Searched refs:hostname (Results 1 - 12 of 12) sorted by relevance

/frameworks/base/core/java/android/security/net/config/
H A DDomain.java23 * Lower case hostname for this domain rule.
25 public final String hostname; field in class:Domain
32 public Domain(String hostname, boolean subdomainsIncluded) { argument
33 if (hostname == null) {
36 this.hostname = hostname.toLowerCase(Locale.US);
42 return hostname.hashCode() ^ (subdomainsIncluded ? 1231 : 1237);
55 otherDomain.hostname.equals(this.hostname);
H A DApplicationConfig.java29 * configuration to be used for communicating with a specific hostname.</p>
59 * Get the {@link NetworkSecurityConfig} corresponding to the provided hostname.
64 * {@code hostname}. Subsequent calls with the same hostname will always return the same
68 * the network security configuration for connections to {@code hostname}.
70 public NetworkSecurityConfig getConfigForHostname(String hostname) { argument
72 if (hostname == null || hostname.isEmpty() || mConfigs == null) {
75 if (hostname.charAt(0) == '.') {
76 throw new IllegalArgumentException("hostname mus
146 isCleartextTrafficPermitted(String hostname) argument
[all...]
H A DConfigNetworkSecurityPolicy.java37 public boolean isCleartextTrafficPermitted(String hostname) { argument
38 return mConfig.isCleartextTrafficPermitted(hostname);
H A DRootTrustManager.java32 * <p>This trust manager delegates to the specific trust manager for the hostname being used for
36 * Note that if the {@code ApplicationConfig} has per-domain configurations the hostname aware
90 // Not an SSLSocket, use the hostname unaware checkServerTrusted.
112 "Domain specific configurations require that hostname aware"
125 String hostname) throws CertificateException {
126 if (hostname == null && mConfig.hasPerDomainConfigs()) {
128 "Domain specific configurations require that the hostname be provided");
130 NetworkSecurityConfig config = mConfig.getConfigForHostname(hostname);
131 return config.getTrustManager().checkServerTrusted(certs, authType, hostname);
124 checkServerTrusted(X509Certificate[] certs, String authType, String hostname) argument
/frameworks/base/core/java/android/security/
H A DFrameworkNetworkSecurityPolicy.java37 public boolean isCleartextTrafficPermitted(String hostname) { argument
H A DNetworkSecurityPolicy.java74 * TLS or STARTTLS) is permitted for communicating with {@code hostname} for this process.
78 public boolean isCleartextTrafficPermitted(String hostname) { argument
80 .isCleartextTrafficPermitted(hostname);
/frameworks/base/core/java/org/apache/http/conn/scheme/
H A DHostNameResolver.java45 InetAddress resolve (String hostname) throws IOException; argument
/frameworks/base/core/java/android/net/
H A DProxy.java104 * user did not set a hostname it returns the default host.
210 * Validate syntax of hostname, port and exclusion list entries
213 public static int validate(String hostname, String port, String exclList) { argument
214 Matcher match = HOSTNAME_PATTERN.matcher(hostname);
221 if (hostname.length() > 0 && port.length() == 0) return PROXY_PORT_EMPTY;
224 if (hostname.length() == 0) return PROXY_HOSTNAME_EMPTY;
H A DSSLCertificateSocketFactory.java60 * This implementation does check the server's certificate hostname, but only
61 * for createSocket variants that specify a hostname. When using methods that
67 * {@link HostnameVerifier} to verify the certificate hostname.
70 * SSL certificate and hostname checks for testing purposes. This setting
173 * Verify the hostname of the certificate used by the other end of a
174 * connected socket. You MUST call this if you did not supply a hostname
176 * redundantly if the hostname has already been verified.
178 * <p>Wildcard certificates are allowed to verify any matching hostname,
183 * @param hostname The expected hostname o
189 verifyHostname(Socket socket, String hostname) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DNsdService.java526 /* NNN resolveId hostname ttl addr */
790 private boolean getAddrInfo(int resolveId, String hostname) { argument
793 mNativeConnector.execute("mdnssd", "getaddrinfo", resolveId, hostname);
/frameworks/base/services/core/jni/
H A Dcom_android_server_location_GnssLocationProvider.cpp908 jint type, jstring hostname, jint port)
914 const char *c_hostname = env->GetStringUTFChars(hostname, NULL);
916 env->ReleaseStringUTFChars(hostname, c_hostname);
907 android_location_GnssLocationProvider_set_agps_server(JNIEnv* env, jobject , jint type, jstring hostname, jint port) argument
/frameworks/base/services/core/java/com/android/server/location/
H A DGnssLocationProvider.java2452 private native void native_set_agps_server(int type, String hostname, int port); argument

Completed in 272 milliseconds