Duplicate :
|
|
Relates :
|
|
Relates :
|
|
Relates :
|
|
Relates :
|
Many JDK security provider registers the supported algorithms with a list of aliases including assigned object identifier(s) and/or commonly known aliases. The same algorithms may be supported by multiple providers and each provider creates the aliases separately. This approach may be fragile and error prone. Instead of hardcoing the same information in various places, we should centralize them and re-use as much as possible.
|