Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 854bf943 authored by Automerger Merge Worker's avatar Automerger Merge Worker Committed by Android (Google) Code Review
Browse files

Merge "Merge "Use installed keystore alias to check if enterprise config is...

Merge "Merge "Use installed keystore alias to check if enterprise config is insure" into rvc-dev am: 0a327227 am: c7ae85f4" into rvc-d1-dev-plus-aosp
parents d0c84347 dd1d0544
Loading
Loading
Loading
Loading
+12 −3
Original line number Diff line number Diff line
@@ -1425,10 +1425,19 @@ public class WifiEnterpriseConfig implements Parcelable {
        if (mEapMethod != Eap.PEAP && mEapMethod != Eap.TLS && mEapMethod != Eap.TTLS) {
            return false;
        }
        if (!mIsAppInstalledCaCert && TextUtils.isEmpty(getCaPath())) {
        if (TextUtils.isEmpty(getAltSubjectMatch())
                && TextUtils.isEmpty(getDomainSuffixMatch())) {
            // Both subject and domain match are not set, it's insecure.
            return true;
        }
        return TextUtils.isEmpty(getAltSubjectMatch()) && TextUtils.isEmpty(
                getDomainSuffixMatch());
        if (mIsAppInstalledCaCert) {
            // CA certificate is installed by App, it's secure.
            return false;
        }
        if (getCaCertificateAliases() != null) {
            // CA certificate alias from keyStore is set, it's secure.
            return false;
        }
        return TextUtils.isEmpty(getCaPath());
    }
}
+7 −0
Original line number Diff line number Diff line
@@ -565,6 +565,13 @@ public class WifiEnterpriseConfigTest {
        secureConfig.setCaCertificate(FakeKeys.CA_CERT0);
        secureConfig.setDomainSuffixMatch(TEST_DOMAIN_SUFFIX_MATCH);
        assertFalse(secureConfig.isInsecure());

        WifiEnterpriseConfig secureConfigWithCaAlias = new WifiEnterpriseConfig();
        secureConfigWithCaAlias.setEapMethod(Eap.PEAP);
        secureConfigWithCaAlias.setPhase2Method(Phase2.MSCHAPV2);
        secureConfigWithCaAlias.setCaCertificateAliases(new String[]{"alias1", "alisa2"});
        secureConfigWithCaAlias.setDomainSuffixMatch(TEST_DOMAIN_SUFFIX_MATCH);
        assertFalse(secureConfigWithCaAlias.isInsecure());
    }

}