the big EC rename
This commit is contained in:
parent
db61bc3bbe
commit
744322fdda
@ -1 +1 @@
|
|||||||
Subproject commit 934a6a18301e81c4fd1b3a8cda2dc13dca4741cc
|
Subproject commit ca53235ccfa0458ebf11c204888ca370e20ec3f5
|
0
src/auditor/taler-helper-auditor-render.py
Executable file → Normal file
0
src/auditor/taler-helper-auditor-render.py
Executable file → Normal file
@ -767,7 +767,7 @@ create_denomkey_issue (
|
|||||||
GNUNET_assert (NULL != dki->denom_priv.rsa_private_key);
|
GNUNET_assert (NULL != dki->denom_priv.rsa_private_key);
|
||||||
dki->denom_pub.rsa_public_key
|
dki->denom_pub.rsa_public_key
|
||||||
= GNUNET_CRYPTO_rsa_private_key_get_public (
|
= GNUNET_CRYPTO_rsa_private_key_get_public (
|
||||||
dki->denom_priv.rsa_private_key);
|
dki->denom_priv.rsa_private_key);
|
||||||
GNUNET_CRYPTO_rsa_public_key_hash (dki->denom_pub.rsa_public_key,
|
GNUNET_CRYPTO_rsa_public_key_hash (dki->denom_pub.rsa_public_key,
|
||||||
&dki->issue.properties.denom_hash);
|
&dki->issue.properties.denom_hash);
|
||||||
dki->issue.properties.master = master_public_key;
|
dki->issue.properties.master = master_public_key;
|
||||||
|
@ -233,7 +233,7 @@ deposits_get_transaction (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSACTION_DB_FETCH_FAILED,
|
TALER_EC_DEPOSITS_GET_DB_FETCH_FAILED,
|
||||||
"failed to fetch transaction data");
|
"failed to fetch transaction data");
|
||||||
}
|
}
|
||||||
return qs;
|
return qs;
|
||||||
@ -242,7 +242,7 @@ deposits_get_transaction (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_NOT_FOUND,
|
MHD_HTTP_NOT_FOUND,
|
||||||
TALER_EC_TRACK_TRANSACTION_NOT_FOUND,
|
TALER_EC_DEPOSITS_GET_NOT_FOUND,
|
||||||
"transaction unknown");
|
"transaction unknown");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -288,7 +288,7 @@ handle_track_transaction_request (
|
|||||||
if (GNUNET_SYSERR == ctx.pending)
|
if (GNUNET_SYSERR == ctx.pending)
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSACTION_DB_FEE_INCONSISTENT,
|
TALER_EC_DEPOSITS_GET_DB_FEE_INCONSISTENT,
|
||||||
"fees are inconsistent");
|
"fees are inconsistent");
|
||||||
return reply_deposit_details (connection,
|
return reply_deposit_details (connection,
|
||||||
&tps->h_contract_terms,
|
&tps->h_contract_terms,
|
||||||
@ -387,7 +387,7 @@ TEH_handler_deposits_get (const struct TEH_RequestHandler *rh,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_FORBIDDEN,
|
MHD_HTTP_FORBIDDEN,
|
||||||
TALER_EC_TRACK_TRANSACTION_MERCHANT_SIGNATURE_INVALID,
|
TALER_EC_DEPOSITS_GET_MERCHANT_SIGNATURE_INVALID,
|
||||||
"merchant_sig");
|
"merchant_sig");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -164,7 +164,7 @@ link_transaction (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_NOT_FOUND,
|
MHD_HTTP_NOT_FOUND,
|
||||||
TALER_EC_REFRESH_LINK_COIN_UNKNOWN,
|
TALER_EC_LINK_COIN_UNKNOWN,
|
||||||
"coin_pub");
|
"coin_pub");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
|
@ -63,7 +63,7 @@ reply_melt_insufficient_funds (
|
|||||||
if (NULL == history)
|
if (NULL == history)
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_HISTORY_DB_ERROR_INSUFFICIENT_FUNDS,
|
TALER_EC_MELT_HISTORY_DB_ERROR_INSUFFICIENT_FUNDS,
|
||||||
"Failed to compile transaction history");
|
"Failed to compile transaction history");
|
||||||
return TALER_MHD_reply_json_pack (connection,
|
return TALER_MHD_reply_json_pack (connection,
|
||||||
MHD_HTTP_CONFLICT,
|
MHD_HTTP_CONFLICT,
|
||||||
@ -72,7 +72,7 @@ reply_melt_insufficient_funds (
|
|||||||
"insufficient funds",
|
"insufficient funds",
|
||||||
"code",
|
"code",
|
||||||
(json_int_t)
|
(json_int_t)
|
||||||
TALER_EC_REFRESH_MELT_INSUFFICIENT_FUNDS,
|
TALER_EC_MELT_INSUFFICIENT_FUNDS,
|
||||||
"coin_pub",
|
"coin_pub",
|
||||||
GNUNET_JSON_from_data_auto (coin_pub),
|
GNUNET_JSON_from_data_auto (coin_pub),
|
||||||
"original_value",
|
"original_value",
|
||||||
@ -195,7 +195,7 @@ refresh_check_melt (struct MHD_Connection *connection,
|
|||||||
if (GNUNET_DB_STATUS_HARD_ERROR == qs)
|
if (GNUNET_DB_STATUS_HARD_ERROR == qs)
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_DB_FETCH_ERROR,
|
TALER_EC_MELT_DB_FETCH_ERROR,
|
||||||
"failed to fetch old coin history");
|
"failed to fetch old coin history");
|
||||||
return qs;
|
return qs;
|
||||||
}
|
}
|
||||||
@ -222,7 +222,7 @@ refresh_check_melt (struct MHD_Connection *connection,
|
|||||||
tl);
|
tl);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_MELT_COIN_EXPIRED_NO_ZOMBIE,
|
TALER_EC_MELT_COIN_EXPIRED_NO_ZOMBIE,
|
||||||
"denomination expired");
|
"denomination expired");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -237,7 +237,7 @@ refresh_check_melt (struct MHD_Connection *connection,
|
|||||||
tl);
|
tl);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_COIN_HISTORY_COMPUTATION_FAILED,
|
TALER_EC_MELT_COIN_HISTORY_COMPUTATION_FAILED,
|
||||||
"failed to compute coin transaction history");
|
"failed to compute coin transaction history");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -323,7 +323,7 @@ melt_transaction (void *cls,
|
|||||||
if (GNUNET_DB_STATUS_HARD_ERROR == qs)
|
if (GNUNET_DB_STATUS_HARD_ERROR == qs)
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_DB_FETCH_ERROR,
|
TALER_EC_MELT_DB_FETCH_ERROR,
|
||||||
"failed to fetch melt index");
|
"failed to fetch melt index");
|
||||||
return qs;
|
return qs;
|
||||||
}
|
}
|
||||||
@ -349,7 +349,7 @@ melt_transaction (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_DB_STORE_SESSION_ERROR,
|
TALER_EC_MELT_DB_STORE_SESSION_ERROR,
|
||||||
"failed to persist melt data");
|
"failed to persist melt data");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -398,7 +398,7 @@ handle_melt (struct MHD_Connection *connection,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_FORBIDDEN,
|
MHD_HTTP_FORBIDDEN,
|
||||||
TALER_EC_REFRESH_MELT_COIN_SIGNATURE_INVALID,
|
TALER_EC_MELT_COIN_SIGNATURE_INVALID,
|
||||||
"confirm_sig");
|
"confirm_sig");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -491,7 +491,7 @@ check_for_denomination_key (struct MHD_Connection *connection,
|
|||||||
GNUNET_break (GNUNET_DB_STATUS_SOFT_ERROR != qs);
|
GNUNET_break (GNUNET_DB_STATUS_SOFT_ERROR != qs);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_MELT_DB_FETCH_ERROR,
|
TALER_EC_MELT_DB_FETCH_ERROR,
|
||||||
"failed to find information about old coin");
|
"failed to find information about old coin");
|
||||||
}
|
}
|
||||||
/* sanity check */
|
/* sanity check */
|
||||||
@ -561,7 +561,7 @@ check_for_denomination_key (struct MHD_Connection *connection,
|
|||||||
TEH_KS_release (key_state);
|
TEH_KS_release (key_state);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_FORBIDDEN,
|
MHD_HTTP_FORBIDDEN,
|
||||||
TALER_EC_REFRESH_MELT_DENOMINATION_SIGNATURE_INVALID,
|
TALER_EC_MELT_DENOMINATION_SIGNATURE_INVALID,
|
||||||
"denom_sig");
|
"denom_sig");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -593,7 +593,7 @@ check_for_denomination_key (struct MHD_Connection *connection,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_MELT_FEES_EXCEED_CONTRIBUTION,
|
TALER_EC_MELT_FEES_EXCEED_CONTRIBUTION,
|
||||||
"melt amount smaller than melting fee");
|
"melt amount smaller than melting fee");
|
||||||
}
|
}
|
||||||
return handle_melt (connection,
|
return handle_melt (connection,
|
||||||
|
@ -256,7 +256,7 @@ refreshes_reveal_preflight (void *cls,
|
|||||||
GNUNET_break (qs);
|
GNUNET_break (qs);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_DB_FETCH_REVEAL_ERROR,
|
TALER_EC_REVEAL_DB_FETCH_REVEAL_ERROR,
|
||||||
"failed to fetch reveal data");
|
"failed to fetch reveal data");
|
||||||
rctx->preflight_ok = GNUNET_SYSERR;
|
rctx->preflight_ok = GNUNET_SYSERR;
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
@ -308,7 +308,7 @@ refreshes_reveal_transaction (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_NOT_FOUND,
|
MHD_HTTP_NOT_FOUND,
|
||||||
TALER_EC_REFRESH_REVEAL_SESSION_UNKNOWN,
|
TALER_EC_REVEAL_SESSION_UNKNOWN,
|
||||||
"rc");
|
"rc");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -320,7 +320,7 @@ refreshes_reveal_transaction (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_DB_FETCH_SESSION_ERROR,
|
TALER_EC_REVEAL_DB_FETCH_SESSION_ERROR,
|
||||||
"failed to fetch valid challenge from database");
|
"failed to fetch valid challenge from database");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -413,7 +413,7 @@ refreshes_reveal_transaction (void *cls,
|
|||||||
"hint", "commitment violation",
|
"hint", "commitment violation",
|
||||||
"code",
|
"code",
|
||||||
(json_int_t)
|
(json_int_t)
|
||||||
TALER_EC_REFRESH_REVEAL_COMMITMENT_VIOLATION,
|
TALER_EC_REVEAL_COMMITMENT_VIOLATION,
|
||||||
"rc_expected",
|
"rc_expected",
|
||||||
GNUNET_JSON_from_data_auto (
|
GNUNET_JSON_from_data_auto (
|
||||||
&rc_expected));
|
&rc_expected));
|
||||||
@ -448,7 +448,7 @@ refreshes_reveal_transaction (void *cls,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_COST_CALCULATION_OVERFLOW,
|
TALER_EC_REVEAL_COST_CALCULATION_OVERFLOW,
|
||||||
"failed to add up refresh costs");
|
"failed to add up refresh costs");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -459,7 +459,7 @@ refreshes_reveal_transaction (void *cls,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_AMOUNT_INSUFFICIENT,
|
TALER_EC_REVEAL_AMOUNT_INSUFFICIENT,
|
||||||
"melted coin value is insufficient to cover cost of operation");
|
"melted coin value is insufficient to cover cost of operation");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -514,7 +514,7 @@ refreshes_reveal_persist (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_DB_COMMIT_ERROR,
|
TALER_EC_REVEAL_DB_COMMIT_ERROR,
|
||||||
"failed to persist reveal data");
|
"failed to persist reveal data");
|
||||||
}
|
}
|
||||||
return qs;
|
return qs;
|
||||||
@ -626,13 +626,13 @@ resolve_refreshes_reveal_denominations (struct TEH_KS_StateHandle *key_state,
|
|||||||
case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS:
|
case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS:
|
||||||
res = TALER_MHD_reply_with_error (connection,
|
res = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_NOT_FOUND,
|
MHD_HTTP_NOT_FOUND,
|
||||||
TALER_EC_REFRESH_REVEAL_SESSION_UNKNOWN,
|
TALER_EC_REVEAL_SESSION_UNKNOWN,
|
||||||
"rc");
|
"rc");
|
||||||
break;
|
break;
|
||||||
case GNUNET_DB_STATUS_HARD_ERROR:
|
case GNUNET_DB_STATUS_HARD_ERROR:
|
||||||
res = TALER_MHD_reply_with_error (connection,
|
res = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_DB_FETCH_SESSION_ERROR,
|
TALER_EC_REVEAL_DB_FETCH_SESSION_ERROR,
|
||||||
"failed to fetch session data");
|
"failed to fetch session data");
|
||||||
break;
|
break;
|
||||||
case GNUNET_DB_STATUS_SOFT_ERROR:
|
case GNUNET_DB_STATUS_SOFT_ERROR:
|
||||||
@ -685,7 +685,7 @@ resolve_refreshes_reveal_denominations (struct TEH_KS_StateHandle *key_state,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
res = TALER_MHD_reply_with_error (connection,
|
res = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_FORBIDDEN,
|
MHD_HTTP_FORBIDDEN,
|
||||||
TALER_EC_REFRESH_REVEAL_LINK_SIGNATURE_INVALID,
|
TALER_EC_REVEAL_LINK_SIGNATURE_INVALID,
|
||||||
"link_sig");
|
"link_sig");
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
@ -704,15 +704,15 @@ resolve_refreshes_reveal_denominations (struct TEH_KS_StateHandle *key_state,
|
|||||||
{
|
{
|
||||||
rctx->ev_sigs[i].rsa_signature
|
rctx->ev_sigs[i].rsa_signature
|
||||||
= GNUNET_CRYPTO_rsa_sign_blinded (
|
= GNUNET_CRYPTO_rsa_sign_blinded (
|
||||||
rctx->dkis[i]->denom_priv.rsa_private_key,
|
rctx->dkis[i]->denom_priv.rsa_private_key,
|
||||||
rctx->rcds[i].coin_ev,
|
rctx->rcds[i].coin_ev,
|
||||||
rctx->rcds[i].coin_ev_size);
|
rctx->rcds[i].coin_ev_size);
|
||||||
if (NULL == rctx->ev_sigs[i].rsa_signature)
|
if (NULL == rctx->ev_sigs[i].rsa_signature)
|
||||||
{
|
{
|
||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
res = TALER_MHD_reply_with_error (connection,
|
res = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_SIGNING_ERROR,
|
TALER_EC_REVEAL_SIGNING_ERROR,
|
||||||
"internal signing error");
|
"internal signing error");
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
@ -827,7 +827,7 @@ handle_refreshes_reveal_json (struct MHD_Connection *connection,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_REVEAL_NEW_DENOMS_ARRAY_SIZE_EXCESSIVE,
|
TALER_EC_REVEAL_NEW_DENOMS_ARRAY_SIZE_EXCESSIVE,
|
||||||
"new_denoms_h");
|
"new_denoms_h");
|
||||||
|
|
||||||
}
|
}
|
||||||
@ -837,7 +837,7 @@ handle_refreshes_reveal_json (struct MHD_Connection *connection,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_REVEAL_NEW_DENOMS_ARRAY_SIZE_MISSMATCH,
|
TALER_EC_REVEAL_NEW_DENOMS_ARRAY_SIZE_MISSMATCH,
|
||||||
"new_denoms/coin_evs");
|
"new_denoms/coin_evs");
|
||||||
}
|
}
|
||||||
if (json_array_size (new_denoms_h_json) !=
|
if (json_array_size (new_denoms_h_json) !=
|
||||||
@ -846,7 +846,7 @@ handle_refreshes_reveal_json (struct MHD_Connection *connection,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_REVEAL_NEW_DENOMS_ARRAY_SIZE_MISSMATCH,
|
TALER_EC_REVEAL_NEW_DENOMS_ARRAY_SIZE_MISSMATCH,
|
||||||
"new_denoms/link_sigs");
|
"new_denoms/link_sigs");
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -878,7 +878,7 @@ handle_refreshes_reveal_json (struct MHD_Connection *connection,
|
|||||||
TALER_LOG_ERROR ("Lacking keys to operate\n");
|
TALER_LOG_ERROR ("Lacking keys to operate\n");
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_REFRESH_REVEAL_KEYS_MISSING,
|
TALER_EC_REVEAL_KEYS_MISSING,
|
||||||
"exchange lacks keys");
|
"exchange lacks keys");
|
||||||
}
|
}
|
||||||
ret = resolve_refreshes_reveal_denominations (key_state,
|
ret = resolve_refreshes_reveal_denominations (key_state,
|
||||||
@ -941,7 +941,7 @@ TEH_handler_reveal (const struct TEH_RequestHandler *rh,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESHES_INVALID_RCH,
|
TALER_EC_REVEAL_INVALID_RCH,
|
||||||
"refresh commitment hash malformed");
|
"refresh commitment hash malformed");
|
||||||
}
|
}
|
||||||
if (0 != strcmp (args[1],
|
if (0 != strcmp (args[1],
|
||||||
@ -975,7 +975,7 @@ TEH_handler_reveal (const struct TEH_RequestHandler *rh,
|
|||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
return TALER_MHD_reply_with_error (connection,
|
return TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_BAD_REQUEST,
|
MHD_HTTP_BAD_REQUEST,
|
||||||
TALER_EC_REFRESH_REVEAL_CNC_TRANSFER_ARRAY_SIZE_INVALID,
|
TALER_EC_REVEAL_CNC_TRANSFER_ARRAY_SIZE_INVALID,
|
||||||
"transfer_privs");
|
"transfer_privs");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -445,7 +445,7 @@ get_transfer_deposits (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSFER_DB_FETCH_FAILED,
|
TALER_EC_TRANSFERS_GET_DB_FETCH_FAILED,
|
||||||
"failed to fetch transaction data");
|
"failed to fetch transaction data");
|
||||||
}
|
}
|
||||||
return qs;
|
return qs;
|
||||||
@ -455,7 +455,7 @@ get_transfer_deposits (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSFER_DB_INCONSISTENT,
|
TALER_EC_TRANSFERS_GET_DB_INCONSISTENT,
|
||||||
"exchange database internally inconsistent");
|
"exchange database internally inconsistent");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -463,7 +463,7 @@ get_transfer_deposits (void *cls,
|
|||||||
{
|
{
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_NOT_FOUND,
|
MHD_HTTP_NOT_FOUND,
|
||||||
TALER_EC_TRACK_TRANSFER_WTID_NOT_FOUND,
|
TALER_EC_TRANSFERS_GET_WTID_NOT_FOUND,
|
||||||
"wtid");
|
"wtid");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
@ -484,7 +484,7 @@ get_transfer_deposits (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSFER_WIRE_FEE_NOT_FOUND,
|
TALER_EC_TRANSFERS_GET_WIRE_FEE_NOT_FOUND,
|
||||||
"did not find wire fee");
|
"did not find wire fee");
|
||||||
}
|
}
|
||||||
return qs;
|
return qs;
|
||||||
@ -497,7 +497,7 @@ get_transfer_deposits (void *cls,
|
|||||||
GNUNET_break (0);
|
GNUNET_break (0);
|
||||||
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
*mhd_ret = TALER_MHD_reply_with_error (connection,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
TALER_EC_TRACK_TRANSFER_WIRE_FEE_INCONSISTENT,
|
TALER_EC_TRANSFERS_GET_WIRE_FEE_INCONSISTENT,
|
||||||
"could not subtract wire fee");
|
"could not subtract wire fee");
|
||||||
return GNUNET_DB_STATUS_HARD_ERROR;
|
return GNUNET_DB_STATUS_HARD_ERROR;
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -1297,7 +1297,7 @@ keys_completed_cb (void *cls,
|
|||||||
for (unsigned int i = 0; i<kd_old.num_denom_keys; i++)
|
for (unsigned int i = 0; i<kd_old.num_denom_keys; i++)
|
||||||
kd.denom_keys[i].key.rsa_public_key
|
kd.denom_keys[i].key.rsa_public_key
|
||||||
= GNUNET_CRYPTO_rsa_public_key_dup (
|
= GNUNET_CRYPTO_rsa_public_key_dup (
|
||||||
kd_old.denom_keys[i].key.rsa_public_key);
|
kd_old.denom_keys[i].key.rsa_public_key);
|
||||||
|
|
||||||
kd.num_auditors = kd_old.num_auditors;
|
kd.num_auditors = kd_old.num_auditors;
|
||||||
kd.auditors = GNUNET_new_array (kd.num_auditors,
|
kd.auditors = GNUNET_new_array (kd.num_auditors,
|
||||||
|
@ -365,7 +365,7 @@ handle_link_finished (void *cls,
|
|||||||
{
|
{
|
||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
response_code = 0;
|
response_code = 0;
|
||||||
ec = TALER_EC_REFRESH_LINK_REPLY_MALFORMED;
|
ec = TALER_EC_LINK_REPLY_MALFORMED;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
GNUNET_assert (NULL == lh->link_cb);
|
GNUNET_assert (NULL == lh->link_cb);
|
||||||
|
@ -222,7 +222,7 @@ handle_refresh_reveal_finished (void *cls,
|
|||||||
if (GNUNET_OK != ret)
|
if (GNUNET_OK != ret)
|
||||||
{
|
{
|
||||||
response_code = 0;
|
response_code = 0;
|
||||||
ec = TALER_EC_REFRESH_REVEAL_REPLY_MALFORMED;
|
ec = TALER_EC_REVEAL_REPLY_MALFORMED;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
@ -275,7 +275,7 @@ handle_transfers_get_finished (void *cls,
|
|||||||
j))
|
j))
|
||||||
return;
|
return;
|
||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
ec = TALER_EC_TRACK_TRANSFER_REPLY_MALFORMED;
|
ec = TALER_EC_TRANSFERS_GET_REPLY_MALFORMED;
|
||||||
response_code = 0;
|
response_code = 0;
|
||||||
break;
|
break;
|
||||||
case MHD_HTTP_BAD_REQUEST:
|
case MHD_HTTP_BAD_REQUEST:
|
||||||
|
@ -72,7 +72,7 @@ batch_run (void *cls,
|
|||||||
}
|
}
|
||||||
bs->batch[bs->batch_ip].start_time
|
bs->batch[bs->batch_ip].start_time
|
||||||
= bs->batch[bs->batch_ip].last_req_time
|
= bs->batch[bs->batch_ip].last_req_time
|
||||||
= GNUNET_TIME_absolute_get ();
|
= GNUNET_TIME_absolute_get ();
|
||||||
bs->batch[bs->batch_ip].num_tries = 1;
|
bs->batch[bs->batch_ip].num_tries = 1;
|
||||||
bs->batch[bs->batch_ip].run (bs->batch[bs->batch_ip].cls,
|
bs->batch[bs->batch_ip].run (bs->batch[bs->batch_ip].cls,
|
||||||
&bs->batch[bs->batch_ip],
|
&bs->batch[bs->batch_ip],
|
||||||
|
@ -274,7 +274,7 @@ interpreter_run (void *cls)
|
|||||||
cmd->label);
|
cmd->label);
|
||||||
cmd->start_time
|
cmd->start_time
|
||||||
= cmd->last_req_time
|
= cmd->last_req_time
|
||||||
= GNUNET_TIME_absolute_get ();
|
= GNUNET_TIME_absolute_get ();
|
||||||
cmd->num_tries = 1;
|
cmd->num_tries = 1;
|
||||||
cmd->run (cmd->cls,
|
cmd->run (cmd->cls,
|
||||||
cmd,
|
cmd,
|
||||||
|
Loading…
Reference in New Issue
Block a user