summaryrefslogtreecommitdiff
path: root/app/openssl/crypto/ecdsa/ecs_err.c
diff options
context:
space:
mode:
authorParménides GV <parmegv@sdf.org>2014-04-09 12:13:09 +0200
committerParménides GV <parmegv@sdf.org>2014-04-09 12:13:09 +0200
commit6543f487c993002d5cc9cb4cec8e45f638d15be9 (patch)
tree4652e074df704417feb5450fb80477d49f7cc5bc /app/openssl/crypto/ecdsa/ecs_err.c
parent3ef75e60fef1f16d6a97c3b4ad80c45e362b82ef (diff)
Danger code removed from release apk.
I've copied all files containing "danger" to both release and debug java folders (solution learnt from http://stackoverflow.com/questions/18782368/android-gradle-buildtypes-duplicate-class), and removed every trace of any "danger" related code in the release apk. This way, we make sure nobody can exploit that unused variable in production mode, so that if Android fails to protect our app (people have been able to introduce code into signed apks, so it's not impossible), we make it difficult to bypass the SSL certificate verification. You can call me paranoid if you want ;)
Diffstat (limited to 'app/openssl/crypto/ecdsa/ecs_err.c')
0 files changed, 0 insertions, 0 deletions