diff options
author | lv-426 <oxcafebaby@yahoo.com> | 2008-07-18 03:53:27 +0000 |
---|---|---|
committer | lv-426 <oxcafebaby@yahoo.com> | 2008-07-18 03:53:27 +0000 |
commit | 04c37e5bd7a82f60127b64338cf37c470ca93e12 (patch) | |
tree | e602f345000a692993ac38a7109d1ffaa67ce3b7 /src/testcurl/https/mhds_session_info_test.c | |
parent | 1cd7c174797f65098c6c3048564634cbe6c3bb9f (diff) | |
download | libmicrohttpd-04c37e5bd7a82f60127b64338cf37c470ca93e12.tar.gz libmicrohttpd-04c37e5bd7a82f60127b64338cf37c470ca93e12.zip |
fixed some memory leaks
removed includes dir
Diffstat (limited to 'src/testcurl/https/mhds_session_info_test.c')
-rw-r--r-- | src/testcurl/https/mhds_session_info_test.c | 54 |
1 files changed, 31 insertions, 23 deletions
diff --git a/src/testcurl/https/mhds_session_info_test.c b/src/testcurl/https/mhds_session_info_test.c index 43315c0f..3b869913 100644 --- a/src/testcurl/https/mhds_session_info_test.c +++ b/src/testcurl/https/mhds_session_info_test.c | |||
@@ -75,54 +75,61 @@ query_session_ahc (void *cls, struct MHD_Connection *connection, | |||
75 | int ret; | 75 | int ret; |
76 | 76 | ||
77 | /* assert actual connection cipher is the one negotiated */ | 77 | /* assert actual connection cipher is the one negotiated */ |
78 | if (MHD_get_session_info (connection,MHS_INFO_CIPHER_ALGO).cipher_algorithm != GNUTLS_CIPHER_AES_256_CBC) | 78 | if (MHD_get_tls_session_info (connection, MHS_INFO_CIPHER_ALGO). |
79 | cipher_algorithm != GNUTLS_CIPHER_AES_256_CBC) | ||
79 | { | 80 | { |
80 | fprintf (stderr, "Error: requested cipher mismatch. %s\n", | 81 | fprintf (stderr, "Error: requested cipher mismatch. %s\n", |
81 | strerror (errno)); | 82 | strerror (errno)); |
82 | return -1; | 83 | return -1; |
83 | } | 84 | } |
84 | 85 | ||
85 | if (MHD_get_session_info (connection,MHD_INFO_KX_ALGO).kx_algorithm != GNUTLS_KX_RSA) | 86 | if (MHD_get_tls_session_info (connection, MHD_INFO_KX_ALGO).kx_algorithm != |
86 | { | 87 | GNUTLS_KX_RSA) |
87 | fprintf (stderr, "Error: requested key exchange mismatch. %s\n", | 88 | { |
88 | strerror (errno)); | 89 | fprintf (stderr, "Error: requested key exchange mismatch. %s\n", |
89 | return -1; | 90 | strerror (errno)); |
90 | } | 91 | return -1; |
92 | } | ||
91 | 93 | ||
92 | if (MHD_get_session_info (connection,MHD_INFO_MAC_ALGO).mac_algorithm != GNUTLS_MAC_SHA1) | 94 | if (MHD_get_tls_session_info (connection, MHD_INFO_MAC_ALGO). |
95 | mac_algorithm != GNUTLS_MAC_SHA1) | ||
93 | { | 96 | { |
94 | fprintf (stderr, "Error: requested mac algorithm mismatch. %s\n", | 97 | fprintf (stderr, "Error: requested mac algorithm mismatch. %s\n", |
95 | strerror (errno)); | 98 | strerror (errno)); |
96 | return -1; | 99 | return -1; |
97 | } | 100 | } |
98 | 101 | ||
99 | if (MHD_get_session_info (connection,MHD_INFO_COMPRESSION_METHOD).compression_method != GNUTLS_COMP_NULL) | 102 | if (MHD_get_tls_session_info (connection, MHD_INFO_COMPRESSION_METHOD). |
103 | compression_method != GNUTLS_COMP_NULL) | ||
100 | { | 104 | { |
101 | fprintf (stderr, "Error: requested compression mismatch. %s\n", | 105 | fprintf (stderr, "Error: requested compression mismatch. %s\n", |
102 | strerror (errno)); | 106 | strerror (errno)); |
103 | return -1; | 107 | return -1; |
104 | } | 108 | } |
105 | 109 | ||
106 | if (MHD_get_session_info (connection,MHD_INFO_PROTOCOL).protocol != GNUTLS_SSL3) | 110 | if (MHD_get_tls_session_info (connection, MHD_INFO_PROTOCOL).protocol != |
107 | { | 111 | GNUTLS_SSL3) |
108 | fprintf (stderr, "Error: requested compression mismatch. %s\n", | 112 | { |
109 | strerror (errno)); | 113 | fprintf (stderr, "Error: requested compression mismatch. %s\n", |
110 | return -1; | 114 | strerror (errno)); |
111 | } | 115 | return -1; |
116 | } | ||
112 | 117 | ||
113 | if (MHD_get_session_info (connection,MHD_INFO_CERT_TYPE).certificate_type != GNUTLS_CRT_X509) | 118 | if (MHD_get_tls_session_info (connection, MHD_INFO_CERT_TYPE). |
119 | certificate_type != GNUTLS_CRT_X509) | ||
114 | { | 120 | { |
115 | fprintf (stderr, "Error: requested certificate mismatch. %s\n", | 121 | fprintf (stderr, "Error: requested certificate mismatch. %s\n", |
116 | strerror (errno)); | 122 | strerror (errno)); |
117 | return -1; | 123 | return -1; |
118 | } | 124 | } |
119 | 125 | ||
120 | if (MHD_get_session_info (connection,MHD_INFO_CREDENTIALS_TYPE).credentials_type != GNUTLS_CRD_CERTIFICATE) | 126 | if (MHD_get_tls_session_info (connection, MHD_INFO_CREDENTIALS_TYPE). |
121 | { | 127 | credentials_type != GNUTLS_CRD_CERTIFICATE) |
122 | fprintf (stderr, "Error: requested certificate mismatch. %s\n", | 128 | { |
123 | strerror (errno)); | 129 | fprintf (stderr, "Error: requested certificate mismatch. %s\n", |
124 | return -1; | 130 | strerror (errno)); |
125 | } | 131 | return -1; |
132 | } | ||
126 | 133 | ||
127 | response = MHD_create_response_from_data (strlen (EMPTY_PAGE), | 134 | response = MHD_create_response_from_data (strlen (EMPTY_PAGE), |
128 | (void *) EMPTY_PAGE, | 135 | (void *) EMPTY_PAGE, |
@@ -154,7 +161,8 @@ test_query_session () | |||
154 | MHD_USE_DEBUG, 42433, | 161 | MHD_USE_DEBUG, 42433, |
155 | NULL, NULL, &query_session_ahc, NULL, | 162 | NULL, NULL, &query_session_ahc, NULL, |
156 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, | 163 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, |
157 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); | 164 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, |
165 | MHD_OPTION_END); | ||
158 | 166 | ||
159 | if (d == NULL) | 167 | if (d == NULL) |
160 | return 2; | 168 | return 2; |