397cce4229eb90a6582e1e5b7ce153536a986627 |
|
29-Nov-2012 |
Paul Westbrook <pwestbro@google.com> |
Specify a timeout for the connection handshake Email hadn't been setting a timeout on the connection handshake, so this could have stalled the thread indefinitely. We should use the same timeout that we use for the connection itself. Bug: 7583420 Change-Id: If8740b7f6c1d5fc18f40f0bb1ec7ed88d7b98af5
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
bc47398187c6ffd132435e51d8d61e6ec79a79db |
|
25-Sep-2012 |
Paul Westbrook <pwestbro@google.com> |
Merge Email1 into MR1 Change-Id: I45289d46b65faffc7a3a3dd46382899162f3aaab
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
7d5e2a7c08966ffd4a9e8c78f504cc4fd5be4216 |
|
01-Aug-2012 |
Marc Blank <mblank@google.com> |
Do "same certificate" checking when using "trust certificates" * Refactor/simplify Transport/MailTransport * Add serverCert column to HostAuth table in EmailProvider * During first connection to server, save the server certificate in the HostAuth; on subsequent connections, ensure that the certificate presented has the same public key as the one stored * For now, we'll just fail to connect (with a CertificateException) if there's a mismatch TODO: Add some UI to handle different certificates Bug: 6888866 Change-Id: Ia79497e89eaad8d43617b50d3771121b2ed7f687
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
4d3f3f3ab95c03d4c1ab308801b92ba1d9df2276 |
|
12-Oct-2011 |
Ben Komalo <benkomalo@google.com> |
Fix hostname verifier for Exchange connections. When the socketfactory init code was moved, I forgot to re-add in the check to skip hostname verification. This made "Trust all SSL certificates" checkbox useless. Bug: 5450563 Change-Id: Ie4cba749aaf8c0fd9f9c43f09ebf354c6600d4f0
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
f4f10a3fdf3fdf94db4780017c4392823942b1d7 |
|
01-Jul-2011 |
Ben Komalo <benkomalo@google.com> |
Make client certificate requests optional. This prevents things from always failing if the server requires a client SSL certificate. Note that the solution used to determine if a certificate request was made for a given request is approximate; it is timestamp based and can theoretically give a false positive. In practice, this is very unlikely, since another cert request had to have happened around the same time, AND the response must be a 401/403. Change-Id: Ieb77cf91db3bd52ba4adf1fb07357fef7e204ba5
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
745b33b8ff55e9a9c4871f07f9d97db893f784b2 |
|
01-Jul-2011 |
Makoto Onuki <omakoto@google.com> |
Fix all NoSuchMethodErrors Change-Id: I05adf2b99c819d6aa2d3b52c52a8c655d9307337
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
877b9070fa4d7a6b51ae1f75640a6c23cc86c963 |
|
24-Jun-2011 |
Ben Komalo <benkomalo@google.com> |
Misc cleanups and avoid logging PII Change-Id: I9f906dabe0dd00a434ff88878f0639c835b2e2a7
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
cb24e515b7983133133ca38bd3e3e6354daaab76 |
|
16-Jun-2011 |
Ben Komalo <benkomalo@google.com> |
Add one more error state to certificate process When the KeyStore fails to give us back a certificate for any reason (it was removed from the keystore perhaps), propagate the error back up. Change-Id: I4f0ef783c1665589cc8ccb43d95da43a297a3e9a
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
f4dbbf10996e6bca926a5825bbc69e1e172c20c0 |
|
16-Jun-2011 |
Ben Komalo <benkomalo@google.com> |
Indicate to the user when a cert error happens. This introduces an exception which needs to be thrown from a KeyManager when it tries to establish a connection with a server requesting a certificate. Change-Id: I06dfad7789ed5d320b630e7e4380e15da42a48df
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
78959916e771114ff8c48fc181e34a7dff0aa672 |
|
04-May-2011 |
Ben Komalo <benkomalo@google.com> |
Add support for client side SSL certificates This introduces the ability for clients (i.e. the exchange service) to register "special connection types" that use a client certificate stored in the system keystore. The alias is encoded into the URI scheme for those clients, and the socket factory used for those connections will use the approprate KeyManager. Lots of TODO's, including bubbling a lot of this up to the higher level and wiring the UI to actually set the alias in the HostAuth table. Change-Id: If5e1901c5b58731fdabd3e6b6da7198134b512d2
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
724c3a81cd3649b48ab47c6e49cb42f73f20c815 |
|
08-Jun-2011 |
Ben Komalo <benkomalo@google.com> |
Introduce scheme name escaping in SSLUtils. Change-Id: I73f19e7d40d0b19dfd41cfaf7db0879ef2e3a3ea
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
37f3385803de19d4b6fb4ef1b1ac9a6196dec98c |
|
02-Mar-2011 |
Ying Wang <wangying@google.com> |
Split out emailcommon/Android.mk Change-Id: I846ee2a4b541f4709e647aa537c61549db2bec2e
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
a07f2ae0b18964aa15e218e8b6be8be24e5c9f46 |
|
01-Mar-2011 |
Ying Wang <wangying@google.com> |
Revert "Split out emailcommon/Android.mk" This reverts commit c28bf353190eb576072a8fd2f98821424144876e.
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|
c28bf353190eb576072a8fd2f98821424144876e |
|
01-Mar-2011 |
Ying Wang <wangying@google.com> |
Split out emailcommon/Android.mk Change-Id: I90653e8601ee3ee6a8719d87ffb93222a11a22c0
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
|