| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Cipher should check that the chosen CipherSpi actually supports
initalization with the given parameters. If not, it should return the
first exception that it ran into so that the developer can have an idea
of why the initialization failed. This is most likely do to unsupported
key or algorithm parameters.
Collapse some functions into one so it's easier to keep track of the
exception that should be thrown should all else fail. Also since we try
to initialize during the CipherSpi selection, there is no need to
initialize the returned CipherSpi again.
Also remove an instanceof check to be in line with other implementations
that just throw a ClassCastException since we now will try other
providers before falling back to throwing the unchecked exception. This
might actually provide better debug messages for a developer working on
a CipherSpi provider.
(cherry picked from commit f591462f7901011b2bce61c3cbbdc54840e5b4bc)
Bug: 22573249
Change-Id: Ieec97a8f00e9c0c3889520a3ec9f8bc4e514b35a
|
|
|
|
|
|
|
|
|
|
|
| |
before throwing InvalidKeyException
Also, return saved spi in getSpi instead of recomputing a new one
Bug: 22208820
(cherry picked from commit 8157603ccf1ff124c5bebc8755404a9a825f47d3)
Change-Id: I30a06ef7d9234769b5592a0c7d665c8afa2a8ff8
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| | |
To make it easier to spot non-deprecated ciphers in the sea of
deprecated ciphers, try to visually distinguish it with CSS styling.
Bug: 21522548
Change-Id: I802024a3c33f0da394163c393ebd45a3d0bf75d0
|
|/
|
|
|
|
|
|
|
|
|
|
| |
In java.security javax.crypto and java.security classes with
late binding, when guessing the provider and none of the
available ones supports the specified key
Bug: 18987633
(cherry pick from e38b83dd96281d178b01476b67d354655bf2de62)
Change-Id: I5931046e9044984baf724157138bf3a7c7ef5e90
|
|
|
|
|
|
|
|
| |
Dropped support for non-ephemeral Diffie-Hellman cipher suites, anonymous
authentication, some DES cipher suites, and export cipher suites.
Bug: 21522548
Change-Id: Ie2048d303890935969cc7c1ac7bc9d93705c7a90
|
|
|
|
|
|
|
|
|
|
| |
Since this is a number range, the appropriate punctuation is actually
en dash.
(cherry picked from commit 814e15db27ab930f59c8e6731b901a6c82b8e262)
Bug: 21522548
Change-Id: I99fe4c3a45b2df00671af4b6b82b21aa2c265820
|
|
|
|
|
|
|
|
|
|
|
|
| |
This reverts commit 050e672aaaaa8f8c57788e8d551f43c5fbffe339.
The users of public getSpi have been migrated to getCurrentSpi
introduced in 5d15925a79b8beddfafa8de2ede7fff360a386cb.
(cherry-picked from commit c52bf74f7e53b9f58bbeb29f4d248e7dba7d15ce)
Bug: 18088752
Change-Id: Ied72c8a62a49d9fba8b7bc2d3ef2e30da7daa6e4
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
050e672aaaaa8f8c57788e8d551f43c5fbffe339 exposed the existing getSpi
method of Cipher, Signature, Mac, and KeyAgreement as hidden API.
Unfortunately, the getSpi method creates an SPI instance if one is
not yet set. This changes the state of the crypto operation and does
does not lend itself well to being used for read-only querying of
the SPI from a crypto operation.
This CL addresses the issue by adding a getCurrentSpi hidden API to
these crypto operations. getCurrentSpi simply returns the current SPI
instance, if any, and does not modify the state of the crypto
operation.
A follow-up CL will revert 050e672aaaaa8f8c57788e8d551f43c5fbffe339
which will no longer be needed. This is not reverted here to avoid
breaking the build.
(cherry-picked from commit 5d15925a79b8beddfafa8de2ede7fff360a386cb)
Bug: 18088752
Change-Id: I8de4c121c9a395b3687b173d0bba4e1931ebf958
|
|
|
|
|
|
|
|
| |
Also, fix the package name of the corresponding test so that
vogar isn't confused.
bug: 19245702
Change-Id: I647f0c9ca4c81bb41d4b64088b60f37ebc671e84
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This makes it possible for platform code to obtain the current SPI
implementation of Cipher, Signature, Mac, and KeyAgreement instances.
The current use case is to access additional information about these
crypto operations when they are backed by Android KeyStore.
NOTE: The getSpi API will not and cannot become public framework API.
Bug: 18088752
Change-Id: If575726d288eebc73ffa3209c316fad071a087fd
|
|\ \
| |/
|/| |
|
| |
| |
| |
| | |
Change-Id: I7a5c8095e98f1449fb4efc98061c488fd0b573e2
|
|\ \ |
|
| |/
| |
| |
| | |
Change-Id: I77605ad05ac5e9dfac07f40a2280221f9c641c65
|
|/
|
|
|
|
|
|
|
|
| |
If a Provider is specified in a call to Signature#getInstance,
Cipher#getInstance, KeyAgreement#getInstance, or Mac#getInstance,
it should return that provider no matter if the properties on that
provider say it should support it.
Bug: 19730263
Change-Id: I56045e4cb470a0e1aa0e108a443e04043467c475
|
|
|
|
|
|
|
|
|
| |
Now that Android 5.1 (API Level 22) is out, Javadocs can mention that
DSS TLS/SSL cipher suites were removed after API Level 22. See
fef7818155899c092e6741de049fb7601dfcaf73.
Bug: 17409664
Change-Id: Ibd9da7d3056358492f25695f4949e460f1c98d48
|
|
|
|
|
|
|
|
|
| |
Cipher.update(byte[], int, int inputLen) is supposed to return null
when inputLen is zero. This CL makes it so. Prior to this CL, this
method returned an empty byte array.
Bug: 19100173
Change-Id: I5698f11f76a17dd8fc2509be5d8ec9369a888eaf
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Prior to this change, okhttp's OkHostnameVerifier was used by default
for HttpsURLConnection instances unless changed via
HttpsURLConnection.setDefaultHostnameVerifier. However,
HttpsURLConnection.getDefaultHostnameVerifier by default returned a
different HostnameVerifier -- DefaultHostnameVerifier from libcore.
This CL fixes this discrepancy by getting rid of libcore's
DefaultHostnameVerifier and making
HttpsURLConnection.getDefaultHostnameVerifier return okhttp's
OkHostnameVerifier by default.
Bug: 18481199
Change-Id: I2ba83251f6b76b0c6c7fdccb73a10965c60e1ebe
|
|
|
|
|
|
|
|
|
|
|
| |
This repurposes tests for DefaultHostnameVerifier class to test the
platform-default HostnameVerifier (as provided by
HttpsURLConnection.getDefaultHostnameVerifier()). This is to ensure
that its contract remains stable and tested, regardless of which
implementation is used by default.
Bug: 18481199
Change-Id: Iaaf2f2274f8412eca2544d1e62c2523028914e07
|
|
|
|
|
|
|
|
| |
This is in preparation for migration from OpenSSL to BoringSSL.
BoringSSL does not support DSS.
Bug: 17409664
Change-Id: I6b2ac5f7c7b9c41416650cdbdce2deed03372f49
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This removes the workaround for TLS/SSL server certificate presented
by android.clients.google.com without Server Name Indication (SNI)
not matching android.clients.google.com
(8576f309825e23add080f2a50345ec1884939c39). This type of
service/provider-specific workaround does not belong into the core
library. Applications relying on this workaround will now need to use
SNI or a custom HostnameVerifier.
Bug: 5426333
Change-Id: I4e9b887358eefc73d3cd6a7f6f9a6aacebbfa12e
|
|\
| |
| |
| |
| |
| |
| | |
web site"
* commit '5309a0c2567efb1f349171906c023f3f02846280':
autoclose all <a name> tags so they don't disappear on web site
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
<a> tags with the name attribute---used to create a page anchor---must be
closed immediately and not contain any text because, in order to make the
appropriate content visible below the site's "sticky header" when the anchor
is followed, CSS is used to hide the <a name> element and position it
up higher by an offset equal to the height of the sticky header.
So, do not place text inside an <a> tag with the name attribute.
(cherry-pick of 936306df62d7d44a806fbeb789c6432e7c325981.)
Change-Id: Icae1b1f0716aa02d003f921b8e430ad3c99f26d0
|
|\ \
| | |
| | |
| | |
| | | |
* commit 'e6a6e935e98f426c7000b2bf4086f87101f4441c':
Add support for TLS_FALLBACK_SCSV
|
| | |
| | |
| | |
| | |
| | | |
Bug: 17750026
Change-Id: I8dec89ae59a6f745f63120b11b4f6dbe9b21a139
|
|\ \ \
| | |/
| |/|
| | |
| | | |
* commit '3a025d3db9334bab5e1e80da7c69a5f69cdd2f84':
Enable hostname verification for absolute hostnames.
|
| |\ \ |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
This makes the DefaultHostnameVerifier (the platform default
HostnameVerifier) match relative hostname patterns from CN and DNS
SubjectAltNames fields of TLS/SSL server certificates against
absolute hostnames. Absolute hostname patterns will still never match
relative hostnames because it is not known to what absolute name a
relative name was resolved by DNS.
For example, if hostname is "www.android.com." and server certificate
is for "www.android.com", hostname verification will now pass.
Whereas, if hostname is "www.android.com" and server certificate is
for "www.android.com.", hostname verification will still fail.
All of this is needed because server certificates do not normally
contain absolute hostnames or hostname patterns. At the same time,
connections via absolute hostnames should be supported and even
preferred in most cases, to avoid DNS search suffixes being added.
Bug: 17482685
Change-Id: I3f2006fa1110004b18ce627675334d2a54805c7a
|
|\ \ \ \
| |/ / /
| | | /
| |_|/
|/| | |
* commit '76d38635d9eb6b03251913a993f038da1a3759bc':
Reject wildcard certs for single-label domain names.
|
| |/
| |
| |
| |
| |
| |
| |
| |
| | |
Rejecting wildcard certs for two- (e.g., *.com) or three-label (e.g.,
*.co.uk) domain name patterns requires having a frequently updated
Prefix Suffix List.
Bug: 17552202
Change-Id: Iecd1dc8e22a51f4d779821094c5f55b310171a74
|
| |\ |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Don't bother to reload the default SocketFactory if the requested
classname didn't change since the last time.
Also make the warning when classloading fails more terse. Most of the
time the ClassLoader is wrong, so giving them a hint via
ClassLoader#toString is sufficient.
Bug: 16468683
Change-Id: I36844e942ccadda993c9f5a1523b2a66280903f3
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Apps still depend on this because the platform cannot guarantee that
SNI is used.
Bug: 5426333
Bug: 16635883
Change-Id: I4fd2090c681e814d7caeb1f94aa3604bc2ddd77c
|
|\ \ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
lmp-dev
* commit '98701d71d629b425cb03423708130b384bc88bbe':
Add a way to get all values of an attribute of DN.
|
| |\ \ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This is needed to switch Apache HTTP hostname verification from its
own Distinguished Name (DN) parsing code to this library's
DistinguishedNameParser.
Bug: 16510257
Change-Id: Iedd27cec162167dad11a4fe477d4eaa3eba004b7
|
|\ \ \ \ \
| |/ / / /
| | | / /
| |_|/ /
|/| | | |
* commit 'fa7f9bad0ae25224a366828c538bd1f0c179b56b':
SSLSocketFactory: don't reload the default if class name is same
|
| |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Don't bother to reload the default SocketFactory if the requested
classname didn't change since the last time.
Also make the warning when classloading fails more terse. Most of the
time the ClassLoader is wrong, so giving them a hint via
ClassLoader#toString is sufficient.
(cherry picked from commit 3885890273828ed02caa5de671341faca81a4e89)
Bug: 16468683
Change-Id: I36844e942ccadda993c9f5a1523b2a66280903f3
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This documents and tests that TLS-PSK cipher suites are enabled
if a PSKKeyManager is provided to SSLContext during its
initialization.
Bug: 15073623
(cherry picked from commit b5730a183c0ef94946bb04222f6219f83adef8f5)
Change-Id: Idb84b985301b575f4989f2c2a673b64e4e4930ea
|
| | |
| | |
| | |
| | |
| | |
| | | |
Please do not merge.
Change-Id: I11aabb0a603a77d86697b600fe4379817076af7f
|
| | |
| | |
| | |
| | |
| | |
| | | |
Please do not merge.
Change-Id: Iae444b6b2840916ef9a4d0962a55a74f650bd5a5
|
| | |
| | |
| | |
| | | |
Change-Id: I143d0b26b116e75892223e74b6c22b6c8db05466
|
| |\ \
| | | |
| | | |
| | | |
| | | | |
* commit 'e8a958066d95a4e15a9834e8b9067d106efd9b53':
@hide.
|
| | | |
| | | |
| | | | |
Change-Id: Ieacf34a7b850910e70ae54f738608509e2c39e2e
|
| |\ \ \
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
for TLS-PSK cipher suites."
* commit 'c0a8f479a47de31427211ea7952b3b92c0c650c2':
Document and assert support for TLS-PSK cipher suites.
|
| |\ \ \ \
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
reflect recent changes."
* commit 'a8a3743a541db271b25e25f179e105a48397c129':
Update SSLEngine Javadoc to reflect recent changes.
|
| |\ \ \ \ \
| | |_|_|/ /
| |/| | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
javadoc."
* commit '8efbeb67cec988289eb1eb2dd5a46154b3ef3a52':
Fix a sorting bug in SSLSocket javadoc.
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Change-Id: Iac7db4586372a9b912e5c94fb2ab88c6bf305c35
|