diff options
author | Makoto Onuki <omakoto@google.com> | 2010-01-20 12:03:24 -0800 |
---|---|---|
committer | Android (Google) Code Review <android-gerrit@google.com> | 2010-01-20 12:03:24 -0800 |
commit | 867e8eb753422bb9ef83297b72f925b92040daf9 (patch) | |
tree | 835bab8ed2a9db819b8d61758db0190aba8d336b | |
parent | 9b42b8168c698ccb3234861cea9edc281d2bdd08 (diff) | |
parent | 2683c6f72cb4256f7850bc17d5b2ed4e619c0c6d (diff) | |
download | frameworks_base-867e8eb753422bb9ef83297b72f925b92040daf9.zip frameworks_base-867e8eb753422bb9ef83297b72f925b92040daf9.tar.gz frameworks_base-867e8eb753422bb9ef83297b72f925b92040daf9.tar.bz2 |
Merge "DomainNameValiator: Remove workaround"
-rw-r--r-- | common/java/com/android/common/DomainNameValidator.java | 21 |
1 files changed, 6 insertions, 15 deletions
diff --git a/common/java/com/android/common/DomainNameValidator.java b/common/java/com/android/common/DomainNameValidator.java index 7d58ddf..25dc007 100644 --- a/common/java/com/android/common/DomainNameValidator.java +++ b/common/java/com/android/common/DomainNameValidator.java @@ -166,22 +166,13 @@ public class DomainNameValidator { } } } catch (CertificateParsingException e) { - // TODO figure out if this comment is still true - // i.e. In what condition do we this exception with a valid certificate? - - // one way we can get here is if an alternative name starts with - // '*' character, which is contrary to one interpretation of the - // spec (a valid DNS name must start with a letter); there is no - // good way around this, and in order to be compatible we proceed - // to check the common name (ie, ignore alternative names) - if (LOG_ENABLED) { - String errorMessage = e.getMessage(); - if (errorMessage == null) { - errorMessage = "failed to parse certificate"; - } - - Log.v(TAG, "DomainNameValidator.matchDns(): " + errorMessage); + String errorMessage = e.getMessage(); + if (errorMessage == null) { + errorMessage = "failed to parse certificate"; } + + Log.w(TAG, "DomainNameValidator.matchDns(): " + errorMessage); + return false; } if (!hasDns) { |