1 /*
   2  * Copyright (c) 1998, 2018, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.  Oracle designates this
   8  * particular file as subject to the "Classpath" exception as provided
   9  * by Oracle in the LICENSE file that accompanied this code.
  10  *
  11  * This code is distributed in the hope that it will be useful, but WITHOUT
  12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  14  * version 2 for more details (a copy is included in the LICENSE file that
  15  * accompanied this code).
  16  *
  17  * You should have received a copy of the GNU General Public License version
  18  * 2 along with this work; if not, write to the Free Software Foundation,
  19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  20  *
  21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  22  * or visit www.oracle.com if you need additional information or have any
  23  * questions.
  24  */
  25 
  26 /**
  27  * Provides interfaces for generating RSA (Rivest, Shamir and
  28  * Adleman AsymmetricCipher algorithm)
  29  * keys as defined in the RSA Laboratory Technical Note
  30  * PKCS#1, and DSA (Digital Signature
  31  * Algorithm) keys as defined in NIST's FIPS-186.
  32  * <P>
  33  * Note that these interfaces are intended only for key
  34  * implementations whose key material is accessible and
  35  * available. These interfaces are not intended for key
  36  * implementations whose key material resides in
  37  * inaccessible, protected storage (such as in a
  38  * hardware device).
  39  * <P>
  40  * For more developer information on how to use these
  41  * interfaces, including information on how to design
  42  * {@code Key} classes for hardware devices, please refer
  43  * to these cryptographic provider developer guides:
  44  * <ul>
  45  *   <li>
  46  *     {@extLink security_guide_impl_provider
  47  *       How to Implement a Provider in the Java Cryptography Architecture}
  48  *   </li>
  49  * </ul>
  50  *
  51  * <h2>Package Specification</h2>
  52  *
  53  * <ul>
  54  *   <li>PKCS #1: RSA Cryptography Specifications, Version 2.2 (RFC 8017)</li>
  55  *   <li>Federal Information Processing Standards Publication (FIPS PUB) 186:
  56  *     Digital Signature Standard (DSS) </li>
  57  * </ul>
  58  *
  59  * <h2>Related Documentation</h2>
  60  *
  61  * For further documentation, please see:
  62  * <ul>
  63  *   <li> {extLink security_guide_jca
  64  *       Java Cryptography Architecture Reference Guide}</li>
  65  * </ul>
  66  *
  67  * @since 1.1
  68  */
  69 package java.security.interfaces;