8015388: Required algorithms for JDK 9
Reviewed-by: jnimeh, wetmore, xuelei
This commit is contained in:
parent
a48c66ffbf
commit
d323a04105
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 1997, 2013, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -70,8 +70,8 @@ import java.security.spec.AlgorithmParameterSpec;
|
||||
* following standard {@code AlgorithmParameterGenerator} algorithms and
|
||||
* keysizes in parentheses:
|
||||
* <ul>
|
||||
* <li>{@code DiffieHellman} (1024)</li>
|
||||
* <li>{@code DSA} (1024)</li>
|
||||
* <li>{@code DiffieHellman} (1024, 2048, 4096)</li>
|
||||
* <li>{@code DSA} (1024, 2048)</li>
|
||||
* </ul>
|
||||
* These algorithms are described in the <a href=
|
||||
* "{@docRoot}/../technotes/guides/security/StandardNames.html#AlgorithmParameterGenerator">
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 1997, 2014, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -109,9 +109,9 @@ import sun.security.util.Debug;
|
||||
* following standard {@code KeyPairGenerator} algorithms and keysizes in
|
||||
* parentheses:
|
||||
* <ul>
|
||||
* <li>{@code DiffieHellman} (1024)</li>
|
||||
* <li>{@code DSA} (1024)</li>
|
||||
* <li>{@code RSA} (1024, 2048)</li>
|
||||
* <li>{@code DiffieHellman} (1024, 2048, 4096)</li>
|
||||
* <li>{@code DSA} (1024, 2048)</li>
|
||||
* <li>{@code RSA} (1024, 2048, 4096)</li>
|
||||
* </ul>
|
||||
* These algorithms are described in the <a href=
|
||||
* "{@docRoot}/../technotes/guides/security/StandardNames.html#KeyPairGenerator">
|
||||
|
@ -102,6 +102,7 @@ import sun.security.jca.GetInstance.Instance;
|
||||
* following standard {@code Signature} algorithms:
|
||||
* <ul>
|
||||
* <li>{@code SHA1withDSA}</li>
|
||||
* <li>{@code SHA256withDSA}</li>
|
||||
* <li>{@code SHA1withRSA}</li>
|
||||
* <li>{@code SHA256withRSA}</li>
|
||||
* </ul>
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 1997, 2014, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -37,11 +37,13 @@ import sun.security.jca.GetInstance;
|
||||
* secure random bytes.
|
||||
*
|
||||
* <p> Every implementation of the Java platform is required to support the
|
||||
* following standard {@code SSLContext} protocol:
|
||||
* following standard {@code SSLContext} protocols:
|
||||
* <ul>
|
||||
* <li>{@code TLSv1}</li>
|
||||
* <li>{@code TLSv1.1}</li>
|
||||
* <li>{@code TLSv1.2}</li>
|
||||
* </ul>
|
||||
* This protocol is described in the <a href=
|
||||
* These protocols are described in the <a href=
|
||||
* "{@docRoot}/../technotes/guides/security/StandardNames.html#SSLContext">
|
||||
* SSLContext section</a> of the
|
||||
* Java Cryptography Architecture Standard Algorithm Name Documentation.
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 1999, 2012, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1999, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -34,7 +34,19 @@ import sun.security.jca.GetInstance;
|
||||
* This class acts as a factory for trust managers based on a
|
||||
* source of trust material. Each trust manager manages a specific
|
||||
* type of trust material for use by secure sockets. The trust
|
||||
* material is based on a KeyStore and/or provider specific sources.
|
||||
* material is based on a KeyStore and/or provider-specific sources.
|
||||
*
|
||||
* <p> Every implementation of the Java platform is required to support the
|
||||
* following standard {@code TrustManagerFactory} algorithm:
|
||||
* <ul>
|
||||
* <li><tt>PKIX</tt></li>
|
||||
* </ul>
|
||||
* This algorithm is described in the <a href=
|
||||
* "{@docRoot}/../technotes/guides/security/StandardNames.html#TrustManagerFactory">
|
||||
* TrustManagerFactory section</a> of the
|
||||
* Java Cryptography Architecture Standard Algorithm Name Documentation.
|
||||
* Consult the release documentation for your implementation to see if any
|
||||
* other algorithms are supported.
|
||||
*
|
||||
* @since 1.4
|
||||
* @see TrustManager
|
||||
|
Loading…
Reference in New Issue
Block a user