1. 28 Jan, 2016 1 commit
    • Chad Brubaker's avatar
      Compare keys using encoded form as a fallback · e06e7423
      Chad Brubaker authored
      PublicKey.equals is not required to return true on the same public key
      but from different providers, this causes incorrect lookup failures when
      the key comes from keystore.
      
      Change-Id: Iaedaa91c64eeede1d5021430c015aac746afbc97
      e06e7423
  2. 27 Jan, 2016 1 commit
    • Chad Brubaker's avatar
      Make OpenSSLX509Certificate.hashCode match the RI · 45fad1a9
      Chad Brubaker authored
      Use super.hashCode to make sure that hashCode matches the RI. Since the
      underlying certificate (and therefore the hashcode) is immutable the
      value is cached after the first call to avoid needlessly recomputing the
      hash.
      
      Bug:26386620
      Change-Id: Ic480b48e57144ac730a33dcc313cdff57fe71157
      45fad1a9
  3. 21 Jan, 2016 1 commit
    • Kenny Root's avatar
      Get rid of AlgNameMapper · d31ede7b
      Kenny Root authored
      This was only a hack to support old Harmony code, so we don't need it
      anymore. Remove the direct references to AlgNameMapper and use
      reflection for compatibility in unbundled code.
      
      Change-Id: I7ec14f19e5098ffe12592b79b2b163b41031b6e6
      d31ede7b
  4. 19 Jan, 2016 1 commit
  5. 18 Jan, 2016 2 commits
  6. 14 Jan, 2016 2 commits
    • Adam Langley's avatar
      external/conscrypt: sort list of cipher suite strings. · cabbd221
      Adam Langley authored
      This change sorts the list using sort(1).
      
      Change-Id: Ief0c407969c92405464b9b2e9ebc694f98260263
      cabbd221
    • Adam Langley's avatar
      external/conscrypt: add ChaCha20-Poly1305 cipher suite strings. · 8a585a55
      Adam Langley authored
      In preparation for a new BoringSSL import, this change adds the strings
      for the ChaCha20-Poly1305-based cipher suites, as specified in
      draft-ietf-tls-chacha20-poly1305-04.
      
      This change will cause the ciphers to be advertised via
      |getSupportedCipherSuites| even though BoringSSL hasn't been
      updated yet. This will be a transient flaw.
      
      Change-Id: If633ebb10f74d9f5706ad87d49b40ee5183dae8f
      8a585a55
  7. 11 Jan, 2016 2 commits
  8. 05 Jan, 2016 3 commits
  9. 22 Dec, 2015 6 commits
  10. 14 Dec, 2015 1 commit
  11. 11 Dec, 2015 1 commit
    • Kenny Root's avatar
      Do not sanitize the host JNI library · 45c6c990
      Kenny Root authored
      Sanitization currently makes this library reference symbols which
      cannot be resolved at runtime without additional magic when starting
      the JVM.
      
      Disable this until we can find a fix. This currently fails with:
      libconscrypt_openjdk_jni.so: undefined symbol: __asan_option_detect_stack_use_after_return
      	at java.lang.ClassLoader$NativeLibrary.load(Native Method)
      	at java.lang.ClassLoader.loadLibrary1(ClassLoader.java:1965)
      	at java.lang.ClassLoader.loadLibrary0(ClassLoader.java:1890)
      	at java.lang.ClassLoader.loadLibrary(ClassLoader.java:1880)
      	at java.lang.Runtime.loadLibrary0(Runtime.java:849)
      	at java.lang.System.loadLibrary(System.java:1088)
      	at org.conscrypt.NativeCryptoJni.init(NativeCryptoJni.java:25)
      	at org.conscrypt.NativeCrypto.<clinit>(NativeCrypto.java:54)
      	at org.conscrypt.OpenSSLBIOInputStream.<init>(OpenSSLBIOInputStream.java:34)
      	at org.conscrypt.OpenSSLX509Certificate.fromX509PemInputStream(OpenSSLX509Certificate.java:119)
      	at org.conscrypt.OpenSSLX509CertificateFactory$1.fromX509PemInputStream(OpenSSLX509CertificateFactory.java:220)
      	at org.conscrypt.OpenSSLX509CertificateFactory$1.fromX509PemInputStream(OpenSSLX509CertificateFactory.java:216)
      	at org.conscrypt.OpenSSLX509CertificateFactory$Parser.generateItem(OpenSSLX509CertificateFactory.java:94)
      	at org.conscrypt.OpenSSLX509CertificateFactory.engineGenerateCertificate(OpenSSLX509CertificateFactory.java:272)
      	at java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:339)
      	at com.android.signapk.SignApk.readPublicKey(SignApk.java:161)
      	at com.android.signapk.SignApk.main(SignApk.java:933)
      
      Bug: 26160319
      Change-Id: Icd5ffb49eb5610552af0dd049db99a0b9f181cba
      45c6c990
  12. 10 Dec, 2015 3 commits
    • Kenny Root's avatar
      Merge "Track False Start change in tests" · ecb1da1c
      Kenny Root authored
      ecb1da1c
    • Kenny Root's avatar
      Track False Start change in tests · 55ce195a
      Kenny Root authored
      In BoringSSL, the SSL_MODE_ENABLE_FALSE_START (aka
      SSL_MODE_HANDSHAKE_CUTTHROUGH) is unconditionally enabled because
      BoringSSL does the appropriate checks internally. Make sure our tests
      also reflect this fact by testing the appropriate settings.
      
      Bug: 26139262
      Bug: 26139500
      Change-Id: I125aa440cdb76d2efbfee2be7387b47d22446950
      55ce195a
    • Alex Klyubin's avatar
      Self-contained host native shared library for OpenJDK. · 0ce8205b
      Alex Klyubin authored
      This statically links in BoringSSL and libc++ into Conscrypt's JNI
      OpenJDK shared library for host. The goal is to make the library as
      self-contained as feasible to avoid issues with shared library search
      path when the library is used outside of the Android source tree.
      
      Bug: 26097626
      Change-Id: I3d1b521ad11a0f88ec46d8a7382c14ffdfd44e2e
      0ce8205b
  13. 09 Dec, 2015 4 commits
    • Kenny Root's avatar
      Remove unused sub.mk · c1c501cc
      Kenny Root authored
      Previously this file was used from the main Android.mk, but that's not
      true anymore. Simply remove it.
      
      Change-Id: I16740ee73f91399b837794a625ea84c6281d73da
      c1c501cc
    • Kenny Root's avatar
      acd279ad
    • Alex Klyubin's avatar
      OID 1.2.840.10045.2.1 is EC public key. · 490bad57
      Alex Klyubin authored
      This change adds support for creating EC KeyPairGenerator and
      KeyFactory via EC public key OID 1.2.840.10045.2.1.
      
      Bug: 26097626
      Change-Id: Iedc0b74e201b115750f38eabc9e91d08a884dadd
      490bad57
    • David Benjamin's avatar
      Tweak False Start code for BoringSSL. · e36c8750
      David Benjamin authored
      BoringSSL implements False Start restrictions internally, so there is no need
      to enable it on a callback. (This will make False Start work with ALPN in
      addition to NPN.) While I'm here, switch to the less confusingly named API.
      Nothing else calls it "cutthrough" anymore.
      
      Change-Id: Ic1b7c7b9fa692fd2edf854164d10864046bf578c
      e36c8750
  14. 08 Dec, 2015 4 commits
  15. 07 Dec, 2015 2 commits
  16. 04 Dec, 2015 2 commits
  17. 03 Dec, 2015 3 commits
    • Alex Klyubin's avatar
      Support for PSS Signature configuration via PSSParameterSpec. · e5821c2a
      Alex Klyubin authored
      This adds support for configuring the PSS Signature implementation
      via java.security.spec.PSSParameterSpec. This also makes the
      signature implementation return its current configuration as
      AlgorithmParameters of algorithm "PSS" from which a PSSParameterSpec
      can be obtained.
      
      Bug: 25794302
      Change-Id: Ib7e087cdc75a6b02898afafdfc4308802d6eb5d5
      e5821c2a
    • Kenny Root's avatar
      Use some C++11 concepts · 707d18bb
      Kenny Root authored
      Run clang-modernizer over the native code and clang-format -style=file
      for the changed lines.
      
      Change-Id: I02211de90214567a128c4e3ca88aad26541a7629
      707d18bb
    • Colin Cross's avatar
      Opt-out of STL · 0a01703e
      Colin Cross authored
      conscrypt does not use STL, but gets libc++.so linked in by default.
      Unbundled branches might not have libc++.so, so opt-out of STL.
      
      Change-Id: I8c1e58a821b1d5c4c9aacfe34d605b27a105973b
      0a01703e
  18. 01 Dec, 2015 1 commit