842f4520d0
Major changes are: SAE, Suite B, RFC 7268, EAP-PKE, ACS, and tons of bug fixes. Relnotes: yes
109 lines
2.6 KiB
C
109 lines
2.6 KiB
C
/*
|
|
* wpa_supplicant module tests
|
|
* Copyright (c) 2014, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "wpa_supplicant_i.h"
|
|
#include "blacklist.h"
|
|
|
|
|
|
static int wpas_blacklist_module_tests(void)
|
|
{
|
|
struct wpa_supplicant wpa_s;
|
|
int ret = -1;
|
|
|
|
os_memset(&wpa_s, 0, sizeof(wpa_s));
|
|
|
|
wpa_blacklist_clear(&wpa_s);
|
|
|
|
if (wpa_blacklist_get(NULL, NULL) != NULL ||
|
|
wpa_blacklist_get(NULL, (u8 *) "123456") != NULL ||
|
|
wpa_blacklist_get(&wpa_s, NULL) != NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_add(NULL, NULL) == 0 ||
|
|
wpa_blacklist_add(NULL, (u8 *) "123456") == 0 ||
|
|
wpa_blacklist_add(&wpa_s, NULL) == 0)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_del(NULL, NULL) == 0 ||
|
|
wpa_blacklist_del(NULL, (u8 *) "123456") == 0 ||
|
|
wpa_blacklist_del(&wpa_s, NULL) == 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0)
|
|
goto fail;
|
|
|
|
ret = 0;
|
|
fail:
|
|
wpa_blacklist_clear(&wpa_s);
|
|
|
|
if (ret)
|
|
wpa_printf(MSG_ERROR, "blacklist module test failure");
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int wpas_module_tests(void)
|
|
{
|
|
int ret = 0;
|
|
|
|
wpa_printf(MSG_INFO, "wpa_supplicant module tests");
|
|
|
|
if (wpas_blacklist_module_tests() < 0)
|
|
ret = -1;
|
|
|
|
#ifdef CONFIG_WPS
|
|
{
|
|
int wps_module_tests(void);
|
|
if (wps_module_tests() < 0)
|
|
ret = -1;
|
|
}
|
|
#endif /* CONFIG_WPS */
|
|
|
|
{
|
|
int utils_module_tests(void);
|
|
if (utils_module_tests() < 0)
|
|
ret = -1;
|
|
}
|
|
|
|
{
|
|
int common_module_tests(void);
|
|
if (common_module_tests() < 0)
|
|
ret = -1;
|
|
}
|
|
|
|
{
|
|
int crypto_module_tests(void);
|
|
if (crypto_module_tests() < 0)
|
|
ret = -1;
|
|
}
|
|
|
|
return ret;
|
|
}
|