The self signed certificates created by OpenFire (Not sure if other certs are affected as well) will crash the Java/Android TLS stack when accessing getSubjectAlternativeNames() on the the peer certificate. This usually goes unnoticed in other applications since the DefaultHostnameVerifier checkes the CN first. That however is a violation of RFC6125 section 6.4.4 which requires us to check for the existence of SAN first. This commit adds a work around where in self signed certificates we check for the CN first as well. (Avoiding the call to getSubjectAlternativeNames()) |
||
|---|---|---|
| .. | ||
| axolotl | ||
| sasl | ||
| OtrService.java | ||
| PgpDecryptionService.java | ||
| PgpEngine.java | ||
| XmppDomainVerifier.java | ||