History log of /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/CipherTest.java
Revision Date Author Comments
5189c980ebdc842e0e5ca7d6794b4880aa0b6cd5 04-Oct-2012 Kenny Root <kroot@google.com> OpenSSLCipher: remove buffer for partial blocks

Some block ciphers buffer the first block used. We weren't accounting
for this so we started failing with DES3. This led to another issue that
OpenSSL can sometimes keep things in its internal buffer. Instead of
having multiple levels of buffering, just rely on OpenSSL to do the
buffering.

Change-Id: I40a6c7e92e70d3c9ae530f35e8a4234f62e8d225
46a749879a6d52408e51938b9e63683b238d0bee 03-Oct-2012 Kenny Root <kroot@google.com> OpenSSLCipher: 3DES cipher name depends on key size

OpenSSL doesn't infer from the key size whether to use two-key or
three-key 3DES, so explicitly call it out.

Change-Id: Ibd93088844e7585e72a7c7857dd2af8a150b3780
fe8b870db2b374e21c69c2ff0050e6a34e0d8d94 05-Sep-2012 Brian Carlstrom <bdc@google.com> Tracking upgrade to bouncycastle 1.47

Change-Id: Ie1f2ae92638e81ccd7e4ec2459199e6eecdac75f
281be77953d7827e31fc5aa0e1c29a06063f237f 26-Jul-2012 Brian Carlstrom <bdc@google.com> Fix even more CipherTest flakiness due to implicit random IV values

When Cipher.init is not passed AlgorithmParameters, it will implicitly
generate what it needs, leading to random values that occasionally
caused BadPaddingException not to be thrown when expected. Disable
that behavior by explictly passing in the static IV value.

Bug: 6354967

(cherry-picked from 3441ddaa2ce320360292702dd63dad052cb6999d)

Change-Id: I38d3be7260fd28ffd47f49cb06f68d68c9c20e9f
3441ddaa2ce320360292702dd63dad052cb6999d 26-Jul-2012 Brian Carlstrom <bdc@google.com> Fix even more CipherTest flakiness due to implicit random IV values

When Cipher.init is not passed AlgorithmParameters, it will implicitly
generate what it needs, leading to random values that occasionally
caused BadPaddingException not to be thrown when expected. Disable
that behavior by explictly passing in the static IV value.

Bug: 6354967
Change-Id: I804c7e30e1c29b92780a9b6271c35505835d58f5
d77eccc93cbf92c400ebd114ea8e91413b882d69 25-Jul-2012 Brian Carlstrom <bdc@google.com> Address more CipherTest flakiness due to random IV values

In a recent change, we stopped generating random keys to prevent
flakiness in the BadPaddingException test cases. This change removes
the use of random initialization vector (IV) values. There still are
uses of SecureRandom where the API being tested requires it, but I
visually checked that none of the BadPaddingException cases fall in
this category.

Bug: 6873673

(cherry-picked from f19b9c467fb584a79463357e160c0a41c80d05c8)

Change-Id: Id09c322683972751e326569485330c23051ccf0c
f19b9c467fb584a79463357e160c0a41c80d05c8 25-Jul-2012 Brian Carlstrom <bdc@google.com> Address more CipherTest flakiness due to random IV values

In a recent change, we stopped generating random keys to prevent
flakiness in the BadPaddingException test cases. This change removes
the use of random initialization vector (IV) values. There still are
uses of SecureRandom where the API being tested requires it, but I
visually checked that none of the BadPaddingException cases fall in
this category.

Bug: 6873673

Change-Id: Ia4e53973da05377687faf327b64acd42a2db344a
459a8ccbcc3dfde730780244e2122a734858acee 19-Jul-2012 Brian Carlstrom <bdc@google.com> Address flakiness of doFinal and unwrap CipherTests

The tests occasionally did not throw BadPaddingException when
expected. This seems to be because in those cases the random generated
keys were creating cipher text that appeared to be correctly PKCS#5
padded. In reproducing this in the doFinal case, this happened within
a few hundred runs.

Bug: 6301793
Change-Id: Ibd2d9bdd2fe88bccb20089ef653763849f45ff4c
2ac3f4de596bdeea397e25692b4a4f5a6c15426f 19-Jul-2012 Brian Carlstrom <bdc@google.com> Address flakiness of doFinal and unwrap CipherTests

The tests occasionally did not throw BadPaddingException when
expected. This seems to be because in those cases the random generated
keys were creating cipher text that appeared to be correctly PKCS#5
padded. In reproducing this in the doFinal case, this happened within
a few hundred runs.

Bug: 6301793
Change-Id: Ibd2d9bdd2fe88bccb20089ef653763849f45ff4c
937b6c4ef5f8ad57279e2ebed4393a78d1729d8b 28-Jan-2011 Brian Carlstrom <bdc@google.com> Tolerate leading slash in Cipher transformation

Bug: 3387688
Change-Id: Icd551df2cafd256e49fb92d12d7cb381479d841d
6e65088f21ac5bda5d25fade13ee360c5cba3457 25-Sep-2010 Jesse Wilson <jessewilson@google.com> Rely on the test runner to ensure a pristine VM.

Change-Id: I6f5bfad6f861eb7b398ed7d86747d66cea4f2343
http://b/issue?id=2660429
f33eae7e84eb6d3b0f4e86b59605bb3de73009f3 13-May-2010 Elliott Hughes <enh@google.com> Remove all trailing whitespace from the dalvik team-maintained parts of libcore.

Gentlemen, you may now set your editors to "strip trailing whitespace"...

Change-Id: I85b2f6c80e5fbef1af6cab11789790b078c11b1b
cec4dd4b1d33f78997603d0f89c0d0e56e64dbcd 26-Apr-2010 Peter Hallam <peterhal@google.com> merge more modules into luni