Descriptions of Images from Java Cryptography Architecture (JCA) Reference Guide

The following are text descriptions of images used in Java Cryptography Architecture (JCA) Reference Guide

Description of Figure 1: MD5 Message Digest Implementation

This figure consists of two diagrams. The first diagram represents an application that requests and MD5 algorithm implementation without specifying a provider name. The second diagram represents an application that requests and MD5 algorithm implementation from a specific provider:

Without Specifying Provider Name

This figure consists of five cylinders arranged in three rows. These cylinders, from top to bottom, are labeled as follows:

An arrow labeled MessageDigest_getInstance("MD5") with an arrow head labeled "MDS MessageDigest from ProviderB" starts from the Application cylinder and passes through the following objects:

The arrow head points to the Application cylinder.

From Specific Provider

This figure consists of five cylinders arranged in three rows. These cylinders, from top to bottom, are labeled as follows:

An arrow labeled MessageDigest_getInstance("MD5", "ProviderC") with an arrow head labeled "MDS MessageDigest from ProviderC" starts from the Application cylinder and passes through the following objects:

The arrow head points to the Application cylinder.

Description of Figure 2: Example of How Application Retrieves "AES" Cipher Instance

This figure consists of five boxes:

Arrows connect the boxes as follows:

A dotted line connects CSP3 to the headings Provider.class and com.foo.AESCipher.class

Description of Figure 3: Example of Provider Subclass

This figure consists of a cylinder labeled Provider C and a box. Dotted lines are used to indicate that Provider C contains the contents of the box. The box contains the following headers and Java code:

Description of Figure 4: The SecureRandom Class

This figure consists of three boxes labeled as follows:

Labeled arrows connect these boxes:

Description of Figure 5: The MessageDigest Class

This figure consists of three boxes labeled as follows:

Labeled arrows connect these boxes:

Description of Figure 6: The Signature Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Unlabeled arrows connect these boxes:

Description of Figure 7: The Cipher Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Unlabeled arrows connect these boxes:

Description of Figure 8: The Mac Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Unlabeled arrows connect these boxes:

Description of Figure 9: Differences Between Generators and Factories

This figure consists of two diagrams:

Generators

This diagram contains the following caption: Generators — Generate new objects based on initialization parameters

It consists of boxes labeled as follows:

Unlabeled arrows connect these boxes:

Factories

This diagram contains the following caption: Factories — Transform existing specific objects into other object types

It consists of boxes labeled as follows:

Unlabeled arrows connect these boxes:

Description of Figure 10: The KeyFactory Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Unlabeled arrows connect these boxes:

Description of Figure 11: The SecretKeyFactory Class

This figure consists of boxes labeled as follows:

Unlabeled arrows connect these boxes:

Description of Figure 12: The KeyPairGenerator Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Description of Figure 13: The KeyGenerator Class

This figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

Description of Figure 14: The KeyAgreement Class

This figure is divided into halves by a dashed line. The top half is labeled Alice, and the bottom half is labeled Bob. The figure consists of boxes labeled as follows:

Labeled arrows connect these boxes:

A double-headed arrow joins the Bytes boxes in Alice's and Bob's halves. This arrow is labeled "Should be the same."

Description of Figure 15: The KeyStore Class

This figure consists of a table labeled JKS and a cylinder labeled File.

The table JKS contains the following:

Alias Type Data
Brad Secret Key ...
Milton Trusted Certificate ...
Duke Trusted Certificate ...

An arrow labeled store() points from the JKS table to the File cylinder. An arrow labeled load() points from the File cylinder to the JKS cylinder.

Description of Figure 16: SSL Messages

This figure contains two lists of steps that are next to each other. The list to the left is labeled Client. The list to the right is labeled Server.

The Client list contains the following items:

Five empty lines separate item 1. Client hello and item 7. Certificate. Two empty lines separate item 11. Finished and item 14. Finished.

The Server list contains the following items:

Five empty lines separate item 6. Server hello done and item 12. Change cipher spec.

An arrow points from each item in the Client list to the corresponding empty line in the Server list. Similarly, an arrow points from each item in the Server list to the corresponding empty line in the Client list. For items 14 and 15 in the Client and Server lists, double-headed arrows connect them instead.


Copyright © 1993, 2016, Oracle and/or its affiliates. All rights reserved.