/* This file is part of TALER Copyright (C) 2014 GNUnet e. V. (and other contributing authors) TALER is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with TALER; see the file COPYING. If not, If not, see */ /** * @file exchangedb/test_exchangedb_keyio.c * @brief test cases for some functions in exchangedb/exchangedb_keyio.c * @author Sree Harsha Totakura */ #include "platform.h" #include "gnunet/gnunet_util_lib.h" #include "taler_signatures.h" #include "taler_exchangedb_lib.h" #define RSA_KEY_SIZE 1024 #define EXITIF(cond) \ do { \ if (cond) { GNUNET_break (0); goto EXITIF_exit; } \ } while (0) /** * @brief Iterator called on denomination key. * * @param cls closure with expected DKI * @param dki the denomination key * @param alias coin alias * @return #GNUNET_OK to continue to iterate, * #GNUNET_NO to stop iteration with no error, * #GNUNET_SYSERR to abort iteration with error! */ static int dki_iter (void *cls, const char *alias, const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *dki) { const struct TALER_EXCHANGEDB_DenominationKeyIssueInformation *exp = cls; if (0 != memcmp (&exp->issue, &dki->issue, sizeof (struct TALER_EXCHANGEDB_DenominationKeyInformationP))) { GNUNET_break (0); return GNUNET_SYSERR; } if (0 != GNUNET_CRYPTO_rsa_private_key_cmp (exp->denom_priv.rsa_private_key, dki->denom_priv.rsa_private_key)) { GNUNET_break (0); return GNUNET_SYSERR; } if (0 != GNUNET_CRYPTO_rsa_public_key_cmp (exp->denom_pub.rsa_public_key, dki->denom_pub.rsa_public_key)) { GNUNET_break (0); return GNUNET_SYSERR; } return GNUNET_OK; } int main (int argc, const char *const argv[]) { struct TALER_EXCHANGEDB_DenominationKeyIssueInformation dki; char *enc; size_t enc_size; struct TALER_EXCHANGEDB_DenominationKeyIssueInformation dki_read; char *enc_read; size_t enc_read_size; char *tmpfile; int ret; ret = 1; enc = NULL; enc_read = NULL; tmpfile = NULL; dki.denom_priv.rsa_private_key = NULL; dki_read.denom_priv.rsa_private_key = NULL; GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &dki.issue.signature, sizeof (struct TALER_MasterSignatureP)); dki.denom_priv.rsa_private_key = GNUNET_CRYPTO_rsa_private_key_create (RSA_KEY_SIZE); enc_size = GNUNET_CRYPTO_rsa_private_key_encode (dki.denom_priv.rsa_private_key, &enc); EXITIF (NULL == (tmpfile = GNUNET_DISK_mktemp ("test_exchange_common"))); EXITIF (GNUNET_OK != TALER_EXCHANGEDB_denomination_key_write (tmpfile, &dki)); EXITIF (GNUNET_OK != TALER_EXCHANGEDB_denomination_key_read (tmpfile, &dki_read)); EXITIF (1 != TALER_EXCHANGEDB_denomination_keys_iterate (tmpfile, &dki_iter, &dki)); enc_read_size = GNUNET_CRYPTO_rsa_private_key_encode (dki_read.denom_priv.rsa_private_key, &enc_read); EXITIF (enc_size != enc_read_size); EXITIF (0 != memcmp (enc, enc_read, enc_size)); ret = 0; EXITIF_exit: GNUNET_free_non_null (enc); if (NULL != tmpfile) { (void) unlink (tmpfile); GNUNET_free (tmpfile); } GNUNET_free_non_null (enc_read); if (NULL != dki.denom_priv.rsa_private_key) GNUNET_CRYPTO_rsa_private_key_free (dki.denom_priv.rsa_private_key); if (NULL != dki_read.denom_priv.rsa_private_key) GNUNET_CRYPTO_rsa_private_key_free (dki_read.denom_priv.rsa_private_key); return ret; }