|
||||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||
| Packages that use org.apache.shiro.crypto | |
|---|---|
| org.apache.shiro.crypto | Cryptography Cipher and Hashing components that greatly simplify the JDK's cryptography concepts and add additional convenient behavior. |
| org.apache.shiro.crypto.hash | Cryptographic Hashing components that greatly simplify one-way data hashing in an application. |
| org.apache.shiro.mgt | Provides the master SecurityManager interface and a default implementation
hierarchy for managing all aspects of Shiro's functionality in an application. |
| Classes in org.apache.shiro.crypto used by org.apache.shiro.crypto | |
|---|---|
| AbstractSymmetricCipherService
Base abstract class for supporting symmetric key cipher algorithms. |
|
| CipherService
A CipherService uses a cryptographic algorithm called a
Cipher to convert an original input source using a key to
an uninterpretable format. |
|
| CryptoException
Base Shiro exception for problems encountered during cryptographic operations. |
|
| DefaultBlockCipherService
Base abstract class for block cipher algorithms. |
|
| JcaCipherService
Abstract CipherService implementation utilizing Java's JCA APIs. |
|
| OperationMode
A cipher mode of operation directs a cipher algorithm how to convert data during the encryption or decryption process. |
|
| PaddingScheme
A CipherPaddingScheme represents well-known
padding schemes supported by JPA providers in a
type-safe manner. |
|
| RandomNumberGenerator
A component that can generate random number/byte values as needed. |
|
| Classes in org.apache.shiro.crypto used by org.apache.shiro.crypto.hash | |
|---|---|
| RandomNumberGenerator
A component that can generate random number/byte values as needed. |
|
| UnknownAlgorithmException
Exception thrown when attempting to lookup or use a cryptographic algorithm that does not exist in the current JVM environment. |
|
| Classes in org.apache.shiro.crypto used by org.apache.shiro.mgt | |
|---|---|
| CipherService
A CipherService uses a cryptographic algorithm called a
Cipher to convert an original input source using a key to
an uninterpretable format. |
|
|
||||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||