diff options
author | Mathew Inwood <mathewi@google.com> | 2018-08-14 19:04:16 +0100 |
---|---|---|
committer | Mathew Inwood <mathewi@google.com> | 2018-08-14 19:04:16 +0100 |
commit | bbce9470925ef1111576c6717e890f6611620eb4 (patch) | |
tree | de310984e2085c05d80725c981984105a3d3b692 /core/java/org | |
parent | 1f077d9045d824283e26f63ad889444da7bbf620 (diff) |
Add @UnsupportedAppUsage annotations
For packages:
org.apache.http.params
org.apache.http.conn.ssl
org.apache.http.conn.scheme
org.apache.http.conn
This is an automatically generated CL. See go/UnsupportedAppUsage
for more details.
Exempted-From-Owner-Approval: Mechanical changes to the codebase
which have been approved by Android API council and announced on
android-eng@
Bug: 110868826
Test: m
Change-Id: Ia97cd8d932845e1f4c5454764efff206777d2e02
Merged-In: I4f19d319716b92da095b2b1d08f7c225f7ec027c
Diffstat (limited to 'core/java/org')
-rw-r--r-- | core/java/org/apache/http/conn/ssl/AbstractVerifier.java | 2 | ||||
-rw-r--r-- | core/java/org/apache/http/conn/ssl/SSLSocketFactory.java | 9 |
2 files changed, 11 insertions, 0 deletions
diff --git a/core/java/org/apache/http/conn/ssl/AbstractVerifier.java b/core/java/org/apache/http/conn/ssl/AbstractVerifier.java index b9349b39ba94..36d6e22ca847 100644 --- a/core/java/org/apache/http/conn/ssl/AbstractVerifier.java +++ b/core/java/org/apache/http/conn/ssl/AbstractVerifier.java @@ -46,6 +46,7 @@ import java.util.Locale; import java.util.logging.Logger; import java.util.logging.Level; +import android.annotation.UnsupportedAppUsage; import javax.net.ssl.SSLException; import javax.net.ssl.SSLSession; import javax.net.ssl.SSLSocket; @@ -76,6 +77,7 @@ public abstract class AbstractVerifier implements X509HostnameVerifier { * Looks like we're the only implementation guarding against this. * Firefox, Curl, Sun Java 1.4, 5, 6 don't bother with this check. */ + @UnsupportedAppUsage private final static String[] BAD_COUNTRY_2LDS = { "ac", "co", "com", "ed", "edu", "go", "gouv", "gov", "info", "lg", "ne", "net", "or", "org" }; diff --git a/core/java/org/apache/http/conn/ssl/SSLSocketFactory.java b/core/java/org/apache/http/conn/ssl/SSLSocketFactory.java index 250932be0f36..65be161bc0f6 100644 --- a/core/java/org/apache/http/conn/ssl/SSLSocketFactory.java +++ b/core/java/org/apache/http/conn/ssl/SSLSocketFactory.java @@ -36,6 +36,7 @@ import org.apache.http.conn.scheme.LayeredSocketFactory; import org.apache.http.params.HttpConnectionParams; import org.apache.http.params.HttpParams; +import android.annotation.UnsupportedAppUsage; import javax.net.ssl.HttpsURLConnection; import javax.net.ssl.KeyManager; import javax.net.ssl.KeyManagerFactory; @@ -174,9 +175,13 @@ public class SSLSocketFactory implements LayeredSocketFactory { return NoPreloadHolder.DEFAULT_FACTORY; } + @UnsupportedAppUsage private final SSLContext sslcontext; + @UnsupportedAppUsage private final javax.net.ssl.SSLSocketFactory socketfactory; + @UnsupportedAppUsage private final HostNameResolver nameResolver; + @UnsupportedAppUsage private X509HostnameVerifier hostnameVerifier = BROWSER_COMPATIBLE_HOSTNAME_VERIFIER; public SSLSocketFactory( @@ -233,6 +238,7 @@ public class SSLSocketFactory implements LayeredSocketFactory { * * @hide */ + @UnsupportedAppUsage public SSLSocketFactory(javax.net.ssl.SSLSocketFactory socketfactory) { super(); this.sslcontext = null; @@ -245,6 +251,7 @@ public class SSLSocketFactory implements LayeredSocketFactory { * This constructor is used exclusively to instantiate the factory for * {@link #getSocketFactory getSocketFactory}. */ + @UnsupportedAppUsage private SSLSocketFactory() { super(); this.sslcontext = null; @@ -252,6 +259,7 @@ public class SSLSocketFactory implements LayeredSocketFactory { this.nameResolver = null; } + @UnsupportedAppUsage private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) throws KeyStoreException, NoSuchAlgorithmException, UnrecoverableKeyException { if (keystore == null) { @@ -263,6 +271,7 @@ public class SSLSocketFactory implements LayeredSocketFactory { return kmfactory.getKeyManagers(); } + @UnsupportedAppUsage private static TrustManager[] createTrustManagers(final KeyStore keystore) throws KeyStoreException, NoSuchAlgorithmException { if (keystore == null) { |