forked from wolfSSL/wolfssl
account for WOLF_C99 with ipv6 test cases
This commit is contained in:
@ -826,6 +826,21 @@ static WC_INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer,
|
|||||||
|
|
||||||
XMEMCPY(addr, answer->ai_addr, answer->ai_addrlen);
|
XMEMCPY(addr, answer->ai_addr, answer->ai_addrlen);
|
||||||
freeaddrinfo(answer);
|
freeaddrinfo(answer);
|
||||||
|
#elif defined(WOLF_C99)
|
||||||
|
HOSTENT* entry;
|
||||||
|
SOCKADDR_IN* sin;
|
||||||
|
|
||||||
|
entry = gethostbyname(peer);
|
||||||
|
sin = (SOCKADDR_IN*)&addr;
|
||||||
|
if (entry) {
|
||||||
|
sin->sin_family = AF_INET;
|
||||||
|
sin->sin_port = XHTONS(port);
|
||||||
|
XMEMCPY(&sin->sin_addr.s_addr, entry->h_addr_list[0],
|
||||||
|
entry->h_length);
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
err_sys("no addr info for responder");
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
printf("no ipv6 getaddrinfo, loopback only tests/examples\n");
|
printf("no ipv6 getaddrinfo, loopback only tests/examples\n");
|
||||||
addr->sin6_addr = in6addr_loopback;
|
addr->sin6_addr = in6addr_loopback;
|
||||||
|
Reference in New Issue
Block a user