Blame SOURCES/cve-tests-backport.patch
|
|
93e6fe |
diff -up http-parser-2.7.1/test.c.tests-simple-type http-parser-2.7.1/test.c
|
|
|
93e6fe |
--- http-parser-2.7.1/test.c.tests-simple-type 2019-04-01 11:47:35.658031500 +0200
|
|
|
93e6fe |
+++ http-parser-2.7.1/test.c 2019-04-01 11:48:20.275113054 +0200
|
|
|
93e6fe |
@@ -3313,18 +3313,18 @@ test_message_count_body (const struct me
|
|
|
93e6fe |
}
|
|
|
93e6fe |
|
|
|
93e6fe |
void
|
|
|
93e6fe |
-test_simple (const char *buf, enum http_errno err_expected)
|
|
|
93e6fe |
+test_simple_type (const char *buf,
|
|
|
93e6fe |
+ enum http_errno err_expected,
|
|
|
93e6fe |
+ enum http_parser_type type)
|
|
|
93e6fe |
{
|
|
|
93e6fe |
- parser_init(HTTP_REQUEST);
|
|
|
93e6fe |
+ parser_init(type);
|
|
|
93e6fe |
|
|
|
93e6fe |
enum http_errno err;
|
|
|
93e6fe |
|
|
|
93e6fe |
parse(buf, strlen(buf));
|
|
|
93e6fe |
- err = HTTP_PARSER_ERRNO(parser);
|
|
|
93e6fe |
+ err = HTTP_PARSER_ERRNO(parser);
|
|
|
93e6fe |
parse(NULL, 0);
|
|
|
93e6fe |
|
|
|
93e6fe |
- parser_free();
|
|
|
93e6fe |
-
|
|
|
93e6fe |
/* In strict mode, allow us to pass with an unexpected HPE_STRICT as
|
|
|
93e6fe |
* long as the caller isn't expecting success.
|
|
|
93e6fe |
*/
|
|
|
93e6fe |
@@ -3340,6 +3340,12 @@ test_simple (const char *buf, enum http_
|
|
|
93e6fe |
}
|
|
|
93e6fe |
|
|
|
93e6fe |
void
|
|
|
93e6fe |
+test_simple (const char *buf, enum http_errno err_expected)
|
|
|
93e6fe |
+{
|
|
|
93e6fe |
+ test_simple_type(buf, err_expected, HTTP_REQUEST);
|
|
|
93e6fe |
+}
|
|
|
93e6fe |
+
|
|
|
93e6fe |
+void
|
|
|
93e6fe |
test_invalid_header_content (int req, const char* str)
|
|
|
93e6fe |
{
|
|
|
93e6fe |
http_parser parser;
|