015-03-05 15:59:22 +01:00
drop:
if (NULL != wire)
json_decref (wire);
2015-03-09 17:05:35 +01:00
if (NULL != rh)
2015-03-22 13:02:49 +01:00
plugin->free_reserve_history (plugin->cls,
rh);
2015-03-09 17:05:35 +01:00
rh = NULL;
2015-03-21 14:21:00 +01:00
if (NULL != session)
GNUNET_break (GNUNET_OK ==
plugin->drop_tables (plugin->cls,
session));
if (NULL != dkp)
destroy_denom_key_pair (dkp);
2015-03-22 22:14:30 +01:00
if (NULL != cbc.sig.rsa_signature)
GNUNET_CRYPTO_rsa_signature_free (cbc.sig.rsa_signature);
if (NULL != cbc2.denom_pub.rsa_public_key)
GNUNET_CRYPTO_rsa_public_key_free (cbc2.denom_pub.rsa_public_key);
if (NULL != cbc2.sig.rsa_signature)
GNUNET_CRYPTO_rsa_signature_free (cbc2.sig.rsa_signature);
dkp = NULL;
2016-03-01 15:35:04 +01:00
TALER_EXCHANGEDB_plugin_unload (plugin);
2015-03-28 12:29:35 +01:00
plugin = NULL;
2015-03-05 15:59:22 +01:00
}
int
2015-03-21 14:21:00 +01:00
main (int argc,
char *const argv[])
2015-03-05 15:59:22 +01:00
{
const char *plugin_name;
char *config_filename;
char *testname;
2016-04-01 20:27:57 +02:00
struct GNUNET_CONFIGURATION_Handle *cfg;
result = -1;
if (NULL == (plugin_name = strrchr (argv[0], (int) '-')))
{
GNUNET_break (0);
return -1;
}
GNUNET_log_setup (argv[0],
"WARNING",
NULL);
plugin_name++;
(void) GNUNET_asprintf (&testname,
"test-exchange-db-%s", plugin_name);
(void) GNUNET_asprintf (&config_filename,
"%s.conf", testname);
2016-04-01 20:27:57 +02:00
cfg = GNUNET_CONFIGURATION_create ();
2015-03-05 15:59:22 +01:00
if (GNUNET_OK !=
2016-04-01 20:27:57 +02:00
GNUNET_CONFIGURATION_parse (cfg,
config_filename))
{
2016-04-01 20:27:57 +02:00
GNUNET_break (0);
GNUNET_free (config_filename);
2015-03-26 18:36:52 +01:00
GNUNET_free (testname);
2016-04-01 20:27:57 +02:00
return 2;
}
2016-04-01 20:27:57 +02:00
GNUNET_SCHEDULER_run (&run, cfg);
GNUNET_CONFIGURATION_destroy (cfg);
GNUNET_free (config_filename);
2015-03-26 18:36:52 +01:00
GNUNET_free (testname);
2015-03-05 15:59:22 +01:00
return result;
}