org.avis.security
Enum SecureHash

java.lang.Object
  extended by java.lang.Enum<SecureHash>
      extended by org.avis.security.SecureHash
All Implemented Interfaces:
Serializable, Comparable<SecureHash>

public enum SecureHash
extends Enum<SecureHash>

An enumeration of supported secure hash algorithms.

Author:
Matthew Phillips

Enum Constant Summary
SHA1
           
 
Method Summary
abstract  byte[] hash(byte[] input)
          Perform the hash scheme on an input byte array.
static SecureHash valueOf(String name)
          Returns the enum constant of this type with the specified name.
static SecureHash[] values()
          Returns an array containing the constants of this enum type, in the order they're declared.
 
Methods inherited from class java.lang.Enum
compareTo, equals, getDeclaringClass, hashCode, name, ordinal, toString, valueOf
 
Methods inherited from class java.lang.Object
getClass, notify, notifyAll, wait, wait, wait
 

Enum Constant Detail

SHA1

public static final SecureHash SHA1
Method Detail

values

public static final SecureHash[] values()
Returns an array containing the constants of this enum type, in the order they're declared. This method may be used to iterate over the constants as follows:
for(SecureHash c : SecureHash.values())
        System.out.println(c);

Returns:
an array containing the constants of this enum type, in the order they're declared

valueOf

public static SecureHash valueOf(String name)
Returns the enum constant of this type with the specified name. The string must match exactly an identifier used to declare an enum constant in this type. (Extraneous whitespace characters are not permitted.)

Parameters:
name - the name of the enum constant to be returned.
Returns:
the enum constant with the specified name
Throws:
IllegalArgumentException - if this enum type has no constant with the specified name

hash

public abstract byte[] hash(byte[] input)
Perform the hash scheme on an input byte array.

Parameters:
input - The data to hash.
Returns:
The hashed result. Length depends on the hash scheme.


Copyright © 2008 Matthew Phillips. All Rights Reserved.