diff options
author | Brian Carlstrom <bdc@google.com> | 2010-04-19 13:58:57 -0700 |
---|---|---|
committer | Android (Google) Code Review <android-gerrit@google.com> | 2010-04-19 13:58:57 -0700 |
commit | 448c95ad8573f17309904dcaf0bc8655b1bcf93d (patch) | |
tree | b217e1efd93a8a27b7996bdd4fb97fc9b2c71fe1 | |
parent | 0ab2daa342fa8f73de7d068cb5e5696411a69893 (diff) | |
parent | e92ca10c7620dd54c5e13fdabb6f1ff6adefd9fd (diff) | |
download | libcore-448c95ad8573f17309904dcaf0bc8655b1bcf93d.zip libcore-448c95ad8573f17309904dcaf0bc8655b1bcf93d.tar.gz libcore-448c95ad8573f17309904dcaf0bc8655b1bcf93d.tar.bz2 |
Merge "openssl-1.0.0 upgrade"
3 files changed, 46 insertions, 24 deletions
diff --git a/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp b/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp index 5191fdc..d0682a4 100644 --- a/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp +++ b/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp @@ -1717,9 +1717,16 @@ static void org_apache_harmony_xnet_provider_jsse_OpenSSLSocketImpl_setenabledpr } static jobjectArray makeCipherList(JNIEnv* env, SSL* ssl) { + STACK_OF(SSL_CIPHER)* cipher_list = SSL_get_ciphers(ssl); // Count the ciphers. + int num = sk_SSL_CIPHER_num(cipher_list); int cipherCount = 0; - while (SSL_get_cipher_list(ssl, cipherCount) != NULL) { + for (int i = 0; i < num; ++i) { + SSL_CIPHER* cipher = sk_SSL_CIPHER_value(cipher_list, i); + if (strcmp(SSL_CIPHER_get_version(cipher), SSL_TXT_SSLV2) == 0) { + // openssl-1.0.0 includes duplicate names for SSLv2 and SSLv3 ciphers + continue; + } ++cipherCount; } @@ -1734,9 +1741,14 @@ static jobjectArray makeCipherList(JNIEnv* env, SSL* ssl) { } // Fill in the cipher names. - for (int i = 0; i < cipherCount; ++i) { - const char* c = SSL_get_cipher_list(ssl, i); - env->SetObjectArrayElement(array, i, env->NewStringUTF(c)); + int cipherIndex = 0; + for (int i = 0; i < num; ++i) { + SSL_CIPHER* cipher = sk_SSL_CIPHER_value(cipher_list, i); + if (strcmp(SSL_CIPHER_get_version(cipher), SSL_TXT_SSLV2) == 0) { + continue; + } + env->SetObjectArrayElement(array, cipherIndex, env->NewStringUTF(cipher->name)); + ++cipherIndex; } return array; } @@ -1801,15 +1813,14 @@ static void OpenSSLSocketImpl_nativeSetEnabledCipherSuites(JNIEnv* env, jclass, setEnabledCipherSuites(env, controlString, ssl_ctx); } -#define SSL_AUTH_MASK 0x00007F00L -#define SSL_aRSA 0x00000100L /* Authenticate with RSA */ -#define SSL_aDSS 0x00000200L /* Authenticate with DSS */ -#define SSL_DSS SSL_aDSS -#define SSL_aFZA 0x00000400L -#define SSL_aNULL 0x00000800L /* no Authenticate, ADH */ -#define SSL_aDH 0x00001000L /* no Authenticate, ADH */ -#define SSL_aKRB5 0x00002000L /* Authenticate with KRB5 */ -#define SSL_aECDSA 0x00004000L /* Authenticate with ECDSA */ +#define SSL_aRSA 0x00000001L +#define SSL_aDSS 0x00000002L +#define SSL_aNULL 0x00000004L +#define SSL_aDH 0x00000008L +#define SSL_aECDH 0x00000010L +#define SSL_aKRB5 0x00000020L +#define SSL_aECDSA 0x00000040L +#define SSL_aPSK 0x00000080L /** * Sets the client's crypto algorithms and authentication methods. @@ -1818,10 +1829,10 @@ static jstring org_apache_harmony_xnet_provider_jsse_OpenSSLSocketImpl_cipheraut jobject object) { SSL* ssl; - SSL_CIPHER *cipher; + const SSL_CIPHER *cipher; jstring ret; char buf[512]; - unsigned long alg; + unsigned long alg_auth; const char *au; ssl = getSslPointer(env, object, true); @@ -1831,9 +1842,9 @@ static jstring org_apache_harmony_xnet_provider_jsse_OpenSSLSocketImpl_cipheraut cipher = SSL_get_current_cipher(ssl); - alg = cipher->algorithms; + alg_auth = cipher->algorithm_auth; - switch (alg&SSL_AUTH_MASK) { + switch (alg_auth) { case SSL_aRSA: au="RSA"; break; @@ -1843,8 +1854,11 @@ static jstring org_apache_harmony_xnet_provider_jsse_OpenSSLSocketImpl_cipheraut case SSL_aDH: au="DH"; break; - case SSL_aFZA: - au = "FZA"; + case SSL_aKRB5: + au="KRB5"; + break; + case SSL_aECDH: + au = "ECDH"; break; case SSL_aNULL: au="None"; @@ -1852,6 +1866,9 @@ static jstring org_apache_harmony_xnet_provider_jsse_OpenSSLSocketImpl_cipheraut case SSL_aECDSA: au="ECDSA"; break; + case SSL_aPSK: + au="PSK"; + break; default: au="unknown"; break; @@ -2514,7 +2531,7 @@ static jstring OpenSSLSessionImpl_getCipherSuite(JNIEnv* env, jobject object) { SSL_set_session(ssl, ssl_session); - SSL_CIPHER* cipher = SSL_get_current_cipher(ssl); + const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl); jstring result = env->NewStringUTF(SSL_CIPHER_get_name(cipher)); SSL_free(ssl); diff --git a/x-net/src/test/java/tests/api/javax/net/ssl/SSLServerSocketTest.java b/x-net/src/test/java/tests/api/javax/net/ssl/SSLServerSocketTest.java index c4bae0a..d12959b 100644 --- a/x-net/src/test/java/tests/api/javax/net/ssl/SSLServerSocketTest.java +++ b/x-net/src/test/java/tests/api/javax/net/ssl/SSLServerSocketTest.java @@ -33,6 +33,7 @@ import java.io.InputStream; import java.net.InetAddress; import java.security.KeyStore; import java.security.SecureRandom; +import java.util.Arrays; import javax.net.ssl.KeyManager; import javax.net.ssl.KeyManagerFactory; @@ -327,7 +328,9 @@ public class SSLServerSocketTest extends TestCase { sss.setEnabledCipherSuites(sss.getSupportedCipherSuites()); String[] res = sss.getEnabledCipherSuites(); assertNotNull("NULL result", res); - assertTrue("No enabled cipher suites.", res.length == count); + assertEquals("not all supported cipher suites were enabled", + Arrays.asList(sss.getSupportedCipherSuites()), + Arrays.asList(res)); } /** diff --git a/x-net/src/test/java/tests/api/javax/net/ssl/SSLSocketTest.java b/x-net/src/test/java/tests/api/javax/net/ssl/SSLSocketTest.java index 13a0e59..a17df93 100644 --- a/x-net/src/test/java/tests/api/javax/net/ssl/SSLSocketTest.java +++ b/x-net/src/test/java/tests/api/javax/net/ssl/SSLSocketTest.java @@ -27,7 +27,7 @@ import javax.security.cert.X509Certificate; import java.net.*; import java.security.KeyStore; import java.security.SecureRandom; -import java.lang.String; +import java.util.Arrays; import java.io.ByteArrayInputStream; import java.io.IOException; import java.io.InputStream; @@ -636,8 +636,10 @@ public class SSLSocketTest extends TestCase { } ssl.setEnabledCipherSuites(ssl.getSupportedCipherSuites()); String[] res = ssl.getEnabledCipherSuites(); - assertEquals("not all supported cipher suites where enabled", - ssl.getSupportedCipherSuites().length, res.length); + assertNotNull("NULL result", res); + assertEquals("not all supported cipher suites were enabled", + Arrays.asList(ssl.getSupportedCipherSuites()), + Arrays.asList(res)); } /** |