No cache version.

Caching disabled. Default setting for this page:enabled (code LNG204)
If the display is too slow, you can disable the user mode to view the cached version.
java.security.spec

Class EncodedKeySpec

    • Constructor Detail

      • EncodedKeySpec

        public EncodedKeySpec(byte[] encodedKey)
        Creates a new EncodedKeySpec with the given encoded key.
        Parameters:
        encodedKey - the encoded key. The contents of the array are copied to protect against subsequent modification.
        Throws:
        NullPointerException - if encodedKey is null.
    • Method Detail

      • getEncoded

        public byte[] getEncoded()
        Returns the encoded key.
        Returns:
        the encoded key. Returns a new array each time this method is called.
      • getFormat

        public abstract String getFormat()
        Returns the name of the encoding format associated with this key specification.

        If the opaque representation of a key (see Key) can be transformed (see KeyFactory) into this key specification (or a subclass of it), getFormat called on the opaque key returns the same value as the getFormat method of this key specification.

        Returns:
        a string representation of the encoding format.

Document created the 11/06/2005, last modified the 04/03/2020
Source of the printed document:https://www.gaudry.be/en/java-api-rf-java/security/spec/encodedkeyspec.html/.html/.html

The infobrol is a personal site whose content is my sole responsibility. The text is available under CreativeCommons license (BY-NC-SA). More info on the terms of use and the author.

References

  1. View the html document Language of the document:fr Manuel PHP : https://docs.oracle.com

These references and links indicate documents consulted during the writing of this page, or which may provide additional information, but the authors of these sources can not be held responsible for the content of this page.
The author This site is solely responsible for the way in which the various concepts, and the freedoms that are taken with the reference works, are presented here. Remember that you must cross multiple source information to reduce the risk of errors.

Contents Haut