jdk/src/java.base/share/conf/security/java.security
changeset 40565 3ac0ba151e70
parent 40558 ec1dec20d88f
child 41230 0a8c1ba2b6fb
equal deleted inserted replaced
40564:242110f0c920 40565:3ac0ba151e70
   802 #       EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \
   802 #       EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \
   803 #       E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \
   803 #       E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \
   804 #       EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \
   804 #       EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \
   805 #       FFFFFFFF FFFFFFFF, 2}
   805 #       FFFFFFFF FFFFFFFF, 2}
   806 
   806 
       
   807 # Cryptographic Jurisdiction Policy defaults
       
   808 # 
       
   809 # Due to the import control restrictions of some countries, the default
       
   810 # JCE policy files allow for strong but "limited" cryptographic key
       
   811 # lengths to be used.  If your country's cryptographic regulations allow,
       
   812 # the "unlimited" strength policy files can be used instead, which contain
       
   813 # no restrictions on cryptographic strengths.
       
   814 # 
       
   815 # If your country has restrictions that don't fit either "limited" or
       
   816 # "unlimited", an appropriate set of policy files should be created and
       
   817 # configured before using this distribution.  The jurisdiction policy file
       
   818 # configuration must reflect the cryptographic restrictions appropriate
       
   819 # for your country.
       
   820 # 
       
   821 # YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
       
   822 # TO DETERMINE THE EXACT REQUIREMENTS.
       
   823 # 
       
   824 # The policy files are flat text files organized into subdirectories of
       
   825 # <java-home>/conf/security/policy.  Each directory contains a complete
       
   826 # set of policy files.
       
   827 #
       
   828 # The "crypto.policy" Security property controls the directory selection,
       
   829 # and thus the effective cryptographic policy.
       
   830 # 
       
   831 # The default set of directories is:  
       
   832 # 
       
   833 #     limited | unlimited 
       
   834 # 
       
   835 # however other directories can be created and configured.
       
   836 # 
       
   837 # Within a directory, the effective policy is the combined minimum
       
   838 # permissions of the grant statements in the file(s) with the filename
       
   839 # pattern "default_*.policy".  At least one grant is required.  For
       
   840 # example:
       
   841 #
       
   842 #     limited   =  Export (all) + Import (limited)  =  Limited
       
   843 #     unlimited =  Export (all) + Import (all)      =  Unlimited
       
   844 #
       
   845 # The effective exemption policy is the combined minimum permissions
       
   846 # of the grant statements in the file(s) with the filename pattern
       
   847 # "exempt_*.policy".  Exemption grants are optional.
       
   848 #
       
   849 #     limited   =  grants exemption permissions, by which the
       
   850 #                  effective policy can be circumvented. 
       
   851 #                  e.g.  KeyRecovery/Escrow/Weakening.
       
   852 # 
       
   853 # Please see the JCA documentation for additional information on these
       
   854 # files and formats.
       
   855 crypto.policy=crypto.policydir-tbd
       
   856 
   807 #
   857 #
   808 # The policy for the XML Signature secure validation mode. The mode is
   858 # The policy for the XML Signature secure validation mode. The mode is
   809 # enabled by setting the property "org.jcp.xml.dsig.secureValidation" to
   859 # enabled by setting the property "org.jcp.xml.dsig.secureValidation" to
   810 # true with the javax.xml.crypto.XMLCryptoContext.setProperty() method,
   860 # true with the javax.xml.crypto.XMLCryptoContext.setProperty() method,
   811 # or by running the code with a SecurityManager.
   861 # or by running the code with a SecurityManager.