mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-24 16:28:23 -05:00
bbbb3c04ef
This change adds some barebones tests for new blacklisting functionality to wpas_module_tests.c. The tests ensure some basic functionality for the functions wpa_blacklist_is_blacklisted() and wpa_blacklist_update(). Signed-off-by: Kevin Lund <kglund@google.com> Signed-off-by: Brian Norris <briannorris@chromium.org>
115 lines
3.1 KiB
C
115 lines
3.1 KiB
C
/*
|
|
* wpa_supplicant module tests
|
|
* Copyright (c) 2014, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "utils/module_tests.h"
|
|
#include "wpa_supplicant_i.h"
|
|
#include "blacklist.h"
|
|
|
|
|
|
static int wpas_blacklist_module_tests(void)
|
|
{
|
|
struct wpa_supplicant wpa_s;
|
|
int ret = -1;
|
|
|
|
os_memset(&wpa_s, 0, sizeof(wpa_s));
|
|
|
|
wpa_blacklist_clear(&wpa_s);
|
|
|
|
if (wpa_blacklist_get(NULL, NULL) != NULL ||
|
|
wpa_blacklist_get(NULL, (u8 *) "123456") != NULL ||
|
|
wpa_blacklist_get(&wpa_s, NULL) != NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_add(NULL, NULL) == 0 ||
|
|
wpa_blacklist_add(NULL, (u8 *) "123456") == 0 ||
|
|
wpa_blacklist_add(&wpa_s, NULL) == 0)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_del(NULL, NULL) == 0 ||
|
|
wpa_blacklist_del(NULL, (u8 *) "123456") == 0 ||
|
|
wpa_blacklist_del(&wpa_s, NULL) == 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0)
|
|
goto fail;
|
|
|
|
if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "333333") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "xxxxxx") == 0 ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "xxxxxx") != NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "111111") == NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "222222") == NULL ||
|
|
wpa_blacklist_get(&wpa_s, (u8 *) "444444") == NULL ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "444444") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0)
|
|
goto fail;
|
|
|
|
wpa_blacklist_clear(&wpa_s);
|
|
|
|
if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 ||
|
|
!wpa_blacklist_is_blacklisted(&wpa_s, (u8 *) "111111") ||
|
|
wpa_blacklist_del(&wpa_s, (u8 *) "111111") < 0 ||
|
|
wpa_blacklist_is_blacklisted(&wpa_s, (u8 *) "111111") ||
|
|
wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0)
|
|
goto fail;
|
|
|
|
wpa_blacklist_update(&wpa_s);
|
|
|
|
if (!wpa_blacklist_is_blacklisted(&wpa_s, (u8 *) "111111"))
|
|
goto fail;
|
|
|
|
ret = 0;
|
|
fail:
|
|
wpa_blacklist_clear(&wpa_s);
|
|
|
|
if (ret)
|
|
wpa_printf(MSG_ERROR, "blacklist module test failure");
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int wpas_module_tests(void)
|
|
{
|
|
int ret = 0;
|
|
|
|
wpa_printf(MSG_INFO, "wpa_supplicant module tests");
|
|
|
|
if (wpas_blacklist_module_tests() < 0)
|
|
ret = -1;
|
|
|
|
#ifdef CONFIG_WPS
|
|
if (wps_module_tests() < 0)
|
|
ret = -1;
|
|
#endif /* CONFIG_WPS */
|
|
|
|
if (utils_module_tests() < 0)
|
|
ret = -1;
|
|
|
|
if (common_module_tests() < 0)
|
|
ret = -1;
|
|
|
|
if (crypto_module_tests() < 0)
|
|
ret = -1;
|
|
|
|
return ret;
|
|
}
|