Note that these interfaces are intended only for key implementations whose key material is accessible and available. These interfaces are not intended for key implementations whose key material resides in inaccessible, protected storage (such as in a hardware device).
For more developer information on how to use these
interfaces, including information on how to design
Key
classes for hardware devices, please refer
to these cryptographic provider developer guides: