Initial import of ADIF API reverse-engineering toolkit
This commit is contained in:
74
apk_decompiled/sources/m3/m.java
Normal file
74
apk_decompiled/sources/m3/m.java
Normal file
@@ -0,0 +1,74 @@
|
||||
package m3;
|
||||
|
||||
import java.security.KeyStore;
|
||||
import java.security.Provider;
|
||||
import java.util.Arrays;
|
||||
import java.util.List;
|
||||
import javax.net.ssl.SSLContext;
|
||||
import javax.net.ssl.SSLSocket;
|
||||
import javax.net.ssl.TrustManager;
|
||||
import javax.net.ssl.TrustManagerFactory;
|
||||
import javax.net.ssl.X509TrustManager;
|
||||
import kotlin.jvm.internal.Intrinsics;
|
||||
import org.openjsse.net.ssl.OpenJSSE;
|
||||
|
||||
/* loaded from: classes3.dex */
|
||||
public final class m extends n {
|
||||
|
||||
/* renamed from: d, reason: collision with root package name */
|
||||
public static final boolean f7827d;
|
||||
|
||||
/* renamed from: c, reason: collision with root package name */
|
||||
public final Provider f7828c = new OpenJSSE();
|
||||
|
||||
static {
|
||||
boolean z3 = false;
|
||||
try {
|
||||
Class.forName("org.openjsse.net.ssl.OpenJSSE", false, l.class.getClassLoader());
|
||||
z3 = true;
|
||||
} catch (ClassNotFoundException unused) {
|
||||
}
|
||||
f7827d = z3;
|
||||
}
|
||||
|
||||
@Override // m3.n
|
||||
public final void d(SSLSocket sslSocket, String str, List protocols) {
|
||||
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
|
||||
Intrinsics.checkNotNullParameter(protocols, "protocols");
|
||||
super.d(sslSocket, str, protocols);
|
||||
}
|
||||
|
||||
@Override // m3.n
|
||||
public final String f(SSLSocket sslSocket) {
|
||||
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
|
||||
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override // m3.n
|
||||
public final SSLContext k() {
|
||||
SSLContext sSLContext = SSLContext.getInstance("TLSv1.3", this.f7828c);
|
||||
Intrinsics.checkNotNullExpressionValue(sSLContext, "getInstance(\"TLSv1.3\", provider)");
|
||||
return sSLContext;
|
||||
}
|
||||
|
||||
@Override // m3.n
|
||||
public final X509TrustManager m() {
|
||||
TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm(), this.f7828c);
|
||||
trustManagerFactory.init((KeyStore) null);
|
||||
TrustManager[] trustManagers = trustManagerFactory.getTrustManagers();
|
||||
Intrinsics.checkNotNull(trustManagers);
|
||||
if (trustManagers.length == 1) {
|
||||
TrustManager trustManager = trustManagers[0];
|
||||
if (trustManager instanceof X509TrustManager) {
|
||||
Intrinsics.checkNotNull(trustManager, "null cannot be cast to non-null type javax.net.ssl.X509TrustManager");
|
||||
return (X509TrustManager) trustManager;
|
||||
}
|
||||
}
|
||||
StringBuilder sb = new StringBuilder("Unexpected default trust managers: ");
|
||||
String arrays = Arrays.toString(trustManagers);
|
||||
Intrinsics.checkNotNullExpressionValue(arrays, "toString(this)");
|
||||
sb.append(arrays);
|
||||
throw new IllegalStateException(sb.toString().toString());
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user