diff options
author | Matt Caswell <matt@openssl.org> | 2016-11-02 10:44:15 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-11-02 16:47:14 +0000 |
commit | 7856332e8c14fd1da1811a9d0afde243dd0f4669 (patch) | |
tree | 97729611d14aeeecbbb32d0ec8386181b9ca4a42 /test | |
parent | a7faa6da317887e14e8e28254a83555983ed6ca7 (diff) |
Add a read_ahead test
This test checks that read_ahead works correctly when dealing with large
records.
Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'test')
-rw-r--r-- | test/sslapitest.c | 26 |
1 files changed, 23 insertions, 3 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c index 4d22d8ef00..a78b0606ac 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -31,7 +31,7 @@ static X509 *ocspcert = NULL; #define NUM_EXTRA_CERTS 40 static int execute_test_large_message(const SSL_METHOD *smeth, - const SSL_METHOD *cmeth) + const SSL_METHOD *cmeth, int read_ahead) { SSL_CTX *cctx = NULL, *sctx = NULL; SSL *clientssl = NULL, *serverssl = NULL; @@ -59,6 +59,14 @@ static int execute_test_large_message(const SSL_METHOD *smeth, goto end; } + if(read_ahead) { + /* + * Test that read_ahead works correctly when dealing with large + * records + */ + SSL_CTX_set_read_ahead(cctx, 1); + } + /* * We assume the supplied certificate is big enough so that if we add * NUM_EXTRA_CERTS it will make the overall message large enough. The @@ -105,14 +113,25 @@ static int execute_test_large_message(const SSL_METHOD *smeth, static int test_large_message_tls(void) { - return execute_test_large_message(TLS_server_method(), TLS_client_method()); + return execute_test_large_message(TLS_server_method(), TLS_client_method(), + 0); +} + +static int test_large_message_tls_read_ahead(void) +{ + return execute_test_large_message(TLS_server_method(), TLS_client_method(), + 1); } #ifndef OPENSSL_NO_DTLS static int test_large_message_dtls(void) { + /* + * read_ahead is not relevant to DTLS because DTLS always acts as if + * read_ahead is set. + */ return execute_test_large_message(DTLS_server_method(), - DTLS_client_method()); + DTLS_client_method(), 0); } #endif @@ -863,6 +882,7 @@ int main(int argc, char *argv[]) CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); ADD_TEST(test_large_message_tls); + ADD_TEST(test_large_message_tls_read_ahead); #ifndef OPENSSL_NO_DTLS ADD_TEST(test_large_message_dtls); #endif |