Package | Description |
---|---|
org.ietf.jgss |
This package presents a framework that allows application developers to
make use of security services like authentication, data integrity and
data confidentiality from a variety of underlying security mechanisms
like Kerberos, using a unified API.
|
Modifier and Type | Method and Description |
---|---|
byte[] |
GSSContext.getMIC(byte[] inMsg,
int offset,
int len,
MessageProp msgProp)
Returns a token containing a cryptographic Message Integrity Code
(MIC) for the supplied message, for transfer to the peer
application.
|
void |
GSSContext.getMIC(InputStream inStream,
OutputStream outStream,
MessageProp msgProp)
Uses streams to produce a token containing a cryptographic MIC for
the supplied message, for transfer to the peer application.
|
byte[] |
GSSContext.unwrap(byte[] inBuf,
int offset,
int len,
MessageProp msgProp)
Used to process tokens generated by the
wrap method on
the other side of the context. |
void |
GSSContext.unwrap(InputStream inStream,
OutputStream outStream,
MessageProp msgProp)
Uses streams to process tokens generated by the
wrap
method on the other side of the context. |
void |
GSSContext.verifyMIC(byte[] inToken,
int tokOffset,
int tokLen,
byte[] inMsg,
int msgOffset,
int msgLen,
MessageProp msgProp)
Verifies the cryptographic MIC, contained in the token parameter,
over the supplied message.
|
void |
GSSContext.verifyMIC(InputStream tokStream,
InputStream msgStream,
MessageProp msgProp)
Uses streams to verify the cryptographic MIC, contained in the token
parameter, over the supplied message.
|
byte[] |
GSSContext.wrap(byte[] inBuf,
int offset,
int len,
MessageProp msgProp)
Applies per-message security services over the established security
context.
|
void |
GSSContext.wrap(InputStream inStream,
OutputStream outStream,
MessageProp msgProp)
Applies per-message security services over the established security
context using streams.
|
Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2016, Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.