The vulnerability description indicates that setting a hostname verification policy to 'ANY' skips trust store certificate verification. The provided commit 99ca24c directly addresses this. The core change is in the services/src/main/java/org/keycloak/truststore/JSSETruststoreConfigurator.java file, specifically within the getTrustManagers() method. The patch removes a conditional block that, if getProvider().getPolicy() == HostnameVerificationPolicy.ANY was true, returned a new X509TrustManager with empty checkClientTrusted and checkServerTrusted methods. This means that when the policy was 'ANY', no actual certificate validation was performed by this trust manager. Therefore, org.keycloak.truststore.JSSETruststoreConfigurator.getTrustManagers() is the function that contained the vulnerable logic allowing the bypass of certificate verification.