< prev index next >
src/java.base/share/classes/com/sun/crypto/provider/JceKeyStore.java
Print this page
*** 66,76 ****
// Private key and supporting certificate chain
private static final class PrivateKeyEntry {
Date date; // the creation date of this entry
byte[] protectedKey;
! Certificate chain[];
};
// Secret key
private static final class SecretKeyEntry {
Date date; // the creation date of this entry
--- 66,76 ----
// Private key and supporting certificate chain
private static final class PrivateKeyEntry {
Date date; // the creation date of this entry
byte[] protectedKey;
! Certificate[] chain;
};
// Secret key
private static final class SecretKeyEntry {
Date date; // the creation date of this entry
*** 637,647 ****
/*
* Write the keyed hash which is used to detect tampering with
* the keystore (such as deleting or modifying key or
* certificate entries).
*/
! byte digest[] = md.digest();
dos.write(digest);
dos.flush();
} finally {
if (oos != null) {
--- 637,647 ----
/*
* Write the keyed hash which is used to detect tampering with
* the keystore (such as deleting or modifying key or
* certificate entries).
*/
! byte[] digest = md.digest();
dos.write(digest);
dos.flush();
} finally {
if (oos != null) {
*** 866,876 ****
* If a password has been provided, we check the keyed digest
* at the end. If this check fails, the store has been tampered
* with
*/
if (password != null) {
! byte computed[], actual[];
computed = md.digest();
actual = new byte[computed.length];
dis.readFully(actual);
for (int i = 0; i < computed.length; i++) {
if (computed[i] != actual[i]) {
--- 866,876 ----
* If a password has been provided, we check the keyed digest
* at the end. If this check fails, the store has been tampered
* with
*/
if (password != null) {
! byte[] computed;byte[] actual;
computed = md.digest();
actual = new byte[computed.length];
dis.readFully(actual);
for (int i = 0; i < computed.length; i++) {
if (computed[i] != actual[i]) {
< prev index next >