public class SecretKeySpec extends Object implements KeySpec, SecretKey
It can be used to construct a SecretKey
from a byte array,
without having to go through a (provider-based)
SecretKeyFactory
.
This class is only useful for raw secret keys that can be represented as a byte array and have no key parameters associated with them, e.g., DES or Triple DES keys.
SecretKey
,
SecretKeyFactory
,
Serialized Form Constructor and Description |
---|
SecretKeySpec (byte[] key,
int offset,
int len,
String algorithm)
Constructs a secret key from the given byte array, using the first
len bytes of key , starting at
offset inclusive. |
SecretKeySpec (byte[] key,
String algorithm)
Constructs a secret key from the given byte array.
|
Modifier and Type | Method and Description |
---|---|
boolean |
equals (Object obj)
Tests for equality between the specified object and this
object.
|
String |
getAlgorithm ()
Returns the name of the algorithm associated with this secret key.
|
byte[] |
getEncoded ()
Returns the key material of this secret key.
|
String |
getFormat ()
Returns the name of the encoding format for this secret key.
|
int |
hashCode ()
Calculates a hash code value for the object.
|
public SecretKeySpec(byte[] key, String algorithm)
This constructor does not check if the given bytes indeed specify a
secret key of the specified algorithm. For example, if the algorithm is
DES, this constructor does not check if key
is 8 bytes
long, and also does not check for weak or semi-weak keys.
In order for those checks to be performed, an algorithm-specific
key specification class (in this case:
DESKeySpec
)
should be used.
key
- the key material of the secret key. The contents of
the array are copied to protect against subsequent modification.algorithm
- the name of the secret-key algorithm to be associated
with the given key material.
See Appendix A in the
Java Cryptography Architecture Reference Guide
for information about standard algorithm names.IllegalArgumentException
- if algorithm
is null or key
is null or empty.public SecretKeySpec(byte[] key, int offset, int len, String algorithm)
len
bytes of key
, starting at
offset
inclusive.
The bytes that constitute the secret key are
those between key[offset]
and
key[offset+len-1]
inclusive.
This constructor does not check if the given bytes indeed specify a
secret key of the specified algorithm. For example, if the algorithm is
DES, this constructor does not check if key
is 8 bytes
long, and also does not check for weak or semi-weak keys.
In order for those checks to be performed, an algorithm-specific key
specification class (in this case:
DESKeySpec
)
must be used.
key
- the key material of the secret key. The first
len
bytes of the array beginning at
offset
inclusive are copied to protect
against subsequent modification.offset
- the offset in key
where the key material
starts.len
- the length of the key material.algorithm
- the name of the secret-key algorithm to be associated
with the given key material.
See Appendix A in the
Java Cryptography Architecture Reference Guide
for information about standard algorithm names.IllegalArgumentException
- if algorithm
is null or key
is null, empty, or too short,
i.e. key.length-offset.
ArrayIndexOutOfBoundsException
- is thrown if
offset
or len
index bytes outside the
key
.public String getAlgorithm()
getAlgorithm
in interface Key
public String getFormat()
public byte[] getEncoded()
getEncoded
in interface Key
public int hashCode()
hashCode
in class Object
Object.equals(java.lang.Object)
,
System.identityHashCode(java.lang.Object)
public boolean equals(Object obj)
equals
in class Object
obj
- the object to test for equality with this object.obj
is null or otherwise.Object.hashCode()
,
HashMap
Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2020, Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.
Scripting on this page tracks web page traffic, but does not change the content in any way.