Link to figures in Java Cryptography Architecture (JCA) Reference Guide
Link to figures in How to Implement a Provider
This image consists of five cylinders that represent the following:
ProviderA: Message digest implementations SHA384 and SHA512ProviderB: Message digest implementations SHA256 and SHA384ProviderC: Message digest implementations SHA256 and SHA512An arrow representing a call to
MessageDigest.getInstance("SHA-256") starts from the Application
cylinder and passes through the following cylinders in the indicated order:
ProviderAProviderBThe arrow ends at the Application cylinder. The call to
MessageDigest.getInstance("SHA-256") has returned a SHA-256 message
digest implementation from ProviderB.
This image consists of five cylinders that represent the following:
ProviderA: Message digest implementations SHA384 and SHA512ProviderB: Message digest implementations SHA256 and SHA384ProviderC: Message digest implementations SHA256 and SHA512An arrow representing a call to
MessageDigest.getInstance("SHA-256", "ProviderC") starts from the
Application cylinder and passes through the following cylinders in the indicated
order:
ProviderCThe arrow ends at the Application cylinder. The call to
MessageDigest.getInstance("SHA-256", "ProviderC") has returned a
SHA-256 message digest implementation from ProviderC.