//! Stress some functions for testing; if used as a lib, this file is obsolete. use std::collections::HashSet; use std::ptr; use tempfile::{tempdir, TempDir}; use deltachat::chat::{self, Chat}; use deltachat::config; use deltachat::constants::*; use deltachat::contact::*; use deltachat::context::*; use deltachat::dc_imex::*; use deltachat::dc_tools::*; use deltachat::keyring::*; use deltachat::oauth2::*; use deltachat::pgp::*; use deltachat::types::*; use deltachat::x::*; use libc; /* some data used for testing ******************************************************************************/ /* S_EM_SETUPFILE is a AES-256 symm. encrypted setup message created by Enigmail with an "encrypted session key", see RFC 4880. The code is in S_EM_SETUPCODE */ static mut S_EM_SETUPCODE: *const libc::c_char = b"1742-0185-6197-1303-7016-8412-3581-4441-0597\x00" as *const u8 as *const libc::c_char; static mut S_EM_SETUPFILE: *const libc::c_char = b"-----BEGIN PGP MESSAGE-----\nPassphrase-Format: numeric9x4\nPassphrase-Begin: 17\n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\nmngm1QCMMw2v/j8=\n=9sJE\n-----END PGP MESSAGE-----\n\x00" as *const u8 as *const libc::c_char; unsafe fn stress_functions(context: &Context) { if 0 != dc_is_open(context) { if dc_file_exist(context, "$BLOBDIR/foobar") || dc_file_exist(context, "$BLOBDIR/dada") || dc_file_exist(context, "$BLOBDIR/foobar.dadada") || dc_file_exist(context, "$BLOBDIR/foobar-folder") { dc_delete_file(context, "$BLOBDIR/foobar"); dc_delete_file(context, "$BLOBDIR/dada"); dc_delete_file(context, "$BLOBDIR/foobar.dadada"); dc_delete_file(context, "$BLOBDIR/foobar-folder"); } dc_write_file( context, b"$BLOBDIR/foobar\x00" as *const u8 as *const libc::c_char, b"content\x00" as *const u8 as *const libc::c_char as *const libc::c_void, 7i32 as size_t, ); assert!(dc_file_exist(context, "$BLOBDIR/foobar",)); assert!(!dc_file_exist(context, "$BLOBDIR/foobarx")); assert_eq!( dc_get_filebytes(context, "$BLOBDIR/foobar",), 7i32 as libc::c_ulonglong ); let abs_path: *mut libc::c_char = dc_mprintf( b"%s/%s\x00" as *const u8 as *const libc::c_char, context.get_blobdir(), b"foobar\x00" as *const u8 as *const libc::c_char, ); assert!(dc_is_blobdir_path(context, as_str(abs_path))); assert!(dc_is_blobdir_path(context, "$BLOBDIR/fofo",)); assert!(!dc_is_blobdir_path(context, "/BLOBDIR/fofo",)); assert!(dc_file_exist(context, as_path(abs_path))); free(abs_path as *mut libc::c_void); assert!(dc_copy_file(context, "$BLOBDIR/foobar", "$BLOBDIR/dada",)); assert_eq!(dc_get_filebytes(context, "$BLOBDIR/dada",), 7); let mut buf: *mut libc::c_void = ptr::null_mut(); let mut buf_bytes: size_t = 0; assert_eq!( dc_read_file( context, b"$BLOBDIR/dada\x00" as *const u8 as *const libc::c_char, &mut buf, &mut buf_bytes, ), 1 ); assert_eq!(buf_bytes, 7); assert_eq!( std::str::from_utf8(std::slice::from_raw_parts(buf as *const u8, buf_bytes)).unwrap(), "content" ); free(buf as *mut _); assert!(dc_delete_file(context, "$BLOBDIR/foobar")); assert!(dc_delete_file(context, "$BLOBDIR/dada")); assert!(dc_create_folder(context, "$BLOBDIR/foobar-folder")); assert!(dc_file_exist(context, "$BLOBDIR/foobar-folder",)); assert!(!dc_delete_file(context, "$BLOBDIR/foobar-folder")); let fn0: *mut libc::c_char = dc_get_fine_pathNfilename( context, b"$BLOBDIR\x00" as *const u8 as *const libc::c_char, b"foobar.dadada\x00" as *const u8 as *const libc::c_char, ); assert!(!fn0.is_null()); assert_eq!( strcmp( fn0, b"$BLOBDIR/foobar.dadada\x00" as *const u8 as *const libc::c_char, ), 0 ); dc_write_file( context, fn0, b"content\x00" as *const u8 as *const libc::c_char as *const libc::c_void, 7i32 as size_t, ); let fn1: *mut libc::c_char = dc_get_fine_pathNfilename( context, b"$BLOBDIR\x00" as *const u8 as *const libc::c_char, b"foobar.dadada\x00" as *const u8 as *const libc::c_char, ); assert!(!fn1.is_null()); assert_eq!( strcmp( fn1, b"$BLOBDIR/foobar-1.dadada\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(dc_delete_file(context, as_path(fn0))); free(fn0 as *mut libc::c_void); free(fn1 as *mut libc::c_void); } let res = context.get_config(&config::Config::SysConfigKeys).unwrap(); assert!(!res.contains(" probably_never_a_key ")); assert!(res.contains(" addr ")); assert!(res.contains(" mail_server ")); assert!(res.contains(" mail_user ")); assert!(res.contains(" mail_pw ")); assert!(res.contains(" mail_port ")); assert!(res.contains(" send_server ")); assert!(res.contains(" send_user ")); assert!(res.contains(" send_pw ")); assert!(res.contains(" send_port ")); assert!(res.contains(" server_flags ")); assert!(res.contains(" imap_folder ")); assert!(res.contains(" displayname ")); assert!(res.contains(" selfstatus ")); assert!(res.contains(" selfavatar ")); assert!(res.contains(" e2ee_enabled ")); assert!(res.contains(" mdns_enabled ")); assert!(res.contains(" save_mime_headers ")); assert!(res.contains(" configured_addr ")); assert!(res.contains(" configured_mail_server ")); assert!(res.contains(" configured_mail_user ")); assert!(res.contains(" configured_mail_pw ")); assert!(res.contains(" configured_mail_port ")); assert!(res.contains(" configured_send_server ")); assert!(res.contains(" configured_send_user ")); assert!(res.contains(" configured_send_pw ")); assert!(res.contains(" configured_send_port ")); assert!(res.contains(" configured_server_flags ")); let mut buf_0: *mut libc::c_char; let mut headerline: *const libc::c_char = ptr::null(); let mut setupcodebegin: *const libc::c_char = ptr::null(); let mut preferencrypt: *const libc::c_char = ptr::null(); let mut base64: *const libc::c_char = ptr::null(); buf_0 = strdup( b"-----BEGIN PGP MESSAGE-----\nNoVal:\n\ndata\n-----END PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ); let ok = dc_split_armored_data( buf_0, &mut headerline, &mut setupcodebegin, ptr::null_mut(), &mut base64, ); assert!(ok); assert!(!headerline.is_null()); assert_eq!( strcmp( headerline, b"-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!base64.is_null()); assert_eq!(as_str(base64 as *const libc::c_char), "data",); free(buf_0 as *mut libc::c_void); buf_0 = strdup(b"-----BEGIN PGP MESSAGE-----\n\ndat1\n-----END PGP MESSAGE-----\n-----BEGIN PGP MESSAGE-----\n\ndat2\n-----END PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char); let ok = dc_split_armored_data( buf_0, &mut headerline, &mut setupcodebegin, ptr::null_mut(), &mut base64, ); assert!(ok); assert!(!headerline.is_null()); assert_eq!( strcmp( headerline, b"-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!base64.is_null()); assert_eq!(as_str(base64 as *const libc::c_char), "dat1",); free(buf_0 as *mut libc::c_void); buf_0 = strdup( b"foo \n -----BEGIN PGP MESSAGE----- \n base64-123 \n -----END PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ); let ok = dc_split_armored_data( buf_0, &mut headerline, &mut setupcodebegin, ptr::null_mut(), &mut base64, ); assert!(ok); assert!(!headerline.is_null()); assert_eq!( strcmp( headerline, b"-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(setupcodebegin.is_null()); assert!(!base64.is_null()); assert_eq!(as_str(base64 as *const libc::c_char), "base64-123",); free(buf_0 as *mut libc::c_void); buf_0 = strdup(b"foo-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char); let ok = dc_split_armored_data( buf_0, &mut headerline, &mut setupcodebegin, ptr::null_mut(), &mut base64, ); assert!(!ok); free(buf_0 as *mut libc::c_void); buf_0 = strdup(b"foo \n -----BEGIN PGP MESSAGE-----\n Passphrase-BeGIN : 23 \n \n base64-567 \r\n abc \n -----END PGP MESSAGE-----\n\n\n\x00" as *const u8 as *const libc::c_char); let ok = dc_split_armored_data( buf_0, &mut headerline, &mut setupcodebegin, ptr::null_mut(), &mut base64, ); assert!(ok); assert!(!headerline.is_null()); assert_eq!( strcmp( headerline, b"-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!setupcodebegin.is_null()); assert_eq!( strcmp( setupcodebegin, b"23\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!base64.is_null()); assert_eq!(as_str(base64 as *const libc::c_char), "base64-567 \n abc",); free(buf_0 as *mut libc::c_void); buf_0 = strdup(b"-----BEGIN PGP PRIVATE KEY BLOCK-----\n Autocrypt-Prefer-Encrypt : mutual \n\nbase64\n-----END PGP PRIVATE KEY BLOCK-----\x00" as *const u8 as *const libc::c_char); let ok = dc_split_armored_data( buf_0, &mut headerline, ptr::null_mut(), &mut preferencrypt, &mut base64, ); assert!(ok); assert!(!headerline.is_null()); assert_eq!( strcmp( headerline, b"-----BEGIN PGP PRIVATE KEY BLOCK-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!preferencrypt.is_null()); assert_eq!( strcmp( preferencrypt, b"mutual\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(!base64.is_null()); assert_eq!(as_str(base64 as *const libc::c_char), "base64",); free(buf_0 as *mut libc::c_void); let mut norm: *mut libc::c_char = dc_normalize_setup_code( context, b"123422343234423452346234723482349234\x00" as *const u8 as *const libc::c_char, ); assert!(!norm.is_null()); assert_eq!( 0, strcmp( norm, b"1234-2234-3234-4234-5234-6234-7234-8234-9234\x00" as *const u8 as *const libc::c_char, ) ); free(norm as *mut libc::c_void); norm = dc_normalize_setup_code( context, b"\t1 2 3422343234- foo bar-- 423-45 2 34 6234723482349234 \x00" as *const u8 as *const libc::c_char, ); assert!(!norm.is_null()); assert_eq!( 0, strcmp( norm, b"1234-2234-3234-4234-5234-6234-7234-8234-9234\x00" as *const u8 as *const libc::c_char, ) ); free(norm as *mut libc::c_void); let mut buf_1: *mut libc::c_char; let mut headerline_0: *const libc::c_char = ptr::null(); let mut setupcodebegin_0: *const libc::c_char = ptr::null(); let mut preferencrypt_0: *const libc::c_char = ptr::null(); buf_1 = strdup(S_EM_SETUPFILE); assert!(dc_split_armored_data( buf_1, &mut headerline_0, &mut setupcodebegin_0, &mut preferencrypt_0, ptr::null_mut(), )); assert!(!headerline_0.is_null()); assert_eq!( 0, strcmp( headerline_0, b"-----BEGIN PGP MESSAGE-----\x00" as *const u8 as *const libc::c_char, ) ); assert!(!setupcodebegin_0.is_null()); assert!(strlen(setupcodebegin_0) < strlen(S_EM_SETUPCODE)); assert_eq!( strncmp(setupcodebegin_0, S_EM_SETUPCODE, strlen(setupcodebegin_0)), 0 ); assert!(preferencrypt_0.is_null()); free(buf_1 as *mut libc::c_void); buf_1 = dc_decrypt_setup_file(context, S_EM_SETUPCODE, S_EM_SETUPFILE); assert!(!buf_1.is_null()); assert!(dc_split_armored_data( buf_1, &mut headerline_0, &mut setupcodebegin_0, &mut preferencrypt_0, ptr::null_mut(), )); assert!(!headerline_0.is_null()); assert_eq!( strcmp( headerline_0, b"-----BEGIN PGP PRIVATE KEY BLOCK-----\x00" as *const u8 as *const libc::c_char, ), 0 ); assert!(setupcodebegin_0.is_null()); assert!(!preferencrypt_0.is_null()); assert_eq!( strcmp( preferencrypt_0, b"mutual\x00" as *const u8 as *const libc::c_char, ), 0 ); free(buf_1 as *mut libc::c_void); // Cant check, no configured context // assert!(dc_is_configured(context) != 0, "Missing configured context"); // let setupcode = dc_create_setup_code(context); // let setupcode_c = CString::yolo(setupcode.clone()); // let setupfile = dc_render_setup_file(context, &setupcode).unwrap(); // let setupfile_c = CString::yolo(setupfile); // let mut headerline_2: *const libc::c_char = ptr::null(); // let payload = dc_decrypt_setup_file(context, setupcode_c.as_ptr(), setupfile_c.as_ptr()); // assert!(payload.is_null()); // assert!(!dc_split_armored_data( // payload, // &mut headerline_2, // ptr::null_mut(), // ptr::null_mut(), // ptr::null_mut(), // )); // assert!(!headerline_2.is_null()); // assert_eq!( // strcmp( // headerline_2, // b"-----BEGIN PGP PRIVATE KEY BLOCK-----\x00" as *const u8 as *const libc::c_char, // ), // 0 // ); // free(payload as *mut libc::c_void); // Cant check, no configured context // assert!(dc_is_configured(context) != 0, "missing configured context"); // let qr = dc_get_securejoin_qr(context, 0); // assert!(!qr.is_null(), "Invalid qr code generated"); // let qr_r = as_str(qr); // assert!(qr_r.len() > 55); // assert!(qr_r.starts_with("OPENPGP4FPR:")); // let res = dc_check_qr(context, qr); // let s = res.get_state(); // assert!( // s == QrState::AskVerifyContact // || s == QrState::FprMissmatch // || s == QrState::FprWithoutAddr // ); // free(qr.cast()); } #[test] #[ignore] // is too expensive fn test_encryption_decryption() { let (public_key, private_key) = dc_pgp_create_keypair("foo@bar.de").unwrap(); private_key.split_key().unwrap(); let (public_key2, private_key2) = dc_pgp_create_keypair("two@zwo.de").unwrap(); assert_ne!(public_key, public_key2); let original_text = b"This is a test"; let mut keyring = Keyring::default(); keyring.add_owned(public_key.clone()); keyring.add_ref(&public_key2); let ctext_signed = dc_pgp_pk_encrypt(original_text, &keyring, Some(&private_key)).unwrap(); assert!(!ctext_signed.is_empty()); assert!(ctext_signed.starts_with("-----BEGIN PGP MESSAGE-----")); let ctext_unsigned = dc_pgp_pk_encrypt(original_text, &keyring, None).unwrap(); assert!(!ctext_unsigned.is_empty()); assert!(ctext_unsigned.starts_with("-----BEGIN PGP MESSAGE-----")); let mut keyring = Keyring::default(); keyring.add_owned(private_key); let mut public_keyring = Keyring::default(); public_keyring.add_ref(&public_key); let mut public_keyring2 = Keyring::default(); public_keyring2.add_owned(public_key2.clone()); let mut valid_signatures: HashSet = Default::default(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_bytes(), &keyring, &public_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(plain, original_text,); assert_eq!(valid_signatures.len(), 1); valid_signatures.clear(); let empty_keyring = Keyring::default(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_bytes(), &keyring, &empty_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(plain, original_text); assert_eq!(valid_signatures.len(), 0); valid_signatures.clear(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_bytes(), &keyring, &public_keyring2, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(plain, original_text); assert_eq!(valid_signatures.len(), 0); valid_signatures.clear(); public_keyring2.add_ref(&public_key); let plain = dc_pgp_pk_decrypt( ctext_signed.as_bytes(), &keyring, &public_keyring2, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(plain, original_text); assert_eq!(valid_signatures.len(), 1); valid_signatures.clear(); let plain = dc_pgp_pk_decrypt( ctext_unsigned.as_bytes(), &keyring, &public_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(plain, original_text); valid_signatures.clear(); let mut keyring = Keyring::default(); keyring.add_ref(&private_key2); let mut public_keyring = Keyring::default(); public_keyring.add_ref(&public_key); let plain = dc_pgp_pk_decrypt(ctext_signed.as_bytes(), &keyring, &public_keyring, None).unwrap(); assert_eq!(plain, original_text); } unsafe extern "C" fn cb( _context: &Context, _event: Event, _data1: uintptr_t, _data2: uintptr_t, ) -> uintptr_t { 0 } #[allow(dead_code)] struct TestContext { ctx: Context, dir: TempDir, } unsafe fn create_test_context() -> TestContext { let mut ctx = dc_context_new(Some(cb), std::ptr::null_mut(), None); let dir = tempdir().unwrap(); let dbfile = dir.path().join("db.sqlite"); assert!( dc_open(&mut ctx, dbfile.to_str().unwrap(), None), "Failed to open {}", dbfile.display() ); TestContext { ctx: ctx, dir: dir } } #[test] fn test_dc_get_oauth2_url() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let redirect_uri = "chat.delta:/com.b44t.messenger"; let res = dc_get_oauth2_url(&ctx.ctx, addr, redirect_uri); assert_eq!(res, Some("https://accounts.google.com/o/oauth2/auth?client_id=959970109878%2D4mvtgf6feshskf7695nfln6002mom908%2Eapps%2Egoogleusercontent%2Ecom&redirect_uri=chat%2Edelta%3A%2Fcom%2Eb44t%2Emessenger&response_type=code&scope=https%3A%2F%2Fmail.google.com%2F%20email&access_type=offline".into())); } #[test] fn test_dc_get_oauth2_addr() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let code = "fail"; let res = dc_get_oauth2_addr(&ctx.ctx, addr, code); // this should fail as it is an invalid password assert_eq!(res, None); } #[test] fn test_dc_get_oauth2_token() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let code = "fail"; let res = dc_get_oauth2_access_token(&ctx.ctx, addr, code, 0); // this should fail as it is an invalid password assert_eq!(res, None); } #[test] fn test_stress_tests() { unsafe { let context = create_test_context(); stress_functions(&context.ctx); } } #[test] fn test_get_contacts() { unsafe { let context = create_test_context(); let contacts = Contact::get_all(&context.ctx, 0, Some("some2")).unwrap(); assert_eq!(contacts.len(), 0); let id = Contact::create(&context.ctx, "bob", "bob@mail.de").unwrap(); assert_ne!(id, 0); let contacts = Contact::get_all(&context.ctx, 0, Some("bob")).unwrap(); assert_eq!(contacts.len(), 1); let contacts = Contact::get_all(&context.ctx, 0, Some("alice")).unwrap(); assert_eq!(contacts.len(), 0); } } #[test] fn test_chat() { unsafe { let context = create_test_context(); let contact1 = Contact::create(&context.ctx, "bob", "bob@mail.de").unwrap(); assert_ne!(contact1, 0); let chat_id = chat::create_by_contact_id(&context.ctx, contact1).unwrap(); assert!(chat_id > 9, "chat_id too small {}", chat_id); let chat = Chat::load_from_db(&context.ctx, chat_id).unwrap(); let chat2_id = chat::create_by_contact_id(&context.ctx, contact1).unwrap(); assert_eq!(chat2_id, chat_id); let chat2 = Chat::load_from_db(&context.ctx, chat2_id).unwrap(); assert_eq!(chat2.name, chat.name); } } #[test] fn test_wrong_db() { unsafe { let mut ctx = dc_context_new(Some(cb), std::ptr::null_mut(), None); let dir = tempdir().unwrap(); let dbfile = dir.path().join("db.sqlite"); std::fs::write(&dbfile, b"123").unwrap(); let res = dc_open(&mut ctx, dbfile.to_str().unwrap(), None); assert!(!res); } }