- 09 Jul, 2013 3 commits
-
-
Elliott Hughes authored
Change-Id: I5115b9203ce6b11c37c0eb41fbc84fa5962ce196
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 9695860 Change-Id: I61e5a932d73c14b964c44e753c7317b532b51b6d
-
- 08 Jul, 2013 1 commit
-
-
Elliott Hughes authored
-
- 05 Jul, 2013 1 commit
-
-
jwilson authored
Change-Id: Id14de316d1eff3443ff9c91f098fe7ae4b6561cd
-
- 03 Jul, 2013 7 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 9695860 Change-Id: I5c12dc5f3c70a9fe081adf5bf5b6b4b3a115e7e1
-
Elliott Hughes authored
-
Elliott Hughes authored
Also add tests so we can't drift again in future. Bug: 9690863 Change-Id: If9d43a67a4879cb5c6b8e6cab5f7ffd7a93035ac
-
Elliott Hughes authored
-
Elliott Hughes authored
-
Lorenzo Colitti authored
This will allow us to write a CTS test for ICMPv6 datagram socket support. Bug: 9469865 Change-Id: I3da0918fa0797e7319f8b2f71856f455858bdc18
-
- 02 Jul, 2013 2 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: Icf339230e1f2789ccb5f7dbff99c760aba7b2456
-
- 01 Jul, 2013 6 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I0360fca2adf366009a5c2ae0e6a18f4e975c481a
-
Elliott Hughes authored
-
Kenny Root authored
-
Kenny Root authored
There was an unfinished code path to use Authenticated Attributes to verify JAR files. This finishes it up and allows PKCS#7 signatures with that field instead of a direct digest on the encapsulated data. The description of Authenticated Attributes can be found in RFC 3852 section 9 referred to as "authAttrs." Bug: 9625223 Change-Id: Ia2c8fc09d39fbb67c1bdcdfe087f185471dcedd4
-
Elliott Hughes authored
Bug: 3484927 Bug: 9656330 Change-Id: I34dbf3398ed955a6c621e154a7c0e4c0b51b9ebd
-
- 29 Jun, 2013 4 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I6d2417e04fd65ee95160a54b08d7cd5210973354
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I30c30799aed1b3bbd1b2c90825685cea457600d1
-
- 28 Jun, 2013 7 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I5820267491b850b8fcc696fa48962710de123009
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I9a2702970fe746b1f6bbbb438e4ce830e916bad4
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 3484927 Change-Id: I759b10ff42ebbc5849b174241fa3d9b004e10959
-
Vladimir Marko authored
Avoid read position slipping beyond limit on EOF, causing an ArrayIndexOutOfBoundsException. Also fix two incorrect checks whether to read more data. Bug: 9012715 Change-Id: I40f60becd97eb4d9f33842bea2c19e9dc531d3b7
-
- 27 Jun, 2013 6 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
We really don't want to compute a new regular expression and compile it into a new Pattern every time we call nextInt (and friends). Adding a single-element cache (flushed if the Scanner's locale changes) makes this 100x faster. There still exists a pathological case where you switch back and forth between bases. Also improve the documentation to make it clearer that you really don't want to use this awful class anyway. Also bring back a few more of the tests we lost in the gingerbread timeframe. Bug: https://code.google.com/p/android/issues/detail?id=57050 Change-Id: Id6095682fb44abae2887dda29dd3d32ac777c68f
-
Elliott Hughes authored
-
Elliott Hughes authored
Our new getopt_long(3) distinguishes between illegal, invalid, unrecognized, ambiguous, and unknown options; the old one only had ambiguous and [two slight variants of] unknown. Change-Id: Iec4f124d66e4e483292043db5a93caa4cf1a15b0
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I4acecd936075f226ae867d8b361ff422978af7de
-
- 26 Jun, 2013 1 commit
-
-
Kenny Root authored
-
- 25 Jun, 2013 1 commit
-
-
Kenny Root authored
This adds the ability to use Application-Layer Protocol Negotiation (ALPN) as both a client and a server. ALPN is essentially like Next Protocol Negotiation (NPN) but negotiation is done in the clear. This allows the use of other protocols on the same port (e.g., SPDY instead of HTTP on port 80). Although previously clients using NPN were able to use cut-through, the new ALPN API does not provide for a way for a client to enable that during a callback. So the only difference is that NPN clients can enable SSL False Start while ALPN clients cannot currently. Change-Id: I42ff70f3711e9cccaf754d189f76eeaa9db5f981
-
- 24 Jun, 2013 1 commit
-
-
Elliott Hughes authored
-