//! Stress some functions for testing; if used as a lib, this file is obsolete. use std::collections::HashSet; use std::ffi::CString; use mmime::mailimf_types::*; use tempfile::{tempdir, TempDir}; use deltachat::constants::*; use deltachat::context::*; use deltachat::dc_array::*; use deltachat::dc_configure::*; use deltachat::dc_imex::*; use deltachat::dc_location::*; use deltachat::dc_lot::*; use deltachat::dc_mimeparser::*; use deltachat::dc_qr::*; use deltachat::dc_saxparser::*; use deltachat::dc_securejoin::*; use deltachat::dc_tools::*; use deltachat::key::*; use deltachat::keyring::*; use deltachat::oauth2::*; use deltachat::pgp::*; use deltachat::types::*; use deltachat::x::*; use libc; /* some data used for testing ******************************************************************************/ /* S_EM_SETUPFILE is a AES-256 symm. encrypted setup message created by Enigmail with an "encrypted session key", see RFC 4880. The code is in S_EM_SETUPCODE */ static mut S_EM_SETUPCODE: *const libc::c_char = b"1742-0185-6197-1303-7016-8412-3581-4441-0597\x00" as *const u8 as *const libc::c_char; static mut S_EM_SETUPFILE: *const libc::c_char = b"-----BEGIN PGP MESSAGE-----\nPassphrase-Format: numeric9x4\nPassphrase-Begin: 17\n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\nmngm1QCMMw2v/j8=\n=9sJE\n-----END PGP MESSAGE-----\n\x00" as *const u8 as *const libc::c_char; unsafe fn stress_functions(context: &Context) { let mut saxparser: dc_saxparser_t = dc_saxparser_t { starttag_cb: None, endtag_cb: None, text_cb: None, userdata: 0 as *mut libc::c_void, }; dc_saxparser_init(&mut saxparser, 0 as *mut libc::c_void); dc_saxparser_parse( &mut saxparser, b" 55 && strncmp( qr, b"OPENPGP4FPR:\x00" as *const u8 as *const libc::c_char, 12, ) == 0i32 && strncmp( &mut *qr.offset(52isize), b"#a=\x00" as *const u8 as *const libc::c_char, 3, ) == 0i32) ); let mut res: *mut dc_lot_t = dc_check_qr(context, qr); assert!(res.is_null()); assert!(!((*res).state == 200i32 || (*res).state == 220i32 || (*res).state == 230i32)); dc_lot_unref(res); free(qr as *mut libc::c_void); res = dc_check_qr(context, b"BEGIN:VCARD\nVERSION:3.0\nN:Last;First\nEMAIL;TYPE=INTERNET:stress@test.local\nEND:VCARD\x00" as *const u8 as *const libc::c_char); assert!(res.is_null()); assert!(!((*res).state == 320i32)); assert!(!((*res).id != 0i32 as libc::c_uint)); dc_lot_unref(res); }; } #[test] #[ignore] // is too expensive fn test_encryption_decryption() { unsafe { let mut bad_data: [libc::c_uchar; 4096] = [0; 4096]; let mut i_0: libc::c_int = 0i32; while i_0 < 4096i32 { bad_data[i_0 as usize] = (i_0 & 0xffi32) as libc::c_uchar; i_0 += 1 } let mut j: libc::c_int = 0i32; while j < 4096 / 40 { let bad_key = Key::from_binary( &mut *bad_data.as_mut_ptr().offset(j as isize) as *const u8, 4096 / 2 + j, if 0 != j & 1 { KeyType::Public } else { KeyType::Private }, ); assert!(bad_key.is_none()); j += 1 } let (public_key, private_key) = dc_pgp_create_keypair(b"foo@bar.de\x00" as *const u8 as *const libc::c_char).unwrap(); private_key.split_key().unwrap(); let (public_key2, private_key2) = dc_pgp_create_keypair(b"two@zwo.de\x00" as *const u8 as *const libc::c_char).unwrap(); assert_ne!(public_key, public_key2); let original_text: *const libc::c_char = b"This is a test\x00" as *const u8 as *const libc::c_char; let mut keyring = Keyring::default(); keyring.add_owned(public_key.clone()); keyring.add_ref(&public_key2); let ctext = dc_pgp_pk_encrypt( original_text as *const libc::c_void, strlen(original_text), &keyring, Some(&private_key), ) .unwrap(); assert!(!ctext.is_empty()); assert!(ctext.starts_with("-----BEGIN PGP MESSAGE-----")); let ctext_signed_bytes = ctext.len(); let ctext_signed = CString::new(ctext).unwrap(); let ctext = dc_pgp_pk_encrypt( original_text as *const libc::c_void, strlen(original_text), &keyring, None, ) .unwrap(); assert!(!ctext.is_empty()); assert!(ctext.starts_with("-----BEGIN PGP MESSAGE-----")); let ctext_unsigned_bytes = ctext.len(); let ctext_unsigned = CString::new(ctext).unwrap(); let mut keyring = Keyring::default(); keyring.add_owned(private_key); let mut public_keyring = Keyring::default(); public_keyring.add_ref(&public_key); let mut public_keyring2 = Keyring::default(); public_keyring2.add_owned(public_key2.clone()); let mut valid_signatures: HashSet = Default::default(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_ptr() as *const _, ctext_signed_bytes, &keyring, &public_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); assert_eq!(valid_signatures.len(), 1); valid_signatures.clear(); let empty_keyring = Keyring::default(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_ptr() as *const _, ctext_signed_bytes, &keyring, &empty_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); assert_eq!(valid_signatures.len(), 0); valid_signatures.clear(); let plain = dc_pgp_pk_decrypt( ctext_signed.as_ptr() as *const _, ctext_signed_bytes, &keyring, &public_keyring2, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); assert_eq!(valid_signatures.len(), 0); valid_signatures.clear(); public_keyring2.add_ref(&public_key); let plain = dc_pgp_pk_decrypt( ctext_signed.as_ptr() as *const _, ctext_signed_bytes, &keyring, &public_keyring2, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); assert_eq!(valid_signatures.len(), 1); valid_signatures.clear(); let plain = dc_pgp_pk_decrypt( ctext_unsigned.as_ptr() as *const _, ctext_unsigned_bytes, &keyring, &public_keyring, Some(&mut valid_signatures), ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); valid_signatures.clear(); let mut keyring = Keyring::default(); keyring.add_ref(&private_key2); let mut public_keyring = Keyring::default(); public_keyring.add_ref(&public_key); let plain = dc_pgp_pk_decrypt( ctext_signed.as_ptr() as *const _, ctext_signed_bytes, &keyring, &public_keyring, None, ) .unwrap(); assert_eq!(std::str::from_utf8(&plain).unwrap(), as_str(original_text),); } } unsafe extern "C" fn cb( _context: &Context, _event: Event, _data1: uintptr_t, _data2: uintptr_t, ) -> uintptr_t { 0 } #[allow(dead_code)] struct TestContext { ctx: Context, dir: TempDir, } unsafe fn create_test_context() -> TestContext { let mut ctx = dc_context_new(Some(cb), std::ptr::null_mut(), std::ptr::null_mut()); let dir = tempdir().unwrap(); let dbfile = CString::new(dir.path().join("db.sqlite").to_str().unwrap()).unwrap(); assert_eq!( dc_open(&mut ctx, dbfile.as_ptr(), std::ptr::null()), 1, "Failed to open {}", as_str(dbfile.as_ptr() as *const libc::c_char) ); TestContext { ctx: ctx, dir: dir } } #[test] fn test_dc_kml_parse() { unsafe { let context = create_test_context(); let xml: *const libc::c_char = b"\n\n\n2019-03-06T21:09:57Z9.423110,53.790302\n\n \n\t2018-12-13T22:11:12Z\t 19.423110 \t , \n 63.790302\n \n\n\x00" as *const u8 as *const libc::c_char; let kml: *mut dc_kml_t = dc_kml_parse(&context.ctx, xml, strlen(xml)); assert!(!(*kml).addr.is_null()); assert_eq!( as_str((*kml).addr as *const libc::c_char), "user@example.org", ); assert_eq!(dc_array_get_cnt((*kml).locations), 2); assert!(dc_array_get_latitude((*kml).locations, 0) > 53.6f64); assert!(dc_array_get_latitude((*kml).locations, 0) < 53.8f64); assert!(dc_array_get_longitude((*kml).locations, 0) > 9.3f64); assert!(dc_array_get_longitude((*kml).locations, 0) < 9.5f64); assert!(dc_array_get_accuracy((*kml).locations, 0) > 31.9f64); assert!(dc_array_get_accuracy((*kml).locations, 0) < 32.1f64); assert_eq!(dc_array_get_timestamp((*kml).locations, 0), 1551906597); assert!(dc_array_get_latitude((*kml).locations, 1) > 63.6f64); assert!(dc_array_get_latitude((*kml).locations, 1) < 63.8f64); assert!(dc_array_get_longitude((*kml).locations, 1) > 19.3f64); assert!(dc_array_get_longitude((*kml).locations, 1) < 19.5f64); assert!(dc_array_get_accuracy((*kml).locations, 1) > 2.4f64); assert!(dc_array_get_accuracy((*kml).locations, 1) < 2.6f64); assert_eq!(dc_array_get_timestamp((*kml).locations, 1), 1544739072); dc_kml_unref(kml); } } #[test] fn test_dc_mimeparser_with_context() { unsafe { let context = create_test_context(); let mut mimeparser = dc_mimeparser_new(&context.ctx); let raw: *const libc::c_char = b"Content-Type: multipart/mixed; boundary=\"==break==\";\nSubject: outer-subject\nX-Special-A: special-a\nFoo: Bar\nChat-Version: 0.0\n\n--==break==\nContent-Type: text/plain; protected-headers=\"v1\";\nSubject: inner-subject\nX-Special-B: special-b\nFoo: Xy\nChat-Version: 1.0\n\ntest1\n\n--==break==--\n\n\x00" as *const u8 as *const libc::c_char; dc_mimeparser_parse(&mut mimeparser, raw, strlen(raw)); assert_eq!( as_str(mimeparser.subject as *const libc::c_char), "inner-subject", ); let mut of: *mut mailimf_optional_field = dc_mimeparser_lookup_optional_field( &mimeparser, b"X-Special-A\x00" as *const u8 as *const libc::c_char, ); assert_eq!(as_str((*of).fld_value as *const libc::c_char), "special-a",); of = dc_mimeparser_lookup_optional_field( &mimeparser, b"Foo\x00" as *const u8 as *const libc::c_char, ); assert_eq!(as_str((*of).fld_value as *const libc::c_char), "Bar",); of = dc_mimeparser_lookup_optional_field( &mimeparser, b"Chat-Version\x00" as *const u8 as *const libc::c_char, ); assert_eq!(as_str((*of).fld_value as *const libc::c_char), "1.0",); assert_eq!(carray_count(mimeparser.parts), 1); dc_mimeparser_unref(&mut mimeparser); } } #[test] fn test_dc_get_oauth2_url() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let redirect_uri = "chat.delta:/com.b44t.messenger"; let res = dc_get_oauth2_url(&ctx.ctx, addr, redirect_uri); assert_eq!(res, Some("https://accounts.google.com/o/oauth2/auth?client_id=959970109878-4mvtgf6feshskf7695nfln6002mom908.apps.googleusercontent.com&redirect_uri=chat.delta:/com.b44t.messenger&response_type=code&scope=https%3A%2F%2Fmail.google.com%2F%20email&access_type=offline".into())); } #[test] fn test_dc_get_oauth2_addr() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let code = "fail"; let res = dc_get_oauth2_addr(&ctx.ctx, addr, code); // this should fail as it is an invalid password assert_eq!(res, None); } #[test] fn test_dc_get_oauth2_token() { let ctx = unsafe { create_test_context() }; let addr = "dignifiedquire@gmail.com"; let code = "fail"; let res = dc_get_oauth2_access_token(&ctx.ctx, addr, code, 0); // this should fail as it is an invalid password assert_eq!(res, None); } #[test] fn test_stress_tests() { unsafe { let context = create_test_context(); stress_functions(&context.ctx); } } #[test] fn test_arr_to_string() { let arr2: [uint32_t; 4] = [ 0i32 as uint32_t, 12i32 as uint32_t, 133i32 as uint32_t, 1999999i32 as uint32_t, ]; let str_0 = unsafe { dc_arr_to_string(arr2.as_ptr(), 4i32) }; assert_eq!(to_string(str_0), "0,12,133,1999999"); unsafe { free(str_0 as *mut _) }; }