- 18 Mar, 2016 2 commits
-
-
Kenny Root authored
am: 3467d643 * commit '3467d643': OpenSSLCipher: reset AAD when necessary
-
Kenny Root authored
am: b9d2def2 * commit 'b9d2def2': OpenSSLCipher: reset AAD when necessary
-
- 16 Mar, 2016 1 commit
-
-
Kenny Root authored
Due to AAD data not being reset when a Cipher instance was re-used, this bug was never uncovered by tests that actually exercise this case. Bug: 27696681 Bug: 27324690 Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
-
- 11 Mar, 2016 2 commits
-
-
Kenny Root authored
-
Kenny Root authored
Update d2i_SSL_SESSION to only throw IOException and change tests to expect that to happen. Since IOException is declared as a thrown exception, non-test code should already be expecting this. (cherry picked from commit c12c046e) Bug: 27526112 Change-Id: Ic8c1a47debce9cb76221150d050be86d010c6ec3
-
- 10 Mar, 2016 1 commit
-
-
Kenny Root authored
In an effort to not use reverse DNS, we no longer return hostnames from sockets created via IP addresses. However, this also made the SSLSession return null when a Socket is created to an IP address instead of an FQDN. While being careful not to trigger another DNS lookup, simply return a textual representation of the IP address connected when the SSLSocket has no knowledge of what the actual FQDN is supposed to be. Bug: 27123298 Change-Id: Ie37e214f91e4f005f90da0d4a2aba1cd604d60b7
-
- 08 Mar, 2016 2 commits
-
-
Kenny Root authored
AAD was not being reset correctly during init or doFinal calls thus leading to incorrect output. (cherry picked from commit 0bab7f3b) Bug: 27324690 Change-Id: If7806a9d7847814b60719637abceb94d8fbc8831
-
Kenny Root authored
Java 7 added a new method to InetSocketAddress called getHostString() which returns the unresolved host for a given address. This should be suitable for use with SNI as long as it isn't an IP address. This also helps with testing because we can use serialization tricks to rewrite the "hostname" field of an already-serialized loopback address. (cherry picked from commit bc8a290f) Bug: 27271561 Change-Id: I9845e57d505712cdfee87d18246a1a3b021deea3
-
- 04 Mar, 2016 1 commit
-
-
Alex Klyubin authored
RC4 has been deprecated for a while. It's now time to no longer use it by default. Mozilla Firefox and Chrome web browsers have already made the leap. This is a follow-up to 751965bd where TLS_RSA_WITH_RC4_128_SHA was disabled for the same reasons. Bug: 24898327 (cherry picked from commit bbe63d5d) Change-Id: Id13d3ba280139b25fdef057d9afb17ef3edf30cf
-
- 01 Mar, 2016 1 commit
-
-
Kenny Root authored
Frequently an old SSLSession cache from a different version of OpenSSL or BoringSSL will cause the de-serialization of the SSLSession information to fail. This will spam the logs and happens Frequently when GmsCore's ProviderInstaller is used. For now try to extract a bit more useful information from the error thrown by native code and don't bother to print the stack trace since it's not fatal. (cherry picked from commit de8236f4) Bug: 25328662 Change-Id: I0a396a52418e7911b98133b45bbfafcc6651e863
-
- 29 Feb, 2016 3 commits
-
-
Kenny Root authored
BoringSSL currently has no API to check which algorithms were sent in the signature_algorithms extension, so just include the known signature algorithms for BoringSSL plus the required signature algorithms for the remote side. This may not be technically correct, but it's the best we can do until we have an API in BoringSSL. The previous behavior of throwing UnsupportedOperationException was not very nice to users of this API. (cherry picked from commit 2ff9e88c) Bug: 27123298 Change-Id: Icf99a82abfe827584ab80f6a13398119b23d35d5
-
Kenny Root authored
-
Kenny Root authored
* changes: OpenSSLCipher: multiple calls to updateAAD were ignored OpenSSLCipher: reset AAD when necessary
-
- 26 Feb, 2016 4 commits
-
-
Kenny Root authored
SSLSession should be wrapped so that cached sessions might have the functionality that ExtendedSSLSession offers. This also made the SSLSessionTest fail because the pre-cached instance would be ExtendedSSLSession and the post-cached session would be a regular SSLSession. To keep compatibility with older versions of the platform, it was impossible to directly switch OpenSSLSessionImpl over to ExtendedSSLSession. So the use of a delegate in the case when the platform does have ExtendedSSLSession was required. Since older platform versions still use OpenSSLSessionImpl that extends SSLSession, we just directly inflate the serialized sessions to that. The SSLSessionTest was changed to accomodate the delegate scheme since SSLSession does not have an equals method, the tests for SSLSessionTest were directly comparing object instance equality which fails when the sessions are wrapped in a delegate like this. (cherry picked from commit 710c0817) Bug: 27123298 Change-Id: Iefbea03a72dbcc76ae0b439cfdcecd817926b7d0
-
Narayan Kamath authored
We don't call super.close() when we're wrapping a socket, so we'll have to be careful not to call any superclass methods that might end up creating a SocketImpl. bug: 27250522 (cherry picked from commit edae6d2b) Change-Id: Iabeade852e6a5c3bc923c7b3601f3edf3322fee2
-
Kenny Root authored
Do to a missing assignment statement, only the first call to updateAAD was honored and the rest were discarded. Bug: 27371173 Change-Id: I77ad7800b0905f72d5abe76b56352a94056ceb9c
-
Kenny Root authored
AAD was not being reset correctly during init or doFinal calls thus leading to incorrect output. Bug: 27324690 Change-Id: If7806a9d7847814b60719637abceb94d8fbc8831
-
- 24 Feb, 2016 1 commit
-
-
Alex Klyubin authored
RC4 has been deprecated for a while. It's now time to no longer use it by default. Mozilla Firefox and Chrome web browsers have already made the leap. Bug: 24898327 (cherry picked from commit 751965bd) Change-Id: I63fb45fe62b594ba6311d42be26e214adbab5c20
-
- 16 Feb, 2016 1 commit
-
-
Neil Fuller authored
The default is changing to v52 (1.8). The build for this package uses jarjar to repackage .class files. The version of jarjar in the Android tree does not currently support v52 .class files. Bug: 26753820 Change-Id: Id15d7a9b7dc7e32d516b259b34f96430e34a44fc
-
- 05 Feb, 2016 3 commits
-
-
Kenny Root authored
am: 024b696e * commit '024b696e': Fix OID for SHA224WithRSA
-
Kenny Root authored
am: 8ed5338f * commit '8ed5338f': Fix OID for SHA224WithRSA
-
Kenny Root authored
-
- 04 Feb, 2016 12 commits
-
-
Chad Brubaker authored
Bug: 26390415 Change-Id: I0cdcb75ba1459c747e5c88452d41a573aada4c7e
-
Kenny Root authored
am: 3439131b * commit '3439131b': Add support for honoring cipher list order
-
Kenny Root authored
am: 5666bf8f * commit '5666bf8f': Add support for honoring cipher list order
-
Kenny Root authored
am: 16b26ebf * commit '16b26ebf': Add support for SNI API
-
Kenny Root authored
am: 6f4ce164 * commit '6f4ce164': Add support for SNI API
-
Kenny Root authored
-
Kenny Root authored
-
Kenny Root authored
This allows to specify that a server's cipher suite list order should be respected and preserved over the client's cipher suite list order. Change-Id: I7f760e9b5fbc8ab6e4c9d29221c64b510498e95f
-
Kenny Root authored
This adds support for retrieving SNI name as a server and setting SNI name as a client. It currently doesn't implement use of the SNIMatcher API. Change-Id: I4f76fcbd96bd7c3398532f3858bbdd0d06103082
-
Kenny Root authored
am: 5d827183 * commit '5d827183': X509 certificates: exception for no Signature provider found
-
Kenny Root authored
am: 3892ccde * commit '3892ccde': X509 certificates: exception for no Signature provider found
-
Kenny Root authored
If the X.509 certificate's signature algorithm OID is not satisfied by any provider registered, a NoSuchAlgorithmException should be thrown. The previous behavior was an unchecked NullPointerException was thrown during the attempt to set up the (actually null) signature instance. Bug: 26954162 Change-Id: Iac3e27c823580738a54d75a45d39411456934dd5
-
- 03 Feb, 2016 6 commits
-
-
Kenny Root authored
Change-Id: Ibf746a1c9d459e87aca1a63b7aef54e6ab262445
-
Kenny Root authored
am: 50dcd032 * commit '50dcd032': Add handshake session and ExtendedX509TrustManager support
-
Kenny Root authored
This enables the new API to specify when a host should be verified by hostname. Before there was no public API that was capable of indicating to the TrustManager which DNS hostname you were intending to connect with. Change-Id: Ic5845d1e93f02b54d971673a280d0a3571739fbf
-
Kenny Root authored
am: 84ea487b * commit '84ea487b': Add getFileDescriptor$ call for compat
-
Kenny Root authored
am: 346d38ac * commit '346d38ac': Add getFileDescriptor$ call for compat
-
Kenny Root authored
Newer Android versions have implemented getFileDescriptor$ to fix a bug in Conscrypt since libcore commit 5d3f5200f3511c9a7107bcc0a996c7afa1b39aaf which has continued to do the right thing. Use this method instead since newer versions don't necessarily set the "impl" field on Socket instances. Bug: 25857624 Change-Id: I64fbda844ea3b632023822f1436bd674852e327a
-