pg_solve_mfa_challenge.c (2818B)
1 /* 2 This file is part of TALER 3 Copyright (C) 2025 Taler Systems SA 4 5 TALER is free software; you can redistribute it and/or modify it under the 6 terms of the GNU General Public License as published by the Free Software 7 Foundation; either version 3, or (at your option) any later version. 8 9 TALER is distributed in the hope that it will be useful, but WITHOUT ANY 10 WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR 11 A PARTICULAR PURPOSE. See the GNU General Public License for more details. 12 13 You should have received a copy of the GNU General Public License along with 14 TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/> 15 */ 16 /** 17 * @file backenddb/pg_solve_mfa_challenge.c 18 * @brief Implementation of the solve_mfa_challenge function for Postgres 19 * @author Christian Grothoff 20 */ 21 #include "platform.h" 22 #include <taler/taler_error_codes.h> 23 #include <taler/taler_dbevents.h> 24 #include <taler/taler_pq_lib.h> 25 #include "pg_solve_mfa_challenge.h" 26 #include "pg_helper.h" 27 28 29 enum GNUNET_DB_QueryStatus 30 TMH_PG_solve_mfa_challenge ( 31 void *cls, 32 uint64_t challenge_id, 33 const struct TALER_MERCHANT_MFA_BodyHash *h_body, 34 const char *solution, 35 bool *solved, 36 uint32_t *retry_counter) 37 { 38 struct PostgresClosure *pg = cls; 39 struct GNUNET_TIME_Absolute now = GNUNET_TIME_absolute_get (); 40 bool no_match; 41 struct GNUNET_PQ_QueryParam params[] = { 42 GNUNET_PQ_query_param_uint64 (&challenge_id), 43 GNUNET_PQ_query_param_auto_from_type (h_body), 44 GNUNET_PQ_query_param_string (solution), 45 GNUNET_PQ_query_param_absolute_time (&now), 46 GNUNET_PQ_query_param_end 47 }; 48 struct GNUNET_PQ_ResultSpec rs[] = { 49 GNUNET_PQ_result_spec_bool ("out_solved", 50 solved), 51 GNUNET_PQ_result_spec_allow_null ( 52 GNUNET_PQ_result_spec_uint32 ("out_retry_counter", 53 retry_counter), 54 &no_match), 55 GNUNET_PQ_result_spec_end 56 }; 57 enum GNUNET_DB_QueryStatus qs; 58 59 /* conservatively set security-relevant return values to 60 safe values, even though these should not be used with qs <= 0 */ 61 *solved = false; 62 *retry_counter = 0; 63 PREPARE (pg, 64 "solve_mfa_challenge", 65 "SELECT" 66 " out_solved" 67 " ,out_retry_counter" 68 " FROM merchant_do_solve_mfa_challenge" 69 " ($1, $2, $3, $4);"); 70 qs = GNUNET_PQ_eval_prepared_singleton_select (pg->conn, 71 "solve_mfa_challenge", 72 params, 73 rs); 74 if (qs <= 0) 75 return qs; 76 if (no_match) 77 { 78 GNUNET_PQ_cleanup_result (rs); 79 return GNUNET_DB_STATUS_SUCCESS_NO_RESULTS; 80 } 81 GNUNET_PQ_cleanup_result (rs); 82 return qs; 83 }