Link to figures in Java Cryptography Architecture (JCA) Reference Guide
Link to figures in How to Implement a Provider
This image consists of five cylinders that represent the following:
ProviderA
: Message digest implementations SHA384 and SHA512ProviderB
: Message digest implementations SHA256 and SHA384ProviderC
: Message digest implementations SHA256 and SHA512An arrow representing a call to
MessageDigest.getInstance("SHA-256")
starts from the Application
cylinder and passes through the following cylinders in the indicated order:
ProviderA
ProviderB
The arrow ends at the Application cylinder. The call to
MessageDigest.getInstance("SHA-256")
has returned a SHA-256 message
digest implementation from ProviderB
.
This image consists of five cylinders that represent the following:
ProviderA
: Message digest implementations SHA384 and SHA512ProviderB
: Message digest implementations SHA256 and SHA384ProviderC
: Message digest implementations SHA256 and SHA512An arrow representing a call to
MessageDigest.getInstance("SHA-256", "ProviderC")
starts from the
Application cylinder and passes through the following cylinders in the indicated
order:
ProviderC
The arrow ends at the Application cylinder. The call to
MessageDigest.getInstance("SHA-256", "ProviderC")
has returned a
SHA-256 message digest implementation from ProviderC
.