1. 05 Feb, 2016 1 commit
  2. 04 Feb, 2016 6 commits
  3. 03 Feb, 2016 3 commits
    • Kenny Root's avatar
      Add handshake session and ExtendedX509TrustManager support · 50dcd032
      Kenny Root authored
      This enables the new API to specify when a host should be verified by
      hostname. Before there was no public API that was capable of indicating
      to the TrustManager which DNS hostname you were intending to connect
      with.
      
      Change-Id: Ic5845d1e93f02b54d971673a280d0a3571739fbf
      50dcd032
    • Kenny Root's avatar
      Add getFileDescriptor$ call for compat · 346d38ac
      Kenny Root authored
      Newer Android versions have implemented getFileDescriptor$ to fix a bug
      in Conscrypt since libcore commit
      5d3f5200f3511c9a7107bcc0a996c7afa1b39aaf which has continued to do the
      right thing. Use this method instead since newer versions don't
      necessarily set the "impl" field on Socket instances.
      
      Bug: 25857624
      Change-Id: I64fbda844ea3b632023822f1436bd674852e327a
      346d38ac
    • Kenny Root's avatar
      Revert "Revert "Add ExtendedSSLSession, et al."" · ce18fe69
      Kenny Root authored
      This reverts commit 132c311d.
      
      Some stubs were neded to allow building on unbundled builds.
      
      Change-Id: I713d00923eecac7e323d53e561cf509794cc4fd4
      ce18fe69
  4. 02 Feb, 2016 3 commits
    • Kenny Root's avatar
      Revert "Add ExtendedSSLSession, et al." · 132c311d
      Kenny Root authored
      This reverts commit 38d12ed4.
      
      This breaks the unbundled build because of OpenSSLExtendedSessionImpl.
      
      Change-Id: I73951a6f1d5cb14c70cd807c2c895bbbdc4c8e40
      132c311d
    • Kenny Root's avatar
      Add ExtendedSSLSession, et al. · 38d12ed4
      Kenny Root authored
      In order to support SNI certificate selection of the server-side and
      enhanced certificate verification on the client side, we add
      ExtendedSSLSession and the getHandshakeSession support.
      
      This is just to set up for future implementations of SNI and
      ExtendedX509TrustManager and doesn't actually implement the logic needed
      to fully support the new features.
      
      Change-Id: I300d3134d8ab9c184d6473183612dc53658a8221
      38d12ed4
    • Kenny Root's avatar
      Add ChaCha20-Poly1305 as an enabled cipher suite · 6f9dffd8
      Kenny Root authored
      Change-Id: Idc143d37c63cf3436ccdddc22abcb11802fc6615
      6f9dffd8
  5. 28 Jan, 2016 1 commit
    • Chad Brubaker's avatar
      Compare keys using encoded form as a fallback · e06e7423
      Chad Brubaker authored
      PublicKey.equals is not required to return true on the same public key
      but from different providers, this causes incorrect lookup failures when
      the key comes from keystore.
      
      Change-Id: Iaedaa91c64eeede1d5021430c015aac746afbc97
      e06e7423
  6. 27 Jan, 2016 1 commit
    • Chad Brubaker's avatar
      Make OpenSSLX509Certificate.hashCode match the RI · 45fad1a9
      Chad Brubaker authored
      Use super.hashCode to make sure that hashCode matches the RI. Since the
      underlying certificate (and therefore the hashcode) is immutable the
      value is cached after the first call to avoid needlessly recomputing the
      hash.
      
      Bug:26386620
      Change-Id: Ic480b48e57144ac730a33dcc313cdff57fe71157
      45fad1a9
  7. 21 Jan, 2016 1 commit
    • Kenny Root's avatar
      Get rid of AlgNameMapper · d31ede7b
      Kenny Root authored
      This was only a hack to support old Harmony code, so we don't need it
      anymore. Remove the direct references to AlgNameMapper and use
      reflection for compatibility in unbundled code.
      
      Change-Id: I7ec14f19e5098ffe12592b79b2b163b41031b6e6
      d31ede7b
  8. 19 Jan, 2016 1 commit
  9. 18 Jan, 2016 2 commits
  10. 14 Jan, 2016 2 commits
    • Adam Langley's avatar
      external/conscrypt: sort list of cipher suite strings. · cabbd221
      Adam Langley authored
      This change sorts the list using sort(1).
      
      Change-Id: Ief0c407969c92405464b9b2e9ebc694f98260263
      cabbd221
    • Adam Langley's avatar
      external/conscrypt: add ChaCha20-Poly1305 cipher suite strings. · 8a585a55
      Adam Langley authored
      In preparation for a new BoringSSL import, this change adds the strings
      for the ChaCha20-Poly1305-based cipher suites, as specified in
      draft-ietf-tls-chacha20-poly1305-04.
      
      This change will cause the ciphers to be advertised via
      |getSupportedCipherSuites| even though BoringSSL hasn't been
      updated yet. This will be a transient flaw.
      
      Change-Id: If633ebb10f74d9f5706ad87d49b40ee5183dae8f
      8a585a55
  11. 11 Jan, 2016 2 commits
  12. 05 Jan, 2016 3 commits
  13. 22 Dec, 2015 6 commits
  14. 14 Dec, 2015 1 commit
  15. 11 Dec, 2015 1 commit
    • Kenny Root's avatar
      Do not sanitize the host JNI library · 45c6c990
      Kenny Root authored
      Sanitization currently makes this library reference symbols which
      cannot be resolved at runtime without additional magic when starting
      the JVM.
      
      Disable this until we can find a fix. This currently fails with:
      libconscrypt_openjdk_jni.so: undefined symbol: __asan_option_detect_stack_use_after_return
      	at java.lang.ClassLoader$NativeLibrary.load(Native Method)
      	at java.lang.ClassLoader.loadLibrary1(ClassLoader.java:1965)
      	at java.lang.ClassLoader.loadLibrary0(ClassLoader.java:1890)
      	at java.lang.ClassLoader.loadLibrary(ClassLoader.java:1880)
      	at java.lang.Runtime.loadLibrary0(Runtime.java:849)
      	at java.lang.System.loadLibrary(System.java:1088)
      	at org.conscrypt.NativeCryptoJni.init(NativeCryptoJni.java:25)
      	at org.conscrypt.NativeCrypto.<clinit>(NativeCrypto.java:54)
      	at org.conscrypt.OpenSSLBIOInputStream.<init>(OpenSSLBIOInputStream.java:34)
      	at org.conscrypt.OpenSSLX509Certificate.fromX509PemInputStream(OpenSSLX509Certificate.java:119)
      	at org.conscrypt.OpenSSLX509CertificateFactory$1.fromX509PemInputStream(OpenSSLX509CertificateFactory.java:220)
      	at org.conscrypt.OpenSSLX509CertificateFactory$1.fromX509PemInputStream(OpenSSLX509CertificateFactory.java:216)
      	at org.conscrypt.OpenSSLX509CertificateFactory$Parser.generateItem(OpenSSLX509CertificateFactory.java:94)
      	at org.conscrypt.OpenSSLX509CertificateFactory.engineGenerateCertificate(OpenSSLX509CertificateFactory.java:272)
      	at java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:339)
      	at com.android.signapk.SignApk.readPublicKey(SignApk.java:161)
      	at com.android.signapk.SignApk.main(SignApk.java:933)
      
      Bug: 26160319
      Change-Id: Icd5ffb49eb5610552af0dd049db99a0b9f181cba
      45c6c990
  16. 10 Dec, 2015 3 commits
    • Kenny Root's avatar
      Merge "Track False Start change in tests" · ecb1da1c
      Kenny Root authored
      ecb1da1c
    • Kenny Root's avatar
      Track False Start change in tests · 55ce195a
      Kenny Root authored
      In BoringSSL, the SSL_MODE_ENABLE_FALSE_START (aka
      SSL_MODE_HANDSHAKE_CUTTHROUGH) is unconditionally enabled because
      BoringSSL does the appropriate checks internally. Make sure our tests
      also reflect this fact by testing the appropriate settings.
      
      Bug: 26139262
      Bug: 26139500
      Change-Id: I125aa440cdb76d2efbfee2be7387b47d22446950
      55ce195a
    • Alex Klyubin's avatar
      Self-contained host native shared library for OpenJDK. · 0ce8205b
      Alex Klyubin authored
      This statically links in BoringSSL and libc++ into Conscrypt's JNI
      OpenJDK shared library for host. The goal is to make the library as
      self-contained as feasible to avoid issues with shared library search
      path when the library is used outside of the Android source tree.
      
      Bug: 26097626
      Change-Id: I3d1b521ad11a0f88ec46d8a7382c14ffdfd44e2e
      0ce8205b
  17. 09 Dec, 2015 3 commits