| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
| |
This test sometimes fails, but we don't know what the coefficient of
variation is on the test results. Add this to the debug output so we can
see if there is just some wild swing during testing.
Also add a few rounds of warm-up as well.
Bug: 24011092
Change-Id: Ic58f106f68eb93976e3f030e2f23e0156fe84be8
(cherry picked from commit 5fe1cd001f38fba460ac0ce5c15b85250e400f25)
|
|
|
|
|
|
|
|
|
|
|
|
| |
Baseline Requirements say the serial number must have 20-bits of
entropy, but some certificates are issued not in compliance. This causes
issues where they are falsely marked as blacklisted. Until there is
issuer + serial number matching, we can just use the pubkey matching for
the certificates that are blacklisted with non-compliant serial numbers.
Bug: 21736046
Bug: 21816853
Change-Id: I44e6d490099fbe1da2f5afb5ef61196a4593e04f
|
|
|
|
|
|
|
| |
(cherry picked from commit 218699c1451b91c24d6f65c8b25cf7ac8fffbf7f)
Bug: 18013422
Change-Id: Ia5cfe6bf4678048e521c28cfc5f375929379070c
|
|\
| |
| |
| |
| |
| |
| | |
by having more iterations"
* commit '9a7c39c0f1a370a5604bb84b94e36267b20f29c2':
DigestTest: reduce flakiness by having more iterations
|
| |
| |
| |
| |
| |
| |
| |
| | |
This fails every once in a while sinch this isn't a rigorous benchmark,
but try to combat it by having more iterations so the measurement
has more time to stabilize.
Change-Id: I4336d0d670e1e666e5bb75788228651f563eb59a
|
|/
|
|
|
|
|
| |
Serial is: 31da7
Pubkey hash is: 3ecf4bbbe46096d514bb539bb913d77aa4ef31bf
Change-Id: I530033075a33de10d202cd8fe0850a9473b9ae19
|
|
|
|
| |
Change-Id: I3949c1b2bb55d945011003e2f10f6e8b1b52a065
|
|
|
|
| |
Change-Id: Ibc0763f1688b9ac448990abf48c534f7fcf5056a
|
|
|
|
|
|
| |
This adds a negative and positive test for pubkey blacklisting.
Change-Id: I20b23e041db624354f4b4eeab83c6fc51e3222b6
|
|
|
|
| |
Change-Id: Id453884228d10374b03f06c5fc795b68811ecc56
|
|
|
|
| |
Change-Id: I56f80e52b5974a6953e89d54d84f020d41117b2a
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
PKIXCertPathValidatorSpiTest.testTrustAndRemoteCertificatesWithDifferentEncodings
testTrustAndRemoteCertificatesWithDifferentEncodings was failing for two reasons:
1.) it improperly included the root CA which was causing a CertPathValidatorException
this started with the fix 60f1dce097d78928597a5d057577596162e825fd in external/bouncycastle
2.) the certificate expired on May 5th
After rewriting, it was clear the test had nothing to do with
PKIXCertPathValidatorSpi, so the revised test has been moved to
X500PrincipalTest.
Bug: 3474648
Change-Id: Ie9e0c5799f591a48f4ee337f6abd24968daab2d7
|
|
|
|
| |
Change-Id: Ie61022069e597d9c5c6e7ea4659fd614efe31852
|
|
Bug: 3086427
Change-Id: I026f80bfa5e963a8e988ecd6f91c9732a4afc70c
|