From 8e93f0c3bc8497a7ca1ce97a3bd8948612d52c1e Mon Sep 17 00:00:00 2001 From: Alex Klyubin Date: Thu, 30 Oct 2014 13:33:58 -0700 Subject: Mention ECDHE_PSK bug in Javadoc of PskKeyManager. Bug: 18144779 Change-Id: I50e1bb18456295170ef288ad089a0edad7f00ecf --- core/java/android/net/PskKeyManager.java | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'core/java/android/net/PskKeyManager.java') diff --git a/core/java/android/net/PskKeyManager.java b/core/java/android/net/PskKeyManager.java index d162282..f82e635 100644 --- a/core/java/android/net/PskKeyManager.java +++ b/core/java/android/net/PskKeyManager.java @@ -81,6 +81,13 @@ import javax.net.ssl.SSLEngine; * Subclasses should normally provide their own implementation of {@code getKey} because the default * implementation returns no key, which aborts the handshake. * + *

Known issues

+ * The implementation of {@code ECDHE_PSK} cipher suites in API Level 21 contains a bug which breaks + * compatibility with other implementations. {@code ECDHE_PSK} cipher suites are enabled by default + * on platforms with API Level 21 when an {@code SSLContext} is initialized with a + * {@code PskKeyManager}. A workaround is to disable {@code ECDHE_PSK} cipher suites on platforms + * with API Level 21. + * *

Example

* The following example illustrates how to create an {@code SSLContext} which enables the use of * TLS-PSK in {@code SSLSocket}, {@code SSLServerSocket} and {@code SSLEngine} instances obtained -- cgit v1.1