|
|||||||||
| PREV NEXT | FRAMES NO FRAMES | ||||||||
AESKey contains a 16/24/32 byte key for AES computations based
on the Rijndael algorithm.AID instance encapsulating the specified AID bytes.
ALG_AES_BLOCK_128_CBC_NOPAD provides a
cipher using AES with block size 128 in CBC mode and does not pad input
data.
ALG_AES_BLOCK_128_ECB_NOPAD provides a
cipher using AES with block size 128 in ECB mode and does not pad input
data.
ALG_AES_CBC_ISO9797_M1 provides a cipher
using AES with block size 128 in CBC mode, and pads input data according to the ISO 9797
method 1 scheme.
ALG_AES_CBC_ISO9797_M2 provides a cipher
using AES with block size 128 in CBC mode, and pads input data according to the ISO 9797
method 2 (ISO 7816-4, EMV'96) scheme.
ALG_AES_ECB_ISO9797_M1 provides a cipher
using AES with block size 128 in ECB mode, and pads input data according to the ISO 9797
method 1 scheme.
ALG_AES_ECB_ISO9797_M2 provides a cipher
using AES with block size 128 in ECB mode, and pads input data according to the ISO 9797
method 2 (ISO 7816-4, EMV'96) scheme.
ALG_AES_ECB_PKCS5 provides a cipher using
AES with block size 128 in ECB mode, and pads input data according to the PKCS#5 scheme.
ALG_AES_MAC_128_NOPAD generates a
16-byte MAC using AES with blocksize 128 in CBC mode and does not pad
input data.
ALG_AES_MAC_192_NOPAD generates a
24-byte MAC using AES with blocksize 192 in CBC mode and does not pad
input data.
ALG_AES_MAC_256_NOPAD generates a
32-byte MAC using AES with blocksize 256 in CBC mode and does not pad
input data.
ALG_DES_CBC_ISO9797_M1 provides a cipher
using DES in CBC mode or triple DES in outer CBC mode, and pads input
data according to the ISO 9797 method 1 scheme.
ALG_DES_CBC_ISO9797_M2 provides a cipher
using DES in CBC mode or triple DES in outer CBC mode, and pads input
data according to the ISO 9797 method 2 (ISO 7816-4, EMV'96) scheme.
ALG_DES_CBC_NOPAD provides a cipher using
DES in CBC mode or triple DES in outer CBC mode, and does not pad input
data.
ALG_DES_ECB_ISO9797_M1 provides a cipher
using DES in ECB mode, and pads input data according to the ISO 9797
method 1 scheme.
ALG_DES_ECB_ISO9797_M2 provides a cipher
using DES in ECB mode, and pads input data according to the ISO 9797
method 2 (ISO 7816-4, EMV'96) scheme.
ALG_DES_ECB_NOPAD provides a cipher using
DES in ECB mode, and does not pad input data.
ALG_DES_ECB_PKCS5 provides a cipher using
DES in ECB mode, and pads input data according to the PKCS#5 scheme.
ALG_DES_MAC4_ISO9797_1_M2_ALG3
generates a 4-byte MAC using a 2-key DES3 key according to ISO9797-1 MAC
algorithm 3 with method 2 (also EMV'96, EMV'2000), where input data is
padded using method 2 and the data is processed as described in MAC
Algorithm 3 of the ISO 9797-1 specification.
ALG_DES_MAC4_ISO9797_M1 generates a
4-byte MAC (most significant 4 bytes of encrypted block) using DES in CBC
mode or triple DES in outer CBC mode.
ALG_DES_MAC4_ISO9797_M2 generates a
4-byte MAC (most significant 4 bytes of encrypted block) using DES in CBC
mode or triple DES in outer CBC mode.
ALG_DES_MAC4_NOPAD generates a 4-byte
MAC (most significant 4 bytes of encrypted block) using DES in CBC mode
or triple DES in outer CBC mode.
ALG_DES_MAC4_PKCS5 generates a 4-byte
MAC (most significant 4 bytes of encrypted block) using DES in CBC mode
or triple DES in outer CBC mode.
ALG_DES_MAC8_ISO9797_1_M2_ALG3
generates an 8-byte MAC using a 2-key DES3 key according to ISO9797-1 MAC
algorithm 3 with method 2 (also EMV'96, EMV'2000), where input data is
padded using method 2 and the data is processed as described in MAC
Algorithm 3 of the ISO 9797-1 specification.
ALG_DES_MAC8_ISO9797_M1 generates an
8-byte MAC using DES in CBC mode or triple DES in outer CBC mode.
ALG_DES_MAC8_ISO9797_M2 generates an
8-byte MAC using DES in CBC mode or triple DES in outer CBC mode.
ALG_DES_MAC_8_NOPAD generates an
8-byte MAC using DES in CBC mode or triple DES in outer CBC mode.
KeyPair object containing a DSA key pair.
ALG_DSA_SHA generates a 20-byte SHA
digest and signs/verifies the digests using DSA.
KeyPair object containing an EC key pair for EC operations
over fields of characteristic 2 with polynomial basis.
KeyPair object containing an EC key pair for EC operations
over large prime fields
ALG_ECDSA_SHA generates a 20-byte SHA
digest and signs/verifies the digest using ECDSA.
ALG_ECDSA_SHA_224 generates a 28-byte
SHA-224 digest and signs/verifies the digest using ECDSA with the P-224
curve defined in the Digital Signature Standards specification[NIST FIPS
PUB 186-2].
ALG_ECDSA_SHA_256 generates a 32-byte
SHA-256 digest and signs/verifies the digest using ECDSA with the P-256
curve defined in the Digital Signature Standards specification[NIST FIPS
PUB 186-2].
ALG_ECDSA_SHA_384 generates a 48-byte
SHA-384 digest and signs/verifies the digest using ECDSA with the P-384
curve defined in the Digital Signature Standards specification[NIST FIPS
PUB 186-2].
ALG_ECDSA_SHA_512 generates a 64-byte
SHA-512 digest and signs/verifies the digest using ECDSA with the P-521
curve defined in the Digital Signature Standards specification[NIST FIPS
PUB 186-2].
ALG_HMAC_MD5 This
algorithm generates an HMAC following the steps found in RFC: 2104 using
MD5 as the hashing algorithm.
ALG_HMAC_RIPEMD160
This algorithm generates an HMAC following the steps found in RFC: 2104
using RIPEMD160 as the hashing algorithm.
ALG_HMAC_SHA1 This
algorithm generates an HMAC following the steps found in RFC: 2104 using
SHA1 as the hashing algorithm.
ALG_HMAC_SHA_256
This algorithm generates an HMAC following the steps found in RFC: 2104
using SHA-256 as the hashing algorithm.
ALG_HMAC_SHA_384
This algorithm generates an HMAC following the steps found in RFC: 2104
using SHA-384 as the hashing algorithm.
ALG_HMAC_SHA_512
This algorithm generates an HMAC following the steps found in RFC: 2104
using SHA-512 as the hashing algorithm.
ALG_KOREAN_SEED_CBC_NOPAD provides a
cipher using the Korean SEED algorithm specified in the Korean SEED
Algorithm specification provided by KISA, Korea Information Security
Agency in ECB mode and does not pad input data.
ALG_KOREAN_SEED_ECB_NOPAD provides a
cipher using the Korean SEED algorithm specified in the Korean SEED
Algorithm specification provided by KISA, Korea Information Security
Agency in ECB mode and does not pad input data.
ALG_KOREAN_SEED_MAC_NOPAD generates an
16-byte MAC using Korean SEED in CBC mode.
KeyPair object containing a RSA key pair.
KeyPair object containing a RSA key pair with private key
in its Chinese Remainder Theorem form.
ALG_RSA_MD5_PKCS1 generates a 16-byte
MD5 digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_MD5_PKCS1_PSS generates a
16-byte MD5 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_MD5_RFC2409 generates a
16-byte MD5 digest, pads the digest according to the RFC2409 scheme, and
encrypts it using RSA.
ALG_RSA_NOPAD provides a cipher using RSA
and does not pad input data.
ALG_RSA_PKCS1 provides a cipher using
RSA, and pads input data according to the PKCS#1 (v1.5) scheme.
ALG_RSA_PKCS1_OAEP provides a cipher
using RSA, and pads input data according to the PKCS#1-OAEP scheme (IEEE
1363-2000).
ALG_RSA_RIPEMD160_ISO9796 generates a
20-byte RIPE MD-160 digest, pads the digest according to the ISO 9796
scheme, and encrypts it using RSA.
ALG_RSA_RIPEMD160_ISO9796_MR generates
20-byte RIPE MD-160 digest, pads it according to the ISO9796-2
specification and encrypts using RSA.
ALG_RSA_RIPEMD160_PKCS1 generates a
20-byte RIPE MD-160 digest, pads the digest according to the PKCS#1
(v1.5) scheme, and encrypts it using RSA.
ALG_RSA_RIPEMD160_PKCS1_PSS generates
a 20-byte RIPE MD-160 digest, pads it according to the PKCS#1-PSS scheme
(IEEE 1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_224_PKCS1 generates a 28-byte
SHA digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_SHA_224_PKCS1_PSS generates a
28-byte SHA-1 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_256_PKCS1 generates a 32-byte
SHA digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_SHA_256_PKCS1_PSS generates a
32-byte SHA-1 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_384_PKCS1 generates a 48-byte
SHA digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_SHA_384_PKCS1_PSS generates a
48-byte SHA-1 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_512_PKCS1 generates a 64-byte
SHA digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_SHA_512_PKCS1_PSS generates a
64-byte SHA-1 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_ISO9796 generates a
20-byte SHA digest, pads the digest according to the ISO 9796-2 scheme as
specified in EMV '96 and EMV 2000, and encrypts it using RSA.
ALG_RSA_SHA_ISO9796_MR generates
20-byte SHA-1 digest, pads it according to the ISO9796-2 specification
and encrypts using RSA.
ALG_RSA_SHA_PKCS1 generates a 20-byte
SHA digest, pads the digest according to the PKCS#1 (v1.5) scheme, and
encrypts it using RSA.
ALG_RSA_SHA_PKCS1_PSS generates a
20-byte SHA-1 digest, pads it according to the PKCS#1-PSS scheme (IEEE
1363-2000), and encrypts it using RSA.
ALG_RSA_SHA_RFC2409 generates a
20-byte SHA digest, pads the digest according to the RFC2409 scheme, and
encrypts it using RSA.
APDUException represents an APDU related
exception.ConstructedBERTLV.
this Primitive
BER TLV object.
install() method should create the
applet object.
AppletEvent interface provides a callback interface for
the Java Card runtime environment to inform the applet about life cycle
events.ArithmeticException is thrown when an exceptional arithmetic
condition has occurred.ArithmeticException.
ArrayIndexOutOfBoundsException is thrown to indicate that an
array has been accessed with an illegal index.ArrayIndexOutOfBoundsException.
ArrayLogic class contains common utility functions for
manipulating arrays of primitive components - byte, short or int.ArrayStoreException is thrown to indicate that an attempt has
been made to store the wrong type of object into an array of objects.ArrayStoreException.
APDU.setOutgoingLength()
method to indicate
APDUException.BAD_LENGTH if len is
negative, or greater than 256 and the currently selected applet does not
implement the javacardx.apdu.ExtendedLength interface, or
if non BLOCK CHAINED data transfer is requested and len is
greater than (IFSD-2), where IFSD is the Outgoing Block Size.
BasicService.
BCDUtil class contains common BCD(binary coded decimal)
related utility functions.BERTag class encapsulates a BER TLV tag.BERTLV Tag object capable of
encapsulating a BER TLV Tag.
BERTLV class encapsulates a BER TLV structure.BERTLV object capable of
encapsulating a BER TLV structure.
BigNumber class encapsulates an unsigned number whose
value is represented in internal hexadecimal format using an implementation
specific maximum number of bytes.BioException class encapsulates specific exceptions which
can be thrown by the methods of the javacardx.biometry package
in case of error.APDU.sendBytes() method to
indicate that the sum of buffer offset parameter and the byte length
parameter exceeds the APDU buffer size.
APDU object cannot be accessed for input processing.
APDU object cannot be accessed for output processing.
CardException class defines a field reason and
two accessor methods
getReason() and setReason().CardRemoteObject and automatically exports
it.
CardRuntimeException class defines a field
reason and two accessor methods
getReason() and
setReason().pin against the PIN value.
pin against the PIN value.
Checksum class is the base class for CRC (cyclic
redundancy check) checksum algorithms.Cipher class is the abstract base class for Cipher
algorithms.ClassCastException is thrown to indicate that the code has
attempted to cast an object to a subclass of which it is not an instance.ClassCastException.
CLEAR_ON_RESET cases.
APDU object does not fit in the APDU buffer.
APDU object has been completely processed.
ConstructedBERTag class encapsulates a constructed BER TLV
tag.ConstructedBERTLV class encapsulates a constructed BER TLV
structure.ConstructedBERTLV object
capable of encapsulating a ConstructedBERTLV structure.
CryptoException represents a cryptography-related exception.CryptoException with the specified reason.
initParam parameter in the buildBioTemplate()
method.
this ConstructedBERTLV.
DESKey contains an 8/16/24-byte key for single/2 key triple
DES/3 key triple DES operations.APDU object.
Dispatcher is used to build an application by aggregating
several services.Dispatcher with a designated maximum number of
services.
DSAPrivateKey interface is used to sign data using the DSA
algorithm.DSAPublicKey interface is used to verify signatures on
signed data using the DSA algorithm.ECKey interface is the base interface for the EC
algorithm's private and public key implementations.ECPrivateKey interface is used to generate signatures on
data using the ECDSA (Elliptic Curve Digital Signature Algorithm) and to
generate shared secrets using the ECDH (Elliptic Curve Diffie-Hellman)
algorithm.ECPublicKey interface is used to verify signatures on
signed data using the ECDSA algorithm and to generate shared secrets using
the ECDH algorithm.this AID instance
to the AID bytes in the specified object.
bArray are the same
as those encapsulated in this AID object.
this BER Tag with another.
Exception and its subclasses are a form of
Throwable that indicate conditions that a reasonable applet
might want to catch.Exception instance.
ExtendedLength interface serves as a tagging interface to
indicate that the applet supports extended length APDU.ExternalException represents an external subsystem related
exception.ExternalException with the specified reason.
APDU
object to processed, and indicates that the processing has
failed.
BERTLV within
this ConstructedBERTLV object that matches
the specified BER Tag.
BERTLV within
this ConstructedBERTLV object that matches
the specified BER Tag.
PrivateKey specified during initialization and the public
key data provided.
KeyPair
instance with new key values.
AID object associated with the current applet context, or
null if the Applet.register() method has
not yet been invoked.
AID
object.
APDU object.
APDU command based on the CLA byte.
Applet.process(APDU)
method to obtain a reference to the current APDU object.
Applet.process(APDU)
method to obtain a reference to the current APDU buffer.
APDU
object.
InitializedMessageDigest object instance of the
selected algorithm.
APDU
object.
Checksum object instance of the selected
algorithm.
KeyAgreement object instance of the selected
algorithm.
MessageDigest object instance of the selected
algorithm.
RandomData instance of the selected algorithm.
Signature object instance of the selected
algorithm.
Cipher object instance of the selected
algorithm.
BERTLV Tag object from the binary representation
in the byte array.
BERTLV using the input binary data.
Key data in plain text.
Key data in plain text.
Key data in plain text.
Key data in plain text.
Cipher object to be used to decrypt the input
key data and key parameters in the set methods.
this TLV object's Length component
MemoryAccess object instance for the selected
memory subsystem.
APDU
object.
APDU
object.
APDU object.
AID object starting at the specified offset for the
specified length.
AID object associated with the previously active applet
context.
KeyPair object.
KeyPair object.
APDU
object.
this value of the TLV object's Tag component
PIN is blocked.
PIN is blocked.
this Primitive BER TLV object
into the output buffer.
HMACKey contains a key for HMAC operations.javacard.framework.Applet.register() method to indicate
that the input AID parameter is not a legal AID value.
beginTransaction method to
indicate a transaction is already in progress.
IndexOutOfBoundsException is thrown to indicate that an index
of some sort (such as to an array) is out of range.IndexOutOfBoundsException.
Checksum object with the
algorithm specific parameters.
Signature object with the appropriate
Key.
Signature object with the appropriate
Key and algorithm specific parameters.
Signature object with the appropriate
Key.
Cipher object with the appropriate
Key.
Cipher object with the appropriate Key and
algorithm specific parameters.
this ConstructedBERTag
object with the specified tag class, and tag number.
this ConstructedBERTag
object from the binary representation in the byte array.
this ConstructedBERTLV
using the input byte data.
this ConstructedBERTLV
object with the input tag and TLV parameter.
this ConstructedBERTLV
object with the input tag and specified data as value of the object.
this PrimitiveBERTag object
with the specified tag class, and tag number.
this PrimitiveBERTLV Tag
object from the binary representation in the byte array.
this PrimitiveBERTLV using
the input byte data.
this PrimitiveBERTLV
object with the input tag, length and data.
InitializedMessageDigest class is a subclass of the base
class MessageDigest.Applet subclass, the Java
Card runtime environment will call this static method first.
IOException
is thrown to signal that an I/O exception of some sort has occurred.IOException.
APDU command is the first or
part of a command chain.
this BER tag structure is constructed
APDU command CLA byte
corresponds to an interindustry command as defined in ISO 7816-4:2005
specification.
ISO7816 encapsulates constants related to ISO 7816-3 and ISO
7816-4.ISOException class encapsulates an ISO 7816-4 response status
word as its reason code.APDU object has already been
processed.
true if the encoding of the current
APDU command based on the CLA byte indicates secure
messaging.
true if a valid PIN has been presented since the
last card reset or last call to reset().
true if a valid PIN value has been presented since
the last card reset or last call to reset().
reset().
APDU command CLA byte is
valid.
JCint class contains common utility functions using ints.JCSystem class includes a collection of methods to control
applet execution, resource management, atomic transaction management, object
deletion mechanism and inter-applet object sharing in the Java Card
environment.Key interface is the base interface for all keys.KeyAgreement class is the base class for key agreement
algorithms such as Diffie-Hellman and EC Diffie-Hellman [IEEE P1363].KeyBuilder class is a key object factory.KeyEncryption interface defines the methods used to enable
encrypted key data access to a key implementation.KeyPair instance for the specified algorithm
and keylength; the encapsulated keys are uninitialized.
KeyPair object containing the specified
public key and private key.
KoreanSEEDKey contains an 16-byte key for Korean Seed
Algorithm operations.LENGTH_AES_128 = 128.
LENGTH_AES_192 = 192.
LENGTH_AES_256 = 256.
LENGTH_DES = 64.
LENGTH_DES3_2KEY = 128.
LENGTH_DES3_3KEY = 192.
LENGTH_DSA_1024 = 1024.
LENGTH_DSA_512 = 512.
LENGTH_DSA_768 = 768.
LENGTH_EC_F2M_113 = 113.
LENGTH_EC_F2M_131 = 131.
LENGTH_EC_F2M_163 = 163.
LENGTH_EC_F2M_193 = 193.
LENGTH_EC_FP_112 = 112.
LENGTH_EC_FP_128 = 128.
LENGTH_EC_FP_160 = 160.
LENGTH_EC_FP_192 = 192.
LENGTH_EC_FP_224 = 224.
LENGTH_EC_FP_256 = 256.
LENGTH_EC_FP_384 = 384.
LENGTH_HMAC_SHA_1_BLOCK_64 = 64.
LENGTH_HMAC_SHA_256_BLOCK_64 = 64.
LENGTH_HMAC_SHA_384_BLOCK_128 = 128.
LENGTH_HMAC_SHA_512_BLOCK_128 = 128.
LENGTH_KOREAN_SEED_128 = 128.
LENGTH_RSA_1024 = 1024.
LENGTH_RSA_1280 = 1280.
LENGTH_RSA_1536 = 1536.
LENGTH_RSA_1984 = 1984.
LENGTH_RSA_2048 = 2048.
LENGTH_RSA_4096 = 4096.
LENGTH_RSA_512 = 512.
LENGTH_RSA_736 = 736.
LENGTH_RSA_768 = 768.
LENGTH_RSA_896 = 896.
AID object, if any, encapsulating the specified AID bytes
in the buffer parameter if there exists a successfully
installed applet on the card whose instance AID exactly matches that of
the specified AID bytes.
Object with the specified
array length.
MessageDigest class is the base class for hashing
algorithms.init() methods to indicate decryption mode.
init() methods to indicate encryption mode.
init() methods to indicate signature sign mode.
init() methods to indicate signature verify mode.
MultiSelectable interface identifies the implementing
Applet subclass as being capable of concurrent selections.NegativeArraySizeException is thrown if an applet tries to
create an array with negative size.NegativeArraySizeException.
makeTransient..() methods
to indicate that no room is available in volatile memory for the
requested object.
abortTransaction and
commitTransaction methods when a transaction is not in
progress.
NullPointerException is thrown when an applet attempts to use
null in a case where an object is required.NullPointerException.
Object is the root of the Java Card platform class
hierarchy.OwnerBioTemplate interface should be implemented by the
applet which owns the biometric template.PIN interface, and provides
the ability to update the PIN and thus owner functionality.ParityBit class is a utility to assist with DES key parity
bit generation.length bytes of the encapsulated AID bytes within
this AID object.
PINException represents a OwnerPIN class
access-related exception.PrimitiveBERTag class encapsulates a primitive BER TLV
tag.PrimitiveBERTag object
capable of encapsulating a primitive BER TLV Tag.
PrimitiveBERTLV class encapsulates a primitive BER TLV
structure.PrimitiveBERTLV object
capable of encapsulating a Primitive BER TLV structure.
PrivateKey interface is the base interface for private
keys used in asymmetric algorithms.BasicService method is a default implementation and
simply returns false without performing any processing.
APDU object.
APDU object.
BasicService method is a default implementation and
simply returns false without performing any processing.
APDU
object.
BasicService method is a default implementation and
simply returns false without performing any processing.
APDU
object.
PublicKey interface is the base interface for public keys
used in asymmetric algorithms.RandomData abstract class is the base class for random
number generation.bOff.
APDU object
if the input has not already been received.
this applet
instance with the Java Card runtime environment and to assign the Java
Card platform name of the applet as its instance AID bytes.
this applet
instance with the Java Card runtime environment and assign the specified
AID bytes as its instance AID bytes.
RemoteException is thrown to indicate that a
communication-related exception has occurred during the execution of a remote
method call.RemoteException.
this Primitive BER TLV object.
PIN try counter to the value of the
PIN try limit.
PIN try counter to the value of the
PIN try limit.
MessageDigest object to the initial state for
further use.
PIN
try counter to the value of the PIN try limit and clears
the blocking state of the PIN.
otherAID
object matches that of this AID object.
RMIService and sets the specified remote
object as the initial reference for the applet.
RSAPrivateCrtKey interface is used to sign data using the
RSA algorithm in its Chinese Remainder Theorem form.RSAPrivateKey class is used to sign data using the RSA
algorithm in its modulus/exponent form.RSAPublicKey is used to verify signatures on signed data
using the RSA algorithm.RuntimeException is the superclass of those exceptions that
can be thrown during the normal operation of the Java Card Virtual Machine.RuntimeException instance.
SecretKey class is the base interface for keys used in
symmetric algorithms (DES, for example).SecurityException is thrown by the Java Card Virtual Machine
to indicate a security violation.SecurityException.
process() method to
distinguish the SELECT APDU command which selected this
applet, from all other SELECT APDU commands which may relate to file or
internal applet state selection.
APDU
object is the applet SELECT FILE command which selected the currently
selected applet.
len more bytes from APDU buffer at specified offset
bOff.
len more bytes from outData byte
array starting at specified offset bOff.
ServiceException represents a service framework-related
exception.ServiceException.
TYPE_EC_F2M_PUBLIC or TYPE_EC_F2M_PRIVATE
in the case where the polynomial is a trinomial, of the form x^n + x^e +
1 (where n is the bit length of the key).
TYPE_EC_F2M_PUBLIC or TYPE_EC_F2M_PRIVATE
in the case where the polynomial is a pentanomial, of the form x^n + x^e1 +
x^e2 + x^e3 + 1 (where n is the bit length of the key).
TYPE_EC_FP_PRIVATE or TYPE_EC_FP_PUBLIC.
MessageDigest superclass.
DEFAULT_RMI_INVOKE_INSTRUCTION in the Java Card platform
RMI protocol for the INVOKE commands used to access the
RMIService for remote method invocations.
Key data.
Key data.
Key data.
Key data.
Cipher object to be used to decrypt the input key
data and key parameters in the set methods.
APDU object.
APDU
object to processed.
APDU
object.
SharedBioTemplate interface provides the means for
accessing unrestricted biometric functionality, e.g., the biometric matching
functions.Signature class is the base class for Signature
algorithms.Signature class must implement this
SignatureMessageRecovery interface to provide message recovery
functionality.this tag
structure
this TLV
structure
APDU object occurs when an
APDUException with reason code
APDUException.IO_ERROR has been thrown.
APDU object occurs when an
APDUException with reason code
APDUException.NO_T0_GETRESPONSE has been thrown.
APDU object occurs when an
APDUException with reason code
APDUException.NO_T0_REISSUE has been thrown.
APDU object occurs when an
APDUException with reason code
APDUException.T1_IFD_ABORT has been thrown.
APDU object when all the incoming
data been received.
APDU object when all outbound data
has been transferred.
APDU object when only the
command header is valid.
APDU object when data transfer
mode is outbound but length is not yet known.
APDU object when data transfer mode
is outbound and outbound length is known.
APDU object when incoming data has
partially been received.
APDU object when some outbound data
has been transferred but not all.
APDU
object to processed, and indicates that the processing has
succeeded.
APDU
object to processed, and indicates that the processing has
partially succeeded.
SystemException represents a JCSystem class
related exception.this BER Tag structure
this BER Tag structure
Throwable.
APDUException with the specified reason.
CardException class with the specified reason.
CardRuntimeException class with the specified reason.
PINException with the specified reason.
ServiceException with the specified reason.
SystemException with the specified reason.
TransactionException with the specified reason.
UserException with the specified reason.
CryptoException with the specified reason.
ExternalException with the specified reason.
TLVException with the specified reason.
UtilException with the specified reason.
TLVException represents a TLV-related exception.TLVException with the specified reason.
this BER tag structure to the
byte array
this TLV structure to the specified byte array.
TransactionException represents an exception in the
transaction subsystem.Key object which implements interface type
AESKey with persistent key data.
Key object which implements interface type
AESKey with CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
AESKey with CLEAR_ON_RESET transient key data.
Key object which implements interface type
DESKey with persistent key data.
Key object which implements interface type
DESKey with CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
DESKey with CLEAR_ON_RESET transient key data.
Key object which implements the interface type
DSAPrivateKey for the DSA algorithm.
Key object which implements the interface type
DSAPrivateKey for the DSA algorithm, with
CLEAR_ON_DESELECT transient key data.
Key object which implements the interface type
DSAPrivateKey for the DSA algorithm, with CLEAR_ON_RESET
transient key data.
Key object which implements the interface type
DSAPublicKey for the DSA algorithm.
ECPrivateKey
for EC operations over fields of characteristic 2 with polynomial basis.
ECPrivateKey
for EC operations over fields of characteristic 2 with polynomial basis,
with CLEAR_ON_DESELECT transient key data.
ECPrivateKey
for EC operations over fields of characteristic 2 with polynomial basis,
with CLEAR_ON_RESET transient key data.
ECPublicKey
for EC operations over fields of characteristic 2 with polynomial basis.
ECPrivateKey
for EC operations over large prime fields.
ECPrivateKey
for EC operations over large prime fields, with CLEAR_ON_DESELECT
transient key data.
ECPrivateKey
for EC operations over large prime fields, with CLEAR_ON_RESET transient
key data.
ECPublicKey
for EC operations over large prime fields.
Key object which implements interface type
HMACKey with persistent key data.
Key object which implements interface type
HMACKey with CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
HMACKey with CLEAR_ON_RESET transient key data.
Key object which implements interface type
KoreanSEEDKey with persistent key data.
Key object which implements interface type
KoreanSEEDKey with CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
KoreanSEEDKey with CLEAR_ON_RESET transient key data.
Key object which implements interface type
RSAPrivateCrtKey which uses Chinese Remainder Theorem.
Key object which implements interface type
RSAPrivateCrtKey which uses Chinese Remainder Theorem,
with CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
RSAPrivateCrtKey which uses Chinese Remainder Theorem,
with CLEAR_ON_RESET transient key data.
Key object which implements interface type
RSAPrivateKey which uses modulus/exponent form.
Key object which implements interface type
RSAPrivateKey which uses modulus/exponent form, with
CLEAR_ON_DESELECT transient key data.
Key object which implements interface type
RSAPrivateKey which uses modulus/exponent form, with
CLEAR_ON_RESET transient key data.
Key object which implements interface type
RSAPublicKey.
PIN
try counter to the value of the PIN try limit.
UserException represents a User exception.UserException with reason = 0.
UserException with the specified reason.
Util class contains common utility functions.UtilException represents a util related exception.UtilException with the specified reason.
|
|||||||||
| PREV NEXT | FRAMES NO FRAMES | ||||||||