1 <!-- |
|
2 Copyright (c) 1999, 2015, Oracle and/or its affiliates. All rights reserved. |
|
3 DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 |
|
5 This code is free software; you can redistribute it and/or modify it |
|
6 under the terms of the GNU General Public License version 2 only, as |
|
7 published by the Free Software Foundation. Oracle designates this |
|
8 particular file as subject to the "Classpath" exception as provided |
|
9 by Oracle in the LICENSE file that accompanied this code. |
|
10 |
|
11 This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 version 2 for more details (a copy is included in the LICENSE file that |
|
15 accompanied this code). |
|
16 |
|
17 You should have received a copy of the GNU General Public License version |
|
18 2 along with this work; if not, write to the Free Software Foundation, |
|
19 Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 |
|
21 Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
22 or visit www.oracle.com if you need additional information or have any |
|
23 questions. |
|
24 --> |
|
25 |
|
26 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> |
|
27 <html> |
|
28 |
|
29 <body bgcolor="white"> |
|
30 |
|
31 Provides the classes and interfaces for cryptographic operations. The |
|
32 cryptographic operations defined in this package include encryption, |
|
33 key generation and key agreement, and Message Authentication Code |
|
34 (MAC) generation. |
|
35 |
|
36 <p>Support for encryption includes symmetric, asymmetric, block, and |
|
37 stream ciphers. This package also supports secure streams and sealed |
|
38 objects. |
|
39 |
|
40 <p>Many of the classes provided in this package are provider-based. The |
|
41 class itself defines a programming interface to which applications may |
|
42 write. The implementations themselves may then be written by |
|
43 independent third-party vendors and plugged in seamlessly as needed. |
|
44 Therefore application developers may take advantage of any number of |
|
45 provider-based implementations without having to add or rewrite code. |
|
46 |
|
47 <h2>Package Specification</h2> |
|
48 |
|
49 <ul> |
|
50 <li><a href="{@docRoot}/../technotes/guides/security/StandardNames.html"> |
|
51 <b>Java™ |
|
52 Cryptography Architecture Standard Algorithm Name |
|
53 Documentation</b></a></li> |
|
54 </ul> |
|
55 |
|
56 <h2>Related Documentation</h2> |
|
57 |
|
58 For further documentation, please see: |
|
59 <ul> |
|
60 <li> |
|
61 <a href= |
|
62 "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html"> |
|
63 <b>Java™ |
|
64 Cryptography Architecture (JCA) Reference Guide |
|
65 </b></a></li> |
|
66 <li> |
|
67 <a href= |
|
68 "{@docRoot}/../technotes/guides/security/crypto/HowToImplAProvider.html"> |
|
69 <b>How to Implement a Provider in the |
|
70 Java™ Cryptography Architecture |
|
71 </b></a></li> |
|
72 </ul> |
|
73 |
|
74 @since 1.4 |
|
75 </body> |
|
76 </html> |
|