< prev index next >

src/java.base/share/classes/com/sun/crypto/provider/JceKeyStore.java

Print this page

        

*** 66,76 **** // Private key and supporting certificate chain private static final class PrivateKeyEntry { Date date; // the creation date of this entry byte[] protectedKey; ! Certificate chain[]; }; // Secret key private static final class SecretKeyEntry { Date date; // the creation date of this entry --- 66,76 ---- // Private key and supporting certificate chain private static final class PrivateKeyEntry { Date date; // the creation date of this entry byte[] protectedKey; ! Certificate[] chain; }; // Secret key private static final class SecretKeyEntry { Date date; // the creation date of this entry
*** 637,647 **** /* * Write the keyed hash which is used to detect tampering with * the keystore (such as deleting or modifying key or * certificate entries). */ ! byte digest[] = md.digest(); dos.write(digest); dos.flush(); } finally { if (oos != null) { --- 637,647 ---- /* * Write the keyed hash which is used to detect tampering with * the keystore (such as deleting or modifying key or * certificate entries). */ ! byte[] digest = md.digest(); dos.write(digest); dos.flush(); } finally { if (oos != null) {
*** 866,876 **** * If a password has been provided, we check the keyed digest * at the end. If this check fails, the store has been tampered * with */ if (password != null) { ! byte computed[], actual[]; computed = md.digest(); actual = new byte[computed.length]; dis.readFully(actual); for (int i = 0; i < computed.length; i++) { if (computed[i] != actual[i]) { --- 866,876 ---- * If a password has been provided, we check the keyed digest * at the end. If this check fails, the store has been tampered * with */ if (password != null) { ! byte[] computed;byte[] actual; computed = md.digest(); actual = new byte[computed.length]; dis.readFully(actual); for (int i = 0; i < computed.length; i++) { if (computed[i] != actual[i]) {
< prev index next >