Open In App
Related Articles

Provider keys() method in Java with Examples

Improve
Improve
Improve
Like Article
Like
Save Article
Save
Report issue
Report

The keys() method of java.security.Provider class is used to return an enumeration of the keys in this hashtable.

Syntax: 

public Enumeration keys()

Return Value: This method returns an enumeration of the keys in this hashtable.

Below are the examples to illustrate the keys() method:

Program 1: 

Java

// Java program to demonstrate
// keys() method
 
import java.security.*;
import java.util.*;
 
public class GFG1 {
    public static void main(String[] argv)
    {
        // Declaring int variable
        int i = 10;
 
        try {
            // creating the object of SecureRandom
            SecureRandom sr = SecureRandom.getInstance("NativePRNGBlocking");
 
            // getting the Provider of the SecureRandom sr
            // by using method getProvider()
            Provider provider = sr.getProvider();
 
            // Declaring the variable of Enumeration<Object> type
            Enumeration<Object> enume;
 
            // getting the enumeration of the keys
            enume = provider.keys();
 
            // printing the enumerated keys
            System.out.println("enumeration of the values: \n");
            while (i > 0) {
                System.out.println("Value is: " + enume.nextElement());
                i--;
            }
        }
 
        catch (NoSuchAlgorithmException e) {
            System.out.println("Exception thrown : " + e);
        }
    }
}

                    

Output: 
enumeration of the values: 

Value is: Alg.Alias.Signature.SHA1/DSA
Value is: Alg.Alias.Signature.1.2.840.10040.4.3
Value is: Alg.Alias.Signature.DSS
Value is: SecureRandom.SHA1PRNG ImplementedIn
Value is: KeyStore.JKS
Value is: Alg.Alias.MessageDigest.SHA-1
Value is: MessageDigest.SHA
Value is: KeyStore.CaseExactJKS
Value is: CertStore.com.sun.security.IndexedCollection ImplementedIn
Value is: Signature.SHA256withDSA

 

Example 2:

Java

// Java program to demonstrate
// keys() method
 
import java.security.*;
import java.util.*;
 
public class GFG1 {
    public static void main(String[] argv)
    {
        // Declaring int variable
        int i = 10;
 
        try {
            // creating the object of Signature
            Signature sr = Signature.getInstance("SHA1withDSA");
 
            // getting the Provider of the Signature sr
            // by using method getProvider()
            Provider provider = sr.getProvider();
 
            // Declaring the variable of Enumeration<Object> type
            Enumeration<Object> enume;
 
            // getting the enumeration of the keys
            enume = provider.keys();
 
            // printing the enumerated keys
            System.out.println("enumeration of the values: \n");
            while (i > 0) {
                System.out.println("Value is: " + enume.nextElement());
                i--;
            }
        }
 
        catch (NoSuchAlgorithmException e) {
            System.out.println("Exception thrown : " + e);
        }
    }
}

                    

Output: 
enumeration of the values: 

Value is: Alg.Alias.Signature.SHA1/DSA
Value is: Alg.Alias.Signature.1.2.840.10040.4.3
Value is: Alg.Alias.Signature.DSS
Value is: SecureRandom.SHA1PRNG ImplementedIn
Value is: KeyStore.JKS
Value is: Alg.Alias.MessageDigest.SHA-1
Value is: MessageDigest.SHA
Value is: KeyStore.CaseExactJKS
Value is: CertStore.com.sun.security.IndexedCollection ImplementedIn
Value is: Signature.SHA256withDSA

 


Last Updated : 30 Jan, 2023
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads