Lines Matching full:algorithms
32 # more digital signature algorithms or message digest algorithms.
42 # searched for requested algorithms (when no specific provider is
48 # for the Java Security API to look up the algorithms or other
282 # Determines the default key and trust manager factory algorithms for
422 # In some environments, certain algorithms or key lengths may be undesirable
425 # describes the mechanism for disabling algorithms based on algorithm name
426 # and/or key length. This includes algorithms used in certificates, as well
468 # the assertion algorithm name "DSA" will disable all certificate algorithms
470 # will not disable algorithms related to "ECDSA".
484 # This constraint is only used on algorithms that have a key size.
549 # In some environments, certain algorithms or key lengths may be undesirable
552 # mechanism for disabling algorithms based on algorithm name and/or key length.
553 # JARs signed with any of the disabled algorithms or key sizes will be treated
593 # In some environments, certain algorithms or key lengths may be undesirable
595 # algorithms during SSL/TLS security parameters negotiation, including
599 # Disabled algorithms will not be negotiated for SSL/TLS connections, even
603 # of disabled algorithms will also be checked during certification path
604 # building and validation, including algorithms used in certificates, as
622 # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
627 # algorithms may still be supported, but applications should not use them
628 # as the security strength of legacy algorithms are usually not strong enough
631 # During SSL/TLS security parameters negotiation, legacy algorithms will
634 # The syntax of the legacy algorithms string is described as this Java
744 # strengths or algorithms.