diff options
author | Christian Grothoff <christian@grothoff.org> | 2009-02-02 06:57:28 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2009-02-02 06:57:28 +0000 |
commit | cdc246a32e3efdf3293e97f833a89d2d517df3ea (patch) | |
tree | 0e213fe7be0981f8643a6bd746237175dccc87a8 | |
parent | 5ac46a90dfdf4125d03d3b605d2b7aed604a8a59 (diff) | |
download | libmicrohttpd-cdc246a32e3efdf3293e97f833a89d2d517df3ea.tar.gz libmicrohttpd-cdc246a32e3efdf3293e97f833a89d2d517df3ea.zip |
minor bugfixes in testcases
-rw-r--r-- | src/testcurl/https/mhds_get_test.c | 20 | ||||
-rw-r--r-- | src/testcurl/https/mhds_multi_daemon_test.c | 7 | ||||
-rw-r--r-- | src/testcurl/https/tls_alert_test.c | 18 | ||||
-rw-r--r-- | src/testcurl/https/tls_authentication_test.c | 19 | ||||
-rw-r--r-- | src/testcurl/https/tls_cipher_change_test.c | 11 | ||||
-rw-r--r-- | src/testcurl/https/tls_daemon_options_test.c | 13 | ||||
-rw-r--r-- | src/testcurl/https/tls_multi_thread_mode_test.c | 1 | ||||
-rw-r--r-- | src/testcurl/https/tls_session_time_out_test.c | 7 |
8 files changed, 69 insertions, 27 deletions
diff --git a/src/testcurl/https/mhds_get_test.c b/src/testcurl/https/mhds_get_test.c index 302c6e9a..9b2f9519 100644 --- a/src/testcurl/https/mhds_get_test.c +++ b/src/testcurl/https/mhds_get_test.c | |||
@@ -147,22 +147,19 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
147 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; | 147 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; |
148 | if (NULL == (doc_path = malloc (doc_path_len))) | 148 | if (NULL == (doc_path = malloc (doc_path_len))) |
149 | { | 149 | { |
150 | fclose (test_fd); | ||
151 | fprintf (stderr, MHD_E_MEM); | 150 | fprintf (stderr, MHD_E_MEM); |
152 | return -1; | 151 | return -1; |
153 | } | 152 | } |
154 | if (getcwd (doc_path, doc_path_len) == NULL) | 153 | if (getcwd (doc_path, doc_path_len) == NULL) |
155 | { | 154 | { |
156 | fclose (test_fd); | ||
157 | free (doc_path); | ||
158 | fprintf (stderr, "Error: failed to get working directory. %s\n", | 155 | fprintf (stderr, "Error: failed to get working directory. %s\n", |
159 | strerror (errno)); | 156 | strerror (errno)); |
157 | free (doc_path); | ||
160 | return -1; | 158 | return -1; |
161 | } | 159 | } |
162 | 160 | ||
163 | if (NULL == (mem_test_file_local = malloc (len))) | 161 | if (NULL == (mem_test_file_local = malloc (len))) |
164 | { | 162 | { |
165 | fclose (test_fd); | ||
166 | fprintf (stderr, MHD_E_MEM); | 163 | fprintf (stderr, MHD_E_MEM); |
167 | return -1; | 164 | return -1; |
168 | } | 165 | } |
@@ -170,15 +167,17 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
170 | fseek (test_fd, 0, SEEK_SET); | 167 | fseek (test_fd, 0, SEEK_SET); |
171 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) | 168 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) |
172 | { | 169 | { |
173 | fclose (test_fd); | 170 | free (mem_test_file_local); |
171 | free (doc_path); | ||
174 | fprintf (stderr, "Error: failed to read test file. %s\n", | 172 | fprintf (stderr, "Error: failed to read test file. %s\n", |
175 | strerror (errno)); | 173 | strerror (errno)); |
176 | return -1; | 174 | return -1; |
177 | } | 175 | } |
178 | 176 | ||
179 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) | 177 | if (NULL == (cbc.buf = malloc (len))) |
180 | { | 178 | { |
181 | fclose (test_fd); | 179 | free (mem_test_file_local); |
180 | free (doc_path); | ||
182 | fprintf (stderr, MHD_E_MEM); | 181 | fprintf (stderr, MHD_E_MEM); |
183 | return -1; | 182 | return -1; |
184 | } | 183 | } |
@@ -219,6 +218,9 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
219 | fprintf (stderr, "curl_easy_perform failed: `%s'\n", | 218 | fprintf (stderr, "curl_easy_perform failed: `%s'\n", |
220 | curl_easy_strerror (errornum)); | 219 | curl_easy_strerror (errornum)); |
221 | curl_easy_cleanup (c); | 220 | curl_easy_cleanup (c); |
221 | free (mem_test_file_local); | ||
222 | free (doc_path); | ||
223 | free (cbc.buf); | ||
222 | return errornum; | 224 | return errornum; |
223 | } | 225 | } |
224 | 226 | ||
@@ -229,6 +231,7 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
229 | fprintf (stderr, "Error: local file & received file differ.\n"); | 231 | fprintf (stderr, "Error: local file & received file differ.\n"); |
230 | free (cbc.buf); | 232 | free (cbc.buf); |
231 | free (mem_test_file_local); | 233 | free (mem_test_file_local); |
234 | free (doc_path); | ||
232 | return -1; | 235 | return -1; |
233 | } | 236 | } |
234 | 237 | ||
@@ -281,12 +284,14 @@ setupTestFile () | |||
281 | { | 284 | { |
282 | fprintf (stderr, "Error: failed to write `%s. %s'\n", | 285 | fprintf (stderr, "Error: failed to write `%s. %s'\n", |
283 | test_file_name, strerror (errno)); | 286 | test_file_name, strerror (errno)); |
287 | fclose (test_fd); | ||
284 | return NULL; | 288 | return NULL; |
285 | } | 289 | } |
286 | if (fflush (test_fd)) | 290 | if (fflush (test_fd)) |
287 | { | 291 | { |
288 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", | 292 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", |
289 | strerror (errno)); | 293 | strerror (errno)); |
294 | fclose (test_fd); | ||
290 | return NULL; | 295 | return NULL; |
291 | } | 296 | } |
292 | 297 | ||
@@ -341,6 +346,7 @@ main (int argc, char *const *argv) | |||
341 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) | 346 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) |
342 | { | 347 | { |
343 | fprintf (stderr, "Error: %s\n", strerror (errno)); | 348 | fprintf (stderr, "Error: %s\n", strerror (errno)); |
349 | fclose (test_fd); | ||
344 | return -1; | 350 | return -1; |
345 | } | 351 | } |
346 | 352 | ||
diff --git a/src/testcurl/https/mhds_multi_daemon_test.c b/src/testcurl/https/mhds_multi_daemon_test.c index b462cdd7..69598d8f 100644 --- a/src/testcurl/https/mhds_multi_daemon_test.c +++ b/src/testcurl/https/mhds_multi_daemon_test.c | |||
@@ -143,13 +143,11 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version, | |||
143 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; | 143 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; |
144 | if (NULL == (doc_path = malloc (doc_path_len))) | 144 | if (NULL == (doc_path = malloc (doc_path_len))) |
145 | { | 145 | { |
146 | fclose (test_fd); | ||
147 | fprintf (stderr, MHD_E_MEM); | 146 | fprintf (stderr, MHD_E_MEM); |
148 | return -1; | 147 | return -1; |
149 | } | 148 | } |
150 | if (getcwd (doc_path, doc_path_len) == NULL) | 149 | if (getcwd (doc_path, doc_path_len) == NULL) |
151 | { | 150 | { |
152 | fclose (test_fd); | ||
153 | free (doc_path); | 151 | free (doc_path); |
154 | fprintf (stderr, "Error: failed to get working directory. %s\n", | 152 | fprintf (stderr, "Error: failed to get working directory. %s\n", |
155 | strerror (errno)); | 153 | strerror (errno)); |
@@ -160,7 +158,6 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version, | |||
160 | fseek (test_fd, 0, SEEK_SET); | 158 | fseek (test_fd, 0, SEEK_SET); |
161 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) | 159 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) |
162 | { | 160 | { |
163 | fclose (test_fd); | ||
164 | fprintf (stderr, "Error: failed to read test file. %s\n", | 161 | fprintf (stderr, "Error: failed to read test file. %s\n", |
165 | strerror (errno)); | 162 | strerror (errno)); |
166 | return -1; | 163 | return -1; |
@@ -168,7 +165,6 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version, | |||
168 | 165 | ||
169 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) | 166 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) |
170 | { | 167 | { |
171 | fclose (test_fd); | ||
172 | fprintf (stderr, "Error: failed to read test file. %s\n", | 168 | fprintf (stderr, "Error: failed to read test file. %s\n", |
173 | strerror (errno)); | 169 | strerror (errno)); |
174 | return -1; | 170 | return -1; |
@@ -294,12 +290,14 @@ setupTestFile () | |||
294 | { | 290 | { |
295 | fprintf (stderr, "Error: failed to write `%s. %s'\n", | 291 | fprintf (stderr, "Error: failed to write `%s. %s'\n", |
296 | test_file_name, strerror (errno)); | 292 | test_file_name, strerror (errno)); |
293 | fclose (test_fd); | ||
297 | return NULL; | 294 | return NULL; |
298 | } | 295 | } |
299 | if (fflush (test_fd)) | 296 | if (fflush (test_fd)) |
300 | { | 297 | { |
301 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", | 298 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", |
302 | strerror (errno)); | 299 | strerror (errno)); |
300 | fclose (test_fd); | ||
303 | return NULL; | 301 | return NULL; |
304 | } | 302 | } |
305 | 303 | ||
@@ -327,6 +325,7 @@ main (int argc, char *const *argv) | |||
327 | { | 325 | { |
328 | fprintf (stderr, "Error (code: %u). l:%d f:%s\n", errorCount, __LINE__, | 326 | fprintf (stderr, "Error (code: %u). l:%d f:%s\n", errorCount, __LINE__, |
329 | __FUNCTION__); | 327 | __FUNCTION__); |
328 | fclose (test_fd); | ||
330 | return -1; | 329 | return -1; |
331 | } | 330 | } |
332 | 331 | ||
diff --git a/src/testcurl/https/tls_alert_test.c b/src/testcurl/https/tls_alert_test.c index cb04d699..cbb2cf20 100644 --- a/src/testcurl/https/tls_alert_test.c +++ b/src/testcurl/https/tls_alert_test.c | |||
@@ -62,7 +62,7 @@ setup (MHD_gtls_session_t * session, | |||
62 | MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) | 62 | MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) |
63 | { | 63 | { |
64 | int ret; | 64 | int ret; |
65 | const char **err_pos; | 65 | const char *err_pos; |
66 | 66 | ||
67 | MHD__gnutls_certificate_allocate_credentials (xcred); | 67 | MHD__gnutls_certificate_allocate_credentials (xcred); |
68 | 68 | ||
@@ -74,7 +74,7 @@ setup (MHD_gtls_session_t * session, | |||
74 | GNUTLS_X509_FMT_PEM); | 74 | GNUTLS_X509_FMT_PEM); |
75 | 75 | ||
76 | MHD__gnutls_init (session, GNUTLS_CLIENT); | 76 | MHD__gnutls_init (session, GNUTLS_CLIENT); |
77 | ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", err_pos); | 77 | ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", &err_pos); |
78 | if (ret < 0) | 78 | if (ret < 0) |
79 | { | 79 | { |
80 | return -1; | 80 | return -1; |
@@ -112,6 +112,13 @@ test_alert_close_notify (MHD_gtls_session_t session) | |||
112 | struct sockaddr_in sa; | 112 | struct sockaddr_in sa; |
113 | 113 | ||
114 | sd = socket (AF_INET, SOCK_STREAM, 0); | 114 | sd = socket (AF_INET, SOCK_STREAM, 0); |
115 | if (sd == -1) | ||
116 | { | ||
117 | fprintf(stderr, | ||
118 | "Failed to create socket: %s\n", | ||
119 | strerror(errno)); | ||
120 | return -1; | ||
121 | } | ||
115 | memset (&sa, '\0', sizeof (struct sockaddr_in)); | 122 | memset (&sa, '\0', sizeof (struct sockaddr_in)); |
116 | sa.sin_family = AF_INET; | 123 | sa.sin_family = AF_INET; |
117 | sa.sin_port = htons (42433); | 124 | sa.sin_port = htons (42433); |
@@ -161,6 +168,13 @@ test_alert_unexpected_message (MHD_gtls_session_t session) | |||
161 | struct sockaddr_in sa; | 168 | struct sockaddr_in sa; |
162 | 169 | ||
163 | sd = socket (AF_INET, SOCK_STREAM, 0); | 170 | sd = socket (AF_INET, SOCK_STREAM, 0); |
171 | if (sd == -1) | ||
172 | { | ||
173 | fprintf(stderr, | ||
174 | "Failed to create socket: %s\n", | ||
175 | strerror(errno)); | ||
176 | return -1; | ||
177 | } | ||
164 | memset (&sa, '\0', sizeof (struct sockaddr_in)); | 178 | memset (&sa, '\0', sizeof (struct sockaddr_in)); |
165 | sa.sin_family = AF_INET; | 179 | sa.sin_family = AF_INET; |
166 | sa.sin_port = htons (42433); | 180 | sa.sin_port = htons (42433); |
diff --git a/src/testcurl/https/tls_authentication_test.c b/src/testcurl/https/tls_authentication_test.c index 900d20de..7f576654 100644 --- a/src/testcurl/https/tls_authentication_test.c +++ b/src/testcurl/https/tls_authentication_test.c | |||
@@ -144,39 +144,39 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
144 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; | 144 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; |
145 | if (NULL == (doc_path = malloc (doc_path_len))) | 145 | if (NULL == (doc_path = malloc (doc_path_len))) |
146 | { | 146 | { |
147 | fclose (test_fd); | ||
148 | fprintf (stderr, MHD_E_MEM); | 147 | fprintf (stderr, MHD_E_MEM); |
149 | return -1; | 148 | return -1; |
150 | } | 149 | } |
151 | if (getcwd (doc_path, doc_path_len) == NULL) | 150 | if (getcwd (doc_path, doc_path_len) == NULL) |
152 | { | 151 | { |
153 | fclose (test_fd); | ||
154 | free (doc_path); | ||
155 | fprintf (stderr, "Error: failed to get working directory. %s\n", | 152 | fprintf (stderr, "Error: failed to get working directory. %s\n", |
156 | strerror (errno)); | 153 | strerror (errno)); |
154 | free (doc_path); | ||
157 | return -1; | 155 | return -1; |
158 | } | 156 | } |
159 | 157 | ||
160 | if (NULL == (mem_test_file_local = malloc (len))) | 158 | if (NULL == (mem_test_file_local = malloc (len))) |
161 | { | 159 | { |
162 | fclose (test_fd); | ||
163 | fprintf (stderr, MHD_E_MEM); | 160 | fprintf (stderr, MHD_E_MEM); |
161 | free (doc_path); | ||
164 | return -1; | 162 | return -1; |
165 | } | 163 | } |
166 | 164 | ||
167 | fseek (test_fd, 0, SEEK_SET); | 165 | fseek (test_fd, 0, SEEK_SET); |
168 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) | 166 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) |
169 | { | 167 | { |
170 | fclose (test_fd); | ||
171 | fprintf (stderr, "Error: failed to read test file. %s\n", | 168 | fprintf (stderr, "Error: failed to read test file. %s\n", |
172 | strerror (errno)); | 169 | strerror (errno)); |
170 | free (doc_path); | ||
171 | free (mem_test_file_local); | ||
173 | return -1; | 172 | return -1; |
174 | } | 173 | } |
175 | 174 | ||
176 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) | 175 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) |
177 | { | 176 | { |
178 | fclose (test_fd); | ||
179 | fprintf (stderr, MHD_E_MEM); | 177 | fprintf (stderr, MHD_E_MEM); |
178 | free (doc_path); | ||
179 | free (mem_test_file_local); | ||
180 | return -1; | 180 | return -1; |
181 | } | 181 | } |
182 | cbc.size = len; | 182 | cbc.size = len; |
@@ -218,6 +218,9 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
218 | fprintf (stderr, "curl_easy_perform failed: `%s'\n", | 218 | fprintf (stderr, "curl_easy_perform failed: `%s'\n", |
219 | curl_easy_strerror (errornum)); | 219 | curl_easy_strerror (errornum)); |
220 | curl_easy_cleanup (c); | 220 | curl_easy_cleanup (c); |
221 | free (cbc.buf); | ||
222 | free (doc_path); | ||
223 | free (mem_test_file_local); | ||
221 | return errornum; | 224 | return errornum; |
222 | } | 225 | } |
223 | 226 | ||
@@ -228,6 +231,7 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version) | |||
228 | fprintf (stderr, "Error: local file & received file differ.\n"); | 231 | fprintf (stderr, "Error: local file & received file differ.\n"); |
229 | free (cbc.buf); | 232 | free (cbc.buf); |
230 | free (mem_test_file_local); | 233 | free (mem_test_file_local); |
234 | free (doc_path); | ||
231 | return -1; | 235 | return -1; |
232 | } | 236 | } |
233 | 237 | ||
@@ -308,12 +312,14 @@ setup_ca_cert () | |||
308 | { | 312 | { |
309 | fprintf (stderr, "Error: failed to write `%s. %s'\n", | 313 | fprintf (stderr, "Error: failed to write `%s. %s'\n", |
310 | ca_cert_file_name, strerror (errno)); | 314 | ca_cert_file_name, strerror (errno)); |
315 | fclose (test_fd); | ||
311 | return NULL; | 316 | return NULL; |
312 | } | 317 | } |
313 | if (fflush (fd)) | 318 | if (fflush (fd)) |
314 | { | 319 | { |
315 | fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", | 320 | fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", |
316 | strerror (errno)); | 321 | strerror (errno)); |
322 | fclose (test_fd); | ||
317 | return NULL; | 323 | return NULL; |
318 | } | 324 | } |
319 | 325 | ||
@@ -342,6 +348,7 @@ main (int argc, char *const *argv) | |||
342 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) | 348 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) |
343 | { | 349 | { |
344 | fprintf (stderr, "Error (code: %u)\n", errorCount); | 350 | fprintf (stderr, "Error (code: %u)\n", errorCount); |
351 | fclose (test_fd); | ||
345 | return -1; | 352 | return -1; |
346 | } | 353 | } |
347 | 354 | ||
diff --git a/src/testcurl/https/tls_cipher_change_test.c b/src/testcurl/https/tls_cipher_change_test.c index 3c38e630..cb5b74c6 100644 --- a/src/testcurl/https/tls_cipher_change_test.c +++ b/src/testcurl/https/tls_cipher_change_test.c | |||
@@ -64,7 +64,7 @@ setup (MHD_gtls_session_t * session, | |||
64 | MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) | 64 | MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) |
65 | { | 65 | { |
66 | int ret; | 66 | int ret; |
67 | const char **err_pos; | 67 | const char *err_pos; |
68 | 68 | ||
69 | MHD__gnutls_certificate_allocate_credentials (xcred); | 69 | MHD__gnutls_certificate_allocate_credentials (xcred); |
70 | 70 | ||
@@ -76,7 +76,7 @@ setup (MHD_gtls_session_t * session, | |||
76 | GNUTLS_X509_FMT_PEM); | 76 | GNUTLS_X509_FMT_PEM); |
77 | 77 | ||
78 | MHD__gnutls_init (session, GNUTLS_CLIENT); | 78 | MHD__gnutls_init (session, GNUTLS_CLIENT); |
79 | ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", err_pos); | 79 | ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", &err_pos); |
80 | if (ret < 0) | 80 | if (ret < 0) |
81 | { | 81 | { |
82 | return -1; | 82 | return -1; |
@@ -116,6 +116,13 @@ test_out_of_context_cipher_change (MHD_gtls_session_t session) | |||
116 | struct sockaddr_in sa; | 116 | struct sockaddr_in sa; |
117 | 117 | ||
118 | sd = socket (AF_INET, SOCK_STREAM, 0); | 118 | sd = socket (AF_INET, SOCK_STREAM, 0); |
119 | if (sd == -1) | ||
120 | { | ||
121 | fprintf(stderr, | ||
122 | "Failed to create socket: %s\n", | ||
123 | strerror(errno)); | ||
124 | return -1; | ||
125 | } | ||
119 | memset (&sa, '\0', sizeof (struct sockaddr_in)); | 126 | memset (&sa, '\0', sizeof (struct sockaddr_in)); |
120 | sa.sin_family = AF_INET; | 127 | sa.sin_family = AF_INET; |
121 | sa.sin_port = htons (42433); | 128 | sa.sin_port = htons (42433); |
diff --git a/src/testcurl/https/tls_daemon_options_test.c b/src/testcurl/https/tls_daemon_options_test.c index a0d8af97..f24ff4f9 100644 --- a/src/testcurl/https/tls_daemon_options_test.c +++ b/src/testcurl/https/tls_daemon_options_test.c | |||
@@ -160,39 +160,37 @@ test_https_transfer (FILE * test_fd, char *cipher_suite, int proto_version) | |||
160 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; | 160 | doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; |
161 | if (NULL == (doc_path = malloc (doc_path_len))) | 161 | if (NULL == (doc_path = malloc (doc_path_len))) |
162 | { | 162 | { |
163 | fclose (test_fd); | ||
164 | fprintf (stderr, MHD_E_MEM); | 163 | fprintf (stderr, MHD_E_MEM); |
165 | return -1; | 164 | return -1; |
166 | } | 165 | } |
167 | if (getcwd (doc_path, doc_path_len) == NULL) | 166 | if (getcwd (doc_path, doc_path_len) == NULL) |
168 | { | 167 | { |
169 | fclose (test_fd); | ||
170 | free (doc_path); | ||
171 | fprintf (stderr, "Error: failed to get working directory. %s\n", | 168 | fprintf (stderr, "Error: failed to get working directory. %s\n", |
172 | strerror (errno)); | 169 | strerror (errno)); |
170 | free (doc_path); | ||
173 | return -1; | 171 | return -1; |
174 | } | 172 | } |
175 | 173 | ||
176 | if (NULL == (mem_test_file_local = malloc (len))) | 174 | if (NULL == (mem_test_file_local = malloc (len))) |
177 | { | 175 | { |
178 | fclose (test_fd); | ||
179 | fprintf (stderr, MHD_E_MEM); | 176 | fprintf (stderr, MHD_E_MEM); |
177 | free (doc_path); | ||
180 | return -1; | 178 | return -1; |
181 | } | 179 | } |
182 | 180 | ||
183 | fseek (test_fd, 0, SEEK_SET); | 181 | fseek (test_fd, 0, SEEK_SET); |
184 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) | 182 | if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) |
185 | { | 183 | { |
186 | fclose (test_fd); | ||
187 | fprintf (stderr, "Error: failed to read test file. %s\n", | 184 | fprintf (stderr, "Error: failed to read test file. %s\n", |
188 | strerror (errno)); | 185 | strerror (errno)); |
186 | free (doc_path); | ||
189 | return -1; | 187 | return -1; |
190 | } | 188 | } |
191 | 189 | ||
192 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) | 190 | if (NULL == (cbc.buf = malloc (sizeof (char) * len))) |
193 | { | 191 | { |
194 | fclose (test_fd); | ||
195 | fprintf (stderr, MHD_E_MEM); | 192 | fprintf (stderr, MHD_E_MEM); |
193 | free (doc_path); | ||
196 | return -1; | 194 | return -1; |
197 | } | 195 | } |
198 | cbc.size = len; | 196 | cbc.size = len; |
@@ -267,12 +265,14 @@ setupTestFile () | |||
267 | { | 265 | { |
268 | fprintf (stderr, "Error: failed to write `%s. %s'\n", | 266 | fprintf (stderr, "Error: failed to write `%s. %s'\n", |
269 | test_file_name, strerror (errno)); | 267 | test_file_name, strerror (errno)); |
268 | fclose (test_fd); | ||
270 | return NULL; | 269 | return NULL; |
271 | } | 270 | } |
272 | if (fflush (test_fd)) | 271 | if (fflush (test_fd)) |
273 | { | 272 | { |
274 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", | 273 | fprintf (stderr, "Error: failed to flush test file stream. %s\n", |
275 | strerror (errno)); | 274 | strerror (errno)); |
275 | fclose (test_fd); | ||
276 | return NULL; | 276 | return NULL; |
277 | } | 277 | } |
278 | 278 | ||
@@ -406,6 +406,7 @@ main (int argc, char *const *argv) | |||
406 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) | 406 | if (0 != curl_global_init (CURL_GLOBAL_ALL)) |
407 | { | 407 | { |
408 | fprintf (stderr, "Error: %s\n", strerror (errno)); | 408 | fprintf (stderr, "Error: %s\n", strerror (errno)); |
409 | fclose (test_fd); | ||
409 | return -1; | 410 | return -1; |
410 | } | 411 | } |
411 | 412 | ||
diff --git a/src/testcurl/https/tls_multi_thread_mode_test.c b/src/testcurl/https/tls_multi_thread_mode_test.c index 5b0533fb..e0c0a304 100644 --- a/src/testcurl/https/tls_multi_thread_mode_test.c +++ b/src/testcurl/https/tls_multi_thread_mode_test.c | |||
@@ -189,6 +189,7 @@ test_https_transfer (FILE * test_fd, char *cipher_suite, int proto_version) | |||
189 | { | 189 | { |
190 | fclose (test_fd); | 190 | fclose (test_fd); |
191 | free (doc_path); | 191 | free (doc_path); |
192 | free (mem_test_file_local); | ||
192 | fprintf (stderr, "Error: failed to read test file. %s\n", | 193 | fprintf (stderr, "Error: failed to read test file. %s\n", |
193 | strerror (errno)); | 194 | strerror (errno)); |
194 | return -1; | 195 | return -1; |
diff --git a/src/testcurl/https/tls_session_time_out_test.c b/src/testcurl/https/tls_session_time_out_test.c index b9661f33..97c7b74f 100644 --- a/src/testcurl/https/tls_session_time_out_test.c +++ b/src/testcurl/https/tls_session_time_out_test.c | |||
@@ -103,6 +103,13 @@ test_tls_session_time_out (MHD_gtls_session_t session) | |||
103 | struct sockaddr_in sa; | 103 | struct sockaddr_in sa; |
104 | 104 | ||
105 | sd = socket (AF_INET, SOCK_STREAM, 0); | 105 | sd = socket (AF_INET, SOCK_STREAM, 0); |
106 | if (sd == -1) | ||
107 | { | ||
108 | fprintf(stderr, | ||
109 | "Failed to create socket: %s\n", | ||
110 | strerror(errno)); | ||
111 | return -1; | ||
112 | } | ||
106 | memset (&sa, '\0', sizeof (struct sockaddr_in)); | 113 | memset (&sa, '\0', sizeof (struct sockaddr_in)); |
107 | sa.sin_family = AF_INET; | 114 | sa.sin_family = AF_INET; |
108 | sa.sin_port = htons (42433); | 115 | sa.sin_port = htons (42433); |