/openjdk7/jdk/test/sun/security/ssl/sanity/interop/ |
H A D | CipherTest.java | 57 static KeyStore trustStore, keyStore; 386 private static KeyStore readKeyStore(String name) throws Exception { 389 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/test/sun/security/pkcs11/sslecc/ |
H A D | CipherTest.java | 56 static KeyStore trustStore, keyStore; 387 private static KeyStore readKeyStore(String name) throws Exception { 390 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/src/share/classes/java/security/cert/ |
H A D | PKIXParameters.java | 29 import java.security.KeyStore; 55 * {@link #PKIXParameters(KeyStore) PKIXParameters(KeyStore)}, specifying a 56 * <code>KeyStore</code> instance containing trusted certificate entries, each 130 * certificate entries contained in the specified <code>KeyStore</code>. 134 * @param keystore a <code>KeyStore</code> from which the set of 141 public PKIXParameters(KeyStore keystore)
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/ |
H A D | TrustTrustedCert.java | 219 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/ |
H A D | SessionCacheSizeTests.java | 291 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | SessionTimeOutTests.java | 316 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/test/java/security/KeyStore/ |
H A D | KeyStoreBuilder.java | 27 * @summary verify that the KeyStore.Builder API works 35 import java.security.KeyStore.*; 51 KeyStore ks; 58 System.out.println("-KeyStore: " + ks.size()); 65 System.out.println("-KeyStore: " + ks.size()); 72 System.out.println("-KeyStore: " + k); 82 System.out.println("-KeyStore: " + ks.size()); 107 System.out.println("-KeyStore: " + k); 223 put("KeyStore.My", "KeyStoreBuilder$MyKeyStoreSpi");
|
/openjdk7/jdk/src/share/classes/com/sun/security/auth/module/ |
H A D | KeyStoreLoginModule.java | 38 import java.security.KeyStore; 90 * URL is passed to the <code>KeyStore.load</code> method. 92 * passed to the <code>KeyStore.load</code> method. 93 * "NONE" should be specified if the KeyStore resides 98 * calling <code>KeyStore.getDefaultType()</code>. 123 * <dd> This value should be set to "true" if the KeyStore 167 private KeyStore keyStore; 233 keyStoreType = KeyStore.getDefaultType(); 316 // log into KeyStore to retrieve data, 339 /** Get the alias and passwords to use for looking up in the KeyStore [all...] |
/openjdk7/jdk/src/share/classes/sun/security/tools/ |
H A D | KeyTool.java | 30 import java.security.KeyStore; 87 import static java.security.KeyStore.*; 98 * @see java.security.KeyStore 145 private KeyStore keyStore = null; 154 private KeyStore caks = null; // "cacerts" keystore 569 storetype = KeyStore.getDefaultType(); 574 srcstoretype = KeyStore.getDefaultType(); 763 keyStore = KeyStore.getInstance(storetype); 765 keyStore = KeyStore.getInstance(storetype, providerName); 997 importAlias, KeyStore [all...] |
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ |
H A D | PKIXExtendedTM.java | 40 import java.security.KeyStore; 726 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | SunX509ExtendedTM.java | 40 import java.security.KeyStore; 727 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ |
H A D | DNSIdentities.java | 40 import java.security.KeyStore; 854 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | IPAddressDNSIdentities.java | 40 import java.security.KeyStore; 863 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | IPAddressIPIdentities.java | 40 import java.security.KeyStore; 855 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | IPIdentities.java | 40 import java.security.KeyStore; 854 KeyStore ks = KeyStore.getInstance("JKS");
|
H A D | Identities.java | 40 import java.security.KeyStore; 854 KeyStore ks = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/test/sun/security/ssl/sun/net/www/httpstest/ |
H A D | HttpServer.java | 121 KeyStore ks = KeyStore.getInstance("JKS"); 122 KeyStore ts = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/make/sun/security/mscapi/ |
H A D | Makefile | 128 sun/security/mscapi/KeyStore.java \
|
/openjdk7/jdk/test/sun/security/mscapi/ |
H A D | SignUsingNONEwithRSA.java | 117 KeyStore ks = KeyStore.getInstance("Windows-MY", "SunMSCAPI");
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | SSLContextImpl.java | 83 tmf.init((KeyStore)null); 528 KeyStore ks = 552 KeyStore.getDefaultType())); 597 KeyStore ks = null; 603 ks = KeyStore.getInstance(defaultKeyStoreType); 605 ks = KeyStore.getInstance(defaultKeyStoreType,
|
H A D | X509KeyManagerImpl.java | 35 import java.security.KeyStore.*; 46 * . it is based around the KeyStore.Builder API. This allows it to use 47 * other forms of KeyStore protection or password input (e.g. a 48 * CallbackHandler) or to have keys within one KeyStore protected by 242 KeyStore ks = builder.getKeyStore(); 586 * We exclude entries in the KeyStore if they are not: 614 KeyStore ks = builder.getKeyStore();
|
H A D | SunX509KeyManagerImpl.java | 39 * An implemention of X509KeyManager backed by a KeyStore. 41 * The backing KeyStore is inspected when this object is constructed. 44 * that subsequent modifications of the KeyStore have no effect on the 75 * The credentials from the KeyStore as 116 SunX509KeyManagerImpl(KeyStore ks, char[] password) throws KeyStoreException,
|
/openjdk7/jdk/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ |
H A D | CheckStatus.java | 653 KeyStore ks = KeyStore.getInstance("JKS"); 654 KeyStore ts = KeyStore.getInstance("JKS");
|
H A D | ConnectionTest.java | 86 KeyStore ks = KeyStore.getInstance("JKS"); 87 KeyStore ts = KeyStore.getInstance("JKS");
|
/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | PolicyFile.java | 632 KeyStore keyStore = null; 767 private CodeSource getCodeSource(PolicyParser.GrantEntry ge, KeyStore keyStore, 798 KeyStore keyStore, PolicyInfo newInfo) { 1057 (KeyStore keyStore, String aliases, PolicyInfo newInfo) { 1891 List<PolicyParser.PrincipalEntry> principals, KeyStore keystore) { 1927 KeyStore keystore) throws Exception { 2000 private String getDN(String alias, KeyStore keystore) {
|