diff --git a/unittest/libmariadb/connection.c b/unittest/libmariadb/connection.c index 8edf5dfb..adc27510 100644 --- a/unittest/libmariadb/connection.c +++ b/unittest/libmariadb/connection.c @@ -2339,6 +2339,7 @@ static int test_conc748(MYSQL *my __attribute__((unused))) MYSQL *mysql; int i; const char *ciphers[3]= {"TLS_AES_128_GCM_SHA256", "TLS_AES_256_GCM_SHA384", "TLS_CHACHA20_POLY1305_SHA256"}; + my_bool verify= 0; SKIP_MAXSCALE; @@ -2348,6 +2349,7 @@ static int test_conc748(MYSQL *my __attribute__((unused))) mysql= mysql_init(NULL); mysql_ssl_set(mysql, NULL, NULL, NULL, NULL, NULL); + mysql_optionsv(mysql, MYSQL_OPT_SSL_VERIFY_SERVER_CERT, &verify); mysql_optionsv(mysql, MYSQL_OPT_SSL_CIPHER, ciphers[i]); if (!my_test_connect(mysql, hostname, username, diff --git a/unittest/libmariadb/ps_bugs.c b/unittest/libmariadb/ps_bugs.c index 3109b141..f57b42a0 100644 --- a/unittest/libmariadb/ps_bugs.c +++ b/unittest/libmariadb/ps_bugs.c @@ -5001,7 +5001,7 @@ static int test_conc_fraction(MYSQL *mysql) for (i=0; i < 10; i++, frac=frac*10+i) { - unsigned long expected= 0; + my_ulonglong expected= 0; sprintf(query, "SELECT '2018-11-05 22:25:59.%ld'", frac); diag("%d: %s", i, query); @@ -5033,7 +5033,7 @@ static int test_conc_fraction(MYSQL *mysql) if (tm.second_part != expected) { - diag("Error: tm.second_part=%ld expected=%ld", tm.second_part, expected); + diag("Error: tm.second_part=%ld expected=%lld", tm.second_part, expected); mysql_stmt_close(stmt); return FAIL; }