/aosp12/frameworks/base/core/java/android/security/net/config/ |
H A D | RootTrustManager.java | 53 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 58 config.getTrustManager().checkClientTrusted(chain, authType); in checkClientTrusted() 62 public void checkClientTrusted(X509Certificate[] certs, String authType, Socket socket) in checkClientTrusted() argument 67 config.getTrustManager().checkClientTrusted(certs, authType, socket); in checkClientTrusted() 76 config.getTrustManager().checkClientTrusted(certs, authType, engine); in checkClientTrusted() 90 config.getTrustManager().checkServerTrusted(certs, authType, socket); in checkServerTrusted() 93 checkServerTrusted(certs, authType); in checkServerTrusted() 106 config.getTrustManager().checkServerTrusted(certs, authType, engine); in checkServerTrusted() 110 public void checkServerTrusted(X509Certificate[] certs, String authType) in checkServerTrusted() argument 118 config.getTrustManager().checkServerTrusted(certs, authType); in checkServerTrusted() [all …]
|
H A D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 69 mDelegate.checkClientTrusted(chain, authType); in checkClientTrusted() 73 public void checkClientTrusted(X509Certificate[] certs, String authType, Socket socket) in checkClientTrusted() argument 75 mDelegate.checkClientTrusted(certs, authType, socket); in checkClientTrusted() 79 public void checkClientTrusted(X509Certificate[] certs, String authType, SSLEngine engine) in checkClientTrusted() argument 81 mDelegate.checkClientTrusted(certs, authType, engine); in checkClientTrusted() 85 public void checkServerTrusted(X509Certificate[] certs, String authType) in checkServerTrusted() argument 87 checkServerTrusted(certs, authType, (String) null); in checkServerTrusted() 91 public void checkServerTrusted(X509Certificate[] certs, String authType, Socket socket) in checkServerTrusted() argument 94 mDelegate.getTrustedChainForServer(certs, authType, socket); in checkServerTrusted() [all …]
|
/aosp12/packages/apps/Nfc/src/com/android/nfc/ |
H A D | NfcWifiProtectedSetup.java | 151 short authType = payload.getShort(); in parseCredential() local 152 populateAllowedKeyManagement(result.allowedKeyManagement, authType); in parseCredential() 176 private static void populateAllowedKeyManagement(BitSet allowedKeyManagement, short authType) { in populateAllowedKeyManagement() argument 177 if (authType == AUTH_TYPE_WPA_PSK || authType == AUTH_TYPE_WPA2_PSK in populateAllowedKeyManagement() 178 || authType == AUTH_TYPE_WPA_AND_WPA2_PSK) { in populateAllowedKeyManagement() 180 } else if (authType == AUTH_TYPE_WPA_EAP || authType == AUTH_TYPE_WPA2_EAP) { in populateAllowedKeyManagement() 182 } else if (authType == AUTH_TYPE_OPEN) { in populateAllowedKeyManagement()
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/anqp/eap/ |
H A D | CredentialType.java | 52 public CredentialType(int authType, int credType) { in CredentialType() argument 53 super(authType); in CredentialType() 73 int authType = tunneled ? AuthParam.PARAM_TYPE_TUNNELED_EAP_METHOD_CREDENTIAL_TYPE in parse() local 75 return new CredentialType(authType, credType); in parse()
|
H A D | ExpandedEAPMethod.java | 42 public ExpandedEAPMethod(int authType, int vendorID, long vendorType) { in ExpandedEAPMethod() argument 43 super(authType); in ExpandedEAPMethod() 71 int authType = inner ? AuthParam.PARAM_TYPE_EXPANDED_INNER_EAP_METHOD in parse() local 73 return new ExpandedEAPMethod(authType, vendorID, vendorType); in parse()
|
H A D | NonEAPInnerAuth.java | 54 public NonEAPInnerAuth(int authType) { in NonEAPInnerAuth() argument 56 mAuthType = authType; in NonEAPInnerAuth() 71 int authType = payload.get() & 0xFF; in parse() local 72 return new NonEAPInnerAuth(authType); in parse()
|
/aosp12/packages/apps/Car/DebuggingRestrictionController/app/src/main/java/com/android/car/debuggingrestrictioncontroller/auth/ |
H A D | SelfSignedTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 69 trustManager.checkClientTrusted(chain, authType); in checkClientTrusted() 72 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 74 trustManager.checkServerTrusted(chain, authType); in checkServerTrusted()
|
/aosp12/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 95 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, in checkServerTrusted() argument 98 return mDelegate.checkServerTrusted(chain, authType, host); in checkServerTrusted() 102 authType, host); in checkServerTrusted()
|
/aosp12/frameworks/base/telephony/java/android/telephony/data/ |
H A D | DataProfile.java | 108 private DataProfile(int profileId, String apn, @ProtocolType int protocolType, int authType, in DataProfile() argument 117 if (authType == -1) { in DataProfile() 118 authType = TextUtils.isEmpty(userName) ? RILConstants.SETUP_DATA_AUTH_NONE in DataProfile() 121 this.mAuthType = authType; in DataProfile() 460 public @NonNull Builder setAuthType(@AuthType int authType) { in setAuthType() argument 461 mAuthType = authType; in setAuthType()
|
H A D | ApnSetting.java | 909 int authType, int mApnTypeBitmask, int protocol, int roamingProtocol, in makeApnSetting() argument 925 .setAuthType(authType) in makeApnSetting() 951 int authType, int mApnTypeBitmask, int protocol, int roamingProtocol, in makeApnSetting() argument 956 mmsc, mmsProxyAddress, mmsProxyPort, user, password, authType, mApnTypeBitmask, in makeApnSetting() 1128 int authType; in fromString() local 1130 authType = Integer.parseInt(a[12]); in fromString() 1132 authType = 0; in fromString() 1213 portFromString(a[9]), a[4], a[5], authType, in fromString() 1764 final int authType = in.readInt(); in readFromParcel() local 2109 public Builder setAuthType(@AuthType int authType) { in setAuthType() argument [all …]
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/ |
H A D | WifiApConfigStore.java | 532 int authType; in validateApWifiConfiguration() local 535 authType = apConfig.getSecurityType(); in validateApWifiConfiguration() 541 if (authType == SoftApConfiguration.SECURITY_TYPE_OPEN) { in validateApWifiConfiguration() 547 } else if (authType == SoftApConfiguration.SECURITY_TYPE_WPA2_PSK in validateApWifiConfiguration() 548 || authType == SoftApConfiguration.SECURITY_TYPE_WPA3_SAE_TRANSITION in validateApWifiConfiguration() 549 || authType == SoftApConfiguration.SECURITY_TYPE_WPA3_SAE) { in validateApWifiConfiguration() 565 if (authType != SoftApConfiguration.SECURITY_TYPE_WPA3_SAE in validateApWifiConfiguration()
|
/aosp12/frameworks/base/wifi/tests/src/android/net/wifi/ |
H A D | SoftApConfToXmlMigrationUtilTest.java | 73 int authType = config.getAuthType(); in createLegacyApConfFile() local 74 out.writeInt(authType); in createLegacyApConfFile() 75 if (authType != WifiConfiguration.KeyMgmt.NONE) { in createLegacyApConfFile()
|
/aosp12/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} in checkClientTrusted() argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} in checkServerTrusted() argument
|
/aosp12/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | PhoneSubInfoController.java | 422 public String getIccSimChallengeResponse(int subId, int appType, int authType, String data, 440 if (authType != UiccCardApplication.AUTH_CONTEXT_EAP_SIM 441 && authType != UiccCardApplication.AUTH_CONTEXT_EAP_AKA) { 442 loge("getIccSimChallengeResponse() unsupported authType: " + authType); 445 return uiccApp.getIccRecords().getIccSimChallengeResponse(authType, data);
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/ |
H A D | OsuServerConnection.java | 612 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 615 Log.v(TAG, "checkClientTrusted " + authType); in checkClientTrusted() 620 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 623 Log.v(TAG, "checkServerTrusted " + authType); in checkServerTrusted() 628 mDelegate.checkServerTrusted(chain, authType); in checkServerTrusted()
|
/aosp12/packages/apps/Messaging/src/com/android/messaging/sms/ |
H A D | ApnsXmlProcessor.java | 247 final String authType = apnValues.getAsString(Telephony.Carriers.AUTH_TYPE); in processApn() local 248 if (authType != null) { in processApn() 249 apnValues.put(Telephony.Carriers.AUTH_TYPE, parseInt(authType, -1, "apn authtype")); in processApn()
|
/aosp12/hardware/interfaces/radio/1.0/vts/functional/ |
H A D | radio_hidl_hal_data.cpp | 118 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P() 217 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P() 283 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P()
|
/aosp12/frameworks/base/wifi/java/src/android/net/wifi/ |
H A D | SoftApConfToXmlMigrationUtil.java | 139 int authType = in.readInt(); in loadFromLegacyFile() local 140 if (authType == WifiConfiguration.KeyMgmt.WPA2_PSK) { in loadFromLegacyFile()
|
/aosp12/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
H A D | KeyChainTestActivity.java | 308 @Override public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 311 @Override public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument
|
/aosp12/frameworks/base/core/java/android/net/ |
H A D | SSLCertificateSocketFactory.java | 109 public void checkClientTrusted(X509Certificate[] certs, String authType) { } 110 public void checkServerTrusted(X509Certificate[] certs, String authType) { }
|
/aosp12/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | IPhoneSubInfo.aidl | 219 String getIccSimChallengeResponse(int subId, int appType, int authType, String data, in getIccSimChallengeResponse() argument
|
/aosp12/packages/apps/Settings/src/com/android/settings/wifi/addappnetworks/ |
H A D | AddAppNetworksFragment.java | 333 final int authType = specifiedConfig.getAuthType(); in isSavedWifiConfiguration() local 339 || authType != privilegedWifiConfiguration.getAuthType()) { in isSavedWifiConfiguration() 345 switch (authType) { in isSavedWifiConfiguration()
|
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/statemachine/ |
H A D | EapSimAkaMethodStateMachine.java | 194 byte[] processUiccAuthentication(String tag, int authType, byte[] formattedChallenge) throws in processUiccAuthentication() argument 199 mEapUiccConfig.getAppType(), authType, base64Challenge); in processUiccAuthentication()
|
/aosp12/hardware/interfaces/radio/1.4/vts/functional/ |
H A D | radio_hidl_hal_api.cpp | 639 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P() 802 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P() 845 dataProfileInfo.authType = ApnAuthType::NO_PAP_NO_CHAP; in TEST_P()
|
/aosp12/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
H A D | UsimDataDownloadCommands.java.broken | 596 String password, String authType, String protocol, Message result) { 644 public void setInitialAttachApn(String apn, String protocol, int authType, String username,
|