Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/src/java.base/share/conf/security/policy/README.txt
41152 views
1
2
Java(TM) Cryptography Extension Policy Files
3
for the Java(TM) Platform, Standard Edition Runtime Environment
4
5
README
6
------------------------------------------------------------------------
7
8
Import and export control rules on cryptographic software vary from
9
country to country. The Java Cryptography Extension (JCE) architecture
10
allows flexible cryptographic key strength to be configured via the
11
jurisdiction policy files which are referenced by the "crypto.policy"
12
security property in the <java-home>/conf/security/java.security file.
13
14
By default, Java provides two different sets of cryptographic policy
15
files:
16
17
unlimited: These policy files contain no restrictions on cryptographic
18
strengths or algorithms
19
20
limited: These policy files contain more restricted cryptographic
21
strengths
22
23
These files reside in <java-home>/conf/security/policy in the "unlimited"
24
or "limited" subdirectories respectively.
25
26
Each subdirectory contains a complete policy configuration,
27
and subdirectories can be added/edited/removed to reflect your
28
import or export control product requirements.
29
30
Within a subdirectory, the effective policy is the combined minimum
31
permissions of the grant statements in the file(s) matching the filename
32
pattern "default_*.policy". At least one grant is required. For example:
33
34
limited = Export (all) + Import (limited) = Limited
35
unlimited = Export (all) + Import (all) = Unlimited
36
37
The effective exemption policy is the combined minimum permissions
38
of the grant statements in the file(s) matching the filename pattern
39
"exempt_*.policy". Exemption grants are optional. For example:
40
41
limited = grants exemption permissions, by which the
42
effective policy can be circumvented.
43
e.g. KeyRecovery/KeyEscrow/KeyWeakening.
44
45
Please see the Java Cryptography Architecture (JCA) documentation for
46
additional information on these files and formats.
47
48
YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
49
TO DETERMINE THE EXACT REQUIREMENTS.
50
51
Please note that the JCE for Java SE, including the JCE framework,
52
cryptographic policy files, and standard JCE providers provided with
53
the Java SE, have been reviewed and approved for export as mass market
54
encryption item by the US Bureau of Industry and Security.
55
56