Add checkServerTrusted variant to X509TrustManagerExtensions
This variant passes down the OCSP and TLS data that may be required to
validate the Certificate Transparency status of a certificate.
This is required for network stacks that are not able to pass down an
SSLSession nor a Socket (e.g., Cronet).
Bug: 293505388
Bug: 319829948
Bug: 377159091
Test: build
API-Coverage-Bug: 376139811
Flag: android.net.platform.flags.x509_extensions_certificate_transparency
Change-Id: I0304c97e799452a51916174788ba7dd6c9a82fb6
diff --git a/AconfigFlags.bp b/AconfigFlags.bp
index e184704..e951708 100644
--- a/AconfigFlags.bp
+++ b/AconfigFlags.bp
@@ -105,6 +105,7 @@
"com.android.server.flags.services-aconfig-java",
"com.android.text.flags-aconfig-java",
"com.android.window.flags.window-aconfig-java",
+ "conscrypt_exported_aconfig_flags_lib",
"device_policy_aconfig_flags_lib",
"display_flags_lib",
"dropbox_flags_lib",
@@ -194,6 +195,14 @@
defaults: ["framework-minus-apex-aconfig-java-defaults"],
}
+// Conscrypt
+java_aconfig_library {
+ name: "conscrypt_exported_aconfig_flags_lib",
+ aconfig_declarations: "conscrypt-aconfig-flags",
+ mode: "exported",
+ defaults: ["framework-minus-apex-aconfig-java-defaults"],
+}
+
// Telecom
java_aconfig_library {
name: "telecom_flags_core_java_lib",