2016-05-30 15:08:12 +02:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
|
|
|
Copyright (C) 2014, 2015, 2016 GNUnet e.V. and INRIA
|
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU Lesser General Public License as published by the Free Software
|
|
|
|
Foundation; either version 2.1, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING.LGPL. If not, see <http://www.gnu.org/licenses/>
|
2016-05-30 15:08:12 +02:00
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* @file src/benchmark/taler-exchange-benchmark.c
|
|
|
|
* @brief exchange's benchmark
|
|
|
|
* @author Marcello Stanisci
|
2016-06-15 16:04:29 +02:00
|
|
|
* @author Christian Grothoff
|
2016-05-30 15:08:12 +02:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
2016-06-03 14:18:42 +02:00
|
|
|
#include "taler_util.h"
|
|
|
|
#include "taler_signatures.h"
|
|
|
|
#include "taler_exchange_service.h"
|
|
|
|
#include "taler_json_lib.h"
|
2016-05-30 15:08:12 +02:00
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
|
|
|
#include <gnunet/gnunet_curl_lib.h>
|
|
|
|
#include <microhttpd.h>
|
2016-06-08 17:11:33 +02:00
|
|
|
#include <jansson.h>
|
2016-05-30 15:08:12 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* How much slack do we leave in terms of coins that are invalid (and
|
2016-06-15 19:24:48 +02:00
|
|
|
* thus available for refresh)? Should be significantly larger
|
|
|
|
* than #REFRESH_SLOTS_NEEDED, and must be below #pool_size.
|
2016-06-15 16:45:29 +02:00
|
|
|
*/
|
2016-06-15 19:24:48 +02:00
|
|
|
#define INVALID_COIN_SLACK 20
|
2016-06-08 17:11:33 +02:00
|
|
|
|
2016-06-15 17:54:36 +02:00
|
|
|
/**
|
2016-06-15 19:24:48 +02:00
|
|
|
* How much slack must we have to do a refresh? Should be the
|
|
|
|
* maximum number of coins a refresh can generate, and thus
|
|
|
|
* larger than log(base 2) of #COIN_VALUE. Must also be
|
|
|
|
* smaller than #INVALID_COIN_SLACK and smaller than 64.
|
|
|
|
*/
|
|
|
|
#define REFRESH_SLOTS_NEEDED 5
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The benchmark withdraws always the same denomination, since the
|
|
|
|
* calculation for refreshing is statically done (at least in this
|
|
|
|
* first version). In the future, this will be the largest value
|
|
|
|
* we ever withdraw.
|
2016-06-15 17:54:36 +02:00
|
|
|
*/
|
|
|
|
#define COIN_VALUE 8
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Probability a coin can be refreshed.
|
|
|
|
* This probability multiplied by the number of coins
|
|
|
|
* generated during the average refresh must be smaller
|
|
|
|
* than one. The variance must be covered by the
|
|
|
|
* #INVALID_COIN_SLACK.
|
|
|
|
*/
|
|
|
|
#define REFRESH_PROBABILITY 0.1
|
|
|
|
|
|
|
|
/**
|
2016-06-15 19:24:48 +02:00
|
|
|
* What is the amount we deposit into a reserve each time.
|
|
|
|
* We keep it simple and always deposit the same amount for now.
|
2016-06-15 17:54:36 +02:00
|
|
|
*/
|
|
|
|
#define RESERVE_VALUE 1000
|
|
|
|
|
|
|
|
/**
|
2016-06-15 19:24:48 +02:00
|
|
|
* What should be the ratio of coins withdrawn per reserve?
|
|
|
|
* We roughly match #RESERVE_VALUE / #COIN_VALUE, as that
|
|
|
|
* matches draining the reserve.
|
2016-06-15 17:54:36 +02:00
|
|
|
*/
|
|
|
|
#define COINS_PER_RESERVE 12
|
|
|
|
|
2016-06-15 18:19:40 +02:00
|
|
|
/**
|
|
|
|
* How many times must #benchmark_run() execute before we
|
|
|
|
* consider ourselves warm?
|
|
|
|
*/
|
|
|
|
#define WARM_THRESHOLD 1000LL
|
|
|
|
|
|
|
|
/**
|
2016-06-15 19:24:48 +02:00
|
|
|
* List of coins to get in return to a melt operation, in order
|
|
|
|
* of preference. The values from this structure are converted
|
|
|
|
* to the #refresh_pk array. Must be NULL-terminated. The
|
|
|
|
* currency is omitted as we get that from /keys.
|
2016-06-15 18:19:40 +02:00
|
|
|
*/
|
|
|
|
static const char *refresh_denoms[] = {
|
2016-06-15 19:24:48 +02:00
|
|
|
"4.00",
|
|
|
|
"2.00",
|
|
|
|
"1.00",
|
2016-06-15 18:19:40 +02:00
|
|
|
NULL
|
|
|
|
};
|
2016-06-15 17:54:36 +02:00
|
|
|
|
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
|
|
|
* Needed information for a reserve. Other values are the same for all reserves, therefore defined in global variables
|
|
|
|
*/
|
2016-06-15 15:09:57 +02:00
|
|
|
struct Reserve
|
|
|
|
{
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* DLL of reserves to fill.
|
|
|
|
*/
|
|
|
|
struct Reserve *next;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DLL of reserves to fill.
|
|
|
|
*/
|
|
|
|
struct Reserve *prev;
|
|
|
|
|
|
|
|
/**
|
2016-06-03 01:23:16 +02:00
|
|
|
* Set (by the interpreter) to the reserve's private key
|
|
|
|
* we used to fill the reserve.
|
|
|
|
*/
|
|
|
|
struct TALER_ReservePrivateKeyP reserve_priv;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set to the API's handle during the operation.
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGE_AdminAddIncomingHandle *aih;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* How much is left in this reserve.
|
|
|
|
*/
|
|
|
|
struct TALER_Amount left;
|
2016-06-03 01:23:16 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
/**
|
|
|
|
* Index of this reserve in the #reserves array.
|
2016-09-23 16:52:13 +02:00
|
|
|
*/
|
2016-06-15 16:04:29 +02:00
|
|
|
unsigned int reserve_index;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
};
|
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
2016-06-04 01:29:42 +02:00
|
|
|
* Information regarding a coin
|
2016-06-03 01:23:16 +02:00
|
|
|
*/
|
2016-06-15 15:09:57 +02:00
|
|
|
struct Coin
|
|
|
|
{
|
2016-06-03 01:23:16 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* DLL of coins to withdraw.
|
|
|
|
*/
|
|
|
|
struct Coin *next;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DLL of coins to withdraw.
|
|
|
|
*/
|
|
|
|
struct Coin *prev;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to the exchange's signature over the
|
|
|
|
* coin's public key.
|
|
|
|
*/
|
|
|
|
struct TALER_DenominationSignature sig;
|
|
|
|
|
|
|
|
/**
|
2016-06-15 15:41:17 +02:00
|
|
|
* Set to the coin's private key.
|
2016-06-03 01:23:16 +02:00
|
|
|
*/
|
|
|
|
struct TALER_CoinSpendPrivateKeyP coin_priv;
|
|
|
|
|
2016-06-15 15:41:17 +02:00
|
|
|
/**
|
|
|
|
* This specifies the denomination key to use.
|
|
|
|
*/
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *pk;
|
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
|
|
|
* Withdraw handle (while operation is running).
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGE_ReserveWithdrawHandle *wsh;
|
|
|
|
|
2016-06-15 15:41:17 +02:00
|
|
|
/**
|
|
|
|
* Refresh melt handle
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGE_RefreshMeltHandle *rmh;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Refresh reveal handle
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGE_RefreshRevealHandle *rrh;
|
|
|
|
|
2016-06-06 16:53:42 +02:00
|
|
|
/**
|
|
|
|
* Deposit handle (while operation is running).
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGE_DepositHandle *dh;
|
2016-06-15 16:45:29 +02:00
|
|
|
|
|
|
|
/**
|
2016-06-15 20:09:09 +02:00
|
|
|
* Array of denominations we expect to get from melt.
|
2016-06-15 16:45:29 +02:00
|
|
|
*/
|
|
|
|
struct TALER_Amount *denoms;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:42:43 +02:00
|
|
|
/**
|
|
|
|
* The result of a #TALER_EXCHANGE_refresh_prepare() call
|
|
|
|
*/
|
2016-06-15 16:45:29 +02:00
|
|
|
char *blob;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:42:43 +02:00
|
|
|
/**
|
|
|
|
* Size of @e blob
|
|
|
|
*/
|
|
|
|
size_t blob_size;
|
|
|
|
|
2016-06-09 23:35:05 +02:00
|
|
|
/**
|
|
|
|
* Flag indicating if the coin is going to be refreshed
|
|
|
|
*/
|
|
|
|
unsigned int refresh;
|
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* #GNUNET_YES if this coin is in the #invalid_coins_head DLL.
|
|
|
|
*/
|
|
|
|
int invalid;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-13 23:40:00 +02:00
|
|
|
/**
|
2016-06-15 15:41:17 +02:00
|
|
|
* Index in the reserve's global array indicating which
|
|
|
|
* reserve this coin is to be retrieved. If the coin comes
|
|
|
|
* from a refresh, then this value is set to the melted coin's
|
|
|
|
* reserve index
|
2016-06-07 16:58:55 +02:00
|
|
|
*/
|
2016-06-15 15:41:17 +02:00
|
|
|
unsigned int reserve_index;
|
2016-06-07 16:58:55 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
/**
|
|
|
|
* Index of this coin in the #coins array.
|
2016-09-23 16:52:13 +02:00
|
|
|
*/
|
2016-06-15 16:04:29 +02:00
|
|
|
unsigned int coin_index;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-07 16:58:55 +02:00
|
|
|
/**
|
2016-06-15 15:41:17 +02:00
|
|
|
* If the coin has to be refreshed, this value indicates
|
|
|
|
* how much is left on this coin
|
2016-06-07 16:58:55 +02:00
|
|
|
*/
|
2016-06-15 15:41:17 +02:00
|
|
|
struct TALER_Amount left;
|
2016-06-07 16:58:55 +02:00
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
};
|
2016-05-30 17:16:01 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/**
|
|
|
|
* DLL of reserves to fill.
|
|
|
|
*/
|
|
|
|
static struct Reserve *empty_reserve_head;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DLL of reserves to fill.
|
|
|
|
*/
|
|
|
|
static struct Reserve *empty_reserve_tail;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DLL of coins to withdraw.
|
|
|
|
*/
|
|
|
|
static struct Coin *invalid_coins_head;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DLL of coins to withdraw.
|
|
|
|
*/
|
|
|
|
static struct Coin *invalid_coins_tail;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How many coins are in the #invalid_coins_head DLL?
|
|
|
|
*/
|
|
|
|
static unsigned int num_invalid_coins;
|
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* Should we initialize and start the exchange, if #GNUNET_NO,
|
|
|
|
* we expect one to be already up and running.
|
|
|
|
*/
|
|
|
|
static int run_exchange;
|
|
|
|
|
2016-06-15 18:19:40 +02:00
|
|
|
/**
|
2016-06-15 18:42:00 +02:00
|
|
|
* Enables printing of "C" and "W" to indicate progress (warm/cold)
|
|
|
|
* every 50 iterations. Also includes how long the iteration took,
|
|
|
|
* so we can see if it is stable.
|
2016-06-15 18:19:40 +02:00
|
|
|
*/
|
2017-03-15 12:01:06 +01:00
|
|
|
static unsigned int be_verbose;
|
2016-06-15 18:19:40 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* How many coins the benchmark should operate on
|
|
|
|
*/
|
|
|
|
static unsigned int pool_size = 100;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Configuration file path
|
|
|
|
*/
|
|
|
|
static char *config_file;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Configuation object (used to get BANK_URI)
|
|
|
|
*/
|
|
|
|
static struct GNUNET_CONFIGURATION_Handle *cfg;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How many reserves ought to be created given the pool size
|
|
|
|
*/
|
|
|
|
static unsigned int nreserves;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How many coins are in the #coins array. This is needed
|
|
|
|
* as the number of coins is not always #nreserves * #COINS_PER_RESERVE
|
|
|
|
* due to refresh operations
|
|
|
|
*/
|
|
|
|
static unsigned int ncoins;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Bank details of who creates reserves
|
|
|
|
*/
|
|
|
|
static json_t *bank_details;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Bank details of who deposits coins
|
|
|
|
*/
|
|
|
|
static json_t *merchant_details;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Array of denomination keys needed to perform the refresh operation
|
|
|
|
*/
|
|
|
|
static struct TALER_EXCHANGE_DenomPublicKey *refresh_pk;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Size of #refresh_pk
|
|
|
|
*/
|
|
|
|
static unsigned int refresh_pk_len;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Same blinding key for all coins
|
|
|
|
*/
|
|
|
|
static struct TALER_DenominationBlindingKeyP blinding_key;
|
|
|
|
|
2016-06-11 16:31:33 +02:00
|
|
|
/**
|
|
|
|
* Handle to the exchange's process
|
|
|
|
*/
|
|
|
|
static struct GNUNET_OS_Process *exchanged;
|
|
|
|
|
2016-05-30 18:45:57 +02:00
|
|
|
/**
|
|
|
|
* Context for running the #ctx's event loop.
|
|
|
|
*/
|
|
|
|
static struct GNUNET_CURL_RescheduleContext *rc;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Benchmark's task
|
|
|
|
*/
|
2016-06-15 15:09:57 +02:00
|
|
|
static struct GNUNET_SCHEDULER_Task *benchmark_task;
|
2016-05-30 18:45:57 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Main execution context for the main loop of the exchange.
|
|
|
|
*/
|
|
|
|
static struct GNUNET_CURL_Context *ctx;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle to access the exchange.
|
|
|
|
*/
|
|
|
|
static struct TALER_EXCHANGE_Handle *exchange;
|
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
2016-06-15 15:41:17 +02:00
|
|
|
* The array of all reserves, of length #nreserves.
|
2016-06-03 01:23:16 +02:00
|
|
|
*/
|
|
|
|
static struct Reserve *reserves;
|
|
|
|
|
|
|
|
/**
|
2016-06-15 15:41:17 +02:00
|
|
|
* The array of all coins, of length #ncoins.
|
2016-06-03 01:23:16 +02:00
|
|
|
*/
|
|
|
|
static struct Coin *coins;
|
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
/**
|
|
|
|
* Transfer UUID counter, used in /admin/add/incoming
|
|
|
|
*/
|
|
|
|
static unsigned int transfer_uuid;
|
|
|
|
|
2016-06-06 16:53:42 +02:00
|
|
|
/**
|
|
|
|
* This key (usually provided by merchants) is needed when depositing coins,
|
|
|
|
* even though there is no merchant acting in the benchmark
|
|
|
|
*/
|
|
|
|
static struct TALER_MerchantPrivateKeyP merchant_priv;
|
2016-06-03 01:23:16 +02:00
|
|
|
|
2016-05-30 15:08:12 +02:00
|
|
|
/**
|
|
|
|
* URI under which the exchange is reachable during the benchmark.
|
|
|
|
*/
|
2016-06-15 15:41:17 +02:00
|
|
|
static char *exchange_uri;
|
2016-05-30 18:45:57 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
/**
|
|
|
|
* URI under which the administrative exchange is reachable during the
|
|
|
|
* benchmark.
|
|
|
|
*/
|
|
|
|
static char *exchange_admin_uri;
|
|
|
|
|
2016-06-07 16:58:55 +02:00
|
|
|
/**
|
2016-06-08 16:12:31 +02:00
|
|
|
* Used currency (read from /keys' output)
|
2016-06-07 16:58:55 +02:00
|
|
|
*/
|
2016-06-08 16:12:31 +02:00
|
|
|
static char *currency;
|
2016-06-07 16:58:55 +02:00
|
|
|
|
2016-06-11 17:35:15 +02:00
|
|
|
/**
|
2016-06-15 18:19:40 +02:00
|
|
|
* What time did we start to really measure performance?
|
2016-06-11 17:35:15 +02:00
|
|
|
*/
|
2016-06-15 18:19:40 +02:00
|
|
|
static struct GNUNET_TIME_Absolute start_time;
|
|
|
|
|
|
|
|
/**
|
2017-04-20 07:49:56 +02:00
|
|
|
* Number of times #benchmark_run has executed. Used
|
2016-06-15 18:19:40 +02:00
|
|
|
* to indicate when we consider us warm.
|
2016-09-23 16:52:13 +02:00
|
|
|
*/
|
2016-06-15 18:19:40 +02:00
|
|
|
static unsigned long long warm;
|
|
|
|
|
|
|
|
/**
|
2017-04-20 07:49:56 +02:00
|
|
|
* Number of times #benchmark_run should execute
|
2016-06-15 18:19:40 +02:00
|
|
|
* before we shut down.
|
2016-09-23 16:52:13 +02:00
|
|
|
*/
|
2016-06-15 18:19:40 +02:00
|
|
|
static unsigned int num_iterations;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of /deposit operations we have executed since #start_time.
|
|
|
|
*/
|
|
|
|
static unsigned long long num_deposit;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of /withdraw operations we have executed since #start_time.
|
|
|
|
*/
|
|
|
|
static unsigned long long num_withdraw;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of /refresh operations we have executed since #start_time.
|
|
|
|
*/
|
|
|
|
static unsigned long long num_refresh;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of /admin operations we have executed since #start_time.
|
|
|
|
*/
|
|
|
|
static unsigned long long num_admin;
|
2016-06-11 17:35:15 +02:00
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
|
|
|
|
/**
|
2016-09-23 16:52:13 +02:00
|
|
|
* Throw a weighted coin with @a probability.
|
|
|
|
*
|
2017-04-20 07:49:56 +02:00
|
|
|
* @return #GNUNET_OK with @a probability, #GNUNET_NO with 1 - @a probability
|
2016-06-15 15:09:57 +02:00
|
|
|
*/
|
2016-06-04 01:29:42 +02:00
|
|
|
static unsigned int
|
|
|
|
eval_probability (float probability)
|
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
uint64_t random;
|
2016-06-04 01:29:42 +02:00
|
|
|
float random_01;
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
random = GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
UINT64_MAX);
|
|
|
|
random_01 = (double) random / UINT64_MAX;
|
|
|
|
return (random_01 <= probability) ? GNUNET_OK : GNUNET_NO;
|
2016-06-04 01:29:42 +02:00
|
|
|
}
|
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-06-04 01:29:42 +02:00
|
|
|
/**
|
|
|
|
* Shutdown benchmark in case of errors
|
|
|
|
*
|
|
|
|
* @param msg error message to print in logs
|
|
|
|
*/
|
2016-06-03 01:23:16 +02:00
|
|
|
static void
|
2016-06-06 23:53:54 +02:00
|
|
|
fail (const char *msg)
|
2016-06-04 01:29:42 +02:00
|
|
|
{
|
2016-06-10 22:35:38 +02:00
|
|
|
if (NULL != msg)
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"%s\n",
|
|
|
|
msg);
|
2016-06-04 01:29:42 +02:00
|
|
|
GNUNET_SCHEDULER_shutdown ();
|
|
|
|
}
|
2016-06-03 01:23:16 +02:00
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* Main task for the benchmark.
|
|
|
|
*
|
|
|
|
* @param cls NULL
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
benchmark_run (void *cls);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Run the main task for the benchmark.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
continue_master_task ()
|
|
|
|
{
|
|
|
|
benchmark_task = GNUNET_SCHEDULER_add_now (&benchmark_run,
|
|
|
|
NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-07 16:58:55 +02:00
|
|
|
/**
|
|
|
|
* Find denomination key matching the given amount.
|
|
|
|
*
|
|
|
|
* @param keys array of keys to search
|
|
|
|
* @param amount coin value to look for
|
|
|
|
* @return NULL if no matching key was found
|
|
|
|
*/
|
|
|
|
static const struct TALER_EXCHANGE_DenomPublicKey *
|
|
|
|
find_pk (const struct TALER_EXCHANGE_Keys *keys,
|
|
|
|
const struct TALER_Amount *amount)
|
|
|
|
{
|
|
|
|
struct GNUNET_TIME_Absolute now;
|
|
|
|
struct TALER_EXCHANGE_DenomPublicKey *pk;
|
|
|
|
char *str;
|
|
|
|
|
|
|
|
now = GNUNET_TIME_absolute_get ();
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0;i<keys->num_denom_keys;i++)
|
2016-06-07 16:58:55 +02:00
|
|
|
{
|
|
|
|
pk = &keys->denom_keys[i];
|
|
|
|
if ( (0 == TALER_amount_cmp (amount,
|
|
|
|
&pk->value)) &&
|
|
|
|
(now.abs_value_us >= pk->valid_from.abs_value_us) &&
|
|
|
|
(now.abs_value_us < pk->withdraw_valid_until.abs_value_us) )
|
|
|
|
return pk;
|
|
|
|
}
|
|
|
|
/* do 2nd pass to check if expiration times are to blame for failure */
|
|
|
|
str = TALER_amount_to_string (amount);
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0;i<keys->num_denom_keys;i++)
|
2016-06-07 16:58:55 +02:00
|
|
|
{
|
|
|
|
pk = &keys->denom_keys[i];
|
|
|
|
if ( (0 == TALER_amount_cmp (amount,
|
|
|
|
&pk->value)) &&
|
|
|
|
( (now.abs_value_us < pk->valid_from.abs_value_us) ||
|
|
|
|
(now.abs_value_us > pk->withdraw_valid_until.abs_value_us) ) )
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Have denomination key for `%s', but with wrong expiration range %llu vs [%llu,%llu)\n",
|
|
|
|
str,
|
|
|
|
(unsigned long long) now.abs_value_us,
|
|
|
|
(unsigned long long) pk->valid_from.abs_value_us,
|
|
|
|
(unsigned long long) pk->withdraw_valid_until.abs_value_us);
|
|
|
|
GNUNET_free (str);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"No denomination key for amount %s found\n",
|
|
|
|
str);
|
|
|
|
GNUNET_free (str);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
|
2016-06-10 16:04:03 +02:00
|
|
|
/**
|
|
|
|
* Function called with the result of the /refresh/reveal operation.
|
|
|
|
*
|
2016-06-15 16:42:43 +02:00
|
|
|
* @param cls closure with the `struct Coin *`
|
2016-06-10 16:04:03 +02:00
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2016-10-20 21:20:31 +02:00
|
|
|
* @param ec taler-specific error code, #TALER_EC_NONE on success
|
2016-06-10 16:04:03 +02:00
|
|
|
* @param num_coins number of fresh coins created, length of the @a sigs and @a coin_privs arrays, 0 if the operation failed
|
|
|
|
* @param coin_privs array of @a num_coins private keys for the coins that were created, NULL on error
|
|
|
|
* @param sigs array of signature over @a num_coins coins, NULL on error
|
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
reveal_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-10-20 21:20:31 +02:00
|
|
|
enum TALER_ErrorCode ec,
|
2016-06-10 16:04:03 +02:00
|
|
|
unsigned int num_coins,
|
|
|
|
const struct TALER_CoinSpendPrivateKeyP *coin_privs,
|
|
|
|
const struct TALER_DenominationSignature *sigs,
|
|
|
|
const json_t *full_response)
|
|
|
|
{
|
2016-06-15 16:42:43 +02:00
|
|
|
struct Coin *coin = cls;
|
2016-06-11 17:35:15 +02:00
|
|
|
unsigned int i;
|
|
|
|
const struct TALER_EXCHANGE_Keys *keys;
|
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->rrh = NULL;
|
2016-06-11 17:35:15 +02:00
|
|
|
if (MHD_HTTP_OK != http_status)
|
|
|
|
{
|
2016-06-13 15:42:08 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("Not all coins correctly revealed");
|
2016-06-11 17:35:15 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
else
|
2016-06-14 15:58:25 +02:00
|
|
|
{
|
2016-06-11 17:35:15 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
2016-06-13 15:42:08 +02:00
|
|
|
"Coin #%d revealed!\n",
|
2016-06-15 16:42:43 +02:00
|
|
|
coin->coin_index);
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->left.value = 0;
|
2016-06-14 15:58:25 +02:00
|
|
|
}
|
|
|
|
|
2016-06-11 17:35:15 +02:00
|
|
|
keys = TALER_EXCHANGE_get_keys (exchange);
|
|
|
|
for (i=0; i<num_coins; i++)
|
|
|
|
{
|
2016-06-15 16:45:29 +02:00
|
|
|
struct Coin *fresh_coin;
|
2016-06-14 15:51:58 +02:00
|
|
|
char *revealed_str;
|
|
|
|
|
2016-06-15 16:42:43 +02:00
|
|
|
revealed_str = TALER_amount_to_string (&coin->denoms[i]);
|
2016-06-14 15:51:58 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
2016-06-15 16:36:17 +02:00
|
|
|
"revealing %s # of coins after refresh: %d\n",
|
2016-06-14 15:51:58 +02:00
|
|
|
revealed_str,
|
|
|
|
ncoins);
|
|
|
|
GNUNET_free (revealed_str);
|
2016-06-15 16:04:29 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
fresh_coin = invalid_coins_head;
|
|
|
|
if (NULL == fresh_coin)
|
|
|
|
{
|
2016-06-15 19:24:48 +02:00
|
|
|
/* #REFRESH_SLOTS_NEEDED too low? */
|
2016-06-15 16:45:29 +02:00
|
|
|
GNUNET_break (0);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
GNUNET_CONTAINER_DLL_remove (invalid_coins_head,
|
|
|
|
invalid_coins_tail,
|
|
|
|
fresh_coin);
|
|
|
|
num_invalid_coins--;
|
|
|
|
fresh_coin->invalid = GNUNET_NO;
|
|
|
|
fresh_coin->pk = find_pk (keys, &coin->denoms[i]);
|
2016-06-15 17:54:36 +02:00
|
|
|
GNUNET_assert (NULL == fresh_coin->sig.rsa_signature);
|
|
|
|
fresh_coin->sig.rsa_signature =
|
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (sigs[i].rsa_signature);
|
2016-06-15 16:45:29 +02:00
|
|
|
fresh_coin->coin_priv = coin_privs[i];
|
|
|
|
fresh_coin->left = coin->denoms[i];
|
2016-06-11 17:35:15 +02:00
|
|
|
}
|
2016-06-15 19:24:48 +02:00
|
|
|
GNUNET_free (coin->denoms);
|
|
|
|
coin->denoms = NULL;
|
2016-06-15 16:36:17 +02:00
|
|
|
continue_master_task ();
|
2016-06-10 16:04:03 +02:00
|
|
|
}
|
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
|
2016-06-10 15:22:32 +02:00
|
|
|
/**
|
|
|
|
* Function called with the result of the /refresh/melt operation.
|
|
|
|
*
|
2016-06-15 16:42:43 +02:00
|
|
|
* @param cls closure with the `struct Coin *`
|
2016-06-10 15:22:32 +02:00
|
|
|
* @param http_status HTTP response code, never #MHD_HTTP_OK (200) as for successful intermediate response this callback is skipped.
|
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2016-10-20 21:20:31 +02:00
|
|
|
* @param ec taler-specific error code, #TALER_EC_NONE on success
|
2016-06-10 15:22:32 +02:00
|
|
|
* @param noreveal_index choice by the exchange in the cut-and-choose protocol,
|
|
|
|
* UINT16_MAX on error
|
|
|
|
* @param exchange_pub public key the exchange used for signing
|
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
melt_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-10-20 21:20:31 +02:00
|
|
|
enum TALER_ErrorCode ec,
|
2016-06-10 15:22:32 +02:00
|
|
|
uint16_t noreveal_index,
|
|
|
|
const struct TALER_ExchangePublicKeyP *exchange_pub,
|
|
|
|
const json_t *full_response)
|
|
|
|
{
|
2016-06-15 16:42:43 +02:00
|
|
|
struct Coin *coin = cls;
|
2016-06-10 16:04:03 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->rmh = NULL;
|
2016-06-10 16:04:03 +02:00
|
|
|
if (MHD_HTTP_OK != http_status)
|
|
|
|
{
|
2016-06-10 16:07:51 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("Coin not correctly melted!");
|
2016-06-10 16:06:27 +02:00
|
|
|
return;
|
2016-06-10 16:04:03 +02:00
|
|
|
}
|
2016-06-14 15:51:58 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->rrh
|
2016-06-10 16:06:27 +02:00
|
|
|
= TALER_EXCHANGE_refresh_reveal (exchange,
|
2016-06-15 16:42:43 +02:00
|
|
|
coin->blob_size,
|
|
|
|
coin->blob,
|
2016-06-10 16:06:27 +02:00
|
|
|
noreveal_index,
|
2016-06-14 15:51:58 +02:00
|
|
|
&reveal_cb,
|
2016-06-15 16:42:43 +02:00
|
|
|
coin);
|
2016-06-15 16:45:29 +02:00
|
|
|
GNUNET_free (coin->blob);
|
|
|
|
coin->blob = NULL;
|
|
|
|
if (NULL == coin->rrh)
|
|
|
|
{
|
|
|
|
fail ("Failed on reveal during refresh!");
|
|
|
|
return;
|
|
|
|
}
|
2016-06-10 15:22:32 +02:00
|
|
|
}
|
2016-06-07 16:58:55 +02:00
|
|
|
|
2016-06-13 15:42:08 +02:00
|
|
|
|
|
|
|
/**
|
2016-06-15 17:54:36 +02:00
|
|
|
* Mark coin as invalid.
|
2016-06-13 15:42:08 +02:00
|
|
|
*
|
2016-06-15 17:54:36 +02:00
|
|
|
* @param coin coin to mark invalid
|
2016-06-13 15:42:08 +02:00
|
|
|
*/
|
|
|
|
static void
|
2016-06-15 17:54:36 +02:00
|
|
|
invalidate_coin (struct Coin *coin)
|
|
|
|
{
|
|
|
|
GNUNET_CONTAINER_DLL_insert (invalid_coins_head,
|
|
|
|
invalid_coins_tail,
|
|
|
|
coin);
|
|
|
|
num_invalid_coins++;
|
|
|
|
coin->invalid = GNUNET_YES;
|
|
|
|
if (NULL != coin->sig.rsa_signature)
|
|
|
|
{
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (coin->sig.rsa_signature);
|
|
|
|
coin->sig.rsa_signature = NULL;
|
|
|
|
}
|
|
|
|
}
|
2016-06-13 15:42:08 +02:00
|
|
|
|
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* Refresh the given @a coin
|
|
|
|
*
|
|
|
|
* @param coin coin to refresh
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
refresh_coin (struct Coin *coin)
|
|
|
|
{
|
|
|
|
char *blob;
|
|
|
|
size_t blob_size;
|
|
|
|
struct TALER_Amount *denoms = NULL;
|
|
|
|
struct TALER_EXCHANGE_DenomPublicKey *dpks = NULL;
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *curr_dpk;
|
|
|
|
struct TALER_Amount curr;
|
2016-06-15 20:09:09 +02:00
|
|
|
struct TALER_Amount left;
|
2016-06-15 16:36:17 +02:00
|
|
|
unsigned int ndenoms = 0;
|
|
|
|
unsigned int ndenoms2 = 0;
|
2016-06-15 19:24:48 +02:00
|
|
|
unsigned int off;
|
2016-06-15 20:09:09 +02:00
|
|
|
|
|
|
|
GNUNET_break (NULL == coin->denoms);
|
2016-09-23 16:52:13 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency, &curr));
|
2016-06-15 20:09:09 +02:00
|
|
|
left = coin->left;
|
2016-06-15 19:24:48 +02:00
|
|
|
off = 0;
|
|
|
|
while (0 != TALER_amount_cmp (&curr,
|
2016-06-15 20:09:09 +02:00
|
|
|
&left))
|
2016-06-15 16:36:17 +02:00
|
|
|
{
|
2016-06-15 19:24:48 +02:00
|
|
|
if (off >= refresh_pk_len)
|
|
|
|
{
|
|
|
|
/* refresh currency choices do not add up! */
|
|
|
|
GNUNET_break (0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
curr_dpk = &refresh_pk[off];
|
2016-06-15 20:09:09 +02:00
|
|
|
while (-1 != TALER_amount_cmp (&left,
|
2016-06-15 19:24:48 +02:00
|
|
|
&curr_dpk->value))
|
2016-06-15 16:36:17 +02:00
|
|
|
{
|
|
|
|
GNUNET_array_append (denoms,
|
|
|
|
ndenoms,
|
2016-06-15 19:24:48 +02:00
|
|
|
curr_dpk->value);
|
2016-06-15 16:36:17 +02:00
|
|
|
GNUNET_array_append (dpks,
|
|
|
|
ndenoms2,
|
|
|
|
*curr_dpk);
|
2016-06-15 20:09:09 +02:00
|
|
|
GNUNET_assert (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&left,
|
|
|
|
&left,
|
|
|
|
&curr_dpk->value));
|
2016-06-15 16:36:17 +02:00
|
|
|
}
|
2016-06-15 19:24:48 +02:00
|
|
|
off++;
|
2016-06-15 16:36:17 +02:00
|
|
|
}
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"# of coins to get in melt: %d\n",
|
|
|
|
ndenoms2);
|
2016-06-15 19:24:48 +02:00
|
|
|
GNUNET_break (ndenoms2 <= REFRESH_SLOTS_NEEDED);
|
2016-06-15 16:36:17 +02:00
|
|
|
blob = TALER_EXCHANGE_refresh_prepare (&coin->coin_priv,
|
|
|
|
&coin->left,
|
|
|
|
&coin->sig,
|
|
|
|
coin->pk,
|
|
|
|
GNUNET_YES,
|
|
|
|
ndenoms2,
|
|
|
|
dpks,
|
|
|
|
&blob_size);
|
2016-06-15 17:54:36 +02:00
|
|
|
invalidate_coin (coin);
|
|
|
|
GNUNET_array_grow (dpks,
|
|
|
|
ndenoms2,
|
|
|
|
0);
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL == blob)
|
|
|
|
{
|
|
|
|
fail ("Failed to prepare refresh");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"Prepared blob of size %d for refresh\n",
|
|
|
|
(unsigned int) blob_size);
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:42:43 +02:00
|
|
|
coin->blob = blob;
|
|
|
|
coin->blob_size = blob_size;
|
|
|
|
coin->denoms = denoms;
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
num_refresh++;
|
2016-06-15 16:36:17 +02:00
|
|
|
coin->rmh = TALER_EXCHANGE_refresh_melt (exchange,
|
|
|
|
blob_size,
|
|
|
|
blob,
|
|
|
|
&melt_cb,
|
2016-06-15 16:42:43 +02:00
|
|
|
coin);
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL == coin->rmh)
|
|
|
|
{
|
|
|
|
fail ("Impossible to issue a melt request to the exchange");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-06 16:53:42 +02:00
|
|
|
/**
|
|
|
|
* Function called with the result of a /deposit operation.
|
|
|
|
*
|
2016-06-15 16:04:29 +02:00
|
|
|
* @param cls closure with the `struct Coin` that we are processing
|
2016-06-06 16:53:42 +02:00
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful deposit;
|
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2016-10-20 21:20:31 +02:00
|
|
|
* @param ec taler-specific error code, #TALER_EC_NONE on success
|
2016-06-07 15:14:44 +02:00
|
|
|
* @param exchange_pub public key used by the exchange for signing
|
2016-06-06 16:53:42 +02:00
|
|
|
* @param obj the received JSON reply, should be kept as proof (and, in case of errors,
|
|
|
|
* be forwarded to the customer)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
deposit_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-10-20 21:20:31 +02:00
|
|
|
enum TALER_ErrorCode ec,
|
2016-06-07 15:14:44 +02:00
|
|
|
const struct TALER_ExchangePublicKeyP *exchange_pub,
|
2016-06-06 16:53:42 +02:00
|
|
|
const json_t *obj)
|
|
|
|
{
|
2016-06-15 16:04:29 +02:00
|
|
|
struct Coin *coin = cls;
|
2016-06-06 16:53:42 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->dh = NULL;
|
2016-06-06 16:53:42 +02:00
|
|
|
if (MHD_HTTP_OK != http_status)
|
|
|
|
{
|
2016-06-13 15:42:08 +02:00
|
|
|
json_dumpf (obj, stderr, 0);
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("At least one coin has not been deposited, status: %d");
|
2016-06-06 16:53:42 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-14 15:51:58 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Coin #%d correctly spent!\n",
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->coin_index);
|
|
|
|
if (GNUNET_YES == coin->refresh)
|
2016-06-15 17:54:36 +02:00
|
|
|
{
|
2016-06-15 16:36:17 +02:00
|
|
|
refresh_coin (coin);
|
2016-06-15 17:54:36 +02:00
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
else
|
2016-06-15 17:54:36 +02:00
|
|
|
{
|
|
|
|
invalidate_coin (coin);
|
2016-06-15 16:36:17 +02:00
|
|
|
continue_master_task ();
|
2016-06-15 17:54:36 +02:00
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Spend the given coin. Also triggers refresh
|
|
|
|
* with a certain probability.
|
|
|
|
*
|
|
|
|
* @param coin coin to spend
|
|
|
|
* @param do_refresh should we also do the refresh?
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
spend_coin (struct Coin *coin,
|
|
|
|
int do_refresh)
|
|
|
|
{
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
struct GNUNET_TIME_Absolute wire_deadline;
|
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
|
|
|
struct GNUNET_TIME_Absolute refund_deadline;
|
2017-05-29 01:15:41 +02:00
|
|
|
struct GNUNET_HashCode h_contract_terms;
|
2016-06-15 16:36:17 +02:00
|
|
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
|
|
|
struct TALER_DepositRequestPS dr;
|
|
|
|
struct TALER_MerchantPublicKeyP merchant_pub;
|
|
|
|
struct TALER_CoinSpendSignatureP coin_sig;
|
|
|
|
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&coin->coin_priv.eddsa_priv,
|
|
|
|
&coin_pub.eddsa_pub);
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
2017-05-29 01:15:41 +02:00
|
|
|
&h_contract_terms,
|
|
|
|
sizeof (h_contract_terms));
|
2016-06-15 16:36:17 +02:00
|
|
|
timestamp = GNUNET_TIME_absolute_get ();
|
|
|
|
wire_deadline = GNUNET_TIME_absolute_add (timestamp,
|
|
|
|
GNUNET_TIME_UNIT_WEEKS);
|
|
|
|
refund_deadline = GNUNET_TIME_absolute_add (timestamp,
|
|
|
|
GNUNET_TIME_UNIT_DAYS);
|
|
|
|
GNUNET_TIME_round_abs (×tamp);
|
|
|
|
GNUNET_TIME_round_abs (&wire_deadline);
|
|
|
|
GNUNET_TIME_round_abs (&refund_deadline);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"Spending %d-th coin\n",
|
|
|
|
coin->coin_index);
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
if (do_refresh)
|
2016-06-07 16:58:55 +02:00
|
|
|
{
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* Always spending 1 out of 8 KUDOS. To be improved by randomly
|
2016-09-23 16:52:13 +02:00
|
|
|
* picking the spent amount
|
2016-06-15 16:36:17 +02:00
|
|
|
*/
|
|
|
|
struct TALER_Amount one;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency, &one));
|
2016-06-15 16:36:17 +02:00
|
|
|
one.value = 1;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
|
|
|
GNUNET_assert (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&amount,
|
|
|
|
&one,
|
|
|
|
&coin->pk->fee_deposit));
|
|
|
|
GNUNET_assert (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&coin->left,
|
|
|
|
&coin->pk->value,
|
|
|
|
&one));
|
2016-06-15 16:36:17 +02:00
|
|
|
coin->refresh = GNUNET_YES;
|
2016-06-10 16:06:27 +02:00
|
|
|
}
|
2016-06-13 15:42:08 +02:00
|
|
|
else
|
2016-06-15 16:36:17 +02:00
|
|
|
{
|
2016-09-23 16:52:13 +02:00
|
|
|
GNUNET_assert (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&amount,
|
|
|
|
&coin->pk->value,
|
|
|
|
&coin->pk->fee_deposit));
|
2016-06-15 16:45:29 +02:00
|
|
|
coin->refresh = GNUNET_NO;
|
2016-06-15 16:36:17 +02:00
|
|
|
}
|
|
|
|
memset (&dr, 0, sizeof (dr));
|
|
|
|
dr.purpose.size = htonl (sizeof (struct TALER_DepositRequestPS));
|
|
|
|
dr.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_DEPOSIT);
|
2017-05-29 01:15:41 +02:00
|
|
|
dr.h_contract_terms = h_contract_terms;
|
2017-10-06 20:02:28 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_JSON_hash (merchant_details,
|
|
|
|
&dr.h_wire));
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
dr.timestamp = GNUNET_TIME_absolute_hton (timestamp);
|
|
|
|
dr.refund_deadline = GNUNET_TIME_absolute_hton (refund_deadline);
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
TALER_amount_hton (&dr.amount_with_fee,
|
|
|
|
&amount);
|
|
|
|
TALER_amount_hton (&dr.deposit_fee,
|
|
|
|
&coin->pk->fee_deposit);
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&merchant_priv.eddsa_priv,
|
|
|
|
&merchant_pub.eddsa_pub);
|
|
|
|
dr.merchant = merchant_pub;
|
|
|
|
dr.coin_pub = coin_pub;
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
GNUNET_CRYPTO_eddsa_sign (&coin->coin_priv.eddsa_priv,
|
|
|
|
&dr.purpose,
|
|
|
|
&coin_sig.eddsa_signature));
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
num_deposit++;
|
2016-06-15 16:36:17 +02:00
|
|
|
coin->dh = TALER_EXCHANGE_deposit (exchange,
|
|
|
|
&amount,
|
|
|
|
wire_deadline,
|
|
|
|
merchant_details,
|
2017-05-29 01:15:41 +02:00
|
|
|
&h_contract_terms,
|
2016-06-15 16:36:17 +02:00
|
|
|
&coin_pub,
|
|
|
|
&coin->sig,
|
|
|
|
&coin->pk->key,
|
|
|
|
timestamp,
|
|
|
|
&merchant_pub,
|
|
|
|
refund_deadline,
|
|
|
|
&coin_sig,
|
|
|
|
&deposit_cb,
|
|
|
|
coin);
|
|
|
|
if (NULL == coin->dh)
|
|
|
|
{
|
|
|
|
fail ("An error occurred while calling deposit API");
|
|
|
|
return;
|
2016-06-13 15:42:08 +02:00
|
|
|
}
|
2016-06-06 16:53:42 +02:00
|
|
|
}
|
|
|
|
|
2016-06-13 15:42:08 +02:00
|
|
|
|
2016-06-04 01:29:42 +02:00
|
|
|
/**
|
|
|
|
* Function called upon completion of our /reserve/withdraw request.
|
2016-06-14 15:53:48 +02:00
|
|
|
* This is merely the function which spends withdrawn coins. For each
|
2016-06-16 00:22:20 +02:00
|
|
|
* spent coin, it either refresh it or re-withdraw it.
|
2016-06-04 01:29:42 +02:00
|
|
|
*
|
2016-06-15 16:04:29 +02:00
|
|
|
* @param cls closure with our `struct Coin`
|
2016-06-04 01:29:42 +02:00
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2016-10-20 21:20:31 +02:00
|
|
|
* @param ec taler-specific error code, #TALER_EC_NONE on success
|
2016-06-04 01:29:42 +02:00
|
|
|
* @param sig signature over the coin, NULL on error
|
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
reserve_withdraw_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-10-20 21:20:31 +02:00
|
|
|
enum TALER_ErrorCode ec,
|
2016-06-04 01:29:42 +02:00
|
|
|
const struct TALER_DenominationSignature *sig,
|
|
|
|
const json_t *full_response)
|
|
|
|
{
|
2016-06-15 16:04:29 +02:00
|
|
|
struct Coin *coin = cls;
|
2016-06-04 01:29:42 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->wsh = NULL;
|
2016-06-04 01:29:42 +02:00
|
|
|
if (MHD_HTTP_OK != http_status)
|
2016-06-09 17:22:15 +02:00
|
|
|
{
|
2016-06-13 15:42:08 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("At least one coin has not correctly been withdrawn");
|
2016-06-09 17:22:15 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-14 15:51:58 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
2016-06-06 23:53:54 +02:00
|
|
|
"%d-th coin withdrawn\n",
|
2016-06-15 16:04:29 +02:00
|
|
|
coin->coin_index);
|
|
|
|
coin->sig.rsa_signature =
|
2016-06-04 01:29:42 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_dup (sig->rsa_signature);
|
2016-06-15 16:45:29 +02:00
|
|
|
GNUNET_CONTAINER_DLL_remove (invalid_coins_head,
|
|
|
|
invalid_coins_tail,
|
|
|
|
coin);
|
|
|
|
num_invalid_coins--;
|
|
|
|
coin->invalid = GNUNET_NO;
|
2016-06-15 16:36:17 +02:00
|
|
|
continue_master_task ();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Withdraw the given coin from the respective reserve.
|
|
|
|
*
|
|
|
|
* @param coin coin to withdraw
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
withdraw_coin (struct Coin *coin)
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *coin_priv;
|
|
|
|
struct TALER_Amount amount;
|
2016-06-15 16:45:29 +02:00
|
|
|
struct TALER_Amount left;
|
2016-06-15 16:36:17 +02:00
|
|
|
const struct TALER_EXCHANGE_Keys *keys;
|
|
|
|
struct Reserve *r;
|
|
|
|
|
|
|
|
keys = TALER_EXCHANGE_get_keys (exchange);
|
|
|
|
r = &reserves[coin->reserve_index];
|
|
|
|
coin_priv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
coin->coin_priv.eddsa_priv = *coin_priv;
|
|
|
|
GNUNET_free (coin_priv);
|
2016-09-23 16:52:13 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
&amount));
|
2016-06-15 16:36:17 +02:00
|
|
|
amount.value = COIN_VALUE;
|
2016-06-15 17:54:36 +02:00
|
|
|
GNUNET_assert (-1 != TALER_amount_cmp (&r->left,
|
|
|
|
&amount));
|
2016-06-15 16:36:17 +02:00
|
|
|
GNUNET_assert (NULL != (coin->pk = find_pk (keys, &amount)));
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
num_withdraw++;
|
2016-06-15 16:36:17 +02:00
|
|
|
coin->wsh =
|
|
|
|
TALER_EXCHANGE_reserve_withdraw (exchange,
|
|
|
|
coin->pk,
|
|
|
|
&r->reserve_priv,
|
|
|
|
&coin->coin_priv,
|
|
|
|
&blinding_key,
|
|
|
|
&reserve_withdraw_cb,
|
|
|
|
coin);
|
2016-06-15 16:45:29 +02:00
|
|
|
GNUNET_assert (GNUNET_SYSERR !=
|
|
|
|
TALER_amount_subtract (&left,
|
|
|
|
&r->left,
|
|
|
|
&amount));
|
|
|
|
r->left = left;
|
|
|
|
if (-1 == TALER_amount_cmp (&left,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
/* not enough left in the reserve for future withdrawals,
|
|
|
|
create a new reserve! */
|
|
|
|
GNUNET_CONTAINER_DLL_insert (empty_reserve_head,
|
|
|
|
empty_reserve_tail,
|
|
|
|
r);
|
|
|
|
}
|
2016-06-04 01:29:42 +02:00
|
|
|
}
|
2016-06-06 23:53:54 +02:00
|
|
|
|
|
|
|
|
2016-06-03 01:23:16 +02:00
|
|
|
/**
|
|
|
|
* Function called upon completion of our /admin/add/incoming request.
|
2016-06-07 16:58:55 +02:00
|
|
|
* Its duty is withdrawing coins on the freshly created reserve.
|
2016-06-03 01:23:16 +02:00
|
|
|
*
|
2016-06-15 16:04:29 +02:00
|
|
|
* @param cls closure with the `struct Reserve *`
|
2016-06-03 01:23:16 +02:00
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2016-10-20 21:20:31 +02:00
|
|
|
* @param ec taler-specific error code, #TALER_EC_NONE on success
|
2016-06-03 01:23:16 +02:00
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
add_incoming_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-10-20 21:20:31 +02:00
|
|
|
enum TALER_ErrorCode ec,
|
2016-06-03 01:23:16 +02:00
|
|
|
const json_t *full_response)
|
|
|
|
{
|
2016-06-15 16:04:29 +02:00
|
|
|
struct Reserve *r = cls;
|
2016-06-04 01:29:42 +02:00
|
|
|
|
2016-06-15 16:04:29 +02:00
|
|
|
r->aih = NULL;
|
2016-06-04 01:29:42 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"/admin/add/incoming callback called on %d-th reserve\n",
|
2016-06-15 16:04:29 +02:00
|
|
|
r->reserve_index);
|
2016-06-04 01:29:42 +02:00
|
|
|
if (MHD_HTTP_OK != http_status)
|
2016-06-13 15:42:08 +02:00
|
|
|
{
|
|
|
|
json_dumpf (full_response, stderr, 0);
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("At least one reserve failed in being created");
|
|
|
|
return;
|
2016-06-13 15:42:08 +02:00
|
|
|
}
|
2016-06-15 16:45:29 +02:00
|
|
|
GNUNET_CONTAINER_DLL_remove (empty_reserve_head,
|
|
|
|
empty_reserve_tail,
|
|
|
|
r);
|
2016-06-15 16:36:17 +02:00
|
|
|
continue_master_task ();
|
2016-06-03 01:23:16 +02:00
|
|
|
}
|
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-05-30 18:45:57 +02:00
|
|
|
/**
|
2016-06-15 16:36:17 +02:00
|
|
|
* Fill a reserve using /admin/add/incoming
|
2016-05-30 18:45:57 +02:00
|
|
|
*
|
2016-06-15 16:36:17 +02:00
|
|
|
* @param r reserve to fill
|
2016-05-30 18:45:57 +02:00
|
|
|
*/
|
|
|
|
static void
|
2016-06-15 16:36:17 +02:00
|
|
|
fill_reserve (struct Reserve *r)
|
2016-05-30 18:45:57 +02:00
|
|
|
{
|
2016-06-03 01:23:16 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
|
|
|
struct GNUNET_TIME_Absolute execution_date;
|
|
|
|
struct TALER_Amount reserve_amount;
|
2016-06-15 16:36:17 +02:00
|
|
|
json_t *transfer_details;
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-09-23 16:52:13 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_get_zero (currency,
|
|
|
|
&reserve_amount));
|
2016-06-08 16:12:31 +02:00
|
|
|
reserve_amount.value = RESERVE_VALUE;
|
2016-06-03 01:23:16 +02:00
|
|
|
execution_date = GNUNET_TIME_absolute_get ();
|
|
|
|
GNUNET_TIME_round_abs (&execution_date);
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
r->reserve_priv.eddsa_priv = *priv;
|
|
|
|
GNUNET_free (priv);
|
|
|
|
transfer_details = json_pack ("{s:I}",
|
|
|
|
"uuid", (json_int_t) transfer_uuid++);
|
|
|
|
GNUNET_assert (NULL != transfer_details);
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&r->reserve_priv.eddsa_priv,
|
|
|
|
&reserve_pub.eddsa_pub);
|
2016-06-15 16:45:29 +02:00
|
|
|
r->left = reserve_amount;
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
num_admin++;
|
2016-06-15 16:36:17 +02:00
|
|
|
r->aih = TALER_EXCHANGE_admin_add_incoming (exchange,
|
|
|
|
exchange_admin_uri,
|
|
|
|
&reserve_pub,
|
|
|
|
&reserve_amount,
|
|
|
|
execution_date,
|
|
|
|
bank_details,
|
|
|
|
transfer_details,
|
|
|
|
&add_incoming_cb,
|
|
|
|
r);
|
|
|
|
GNUNET_assert (NULL != r->aih);
|
|
|
|
json_decref (transfer_details);
|
|
|
|
}
|
2016-06-03 01:23:16 +02:00
|
|
|
|
2016-05-30 18:57:16 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
/**
|
|
|
|
* Main task for the benchmark.
|
|
|
|
*
|
|
|
|
* @param cls NULL
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
benchmark_run (void *cls)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
2016-06-15 16:45:29 +02:00
|
|
|
int refresh;
|
|
|
|
struct Coin *coin;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
benchmark_task = NULL;
|
2016-06-15 16:45:29 +02:00
|
|
|
/* First, always make sure all reserves are full */
|
|
|
|
if (NULL != empty_reserve_head)
|
2016-06-03 01:23:16 +02:00
|
|
|
{
|
2016-06-15 16:45:29 +02:00
|
|
|
fill_reserve (empty_reserve_head);
|
|
|
|
return;
|
2016-06-03 01:23:16 +02:00
|
|
|
}
|
2016-06-15 16:45:29 +02:00
|
|
|
/* Second, withdraw until #num_invalid_coins is less than
|
|
|
|
#INVALID_COIN_SLACK */
|
|
|
|
if (num_invalid_coins > INVALID_COIN_SLACK)
|
2016-06-15 16:36:17 +02:00
|
|
|
{
|
2016-06-15 16:45:29 +02:00
|
|
|
withdraw_coin (invalid_coins_head);
|
|
|
|
return;
|
|
|
|
}
|
2016-06-15 18:19:40 +02:00
|
|
|
warm++;
|
|
|
|
if ( be_verbose &&
|
2016-06-15 18:42:00 +02:00
|
|
|
(0 == (warm % 50)) )
|
|
|
|
{
|
|
|
|
static struct GNUNET_TIME_Absolute last;
|
|
|
|
struct GNUNET_TIME_Relative duration;
|
|
|
|
|
|
|
|
if (0 != last.abs_value_us)
|
|
|
|
duration = GNUNET_TIME_absolute_get_duration (last);
|
|
|
|
else
|
|
|
|
duration = GNUNET_TIME_UNIT_FOREVER_REL;
|
|
|
|
last = GNUNET_TIME_absolute_get ();
|
2016-06-15 18:19:40 +02:00
|
|
|
fprintf (stderr,
|
2016-06-15 18:42:00 +02:00
|
|
|
"%s - %s\n",
|
|
|
|
WARM_THRESHOLD < warm ? "WARM" : "COLD",
|
|
|
|
GNUNET_STRINGS_relative_time_to_string (duration,
|
|
|
|
GNUNET_YES));
|
|
|
|
}
|
2016-06-15 18:19:40 +02:00
|
|
|
if (WARM_THRESHOLD == warm)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Benchmark warm.\n");
|
|
|
|
start_time = GNUNET_TIME_absolute_get ();
|
|
|
|
}
|
|
|
|
if ( (warm > num_iterations) &&
|
|
|
|
(0 != num_iterations) )
|
|
|
|
{
|
|
|
|
GNUNET_SCHEDULER_shutdown ();
|
|
|
|
return;
|
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
/* By default, pick a random valid coin to spend */
|
|
|
|
for (i=0;i<1000;i++)
|
|
|
|
{
|
2016-06-15 17:54:36 +02:00
|
|
|
coin = &coins[GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
ncoins)];
|
2016-06-15 16:45:29 +02:00
|
|
|
if (GNUNET_YES == coin->invalid)
|
|
|
|
continue; /* unlucky draw, try again */
|
|
|
|
if (1 == coin->left.value)
|
|
|
|
refresh = GNUNET_NO; /* cannot refresh, coin is already at unit */
|
|
|
|
else
|
|
|
|
refresh = eval_probability (REFRESH_PROBABILITY);
|
2016-06-15 19:24:48 +02:00
|
|
|
if (num_invalid_coins < REFRESH_SLOTS_NEEDED)
|
|
|
|
refresh = GNUNET_NO;
|
2016-06-15 16:36:17 +02:00
|
|
|
spend_coin (coin,
|
2016-06-15 16:45:29 +02:00
|
|
|
refresh);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
fail ("Too many invalid coins, is your INVALID_COIN_SLACK too high?");
|
2016-05-30 18:45:57 +02:00
|
|
|
}
|
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
|
2016-06-09 23:35:05 +02:00
|
|
|
/**
|
2016-06-10 16:06:27 +02:00
|
|
|
* Populates the global array of denominations which will
|
2016-06-15 15:09:57 +02:00
|
|
|
* be withdrawn in a refresh operation. It sums up 4 #currency units,
|
2016-06-09 23:35:05 +02:00
|
|
|
* since that is the only amount refreshed so far by the benchmark
|
|
|
|
*
|
2016-06-13 16:36:10 +02:00
|
|
|
* @return #GNUNET_OK if the array is correctly built, #GNUNET_SYSERR
|
2016-06-10 22:35:38 +02:00
|
|
|
* otherwise
|
2016-06-09 23:35:05 +02:00
|
|
|
*/
|
2017-10-06 22:13:05 +02:00
|
|
|
static int
|
2016-06-15 19:24:48 +02:00
|
|
|
build_refresh ()
|
2016-06-09 23:35:05 +02:00
|
|
|
{
|
|
|
|
char *amount_str;
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *picked_denom;
|
|
|
|
const struct TALER_EXCHANGE_Keys *keys;
|
|
|
|
|
2016-06-15 19:24:48 +02:00
|
|
|
GNUNET_array_grow (refresh_pk,
|
|
|
|
refresh_pk_len,
|
|
|
|
0);
|
2016-06-09 23:35:05 +02:00
|
|
|
keys = TALER_EXCHANGE_get_keys (exchange);
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0; NULL != refresh_denoms[i]; i++)
|
2016-06-09 23:35:05 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_asprintf (&amount_str,
|
|
|
|
"%s:%s",
|
|
|
|
currency,
|
2016-06-15 19:24:48 +02:00
|
|
|
refresh_denoms[i]);
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (amount_str,
|
|
|
|
&amount));
|
|
|
|
picked_denom = find_pk (keys,
|
|
|
|
&amount);
|
2016-06-10 22:35:38 +02:00
|
|
|
if (NULL == picked_denom)
|
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_break (0);
|
|
|
|
GNUNET_free (amount_str);
|
2016-06-10 22:35:38 +02:00
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_array_append (refresh_pk,
|
|
|
|
refresh_pk_len,
|
|
|
|
*picked_denom);
|
2016-06-09 23:35:05 +02:00
|
|
|
GNUNET_free (amount_str);
|
|
|
|
}
|
2016-06-10 22:35:38 +02:00
|
|
|
return GNUNET_OK;
|
2016-06-09 23:35:05 +02:00
|
|
|
}
|
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-05-30 18:45:57 +02:00
|
|
|
/**
|
|
|
|
* Functions of this type are called to provide the retrieved signing and
|
|
|
|
* denomination keys of the exchange. No TALER_EXCHANGE_*() functions should be called
|
|
|
|
* in this callback.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
2016-06-09 23:35:05 +02:00
|
|
|
* @param _keys information about keys of the exchange
|
2017-07-01 14:15:26 +02:00
|
|
|
* @param vc compatibility information
|
2016-05-30 18:45:57 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
cert_cb (void *cls,
|
2017-07-01 14:15:26 +02:00
|
|
|
const struct TALER_EXCHANGE_Keys *_keys,
|
|
|
|
enum TALER_EXCHANGE_VersionCompatibility vc)
|
2016-05-30 18:45:57 +02:00
|
|
|
{
|
|
|
|
/* check that keys is OK */
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL == _keys)
|
|
|
|
{
|
|
|
|
fail ("Exchange returned no keys!");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( (0 == _keys->num_sign_keys) ||
|
|
|
|
(0 == _keys->num_denom_keys) )
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail ("Bad /keys response");
|
|
|
|
return;
|
|
|
|
}
|
2016-05-30 18:45:57 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
2016-06-15 15:09:57 +02:00
|
|
|
"Read %u signing keys and %u denomination keys\n",
|
2016-06-15 15:41:17 +02:00
|
|
|
_keys->num_sign_keys,
|
2016-06-04 01:29:42 +02:00
|
|
|
_keys->num_denom_keys);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL != currency)
|
2016-06-15 19:24:48 +02:00
|
|
|
{
|
|
|
|
/* we've been here before, still need to update refresh_denoms */
|
|
|
|
if (GNUNET_SYSERR ==
|
|
|
|
build_refresh ())
|
|
|
|
{
|
|
|
|
fail ("Initializing denominations failed");
|
|
|
|
return;
|
|
|
|
}
|
2016-09-23 16:52:13 +02:00
|
|
|
return;
|
2016-06-15 19:24:48 +02:00
|
|
|
}
|
2016-06-10 01:04:09 +02:00
|
|
|
currency = GNUNET_strdup (_keys->denom_keys[0].value.currency);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (GNUNET_SYSERR ==
|
2016-06-15 19:24:48 +02:00
|
|
|
build_refresh ())
|
2016-06-10 22:35:38 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("Initializing denominations failed");
|
2016-06-10 22:35:38 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-15 19:24:48 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"Using currency: %s\n",
|
|
|
|
currency);
|
2016-06-15 16:36:17 +02:00
|
|
|
continue_master_task ();
|
2016-05-30 18:45:57 +02:00
|
|
|
}
|
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-05-30 18:45:57 +02:00
|
|
|
/**
|
2016-06-07 16:58:55 +02:00
|
|
|
* Function run when the benchmark terminates (good or bad).
|
2016-05-30 18:45:57 +02:00
|
|
|
* Cleans up our state.
|
|
|
|
*
|
|
|
|
* @param cls the interpreter state.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
do_shutdown (void *cls)
|
|
|
|
{
|
2016-06-15 18:19:40 +02:00
|
|
|
struct GNUNET_TIME_Relative duration;
|
2016-06-03 02:28:57 +02:00
|
|
|
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
duration = GNUNET_TIME_absolute_get_duration (start_time);
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Shutting down...\n");
|
|
|
|
if (NULL != benchmark_task)
|
|
|
|
{
|
|
|
|
GNUNET_SCHEDULER_cancel (benchmark_task);
|
|
|
|
benchmark_task = NULL;
|
|
|
|
}
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0; i<nreserves; i++)
|
2016-06-03 02:28:57 +02:00
|
|
|
{
|
|
|
|
if (NULL != reserves[i].aih)
|
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Cancelling %d-th reserve\n",
|
|
|
|
i);
|
2016-06-03 02:28:57 +02:00
|
|
|
TALER_EXCHANGE_admin_add_incoming_cancel(reserves[i].aih);
|
|
|
|
reserves[i].aih = NULL;
|
|
|
|
}
|
|
|
|
}
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0; i<COINS_PER_RESERVE * nreserves; i++)
|
2016-06-03 02:28:57 +02:00
|
|
|
{
|
2016-06-15 16:36:17 +02:00
|
|
|
struct Coin *coin = &coins[i];
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL != coin->wsh)
|
2016-06-03 02:28:57 +02:00
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Cancelling %d-th coin withdraw handle\n",
|
|
|
|
i);
|
2016-06-15 16:36:17 +02:00
|
|
|
TALER_EXCHANGE_reserve_withdraw_cancel (coin->wsh);
|
|
|
|
coin->wsh = NULL;
|
2016-06-06 23:55:31 +02:00
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL != coin->dh)
|
2016-06-06 16:53:42 +02:00
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Cancelling %d-th coin deposit handle\n",
|
|
|
|
i);
|
2016-06-15 16:36:17 +02:00
|
|
|
TALER_EXCHANGE_deposit_cancel(coin->dh);
|
|
|
|
coin->dh = NULL;
|
2016-06-06 23:53:54 +02:00
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL != coin->rmh)
|
2016-06-07 16:58:55 +02:00
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Cancelling %d-th coin melt handle\n",
|
|
|
|
i);
|
2016-06-15 16:36:17 +02:00
|
|
|
TALER_EXCHANGE_refresh_melt_cancel (coin->rmh);
|
|
|
|
coin->rmh = NULL;
|
2016-06-07 16:58:55 +02:00
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
if (NULL != coin->rrh)
|
2016-06-07 16:58:55 +02:00
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Cancelling %d-th coin reveal handle\n",
|
|
|
|
i);
|
2016-06-15 16:36:17 +02:00
|
|
|
TALER_EXCHANGE_refresh_reveal_cancel (coin->rrh);
|
|
|
|
coin->rmh = NULL;
|
2016-06-07 16:58:55 +02:00
|
|
|
}
|
2016-06-15 16:45:29 +02:00
|
|
|
if (NULL != coin->blob)
|
|
|
|
{
|
|
|
|
GNUNET_free (coin->blob);
|
|
|
|
coin->blob = NULL;
|
|
|
|
}
|
2016-06-15 17:54:36 +02:00
|
|
|
if (NULL != coin->sig.rsa_signature)
|
|
|
|
{
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (coin->sig.rsa_signature);
|
|
|
|
coin->sig.rsa_signature = NULL;
|
|
|
|
}
|
2016-06-15 19:24:48 +02:00
|
|
|
if (NULL != coin->denoms)
|
|
|
|
{
|
|
|
|
GNUNET_free (coin->denoms);
|
|
|
|
coin->denoms = NULL;
|
|
|
|
}
|
2016-06-03 02:28:57 +02:00
|
|
|
}
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL != bank_details)
|
|
|
|
{
|
|
|
|
json_decref (bank_details);
|
|
|
|
bank_details = NULL;
|
|
|
|
}
|
2016-06-08 17:34:46 +02:00
|
|
|
if (NULL != merchant_details)
|
2016-06-15 15:09:57 +02:00
|
|
|
{
|
2016-06-09 23:35:05 +02:00
|
|
|
json_decref (merchant_details);
|
2016-06-15 15:09:57 +02:00
|
|
|
merchant_details = NULL;
|
|
|
|
}
|
2016-06-03 01:23:16 +02:00
|
|
|
GNUNET_free_non_null (reserves);
|
2016-06-15 16:36:17 +02:00
|
|
|
reserves = NULL;
|
2016-06-03 01:23:16 +02:00
|
|
|
GNUNET_free_non_null (coins);
|
2016-06-15 16:36:17 +02:00
|
|
|
coins = NULL;
|
2016-06-10 01:04:09 +02:00
|
|
|
GNUNET_free_non_null (currency);
|
2016-06-15 16:36:17 +02:00
|
|
|
currency = NULL;
|
2016-06-06 22:40:33 +02:00
|
|
|
|
|
|
|
if (NULL != exchange)
|
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Disconnecting from exchange\n");
|
2016-06-06 22:40:33 +02:00
|
|
|
TALER_EXCHANGE_disconnect (exchange);
|
|
|
|
exchange = NULL;
|
|
|
|
}
|
|
|
|
if (NULL != ctx)
|
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Invoking GNUNET_CURL_fini()\n");
|
2016-06-06 22:40:33 +02:00
|
|
|
GNUNET_CURL_fini (ctx);
|
|
|
|
ctx = NULL;
|
|
|
|
}
|
|
|
|
if (NULL != rc)
|
|
|
|
{
|
2016-06-11 14:33:52 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Invoking GNUNET_CURL_gnunet_rc_destroy()\n");
|
2016-06-06 22:40:33 +02:00
|
|
|
GNUNET_CURL_gnunet_rc_destroy (rc);
|
|
|
|
rc = NULL;
|
|
|
|
}
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_CONFIGURATION_destroy (cfg);
|
|
|
|
cfg = NULL;
|
2016-06-15 18:19:40 +02:00
|
|
|
if (warm >= WARM_THRESHOLD)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"Executed A=%llu/W=%llu/D=%llu/R=%llu operations in %s\n",
|
|
|
|
num_admin,
|
|
|
|
num_withdraw,
|
|
|
|
num_deposit,
|
|
|
|
num_refresh,
|
|
|
|
GNUNET_STRINGS_relative_time_to_string (duration,
|
2016-06-15 18:42:00 +02:00
|
|
|
GNUNET_YES));
|
2016-06-15 18:19:40 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf (stdout,
|
|
|
|
"Sorry, no results, benchmark did not get warm!\n");
|
|
|
|
}
|
2016-05-30 18:45:57 +02:00
|
|
|
}
|
2016-05-30 15:08:12 +02:00
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-05-30 17:16:01 +02:00
|
|
|
/**
|
|
|
|
* Main function that will be run by the scheduler.
|
2016-06-15 16:36:17 +02:00
|
|
|
* Prepares everything for the benchmark.
|
2016-05-30 15:08:12 +02:00
|
|
|
*
|
2016-05-30 17:16:01 +02:00
|
|
|
* @param cls closure
|
2016-05-30 15:08:12 +02:00
|
|
|
*/
|
2016-05-30 17:16:01 +02:00
|
|
|
static void
|
|
|
|
run (void *cls)
|
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
char *bank_details_filename;
|
2016-06-08 17:11:33 +02:00
|
|
|
char *merchant_details_filename;
|
2016-06-15 16:36:17 +02:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
2016-06-08 16:12:31 +02:00
|
|
|
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"gotten pool_size of %d\n",
|
|
|
|
pool_size);
|
|
|
|
cfg = GNUNET_CONFIGURATION_create ();
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_SCHEDULER_add_shutdown (&do_shutdown,
|
|
|
|
NULL);
|
2017-03-15 12:01:06 +01:00
|
|
|
if (GNUNET_SYSERR ==
|
|
|
|
GNUNET_CONFIGURATION_parse (cfg,
|
|
|
|
config_file))
|
2016-06-09 17:22:15 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("Failed to parse configuration file");
|
2016-06-09 17:22:15 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-15 19:24:48 +02:00
|
|
|
if (pool_size < INVALID_COIN_SLACK)
|
|
|
|
{
|
|
|
|
fail ("Pool size given too small.");
|
|
|
|
return;
|
|
|
|
}
|
2016-06-15 15:09:57 +02:00
|
|
|
if (GNUNET_SYSERR ==
|
|
|
|
GNUNET_CONFIGURATION_get_value_filename (cfg,
|
|
|
|
"benchmark",
|
|
|
|
"bank_details",
|
|
|
|
&bank_details_filename))
|
2016-06-09 17:22:15 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"benchmark",
|
|
|
|
"bank_details");
|
|
|
|
fail ("Failed to get BANK_DETAILS value");
|
2016-06-09 17:22:15 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-08 17:11:33 +02:00
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
bank_details = json_load_file (bank_details_filename,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
2016-06-15 18:42:00 +02:00
|
|
|
GNUNET_free (bank_details_filename);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL == bank_details)
|
2016-06-09 17:22:15 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
fail ("Failed to parse file with BANK_DETAILS");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (GNUNET_SYSERR ==
|
|
|
|
GNUNET_CONFIGURATION_get_value_filename (cfg,
|
|
|
|
"benchmark",
|
|
|
|
"merchant_details",
|
|
|
|
&merchant_details_filename))
|
|
|
|
{
|
|
|
|
GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"benchmark",
|
|
|
|
"merchant_details");
|
|
|
|
fail ("Failed to get MERCHANT_DETAILS value");
|
2016-06-09 17:22:15 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-06-08 17:11:33 +02:00
|
|
|
merchant_details = json_load_file (merchant_details_filename,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
2016-06-15 18:42:00 +02:00
|
|
|
GNUNET_free (merchant_details_filename);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL == merchant_details)
|
|
|
|
{
|
|
|
|
fail ("Failed to parse file with MERCHANT_DETAILS");
|
|
|
|
return;
|
|
|
|
}
|
2016-06-15 16:36:17 +02:00
|
|
|
|
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
merchant_priv.eddsa_priv = *priv;
|
|
|
|
GNUNET_free (priv);
|
|
|
|
|
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&blinding_key,
|
|
|
|
sizeof (blinding_key));
|
|
|
|
|
|
|
|
nreserves = pool_size / COINS_PER_RESERVE;
|
2016-06-15 19:24:48 +02:00
|
|
|
if (COINS_PER_RESERVE * nreserves < pool_size)
|
|
|
|
nreserves++;
|
2016-06-15 16:36:17 +02:00
|
|
|
reserves = GNUNET_new_array (nreserves,
|
|
|
|
struct Reserve);
|
|
|
|
ncoins = COINS_PER_RESERVE * nreserves;
|
|
|
|
coins = GNUNET_new_array (ncoins,
|
|
|
|
struct Coin);
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int i=0;i < nreserves;i++)
|
2016-06-15 16:45:29 +02:00
|
|
|
{
|
|
|
|
struct Reserve *r = &reserves[i];
|
2016-06-15 16:36:17 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
r->reserve_index = i;
|
|
|
|
GNUNET_CONTAINER_DLL_insert (empty_reserve_head,
|
|
|
|
empty_reserve_tail,
|
|
|
|
r);
|
2017-10-06 22:13:05 +02:00
|
|
|
for (unsigned int j=0; j < COINS_PER_RESERVE; j++)
|
2016-06-15 16:45:29 +02:00
|
|
|
{
|
|
|
|
struct Coin *coin;
|
|
|
|
unsigned int coin_index;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 16:45:29 +02:00
|
|
|
coin_index = i * COINS_PER_RESERVE + j;
|
|
|
|
coin = &coins[coin_index];
|
|
|
|
coin->coin_index = coin_index;
|
|
|
|
coin->reserve_index = i;
|
2016-06-15 17:54:36 +02:00
|
|
|
invalidate_coin (coin);
|
2016-06-15 16:45:29 +02:00
|
|
|
}
|
|
|
|
}
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-05-30 18:45:57 +02:00
|
|
|
ctx = GNUNET_CURL_init (&GNUNET_CURL_gnunet_scheduler_reschedule,
|
|
|
|
&rc);
|
|
|
|
GNUNET_assert (NULL != ctx);
|
|
|
|
rc = GNUNET_CURL_gnunet_rc_create (ctx);
|
2016-06-15 15:09:57 +02:00
|
|
|
GNUNET_assert (NULL != rc);
|
2016-05-30 18:45:57 +02:00
|
|
|
exchange = TALER_EXCHANGE_connect (ctx,
|
2016-06-15 15:41:17 +02:00
|
|
|
exchange_uri,
|
2016-05-30 18:45:57 +02:00
|
|
|
&cert_cb, NULL,
|
|
|
|
TALER_EXCHANGE_OPTION_END);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (NULL == exchange)
|
|
|
|
{
|
|
|
|
fail ("Failed to connect to the exchange!");
|
2016-09-23 16:52:13 +02:00
|
|
|
return;
|
2016-06-15 15:09:57 +02:00
|
|
|
}
|
2016-05-30 17:16:01 +02:00
|
|
|
}
|
|
|
|
|
2016-06-06 23:53:54 +02:00
|
|
|
|
2016-05-30 15:08:12 +02:00
|
|
|
int
|
|
|
|
main (int argc,
|
|
|
|
char * const *argv)
|
|
|
|
{
|
2016-06-08 16:12:31 +02:00
|
|
|
struct GNUNET_OS_Process *proc;
|
|
|
|
unsigned int cnt;
|
2016-05-30 17:16:01 +02:00
|
|
|
const struct GNUNET_GETOPT_CommandLineOption options[] = {
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_flag ('a',
|
2017-05-04 20:19:49 +02:00
|
|
|
"automate",
|
|
|
|
"Initialize and start the bank and exchange",
|
|
|
|
&run_exchange),
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_mandatory
|
|
|
|
(GNUNET_GETOPT_option_cfgfile (&config_file)),
|
|
|
|
GNUNET_GETOPT_option_string ('e',
|
2017-03-15 12:01:06 +01:00
|
|
|
"exchange-uri",
|
|
|
|
"URI",
|
|
|
|
"URI of the exchange",
|
|
|
|
&exchange_uri),
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_string ('E',
|
2017-03-15 12:01:06 +01:00
|
|
|
"exchange-admin-uri",
|
|
|
|
"URI",
|
|
|
|
"URI of the administrative interface of the exchange",
|
|
|
|
&exchange_admin_uri),
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_help ("tool to benchmark the Taler exchange"),
|
|
|
|
GNUNET_GETOPT_option_uint ('s',
|
2017-05-04 20:19:49 +02:00
|
|
|
"pool-size",
|
|
|
|
"SIZE",
|
|
|
|
"How many coins this benchmark should instantiate",
|
|
|
|
&pool_size),
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_uint ('l',
|
2017-05-04 20:19:49 +02:00
|
|
|
"limit",
|
|
|
|
"LIMIT",
|
|
|
|
"Terminate the benchmark after LIMIT operations",
|
|
|
|
&num_iterations),
|
2017-03-25 21:22:22 +01:00
|
|
|
GNUNET_GETOPT_option_verbose (&be_verbose),
|
2016-06-15 16:04:29 +02:00
|
|
|
GNUNET_GETOPT_OPTION_END
|
2016-06-15 15:09:57 +02:00
|
|
|
};
|
2016-06-15 18:19:40 +02:00
|
|
|
int ret;
|
2016-05-30 17:16:01 +02:00
|
|
|
|
2016-06-15 15:41:17 +02:00
|
|
|
GNUNET_log_setup ("taler-exchange-benchmark",
|
|
|
|
"WARNING",
|
|
|
|
NULL);
|
2016-06-15 19:24:48 +02:00
|
|
|
GNUNET_assert (INVALID_COIN_SLACK >= REFRESH_SLOTS_NEEDED);
|
|
|
|
GNUNET_assert (COIN_VALUE <= (1LL << REFRESH_SLOTS_NEEDED));
|
2016-06-15 18:19:40 +02:00
|
|
|
ret = GNUNET_GETOPT_run ("taler-exchange-benchmark",
|
|
|
|
options, argc, argv);
|
|
|
|
GNUNET_assert (GNUNET_SYSERR != ret);
|
|
|
|
if (GNUNET_NO == ret)
|
|
|
|
return 0;
|
2016-06-15 20:09:09 +02:00
|
|
|
if ( (0 != num_iterations) &&
|
|
|
|
(WARM_THRESHOLD >= num_iterations) )
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Number of iterations below WARM_THRESHOLD of %llu\n",
|
|
|
|
WARM_THRESHOLD);
|
2016-06-15 16:45:29 +02:00
|
|
|
if ( (NULL == exchange_uri) ||
|
|
|
|
(0 == strlen (exchange_uri) ))
|
|
|
|
{
|
|
|
|
GNUNET_free_non_null (exchange_uri);
|
2016-06-15 15:41:17 +02:00
|
|
|
exchange_uri = GNUNET_strdup ("http://localhost:8081/");
|
2016-06-15 16:45:29 +02:00
|
|
|
}
|
2016-06-15 16:04:29 +02:00
|
|
|
if (NULL == exchange_admin_uri)
|
|
|
|
exchange_admin_uri = GNUNET_strdup ("http://localhost:18080/");
|
2016-06-15 15:09:57 +02:00
|
|
|
if (run_exchange)
|
2016-06-08 16:12:31 +02:00
|
|
|
{
|
2016-06-15 15:41:17 +02:00
|
|
|
char *wget;
|
2016-09-23 16:52:13 +02:00
|
|
|
|
2016-06-15 15:09:57 +02:00
|
|
|
proc = GNUNET_OS_start_process (GNUNET_NO,
|
|
|
|
GNUNET_OS_INHERIT_STD_ALL,
|
|
|
|
NULL, NULL, NULL,
|
|
|
|
"taler-exchange-keyup",
|
|
|
|
"taler-exchange-keyup",
|
2016-06-15 16:45:29 +02:00
|
|
|
"-c", config_file,
|
2016-06-15 15:09:57 +02:00
|
|
|
NULL);
|
|
|
|
if (NULL == proc)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"Failed to run taler-exchange-keyup. Check your PATH.\n");
|
|
|
|
return 77;
|
|
|
|
}
|
|
|
|
GNUNET_OS_process_wait (proc);
|
|
|
|
GNUNET_OS_process_destroy (proc);
|
|
|
|
|
|
|
|
proc = GNUNET_OS_start_process (GNUNET_NO,
|
|
|
|
GNUNET_OS_INHERIT_STD_ALL,
|
|
|
|
NULL, NULL, NULL,
|
|
|
|
"taler-exchange-dbinit",
|
|
|
|
"taler-exchange-dbinit",
|
|
|
|
"-r",
|
2016-06-15 16:45:29 +02:00
|
|
|
"-c", config_file,
|
2016-06-15 15:09:57 +02:00
|
|
|
NULL);
|
|
|
|
if (NULL == proc)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"Failed to run taler-exchange-dbinit. Check your PATH.\n");
|
|
|
|
return 77;
|
|
|
|
}
|
|
|
|
GNUNET_OS_process_wait (proc);
|
|
|
|
GNUNET_OS_process_destroy (proc);
|
|
|
|
|
|
|
|
exchanged = GNUNET_OS_start_process (GNUNET_NO,
|
|
|
|
GNUNET_OS_INHERIT_STD_ALL,
|
|
|
|
NULL, NULL, NULL,
|
|
|
|
"taler-exchange-httpd",
|
|
|
|
"taler-exchange-httpd",
|
2016-06-15 16:45:29 +02:00
|
|
|
"-c", config_file,
|
2016-06-15 15:09:57 +02:00
|
|
|
NULL);
|
|
|
|
if (NULL == exchanged)
|
2016-06-08 16:12:31 +02:00
|
|
|
{
|
2016-06-15 15:09:57 +02:00
|
|
|
fprintf (stderr,
|
|
|
|
"Failed to run taler-exchange-httpd. Check your PATH.\n");
|
|
|
|
return 77;
|
|
|
|
}
|
2016-06-15 15:41:17 +02:00
|
|
|
|
|
|
|
GNUNET_asprintf (&wget,
|
2016-06-15 16:45:29 +02:00
|
|
|
"wget -q -t 1 -T 1 %s%skeys -o /dev/null -O /dev/null",
|
|
|
|
exchange_uri,
|
|
|
|
(exchange_uri[strlen (exchange_uri)-1] == '/') ? "" : "/");
|
2016-06-15 15:09:57 +02:00
|
|
|
cnt = 0;
|
|
|
|
do {
|
2016-06-08 16:12:31 +02:00
|
|
|
fprintf (stderr, ".");
|
|
|
|
sleep (1);
|
|
|
|
cnt++;
|
|
|
|
if (cnt > 60)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"\nFailed to start taler-exchange-httpd\n");
|
|
|
|
GNUNET_OS_process_kill (exchanged,
|
|
|
|
SIGKILL);
|
|
|
|
GNUNET_OS_process_wait (exchanged);
|
|
|
|
GNUNET_OS_process_destroy (exchanged);
|
|
|
|
return 77;
|
|
|
|
}
|
|
|
|
}
|
2016-06-15 15:41:17 +02:00
|
|
|
while (0 != system (wget));
|
|
|
|
GNUNET_free (wget);
|
2016-06-15 15:09:57 +02:00
|
|
|
fprintf (stderr, "\n");
|
|
|
|
}
|
2017-03-15 12:01:06 +01:00
|
|
|
GNUNET_SCHEDULER_run (&run,
|
|
|
|
NULL);
|
2016-06-15 15:09:57 +02:00
|
|
|
if (run_exchange)
|
|
|
|
{
|
|
|
|
GNUNET_OS_process_kill (exchanged,
|
|
|
|
SIGTERM);
|
|
|
|
GNUNET_OS_process_wait (exchanged);
|
|
|
|
GNUNET_OS_process_destroy (exchanged);
|
|
|
|
}
|
|
|
|
return 0;
|
2016-05-30 15:08:12 +02:00
|
|
|
}
|
2016-06-15 15:41:17 +02:00
|
|
|
|
|
|
|
/* end of taler-exchange-benchmark.c */
|