| From class Cipher
                
                  
                    | ByteArray! | doFinal()
                         Finishes a multiple-part encryption or decryption operation, depending on how this cipher was initialized.  Input data that may have been buffered during a previous updateoperation is processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in a new buffer. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again. |  
                    | ByteArray! | doFinal(input: ByteArray!)
                         Encrypts or decrypts data in a single-part operation, or finishes a multiple-part operation. The data is encrypted or decrypted, depending on how this cipher was initialized.  The bytes in the inputbuffer, and any input bytes that may have been buffered during a previousupdateoperation, are processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in a new buffer. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again. |  
                    | Int | doFinal(output: ByteArray!, outputOffset: Int)
                         Finishes a multiple-part encryption or decryption operation, depending on how this cipher was initialized.  Input data that may have been buffered during a previous updateoperation is processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in theoutputbuffer, starting atoutputOffsetinclusive. If the outputbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again. |  
                    | ByteArray! | doFinal(input: ByteArray!, inputOffset: Int, inputLen: Int)
                         Encrypts or decrypts data in a single-part operation, or finishes a multiple-part operation. The data is encrypted or decrypted, depending on how this cipher was initialized.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, and any input bytes that may have been buffered during a previousupdateoperation, are processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in a new buffer. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again. |  
                    | Int | doFinal(input: ByteArray!, inputOffset: Int, inputLen: Int, output: ByteArray!)
                         Encrypts or decrypts data in a single-part operation, or finishes a multiple-part operation. The data is encrypted or decrypted, depending on how this cipher was initialized.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, and any input bytes that may have been buffered during a previousupdateoperation, are processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in theoutputbuffer. If the outputbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again.  Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same byte array and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | Int | doFinal(input: ByteArray!, inputOffset: Int, inputLen: Int, output: ByteArray!, outputOffset: Int)
                         Encrypts or decrypts data in a single-part operation, or finishes a multiple-part operation. The data is encrypted or decrypted, depending on how this cipher was initialized.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, and any input bytes that may have been buffered during a previousupdateoperation, are processed, with padding (if requested) being applied. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in theoutputbuffer, starting atoutputOffsetinclusive. If the outputbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again.  Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same byte array and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | Int | doFinal(input: ByteBuffer!, output: ByteBuffer!)
                         Encrypts or decrypts data in a single-part operation, or finishes a multiple-part operation. The data is encrypted or decrypted, depending on how this cipher was initialized.  All input.remaining()bytes starting atinput.position()are processed. If an AEAD mode such as GCM/CCM is being used, the authentication tag is appended in the case of encryption, or verified in the case of decryption. The result is stored in the output buffer. Upon return, the input buffer's position will be equal to its limit; its limit will not have changed. The output buffer's position will have advanced by n, where n is the value returned by this method; the output buffer's limit will not have changed. If output.remaining()bytes are insufficient to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. Upon finishing, this method resets this cipher object to the state it was in when previously initialized via a call to init. That is, the object is reset and available to encrypt or decrypt (depending on the operation mode that was specified in the call toinit) more data. Note: if any exception is thrown, this cipher object may need to be reset before it can be used again.  Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same byte array and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | String! | getAlgorithm()
                         Returns the algorithm name of this Cipherobject. This is the same name that was specified in one of the getInstancecalls that created thisCipherobject.. |  
                    | Int | getBlockSize()
                         Returns the block size (in bytes). |  
                    | ExemptionMechanism! | getExemptionMechanism()
                         Returns the exemption mechanism object used with this cipher. |  
                    | ByteArray! | getIV()
                         Returns the initialization vector (IV) in a new buffer.  This is useful in the case where a random IV was created, or in the context of password-based encryption or decryption, where the IV is derived from a user-supplied password. |  
                    | Cipher! | getInstance(transformation: String!)
                         Returns a Cipherobject that implements the specified transformation.  This method traverses the list of registered security Providers, starting with the most preferred Provider. A new Cipher object encapsulating the CipherSpi implementation from the first Provider that supports the specified algorithm is returned.   Note that the list of registered providers may be retrieved via the Security.getProviders()method. |  
                    | Cipher! | getInstance(transformation: String!, provider: String!)
                         Returns a Cipherobject that implements the specified transformation.  A new Cipher object encapsulating the CipherSpi implementation from the specified provider is returned. The specified provider must be registered in the security provider list.   Note that the list of registered providers may be retrieved via the Security.getProviders()method. |  
                    | Cipher! | getInstance(transformation: String!, provider: Provider!)
                         Returns a Cipherobject that implements the specified transformation.  A new Cipher object encapsulating the CipherSpi implementation from the specified Provider object is returned. Note that the specified Provider object does not have to be registered in the provider list. |  
                    | Int | getMaxAllowedKeyLength(transformation: String!)
                         Returns the maximum key length for the specified transformation according to the installed JCE jurisdiction policy files. If JCE unlimited strength jurisdiction policy files are installed, Integer.MAX_VALUE will be returned. For more information on default key size in JCE jurisdiction policy files, please see Appendix E in the  Java Cryptography Architecture Reference Guide. |  
                    | AlgorithmParameterSpec! | getMaxAllowedParameterSpec(transformation: String!)
                         Returns an AlgorithmParameterSpec object which contains the maximum cipher parameter value according to the jurisdiction policy file. If JCE unlimited strength jurisdiction policy files are installed or there is no maximum limit on the parameters for the specified transformation in the policy file, null will be returned. |  
                    | Int | getOutputSize(inputLen: Int)
                         Returns the length in bytes that an output buffer would need to be in order to hold the result of the next updateordoFinaloperation, given the input lengthinputLen(in bytes). This call takes into account any unprocessed (buffered) data from a previous updatecall, padding, and AEAD tagging. The actual output length of the next updateordoFinalcall may be smaller than the length returned by this method. |  
                    | AlgorithmParameters! | getParameters()
                         Returns the parameters used with this cipher.  The returned parameters may be the same that were used to initialize this cipher, or may contain a combination of default and random parameter values used by the underlying cipher implementation if this cipher requires algorithm parameters but was not initialized with any. |  
                    | Provider! | getProvider()
                         Returns the provider of this Cipherobject. |  
                    | Unit | init(opmode: Int, certificate: Certificate!)
                         Initializes this cipher with the public key from the given certificate.   The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If the certificate is of type X.509 and has a key usage extension field marked as critical, and the value of the key usage extension field implies that the public key in the certificate and its corresponding private key are not supposed to be used for the operation represented by the value of opmode, anInvalidKeyExceptionis thrown.  If this cipher requires any algorithm parameters that cannot be derived from the public key in the given certificate, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise an  InvalidKeyExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them using the SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.) Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, certificate: Certificate!, random: SecureRandom!)
                         Initializes this cipher with the public key from the given certificate and a source of randomness.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If the certificate is of type X.509 and has a key usage extension field marked as critical, and the value of the key usage extension field implies that the public key in the certificate and its corresponding private key are not supposed to be used for the operation represented by the value of opmode, anInvalidKeyExceptionis thrown. If this cipher requires any algorithm parameters that cannot be derived from the public key in the given certificate, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidKeyExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them from random. Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!)
                         Initializes this cipher with a key.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters that cannot be derived from the given key, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidKeyExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them using the java.security.SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.) Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!, params: AlgorithmParameters!)
                         Initializes this cipher with a key and a set of algorithm parameters.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters and paramsis null, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidAlgorithmParameterExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them using the java.security.SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.) Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!, params: AlgorithmParameters!, random: SecureRandom!)
                         Initializes this cipher with a key, a set of algorithm parameters, and a source of randomness.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters and paramsis null, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidAlgorithmParameterExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them from random. Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!, random: SecureRandom!)
                         Initializes this cipher with a key and a source of randomness.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters that cannot be derived from the given key, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidKeyExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them from random. Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!, params: AlgorithmParameterSpec!)
                         Initializes this cipher with a key and a set of algorithm parameters.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters and paramsis null, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidAlgorithmParameterExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them using the java.security.SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.) Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Unit | init(opmode: Int, key: Key!, params: AlgorithmParameterSpec!, random: SecureRandom!)
                         Initializes this cipher with a key, a set of algorithm parameters, and a source of randomness.  The cipher is initialized for one of the following four operations: encryption, decryption, key wrapping or key unwrapping, depending on the value of opmode. If this cipher requires any algorithm parameters and paramsis null, the underlying cipher implementation is supposed to generate the required parameters itself (using provider-specific default or random values) if it is being initialized for encryption or key wrapping, and raise anInvalidAlgorithmParameterExceptionif it is being initialized for decryption or key unwrapping. The generated parameters can be retrieved usinggetParametersorgetIV(if the parameter is an IV). If this cipher requires algorithm parameters that cannot be derived from the input parameters, and there are no reasonable provider-specific default values, initialization will necessarily fail.  If this cipher (including its underlying feedback or padding scheme) requires any random bytes (e.g., for parameter generation), it will get them from random. Note that when a Cipher object is initialized, it loses all previously-acquired state. In other words, initializing a Cipher is equivalent to creating a new instance of that Cipher and initializing it. |  
                    | Key! | unwrap(wrappedKey: ByteArray!, wrappedKeyAlgorithm: String!, wrappedKeyType: Int)
                         Unwrap a previously wrapped key. |  
                    | ByteArray! | update(input: ByteArray!)
                         Continues a multiple-part encryption or decryption operation (depending on how this cipher was initialized), processing another data part.  The bytes in the inputbuffer are processed, and the result is stored in a new buffer. If inputhas a length of zero, this method returnsnull. |  
                    | ByteArray! | update(input: ByteArray!, inputOffset: Int, inputLen: Int)
                         Continues a multiple-part encryption or decryption operation (depending on how this cipher was initialized), processing another data part.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, are processed, and the result is stored in a new buffer. If inputLenis zero, this method returnsnull. |  
                    | Int | update(input: ByteArray!, inputOffset: Int, inputLen: Int, output: ByteArray!)
                         Continues a multiple-part encryption or decryption operation (depending on how this cipher was initialized), processing another data part.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, are processed, and the result is stored in theoutputbuffer. If the outputbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. If inputLenis zero, this method returns a length of zero. Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same byte array and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | Int | update(input: ByteArray!, inputOffset: Int, inputLen: Int, output: ByteArray!, outputOffset: Int)
                         Continues a multiple-part encryption or decryption operation (depending on how this cipher was initialized), processing another data part.  The first inputLenbytes in theinputbuffer, starting atinputOffsetinclusive, are processed, and the result is stored in theoutputbuffer, starting atoutputOffsetinclusive. If the outputbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. If inputLenis zero, this method returns a length of zero. Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same byte array and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | Int | update(input: ByteBuffer!, output: ByteBuffer!)
                         Continues a multiple-part encryption or decryption operation (depending on how this cipher was initialized), processing another data part.  All input.remaining()bytes starting atinput.position()are processed. The result is stored in the output buffer. Upon return, the input buffer's position will be equal to its limit; its limit will not have changed. The output buffer's position will have advanced by n, where n is the value returned by this method; the output buffer's limit will not have changed. If output.remaining()bytes are insufficient to hold the result, aShortBufferExceptionis thrown. In this case, repeat this call with a larger output buffer. UsegetOutputSizeto determine how big the output buffer should be. Note: this method should be copy-safe, which means the inputandoutputbuffers can reference the same block of memory and no unprocessed input data is overwritten when the result is copied into the output buffer. |  
                    | Unit | updateAAD(src: ByteArray!)
                         Continues a multi-part update of the Additional Authentication Data (AAD).   Calls to this method provide AAD to the cipher when operating in modes such as AEAD (GCM/CCM). If this cipher is operating in either GCM or CCM mode, all AAD must be supplied before beginning operations on the ciphertext (via the updateanddoFinalmethods). |  
                    | Unit | updateAAD(src: ByteArray!, offset: Int, len: Int)
                         Continues a multi-part update of the Additional Authentication Data (AAD), using a subset of the provided buffer.   Calls to this method provide AAD to the cipher when operating in modes such as AEAD (GCM/CCM). If this cipher is operating in either GCM or CCM mode, all AAD must be supplied before beginning operations on the ciphertext (via the updateanddoFinalmethods). |  
                    | Unit | updateAAD(src: ByteBuffer!)
                         Continues a multi-part update of the Additional Authentication Data (AAD).   Calls to this method provide AAD to the cipher when operating in modes such as AEAD (GCM/CCM). If this cipher is operating in either GCM or CCM mode, all AAD must be supplied before beginning operations on the ciphertext (via the updateanddoFinalmethods).  All src.remaining()bytes starting atsrc.position()are processed. Upon return, the input buffer's position will be equal to its limit; its limit will not have changed. |  
                    | ByteArray! | wrap(key: Key!)
                         Wrap a key. |  |