summaryrefslogtreecommitdiffstats
path: root/emailcommon
diff options
context:
space:
mode:
authorMartin Hibdon <mhibdon@google.com>2014-10-22 14:47:51 -0700
committerMartin Hibdon <mhibdon@google.com>2014-10-24 11:46:48 -0700
commit93a9662d8db14e492da0cf4866265a0ddebda190 (patch)
treef58f464878b130639b5ebe56bda6b79a7384d9ec /emailcommon
parenta908d45ae3519ecdc82e187d1ab72e8991ea7ed8 (diff)
downloadandroid_packages_apps_Email-93a9662d8db14e492da0cf4866265a0ddebda190.tar.gz
android_packages_apps_Email-93a9662d8db14e492da0cf4866265a0ddebda190.tar.bz2
android_packages_apps_Email-93a9662d8db14e492da0cf4866265a0ddebda190.zip
Add analytics to track of what cipher suites are being used
b/18001842 I do this in MailTransport, which is only used by POP and IMAP. I can't log Analytics in SSLSocketFactoryWrapper, because that is in emailcommon and would cause a circular dependancy between emailcomman and UnifiedEmail. This will not yet work for Exchange, because it gets its socket indirectly through EmailClientConnectionManager, using a SchemeRegistry. Still, it will be helpful to get this info for POP and IMAP. Change-Id: Ibb9d22c83c49d0ba5090295b5321ca6afb09e65b
Diffstat (limited to 'emailcommon')
-rw-r--r--emailcommon/src/com/android/emailcommon/utility/SSLSocketFactoryWrapper.java2
1 files changed, 1 insertions, 1 deletions
diff --git a/emailcommon/src/com/android/emailcommon/utility/SSLSocketFactoryWrapper.java b/emailcommon/src/com/android/emailcommon/utility/SSLSocketFactoryWrapper.java
index 516084fe4..66b596bff 100644
--- a/emailcommon/src/com/android/emailcommon/utility/SSLSocketFactoryWrapper.java
+++ b/emailcommon/src/com/android/emailcommon/utility/SSLSocketFactoryWrapper.java
@@ -234,10 +234,10 @@ public class SSLSocketFactoryWrapper extends javax.net.ssl.SSLSocketFactory {
ssl.startHandshake();
SSLSession session = ssl.getSession();
- LogUtils.d(LogUtils.TAG, "using cipherSuite %s", session.getCipherSuite());
if (session == null) {
throw new SSLException("Cannot verify SSL socket without session");
}
+ LogUtils.d(LogUtils.TAG, "using cipherSuite %s", session.getCipherSuite());
if (!HttpsURLConnection.getDefaultHostnameVerifier().verify(hostname, session)) {
throw new SSLPeerUnverifiedException("Cannot verify hostname: " + hostname);
}