aboutsummaryrefslogtreecommitdiff
path: root/tests/tcp6.c
diff options
context:
space:
mode:
authorGarrett D'Amore <garrett@damore.org>2017-10-23 08:49:58 -0700
committerGarrett D'Amore <garrett@damore.org>2017-10-23 08:49:58 -0700
commitfdb73b69a887d868f8e976ef8a990a5d7f6687f9 (patch)
treee6716c3837dfb85351f9bf1389bf510dc18daafe /tests/tcp6.c
parentd7fe2d325f25d339bb93fc86c2e63b71c6bbd575 (diff)
downloadnng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.tar.gz
nng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.tar.bz2
nng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.zip
fixes #127 Bad format TCP address causes null pointer exception
I've added some tests to validate this too.
Diffstat (limited to 'tests/tcp6.c')
-rw-r--r--tests/tcp6.c10
1 files changed, 10 insertions, 0 deletions
diff --git a/tests/tcp6.c b/tests/tcp6.c
index 6f84d282..b1695c84 100644
--- a/tests/tcp6.c
+++ b/tests/tcp6.c
@@ -69,6 +69,16 @@ check_props_v6(nng_msg *msg, nng_listener l, nng_dialer d)
So(nng_dialer_getopt(d, NNG_OPT_REMADDR, &ra, &z) != 0);
});
+ Convey("Malformed TCPv6 addresses do not panic", {
+ nng_socket s1;
+
+ So(nng_pair_open(&s1) == 0);
+ Reset({ nng_close(s1); });
+ So(nng_dial(s1, "tcp://::1", NULL, 0) == NNG_EADDRINVAL);
+ So(nng_dial(s1, "tcp://::1:5055", NULL, 0) == NNG_EADDRINVAL);
+ So(nng_dial(s1, "tcp://[::1]", NULL, 0) == NNG_EADDRINVAL);
+ });
+
return (0);
}