JDK 17 | JDK 21 | JDK 22 |
---|---|---|
17.0.13-oracleResolved | 21.0.5-oracleResolved | 22Resolved |
When instantiating a third-party security provider's implementation (class) of a `KEM` algorithm, the framework will determine the provider's codebase (JAR file) and verify its signature. In this way, JCA authenticates the provider and ensures that only providers signed by a trusted entity can be plugged into the JCA. This is consistent with other JCE service classes, such as `Cipher`, `Mac`, `KeyAgreement`, and others.