Commit Graph

136 Commits

Author SHA1 Message Date
Robert Greenwalt
78a640af95 Make HiPri work when already connected.
A recent change made the HiPri MobileDataStateTracker listen for notifications
about the default connection (which HiPri shadows).  Local code was sending
itself a notification using the old HiPri badging instead of the new Default
badging and those notifications where therefore ignored.

Manifested itself on HiPri connections when we were already on 3g.

See change 42422 on master platform/frameworks/base for the change this is completing.

Change-Id: I375026048724d0035297287c61c6c2f58d4e0294
2010-03-10 16:19:18 -08:00
Steve Block
68da044d3a Merge "Updates WebAddress to ignore the colon after the host component of a URL if no port is specified" 2010-03-08 10:43:38 -08:00
Steve Block
2257440f4b Updates WebAddress to ignore the colon after the host component of a URL if no port is specified
Currently, the regex used to extract the port matches ':' followed by 1 or more
digits. This means that when passed a malformed URL of type <host>:<path>, no
match is made for the port and the ':' is matched as part of the path. Since the
handling of the path adds a leading '/' where absent (see http://b/1011602),
this leads to the URL being converted to <host>/:<path>.

This change updates the port regex to match ':' followed by zero or more digits.
This means that the ':' is always matched, so it does not leak into the path
and the result is <host><path>. This matches the behavior of desktop browsers.

Bug: 2494876
Change-Id: I34b47c8187cf03aa7674c14cd6593de53dce3169
2010-03-08 17:52:02 +00:00
Debajit Ghosh
0dc59b00f2 switching from ro.secure to ro.debuggable for relaxing ssl cert check.
Conflicts:

	core/java/android/net/SSLCertificateSocketFactory.java
2010-03-04 15:25:48 -08:00
Robert Greenwalt
5a73506cdd Add error reporting for Tethering.
Also make the usb interface configuration more robust so retries are possible.

Makes all Tethering errors recoverable - no harm letting them try again anyway.  Worst case
is they need to reboot.
2010-03-03 15:14:29 -08:00
Brian Carlstrom
ddb42a421f Merge "Fixing spelling of intiialization to initialization in comment" 2010-03-02 19:05:12 -08:00
Brian Carlstrom
a5987a5101 SslCertificate should clone Dates
To avoid external tampering with Dates withing SslCertificate by code
holding on to pointers to Dates used in the constructor or code
mutating values returned by the accessors, we now clone Dates taking
in as arguments and returned to callers.
2010-03-02 16:39:14 -08:00
Brian Carlstrom
37254dcdcf Fixing spelling of intiialization to initialization in comment 2010-03-02 13:30:04 -08:00
Brian Carlstrom
9147a0ed64 SslCertificate should use Dates - fixing api for build
Also fixing missing @deprecated noticed when updating API
2010-03-02 11:24:39 -08:00
Brian Carlstrom
445d8f1592 SslCertificate should provide Date interface
While working on out openssl code, I found a Y2k bug that the dates
from invalidate certificates could be shown as 1909 instead of 2009.
The reason was because SslCertificate/BrowserActivity passed the
values around as Strings even though the started as Dates (from
X509Certificate) and were converted backed to Dates before
presentation by BrowserActivity's reformatCertificateDate.

SslCertificate now maintains date fields internally as Date objects
without converting them to Strings. The constructor and String
accessors, which are now @deprecated, now specify the format as an ISO
8601 date string which uses 4 digit years.

BrowserActivity now reformatCertificateDate is now simply
formatCertificateDate and no longer has to convert from String to Date
and back to String to get proper Locale formatting.

CTS SslCertificateTest also updated.
2010-03-02 11:07:32 -08:00
Robert Greenwalt
0e350f020a Fix hipri status notifications
MobileDataStateTracker was looking for "hipri" notifications, but it is really
just using the default apn.
2010-02-26 14:10:22 -08:00
Dianne Hackborn
2269d1572e Re-arrange android-common so framework no longer links with it.
This is the framework part, moving classes around so the framework
no longer needs to link to android-common.  Makes some APIs public,
others that didn't need to be public are private in the framework,
some small things are copied.
2010-02-25 11:39:33 -08:00
Robert Greenwalt
c03fa50149 Add mobile data on/off switch.
bug:2251458
2010-02-24 18:14:07 -08:00
Robert Greenwalt
65ae29bd85 Add USB RNDIS enable/disable control
Also adding interface configuration to the tethering machine.
Also fixing netd bug that didn't send up/down portion of iface config command.
2010-02-23 16:04:41 -08:00
Robert Greenwalt
6a6ce74e59 Merge "Update Tethering." 2010-02-16 17:11:10 -08:00
Robert Greenwalt
2a091d7aa0 Update Tethering.
Adds telephony support, async model, multiple tethered iface suport,
better notifications, device config.

bug:2413855
2010-02-16 16:56:09 -08:00
Jean-Baptiste Queru
e3460d7a01 fix build
Change-Id: I08b7d09408530e8c107e2821af7a769fba1c7bd7
2010-02-16 14:49:01 -08:00
Dan Egnor
9d4b575453 Add getInsecure() that returns a persistently insecure SSLSocketFactory,
which Email needs for unbundling.

Bug: 2353593
2010-02-16 14:18:24 -08:00
Patrick Scott
fa4039e4fc Do not include the fragement identifier in the path.
Bug: 2435741
2010-02-16 17:09:03 -05:00
Jean-Baptiste Queru
3af80dc6d9 Expose more Download Manager APIs.
This will allow apps to track download progress.

Change-Id: Id6b77c0fc01b4838fca45e2fe241b1ea08e65038
2010-02-16 13:55:19 -08:00
Shimeng (Simon) Wang
e8cb5ab7c0 Merge "Enhance URL regular expression to match more Unicode chars." 2010-02-16 10:49:37 -08:00
Paul Westbrook
b9dfb9b403 Download Manager API to support Gmail
Adds APIs to the Download manager to handle downloads based on
opaque ids
2010-02-16 09:25:40 -08:00
Jean-Baptiste Queru
d85639afb6 Merge "Public Download Manager API" 2010-02-12 13:48:51 -08:00
Shimeng (Simon) Wang
51c02dbf75 Enhance URL regular expression to match more Unicode chars.
Enhance URL regular expression to match legal one byte Unicode characters in
Internationalized Resource Identifiers as detailed in RFC 3987.  Specifically
two byte Unicode characters are not included.  Not all things in RFC 3987 is
implemented, this is just an enhancement for recognizing more common used one
byte Unicode characters.

This change helps Browser address bar identify more valid URL without scheme
typed in, such as 현금영수증.kr

make-iana-tld-pattern.py is modified to contain only Top Level Domain
regular expression generation.  Other parts of WEB_URL pattern are in
solely in Patters.java for better consistency and maintenance.
2010-02-11 14:07:44 -08:00
Dan Egnor
60586f2ec6 API CHANGE: Add SSLSessionCache public API to allow unbundled SSL session caching.
Generally clean up the associated SSLCertificateSocketFactory API as well,
change AndroidHttpClient to use this new thing, and make the android-common
library build SDK-clean (woo hoo).

Bug: 2362543
Bug: 2357311
2010-02-10 14:43:21 -08:00
Jean-Baptiste Queru
47f46981cc Public Download Manager API
Change-Id: Ie91e816620b367816572f83d85cfecc91d66c764
2010-02-08 15:24:27 -08:00
Ken Shirriff
5c19aeca3d API review: TrafficStats: rename Pkts to Packets
Rename getMobileTxPackets(), getMobileRxPackets(), getTotalTxPackets(),
getMobileRxPackets()

bug 2420318
2010-02-04 14:37:21 -08:00
Robert Greenwalt
d0e18ffb82 First pass at USB Tethering.
bug:2281900
2010-02-04 09:15:06 -08:00
Huahui Wu
c4e834dc47 Rebuild a cleaner certificates chain before validating it.
This change cleans the server certificates:
1. Use the end-entity certificate as found in the chain received from the server as the end-entity cert for the newly built chain.

2. Look at the last cert in the newly built chain, specifically it's "issuer" field.  If there's a cert in the chain as received with this as the "subject", and this cert hasn't yet been moved into the newly built chain, move it there (as the new last cert).  Repeat this step 2 until you can't continue (because there's no matching previously unused cert left).

3. If the last certificate in the new chain has expired (and it's not the end-entity cert), remember this fact, and remove it (so that we can try if we can validating the chain for a different root). If in this case it turns out that we still can't validate the chain, it's probably the cert expiry error that should be displayed.

This CL also cleans the redundant error detection code and reduces the error messages to two types, which are the only two make differences to the user:
a. SSL_IDMISMATCH for name mismatch,
b. SSL_UNTRUSTED for other reasons.
2010-02-02 17:47:47 -05:00
Brian Carlstrom
6505122dfe Issue 1597: browser crash possibly related to invalid SSL certificate 2010-01-28 11:17:43 -08:00
San Mehat
4d02d001ef NetworkManagementService: Introduce INetworkManagementEventObserver
Introduce a callback event observer which can be registered on the
INetworkManagementService instance to receive events from the service.

Signed-off-by: San Mehat <san@google.com>
2010-01-22 16:10:29 -08:00
San Mehat
353ced79b4 android.net: Introduce @hidden parcelable InterfaceConfiguration class
This class is used to get/set interface configuration via the
new NetworkManagementService API

Signed-off-by: San Mehat <san@google.com>
2010-01-22 12:22:54 -08:00
Robert Greenwalt
1bc3c3775b Fix Javadoc errors so the sdk can build.
I unhid some API in a previous install, triggering javadoc processing on
their buggy comments.

Fixing build.
2010-01-13 11:47:50 -08:00
Robert Greenwalt
c849cdf5cf Unhide some CM constants to support unbundling.
The MOBILE_MMS, MOBILE_SUPL, MOBILE_DUN and MOBILE_HIPRI net types used
by location, messaging, and vending needed to be exposed.

Bug: 2363272
Change-ID: I6d2361d3642064db619b283b9217512563eb3439
2010-01-13 10:01:44 -08:00
Makoto Onuki
8f028a94fc Moved DomainNameChecker to android common.
- Moved DomainNameChecker from android.net.http to android common, and renamed to DomainNameValidator.
- Added a simplified version of DNParser, which DomainNameValidator uses instead of X509Name in order to extract Subject Name from a certificate.
- Added unit tests for DomainNameChecker and DNParser.

There's a suspicious comment in DomainNameChecker saying something like "X509Certificate fails to parse a certificate when a subject alt name begins with '*'".  I think we should fix it if it's really the case -- otherwise certificates with the wildcard wouldn't work.  I'll see if it's true after submitting this patch.
2010-01-12 10:27:13 -08:00
Grace Kloba
5aded76004 am 552346a7: am 106f9b24: Patch from Huahui Wu.
Merge commit '552346a743be7c8b10893f817238e92938866999'

* commit '552346a743be7c8b10893f817238e92938866999':
  Patch from Huahui Wu.
2010-01-05 11:32:52 -08:00
Grace Kloba
552346a743 am 106f9b24: Patch from Huahui Wu.
Merge commit '106f9b244633171ab75dd98b9761b7137c1a4705' into eclair-mr2-plus-aosp

* commit '106f9b244633171ab75dd98b9761b7137c1a4705':
  Patch from Huahui Wu.
2010-01-05 11:20:18 -08:00
Grace Kloba
106f9b2446 Patch from Huahui Wu.
Fix http://b/issue?id=1908085
2010-01-05 10:50:39 -08:00
Tom Taylor
f0108cda21 resolved conflicts for merge of ad2fa35d to master
Change-Id: Ia4362cd48ac0689b91003943a4cd9660da72ff90
2009-12-22 10:11:55 -08:00
Tom Taylor
ad2fa35d88 am d4a4729c: Update imports to android-common
Merge commit 'd4a4729c0cac582a2dcec7c8cfb316b81885a0f0' into eclair-mr2-plus-aosp

* commit 'd4a4729c0cac582a2dcec7c8cfb316b81885a0f0':
  Update imports to android-common
2009-12-21 15:44:34 -08:00
Tom Taylor
d4a4729c0c Update imports to android-common
Several files were moved to android-common. Update all the references
to import those files from the new location.
2009-12-21 13:59:18 -08:00
Paul Westbrook
e143bc92b2 resolved conflicts for merge of 15d3bb2c to master 2009-12-14 10:56:45 -08:00
Paul Westbrook
15d3bb2ce6 am 7762d936: Unbundling work
Merge commit '7762d93621f508f4410fd37b5bbdfec0071b0420' into eclair-mr2-plus-aosp

* commit '7762d93621f508f4410fd37b5bbdfec0071b0420':
  Unbundling work
2009-12-14 10:10:20 -08:00
Paul Westbrook
7762d93621 Unbundling work
Moved AndroidHttpClient, Rfc822InputFilter, Rfc822Validator
NumberPicker, NumberPickerButton to android-common
---
2009-12-14 09:24:09 -08:00
Ken Shirriff
8ea486788f am 0e933c85: am f7d0b013: Add TrafficStats class to SDK.
Merge commit '0e933c853ad53037631e5bca5b4a46f056c1e538'

* commit '0e933c853ad53037631e5bca5b4a46f056c1e538':
  Add TrafficStats class to SDK.
2009-12-10 07:04:31 -08:00
Ken Shirriff
0e933c853a am f7d0b013: Add TrafficStats class to SDK.
Merge commit 'f7d0b01387c10f93bf17981d45087810c80f0902' into eclair-mr2-plus-aosp

* commit 'f7d0b01387c10f93bf17981d45087810c80f0902':
  Add TrafficStats class to SDK.
2009-12-09 15:48:11 -08:00
Ken Shirriff
f7d0b01387 Add TrafficStats class to SDK.
This class (a rename of NetStat) provides network byte and packet statistics.
NetStat will be removed separately, to avoid breaking other packages when submitting.
2009-12-08 10:50:25 -08:00
Grace Kloba
6180977d11 am 8657978a: am ddcea3d2: Expose onReceivedSslError() so that the WebView client can accept the error and continue.
Merge commit '8657978aabc7141869926a98a0da257255678dd4'

* commit '8657978aabc7141869926a98a0da257255678dd4':
  Expose onReceivedSslError() so that the WebView client
2009-12-07 18:37:00 -08:00
Grace Kloba
8657978aab am ddcea3d2: Expose onReceivedSslError() so that the WebView client can accept the error and continue.
Merge commit 'ddcea3d21645bb3037703c84807dae077aae62ce' into eclair-mr2-plus-aosp

* commit 'ddcea3d21645bb3037703c84807dae077aae62ce':
  Expose onReceivedSslError() so that the WebView client
2009-12-07 13:40:53 -08:00
Grace Kloba
ddcea3d216 Expose onReceivedSslError() so that the WebView client
can accept the error and continue.

Fix http://b/issue?id=2299152
2009-12-07 13:20:33 -08:00