diff options
| author | 2010-01-20 12:03:24 -0800 | |
|---|---|---|
| committer | 2010-01-20 12:03:24 -0800 | |
| commit | 867e8eb753422bb9ef83297b72f925b92040daf9 (patch) | |
| tree | 835bab8ed2a9db819b8d61758db0190aba8d336b | |
| parent | 9b42b8168c698ccb3234861cea9edc281d2bdd08 (diff) | |
| parent | 2683c6f72cb4256f7850bc17d5b2ed4e619c0c6d (diff) | |
Merge "DomainNameValiator: Remove workaround"
| -rw-r--r-- | common/java/com/android/common/DomainNameValidator.java | 21 |
1 files changed, 6 insertions, 15 deletions
diff --git a/common/java/com/android/common/DomainNameValidator.java b/common/java/com/android/common/DomainNameValidator.java index 7d58ddfcac36..25dc007f7515 100644 --- a/common/java/com/android/common/DomainNameValidator.java +++ b/common/java/com/android/common/DomainNameValidator.java @@ -166,22 +166,13 @@ public class DomainNameValidator { } } } catch (CertificateParsingException e) { - // TODO figure out if this comment is still true - // i.e. In what condition do we this exception with a valid certificate? - - // one way we can get here is if an alternative name starts with - // '*' character, which is contrary to one interpretation of the - // spec (a valid DNS name must start with a letter); there is no - // good way around this, and in order to be compatible we proceed - // to check the common name (ie, ignore alternative names) - if (LOG_ENABLED) { - String errorMessage = e.getMessage(); - if (errorMessage == null) { - errorMessage = "failed to parse certificate"; - } - - Log.v(TAG, "DomainNameValidator.matchDns(): " + errorMessage); + String errorMessage = e.getMessage(); + if (errorMessage == null) { + errorMessage = "failed to parse certificate"; } + + Log.w(TAG, "DomainNameValidator.matchDns(): " + errorMessage); + return false; } if (!hasDns) { |