Lines Matching full:algorithms
32 # more digital signature algorithms or message digest algorithms.
42 # searched for requested algorithms (when no specific provider is
52 # for the Java Security API to look up the algorithms or other
77 # A list of preferred providers for specific algorithms. These providers will
78 # be searched for matching algorithms before the list of registered providers.
92 # algorithms together. The type is "Group" and is followed by an algorithm
316 # Determines the default key and trust manager factory algorithms for
457 # In some environments, certain algorithms or key lengths may be undesirable
460 # describes the mechanism for disabling algorithms based on algorithm name
461 # and/or key length. This includes algorithms used in certificates, as well
503 # the assertion algorithm name "DSA" will disable all certificate algorithms
505 # will not disable algorithms related to "ECDSA".
519 # This constraint is only used on algorithms that have a key size.
584 # In some environments, certain algorithms or key lengths may be undesirable
587 # mechanism for disabling algorithms based on algorithm name and/or key length.
588 # JARs signed with any of the disabled algorithms or key sizes will be treated
629 # In some environments, certain algorithms or key lengths may be undesirable
631 # algorithms during SSL/TLS/DTLS security parameters negotiation, including
635 # Disabled algorithms will not be negotiated for SSL/TLS connections, even
639 # of disabled algorithms will also be checked during certification path
640 # building and validation, including algorithms used in certificates, as
658 # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
663 # algorithms may still be supported, but applications should not use them
664 # as the security strength of legacy algorithms are usually not strong enough
667 # During SSL/TLS security parameters negotiation, legacy algorithms will
670 # The syntax of the legacy algorithms string is described as this Java