summaryrefslogtreecommitdiff
path: root/lib/ssl/test/ssl_packet_SUITE.erl
diff options
context:
space:
mode:
authorIngela Anderton Andin <ingela@erlang.org>2019-11-07 12:00:56 +0100
committerIngela Anderton Andin <ingela@erlang.org>2019-11-12 15:35:21 +0100
commitbddcdb1788507d3d1ee26717dfa10e7d5b529572 (patch)
tree7874af8e21a715ab3c3c07110cd98b90198136d5 /lib/ssl/test/ssl_packet_SUITE.erl
parente970af80a7e31e4ecdc88e87d0acf78470c45b19 (diff)
downloaderlang-bddcdb1788507d3d1ee26717dfa10e7d5b529572.tar.gz
ssl: Correct tests
Receiving code that takes beast mitigation into account has never been correct as you can not make such a assumptions about the streamed data, and in the packet context it is even more wrong.
Diffstat (limited to 'lib/ssl/test/ssl_packet_SUITE.erl')
-rw-r--r--lib/ssl/test/ssl_packet_SUITE.erl19
1 files changed, 3 insertions, 16 deletions
diff --git a/lib/ssl/test/ssl_packet_SUITE.erl b/lib/ssl/test/ssl_packet_SUITE.erl
index b7060fa136..1815d0561c 100644
--- a/lib/ssl/test/ssl_packet_SUITE.erl
+++ b/lib/ssl/test/ssl_packet_SUITE.erl
@@ -2108,18 +2108,10 @@ active_once_packet(Socket,_, 0) ->
end;
active_once_packet(Socket, Data, N) ->
receive
- {ssl, Socket, Byte} when length(Byte) == 1 ->
- ssl:setopts(Socket, [{active, once}]),
- receive
- {ssl, Socket, _} ->
- ssl:setopts(Socket, [{active, once}]),
- active_once_packet(Socket, Data, N-1)
- end;
{ssl, Socket, Data} ->
- ok
- end,
- ssl:setopts(Socket, [{active, once}]),
- active_once_packet(Socket, Data, N-1).
+ ssl:setopts(Socket, [{active, once}]),
+ active_once_packet(Socket, Data, N-1)
+ end.
active_raw(Socket, Data, N) ->
active_raw(Socket, (length(Data) * N)).
@@ -2140,11 +2132,6 @@ active_packet(Socket, _, 0) ->
end;
active_packet(Socket, Data, N) ->
receive
- {ssl, Socket, Byte} when length(Byte) == 1 ->
- receive
- {ssl, Socket, _} ->
- active_packet(Socket, Data, N -1)
- end;
{ssl, Socket, Data} ->
active_packet(Socket, Data, N -1);
Other ->