The serialVersionUID is computed using the signature of a stream of bytes that reflect the class definition. The National Institute of Standards and Technology (NIST) Secure Hash Algorithm (SHA-1) is used to compute a signature for the stream. The first two 32-bit quantities are used to form a 64-bit hash. A java.lang.DataOutputStream is used to convert primitive data types to a sequence of bytes. The values input to the stream are defined by the Java Virtual Machine (VM) specification for classes. The sequence of items in the stream is as follows: 1. The class name written using UTF encoding. 2. The class modifiers written as a 32-bit integer. 3. The name of each interface sorted by name written using UTF encoding. 4. For each field of the class sorted by field name (except private static and private transient fields): 1. The name of the field in UTF encoding. 2. The modifiers of the field written as a 32-bit integer. 3. The descriptor of the field in UTF encoding 5. If a class initializer exists, write out the following: 1. The name of the method, <clinit>, in UTF encoding. 2. The modifier of the method, java.lang.reflect.Modifier.STATIC, written as a 32-bit integer. 3. The descriptor of the method, ()V, in UTF encoding. 6. For each non-private constructor sorted by method name and signature: 1. The name of the method, <init>, in UTF encoding. 2. The modifiers of the method written as a 32-bit integer. 3. The descriptor of the method in UTF encoding. 7. For each non-private method sorted by method name and signature: 1. The name of the method in UTF encoding. 2. The modifiers of the method written as a 32-bit integer. 3. The descriptor of the method in UTF encoding. 8. The SHA-1 algorithm is executed on the stream of bytes produced by DataOutputStream and produces five 32-bit values sha[0..4]. 9. The hash value is assembled from the first and second 32-bit values of the SHA-1 message digest. If the result of the message digest, the five 32-bit words H0 H1 H2 H3 H4, is in an array of five int values named sha, the hash value would be computed as follows: long hash = ((sha[0] >>> 24) & 0xFF) | ((sha[0] >>> 16) & 0xFF) << 8 | ((sha[0] >>> 8) & 0xFF) << 16 | ((sha[0] >>> 0) & 0xFF) << 24 | ((sha[1] >>> 24) & 0xFF) << 32 | ((sha[1] >>> 16) & 0xFF) << 40 | ((sha[1] >>> 8) & 0xFF) << 48 | ((sha[1] >>> 0) & 0xFF) << 56;@author Rajendra Inamdar, Vishal Vishnoi
|
|
|
|
|
|
|
|
|
|
|
|
|
|