From: Frank Lichtenheld Date: Fri, 24 Jun 2022 12:26:57 +0000 (+0200) Subject: test_crypto: fix test_occ_mtu_calculation with --disable-fragment X-Git-Tag: v2.6_beta1~41 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=252e5d6888261d7b2aae1034c834fba8a393cef4;p=thirdparty%2Fopenvpn.git test_crypto: fix test_occ_mtu_calculation with --disable-fragment Doesn't make sense to test with fragment, if the code ignores it. Signed-off-by: Frank Lichtenheld Acked-by: Arne Schwabe Message-Id: <20220624122657.28675-1-frank@lichtenheld.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg24550.html Signed-off-by: Gert Doering --- diff --git a/tests/unit_tests/openvpn/test_crypto.c b/tests/unit_tests/openvpn/test_crypto.c index 83572b827..aec4e0490 100644 --- a/tests/unit_tests/openvpn/test_crypto.c +++ b/tests/unit_tests/openvpn/test_crypto.c @@ -299,13 +299,15 @@ test_occ_mtu_calculation(void **state) linkmtu = calc_options_string_link_mtu(&o, &f); assert_int_equal(linkmtu, 1445); +#if defined(ENABLE_FRAGMENT) /* secret, comp-lzo yes, cipher BF-CBC, auth SHA1, fragment 1200 */ o.ce.fragment = 1200; linkmtu = calc_options_string_link_mtu(&o, &f); assert_int_equal(linkmtu, 1449); + o.ce.fragment = 0; +#endif o.comp.alg = COMP_ALG_UNDEF; - o.ce.fragment = 0; #endif /* TLS mode */ @@ -350,7 +352,7 @@ test_occ_mtu_calculation(void **state) assert_int_equal(linkmtu, 1449); -#if defined(USE_COMP) +#if defined(USE_COMP) && defined(ENABLE_FRAGMENT) o.comp.alg = COMP_ALG_LZO; /* tls client, auth SHA1, cipher AES-256-GCM, fragment, comp-lzo yes */