-
- All Superinterfaces:
- Key, Serializable
- All Known Subinterfaces:
- PBEKey
- All Known Implementing Classes:
- KerberosKey, SecretKeySpec
public interface SecretKey extends Key
A secret (symmetric) key.This interface contains no methods or constants. Its only purpose is to group (and provide type safety for) secret keys.
Provider implementations of this interface must overwrite the
equals
andhashCode
methods inherited fromjava.lang.Object
, so that secret keys are compared based on their underlying key material and not based on reference.Keys that implement this interface return the string
RAW
as their encoding format (seegetFormat
), and return the raw key bytes as the result of agetEncoded
method call. (ThegetFormat
andgetEncoded
methods are inherited from thejava.security.Key
parent interface.)- Since:
- 1.4
- See Also:
SecretKeyFactory
,Cipher
-
-
Field Summary
Fields Modifier and Type Field and Description static long
serialVersionUID
The class fingerprint that is set to indicate serialization compatibility since J2SE 1.4.
-
Method Summary
-
Methods inherited from interface java.security.Key
getAlgorithm, getEncoded, getFormat
-
-
-
-
Field Detail
-
serialVersionUID
static final long serialVersionUID
The class fingerprint that is set to indicate serialization compatibility since J2SE 1.4.- See Also:
- Constant Field Values
-
-
Document created the 11/06/2005, last modified the 04/03/2020
Source of the printed document:https://www.gaudry.be/en/java-api-rf-javax/crypto/SecretKey.html
The infobrol is a personal site whose content is my sole responsibility. The text is available under CreativeCommons license (BY-NC-SA). More info on the terms of use and the author.
References
These references and links indicate documents consulted during the writing of this page, or which may provide additional information, but the authors of these sources can not be held responsible for the content of this page.
The author This site is solely responsible for the way in which the various concepts, and the freedoms that are taken with the reference works, are presented here. Remember that you must cross multiple source information to reduce the risk of errors.