10139N/A<!
DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
10139N/ACopyright 1998-2006 Sun Microsystems, Inc. All Rights Reserved. 10139N/ADO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 10139N/AThis code is free software; you can redistribute it and/or modify it 10139N/Aunder the terms of the GNU General Public License version 2 only, as 10139N/Apublished by the Free Software Foundation. Sun designates this 10139N/Aparticular file as subject to the "Classpath" exception as provided 10139N/Aby Sun in the LICENSE file that accompanied this code. 12888N/AThis code is distributed in the hope that it will be useful, but WITHOUT 12578N/AANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 10139N/AFITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 10139N/Aversion 2 for more details (a copy is included in the LICENSE file that 11419N/AYou should have received a copy of the GNU General Public License version 10139N/A2 along with this work; if not, write to the Free Software Foundation, 11419N/AInc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 10142N/APlease contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, 10139N/AProvides the classes and interfaces for the security framework.
11419N/AThis includes classes that implement an easily configurable,
11437N/Afine-grained access control security architecture.
11437N/Athe generation and storage of cryptographic public key pairs,
11437N/Aas well as a number of exportable cryptographic operations
10139N/Aincluding those for message digest and signature generation. Finally,
10139N/Aand secure random number generation.
10139N/AMany of the classes provided in this package (the cryptographic
10139N/Aand secure random number generator classes in particular) are
10803N/Aprovider-based. The class itself defines a programming interface
10139N/Ato which applications may write. The implementations themselves may
10139N/Athen be written by independent third-party vendors and plugged
10139N/Ain seamlessly as needed. Therefore application developers may
10139N/Atake advantage of any number of provider-based implementations
10139N/Awithout having to add or rewrite code.
11419N/A Cryptography Architecture</
b></
a></
li>
11070N/A <
li>PKCS8: Private-Key Information Standard, Version 1.2, November 1993</
li>
10139N/AFor further documentation, please see:
12368N/A Security Architecture</
b></
a></
li>
12892N/A How to Implement a Provider for the Java Cryptography Architecture
13034N/A Default Policy Implementation and Policy File Syntax