forked from wolfSSL/wolfssl
addressed review comments
This commit is contained in:
@ -388,7 +388,7 @@ static int sockAddrEqual(
|
|||||||
#ifndef WOLFSSL_IPV6
|
#ifndef WOLFSSL_IPV6
|
||||||
static int PeerIsIpv6(const SOCKADDR_S *peer, XSOCKLENT len)
|
static int PeerIsIpv6(const SOCKADDR_S *peer, XSOCKLENT len)
|
||||||
{
|
{
|
||||||
if (len < (int)sizeof(peer->ss_family))
|
if (len < (XSOCKLENT)sizeof(peer->ss_family))
|
||||||
return 0;
|
return 0;
|
||||||
return peer->ss_family == WOLFSSL_IP6;
|
return peer->ss_family == WOLFSSL_IP6;
|
||||||
}
|
}
|
||||||
|
@ -65944,7 +65944,7 @@ static int test_dtls_msg_get_connected_port(int fd, word16 *port)
|
|||||||
XMEMSET((byte*)&peer, 0, sizeof(peer));
|
XMEMSET((byte*)&peer, 0, sizeof(peer));
|
||||||
len = sizeof(peer);
|
len = sizeof(peer);
|
||||||
ret = getpeername(fd, (SOCKADDR*)&peer, &len);
|
ret = getpeername(fd, (SOCKADDR*)&peer, &len);
|
||||||
if (ret != 0 || len > (int)sizeof(peer))
|
if (ret != 0 || len > (XSOCKLENT)sizeof(peer))
|
||||||
return -1;
|
return -1;
|
||||||
switch (peer.ss_family) {
|
switch (peer.ss_family) {
|
||||||
#ifdef WOLFSSL_IPV6
|
#ifdef WOLFSSL_IPV6
|
||||||
|
Reference in New Issue
Block a user