| /* |
| * wpa_supplicant module tests |
| * Copyright (c) 2014, Jouni Malinen <j@w1.fi> |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "utils/includes.h" |
| |
| #include "utils/common.h" |
| #include "wpa_supplicant_i.h" |
| #include "blacklist.h" |
| |
| |
| static int wpas_blacklist_module_tests(void) |
| { |
| struct wpa_supplicant wpa_s; |
| int ret = -1; |
| |
| os_memset(&wpa_s, 0, sizeof(wpa_s)); |
| |
| wpa_blacklist_clear(&wpa_s); |
| |
| if (wpa_blacklist_get(NULL, NULL) != NULL || |
| wpa_blacklist_get(NULL, (u8 *) "123456") != NULL || |
| wpa_blacklist_get(&wpa_s, NULL) != NULL || |
| wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL) |
| goto fail; |
| |
| if (wpa_blacklist_add(NULL, NULL) == 0 || |
| wpa_blacklist_add(NULL, (u8 *) "123456") == 0 || |
| wpa_blacklist_add(&wpa_s, NULL) == 0) |
| goto fail; |
| |
| if (wpa_blacklist_del(NULL, NULL) == 0 || |
| wpa_blacklist_del(NULL, (u8 *) "123456") == 0 || |
| wpa_blacklist_del(&wpa_s, NULL) == 0 || |
| wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0) |
| goto fail; |
| |
| if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 || |
| wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 || |
| wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 || |
| wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL || |
| wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL || |
| wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL || |
| wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL || |
| wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 || |
| wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 || |
| wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 || |
| wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0) |
| goto fail; |
| |
| ret = 0; |
| fail: |
| wpa_blacklist_clear(&wpa_s); |
| |
| if (ret) |
| wpa_printf(MSG_ERROR, "blacklist module test failure"); |
| |
| return ret; |
| } |
| |
| |
| int wpas_module_tests(void) |
| { |
| int ret = 0; |
| |
| wpa_printf(MSG_INFO, "wpa_supplicant module tests"); |
| |
| if (wpas_blacklist_module_tests() < 0) |
| ret = -1; |
| |
| #ifdef CONFIG_WPS |
| { |
| int wps_module_tests(void); |
| if (wps_module_tests() < 0) |
| ret = -1; |
| } |
| #endif /* CONFIG_WPS */ |
| |
| { |
| int utils_module_tests(void); |
| if (utils_module_tests() < 0) |
| ret = -1; |
| } |
| |
| { |
| int common_module_tests(void); |
| if (common_module_tests() < 0) |
| ret = -1; |
| } |
| |
| { |
| int crypto_module_tests(void); |
| if (crypto_module_tests() < 0) |
| ret = -1; |
| } |
| |
| return ret; |
| } |