mirror of
https://github.com/samba-team/samba.git
synced 2024-12-24 21:34:56 +03:00
194faa7616
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14127 Signed-off-by: Ralph Boehme <slow@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
152 lines
4.7 KiB
C
152 lines
4.7 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
util time testing
|
|
|
|
Copyright (C) Jelmer Vernooij <jelmer@samba.org> 2008
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "torture/torture.h"
|
|
#include "torture/local/proto.h"
|
|
|
|
static bool test_null_time(struct torture_context *tctx)
|
|
{
|
|
torture_assert(tctx, null_time(0), "0");
|
|
torture_assert(tctx, null_time(0xFFFFFFFF), "0xFFFFFFFF");
|
|
torture_assert(tctx, null_time(-1), "-1");
|
|
torture_assert(tctx, !null_time(42), "42");
|
|
return true;
|
|
}
|
|
|
|
static bool test_null_nttime(struct torture_context *tctx)
|
|
{
|
|
torture_assert(tctx, null_nttime(0), "0");
|
|
torture_assert(tctx, !null_nttime(NTTIME_FREEZE), "-1");
|
|
torture_assert(tctx, !null_nttime(NTTIME_THAW), "-2");
|
|
torture_assert(tctx, !null_nttime(42), "42");
|
|
return true;
|
|
}
|
|
|
|
|
|
static bool test_http_timestring(struct torture_context *tctx)
|
|
{
|
|
const char *start = "Thu, 01 Jan 1970";
|
|
char *result;
|
|
/*
|
|
* Correct test for negative UTC offset. Without the correction, the
|
|
* test fails when run on hosts with negative UTC offsets, as the date
|
|
* returned is back in 1969 (pre-epoch).
|
|
*/
|
|
time_t now = time(NULL);
|
|
struct tm local = *localtime(&now);
|
|
struct tm gmt = *gmtime(&now);
|
|
time_t utc_offset = mktime(&local) - mktime(&gmt);
|
|
|
|
result = http_timestring(tctx, 42 - (utc_offset < 0 ? utc_offset : 0));
|
|
torture_assert(tctx, !strncmp(start, result,
|
|
strlen(start)), result);
|
|
torture_assert_str_equal(tctx, "never",
|
|
http_timestring(tctx, get_time_t_max()), "42");
|
|
return true;
|
|
}
|
|
|
|
static bool test_timestring(struct torture_context *tctx)
|
|
{
|
|
const char *start = "Thu Jan 1";
|
|
char *result;
|
|
/*
|
|
* Correct test for negative UTC offset. Without the correction, the
|
|
* test fails when run on hosts with negative UTC offsets, as the date
|
|
* returned is back in 1969 (pre-epoch).
|
|
*/
|
|
time_t now = time(NULL);
|
|
struct tm local = *localtime(&now);
|
|
struct tm gmt = *gmtime(&now);
|
|
time_t utc_offset = mktime(&local) - mktime(&gmt);
|
|
|
|
result = timestring(tctx, 42 - (utc_offset < 0 ? utc_offset : 0));
|
|
torture_assert(tctx, !strncmp(start, result, strlen(start)), result);
|
|
return true;
|
|
}
|
|
|
|
static bool test_normalize_timespec(struct torture_context *tctx)
|
|
{
|
|
const struct {
|
|
time_t in_s; long in_ns;
|
|
time_t out_s; long out_ns;
|
|
} data [] = {
|
|
{ 0, 0, 0, 0 }
|
|
, { 1, 0, 1, 0 }
|
|
, { -1, 0, -1, 0 }
|
|
, { 0, 1000000000, 1, 0 }
|
|
, { 0, 2000000000, 2, 0 }
|
|
, { 0, 1000000001, 1, 1 }
|
|
, { 0, 2000000001, 2, 1 }
|
|
, { 0, -1000000000, -1, 0 }
|
|
, { 0, -2000000000, -2, 0 }
|
|
, { 0, -1000000001, -2, 999999999 }
|
|
, { 0, -2000000001, -3, 999999999 }
|
|
, { 0, -1, -1, 999999999 }
|
|
, { 1, -1, 0, 999999999 }
|
|
, { -1, -1, -2, 999999999 }
|
|
, { 0, 999999999, 0, 999999999 }
|
|
, { 0, 1999999999, 1, 999999999 }
|
|
, { 0, 2999999999, 2, 999999999 }
|
|
, { 0, -999999999, -1, 1 }
|
|
, { 0, -1999999999, -2, 1 }
|
|
, { 0, -2999999999, -3, 1 }
|
|
, { LONG_MAX, 1000000001, LONG_MAX, 999999999 } /* overflow */
|
|
, { LONG_MAX, 999999999, LONG_MAX, 999999999 } /* harmless */
|
|
, { LONG_MAX, -1, LONG_MAX-1, 999999999 } /* -1 */
|
|
, { LONG_MIN, -1000000001, LONG_MIN, 0 } /* overflow */
|
|
, { LONG_MIN, 0, LONG_MIN, 0 } /* harmless */
|
|
, { LONG_MIN, 1000000000, LONG_MIN+1, 0 } /* +1 */
|
|
};
|
|
int i;
|
|
|
|
for (i = 0; i < sizeof(data) / sizeof(data[0]); ++i) {
|
|
struct timespec ts = (struct timespec)
|
|
{ .tv_sec = data[i].in_s
|
|
, .tv_nsec = data[i].in_ns };
|
|
|
|
normalize_timespec(&ts);
|
|
|
|
torture_assert_int_equal(tctx, ts.tv_sec, data[i].out_s,
|
|
"mismatch in tv_sec");
|
|
torture_assert_int_equal(tctx, ts.tv_nsec, data[i].out_ns,
|
|
"mismatch in tv_nsec");
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
struct torture_suite *torture_local_util_time(TALLOC_CTX *mem_ctx)
|
|
{
|
|
struct torture_suite *suite = torture_suite_create(mem_ctx, "time");
|
|
|
|
torture_suite_add_simple_test(suite, "null_time", test_null_time);
|
|
torture_suite_add_simple_test(suite, "null_nttime", test_null_nttime);
|
|
torture_suite_add_simple_test(suite, "http_timestring",
|
|
test_http_timestring);
|
|
torture_suite_add_simple_test(suite, "timestring",
|
|
test_timestring);
|
|
torture_suite_add_simple_test(suite, "normalize_timespec",
|
|
test_normalize_timespec);
|
|
|
|
return suite;
|
|
}
|