Uses of Interface
javax.security.auth.Destroyable
-
Packages that use Destroyable Package Description java.security Provides the classes and interfaces for the security framework.java.security.interfaces Provides interfaces for generating RSA (Rivest, Shamir and Adleman AsymmetricCipher algorithm) keys as defined in the RSA Laboratory Technical Note PKCS#1, and DSA (Digital Signature Algorithm) keys as defined in NIST's FIPS-186.javax.crypto Provides the classes and interfaces for cryptographic operations.javax.crypto.interfaces Provides interfaces for Diffie-Hellman keys as defined in RSA Laboratories' PKCS #3.javax.crypto.spec Provides classes and interfaces for key specifications and algorithm parameter specifications.javax.security.auth.kerberos This package contains utility classes related to the Kerberos network authentication protocol.javax.security.auth.x500 This package contains the classes that should be used to store X500 Principal and X500 Private Credentials in a Subject. -
-
Uses of Destroyable in java.security
Subinterfaces of Destroyable in java.security Modifier and Type Interface and Description interface
PrivateKey
A private key.Classes in java.security that implement Destroyable Modifier and Type Class and Description static class
KeyStore.PasswordProtection
A password-based implementation ofProtectionParameter
. -
Uses of Destroyable in java.security.interfaces
Subinterfaces of Destroyable in java.security.interfaces Modifier and Type Interface and Description interface
DSAPrivateKey
The standard interface to a DSA private key.interface
ECPrivateKey
The interface to an elliptic curve (EC) private key.interface
RSAMultiPrimePrivateCrtKey
The interface to an RSA multi-prime private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interface
RSAPrivateCrtKey
The interface to an RSA private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interface
RSAPrivateKey
The interface to an RSA private key. -
Uses of Destroyable in javax.crypto
Subinterfaces of Destroyable in javax.crypto Modifier and Type Interface and Description interface
SecretKey
A secret (symmetric) key. -
Uses of Destroyable in javax.crypto.interfaces
Subinterfaces of Destroyable in javax.crypto.interfaces Modifier and Type Interface and Description interface
DHPrivateKey
The interface to a Diffie-Hellman private key.interface
PBEKey
The interface to a PBE key. -
Uses of Destroyable in javax.crypto.spec
Classes in javax.crypto.spec that implement Destroyable Modifier and Type Class and Description class
SecretKeySpec
This class specifies a secret key in a provider-independent fashion. -
Uses of Destroyable in javax.security.auth.kerberos
Classes in javax.security.auth.kerberos that implement Destroyable Modifier and Type Class and Description class
KerberosKey
This class encapsulates a long term secret key for a Kerberos principal.class
KerberosTicket
This class encapsulates a Kerberos ticket and associated information as viewed from the client's point of view. -
Uses of Destroyable in javax.security.auth.x500
Classes in javax.security.auth.x500 that implement Destroyable Modifier and Type Class and Description class
X500PrivateCredential
This class represents anX500PrivateCredential
.
-
Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2022, Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.