History log of /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
303b553b13a02529fc8cb22b9b37672887759ce9 22-Oct-2014 Martin Hibdon <mhibdon@google.com> Allow an external security provider to be installed

b/18001842

Change-Id: I8312fe541896e1ceeb6c5102f90bdbb0bb945151
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
4ecd51a794c5a2af1a5a838f22997b4e361acb8b 17-Oct-2014 Martin Hibdon <mhibdon@google.com> Add deprecated cipher suites to our SSLSocket

b/18001842
In the L platform, some cipher suites are disabled by
default. Unfortunately, some of these are still in use
by common email providers. We need them to be enabled
for email to work with these providers.

Change-Id: Ia3a9bab5467c26626db9259074f77ec476610fa5
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
601700a61e453c612e0dabe4e93002766b3751b7 26-Sep-2014 Martin Hibdon <mhibdon@google.com> Get SSLSocketFactory from GmsCore

b/15721931
This follows an example pattern from GoogleHttpClient.
It tries to get the SSLCertificateSocketFactory from
GmsCore using reflection. If that fails, (because GmsCore
is not installed on the device) then it will fall back
to the platform implementation.
MailApplication sets a static object in SSLUtils that
allows it to get an externally created SSLCertifcateSocketFactory.
If this method is set, then it will use it, otherwise it
will fall back to the platform factory. This way there
is no reference to GmsCore in the AOSP email.

Change-Id: I0890fe4c3d79283fb98a4dc5a62a32efd320e52a
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
3dd85723a1af5537e23e4b05bdc361cce9cd42be 11-Apr-2014 Tony Mantler <nicoya@google.com> Cleanup in EmailContent

Change-Id: Ifa251eb206779f59ea003f99395d454c7e407bc2
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
37a4c65e58728b321850b1e51d87eecfe9d1d805 13-Feb-2014 Anthony Lee <anthonylee@google.com> Introduce an SSL handshake timeout value of 30 seconds.

Motorola 0009-IKXREL1KK-5011 patch. Hanging on an SSL handshake is
a real situation that needs to be handled. 30 seconds is more than
enough of a timeout to abort on a potential hang. The coincidental
thing is that there was a fix that was made a while back to email 1
that addressed the same issue in similar code. You can reference it
here: b/7583420.

Change-Id: I0533e57f8c5d45d241adb7f37d54ebe1f0ad9368
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
2ed113c7137e6f1059a22fa018332d56ec740a0a 01-Nov-2013 Tony Mantler <nicoya@google.com> Foreign characters may be letters and digits, but they're not allowed in Uri/Url schemes

b/11356390

Change-Id: Ic510607ab5f671e3f3f474ea3c2f4af7e9966cb1
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
8708594f03068a8c71a6c6e752b52c2fc1a733d8 16-Aug-2013 Martin Hibdon <mhibdon@google.com> Use insecure socketFactory if "accept all certificates"

b/9176386

Change-Id: I1edc92bb4207d166e9b252bf3ed98ad8b2c4d996
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
560bfadc3151f7a06f3b06e9a6c92cfa534c63ec 26-May-2013 Scott Kennedy <skennedy@google.com> Unify LogTag

There is now only one LogTag class. The static initializer of
GmailApplication (existing) and EmailApplication (new) will now set
the log tag to "Gmail" and "Email", respectively. Up until that code
is run, it will be "UnifiedEmail".

"setprop log.tag.Gmail VERBOSE" (or .Email) will trigger all logs to
be printed as long as they go through LogUtils, regardless of what tag
is used by that individual log. This lets us still turn on logging
everywhere in one command, but also lets us use more descriptive tags
(like the class name).

And since we no longer have three com.android.mail.utils.LogTag
classes, builds will be much easier.

Also, we now use LogUtils everywhere.

Change-Id: I55f1c7a66ce50ead54877a13e40256422a56dc39
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
7d5e2a7c08966ffd4a9e8c78f504cc4fd5be4216 01-Aug-2012 Marc Blank <mblank@google.com> Do "same certificate" checking when using "trust certificates"

* Refactor/simplify Transport/MailTransport
* Add serverCert column to HostAuth table in EmailProvider
* During first connection to server, save the server certificate
in the HostAuth; on subsequent connections, ensure that the
certificate presented has the same public key as the one
stored
* For now, we'll just fail to connect (with a CertificateException)
if there's a mismatch

TODO: Add some UI to handle different certificates

Bug: 6888866
Change-Id: Ia79497e89eaad8d43617b50d3771121b2ed7f687
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
4d3f3f3ab95c03d4c1ab308801b92ba1d9df2276 12-Oct-2011 Ben Komalo <benkomalo@google.com> Fix hostname verifier for Exchange connections.

When the socketfactory init code was moved, I forgot to re-add in the check
to skip hostname verification. This made "Trust all SSL certificates"
checkbox useless.

Bug: 5450563
Change-Id: Ie4cba749aaf8c0fd9f9c43f09ebf354c6600d4f0
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
f4f10a3fdf3fdf94db4780017c4392823942b1d7 01-Jul-2011 Ben Komalo <benkomalo@google.com> Make client certificate requests optional.

This prevents things from always failing if the server requires a client
SSL certificate.

Note that the solution used to determine if a certificate request was
made for a given request is approximate; it is timestamp based and can
theoretically give a false positive. In practice, this is very unlikely,
since another cert request had to have happened around the same time,
AND the response must be a 401/403.

Change-Id: Ieb77cf91db3bd52ba4adf1fb07357fef7e204ba5
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
745b33b8ff55e9a9c4871f07f9d97db893f784b2 01-Jul-2011 Makoto Onuki <omakoto@google.com> Fix all NoSuchMethodErrors

Change-Id: I05adf2b99c819d6aa2d3b52c52a8c655d9307337
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
877b9070fa4d7a6b51ae1f75640a6c23cc86c963 24-Jun-2011 Ben Komalo <benkomalo@google.com> Misc cleanups and avoid logging PII

Change-Id: I9f906dabe0dd00a434ff88878f0639c835b2e2a7
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
cb24e515b7983133133ca38bd3e3e6354daaab76 16-Jun-2011 Ben Komalo <benkomalo@google.com> Add one more error state to certificate process

When the KeyStore fails to give us back a certificate for any reason (it
was removed from the keystore perhaps), propagate the error back up.

Change-Id: I4f0ef783c1665589cc8ccb43d95da43a297a3e9a
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
f4dbbf10996e6bca926a5825bbc69e1e172c20c0 16-Jun-2011 Ben Komalo <benkomalo@google.com> Indicate to the user when a cert error happens.

This introduces an exception which needs to be thrown from a KeyManager
when it tries to establish a connection with a server requesting a
certificate.

Change-Id: I06dfad7789ed5d320b630e7e4380e15da42a48df
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
78959916e771114ff8c48fc181e34a7dff0aa672 04-May-2011 Ben Komalo <benkomalo@google.com> Add support for client side SSL certificates

This introduces the ability for clients (i.e. the exchange service) to
register "special connection types" that use a client certificate stored
in the system keystore. The alias is encoded into the URI scheme for
those clients, and the socket factory used for those connections will
use the approprate KeyManager.

Lots of TODO's, including bubbling a lot of this up to the higher level
and wiring the UI to actually set the alias in the HostAuth table.

Change-Id: If5e1901c5b58731fdabd3e6b6da7198134b512d2
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
724c3a81cd3649b48ab47c6e49cb42f73f20c815 08-Jun-2011 Ben Komalo <benkomalo@google.com> Introduce scheme name escaping in SSLUtils.

Change-Id: I73f19e7d40d0b19dfd41cfaf7db0879ef2e3a3ea
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
37f3385803de19d4b6fb4ef1b1ac9a6196dec98c 02-Mar-2011 Ying Wang <wangying@google.com> Split out emailcommon/Android.mk

Change-Id: I846ee2a4b541f4709e647aa537c61549db2bec2e
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
a07f2ae0b18964aa15e218e8b6be8be24e5c9f46 01-Mar-2011 Ying Wang <wangying@google.com> Revert "Split out emailcommon/Android.mk"

This reverts commit c28bf353190eb576072a8fd2f98821424144876e.
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java
c28bf353190eb576072a8fd2f98821424144876e 01-Mar-2011 Ying Wang <wangying@google.com> Split out emailcommon/Android.mk

Change-Id: I90653e8601ee3ee6a8719d87ffb93222a11a22c0
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/SSLUtils.java