Java(TM) Cryptography Extension Policy Files
for the Java(TM) Platform, Standard Edition Runtime Environment
README
------------------------------------------------------------------------
Import and export control rules on cryptographic software vary from
country to country. The Java Cryptography Extension (JCE) architecture
allows flexible cryptographic key strength to be configured via the
jurisdiction policy files which are referenced by the "crypto.policy"
security property in the <java-home>/conf/security/java.security file.
By default, Java provides two different sets of cryptographic policy
files:
unlimited: These policy files contain no restrictions on cryptographic
strengths or algorithms
limited: These policy files contain more restricted cryptographic
strengths
These files reside in <java-home>/conf/security/policy in the "unlimited"
or "limited" subdirectories respectively.
Each subdirectory contains a complete policy configuration,
and subdirectories can be added/edited/removed to reflect your
import or export control product requirements.
Within a subdirectory, the effective policy is the combined minimum
permissions of the grant statements in the file(s) matching the filename
pattern "default_*.policy". At least one grant is required. For example:
limited = Export (all) + Import (limited) = Limited
unlimited = Export (all) + Import (all) = Unlimited
The effective exemption policy is the combined minimum permissions
of the grant statements in the file(s) matching the filename pattern
"exempt_*.policy". Exemption grants are optional. For example:
limited = grants exemption permissions, by which the
effective policy can be circumvented.
e.g. KeyRecovery/KeyEscrow/KeyWeakening.
Please see the Java Cryptography Architecture (JCA) documentation for
additional information on these files and formats.
YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
TO DETERMINE THE EXACT REQUIREMENTS.
Please note that the JCE for Java SE, including the JCE framework,
cryptographic policy files, and standard JCE providers provided with
the Java SE, have been reviewed and approved for export as mass market
encryption item by the US Bureau of Industry and Security.
gsllz
- 粉丝: 12
- 资源: 23
最新资源
- SQL操作教学与实战指南 - 数据库与表格的创建、修改、索引管理
- 学生作业-高考倒计时、列表的查询和排序 该项目为html前端项目,主要高考倒计时、列表的查询和排序 涉及html、js、css
- 数据库SQL查询操作详解与应用-从简单到复杂多表查询实践案例
- 数据库SQL查询实战:涵盖多表连接、嵌套查询、自身连接与复杂数据提取
- 计算机网络期末复习-OSI与TCP/IP模型、协议详解及应用场景
- 计算机网络复习要点:OSI模型、TCP/IP协议、IP地址、路由算法及网络安全
- 计算机网络期末复习详解-涵盖网络协议、数据传输、安全性的综合攻略
- 基于随机森林算法RF的数据回归预测 多输入单输出 代码含详细注释,不负责 数据存入Excel,替方便,指标计算有决定系数R2,平均绝对误差MAE,平均相对误差MBE
- python SyntaxError: invalid predicate报错
- 8FD47CAE-589D-4575-84E7-E4025F179C31.zip
- factoryio液位PID仿真程序 使用简单的梯形图编写,通俗易懂,起到抛砖引玉的作用,比较适合有动手能力的入门初学者 软件环境: 1、西门子编程软件:TIA Portal V15(博图V15)
- 1+X网络安全应急响应之应急准备:构建高效安全的应急响应体系
- win32汇编环境,在窗口程序中画五边形与六边形
- 东北大学钢板表面缺陷检测数据集 钢板表面缺陷检测数据集 含xml标签文件 可用于目标检测算法 yolov5 yolov6 yolov7 yolov8
- 法院“科技法庭”与庭审联网系统PPT(30页).pptx
- 电子法院介绍PPT(34页).pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈