55 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			55 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| 
 | |
|             Java(TM) Cryptography Extension Policy Files
 | |
|     for the Java(TM) Platform, Standard Edition Runtime Environment
 | |
| 
 | |
|                                README
 | |
| ------------------------------------------------------------------------
 | |
| 
 | |
| Import and export control rules on cryptographic software vary from
 | |
| country to country.  The Java Cryptography Extension (JCE) architecture
 | |
| allows flexible cryptographic key strength to be configured via the
 | |
| jurisdiction policy files which are referenced by the "crypto.policy"
 | |
| security property in the <java-home>/conf/security/java.security file.
 | |
| 
 | |
| By default, Java provides two different sets of cryptographic policy
 | |
| files:
 | |
| 
 | |
|     unlimited:  These policy files contain no restrictions on cryptographic
 | |
|                 strengths or algorithms
 | |
| 
 | |
|     limited:    These policy files contain more restricted cryptographic
 | |
|                 strengths
 | |
| 
 | |
| These files reside in <java-home>/conf/security/policy in the "unlimited"
 | |
| or "limited" subdirectories respectively.
 | |
| 
 | |
| Each subdirectory contains a complete policy configuration,
 | |
| and subdirectories can be added/edited/removed to reflect your
 | |
| import or export control product requirements.
 | |
| 
 | |
| Within a subdirectory, the effective policy is the combined minimum
 | |
| permissions of the grant statements in the file(s) matching the filename
 | |
| pattern "default_*.policy".  At least one grant is required.  For example:
 | |
| 
 | |
|     limited   =  Export (all) + Import (limited)  =  Limited
 | |
|     unlimited =  Export (all) + Import (all)      =  Unlimited
 | |
| 
 | |
| The effective exemption policy is the combined minimum permissions
 | |
| of the grant statements in the file(s) matching the filename pattern
 | |
| "exempt_*.policy".  Exemption grants are optional.  For example:
 | |
| 
 | |
|     limited   =  grants exemption permissions, by which the
 | |
|                  effective policy can be circumvented.
 | |
|                  e.g.  KeyRecovery/KeyEscrow/KeyWeakening.
 | |
| 
 | |
| Please see the Java Cryptography Architecture (JCA) documentation for
 | |
| additional information on these files and formats.
 | |
| 
 | |
| YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
 | |
| TO DETERMINE THE EXACT REQUIREMENTS.
 | |
| 
 | |
| Please note that the JCE for Java SE, including the JCE framework,
 | |
| cryptographic policy files, and standard JCE providers provided with
 | |
| the Java SE, have been reviewed and approved for export as mass market
 | |
| encryption item by the US Bureau of Industry and Security.
 |