aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPete Bentley <44170157+prbprbprb@users.noreply.github.com>2022-05-16 23:27:48 +0000
committerAutomerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>2022-05-16 23:27:48 +0000
commit75f76a2453908efd41a760c9fa4885e269706026 (patch)
treecf8b159abe90d9f9fe138fd119b5566ede3e4414
parent00619fc6e5b0375fc1af3a60830cd71c1c7200fe (diff)
parent167d0fe5af3fb308d8abd64b31fff493db940c29 (diff)
downloadconscrypt-75f76a2453908efd41a760c9fa4885e269706026.tar.gz
Make SSLSocketTest agnostic about whether TLSv1 is supported. am: 3b5ac3e6fb am: 167d0fe5af
Original change: https://android-review.googlesource.com/c/platform/external/conscrypt/+/1882478 Change-Id: Ie101b11207f351c2e1cbe250330fd6966018db0f Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-rw-r--r--common/src/test/java/org/conscrypt/javax/net/ssl/SSLSocketTest.java23
-rw-r--r--repackaged/common/src/test/java/com/android/org/conscrypt/javax/net/ssl/SSLSocketTest.java23
2 files changed, 26 insertions, 20 deletions
diff --git a/common/src/test/java/org/conscrypt/javax/net/ssl/SSLSocketTest.java b/common/src/test/java/org/conscrypt/javax/net/ssl/SSLSocketTest.java
index 1099c291..d0d5dd7e 100644
--- a/common/src/test/java/org/conscrypt/javax/net/ssl/SSLSocketTest.java
+++ b/common/src/test/java/org/conscrypt/javax/net/ssl/SSLSocketTest.java
@@ -426,9 +426,9 @@ public class SSLSocketTest {
SSLContext clientContext = c.clientContext;
SSLSocket client = (SSLSocket)
clientContext.getSocketFactory().createSocket(c.host, c.port);
- client.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1"});
+ client.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.1"});
final SSLSocket server = (SSLSocket) c.serverSocket.accept();
- server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.2", "TLSv1.1"});
ExecutorService executor = Executors.newSingleThreadExecutor();
Future<Void> future = executor.submit(new Callable<Void>() {
@Override public Void call() throws Exception {
@@ -439,7 +439,7 @@ public class SSLSocketTest {
executor.shutdown();
client.startHandshake();
- assertEquals("TLSv1", client.getSession().getProtocol());
+ assertEquals("TLSv1.1", client.getSession().getProtocol());
future.get();
client.close();
@@ -457,9 +457,9 @@ public class SSLSocketTest {
SSLContext clientContext = c.clientContext;
SSLSocket client = (SSLSocket)
clientContext.getSocketFactory().createSocket(c.host, c.port);
- client.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1"});
+ client.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.1"});
final SSLSocket server = (SSLSocket) c.serverSocket.accept();
- server.setEnabledProtocols(new String[] {"TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1"});
ExecutorService executor = Executors.newSingleThreadExecutor();
Future<Void> future = executor.submit(new Callable<Void>() {
@Override public Void call() throws Exception {
@@ -470,7 +470,7 @@ public class SSLSocketTest {
executor.shutdown();
client.startHandshake();
- assertEquals("TLSv1", client.getSession().getProtocol());
+ assertEquals("TLSv1.1", client.getSession().getProtocol());
future.get();
client.close();
@@ -1056,7 +1056,7 @@ public class SSLSocketTest {
Future<Void> s = runAsync(new Callable<Void>() {
@Override
public Void call() throws Exception {
- server.setEnabledProtocols(new String[] {"TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1"});
server.setEnabledCipherSuites(serverCipherSuites);
try {
server.startHandshake();
@@ -1072,7 +1072,7 @@ public class SSLSocketTest {
Future<Void> c = runAsync(new Callable<Void>() {
@Override
public Void call() throws Exception {
- client.setEnabledProtocols(new String[]{"TLSv1"});
+ client.setEnabledProtocols(new String[]{"TLSv1.1"});
client.setEnabledCipherSuites(clientCipherSuites);
try {
client.startHandshake();
@@ -1094,8 +1094,11 @@ public class SSLSocketTest {
@Test
public void test_SSLSocket_tlsFallback_byVersion() throws Exception {
- for (final String protocol : new String[] { "TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3" }) {
- SSLSocketFactory factory = new DelegatingSSLSocketFactory((SSLSocketFactory) SSLSocketFactory.getDefault()) {
+ String[] supportedProtocols =
+ SSLContext.getDefault().getDefaultSSLParameters().getProtocols();
+ for (final String protocol : supportedProtocols) {
+ SSLSocketFactory factory = new DelegatingSSLSocketFactory(
+ (SSLSocketFactory) SSLSocketFactory.getDefault()) {
@Override protected SSLSocket configureSocket(SSLSocket socket) {
socket.setEnabledProtocols(new String[] {protocol});
String[] enabled = socket.getEnabledCipherSuites();
diff --git a/repackaged/common/src/test/java/com/android/org/conscrypt/javax/net/ssl/SSLSocketTest.java b/repackaged/common/src/test/java/com/android/org/conscrypt/javax/net/ssl/SSLSocketTest.java
index 606dfb2e..80c84866 100644
--- a/repackaged/common/src/test/java/com/android/org/conscrypt/javax/net/ssl/SSLSocketTest.java
+++ b/repackaged/common/src/test/java/com/android/org/conscrypt/javax/net/ssl/SSLSocketTest.java
@@ -430,9 +430,9 @@ public class SSLSocketTest {
SSLContext clientContext = c.clientContext;
SSLSocket client = (SSLSocket)
clientContext.getSocketFactory().createSocket(c.host, c.port);
- client.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1"});
+ client.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.1"});
final SSLSocket server = (SSLSocket) c.serverSocket.accept();
- server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.2", "TLSv1.1"});
ExecutorService executor = Executors.newSingleThreadExecutor();
Future<Void> future = executor.submit(new Callable<Void>() {
@Override public Void call() throws Exception {
@@ -443,7 +443,7 @@ public class SSLSocketTest {
executor.shutdown();
client.startHandshake();
- assertEquals("TLSv1", client.getSession().getProtocol());
+ assertEquals("TLSv1.1", client.getSession().getProtocol());
future.get();
client.close();
@@ -461,9 +461,9 @@ public class SSLSocketTest {
SSLContext clientContext = c.clientContext;
SSLSocket client = (SSLSocket)
clientContext.getSocketFactory().createSocket(c.host, c.port);
- client.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1"});
+ client.setEnabledProtocols(new String[] {"TLSv1.3", "TLSv1.1"});
final SSLSocket server = (SSLSocket) c.serverSocket.accept();
- server.setEnabledProtocols(new String[] {"TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1"});
ExecutorService executor = Executors.newSingleThreadExecutor();
Future<Void> future = executor.submit(new Callable<Void>() {
@Override public Void call() throws Exception {
@@ -474,7 +474,7 @@ public class SSLSocketTest {
executor.shutdown();
client.startHandshake();
- assertEquals("TLSv1", client.getSession().getProtocol());
+ assertEquals("TLSv1.1", client.getSession().getProtocol());
future.get();
client.close();
@@ -1060,7 +1060,7 @@ public class SSLSocketTest {
Future<Void> s = runAsync(new Callable<Void>() {
@Override
public Void call() throws Exception {
- server.setEnabledProtocols(new String[] {"TLSv1.1", "TLSv1"});
+ server.setEnabledProtocols(new String[] {"TLSv1.2", "TLSv1.1"});
server.setEnabledCipherSuites(serverCipherSuites);
try {
server.startHandshake();
@@ -1076,7 +1076,7 @@ public class SSLSocketTest {
Future<Void> c = runAsync(new Callable<Void>() {
@Override
public Void call() throws Exception {
- client.setEnabledProtocols(new String[]{"TLSv1"});
+ client.setEnabledProtocols(new String[] {"TLSv1.1"});
client.setEnabledCipherSuites(clientCipherSuites);
try {
client.startHandshake();
@@ -1098,8 +1098,11 @@ public class SSLSocketTest {
@Test
public void test_SSLSocket_tlsFallback_byVersion() throws Exception {
- for (final String protocol : new String[] { "TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3" }) {
- SSLSocketFactory factory = new DelegatingSSLSocketFactory((SSLSocketFactory) SSLSocketFactory.getDefault()) {
+ String[] supportedProtocols =
+ SSLContext.getDefault().getDefaultSSLParameters().getProtocols();
+ for (final String protocol : supportedProtocols) {
+ SSLSocketFactory factory = new DelegatingSSLSocketFactory(
+ (SSLSocketFactory) SSLSocketFactory.getDefault()) {
@Override protected SSLSocket configureSocket(SSLSocket socket) {
socket.setEnabledProtocols(new String[] {protocol});
String[] enabled = socket.getEnabledCipherSuites();