Uses of Interface
javax.security.auth.Destroyable
Packages that use Destroyable
Package
Description
Provides the classes and interfaces for the security framework.
Provides interfaces for generating RSA (Rivest, Shamir and
 Adleman AsymmetricCipher algorithm)
 keys as defined in the RSA Laboratory Technical Note
 PKCS#1, and DSA (Digital Signature
 Algorithm) keys as defined in NIST's FIPS-186.
Provides the classes and interfaces for cryptographic
 operations.
Provides interfaces for Diffie-Hellman keys as defined in RSA
 Laboratories' PKCS #3.
Provides classes and interfaces for key specifications and
 algorithm parameter specifications.
This package contains utility classes related to the Kerberos network
 authentication protocol.
This package contains the classes that should be used to store
 X500 Principal and X500 Private Credentials in a
 Subject.
- 
Uses of Destroyable in java.securitySubinterfaces of Destroyable in java.securityClasses in java.security that implement DestroyableModifier and TypeClassDescriptionstatic classA password-based implementation ofProtectionParameter.
- 
Uses of Destroyable in java.security.interfacesSubinterfaces of Destroyable in java.security.interfacesModifier and TypeInterfaceDescriptioninterfaceThe standard interface to a DSA private key.interfaceThe interface to an elliptic curve (EC) private key.interfaceAn interface for an elliptic curve private key as defined by RFC 8032: Edwards-Curve Digital Signature Algorithm (EdDSA).interfaceThe interface to an RSA multi-prime private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceThe interface to an RSA private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceThe interface to an RSA private key.interfaceAn interface for an elliptic curve private key as defined by RFC 7748.
- 
Uses of Destroyable in javax.cryptoSubinterfaces of Destroyable in javax.crypto
- 
Uses of Destroyable in javax.crypto.interfacesSubinterfaces of Destroyable in javax.crypto.interfacesModifier and TypeInterfaceDescriptioninterfaceThe interface to a Diffie-Hellman private key.interfaceThe interface to a PBE key.
- 
Uses of Destroyable in javax.crypto.specClasses in javax.crypto.spec that implement DestroyableModifier and TypeClassDescriptionclassThis class specifies a secret key in a provider-independent fashion.
- 
Uses of Destroyable in javax.security.auth.kerberosClasses in javax.security.auth.kerberos that implement DestroyableModifier and TypeClassDescriptionclassThis class encapsulates an EncryptionKey used in Kerberos.classThis class encapsulates a Kerberos 5 KRB_CRED message which can be used to send Kerberos credentials from one principal to another.classThis class encapsulates a long term secret key for a Kerberos principal.classThis class encapsulates a Kerberos ticket and associated information as viewed from the client's point of view.
- 
Uses of Destroyable in javax.security.auth.x500Classes in javax.security.auth.x500 that implement DestroyableModifier and TypeClassDescriptionclassThis class represents anX500PrivateCredential.