]> git.ipfire.org Git - thirdparty/hostap.git/blame - wpa_supplicant/wpas_module_tests.c
EAP: Increase the maximum number of message exchanges
[thirdparty/hostap.git] / wpa_supplicant / wpas_module_tests.c
CommitLineData
ea449b5b
JM
1/*
2 * wpa_supplicant module tests
3 * Copyright (c) 2014, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9#include "utils/includes.h"
10
11#include "utils/common.h"
50a17a76 12#include "utils/module_tests.h"
da60d9c1
JM
13#include "wpa_supplicant_i.h"
14#include "blacklist.h"
15
16
17static int wpas_blacklist_module_tests(void)
18{
19 struct wpa_supplicant wpa_s;
20 int ret = -1;
21
22 os_memset(&wpa_s, 0, sizeof(wpa_s));
23
24 wpa_blacklist_clear(&wpa_s);
25
26 if (wpa_blacklist_get(NULL, NULL) != NULL ||
27 wpa_blacklist_get(NULL, (u8 *) "123456") != NULL ||
28 wpa_blacklist_get(&wpa_s, NULL) != NULL ||
29 wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL)
30 goto fail;
31
32 if (wpa_blacklist_add(NULL, NULL) == 0 ||
33 wpa_blacklist_add(NULL, (u8 *) "123456") == 0 ||
34 wpa_blacklist_add(&wpa_s, NULL) == 0)
35 goto fail;
36
37 if (wpa_blacklist_del(NULL, NULL) == 0 ||
38 wpa_blacklist_del(NULL, (u8 *) "123456") == 0 ||
39 wpa_blacklist_del(&wpa_s, NULL) == 0 ||
40 wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0)
41 goto fail;
42
43 if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
44 wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
45 wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
46 wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
47 wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
48 wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 ||
49 wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 ||
50 wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL ||
51 wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL ||
52 wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL ||
53 wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL ||
54 wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
55 wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 ||
56 wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 ||
57 wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
58 wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
59 wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0)
60 goto fail;
61
62 ret = 0;
63fail:
64 wpa_blacklist_clear(&wpa_s);
65
66 if (ret)
67 wpa_printf(MSG_ERROR, "blacklist module test failure");
68
69 return ret;
70}
71
ea449b5b
JM
72
73int wpas_module_tests(void)
74{
3cdcb3a4
JM
75 int ret = 0;
76
ea449b5b 77 wpa_printf(MSG_INFO, "wpa_supplicant module tests");
3cdcb3a4 78
da60d9c1
JM
79 if (wpas_blacklist_module_tests() < 0)
80 ret = -1;
81
3cdcb3a4 82#ifdef CONFIG_WPS
50a17a76
JM
83 if (wps_module_tests() < 0)
84 ret = -1;
3cdcb3a4
JM
85#endif /* CONFIG_WPS */
86
50a17a76
JM
87 if (utils_module_tests() < 0)
88 ret = -1;
89
90 if (common_module_tests() < 0)
91 ret = -1;
92
93 if (crypto_module_tests() < 0)
94 ret = -1;
942b7546 95
3cdcb3a4 96 return ret;
ea449b5b 97}