summaryrefslogtreecommitdiffstats
path: root/test/packettest.c
diff options
context:
space:
mode:
authorEmilia Kasper <emilia@openssl.org>2015-10-06 17:20:32 +0200
committerEmilia Kasper <emilia@openssl.org>2015-10-09 15:32:35 +0200
commit310115448188415e270bb0bef958c7c130939838 (patch)
tree4acce2a2cb0626327668858b21dc9f7811e803c5 /test/packettest.c
parentFix Windows build (diff)
downloadopenssl-310115448188415e270bb0bef958c7c130939838.tar.xz
openssl-310115448188415e270bb0bef958c7c130939838.zip
DTLS: remove unused cookie field
Note that this commit constifies a user callback parameter and therefore will break compilation for applications using this callback. But unless they are abusing write access to the buffer, the fix is trivial. Reviewed-by: Andy Polyakov <appro@openssl.org>
Diffstat (limited to 'test/packettest.c')
-rw-r--r--test/packettest.c20
1 files changed, 20 insertions, 0 deletions
diff --git a/test/packettest.c b/test/packettest.c
index edaa2824ba..ac360f59bd 100644
--- a/test/packettest.c
+++ b/test/packettest.c
@@ -360,6 +360,25 @@ static int test_PACKET_null_init()
return 1;
}
+static int test_PACKET_equal(unsigned char buf[BUF_LEN])
+{
+ PACKET pkt;
+
+ if ( !PACKET_buf_init(&pkt, buf, 4)
+ || !PACKET_equal(&pkt, buf, 4)
+ || PACKET_equal(&pkt, buf + 1, 4)
+ || !PACKET_buf_init(&pkt, buf, BUF_LEN)
+ || !PACKET_equal(&pkt, buf, BUF_LEN)
+ || PACKET_equal(&pkt, buf, BUF_LEN - 1)
+ || PACKET_equal(&pkt, buf, BUF_LEN + 1)
+ || PACKET_equal(&pkt, buf, 0)) {
+ fprintf(stderr, "test_PACKET_equal() failed\n");
+ return 0;
+ }
+
+ return 1;
+}
+
static int test_PACKET_get_length_prefixed_1()
{
unsigned char buf[BUF_LEN];
@@ -452,6 +471,7 @@ int main(int argc, char **argv)
if ( !test_PACKET_buf_init()
|| !test_PACKET_null_init()
|| !test_PACKET_remaining(buf)
+ || !test_PACKET_equal(buf)
|| !test_PACKET_get_1(buf)
|| !test_PACKET_get_4(buf)
|| !test_PACKET_get_net_2(buf)