javax.crypto.spec

Class SecretKeySpec

  • All Implemented Interfaces:
    Serializable, Key, KeySpec, SecretKey

    public class SecretKeySpec
    extends Object
    implements KeySpec, SecretKey
    This class specifies a secret key in a provider-independent fashion.

    It can be used to construct a SecretKey from a byte array, without having to go through a (provider-based) SecretKeyFactory.

    This class is only useful for raw secret keys that can be represented as a byte array and have no key parameters associated with them, e.g., DES or Triple DES keys.

    Since:
    1.4
    See Also:
    SecretKey, SecretKeyFactory, Serialized Form
    • Constructor Summary

      Constructors 
      Constructor and Description
      SecretKeySpec(byte[] key, int offset, int len, String algorithm)
      Constructs a secret key from the given byte array, using the first len bytes of key, starting at offset inclusive.
      SecretKeySpec(byte[] key, String algorithm)
      Constructs a secret key from the given byte array.

        

    • Constructor Detail

      • SecretKeySpec

        public SecretKeySpec(byte[] key,
                     String algorithm)
        Constructs a secret key from the given byte array.

        This constructor does not check if the given bytes indeed specify a secret key of the specified algorithm. For example, if the algorithm is DES, this constructor does not check if key is 8 bytes long, and also does not check for weak or semi-weak keys. In order for those checks to be performed, an algorithm-specific key specification class (in this case: DESKeySpec) should be used.

        Parameters:
        key - the key material of the secret key. The contents of the array are copied to protect against subsequent modification.
        algorithm - the name of the secret-key algorithm to be associated with the given key material. See Appendix A in the Java Cryptography Architecture Reference Guide for information about standard algorithm names.
        Throws:
        IllegalArgumentException - if algorithm is null or key is null or empty.
      • SecretKeySpec

        public SecretKeySpec(byte[] key,
                     int offset,
                     int len,
                     String algorithm)
        Constructs a secret key from the given byte array, using the first len bytes of key, starting at offset inclusive.

        The bytes that constitute the secret key are those between key[offset] and key[offset+len-1] inclusive.

        This constructor does not check if the given bytes indeed specify a secret key of the specified algorithm. For example, if the algorithm is DES, this constructor does not check if key is 8 bytes long, and also does not check for weak or semi-weak keys. In order for those checks to be performed, an algorithm-specific key specification class (in this case: DESKeySpec) must be used.

        Parameters:
        key - the key material of the secret key. The first len bytes of the array beginning at offset inclusive are copied to protect against subsequent modification.
        offset - the offset in key where the key material starts.
        len - the length of the key material.
        algorithm - the name of the secret-key algorithm to be associated with the given key material. See Appendix A in the Java Cryptography Architecture Reference Guide for information about standard algorithm names.
        Throws:
        IllegalArgumentException - if algorithm is null or key is null, empty, or too short, i.e. key.length-offset.
        ArrayIndexOutOfBoundsException - is thrown if offset or len index bytes outside the key.
    • Method Detail

      • getAlgorithm

        public String getAlgorithm()
        Returns the name of the algorithm associated with this secret key.
        Specified by:
        getAlgorithm in interface Key
        Returns:
        the secret key algorithm.
      • getFormat

        public String getFormat()
        Returns the name of the encoding format for this secret key.
        Specified by:
        getFormat in interface Key
        Returns:
        the string "RAW".
      • getEncoded

        public byte[] getEncoded()
        Returns the key material of this secret key.
        Specified by:
        getEncoded in interface Key
        Returns:
        the key material. Returns a new array each time this method is called.
      • equals

        public boolean equals(Object obj)
        Tests for equality between the specified object and this object. Two SecretKeySpec objects are considered equal if they are both SecretKey instances which have the same case-insensitive algorithm name and key encoding.
        Overrides:
        equals in class Object
        Parameters:
        obj - the object to test for equality with this object.
        Returns:
        true if the objects are considered equal, false if obj is null or otherwise.
        See Also:
        Object.hashCode(), HashMap

Traduction non disponible

Les API Java ne sont pas encore traduites en français sur l'infobrol. Seule la version anglaise est disponible pour l'instant.

Version en cache

21/11/2024 21:32:56 Cette version de la page est en cache (à la date du 21/11/2024 21:32:56) afin d'accélérer le traitement. Vous pouvez activer le mode utilisateur dans le menu en haut pour afficher la dernère version de la page.

Document créé le 31/08/2006, dernière modification le 04/03/2020
Source du document imprimé : https://www.gaudry.be/java-api-rf-javax/crypto/spec/secretkeyspec.html

L'infobrol est un site personnel dont le contenu n'engage que moi. Le texte est mis à disposition sous licence CreativeCommons(BY-NC-SA). Plus d'info sur les conditions d'utilisation et sur l'auteur.

Références

  1. Consulter le document html Langue du document :fr Manuel PHP : https://docs.oracle.com, SecretKeySpec

Ces références et liens indiquent des documents consultés lors de la rédaction de cette page, ou qui peuvent apporter un complément d'information, mais les auteurs de ces sources ne peuvent être tenus responsables du contenu de cette page.
L'auteur de ce site est seul responsable de la manière dont sont présentés ici les différents concepts, et des libertés qui sont prises avec les ouvrages de référence. N'oubliez pas que vous devez croiser les informations de sources multiples afin de diminuer les risques d'erreurs.

Table des matières Haut