1. 22 Mar, 2016 1 commit
  2. 21 Mar, 2016 2 commits
  3. 20 Mar, 2016 1 commit
  4. 18 Mar, 2016 10 commits
  5. 17 Mar, 2016 1 commit
    • Kenny Root's avatar
      Fix updateAAD when offset is not 0 · ac9bd77b
      Kenny Root authored
      Due to AAD data not being reset when a Cipher instance was re-used, this
      bug was never uncovered by tests that actually exercise this case.
      
      (cherry picked from commit 95cf7b9b)
      
      Bug: 27696681
      Bug: 27324690
      Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
      ac9bd77b
  6. 16 Mar, 2016 1 commit
    • Kenny Root's avatar
      Fix updateAAD when offset is not 0 · 95cf7b9b
      Kenny Root authored
      Due to AAD data not being reset when a Cipher instance was re-used, this
      bug was never uncovered by tests that actually exercise this case.
      
      Bug: 27696681
      Bug: 27324690
      Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
      95cf7b9b
  7. 12 Mar, 2016 2 commits
    • Kenny Root's avatar
      Update d2i_SSL_SESSION test expectations · 1874c5cf
      Kenny Root authored
      Update d2i_SSL_SESSION to only throw IOException and change tests to
      expect that to happen. Since IOException is declared as a thrown
      exception, non-test code should already be expecting this.
      
      (cherry picked from commit c12c046e)
      
      Bug: 27526112
      Change-Id: Ic8c1a47debce9cb76221150d050be86d010c6ec3
      1874c5cf
    • Kenny Root's avatar
      Allow SSLSession to return IP address · 522cf271
      Kenny Root authored
      In an effort to not use reverse DNS, we no longer return hostnames from
      sockets created via IP addresses. However, this also made the SSLSession
      return null when a Socket is created to an IP address instead of an
      FQDN.
      
      While being careful not to trigger another DNS lookup, simply return a
      textual representation of the IP address connected when the SSLSocket has
      no knowledge of what the actual FQDN is supposed to be.
      
      Bug: 27123298
      Change-Id: Ie37e214f91e4f005f90da0d4a2aba1cd604d60b7
      522cf271
  8. 11 Mar, 2016 2 commits
  9. 10 Mar, 2016 2 commits
    • Kenny Root's avatar
      Allow SSLSession to return IP address · ee1a1541
      Kenny Root authored
      In an effort to not use reverse DNS, we no longer return hostnames from
      sockets created via IP addresses. However, this also made the SSLSession
      return null when a Socket is created to an IP address instead of an
      FQDN.
      
      While being careful not to trigger another DNS lookup, simply return a
      textual representation of the IP address connected when the SSLSocket has
      no knowledge of what the actual FQDN is supposed to be.
      
      Bug: 27123298
      Change-Id: Ie37e214f91e4f005f90da0d4a2aba1cd604d60b7
      ee1a1541
    • Kenny Root's avatar
      Try to get peer hostname from SocketAddress · 6cc1b0c1
      Kenny Root authored
      Java 7 added a new method to InetSocketAddress called getHostString()
      which returns the unresolved host for a given address. This should be
      suitable for use with SNI as long as it isn't an IP address.
      
      This also helps with testing because we can use serialization tricks to
      rewrite the "hostname" field of an already-serialized loopback address.
      
      (cherry picked from commit bc8a290f)
      
      Bug: 27271561
      Change-Id: I9845e57d505712cdfee87d18246a1a3b021deea3
      6cc1b0c1
  10. 08 Mar, 2016 3 commits
    • Kenny Root's avatar
      OpenSSLCipher: multiple calls to updateAAD were ignored · 42841ecb
      Kenny Root authored
      Do to a missing assignment statement, only the first call to updateAAD
      was honored and the rest were discarded.
      
      (cherry picked from commit a23b05b3)
      
      Bug: 27371173
      Change-Id: I77ad7800b0905f72d5abe76b56352a94056ceb9c
      42841ecb
    • Kenny Root's avatar
      OpenSSLCipher: reset AAD when necessary · b9d2def2
      Kenny Root authored
      AAD was not being reset correctly during init or doFinal calls thus
      leading to incorrect output.
      
      (cherry picked from commit 0bab7f3b)
      
      Bug: 27324690
      Change-Id: If7806a9d7847814b60719637abceb94d8fbc8831
      b9d2def2
    • Kenny Root's avatar
      Try to get peer hostname from SocketAddress · 99bb3908
      Kenny Root authored
      Java 7 added a new method to InetSocketAddress called getHostString()
      which returns the unresolved host for a given address. This should be
      suitable for use with SNI as long as it isn't an IP address.
      
      This also helps with testing because we can use serialization tricks to
      rewrite the "hostname" field of an already-serialized loopback address.
      
      (cherry picked from commit bc8a290f)
      
      Bug: 27271561
      Change-Id: I9845e57d505712cdfee87d18246a1a3b021deea3
      99bb3908
  11. 06 Mar, 2016 1 commit
  12. 04 Mar, 2016 1 commit
    • Alex Klyubin's avatar
      Disable the two remaining RC4 cipher suites. · 035dad72
      Alex Klyubin authored
      RC4 has been deprecated for a while. It's now time to no longer use it
      by default. Mozilla Firefox and Chrome web browsers have already made
      the leap.
      
      This is a follow-up to 751965bd
      where TLS_RSA_WITH_RC4_128_SHA was disabled for the same reasons.
      
      Bug: 24898327
      
      (cherry picked from commit bbe63d5d)
      
      Change-Id: Id13d3ba280139b25fdef057d9afb17ef3edf30cf
      035dad72
  13. 03 Mar, 2016 1 commit
  14. 01 Mar, 2016 3 commits
    • Kenny Root's avatar
      Infer what signature algorithms would be used · 964da903
      Kenny Root authored
      BoringSSL currently has no API to check which algorithms were sent in
      the signature_algorithms extension, so just include the known signature
      algorithms for BoringSSL plus the required signature algorithms for the
      remote side. This may not be technically correct, but it's the best we
      can do until we have an API in BoringSSL.
      
      The previous behavior of throwing UnsupportedOperationException was not
      very nice to users of this API.
      
      (cherry picked from commit 2ff9e88c)
      
      Bug: 27123298
      Change-Id: Icf99a82abfe827584ab80f6a13398119b23d35d5
      964da903
    • Kenny Root's avatar
      OpenSSLSessionImpl: add better errors when converting · e280fa11
      Kenny Root authored
      Frequently an old SSLSession cache from a different version of OpenSSL
      or BoringSSL will cause the de-serialization of the SSLSession
      information to fail. This will spam the logs and happens Frequently
      when GmsCore's ProviderInstaller is used. For now try to extract a bit
      more useful information from the error thrown by native code and don't
      bother to print the stack trace since it's not fatal.
      
      (cherry picked from commit de8236f4)
      
      Bug: 25328662
      Change-Id: I0a396a52418e7911b98133b45bbfafcc6651e863
      e280fa11
    • The Android Automerger's avatar
  15. 29 Feb, 2016 3 commits
  16. 28 Feb, 2016 1 commit
  17. 26 Feb, 2016 4 commits
    • Kenny Root's avatar
      Wrap cached sessions before returning · edfc6deb
      Kenny Root authored
      SSLSession should be wrapped so that cached sessions might have the
      functionality that ExtendedSSLSession offers. This also made the
      SSLSessionTest fail because the pre-cached instance would be
      ExtendedSSLSession and the post-cached session would be a regular
      SSLSession.
      
      To keep compatibility with older versions of the platform, it was
      impossible to directly switch OpenSSLSessionImpl over to
      ExtendedSSLSession. So the use of a delegate in the case when the
      platform does have ExtendedSSLSession was required. Since older platform
      versions still use OpenSSLSessionImpl that extends SSLSession, we just
      directly inflate the serialized sessions to that.
      
      The SSLSessionTest was changed to accomodate the delegate scheme since
      SSLSession does not have an equals method, the tests for SSLSessionTest
      were directly comparing object instance equality which fails when the
      sessions are wrapped in a delegate like this.
      
      (cherry picked from commit 710c0817)
      
      Bug: 27123298
      Change-Id: Iefbea03a72dbcc76ae0b439cfdcecd817926b7d0
      edfc6deb
    • Narayan Kamath's avatar
      OpenSSLSocketImpl: Don't accidentally create a SocketImpl. · db1c6233
      Narayan Kamath authored
      We don't call super.close() when we're wrapping a socket, so we'll
      have to be careful not to call any superclass methods that might
      end up creating a SocketImpl.
      
      bug: 27250522
      
      (cherry picked from commit edae6d2b)
      
      Change-Id: Iabeade852e6a5c3bc923c7b3601f3edf3322fee2
      db1c6233
    • Kenny Root's avatar
      OpenSSLCipher: multiple calls to updateAAD were ignored · a23b05b3
      Kenny Root authored
      Do to a missing assignment statement, only the first call to updateAAD
      was honored and the rest were discarded.
      
      Bug: 27371173
      Change-Id: I77ad7800b0905f72d5abe76b56352a94056ceb9c
      a23b05b3
    • Kenny Root's avatar
      OpenSSLCipher: reset AAD when necessary · 0bab7f3b
      Kenny Root authored
      AAD was not being reset correctly during init or doFinal calls thus
      leading to incorrect output.
      
      Bug: 27324690
      Change-Id: If7806a9d7847814b60719637abceb94d8fbc8831
      0bab7f3b
  18. 25 Feb, 2016 1 commit