wpas_module_tests.c 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. /*
  2. * wpa_supplicant module tests
  3. * Copyright (c) 2014, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "wpa_supplicant_i.h"
  11. #include "blacklist.h"
  12. static int wpas_blacklist_module_tests(void)
  13. {
  14. struct wpa_supplicant wpa_s;
  15. int ret = -1;
  16. os_memset(&wpa_s, 0, sizeof(wpa_s));
  17. wpa_blacklist_clear(&wpa_s);
  18. if (wpa_blacklist_get(NULL, NULL) != NULL ||
  19. wpa_blacklist_get(NULL, (u8 *) "123456") != NULL ||
  20. wpa_blacklist_get(&wpa_s, NULL) != NULL ||
  21. wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL)
  22. goto fail;
  23. if (wpa_blacklist_add(NULL, NULL) == 0 ||
  24. wpa_blacklist_add(NULL, (u8 *) "123456") == 0 ||
  25. wpa_blacklist_add(&wpa_s, NULL) == 0)
  26. goto fail;
  27. if (wpa_blacklist_del(NULL, NULL) == 0 ||
  28. wpa_blacklist_del(NULL, (u8 *) "123456") == 0 ||
  29. wpa_blacklist_del(&wpa_s, NULL) == 0 ||
  30. wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0)
  31. goto fail;
  32. if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
  33. wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
  34. wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
  35. wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
  36. wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
  37. wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 ||
  38. wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 ||
  39. wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL ||
  40. wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL ||
  41. wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL ||
  42. wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL ||
  43. wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
  44. wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 ||
  45. wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 ||
  46. wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
  47. wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
  48. wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0)
  49. goto fail;
  50. ret = 0;
  51. fail:
  52. wpa_blacklist_clear(&wpa_s);
  53. if (ret)
  54. wpa_printf(MSG_ERROR, "blacklist module test failure");
  55. return ret;
  56. }
  57. int wpas_module_tests(void)
  58. {
  59. int ret = 0;
  60. wpa_printf(MSG_INFO, "wpa_supplicant module tests");
  61. if (wpas_blacklist_module_tests() < 0)
  62. ret = -1;
  63. #ifdef CONFIG_WPS
  64. {
  65. int wps_module_tests(void);
  66. if (wps_module_tests() < 0)
  67. ret = -1;
  68. }
  69. #endif /* CONFIG_WPS */
  70. {
  71. int utils_module_tests(void);
  72. if (utils_module_tests() < 0)
  73. ret = -1;
  74. }
  75. {
  76. int common_module_tests(void);
  77. if (common_module_tests() < 0)
  78. ret = -1;
  79. }
  80. {
  81. int crypto_module_tests(void);
  82. if (crypto_module_tests() < 0)
  83. ret = -1;
  84. }
  85. return ret;
  86. }