forked from pEp.foundation/pEpEngine
ENGINE-619: add test case
parent
2e934f3706
commit
9e7a1109cd
@ -0,0 +1,467 @@
|
||||
#include <stdlib.h>
|
||||
#include <string>
|
||||
#include <cstring>
|
||||
|
||||
#include "internal_format.h"
|
||||
|
||||
#include "TestUtilities.h"
|
||||
#include "TestConstants.h"
|
||||
#include "Engine.h"
|
||||
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
|
||||
namespace {
|
||||
|
||||
//The fixture for Engine619Test
|
||||
class Engine619Test : public ::testing::Test {
|
||||
public:
|
||||
Engine* engine;
|
||||
PEP_SESSION session;
|
||||
|
||||
protected:
|
||||
// You can remove any or all of the following functions if its body
|
||||
// is empty.
|
||||
Engine619Test() {
|
||||
// You can do set-up work for each test here.
|
||||
test_suite_name = ::testing::UnitTest::GetInstance()->current_test_info()->GTEST_SUITE_SYM();
|
||||
test_name = ::testing::UnitTest::GetInstance()->current_test_info()->name();
|
||||
test_path = get_main_test_home_dir() + "/" + test_suite_name + "/" + test_name;
|
||||
std::cout << "QQQQ " << get_main_test_home_dir() << "," << test_suite_name << "," << test_name << "\n";
|
||||
}
|
||||
|
||||
~Engine619Test() override {
|
||||
// You can do clean-up work that doesn't throw exceptions here.
|
||||
}
|
||||
|
||||
// If the constructor and destructor are not enough for setting up
|
||||
// and cleaning up each test, you can define the following methods:
|
||||
|
||||
void SetUp() override {
|
||||
// Code here will be called immediately after the constructor (right
|
||||
// before each test).
|
||||
|
||||
// Leave this empty if there are no files to copy to the home directory path
|
||||
std::vector<std::pair<std::string, std::string>> init_files = std::vector<std::pair<std::string, std::string>>();
|
||||
|
||||
// Get a new test Engine.
|
||||
engine = new Engine(test_path);
|
||||
ASSERT_NOTNULL(engine);
|
||||
|
||||
// Ok, let's initialize test directories etc.
|
||||
engine->prep(NULL, NULL, NULL, init_files);
|
||||
|
||||
// Ok, try to start this bugger.
|
||||
engine->start();
|
||||
ASSERT_NOTNULL(engine->session);
|
||||
session = engine->session;
|
||||
|
||||
// Engine is up. Keep on truckin'
|
||||
}
|
||||
|
||||
void TearDown() override {
|
||||
// Code here will be called immediately after each test (right
|
||||
// before the destructor).
|
||||
engine->shut_down();
|
||||
delete engine;
|
||||
engine = NULL;
|
||||
session = NULL;
|
||||
}
|
||||
|
||||
private:
|
||||
const char* test_suite_name;
|
||||
const char* test_name;
|
||||
string test_path;
|
||||
// Objects declared here can be used by all tests in the Engine619Test suite.
|
||||
|
||||
};
|
||||
|
||||
} // namespace
|
||||
|
||||
// TEST_F(Engine619Test, check_internal_format) {
|
||||
// const char *data = "simulated data";
|
||||
// size_t data_size = strlen(data) + 1;
|
||||
|
||||
// char *code;
|
||||
// size_t code_size;
|
||||
|
||||
// // test PGP keys
|
||||
|
||||
// PEP_STATUS status = encode_internal(data, data_size, "application/pgp-keys", &code, &code_size);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(code_size, data_size + 4);
|
||||
|
||||
// ASSERT_EQ(code[0], 0);
|
||||
// ASSERT_EQ(code[1], 'K');
|
||||
// ASSERT_EQ(code[2], 2);
|
||||
|
||||
// ASSERT_STREQ(code + 4, data);
|
||||
|
||||
// // decode
|
||||
|
||||
// char *value;
|
||||
// size_t size;
|
||||
// char *mime_type;
|
||||
|
||||
// status = decode_internal(code, code_size, &value, &size, &mime_type);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(size, data_size);
|
||||
// ASSERT_STREQ(value, data);
|
||||
// ASSERT_STREQ(mime_type, "application/pgp-keys");
|
||||
|
||||
// free(value);
|
||||
// free(code);
|
||||
|
||||
// // test Sync
|
||||
|
||||
// status = encode_internal(data, data_size, "application/pEp.sync", &code, &code_size);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(code_size, data_size + 4);
|
||||
|
||||
// ASSERT_EQ(code[0], 0);
|
||||
// ASSERT_EQ(code[1], 'S');
|
||||
// ASSERT_EQ(code[2], 0);
|
||||
|
||||
// ASSERT_STREQ(code + 4, data);
|
||||
|
||||
// // decode
|
||||
|
||||
// status = decode_internal(code, code_size, &value, &size, &mime_type);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(size, data_size);
|
||||
// ASSERT_STREQ(value, data);
|
||||
// ASSERT_STREQ(mime_type, "application/pEp.sync");
|
||||
|
||||
// free(value);
|
||||
// free(code);
|
||||
|
||||
// // test Distribution
|
||||
|
||||
// status = encode_internal(data, data_size, "application/pEp.distribution", &code, &code_size);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(code_size, data_size + 4);
|
||||
|
||||
// ASSERT_EQ(code[0], 0);
|
||||
// ASSERT_EQ(code[1], 'D');
|
||||
// ASSERT_EQ(code[2], 0);
|
||||
|
||||
// ASSERT_STREQ(code + 4, data);
|
||||
|
||||
// // decode
|
||||
|
||||
// status = decode_internal(code, code_size, &value, &size, &mime_type);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(size, data_size);
|
||||
// ASSERT_STREQ(value, data);
|
||||
// ASSERT_STREQ(mime_type, "application/pEp.distribution");
|
||||
|
||||
// free(value);
|
||||
// free(code);
|
||||
|
||||
// // test PGP signature
|
||||
|
||||
// status = encode_internal(data, data_size, "application/pgp-signature", &code, &code_size);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(code_size, data_size + 4);
|
||||
|
||||
// ASSERT_EQ(code[0], 0);
|
||||
// ASSERT_EQ(code[1], 'A');
|
||||
// ASSERT_EQ(code[2], 2);
|
||||
|
||||
// ASSERT_STREQ(code + 4, data);
|
||||
|
||||
// // decode
|
||||
|
||||
// status = decode_internal(code, code_size, &value, &size, &mime_type);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
|
||||
// ASSERT_EQ(size, data_size);
|
||||
// ASSERT_STREQ(value, data);
|
||||
// ASSERT_STREQ(mime_type, "application/pgp-signature");
|
||||
|
||||
// free(value);
|
||||
// free(code);
|
||||
// }
|
||||
|
||||
// TEST_F(Engine619Test, check_encrypt_decrypt_message) {
|
||||
// // a message from me, Alice, to Bob
|
||||
|
||||
// const char* alice_fpr = "4ABE3AAF59AC32CFE4F86500A9411D176FF00E97";
|
||||
// const char* bob_fpr = "BFCDB7F301DEEEBBF947F29659BFF488C9C2EE39";
|
||||
// PEP_STATUS status = read_file_and_import_key(session,
|
||||
// "test_keys/pub/pep-test-alice-0x6FF00E97_pub.asc");
|
||||
// ASSERT_EQ(status , PEP_KEY_IMPORTED);
|
||||
// status = set_up_ident_from_scratch(session,
|
||||
// "test_keys/priv/pep-test-alice-0x6FF00E97_priv.asc",
|
||||
// "pep.test.alice@pep-project.org", alice_fpr,
|
||||
// PEP_OWN_USERID, "Alice in Wonderland", NULL, true
|
||||
// );
|
||||
// ASSERT_OK;
|
||||
// ASSERT_TRUE(slurp_and_import_key(session, "test_keys/pub/pep-test-bob-0xC9C2EE39_pub.asc"));
|
||||
|
||||
// message* msg = new_message(PEP_dir_outgoing);
|
||||
// pEp_identity* alice = new_identity("pep.test.alice@pep-project.org", NULL, PEP_OWN_USERID, NULL);
|
||||
// pEp_identity* bob = new_identity("pep.test.bob@pep-project.org", NULL, "Bob", NULL);
|
||||
// status = myself(session, alice);
|
||||
// ASSERT_OK;
|
||||
// status = update_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// bob->fpr = strdup(bob_fpr);
|
||||
// status = set_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// status = update_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// status = set_as_pEp_user(session, bob);
|
||||
// ASSERT_OK;
|
||||
|
||||
// msg->to = new_identity_list(bob);
|
||||
// msg->from = alice;
|
||||
// msg->shortmsg = strdup("Yo Bob!");
|
||||
// msg->longmsg = strdup("Look at my hot new sender fpr field!");
|
||||
|
||||
// // Volker: This is a sloppy way to test - it got processed as a real distribution message because data has meaning
|
||||
// // and happily exposed a bug in your generation code, but... well, you know better :)
|
||||
// const char *distribution = "simulation of distribution data";
|
||||
// msg->attachments = new_bloblist(strdup(distribution), strlen(distribution)
|
||||
// + 1, "application/pEp.distribution", "distribution.pEp");
|
||||
|
||||
// // encrypt this message inline
|
||||
|
||||
// message* enc_msg = NULL;
|
||||
// status = encrypt_message(session, msg, NULL, &enc_msg, PEP_enc_inline, 0);
|
||||
// ASSERT_OK;
|
||||
|
||||
// // .shortmsg will stay unencrypted
|
||||
// ASSERT_STREQ(msg->shortmsg, enc_msg->shortmsg);
|
||||
|
||||
// // .longmsg will go encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(enc_msg->longmsg));
|
||||
|
||||
// ASSERT_TRUE(enc_msg->attachments);
|
||||
// ASSERT_TRUE(enc_msg->attachments->value);
|
||||
|
||||
// bloblist_t *ad = enc_msg->attachments;
|
||||
|
||||
// // distribution message is encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(ad->value));
|
||||
// ASSERT_STREQ(ad->mime_type, "application/octet-stream");
|
||||
// ASSERT_STREQ(ad->filename, "distribution.pEp.pgp");
|
||||
|
||||
// // next attachment
|
||||
// ASSERT_TRUE(ad->next);
|
||||
// ad = ad->next;
|
||||
|
||||
// // attached key is encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(ad->value));
|
||||
// ASSERT_STREQ(ad->mime_type, "application/octet-stream");
|
||||
// // ASSERT_STREQ(ad->filename, "file://pEpkey.asc.pgp");
|
||||
// // As of ENGINE-633:
|
||||
// ASSERT_STREQ(ad->filename, "file://sender_key.asc.pgp");
|
||||
// // decrypt this message
|
||||
|
||||
// message *dec_msg = NULL;
|
||||
// stringlist_t *keylist = NULL;
|
||||
// PEP_rating rating;
|
||||
// PEP_decrypt_flags_t flags = 0;
|
||||
|
||||
// status = decrypt_message(session, enc_msg, &dec_msg, &keylist, &rating, &flags);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
// ASSERT_STREQ(dec_msg->shortmsg, enc_msg->shortmsg);
|
||||
// ASSERT_STREQ(msg->longmsg, dec_msg->longmsg);
|
||||
|
||||
// // check attachments
|
||||
// ASSERT_TRUE(dec_msg->attachments);
|
||||
// ASSERT_TRUE(dec_msg->attachments->value);
|
||||
// bloblist_t *as = dec_msg->attachments;
|
||||
// bloblist_t *bl = msg->attachments;
|
||||
|
||||
// ASSERT_STREQ(as->filename, "file://distribution.pEp");
|
||||
// // the MIME will be derived from filename
|
||||
// ASSERT_STREQ(as->mime_type, "application/pEp.distribution");
|
||||
|
||||
// free_message(msg);
|
||||
// free_message(enc_msg);
|
||||
// free_message(dec_msg);
|
||||
// }
|
||||
|
||||
// TEST_F(Engine619Test, check_encrypt_decrypt_message_elevated) {
|
||||
// // a message from me, Alice, to Bob
|
||||
|
||||
// const char* alice_fpr = "4ABE3AAF59AC32CFE4F86500A9411D176FF00E97";
|
||||
// const char* bob_fpr = "BFCDB7F301DEEEBBF947F29659BFF488C9C2EE39";
|
||||
// PEP_STATUS status = read_file_and_import_key(session,
|
||||
// "test_keys/pub/pep-test-alice-0x6FF00E97_pub.asc");
|
||||
// ASSERT_EQ(status , PEP_KEY_IMPORTED);
|
||||
// status = set_up_ident_from_scratch(session,
|
||||
// "test_keys/priv/pep-test-alice-0x6FF00E97_priv.asc",
|
||||
// "pep.test.alice@pep-project.org", alice_fpr,
|
||||
// PEP_OWN_USERID, "Alice in Wonderland", NULL, true
|
||||
// );
|
||||
// ASSERT_OK;
|
||||
// ASSERT_TRUE(slurp_and_import_key(session, "test_keys/pub/pep-test-bob-0xC9C2EE39_pub.asc"));
|
||||
|
||||
// message* msg = new_message(PEP_dir_outgoing);
|
||||
// pEp_identity* alice = new_identity("pep.test.alice@pep-project.org", NULL, PEP_OWN_USERID, NULL);
|
||||
// pEp_identity* bob = new_identity("pep.test.bob@pep-project.org", NULL, "Bob", NULL);
|
||||
// status = myself(session, alice);
|
||||
// ASSERT_OK;
|
||||
// status = update_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// bob->fpr = strdup(bob_fpr);
|
||||
// status = set_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// status = update_identity(session, bob);
|
||||
// ASSERT_OK;
|
||||
// status = set_as_pEp_user(session, bob);
|
||||
// ASSERT_OK;
|
||||
|
||||
// msg->to = new_identity_list(bob);
|
||||
// msg->from = alice;
|
||||
// msg->shortmsg = strdup("Yo Bob!");
|
||||
// msg->longmsg = strdup("Look at my hot new sender fpr field!");
|
||||
|
||||
// const char *distribution = "simulation of distribution data";
|
||||
// msg->attachments = new_bloblist(strdup(distribution), strlen(distribution)
|
||||
// + 1, "application/pEp.distribution", "distribution.pEp");
|
||||
|
||||
// // encrypt this message inline
|
||||
|
||||
// message* enc_msg = NULL;
|
||||
// status = encrypt_message(session, msg, NULL, &enc_msg, PEP_enc_inline_EA, 0);
|
||||
// ASSERT_OK;
|
||||
|
||||
// // .longmsg will go encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(enc_msg->longmsg));
|
||||
|
||||
// ASSERT_TRUE(enc_msg->attachments);
|
||||
// ASSERT_TRUE(enc_msg->attachments->value);
|
||||
|
||||
// bloblist_t *ad = enc_msg->attachments;
|
||||
|
||||
// // distribution message is encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(ad->value));
|
||||
// ASSERT_STREQ(ad->mime_type, "application/octet-stream");
|
||||
// ASSERT_STREQ(ad->filename, "distribution.pEp.pgp");
|
||||
|
||||
// // next attachment
|
||||
// ASSERT_TRUE(ad->next);
|
||||
// ad = ad->next;
|
||||
|
||||
// // attached key is encrypted
|
||||
// ASSERT_TRUE(is_PGP_message_text(ad->value));
|
||||
// ASSERT_STREQ(ad->mime_type, "application/octet-stream");
|
||||
// // ASSERT_STREQ(ad->filename, "file://pEpkey.asc.pgp");
|
||||
// // As of ENGINE-633:
|
||||
// ASSERT_STREQ(ad->filename, "file://sender_key.asc.pgp");
|
||||
// // decrypt this message
|
||||
|
||||
// char *ct = strdup(ad->value);
|
||||
|
||||
// {
|
||||
// // test if this is an elevated attachment
|
||||
|
||||
// char *pt;
|
||||
// size_t pt_size;
|
||||
// stringlist_t *keylist;
|
||||
|
||||
// // decrypt this part
|
||||
|
||||
// status = decrypt_and_verify(session, ct, strlen(ct) + 1, NULL, 0, &pt, &pt_size, &keylist, NULL);
|
||||
// ASSERT_EQ(status, PEP_DECRYPTED_AND_VERIFIED);
|
||||
|
||||
// // decode internal message format
|
||||
|
||||
// char *dt;
|
||||
// size_t dt_size;
|
||||
// char *mime_type;
|
||||
// status = decode_internal(pt, pt_size, &dt, &dt_size, &mime_type);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
// ASSERT_TRUE(dt);
|
||||
// ASSERT_STREQ(mime_type, "application/pgp-keys");
|
||||
|
||||
// free(pt);
|
||||
// free(dt);
|
||||
// free(mime_type);
|
||||
// free_stringlist(keylist);
|
||||
// }
|
||||
|
||||
// // create artificial message for Key like a transport would do
|
||||
|
||||
// message *art_msg = new_message(PEP_dir_incoming);
|
||||
// art_msg->enc_format = PEP_enc_inline_EA;
|
||||
// art_msg->from = identity_dup(enc_msg->to->ident);
|
||||
// art_msg->to = new_identity_list(identity_dup(enc_msg->from));
|
||||
// art_msg->longmsg = ct;
|
||||
|
||||
// // decrypt this message
|
||||
|
||||
// message *dec_msg = NULL;
|
||||
// stringlist_t *keylist = NULL;
|
||||
// PEP_rating rating;
|
||||
// PEP_decrypt_flags_t flags = 0;
|
||||
|
||||
// status = decrypt_message(session, art_msg, &dec_msg, &keylist, &rating, &flags);
|
||||
// ASSERT_EQ(status, PEP_STATUS_OK);
|
||||
// ASSERT_TRUE(dec_msg);
|
||||
// // today the engine is sucking keys in
|
||||
// // ASSERT_STREQ(dec_msg->attachments->mime_type, "application/pgp-keys");
|
||||
// ASSERT_STREQ(dec_msg->shortmsg, "pEp");
|
||||
|
||||
// stringpair_list_t *of;
|
||||
// bool pEp_auto_consume_found = false;
|
||||
// for (of = dec_msg->opt_fields; of && of->value; of = of->next) {
|
||||
// if (strcasecmp(of->value->key, "pEp-auto-consume") == 0) {
|
||||
// ASSERT_STREQ(of->value->value, "yes");
|
||||
// pEp_auto_consume_found = true;
|
||||
// break;
|
||||
// }
|
||||
// }
|
||||
// ASSERT_TRUE(pEp_auto_consume_found);
|
||||
|
||||
// free_message(msg);
|
||||
// free_message(enc_msg);
|
||||
// free_message(dec_msg);
|
||||
// free_message(art_msg);
|
||||
// }
|
||||
|
||||
TEST_F(Engine619Test, decrypt_message_with_private_key) {
|
||||
PEP_STATUS status = PEP_STATUS_OK;
|
||||
message *message_src
|
||||
= slurp_message_file_into_struct("test_mails/ExtraKeyPrivateKeyAttached.eml");
|
||||
ASSERT_NOTNULL (message_src);
|
||||
|
||||
message *message_dst;
|
||||
stringlist_t* keys = NULL;
|
||||
PEP_rating rating;
|
||||
PEP_decrypt_flags_t flags = 0;
|
||||
|
||||
status = decrypt_message(session, message_src, & message_dst,
|
||||
& keys, & rating, & flags);
|
||||
/* It is normal and expected that decryption fails here: this message is
|
||||
unencrypted. The point of this test is to arrive at a call to
|
||||
pgp_import_keydata , which used to corrut the heap (ENGINE-619). */
|
||||
ASSERT_EQ (status, PEP_UNENCRYPTED);
|
||||
|
||||
/* Check that the message content matches what we expect. */
|
||||
ASSERT_NOTNULL (message_src->shortmsg);
|
||||
ASSERT_NOTNULL (message_src->longmsg);
|
||||
ASSERT_NULL (message_src->longmsg_formatted);
|
||||
|
||||
/* The message has exactly one attachment, the private key. */
|
||||
bloblist_t *attachments = message_src->attachments;
|
||||
ASSERT_NOTNULL (attachments);
|
||||
ASSERT_NULL (attachments->next);
|
||||
|
||||
/* We can even print it. */
|
||||
std::cerr << "THE FIRST ATTACHMENT HAS SIZE " << attachments->size << "\n";
|
||||
std::cerr << "THE FIRST ATTACHMENT IS:\n";
|
||||
std::cerr << attachments->value;
|
||||
std::cerr << "\n";
|
||||
}
|
Loading…
Reference in New Issue