diff options
author | Emilia Kasper <emilia@openssl.org> | 2015-10-06 17:20:32 +0200 |
---|---|---|
committer | Emilia Kasper <emilia@openssl.org> | 2015-10-09 15:32:35 +0200 |
commit | 310115448188415e270bb0bef958c7c130939838 (patch) | |
tree | 4acce2a2cb0626327668858b21dc9f7811e803c5 /test/packettest.c | |
parent | Fix Windows build (diff) | |
download | openssl-310115448188415e270bb0bef958c7c130939838.tar.xz openssl-310115448188415e270bb0bef958c7c130939838.zip |
DTLS: remove unused cookie field
Note that this commit constifies a user callback parameter and therefore
will break compilation for applications using this callback. But unless
they are abusing write access to the buffer, the fix is trivial.
Reviewed-by: Andy Polyakov <appro@openssl.org>
Diffstat (limited to 'test/packettest.c')
-rw-r--r-- | test/packettest.c | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/test/packettest.c b/test/packettest.c index edaa2824ba..ac360f59bd 100644 --- a/test/packettest.c +++ b/test/packettest.c @@ -360,6 +360,25 @@ static int test_PACKET_null_init() return 1; } +static int test_PACKET_equal(unsigned char buf[BUF_LEN]) +{ + PACKET pkt; + + if ( !PACKET_buf_init(&pkt, buf, 4) + || !PACKET_equal(&pkt, buf, 4) + || PACKET_equal(&pkt, buf + 1, 4) + || !PACKET_buf_init(&pkt, buf, BUF_LEN) + || !PACKET_equal(&pkt, buf, BUF_LEN) + || PACKET_equal(&pkt, buf, BUF_LEN - 1) + || PACKET_equal(&pkt, buf, BUF_LEN + 1) + || PACKET_equal(&pkt, buf, 0)) { + fprintf(stderr, "test_PACKET_equal() failed\n"); + return 0; + } + + return 1; +} + static int test_PACKET_get_length_prefixed_1() { unsigned char buf[BUF_LEN]; @@ -452,6 +471,7 @@ int main(int argc, char **argv) if ( !test_PACKET_buf_init() || !test_PACKET_null_init() || !test_PACKET_remaining(buf) + || !test_PACKET_equal(buf) || !test_PACKET_get_1(buf) || !test_PACKET_get_4(buf) || !test_PACKET_get_net_2(buf) |