| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
To make it easier to spot non-deprecated ciphers in the sea of
deprecated ciphers, try to visually distinguish it with CSS styling.
Bug: 21522548
Change-Id: I802024a3c33f0da394163c393ebd45a3d0bf75d0
|
|
|
|
|
|
|
|
| |
Dropped support for non-ephemeral Diffie-Hellman cipher suites, anonymous
authentication, some DES cipher suites, and export cipher suites.
Bug: 21522548
Change-Id: Ie2048d303890935969cc7c1ac7bc9d93705c7a90
|
|
|
|
|
|
|
|
|
|
| |
Since this is a number range, the appropriate punctuation is actually
en dash.
(cherry picked from commit 814e15db27ab930f59c8e6731b901a6c82b8e262)
Bug: 21522548
Change-Id: I99fe4c3a45b2df00671af4b6b82b21aa2c265820
|
|
|
|
|
|
|
|
|
| |
Now that Android 5.1 (API Level 22) is out, Javadocs can mention that
DSS TLS/SSL cipher suites were removed after API Level 22. See
fef7818155899c092e6741de049fb7601dfcaf73.
Bug: 17409664
Change-Id: Ibd9da7d3056358492f25695f4949e460f1c98d48
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Prior to this change, okhttp's OkHostnameVerifier was used by default
for HttpsURLConnection instances unless changed via
HttpsURLConnection.setDefaultHostnameVerifier. However,
HttpsURLConnection.getDefaultHostnameVerifier by default returned a
different HostnameVerifier -- DefaultHostnameVerifier from libcore.
This CL fixes this discrepancy by getting rid of libcore's
DefaultHostnameVerifier and making
HttpsURLConnection.getDefaultHostnameVerifier return okhttp's
OkHostnameVerifier by default.
Bug: 18481199
Change-Id: I2ba83251f6b76b0c6c7fdccb73a10965c60e1ebe
|
|
|
|
|
|
|
|
|
|
|
| |
This repurposes tests for DefaultHostnameVerifier class to test the
platform-default HostnameVerifier (as provided by
HttpsURLConnection.getDefaultHostnameVerifier()). This is to ensure
that its contract remains stable and tested, regardless of which
implementation is used by default.
Bug: 18481199
Change-Id: Iaaf2f2274f8412eca2544d1e62c2523028914e07
|
|
|
|
|
|
|
|
| |
This is in preparation for migration from OpenSSL to BoringSSL.
BoringSSL does not support DSS.
Bug: 17409664
Change-Id: I6b2ac5f7c7b9c41416650cdbdce2deed03372f49
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This removes the workaround for TLS/SSL server certificate presented
by android.clients.google.com without Server Name Indication (SNI)
not matching android.clients.google.com
(8576f309825e23add080f2a50345ec1884939c39). This type of
service/provider-specific workaround does not belong into the core
library. Applications relying on this workaround will now need to use
SNI or a custom HostnameVerifier.
Bug: 5426333
Change-Id: I4e9b887358eefc73d3cd6a7f6f9a6aacebbfa12e
|
|\
| |
| |
| |
| | |
* commit 'e6a6e935e98f426c7000b2bf4086f87101f4441c':
Add support for TLS_FALLBACK_SCSV
|
| |
| |
| |
| |
| | |
Bug: 17750026
Change-Id: I8dec89ae59a6f745f63120b11b4f6dbe9b21a139
|
|\ \
| | |
| | |
| | |
| | | |
* commit '3a025d3db9334bab5e1e80da7c69a5f69cdd2f84':
Enable hostname verification for absolute hostnames.
|
| |\ \ |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
This makes the DefaultHostnameVerifier (the platform default
HostnameVerifier) match relative hostname patterns from CN and DNS
SubjectAltNames fields of TLS/SSL server certificates against
absolute hostnames. Absolute hostname patterns will still never match
relative hostnames because it is not known to what absolute name a
relative name was resolved by DNS.
For example, if hostname is "www.android.com." and server certificate
is for "www.android.com", hostname verification will now pass.
Whereas, if hostname is "www.android.com" and server certificate is
for "www.android.com.", hostname verification will still fail.
All of this is needed because server certificates do not normally
contain absolute hostnames or hostname patterns. At the same time,
connections via absolute hostnames should be supported and even
preferred in most cases, to avoid DNS search suffixes being added.
Bug: 17482685
Change-Id: I3f2006fa1110004b18ce627675334d2a54805c7a
|
|\ \ \ \
| |/ / /
| | | /
| |_|/
|/| | |
* commit '76d38635d9eb6b03251913a993f038da1a3759bc':
Reject wildcard certs for single-label domain names.
|
| |/
| |
| |
| |
| |
| |
| |
| |
| | |
Rejecting wildcard certs for two- (e.g., *.com) or three-label (e.g.,
*.co.uk) domain name patterns requires having a frequently updated
Prefix Suffix List.
Bug: 17552202
Change-Id: Iecd1dc8e22a51f4d779821094c5f55b310171a74
|
| |\ |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Don't bother to reload the default SocketFactory if the requested
classname didn't change since the last time.
Also make the warning when classloading fails more terse. Most of the
time the ClassLoader is wrong, so giving them a hint via
ClassLoader#toString is sufficient.
Bug: 16468683
Change-Id: I36844e942ccadda993c9f5a1523b2a66280903f3
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Apps still depend on this because the platform cannot guarantee that
SNI is used.
Bug: 5426333
Bug: 16635883
Change-Id: I4fd2090c681e814d7caeb1f94aa3604bc2ddd77c
|
|\ \ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
lmp-dev
* commit '98701d71d629b425cb03423708130b384bc88bbe':
Add a way to get all values of an attribute of DN.
|
| |\ \ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This is needed to switch Apache HTTP hostname verification from its
own Distinguished Name (DN) parsing code to this library's
DistinguishedNameParser.
Bug: 16510257
Change-Id: Iedd27cec162167dad11a4fe477d4eaa3eba004b7
|
|\ \ \ \ \
| |/ / / /
| | | / /
| |_|/ /
|/| | | |
* commit 'fa7f9bad0ae25224a366828c538bd1f0c179b56b':
SSLSocketFactory: don't reload the default if class name is same
|
| |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Don't bother to reload the default SocketFactory if the requested
classname didn't change since the last time.
Also make the warning when classloading fails more terse. Most of the
time the ClassLoader is wrong, so giving them a hint via
ClassLoader#toString is sufficient.
(cherry picked from commit 3885890273828ed02caa5de671341faca81a4e89)
Bug: 16468683
Change-Id: I36844e942ccadda993c9f5a1523b2a66280903f3
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This documents and tests that TLS-PSK cipher suites are enabled
if a PSKKeyManager is provided to SSLContext during its
initialization.
Bug: 15073623
(cherry picked from commit b5730a183c0ef94946bb04222f6219f83adef8f5)
Change-Id: Idb84b985301b575f4989f2c2a673b64e4e4930ea
|
| | |
| | |
| | |
| | |
| | |
| | | |
Please do not merge.
Change-Id: I11aabb0a603a77d86697b600fe4379817076af7f
|
| | |
| | |
| | |
| | |
| | |
| | | |
Please do not merge.
Change-Id: Iae444b6b2840916ef9a4d0962a55a74f650bd5a5
|
| | |
| | |
| | |
| | | |
Change-Id: I143d0b26b116e75892223e74b6c22b6c8db05466
|
| |\ \
| | | |
| | | |
| | | |
| | | | |
* commit 'e8a958066d95a4e15a9834e8b9067d106efd9b53':
@hide.
|
| | | |
| | | |
| | | | |
Change-Id: Ieacf34a7b850910e70ae54f738608509e2c39e2e
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
for TLS-PSK cipher suites."
* commit 'c0a8f479a47de31427211ea7952b3b92c0c650c2':
Document and assert support for TLS-PSK cipher suites.
|
| |\ \ \ \
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
reflect recent changes."
* commit 'a8a3743a541db271b25e25f179e105a48397c129':
Update SSLEngine Javadoc to reflect recent changes.
|
| |\ \ \ \ \
| | |_|_|/ /
| |/| | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
javadoc."
* commit '8efbeb67cec988289eb1eb2dd5a46154b3ef3a52':
Fix a sorting bug in SSLSocket javadoc.
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Change-Id: Iac7db4586372a9b912e5c94fb2ab88c6bf305c35
|
| |_|_|_|/
|/| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This removes the workaround for broken TLS/SSL server certificates
that were being presented by android.clients.google.com in early 2012
(8576f309825e23add080f2a50345ec1884939c39). The server is presenting
better certificates these days and the workaround is no longer needed.
Bug: 5426333
Change-Id: I4e7be7bcf522f2d210a596aa03b86a19884e075a
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This documents and tests that TLS-PSK cipher suites are enabled
if a PSKKeyManager is provided to SSLContext during its
initialization.
Bug: 15073623
Change-Id: I8e2bc3e7a1ea8a986e468973b6bad19dc6b7bc3c
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
This also fixes a typo in two TLS-PSK cipher suite names.
Bug: 15073623
Change-Id: I92d289c2b91862529faf6e06f2eb9b0a21d42b52
|
|\ \ \ \ \ \
| |/ / / / /
|/| | | | | |
|
| | |_|_|/
| |/| | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Currently the default SocketFactory is set once and never invalidated.
Use the Services cache version number to know when to invalidate our
cache.
This increases the time to get the default implementation from 63ns to
97ns on a Nexus 7 (2013) aka deb.
Change-Id: I5d46f02fccaa25e5bcea69d5ca0e4924290cf0e1
|
|/ / / /
| | | |
| | | |
| | | |
| | | |
| | | | |
(cherry picked from commit 36214feb86a0963b23f34c8c63584252bd757e19)
Change-Id: I96d5109c01e39255b9970f7a515ddd3575a50e56
|
|\ \ \ \
| |_|_|/
|/| | | |
|
| | |/
| |/|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This CL updates the Javadoc of SSLSocket and SSLEngine to list the
now supported TLS-PSK cipher suites. It also adds tests to assert
that these cipher suites are actually supported by SSLSocket and
SSLEngine.
Bug: 15073623
Change-Id: I8e59264455f980f23a5e66099c27b5b4d932b9bb
|
|\ \ \
| |/ /
|/| | |
|
| |/
| |
| |
| |
| |
| |
| | |
SSLEngine is now backed by OpenSSL and thus supports the same cipher
suites and protocols as SSLSocket.
Change-Id: I842d6806afa5f9123dae3900c8ddad537d76048a
|
|/
|
|
| |
Change-Id: I1d2eaf44191e468713e9a8ee888017a6b0f37e25
|
|
|
|
|
|
|
|
| |
Bring these exception messages more in line with what the rest of
libcore uses. Also print out the value that caused an exception to be
thrown to aid in debugging.
Change-Id: Ia2244592781091da9c3239c5f61946f6fb806204
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SSLContext.init treats null arrays of KeyManager/TrustManager
different from non-null arrays. In the case of null arrays,
SSLContext.init finds the highest priority implementation of
KeyManagerFactory/TrustManagerFactory and then obtains the required
types of KeyManager/TrustManager from these factories. In the case of
non-null arrays, SSLContext.init obtains each desired type of
KeyManager/TrustManager from the provided arrays only.
Bug: 13563574
Bug: 13563675
Change-Id: I52adc5e7143d4f050be0b22b3b464c10bb97d102
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This adds the X509ExtendedTrustManager class and all its ancillary
methods that allow it to be used. This allows the
endpointVerificationAlgorithm setting to be enabled on SSLSocket to
check that the cerificate given for the endpoint during the handshake
matched the expected hostname.
Since X509ExtendedTrustManager allows you to pass in an SSLSocket, there
is a new call added to SSLSocket called getHandshakeSession which does
not force the handshake to take place.
Bug: 13103812
Change-Id: I18a18b4f457d1676c8dc9a2a7bf7c3c4646a0425
|
|
|
|
|
|
|
|
|
|
|
| |
Although HMAC-MD5 is not yet broken, the foundations are shaky --
see http://tools.ietf.org/html/rfc6151.
Scans show that disabling these TLS/SSL cipher suites currently
causes handshake issues with 0.4% of the ecosystem.
Bug: 11220570
Change-Id: I1970d2ecbdf3c0d26e45d439047b1d3884ade2ec
|
|
|
|
|
|
|
|
|
|
|
| |
The effective key length for 3DES_EDE bulk encryption algorithm
is only 112 bits. We're now aiming for 128 and higher.
Scans show that removing these cipher suites from the default list
causes handshake issues only with 0.15% of the ecosystem.
Bug: 11220570
Change-Id: Ie01ebe8134d08a36b276295b804540157963be8f
|