<!DOCTYPE html>
<html lang="en">
<head>
  <meta charset="utf-8" />
  <meta name="generator" content="pandoc,fixuphtml" />
  <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes" />
  <title>Java Security Standard Algorithm Names</title>
  <style type="text/css">
      code{white-space: pre-wrap;}
      span.smallcaps{font-variant: small-caps;}
      span.underline{text-decoration: underline;}
      div.column{display: inline-block; vertical-align: top; width: 50%;}
  </style>
  <link rel="stylesheet" href="../../resources/jdk-default.css" />
  <!--[if lt IE 9]>
    <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv-printshiv.min.js"></script>
  <![endif]-->
</head>
<body>
<header id="title-block-header">
<h1 class="title">Java Security Standard Algorithm Names</h1>
</header>
<nav id="TOC" title="Table Of Contents">
<ul>
<li><a href="#algorithmparametergenerator-algorithms"><code>AlgorithmParameterGenerator</code> Algorithms</a></li>
<li><a href="#algorithmparameters-algorithms"><code>AlgorithmParameters</code> Algorithms</a></li>
<li><a href="#certificatefactory-types"><code>CertificateFactory</code> Types</a></li>
<li><a href="#certpath-encodings"><code>CertPath</code> Encodings</a></li>
<li><a href="#certpathbuilder-algorithms"><code>CertPathBuilder</code> Algorithms</a></li>
<li><a href="#certpathvalidator-algorithms"><code>CertPathValidator</code> Algorithms</a></li>
<li><a href="#certstore-types"><code>CertStore</code> Types</a></li>
<li><a href="#cipher-algorithm-names"><code>Cipher</code> Algorithm Names</a></li>
<li><a href="#cipher-algorithm-modes"><code>Cipher</code> Algorithm Modes</a></li>
<li><a href="#cipher-algorithm-paddings"><code>Cipher</code> Algorithm Paddings</a></li>
<li><a href="#configuration-types"><code>Configuration</code> Types</a></li>
<li><a href="#exemption-mechanisms">Exemption Mechanisms</a></li>
<li><a href="#gssapi-mechanisms">GSSAPI Mechanisms</a></li>
<li><a href="#keyagreement-algorithms"><code>KeyAgreement</code> Algorithms</a></li>
<li><a href="#keyfactory-algorithms"><code>KeyFactory</code> Algorithms</a></li>
<li><a href="#keygenerator-algorithms"><code>KeyGenerator</code> Algorithms</a></li>
<li><a href="#keymanagerfactory-algorithms"><code>KeyManagerFactory</code> Algorithms</a></li>
<li><a href="#keypairgenerator-algorithms"><code>KeyPairGenerator</code> Algorithms</a></li>
<li><a href="#keystore-types"><code>KeyStore</code> Types</a></li>
<li><a href="#mac-algorithms"><code>Mac</code> Algorithms</a></li>
<li><a href="#messagedigest-algorithms"><code>MessageDigest</code> Algorithms</a></li>
<li><a href="#parameterspec-names"><code>ParameterSpec</code> Names</a></li>
<li><a href="#policy-types"><code>Policy</code> Types</a></li>
<li><a href="#saslclient-mechanisms"><code>SaslClient</code> Mechanisms</a></li>
<li><a href="#saslserver-mechanisms"><code>SaslServer</code> Mechanisms</a></li>
<li><a href="#secretkeyfactory-algorithms"><code>SecretKeyFactory</code> Algorithms</a></li>
<li><a href="#securerandom-number-generation-algorithms"><code>SecureRandom</code> Number Generation Algorithms</a></li>
<li><a href="#service-attributes">Service Attributes</a></li>
<li><a href="#signature-algorithms"><code>Signature</code> Algorithms</a></li>
<li><a href="#sslcontext-algorithms"><code>SSLContext</code> Algorithms</a></li>
<li><a href="#trustmanagerfactory-algorithms"><code>TrustManagerFactory</code> Algorithms</a></li>
<li><a href="#xml-signature-xmlsignaturefactorykeyinfofactorytransformservice-mechanisms">XML Signature (<code>XMLSignatureFactory</code>/<code>KeyInfoFactory</code>/<code>TransformService</code>) Mechanisms</a></li>
<li><a href="#xml-signature-transform-transformservice-algorithms">XML Signature Transform (<code>TransformService</code>) Algorithms</a></li>
<li><a href="#jsse-cipher-suite-names">JSSE Cipher Suite Names</a></li>
<li><a href="#additional-jsse-standard-names">Additional JSSE Standard Names</a><ul>
<li><a href="#key-types">Key Types</a></li>
<li><a href="#protocols">Protocols</a></li>
<li><a href="#authentication-types">Authentication Types</a></li>
<li><a href="#endpoint-identification-algorithms">Endpoint Identification Algorithms</a></li>
<li><a href="#signature-schemes">Signature Schemes</a></li>
<li><a href="#named-groups">Named Groups</a></li>
</ul></li>
<li><a href="#security-algorithm-specification">Security Algorithm Specification</a><ul>
<li><a href="#specification-template">Specification Template</a></li>
<li><a href="#algorithm-specifications">Algorithm Specifications</a></li>
</ul></li>
<li><a href="#security-algorithm-implementation-requirements">Security Algorithm Implementation Requirements</a><ul>
<li><a href="#xml-signature-algorithms">XML Signature Algorithms</a></li>
</ul></li>
</ul>
</nav>
<main><p>The Java SE Security API requires and uses a set of standard names for algorithms, certificate and keystore types. You can find a list of standard algorithm names in this document.</p>
<p>Note that an SE implementation may support additional algorithms that are not defined in this specification. As a best practice, if an algorithm is defined in a subsequent version of this specification and an implementation of an earlier specification supports that algorithm, the implementation should use the standard name of the algorithm that is defined in the subsequent specification. Each SE implementation should also document the algorithms that it supports or adds support for in subsequent update releases. The algorithms may be documented in release notes or in a separate document such as the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase17&amp;id=GUID-FE2D2E28-C991-4EF9-9DBE-2A4982726313">JDK Providers Documentation</a>.</p>
<p>In some cases naming conventions are given for forming names that are not explicitly listed, to facilitate name consistency across provider implementations. Items in angle brackets (such as <code>&lt;digest&gt;</code> and <code>&lt;encryption&gt;</code>) are placeholders to be replaced by a specific message digest, encryption algorithm, or other name.</p>
<p><strong>Note:</strong> Standard names are not case-sensitive.</p>
<p><strong>Note:</strong> The <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase17&amp;id=GUID-FE2D2E28-C991-4EF9-9DBE-2A4982726313">JDK Providers Documentation</a> contains specific provider and algorithm information.</p>
<h2 id="algorithmparametergenerator-algorithms"><code>AlgorithmParameterGenerator</code> Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>AlgorithmParameterGenerator</code>.</p>
<table>
<colgroup>
<col style="width: 22%" />
<col style="width: 77%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DiffieHellman</th>
<td style="text-align: left;">Parameters for use with the Diffie-Hellman algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DSA</th>
<td style="text-align: left;">Parameters for use with the Digital Signature Algorithm.</td>
</tr>
</tbody>
</table>
<h2 id="algorithmparameters-algorithms"><code>AlgorithmParameters</code> Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>AlgorithmParameters</code>.</p>
<table>
<colgroup>
<col style="width: 24%" />
<col style="width: 75%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">AES</th>
<td style="text-align: left;">Parameters for use with the AES algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Blowfish</th>
<td style="text-align: left;">Parameters for use with the Blowfish algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ChaCha20-Poly1305</th>
<td style="text-align: left;">Parameters for use with the ChaCha20-Poly1305 algorithm, as defined in <a href="https://tools.ietf.org/html/rfc8103">RFC 8103</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DES</th>
<td style="text-align: left;">Parameters for use with the DES algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DESede</th>
<td style="text-align: left;">Parameters for use with the DESede algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DiffieHellman</th>
<td style="text-align: left;">Parameters for use with the DiffieHellman algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DSA</th>
<td style="text-align: left;">Parameters for use with the Digital Signature Algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">EC</th>
<td style="text-align: left;">Parameters for use with the EC algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">OAEP</th>
<td style="text-align: left;">Parameters for use with the OAEP algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PBEWith&lt;digest&gt;And&lt;encryption&gt; PBEWith&lt;prf&gt;And&lt;encryption&gt;</th>
<td style="text-align: left;">Parameters for use with PKCS #5 password-based encryption, where &lt;digest&gt; is a message digest, &lt;prf&gt; is a pseudo-random function, and &lt;encryption&gt; is an encryption algorithm. Examples: <strong>PBEWithMD5AndDES</strong>, and <strong>PBEWithHmacSHA256AndAES</strong>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PBE</th>
<td style="text-align: left;">Parameters for use with the PBE algorithm. <em>This name should not be used, in preference to the more specific PBE-algorithm names previously listed.</em></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RC2</th>
<td style="text-align: left;">Parameters for use with the RC2 algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RSASSA-PSS</th>
<td style="text-align: left;">Parameters for use with the RSASSA-PSS signature algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">XDH</th>
<td style="text-align: left;">Parameters for Diffie-Hellman key agreement with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X25519</th>
<td style="text-align: left;">Parameters for Diffie-Hellman key agreement with Curve25519 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">X448</th>
<td style="text-align: left;">Parameters for Diffie-Hellman key agreement with Curve448 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
</tbody>
</table>
<h2 id="certificatefactory-types"><code>CertificateFactory</code> Types</h2>
<p>The type in this section can be specified when generating an instance of <code>CertificateFactory</code>.</p>
<table>
<colgroup>
<col style="width: 8%" />
<col style="width: 91%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Type</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X.509</th>
<td style="text-align: left;">The certificate type defined in X.509, also specified in <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>.</td>
</tr>
</tbody>
</table>
<h2 id="certpath-encodings"><code>CertPath</code> Encodings</h2>
<p>The following encodings may be passed to the <code>getEncoded</code> method of <code>CertPath</code> or the <code>generateCertPath(InputStream inStream, String encoding)</code> method of <code>CertificateFactory</code>.</p>
<table>
<colgroup>
<col style="width: 13%" />
<col style="width: 86%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Encoding</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKCS7</th>
<td style="text-align: left;">A PKCS #7 SignedData object, with the only significant field being certificates. In particular, the signature and the contents are ignored. If no certificates are present, a zero-length <code>CertPath</code> is assumed.<br />
<br />
<strong>Warning:</strong> PKCS #7 does not maintain the order of certificates in a certification path. This means that if a <code>CertPath</code> is converted to PKCS #7 encoded bytes and then converted back, the order of the certificates may change, potentially rendering the <code>CertPath</code> invalid. Users should be aware of this behavior.<br />
<br />
See <a href="https://www.rfc-editor.org/rfc/rfc2315.txt">PKCS #7: Cryptographic Message Syntax</a> for details on PKCS #7.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PkiPath</th>
<td style="text-align: left;">An ASN.1 DER encoded sequence of certificates, defined as follows:<br />
<br />
<code>PkiPath ::= SEQUENCE OF Certificate</code><br />
<br />
Within the sequence, the order of certificates is such that the subject of the first certificate is the issuer of the second certificate, and so on. Each certificate in <code>PkiPath</code> shall be unique. No certificate may appear more than once in a value of <code>Certificate</code> in <code>PkiPath</code>. The <code>PkiPath</code> format is defined in defect report 279 against X.509 (2000) and is incorporated into Technical Corrigendum 1 (DTC 2) for the ITU-T Recommendation X.509 (2000). See <a href="https://www.itu.int/rec/T-REC-X.509/en">the ITU web site</a> for details.</td>
</tr>
</tbody>
</table>
<h2 id="certpathbuilder-algorithms"><code>CertPathBuilder</code> Algorithms</h2>
<p>The algorithm in this section can be specified when generating an instance of <code>CertPathBuilder</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKIX</th>
<td style="text-align: left;">The PKIX certification path validation algorithm as defined in the <a href="#service-attributes">ValidationAlgorithm service attribute</a>. The output of <code>CertPathBuilder</code> instances implementing this algorithm is a certification path validated against the PKIX validation algorithm.</td>
</tr>
</tbody>
</table>
<h2 id="certpathvalidator-algorithms"><code>CertPathValidator</code> Algorithms</h2>
<p>The algorithm in this section can be specified when generating an instance of <code>CertPathValidator</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKIX</th>
<td style="text-align: left;">The PKIX certification path validation algorithm as defined in the <a href="#service-attributes">ValidationAlgorithm service attribute</a>.</td>
</tr>
</tbody>
</table>
<h2 id="certstore-types"><code>CertStore</code> Types</h2>
<p>The types in this section can be specified when generating an instance of <code>CertStore</code>.</p>
<table>
<colgroup>
<col style="width: 15%" />
<col style="width: 85%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Type</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Collection</th>
<td style="text-align: left;">A <code>CertStore</code> implementation that retrieves certificates and CRLs from a <code>Collection</code>. This type of <code>CertStore</code> is particularly useful in applications where certificates or CRLs are received in a bag or some sort of attachment, such as with a signed email message or in an SSL negotiation.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">LDAP</th>
<td style="text-align: left;">A <code>CertStore</code> implementation that fetches certificates and CRLs from an LDAP directory using the schema defined in the <a href="#service-attributes">LDAPSchema service attribute</a>.</td>
</tr>
</tbody>
</table>
<h2 id="cipher-algorithm-names"><code>Cipher</code> Algorithm Names</h2>
<p>The following names can be specified as the <em>algorithm</em> component in a <a href="../../api/java.base/javax/crypto/Cipher.html">transformation</a> when requesting an instance of <code>Cipher</code>.</p>
<p><strong>Note:</strong> It is recommended to use a transformation that fully specifies the algorithm, mode, and padding. By not doing so, the provider will use a default for the mode and padding which may not meet the security requirements of your application.</p>
<table>
<colgroup>
<col style="width: 25%" />
<col style="width: 74%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">AES</th>
<td style="text-align: left;">Advanced Encryption Standard as specified by NIST in <a href="https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf">FIPS 197</a>. Also known as the Rijndael algorithm by Joan Daemen and Vincent Rijmen, AES is a 128-bit block cipher supporting keys of 128, 192, and 256 bits.<br />
<br />
To use the AES cipher with only one valid key size, use the format AES_&lt;n&gt;, where &lt;n&gt; can be 128, 192 or 256.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">AESWrap</th>
<td style="text-align: left;">The AES key wrapping algorithm as described in <a href="https://tools.ietf.org/html/rfc3394">RFC 3394</a><br />
and <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">NIST Special Publication SP 800-38F</a>.<br />
This is same as specifying AES cipher with KW mode and NoPadding. To use the AESWrap cipher with only one valid key size, use the format AESWrap_&lt;n&gt;, where &lt;n&gt; can be 128, 192, or 256.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">AESWrapPad</th>
<td style="text-align: left;">The AES key wrapping algorithm as described in <a href="https://tools.ietf.org/html/rfc5649">RFC 5649</a> and<br />
<a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">NIST Special Publication SP 800-38F</a>.<br />
This is same as specifying AES cipher with KWP mode and NoPadding. To use the AESWrapPad cipher with only one valid key size, use the format AESWrapPad_&lt;n&gt;, where &lt;n&gt; can be 128, 192, or 256.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ARCFOUR</th>
<td style="text-align: left;">A stream cipher believed to be fully interoperable with the RC4 cipher developed by Ron Rivest. For more information, see K. Kaukonen and R. Thayer, <a href="https://tools.ietf.org/id/draft-kaukonen-cipher-arcfour-03.txt">&quot;A Stream Cipher Encryption Algorithm 'Arcfour'&quot;</a>, Internet Draft (expired).</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Blowfish</th>
<td style="text-align: left;">The <a href="https://www.schneier.com/blowfish.html">Blowfish block cipher</a> designed by Bruce Schneier.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ChaCha20</th>
<td style="text-align: left;">The ChaCha20 stream cipher as defined in <a href="https://tools.ietf.org/html/rfc7539">RFC 7539</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ChaCha20-Poly1305</th>
<td style="text-align: left;">The ChaCha20 cipher in AEAD mode using the Poly1305 authenticator, as defined in <a href="https://tools.ietf.org/html/rfc7539">RFC 7539</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DES</th>
<td style="text-align: left;">The Digital Encryption Standard as described in <a href="https://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf">FIPS PUB 46-3</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DESede</th>
<td style="text-align: left;">Triple DES Encryption (also known as DES-EDE, 3DES, or Triple-DES). Data is encrypted using the DES algorithm three separate times. It is first encrypted using the first subkey, then decrypted with the second subkey, and encrypted with the third subkey.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DESedeWrap</th>
<td style="text-align: left;">The DESede key wrapping algorithm as described in <a href="https://tools.ietf.org/html/rfc3217">RFC 3217</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ECIES</th>
<td style="text-align: left;">Elliptic Curve Integrated Encryption Scheme</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PBEWith&lt;digest&gt;And&lt;encryption&gt; PBEWith&lt;prf&gt;And&lt;encryption&gt;</th>
<td style="text-align: left;">The password-based encryption algorithm defined in PKCS #5, using the specified message digest (&lt;digest&gt;) or pseudo-random function (&lt;prf&gt;) and encryption algorithm (&lt;encryption&gt;). Examples:<br />
<br />
<strong>PBEWithMD5AndDES</strong>: The PBES1 password-based encryption algorithm as defined in <a href="https://tools.ietf.org/html/rfc8018">PKCS #5: Password-Based Cryptography Specification, Version 2.1</a>. Note that this algorithm implies <a href="#cbc">CBC</a> as the cipher mode and <a href="#pkcs5padding">PKCS5Padding</a> as the padding scheme and cannot be used with any other cipher modes or padding schemes.<br />
<br />
<strong>PBEWithHmacSHA256AndAES_128</strong>: The PBES2 password-based encryption algorithm as defined in <a href="https://tools.ietf.org/html/rfc8018">PKCS #5: Password-Based Cryptography Specification, Version 2.1</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RC2</th>
<td style="text-align: left;">Variable-key-size encryption algorithms developed by Ron Rivest for RSA Data Security, Inc.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RC4</th>
<td style="text-align: left;">Variable-key-size encryption algorithms developed by Ron Rivest for RSA Data Security, Inc. (See note prior for ARCFOUR.)</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RC5</th>
<td style="text-align: left;">Variable-key-size encryption algorithms developed by Ron Rivest for RSA Data Security, Inc.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RSA</th>
<td style="text-align: left;">The RSA encryption algorithm as defined in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
</tbody>
</table>
<h2 id="cipher-algorithm-modes"><code>Cipher</code> Algorithm Modes</h2>
<p>The following names can be specified as the <em>mode</em> component in a <a href="../../api/java.base/javax/crypto/Cipher.html">transformation</a> when requesting an instance of <code>Cipher</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NONE</th>
<td style="text-align: left;">No mode.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">CBC <a id=cbc></a></th>
<td style="text-align: left;">Cipher Block Chaining Mode, as defined in <a href="https://csrc.nist.gov/publications/fips/fips81/fips81.htm">FIPS PUB 81</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">CCM</th>
<td style="text-align: left;">Counter/CBC Mode, as defined in <a href="https://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf">NIST Special Publication SP 800-38C</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">CFB, CFBx</th>
<td style="text-align: left;">Cipher Feedback Mode, as defined in <a href="https://csrc.nist.gov/publications/fips/fips81/fips81.htm">FIPS PUB 81</a>.<br />
<br />
Using modes such as CFB and OFB, block ciphers can encrypt data in units smaller than the cipher's actual block size. When requesting such a mode, you may optionally specify the number of bits to be processed at a time by appending this number to the mode name as shown in the &quot;<em>DES/CFB8/NoPadding</em>&quot; and &quot;<em>DES/OFB32/PKCS5Padding</em>&quot; transformations. If no such number is specified, a provider-specific default is used. (For example, the SunJCE provider uses a default of 64 bits for DES.) Thus, block ciphers can be turned into byte-oriented stream ciphers by using an 8-bit mode such as CFB8 or OFB8.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">CTR</th>
<td style="text-align: left;">A simplification of OFB, Counter mode updates the input block as a counter.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">CTS</th>
<td style="text-align: left;">Cipher Text Stealing, as described in Bruce Schneier's book <em>Applied Cryptography-Second Edition</em>, John Wiley and Sons, 1996.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ECB</th>
<td style="text-align: left;">Electronic Codebook Mode, as defined in <a href="https://csrc.nist.gov/publications/fips/fips81/fips81.htm">FIPS PUB 81</a> (generally this mode should not be used for multiple blocks of data).</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">GCM</th>
<td style="text-align: left;">Galois/Counter Mode, as defined in <a href="https://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf">NIST Special Publication SP 800-38D</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">KW</th>
<td style="text-align: left;">Key Wrap (KW) mode, as defined in <a href="https://tools.ietf.org/html/rfc3394">RFC 3394</a> and <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">NIST Special Publication SP 800-38F</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">KWP</th>
<td style="text-align: left;">Key Wrap With Padding (KWP) mode, as defined in <a href="https://tools.ietf.org/html/rfc5649">RFC 5649</a> and <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">NIST Special Publication SP 800-38F</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">OFB, OFBx</th>
<td style="text-align: left;">Output Feedback Mode, as defined in <a href="https://csrc.nist.gov/publications/fips/fips81/fips81.htm">FIPS PUB 81</a>.<br />
<br />
Using modes such as CFB and OFB, block ciphers can encrypt data in units smaller than the cipher's actual block size. When requesting such a mode, you may optionally specify the number of bits to be processed at a time by appending this number to the mode name as shown in the &quot;<em>DES/CFB8/NoPadding</em>&quot; and &quot;<em>DES/OFB32/PKCS5Padding</em>&quot; transformations. If no such number is specified, a provider-specific default is used. (For example, the SunJCE provider uses a default of 64 bits for DES.) Thus, block ciphers can be turned into byte-oriented stream ciphers by using an 8-bit mode such as CFB8 or OFB8.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PCBC</th>
<td style="text-align: left;">Propagating Cipher Block Chaining, as defined by <a href="https://web.mit.edu/kerberos/">Kerberos V4</a>.</td>
</tr>
</tbody>
</table>
<h2 id="cipher-algorithm-paddings"><code>Cipher</code> Algorithm Paddings</h2>
<p>The following names can be specified as the <em>padding</em> component in a <a href="../../api/java.base/javax/crypto/Cipher.html">transformation</a> when requesting an instance of <code>Cipher</code>.</p>
<table>
<colgroup>
<col style="width: 25%" />
<col style="width: 74%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NoPadding</th>
<td style="text-align: left;">No padding.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ISO10126Padding</th>
<td style="text-align: left;">This padding for block ciphers is described in <a href="https://www.w3.org/TR/xmlenc-core/#sec-Alg-Block">5.2 Block Encryption Algorithms</a> in the W3C &quot;XML Encryption Syntax and Processing&quot; document.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">OAEPPadding, OAEPWith&lt;digest&gt;And&lt;mgf&gt;Padding</th>
<td style="text-align: left;">Optimal Asymmetric Encryption. Padding scheme defined in PKCS #1, where &lt;digest&gt; should be replaced by the message digest and &lt;mgf&gt; by the mask generation function. Examples: <strong>OAEPWithMD5AndMGF1Padding</strong> and <strong>OAEPWithSHA-512AndMGF1Padding</strong>.<br />
<br />
If <code>OAEPPadding</code> is used, <code>Cipher</code> objects are initialized with a <code>javax.crypto.spec.OAEPParameterSpec</code> object to supply values needed for OAEPPadding.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PKCS1Padding</th>
<td style="text-align: left;">The padding scheme described in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>, used with the RSA algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKCS5Padding <a id=pkcs5padding></a></th>
<td style="text-align: left;">The padding scheme described in <a href="https://tools.ietf.org/html/rfc8018">PKCS #5: Password-Based Cryptography Specification, version 2.1</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SSL3Padding</th>
<td style="text-align: left;">The padding scheme defined in the SSL Protocol Version 3.0, November 18, 1996, section 5.2.3.2 (CBC block cipher):<br />
<br />
<code>block-ciphered struct {</code><br />
    <code>opaque content[SSLCompressed.length];</code><br />
    <code>opaque MAC[CipherSpec.hash_size];</code><br />
    <code>uint8 padding[GenericBlockCipher.padding_length];</code><br />
    <code>uint8 padding_length;</code><br />
<code>} GenericBlockCipher;</code><br />
<br />
The size of an instance of a <code>GenericBlockCipher</code> must be a multiple of the block cipher's block length. The padding length, which is always present, contributes to the padding, which implies that if:<br />
<br />
<code>sizeof(content) + sizeof(MAC) % block_length = 0,</code><br />
<br />
padding has to be <code>(block_length - 1)</code> bytes long, because of the existence of <code>padding_length</code>.<br />
<br />
This makes the padding scheme similar (but not quite) to PKCS5Padding, where the padding length is encoded in the padding (and ranges from 1 to <code>block_length</code>). With the SSL scheme, the <code>sizeof(padding)</code> is encoded in the always present <code>padding_length</code> and therefore ranges from 0 to <code>block_length-1</code>.</td>
</tr>
</tbody>
</table>
<h2 id="configuration-types"><code>Configuration</code> Types</h2>
<p>The type in this section can be specified when generating an instance of <code>javax.security.auth.login.Configuration</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Type</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">JavaLoginConfig</th>
<td style="text-align: left;">The default Configuration implementation from the SUN provider, as described in the <a href="../../api/java.base/javax/security/auth/login/Configuration.html">Configuration class specification</a>. This type accepts <code>java.security.URIParameter</code> as a valid <code>Configuration.Parameter</code> type. If this parameter is not specified, then the configuration information is loaded from the sources described in the <code>ConfigFile</code> class specification. If this parameter is specified, the configuration information is loaded solely from the specified URI.</td>
</tr>
</tbody>
</table>
<h2 id="exemption-mechanisms">Exemption Mechanisms</h2>
<p>The following exemption mechanism names can be specified in the permission policy file that accompanies an application considered &quot;exempt&quot; from cryptographic restrictions.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">KeyEscrow</th>
<td style="text-align: left;">An encryption system with a backup decryption capability that allows authorized persons (users, officers of an organization, and government officials), under certain prescribed conditions, to decrypt ciphertext with the help of information supplied by one or more trusted parties who hold special data recovery keys.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">KeyRecovery</th>
<td style="text-align: left;">A method of obtaining the secret key used to lock encrypted data. One use is as a means of providing fail-safe access to a corporation's own encrypted information in times of disaster.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">KeyWeakening</th>
<td style="text-align: left;">A method in which a part of the key can be escrowed or recovered.</td>
</tr>
</tbody>
</table>
<h2 id="gssapi-mechanisms">GSSAPI Mechanisms</h2>
<p>The following mechanisms can be specified when using GSSAPI. Note that Object Identifiers (OIDs) are specified instead of names to be consistent with the GSSAPI standard.</p>
<table>
<colgroup>
<col style="width: 27%" />
<col style="width: 72%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Mechanism OID</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">1.2.840.113554.1.2.2</th>
<td style="text-align: left;">The Kerberos v5 GSS-API mechanism defined in <a href="https://tools.ietf.org/html/rfc4121">RFC 4121</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">1.3.6.1.5.5.2</th>
<td style="text-align: left;">The Simple and Protected GSS-API Negotiation (SPNEGO) mechanism defined in <a href="https://tools.ietf.org/html/rfc4178">RFC 4178</a>.</td>
</tr>
</tbody>
</table>
<h2 id="keyagreement-algorithms"><code>KeyAgreement</code> Algorithms</h2>
<p>The following algorithm names can be specified when requesting an instance of <code>KeyAgreement</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DiffieHellman</th>
<td style="text-align: left;">Diffie-Hellman Key Agreement as defined in PKCS #3: Diffie-Hellman Key-Agreement Standard, RSA Laboratories, version 1.4, November 1993.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ECDH</th>
<td style="text-align: left;">Elliptic Curve Diffie-Hellman as defined in ANSI X9.63 and as described in <a href="https://tools.ietf.org/html/rfc3278">RFC 3278</a>: &quot;Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS).&quot;</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ECMQV</th>
<td style="text-align: left;">Elliptic Curve Menezes-Qu-Vanstone.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">XDH</th>
<td style="text-align: left;">Diffie-Hellman key agreement with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X25519</th>
<td style="text-align: left;">Diffie-Hellman key agreement with Curve25519 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">X448</th>
<td style="text-align: left;">Diffie-Hellman key agreement with Curve448 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
</tbody>
</table>
<h2 id="keyfactory-algorithms"><code>KeyFactory</code> Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>KeyFactory</code>.</p>
<p><em>(Except as noted, these classes create keys for which <a href="../../api/java.base/java/security/Key.html#getAlgorithm()">Key.getAlgorithm()</a> returns the standard algorithm name.)</em></p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DiffieHellman</th>
<td style="text-align: left;">Keys for the Diffie-Hellman KeyAgreement algorithm.<br />
<br />
<strong>Note:</strong> <code>key.getAlgorithm()</code> will return &quot;DH&quot; instead of &quot;DiffieHellman&quot;.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DSA</th>
<td style="text-align: left;">Keys for the Digital Signature Algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EC</th>
<td style="text-align: left;">Keys for the Elliptic Curve algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">EdDSA</th>
<td style="text-align: left;">Keys for Edwards-Curve signature algorithm with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Ed25519</th>
<td style="text-align: left;">Keys for Edwards-Curve signature algorithm with Ed25519 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Ed448</th>
<td style="text-align: left;">Keys for Edwards-Curve signature algorithm with Ed448 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RSA</th>
<td style="text-align: left;">Keys for the RSA algorithm (Signature/Cipher).</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RSASSA-PSS</th>
<td style="text-align: left;">Keys for the RSASSA-PSS algorithm (Signature).</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">XDH</th>
<td style="text-align: left;">Keys for Diffie-Hellman key agreement with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">X25519</th>
<td style="text-align: left;">Keys for Diffie-Hellman key agreement with Curve25519 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X448</th>
<td style="text-align: left;">Keys for Diffie-Hellman key agreement with Curve448 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
</tbody>
</table>
<h2 id="keygenerator-algorithms"><code>KeyGenerator</code> Algorithms</h2>
<p>The following algorithm names can be specified when requesting an instance of <code>KeyGenerator</code>.</p>
<p><em>(These classes generate keys for which <a href="../../api/java.base/java/security/Key.html#getAlgorithm()">Key.getAlgorithm()</a> returns the standard algorithm name.)</em></p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">AES</th>
<td style="text-align: left;">Key generator for use with the AES algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ARCFOUR</th>
<td style="text-align: left;">Key generator for use with the ARCFOUR (RC4) algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Blowfish</th>
<td style="text-align: left;">Key generator for use with the Blowfish algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ChaCha20</th>
<td style="text-align: left;">Key generator for use with the ChaCha20 and ChaCha20-Poly1305 algorithms.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DES</th>
<td style="text-align: left;">Key generator for use with the DES algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DESede</th>
<td style="text-align: left;">Key generator for use with the DESede (triple-DES) algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">HmacMD5</th>
<td style="text-align: left;">Key generator for use with the HmacMD5 algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">HmacSHA1<br />
HmacSHA224<br />
HmacSHA256<br />
HmacSHA384<br />
HmacSHA512<br />
HmacSHA3-224<br />
HmacSHA3-256<br />
HmacSHA3-384<br />
HmacSHA3-512</th>
<td style="text-align: left;">Keys generator for use with the various flavors of the HmacSHA algorithms.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RC2</th>
<td style="text-align: left;">Key generator for use with the RC2 algorithm.</td>
</tr>
</tbody>
</table>
<h2 id="keymanagerfactory-algorithms"><code>KeyManagerFactory</code> Algorithms</h2>
<p>The algorithm names that can be specified when generating an instance of <code>KeyManagerFactory</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKIX</th>
<td style="text-align: left;">A factory for <code>X509ExtendedKeyManager</code>s that manage X.509 certificate-based key pairs for local side authentication according to the rules defined by the IETF PKIX working group in <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a> or its successor. The <code>KeyManagerFactory</code> must support initialization using the class <code>javax.net.ssl.KeyStoreBuilderParameters</code>.</td>
</tr>
</tbody>
</table>
<h2 id="keypairgenerator-algorithms"><code>KeyPairGenerator</code> Algorithms</h2>
<p>The algorithm names that can be specified when generating an instance of <code>KeyPairGenerator</code>.</p>
<p><em>(Except as noted, these classes create keys for which <a href="../../api/java.base/java/security/Key.html#getAlgorithm()">Key.getAlgorithm()</a> returns the standard algorithm name.)</em></p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DiffieHellman</th>
<td style="text-align: left;">Generates keypairs for the Diffie-Hellman KeyAgreement algorithm.<br />
<br />
<strong>Note:</strong> <code>key.getAlgorithm()</code> will return &quot;DH&quot; instead of &quot;DiffieHellman&quot;.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DSA</th>
<td style="text-align: left;">Generates keypairs for the Digital Signature Algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RSA</th>
<td style="text-align: left;">Generates keypairs for the RSA algorithm (Signature/Cipher).</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RSASSA-PSS</th>
<td style="text-align: left;">Generates keypairs for the RSASSA-PSS signature algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EC</th>
<td style="text-align: left;">Generates keypairs for the Elliptic Curve algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">EdDSA</th>
<td style="text-align: left;">Generates keypairs for Edwards-Curve signature algorithm with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Ed25519</th>
<td style="text-align: left;">Generates keypairs for Edwards-Curve signature algorithm with Ed25519 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Ed448</th>
<td style="text-align: left;">Generates keypairs for Edwards-Curve signature algorithm with Ed448 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">XDH</th>
<td style="text-align: left;">Generates keypairs for Diffie-Hellman key agreement with elliptic curves as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">X25519</th>
<td style="text-align: left;">Generates keypairs for Diffie-Hellman key agreement with Curve25519 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X448</th>
<td style="text-align: left;">Generates keypairs for Diffie-Hellman key agreement with Curve448 as defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
</tbody>
</table>
<h2 id="keystore-types"><code>KeyStore</code> Types</h2>
<p>The types in this section can be specified when generating an instance of <code>KeyStore</code>.</p>
<table>
<colgroup>
<col style="width: 10%" />
<col style="width: 90%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Type</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">jceks</th>
<td style="text-align: left;">The proprietary keystore implementation provided by the SunJCE provider.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">jks</th>
<td style="text-align: left;">The proprietary keystore implementation provided by the SUN provider.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">dks</th>
<td style="text-align: left;">A domain keystore is a collection of keystores presented as a single logical keystore. It is specified by configuration data whose syntax is described in the <a href="../../api/java.base/java/security/DomainLoadStoreParameter.html">DomainLoadStoreParameter</a> class.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">pkcs11</th>
<td style="text-align: left;">A keystore backed by a PKCS #11 token.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">pkcs12</th>
<td style="text-align: left;">The transfer syntax for personal identity information as defined in <a href="https://tools.ietf.org/html/rfc7292">PKCS #12</a>.</td>
</tr>
</tbody>
</table>
<h2 id="mac-algorithms"><code>Mac</code> Algorithms</h2>
<p>The following algorithm names can be specified when requesting an instance of <code>Mac</code>.</p>
<table>
<colgroup>
<col style="width: 24%" />
<col style="width: 75%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">HmacMD5</th>
<td style="text-align: left;">The HMAC-MD5 keyed-hashing algorithm as defined in <a href="https://tools.ietf.org/html/rfc2104">RFC 2104</a>: &quot;HMAC: Keyed-Hashing for Message Authentication&quot; (February 1997).</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">HmacSHA1<br />
HmacSHA224<br />
HmacSHA256<br />
HmacSHA384<br />
HmacSHA512<br />
HmacSHA512/224<br />
HmacSHA512/256<br />
HmacSHA3-224<br />
HmacSHA3-256<br />
HmacSHA3-384<br />
HmacSHA3-512</th>
<td style="text-align: left;">The HmacSHA* algorithms as defined in <a href="https://tools.ietf.org/html/rfc2104">RFC 2104</a> &quot;HMAC: Keyed-Hashing for Message Authentication&quot; (February 1997) with <code>SHA-*</code> with SHA, SHA-2, and SHA-3 family of digest algorithms.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PBEWith&lt;mac&gt;</th>
<td style="text-align: left;">The PBMAC1 password-based message authentication scheme as defined in <a href="https://tools.ietf.org/html/rfc8018">PKCS #5: Password-Based Cryptography Specification, Version 2.1</a>, where &lt;mac&gt; is a Message Authentication Code algorithm name. Example: <strong>PBEWithHmacSHA256</strong></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">HmacPBESHA1<br />
HmacPBESHA224<br />
HmacPBESHA256<br />
HmacPBESHA384<br />
HmacPBESHA512<br />
HmacPBESHA512/224<br />
HmacPBESHA512/256</th>
<td style="text-align: left;">The HMAC algorithms as defined in <a href="https://tools.ietf.org/html/rfc7292#appendix-B.4">Appendix B.4 of RFC 7292</a>: &quot;PKCS #12: Personal Information Exchange Syntax v1.1&quot; (July 2014).</td>
</tr>
</tbody>
</table>
<h2 id="messagedigest-algorithms"><code>MessageDigest</code> Algorithms</h2>
<p>Algorithm names that can be specified when generating an instance of <code>MessageDigest</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">MD2</th>
<td style="text-align: left;">The MD2 message digest algorithm as defined in <a href="https://tools.ietf.org/html/rfc1319">RFC 1319</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">MD5</th>
<td style="text-align: left;">The MD5 message digest algorithm as defined in <a href="https://tools.ietf.org/html/rfc1321">RFC 1321</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SHA-1<br />
SHA-224<br />
SHA-256<br />
SHA-384<br />
SHA-512/224<br />
SHA-512/256</th>
<td style="text-align: left;">Hash algorithms defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS PUB 180-4</a>. Secure hash algorithms - SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256 - for computing a condensed representation of electronic data (message). When a message is input to a hash algorithm, the result is an output called a message digest. A message digest ranges in length from 160-512 bits, depending on the algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SHA3-224<br />
SHA3-256<br />
SHA3-384<br />
SHA3-512</th>
<td style="text-align: left;">Permutation-based hash and extendable-output functions as defined in <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">FIPS PUB 202</a>. An input message length can vary; the length of the output digest is fixed.<br />
<br />
SHA3-224 produces a 224 bit digest.<br />
SHA3-256 produces a 256 bit digest.<br />
SHA3-384 produces a 384 bit digest.<br />
SHA3-512 produces a 512 bit digest.</td>
</tr>
</tbody>
</table>
<h2 id="parameterspec-names"><code>ParameterSpec</code> Names</h2>
<p>The <code>NamedParameterSpec</code> class in the <code>java.security.spec</code> package may be used to specify a set of parameters using the following names.</p>
<table style="width:61%;">
<colgroup>
<col style="width: 11%" />
<col style="width: 50%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">X25519</th>
<td style="text-align: left;">Elliptic curve cryptography using the X25519 scalar multiplication function defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">X448</th>
<td style="text-align: left;">Elliptic curve cryptography using the X448 scalar multiplication function defined in <a href="https://tools.ietf.org/html/rfc7748">RFC 7748</a>.</td>
</tr>
</tbody>
</table>
<p>The <code>ECGenParameterSpec</code> class in the <code>java.security.spec</code> package may be used to specify a set of elliptic curve parameters using the following names.</p>
<table style="width:75%;">
<colgroup>
<col style="width: 25%" />
<col style="width: 50%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">sect163k1<br />
sect163r1<br />
sect163r2<br />
sect193r1<br />
sect193r2<br />
sect233k1<br />
sect233r1<br />
sect239k1<br />
sect283k1<br />
sect283r1<br />
sect409k1<br />
sect409r1<br />
sect571k1<br />
sect571r1<br />
secp160k1<br />
secp160r1<br />
secp160r2<br />
secp192k1<br />
secp192r1<br />
secp224k1<br />
secp224r1<br />
secp256k1<br />
secp256r1<br />
secp384r1<br />
secp521r1</th>
<td style="text-align: left;">The named curves as specified in <a href="https://www.secg.org/sec2-v2.pdf">SECG, SEC 2: Recommended Elliptic Curve Domain Parameters</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">brainpoolP256r1<br />
brainpoolP384r1<br />
brainpoolP512r1</th>
<td style="text-align: left;">The named curves as defined in <a href="https://tools.ietf.org/html/rfc5639">RFC 5639</a>.</td>
</tr>
</tbody>
</table>
<h2 id="policy-types"><code>Policy</code> Types</h2>
<p>The type in this section can be specified when generating an instance of <code>Policy</code>.</p>
<table>
<colgroup>
<col style="width: 15%" />
<col style="width: 85%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Type</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">JavaPolicy</th>
<td style="text-align: left;">The default Policy implementation from the SUN provider, as described in the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase17&amp;id=GUID-789089CA-8557-4017-B8B0-6899AD3BA18D">Default Policy Implementation and Policy File Syntax</a> section of the <em>Java Platform, Standard Edition Security Developer's Guide</em>. This type accepts <code>java.security.URIParameter</code> as a valid <code>Policy.Parameter</code> type. If this parameter is not specified, then the policy information is loaded from the sources described in the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase17&amp;id=GUID-BFF84712-05CF-4C1E-926F-411FDF83AE32">Default Policy File Locations</a> section of the <em>Java Platform, Standard Edition Security Developer's Guide</em>. If this parameter is specified, the policy information is loaded solely from the specified URI.</td>
</tr>
</tbody>
</table>
<h2 id="saslclient-mechanisms"><code>SaslClient</code> Mechanisms</h2>
<p>The mechanisms in this section can be specified when generating an instance of <code>SaslClient</code>.</p>
<table>
<colgroup>
<col style="width: 15%" />
<col style="width: 85%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Mechanism</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">CRAM-MD5</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2195">RFC 2195</a>. This mechanism supports a hashed user name/password authentication scheme.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DIGEST-MD5</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2831">RFC 2831</a>. This mechanism defines how HTTP Digest Authentication can be used as a SASL mechanism.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EXTERNAL</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2222">RFC 2222</a>. This mechanism obtains authentication information from an external channel (such as TLS or IPsec).</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">GSSAPI</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2222">RFC 2222</a>. This mechanism uses the GSSAPI for obtaining authentication information. It supports Kerberos v5 authentication.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NTLM</th>
<td style="text-align: left;">See <a href="https://msdn.microsoft.com/en-us/library/cc236621.aspx">MS-NLMP</a>. This mechanism supports the NTLM authentication scheme.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PLAIN</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2595">RFC 2595</a>. This mechanism supports cleartext user name/password authentication.</td>
</tr>
</tbody>
</table>
<h2 id="saslserver-mechanisms"><code>SaslServer</code> Mechanisms</h2>
<p>The mechanisms in this section can be specified when generating an instance of <code>SaslServer</code>.</p>
<table>
<colgroup>
<col style="width: 15%" />
<col style="width: 85%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Mechanism</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">CRAM-MD5</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2195">RFC 2195</a>. This mechanism supports a hashed user name/password authentication scheme.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DIGEST-MD5</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2831">RFC 2831</a>. This mechanism defines how HTTP Digest Authentication can be used as a SASL mechanism.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">GSSAPI</th>
<td style="text-align: left;">See <a href="https://tools.ietf.org/html/rfc2222">RFC 2222</a>. This mechanism uses the GSSAPI for obtaining authentication information. It supports Kerberos v5 authentication.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NTLM</th>
<td style="text-align: left;">See <a href="https://msdn.microsoft.com/en-us/library/cc236621.aspx">MS-NLMP</a>. This mechanism supports the NTLM authentication scheme.</td>
</tr>
</tbody>
</table>
<h2 id="secretkeyfactory-algorithms"><code>SecretKeyFactory</code> Algorithms</h2>
<p>The following algorithm names can be specified when requesting an instance of <code>SecretKeyFactory</code>.</p>
<p><em>(These classes create keys for which <a href="../../api/java.base/java/security/Key.html#getAlgorithm()">Key.getAlgorithm()</a> returns the standard algorithm name.)</em></p>
<table>
<colgroup>
<col style="width: 26%" />
<col style="width: 73%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">AES</th>
<td style="text-align: left;">Constructs secret keys for use with the AES algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ARCFOUR</th>
<td style="text-align: left;">Constructs secret keys for use with the ARCFOUR algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ChaCha20</th>
<td style="text-align: left;">Constructs secret keys for use with the ChaCha20 and ChaCha20-Poly1305 algorithms.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DES</th>
<td style="text-align: left;">Constructs secrets keys for use with the DES algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DESede</th>
<td style="text-align: left;">Constructs secrets keys for use with the DESede (Triple-DES) algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PBEWith&lt;digest&gt;And&lt;encryption&gt;<br />
PBEWith&lt;prf&gt;And&lt;encryption&gt;</th>
<td style="text-align: left;">Secret-key factory for use with PKCS #5 password-based encryption, where &lt;digest&gt; is a message digest, &lt;prf&gt; is a pseudo-random function, and &lt;encryption&gt; is an encryption algorithm. Examples:<br />
<br />
<strong>PBEWithMD5AndDES</strong> (PKCS #5, PBES1 encryption scheme),<br />
<strong>PBEWithHmacSHA256AndAES_128</strong> (PKCS #5, PBES2 encryption scheme)<br />
<br />
<strong>Note:</strong> These all use only the low order 8 bits of each password character.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PBKDF2With&lt;prf&gt;</th>
<td style="text-align: left;">Password-based key-derivation algorithm defined in <a href="https://tools.ietf.org/html/rfc8018">PKCS #5: Password-Based Cryptography Specification, Version 2.1</a> using the specified pseudo-random function (&lt;prf&gt;). Example:<br />
<strong>PBKDF2WithHmacSHA256</strong>.</td>
</tr>
</tbody>
</table>
<h2 id="securerandom-number-generation-algorithms"><code>SecureRandom</code> Number Generation Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>SecureRandom</code>.</p>
<table>
<colgroup>
<col style="width: 28%" />
<col style="width: 71%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NativePRNG</th>
<td style="text-align: left;">Obtains random numbers from the underlying native OS. No assertions are made as to the blocking nature of generating these numbers.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NativePRNGBlocking</th>
<td style="text-align: left;">Obtains random numbers from the underlying native OS, blocking if necessary. For example, <code>/dev/random</code> on UNIX-like systems.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NativePRNGNonBlocking</th>
<td style="text-align: left;">Obtains random numbers from the underlying native OS, without blocking to prevent applications from excessive stalling. For example, <code>/dev/urandom</code> on UNIX-like systems.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">PKCS11</th>
<td style="text-align: left;">Obtains random numbers from the underlying installed and configured PKCS #11 library.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DRBG</th>
<td style="text-align: left;">An algorithm using DRBG mechanisms as defined in <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf">NIST SP 800-90Ar1</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SHA1PRNG</th>
<td style="text-align: left;">The name of the pseudo-random number generation (PRNG) algorithm supplied by the SUN provider. This algorithm uses SHA-1 as the foundation of the PRNG. It computes the SHA-1 hash over a true-random seed value concatenated with a 64-bit counter which is incremented by 1 for each operation. From the 160-bit SHA-1 output, only 64 bits are used.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Windows-PRNG</th>
<td style="text-align: left;">Obtains random numbers from the underlying Windows OS.</td>
</tr>
</tbody>
</table>
<h2 id="service-attributes">Service Attributes</h2>
<p>The attributes in this section are for cryptographic services. The service attributes can be used as filters for selecting providers.</p>
<p>A cryptographic service is always associated with a particular algorithm or type. For example, a digital signature service is always associated with a particular algorithm (for example, DSA), and a <code>CertificateFactory</code> service is always associated with a particular certificate type (for example, X.509).</p>
<p><strong>Note:</strong> The attribute name and value are case-insensitive.</p>
<table>
<colgroup>
<col style="width: 26%" />
<col style="width: 73%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Attribute</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">KeySize</th>
<td style="text-align: left;">The maximum key size that the provider supports for the cryptographic service.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ImplementedIn</th>
<td style="text-align: left;">Whether the implementation for the cryptographic service is done by software or hardware. The value of this attribute is &quot;software&quot; or &quot;hardware&quot;.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ValidationAlgorithm</th>
<td style="text-align: left;">The name of the specification that defines the certification path validation algorithm that an implementation of <code>CertPathBuilder</code> or <code>CertPathValidator</code> supports. RFCs should be specified as &quot;RFC#&quot; (ex: &quot;RFC5280&quot;) and Internet Drafts as the name of the draft (ex: &quot;<code>draft-ietf-pkix-rfc2560bis-01.txt</code>&quot;). Values for this attribute that are specified as selection criteria to the <code>Security.getProviders</code> method will be compared using the <code>String.equalsIgnoreCase</code> method. All PKIX implementations of <code>CertPathBuilder</code> and <code>CertPathValidator</code> should provide a value for this attribute.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">LDAPSchema</th>
<td style="text-align: left;">The name of the specification that defines the LDAP schema that an implementation of an LDAP <code>CertStore</code> uses to retrieve certificates and CRLs. The format and semantics of this attribute is the same as described for the ValidationAlgorithm attribute. All LDAP implementations of <code>CertStore</code> should provide a value for this attribute.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ThreadSafe</th>
<td style="text-align: left;">Whether a <code>SecureRandom</code> implementation has its <code>SecureRandomSpi</code> engine methods implemented thread safe.</td>
</tr>
</tbody>
</table>
<p>For example,</p>
<pre><code>    map.put(&quot;KeyPairGenerator.DSA&quot;,
            &quot;sun.security.provider.DSAKeyPairGenerator&quot;);
    map.put(&quot;KeyPairGenerator.DSA KeySize&quot;, &quot;2048&quot;);
    map.put(&quot;KeyPairGenerator.DSA ImplementedIn&quot;, &quot;Software&quot;);</code></pre>
<h2 id="signature-algorithms"><code>Signature</code> Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>Signature</code>.</p>
<table>
<colgroup>
<col style="width: 26%" />
<col style="width: 73%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EdDSA</th>
<td style="text-align: left;">Edwards-Curve signature algorithm as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Ed25519</th>
<td style="text-align: left;">Edwards-Curve signature algorithm with Ed25519 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Ed448</th>
<td style="text-align: left;">Edwards-Curve signature algorithm with Ed448 as defined in <a href="https://tools.ietf.org/html/rfc8032">RFC 8032</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NONEwithRSA</th>
<td style="text-align: left;">The RSA signature algorithm which does not use any digesting algorithm and uses only the RSASP1/RSAVP1 primitives as defined in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">MD2withRSA<br />
MD5withRSA</th>
<td style="text-align: left;">The RSA signature algorithm that uses the MD2/MD5 digest with the RSASSA-PKCS1-v1_5 signature scheme as defined in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SHA1withRSA<br />
SHA224withRSA<br />
SHA256withRSA<br />
SHA384withRSA<br />
SHA512withRSA<br />
SHA512/224withRSA<br />
SHA512/256withRSA<br />
SHA3-224withRSA<br />
SHA3-256withRSA<br />
SHA3-384withRSA<br />
SHA3-512withRSA</th>
<td style="text-align: left;">The RSA signature algorithm that uses the SHA-* digest with the RSASSA-PKCS1-v1_5 signature scheme as defined in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RSASSA-PSS</th>
<td style="text-align: left;">The signature algorithm that uses the RSASSA-PSS signature scheme as defined in [PKCS #1 v2.2] (https://tools.ietf.org/html/rfc8017). Note that this signature algorithm needs parameters such as a digesting algorithm, salt length and MGF1 algorithm, to be supplied before performing the RSA operation.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NONEwithDSA</th>
<td style="text-align: left;">The Digital Signature Algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf">FIPS PUB 186-2</a>. The data must be exactly 20 bytes in length. This algorithm is also known as rawDSA.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SHA1withDSA<br />
SHA224withDSA<br />
SHA256withDSA<br />
SHA384withDSA<br />
SHA512withDSA<br />
SHA3-224withDSA<br />
SHA3-256withDSA<br />
SHA3-384withDSA<br />
SHA3-512withDSA</th>
<td style="text-align: left;">The DSA signature algorithms that use the SHA-1, SHA-2, and SHA-3 family of digest algorithms to create and verify digital signatures as defined in <a href="https://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf">FIPS PUB 186-3</a> and <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf">FIPS PUB 186-4</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NONEwithECDSA<br />
SHA1withECDSA<br />
SHA224withECDSA<br />
SHA256withECDSA<br />
SHA384withECDSA<br />
SHA512withECDSA<br />
<em>(ECDSA)</em><br />
SHA3-224withECDSA<br />
SHA3-256withECDSA<br />
SHA3-384withECDSA<br />
SHA3-512withECDSA</th>
<td style="text-align: left;">The ECDSA signature algorithms as defined in ANSI X9.62.<br />
<br />
<strong>Note:</strong> &quot;ECDSA&quot; is an ambiguous name for the &quot;SHA1withECDSA&quot; algorithm and should not be used. The formal name &quot;SHA1withECDSA&quot; should be used instead.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">NONEwithDSAinP1363Format<br />
SHA1withDSAinP1363Format<br />
SHA224withDSAinP1363Format<br />
SHA256withDSAinP1363Format<br />
SHA384withDSAinP1363Format<br />
SHA512withDSAinP1363Format<br />
SHA3-224withDSAinP1363Format<br />
SHA3-256withDSAinP1363Format<br />
SHA3-384withDSAinP1363Format<br />
SHA3-512withDSAinP1363Format</th>
<td style="text-align: left;">The DSA signature algorithms as defined in FIPS PUB 186-2, 186-3, and 186-4 with an output as defined in IEEE P1363 format. The format of the Signature bytes for these algorithms is the concatenation of the integers r and s in raw bytes.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">NONEwithECDSAinP1363Format<br />
SHA1withECDSAinP1363Format<br />
SHA224withECDSAinP1363Format<br />
SHA256withECDSAinP1363Format<br />
SHA384withECDSAinP1363Format<br />
SHA512withECDSAinP1363Format<br />
SHA3-224withECDSAinP1363Format<br />
SHA3-256withECDSAinP1363Format<br />
SHA3-384withECDSAinP1363Format<br />
SHA3-512withECDSAinP1363Format</th>
<td style="text-align: left;">The ECDSA signature algorithms as defined in ANSI X9.62 and FIPS PUB 186-4 with an output as defined in IEEE P1363 format. The format of the Signature bytes for these algorithms is the concatenation of the integers r and s in raw bytes.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">&lt;digest&gt;with&lt;encryption&gt;</th>
<td style="text-align: left;">Use this to form a name for a signature algorithm with a particular message digest (such as MD2 or MD5) and algorithm (such as RSA or DSA), just as was done for the explicitly defined standard names in this section (MD2withRSA, and so on).<br />
<br />
For the signature schemes defined in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>, for which the &lt;digest&gt;with&lt;encryption&gt; form is insufficient, &lt;digest&gt;with&lt;encryption&gt;and&lt;mgf&gt; can be used to form a name. Here, &lt;mgf&gt; should be replaced by a mask generation function such as MGF1. Example: <strong>MD5withRSAandMGF1</strong><br />
<br />
For the signature formats defined in IEEE P1363, &lt;digest&gt;with&lt;encryption&gt;in&lt;format&gt;Format can be used to form a name. Example: <strong>SHA1withECDSAinP1363Format</strong></td>
</tr>
</tbody>
</table>
<h2 id="sslcontext-algorithms"><code>SSLContext</code> Algorithms</h2>
<p>The algorithm names in this section can be specified when generating an instance of <code>SSLContext</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SSL</th>
<td style="text-align: left;">Supports some version of SSL; may support other SSL/TLS versions.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SSLv2</th>
<td style="text-align: left;">Supports SSL version 2 or later; may support other SSL/TLS versions.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SSLv3</th>
<td style="text-align: left;">Supports SSL version 3; may support other SSL/TLS versions.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">TLS</th>
<td style="text-align: left;">Supports some version of TLS; may support other SSL/TLS versions.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc2246">RFC 2246: TLS version 1.0</a>; may support other SSL/TLS versions.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.1</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc4346">RFC 4346: TLS version 1.1</a>; may support other SSL/TLS versions.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.2</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc5246">RFC 5246: TLS version 1.2</a>; may support other SSL/TLS versions.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.3</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc8446">RFC 8446: TLS version 1.3</a>; may support other SSL/TLS versions.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DTLS</th>
<td style="text-align: left;">Supports the default provider-dependent versions of DTLS versions.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DTLSv1.0</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc4347">RFC 4347: DTLS version 1.0</a>; may support other DTLS versions.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DTLSv1.2</th>
<td style="text-align: left;">Supports <a href="https://tools.ietf.org/html/rfc6347">RFC 6347: DTLS version 1.2</a>; may support other DTLS versions.</td>
</tr>
</tbody>
</table>
<h2 id="trustmanagerfactory-algorithms"><code>TrustManagerFactory</code> Algorithms</h2>
<p>The algorithm name in this section can be specified when generating an instance of <code>TrustManagerFactory</code>.</p>
<table>
<colgroup>
<col style="width: 21%" />
<col style="width: 78%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm Name</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">PKIX</th>
<td style="text-align: left;">A factory for <code>X509ExtendedTrustManager</code> objects that validate certificate chains according to the rules defined by the IETF PKIX working group in <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a> or its successor. The <code>TrustManagerFactory</code> must support initialization using the class <code>javax.net.ssl.CertPathTrustManagerParameters</code>.</td>
</tr>
</tbody>
</table>
<h2 id="xml-signature-xmlsignaturefactorykeyinfofactorytransformservice-mechanisms">XML Signature (<code>XMLSignatureFactory</code>/<code>KeyInfoFactory</code>/<code>TransformService</code>) Mechanisms</h2>
<p>The mechanism that can be specified when generating an instance of <code>XMLSignatureFactory</code>, <code>KeyInfoFactory</code>, or <code>TransformService</code>.</p>
<p>The mechanism identifies the XML processing mechanism that an implementation uses internally to parse and generate XML signature and KeyInfo structures. Also, note that each <code>TransformService</code> instance supports a specific transform algorithm in addition to a mechanism. The standard names for the transform algorithms are defined in the next section.</p>
<table style="width:54%;">
<colgroup>
<col style="width: 16%" />
<col style="width: 37%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Mechanism</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DOM</th>
<td style="text-align: left;">The Document Object Model.</td>
</tr>
</tbody>
</table>
<h2 id="xml-signature-transform-transformservice-algorithms">XML Signature Transform (<code>TransformService</code>) Algorithms</h2>
<p>The algorithms in this section can be specified when generating an instance of <code>TransformService</code>.</p>
<p><strong>Note:</strong> The URIs are specified instead of names to be consistent with the XML Signature standard. API constants have been defined for each URI, and are listed in parentheses after each URI in the following table.</p>
<table>
<colgroup>
<col style="width: 50%" />
<col style="width: 50%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Algorithm URI</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/TR/2001/REC-xml-c14n-20010315 (<code>CanonicalizationMethod.INCLUSIVE</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/2001/REC-xml-c14n-20010315">Canonical XML (without comments)</a> canonicalization algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments (<code>CanonicalizationMethod.INCLUSIVE_WITH_COMMENTS</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments">Canonical XML with comments</a> canonicalization algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2001/10/xml-exc-c14n# (<code>CanonicalizationMethod.EXCLUSIVE</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/#">Exclusive Canonical XML (without comments)</a> canonicalization algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2001/10/xml-exc-c14n#WithComments (<code>CanonicalizationMethod.EXCLUSIVE_WITH_COMMENTS</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/#WithComments">Exclusive Canonical XML with comments</a> canonicalization algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2006/12/xml-c14n11 (<code>CanonicalizationMethod.INCLUSIVE_11</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xml-c14n11/">Canonical XML 1.1 (without comments)</a> canonicalization algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2006/12/xml-c14n11#WithComments (<code>CanonicalizationMethod.INCLUSIVE_11_WITH_COMMENTS</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xml-c14n11/#WithComments">Canonical XML 1.1 with comments</a> canonicalization algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2000/09/xmldsig#base64 (<code>Transform.BASE64</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xmldsig-core/#sec-Base-64">Base64</a> transform algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2000/09/xmldsig#enveloped-signature (<code>Transform.ENVELOPED</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xmldsig-core/#sec-EnvelopedSignature">Enveloped Signature</a> transform algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/TR/1999/REC-xpath-19991116 (<code>Transform.XPATH</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xmldsig-core/#sec-XPath">XPath</a> transform algorithm.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/2002/06/xmldsig-filter2 (<code>Transform.XPATH2</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/2002/REC-xmldsig-filter2-20021108/">XPath Filter 2</a> transform algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">http://www.w3.org/TR/1999/REC-xslt-19991116 (<code>Transform.XSLT</code>)</th>
<td style="text-align: left;">The <a href="https://www.w3.org/TR/xmldsig-core/#sec-XSLT">XSLT</a> transform algorithm.</td>
</tr>
</tbody>
</table>
<h2 id="jsse-cipher-suite-names">JSSE Cipher Suite Names</h2>
<p>The following table contains the standard JSSE cipher suite names. Over time, various groups have added additional cipher suites to the <a href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4">SSL/TLS/DTLS namespace</a>.</p>
<p>Some JSSE cipher suite names were defined before TLSv1.0 was finalized, and were therefore given the <code>SSL_</code> prefix. The names mentioned in the TLS RFCs prefixed with <code>TLS_</code> are functionally equivalent to the JSSE cipher suites prefixed with <code>SSL_</code>.</p>
<table>
<colgroup>
<col style="width: 9%" />
<col style="width: 41%" />
<col style="width: 10%" />
<col style="width: 10%" />
<col style="width: 10%" />
<col style="width: 18%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Cipher Suite Code</th>
<th style="text-align: left;">Standard Name (IANA name if different)</th>
<th style="text-align: left;">Valid for Datagram Transport Layer Protocols</th>
<th style="text-align: left;">Deprecated (Protocol)</th>
<th style="text-align: left;">Introduced in (Protocol)</th>
<th style="text-align: left;">References</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x00</th>
<td style="text-align: left;">SSL_NULL_WITH_NULL_NULL IANA:TLS_NULL_WITH_NULL_NULL</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x01</th>
<td style="text-align: left;">SSL_RSA_WITH_NULL_MD5 IANA:TLS_RSA_WITH_NULL_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x02</th>
<td style="text-align: left;">SSL_RSA_WITH_NULL_SHA IANA:TLS_RSA_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x03</th>
<td style="text-align: left;">SSL_RSA_EXPORT_WITH_RC4_40_MD5 IANA:TLS_RSA_EXPORT_WITH_RC4_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x04</th>
<td style="text-align: left;">SSL_RSA_WITH_RC4_128_MD5 IANA:TLS_RSA_WITH_RC4_128_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x05</th>
<td style="text-align: left;">SSL_RSA_WITH_RC4_128_SHA IANA:TLS_RSA_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x06</th>
<td style="text-align: left;">SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 IANA:TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x07</th>
<td style="text-align: left;">SSL_RSA_WITH_IDEA_CBC_SHA IANA:TLS_RSA_WITH_IDEA_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5469">RFC 5469</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x08</th>
<td style="text-align: left;">SSL_RSA_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x09</th>
<td style="text-align: left;">SSL_RSA_WITH_DES_CBC_SHA IANA:TLS_RSA_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5469">RFC 5469</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0A</th>
<td style="text-align: left;">SSL_RSA_WITH_3DES_EDE_CBC_SHA IANA:TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0B</th>
<td style="text-align: left;">SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0C</th>
<td style="text-align: left;">SSL_DH_DSS_WITH_DES_CBC_SHA IANA:TLS_DH_DSS_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0D</th>
<td style="text-align: left;">SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA IANA:TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0E</th>
<td style="text-align: left;">SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x0F</th>
<td style="text-align: left;">SSL_DH_RSA_WITH_DES_CBC_SHA IANA:TLS_DH_RSA_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5469">RFC 5469</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x10</th>
<td style="text-align: left;">SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA IANA:TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x11</th>
<td style="text-align: left;">SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x12</th>
<td style="text-align: left;">SSL_DHE_DSS_WITH_DES_CBC_SHA IANA:TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5469">RFC 5469</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x13</th>
<td style="text-align: left;">SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA IANA:TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x14</th>
<td style="text-align: left;">SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x15</th>
<td style="text-align: left;">SSL_DHE_RSA_WITH_DES_CBC_SHA IANA:TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5469">RFC 5469</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x16</th>
<td style="text-align: left;">SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA IANA:TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x17</th>
<td style="text-align: left;">SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 IANA:TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x18</th>
<td style="text-align: left;">SSL_DH_anon_WITH_RC4_128_MD5 IANA:TLS_DH_anon_WITH_RC4_128_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x19</th>
<td style="text-align: left;">SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA IANA:TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x1A</th>
<td style="text-align: left;">SSL_DH_anon_WITH_DES_CBC_SHA IANA:TLS_DH_anon_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x1B</th>
<td style="text-align: left;">SSL_DH_anon_WITH_3DES_EDE_CBC_SHA IANA:TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x1E</th>
<td style="text-align: left;">TLS_KRB5_WITH_DES_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">TLSv1.0</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x1F</th>
<td style="text-align: left;">TLS_KRB5_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.0</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x20</th>
<td style="text-align: left;">TLS_KRB5_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.0</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x21</th>
<td style="text-align: left;">TLS_KRB5_WITH_IDEA_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x22</th>
<td style="text-align: left;">TLS_KRB5_WITH_DES_CBC_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x23</th>
<td style="text-align: left;">TLS_KRB5_WITH_3DES_EDE_CBC_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x24</th>
<td style="text-align: left;">TLS_KRB5_WITH_RC4_128_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x25</th>
<td style="text-align: left;">TLS_KRB5_WITH_IDEA_CBC_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x26</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x27</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x28</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_RC4_40_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x29</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2A</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2B</th>
<td style="text-align: left;">TLS_KRB5_EXPORT_WITH_RC4_40_MD5</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.1</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2712">RFC 2712</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2C</th>
<td style="text-align: left;">TLS_PSK_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4785">RFC 4785</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2D</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4785">RFC 4785</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2E</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4785">RFC 4785</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x2F</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x30</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x31</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x32</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x33</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x34</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x35</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x36</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x37</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x38</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x39</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3A</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3B</th>
<td style="text-align: left;">TLS_RSA_WITH_NULL_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3C</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3D</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3E</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x3F</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x40</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x41</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x42</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x43</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x44</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x45</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x46</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x67</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x68</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x69</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x6A</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x6B</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x6C</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x6D</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x84</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x85</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x86</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x87</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x88</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x89</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8A</th>
<td style="text-align: left;">TLS_PSK_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8B</th>
<td style="text-align: left;">TLS_PSK_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8C</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8D</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8E</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x8F</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x90</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x91</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x92</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x93</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x94</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x95</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4279">RFC 4279</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x96</th>
<td style="text-align: left;">TLS_RSA_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x97</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x98</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x99</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9A</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9B</th>
<td style="text-align: left;">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4162">RFC 4162</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9C</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9D</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9E</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0x9F</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA0</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA1</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA2</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA3</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA4</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA5</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA6</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA7</th>
<td style="text-align: left;">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5288">RFC 5288</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA8</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xA9</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAA</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAB</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAC</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAD</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAE</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xAF</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB0</th>
<td style="text-align: left;">TLS_PSK_WITH_NULL_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB1</th>
<td style="text-align: left;">TLS_PSK_WITH_NULL_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB2</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB3</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB4</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_NULL_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB5</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_NULL_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB6</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB7</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB8</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_NULL_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xB9</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_NULL_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5487">RFC 5487</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBA</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBB</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBC</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBD</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBE</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xBF</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC0</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC1</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC2</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC3</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC4</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xC5</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5932">RFC 5932</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x00,0xFF</th>
<td style="text-align: left;">TLS_EMPTY_RENEGOTIATION_INFO_SCSV</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5746">RFC 5746</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x13,0x01</th>
<td style="text-align: left;">TLS_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x13,0x02</th>
<td style="text-align: left;">TLS_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x13,0x03</th>
<td style="text-align: left;">TLS_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x13,0x04</th>
<td style="text-align: left;">TLS_AES_128_CCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0x13,0x05</th>
<td style="text-align: left;">TLS_AES_128_CCM_8_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0x56,0x00</th>
<td style="text-align: left;">TLS_FALLBACK_SCSV</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7507">RFC 7507</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x01</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x02</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x03</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x04</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x05</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x06</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x07</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x08</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x09</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0A</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0B</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0C</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0D</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0E</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x0F</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x10</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x11</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x12</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x13</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x14</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x15</th>
<td style="text-align: left;">TLS_ECDH_anon_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x16</th>
<td style="text-align: left;">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x17</th>
<td style="text-align: left;">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x18</th>
<td style="text-align: left;">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x19</th>
<td style="text-align: left;">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1A</th>
<td style="text-align: left;">TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1B</th>
<td style="text-align: left;">TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1C</th>
<td style="text-align: left;">TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1D</th>
<td style="text-align: left;">TLS_SRP_SHA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1E</th>
<td style="text-align: left;">TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x1F</th>
<td style="text-align: left;">TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x20</th>
<td style="text-align: left;">TLS_SRP_SHA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x21</th>
<td style="text-align: left;">TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x22</th>
<td style="text-align: left;">TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5054">RFC 5054</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x23</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x24</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x25</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x26</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x27</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x28</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x29</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2A</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2B</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2C</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2D</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2E</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x2F</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x30</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x31</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x32</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5289">RFC 5289</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x33</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_RC4_128_SHA</td>
<td style="text-align: left;">No</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a> <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x34</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x35</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x36</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x37</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x38</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x39</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_NULL_SHA</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3A</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_NULL_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3B</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_NULL_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc5489">RFC 5489</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3C</th>
<td style="text-align: left;">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3D</th>
<td style="text-align: left;">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3E</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x3F</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x40</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x41</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x42</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x43</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x44</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x45</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x46</th>
<td style="text-align: left;">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x47</th>
<td style="text-align: left;">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x48</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x49</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4A</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4B</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4C</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4D</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4E</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x4F</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x50</th>
<td style="text-align: left;">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x51</th>
<td style="text-align: left;">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x52</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x53</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x54</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x55</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x56</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x57</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x58</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x59</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5A</th>
<td style="text-align: left;">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5B</th>
<td style="text-align: left;">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5C</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5D</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5E</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x5F</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x60</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x61</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x62</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x63</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x64</th>
<td style="text-align: left;">TLS_PSK_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x65</th>
<td style="text-align: left;">TLS_PSK_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x66</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x67</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x68</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x69</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6A</th>
<td style="text-align: left;">TLS_PSK_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6B</th>
<td style="text-align: left;">TLS_PSK_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6C</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6D</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6E</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x6F</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x70</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x71</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6209">RFC 6209</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x72</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x73</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x74</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x75</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x76</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x77</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x78</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x79</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7A</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7B</th>
<td style="text-align: left;">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7C</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7D</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7E</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x7F</th>
<td style="text-align: left;">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x80</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x81</th>
<td style="text-align: left;">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x82</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x83</th>
<td style="text-align: left;">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x84</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x85</th>
<td style="text-align: left;">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x86</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x87</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x88</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x89</th>
<td style="text-align: left;">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8A</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8B</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8C</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8D</th>
<td style="text-align: left;">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8E</th>
<td style="text-align: left;">TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x8F</th>
<td style="text-align: left;">TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x90</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x91</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x92</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x93</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x94</th>
<td style="text-align: left;">TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x95</th>
<td style="text-align: left;">TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x96</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x97</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x98</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x99</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9A</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9B</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">N/A</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6367">RFC 6367</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9C</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_128_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9D</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_256_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9E</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_128_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0x9F</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_256_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA0</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_128_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA1</th>
<td style="text-align: left;">TLS_RSA_WITH_AES_256_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA2</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA3</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA4</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_128_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA5</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_256_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA6</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_128_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA7</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_256_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA8</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_128_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xA9</th>
<td style="text-align: left;">TLS_PSK_WITH_AES_256_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAA</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_128_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAB</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_AES_256_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc6655">RFC 6655</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAC</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_128_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7251">RFC 7251</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAD</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_256_CCM</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7251">RFC 7251</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAE</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7251">RFC 7251</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xC0,0xAF</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7251">RFC 7251</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xA8</th>
<td style="text-align: left;">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xA9</th>
<td style="text-align: left;">TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xAA</th>
<td style="text-align: left;">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xAB</th>
<td style="text-align: left;">TLS_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xAC</th>
<td style="text-align: left;">TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xAD</th>
<td style="text-align: left;">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">0xCC,0xAE</th>
<td style="text-align: left;">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
<td style="text-align: left;">Yes</td>
<td style="text-align: left;">TLSv1.3</td>
<td style="text-align: left;">TLSv1.2</td>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc7905">RFC 7905</a></td>
</tr>
</tbody>
</table>
<h2 id="additional-jsse-standard-names">Additional JSSE Standard Names</h2>
<h3 id="key-types">Key Types</h3>
<p>The <code>keyType</code> parameter passed to the <code>chooseClientAlias</code>, <code>chooseServerAlias</code>, <code>getClientAliases</code>, and <code>getServerAliases</code> methods of <code>X509KeyManager</code> specifies the public key types.</p>
<p>Each row of the table that follows lists the standard name that should be used for <code>keyType</code>, given the specified certificate type.</p>
<table style="width:67%;">
<caption>Standard Names for a Key Type</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 50%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Name</th>
<th style="text-align: left;">Certificate Type</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">RSA</th>
<td style="text-align: left;">RSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DSA</th>
<td style="text-align: left;">DSA</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DH_RSA</th>
<td style="text-align: left;">Diffie-Hellman with RSA signature</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DH_DSA</th>
<td style="text-align: left;">Diffie-Hellman with DSA signature</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EC</th>
<td style="text-align: left;">Elliptic Curve</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">EC_EC</th>
<td style="text-align: left;">Elliptic Curve with ECDSA signature</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EC_RSA</th>
<td style="text-align: left;">Elliptic Curve with RSA signature</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">RSASSA-PSS</th>
<td style="text-align: left;">RSASSA-PSS</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">EdDSA</th>
<td style="text-align: left;">EdDSA (Ed25519 and Ed448)</td>
</tr>
</tbody>
</table>
<h3 id="protocols">Protocols</h3>
<p>The <code>protocols</code> parameter passed to the <code>setEnabledProtocols</code> method of <code>SSLSocket</code> and <code>SSLEngine</code> specifies the protocol versions to be enabled for use on the connection. The table that follows lists the standard names that can be passed to the <code>setEnabledProtocols</code> method or that may be returned by the <code>getSupportedProtocols</code> and <code>getEnabledProtocols</code> methods of <code>SSLSocket</code> and <code>SSLEngine</code>.</p>
<p>These names also apply to the <code>protocol</code> parameter returned from the <code>getProtocol</code> method of <code>SSLSession</code>, and the <code>protocols</code> parameter passed to the <code>setProtocols</code> method or that may be returned by the <code>getProtocols</code> method of <code>SSLParameters</code>.</p>
<table>
<caption>Standard Names for a Protocol</caption>
<colgroup>
<col style="width: 15%" />
<col style="width: 85%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Name</th>
<th style="text-align: left;">Protocol</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SSLv2</th>
<td style="text-align: left;">SSL version 2 protocol</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">SSLv3</th>
<td style="text-align: left;">SSL version 3 protocol</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1</th>
<td style="text-align: left;">TLS version 1.0 protocol (defined in <a href="https://tools.ietf.org/html/rfc2246">RFC 2246</a>)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.1</th>
<td style="text-align: left;">TLS version 1.1 protocol (defined in <a href="https://tools.ietf.org/html/rfc4346">RFC 4346</a>)</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.2</th>
<td style="text-align: left;">TLS version 1.2 protocol (defined in <a href="https://tools.ietf.org/html/rfc5246">RFC 5246</a>)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">TLSv1.3</th>
<td style="text-align: left;">TLS version 1.3 protocol (defined in <a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a>)</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">DTLSv1.0</th>
<td style="text-align: left;">DTLS version 1.0 protocol (defined in <a href="https://tools.ietf.org/html/rfc4347">RFC 4347</a>)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">DTLSv1.2</th>
<td style="text-align: left;">DTLS version 1.2 protocol (defined in <a href="https://tools.ietf.org/html/rfc6347">RFC 6347</a>)</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">SSLv2Hello</th>
<td style="text-align: left;">Currently, the SSLv3, TLSv1, and TLSv1.1 protocols allow you to send SSLv3, TLSv1, and TLSv1.1 hellos encapsulated in an SSLv2 format hello. For more details on the reasons for allowing this compatibility in these protocols, see Appendix E in the appropriate RFCs (previously listed).<br />
<br />
<strong>Note:</strong> Some SSL/TLS servers do not support the v2 hello format and require that client hellos conform to the SSLv3 or TLSv1 client hello formats.<br />
<br />
The SSLv2Hello option controls the SSLv2 encapsulation. If SSLv2Hello is disabled on the client, then all outgoing messages will conform to the SSLv3/TLSv1 client hello format. If SSLv2Hello is disabled on the server, then all incoming messages must conform to the SSLv3/TLSv1 client hello format.</td>
</tr>
</tbody>
</table>
<h3 id="authentication-types">Authentication Types</h3>
<p>The <code>authType</code> parameter passed to the <code>checkClientTrusted</code> and <code>checkServerTrusted</code> methods of <code>X509TrustManager</code> indicates the authentication type. The table that follows specifies what standard names should be used for the client or server certificate chains.</p>
<table>
<caption>Standard Names for Client or Server Certificate Chain</caption>
<colgroup>
<col style="width: 25%" />
<col style="width: 75%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Client or Server Certificate Chain</th>
<th style="text-align: left;">Authentication Type Standard Name</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Client</th>
<td style="text-align: left;">Determined by the actual certificate used. For instance, if RSAPublicKey is used, the <code>authType</code> should be &quot;RSA&quot;.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Server</th>
<td style="text-align: left;">The key exchange algorithm portion of the cipher suites represented as a String, such as &quot;RSA&quot; or &quot;DHE_DSS&quot;.<br />
<br />
<strong>Note:</strong> For some exportable cipher suites, the key exchange algorithm is determined at runtime during the handshake.<br />
<br />
For instance, for TLS_RSA_EXPORT_WITH_RC4_40_MD5, the <code>authType</code> should be &quot;RSA_EXPORT&quot; when an ephemeral RSA key is used for the key exchange, and &quot;RSA&quot; when the key from the server certificate is used. Or it can take the value &quot;UNKNOWN&quot;.</td>
</tr>
</tbody>
</table>
<h3 id="endpoint-identification-algorithms">Endpoint Identification Algorithms</h3>
<p>The endpoint identification algorithm indicates the endpoint identification or verification procedures during SSL/TLS/DTLS handshaking. The algorithm name can be passed to the <code>setEndpointIdentificationAlgorithm</code> method of <code>javax.net.ssl.SSLParameters</code>.</p>
<p>The following table shows the standard endpoint identification names.</p>
<table>
<caption>Endpoint Identification Algorithm Name</caption>
<colgroup>
<col style="width: 50%" />
<col style="width: 50%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Endpoint Identification Algorithm Name</th>
<th style="text-align: left;">Specification</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">HTTPS</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2818">RFC 2818</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">LDAPS</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc2830">RFC 2830</a></td>
</tr>
</tbody>
</table>
<h3 id="signature-schemes">Signature Schemes</h3>
<p>The following table contains the standard signature scheme names, which are the algorithms used in the digital signatures of TLS connections and are also defined in the <a href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-signaturescheme">SignatureScheme section</a> of the IANA TLS Registry.</p>
<table>
<colgroup>
<col style="width: 33%" />
<col style="width: 66%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Signature Scheme</th>
<th style="text-align: left;">Specification</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ecdsa_secp256r1_sha256</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ecdsa_secp384r1_sha384</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ecdsa_secp521r1_sha512</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ecdsa_sha1</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ed25519</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">ed448</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pkcs1_sha1</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pkcs1_sha256</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pkcs1_sha384</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pkcs1_sha512</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_pss_sha256</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_pss_sha384</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_pss_sha512</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_rsae_sha256</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_rsae_sha384</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">rsa_pss_rsae_sha512</th>
<td style="text-align: left;"><a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a></td>
</tr>
</tbody>
</table>
<h3 id="named-groups">Named Groups</h3>
<p>The following table contains the standard group names, which are the named groups used in key exchange algorithms of TLS connections and are also defined in the <a href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">Supported Groups section</a> of the IANA TLS Registry.</p>
<table style="width:99%;">
<colgroup>
<col style="width: 25%" />
<col style="width: 73%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Name</th>
<th></th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">secp256rl<br />
secp384r1<br />
secp521r1</th>
<td>The NIST elliptic curves as specified in <a href="https://tools.ietf.org/html/rfc8422">RFC 8422</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">x25519<br />
x448<br />
</th>
<td>The elliptic curves as specified in <a href="https://tools.ietf.org/html/rfc8446">RFC 8446</a> and <a href="https://tools.ietf.org/html/rfc8422">RFC 8442</a>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">ffdhe2048<br />
ffdhe3072<br />
ffdhe4096<br />
ffdhe6144<br />
ffdhe8192</th>
<td>The Finite Field Diffie-Hellman Ephemeral (FFDHE) groups as specified in <a href="https://tools.ietf.org/html/rfc7919">RFC 7919</a>.</td>
</tr>
</tbody>
</table>
<h2 id="security-algorithm-specification">Security Algorithm Specification</h2>
<p>This section specifies details concerning some of the algorithms defined in this document. Any provider supplying an implementation of the listed algorithms must comply with the specifications in this section.</p>
<h3 id="specification-template">Specification Template</h3>
<p>The following table shows the fields of the algorithm specifications.</p>
<table>
<colgroup>
<col style="width: 27%" />
<col style="width: 72%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">The name by which the algorithm is known. This is the name passed to the <code>getInstance</code> method (when requesting the algorithm), and returned by the <code>getAlgorithm</code> method to determine the name of an existing algorithm object. These methods are in the relevant engine classes: <code>Signature</code>, <code>MessageDigest</code>, <code>KeyPairGenerator</code>, and <code>AlgorithmParameterGenerator</code> .</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;">The type of algorithm: <code>Signature</code>, <code>MessageDigest</code>, <code>KeyPairGenerator</code>, or <code>AlgorithmParameterGenerator</code>.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">General notes about the algorithm, including any standards implemented by the algorithm, applicable patents, and so on.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyPair</code> Algorithm (<em>optional</em>)</th>
<td style="text-align: left;">The <code>KeyPair</code> algorithm for this algorithm.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Keysize (<em>optional</em>)</th>
<td style="text-align: left;">For a keyed algorithm or key generation algorithm: the valid keysizes.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Size (<em>optional</em>)</th>
<td style="text-align: left;">For an algorithm parameter generation algorithm: the valid &quot;sizes&quot; for algorithm parameter generation.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Parameter Defaults (<em>optional</em>)</th>
<td style="text-align: left;">For a key generation algorithm: the default parameter values.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Signature</code> Format (<em>optional</em>)</th>
<td style="text-align: left;">For a <code>Signature</code> algorithm, the format of the signature, that is, the input and output of the verify and sign methods, respectively.</td>
</tr>
</tbody>
</table>
<h3 id="algorithm-specifications">Algorithm Specifications</h3>
<table>
<caption>SHA-1 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-1</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 160-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-224 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-224</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 224-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-256 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-256</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 256-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-384 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-384</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 384-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-512 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-512</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 512-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-512/224 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-512/224</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 224-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA-512/256 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA-512/256</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf">FIPS 180-4</a>. The output of this algorithm is a 256-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA3-224 Message Digest Algorithms</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA3-224</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">FIPS PUB 202</a>. The output of this algorithm is a 224-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA3-256 Message Digest Algorithms</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA3-256</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">FIPS PUB 202</a>. The output of this algorithm is a 256-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA3-384 Message Digest Algorithms</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA3-384</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">FIPS PUB 202</a>. The output of this algorithm is a 384-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>SHA3-512 Message Digest Algorithms</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA3-512</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">FIPS PUB 202</a>. The output of this algorithm is a 512-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>MD2 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">MD2</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://tools.ietf.org/html/rfc1319">RFC 1319</a>. The output of this algorithm is a 128-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>MD5 Message Digest Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">MD5</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>MessageDigest</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The message digest algorithm as defined in <a href="https://tools.ietf.org/html/rfc1321">RFC 1321</a>. The output of this algorithm is a 128-bit digest.</td>
</tr>
</tbody>
</table>
<table>
<caption>The Digital Signature Algorithms, with SHA-1 or SHA-2</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA384withDSA, and SHA512withDSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>Signature</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">The signature algorithm described in <a href="https://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf">NIST FIPS 186-3</a>, using DSA with the SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message digest algorithms.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyPair</code> Algorithm</th>
<td style="text-align: left;">DSA</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Signature</code> Format</th>
<td style="text-align: left;">ASN.1 sequence of two INTEGER values: <code>r</code> and <code>s</code>, in that order:<br />
<br />
<code>SEQUENCE { r INTEGER, s INTEGER }</code></td>
</tr>
</tbody>
</table>
<table>
<caption>RSA-based Signature Algorithms, with MD2, MD5, SHA-1, or SHA-2</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Names</th>
<td style="text-align: left;">MD2withRSA, MD5withRSA, SHA1withRSA, SHA224withRSA, SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA512/224withRSA, SHA512/256withRSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>Signature</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">These are the signature algorithms that use the MD2, MD5, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message digest algorithms (respectively) with RSA encryption.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyPair</code> Algorithm</th>
<td style="text-align: left;">RSA</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Signature</code> Format</th>
<td style="text-align: left;">DER-encoded PKCS #1 block as defined in <a href="https://tools.ietf.org/html/rfc8017">RSA Laboratories, PKCS #1 v2.2</a>. The data encrypted is the digest of the data signed.</td>
</tr>
</tbody>
</table>
<table>
<caption>RSASSA-PSS-based Signature Algorithms</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Names</th>
<td style="text-align: left;">RSASSA-PSS</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>Signature</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">This signature algorithm requires PSS parameters to be explicitly supplied before data can be processed.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyPair</code> Algorithm</th>
<td style="text-align: left;">RSA or RSASSA-PSS</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Signature</code> Format</th>
<td style="text-align: left;">DER-encoded PKCS1 block as defined in <a href="https://tools.ietf.org/html/rfc8017">RSA Laboratories, PKCS #1 v2.2</a>. The data encrypted is the digest of the data signed.</td>
</tr>
</tbody>
</table>
<table>
<caption>DSA KeyPair Generation Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Name</th>
<td style="text-align: left;">DSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>KeyPairGenerator</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">This algorithm is the key pair generation algorithm described in <a href="https://csrc.nist.gov/publications/PubsFIPS.html">NIST FIPS 186</a> for DSA.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Keysize</th>
<td style="text-align: left;">The length, in bits, of the modulus <code>p</code>. This must be a multiple of 64, ranging from 512 to 1024 (inclusive), 2048, or 3072.</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Parameter Defaults</th>
<td style="text-align: left;">See below for the parameter values.</td>
</tr>
</tbody>
</table>
<p>The following are the parameter values for keysizes of 512, 768, and 1024 bits:</p>
<p><strong>512-bit Key Parameters</strong></p>
<pre><code> SEED =
     b869c82b 35d70e1b 1ff91b28 e37a62ec dc34409b
 counter = 123
 p =
     fca682ce 8e12caba 26efccf7 110e526d b078b05e decbcd1e b4a208f3
     ae1617ae 01f35b91 a47e6df6 3413c5e1 2ed0899b cd132acd 50d99151
     bdc43ee7 37592e17
 q =
     962eddcc 369cba8e bb260ee6 b6a126d9 346e38c5
 g =
     678471b2 7a9cf44e e91a49c5 147db1a9 aaf244f0 5a434d64 86931d2d
     14271b9e 35030b71 fd73da17 9069b32e 2935630e 1c206235 4d0da20a
     6c416e50 be794ca4</code></pre>
<p><strong>768-bit key parameters</strong></p>
<pre><code> SEED =
     77d0f8c4 dad15eb8 c4f2f8d6 726cefd9 6d5bb399
 counter = 263
 p =
     e9e64259 9d355f37 c97ffd35 67120b8e 25c9cd43 e927b3a9 670fbec5
     d8901419 22d2c3b3 ad248009 3799869d 1e846aab 49fab0ad 26d2ce6a
     22219d47 0bce7d77 7d4a21fb e9c270b5 7f607002 f3cef839 3694cf45
     ee3688c1 1a8c56ab 127a3daf
 q =
     9cdbd84c 9f1ac2f3 8d0f80f4 2ab952e7 338bf511
 g =
     30470ad5 a005fb14 ce2d9dcd 87e38bc7 d1b1c5fa cbaecbe9 5f190aa7
     a31d23c4 dbbcbe06 17454440 1a5b2c02 0965d8c2 bd2171d3 66844577
     1f74ba08 4d2029d8 3c1c1585 47f3a9f1 a2715be2 3d51ae4d 3e5a1f6a
     7064f316 933a346d 3f529252</code></pre>
<p><strong>1024-bit key parameters</strong></p>
<pre><code> SEED =
     8d515589 4229d5e6 89ee01e6 018a237e 2cae64cd
 counter = 92
 p =
     fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80
     b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b
     801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6
     1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675
     f3ae2b61 d72aeff2 2203199d d14801c7
 q =
     9760508f 15230bcc b292b982 a2eb840b f0581cf5
 g =
     f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b
     3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613
     b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f
     0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06
     928b665e 807b5525 64014c3b fecf492a</code></pre>
<p>The following are the default values for larger DSA key sizes identified by (L,N) pairs:</p>
<p><strong>(L,N) = (2048, 256)</strong></p>
<pre><code> SEED =
     b0b44176 01b59cbc 9d8ac8f9 35cadaec 4f5fbb2f 23785609 ae466748
     d9b5a536
 counter = 497
 p =
     95475cf5 d93e596c 3fcd1d90 2add02f4 27f5f3c7 210313bb 45fb4d5b
     b2e5fe1c bd678cd4 bbdd84c9 836be1f3 1c077772 5aeb6c2f c38b85f4
     8076fa76 bcd8146c c89a6fb2 f706dd71 9898c208 3dc8d896 f84062e2
     c9c94d13 7b054a8d 8096adb8 d5195239 8eeca852 a0af12df 83e475aa
     65d4ec0c 38a9560d 5661186f f98b9fc9 eb60eee8 b030376b 236bc73b
     e3acdbd7 4fd61c1d 2475fa30 77b8f080 467881ff 7e1ca56f ee066d79
     506ade51 edbb5443 a563927d bc4ba520 08674617 5c888592 5ebc64c6
     14790677 3496990c b714ec66 7304e261 faee33b3 cbdf008e 0c3fa906
     50d97d39 09c9275b f4ac86ff cb3d03e6 dfc8ada5 934242dd 6d3bcca2
     a406cb0b
 q =
     f8183668 ba5fc5bb 06b5981e 6d8b795d 30b8978d 43ca0ec5 72e37e09
     939a9773
 g =
     42debb9d a5b3d88c c956e087 87ec3f3a 09bba5f4 8b889a74 aaf53174
     aa0fbe7e 3c5b8fcd 7a53bef5 63b0e985 60328960 a9517f40 14d3325f
     c7962bf1 e049370d 76d1314a 76137e79 2f3f0db8 59d095e4 a5b93202
     4f079ecf 2ef09c79 7452b077 0e135078 2ed57ddf 794979dc ef23cb96
     f1830619 65c4ebc9 3c9c71c5 6b925955 a75f94cc cf1449ac 43d586d0
     beee4325 1b0b2287 349d68de 0d144403 f13e802f 4146d882 e057af19
     b6f6275c 6676c8fa 0e3ca271 3a3257fd 1b27d063 9f695e34 7d8d1cf9
     ac819a26 ca9b04cb 0eb9b7b0 35988d15 bbac6521 2a55239c fc7e58fa
     e38d7250 ab9991ff bc971340 25fe8ce0 4c4399ad 96569be9 1a546f49
     78693c7a</code></pre>
<p><strong>(L,N) = (2048, 224)</strong></p>
<pre><code> SEED =
     58423608 0cfa43c0 9b023541 35f4cc51 98a19efa da08bd86 6d601ba4
 counter = 2666
 p =
     8f7935d9 b9aae9bf abed887a cf4951b6 f32ec59e 3baf3718 e8eac496
     1f3efd36 06e74351 a9c41833 39b809e7 c2ae1c53 9ba7475b 85d011ad
     b8b47987 75498469 5cac0e8f 14b33608 28a22ffa 27110a3d 62a99345
     3409a0fe 696c4658 f84bdd20 819c3709 a01057b1 95adcd00 233dba54
     84b6291f 9d648ef8 83448677 979cec04 b434a6ac 2e75e998 5de23db0
     292fc111 8c9ffa9d 8181e733 8db792b7 30d7b9e3 49592f68 09987215
     3915ea3d 6b8b4653 c633458f 803b32a4 c2e0f272 90256e4e 3f8a3b08
     38a1c450 e4e18c1a 29a37ddf 5ea143de 4b66ff04 903ed5cf 1623e158
     d487c608 e97f211c d81dca23 cb6e3807 65f822e3 42be484c 05763939
     601cd667
 q =
     baf696a6 8578f7df dee7fa67 c977c785 ef32b233 bae580c0 bcd5695d
 g =
     16a65c58 20485070 4e7502a3 9757040d 34da3a34 78c154d4 e4a5c02d
     242ee04f 96e61e4b d0904abd ac8f37ee b1e09f31 82d23c90 43cb642f
     88004160 edf9ca09 b32076a7 9c32a627 f2473e91 879ba2c4 e744bd20
     81544cb5 5b802c36 8d1fa83e d489e94e 0fa0688e 32428a5c 78c478c6
     8d0527b7 1c9a3abb 0b0be12c 44689639 e7d3ce74 db101a65 aa2b87f6
     4c6826db 3ec72f4b 5599834b b4edb02f 7c90e9a4 96d3a55d 535bebfc
     45d4f619 f63f3ded bb873925 c2f224e0 7731296d a887ec1e 4748f87e
     fb5fdeb7 5484316b 2232dee5 53ddaf02 112b0d1f 02da3097 3224fe27
     aeda8b9d 4b2922d9 ba8be39e d9e103a6 3c52810b c688b7e2 ed4316e1
     ef17dbde</code></pre>
<table>
<caption>RSA KeyPair Generation Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Names</th>
<td style="text-align: left;">RSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>KeyPairGenerator</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">This algorithm is the key pair generation algorithm described in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Strength</th>
<td style="text-align: left;">The length, in bits, of the modulus <code>n</code>. This must be a multiple of 8 that is greater than or equal to 512</td>
</tr>
</tbody>
</table>
<table>
<caption>RSASSA-PSS KeyPair Generation Algorithm</caption>
<colgroup>
<col style="width: 16%" />
<col style="width: 83%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Names</th>
<td style="text-align: left;">RSASSA-PSS</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>KeyPairGenerator</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">This algorithm is the key pair generation algorithm described in <a href="https://tools.ietf.org/html/rfc8017">PKCS #1 v2.2</a>.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Strength</th>
<td style="text-align: left;">The length, in bits, of the modulus <code>n</code>. This must be a multiple of 8 that is greater than or equal to 512</td>
</tr>
</tbody>
</table>
<table>
<caption>DSA Parameter Generation Algorithm</caption>
<colgroup>
<col style="width: 18%" />
<col style="width: 81%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Field</th>
<th style="text-align: left;">Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Names</th>
<td style="text-align: left;">DSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Type</th>
<td style="text-align: left;"><code>AlgorithmParameterGenerator</code></td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row">Description</th>
<td style="text-align: left;">This algorithm is the parameter generation algorithm described in <a href="https://csrc.nist.gov/publications/PubsFIPS.html">NIST FIPS 186</a> for DSA.</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row">Strength</th>
<td style="text-align: left;">The length, in bits, of the modulus <code>p</code>. This must be a multiple of 64, ranging from from 512 to 1024 (inclusive), 2048, or 3072.<br />
Alternatively, generate DSA parameters with the <a href="../../api/java.base/java/security/spec/DSAGenParameterSpec.html">DSAGenParameterSpec</a> class. Note that this class supports the latest version of DSA standard, <a href="https://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf">FIPS PUB 186-3</a>, and only allows certain length of prime P and Q to be used. Valid sizes for length of prime P and sub-prime Q in bits are as follows:<br />
<br />
(1024, 160)<br />
(2048, 224)<br />
(2048, 256)<br />
(3072, 256)</td>
</tr>
</tbody>
</table>
<h2 id="security-algorithm-implementation-requirements">Security Algorithm Implementation Requirements</h2>
<p>This section defines the security algorithm requirements for Java SE implementations. The security algorithm requirements are intended to improve the interoperability of Java SE implementations and applications that use these algorithms.</p>
<p><strong>Note:</strong> The requirements in this section are <strong>not</strong> a measure of the strength or security of the algorithm. For example, recent advances in cryptanalysis have found weaknesses in the strength of the DESede (Triple DES) cipher algorithm. It is your responsibility to determine whether the algorithm meets the security requirements of your application.</p>
<p>Every implementation of this version of the Java SE platform must support the specified algorithms in the table that follows. These requirements do not apply to 3rd party providers. Consult the release documentation for your implementation to see if any other algorithms are supported.</p>
<table>
<colgroup>
<col style="width: 58%" />
<col style="width: 41%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Class</th>
<th style="text-align: left;">Algorithm Name(s)</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>AlgorithmParameterGenerator</code><br />
Implementations must support the key sizes<br />
in parentheses.</th>
<td style="text-align: left;">DiffieHellman (1024, 2048)<br />
DSA (1024, 2048)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>AlgorithmParameters</code></th>
<td style="text-align: left;">AES<br />
DESede<br />
DiffieHellman<br />
DSA</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>CertificateFactory</code></th>
<td style="text-align: left;">X.509</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>CertPath</code> Encoding</th>
<td style="text-align: left;">PKCS7<br />
PkiPath</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>CertPathBuilder</code></th>
<td style="text-align: left;">PKIX</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>CertPathValidator</code></th>
<td style="text-align: left;">PKIX</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>CertStore</code></th>
<td style="text-align: left;">Collection</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Cipher</code><br />
Implementations must support the key sizes in parentheses.</th>
<td style="text-align: left;">AES/CBC/NoPadding (128)<br />
AES/CBC/PKCS5Padding (128)<br />
AES/ECB/NoPadding (128)<br />
AES/ECB/PKCS5Padding (128)<br />
AES/GCM/NoPadding (128)<br />
DESede/CBC/NoPadding (168)<br />
DESede/CBC/PKCS5Padding (168)<br />
DESede/ECB/NoPadding (168)<br />
DESede/ECB/PKCS5Padding (168)<br />
RSA/ECB/PKCS1Padding (1024, 2048)<br />
RSA/ECB/OAEPWithSHA-1AndMGF1Padding (1024, 2048)<br />
RSA/ECB/OAEPWithSHA-256AndMGF1Padding (1024, 2048)<br />
</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Configuration</code> <a href="#footnote-1">[1]</a></th>
<td style="text-align: left;"></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyAgreement</code></th>
<td style="text-align: left;">DiffieHellman</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyFactory</code></th>
<td style="text-align: left;">DiffieHellman<br />
DSA<br />
RSA</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyGenerator</code><br />
Implementations must support the key sizes in parentheses.</th>
<td style="text-align: left;">AES (128)<br />
DESede (168)<br />
HmacSHA1<br />
HmacSHA256</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyPairGenerator</code><br />
Implementations must support the key sizes in parentheses.</th>
<td style="text-align: left;">DiffieHellman (1024, 2048, 4096)<br />
DSA (1024, 2048)<br />
RSA (1024, 2048, 4096)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>KeyStore</code></th>
<td style="text-align: left;">PKCS12</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Mac</code></th>
<td style="text-align: left;">HmacSHA1<br />
HmacSHA256</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>MessageDigest</code></th>
<td style="text-align: left;">SHA-1<br />
SHA-256</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Policy</code> <a href="#footnote-1">[1]</a></th>
<td style="text-align: left;"></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>SecretKeyFactory</code></th>
<td style="text-align: left;">DESede</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>SecureRandom</code> <a href="#footnote-1">[1]</a></th>
<td style="text-align: left;"></td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>Signature</code></th>
<td style="text-align: left;">SHA1withDSA<br />
SHA1withRSA<br />
SHA256withDSA<br />
SHA256withRSA</td>
</tr>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>SSLContext</code></th>
<td style="text-align: left;">TLSv1.2</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>TrustManagerFactory</code></th>
<td style="text-align: left;">PKIX</td>
</tr>
</tbody>
</table>
<p><a id=footnote-1></a> <strong>[1]</strong> No specific <code>Configuration</code> type, <code>Policy</code> type or <code>SecureRandom</code> algorithm is required; however, an implementation-specific default must be provided.</p>
<h3 id="xml-signature-algorithms">XML Signature Algorithms</h3>
<p>Every implementation of this version of the Java SE platform must support the specified XML Signature algorithms in the table that follows. These requirements do not apply to 3rd party providers. Consult the release documentation for your implementation to see if any other algorithms are supported.</p>
<table>
<colgroup>
<col style="width: 28%" />
<col style="width: 71%" />
</colgroup>
<thead>
<tr class="header">
<th style="text-align: left;">Class</th>
<th style="text-align: left;">Algorithm Name(s)</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<th style="font-weight: normal; text-align: left;" scope="row"><code>TransformService</code></th>
<td style="text-align: left;">http://www.w3.org/2001/10/xml-exc-c14n# (<code>CanonicalizationMethod.EXCLUSIVE</code>)<br />
http://www.w3.org/TR/2001/REC-xml-c14n-20010315 (<code>CanonicalizationMethod.INCLUSIVE</code>)<br />
http://www.w3.org/2000/09/xmldsig#base64 (<code>Transform.BASE64</code>)<br />
http://www.w3.org/2000/09/xmldsig#enveloped-signature (<code>Transform.ENVELOPED</code>)</td>
</tr>
<tr class="even">
<th style="font-weight: normal; text-align: left;" scope="row"><code>XMLSignatureFactory</code></th>
<td style="text-align: left;">DOM</td>
</tr>
</tbody>
</table>
</main><footer class="legal-footer"><hr/><a href="../../legal/copyright.html">Copyright</a> &copy; 1993, 2021, Oracle and/or its affiliates, 500 Oracle Parkway, Redwood Shores, CA 94065 USA.<br>All rights reserved. Use is subject to <a href="https://www.oracle.com/java/javase/terms/license/java17speclicense.html">license terms</a> and the <a href="https://www.oracle.com/technetwork/java/redist-137594.html">documentation redistribution policy</a>. <!-- Version 17.0.2+8-LTS-86 --></footer>
</body>
</html>