1. 22 Aug, 2015 1 commit
  2. 20 Aug, 2015 1 commit
    • Adam Langley's avatar
      external/conscrypt: allow server-initiated renegotiations. · 295b30e7
      Adam Langley authored
      BoringSSL disables server-initiated renegotiations by default. However,
      it's unclear what the impact of this will be. On the other hand,
      rejecting renegotiations certainly makes things simplier.
      
      (cherry picked from commit ed628f94)
      
      Bug: 23189319
      Change-Id: I0cd3f04838c0afea665a88d4f0cd0a16c1e811de
      295b30e7
  3. 23 Jun, 2015 1 commit
  4. 22 Jun, 2015 5 commits
  5. 18 Jun, 2015 1 commit
  6. 17 Jun, 2015 1 commit
  7. 16 Jun, 2015 1 commit
  8. 15 Jun, 2015 1 commit
  9. 13 Jun, 2015 1 commit
  10. 11 Jun, 2015 15 commits
    • Kenny Root's avatar
      Fix compilation with OpenSSL · b0e7a581
      Kenny Root authored
      (cherry picked from commit d9a48aa4)
      
      Bug: 21034231
      Change-Id: I1efd062a6608111e6ab468f4e362291895dd166d
      b0e7a581
    • Kenny Root's avatar
      Fix error conditions in certificate/PKCS#7 reading · 35c2503a
      Kenny Root authored
      When an error condition is encountered in BoringSSL, sometimes it
      deliberately does not put something on the ERR stack to prevent abuse of
      that knowledge. Instead we need to throw an exception explicitly when no
      error is pushed onto the stack.
      
      (cherry picked from commit 79f05f46)
      
      Bug: 21034231
      Change-Id: Ia06347c5653672c982ecff2c26be9b091d03009f
      35c2503a
    • Kenny Root's avatar
      Fix compilation with OpenSSL · 199a1346
      Kenny Root authored
      (cherry picked from commit d9a48aa4)
      
      Bug: 21034231
      Change-Id: I1efd062a6608111e6ab468f4e362291895dd166d
      199a1346
    • Kenny Root's avatar
      Fix error conditions in certificate/PKCS#7 reading · ccb8225a
      Kenny Root authored
      When an error condition is encountered in BoringSSL, sometimes it
      deliberately does not put something on the ERR stack to prevent abuse of
      that knowledge. Instead we need to throw an exception explicitly when no
      error is pushed onto the stack.
      
      (cherry picked from commit 79f05f46)
      
      Bug: 21034231
      Change-Id: Ia06347c5653672c982ecff2c26be9b091d03009f
      ccb8225a
    • Kenny Root's avatar
      d6828c47
    • Kenny Root's avatar
      Fix up JNI_TRACE for AEAD · 203afd81
      Kenny Root authored
      (cherry picked from commit edc4f273)
      
      Bug: 21762837
      Change-Id: I11042be8fe1e046ac96759b4554ce9229e1cf6f3
      203afd81
    • Kenny Root's avatar
    • Sergio Giro's avatar
      OpenSSLCipher: adjust expected length with padding in decrypt mode · 1127c196
      Sergio Giro authored
      - Consider the |final| buffer when computing the expected length
      - Should not expect an extra block when using padding in decrypting
      mode
      
      Bug: 19186852
      Change-Id: I8c51b309ca98030ab1eda5b2a0201a97a5758072
      
      (cherry-pick from 8fa4acdc)
      1127c196
    • The Android Automerger's avatar
    • Kenny Root's avatar
    • Alex Klyubin's avatar
    • Adam Langley's avatar
      external/conscrypt: tweaks for next BoringSSL import. · ca6d8d34
      Adam Langley authored
      Upstream BoringSSL has dropped |SSL_ST_BEFORE| (which appears to have been
      unused) and all the |*_LOCK_*| symbols. The latter are replaced with
      |*_up_ref|, with #if's so that it continues to work with OpenSSL.
      
      (cherry picked from commit ba3f063e)
      
      Change-Id: Ib609c83d428b7624e24e3b96c93afc2e482e6a6d
      ca6d8d34
    • Kenny Root's avatar
      Try to get preferred external provider · 9467d22b
      Kenny Root authored
      When using an opaque key, try to honor the system's preferred provider
      which is selected via late binding. If it's not found, try to find the
      first provider that initializes correctly with the given key.
      
      (cherry picked from commit c590a930)
      
      Bug: 21737886
      Change-Id: I17483136aa5c1c5e474109525aefac9facaf7379
      9467d22b
    • Adam Langley's avatar
      Fix ECDSA upcalls from TLS/SSL into JCA. · 9bca53ce
      Adam Langley authored
      When BoringSSL/OpenSSL TLS/SSL stack operates on opaque private keys
      (those that don't expose their key material) it upcalls (via
      Conscrypt's NativeCrypto) into corresponding JCA Signature and Cipher
      primitives.
      
      This fixes a crash in the ECDSA upcall when Conscrypt is used with
      BoringSSL.
      
      (cherry-picked from commit 61c66eb9)
      
      Bug: 21738458
      Change-Id: I6def1bce62f20b2ec39fe88251975458e8813362
      9bca53ce
    • Alex Klyubin's avatar
      Fix RSA upcalls from TLS/SSL into JCA. · d1b4488c
      Alex Klyubin authored
      When BoringSSL/OpenSSL TLS/SSL stack operates on opaque private keys
      (those that don't expose their key material) it upcalls (via
      Conscrypt's NativeCrypto) into corresponding JCA Signature and Cipher
      primitives.
      
      This CL fixes two issues with RSA-related upcalls, which prevented
      the use of opaque RSA private keys for TLS/SSL with Conscrypt backed
      by BoringSSL:
      * RSA sign was upcalled into RSA Cipher decrypt using private key.
        In JCA, the correct upcall is RSA Signature sign. This is now
        invoked instead of RSA Cipher decrypt.
      * RSA decrypt was not implemented. It's now implemented.
      
      As part of implementing RSA decrypt upcall from BoringSSL, it
      transpired that BoringSSL requests no padding as opposed to OpenSSL
      which requests PKCS#1 padding. As a result, this CL modifies the
      decrypt upcall to take a padding parameter. The implementation of
      the upcall (see CryptoUpcalls.java) now supports PKCS#1 padding
      scheme, OAEP padding scheme, and no padding.
      
      This CL also drops the encrypt/decrypt flag from the RSA
      encrypt/decrypt upcall and simplies it into an RSA decrypt upcall. RSA
      encrypt upcall is not needed at all.
      
      (cherry-picked from commit 279e9845)
      
      Bug: 21738458
      Change-Id: I075aa74e4cd89dd3ceab99f728ce371c7bc89cf0
      d1b4488c
  11. 10 Jun, 2015 2 commits
    • Kenny Root's avatar
      NativeCrypto: special case for empty cipher list · e5d26bcf
      Kenny Root authored
      For the Java language, setting an empty cipher list is not an error but
      it's an error in OpenSSL. However, the underlying API actually updates
      the cipher list to an empty string as intended. So we need to handle
      this special case by clearing the error stack and making sure that our
      expectation is satisfied.
      
      (cherry picked from commit 5b6a5ecc)
      
      Bug: 21195269
      Change-Id: Id21792215513f4e0d6e051160f69e5f830d39015
      e5d26bcf
    • Kenny Root's avatar
      NativeCrypto: special case for empty cipher list · d65ea6de
      Kenny Root authored
      For the Java language, setting an empty cipher list is not an error but
      it's an error in OpenSSL. However, the underlying API actually updates
      the cipher list to an empty string as intended. So we need to handle
      this special case by clearing the error stack and making sure that our
      expectation is satisfied.
      
      (cherry picked from commit 5b6a5ecc)
      
      Bug: 21195269
      Change-Id: Id21792215513f4e0d6e051160f69e5f830d39015
      d65ea6de
  12. 04 Jun, 2015 1 commit
  13. 02 Jun, 2015 5 commits
  14. 01 Jun, 2015 4 commits