Loading core/java/android/net/PSKKeyManager.java +2 −5 Original line number Diff line number Diff line Loading @@ -86,14 +86,11 @@ import javax.net.ssl.SSLEngine; * SSLContext sslContext = SSLContext.getInstance("TLS"); * sslContext.init( * new KeyManager[] {myPskKeyManager}, * new TrustManager[0], // No TrustManagers needed in TLS-PSK * new TrustManager[0], // No TrustManagers needed for TLS-PSK * null // Use the default source of entropy * ); * * SSLSocket sslSocket = (SSLSocket) sslContext.getSocketFactory().createSocket(...); * // Enable a TLS-PSK cipher suite (no TLS-PSK cipher suites are enabled by default) * sslSocket.setEnabledCipherSuites(new String[] {"TLS_PSK_WITH_AES_128_CBC_SHA"}); * sslSocket.startHandshake(); * }</pre> */ public interface PSKKeyManager extends com.android.org.conscrypt.PSKKeyManager { Loading Loading
core/java/android/net/PSKKeyManager.java +2 −5 Original line number Diff line number Diff line Loading @@ -86,14 +86,11 @@ import javax.net.ssl.SSLEngine; * SSLContext sslContext = SSLContext.getInstance("TLS"); * sslContext.init( * new KeyManager[] {myPskKeyManager}, * new TrustManager[0], // No TrustManagers needed in TLS-PSK * new TrustManager[0], // No TrustManagers needed for TLS-PSK * null // Use the default source of entropy * ); * * SSLSocket sslSocket = (SSLSocket) sslContext.getSocketFactory().createSocket(...); * // Enable a TLS-PSK cipher suite (no TLS-PSK cipher suites are enabled by default) * sslSocket.setEnabledCipherSuites(new String[] {"TLS_PSK_WITH_AES_128_CBC_SHA"}); * sslSocket.startHandshake(); * }</pre> */ public interface PSKKeyManager extends com.android.org.conscrypt.PSKKeyManager { Loading