summaryrefslogtreecommitdiff
path: root/bouncycastle.config
AgeCommit message (Collapse)Author
2013-12-12Upgrade to Bouncycastle 1.50Kenny Root
SHA256 sums of source packages: 0be5bb948ec481b3d1f30ee80ef593b298b3782697f9eeee5c74cf270689b520 bcpkix-jdk15on-150.tar.gz 468259c9166fbcf87ad284ae46fae45408cb7cfc9c406862ea75d5b8696f4f2a bcprov-jdk15on-150.tar.gz Change-Id: Id566e9137f85d8328e9f0cb0472ff2f6ae7a71d3
2013-09-26Restore SHA-224Kenny Root
In the StandardNames 8 document, SHA-224 has made a comeback. Change-Id: I2cfd04df026502efa3ccbae17eb509588f43292f
2013-06-03bouncycastle 1.49 upgradeBrian Carlstrom
Change-Id: Icbf5a147409c810060a5acc884834fb2a778e860
2013-02-12bouncycastle 1.48 upgradeBrian Carlstrom
Change-Id: Idb04baf42de07b18ddb162e5cd1f98cdadf366f4
2013-01-29Restore PBE Cipher wrap and unwrap support from upstreamBrian Carlstrom
Bug: https://code.google.com/p/android/issues/detail?id=41405 Change-Id: I9bf90613c510f753032110724b074d31ae76a1fb
2012-09-19Make existing bouncycastle bcprov build on host and add host-only bcpkix buildBrian Carlstrom
- Move existing provider source to bcprov - Added bcpkix host build to support built/tooks/signapk sha1sum of sources: - 10bfea344842fe8e065c80e399c93f8651dc87d8 bcprov-jdk15on-147.tar.gz - 913828c7ae36e030508e97e07b3c213fb1db1e9c bcpkix-jdk15on-147.tar.gz Bug: 7056297 Change-Id: Id4f957f300a39aa34b4c3c679b2312631d3f1639
2012-09-10bouncycastle 1.47 upgradeBrian Carlstrom
Change-Id: I601cc0dd434897d48c79abb67e9f833159135cce
2012-04-11Restore AuthorityKeyIdentifierStructure and SubjectKeyIdentifierStructure ↵Brian Carlstrom
for Polo Bug: 6322311 Change-Id: I983874a2ca45ebf2f5742ac383df364d7da75da6
2011-06-07Restore bouncycastle PEMReader to match PEMWriterBrian Carlstrom
Change-Id: I1ebd086895e8da2af2e0d21dd6529650d81adb12
2011-04-13bouncycastle 1.46 upgradeBrian Carlstrom
Change-Id: I01be307de0a79b3058215d76e67f39f77243a619
2010-11-17Restoring bouncycastle Elliptic Curve Key supportBrian Carlstrom
Specific algorithms now available: - KeyAgreement.ECDH - KeyFactory.EC - KeyPairGenerator.EC - Signature.NONEWITHECDSA - Signature.ECDSA - Signature.SHA256WITHECDSA - Signature.SHA384WITHECDSA - Signature.SHA512WITHECDSA Bug: 3058375 Change-Id: I611b23b2f72bb5d9898d4c695f1677c7914353c6
2010-10-12Restoring two more bouncycastle classes for compatibilityandroid-cts-2.3_r2android-cts-2.3_r1android-2.3_r1android-2.3.3_r1aandroid-2.3.3_r1.1android-2.3.3_r1android-2.3.2_r1android-2.3.1_r1Brian Carlstrom
Bug: 3086427 Change-Id: I7500d43f11630fdf52b70001f110400bcee6c2e1
2010-10-11Restore X509V1CertificateGenerator for application compatibilityBrian Carlstrom
Bug: 3086427 Change-Id: Ib93464a2184532dde935a1ce9ad8dda0df2324c1
2010-10-04Adding SecretKeyFactory.PBKDF2WithHmacSHA1 support wrapperBrian Carlstrom
Bug: 3059950 Change-Id: I9de5e0ebed773818aeeb6831d48db308b09a4246
2010-08-25Remove RC5 references from bouncycastleBrian Carlstrom
The RI doesn't include RC5 and we didn't either in the provider definition, but I noticed we still had a few implementation support classes so remove these unneeded files. Also cleaned up a few RC2 mentions that are unneeded. RC2 implementation does remain for PKCS12 support. Change-Id: I4ef304e11a0cba677b3977c54a2afb2330ca5565
2010-08-19Restoring blowfish to bouncycastleBrian Carlstrom
Adding blowfish algoritms for RI parity. Also added KeyGenerator.ARCFOUR alias for RI compatability. Change-Id: I1ddf86bdc82a1056f3f671743709e9186e95f7c3
2010-07-21Restore BouncyCastle's RC4 implementationBrian Carlstrom
Change-Id: I99c9d547039679b093bf6da15c6dcdede42d2570
2010-07-16Fix PKCS12 and BKS KeyStore as well as SSL renegotiationBrian Carlstrom
Summary: - Added KeyStoreTest and fixed PKCS and BKS keystores to be fully functional - KeyStore and KeyStoreImpl improvements in libcore and bouncycastle for more RI-like behavior - SSL Renegotiation fix for new implementation Details: external/bouncycastle TwoFish added back for BKS KeyStore. Like RC2, it not supported as a general cipher, but instead used internally for KeyStore implementation. src/main/java/org/bouncycastle/crypto/engines/TwofishEngine.java bouncycastle.config Added back PBEWITHSHAANDTWOFISH, PBEWITHSHAANDTWOFISH-CBC, PBEWITHSHA1ANDRC2-CBC, PBEWITHHMACSHA, PBEWITHHMACSHA1 to support PKCS12 and BKS KeyStore implementations (as determined by new KeyStoreTest) src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java src/main/java/org/bouncycastle/jce/provider/JCEBlockCipher.java src/main/java/org/bouncycastle/jce/provider/JCEMac.java src/main/java/org/bouncycastle/jce/provider/JCESecretKeyFactory.java Don't throw an error when deleting a non-existing KeyStore entry. The RI documentation (and behavior) says it throws an error when it fails to remove an entry, not when the entry does not exist. src/main/java/org/bouncycastle/jce/provider/JDKKeyStore.java src/main/java/org/bouncycastle/jce/provider/JDKPKCS12KeyStore.java Try to make BC's PKCS KeyStore have a more RI-like getCreationDate behavior src/main/java/org/bouncycastle/jce/provider/JDKPKCS12KeyStore.java Make BC's PKCS KeyStore failfast on setting non-supported key, instead of failing later on get. src/main/java/org/bouncycastle/jce/provider/JDKPKCS12KeyStore.java Make BC's PKCS KeyStore handle setting a PrivateKey with an emtpy chain. src/main/java/org/bouncycastle/jce/provider/JDKPKCS12KeyStore.java Add more general avoidance of NullPointerExceptions on null aliases src/main/java/org/bouncycastle/jce/provider/JDKPKCS12KeyStore.java Added notes about changes improvements patches/README Regenerated patch with above changes patches/android.patch libcore KeyStore improvements based on KeyStoreTest - Fix UnrecoverableKeyException to be a subclass of UnrecoverableEntryException, which was keeping the new KeyStoreTest from compiling. luni/src/main/java/java/security/UnrecoverableKeyException.java - Fix to not convert UnrecoverableKeyException to KeyStoreException, which was only being done because of the UnrecoverableKeyException superclass bug. luni/src/main/java/java/security/KeyStoreSpi.java - Harmony KeyStore was being overly aggresive about throwing on null alias arguments in cases where the RI was happy to pass them to the KeyStoreSpi. luni/src/main/java/java/security/KeyStore.java - New test after PKCS12 regresion. It enumerates and excercises all methods on all available KeyStore implementations. Unfortunately, the main varieties of KeyStores made this a lot more complicated than I was originally expecting. It does clarifiy the differences between the RI and BC KeyStore implementations, especially for PKCS12, where in some ways the RI is more feature complete (setting key via byte[]), but in other ways BC goes beyond some RI limitations (allowing storage of certificates). luni/src/test/java/java/security/KeyStoreTest.java TestKeyStore improvements while writing KeyStoreTest - Renamed "keyStorePassword" working usages to clarify if it really means the "storePassword" on the whole KeyStore, or if it is a "keyPassword" on individual keys. - Moved TestKeyStore from javax.net.ssl to java.security luni/src/test/java/javax/net/ssl/SSLContextTest.java luni/src/test/java/javax/net/ssl/SSLEngineTest.java luni/src/test/java/javax/net/ssl/SSLSessionTest.java luni/src/test/java/javax/net/ssl/SSLSocketTest.java support/src/test/java/java/security/StandardNames.java support/src/test/java/java/security/TestKeyStore.java support/src/test/java/javax/net/ssl/TestKeyStore.java support/src/test/java/javax/net/ssl/TestSSLContext.java Fixing up SSL renegotiation support. Now that we are not trying to prevent renegotiation, make sure it is working correctly. - Remove SSL_VERIFY_CLIENT_ONCE to take the default behavior of re-requesting client certificate on renegotiation. luni/src/main/java/org/apache/harmony/xnet/provider/jsse/NativeCrypto.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/OpenSSLSocketImpl.java - Updated comments to reflect renegotiation. Bug fix to not clear out callback reference on handshake complete, since we need it for renegotiation. luni/src/main/native/NativeCrypto.cpp Updated for PKCS12 KeyStore support support/src/test/java/java/security/StandardNames.java Added javadoc when writint KeyStoreTest luni/src/test/java/java/security/ProviderTest.java frameworks/base Tracking changes to UnrecoverableKeyException superclass api/8.xml api/current.xml Change-Id: Idd09289b7ec510a2d981769e7bf077b101c26f88
2010-06-25Remove libcore's dependency on bouncycastleBrian Carlstrom
external/bouncycastle - Change to be the primary build for bouncycastle sources (as opposed to part of libcore) - Moved OpenSSLMessageDigest from libcore to OpenSSLDigest It uses NativeCrypto API from core, but implements a bouncycastle specific interface - restored registration of bouncycastle MessageDigests for SHA-1, SHA-256, MD5 OpenSSLProvider versions take precedence, but explicit provider of "BC" allows choice - enabled native versions of SHA-384 and SHA-512 - pruned MD4 implementation frameworks/base - frameworks and CoreTests modules now depend on bouncycastle - update preloades classes for NativeBN package change - moved CryptoTest to libcore libcore - core now builds without bouncycastle sources - core-tests, core-tests-support, core-tests-supportlib now depend on bouncycastle - removed libcore/openssl directory, moving NativeBN to java/math - minor cleanup of Provider, Security, Services style while working on ProviderTest - added new OpenSSLProvider registered as first provider to have priority over the others to ensure our native implementations are used - moved BouncyCastle to have priority as a provider over Harmony - JarVerifier and JarUtils now implicitly use OpenSSLMessageDigest - Cleanedup OpenSSLSignature, implementation needs to be finished to move to OpenSSLProvider - To avoid using PEMWriter from BouncyCastle, NativeCrypto now takes binary encoded certs and keys This is more efficient as well avoiding the base64 decode/encode of the binary data - removed SHA-224 to match the RI packages/apps/CertInstaller - CertificateInstaller module now depends on bouncycastle this is the only app to depend on bouncycastle system/core - updated BOOTCLASSPATH Change-Id: I42ac63a1669b03d0243f9714c89312227e48241d
2010-06-21Aligning bouncycastle with RI supported algorithmsBrian Carlstrom
Change-Id: I81156564372ac60d009e62fa9f8ef0ff2239dda5
2010-06-21Upgrade bouncycastle from 1.34 to 1.45Brian Carlstrom
This maintains the same set of provided algorithms as tested with libcore's javax.security.PreparerTest. A further checkin will try to bring the supported list in line with the RI. Details: Upgraded to JDK 1.6 version of 1.45 release bouncycastle.version First pass of triming unneeded files bouncycastle.config Compile with UTF-8 to avoid warnings Android.mk The updated patch patches/android.patch The rest of the files are generated from the release tar ball and the patch ./import_bouncycastle.sh import .../bcprov-jdk16-145.tar.gz src/main/java/... Change-Id: I1df5ad8a7161ec578415ae23f01c3b550e381927
2010-06-17Move external/bouncycastle to be based of patches from upstreamBrian Carlstrom
No code change here intentionally. Running ./import_bouncycastle.sh import .../bcprov-jdk15-134.tar.gz gives us exactly what we had before. This is based on how we mange external/openssl Change-Id: I8485780557f5cc0aa857450d4c27b98c26535710