summaryrefslogtreecommitdiffstats
path: root/unotest/source/cpp/filters-test.cxx
diff options
context:
space:
mode:
Diffstat (limited to 'unotest/source/cpp/filters-test.cxx')
-rw-r--r--unotest/source/cpp/filters-test.cxx170
1 files changed, 170 insertions, 0 deletions
diff --git a/unotest/source/cpp/filters-test.cxx b/unotest/source/cpp/filters-test.cxx
new file mode 100644
index 000000000..7adbd9ca4
--- /dev/null
+++ b/unotest/source/cpp/filters-test.cxx
@@ -0,0 +1,170 @@
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
+/*
+ * This file is part of the LibreOffice project.
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+#include <sal/config.h>
+
+#include <set>
+#include <string_view>
+
+#include <unotest/filters-test.hxx>
+#include <osl/file.hxx>
+#include <osl/thread.h>
+#include <rtl/cipher.h>
+
+#include <cppunit/TestAssert.h>
+
+namespace test {
+
+static void decode(const OUString& rIn, const OUString &rOut)
+{
+ rtlCipher cipher = rtl_cipher_create(rtl_Cipher_AlgorithmARCFOUR, rtl_Cipher_ModeStream);
+ CPPUNIT_ASSERT_MESSAGE("cipher creation failed", cipher != nullptr);
+
+ //mcrypt --bare -a arcfour -o hex -k 435645 -s 3
+ const sal_uInt8 aKey[3] = {'C', 'V', 'E'};
+
+ rtlCipherError result = rtl_cipher_init(cipher, rtl_Cipher_DirectionDecode, aKey, SAL_N_ELEMENTS(aKey), nullptr, 0);
+
+ CPPUNIT_ASSERT_EQUAL_MESSAGE("cipher init failed", rtl_Cipher_E_None, result);
+
+ osl::File aIn(rIn);
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, aIn.open(osl_File_OpenFlag_Read));
+
+ osl::File aOut(rOut);
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, aOut.open(osl_File_OpenFlag_Write));
+
+ sal_uInt8 in[8192];
+ sal_uInt8 out[8192];
+ sal_uInt64 nBytesRead, nBytesWritten;
+ while(true)
+ {
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, aIn.read(in, sizeof(in), nBytesRead));
+ if (!nBytesRead)
+ break;
+ CPPUNIT_ASSERT_EQUAL(rtl_Cipher_E_None, rtl_cipher_decode(cipher, in, nBytesRead, out, sizeof(out)));
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, aOut.write(out, nBytesRead, nBytesWritten));
+ CPPUNIT_ASSERT_EQUAL(nBytesRead, nBytesWritten);
+ }
+
+ rtl_cipher_destroy(cipher);
+}
+
+void FiltersTest::recursiveScan(filterStatus nExpected,
+ const OUString &rFilter, const OUString &rURL,
+ const OUString &rUserData, SfxFilterFlags nFilterFlags,
+ SotClipboardFormatId nClipboardID, unsigned int nFilterVersion, bool bExport)
+{
+ osl::Directory aDir(rURL);
+
+ CPPUNIT_ASSERT_EQUAL_MESSAGE(OUString("Failed to open directory " + rURL).toUtf8().getStr(), osl::FileBase::E_None, aDir.open());
+ osl::DirectoryItem aItem;
+ osl::FileStatus aFileStatus(osl_FileStatus_Mask_FileURL|osl_FileStatus_Mask_Type);
+ std::set<OUString> dirs;
+ std::set<OUString> files;
+ while (aDir.getNextItem(aItem) == osl::FileBase::E_None)
+ {
+ aItem.getFileStatus(aFileStatus);
+ OUString sURL = aFileStatus.getFileURL();
+ if (aFileStatus.getFileType() == osl::FileStatus::Directory)
+ {
+ dirs.insert(sURL);
+ }
+ else
+ {
+ files.insert(sURL);
+ }
+ }
+ for (auto const & sURL: dirs) {
+ recursiveScan(nExpected, rFilter, sURL, rUserData,
+ nFilterFlags, nClipboardID, nFilterVersion, bExport);
+ }
+ for (auto const & sURL: files) {
+ OUString sTmpFile;
+ bool bEncrypted = false;
+
+ sal_Int32 nLastSlash = sURL.lastIndexOf('/');
+
+ if ((nLastSlash != -1) && (nLastSlash+1 < sURL.getLength()))
+ {
+ //ignore .files
+ if (sURL[nLastSlash+1] == '.')
+ continue;
+
+ if (
+ (sURL.match("BID", nLastSlash+1)) ||
+ (sURL.match("CVE", nLastSlash+1)) ||
+ (sURL.match("EDB", nLastSlash+1)) ||
+ (sURL.match("RC4", nLastSlash+1)) // just means "encrypted"
+ )
+ {
+ bEncrypted = true;
+ }
+ }
+
+ OString aRes(
+ OString::Concat(bExport ? std::string_view("save") : std::string_view("load")) + " "
+ + OUStringToOString(sURL, osl_getThreadTextEncoding()));
+
+ OUString realUrl;
+ if (bEncrypted)
+ {
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, osl::FileBase::createTempFile(nullptr, nullptr, &sTmpFile));
+ decode(sURL, sTmpFile);
+ realUrl = sTmpFile;
+ }
+ else
+ {
+ realUrl = sURL;
+ }
+
+ //output name early, so in the case of a hang, the name of
+ //the hanging input file is visible
+ fprintf(stderr, "Testing %s:\n", aRes.getStr());
+ sal_uInt32 nStartTime = osl_getGlobalTimer();
+ bool bRes;
+ if (!bExport)
+ bRes = load(rFilter, realUrl, rUserData, nFilterFlags,
+ nClipboardID, nFilterVersion);
+ else
+ bRes = save(rFilter, realUrl, rUserData, nFilterFlags,
+ nClipboardID, nFilterVersion);
+ sal_uInt32 nEndTime = osl_getGlobalTimer();
+
+ if (bEncrypted)
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, osl::File::remove(sTmpFile));
+
+ fprintf(stderr, "Tested %s: %s (%" SAL_PRIuUINT32 "ms)\n",
+ aRes.getStr(), bRes?"Pass":"Fail", nEndTime-nStartTime);
+ if (nExpected == test::indeterminate)
+ continue;
+ filterStatus nResult = bRes ? test::pass : test::fail;
+ CPPUNIT_ASSERT_EQUAL_MESSAGE(aRes.getStr(), nExpected, nResult);
+ }
+ CPPUNIT_ASSERT_EQUAL(osl::FileBase::E_None, aDir.close());
+}
+
+void FiltersTest::testDir(const OUString &rFilter,
+ std::u16string_view rURL, const OUString &rUserData,
+ SfxFilterFlags nFilterFlags, SotClipboardFormatId nClipboardID,
+ unsigned int nFilterVersion, bool bExport)
+{
+ recursiveScan(test::pass, rFilter,
+ OUString::Concat(rURL) + "pass",
+ rUserData, nFilterFlags, nClipboardID, nFilterVersion, bExport);
+ recursiveScan(test::fail, rFilter,
+ OUString::Concat(rURL) + "fail",
+ rUserData, nFilterFlags, nClipboardID, nFilterVersion, bExport);
+ recursiveScan(test::indeterminate, rFilter,
+ OUString::Concat(rURL) + "indeterminate",
+ rUserData, nFilterFlags, nClipboardID, nFilterVersion, bExport);
+}
+
+}
+
+/* vim:set shiftwidth=4 softtabstop=4 expandtab: */