Cipher.getInstance("AES/ECB/des cbc pkcs5paddingg"); 这句话总是报错。

java aes加密与网上在线加密不同。谁能告诉我为什么?求个正确的例子,谢谢了!_百度知道
java aes加密与网上在线加密不同。谁能告诉我为什么?求个正确的例子,谢谢了!
printStackTrace();
byte[] enCodeFormat = secretKey.doFinal(byteContent);
} catch (NoSuchAlgorithmException e) {
e, String password) {
KeyGenerator kgen = KeyG
cipher.printStackTrace().getBytes(&quot.printStackTrace().getInstance(&quot, &SecretKeySpec key = new SecretKeySpec(enCodeF);AES&quot.init(C)));
SecretKey secretKey =);
kgen.getEncoded(), key);
byte[] byteContent = content.generateKey();).init(128;ECB/
utf-8&AES&#47, new SecureRandom(password.printStackTrace();
} catch (IllegalBlockSizeException e) {
} catch (UnsupportedEncodingException e) {
} catch (BadPaddingException e) {
e.getBytes(&quot.ENCRYPT_MODE;utf-8&quot:fdc2a7ef5accpublic static byte[] encrypt(S
byte[] result =
Cipher cipher = Cipher:73C58BAFE578CCD0B9D6D在线结果;
}PKCS5Padding&
} catch (NoSuchPaddingException e) {).printStackTrace():test
密码.getInstance(&quot我的代码如下;
} catch (InvalidKeyException e) {
e:测试结果;AES&quot.printStackTrace():内容
CBC/ECB/NoPadding (128)AES/就是这个东西有很多标准的,你得看下线上用的是什么标准AES/PKCS5Padding (128)DES/ECB/PKCS5Padding (56)DESede/ECB/NoPadding (168)DESede/CBC/ECB/ECB/CBC/PKCS5Padding (56)DES/NoPadding (128)AES&#47, 2048)RSA/OAEPWithSHA-1AndMGF1Padding (1024;ECB&#47, 2048)RSA/CBC/PKCS5Padding (168)DESede/PKCS5Padding (128)AES/);NoPadding (168)DESede/NoPadding (56)DES/PKCS5Padding&OAEPWithSHA-256AndMGF1Padding (1024;NoPadding (56)DES/PKCS5Padding (168)RSA/ECB/ECB/AES/CBC&#47CCBC/PKCS1Padding (1024;ECB&#47.getInstance(&ECB&#47
你能给个精确一点的回答吗?这里用的是AES,也就是前四条。NoPadding的话加密内容不是16的整数直接异常,其它组合我都试过了。调不出。
细看了一下你的代码,我不太明白这段的含义KeyGenerator kgen = KeyGenerator.getInstance(&AES&);kgen.init(128, new SecureRandom(password.getBytes(&utf-8&)));SecretKey secretKey = kgen.generateKey();byte[] enCodeFormat = secretKey.getEncoded();SecureRandom指的是一个随机数,参数是种子,而不是key的内容修改了下代码就会得出线上的内容,一般密码都会用MD5生成个摘要,才用来作Key的值(MD5刚好是16个字节)&&&SecretKeySpec&key&=&new&SecretKeySpec(Arrays.copyOf(password.getBytes(&utf-8&),&16),&&AES&);&&&Cipher&cipher&=&Cipher.getInstance(&AES/ECB/PKCS5Padding&);&&&byte[]&byteContent&=&content.getBytes(&utf-8&);&&&cipher.init(Cipher.ENCRYPT_MODE,&key);&&&byte[]&result&=&cipher.doFinal(byteContent);&&&return&
其他类似问题
为您推荐:
其他1条回答
这个都是统一的啊
等待您来回答
下载知道APP
随时随地咨询
出门在外也不愁Cipher (Java Platform SE 7 )
JavaScript is disabled on your browser.
Class Cipher
javax.crypto.Cipher
Direct Known Subclasses:
public class Cipher
This class provides the functionality of a cryptographic cipher for
encryption and decryption. It forms the core of the Java Cryptographic
Extension (JCE) framework.
In order to create a Cipher object, the application calls the
Cipher's getInstance method, and passes the name of the
requested transformation to it. Optionally, the name of a provider
may be specified.
A transformation is a string that describes the operation (or
set of operations) to be performed on the given input, to produce some
output. A transformation always includes the name of a cryptographic
algorithm (e.g., DES), and may be followed by a feedback mode and
padding scheme.
A transformation is of the form:
"algorithm/mode/padding" or
"algorithm"
(in the latter case,
provider-specific default values for the mode and padding scheme are used).
For example, the following is a valid transformation:
Cipher c = Cipher.getInstance("DES/CBC/PKCS5Padding");
Using modes such as CFB and OFB, block
ciphers can encrypt data in units smaller than the cipher's actual
block size.
When requesting such a mode, you may optionally specify
the number of bits to be processed at a time by appending this number
to the mode name as shown in the "DES/CFB8/NoPadding" and
"DES/OFB32/PKCS5Padding" transformations. If no such
number is specified, a provider-specific default is used. (For
example, the SunJCE provider uses a default of 64 bits for DES.)
Thus, block ciphers can be turned into byte-oriented stream ciphers by
using an 8 bit mode such as CFB8 or OFB8.
Modes such as Authenticated Encryption with Associated Data (AEAD)
provide authenticity assurances for both confidential data and
Additional Associated Data (AAD) that is not encrypted.
(Please see
information on AEAD and AEAD algorithms such as GCM/CCM.) Both
confidential and AAD data can be used when calculating the
authentication tag (similar to a ).
This tag is appended
to the ciphertext during encryption, and is verified on decryption.
AEAD modes such as GCM/CCM perform all AAD authenticity calculations
before starting the ciphertext authenticity calculations.
implementations having to internally buffer ciphertext, all AAD data
must be supplied to GCM/CCM implementations (via the updateAAD methods) before the ciphertext is processed (via
the update and doFinal methods).
GCMParameterSpec s = new GCMParameterSpec(...);
cipher.init(..., s);
// If the GCMParameterSpec is needed again
cipher.getParameters().getParameterSpec(GCMParameterSpec.class));
cipher.updateAAD(...);
cipher.update(...);
// Multi-part update
cipher.doFinal(...);
// conclusion of operation
Every implementation of the Java platform is required to support
the following standard Cipher transformations with the keysizes
in parentheses:
AES/CBC/NoPadding (128)
AES/CBC/PKCS5Padding (128)
AES/ECB/NoPadding (128)
AES/ECB/PKCS5Padding (128)
DES/CBC/NoPadding (56)
DES/CBC/PKCS5Padding (56)
DES/ECB/NoPadding (56)
DES/ECB/PKCS5Padding (56)
DESede/CBC/NoPadding (168)
DESede/CBC/PKCS5Padding (168)
DESede/ECB/NoPadding (168)
DESede/ECB/PKCS5Padding (168)
RSA/ECB/PKCS1Padding ()
RSA/ECB/OAEPWithSHA-1AndMGF1Padding ()
RSA/ECB/OAEPWithSHA-256AndMGF1Padding ()
These transformations are described in the
Java Cryptography Architecture Standard Algorithm Name Documentation.
Consult the release documentation for your implementation to see if any
other transformations are supported.
See Also:,
Field Summary
Modifier and Type
Field and Description
static int
Constant used to initialize cipher to decryption mode.
static int
Constant used to initialize cipher to encryption mode.
static int
Constant used to indicate the to-be-unwrapped key is a "private key".
static int
Constant used to indicate the to-be-unwrapped key is a "public key".
static int
Constant used to indicate the to-be-unwrapped key is a "secret key".
static int
Constant used to initialize cipher to key-unwrapping mode.
static int
Constant used to initialize cipher to key-wrapping mode.
Constructor Summary
Constructors&
Constructor and Description
(&cipherSpi,
&provider,
&transformation)
Creates a Cipher object.
Method Summary
Modifier and Type
Method and Description
Finishes a multiple-part encryption or decryption operation, depending
on how this cipher was initialized.
(byte[]&input)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation.
(byte[]&output,
int&outputOffset)
Finishes a multiple-part encryption or decryption operation, depending
on how this cipher was initialized.
(byte[]&input,
int&inputOffset,
int&inputLen)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation.
(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation.
(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output,
int&outputOffset)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation.
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation.
Returns the algorithm name of this Cipher object.
Returns the block size (in bytes).
Returns the exemption mechanism object used with this cipher.
(&transformation)
Returns a Cipher object that implements the specified
transformation.
(&transformation,
&provider)
Returns a Cipher object that implements the specified
transformation.
(&transformation,
&provider)
Returns a Cipher object that implements the specified
transformation.
Returns the initialization vector (IV) in a new buffer.
static int
(&transformation)
Returns the maximum key length for the specified transformation
according to the installed JCE jurisdiction policy files.
(&transformation)
Returns an AlgorithmParameterSpec object which contains
the maximum cipher parameter value according to the
jurisdiction policy file.
(int&inputLen)
Returns the length in bytes that an output buffer would need to be in
order to hold the result of the next update or
doFinal operation, given the input length
inputLen (in bytes).
Returns the parameters used with this cipher.
Returns the provider of this Cipher object.
(int&opmode,
&certificate)
Initializes this cipher with the public key from the given certificate.
(int&opmode,
&certificate,
Initializes this cipher with the public key from the given certificate
a source of randomness.
(int&opmode,
Initializes this cipher with a key.
(int&opmode,
Initializes this cipher with a key and a set of algorithm
parameters.
(int&opmode,
Initializes this cipher with a key and a set of algorithm
parameters.
(int&opmode,
Initializes this cipher with a key, a set of algorithm
parameters, and a source of randomness.
(int&opmode,
Initializes this cipher with a key, a set of algorithm
parameters, and a source of randomness.
(int&opmode,
Initializes this cipher with a key and a source of randomness.
(byte[]&wrappedKey,
&wrappedKeyAlgorithm,
int&wrappedKeyType)
Unwrap a previously wrapped key.
(byte[]&input)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
(byte[]&input,
int&inputOffset,
int&inputLen)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output,
int&outputOffset)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
(byte[]&src)
Continues a multi-part update of the Additional Authentication
Data (AAD).
(byte[]&src,
int&offset,
Continues a multi-part update of the Additional Authentication
Data (AAD), using a subset of the provided buffer.
Continues a multi-part update of the Additional Authentication
Data (AAD).
Wrap a key.
Methods inherited from class&java.lang.
, , , , , , , , , ,
Field Detail
ENCRYPT_MODE
public static final&int ENCRYPT_MODE
Constant used to initialize cipher to encryption mode.
DECRYPT_MODE
public static final&int DECRYPT_MODE
Constant used to initialize cipher to decryption mode.
public static final&int WRAP_MODE
Constant used to initialize cipher to key-wrapping mode.
UNWRAP_MODE
public static final&int UNWRAP_MODE
Constant used to initialize cipher to key-unwrapping mode.
PUBLIC_KEY
public static final&int PUBLIC_KEY
Constant used to indicate the to-be-unwrapped key is a "public key".
PRIVATE_KEY
public static final&int PRIVATE_KEY
Constant used to indicate the to-be-unwrapped key is a "private key".
SECRET_KEY
public static final&int SECRET_KEY
Constant used to indicate the to-be-unwrapped key is a "secret key".
Constructor Detail
protected&Cipher(&cipherSpi,
&provider,
&transformation)
Creates a Cipher object.
Parameters:cipherSpi - the delegateprovider - the providertransformation - the transformation
Method Detail
getInstance
public static final&&getInstance(&transformation)
Returns a Cipher object that implements the specified
transformation.
This method traverses the list of registered security Providers,
starting with the most preferred Provider.
A new Cipher object encapsulating the
CipherSpi implementation from the first
Provider that supports the specified algorithm is returned.
Note that the list of registered providers may be retrieved via
Parameters:transformation - the name of the transformation, e.g.,
DES/CBC/PKCS5Padding.
See the Cipher section in the
for information about standard transformation names.
Returns:a cipher that implements the requested transformation.
- if transformation
is null, empty, in an invalid format,
or if no Provider supports a CipherSpi implementation for the
specified algorithm.
- if transformation
contains a padding scheme that is not available.See Also:
getInstance
public static final&&getInstance(&transformation,
&provider)
Returns a Cipher object that implements the specified
transformation.
A new Cipher object encapsulating the
CipherSpi implementation from the specified provider
is returned.
The specified provider must be registered
in the security provider list.
Note that the list of registered providers may be retrieved via
Parameters:transformation - the name of the transformation,
e.g., DES/CBC/PKCS5Padding.
See the Cipher section in the
for information about standard transformation names.provider - the name of the provider.
Returns:a cipher that implements the requested transformation.
- if transformation
is null, empty, in an invalid format,
or if a CipherSpi implementation for the specified algorithm
is not available from the specified provider.
- if the specified provider is not
registered in the security provider list.
- if transformation
contains a padding scheme that is not available.
- if the provider
is null or empty.See Also:
getInstance
public static final&&getInstance(&transformation,
&provider)
Returns a Cipher object that implements the specified
transformation.
A new Cipher object encapsulating the
CipherSpi implementation from the specified Provider
object is returned.
Note that the specified Provider object
does not have to be registered in the provider list.
Parameters:transformation - the name of the transformation,
e.g., DES/CBC/PKCS5Padding.
See the Cipher section in the
for information about standard transformation names.provider - the provider.
Returns:a cipher that implements the requested transformation.
- if transformation
is null, empty, in an invalid format,
or if a CipherSpi implementation for the specified algorithm
is not available from the specified Provider object.
- if transformation
contains a padding scheme that is not available.
- if the provider
is null.See Also:
getProvider
public final&&getProvider()
Returns the provider of this Cipher object.
Returns:the provider of this Cipher object
getAlgorithm
public final&&getAlgorithm()
Returns the algorithm name of this Cipher object.
This is the same name that was specified in one of the
getInstance calls that created this Cipher
Returns:the algorithm name of this Cipher object.
getBlockSize
public final&int&getBlockSize()
Returns the block size (in bytes).
Returns:the block size (in bytes), or 0 if the underlying algorithm is
not a block cipher
getOutputSize
public final&int&getOutputSize(int&inputLen)
Returns the length in bytes that an output buffer would need to be in
order to hold the result of the next update or
doFinal operation, given the input length
inputLen (in bytes).
This call takes into account any unprocessed (buffered) data from a
previous update call, padding, and AEAD tagging.
The actual output length of the next update or
doFinal call may be smaller than the length returned by
this method.
Parameters:inputLen - the input length (in bytes)
Returns:the required output buffer size (in bytes)
- if this cipher is in a wrong state
(e.g., has not yet been initialized)
public final&byte[]&getIV()
Returns the initialization vector (IV) in a new buffer.
This is useful in the case where a random IV was created,
or in the context of password-based encryption or
decryption, where the IV is derived from a user-supplied password.
Returns:the initialization vector in a new buffer, or null if the
underlying algorithm does not use an IV, or if the IV has not yet
getParameters
public final&&getParameters()
Returns the parameters used with this cipher.
The returned parameters may be the same that were used to initialize
this cipher, or may contain a combination of default and random
parameter values used by the underlying cipher implementation if this
cipher requires algorithm parameters but was not initialized with any.
Returns:the parameters used with this cipher, or null if this cipher
does not use any parameters.
getExemptionMechanism
public final&&getExemptionMechanism()
Returns the exemption mechanism object used with this cipher.
Returns:the exemption mechanism object used with this cipher, or
null if this cipher does not use any exemption mechanism.
public final&void&init(int&opmode,
Initializes this cipher with a key.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters that cannot be
derived from the given key, the underlying cipher
implementation is supposed to generate the required parameters itself
(using provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidKeyException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them using the
implementation of the highest-priority
installed provider as the source of randomness.
(If none of the installed providers supply an implementation of
SecureRandom, a system-provided source of randomness will be used.)
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of
the following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)key - the key
- if the given key is inappropriate for
initializing this cipher, or requires
algorithm parameters that cannot be
determined from the given key, or if the given key has a keysize that
exceeds the maximum allowable keysize (as determined from the
configured jurisdiction policy files).
public final&void&init(int&opmode,
Initializes this cipher with a key and a source of randomness.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters that cannot be
derived from the given key, the underlying cipher
implementation is supposed to generate the required parameters itself
(using provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidKeyException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them from random.
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)key - the encryption keyrandom - the source of randomness
- if the given key is inappropriate for
initializing this cipher, or requires
algorithm parameters that cannot be
determined from the given key, or if the given key has a keysize that
exceeds the maximum allowable keysize (as determined from the
configured jurisdiction policy files).
public final&void&init(int&opmode,
Initializes this cipher with a key and a set of algorithm
parameters.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters and
params is null, the underlying cipher implementation is
supposed to generate the required parameters itself (using
provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidAlgorithmParameterException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them using the
implementation of the highest-priority
installed provider as the source of randomness.
(If none of the installed providers supply an implementation of
SecureRandom, a system-provided source of randomness will be used.)
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)key - the encryption keyparams - the algorithm parameters
- if the given key is inappropriate for
initializing this cipher, or its keysize exceeds the maximum allowable
keysize (as determined from the configured jurisdiction policy files).
- if the given algorithm
parameters are inappropriate for this cipher,
or this cipher requires
algorithm parameters and params is null, or the given
algorithm parameters imply a cryptographic strength that would exceed
the legal limits (as determined from the configured jurisdiction
policy files).
public final&void&init(int&opmode,
Initializes this cipher with a key, a set of algorithm
parameters, and a source of randomness.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters and
params is null, the underlying cipher implementation is
supposed to generate the required parameters itself (using
provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidAlgorithmParameterException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them from random.
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)key - the encryption keyparams - the algorithm parametersrandom - the source of randomness
- if the given key is inappropriate for
initializing this cipher, or its keysize exceeds the maximum allowable
keysize (as determined from the configured jurisdiction policy files).
- if the given algorithm
parameters are inappropriate for this cipher,
or this cipher requires
algorithm parameters and params is null, or the given
algorithm parameters imply a cryptographic strength that would exceed
the legal limits (as determined from the configured jurisdiction
policy files).
public final&void&init(int&opmode,
Initializes this cipher with a key and a set of algorithm
parameters.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters and
params is null, the underlying cipher implementation is
supposed to generate the required parameters itself (using
provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidAlgorithmParameterException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them using the
implementation of the highest-priority
installed provider as the source of randomness.
(If none of the installed providers supply an implementation of
SecureRandom, a system-provided source of randomness will be used.)
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following: ENCRYPT_MODE,
DECRYPT_MODE, WRAP_MODE
or UNWRAP_MODE)key - the encryption keyparams - the algorithm parameters
- if the given key is inappropriate for
initializing this cipher, or its keysize exceeds the maximum allowable
keysize (as determined from the configured jurisdiction policy files).
- if the given algorithm
parameters are inappropriate for this cipher,
or this cipher requires
algorithm parameters and params is null, or the given
algorithm parameters imply a cryptographic strength that would exceed
the legal limits (as determined from the configured jurisdiction
policy files).
public final&void&init(int&opmode,
Initializes this cipher with a key, a set of algorithm
parameters, and a source of randomness.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If this cipher requires any algorithm parameters and
params is null, the underlying cipher implementation is
supposed to generate the required parameters itself (using
provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidAlgorithmParameterException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them from random.
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following: ENCRYPT_MODE,
DECRYPT_MODE, WRAP_MODE
or UNWRAP_MODE)key - the encryption keyparams - the algorithm parametersrandom - the source of randomness
- if the given key is inappropriate for
initializing this cipher, or its keysize exceeds the maximum allowable
keysize (as determined from the configured jurisdiction policy files).
- if the given algorithm
parameters are inappropriate for this cipher,
or this cipher requires
algorithm parameters and params is null, or the given
algorithm parameters imply a cryptographic strength that would exceed
the legal limits (as determined from the configured jurisdiction
policy files).
public final&void&init(int&opmode,
&certificate)
Initializes this cipher with the public key from the given certificate.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping or
key unwrapping, depending
on the value of opmode.
If the certificate is of type X.509 and has a key usage
extension field marked as critical, and the value of the key usage
extension field implies that the public key in
the certificate and its corresponding private key are not
supposed to be used for the operation represented by the value
of opmode,
an InvalidKeyException
is thrown.
If this cipher requires any algorithm parameters that cannot be
derived from the public key in the given certificate, the underlying
implementation is supposed to generate the required parameters itself
(using provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidKeyException if it is being initialized for decryption or
key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them using the
SecureRandom
implementation of the highest-priority
installed provider as the source of randomness.
(If none of the installed providers supply an implementation of
SecureRandom, a system-provided source of randomness will be used.)
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)certificate - the certificate
- if the public key in the given
certificate is inappropriate for initializing this cipher, or this
cipher requires algorithm parameters that cannot be determined from the
public key in the given certificate, or the keysize of the public key
in the given certificate has a keysize that exceeds the maximum
allowable keysize (as determined by the configured jurisdiction policy
public final&void&init(int&opmode,
&certificate,
Initializes this cipher with the public key from the given certificate
a source of randomness.
The cipher is initialized for one of the following four operations:
encryption, decryption, key wrapping
or key unwrapping, depending on
the value of opmode.
If the certificate is of type X.509 and has a key usage
extension field marked as critical, and the value of the key usage
extension field implies that the public key in
the certificate and its corresponding private key are not
supposed to be used for the operation represented by the value of
an InvalidKeyException
is thrown.
If this cipher requires any algorithm parameters that cannot be
derived from the public key in the given certificate,
the underlying cipher
implementation is supposed to generate the required parameters itself
(using provider-specific default or random values) if it is being
initialized for encryption or key wrapping, and raise an
InvalidKeyException if it is being
initialized for decryption or key unwrapping.
The generated parameters can be retrieved using
(if the parameter is an IV).
If this cipher requires algorithm parameters that cannot be
derived from the input parameters, and there are no reasonable
provider-specific default values, initialization will
necessarily fail.
If this cipher (including its underlying feedback or padding scheme)
requires any random bytes (e.g., for parameter generation), it will get
them from random.
Note that when a Cipher object is initialized, it loses all
previously-acquired state. In other words, initializing a Cipher is
equivalent to creating a new instance of that Cipher and initializing
Parameters:opmode - the operation mode of this cipher (this is one of the
following:
ENCRYPT_MODE, DECRYPT_MODE,
WRAP_MODE or UNWRAP_MODE)certificate - the certificaterandom - the source of randomness
- if the public key in the given
certificate is inappropriate for initializing this cipher, or this
requires algorithm parameters that cannot be determined from the
public key in the given certificate, or the keysize of the public key
in the given certificate has a keysize that exceeds the maximum
allowable keysize (as determined by the configured jurisdiction policy
public final&byte[]&update(byte[]&input)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
The bytes in the input buffer are processed, and the
result is stored in a new buffer.
If input has a length of zero, this method returns
Parameters:input - the input buffer
Returns:the new buffer with the result, or null if the underlying
cipher is a block cipher and the input data is too short to result in a
new block.
- if this cipher is in a wrong state
(e.g., has not been initialized)
public final&byte[]&update(byte[]&input,
int&inputOffset,
int&inputLen)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, are processed,
and the result is stored in a new buffer.
If inputLen is zero, this method returns
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input length
Returns:the new buffer with the result, or null if the underlying
cipher is a block cipher and the input data is too short to result in a
new block.
- if this cipher is in a wrong state
(e.g., has not been initialized)
public final&int&update(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, are processed,
and the result is stored in the output buffer.
If the output buffer is too small to hold the result,
a ShortBufferException is thrown. In this case, repeat this
call with a larger output buffer. Use
to determine how big
the output buffer should be.
If inputLen is zero, this method returns
a length of zero.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same byte array and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input lengthoutput - the buffer for the result
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if the given output buffer is too small
to hold the result
public final&int&update(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output,
int&outputOffset)
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, are processed,
and the result is stored in the output buffer, starting at
outputOffset inclusive.
If the output buffer is too small to hold the result,
a ShortBufferException is thrown. In this case, repeat this
call with a larger output buffer. Use
to determine how big
the output buffer should be.
If inputLen is zero, this method returns
a length of zero.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same byte array and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input lengthoutput - the buffer for the resultoutputOffset - the offset in output where the result
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if the given output buffer is too small
to hold the result
public final&int&update(&input,
Continues a multiple-part encryption or decryption operation
(depending on how this cipher was initialized), processing another data
All input.remaining() bytes starting at
input.position() are processed. The result is stored
in the output buffer.
Upon return, the input buffer's position will be equal
its limit will not have changed. The output buffer's
position will have advanced by n, where n is the value returned
the output buffer's limit will not have changed.
If output.remaining() bytes are insufficient to
hold the result, a ShortBufferException is thrown.
In this case, repeat this call with a larger output buffer. Use
to determine how big
the output buffer should be.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same block of memory and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input ByteBufferoutput - the output ByteByffer
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if input and output are the
same object
- if the output buffer is read-only
- if there is insufficient space in the
output bufferSince:
public final&byte[]&doFinal()
Finishes a multiple-part encryption or decryption operation, depending
on how this cipher was initialized.
Input data that may have been buffered during a previous
update operation is processed, with padding (if requested)
being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in a new buffer.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Returns:the new buffer with the result
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&int&doFinal(byte[]&output,
int&outputOffset)
Finishes a multiple-part encryption or decryption operation, depending
on how this cipher was initialized.
Input data that may have been buffered during a previous
update operation is processed, with padding (if requested)
being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in the output buffer, starting at
outputOffset inclusive.
If the output buffer is too small to hold the result,
a ShortBufferException is thrown. In this case, repeat this
call with a larger output buffer. Use
to determine how big
the output buffer should be.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Parameters:output - the buffer for the resultoutputOffset - the offset in output where the result
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if the given output buffer is too small
to hold the result
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&byte[]&doFinal(byte[]&input)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation. The data is encrypted or decrypted,
depending on how this cipher was initialized.
The bytes in the input buffer, and any input bytes that
may have been buffered during a previous update operation,
are processed, with padding (if requested) being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in a new buffer.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Parameters:input - the input buffer
Returns:the new buffer with the result
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&byte[]&doFinal(byte[]&input,
int&inputOffset,
int&inputLen)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation. The data is encrypted or decrypted,
depending on how this cipher was initialized.
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, and any input
bytes that may have been buffered during a previous update
operation, are processed, with padding (if requested) being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in a new buffer.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input length
Returns:the new buffer with the result
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&int&doFinal(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation. The data is encrypted or decrypted,
depending on how this cipher was initialized.
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, and any input
bytes that may have been buffered during a previous update
operation, are processed, with padding (if requested) being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in the output buffer.
If the output buffer is too small to hold the result,
a ShortBufferException is thrown. In this case, repeat this
call with a larger output buffer. Use
to determine how big
the output buffer should be.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same byte array and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input lengthoutput - the buffer for the result
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if the given output buffer is too small
to hold the result
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&int&doFinal(byte[]&input,
int&inputOffset,
int&inputLen,
byte[]&output,
int&outputOffset)
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation. The data is encrypted or decrypted,
depending on how this cipher was initialized.
The first inputLen bytes in the input
buffer, starting at inputOffset inclusive, and any input
bytes that may have been buffered during a previous
update operation, are processed, with padding
(if requested) being applied.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in the output buffer, starting at
outputOffset inclusive.
If the output buffer is too small to hold the result,
a ShortBufferException is thrown. In this case, repeat this
call with a larger output buffer. Use
to determine how big
the output buffer should be.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same byte array and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input bufferinputOffset - the offset in input where the input
startsinputLen - the input lengthoutput - the buffer for the resultoutputOffset - the offset in output where the result
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if the given output buffer is too small
to hold the result
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated value
public final&int&doFinal(&input,
Encrypts or decrypts data in a single-part operation, or finishes a
multiple-part operation. The data is encrypted or decrypted,
depending on how this cipher was initialized.
All input.remaining() bytes starting at
input.position() are processed.
If an AEAD mode such as GCM/CCM is being used, the authentication
tag is appended in the case of encryption, or verified in the
case of decryption.
The result is stored in the output buffer.
Upon return, the input buffer's position will be equal
its limit will not have changed. The output buffer's
position will have advanced by n, where n is the value returned
the output buffer's limit will not have changed.
If output.remaining() bytes are insufficient to
hold the result, a ShortBufferException is thrown.
In this case, repeat this call with a larger output buffer. Use
to determine how big
the output buffer should be.
Upon finishing, this method resets this cipher object to the state
it was in when previously initialized via a call to init.
That is, the object is reset and available to encrypt or decrypt
(depending on the operation mode that was specified in the call to
init) more data.
Note: if any exception is thrown, this cipher object may need to
be reset before it can be used again.
Note: this method should be copy-safe, which means the
input and output buffers can reference
the same byte array and no unprocessed input data is overwritten
when the result is copied into the output buffer.
Parameters:input - the input ByteBufferoutput - the output ByteBuffer
Returns:the number of bytes stored in output
- if this cipher is in a wrong state
(e.g., has not been initialized)
- if input and output are the
same object
- if the output buffer is read-only
- if this cipher is a block cipher,
no padding has been requested (only in encryption mode), and the total
input length of the data processed by this cipher is not a multiple of
or if this encryption algorithm is unable to
process the input data provided.
- if there is insufficient space in the
output buffer
- if this cipher is in decryption mode,
and (un)padding has been requested, but the decrypted data is not
bounded by the appropriate padding bytes
- if this cipher is decrypting in an
AEAD mode (such as GCM/CCM), and the received authentication tag
does not match the calculated valueSince:
public final&byte[]&wrap(&key)
Wrap a key.
Parameters:key - the key to be wrapped.
Returns:the wrapped key.
- if this cipher is in a wrong
state (e.g., has not been initialized).
- if this cipher is a block
cipher, no padding has been requested, and the length of the
encoding of the key to be wrapped is not a
multiple of the block size.
- if it is impossible or unsafe to
wrap the key with this cipher (e.g., a hardware protected key is
being passed to a software-only cipher).
public final&&unwrap(byte[]&wrappedKey,
&wrappedKeyAlgorithm,
int&wrappedKeyType)
Unwrap a previously wrapped key.
Parameters:wrappedKey - the key to be unwrapped.wrappedKeyAlgorithm - the algorithm associated with the wrapped
key.wrappedKeyType - the type of the wrapped key. This must be one of
SECRET_KEY, PRIVATE_KEY, or
PUBLIC_KEY.
Returns:the unwrapped key.
- if this cipher is in a wrong state
(e.g., has not been initialized).
- if no installed providers
can create keys of type wrappedKeyType for the
wrappedKeyAlgorithm.
- if wrappedKey does not
represent a wrapped key of type wrappedKeyType for
the wrappedKeyAlgorithm.
getMaxAllowedKeyLength
public static final&int&getMaxAllowedKeyLength(&transformation)
Returns the maximum key length for the specified transformation
according to the installed JCE jurisdiction policy files. If
JCE unlimited strength jurisdiction policy files are installed,
Integer.MAX_VALUE will be returned.
For more information on default key size in JCE jurisdiction
policy files, please see Appendix E in the
Parameters:transformation - the cipher transformation.
Returns:the maximum key length in bits or Integer.MAX_VALUE.
- if transformation is null.
- if transformation
is not a valid transformation, i.e. in the form of "algorithm" or
"algorithm/mode/padding".Since:
getMaxAllowedParameterSpec
public static final&&getMaxAllowedParameterSpec(&transformation)
Returns an AlgorithmParameterSpec object which contains
the maximum cipher parameter value according to the
jurisdiction policy file. If JCE unlimited strength jurisdiction
policy files are installed or there is no maximum limit on the
parameters for the specified transformation in the policy file,
null will be returned.
Parameters:transformation - the cipher transformation.
Returns:an AlgorithmParameterSpec which holds the maximum
value or null.
- if transformation
- if transformation
is not a valid transformation, i.e. in the form of "algorithm" or
"algorithm/mode/padding".Since:
public final&void&updateAAD(byte[]&src)
Continues a multi-part update of the Additional Authentication
Data (AAD).
Calls to this method provide AAD to the cipher when operating in
modes such as AEAD (GCM/CCM).
If this cipher is operating in
either GCM or CCM mode, all AAD must be supplied before beginning
operations on the ciphertext (via the update and doFinal methods).
Parameters:src - the buffer containing the Additional Authentication Data
- if the src
byte array is null
- if this cipher is in a wrong state
(e.g., has not been initialized), does not accept AAD, or if
operating in either GCM or CCM mode and one of the update
methods has already been called for the active
encryption/decryption operation
- if the corresponding method
in the CipherSpi has not been overridden by an
implementationSince:
public final&void&updateAAD(byte[]&src,
int&offset,
Continues a multi-part update of the Additional Authentication
Data (AAD), using a subset of the provided buffer.
Calls to this method provide AAD to the cipher when operating in
modes such as AEAD (GCM/CCM).
If this cipher is operating in
either GCM or CCM mode, all AAD must be supplied before beginning
operations on the ciphertext (via the update and doFinal methods).
Parameters:src - the buffer containing the AADoffset - the offset in src where the AAD input startslen - the number of AAD bytes
- if the src
byte array is null, or the offset or length
is less than 0, or the sum of the offset and
len is greater than the length of the
src byte array
- if this cipher is in a wrong state
(e.g., has not been initialized), does not accept AAD, or if
operating in either GCM or CCM mode and one of the update
methods has already been called for the active
encryption/decryption operation
- if the corresponding method
in the CipherSpi has not been overridden by an
implementationSince:
public final&void&updateAAD(&src)
Continues a multi-part update of the Additional Authentication
Data (AAD).
Calls to this method provide AAD to the cipher when operating in
modes such as AEAD (GCM/CCM).
If this cipher is operating in
either GCM or CCM mode, all AAD must be supplied before beginning
operations on the ciphertext (via the update and doFinal methods).
All src.remaining() bytes starting at
src.position() are processed.
Upon return, the input buffer's position will be equal
its limit will not have changed.
Parameters:src - the buffer containing the AAD
- if the src ByteBuffer
- if this cipher is in a wrong state
(e.g., has not been initialized), does not accept AAD, or if
operating in either GCM or CCM mode and one of the update
methods has already been called for the active
encryption/decryption operation
- if the corresponding method
in the CipherSpi has not been overridden by an
implementationSince:
For further API reference and developer documentation, see . That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
© , Oracle and/or its affiliates.
All rights reserved. Use is subject to . Also see the .
Scripting on this page tracks web page traffic, but does not change the content in any way.

我要回帖

更多关于 rsa ecb pkcs1padding 的文章

 

随机推荐