Uses of Class java.security.Signature (Java Platform SE 6)
function windowTitle()
{
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="Uses of Class java.security.Signature (Java Platform SE 6)";
}
}
Overview
Package
Class
Use
Tree
Deprecated
Index
Help
Java™ PlatformStandard Ed. 6
PREV
NEXT
FRAMES
NO FRAMES
All Classes
Uses of Classjava.security.Signature
Packages that use Signature
java.security
Provides the classes and interfaces for the security framework.
Uses of Signature in java.security
Methods in java.security that return Signature
static Signature
Signature.getInstance(String algorithm)
Returns a Signature object that implements the specified signature
algorithm.
static Signature
Signature.getInstance(String algorithm,
Provider provider)
Returns a Signature object that implements the specified
signature algorithm.
static Signature
Signature.getInstance(String algorithm,
String provider)
Returns a Signature object that implements the specified signature
algorithm.
Methods in java.security with parameters of type Signature
boolean
SignedObject.verify(PublicKey verificationKey,
Signature verificationEngine)
Verifies that the signature in this SignedObject is the valid
signature for the object stored inside, with the given
verification key, using the designated verification engine.
Constructors in java.security with parameters of type Signature
SignedObject(Serializable object,
PrivateKey signingKey,
Signature signingEngine)
Constructs a SignedObject from any Serializable object.
Overview
Package
Class
Use
Tree
Deprecated
Index
Help
Java™ PlatformStandard Ed. 6
PREV
NEXT
FRAMES
NO FRAMES
All Classes
Submit a bug or featureFor further API reference and developer documentation, see Java SE Developer Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples. Copyright 2009 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.
Wyszukiwarka
Podobne podstrony:
XLO SignatureAVANCE SIGNATURE 3mkIIHECO SIGNATUREFile Type Signaturesjava security SignatureExceptionSignatureSpiBallet Body Signature Series Workout GuideImage Signature 1 5 1 infojava security SignatureB&W NAUTILUS 805 SIGNATUREIdentification of 32 bit x86 CPUs based on reset signatureControl Flow Graphs as Malware SignaturesSignatureSpiSignatureExceptionCatch Me, If You Can Evading Network Signatures with Web based Polymorphic Wormswięcej podobnych podstron