Uses of Interface
javax.security.auth.Destroyable
| Package | Description | 
|---|---|
| java.security | Provides the classes and interfaces for the security framework. | 
| java.security.interfaces | Provides interfaces for generating RSA (Rivest, Shamir and
 Adleman AsymmetricCipher algorithm)
 keys as defined in the RSA Laboratory Technical Note
 PKCS#1, and DSA (Digital Signature
 Algorithm) keys as defined in NIST's FIPS-186. | 
| javax.crypto | Provides the classes and interfaces for cryptographic
 operations. | 
| javax.crypto.interfaces | Provides interfaces for Diffie-Hellman keys as defined in RSA
 Laboratories' PKCS #3. | 
| javax.crypto.spec | Provides classes and interfaces for key specifications and
 algorithm parameter specifications. | 
| javax.security.auth.kerberos | This package contains utility classes related to the Kerberos network
 authentication protocol. | 
| javax.security.auth.x500 | This package contains the classes that should be used to store
 X500 Principal and X500 Private Credentials in a
 Subject. | 
- 
Uses of Destroyable in java.securitySubinterfaces of Destroyable in java.security Modifier and Type Interface Description interfacePrivateKeyA private key.Classes in java.security that implement Destroyable Modifier and Type Class Description static classKeyStore.PasswordProtectionA password-based implementation ofProtectionParameter.
- 
Uses of Destroyable in java.security.interfacesSubinterfaces of Destroyable in java.security.interfaces Modifier and Type Interface Description interfaceDSAPrivateKeyThe standard interface to a DSA private key.interfaceECPrivateKeyThe interface to an elliptic curve (EC) private key.interfaceRSAMultiPrimePrivateCrtKeyThe interface to an RSA multi-prime private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceRSAPrivateCrtKeyThe interface to an RSA private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values.interfaceRSAPrivateKeyThe interface to an RSA private key.interfaceXECPrivateKeyAn interface for an elliptic curve private key as defined by RFC 7748.
- 
Uses of Destroyable in javax.cryptoSubinterfaces of Destroyable in javax.crypto Modifier and Type Interface Description interfaceSecretKeyA secret (symmetric) key.
- 
Uses of Destroyable in javax.crypto.interfacesSubinterfaces of Destroyable in javax.crypto.interfaces Modifier and Type Interface Description interfaceDHPrivateKeyThe interface to a Diffie-Hellman private key.interfacePBEKeyThe interface to a PBE key.
- 
Uses of Destroyable in javax.crypto.specClasses in javax.crypto.spec that implement Destroyable Modifier and Type Class Description classSecretKeySpecThis class specifies a secret key in a provider-independent fashion.
- 
Uses of Destroyable in javax.security.auth.kerberosClasses in javax.security.auth.kerberos that implement Destroyable Modifier and Type Class Description classEncryptionKeyThis class encapsulates an EncryptionKey used in Kerberos.classKerberosCredMessageThis class encapsulates a Kerberos 5 KRB_CRED message which can be used to send Kerberos credentials from one principal to another.classKerberosKeyThis class encapsulates a long term secret key for a Kerberos principal.classKerberosTicketThis class encapsulates a Kerberos ticket and associated information as viewed from the client's point of view.
- 
Uses of Destroyable in javax.security.auth.x500Classes in javax.security.auth.x500 that implement Destroyable Modifier and Type Class Description classX500PrivateCredentialThis class represents anX500PrivateCredential.