1414 * limitations under the License.
1515 */
1616
17- #include < conscrypt/jniutil.h>
18-
1917#include < conscrypt/compat.h>
18+ #include < conscrypt/jniutil.h>
2019#include < conscrypt/trace.h>
21- #include < cstdlib>
2220#include < errno.h>
2321
22+ #include < cstdlib>
23+
2424namespace conscrypt {
2525namespace jniutil {
2626
27- JavaVM * gJavaVM ;
27+ JavaVM* gJavaVM ;
2828jclass cryptoUpcallsClass;
2929jclass openSslInputStreamClass;
3030jclass nativeRefClass;
@@ -84,10 +84,10 @@ void init(JavaVM* vm, JNIEnv* env) {
8484 bufferClass = findClass (env, " java/nio/Buffer" );
8585 fileDescriptorClass = findClass (env, " java/io/FileDescriptor" );
8686
87- cryptoUpcallsClass = getGlobalRefToClass (
88- env, TO_STRING (JNI_JARJAR_PREFIX) " org/conscrypt/CryptoUpcalls" );
89- nativeRefClass = getGlobalRefToClass (
90- env, TO_STRING (JNI_JARJAR_PREFIX) " org/conscrypt/NativeRef" );
87+ cryptoUpcallsClass =
88+ getGlobalRefToClass ( env, TO_STRING (JNI_JARJAR_PREFIX) " org/conscrypt/CryptoUpcalls" );
89+ nativeRefClass =
90+ getGlobalRefToClass ( env, TO_STRING (JNI_JARJAR_PREFIX) " org/conscrypt/NativeRef" );
9191 nativeRefHpkeCtxClass = getGlobalRefToClass (
9292 env, TO_STRING (JNI_JARJAR_PREFIX) " org/conscrypt/NativeRef$EVP_HPKE_CTX" );
9393 openSslInputStreamClass = getGlobalRefToClass (
@@ -106,46 +106,43 @@ void init(JavaVM* vm, JNIEnv* env) {
106106 inputStream_readMethod = getMethodRef (env, inputStreamClass, " read" , " ([B)I" );
107107 integer_valueOfMethod =
108108 env->GetStaticMethodID (integerClass, " valueOf" , " (I)Ljava/lang/Integer;" );
109- openSslInputStream_readLineMethod =
110- getMethodRef (env, openSslInputStreamClass, " gets" , " ([B)I" );
109+ openSslInputStream_readLineMethod = getMethodRef (env, openSslInputStreamClass, " gets" , " ([B)I" );
111110 outputStream_writeMethod = getMethodRef (env, outputStreamClass, " write" , " ([B)V" );
112111 outputStream_flushMethod = getMethodRef (env, outputStreamClass, " flush" , " ()V" );
113112 buffer_positionMethod = getMethodRef (env, bufferClass, " position" , " ()I" );
114113 buffer_limitMethod = getMethodRef (env, bufferClass, " limit" , " ()I" );
115114 buffer_isDirectMethod = getMethodRef (env, bufferClass, " isDirect" , " ()Z" );
116- sslHandshakeCallbacks_verifyCertificateChain =
117- getMethodRef ( env, sslHandshakeCallbacksClass, " verifyCertificateChain" , " ([[BLjava/lang/String;)V" );
115+ sslHandshakeCallbacks_verifyCertificateChain = getMethodRef (
116+ env, sslHandshakeCallbacksClass, " verifyCertificateChain" , " ([[BLjava/lang/String;)V" );
118117 sslHandshakeCallbacks_onSSLStateChange =
119- getMethodRef (env, sslHandshakeCallbacksClass, " onSSLStateChange" , " (II)V" );
120- sslHandshakeCallbacks_clientCertificateRequested =
121- getMethodRef ( env, sslHandshakeCallbacksClass, " clientCertificateRequested" , " ([B[I[[B)V" );
118+ getMethodRef (env, sslHandshakeCallbacksClass, " onSSLStateChange" , " (II)V" );
119+ sslHandshakeCallbacks_clientCertificateRequested = getMethodRef (
120+ env, sslHandshakeCallbacksClass, " clientCertificateRequested" , " ([B[I[[B)V" );
122121 sslHandshakeCallbacks_serverCertificateRequested =
123- getMethodRef (env, sslHandshakeCallbacksClass, " serverCertificateRequested" , " ()V" );
124- sslHandshakeCallbacks_clientPSKKeyRequested =
125- getMethodRef ( env, sslHandshakeCallbacksClass, " clientPSKKeyRequested" , " (Ljava/lang/String;[B[B)I" );
122+ getMethodRef (env, sslHandshakeCallbacksClass, " serverCertificateRequested" , " ()V" );
123+ sslHandshakeCallbacks_clientPSKKeyRequested = getMethodRef (
124+ env, sslHandshakeCallbacksClass, " clientPSKKeyRequested" , " (Ljava/lang/String;[B[B)I" );
126125 sslHandshakeCallbacks_serverPSKKeyRequested =
127- getMethodRef (env, sslHandshakeCallbacksClass, " serverPSKKeyRequested" , " (Ljava/lang/String;Ljava/lang/String;[B)I" );
126+ getMethodRef (env, sslHandshakeCallbacksClass, " serverPSKKeyRequested" ,
127+ " (Ljava/lang/String;Ljava/lang/String;[B)I" );
128128 sslHandshakeCallbacks_onNewSessionEstablished =
129- getMethodRef (env, sslHandshakeCallbacksClass, " onNewSessionEstablished" , " (J)V" );
129+ getMethodRef (env, sslHandshakeCallbacksClass, " onNewSessionEstablished" , " (J)V" );
130130 sslHandshakeCallbacks_serverSessionRequested =
131- getMethodRef (env, sslHandshakeCallbacksClass, " serverSessionRequested" , " ([B)J" );
131+ getMethodRef (env, sslHandshakeCallbacksClass, " serverSessionRequested" , " ([B)J" );
132132 sslHandshakeCallbacks_selectApplicationProtocol =
133- getMethodRef (env, sslHandshakeCallbacksClass, " selectApplicationProtocol" , " ([B)I" );
134- cryptoUpcallsClass_rawSignMethod = env->GetStaticMethodID (cryptoUpcallsClass,
135- " ecSignDigestWithPrivateKey" ,
136- " (Ljava/security/PrivateKey;[B)[B" );
133+ getMethodRef (env, sslHandshakeCallbacksClass, " selectApplicationProtocol" , " ([B)I" );
134+ cryptoUpcallsClass_rawSignMethod = env->GetStaticMethodID (
135+ cryptoUpcallsClass, " ecSignDigestWithPrivateKey" , " (Ljava/security/PrivateKey;[B)[B" );
137136 if (cryptoUpcallsClass_rawSignMethod == nullptr ) {
138137 env->FatalError (" Could not find ecSignDigestWithPrivateKey" );
139138 }
140- cryptoUpcallsClass_rsaSignMethod = env->GetStaticMethodID (cryptoUpcallsClass,
141- " rsaSignDigestWithPrivateKey" ,
142- " (Ljava/security/PrivateKey;I[B)[B" );
139+ cryptoUpcallsClass_rsaSignMethod = env->GetStaticMethodID (
140+ cryptoUpcallsClass, " rsaSignDigestWithPrivateKey" , " (Ljava/security/PrivateKey;I[B)[B" );
143141 if (cryptoUpcallsClass_rsaSignMethod == nullptr ) {
144142 env->FatalError (" Could not find rsaSignDigestWithPrivateKey" );
145143 }
146- cryptoUpcallsClass_rsaDecryptMethod = env->GetStaticMethodID (cryptoUpcallsClass,
147- " rsaDecryptWithPrivateKey" ,
148- " (Ljava/security/PrivateKey;I[B)[B" );
144+ cryptoUpcallsClass_rsaDecryptMethod = env->GetStaticMethodID (
145+ cryptoUpcallsClass, " rsaDecryptWithPrivateKey" , " (Ljava/security/PrivateKey;I[B)[B" );
149146 if (cryptoUpcallsClass_rsaDecryptMethod == nullptr ) {
150147 env->FatalError (" Could not find rsaDecryptWithPrivateKey" );
151148 }
@@ -257,14 +254,13 @@ int throwInvalidKeyException(JNIEnv* env, const char* message) {
257254
258255int throwIllegalArgumentException (JNIEnv* env, const char * message) {
259256 JNI_TRACE (" throwIllegalArgumentException %s" , message);
260- return conscrypt::jniutil::throwException (
261- env, " java/lang/IllegalArgumentException" , message);
257+ return conscrypt::jniutil::throwException (env, " java/lang/IllegalArgumentException" , message);
262258}
263259
264260int throwIllegalBlockSizeException (JNIEnv* env, const char * message) {
265261 JNI_TRACE (" throwIllegalBlockSizeException %s" , message);
266- return conscrypt::jniutil::throwException (
267- env, " javax/crypto/IllegalBlockSizeException " , message);
262+ return conscrypt::jniutil::throwException (env, " javax/crypto/IllegalBlockSizeException " ,
263+ message);
268264}
269265
270266int throwIllegalStateException (JNIEnv* env, const char * message) {
@@ -274,14 +270,13 @@ int throwIllegalStateException(JNIEnv* env, const char* message) {
274270
275271int throwShortBufferException (JNIEnv* env, const char * message) {
276272 JNI_TRACE (" throwShortBufferException %s" , message);
277- return conscrypt::jniutil::throwException (
278- env, " javax/crypto/ShortBufferException" , message);
273+ return conscrypt::jniutil::throwException (env, " javax/crypto/ShortBufferException" , message);
279274}
280275
281276int throwNoSuchAlgorithmException (JNIEnv* env, const char * message) {
282277 JNI_TRACE (" throwUnknownAlgorithmException %s" , message);
283- return conscrypt::jniutil::throwException (
284- env, " java/security/NoSuchAlgorithmException " , message);
278+ return conscrypt::jniutil::throwException (env, " java/security/NoSuchAlgorithmException " ,
279+ message);
285280}
286281
287282int throwIOException (JNIEnv* env, const char * message) {
@@ -291,8 +286,8 @@ int throwIOException(JNIEnv* env, const char* message) {
291286
292287int throwCertificateException (JNIEnv* env, const char * message) {
293288 JNI_TRACE (" throwCertificateException %s" , message);
294- return conscrypt::jniutil::throwException (
295- env, " java/security/cert/CertificateException " , message);
289+ return conscrypt::jniutil::throwException (env, " java/security/cert/CertificateException " ,
290+ message);
296291}
297292
298293int throwParsingException (JNIEnv* env, const char * message) {
@@ -333,9 +328,9 @@ int throwForCipherError(JNIEnv* env, int reason, const char* message,
333328 case CIPHER_R_WRONG_FINAL_BLOCK_LENGTH:
334329 return throwIllegalBlockSizeException (env, message);
335330 break ;
336- // TODO(davidben): Remove these ifdefs after
337- // https://boringssl-review.googlesource.com/c/boringssl/+/35565 has
338- // rolled out to relevant BoringSSL copies.
331+ // TODO(davidben): Remove these ifdefs after
332+ // https://boringssl-review.googlesource.com/c/boringssl/+/35565 has
333+ // rolled out to relevant BoringSSL copies.
339334#if defined(CIPHER_R_BAD_KEY_LENGTH)
340335 case CIPHER_R_BAD_KEY_LENGTH:
341336#endif
@@ -503,8 +498,7 @@ int throwSocketTimeoutException(JNIEnv* env, const char* message) {
503498
504499int throwSSLHandshakeExceptionStr (JNIEnv* env, const char * message) {
505500 JNI_TRACE (" throwSSLExceptionStr %s" , message);
506- return conscrypt::jniutil::throwException (
507- env, " javax/net/ssl/SSLHandshakeException" , message);
501+ return conscrypt::jniutil::throwException (env, " javax/net/ssl/SSLHandshakeException" , message);
508502}
509503
510504int throwSSLExceptionStr (JNIEnv* env, const char * message) {
@@ -514,8 +508,7 @@ int throwSSLExceptionStr(JNIEnv* env, const char* message) {
514508
515509int throwSSLProtocolExceptionStr (JNIEnv* env, const char * message) {
516510 JNI_TRACE (" throwSSLProtocolExceptionStr %s" , message);
517- return conscrypt::jniutil::throwException (
518- env, " javax/net/ssl/SSLProtocolException" , message);
511+ return conscrypt::jniutil::throwException (env, " javax/net/ssl/SSLProtocolException" , message);
519512}
520513
521514int throwSSLExceptionWithSslErrors (JNIEnv* env, SSL* ssl, int sslErrorCode, const char * message,
0 commit comments