|
||||||||||
PREV NEXT | FRAMES NO FRAMES |
update(cryptix.mime.LegacyString.toByteArray(message,
offset, length))
instead.
update(cryptix.mime.LegacyString.toByteArray(message))
instead.
update(data)
instead.
update(data, offset, length)
.
blockSize()
,
getPlaintextBlockSize()
or
getCiphertextBlockSize()
instead.
cryptix.mime.LegacyString.toByteArray(text)
instead.
new MessageHash("MD5", hash)
instead.
new MessageHash("SHA-1", hash)
instead.
new MessageHash("SHA-0", hash)
instead.
initDecrypt(key)
and
update(buf, 0, buf.length, text, 0)
instead.
initDecrypt(key)
and
update(in, 0, in.length, out, 0)
instead.
initDecrypt(key)
and update(in, inOffset,
blockSize, out, outOffset)
instead.
md.digestAsHash()
with
MessageHash.fromDigest(md)
.
initEncrypt(key)
and
update(buf, 0, buf.length, text, 0)
instead.
initEncrypt(key)
and
update(in, 0, in.length, out, 0)
instead.
initEncrypt(key)
and update(in, inOffset,
blockSize, out, outOffset)
instead.
fetch()
is overridden by child classes to provide the 'meat'
of these classes.
KeyClient.getKey()
to fetch a key using a
specific protocol.
digest()
method on md.
digest(byte[])
method on md.
CryptixProperties.getMajorVersion()
.
CryptixProperties.getMinorVersion()
.
CryptixProperties.getVersionString()
.
MessageHash.fromDigest(md)
.
new MessageHash("MD5", hash)
(note that
this does not check the hash length).
MessageHash.fromDigest(md)
.
new MessageHash("SHA-1", hash)
(note that
this does not check the hash length).
MessageHash.fromDigest(md)
.
new MessageHash("SHA-0", hash)
(note that
this does not check the hash length).
MessageDigest.getInstance("MD5", "Cryptix").digest(cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageDigest.getInstance("MD5", "Cryptix").digest(data)
instead.
md.digest(data)
instead.
MessageDigest.getInstance("SHA-1", "Cryptix").digest(cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageDigest.getInstance("SHA-1", "Cryptix").digest(data)
instead.
MessageDigest.getInstance("SHA-0", "Cryptix").digest(cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageDigest.getInstance("SHA-0", "Cryptix").digest(data)
instead.
MessageHash.fromDigest(MessageDigest.getInstance("MD5", "Cryptix"),
cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageHash.fromDigest(MessageDigest.getInstance("MD5", "Cryptix"),
data)
instead.
MessageHash.fromDigest(MessageDigest.getInstance("SHA-1", "Cryptix"),
cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageHash.fromDigest(MessageDigest.getInstance("SHA-1", "Cryptix"),
data)
instead.
MessageHash.fromDigest(MessageDigest.getInstance("SHA-0", "Cryptix"),
cryptix.mime.LegacyString.toByteArray(str))
instead.
MessageHash.fromDigest(MessageDigest.getInstance("SHA-0", "Cryptix"),
data)
instead.
getDigestLength()
instead.
encode()
or any similar generator
that complies with the RFC.
encodeAsByteArray()
or any similar generator that complies
with the RFC.
getDigestLength()
instead.
self_test
.
self_test
.
self_test
.
self_test
.
getAlgorithm()
instead.
readPacket()
, readKeyRingEntry()
and
readUserIdCertificate()
methods to DataInputStream.writePacket()
, writeKeyRingEntry()
and
writeUserIdCertificate()
methods to DataOutputStream.ArrayUtil.areEqual(a, b)
instead.
toByteArray(s, 0, s.length())
.
getData()
instead.
toByteArray(s, 0, s.length())
.
toByteArray(s, offset, length)
,
but throws an IllegalArgumentException if any of the
characters in s are outside the range \u0000 to \u00FF.
toByteArray(s)
,
but throws an IllegalArgumentException if any of the
characters in s are outside the range \u0000 to \u00FF.
toByteArray(s, offset, length)
,
but throws an IllegalArgumentException if any of the
characters in s are outside the range \u0000 to \u00FF.
toByteArray(s)
,
but throws an IllegalArgumentException if any of the
characters in s are outside the range \u0000 to \u00FF.
toString(b, 0, b.length)
.
toString(b, 0, b.length)
.
|
||||||||||
PREV NEXT | FRAMES NO FRAMES |