Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /*
2 * ====================================================================
3 * Licensed to the Apache Software Foundation (ASF) under one
4 * or more contributor license agreements. See the NOTICE file
5 * distributed with this work for additional information
6 * regarding copyright ownership. The ASF licenses this file
7 * to you under the Apache License, Version 2.0 (the
8 * "License"); you may not use this file except in compliance
9 * with the License. You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing,
14 * software distributed under the License is distributed on an
15 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16 * KIND, either express or implied. See the License for the
17 * specific language governing permissions and limitations
18 * under the License.
19 * ====================================================================
20 *
21 * This software consists of voluntary contributions made by many
22 * individuals on behalf of the Apache Software Foundation. For more
23 * information on the Apache Software Foundation, please see
24 * <http://www.apache.org/>.
25 *
26 */
28 package ch.boye.httpclientandroidlib.conn.ssl;
30 import ch.boye.httpclientandroidlib.annotation.Immutable;
32 /**
33 * The ALLOW_ALL HostnameVerifier essentially turns hostname verification
34 * off. This implementation is a no-op, and never throws the SSLException.
35 *
36 *
37 * @since 4.0
38 */
39 @Immutable
40 public class AllowAllHostnameVerifier extends AbstractVerifier {
42 public final void verify(
43 final String host,
44 final String[] cns,
45 final String[] subjectAlts) {
46 // Allow everything - so never blowup.
47 }
49 @Override
50 public final String toString() {
51 return "ALLOW_ALL";
52 }
54 }