utils_module_tests.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943
  1. /*
  2. * utils module tests
  3. * Copyright (c) 2014-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "common/ieee802_11_defs.h"
  11. #include "utils/bitfield.h"
  12. #include "utils/ext_password.h"
  13. #include "utils/trace.h"
  14. #include "utils/base64.h"
  15. #include "utils/ip_addr.h"
  16. #include "utils/eloop.h"
  17. #include "utils/json.h"
  18. #include "utils/module_tests.h"
  19. struct printf_test_data {
  20. u8 *data;
  21. size_t len;
  22. char *encoded;
  23. };
  24. static const struct printf_test_data printf_tests[] = {
  25. { (u8 *) "abcde", 5, "abcde" },
  26. { (u8 *) "a\0b\nc\ed\re\tf\"\\", 13, "a\\0b\\nc\\ed\\re\\tf\\\"\\\\" },
  27. { (u8 *) "\x00\x31\x00\x32\x00\x39", 6, "\\x001\\0002\\09" },
  28. { (u8 *) "\n\n\n", 3, "\n\12\x0a" },
  29. { (u8 *) "\303\245\303\244\303\266\303\205\303\204\303\226", 12,
  30. "\\xc3\\xa5\xc3\\xa4\\xc3\\xb6\\xc3\\x85\\xc3\\x84\\xc3\\x96" },
  31. { (u8 *) "\303\245\303\244\303\266\303\205\303\204\303\226", 12,
  32. "\\303\\245\\303\\244\\303\\266\\303\\205\\303\\204\\303\\226" },
  33. { (u8 *) "\xe5\xe4\xf6\xc5\xc4\xd6", 6,
  34. "\\xe5\\xe4\\xf6\\xc5\\xc4\\xd6" },
  35. { NULL, 0, NULL }
  36. };
  37. static int printf_encode_decode_tests(void)
  38. {
  39. int i;
  40. size_t binlen;
  41. char buf[100];
  42. u8 bin[100];
  43. int errors = 0;
  44. int array[10];
  45. wpa_printf(MSG_INFO, "printf encode/decode tests");
  46. for (i = 0; printf_tests[i].data; i++) {
  47. const struct printf_test_data *test = &printf_tests[i];
  48. printf_encode(buf, sizeof(buf), test->data, test->len);
  49. wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf);
  50. binlen = printf_decode(bin, sizeof(bin), buf);
  51. if (binlen != test->len ||
  52. os_memcmp(bin, test->data, binlen) != 0) {
  53. wpa_hexdump(MSG_ERROR, "Error in decoding#1",
  54. bin, binlen);
  55. errors++;
  56. }
  57. binlen = printf_decode(bin, sizeof(bin), test->encoded);
  58. if (binlen != test->len ||
  59. os_memcmp(bin, test->data, binlen) != 0) {
  60. wpa_hexdump(MSG_ERROR, "Error in decoding#2",
  61. bin, binlen);
  62. errors++;
  63. }
  64. }
  65. buf[5] = 'A';
  66. printf_encode(buf, 5, (const u8 *) "abcde", 5);
  67. if (buf[5] != 'A') {
  68. wpa_printf(MSG_ERROR, "Error in bounds checking#1");
  69. errors++;
  70. }
  71. for (i = 5; i < 10; i++) {
  72. buf[i] = 'A';
  73. printf_encode(buf, i, (const u8 *) "\xdd\xdd\xdd\xdd\xdd", 5);
  74. if (buf[i] != 'A') {
  75. wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)",
  76. i);
  77. errors++;
  78. }
  79. }
  80. if (printf_decode(bin, 3, "abcde") != 2)
  81. errors++;
  82. if (printf_decode(bin, 3, "\\xa") != 1 || bin[0] != 10)
  83. errors++;
  84. if (printf_decode(bin, 3, "\\xq") != 1 || bin[0] != 'q')
  85. errors++;
  86. if (printf_decode(bin, 3, "\\a") != 1 || bin[0] != 'a')
  87. errors++;
  88. array[0] = 10;
  89. array[1] = 10;
  90. array[2] = 5;
  91. array[3] = 10;
  92. array[4] = 5;
  93. array[5] = 0;
  94. if (int_array_len(array) != 5)
  95. errors++;
  96. int_array_sort_unique(array);
  97. if (int_array_len(array) != 2)
  98. errors++;
  99. if (errors) {
  100. wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors);
  101. return -1;
  102. }
  103. return 0;
  104. }
  105. static int bitfield_tests(void)
  106. {
  107. struct bitfield *bf;
  108. int i;
  109. int errors = 0;
  110. wpa_printf(MSG_INFO, "bitfield tests");
  111. bf = bitfield_alloc(123);
  112. if (bf == NULL)
  113. return -1;
  114. for (i = 0; i < 123; i++) {
  115. if (bitfield_is_set(bf, i) || bitfield_is_set(bf, i + 1))
  116. errors++;
  117. if (i > 0 && bitfield_is_set(bf, i - 1))
  118. errors++;
  119. bitfield_set(bf, i);
  120. if (!bitfield_is_set(bf, i))
  121. errors++;
  122. bitfield_clear(bf, i);
  123. if (bitfield_is_set(bf, i))
  124. errors++;
  125. }
  126. for (i = 123; i < 200; i++) {
  127. if (bitfield_is_set(bf, i) || bitfield_is_set(bf, i + 1))
  128. errors++;
  129. if (i > 0 && bitfield_is_set(bf, i - 1))
  130. errors++;
  131. bitfield_set(bf, i);
  132. if (bitfield_is_set(bf, i))
  133. errors++;
  134. bitfield_clear(bf, i);
  135. if (bitfield_is_set(bf, i))
  136. errors++;
  137. }
  138. for (i = 0; i < 123; i++) {
  139. if (bitfield_is_set(bf, i) || bitfield_is_set(bf, i + 1))
  140. errors++;
  141. bitfield_set(bf, i);
  142. if (!bitfield_is_set(bf, i))
  143. errors++;
  144. }
  145. for (i = 0; i < 123; i++) {
  146. if (!bitfield_is_set(bf, i))
  147. errors++;
  148. bitfield_clear(bf, i);
  149. if (bitfield_is_set(bf, i))
  150. errors++;
  151. }
  152. for (i = 0; i < 123; i++) {
  153. if (bitfield_get_first_zero(bf) != i)
  154. errors++;
  155. bitfield_set(bf, i);
  156. }
  157. if (bitfield_get_first_zero(bf) != -1)
  158. errors++;
  159. for (i = 0; i < 123; i++) {
  160. if (!bitfield_is_set(bf, i))
  161. errors++;
  162. bitfield_clear(bf, i);
  163. if (bitfield_get_first_zero(bf) != i)
  164. errors++;
  165. bitfield_set(bf, i);
  166. }
  167. if (bitfield_get_first_zero(bf) != -1)
  168. errors++;
  169. bitfield_free(bf);
  170. bf = bitfield_alloc(8);
  171. if (bf == NULL)
  172. return -1;
  173. if (bitfield_get_first_zero(bf) != 0)
  174. errors++;
  175. for (i = 0; i < 8; i++)
  176. bitfield_set(bf, i);
  177. if (bitfield_get_first_zero(bf) != -1)
  178. errors++;
  179. bitfield_free(bf);
  180. if (errors) {
  181. wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors);
  182. return -1;
  183. }
  184. return 0;
  185. }
  186. static int int_array_tests(void)
  187. {
  188. int test1[] = { 1, 2, 3, 4, 5, 6, 0 };
  189. int test2[] = { 1, -1, 0 };
  190. int test3[] = { 1, 1, 1, -1, 2, 3, 4, 1, 2, 0 };
  191. int test3_res[] = { -1, 1, 2, 3, 4, 0 };
  192. int errors = 0;
  193. int len;
  194. wpa_printf(MSG_INFO, "int_array tests");
  195. if (int_array_len(test1) != 6 ||
  196. int_array_len(test2) != 2)
  197. errors++;
  198. int_array_sort_unique(test3);
  199. len = int_array_len(test3_res);
  200. if (int_array_len(test3) != len)
  201. errors++;
  202. else if (os_memcmp(test3, test3_res, len * sizeof(int)) != 0)
  203. errors++;
  204. if (errors) {
  205. wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors);
  206. return -1;
  207. }
  208. return 0;
  209. }
  210. static int ext_password_tests(void)
  211. {
  212. struct ext_password_data *data;
  213. int ret = 0;
  214. struct wpabuf *pw;
  215. wpa_printf(MSG_INFO, "ext_password tests");
  216. data = ext_password_init("unknown", "foo");
  217. if (data != NULL)
  218. return -1;
  219. data = ext_password_init("test", NULL);
  220. if (data == NULL)
  221. return -1;
  222. pw = ext_password_get(data, "foo");
  223. if (pw != NULL)
  224. ret = -1;
  225. ext_password_free(pw);
  226. ext_password_deinit(data);
  227. pw = ext_password_get(NULL, "foo");
  228. if (pw != NULL)
  229. ret = -1;
  230. ext_password_free(pw);
  231. return ret;
  232. }
  233. static int trace_tests(void)
  234. {
  235. wpa_printf(MSG_INFO, "trace tests");
  236. wpa_trace_show("test backtrace");
  237. wpa_trace_dump_funcname("test funcname", trace_tests);
  238. return 0;
  239. }
  240. static int base64_tests(void)
  241. {
  242. int errors = 0;
  243. unsigned char *res;
  244. size_t res_len;
  245. wpa_printf(MSG_INFO, "base64 tests");
  246. res = base64_encode((const unsigned char *) "", ~0, &res_len);
  247. if (res) {
  248. errors++;
  249. os_free(res);
  250. }
  251. res = base64_encode((const unsigned char *) "=", 1, &res_len);
  252. if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' ||
  253. res[2] != '=' || res[3] != '=' || res[4] != '\n')
  254. errors++;
  255. os_free(res);
  256. res = base64_encode((const unsigned char *) "=", 1, NULL);
  257. if (!res || res[0] != 'P' || res[1] != 'Q' ||
  258. res[2] != '=' || res[3] != '=' || res[4] != '\n')
  259. errors++;
  260. os_free(res);
  261. res = base64_decode((const unsigned char *) "", 0, &res_len);
  262. if (res) {
  263. errors++;
  264. os_free(res);
  265. }
  266. res = base64_decode((const unsigned char *) "a", 1, &res_len);
  267. if (res) {
  268. errors++;
  269. os_free(res);
  270. }
  271. res = base64_decode((const unsigned char *) "====", 4, &res_len);
  272. if (res) {
  273. errors++;
  274. os_free(res);
  275. }
  276. res = base64_decode((const unsigned char *) "PQ==", 4, &res_len);
  277. if (!res || res_len != 1 || res[0] != '=')
  278. errors++;
  279. os_free(res);
  280. res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len);
  281. if (!res || res_len != 1 || res[0] != '=')
  282. errors++;
  283. os_free(res);
  284. if (errors) {
  285. wpa_printf(MSG_ERROR, "%d base64 test(s) failed", errors);
  286. return -1;
  287. }
  288. return 0;
  289. }
  290. static int common_tests(void)
  291. {
  292. char buf[3], longbuf[100];
  293. u8 addr[ETH_ALEN] = { 1, 2, 3, 4, 5, 6 };
  294. u8 bin[3];
  295. int errors = 0;
  296. struct wpa_freq_range_list ranges;
  297. size_t len;
  298. const char *txt;
  299. u8 ssid[255];
  300. wpa_printf(MSG_INFO, "common tests");
  301. if (hwaddr_mask_txt(buf, 3, addr, addr) != -1)
  302. errors++;
  303. if (wpa_scnprintf(buf, 0, "hello") != 0 ||
  304. wpa_scnprintf(buf, 3, "hello") != 2)
  305. errors++;
  306. if (wpa_snprintf_hex(buf, 0, addr, ETH_ALEN) != 0 ||
  307. wpa_snprintf_hex(buf, 3, addr, ETH_ALEN) != 2)
  308. errors++;
  309. if (merge_byte_arrays(bin, 3, addr, ETH_ALEN, NULL, 0) != 3 ||
  310. merge_byte_arrays(bin, 3, NULL, 0, addr, ETH_ALEN) != 3)
  311. errors++;
  312. if (dup_binstr(NULL, 0) != NULL)
  313. errors++;
  314. if (freq_range_list_includes(NULL, 0) != 0)
  315. errors++;
  316. os_memset(&ranges, 0, sizeof(ranges));
  317. if (freq_range_list_parse(&ranges, "") != 0 ||
  318. freq_range_list_includes(&ranges, 0) != 0 ||
  319. freq_range_list_str(&ranges) != NULL)
  320. errors++;
  321. if (utf8_unescape(NULL, 0, buf, sizeof(buf)) != 0 ||
  322. utf8_unescape("a", 1, NULL, 0) != 0 ||
  323. utf8_unescape("a\\", 2, buf, sizeof(buf)) != 0 ||
  324. utf8_unescape("abcde", 5, buf, sizeof(buf)) != 0 ||
  325. utf8_unescape("abc", 3, buf, 3) != 3)
  326. errors++;
  327. if (utf8_unescape("a", 0, buf, sizeof(buf)) != 1 || buf[0] != 'a')
  328. errors++;
  329. if (utf8_unescape("\\b", 2, buf, sizeof(buf)) != 1 || buf[0] != 'b')
  330. errors++;
  331. if (utf8_escape(NULL, 0, buf, sizeof(buf)) != 0 ||
  332. utf8_escape("a", 1, NULL, 0) != 0 ||
  333. utf8_escape("abcde", 5, buf, sizeof(buf)) != 0 ||
  334. utf8_escape("a\\bcde", 6, buf, sizeof(buf)) != 0 ||
  335. utf8_escape("ab\\cde", 6, buf, sizeof(buf)) != 0 ||
  336. utf8_escape("abc\\de", 6, buf, sizeof(buf)) != 0 ||
  337. utf8_escape("abc", 3, buf, 3) != 3)
  338. errors++;
  339. if (utf8_escape("a", 0, buf, sizeof(buf)) != 1 || buf[0] != 'a')
  340. errors++;
  341. os_memset(ssid, 0, sizeof(ssid));
  342. txt = wpa_ssid_txt(ssid, sizeof(ssid));
  343. len = os_strlen(txt);
  344. /* Verify that SSID_MAX_LEN * 4 buffer limit is enforced. */
  345. if (len != SSID_MAX_LEN * 4) {
  346. wpa_printf(MSG_ERROR,
  347. "Unexpected wpa_ssid_txt() result with too long SSID");
  348. errors++;
  349. }
  350. if (wpa_snprintf_hex_sep(longbuf, 0, addr, ETH_ALEN, '-') != 0 ||
  351. wpa_snprintf_hex_sep(longbuf, 5, addr, ETH_ALEN, '-') != 3 ||
  352. os_strcmp(longbuf, "01-0") != 0)
  353. errors++;
  354. if (errors) {
  355. wpa_printf(MSG_ERROR, "%d common test(s) failed", errors);
  356. return -1;
  357. }
  358. return 0;
  359. }
  360. static int os_tests(void)
  361. {
  362. int errors = 0;
  363. void *ptr;
  364. os_time_t t;
  365. wpa_printf(MSG_INFO, "os tests");
  366. ptr = os_calloc((size_t) -1, (size_t) -1);
  367. if (ptr) {
  368. errors++;
  369. os_free(ptr);
  370. }
  371. ptr = os_calloc((size_t) 2, (size_t) -1);
  372. if (ptr) {
  373. errors++;
  374. os_free(ptr);
  375. }
  376. ptr = os_calloc((size_t) -1, (size_t) 2);
  377. if (ptr) {
  378. errors++;
  379. os_free(ptr);
  380. }
  381. ptr = os_realloc_array(NULL, (size_t) -1, (size_t) -1);
  382. if (ptr) {
  383. errors++;
  384. os_free(ptr);
  385. }
  386. os_sleep(1, 1);
  387. if (os_mktime(1969, 1, 1, 1, 1, 1, &t) == 0 ||
  388. os_mktime(1971, 0, 1, 1, 1, 1, &t) == 0 ||
  389. os_mktime(1971, 13, 1, 1, 1, 1, &t) == 0 ||
  390. os_mktime(1971, 1, 0, 1, 1, 1, &t) == 0 ||
  391. os_mktime(1971, 1, 32, 1, 1, 1, &t) == 0 ||
  392. os_mktime(1971, 1, 1, -1, 1, 1, &t) == 0 ||
  393. os_mktime(1971, 1, 1, 24, 1, 1, &t) == 0 ||
  394. os_mktime(1971, 1, 1, 1, -1, 1, &t) == 0 ||
  395. os_mktime(1971, 1, 1, 1, 60, 1, &t) == 0 ||
  396. os_mktime(1971, 1, 1, 1, 1, -1, &t) == 0 ||
  397. os_mktime(1971, 1, 1, 1, 1, 61, &t) == 0 ||
  398. os_mktime(1971, 1, 1, 1, 1, 1, &t) != 0 ||
  399. os_mktime(2020, 1, 2, 3, 4, 5, &t) != 0 ||
  400. os_mktime(2015, 12, 31, 23, 59, 59, &t) != 0)
  401. errors++;
  402. if (os_setenv("hwsim_test_env", "test value", 0) != 0 ||
  403. os_setenv("hwsim_test_env", "test value 2", 1) != 0 ||
  404. os_unsetenv("hwsim_test_env") != 0)
  405. errors++;
  406. if (os_file_exists("/this-file-does-not-exists-hwsim") != 0)
  407. errors++;
  408. if (errors) {
  409. wpa_printf(MSG_ERROR, "%d os test(s) failed", errors);
  410. return -1;
  411. }
  412. return 0;
  413. }
  414. static int wpabuf_tests(void)
  415. {
  416. int errors = 0;
  417. void *ptr;
  418. struct wpabuf *buf;
  419. wpa_printf(MSG_INFO, "wpabuf tests");
  420. ptr = os_malloc(100);
  421. if (ptr) {
  422. buf = wpabuf_alloc_ext_data(ptr, 100);
  423. if (buf) {
  424. if (wpabuf_resize(&buf, 100) < 0)
  425. errors++;
  426. else
  427. wpabuf_put(buf, 100);
  428. wpabuf_free(buf);
  429. } else {
  430. errors++;
  431. os_free(ptr);
  432. }
  433. } else {
  434. errors++;
  435. }
  436. buf = wpabuf_alloc(100);
  437. if (buf) {
  438. struct wpabuf *buf2;
  439. wpabuf_put(buf, 100);
  440. if (wpabuf_resize(&buf, 100) < 0)
  441. errors++;
  442. else
  443. wpabuf_put(buf, 100);
  444. buf2 = wpabuf_concat(buf, NULL);
  445. if (buf2 != buf)
  446. errors++;
  447. wpabuf_free(buf2);
  448. } else {
  449. errors++;
  450. }
  451. buf = NULL;
  452. buf = wpabuf_zeropad(buf, 10);
  453. if (buf != NULL)
  454. errors++;
  455. if (errors) {
  456. wpa_printf(MSG_ERROR, "%d wpabuf test(s) failed", errors);
  457. return -1;
  458. }
  459. return 0;
  460. }
  461. static int ip_addr_tests(void)
  462. {
  463. int errors = 0;
  464. struct hostapd_ip_addr addr;
  465. char buf[100];
  466. wpa_printf(MSG_INFO, "ip_addr tests");
  467. if (hostapd_parse_ip_addr("1.2.3.4", &addr) != 0 ||
  468. addr.af != AF_INET ||
  469. hostapd_ip_txt(NULL, buf, sizeof(buf)) != NULL ||
  470. hostapd_ip_txt(&addr, buf, 1) != buf || buf[0] != '\0' ||
  471. hostapd_ip_txt(&addr, buf, 0) != NULL ||
  472. hostapd_ip_txt(&addr, buf, sizeof(buf)) != buf)
  473. errors++;
  474. if (hostapd_parse_ip_addr("::", &addr) != 0 ||
  475. addr.af != AF_INET6 ||
  476. hostapd_ip_txt(&addr, buf, 1) != buf || buf[0] != '\0' ||
  477. hostapd_ip_txt(&addr, buf, sizeof(buf)) != buf)
  478. errors++;
  479. if (errors) {
  480. wpa_printf(MSG_ERROR, "%d ip_addr test(s) failed", errors);
  481. return -1;
  482. }
  483. return 0;
  484. }
  485. struct test_eloop {
  486. unsigned int magic;
  487. int close_in_timeout;
  488. int pipefd1[2];
  489. int pipefd2[2];
  490. };
  491. static void eloop_tests_start(int close_in_timeout);
  492. static void eloop_test_read_2(int sock, void *eloop_ctx, void *sock_ctx)
  493. {
  494. struct test_eloop *t = eloop_ctx;
  495. ssize_t res;
  496. char buf[10];
  497. wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock);
  498. if (t->magic != 0x12345678) {
  499. wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x",
  500. __func__, t->magic);
  501. }
  502. if (t->pipefd2[0] != sock) {
  503. wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d",
  504. __func__, sock, t->pipefd2[0]);
  505. }
  506. res = read(sock, buf, sizeof(buf));
  507. wpa_printf(MSG_INFO, "%s: sock=%d --> res=%d",
  508. __func__, sock, (int) res);
  509. }
  510. static void eloop_test_read_2_wrong(int sock, void *eloop_ctx, void *sock_ctx)
  511. {
  512. struct test_eloop *t = eloop_ctx;
  513. wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock);
  514. if (t->magic != 0x12345678) {
  515. wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x",
  516. __func__, t->magic);
  517. }
  518. if (t->pipefd2[0] != sock) {
  519. wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d",
  520. __func__, sock, t->pipefd2[0]);
  521. }
  522. /*
  523. * This is expected to block due to the original socket with data having
  524. * been closed and no new data having been written to the new socket
  525. * with the same fd. To avoid blocking the process during test, skip the
  526. * read here.
  527. */
  528. wpa_printf(MSG_ERROR, "%s: FAIL - should not have called this function",
  529. __func__);
  530. }
  531. static void reopen_pipefd2(struct test_eloop *t)
  532. {
  533. if (t->pipefd2[0] < 0) {
  534. wpa_printf(MSG_INFO, "pipefd2 had been closed");
  535. } else {
  536. int res;
  537. wpa_printf(MSG_INFO, "close pipefd2");
  538. eloop_unregister_read_sock(t->pipefd2[0]);
  539. close(t->pipefd2[0]);
  540. t->pipefd2[0] = -1;
  541. close(t->pipefd2[1]);
  542. t->pipefd2[1] = -1;
  543. res = pipe(t->pipefd2);
  544. if (res < 0) {
  545. wpa_printf(MSG_INFO, "pipe: %s", strerror(errno));
  546. t->pipefd2[0] = -1;
  547. t->pipefd2[1] = -1;
  548. return;
  549. }
  550. wpa_printf(MSG_INFO,
  551. "re-register pipefd2 with new sockets %d,%d",
  552. t->pipefd2[0], t->pipefd2[1]);
  553. eloop_register_read_sock(t->pipefd2[0], eloop_test_read_2_wrong,
  554. t, NULL);
  555. }
  556. }
  557. static void eloop_test_read_1(int sock, void *eloop_ctx, void *sock_ctx)
  558. {
  559. struct test_eloop *t = eloop_ctx;
  560. ssize_t res;
  561. char buf[10];
  562. wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock);
  563. if (t->magic != 0x12345678) {
  564. wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x",
  565. __func__, t->magic);
  566. }
  567. if (t->pipefd1[0] != sock) {
  568. wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d",
  569. __func__, sock, t->pipefd1[0]);
  570. }
  571. res = read(sock, buf, sizeof(buf));
  572. wpa_printf(MSG_INFO, "%s: sock=%d --> res=%d",
  573. __func__, sock, (int) res);
  574. if (!t->close_in_timeout)
  575. reopen_pipefd2(t);
  576. }
  577. static void eloop_test_cb(void *eloop_data, void *user_ctx)
  578. {
  579. struct test_eloop *t = eloop_data;
  580. wpa_printf(MSG_INFO, "%s", __func__);
  581. if (t->magic != 0x12345678) {
  582. wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x",
  583. __func__, t->magic);
  584. }
  585. if (t->close_in_timeout)
  586. reopen_pipefd2(t);
  587. }
  588. static void eloop_test_timeout(void *eloop_data, void *user_ctx)
  589. {
  590. struct test_eloop *t = eloop_data;
  591. int next_run = 0;
  592. wpa_printf(MSG_INFO, "%s", __func__);
  593. if (t->magic != 0x12345678) {
  594. wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x",
  595. __func__, t->magic);
  596. }
  597. if (t->pipefd1[0] >= 0) {
  598. wpa_printf(MSG_INFO, "pipefd1 had not been closed");
  599. eloop_unregister_read_sock(t->pipefd1[0]);
  600. close(t->pipefd1[0]);
  601. t->pipefd1[0] = -1;
  602. close(t->pipefd1[1]);
  603. t->pipefd1[1] = -1;
  604. }
  605. if (t->pipefd2[0] >= 0) {
  606. wpa_printf(MSG_INFO, "pipefd2 had not been closed");
  607. eloop_unregister_read_sock(t->pipefd2[0]);
  608. close(t->pipefd2[0]);
  609. t->pipefd2[0] = -1;
  610. close(t->pipefd2[1]);
  611. t->pipefd2[1] = -1;
  612. }
  613. next_run = t->close_in_timeout;
  614. t->magic = 0;
  615. wpa_printf(MSG_INFO, "%s - free(%p)", __func__, t);
  616. os_free(t);
  617. if (next_run)
  618. eloop_tests_start(0);
  619. }
  620. static void eloop_tests_start(int close_in_timeout)
  621. {
  622. struct test_eloop *t;
  623. int res;
  624. t = os_zalloc(sizeof(*t));
  625. if (!t)
  626. return;
  627. t->magic = 0x12345678;
  628. t->close_in_timeout = close_in_timeout;
  629. wpa_printf(MSG_INFO, "starting eloop tests (%p) (close_in_timeout=%d)",
  630. t, close_in_timeout);
  631. res = pipe(t->pipefd1);
  632. if (res < 0) {
  633. wpa_printf(MSG_INFO, "pipe: %s", strerror(errno));
  634. os_free(t);
  635. return;
  636. }
  637. res = pipe(t->pipefd2);
  638. if (res < 0) {
  639. wpa_printf(MSG_INFO, "pipe: %s", strerror(errno));
  640. close(t->pipefd1[0]);
  641. close(t->pipefd1[1]);
  642. os_free(t);
  643. return;
  644. }
  645. wpa_printf(MSG_INFO, "pipe fds: %d,%d %d,%d",
  646. t->pipefd1[0], t->pipefd1[1],
  647. t->pipefd2[0], t->pipefd2[1]);
  648. eloop_register_read_sock(t->pipefd1[0], eloop_test_read_1, t, NULL);
  649. eloop_register_read_sock(t->pipefd2[0], eloop_test_read_2, t, NULL);
  650. eloop_register_timeout(0, 0, eloop_test_cb, t, NULL);
  651. eloop_register_timeout(0, 200000, eloop_test_timeout, t, NULL);
  652. if (write(t->pipefd1[1], "HELLO", 5) < 0)
  653. wpa_printf(MSG_INFO, "write: %s", strerror(errno));
  654. if (write(t->pipefd2[1], "TEST", 4) < 0)
  655. wpa_printf(MSG_INFO, "write: %s", strerror(errno));
  656. os_sleep(0, 50000);
  657. wpa_printf(MSG_INFO, "waiting for eloop callbacks");
  658. }
  659. static void eloop_tests_run(void *eloop_data, void *user_ctx)
  660. {
  661. eloop_tests_start(1);
  662. }
  663. static int eloop_tests(void)
  664. {
  665. wpa_printf(MSG_INFO, "schedule eloop tests to be run");
  666. /*
  667. * Cannot return error from these without a significant design change,
  668. * so for now, run the tests from a scheduled timeout and require
  669. * separate verification of the results from the debug log.
  670. */
  671. eloop_register_timeout(0, 0, eloop_tests_run, NULL, NULL);
  672. return 0;
  673. }
  674. #ifdef CONFIG_JSON
  675. struct json_test_data {
  676. const char *json;
  677. const char *tree;
  678. };
  679. static const struct json_test_data json_test_cases[] = {
  680. { "{}", "[1:OBJECT:]" },
  681. { "[]", "[1:ARRAY:]" },
  682. { "{", NULL },
  683. { "[", NULL },
  684. { "}", NULL },
  685. { "]", NULL },
  686. { "[[]]", "[1:ARRAY:][2:ARRAY:]" },
  687. { "{\"t\":\"test\"}", "[1:OBJECT:][2:STRING:t]" },
  688. { "{\"t\":123}", "[1:OBJECT:][2:NUMBER:t]" },
  689. { "{\"t\":true}", "[1:OBJECT:][2:BOOLEAN:t]" },
  690. { "{\"t\":false}", "[1:OBJECT:][2:BOOLEAN:t]" },
  691. { "{\"t\":null}", "[1:OBJECT:][2:NULL:t]" },
  692. { "{\"t\":truetrue}", NULL },
  693. { "\"test\"", "[1:STRING:]" },
  694. { "123", "[1:NUMBER:]" },
  695. { "true", "[1:BOOLEAN:]" },
  696. { "false", "[1:BOOLEAN:]" },
  697. { "null", "[1:NULL:]" },
  698. { "truetrue", NULL },
  699. { " {\t\n\r\"a\"\n:\r1\n,\n\"b\":3\n}\n",
  700. "[1:OBJECT:][2:NUMBER:a][2:NUMBER:b]" },
  701. { ",", NULL },
  702. { "{,}", NULL },
  703. { "[,]", NULL },
  704. { ":", NULL },
  705. { "{:}", NULL },
  706. { "[:]", NULL },
  707. { "{ \"\\u005c\" : \"\\u005c\" }", "[1:OBJECT:][2:STRING:\\]" },
  708. { "[{},{}]", "[1:ARRAY:][2:OBJECT:][2:OBJECT:]" },
  709. { "[1,2]", "[1:ARRAY:][2:NUMBER:][2:NUMBER:]" },
  710. { "[\"1\",\"2\"]", "[1:ARRAY:][2:STRING:][2:STRING:]" },
  711. { "[true,false]", "[1:ARRAY:][2:BOOLEAN:][2:BOOLEAN:]" },
  712. };
  713. #endif /* CONFIG_JSON */
  714. static int json_tests(void)
  715. {
  716. #ifdef CONFIG_JSON
  717. unsigned int i;
  718. struct json_token *root;
  719. char buf[1000];
  720. wpa_printf(MSG_INFO, "JSON tests");
  721. for (i = 0; i < ARRAY_SIZE(json_test_cases); i++) {
  722. const struct json_test_data *test = &json_test_cases[i];
  723. int res = 0;
  724. root = json_parse(test->json, os_strlen(test->json));
  725. if ((root && !test->tree) || (!root && test->tree)) {
  726. wpa_printf(MSG_INFO, "JSON test %u failed", i);
  727. res = -1;
  728. } else if (root) {
  729. json_print_tree(root, buf, sizeof(buf));
  730. if (os_strcmp(buf, test->tree) != 0) {
  731. wpa_printf(MSG_INFO,
  732. "JSON test %u tree mismatch: %s %s",
  733. i, buf, test->tree);
  734. res = -1;
  735. }
  736. }
  737. json_free(root);
  738. if (res < 0)
  739. return -1;
  740. }
  741. #endif /* CONFIG_JSON */
  742. return 0;
  743. }
  744. int utils_module_tests(void)
  745. {
  746. int ret = 0;
  747. wpa_printf(MSG_INFO, "utils module tests");
  748. if (printf_encode_decode_tests() < 0 ||
  749. ext_password_tests() < 0 ||
  750. trace_tests() < 0 ||
  751. bitfield_tests() < 0 ||
  752. base64_tests() < 0 ||
  753. common_tests() < 0 ||
  754. os_tests() < 0 ||
  755. wpabuf_tests() < 0 ||
  756. ip_addr_tests() < 0 ||
  757. eloop_tests() < 0 ||
  758. json_tests() < 0 ||
  759. int_array_tests() < 0)
  760. ret = -1;
  761. return ret;
  762. }