The Java Developers Almanac 1.4


Order this book from Amazon.

   
Home > List of Packages > java.security  [30 examples] > Signatures  [4 examples]

e202. Listing All Available Signature Algorithms

Retrieving the list of available signature algorithms requires checking the services provided by all registered providers. The retrieved list of names can be used in creating a Signature object.
    // This method is implemented in e194 Listing All Available Cryptographic Services
    String[] names = getCryptoImpls("Signature");
An example of the output:
    MD2withRSA
    1.3.14.3.2.27
    SHA/DSA
    DSAWithSHA1
    MD5withRSA
    1.3.14.3.2.13
    SHA1/DSA
    SHA1withDSA
    SHA1withRSA
    1.2.840.10040.4.3
    DSS
    SHA-1/DSA
    DSA
    OID.1.2.840.10040.4.3
    SHAwithDSA

 Related Examples
e203. Creating a Signature
e204. Verifying a Signature
e205. Signing a Java Object

See also: Key Store    Message Digests    Permissions    Policy Files    Public and Private Keys   


© 2002 Addison-Wesley.