summaryrefslogtreecommitdiff
path: root/auto_tests/TCP_test.c
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2016-08-19 19:41:46 +0100
committeriphydf <iphydf@users.noreply.github.com>2016-08-19 19:46:23 +0100
commit83d4857f080f6393ada976f3151bce5db2f96e23 (patch)
tree784e1980dbb86cdecd10345a2df5e2b3aaea9496 /auto_tests/TCP_test.c
parentbdf5ac37b45870e8b8e7d621334d7bd034bf7149 (diff)
Fix operation sequencing in TCP_test.
The expression was fun(foo = bar, foo). The evaluation order is unspecified, and often this will do the wrong thing. We should forbid side effects in argument lists and conditionals.
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r--auto_tests/TCP_test.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c
index b08a04bc..06049467 100644
--- a/auto_tests/TCP_test.c
+++ b/auto_tests/TCP_test.c
@@ -106,9 +106,9 @@ START_TEST(test_basic)
106 do_TCP_server(tcp_s); 106 do_TCP_server(tcp_s);
107 c_sleep(50); 107 c_sleep(50);
108 uint8_t packet_resp[4096]; 108 uint8_t packet_resp[4096];
109 int recv_data_len; 109 int recv_data_len = recv(sock, packet_resp, 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, 0);
110 ck_assert_msg((recv_data_len = recv(sock, packet_resp, 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, 110 ck_assert_msg(recv_data_len == 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES,
111 0)) == 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "recv Failed. %u", recv_data_len); 111 "recv Failed. %u", recv_data_len);
112 memcpy(&size, packet_resp, 2); 112 memcpy(&size, packet_resp, 2);
113 ck_assert_msg(ntohs(size) == 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "Wrong packet size."); 113 ck_assert_msg(ntohs(size) == 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "Wrong packet size.");
114 uint8_t packet_resp_plain[4096]; 114 uint8_t packet_resp_plain[4096];
@@ -201,10 +201,10 @@ int write_packet_TCP_secure_connection(struct sec_TCP_con *con, uint8_t *data, u
201 201
202int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) 202int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length)
203{ 203{
204 int len; 204 int len = recv(con->sock, data, length, 0);
205 ck_assert_msg((len = recv(con->sock, data, length, 0)) == length, "wrong len %i\n", len); 205 ck_assert_msg(len == length, "wrong len %i\n", len);
206 ck_assert_msg((len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data)) != -1, 206 len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data);
207 "Decrypt failed"); 207 ck_assert_msg(len != -1, "Decrypt failed");
208 increment_nonce(con->recv_nonce); 208 increment_nonce(con->recv_nonce);
209 return len; 209 return len;
210} 210}