- All Superinterfaces:
- All Known Subinterfaces:
- All Known Implementing Classes:
Provider implementations of this interface must overwrite the
hashCode methods inherited from
Object, so that secret keys are compared based on
their underlying key material and not based on reference.
Implementations should override the default
isDestroyed methods from the
Destroyable interface to enable
sensitive key information to be destroyed, cleared, or in the case
where such information is immutable, unreferenced.
should also override
to prevent keys that have been destroyed from being serialized.
Keys that implement this interface return the string
as their encoding format (see
getFormat), and return the
raw key bytes as the result of a
getEncoded method call. (The
getEncoded methods are inherited
Key parent interface.)
- See Also:
Field SummaryModifier and TypeFieldDescription
static final longDeprecated.
Methods declared in interface javax.security.auth.Destroyable
Methods declared in interface java.security.Key
getAlgorithm, getEncoded, getFormat
serialVersionUID@Deprecated static final long serialVersionUIDDeprecated.A
serialVersionUIDfield in an interface is ineffectual. Do not use; no replacement.The class fingerprint that is set to indicate serialization compatibility since J2SE 1.4.
- See Also:
serialVersionUIDfield in an interface is ineffectual.