freebsd-skq/contrib/wpa/wpa_supplicant/wpas_module_tests.c
rpaulo 842f4520d0 Merge wpa_supplicant/hostapd 2.4.
Major changes are: SAE, Suite B, RFC 7268, EAP-PKE, ACS, and tons of
bug fixes.

Relnotes:	yes
2015-04-21 01:45:11 +00:00

109 lines
2.6 KiB
C

/*
* wpa_supplicant module tests
* Copyright (c) 2014, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#include "utils/includes.h"
#include "utils/common.h"
#include "wpa_supplicant_i.h"
#include "blacklist.h"
static int wpas_blacklist_module_tests(void)
{
struct wpa_supplicant wpa_s;
int ret = -1;
os_memset(&wpa_s, 0, sizeof(wpa_s));
wpa_blacklist_clear(&wpa_s);
if (wpa_blacklist_get(NULL, NULL) != NULL ||
wpa_blacklist_get(NULL, (u8 *) "123456") != NULL ||
wpa_blacklist_get(&wpa_s, NULL) != NULL ||
wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL)
goto fail;
if (wpa_blacklist_add(NULL, NULL) == 0 ||
wpa_blacklist_add(NULL, (u8 *) "123456") == 0 ||
wpa_blacklist_add(&wpa_s, NULL) == 0)
goto fail;
if (wpa_blacklist_del(NULL, NULL) == 0 ||
wpa_blacklist_del(NULL, (u8 *) "123456") == 0 ||
wpa_blacklist_del(&wpa_s, NULL) == 0 ||
wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0)
goto fail;
if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 ||
wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 ||
wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL ||
wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL ||
wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL ||
wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL ||
wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 ||
wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0)
goto fail;
ret = 0;
fail:
wpa_blacklist_clear(&wpa_s);
if (ret)
wpa_printf(MSG_ERROR, "blacklist module test failure");
return ret;
}
int wpas_module_tests(void)
{
int ret = 0;
wpa_printf(MSG_INFO, "wpa_supplicant module tests");
if (wpas_blacklist_module_tests() < 0)
ret = -1;
#ifdef CONFIG_WPS
{
int wps_module_tests(void);
if (wps_module_tests() < 0)
ret = -1;
}
#endif /* CONFIG_WPS */
{
int utils_module_tests(void);
if (utils_module_tests() < 0)
ret = -1;
}
{
int common_module_tests(void);
if (common_module_tests() < 0)
ret = -1;
}
{
int crypto_module_tests(void);
if (crypto_module_tests() < 0)
ret = -1;
}
return ret;
}