The JCA processes all requests for cryptographic algorithms. Stations running without
FIPS 140-2 provide all the Sun (Oracle) built-in providers as well as the standard BouncyCastle provider. The software selects cryptographic
algorithms from any of these providers.
FIPS mode removes most Sun cryptographic providers and services. Instead, it uses the FIPS-certified BouncyCastle modules.
Since all cryptographic algorithm requests through the JCA are restricted to installed providers, only FIPS-compliant algorithms
are used.
NOTE: To upgrade legacy (pre-
AX-3.8) stations, and because of certain required Java core functions, a small number of non-FIPS approved algorithms are still
available. Although these algorithms are accessible through JCA calls, their use is not allowed in a
FIPS 140-2 environment. They are allowed only during the process of upgrading legacy systems.