Lines Matching defs:algorithm

57  * for the syntax of the disabled algorithm string.
78 * Initialize algorithm constraints with the specified security property.
81 * algorithm constraints
88 * Initialize algorithm constraints with the specified security property
92 * algorithm constraints
103 * This only checks if the algorithm has been completely disabled. If
104 * there are keysize or other limit, this method allow the algorithm.
108 String algorithm, AlgorithmParameters parameters) {
109 return checkAlgorithm(disabledAlgorithms, algorithm, decomposer);
113 * Checks if the key algorithm has been disabled or constraints have been
122 * Checks if the key algorithm has been disabled or if constraints have
127 String algorithm, Key key, AlgorithmParameters parameters) {
129 if (algorithm == null || algorithm.length() == 0) {
130 throw new IllegalArgumentException("No algorithm name specified");
133 return checkConstraints(primitives, algorithm, key, parameters);
141 public final void permits(String algorithm, Key key,
144 permits(algorithm, new ConstraintsParameters(algorithm, params, key,
156 public final void permits(String algorithm, ConstraintsParameters cp)
158 algorithmConstraints.permits(algorithm, cp);
172 // Check algorithm constraints with key and algorithm
174 String algorithm, Key key, AlgorithmParameters parameters) {
181 // check the signature algorithm with parameters
182 if (algorithm != null && algorithm.length() != 0) {
183 if (!permits(primitives, algorithm, parameters)) {
188 // check the key algorithm
201 * The complete disabling of an algorithm is not handled by Constraints or
236 // algorithm or has conditions.
238 String algorithm = AlgorithmDecomposer.hashName(
243 constraintsMap.getOrDefault(algorithm,
245 constraintsMap.putIfAbsent(algorithm, constraintList);
247 constraintList.add(new DisabledConstraint(algorithm));
275 c = new KeySizeConstraint(algorithm,
288 c = new jdkCAConstraint(algorithm);
305 c = new DenyAfterConstraint(algorithm, year, month,
310 c = new UsageConstraint(algorithm, s);
331 // Get applicable constraints based off the signature algorithm
332 private List<Constraint> getConstraints(String algorithm) {
333 return constraintsMap.get(algorithm);
355 public void permits(String algorithm, ConstraintsParameters cp)
360 debug.println("Constraints.permits(): " + algorithm +
366 if (algorithm != null) {
367 algorithms.addAll(AlgorithmDecomposer.decomposeOneHash(algorithm));
370 // Attempt to add the public key algorithm if cert provided
391 * This abstract Constraint class for algorithm-based checking
400 String algorithm;
434 * Check if an algorithm constraint is permitted with a given key.
448 * Check if an algorithm constraint is permitted with a given
523 algorithm = algo;
534 debug.println("jdkCAConstraints.permits(): " + algorithm);
544 "anchor limits. " + algorithm + extendedMsg(cp),
562 algorithm = algo;
625 "denyAfter constraint check failed: " + algorithm +
642 debug.println("DenyAfterConstraints.permits(): " + algorithm);
656 UsageConstraint(String algorithm, String[] usages) {
657 this.algorithm = algorithm;
689 usage + " check failed: " + algorithm +
699 * support limits per algorithm. e.g. "keySize <= 1024"
708 algorithm = algo;
764 algorithm + " " + KeyUtil.getKeySize(key) + "bit key" +
780 debug.println("KeySizeConstraints.permits(): " + algorithm);
787 // Verify this constraint is for this public key algorithm
788 if (algorithm.compareToIgnoreCase(key.getAlgorithm()) != 0) {
806 * This constraint is used for the complete disabling of the algorithm.
810 algorithm = algo;
817 "algorithm: " + algorithm + extendedMsg(cp),