Uses of Interface
javax.security.auth.Destroyable
Packages that use Destroyable
Package
Description
Provides the classes and interfaces for the security framework.
Provides interfaces for generating RSA (Rivest, Shamir and
Adleman AsymmetricCipher algorithm)
keys as defined in the RSA Laboratory Technical Note
PKCS#1, and DSA (Digital Signature
Algorithm) keys as defined in NIST's FIPS-186.
Provides the classes and interfaces for cryptographic
operations.
Provides interfaces for Diffie-Hellman keys as defined in RSA
Laboratories' PKCS #3.
Provides classes and interfaces for key specifications and
algorithm parameter specifications.
This package contains utility classes related to the Kerberos network
authentication protocol.
This package contains the classes that should be used to store
X500 Principal and X500 Private Credentials in a
Subject.
-
Uses of Destroyable in java.security
Subinterfaces of Destroyable in java.securityClasses in java.security that implement DestroyableModifier and TypeClassDescriptionstatic classA password-based implementation ofProtectionParameter. -
Uses of Destroyable in java.security.interfaces
Subinterfaces of Destroyable in java.security.interfacesModifier and TypeInterfaceDescriptioninterfaceThe standard interface to a DSA private key.interfaceThe interface to an elliptic curve (EC) private key.interfaceAn interface for an elliptic curve private key as defined by RFC 8032: Edwards-Curve Digital Signature Algorithm (EdDSA).interfaceThe interface to an RSA multi-prime private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceThe interface to an RSA private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceThe interface to an RSA private key.interfaceAn interface for an elliptic curve private key as defined by RFC 7748. -
Uses of Destroyable in javax.crypto
Subinterfaces of Destroyable in javax.crypto -
Uses of Destroyable in javax.crypto.interfaces
Subinterfaces of Destroyable in javax.crypto.interfacesModifier and TypeInterfaceDescriptioninterfaceThe interface to a Diffie-Hellman private key.interfaceThe interface to a PBE key. -
Uses of Destroyable in javax.crypto.spec
Classes in javax.crypto.spec that implement DestroyableModifier and TypeClassDescriptionclassThis class specifies a secret key in a provider-independent fashion. -
Uses of Destroyable in javax.security.auth.kerberos
Classes in javax.security.auth.kerberos that implement DestroyableModifier and TypeClassDescriptionfinal classThis class encapsulates an EncryptionKey used in Kerberos.final classThis class encapsulates a Kerberos 5 KRB_CRED message which can be used to send Kerberos credentials from one principal to another.classThis class encapsulates a long term secret key for a Kerberos principal.classThis class encapsulates a Kerberos ticket and associated information as viewed from the client's point of view. -
Uses of Destroyable in javax.security.auth.x500
Classes in javax.security.auth.x500 that implement DestroyableModifier and TypeClassDescriptionfinal classThis class represents anX500PrivateCredential.