Skip to content
Commits on Oct 6, 2012
  1. @kruton

    Merge "NativeCrypto: clear errors for key verification"

    kruton committed with Gerrit Code Review
Commits on Oct 5, 2012
  1. @kruton

    NativeCrypto: clear errors for key verification

    kruton committed
    It appears that OpenSSL has a bug where any DSA key verification
    operation that fails will push an error on the OpenSSL error stack. This
    change will clear the error state whenever a key verification is
    performed.
    
    Change-Id: I48e608aabb34974c5a55b3adf54d7c9059c69b90
  2. @kruton

    Merge "NativeCrypto: add tests for DSA and RSA keys"

    kruton committed with Gerrit Code Review
  3. @kruton

    Merge "NativeCrypto: add test for EVP_SignInit"

    kruton committed with Gerrit Code Review
  4. @kruton

    Merge "NativeCrypto: add assertions for no OpenSSL errors"

    kruton committed with Gerrit Code Review
  5. @kruton

    NativeCrypto: add tests for DSA and RSA keys

    kruton committed
    Change-Id: I75c924fe67e24948ba26640e99fcc1748671ddf5
  6. @kruton

    NativeCrypto: add test for EVP_SignInit

    kruton committed
    EVP_SignInit was not clearing OpenSSL errors when it encountered a bad
    algorithm name.
    
    Change-Id: I1b2a18ce51c784e0e9a3fb37574b34180c6f8719
  7. @kruton

    NativeCrypto: add assertions for no OpenSSL errors

    kruton committed
    Some calls in NativeCrypto appear to be not clearing error states. Add
    an assertion at the end of each test to make sure this doesn't happen.
    
    Change-Id: I9030891a8dc9e7715e65071fe949a11d7a560e56
  8. @enh

    Merge "Slim down ZoneInfo.toString."

    enh committed with Gerrit Code Review
  9. @enh

    Slim down ZoneInfo.toString.

    enh committed
    Dalvik Explorer can now do a better job of helping examine transition data,
    and regular developers don't need to see it. For America/Los_Angeles, for
    example, toString used to output 186 lines. Now it just returns:
    
      libcore.util.ZoneInfo[id="America/Los_Angeles",mRawOffset=-28800000,mEarliestRawOffset=-28800000,mUseDst=true,mDstSavings=3600000,transitions=185]
    
    Also fix an incorrect comment from the TimeZone documentation.
    
    Change-Id: I5748845a7b4f911e99a0e1c2e1a0786742288518
  10. @kruton

    Merge "OpenSSLCipher: account for padding on doFinal"

    kruton committed with Gerrit Code Review
  11. @kruton

    Merge "Do not use OpenSSLCipherContext in tests"

    kruton committed with Gerrit Code Review
  12. @kruton

    Do not use OpenSSLCipherContext in tests

    kruton committed
    Change-Id: I422954e7e9a9d1021d4281a254cdd732f37ca2bf
  13. @kruton

    OpenSSLCipher: account for padding on doFinal

    kruton committed
    Decrypting also needs to check padding on the last block, so special
    case encrypting in getOutputSize
    
    Change-Id: I0bfaf6f40f5d618e4dd1853668ec5400058e6b67
  14. @enh

    Merge "Add a test for ResourceBundle.Control.getCandidateLocales."

    enh committed with Gerrit Code Review
  15. @enh

    Add a test for ResourceBundle.Control.getCandidateLocales.

    enh committed
    Bug: http://code.google.com/p/android/issues/detail?id=16368
    Change-Id: I44d2f66f80fb79a6bf6c869ccf9b0e95402b296c
  16. @enh

    Merge "Remove unnecessary #include."

    enh committed with Gerrit Code Review
  17. @enh

    Remove unnecessary #include.

    enh committed
    Change-Id: Ie95f39627ed068818b323e03bdbe7765285409d2
  18. @kruton

    Merge "OpenSSLMac: add license header"

    kruton committed with Gerrit Code Review
  19. Merge "Fix a bug in tunnel construction and 'Connection: close' heade…

    Brian Carlstrom committed with Gerrit Code Review
    …rs."
  20. @kruton

    OpenSSLMac: add license header

    kruton committed
    Change-Id: Id205d75d0c82ee33698758f1d6fbec850971322b
  21. @kruton

    Merge "OpenSSLMac: new OpenSSL HMAC connector"

    kruton committed with Gerrit Code Review
  22. @kruton

    OpenSSLMac: new OpenSSL HMAC connector

    kruton committed
    Change-Id: I6a6a9cbdcdc490a0bc1c313bbaf045a4fd99555e
Commits on Oct 4, 2012
  1. @swankjesse

    Fix a bug in tunnel construction and 'Connection: close' headers.

    swankjesse committed with Brian Carlstrom
    Based on square/okhttp#30
    (git fetch git://github.com/square/okhttp.git && git cherry-pick -x b8c51dc5bdc89d5487cbc110d6fe40389de16480)
    
    Bug: http://code.google.com/p/android/issues/detail?id=37221
    Change-Id: I5bed33d9ab16002aa38c2f729fa14a2022485469
  2. @kruton

    Merge "OpenSSLCipher: use OpenSSL buf_len data"

    kruton committed with Gerrit Code Review
  3. @kruton

    OpenSSLCipher: use OpenSSL buf_len data

    kruton committed
    This allows us to exactly match other implementation outputs for the
    same input values. What we were doing before was technically to the
    API's documented behavior, but broke some other things.
    
    Change-Id: I7e95dab4a7be8d737e862f6b6ddb04f6bbcd0dbe
  4. @enh

    Merge "Add ICU.getBestDateTimePattern."

    enh committed with Gerrit Code Review
  5. @kruton

    Merge "OpenSSLCipher: don't explode during null decrypt"

    kruton committed with Gerrit Code Review
  6. @kruton

    Merge "OpenSSLCipher: only return block size multiples"

    kruton committed with Gerrit Code Review
  7. @kruton

    Merge "OpenSSLCipher: add Ciphers to StandardNames"

    kruton committed with Gerrit Code Review
  8. @kruton

    OpenSSLCipher: add Ciphers to StandardNames

    kruton committed
    Change-Id: Ib990dd170d4c94ceea065748aceeb3bb4a297438
  9. @kruton

    OpenSSLCipher: only return block size multiples

    kruton committed
    There is a faulty test that called .getOutputSize(inputLen) and then
    used the output of that to provide inputLen for the .doFinal(...) call.
    Unfortunately, this is the only cipher that failed since we're not
    returning exact multiples of block size for .getOutputSize(...) calls.
    
    Instead we'll just return exact block size multiples so we don't run
    afoul of any other broken code.
    
    Change-Id: I1ca860d6df300ee67df90e575fc476d8291ec9c1
  10. @kruton

    OpenSSLCipher: don't explode during null decrypt

    kruton committed
    Other Cipher implementations return "null" when calling "doFinal()"
    during decrypt mode without having ever called .update(...)
    Change OpenSSLCipher to do the same.
    
    Change-Id: I76e22702a446912df125af0ff518fb123d62f5a3
  11. @enh

    Add ICU.getBestDateTimePattern.

    enh committed
    Bug: 7204705
    Change-Id: I0c65745178182f992d1d0ba0f0d56768194e2084
  12. Merge "OpenSSLCipher: remove buffer for partial blocks"

    Brian Carlstrom committed with Gerrit Code Review
Something went wrong with that request. Please try again.