Xerces validating parser
Each entry consists of a case-insensitive algorithm name and the corresponding default key size (in decimal) separated by ":". By default, this property will not have a value, and JDK providers will use their own default values.
Entries containing an unrecognized algorithm name will be ignored.
If the new Security property (crypto.policy) is set in the java.security file, or has been set dynamically using the Property() call before the JCE framework has been initialized, that setting will be honored. If the property is undefined and the legacy JCE jurisdiction files don't exist in the legacy lib/security directory, then the default cryptographic level will remain at 'limited'.
To configure the JDK to use unlimited cryptography, set the crypto.policy to a value of 'unlimited'.
A new system property has been introduced that allows users to configure the default key size used by the JDK provider implementations of Key Pair Generator and Algorithm Parameter Generator.
This property is named "jdk.security.default Key Size" and the value of this property is a list of comma-separated entries.
If you need this functionality, please refer to the following deployment invocation methods: 1.
Invalid Key Exception: DSA key must be at most 1024 bits Improve javadoc generation The Javadoc Standard Doclet documentation has been enhanced to specify that it doesn't validate the content of documentation comments for conformance, nor does it attempt to correct any errors in documentation comments.
See the Conformance section in the Doclet documentation.
If the value of this property is "true", the SUN provider will return a DSA Key Pair Generator object which implements the java.security.interfaces. This legacy implementation will use the same default value as specified by the javadoc in the interface.
By default, this property will not have a value, and the SUN provider will return a DSA Key Pair Generator object which does not implement the forementioned interface and thus can determine its own provider-specific default value as stated in the java.security.