Lines Matching refs:algorithm
89 # The property is a comma-separated list of serviceType.algorithm:provider
91 # not specified, the algorithm applies to all service types that support it.
92 # The algorithm is the standard algorithm name or transformation.
99 # algorithms together. The type is "Group" and is followed by an algorithm
143 # the traditional system/thread activity algorithm will be used.
166 # This is a comma-separated list of algorithm and/or algorithm:provider
175 # with a DRBG algorithm name, and can be instantiated with a security strength,
183 # mechanism and DRBG algorithm names are not currently configurable by any API.
201 # // The DRBG algorithm name. The "SHA-***" names are for Hash_DRBG and
329 ssl.KeyManagerFactory.algorithm=SunX509
330 ssl.TrustManagerFactory.algorithm=PKIX
513 # generally no longer considered to be a secure hash algorithm. This section
514 # describes the mechanism for disabling algorithms based on algorithm name
517 # The syntax of the disabled algorithm string is described as follows:
538 # Integer value of the algorithm's key length in bits
552 # The "AlgorithmName" is the standard algorithm name of the disabled
553 # algorithm. See the Java Security Standard Algorithm Names Specification
558 # sub-element of the certificate algorithm name, the algorithm will be
560 # the assertion algorithm name "DSA" will disable all certificate algorithms
578 # "AlgorithmName" is of a key algorithm. The "KeyLength" indicates
588 # This constraint prohibits the specified algorithm only if the
589 # algorithm is used in a certificate chain that terminates at a marked
591 # constraint is not set, then all chains using the specified algorithm
599 # This constraint prohibits a certificate with the specified algorithm
602 # constraint date with certificates containing the disabled algorithm
611 # This constraint prohibits the specified algorithm for
612 # a specified usage. This should be used when disabling an algorithm
613 # for all usages is not practical. 'TLSServer' restricts the algorithm
615 # performed. 'TLSClient' restricts the algorithm in TLS client
622 # When an algorithm must satisfy more than one constraint, it must be
630 # before larger keysize constraints of the same algorithm. For example:
633 # Note: The algorithm restrictions do not apply to trust anchors or
650 # In some environments, a certain algorithm or key length may be undesirable.
671 # considered to be a secure hash algorithm. This section describes the
672 # mechanism for disabling algorithms based on algorithm name and/or key length.
676 # The syntax of the disabled algorithm string is described as follows:
699 # Integer value of the algorithm's key length in bits
741 # syntax of the disabled algorithm string.
743 # Note: The algorithm restrictions do not apply to trust anchors or
760 # In some environments, a certain algorithm may be undesirable but it
775 # AlgorithmName (standard JSSE algorithm name)
786 # key exchange algorithm, AES_128_CBC (128 bits AES cipher algorithm in CBC
787 # mode) as the cipher (encryption) algorithm, and SHA-1 as the message digest
788 # algorithm for HMAC.
790 # The LegacyAlgorithm can be one of the following standard algorithm names:
792 # 2. JSSE key exchange algorithm name, e.g., RSA
793 # 3. JSSE cipher (encryption) algorithm name, e.g., AES_128_CBC
794 # 4. JSSE message digest algorithm name, e.g., SHA
797 # Specification for information about the algorithm names.
799 # Note: If a legacy algorithm is also restricted through the
803 # then the algorithm is completely disabled and will not be negotiated.
877 # When the amount of data encrypted exceeds the algorithm value listed below,
889 # A full algorithm transformation.
977 # For AlgConstraint, Uri is the algorithm URI String that is not allowed.
978 # See the XML Signature Recommendation for more information on algorithm
979 # URI Identifiers. For KeySizeConstraint, KeyAlg is the standard algorithm
1177 # If an existing PKCS12 keystore is loaded and then stored, the algorithm and
1180 # is at least one certificate in the existing keystore, the algorithm and
1185 # added certificate will be encrypted (or stored unencrypted if algorithm
1201 # a positive integer, or an unknown algorithm name, an exception will be thrown
1228 # The algorithm used to encrypt a certificate. This can be any non-Hmac PBE
1229 # algorithm defined in the Cipher section of the Java Security Standard
1234 # The iteration count used by the PBE algorithm when encrypting a certificate.
1238 # The algorithm used to encrypt a private key or secret key. This can be
1239 # any non-Hmac PBE algorithm defined in the Cipher section of the Java
1244 # The iteration count used by the PBE algorithm when encrypting a private key
1249 # The algorithm used to calculate the optional MacData at the end of a PKCS12
1250 # file. This can be any HmacPBE algorithm defined in the Mac section of the
1255 # The iteration count used by the MacData algorithm. This value must be a