From f72e8263c7e08d3e4a04de29c17bbada2bd2829a Mon Sep 17 00:00:00 2001 From: Jonathan Dormody Date: Wed, 8 Nov 2017 16:58:16 -0700 Subject: Docs: Added a link to Updating Your Security Provider to Protect Against SSL Exploits Test: make ds-docs Bug: 19110275 Change-Id: I3b0a35715c16c4e30a47aab9cbaf991770426c57 --- core/java/android/net/SSLCertificateSocketFactory.java | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/core/java/android/net/SSLCertificateSocketFactory.java b/core/java/android/net/SSLCertificateSocketFactory.java index b56437eba167..654220065e4e 100644 --- a/core/java/android/net/SSLCertificateSocketFactory.java +++ b/core/java/android/net/SSLCertificateSocketFactory.java @@ -62,7 +62,12 @@ import javax.net.ssl.X509TrustManager; * This implementation does check the server's certificate hostname, but only * for createSocket variants that specify a hostname. When using methods that * use {@link InetAddress} or which return an unconnected socket, you MUST - * verify the server's identity yourself to ensure a secure connection.

+ * verify the server's identity yourself to ensure a secure connection. + * + * Refer to + * + * Updating Your Security Provider to Protect Against SSL Exploits + * for further information.

* *

One way to verify the server's identity is to use * {@link HttpsURLConnection#getDefaultHostnameVerifier()} to get a -- cgit v1.2.3-59-g8ed1b