- 08 Feb, 2013 10 commits
-
-
Kenny Root authored
-
Kenny Root authored
The "CERT_CORRECT" is actually an invalid X.509 certificate, but these test cases are now covered in more detail by luni/src/test/java/libcore/java/security/cert/X509CertificateTest.java The decoding of the alternative names in the certificate look like this via openssl command line: X509v3 Subject Alternative Name: critical 0[..rfc@822.Name..dNSName..1.0...U. ..Organization..http://uniform.Resource.Id........*..\... Change-Id: I41d4753b926715b093f558b41d102842e6b3a2da
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug reported via email by Roy Yokoyama. Change-Id: I13617d640df8f4e1000114cbe6b3b738e8405568
-
Kenny Root authored
-
Elliott Hughes authored
-
Jeff Sharkey authored
This makes writing SetObjectField() code easier. (cherry-pick of 74adde45.) Change-Id: Ia64d58748ce721cbdc89742c020edd22dbb694b0
-
Kenny Root authored
A bug in OpenSSL's dso_lib code was masking the true failure reason for this test. If it has a library name set, it would search the path for it. However, after the first failed try, it would store the error on the OpenSSL error stack, and then the next tries would fail. Changed to using ID instead of library name so we can get truer behavior. This necessitates changing the test ENGINE's ID to match what the library name is. Change-Id: I1acd1bffd6756ec3a527221cf19c6f2067ffc1a8
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: https://code.google.com/p/android/issues/detail?id=39616 Change-Id: I8143f75abc25b2f839a3e44ab800ad90ff9b9029
-
- 07 Feb, 2013 3 commits
-
-
Kenny Root authored
-
Kenny Root authored
-
Kenny Root authored
-
- 06 Feb, 2013 12 commits
-
-
Kenny Root authored
EC keys can have two different formats: explicit parameters or named curve. When you generate a key, it's typically a named curve. When you write out the parameters of the named curve and read them back, it's no longer named. Change the comparison to match the EC parameters themselves instead of concerning the test with named curve stuff. Change-Id: I4fc2fe38cf497b2ce96d1258c54833c717152ad2
-
Kenny Root authored
Change-Id: Iff593c707723811347b5b7e91bed52b07c490c9d
-
Kenny Root authored
Some of the curve names were incorrect in the ECKeyPairGenerator, so renamed them to match what OpenSSL expects. Change-Id: Ib56fe8ce30b95f7faee34a3e18add7c4037e4c47
-
Kenny Root authored
-
Kenny Root authored
Finding safe primes for the DH key pair generator can take up to 20 minutes sometimes. Use a pre-defined set of primes instead of skipping the test altogether because of the extreme amount of time it takes. This leaves us not testing one software path, but this situation is strictly better than not running the test at all. Change-Id: I03d457747e2ec1a2592c1c6350365cbe5aa33759
-
Kenny Root authored
-
Kenny Root authored
For requested keySpec, we don't necessarily need the strict equality check. Also, remove code that is unreachable: RSAPrivateCrtKeySpec is a child of RSAPrivateKeySpec, so there is no need to check whether the keySpec is assignable to the CRT spec. Change-Id: I8070541b015167d9314b83b45bd1410663487865
-
Kenny Root authored
-
Kenny Root authored
* Add hidden API to pass along the EC curve name in ECParameterSpec. The lack of name passing made KeyFactory2Test fail because the reconstructed ECDSA key had explicit curve parameters instead of an OID naming the curve. * Fix some mixing of PKCS8/X509EncodedKeySpec in DSA/ECDSA KeyFactory implementations. * Fix the KeyFactory2Test to output more useful error messages. * Remove known failure which is no longer happening. * Change EC_GROUP_get_curve_name to return the "shortName" string which matches the EC_GROUP_new_by_curve_name Bug: 3483365 Change-Id: I0a80be88bef728b2177f3593cc3421fa47b79470
-
Kenny Root authored
-
Kenny Root authored
Bug: 3387688 Change-Id: I620ae46fcf3681120c958dc847eabc6138144735
-
Nick Kralevich authored
-
- 05 Feb, 2013 13 commits
-
-
Nick Kralevich authored
Add Libcore support for execv() and execve(). This allows java programs to execute other programs without having to write jni wrappers. Change-Id: I82ddc069b5812ebd40f06b7f65ce173d496e0597
-
Elliott Hughes authored
-
Kenny Root authored
-
Elliott Hughes authored
Bug: https://code.google.com/p/android/issues/detail?id=43480 Change-Id: Id42e4458323d7ab3dafb2dec84909096988e4365
-
Kenny Root authored
We were trying to generate a public key from a private key spec which obviously doesn't work. Also fix the error messages that indicated public key when it meant private key. Change-Id: Ifae417bc3e4c56aced5b7583a34965c7f31c9c66
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I5c7f42235114a8685ca53e7f244419469b89c1eb
-
Elliott Hughes authored
-
Kenny Root authored
-
Elliott Hughes authored
Change-Id: I06a634199ff2c8dcf0a8b6e4774da4cdbfb0d774
-
Kenny Root authored
DSA keys do not always have parameters. When validating a certificate chain, the DSA key will inherit parameters from the next DSA key up the chain if DSAPublicKey#getParams() returns "null". Change-Id: I052b42219829157ebdf148abb53048044cc83f8d
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I4194810646a2a0661331aaf941fb5f99ce7758b1
-
- 04 Feb, 2013 2 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 8128460 Change-Id: I41a6baee6e22b8af9170e3e569e0599c38b5e707
-