mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-26 19:52:23 +01:00
Address code review
This commit is contained in:
@@ -111,7 +111,7 @@ typedef struct Dtls13RecordPlaintextHeader {
|
||||
#define DTLS13_UNIFIED_HEADER_SIZE 5
|
||||
#define DTLS13_MIN_CIPHERTEXT 16
|
||||
#ifndef DTLS13_MIN_RTX_INTERVAL
|
||||
#define DTLS13_MIN_RTX_INTERVAL 1000
|
||||
#define DTLS13_MIN_RTX_INTERVAL (DTLS_TIMEOUT_INIT * 1000)
|
||||
#endif
|
||||
|
||||
#ifndef NO_WOLFSSL_CLIENT
|
||||
|
||||
@@ -2493,6 +2493,8 @@ int test_dtls_mtu_split_messages(void)
|
||||
/* Test DTLS 1.3 minimum retransmission interval. This test calls
|
||||
* wolfSSL_dtls_got_timeout() to simulate timeouts and verify that
|
||||
* retransmissions are spaced at least DTLS13_MIN_RTX_INTERVAL apart.
|
||||
* This tests relies on timing of the retransmission logic so it may be
|
||||
* flaky on very slow systems.
|
||||
*/
|
||||
int test_dtls13_min_rtx_interval(void)
|
||||
{
|
||||
@@ -2541,7 +2543,8 @@ int test_dtls13_min_rtx_interval(void)
|
||||
ExpectIntEQ(wolfSSL_dtls_got_timeout(ssl_s), WOLFSSL_SUCCESS);
|
||||
ExpectIntEQ(wolfSSL_dtls_got_timeout(ssl_s), WOLFSSL_SUCCESS);
|
||||
/* Save the message count to make sure no new messages are sent */
|
||||
ExpectIntGE(c_msg_count = test_ctx.c_msg_count, 2);
|
||||
ExpectIntGE(test_ctx.c_msg_count, 2);
|
||||
c_msg_count = test_ctx.c_msg_count;
|
||||
|
||||
/* Second timeout. This one should not trigger a retransmission */
|
||||
if (wolfSSL_dtls13_use_quick_timeout(ssl_s))
|
||||
|
||||
Reference in New Issue
Block a user