/frameworks/base/core/java/android/security/ |
H A D | FrameworkNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { argument 42 public boolean isCertificateTransparencyVerificationRequired(String hostname) { argument
|
H A D | NetworkSecurityPolicy.java | 74 * TLS or STARTTLS) is permitted for communicating with {@code hostname} for this process. 78 public boolean isCleartextTrafficPermitted(String hostname) { argument 80 .isCleartextTrafficPermitted(hostname);
|
/frameworks/base/core/java/android/security/net/config/ |
H A D | ConfigNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { argument 38 return mConfig.isCleartextTrafficPermitted(hostname); 42 public boolean isCertificateTransparencyVerificationRequired(String hostname) { argument
|
H A D | Domain.java | 23 * Lower case hostname for this domain rule. 25 public final String hostname; field in class:Domain 32 public Domain(String hostname, boolean subdomainsIncluded) { argument 33 if (hostname == null) { 36 this.hostname = hostname.toLowerCase(Locale.US); 42 return hostname.hashCode() ^ (subdomainsIncluded ? 1231 : 1237); 55 otherDomain.hostname.equals(this.hostname);
|
H A D | RootTrustManager.java | 32 * <p>This trust manager delegates to the specific trust manager for the hostname being used for 36 * Note that if the {@code ApplicationConfig} has per-domain configurations the hostname aware 90 // Not an SSLSocket, use the hostname unaware checkServerTrusted. 112 "Domain specific configurations require that hostname aware" 125 String hostname) throws CertificateException { 126 if (hostname == null && mConfig.hasPerDomainConfigs()) { 128 "Domain specific configurations require that the hostname be provided"); 130 NetworkSecurityConfig config = mConfig.getConfigForHostname(hostname); 131 return config.getTrustManager().checkServerTrusted(certs, authType, hostname); 124 checkServerTrusted(X509Certificate[] certs, String authType, String hostname) argument
|
H A D | ApplicationConfig.java | 29 * configuration to be used for communicating with a specific hostname.</p> 59 * Get the {@link NetworkSecurityConfig} corresponding to the provided hostname. 64 * {@code hostname}. Subsequent calls with the same hostname will always return the same 68 * the network security configuration for connections to {@code hostname}. 70 public NetworkSecurityConfig getConfigForHostname(String hostname) { argument 72 if (hostname == null || hostname.isEmpty() || mConfigs == null) { 75 if (hostname.charAt(0) == '.') { 76 throw new IllegalArgumentException("hostname mus 146 isCleartextTrafficPermitted(String hostname) argument [all...] |
/frameworks/base/core/java/org/apache/http/conn/scheme/ |
H A D | HostNameResolver.java | 45 InetAddress resolve (String hostname) throws IOException; argument
|
/frameworks/base/core/java/com/android/server/net/ |
H A D | BaseNetdEventCallback.java | 29 public void onDnsEvent(String hostname, String[] ipAddresses, argument 36 String hostname, boolean validated) { 35 onPrivateDnsValidationEvent(int netId, String ipAddress, String hostname, boolean validated) argument
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DnsEvent.java | 31 * <p>It contains information about the originating app as well as the DNS hostname and resolved 36 /** The hostname that was looked up. */ 49 public DnsEvent(String hostname, String[] ipAddresses, int ipAddressesCount, argument 52 this.mHostname = hostname; 66 /** Returns the hostname that was looked up. */
|
/frameworks/base/core/java/android/net/ |
H A D | Proxy.java | 105 * user did not set a hostname it returns the default host. 215 * Validate syntax of hostname, port and exclusion list entries 218 public static int validate(String hostname, String port, String exclList) { argument 219 Matcher match = HOSTNAME_PATTERN.matcher(hostname); 226 if (hostname.length() > 0 && port.length() == 0) return PROXY_PORT_EMPTY; 229 if (hostname.length() == 0) return PROXY_HOSTNAME_EMPTY;
|
H A D | SSLCertificateSocketFactory.java | 63 * This implementation does check the server's certificate hostname, but only 64 * for createSocket variants that specify a hostname. When using methods that 75 * {@link HostnameVerifier} to verify the certificate hostname. 78 * SSL certificate and hostname checks for testing purposes. This setting 181 * Verify the hostname of the certificate used by the other end of a 182 * connected socket. You MUST call this if you did not supply a hostname 184 * redundantly if the hostname has already been verified. 186 * <p>Wildcard certificates are allowed to verify any matching hostname, 191 * @param hostname The expected hostname o 197 verifyHostname(Socket socket, String hostname) argument [all...] |
/frameworks/base/services/core/java/com/android/server/net/watchlist/ |
H A D | WatchlistLoggingHandler.java | 195 private void handleNetworkEvent(String hostname, String[] ipAddresses, argument 198 Slog.i(TAG, "handleNetworkEvent with host: " + hostname + ", uid: " + uid); 212 final String cncDomain = searchAllSubDomainsInWatchlist(hostname);
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | DnsManager.java | 82 * programmed, and strict mode hostname resolution (if applicable) is 96 * [5] Upon a successful hostname resolution NetworkMonitor initiates a 97 * validation attempt in the form of a lookup for a one-time hostname 129 public final String hostname; field in class:DnsManager.PrivateDnsConfig 138 this.hostname = ""; 142 public PrivateDnsConfig(String hostname, InetAddress[] ips) { argument 143 this.useTls = !TextUtils.isEmpty(hostname); 144 this.hostname = useTls ? hostname : ""; 150 hostname 197 final public String hostname; field in class:DnsManager.PrivateDnsValidationUpdate 200 PrivateDnsValidationUpdate(int netId, InetAddress ipAddress, String hostname, boolean validated) argument 234 updateTrackedDnses(String[] ipAddresses, String hostname) argument [all...] |
H A D | NetdEventListenerService.java | 204 String hostname, String[] ipAddresses, int ipAddressesCount, int uid) 211 callback.onDnsEvent(hostname, ipAddresses, ipAddressesCount, timestamp, uid); 220 String ipAddress, String hostname, boolean validated) 224 callback.onPrivateDnsValidationEvent(netId, ipAddress, hostname, validated); 203 onDnsEvent(int netId, int eventType, int returnCode, int latencyMs, String hostname, String[] ipAddresses, int ipAddressesCount, int uid) argument 219 onPrivateDnsValidationEvent(int netId, String ipAddress, String hostname, boolean validated) argument
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | NsdService.java | 497 /* NNN resolveId hostname ttl addr */ 756 private boolean getAddrInfo(int resolveId, String hostname) { argument 757 return mDaemon.execute("getaddrinfo", resolveId, hostname);
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | GnssLocationProvider.java | 2762 private native void native_set_agps_server(int type, String hostname, int port); argument
|
/frameworks/base/services/core/jni/ |
H A D | com_android_server_location_GnssLocationProvider.cpp | 1623 jint type, jstring hostname, jint port) { 1629 const char *c_hostname = env->GetStringUTFChars(hostname, NULL); 1637 env->ReleaseStringUTFChars(hostname, c_hostname); 1622 android_location_GnssLocationProvider_set_agps_server(JNIEnv* env, jobject , jint type, jstring hostname, jint port) argument
|