implementing TALER_refresh_link_encrypted_encode, and adding test

This commit is contained in:
Christian Grothoff 2015-04-18 13:08:19 +02:00
parent e61b83495e
commit e226e5c350
3 changed files with 87 additions and 1 deletions

View File

@ -544,6 +544,17 @@ TALER_refresh_link_encrypted_decode (const char *buf,
size_t buf_len); size_t buf_len);
/* FIXME: should also have _encode API... */ /**
* Encode encrypted refresh link information to buffer.
*
* @param rle refresh link to encode
* @param[out] buf_len set number of bytes returned
* @return NULL on error, otherwise buffer with encoded @a rle
*/
char *
TALER_refresh_link_encrypted_encode (const struct TALER_RefreshLinkEncrypted *rle,
size_t *buf_len);
#endif #endif

View File

@ -292,6 +292,11 @@ TALER_refresh_link_encrypted_decode (const char *buf,
if (buf_len < sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey)) if (buf_len < sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))
return NULL; return NULL;
if (buf_len >= GNUNET_MAX_MALLOC_CHECKED)
{
GNUNET_break (0);
return NULL;
}
rle = GNUNET_malloc (sizeof (struct TALER_RefreshLinkEncrypted) + rle = GNUNET_malloc (sizeof (struct TALER_RefreshLinkEncrypted) +
buf_len - sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey)); buf_len - sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey));
rle->blinding_key_enc = (const char *) &rle[1]; rle->blinding_key_enc = (const char *) &rle[1];
@ -303,6 +308,33 @@ TALER_refresh_link_encrypted_decode (const char *buf,
} }
/**
* Encode encrypted refresh link information to buffer.
*
* @param rle refresh link to encode
* @param[out] buf_len set number of bytes returned
* @return NULL on error, otherwise buffer with encoded @a rle
*/
char *
TALER_refresh_link_encrypted_encode (const struct TALER_RefreshLinkEncrypted *rle,
size_t *buf_len)
{
char *buf;
if (rle->blinding_key_enc_size >= GNUNET_MAX_MALLOC_CHECKED - sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))
{
GNUNET_break (0);
return NULL;
}
*buf_len = sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey) + rle->blinding_key_enc_size;
buf = GNUNET_malloc (*buf_len);
memcpy (buf,
rle->coin_priv_enc,
*buf_len);
return buf;
}
/** /**
* Check if a coin is valid; that is, whether the denomination key exists, * Check if a coin is valid; that is, whether the denomination key exists,
* is not expired, and the signature is correct. * is not expired, and the signature is correct.

View File

@ -24,6 +24,11 @@
#include "taler_crypto_lib.h" #include "taler_crypto_lib.h"
/**
* Test low-level link encryption/decryption APIs.
*
* @return 0 on success
*/
static int static int
test_basics () test_basics ()
{ {
@ -77,6 +82,42 @@ test_basics ()
} }
/**
* Test #TALER_refresh_link_encrypted_decode().
*
* @return 0 on success
*/
static int
test_rled ()
{
struct TALER_RefreshLinkEncrypted *rle;
char buf[512];
char *buf2;
size_t buf_len = sizeof (buf);
memset (buf, 42, sizeof (buf));
rle = TALER_refresh_link_encrypted_decode (buf,
buf_len);
GNUNET_assert (NULL != rle);
buf_len = 42;
buf2 = TALER_refresh_link_encrypted_encode (rle,
&buf_len);
GNUNET_assert (NULL != buf2);
GNUNET_assert (buf_len == sizeof (buf));
GNUNET_assert (0 == memcmp (buf,
buf2,
buf_len));
GNUNET_free (rle);
GNUNET_free (buf2);
return 0;
}
/**
* Test high-level link encryption/decryption API.
*
* @return 0 on success
*/
static int static int
test_high_level () test_high_level ()
{ {
@ -131,6 +172,8 @@ main(int argc,
{ {
if (0 != test_basics ()) if (0 != test_basics ())
return 1; return 1;
if (0 != test_rled ())
return 1;
if (0 != test_high_level ()) if (0 != test_high_level ())
return 1; return 1;
return 0; return 0;