Lines Matching full:algorithms
32 # more digital signature algorithms or message digest algorithms.
42 # searched for requested algorithms (when no specific provider is
48 # for the Java Security API to look up the algorithms or other
279 # Determines the default key and trust manager factory algorithms for
419 # In some environments, certain algorithms or key lengths may be undesirable
422 # describes the mechanism for disabling algorithms based on algorithm name
423 # and/or key length. This includes algorithms used in certificates, as well
465 # the assertion algorithm name "DSA" will disable all certificate algorithms
467 # will not disable algorithms related to "ECDSA".
481 # This constraint is only used on algorithms that have a key size.
546 # In some environments, certain algorithms or key lengths may be undesirable
549 # mechanism for disabling algorithms based on algorithm name and/or key length.
550 # JARs signed with any of the disabled algorithms or key sizes will be treated
590 # In some environments, certain algorithms or key lengths may be undesirable
592 # algorithms during SSL/TLS security parameters negotiation, including
596 # Disabled algorithms will not be negotiated for SSL/TLS connections, even
600 # of disabled algorithms will also be checked during certification path
601 # building and validation, including algorithms used in certificates, as
619 # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
624 # algorithms may still be supported, but applications should not use them
625 # as the security strength of legacy algorithms are usually not strong enough
628 # During SSL/TLS security parameters negotiation, legacy algorithms will
631 # The syntax of the legacy algorithms string is described as this Java
741 # strengths or algorithms.