diff options
| author | Garrett D'Amore <garrett@damore.org> | 2017-10-23 08:49:58 -0700 |
|---|---|---|
| committer | Garrett D'Amore <garrett@damore.org> | 2017-10-23 08:49:58 -0700 |
| commit | fdb73b69a887d868f8e976ef8a990a5d7f6687f9 (patch) | |
| tree | e6716c3837dfb85351f9bf1389bf510dc18daafe /tests/tcp6.c | |
| parent | d7fe2d325f25d339bb93fc86c2e63b71c6bbd575 (diff) | |
| download | nng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.tar.gz nng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.tar.bz2 nng-fdb73b69a887d868f8e976ef8a990a5d7f6687f9.zip | |
fixes #127 Bad format TCP address causes null pointer exception
I've added some tests to validate this too.
Diffstat (limited to 'tests/tcp6.c')
| -rw-r--r-- | tests/tcp6.c | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/tests/tcp6.c b/tests/tcp6.c index 6f84d282..b1695c84 100644 --- a/tests/tcp6.c +++ b/tests/tcp6.c @@ -69,6 +69,16 @@ check_props_v6(nng_msg *msg, nng_listener l, nng_dialer d) So(nng_dialer_getopt(d, NNG_OPT_REMADDR, &ra, &z) != 0); }); + Convey("Malformed TCPv6 addresses do not panic", { + nng_socket s1; + + So(nng_pair_open(&s1) == 0); + Reset({ nng_close(s1); }); + So(nng_dial(s1, "tcp://::1", NULL, 0) == NNG_EADDRINVAL); + So(nng_dial(s1, "tcp://::1:5055", NULL, 0) == NNG_EADDRINVAL); + So(nng_dial(s1, "tcp://[::1]", NULL, 0) == NNG_EADDRINVAL); + }); + return (0); } |
