X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=tests%2Ftest-vconn.c;h=265bdecb5e7e6acd2116ba390ab3969a95cdeadd;hb=38a997566d7faa1e8c4b9c029faed6789e7528ff;hp=c118af92b4deacf9fa9d3b9aafcac82c4f6f1521;hpb=d27ce5292c63d864dfa727e061f63b06ca770e19;p=sliver-openvswitch.git diff --git a/tests/test-vconn.c b/tests/test-vconn.c index c118af92b..265bdecb5 100644 --- a/tests/test-vconn.c +++ b/tests/test-vconn.c @@ -65,11 +65,13 @@ check_errno(int a, int b, const char *as, const char *file, int line) static void fpv_create(const char *type, struct fake_pvconn *fpv) { +#ifdef HAVE_OPENSSL if (!strcmp(type, "ssl")) { stream_ssl_set_private_key_file("testpki-privkey.pem"); stream_ssl_set_certificate_file("testpki-cert.pem"); stream_ssl_set_ca_cert_file("testpki-cacert.pem", false); } +#endif fpv->type = type; if (!strcmp(type, "unix")) { @@ -82,7 +84,7 @@ fpv_create(const char *type, struct fake_pvconn *fpv) CHECK_ERRNO(pstream_open(fpv->pvconn_name, &fpv->pstream), 0); free(bind_path); } else if (!strcmp(type, "tcp") || !strcmp(type, "ssl")) { - char *s, *method, *port, *save_ptr = NULL; + char *s, *port, *save_ptr = NULL; char *open_name; open_name = xasprintf("p%s:0:127.0.0.1", type); @@ -90,7 +92,7 @@ fpv_create(const char *type, struct fake_pvconn *fpv) /* Extract bound port number from pstream name. */ s = xstrdup(pstream_get_name(fpv->pstream)); - method = strtok_r(s, ":", &save_ptr); + strtok_r(s, ":", &save_ptr); port = strtok_r(NULL, ":", &save_ptr); /* Save info. */ @@ -132,7 +134,7 @@ fpv_destroy(struct fake_pvconn *fpv) /* Connects to a fake_pvconn with vconn_open(), then closes the listener and * verifies that vconn_connect() reports 'expected_error'. */ static void -test_refuse_connection(int argc UNUSED, char *argv[]) +test_refuse_connection(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; int expected_error; @@ -154,7 +156,7 @@ test_refuse_connection(int argc UNUSED, char *argv[]) * closes it immediately, and verifies that vconn_connect() reports * 'expected_error'. */ static void -test_accept_then_close(int argc UNUSED, char *argv[]) +test_accept_then_close(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; int expected_error; @@ -179,7 +181,7 @@ test_accept_then_close(int argc UNUSED, char *argv[]) * reads the hello message from it, then closes the connection and verifies * that vconn_connect() reports 'expected_error'. */ static void -test_read_hello(int argc UNUSED, char *argv[]) +test_read_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct fake_pvconn fpv; @@ -308,7 +310,7 @@ test_send_hello(const char *type, const void *out, size_t out_size, /* Try connecting and sending a normal hello, which should succeed. */ static void -test_send_plain_hello(int argc UNUSED, char *argv[]) +test_send_plain_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct ofp_header hello; @@ -324,7 +326,7 @@ test_send_plain_hello(int argc UNUSED, char *argv[]) * the specification says that implementations must accept and ignore extra * data). */ static void -test_send_long_hello(int argc UNUSED, char *argv[]) +test_send_long_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct ofp_header hello; @@ -342,7 +344,7 @@ test_send_long_hello(int argc UNUSED, char *argv[]) /* Try connecting and sending an echo request instead of a hello, which should * fail with EPROTO. */ static void -test_send_echo_hello(int argc UNUSED, char *argv[]) +test_send_echo_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct ofp_header echo; @@ -357,7 +359,7 @@ test_send_echo_hello(int argc UNUSED, char *argv[]) /* Try connecting and sending a hello packet that has its length field as 0, * which should fail with EPROTO. */ static void -test_send_short_hello(int argc UNUSED, char *argv[]) +test_send_short_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct ofp_header hello; @@ -369,7 +371,7 @@ test_send_short_hello(int argc UNUSED, char *argv[]) /* Try connecting and sending a hello packet that has a bad version, which * should fail with EPROTO. */ static void -test_send_invalid_version_hello(int argc UNUSED, char *argv[]) +test_send_invalid_version_hello(int argc OVS_UNUSED, char *argv[]) { const char *type = argv[1]; struct ofp_header hello;