| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| | |\ \ \
| | | |/ /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lollipop-cts-dev
automerge: 2016dc6
* commit '2016dc66a98087c57a15d097fcd04e1ed171e57c':
Add exceptions for test_connectLjava_net_SocketAddressI
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
OldSocketTest's test_connectLjava_net_SocketAddressI would sometimes
fail on certain networks. The connection attempt to the 'non-reachable' IP
would be reset by a local router before the expected
timeout occured, thus causing the test to fail.
This change adds additional catch clauses for cases like this,
looking for ECONNREFUSED messages.
Bug: 18143878
Change-Id: I99a500d5c95cc25aa52ef231e6de43233f3e5316
Signed-off-by: Tiberiu Breana <tiberiu.a.breana@intel.com>
(cherry picked from commit d3ba3eb7a3fa67c1de2cb7a5ba999dcf91c13a91)
|
| |\ \ \ \
| | |/ / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lollipop-cts-dev automerge: 7feb222
* commit '3ad9b58657e3abff45108d89406e2180adf2d77a':
Fix problems with DexClassLoaderTest.
|
| | |\ \ \
| | | |/ /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
automerge: 7feb222
* commit '7feb222f57a3f9ce9d03cb574486e05533f8ef9f':
Fix problems with DexClassLoaderTest.
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This fixes a problem with the DexClassLoaderTest where oat files from
previous tests were being cached and reused for later tests. Now each
test uses its own directory for loading-test.dex and friends so they
are treated as separate dex files from test to test.
As part of this fix, the helper functions for the tests were
reorganized.
Bug: 21033982
(cherry picked from commit 5099b54aaed531ebbbeefacdca4c7ffaf458e3da)
Change-Id: I175184277a585840eca50122cf6898f00823ef3e
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Modify the tests that were using Pacific/Apia and replace with
America/Santiago instead. Pacific/Apia is missing translations
in the version of CLDR shipped with MR1. America/Santiago fits
the criterion of "has no short names".
Bug: 19212588
Change-Id: If241736446fdbbc98464952edad9cbfefc289cb6
|
|\ \ \ \ \
| | | | | |
| | | | | |
| | | | | | |
combinations before throwing InvalidKeyException" into mnc-dev
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
before throwing InvalidKeyException
Also, return saved spi in getSpi instead of recomputing a new one
Bug: 22208820
(cherry picked from commit 8157603ccf1ff124c5bebc8755404a9a825f47d3)
Change-Id: I30a06ef7d9234769b5592a0c7d665c8afa2a8ff8
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Properly exclude AndroidKeyStore from testing given that it's tested
elsewhere. Also use the same set of providers to test (generated at
setup) for all tests.
bug: 21211314
(cherry picked from commit a02da73e5741c02408fa82c189d6b0921d399b20)
Change-Id: Idcddfd223033314be1788b21caf3cf89767bccf4
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Bug: 20275572
Change-Id: I958056f757f095ad6278624e293a5583d9cee822
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
While generating key pairs, BouncyCastle checks that random numbers
are strong enough. Tests were using a mock random generator that
generates the constant 10.
Bug: 19657861
(cherry picked from commit 098bc41d846f847a6551209d65dbb74bfea3bb00)
Change-Id: Ifd1401f9b386e4039b8f51af65e5e7dc5fad15e2
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Bug: 19537384
Change-Id: I155f3db741bdac96f1ecb1ccb15b31faab85e819
(cherry picked from commit 959a23e37abdfa26059e3770eacfe36dea8fc01c)
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | | |
Change-Id: Ib97a6d9a01d30ea708e79fe10d273e1bb752dff9
(cherry picked from commit 14ba1a7bfb28a300ba9679cd9f402ee3cd48c249)
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
During the class initialization, a special path is taken when all the
built-in providers are initialized. This means that the "needsRefresh"
flag is not set initially and the cache is not refreshed when the
SecureRandom service is checked.
Bug: 21970647
Change-Id: Idb796ec5e3ac04424e5fd3a90607666ae23817d5
(cherry picked from commit 10dced1155cb3689ca63383a3b0b794bc3735268)
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
bug: 21870226
Change-Id: I6c45ef97a9f24f74f0b3ad0098ccb9ef14ddd349
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
bug: 21870226
Change-Id: I1d91661599276394343b36a6601026ad46fc6b30
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Was possibly causing a race condition (see b/21776011),
for instance, in case readFirstReceivedChunkFuture
was still executing IoUtils#closeQuietly while the
thread was cancelled.
Bug: 21776011
(cherry picked from commit c22dd77f727262ed8105b8b638aeb817997914fd)
Change-Id: Ibb20a98102d5bdc9ac3eaa0b875801ab218356f1
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Baseline Requirements say the serial number must have 20-bits of
entropy, but some certificates are issued not in compliance. This causes
issues where they are falsely marked as blacklisted. Until there is
issuer + serial number matching, we can just use the pubkey matching for
the certificates that are blacklisted with non-compliant serial numbers.
Bug: 21736046
Bug: 21816853
Change-Id: I44e6d490099fbe1da2f5afb5ef61196a4593e04f
|
|\ \ \ \ \ \ |
|
| |/ / / / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
The test got broken by AndroidKeyStore Provider exposing a Signature
implementation which does not accept vanilla public keys -- it only
accepts AndroidKeyStore Provider's public keys.
The fix is to skip AndroidKeyStore Provider in this test.
Bug: 21814211
Change-Id: If6a2241d6e3292ab9de94d14a24fd958eeb1cbf5
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Use a provider that can handle the provided public-key.
bug: 21816913
Change-Id: Iee7a932a8767c4c1b781636dfb9456a1b604532f
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
To make it easier to spot non-deprecated ciphers in the sea of
deprecated ciphers, try to visually distinguish it with CSS styling.
Bug: 21522548
Change-Id: I802024a3c33f0da394163c393ebd45a3d0bf75d0
|
|\ \ \ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
The order should be as follows:
1. Uncompressed native library dir (if any)
2. Directly from apk (<apk>!/lib/<abi>)
3. vendor/lib:/system/lib
Bug: http://b/21647354
Bug: http://b/21667767
Bug: http://b/21726698
Bug: http://b/8076853
Change-Id: I62cd76b7e4ae927d865d7d0ee81ceb91caa54e99
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Bug: 19186852
Change-Id: I8c51b309ca98030ab1eda5b2a0201a97a5758072
(cherry-pick from 9f7960cfda26dab222d522c28ca44902d996f3e4)
|
|\ \ \ \ \ \ \
| |/ / / / / /
|/| | | | | | |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
If there are no ciphers set, there should just be a handshake failure.
However, Conscrypt was throwing InvalidArgumentException in this
configuration.
(cherry picked from commit def50a267d0100fa560cf7bbcd0b9a9d5f5e068f)
Bug: 21195269
Change-Id: I73cfc4927041ca9b1331b58859382573e7de6f63
|
|\ \ \ \ \ \ \ |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Some tests fail under CTS if the device is set to use the 24 hour clock.
The tests that depend on the value of the setting are now being explicit.
Bug: 20899571
Bug: 20937589
Bug: 20939139
Bug: 20378566
Bug: 21585934
Bug: https://code.google.com/p/android/issues/detail?id=162384
Change-Id: I0f03f54b76dc5d343a2c842434412ff59908b129
|
| |/ / / / / /
|/| | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Since we don't have a specific exception type for the SCSV inappropriate
fallback cipher being used, we relied on scanning the cause message.
BoringSSL has the error message of "INAPPROPRIATE_FALLBACK" which
doesn't match the OpenSSL error message of "inappropriate fallback" so
we need to relax the test a bit to accept both.
This should be fine as we're just using the message as a proxy to
determine whether the correct thing is done and not really trying to
enforce a specific exception message.
(cherry picked from commit 43e063b43daab0962554639dda272428a59f3c24)
Bug: 21211765
Change-Id: I4e7cd5486c0eb8ab3e3f9b64b4e7234436ec4ee0
|
|\ \ \ \ \ \ \ |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
REMOVE 1024-bit root phase-out
SHA1 : 9F:AD:91:A6:CE:6A:C6:C5:00:47:C4:4E:C9:D4:A5:0D:92:D8:49:79
Subject : C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com
Not Before: Aug 1 00:00:00 1996 GMT
Not After : Jan 1 23:59:59 2021 GMT
Bug: 13469917
Change-Id: Idb58dddb48c9cadc392960c6f19575823d005560
|
|/ / / / / / /
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
AndroidKeyStore Provider requires special keys which cannot be created
through standard JCA API. The Provider does not expose ECDH at the
moment either. If/when it does expose ECDH, it will be tested in
cts/tests/tests/keystore rather than here.
Bug: 21723152
Change-Id: I73128907783b4f08c60c9af128e12a124a286054
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
In java.security javax.crypto and java.security classes with
late binding, when guessing the provider and none of the
available ones supports the specified key
Bug: 18987633
(cherry pick from e38b83dd96281d178b01476b67d354655bf2de62)
Change-Id: I5931046e9044984baf724157138bf3a7c7ef5e90
|
|/ / / / / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
ADDED Repository imported
SHA1 : BA:29:41:60:77:98:3F:F4:F3:EF:F2:31:05:3B:2E:EA:6D:4D:45:FD
Subject : C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1
Not Before: Jan 16 17:53:32 2014 GMT
Not After : Jan 16 17:53:32 2034 GMT
ADDED Repository imported
SHA1 : D8:EB:6B:41:51:92:59:E0:F3:E7:85:00:C0:3D:B6:88:97:C9:EE:FC
Subject : C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden Root CA - G3
Not Before: Nov 14 11:28:42 2013 GMT
Not After : Nov 13 23:00:00 2028 GMT
ADDED Repository imported
SHA1 : 76:E2:7E:C1:4F:DB:82:C1:C0:A6:75:B5:05:BE:3D:29:B4:ED:DB:BB
Subject : C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden EV Root CA
Not Before: Dec 8 11:19:29 2010 GMT
Not After : Dec 8 11:10:28 2022 GMT
ADDED Repository imported
SHA1 : E2:B8:29:4B:55:84:AB:6B:58:C2:90:46:6C:AC:3F:B8:39:8F:84:83
Subject : C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT
Not Before: Aug 8 03:07:01 2012 GMT
Not After : Dec 31 03:07:01 2029 GMT
ADDED Repository imported
SHA1 : DF:71:7E:AA:4A:D9:4E:C9:55:84:99:60:2D:48:DE:5F:BC:F0:3A:25
Subject : C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1
Not Before: Jan 16 18:12:23 2014 GMT
Not After : Jan 16 18:12:23 2034 GMT
ADDED from http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_h5.crt (sha1 confirmed)
SHA1 : C4:18:F6:4D:46:D1:DF:00:3D:27:30:13:72:43:A9:12:11:C6:75:FB
Subject : C=TR, L=Ankara, O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E., CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H5
Not Before: Apr 30 08:07:01 2013 GMT
Not After : Apr 28 08:07:01 2023 GMT
ADDED from http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_h6.crt (sha1 confirmed)
SHA1 : 8A:5C:8C:EE:A5:03:E6:05:56:BA:D8:1B:D4:F6:C9:B0:ED:E5:2F:E0
Subject : C=TR, L=Ankara, O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E., CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H6
Not Before: Dec 18 09:04:10 2013 GMT
Not After : Dec 16 09:04:10 2023 GMT
ADDED from http://www.certinomis.fr/publi/cer/AC_Racine_G3.cer (sha1 confirmed)
SHA1 : 9D:70:BB:01:A5:A4:A0:18:11:2E:F7:1C:01:B9:32:C5:34:E7:88:A8
Subject : C=FR, O=Certinomis, OU=0002 433998903, CN=Certinomis - Root CA
Not Before: Oct 21 09:17:18 2013 GMT
Not After : Oct 21 09:17:18 2033 GMT
REMOVE old root; last issued certificate expired
SHA1 : DA:40:18:8B:91:89:A3:ED:EE:AE:DA:97:FE:2F:9D:F5:B7:D1:8A:41
Subject : C=US, O=Equifax Secure Inc., CN=Equifax Secure eBusiness CA-1
Not Before: Jun 21 04:00:00 1999 GMT
Not After : Jun 21 04:00:00 2020 GMT
REMOVE 1024-bit root removed
SHA1 : 7E:78:4A:10:1C:82:65:CC:2D:E1:F1:6D:47:B4:40:CA:D9:0A:19:45
Subject : C=US, O=Equifax Secure Inc., CN=Equifax Secure Global eBusiness CA-1
Not Before: Jun 21 04:00:00 1999 GMT
Not After : Jun 21 04:00:00 2020 GMT
REMOVE 1024-bit root removed
SHA1 : E0:AB:05:94:20:72:54:93:05:60:62:02:36:70:F7:CD:2E:FC:66:66
Subject : C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com
Not Before: Aug 1 00:00:00 1996 GMT
Not After : Jan 1 23:59:59 2021 GMT
REMOVE 1024-bit root
SHA1 : 85:37:1C:A6:E5:50:14:3D:CE:28:03:47:1B:DE:3A:09:E8:F8:77:0F
Subject : C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
Not Before: May 18 00:00:00 1998 GMT
Not After : Aug 1 23:59:59 2028 GMT
REMOVE old root; last issued certificate expired
SHA1 : 39:21:C1:15:C1:5D:0E:CA:5C:CB:5B:C4:F0:7D:21:D8:05:0B:56:6A
Subject : C=US, O=America Online Inc., CN=America Online Root Certification Authority 1
Not Before: May 28 06:00:00 2002 GMT
Not After : Nov 19 20:43:00 2037 GMT
REMOVE old root; last issued certificate expired
SHA1 : 85:B5:FF:67:9B:0C:79:96:1F:C8:6E:44:22:00:46:13:DB:17:92:84
Subject : C=US, O=America Online Inc., CN=America Online Root Certification Authority 2
Not Before: May 28 06:00:00 2002 GMT
Not After : Sep 29 14:08:00 2037 GMT
REMOVE old root cert no longer in use
SHA1 : 80:25:EF:F4:6E:70:C8:D4:72:24:65:84:FE:40:3B:8A:8D:6A:DB:F5
Subject : C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Class 3 CA, CN=TC TrustCenter Class 3 CA II
Not Before: Jan 12 14:41:57 2006 GMT
Not After : Dec 31 22:59:59 2025 GMT
REMOVE unused, see https://bugzilla.mozilla.org/show_bug.cgi?id=850740
SHA1 : 6B:2F:34:AD:89:58:BE:62:FD:B0:6B:5C:CE:BB:9D:D9:4F:4E:39:F3
Subject : C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Universal CA, CN=TC TrustCenter Universal CA I
Not Before: Mar 22 15:54:28 2006 GMT
Not After : Dec 31 22:59:59 2025 GMT
REMOVE unused, see https://bugzilla.mozilla.org/show_bug.cgi?id=850740
SHA1 : AE:50:83:ED:7C:F4:5C:BC:8F:61:C6:21:FE:68:5D:79:42:21:15:6E
Subject : C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Class 2 CA, CN=TC TrustCenter Class 2 CA II
Not Before: Jan 12 14:38:43 2006 GMT
Not After : Dec 31 22:59:59 2025 GMT
REMOVE Audit requirements not met
SHA1 : DD:E1:D2:A9:01:80:2E:1D:87:5E:84:B3:80:7E:4B:B1:FD:99:41:34
Subject : C=TR, O=Elektronik Bilgi Guvenligi A.S., CN=e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi
Not Before: Jan 4 11:32:48 2007 GMT
Not After : Jan 4 11:32:48 2017 GMT
(cherry picked from commit 226c1f270ea2f96d13b31bdf47b929f960c29b56)
Bug: 19418204
Bug: 20033228
Bug: 20069329
Bug: 20643923
Bug: 21480355
Change-Id: I17bf8f3224832b9d67f51e3b1011530f3319058e
|
|\ \ \ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Used by native allocations to prevent deadlocks.
Bug: 21544853
Change-Id: I57b2f7ae8b74185922eb3c15ba0ab71a4d2348aa
|
|/ / / / / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
AndroidKeyStore* provider's Signature implementation requires special
keys which cannot be created through standard JCA API. This Signature
implementation is tested separately in cts/test/test/keystore.
Bug: 18088752
Bug: 20912868
Change-Id: I1f134cbae0c0136a4dec937103d6fde79192948d
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
EC keys of 192 bits have a security level of 96 bits which is well
below accepted minimum levels according to NIST SP800 131A. No need
to be able to generate these anymore. Instead test 521-bit EC keys.
(cherry picked from commit 9b8f9a1bb00f70f79f175282969d428d2aade062)
Bug: 20563457
Change-Id: I674c255c55c910bb8f9ccdf1e5ad7f69a2bdac69
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Dropped support for non-ephemeral Diffie-Hellman cipher suites, anonymous
authentication, some DES cipher suites, and export cipher suites.
Bug: 21522548
Change-Id: Ie2048d303890935969cc7c1ac7bc9d93705c7a90
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Since this is a number range, the appropriate punctuation is actually
en dash.
(cherry picked from commit 814e15db27ab930f59c8e6731b901a6c82b8e262)
Bug: 21522548
Change-Id: I99fe4c3a45b2df00671af4b6b82b21aa2c265820
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
The presence of the build-time flags appears to cause ICU4C
to open the .dat file again as a fallback if it fails to
find a config value. This is even though the .dat file is
explicitly mapped using udata_setCommonData().
Bug: 19960867
Bug: 19961406
(cherry-picked from commit 79fdcc64ea2d9234f258dac57f04b1017a573311)
Change-Id: I03f0f2d661dd2de2b0db085519159f7deb60816d
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Bug: 21582657
Bug: https://code.google.com/p/android/issues/detail?id=174949
(cherry-picked from commit b33ae4f5857e7b9ed870336655d2b42673c69146)
Change-Id: Ide0cb3ae300dbad5ae371ae7ac4fcae363ca0eba
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The docs for Signature don't guarantee that the implementation will not
throw. It is perfectly fine to throw here. The original bug for which
this check was added is bogus (re:
https://code.google.com/p/android/issues/detail?id=34933) in that the RI
behavior is clearly not the same as this test indicates with the
StandardNames.IS_RI branch.
(cherry picked from commit fb8371585860dd8f2321f47c490c1a622f5158ce)
Bug: 18869265
Change-Id: I6e413cac85daf5b14bc20adc2279741ab11d97f6
|
|\ \ \ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Bug: 19937016
(cherry picked from commit 58bef8e53e41a4b7cfe9cf647dca7c6d46528f32)
Change-Id: I347b4eee1f1e3702d34ea10feca6bc1b3f2f1ee8
|