• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 1998, 2018, Oracle and/or its affiliates. All rights reserved.
3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4  *
5  * This code is free software; you can redistribute it and/or modify it
6  * under the terms of the GNU General Public License version 2 only, as
7  * published by the Free Software Foundation.  Oracle designates this
8  * particular file as subject to the "Classpath" exception as provided
9  * by Oracle in the LICENSE file that accompanied this code.
10  *
11  * This code is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
14  * version 2 for more details (a copy is included in the LICENSE file that
15  * accompanied this code).
16  *
17  * You should have received a copy of the GNU General Public License version
18  * 2 along with this work; if not, write to the Free Software Foundation,
19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20  *
21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22  * or visit www.oracle.com if you need additional information or have any
23  * questions.
24  */
25 
26 /**
27  * Provides interfaces for generating RSA (Rivest, Shamir and
28  * Adleman AsymmetricCipher algorithm)
29  * keys as defined in the RSA Laboratory Technical Note
30  * PKCS#1, and DSA (Digital Signature
31  * Algorithm) keys as defined in NIST's FIPS-186.
32  * <P>
33  * Note that these interfaces are intended only for key
34  * implementations whose key material is accessible and
35  * available. These interfaces are not intended for key
36  * implementations whose key material resides in
37  * inaccessible, protected storage (such as in a
38  * hardware device).
39  * <P>
40  * For more developer information on how to use these
41  * interfaces, including information on how to design
42  * {@code Key} classes for hardware devices, please refer
43  * to these cryptographic provider developer guides:
44  * <ul>
45  *   <li>
46  *     {@extLink security_guide_impl_provider
47  *       How to Implement a Provider in the Java Cryptography Architecture}
48  *   </li>
49  * </ul>
50  *
51  * <h2>Package Specification</h2>
52  *
53  * <ul>
54  *   <li>PKCS #1: RSA Cryptography Specifications, Version 2.2 (RFC 8017)</li>
55  *   <li>Federal Information Processing Standards Publication (FIPS PUB) 186:
56  *     Digital Signature Standard (DSS) </li>
57  * </ul>
58  *
59  * <h2>Related Documentation</h2>
60  *
61  * For further documentation, please see:
62  * <ul>
63  *   <li> {extLink security_guide_jca
64  *       Java Cryptography Architecture Reference Guide}</li>
65  * </ul>
66  *
67  * @since 1.1
68  */
69 package java.security.interfaces;
70