Track libcore change
This tracks libcore change I23b85308ac25fd00307d37cff1d93ee6c2bfba98
which adds SNI support.
Change-Id: I93d8a4b07cc1f599123565a5c0672dd7848f05bf
diff --git a/api/current.txt b/api/current.txt
index 18c5c160..5268421 100644
--- a/api/current.txt
+++ b/api/current.txt
@@ -60025,6 +60025,7 @@
ctor public ExtendedSSLSession();
method public abstract java.lang.String[] getLocalSupportedSignatureAlgorithms();
method public abstract java.lang.String[] getPeerSupportedSignatureAlgorithms();
+ method public java.util.List<javax.net.ssl.SNIServerName> getRequestedServerNames();
}
public class HandshakeCompletedEvent extends java.util.EventObject {
@@ -60097,6 +60098,25 @@
public abstract interface ManagerFactoryParameters {
}
+ public final class SNIHostName extends javax.net.ssl.SNIServerName {
+ ctor public SNIHostName(java.lang.String);
+ ctor public SNIHostName(byte[]);
+ method public static javax.net.ssl.SNIMatcher createSNIMatcher(java.lang.String);
+ method public java.lang.String getAsciiName();
+ }
+
+ public abstract class SNIMatcher {
+ ctor protected SNIMatcher(int);
+ method public final int getType();
+ method public abstract boolean matches(javax.net.ssl.SNIServerName);
+ }
+
+ public abstract class SNIServerName {
+ ctor protected SNIServerName(int, byte[]);
+ method public final byte[] getEncoded();
+ method public final int getType();
+ }
+
public class SSLContext {
ctor protected SSLContext(javax.net.ssl.SSLContextSpi, java.security.Provider, java.lang.String);
method public final javax.net.ssl.SSLEngine createSSLEngine();
@@ -60218,12 +60238,16 @@
method public java.lang.String getEndpointIdentificationAlgorithm();
method public boolean getNeedClientAuth();
method public java.lang.String[] getProtocols();
+ method public final java.util.Collection<javax.net.ssl.SNIMatcher> getSNIMatchers();
+ method public final java.util.List<javax.net.ssl.SNIServerName> getServerNames();
method public boolean getWantClientAuth();
method public void setAlgorithmConstraints(java.security.AlgorithmConstraints);
method public void setCipherSuites(java.lang.String[]);
method public void setEndpointIdentificationAlgorithm(java.lang.String);
method public void setNeedClientAuth(boolean);
method public void setProtocols(java.lang.String[]);
+ method public final void setSNIMatchers(java.util.Collection<javax.net.ssl.SNIMatcher>);
+ method public final void setServerNames(java.util.List<javax.net.ssl.SNIServerName>);
method public void setWantClientAuth(boolean);
}
@@ -60351,6 +60375,10 @@
method public abstract java.lang.String[] getSupportedCipherSuites();
}
+ public final class StandardConstants {
+ field public static final int SNI_HOST_NAME = 0; // 0x0
+ }
+
public abstract interface TrustManager {
}
diff --git a/api/system-current.txt b/api/system-current.txt
index 523ef07..b61ceb8 100644
--- a/api/system-current.txt
+++ b/api/system-current.txt
@@ -62643,6 +62643,7 @@
ctor public ExtendedSSLSession();
method public abstract java.lang.String[] getLocalSupportedSignatureAlgorithms();
method public abstract java.lang.String[] getPeerSupportedSignatureAlgorithms();
+ method public java.util.List<javax.net.ssl.SNIServerName> getRequestedServerNames();
}
public class HandshakeCompletedEvent extends java.util.EventObject {
@@ -62715,6 +62716,25 @@
public abstract interface ManagerFactoryParameters {
}
+ public final class SNIHostName extends javax.net.ssl.SNIServerName {
+ ctor public SNIHostName(java.lang.String);
+ ctor public SNIHostName(byte[]);
+ method public static javax.net.ssl.SNIMatcher createSNIMatcher(java.lang.String);
+ method public java.lang.String getAsciiName();
+ }
+
+ public abstract class SNIMatcher {
+ ctor protected SNIMatcher(int);
+ method public final int getType();
+ method public abstract boolean matches(javax.net.ssl.SNIServerName);
+ }
+
+ public abstract class SNIServerName {
+ ctor protected SNIServerName(int, byte[]);
+ method public final byte[] getEncoded();
+ method public final int getType();
+ }
+
public class SSLContext {
ctor protected SSLContext(javax.net.ssl.SSLContextSpi, java.security.Provider, java.lang.String);
method public final javax.net.ssl.SSLEngine createSSLEngine();
@@ -62836,12 +62856,16 @@
method public java.lang.String getEndpointIdentificationAlgorithm();
method public boolean getNeedClientAuth();
method public java.lang.String[] getProtocols();
+ method public final java.util.Collection<javax.net.ssl.SNIMatcher> getSNIMatchers();
+ method public final java.util.List<javax.net.ssl.SNIServerName> getServerNames();
method public boolean getWantClientAuth();
method public void setAlgorithmConstraints(java.security.AlgorithmConstraints);
method public void setCipherSuites(java.lang.String[]);
method public void setEndpointIdentificationAlgorithm(java.lang.String);
method public void setNeedClientAuth(boolean);
method public void setProtocols(java.lang.String[]);
+ method public final void setSNIMatchers(java.util.Collection<javax.net.ssl.SNIMatcher>);
+ method public final void setServerNames(java.util.List<javax.net.ssl.SNIServerName>);
method public void setWantClientAuth(boolean);
}
@@ -62969,6 +62993,10 @@
method public abstract java.lang.String[] getSupportedCipherSuites();
}
+ public final class StandardConstants {
+ field public static final int SNI_HOST_NAME = 0; // 0x0
+ }
+
public abstract interface TrustManager {
}