/frameworks/base/core/java/android/security/net/config/ |
H A D | Domain.java | 23 * Lower case hostname for this domain rule. 25 public final String hostname; field in class:Domain 32 public Domain(String hostname, boolean subdomainsIncluded) { argument 33 if (hostname == null) { 36 this.hostname = hostname.toLowerCase(Locale.US); 42 return hostname.hashCode() ^ (subdomainsIncluded ? 1231 : 1237); 55 otherDomain.hostname.equals(this.hostname);
|
H A D | ApplicationConfig.java | 29 * configuration to be used for communicating with a specific hostname.</p> 59 * Get the {@link NetworkSecurityConfig} corresponding to the provided hostname. 64 * {@code hostname}. Subsequent calls with the same hostname will always return the same 68 * the network security configuration for connections to {@code hostname}. 70 public NetworkSecurityConfig getConfigForHostname(String hostname) { argument 72 if (hostname == null || hostname.isEmpty() || mConfigs == null) { 75 if (hostname.charAt(0) == '.') { 76 throw new IllegalArgumentException("hostname mus 146 isCleartextTrafficPermitted(String hostname) argument [all...] |
H A D | ConfigNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { argument 38 return mConfig.isCleartextTrafficPermitted(hostname);
|
H A D | RootTrustManager.java | 32 * <p>This trust manager delegates to the specific trust manager for the hostname being used for 36 * Note that if the {@code ApplicationConfig} has per-domain configurations the hostname aware 90 // Not an SSLSocket, use the hostname unaware checkServerTrusted. 112 "Domain specific configurations require that hostname aware" 125 String hostname) throws CertificateException { 126 if (hostname == null && mConfig.hasPerDomainConfigs()) { 128 "Domain specific configurations require that the hostname be provided"); 130 NetworkSecurityConfig config = mConfig.getConfigForHostname(hostname); 131 return config.getTrustManager().checkServerTrusted(certs, authType, hostname); 124 checkServerTrusted(X509Certificate[] certs, String authType, String hostname) argument
|
/frameworks/base/core/java/android/security/ |
H A D | FrameworkNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { argument
|
H A D | NetworkSecurityPolicy.java | 74 * TLS or STARTTLS) is permitted for communicating with {@code hostname} for this process. 78 public boolean isCleartextTrafficPermitted(String hostname) { argument 80 .isCleartextTrafficPermitted(hostname);
|
/frameworks/base/core/java/org/apache/http/conn/scheme/ |
H A D | HostNameResolver.java | 45 InetAddress resolve (String hostname) throws IOException; argument
|
/frameworks/base/core/java/android/net/ |
H A D | Proxy.java | 104 * user did not set a hostname it returns the default host. 210 * Validate syntax of hostname, port and exclusion list entries 213 public static int validate(String hostname, String port, String exclList) { argument 214 Matcher match = HOSTNAME_PATTERN.matcher(hostname); 221 if (hostname.length() > 0 && port.length() == 0) return PROXY_PORT_EMPTY; 224 if (hostname.length() == 0) return PROXY_HOSTNAME_EMPTY;
|
H A D | SSLCertificateSocketFactory.java | 60 * This implementation does check the server's certificate hostname, but only 61 * for createSocket variants that specify a hostname. When using methods that 67 * {@link HostnameVerifier} to verify the certificate hostname. 70 * SSL certificate and hostname checks for testing purposes. This setting 173 * Verify the hostname of the certificate used by the other end of a 174 * connected socket. You MUST call this if you did not supply a hostname 176 * redundantly if the hostname has already been verified. 178 * <p>Wildcard certificates are allowed to verify any matching hostname, 183 * @param hostname The expected hostname o 189 verifyHostname(Socket socket, String hostname) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | NsdService.java | 526 /* NNN resolveId hostname ttl addr */ 790 private boolean getAddrInfo(int resolveId, String hostname) { argument 793 mNativeConnector.execute("mdnssd", "getaddrinfo", resolveId, hostname);
|
/frameworks/base/services/core/jni/ |
H A D | com_android_server_location_GnssLocationProvider.cpp | 908 jint type, jstring hostname, jint port) 914 const char *c_hostname = env->GetStringUTFChars(hostname, NULL); 916 env->ReleaseStringUTFChars(hostname, c_hostname); 907 android_location_GnssLocationProvider_set_agps_server(JNIEnv* env, jobject , jint type, jstring hostname, jint port) argument
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | GnssLocationProvider.java | 2452 private native void native_set_agps_server(int type, String hostname, int port); argument
|