|
Oracle Security Developer Tools Crypto Java API Reference 10g (10.1.4.0.1) B28171-01 |
|||||||||
| PREV CLASS NEXT CLASS | FRAMES NO FRAMES | |||||||||
| SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD | |||||||||
An interface for a key, which may be used for encryption or decryption, for generating or verifying signatures, or for generating or verifying MACs.
A key may be a private key, a public key, or a symmetric key.
The code using this API is responsible for erasing any keys it has to when it is done with them to prevent leakage of sensitive key material.
PrivateKey, PublicKey, SymmetricKey| Method Summary | |
java.lang.Object |
clone()Performs a deep clone of the Key instance. |
void |
erase()Erases the key material, making the key un-usable. |
java.lang.String |
getAlgorithm()Returns the algorithm for which this key is primarily used. |
int |
getBitLength()Returns the number of bits required to represent this key's defining key material |
byte[] |
getEncoded()Returns the encoded form of this key. |
java.lang.String |
getFormat()Returns the format of this key's encoded form. |
| Method Detail |
public java.lang.String getAlgorithm()
public java.lang.String getFormat()
public byte[] getEncoded()
public int getBitLength()
i.e. In the case of an RSA key, the modulus' bit length would be returned .
public void erase()
Keys can be erased multiple times with no consequence.
public java.lang.Object clone()
|
Oracle Security Developer Tools Crypto Java API Reference 10g (10.1.4.0.1) B28171-01 |
|||||||||
| PREV CLASS NEXT CLASS | FRAMES NO FRAMES | |||||||||
| SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD | |||||||||