aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2009-02-02 06:57:28 +0000
committerChristian Grothoff <christian@grothoff.org>2009-02-02 06:57:28 +0000
commitcdc246a32e3efdf3293e97f833a89d2d517df3ea (patch)
tree0e213fe7be0981f8643a6bd746237175dccc87a8
parent5ac46a90dfdf4125d03d3b605d2b7aed604a8a59 (diff)
downloadlibmicrohttpd-cdc246a32e3efdf3293e97f833a89d2d517df3ea.tar.gz
libmicrohttpd-cdc246a32e3efdf3293e97f833a89d2d517df3ea.zip
minor bugfixes in testcases
-rw-r--r--src/testcurl/https/mhds_get_test.c20
-rw-r--r--src/testcurl/https/mhds_multi_daemon_test.c7
-rw-r--r--src/testcurl/https/tls_alert_test.c18
-rw-r--r--src/testcurl/https/tls_authentication_test.c19
-rw-r--r--src/testcurl/https/tls_cipher_change_test.c11
-rw-r--r--src/testcurl/https/tls_daemon_options_test.c13
-rw-r--r--src/testcurl/https/tls_multi_thread_mode_test.c1
-rw-r--r--src/testcurl/https/tls_session_time_out_test.c7
8 files changed, 69 insertions, 27 deletions
diff --git a/src/testcurl/https/mhds_get_test.c b/src/testcurl/https/mhds_get_test.c
index 302c6e9a..9b2f9519 100644
--- a/src/testcurl/https/mhds_get_test.c
+++ b/src/testcurl/https/mhds_get_test.c
@@ -147,22 +147,19 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
147 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; 147 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX;
148 if (NULL == (doc_path = malloc (doc_path_len))) 148 if (NULL == (doc_path = malloc (doc_path_len)))
149 { 149 {
150 fclose (test_fd);
151 fprintf (stderr, MHD_E_MEM); 150 fprintf (stderr, MHD_E_MEM);
152 return -1; 151 return -1;
153 } 152 }
154 if (getcwd (doc_path, doc_path_len) == NULL) 153 if (getcwd (doc_path, doc_path_len) == NULL)
155 { 154 {
156 fclose (test_fd);
157 free (doc_path);
158 fprintf (stderr, "Error: failed to get working directory. %s\n", 155 fprintf (stderr, "Error: failed to get working directory. %s\n",
159 strerror (errno)); 156 strerror (errno));
157 free (doc_path);
160 return -1; 158 return -1;
161 } 159 }
162 160
163 if (NULL == (mem_test_file_local = malloc (len))) 161 if (NULL == (mem_test_file_local = malloc (len)))
164 { 162 {
165 fclose (test_fd);
166 fprintf (stderr, MHD_E_MEM); 163 fprintf (stderr, MHD_E_MEM);
167 return -1; 164 return -1;
168 } 165 }
@@ -170,15 +167,17 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
170 fseek (test_fd, 0, SEEK_SET); 167 fseek (test_fd, 0, SEEK_SET);
171 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) 168 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len)
172 { 169 {
173 fclose (test_fd); 170 free (mem_test_file_local);
171 free (doc_path);
174 fprintf (stderr, "Error: failed to read test file. %s\n", 172 fprintf (stderr, "Error: failed to read test file. %s\n",
175 strerror (errno)); 173 strerror (errno));
176 return -1; 174 return -1;
177 } 175 }
178 176
179 if (NULL == (cbc.buf = malloc (sizeof (char) * len))) 177 if (NULL == (cbc.buf = malloc (len)))
180 { 178 {
181 fclose (test_fd); 179 free (mem_test_file_local);
180 free (doc_path);
182 fprintf (stderr, MHD_E_MEM); 181 fprintf (stderr, MHD_E_MEM);
183 return -1; 182 return -1;
184 } 183 }
@@ -219,6 +218,9 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
219 fprintf (stderr, "curl_easy_perform failed: `%s'\n", 218 fprintf (stderr, "curl_easy_perform failed: `%s'\n",
220 curl_easy_strerror (errornum)); 219 curl_easy_strerror (errornum));
221 curl_easy_cleanup (c); 220 curl_easy_cleanup (c);
221 free (mem_test_file_local);
222 free (doc_path);
223 free (cbc.buf);
222 return errornum; 224 return errornum;
223 } 225 }
224 226
@@ -229,6 +231,7 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
229 fprintf (stderr, "Error: local file & received file differ.\n"); 231 fprintf (stderr, "Error: local file & received file differ.\n");
230 free (cbc.buf); 232 free (cbc.buf);
231 free (mem_test_file_local); 233 free (mem_test_file_local);
234 free (doc_path);
232 return -1; 235 return -1;
233 } 236 }
234 237
@@ -281,12 +284,14 @@ setupTestFile ()
281 { 284 {
282 fprintf (stderr, "Error: failed to write `%s. %s'\n", 285 fprintf (stderr, "Error: failed to write `%s. %s'\n",
283 test_file_name, strerror (errno)); 286 test_file_name, strerror (errno));
287 fclose (test_fd);
284 return NULL; 288 return NULL;
285 } 289 }
286 if (fflush (test_fd)) 290 if (fflush (test_fd))
287 { 291 {
288 fprintf (stderr, "Error: failed to flush test file stream. %s\n", 292 fprintf (stderr, "Error: failed to flush test file stream. %s\n",
289 strerror (errno)); 293 strerror (errno));
294 fclose (test_fd);
290 return NULL; 295 return NULL;
291 } 296 }
292 297
@@ -341,6 +346,7 @@ main (int argc, char *const *argv)
341 if (0 != curl_global_init (CURL_GLOBAL_ALL)) 346 if (0 != curl_global_init (CURL_GLOBAL_ALL))
342 { 347 {
343 fprintf (stderr, "Error: %s\n", strerror (errno)); 348 fprintf (stderr, "Error: %s\n", strerror (errno));
349 fclose (test_fd);
344 return -1; 350 return -1;
345 } 351 }
346 352
diff --git a/src/testcurl/https/mhds_multi_daemon_test.c b/src/testcurl/https/mhds_multi_daemon_test.c
index b462cdd7..69598d8f 100644
--- a/src/testcurl/https/mhds_multi_daemon_test.c
+++ b/src/testcurl/https/mhds_multi_daemon_test.c
@@ -143,13 +143,11 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version,
143 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; 143 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX;
144 if (NULL == (doc_path = malloc (doc_path_len))) 144 if (NULL == (doc_path = malloc (doc_path_len)))
145 { 145 {
146 fclose (test_fd);
147 fprintf (stderr, MHD_E_MEM); 146 fprintf (stderr, MHD_E_MEM);
148 return -1; 147 return -1;
149 } 148 }
150 if (getcwd (doc_path, doc_path_len) == NULL) 149 if (getcwd (doc_path, doc_path_len) == NULL)
151 { 150 {
152 fclose (test_fd);
153 free (doc_path); 151 free (doc_path);
154 fprintf (stderr, "Error: failed to get working directory. %s\n", 152 fprintf (stderr, "Error: failed to get working directory. %s\n",
155 strerror (errno)); 153 strerror (errno));
@@ -160,7 +158,6 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version,
160 fseek (test_fd, 0, SEEK_SET); 158 fseek (test_fd, 0, SEEK_SET);
161 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) 159 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len)
162 { 160 {
163 fclose (test_fd);
164 fprintf (stderr, "Error: failed to read test file. %s\n", 161 fprintf (stderr, "Error: failed to read test file. %s\n",
165 strerror (errno)); 162 strerror (errno));
166 return -1; 163 return -1;
@@ -168,7 +165,6 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version,
168 165
169 if (NULL == (cbc.buf = malloc (sizeof (char) * len))) 166 if (NULL == (cbc.buf = malloc (sizeof (char) * len)))
170 { 167 {
171 fclose (test_fd);
172 fprintf (stderr, "Error: failed to read test file. %s\n", 168 fprintf (stderr, "Error: failed to read test file. %s\n",
173 strerror (errno)); 169 strerror (errno));
174 return -1; 170 return -1;
@@ -294,12 +290,14 @@ setupTestFile ()
294 { 290 {
295 fprintf (stderr, "Error: failed to write `%s. %s'\n", 291 fprintf (stderr, "Error: failed to write `%s. %s'\n",
296 test_file_name, strerror (errno)); 292 test_file_name, strerror (errno));
293 fclose (test_fd);
297 return NULL; 294 return NULL;
298 } 295 }
299 if (fflush (test_fd)) 296 if (fflush (test_fd))
300 { 297 {
301 fprintf (stderr, "Error: failed to flush test file stream. %s\n", 298 fprintf (stderr, "Error: failed to flush test file stream. %s\n",
302 strerror (errno)); 299 strerror (errno));
300 fclose (test_fd);
303 return NULL; 301 return NULL;
304 } 302 }
305 303
@@ -327,6 +325,7 @@ main (int argc, char *const *argv)
327 { 325 {
328 fprintf (stderr, "Error (code: %u). l:%d f:%s\n", errorCount, __LINE__, 326 fprintf (stderr, "Error (code: %u). l:%d f:%s\n", errorCount, __LINE__,
329 __FUNCTION__); 327 __FUNCTION__);
328 fclose (test_fd);
330 return -1; 329 return -1;
331 } 330 }
332 331
diff --git a/src/testcurl/https/tls_alert_test.c b/src/testcurl/https/tls_alert_test.c
index cb04d699..cbb2cf20 100644
--- a/src/testcurl/https/tls_alert_test.c
+++ b/src/testcurl/https/tls_alert_test.c
@@ -62,7 +62,7 @@ setup (MHD_gtls_session_t * session,
62 MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) 62 MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred)
63{ 63{
64 int ret; 64 int ret;
65 const char **err_pos; 65 const char *err_pos;
66 66
67 MHD__gnutls_certificate_allocate_credentials (xcred); 67 MHD__gnutls_certificate_allocate_credentials (xcred);
68 68
@@ -74,7 +74,7 @@ setup (MHD_gtls_session_t * session,
74 GNUTLS_X509_FMT_PEM); 74 GNUTLS_X509_FMT_PEM);
75 75
76 MHD__gnutls_init (session, GNUTLS_CLIENT); 76 MHD__gnutls_init (session, GNUTLS_CLIENT);
77 ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", err_pos); 77 ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", &err_pos);
78 if (ret < 0) 78 if (ret < 0)
79 { 79 {
80 return -1; 80 return -1;
@@ -112,6 +112,13 @@ test_alert_close_notify (MHD_gtls_session_t session)
112 struct sockaddr_in sa; 112 struct sockaddr_in sa;
113 113
114 sd = socket (AF_INET, SOCK_STREAM, 0); 114 sd = socket (AF_INET, SOCK_STREAM, 0);
115 if (sd == -1)
116 {
117 fprintf(stderr,
118 "Failed to create socket: %s\n",
119 strerror(errno));
120 return -1;
121 }
115 memset (&sa, '\0', sizeof (struct sockaddr_in)); 122 memset (&sa, '\0', sizeof (struct sockaddr_in));
116 sa.sin_family = AF_INET; 123 sa.sin_family = AF_INET;
117 sa.sin_port = htons (42433); 124 sa.sin_port = htons (42433);
@@ -161,6 +168,13 @@ test_alert_unexpected_message (MHD_gtls_session_t session)
161 struct sockaddr_in sa; 168 struct sockaddr_in sa;
162 169
163 sd = socket (AF_INET, SOCK_STREAM, 0); 170 sd = socket (AF_INET, SOCK_STREAM, 0);
171 if (sd == -1)
172 {
173 fprintf(stderr,
174 "Failed to create socket: %s\n",
175 strerror(errno));
176 return -1;
177 }
164 memset (&sa, '\0', sizeof (struct sockaddr_in)); 178 memset (&sa, '\0', sizeof (struct sockaddr_in));
165 sa.sin_family = AF_INET; 179 sa.sin_family = AF_INET;
166 sa.sin_port = htons (42433); 180 sa.sin_port = htons (42433);
diff --git a/src/testcurl/https/tls_authentication_test.c b/src/testcurl/https/tls_authentication_test.c
index 900d20de..7f576654 100644
--- a/src/testcurl/https/tls_authentication_test.c
+++ b/src/testcurl/https/tls_authentication_test.c
@@ -144,39 +144,39 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
144 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; 144 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX;
145 if (NULL == (doc_path = malloc (doc_path_len))) 145 if (NULL == (doc_path = malloc (doc_path_len)))
146 { 146 {
147 fclose (test_fd);
148 fprintf (stderr, MHD_E_MEM); 147 fprintf (stderr, MHD_E_MEM);
149 return -1; 148 return -1;
150 } 149 }
151 if (getcwd (doc_path, doc_path_len) == NULL) 150 if (getcwd (doc_path, doc_path_len) == NULL)
152 { 151 {
153 fclose (test_fd);
154 free (doc_path);
155 fprintf (stderr, "Error: failed to get working directory. %s\n", 152 fprintf (stderr, "Error: failed to get working directory. %s\n",
156 strerror (errno)); 153 strerror (errno));
154 free (doc_path);
157 return -1; 155 return -1;
158 } 156 }
159 157
160 if (NULL == (mem_test_file_local = malloc (len))) 158 if (NULL == (mem_test_file_local = malloc (len)))
161 { 159 {
162 fclose (test_fd);
163 fprintf (stderr, MHD_E_MEM); 160 fprintf (stderr, MHD_E_MEM);
161 free (doc_path);
164 return -1; 162 return -1;
165 } 163 }
166 164
167 fseek (test_fd, 0, SEEK_SET); 165 fseek (test_fd, 0, SEEK_SET);
168 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) 166 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len)
169 { 167 {
170 fclose (test_fd);
171 fprintf (stderr, "Error: failed to read test file. %s\n", 168 fprintf (stderr, "Error: failed to read test file. %s\n",
172 strerror (errno)); 169 strerror (errno));
170 free (doc_path);
171 free (mem_test_file_local);
173 return -1; 172 return -1;
174 } 173 }
175 174
176 if (NULL == (cbc.buf = malloc (sizeof (char) * len))) 175 if (NULL == (cbc.buf = malloc (sizeof (char) * len)))
177 { 176 {
178 fclose (test_fd);
179 fprintf (stderr, MHD_E_MEM); 177 fprintf (stderr, MHD_E_MEM);
178 free (doc_path);
179 free (mem_test_file_local);
180 return -1; 180 return -1;
181 } 181 }
182 cbc.size = len; 182 cbc.size = len;
@@ -218,6 +218,9 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
218 fprintf (stderr, "curl_easy_perform failed: `%s'\n", 218 fprintf (stderr, "curl_easy_perform failed: `%s'\n",
219 curl_easy_strerror (errornum)); 219 curl_easy_strerror (errornum));
220 curl_easy_cleanup (c); 220 curl_easy_cleanup (c);
221 free (cbc.buf);
222 free (doc_path);
223 free (mem_test_file_local);
221 return errornum; 224 return errornum;
222 } 225 }
223 226
@@ -228,6 +231,7 @@ test_daemon_get (FILE * test_fd, char *cipher_suite, int proto_version)
228 fprintf (stderr, "Error: local file & received file differ.\n"); 231 fprintf (stderr, "Error: local file & received file differ.\n");
229 free (cbc.buf); 232 free (cbc.buf);
230 free (mem_test_file_local); 233 free (mem_test_file_local);
234 free (doc_path);
231 return -1; 235 return -1;
232 } 236 }
233 237
@@ -308,12 +312,14 @@ setup_ca_cert ()
308 { 312 {
309 fprintf (stderr, "Error: failed to write `%s. %s'\n", 313 fprintf (stderr, "Error: failed to write `%s. %s'\n",
310 ca_cert_file_name, strerror (errno)); 314 ca_cert_file_name, strerror (errno));
315 fclose (test_fd);
311 return NULL; 316 return NULL;
312 } 317 }
313 if (fflush (fd)) 318 if (fflush (fd))
314 { 319 {
315 fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", 320 fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n",
316 strerror (errno)); 321 strerror (errno));
322 fclose (test_fd);
317 return NULL; 323 return NULL;
318 } 324 }
319 325
@@ -342,6 +348,7 @@ main (int argc, char *const *argv)
342 if (0 != curl_global_init (CURL_GLOBAL_ALL)) 348 if (0 != curl_global_init (CURL_GLOBAL_ALL))
343 { 349 {
344 fprintf (stderr, "Error (code: %u)\n", errorCount); 350 fprintf (stderr, "Error (code: %u)\n", errorCount);
351 fclose (test_fd);
345 return -1; 352 return -1;
346 } 353 }
347 354
diff --git a/src/testcurl/https/tls_cipher_change_test.c b/src/testcurl/https/tls_cipher_change_test.c
index 3c38e630..cb5b74c6 100644
--- a/src/testcurl/https/tls_cipher_change_test.c
+++ b/src/testcurl/https/tls_cipher_change_test.c
@@ -64,7 +64,7 @@ setup (MHD_gtls_session_t * session,
64 MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred) 64 MHD_gnutls_datum_t * cert, MHD_gtls_cert_credentials_t * xcred)
65{ 65{
66 int ret; 66 int ret;
67 const char **err_pos; 67 const char *err_pos;
68 68
69 MHD__gnutls_certificate_allocate_credentials (xcred); 69 MHD__gnutls_certificate_allocate_credentials (xcred);
70 70
@@ -76,7 +76,7 @@ setup (MHD_gtls_session_t * session,
76 GNUTLS_X509_FMT_PEM); 76 GNUTLS_X509_FMT_PEM);
77 77
78 MHD__gnutls_init (session, GNUTLS_CLIENT); 78 MHD__gnutls_init (session, GNUTLS_CLIENT);
79 ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", err_pos); 79 ret = MHD__gnutls_priority_set_direct (*session, "NORMAL", &err_pos);
80 if (ret < 0) 80 if (ret < 0)
81 { 81 {
82 return -1; 82 return -1;
@@ -116,6 +116,13 @@ test_out_of_context_cipher_change (MHD_gtls_session_t session)
116 struct sockaddr_in sa; 116 struct sockaddr_in sa;
117 117
118 sd = socket (AF_INET, SOCK_STREAM, 0); 118 sd = socket (AF_INET, SOCK_STREAM, 0);
119 if (sd == -1)
120 {
121 fprintf(stderr,
122 "Failed to create socket: %s\n",
123 strerror(errno));
124 return -1;
125 }
119 memset (&sa, '\0', sizeof (struct sockaddr_in)); 126 memset (&sa, '\0', sizeof (struct sockaddr_in));
120 sa.sin_family = AF_INET; 127 sa.sin_family = AF_INET;
121 sa.sin_port = htons (42433); 128 sa.sin_port = htons (42433);
diff --git a/src/testcurl/https/tls_daemon_options_test.c b/src/testcurl/https/tls_daemon_options_test.c
index a0d8af97..f24ff4f9 100644
--- a/src/testcurl/https/tls_daemon_options_test.c
+++ b/src/testcurl/https/tls_daemon_options_test.c
@@ -160,39 +160,37 @@ test_https_transfer (FILE * test_fd, char *cipher_suite, int proto_version)
160 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX; 160 doc_path_len = PATH_MAX > 4096 ? 4096 : PATH_MAX;
161 if (NULL == (doc_path = malloc (doc_path_len))) 161 if (NULL == (doc_path = malloc (doc_path_len)))
162 { 162 {
163 fclose (test_fd);
164 fprintf (stderr, MHD_E_MEM); 163 fprintf (stderr, MHD_E_MEM);
165 return -1; 164 return -1;
166 } 165 }
167 if (getcwd (doc_path, doc_path_len) == NULL) 166 if (getcwd (doc_path, doc_path_len) == NULL)
168 { 167 {
169 fclose (test_fd);
170 free (doc_path);
171 fprintf (stderr, "Error: failed to get working directory. %s\n", 168 fprintf (stderr, "Error: failed to get working directory. %s\n",
172 strerror (errno)); 169 strerror (errno));
170 free (doc_path);
173 return -1; 171 return -1;
174 } 172 }
175 173
176 if (NULL == (mem_test_file_local = malloc (len))) 174 if (NULL == (mem_test_file_local = malloc (len)))
177 { 175 {
178 fclose (test_fd);
179 fprintf (stderr, MHD_E_MEM); 176 fprintf (stderr, MHD_E_MEM);
177 free (doc_path);
180 return -1; 178 return -1;
181 } 179 }
182 180
183 fseek (test_fd, 0, SEEK_SET); 181 fseek (test_fd, 0, SEEK_SET);
184 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len) 182 if (fread (mem_test_file_local, sizeof (char), len, test_fd) != len)
185 { 183 {
186 fclose (test_fd);
187 fprintf (stderr, "Error: failed to read test file. %s\n", 184 fprintf (stderr, "Error: failed to read test file. %s\n",
188 strerror (errno)); 185 strerror (errno));
186 free (doc_path);
189 return -1; 187 return -1;
190 } 188 }
191 189
192 if (NULL == (cbc.buf = malloc (sizeof (char) * len))) 190 if (NULL == (cbc.buf = malloc (sizeof (char) * len)))
193 { 191 {
194 fclose (test_fd);
195 fprintf (stderr, MHD_E_MEM); 192 fprintf (stderr, MHD_E_MEM);
193 free (doc_path);
196 return -1; 194 return -1;
197 } 195 }
198 cbc.size = len; 196 cbc.size = len;
@@ -267,12 +265,14 @@ setupTestFile ()
267 { 265 {
268 fprintf (stderr, "Error: failed to write `%s. %s'\n", 266 fprintf (stderr, "Error: failed to write `%s. %s'\n",
269 test_file_name, strerror (errno)); 267 test_file_name, strerror (errno));
268 fclose (test_fd);
270 return NULL; 269 return NULL;
271 } 270 }
272 if (fflush (test_fd)) 271 if (fflush (test_fd))
273 { 272 {
274 fprintf (stderr, "Error: failed to flush test file stream. %s\n", 273 fprintf (stderr, "Error: failed to flush test file stream. %s\n",
275 strerror (errno)); 274 strerror (errno));
275 fclose (test_fd);
276 return NULL; 276 return NULL;
277 } 277 }
278 278
@@ -406,6 +406,7 @@ main (int argc, char *const *argv)
406 if (0 != curl_global_init (CURL_GLOBAL_ALL)) 406 if (0 != curl_global_init (CURL_GLOBAL_ALL))
407 { 407 {
408 fprintf (stderr, "Error: %s\n", strerror (errno)); 408 fprintf (stderr, "Error: %s\n", strerror (errno));
409 fclose (test_fd);
409 return -1; 410 return -1;
410 } 411 }
411 412
diff --git a/src/testcurl/https/tls_multi_thread_mode_test.c b/src/testcurl/https/tls_multi_thread_mode_test.c
index 5b0533fb..e0c0a304 100644
--- a/src/testcurl/https/tls_multi_thread_mode_test.c
+++ b/src/testcurl/https/tls_multi_thread_mode_test.c
@@ -189,6 +189,7 @@ test_https_transfer (FILE * test_fd, char *cipher_suite, int proto_version)
189 { 189 {
190 fclose (test_fd); 190 fclose (test_fd);
191 free (doc_path); 191 free (doc_path);
192 free (mem_test_file_local);
192 fprintf (stderr, "Error: failed to read test file. %s\n", 193 fprintf (stderr, "Error: failed to read test file. %s\n",
193 strerror (errno)); 194 strerror (errno));
194 return -1; 195 return -1;
diff --git a/src/testcurl/https/tls_session_time_out_test.c b/src/testcurl/https/tls_session_time_out_test.c
index b9661f33..97c7b74f 100644
--- a/src/testcurl/https/tls_session_time_out_test.c
+++ b/src/testcurl/https/tls_session_time_out_test.c
@@ -103,6 +103,13 @@ test_tls_session_time_out (MHD_gtls_session_t session)
103 struct sockaddr_in sa; 103 struct sockaddr_in sa;
104 104
105 sd = socket (AF_INET, SOCK_STREAM, 0); 105 sd = socket (AF_INET, SOCK_STREAM, 0);
106 if (sd == -1)
107 {
108 fprintf(stderr,
109 "Failed to create socket: %s\n",
110 strerror(errno));
111 return -1;
112 }
106 memset (&sa, '\0', sizeof (struct sockaddr_in)); 113 memset (&sa, '\0', sizeof (struct sockaddr_in));
107 sa.sin_family = AF_INET; 114 sa.sin_family = AF_INET;
108 sa.sin_port = htons (42433); 115 sa.sin_port = htons (42433);