"Java Security Technology Exploration Path series: Java Extensible security Architecture" III: JCA (ii): JCA classes and interfaces

Source: Internet
Author: User
Tags list of attributes

Guo Jia
Email: [Email protected]
Blog: http://blog.csdn.net/allenwells
Github:https://github.com/allenwell

A JCA provider Class 1.1 Java.security.Provider

The provider class provides implementation of Java security and inherits the properties class to ensure that the program has sufficient permissions to perform related operations. Provides an internal class servicethat encapsulates the properties of a service. The service class provides the following methods:

    • Public synchronized Provider.service getService (string type, string algorithm) gets this algorithm or alias specifies the type of service that this provider implements.
    • Public synchronized Set
1.1.1 Output self-information
    • Public String getName ()
      Returns the name of the provider
    • Public double getversion ()
      Returns the version number of the provider
    • Public String GetInfo ()
      Returns the information string for the provider
    • Public String toString ()
      The ToString () method of the object class is overridden to return a string containing the name and version number of this provider.
1.1.2 Thread Safety

Public synchronized void load (InputStream instream) reads the list of attributes from the input stream

1.2 java.security.Security

The security class is primarily used to manage a lock-in provider class in a Java program, and the security class is an end-state class, except for its private construction methods, and the rest are static methods.

1.3 Java.security.DigestOutputStream

The message digest output stream, inherited from the Filteroutputstream, can be written to the input stream to complete the digest update.

1.4 Java.security.Key

The key interface is the underlying interface of the key interface.

1.5 Java.security.SecretKey

Symmetric key top-level interface.

1.6 Java.security.PublicKey

The top-level interface for an asymmetric key.

1.7 Java.security.PrivateKey

The top-level interface for an asymmetric key.

Two JCA engine class 2.1 Java.security.MessageDigest

The MessageDigest (Message digest Class) defines the function that uses the message digest algorithm.

2.2 Java.security.Signature

The Signature (signature Class) defines the ability to use a digital signature algorithm.

2.3 Java.security.KeyPairGeneator

The Keypairgeneator (key pair Generator Class) defines the ability to generate a public private key pair for the specified algorithm.

2.4 java.security.KeyFactory

The Keyfactory (Key factory Class) defines the ability to convert between opaque encryption keys and key specifications.

2.5 java.security.cert.CertificateFactory

The Certificatefactory (Certificate factory Class) defines the ability to generate certificates, certification paths, and certificate revocation list objects.

2.6 Java.security.KeyStore

The KeyStore (KeyStore Class) defines the ability to create and manage Keystores.

2.7 Java.security.AlgorithmParameters

The Algorithmparameters class is an engine class that provides an opaque representation of the password parameters.

2.8 Java.security.AlgorithmParameterGenerator

The Algorithmparametergenerator class is used to generate a collection of parameters that will be used in a particular algorithm.

2.9 Java.security.SecureRandom

The SecureRandom (safe random number Class) defines the ability to generate strongly encrypted random numbers or pseudo-random numbers.

"Java Security Technology Exploration Path series: Java Extensible security Architecture" III: JCA (ii): JCA classes and interfaces

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.