Path: blob/master/src/java.base/share/classes/javax/crypto/package-info.java
41152 views
/*1* Copyright (c) 1999, 2017, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation. Oracle designates this7* particular file as subject to the "Classpath" exception as provided8* by Oracle in the LICENSE file that accompanied this code.9*10* This code is distributed in the hope that it will be useful, but WITHOUT11* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or12* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License13* version 2 for more details (a copy is included in the LICENSE file that14* accompanied this code).15*16* You should have received a copy of the GNU General Public License version17* 2 along with this work; if not, write to the Free Software Foundation,18* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.19*20* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA21* or visit www.oracle.com if you need additional information or have any22* questions.23*/2425/**26* Provides the classes and interfaces for cryptographic27* operations. The cryptographic operations defined in this package28* include encryption, key generation and key agreement, and Message29* Authentication Code (MAC) generation.30*31* <p>Support for encryption includes symmetric, asymmetric, block,32* and stream ciphers. This package also supports secure streams and33* sealed objects.34*35* <p>Many of the classes provided in this package are provider-based.36* The class itself defines a programming interface to which37* applications may write. The implementations themselves may then be38* written by independent third-party vendors and plugged in39* seamlessly as needed. Therefore application developers may take40* advantage of any number of provider-based implementations without41* having to add or rewrite code.42*43* <ul>44* <li><a href="{@docRoot}/../specs/security/standard-names.html">45* <b>Java Security Standard Algorithm Names Specification46* </b></a></li>47* </ul>48*49* <h2>Related Documentation</h2>50*51* For further documentation, please see:52* <ul>53* <li>54* {@extLink security_guide_jca55* Java Cryptography Architecture (JCA) Reference Guide}</li>56* <li>57* {@extLink security_guide_impl_provider58* How to Implement a Provider in the Java Cryptography Architecture}</li>59* </ul>60*61* @since 1.462*/63package javax.crypto;646566