mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-03-20 11:11:08 +01:00
@@ -1716,11 +1716,11 @@ struct mbedtls_ssl_context {
|
||||
on next call to record layer? */
|
||||
|
||||
unsigned char MBEDTLS_PRIVATE(in_alert_recv); /*!< Determines if a fatal alert has
|
||||
been received. Values:
|
||||
been received. Values:
|
||||
- \c 0 , no fatal alert received.
|
||||
- \c 1 , a fatal alert has been received */
|
||||
unsigned char MBEDTLS_PRIVATE(in_alert_type); /*!< Type of fatal alert if in_alert_recv
|
||||
!= 0 */
|
||||
!= 0 */
|
||||
|
||||
/* The following three variables indicate if and, if yes,
|
||||
* what kind of alert is pending to be sent.
|
||||
|
||||
@@ -5969,7 +5969,7 @@ void ssl_get_alert_after_fatal(void)
|
||||
TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE);
|
||||
|
||||
/* Reset the session and check that no alert is present*/
|
||||
mbedtls_ssl_session_reset_msg_layer( &ssl, 0);
|
||||
mbedtls_ssl_session_reset_msg_layer(&ssl, 0);
|
||||
TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
|
||||
|
||||
exit:
|
||||
|
||||
Reference in New Issue
Block a user