mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-03-20 19:21:09 +01:00
@@ -1717,8 +1717,8 @@ struct mbedtls_ssl_context {
|
||||
|
||||
unsigned char MBEDTLS_PRIVATE(in_alert_recv); /*!< Determines if a fatal alert has
|
||||
been received. Values:
|
||||
- \c 0 , no fatal alert received.
|
||||
- \c 1 , a fatal alert has been received */
|
||||
- \c 0 , no fatal alert received.
|
||||
- \c 1 , a fatal alert has been received */
|
||||
unsigned char MBEDTLS_PRIVATE(in_alert_type); /*!< Type of fatal alert if in_alert_recv
|
||||
!= 0 */
|
||||
|
||||
|
||||
@@ -5965,11 +5965,11 @@ void ssl_get_alert_after_fatal(void)
|
||||
ssl.in_msg[1] = MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE;
|
||||
|
||||
/* import prepared fatal alert and test getter */
|
||||
TEST_ASSERT(mbedtls_ssl_handle_message_type(&ssl) == MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE );
|
||||
TEST_ASSERT(mbedtls_ssl_handle_message_type(&ssl) == MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE);
|
||||
TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE);
|
||||
|
||||
/* Reset the session and check that no alert is present*/
|
||||
mbedtls_ssl_session_reset_msg_layer( &ssl, 0 );
|
||||
mbedtls_ssl_session_reset_msg_layer( &ssl, 0);
|
||||
TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
|
||||
|
||||
exit:
|
||||
|
||||
Reference in New Issue
Block a user