New API
Show API added in:
Contents
-
New PackagesPackageAdded inDescription3.0.5Extension package that contains the
APDUUtilclass which contains utility functions to parse CLA byte from a command APDU.3.0.5Extension package that contains functionality for implementing a 1:N biometric framework on the Java Card platform.3.1Extension package that defines a framework to handle different source of events.3.1Extension package that defines buffers, which are containers for data.3.1Extension package that defines classes to handle system time and time3.0.5Extension package that contains functionality, for implementing security countermeasures to protect security relevant applet assets on the Java Card platform.3.1Extension package that provides classes to handle certificates3.1Extension package that provides classes implementing cryptographic derivation functions3.1Extension package defining utility classes for security framework
-
New InterfacesInterfaceAdded inDescription3.0.5The
OwnerPINxinterface represents an Owner PIN, extends Personal Identification Number functionality as defined in thePINinterface, and provides the ability to update the PIN, update the try limit and try counter and thus owner functionality.3.0.5TheOwnerPINxWithPredecrementinterface represents an Owner PIN, extends Personal Identification Number functionality as defined in thePINinterface, and provides the ability to update the PIN, update the try limit and try counter and thus owner functionality.3.1A (transparent) specification of cryptographic parameters.3.0.5TheDHKeyinterface is the base interface for the DH algorithm's private and public key implementations.3.0.5TheDHPrivateKeyinterface is used to sign data using the DH algorithm.3.0.5TheDHPublicKeyinterface is used to verify signatures on signed data using the DH algorithm.3.1GenericSecretKeycontains sensitive data value.3.1ThePrimalityTestParamSpecinterface can be used for key pair generation (e.g RSA) for configuring the primality test algorithm.3.2TheSM2KeyAgreementParameterSpecinterface can be used for KeyAgreement operation as defined in the GM/T 0003.3-2012 (Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 3: Key Exchange Protocol).3.1SM4Keycontains a 128-bit key for SM4 computations.3.1TheXECKeyinterface is the base interface for all EC keys used for named curves with predefined parameters and encoding.3.1TheXECPrivateKeyinterface is the base interface for EC private keys for named curves with predefined parameters.3.1TheXECPublicKeyinterface is the base interface for EC public keys for named curves with predefined parameters.3.0.5TheBioMatcherinterface is the base interface for biometric matching.3.0.5TheBioTemplateDatainterface is the base interface for all biometric template data container.3.0.5TheOwnerBioMatcherinterface should be implemented by the applet which owns theBioMatcher.3.0.5TheOwnerBioTemplateDatainterface should be implemented by the applet which owns the Biometric Template Data containers.3.0.5TheSharedBioMatcherinterface provides the means for accessing unrestricted matching biometric functionality, e.g., the biometric matching functions.3.0.5TheSharedBioTemplateDatainterface provides the means for accessing unrestricted biometric template data.3.1A tagging interface that all event listener interfaces must extend.3.1A tagging interface that all event source must implement.previewTheBDHKeyAgreementinterface can be used forKeyAgreementinstances supporting Elliptic Curve Blinded Diffie-Hellman Key Exchange protocol as defined in EMV Contactless Specifications for Payment Systems - Book E Security and Key Management - Version 1.1 Feb 2025.3.1TheCertificateinterface is the base interface for all certificate types.3.1AKeyHandleris triggered by aCertificateParserand allows to fill the fields of aPublicKeypre-allocated by the application with the values of the public key of the certificate.3.1ParserHandleris the base interface for all handlers that can be triggered by the CertificateParser at the time a certificate is built or parsed.3.1TheX509Certificateinterface is the interface to represent X509 certificates as specified in RFC 5280.3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing the KDF Key Derivation Function defined in in the standard ANSI X9.63.3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing KDF in Counter Mode defined in NIST SP 800-108 (Recommendation for Key Derivation Using Pseudorandom Functions).3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing KDF in Double Pipeline Iteration Mode defined in NIST SP 800-108 (Recommendation for Key Derivation Using Pseudorandom Functions).3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing KDF in Feedback Mode defined in NIST SP 800-108 (Recommendation for Key Derivation Using Pseudorandom Functions).3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing the HKDF Key Derivation function defined in in IETF RFC 5869.3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing KDF Key Derivation Function defined in the standard ICAO MRTD Doc 9303.3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing the the KDF1 Key Derivation Function defined in the standard IEEE 1363-2000.3.2This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing the Key Derivation HKDF-Expand-Label3.1This interface specifies the set of parameters used to instantiate aDerivationFunctionimplementing TLS pseudo random function for TLS version 1.1 defined in IETF RFC 4346 or version 1.2 defined in IETF RFC 5246.
-
New ClassesClassAdded inDescription3.0.5The
OwnerPINBuilderclass is factory for OwnerPINobjects.3.1An instance ofResourcesprovides means to read the resources accessible to the caller code.3.0.5TheSensitiveArraysclass provides methods for creating and handling integrity-sensitive array objects.3.0.5TheOneShotclass is a specialization of theInitializedMessageDigestclass intended to support efficient one-shot hash operations that may avoid persistent memory writes entirely.3.0.5TheOneShotclass is a specialization of theMessageDigestclass intended to support efficient one-shot hash operations that may avoid persistent memory writes entirely.3.1This class is used to specify any algorithm parameters that are determined by a standard name.3.0.5TheOneShotclass is a specialization of theRandomDataclass intended to support efficient one-shot random data generation operations that may avoid persistent memory writes entirely.3.0.5TheOneShotclass is a specialization of theSignatureclass intended to support efficient one-shot signing and verification operations that may avoid persistent memory writes entirely.3.0.5TheAPDUUtilclass contains utility methods to parse CLA byte from a command APDU.3.0.5TheBio1toNBuilderclass is aBioMatcherobject factory.3.0.5The AEADCipher class is the abstract base class for Authenticated Encryption with Associated Data (AEAD) ciphers.3.0.5TheOneShotclass is a specialization of theCipherclass intended to support efficient one-shot ciphering and deciphering operations that may avoid persistent memory writes entirely.3.1An event registry instance is used by applications to register or unregister event listeners for a particular source of events.3.1A container for data of a specific primitive type.3.1A byte buffer.3.1A typesafe enumeration for byte orders.3.0.4This class provides methods for handling UTF-8 encoded character sequences (strings).3.1Class used to handle system time, suitable for timestamps or for estimating intervals between events.3.1A time-based amount of time.3.1TheCertificateParserclass is used to parse certificates and createCertificateinstances.3.1TheDerivationFunctionclass is the abstract class for derivation functions.3.1TheOneShotclass is a specialization of theDerivationFunctionclass intended to support efficient one-shot derivation function operations that may avoid persistent memory writes entirely.3.0.5TheSensitiveResultclass provides methods for asserting results of sensitive functions.3.1AMonotonicCounterrepresents a number that can only be increased, never decreased.
-
New Exception ClassesException ClassAdded inDescription3.0.5The
Bio1toNExceptionclass encapsulates specific exceptions which can be thrown by the methods of thejavacardx.biometry1toNpackage in case of error.3.1Unchecked exception thrown when a relative put operation reaches the target buffer's limit.3.1Unchecked exception thrown when a relative get operation reaches the source buffer's limit.3.1Unchecked exception thrown when a content-mutation method such asputorcompactis invoked upon a read-only buffer.3.0.4StringExceptionrepresents aStringUtilclass related exception.3.1Exception used to indicate a problem while calculating a date-time.3.1CertificateExceptionrepresents a certificate-related exception.
-
New Annotation TypesAnnotation TypeAdded inDescription3.0.4Defines a character string constant.3.0.4Defines a pool of character string constants.
-
New FieldsFieldAdded inDescription3.0.5JIS X 6319-4:2010 transport protocol Type F3.0.5Transport protocol Media - APDU over HCI defined for the APDU gate in ETSI TS 102 6223.0.4Constant to indicate boolean array type.3.0.4Constant to indicate byte array type.3.0.4Constant to indicate int array type.3.0.4Constant to indicate object array type.3.0.4Constant to indicate short array type.3.1Constant to configure an array view with the read attribute.3.1Constant to configure an array view with the write attribute.3.0.5This reason code is used to indicate a method has been invoked at an illegal or inappropriate time.3.0.5Diffie-Hellman (DH) secret value derivation primitive as per NIST Special Publication 800-56Ar2.previewElliptic Curve Blinded Diffie-Hellman Key Exchange (ECBDH-KE) using the secp256r1 curve defined in FIPS 186-4.3.0.5Elliptic curve Generic Mapping according to TR03110 v2.3.0.5Elliptic curve secret value derivation primitive, Diffie-Hellman version, as per [IEEE P1363].3.1SM2 Key Exchange protocol, using named curve key
NamedParameterSpec.SM2, as defined in GM/T 0003.3-2012 (Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 3: Key Exchange Protocol).3.2SM2 Key Exchange protocol with the optional confirmation values, using named curve keyNamedParameterSpec.SM2, as defined in GM/T 0003.3-2012 (Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 3: Key Exchange Protocol).3.1X25519 and X448 Diffie-Hellman key agreement protocol, using named curves keysNamedParameterSpec.X25519orNamedParameterSpec.X448, as defined in RFC 7748.3.0.4Algorithmic key typeALG_TYPE_AESchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_DESchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_DH_PARAMETERSchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_DH_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_DH_PUBLICchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_DSA_PARAMETERSchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_DSA_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_DSA_PUBLICchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_EC_F2M_PARAMETERSchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_EC_F2M_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_EC_F2M_PUBLICchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.5Algorithmic key typeALG_TYPE_EC_FP_PARAMETERSchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_EC_FP_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_EC_FP_PUBLICchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.1Algorithmic key typeALG_GENERIC_SECRETchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_HMACchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_KOREAN_SEEDchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_RSA_CRT_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_RSA_PRIVATEchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.0.4Algorithmic key typeALG_TYPE_RSA_PUBLICchoice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.1Algorithmic key typeALG_SM4choice for thealgorithmicKeyTypeparameter of thebuildKey(byte, byte, short, boolean)method.3.1AES Key LengthLENGTH_AES_512= 512.3.0.5DH Key LengthLENGTH_DH_1024= 1024.3.0.5DH Key LengthLENGTH_DH_2048= 2048.3.0.4EC Key LengthLENGTH_EC_FP_521= 521.3.0.5RSA Key LengthLENGTH_RSA_3072= 3072.3.1SM4 Key LengthLENGTH_SM4= 128.3.1Keyobject used to provide domain parameter inKeyBuilder.buildKeyWithSharedDomain(byte, byte, Key, boolean).3.0.5Key object which implements the interface typeDHPrivateKeyfor DH operations.3.0.5Key object which implements the interface typeDHPrivateKeyfor DH operations, .3.0.5Key object which implements the interface typeDHPrivateKeyfor DH operations.3.0.5Key object which implements the interface typeDHPublicKeyfor DH operations.3.0.5Key object which implements the interface typeDHPublicKeyfor DH operations, .3.0.5Key object which implements the interface typeDHPublicKeyfor DH operations.3.1Keyobject used to provide domain parameter inKeyBuilder.buildKeyWithSharedDomain(byte, byte, Key, boolean).3.1Keyobject used to provide domain parameter inKeyBuilder.buildKeyWithSharedDomain(byte, byte, Key, boolean).3.1Keyobject used to provide domain parameter inKeyBuilder.buildKeyWithSharedDomain(byte, byte, Key, boolean).3.1Keyobject which implements interface typeGenericSecretKey.3.1Keyobject which implements interface typeSM4Key.3.1ExtendedKeyobject which implements the interface typeXECKey.3.0.5KeyPairobject containing an DH key pair for modular exponentiation based Diffie HellmanKeyAgreementoperations.3.0.4This constant indicates that there is no discrete message digest algorithm.3.0.5Message Digest algorithm SHA3-224.3.0.5Message Digest algorithm SHA3-256.3.0.5Message Digest algorithm SHA3-384.3.0.5Message Digest algorithm SHA3-512.3.1Message Digest algorithm SM3.3.0.4Length of digest in bytes for SHA-2243.0.5Length of digest in bytes for SHA3-2243.0.5Length of digest in bytes for SHA3-2563.0.5Length of digest in bytes for SHA3-3843.0.5Length of digest in bytes for SHA3-5123.1Length of digest in bytes for SM33.0.5Utility random number generation algorithm.3.0.5This algorithm creates random numbers suitable to be used for key and nonce generation.3.0.5Deterministic Random Bit Generator (DRBG) algorithm.3.0.5True Random Number Generation (TRNG) algorithm.3.0.5Signature algorithmALG_AES_CMAC_128generates a 16-byte Cipher-based MAC (CMAC) using AES with blocksize 128 in CBC mode with ISO9797_M2 padding scheme.3.0.4Signature algorithmALG_DES_MAC4_ISO9797_1_M1_ALG3generates a 4-byte MAC using triple DES with a 2-key DES3 key according to ISO9797-1 MAC algorithm 3 with method 1, where input data is padded using method 1 and the data is processed as described in MAC Algorithm 3 of the ISO 9797-1 specification.3.0.4Signature algorithmALG_DES_MAC8_ISO9797_1_M1_ALG3generates an 8-byte MAC using triple DES with a 2-key DES3 key according to ISO9797-1 MAC algorithm 3 with method 1, where input data is padded using method 1 and the data is processed as described in MAC Algorithm 3 of the ISO 9797-1 specification.3.0.5Cipher algorithmSIG_CIPHER_AES_CMAC128choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_AES_MAC128choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_DES_MAC4choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_DES_MAC8choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_DSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_ECDSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.5Cipher algorithmSIG_CIPHER_ECDSA_PLAINchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.previewCipher algorithmSIG_CIPHER_ECSDSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.previewCipher algorithmSIG_CIPHER_ECSDSA_OPTIMIZEDchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.1Cipher algorithmSIG_CIPHER_EDDSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.2Cipher algorithmSIG_CIPHER_EDDSA_ED25519choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.2Cipher algorithmSIG_CIPHER_EDDSA_ED448choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.1Cipher algorithmSIG_CIPHER_EDDSAPHchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.2Cipher algorithmSIG_CIPHER_EDDSAPH_ED25519choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.2Cipher algorithmSIG_CIPHER_EDDSAPH_ED448choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_HMACchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_KOREAN_SEED_MACchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.4Cipher algorithmSIG_CIPHER_RSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.1Cipher algorithmSIG_CIPHER_SM2choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.1Cipher algorithmSIG_CIPHER_SM4_MAC128choice for thecipherAlgorithmparameter of thegetInstance(byte, byte, byte, boolean)method.3.0.5Cipher algorithmALG_AES_CCMprovides a cipher using AES in Counter with CBC-MAC mode as specified in RFC 3610.3.0.5Cipher algorithmALG_AES_GCMprovides a cipher using AES in Galois/Counter Mode as specified in NIST SP 800-38D, November 2007.3.0.5Cipher algorithm CIPHER_AES_CCM choice for the cipherAlgorithm parameter of theCipher.getInstance(byte, byte, boolean)method; the paddingAlgorithm must be set toPAD_NULL.3.0.5Cipher algorithm CIPHER_AES_GCM choice for the cipherAlgorithm parameter of theCipher.getInstance(byte, byte, boolean)method; the paddingAlgorithm must be set toPAD_NULL.3.1Cipher AlgorithmALG_AES_CFBprovides a cipher using AES in Cipher Feedback (CFB) mode.3.0.5Cipher algorithmALG_AES_CTRprovides a cipher using AES in counter (CTR) mode.3.1Cipher AlgorithmALG_AES_XTSprovides a cipher using AES in XEX Tweakable Block Cipher with Ciphertext Stealing (XTS) mode as defined in IEEE Std 1619.3.0.4Cipher algorithmCIPHER_AES_CBCchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.1TheCIPHER_AES_CFBconstant represents a cipher using AES in Cipher Feedback (CFB) mode.3.1TheCIPHER_AES_CTRconstant represents a cipher using AES in counter (CTR) mode.3.0.4Cipher algorithmCIPHER_AES_ECBchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.1TheCIPHER_AES_XTSconstant represents a cipher using AES in XEX Tweakable Block Cipher with Ciphertext Stealing (XTS) mode as defined in IEEE Std 1619.3.0.4Cipher algorithmCIPHER_DES_CBCchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.0.4Cipher algorithmCIPHER_DES_ECBchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.0.4Cipher algorithmCIPHER_KOREAN_SEED_CBCchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.0.4Cipher algorithmCIPHER_KOREAN_SEED_ECBchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.0.4Cipher algorithmCIPHER_RSAchoice for thecipherAlgorithmparameter of thegetInstance(byte, byte, boolean)method.3.1TheCIPHER_SM2constant represents a cipher using SM2 encryption as defined in GM/T 0003.4-2012 (Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 4: Public Key Encryption Algorithm).3.1TheCIPHER_SM4_CBCconstant represents a cipher using SM4 block cipher algorithm in CBC mode with 128-bit input blocks.3.1TheCIPHER_SM4_ECBconstant represents a cipher using SM4 block cipher algorithm in CBC mode with 128-bit input blocks.3.0.4Padding algorithmPAD_ISO9796choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a Signature object instance.3.0.4Padding algorithmPAD_ISO9796_MRchoice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.2Padding algorithmPAD_ISO9796_MR_SCHEME_1_OPT_2choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.1Padding algorithmPAD_ISO9796_MR_SCHEME_2choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.2Padding algorithmPAD_ISO9796_MR_SCHEME_2_OPT_2choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.1Padding algorithmPAD_ISO9796_MR_SCHEME_3choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.2Padding algorithmPAD_ISO9796_MR_SCHEME_3_OPT_2choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method to create a SignatureMessageRecovery object instance.3.0.4Padding algorithmPAD_ISO9797_1_M1_ALG3choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_ISO9797_1_M2_ALG3choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_ISO9797_M1choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method and theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_ISO9797_M2choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method and theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_NOPADchoice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method and theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4This constant indicates that there is no discrete padding algorithm.3.0.4Padding algorithmPAD_PKCS1choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method and theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_PKCS1_OAEPchoice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.2Padding algorithmPAD_PKCS1_OAEP_EXT_PARAMETERSchoice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA224choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA256choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA3_224choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA3_256choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA3_384choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA3_512choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA384choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.5Padding algorithmPAD_PKCS1_OAEP_SHA512choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method.3.0.4Padding algorithmPAD_PKCS1_PSSchoice for the paddingAlgorithm parameter theSignature.getInstance(byte, byte, byte, boolean)method.3.2Padding algorithmPAD_PKCS1_PSS_EXT_PARAMETERSchoice for the paddingAlgorithm parameter theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_PKCS5choice for the paddingAlgorithm parameter of thegetInstance(byte, byte, boolean)method and theSignature.getInstance(byte, byte, byte, boolean)method.3.0.4Padding algorithmPAD_RFC2409choice for the paddingAlgorithm parameter of theSignature.getInstance(byte, byte, byte, boolean)method.3.2Algorithm implementing the HKDF-Expand-Label Key Derivation defined in TLS 1.3 - IETF RFC 8446.
-
New MethodsMethodAdded inDescription3.2Returns the logical channel encoding type used by the JCRE to interpret the CLA byte of the current APDU.3.0.4This method is used by the applet's
process()method or theselect()method or applet'sdeselect()method to determine if it itself is being re-selected on this logical channel.3.1Get the attributes of the specified array view.3.2Obtains the amount of memory of the specified type that is available to the applet.3.0.4Obtains the amount of memory of the specified type that is available to the applet.3.1Check whether the specified object is an array view3.1Creates an array which is a view on the specifiedarrayparameter.3.1Creates a boolean array which is a view on the specifiedarrayparameter.3.1Creates a byte array which is a view on the specifiedarrayparameter.3.0.4Creates a globalCLEAR_ON_RESETtransient array of the type specified, with the specified array length.3.1Creates a short array which is a view on the specifiedarrayparameter.3.0.5Fills the byte array beginning at the specified position, for the specified length with the specified byte value.3.0.5Copies the domain parameters from the specifiedECKeyinstance into the domain parameters ofthisobject instance.3.2Initializes the object with the given private key and algorithm specific parameters.3.0.4Creates uninitialized cryptographic keys for signature and cipher algorithms.3.0.5Creates cryptographic keys for signature and key agreement algorithms.3.1Creates uninitialized cryptographic keys for named curves with predefined elliptic curve domain parameters.3.1Get the memory type of the specified key.3.1(Re)Initializes the key objects encapsulated in thisKeyPairinstance with new key values.3.2Generates a hash of all/last input data.3.2This method is used to determine if instances of MessageDigest or InitializedMessageDigest classes support intermediate hash calculation for a given algorithm.3.2Always throws aCryptoException.This method is not supported byOneShot.3.0.5Gets the random number generation algorithm.3.2Creates aRandomDatainstance of the selected algorithm.3.0.5Generates random data.3.0.5Gets the cipher algorithm.3.0.4Creates aSignatureobject instance with the selected message digest algorithm, cipher algorithm and padding algorithm.3.0.5Gets the message digest algorithm.3.0.5Gets the padding algorithm.3.0.4This method initializes the starting hash value in place of the default value used by theSignatureclass.3.0.4Generates the signature of the precomputed hash data.3.0.5Verifies the signature of precomputed hash data.3.0.5Returns the logical channel number encoded in theCLAbyteparameter which represents a CLA byte from a command APDU encoded according to APDU.3.0.5Based on encoding of theCLAByteparameter which represents a CLA byte from a command APDU, returns whether anAPDUcommand is the first or part of a command chain.3.0.5Returns whether theCLAByteparameter which represents a CLA bye from a command APDU, corresponds to an interindustry command as defined in ISO 7816-4:2013 specification.3.0.5Returnstrueif encoding of theCLAbyteparameter, which represents a CLA byte from a command APDU, indicates secure messaging.3.0.5Returns whether the currentCLAByteparameter represents a valid CLA byte.3.2Clears the template and set its initialized state to false i.e.3.2Clears the template and set its initialized state to false i.e.3.0.5Generates encrypted/decrypted output from all/last input data.3.0.5Initializes theAEADCipherobject with the appropriateKey.3.0.5Initializes theAEADCipherobject with the appropriate Key and algorithm specific parameters.3.0.5Initializes thisAEADCipherinstance to encrypt or decrypt with the given key, nonce, AAD size and message size.3.0.5RetrievestagLenbytes from the calculated authentication tag.3.0.5Continues a multiple-part encryption or decryption operation, processing additional input data.3.0.5Continues a multi-part update of the Additional Associated Data (AAD) that will be verified by the authentication tag.3.0.5Verifies the authentication tag using the number of bytes set inrequiredTagLenbytes.3.0.5Gets the raw cipher algorithm.3.0.4Creates aCipherobject instance with the selected of the selected raw cipher algorithm and padding algorithm.3.0.5Gets the padding algorithm.3.0.5Compares two Objects for equality.3.0.5Fills the array of primitive components beginning at the specified position, for the specified length with the specified value.3.1Creates an int array which is a view on the specifiedarrayparameter.