aboutsummaryrefslogtreecommitdiff
path: root/libjava/classpath/java/security/SignedObject.java
diff options
context:
space:
mode:
Diffstat (limited to 'libjava/classpath/java/security/SignedObject.java')
-rw-r--r--libjava/classpath/java/security/SignedObject.java22
1 files changed, 11 insertions, 11 deletions
diff --git a/libjava/classpath/java/security/SignedObject.java b/libjava/classpath/java/security/SignedObject.java
index be5a674..79f551c 100644
--- a/libjava/classpath/java/security/SignedObject.java
+++ b/libjava/classpath/java/security/SignedObject.java
@@ -48,27 +48,27 @@ import java.io.Serializable;
/**
* <code>SignedObject</code> is used for storing runtime objects whose
* integrity cannot be compromised without being detected.
- *
+ *
* <p><code>SignedObject</code> contains a {@link Serializable} object which is
* yet to be signed and a digital signature of that object.</p>
- *
+ *
* <p>The signed copy is a "deep copy" (in serialized form) of an original
* object. Any changes to that original instance are not reflected in the
* enclosed copy inside this <code>SignedObject</code>.</p>
- *
+ *
* <p>Several things to note are that, first there is no need to initialize the
* signature engine as this class will handle that automatically. Second,
* verification will only succeed if the public key corresponds to the private
* key used to generate the digital signature inside this
* <code>SignedObject</code>.</p>
- *
+ *
* <p>For fexibility, the signature engine can be specified in the constructor
* or the <code>verify()</code> method. Programmers wishing to verify
* <code>SignedObject</code>s should be aware of the {@link Signature} engine
* they use. A malicious or flawed {@link Signature} implementation may always
* return true on verification thus circumventing the intended secrity check
* provided by the <code>SignedObject</code>.</p>
- *
+ *
* <p>The GNU security provider offers an implementation of the standard NIST
* DSA which uses "DSA" and "SHA-1". It can be specified by "SHA/DSA",
* "SHA-1/DSA" or its OID. If the RSA signature algorithm is provided then it
@@ -94,7 +94,7 @@ public final class SignedObject implements Serializable
* Constructs a new instance of <code>SignedObject</code> from a
* {@link Serializable} object. The object is signed with a designated
* private key and a signature engine.
- *
+ *
* @param object
* the object to sign.
* @param signingKey
@@ -109,7 +109,7 @@ public final class SignedObject implements Serializable
* if a signing error occurs.
*/
public SignedObject(Serializable object, PrivateKey signingKey,
- Signature signingEngine)
+ Signature signingEngine)
throws IOException, InvalidKeyException, SignatureException
{
thealgorithm = signingEngine.getAlgorithm();
@@ -130,7 +130,7 @@ public final class SignedObject implements Serializable
/**
* Returns the encapsulated object. The object is de-serialized before being
* returned.
- *
+ *
* @return the encapsulated object.
* @throws IOException
* if a de-serialization error occurs.
@@ -150,7 +150,7 @@ public final class SignedObject implements Serializable
/**
* Returns the signature bytes of the encapsulated object.
- *
+ *
* @return the signature bytes of the encapsulated object.
*/
public byte[] getSignature()
@@ -161,7 +161,7 @@ public final class SignedObject implements Serializable
/**
* Returns the name of the signature algorithm.
- *
+ *
* @return the name of the signature algorithm.
*/
public String getAlgorithm()
@@ -172,7 +172,7 @@ public final class SignedObject implements Serializable
/**
* Verifies the encapsulated digital signature by checking that it was
* generated by the owner of a designated public key.
- *
+ *
* @param verificationKey
* the public key to use.
* @param verificationEngine