Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 1 addition & 3 deletions common/src/jni/main/cpp/conscrypt/native_crypto.cc
Original file line number Diff line number Diff line change
Expand Up @@ -1548,7 +1548,7 @@ static jlong NativeCrypto_EVP_PKEY_from_private_seed(JNIEnv* env, jclass, jint p
return reinterpret_cast<uintptr_t>(pkey.release());
}

static jbyteArray NativeCrypto_EVP_PKEY_get_private_seed(JNIEnv* env, jclass cls, jobject pkeyRef) {
static jbyteArray NativeCrypto_EVP_PKEY_get_private_seed(JNIEnv* env, jclass, jobject pkeyRef) {
CHECK_ERROR_QUEUE_ON_RETURN;
JNI_TRACE("EVP_PKEY_get_private_seed(%p)", pkeyRef);

Expand Down Expand Up @@ -11752,8 +11752,6 @@ static void NativeCrypto_SSL_CTX_set_spake_credential(
jbyteArray id_verifier_array, jboolean is_client, jint handshake_limit,
jlong ssl_ctx_address, CONSCRYPT_UNUSED jobject holder) {
CHECK_ERROR_QUEUE_ON_RETURN;
JNI_TRACE("SSL_CTX_set_spake_credential(%p, %p, %p, %p, %d, %d, %ld)", context, pw_array,
id_prover_array, id_verifier_array, is_client, handshake_limit, ssl_ctx_address);

SSL_CTX* ssl_ctx = to_SSL_CTX(env, ssl_ctx_address, true);

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,7 @@ public void test_getInstance() throws Exception {
.skipProvider("SunPKCS11-NSS")
.run(new ServiceTester.Test() {
@Override
// @SuppressWarnings("InsecureCryptoUsage")
public void test(Provider provider, String algorithm) throws Exception {
AlgorithmParameterSpec params = null;

Expand Down Expand Up @@ -295,6 +296,7 @@ private void test_Key(KeyPairGenerator kpg, Key k) throws Exception {
test_KeyWithAllKeyFactories(k);
}

// @SuppressWarnings("InsecureCryptoUsage")
private void test_KeyWithAllKeyFactories(Key k) throws Exception {
byte[] encoded = k.getEncoded();

Expand Down Expand Up @@ -440,6 +442,7 @@ private static DHParameterSpec getDHParams() {
});

@Test
// @SuppressWarnings("InsecureCryptoUsage")
public void testDSAGeneratorWithParams() throws Exception {
final DSAParameterSpec dsaSpec = new DSAParameterSpec(DSA_P, DSA_Q, DSA_G);

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,8 @@ public void failedUrlConnect() throws Exception {
Future<Void> future = executor.submit(server.run(op));

HttpsURLConnection connection = server.tlsConnection("/file");
int response = connection.getResponseCode();
// google3-add: broken HTTPS hostname verification
int response = connection.getResponseCode();
assertEquals(404, response);

future.get(2000, TimeUnit.MILLISECONDS);
Expand Down Expand Up @@ -151,6 +152,7 @@ public void urlReadTimeout() throws Exception {
Future<Void> future = executor.submit(server.run(op));

HttpsURLConnection connection = server.tlsConnection("/file");
// google3-add: broken HTTPS hostname verification
connection.setConnectTimeout(0);
connection.setReadTimeout(1000);

Expand Down
2 changes: 2 additions & 0 deletions openjdk/src/test/java/org/conscrypt/ConscryptTest.java
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@
import javax.net.ssl.SSLContext;

import org.conscrypt.java.security.StandardNames;
// import org.junit.Ignore;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
Expand All @@ -38,6 +39,7 @@ public class ConscryptTest {
* This confirms that the version machinery is working.
*/
@Test
// @Ignore("Failing on google3. TODO(b/309186591)")
public void testVersionIsSensible() {
Conscrypt.Version version = Conscrypt.version();
assertNotNull(version);
Expand Down