Examples of Key

Keys are generally obtained through key generators, certificates, or various Identity classes used to manage keys. Keys may also be obtained from key specifications (transparent representations of the underlying key material) through the use of a key factory (see {@link KeyFactory}).

A Key should use KeyRep as its serialized representation. Note that a serialized Key may contain sensitive information which should not be exposed in untrusted environments. See the Security Appendix of the Serialization Specification for more information. @see PublicKey @see PrivateKey @see KeyPair @see KeyPairGenerator @see KeyFactory @see KeyRep @see java.security.spec.KeySpec @see Identity @see Signer @version 1.57 06/04/21 @author Benjamin Renaud

  • javax.xml.registry.infomodel.Key
    @version $Revision$ $Date$
  • net.karneim.pojobuilder.model.PropertyListM.Key
  • nexj.core.meta.persistence.Key
    Interface representing a multi-part key.
  • nl.topicus.onderwijs.dashboard.keys.Key
  • oracle.kv.Key
  • org.aeonbits.owner.Config.Key
  • org.apache.accumulo.core.data.Key
  • org.apache.accumulo.proxy.thrift.Key
  • org.apache.camel.avro.generated.Key
  • org.apache.deltacloud.client.Key
    @author Andre Dietisheim
  • org.apache.flink.runtime.operators.testutils.TestData.Key
  • org.apache.flink.types.Key
    This interface has to be implemented by all data types that act as key. Keys are used to establish relationships between values. A key must always be {@link java.lang.Comparable} to other keys ofthe same type. In addition, keys must implement a correct {@link java.lang.Object#hashCode()} methodand {@link java.lang.Object#equals(Object)} method to ensure that grouping on keys works properly.

    This interface extends {@link org.apache.flink.types.Value} and requires to implementthe serialization of its value. @see org.apache.flink.types.Value @see org.apache.flink.core.io.IOReadableWritable @see java.lang.Comparable

  • org.apache.hadoop.fs.FileSystem.Cache.Key
  • org.apache.hadoop.hbase.migration.nineteen.onelab.filter.Key
    The general behavior of a key that must be stored in a filter.
  • org.apache.hadoop.util.bloom.Key
    The general behavior of a key that must be stored in a filter. @see Filter The general behavior of a filter
  • org.apache.jackrabbit.core.nodetype.EffectiveNodeTypeCache.Key
  • org.apache.jackrabbit.oak.plugins.document.UpdateOp.Key
  • org.apache.jackrabbit.oak.plugins.mongomk.UpdateOp.Key
  • org.apache.olingo.odata2.api.edm.provider.Key
    Objects of this class represent a key for an entity type
  • org.apache.tuscany.das.rdb.Key
    A key instance is used to describe a Table key definition. This is used primarily for compound keys since simple keys are described with a name.
  • org.apache.wicket.protocol.http.mock.Cookies.Key
  • org.apache.wicket.request.resource.ResourceReference.Key
  • org.apache.xerces.validators.schema.identity.Key
    Schema key identity constraint. @author Andy Clark, IBM @version $Id: Key.java,v 1.3 2001/02/20 06:12:28 andyc Exp $
  • org.apache.xindice.core.data.Key
    Key extends Value by providing a hash value for the Key.
  • org.ardverk.dht.rsrc.Key
    A {@link Key} is an unique identifier of a {@link Value}.
  • org.chaidb.db.index.Key
    This interface defines different IDBIndex key types, and methods to compare two keys.
  • org.crosswire.jsword.passage.Key
  • org.cruxframework.crux.core.client.db.annotation.Store.Key
  • org.eclipse.php.internal.ui.preferences.util.Key
  • org.exolab.castor.xml.schema.Key
    A class that represents the XML Schema Identity Constraint: Key. @author Keith Visco @version $Revision: 6230 $ $Date: 2006-04-14 04:14:43 -0600 (Fri, 14 Apr 2006) $
  • org.filsa.nikujaga.pong.Keys.Key
  • org.hdiv.cipher.Key
    Stored Session related data in the cipher section @author Roberto Velasco
  • org.hibernate.ogm.grid.Key
    The key of an entity, association or row.

    Note that exposing the state of instances through arrays is a deliberate decision for the sake of performance. The contents of these arrays must not be modified by the caller. @author Gunnar Morling

  • org.hypertable.thriftgen.Key
  • org.infinispan.test.data.Key
  • org.jayasoft.woj.common.model.security.Key
  • org.jboss.aesh.terminal.Key
  • org.jboss.dna.graph.query.validate.Schemata.Key
  • org.jboss.remoting3.HandleableCloseable.Key
    The VersionedConnectionFactory to negotiate the version on the client side and return an appropriate VersionedConnection for the negotiated version.

    As the only entry point to this class is the create method and as that method creates a new instance for each call it is guaranteed there will not be concurrent negotiations occurring. @author Darran Lofthouse

  • org.jboss.repository.spi.Key
    @author Scott.Stark@jboss.org @version $Revision: 42147 $
  • org.jboss.shrinkwrap.resolver.impl.maven.archive.plugins.ConfigurationUtils.Key
  • org.jboss.test.hibernate.timers.interfaces.Key
    Example ejb key associated with a timer. @author Scott.Stark@jboss.org @version $Revision: 81036 $
  • org.jclouds.ibm.smartcloud.domain.Key
    The current state of a public or private key. @author Adrian Cole
  • org.jclouds.joyent.cloudapi.v6_5.domain.Key
    oyent.com/sdcapidoc/cloudapi/index.html#ListKeys" >docs
  • org.jf.dexlib2.writer.pool.ProtoPool.Key
  • org.jitterbit.crypto.pgp.Key
    Interface defining a public key for PGP encryption. @author Torgil Zethson @since 2.0.0
  • org.jitterbit.integration.client.ui.project.trashcan.InspectionUtils.Key
  • org.jnode.driver.input.Key
    @author Martin Husted Hartvig @since 0.1.6
  • org.kite9.diagram.adl.Key
  • org.kitesdk.data.Key

    A key for retrieving entities from a {@link RandomAccessDataset}.

    @since 0.9.0
  • org.modeshape.jcr.query.validate.Schemata.Key
  • org.mongodb.morphia.Key

    The key object; this class is take from the app-engine datastore (mostly) implementation. It is also Serializable and GWT-safe, enabling your entity objects to be used for GWT RPC should you so desire.

    You may use normal DBRef objects as relationships in your entities if you desire neither type safety nor GWT-ability.

    @author Jeff Schnitzer (from Objectify codebase) @author Scott Hernandez (adapted to morphia/mongodb)
  • org.nfctools.mf.classic.Key
  • org.objectstyle.wolips.eomodeler.core.kvc.Key
  • org.onelab.filter.Key
    The general behavior of a key that must be stored in a filter. @see org.onelab.filter.Filter The general behavior of a filter
  • org.openstreetmap.josm.gui.tagging.TaggingPresetItems.Key
  • org.quartz.utils.Key

    Object representing a job or trigger key.

    @author Jeffrey Wescott
  • org.raml.parser.annotation.Key
  • org.sdnplatform.sync.internal.store.Key
    Represent a key in the sync system. Keys consist of a namespace and a key name. Namespaces should be dot-separated such as "com.bigswitch.device" @author readams
  • org.ugate.resources.RS.KEY
  • org.woped.quantana.graph.Key
  • org.xdams.xw.utility.Key
    @author sandroPer modificare il modello associato al commento di questo tipo generato, aprire Finestra>Preferenze>Java>Generazione codice>Codice e commenti
  • railo.runtime.type.Collection.Key
  • se.unlogic.standardutils.dao.annotations.Key
  • sprites.io.Key
  • uk.org.ogsadai.config.Key
  • water.Key
    Keys This class defines: - A Key's bytes (name) & hash - Known Disk & memory replicas. - A cache of somewhat expensive to compute stuff related to the current Cloud, plus a byte of the desired replication factor. Keys are expected to be a high-count item, hence the care about size. Keys are *interned* in the local K/V store, a non-blocking hash set and are kept pointer equivalent (via the interning) for cheap compares. The interning only happens after a successful insert in the local H2O.STORE via H2O.put_if_later. @author @version 1.0
  • winterwell.utils.Key
    For doing type-safe multi-class maps. Can be sorted by key name. @see Properties @see IProperties @author daniel
  • xbird.storage.index.Key
    Key extends Value by providing a hash value for the Key.
    @author Makoto YUI (yuin405+xbird@gmail.com)

  • Examples of at.jta.Key

                try {
                    Regor regor = new Regor();

                    //The structure for Python is something as Software\\Python\\PythonCore\\2.6\\InstallPath
                    for (Key root : new Key[] { Regor.HKEY_LOCAL_MACHINE, Regor.HKEY_CURRENT_USER }) {
                        Key key = regor.openKey(root, "Software\\Python\\PythonCore", Regor.KEY_READ);
                        if (key != null) {
                            try {
                                List l = regor.listKeys(key);
                                for (Object o : l) {
                                    Key openKey = regor.openKey(key, (String) o + "\\InstallPath", Regor.KEY_READ);
                                    if (openKey != null) {
                                        try {
                                            byte buf[] = regor.readValue(openKey, "");
                                            if (buf != null) {
                                                String parseValue = Regor.parseValue(buf);
    View Full Code Here

    Examples of chord.Key

         * @return The peer that is responsible for this key
         * @throws RemoteException
         */
        private final Peer findIndexer(String restaurant) throws RemoteException
        {
            return this.tracker.getRandomPeer().findSuccessor(new Key(restaurant));
        }
    View Full Code Here

    Examples of com.aerospike.client.Key

       * @return          {@link ClResult} containing bin name/value pairs
       */
      public ClResult getAllDigest(String namespace, byte[] digest,
          ClOptions opts) {
        try {
          Record record = super.get(getPolicy(opts), new Key(namespace, digest));
          return getResult(record);
        }
        catch (AerospikeException ae) {
          return getResult(ae);
        }
    View Full Code Here

    Examples of com.alu.e3.data.model.Key

          }
        }
      }
     
      private void doKeyStoreUpdate(DataEntryEvent<String, Key> event) {
        final Key key = event.getValue();
        Certificate cert = null;
        if(key.getActiveCertId() != null && key.getActiveCertId().length() > 0) {
          try {
            cert = dataManager.getCertById(key.getActiveCertId());       
          }
          catch (InvalidIDException e) {
            LOG.error("Certificate not found "+key.getActiveCertId(), e);
            throw new RuntimeException("Certificate not found "+key.getActiveCertId());
          }
        }
       
        if(cert == null){
          // A key has been uploaded without a certificate. Don't add it to the keystore.
          // This is a standard use-case. Don't error.     
          return;
        }

        PrivateKey jkey = null;
        java.security.cert.Certificate jcert = null;
       
        try {
         
          PasswordFinder passwordFinder = null;
         
          if (key.getKeyPassphrase() != null) {
            passwordFinder = new PasswordFinder() {
             
              @Override
              public char[] getPassword() {
                return key.getKeyPassphrase().toCharArray();
              }
            };
          }
         
          PEMReader pemr = new PEMReader(new StringReader(key.getData()), passwordFinder);
          Object pemobj = pemr.readObject();
          if(pemobj instanceof KeyPair){
            jkey = ((KeyPair)pemobj).getPrivate();
          } else if (pemobj instanceof PrivateKey){
            jkey = (PrivateKey)pemobj;
          } else {
            LOG.error("The PEM object in Key "+key.getId()+" is not a Private Key");
            throw new RuntimeException("The PEM object in Key "+key.getId()+" is not a Private Key");
          }
        } catch(IOException e){
          LOG.error("Failed to read Key "+key.getId()+" data.", e);
          throw new RuntimeException("Failed to read Key "+key.getId()+" data.");
        }
       
        try{
          PEMReader pemr = new PEMReader(new StringReader(cert.getData()));
          Object pemobj = pemr.readObject();
    View Full Code Here

    Examples of com.alu.e3.prov.restapi.model.Key

        provisionData.setTdrOnLimitReached    (api.getTdrOnLimitReached());
        provisionData.setStatus          (fromDataModel(api.getApiDetail().getStatus()));
        provisionData.setHttps          (fromDataModel(api.getApiDetail().getHttps()));

        for(String keyname : api.getProperties().keySet()){
          Key k = new Key();
          k.setName(keyname);
          k.setValue(api.getProperties().get(keyname));
          provisionData.getProperties().add(k);
        }

        provisionData.setHeaderTransformations  (BeanConverterUtil.<com.alu.e3.prov.restapi.model.HeaderTransformation,HeaderTransformation>fromDataModels(api.getHeaderTransformations()));
    View Full Code Here

    Examples of com.alvazan.orm.api.z8spi.Key

      private DirectCursor<IndexColumnInfo> processIndexColumn(ExpressionNode root, ScanInfo scanInfo, ViewInfoImpl viewInfo, DboColumnMeta info) {
        AbstractCursor<IndexColumn> scan;
        if(root.getType() == NoSqlLexer.EQ) {
          byte[] data = retrieveValue(info, root.getChild(ChildSide.RIGHT));
          Key key = new Key(data, true);
          scan = session.scanIndex(scanInfo, key, key, batchSize);
        } else if(root.getType() == NoSqlLexer.GT
            || root.getType() == NoSqlLexer.GE
            || root.getType() == NoSqlLexer.LT
            || root.getType() == NoSqlLexer.LE
            || root.isBetweenExpression()) {
          Key from = null;
          Key to = null;
          if(root.isBetweenExpression()) {
            ExpressionNode node = root.getGreaterThan();
            ExpressionNode node2 = root.getLessThan();
            from = createLeftKey(node, info);
            to = createRightKey(node2, info);
    View Full Code Here

    Examples of com.amazonaws.services.dynamodb.model.Key

                }
                rangeKeyElement = getRangeKeyElement(rangeKey, rangeKeyMethod);
            }

            GetItemResult item = db.getItem(applyUserAgent(new GetItemRequest().withTableName(tableName)
                    .withKey(new Key().withHashKeyElement(hashKeyElement).withRangeKeyElement(rangeKeyElement))
                    .withConsistentRead(config.getConsistentReads() == ConsistentReads.CONSISTENT)));
            Map<String, AttributeValue> itemAttributes = item.getItem();
            if ( itemAttributes == null ) {
                return null;
            }
    View Full Code Here

    Examples of com.ardor3d.input.Key

                final int keyCode = Keyboard.getEventKey();
                final boolean pressed = Keyboard.getEventKeyState();
                final char keyChar = Keyboard.getEventCharacter();

                final Key k = LwjglKey.findByCode(keyCode);

                return new KeyEvent(k, pressed ? KeyState.DOWN : KeyState.UP, keyChar);
            }
    View Full Code Here

    Examples of com.asakusafw.vocabulary.model.Key

        private Matcher<Key> grouping(final String... properties) {
            return new BaseMatcher<Key>() {
                @Override
                public boolean matches(Object object) {
                    if (object instanceof Key) {
                        Key elem = (Key) object;
                        if (Arrays.equals(elem.group(), properties) == false) {
                            return false;
                        }
                    }
                    return true;
                }
    View Full Code Here

    Examples of com.bacoder.parser.javaproperties.api.Key

        super(adapters);
      }

      @Override
      public Key adapt(KeyContext context) {
        Key key = createData(context);
        key.setText(context.getText());
        return key;
      }
    View Full Code Here
    TOP
    Copyright © 2018 www.massapi.com. All rights reserved.
    All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.