forked from I2P_Developers/i2p.i2p
javadoc fixes
This commit is contained in:
@ -22,8 +22,7 @@ import org.bouncycastle.oldcrypto.macs.I2PHMac;
|
||||
|
||||
/**
|
||||
* Calculate the HMAC-MD5-128 of a key+message. All the good stuff occurs
|
||||
* in {@link org.bouncycastle.oldcrypto.macs.I2PHMac} and
|
||||
* {@link org.bouncycastle.oldcrypto.digests.MD5Digest}.
|
||||
* in {@link org.bouncycastle.oldcrypto.macs.I2PHMac}
|
||||
*
|
||||
* Keys are always 32 bytes.
|
||||
* This is used only by UDP.
|
||||
@ -71,7 +70,8 @@ public class HMACGenerator {
|
||||
/**
|
||||
* Calculate the HMAC of the data with the given key
|
||||
*
|
||||
* @return the first 16 bytes contain the HMAC, the last 16 bytes are zero
|
||||
* @param target out parameter the first 16 bytes contain the HMAC, the last 16 bytes are zero
|
||||
* @param targetOffset offset into target to put the hmac
|
||||
* @throws IllegalArgumentException for bad key or target too small
|
||||
*/
|
||||
public void calculate(SessionKey key, byte data[], int offset, int length, byte target[], int targetOffset) {
|
||||
|
@ -42,7 +42,7 @@ public class KeyCertificate extends Certificate {
|
||||
* A KeyCertificate with crypto type 0 (ElGamal)
|
||||
* and the signature type and extra data from the given public key.
|
||||
*
|
||||
* @param sig non-null data non-null
|
||||
* @param spk non-null data non-null
|
||||
* @throws IllegalArgumentException
|
||||
*/
|
||||
public KeyCertificate(SigningPublicKey spk) {
|
||||
@ -68,7 +68,7 @@ public class KeyCertificate extends Certificate {
|
||||
* If type.getPubkeyLen() is greater than 128, caller MUST
|
||||
* fill in the extra key data in the payload.
|
||||
*
|
||||
* @param sig non-null data non-null
|
||||
* @param type non-null
|
||||
* @throws IllegalArgumentException
|
||||
*/
|
||||
public KeyCertificate(SigType type) {
|
||||
|
Reference in New Issue
Block a user