aboutsummaryrefslogtreecommitdiff
path: root/src/exchange/taler-exchange-httpd_refresh_reveal.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/exchange/taler-exchange-httpd_refresh_reveal.c')
-rw-r--r--src/exchange/taler-exchange-httpd_refresh_reveal.c20
1 files changed, 0 insertions, 20 deletions
diff --git a/src/exchange/taler-exchange-httpd_refresh_reveal.c b/src/exchange/taler-exchange-httpd_refresh_reveal.c
index a84e5dea7..8746ba5d0 100644
--- a/src/exchange/taler-exchange-httpd_refresh_reveal.c
+++ b/src/exchange/taler-exchange-httpd_refresh_reveal.c
@@ -273,20 +273,6 @@ refresh_reveal_preflight (void *cls,
273 273
274 274
275/** 275/**
276 * Helper function for #refresh_reveal_transaction() to free internal
277 * state of @a refresh_melt (but not the pointer itself!).
278 *
279 * @param refresh_melt memory to clean up
280 */
281static void
282free_refresh_melt (struct TALER_EXCHANGEDB_RefreshMelt *refresh_melt)
283{
284 GNUNET_CRYPTO_rsa_signature_free (
285 refresh_melt->session.coin.denom_sig.rsa_signature);
286}
287
288
289/**
290 * Execute a "/refresh/reveal". The client is revealing to us the 276 * Execute a "/refresh/reveal". The client is revealing to us the
291 * transfer keys for @a #TALER_CNC_KAPPA-1 sets of coins. Verify that the 277 * transfer keys for @a #TALER_CNC_KAPPA-1 sets of coins. Verify that the
292 * revealed transfer keys would allow linkage to the blinded coins. 278 * revealed transfer keys would allow linkage to the blinded coins.
@@ -335,8 +321,6 @@ refresh_reveal_transaction (void *cls,
335 GNUNET_break (0); 321 GNUNET_break (0);
336 *mhd_ret = TEH_RESPONSE_reply_internal_db_error (connection, 322 *mhd_ret = TEH_RESPONSE_reply_internal_db_error (connection,
337 TALER_EC_REFRESH_REVEAL_DB_FETCH_SESSION_ERROR); 323 TALER_EC_REFRESH_REVEAL_DB_FETCH_SESSION_ERROR);
338 if (refresh_melt.session.noreveal_index >= TALER_CNC_KAPPA)
339 free_refresh_melt (&refresh_melt);
340 return GNUNET_DB_STATUS_HARD_ERROR; 324 return GNUNET_DB_STATUS_HARD_ERROR;
341 } 325 }
342 326
@@ -424,7 +408,6 @@ refresh_reveal_transaction (void *cls,
424 GNUNET_break_op (0); 408 GNUNET_break_op (0);
425 *mhd_ret = reply_refresh_reveal_missmatch (connection, 409 *mhd_ret = reply_refresh_reveal_missmatch (connection,
426 &rc_expected); 410 &rc_expected);
427 free_refresh_melt (&refresh_melt);
428 return GNUNET_DB_STATUS_HARD_ERROR; 411 return GNUNET_DB_STATUS_HARD_ERROR;
429 } 412 }
430 } /* end of checking "rc_expected" */ 413 } /* end of checking "rc_expected" */
@@ -457,7 +440,6 @@ refresh_reveal_transaction (void *cls,
457 *mhd_ret = TEH_RESPONSE_reply_internal_error (connection, 440 *mhd_ret = TEH_RESPONSE_reply_internal_error (connection,
458 TALER_EC_REFRESH_REVEAL_COST_CALCULATION_OVERFLOW, 441 TALER_EC_REFRESH_REVEAL_COST_CALCULATION_OVERFLOW,
459 "failed to add up refresh costs"); 442 "failed to add up refresh costs");
460 free_refresh_melt (&refresh_melt);
461 return GNUNET_DB_STATUS_HARD_ERROR; 443 return GNUNET_DB_STATUS_HARD_ERROR;
462 } 444 }
463 } 445 }
@@ -468,11 +450,9 @@ refresh_reveal_transaction (void *cls,
468 *mhd_ret = TEH_RESPONSE_reply_external_error (connection, 450 *mhd_ret = TEH_RESPONSE_reply_external_error (connection,
469 TALER_EC_REFRESH_REVEAL_AMOUNT_INSUFFICIENT, 451 TALER_EC_REFRESH_REVEAL_AMOUNT_INSUFFICIENT,
470 "melted coin value is insufficient to cover cost of operation"); 452 "melted coin value is insufficient to cover cost of operation");
471 free_refresh_melt (&refresh_melt);
472 return GNUNET_DB_STATUS_HARD_ERROR; 453 return GNUNET_DB_STATUS_HARD_ERROR;
473 } 454 }
474 } 455 }
475 free_refresh_melt (&refresh_melt);
476 return GNUNET_DB_STATUS_SUCCESS_NO_RESULTS; 456 return GNUNET_DB_STATUS_SUCCESS_NO_RESULTS;
477} 457}
478 458