1. 13 Oct, 2016 1 commit
    • Kenny Root's avatar
      Fix typo in name of des-ede mapping · 68a82f6e
      Kenny Root authored
      This was mapping 2-key 3DES to regular DES thus resulting in all
      encryption using 2-key 3DES having the wrong answers.
      
      (cherry picked from commit 55caed99)
      
      Bug: 31081987
      Change-Id: I44ba12dcf51d57952cf3ba501381d144d271a2a6
      (cherry picked from commit 3209baf3)
      68a82f6e
  2. 16 Jun, 2016 1 commit
  3. 15 Jun, 2016 1 commit
    • Chad Brubaker's avatar
      Move CertBlacklist to conscrypt · ce5bdd03
      Chad Brubaker authored
      CertBlacklist was previously in bouncycastle, but with the enso switch
      we no longer use their CertPathValidator and so blacklist checking
      wasn't being done.
      
      CertBlacklist is mostly unchanged from bouncycastle except removing the
      bouncycastle Digest and Hex dependencies in isPublicKeyBlackListed.
      
      Bug: 29397721
      Change-Id: Icccdcc0e108e8b0c60c47522114749518247a598
      ce5bdd03
  4. 23 May, 2016 14 commits
  5. 13 May, 2016 4 commits
  6. 02 May, 2016 2 commits
    • Kenny Root's avatar
      UniqueMutex for explicit ordering with ScopedSslBio · 885cd5fc
      Kenny Root authored
      am: dd5e93cc
      
      * commit 'dd5e93cc':
        UniqueMutex for explicit ordering with ScopedSslBio
      
      Change-Id: Ibac52a957bebedf968ebd3ccbb0d3139c310ab5b
      885cd5fc
    • Kenny Root's avatar
      UniqueMutex for explicit ordering with ScopedSslBio · dd5e93cc
      Kenny Root authored
      The MUTEX_LOCK / MUTEX_UNLOCK semantics work if you also explicitly
      clear out resources that were supposed to be cleared before the lock is
      released. However, with wrapper classes that do it automatically, you
      can't get the correct ordering. Instead of converting these all to
      manual acquire and release, convert the mutex handling to use automatic
      release via UniqueMutex so that ordering is correct with resources that
      should be protected by the mutex.
      
      Thanks to Zhen Song for finding these issues.
      
      (cherry picked from commit cdc9e2f0)
      
      Bug: 28473706
      Change-Id: I4b63ce674e0fc343fe156936df7e8f6e3130722f
      dd5e93cc
  7. 28 Mar, 2016 1 commit
    • Chad Brubaker's avatar
      Add getTrustedChainForServer · 8fa0aeec
      Chad Brubaker authored
      This adds versions of the new checkServerTrusted methods that return the
      built chain.
      
      Bug: 27271561
      Change-Id: Id03500dab962c949430ee217407bf64fec28adb7
      8fa0aeec
  8. 21 Mar, 2016 2 commits
  9. 18 Mar, 2016 10 commits
  10. 17 Mar, 2016 1 commit
    • Kenny Root's avatar
      Fix updateAAD when offset is not 0 · ac9bd77b
      Kenny Root authored
      Due to AAD data not being reset when a Cipher instance was re-used, this
      bug was never uncovered by tests that actually exercise this case.
      
      (cherry picked from commit 95cf7b9b)
      
      Bug: 27696681
      Bug: 27324690
      Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
      ac9bd77b
  11. 16 Mar, 2016 1 commit
    • Kenny Root's avatar
      Fix updateAAD when offset is not 0 · 95cf7b9b
      Kenny Root authored
      Due to AAD data not being reset when a Cipher instance was re-used, this
      bug was never uncovered by tests that actually exercise this case.
      
      Bug: 27696681
      Bug: 27324690
      Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
      95cf7b9b
  12. 11 Mar, 2016 2 commits