Refactor dotfiles into .config
Include local bin files
This commit is contained in:
parent
2741ae520b
commit
d2467209b7
204 changed files with 44454 additions and 3 deletions
44
.local/bin/IPMIView/jre/conf/security/java.policy
Executable file
44
.local/bin/IPMIView/jre/conf/security/java.policy
Executable file
|
@ -0,0 +1,44 @@
|
|||
//
|
||||
// This system policy file grants a set of default permissions to all domains
|
||||
// and can be configured to grant additional permissions to modules and other
|
||||
// code sources. The code source URL scheme for modules linked into a
|
||||
// run-time image is "jrt".
|
||||
//
|
||||
// For example, to grant permission to read the "foo" property to the module
|
||||
// "com.greetings", the grant entry is:
|
||||
//
|
||||
// grant codeBase "jrt:/com.greetings" {
|
||||
// permission java.util.PropertyPermission "foo", "read";
|
||||
// };
|
||||
//
|
||||
|
||||
// default permissions granted to all domains
|
||||
grant {
|
||||
// allows anyone to listen on dynamic ports
|
||||
permission java.net.SocketPermission "localhost:0", "listen";
|
||||
|
||||
// "standard" properies that can be read by anyone
|
||||
permission java.util.PropertyPermission "java.version", "read";
|
||||
permission java.util.PropertyPermission "java.vendor", "read";
|
||||
permission java.util.PropertyPermission "java.vendor.url", "read";
|
||||
permission java.util.PropertyPermission "java.class.version", "read";
|
||||
permission java.util.PropertyPermission "os.name", "read";
|
||||
permission java.util.PropertyPermission "os.version", "read";
|
||||
permission java.util.PropertyPermission "os.arch", "read";
|
||||
permission java.util.PropertyPermission "file.separator", "read";
|
||||
permission java.util.PropertyPermission "path.separator", "read";
|
||||
permission java.util.PropertyPermission "line.separator", "read";
|
||||
permission java.util.PropertyPermission
|
||||
"java.specification.version", "read";
|
||||
permission java.util.PropertyPermission "java.specification.vendor", "read";
|
||||
permission java.util.PropertyPermission "java.specification.name", "read";
|
||||
permission java.util.PropertyPermission
|
||||
"java.vm.specification.version", "read";
|
||||
permission java.util.PropertyPermission
|
||||
"java.vm.specification.vendor", "read";
|
||||
permission java.util.PropertyPermission
|
||||
"java.vm.specification.name", "read";
|
||||
permission java.util.PropertyPermission "java.vm.version", "read";
|
||||
permission java.util.PropertyPermission "java.vm.vendor", "read";
|
||||
permission java.util.PropertyPermission "java.vm.name", "read";
|
||||
};
|
1382
.local/bin/IPMIView/jre/conf/security/java.security
Executable file
1382
.local/bin/IPMIView/jre/conf/security/java.security
Executable file
File diff suppressed because it is too large
Load diff
5
.local/bin/IPMIView/jre/conf/security/nss.cfg
Executable file
5
.local/bin/IPMIView/jre/conf/security/nss.cfg
Executable file
|
@ -0,0 +1,5 @@
|
|||
name = NSS
|
||||
nssLibraryDirectory = /usr/lib64
|
||||
nssDbMode = noDb
|
||||
attributes = compatibility
|
||||
handleStartupErrors = ignoreMultipleInitialisation
|
8
.local/bin/IPMIView/jre/conf/security/nss.fips.cfg
Executable file
8
.local/bin/IPMIView/jre/conf/security/nss.fips.cfg
Executable file
|
@ -0,0 +1,8 @@
|
|||
name = NSS-FIPS
|
||||
nssLibraryDirectory = /usr/lib64
|
||||
nssSecmodDirectory = sql:/etc/pki/nssdb
|
||||
nssDbMode = readOnly
|
||||
nssModule = fips
|
||||
|
||||
attributes(*,CKO_SECRET_KEY,CKK_GENERIC_SECRET)={ CKA_SIGN=true }
|
||||
|
54
.local/bin/IPMIView/jre/conf/security/policy/README.txt
Executable file
54
.local/bin/IPMIView/jre/conf/security/policy/README.txt
Executable file
|
@ -0,0 +1,54 @@
|
|||
|
||||
Java(TM) Cryptography Extension Policy Files
|
||||
for the Java(TM) Platform, Standard Edition Runtime Environment
|
||||
|
||||
README
|
||||
------------------------------------------------------------------------
|
||||
|
||||
Import and export control rules on cryptographic software vary from
|
||||
country to country. The Java Cryptography Extension (JCE) architecture
|
||||
allows flexible cryptographic key strength to be configured via the
|
||||
jurisdiction policy files which are referenced by the "crypto.policy"
|
||||
security property in the <java-home>/conf/security/java.security file.
|
||||
|
||||
By default, Java provides two different sets of cryptographic policy
|
||||
files:
|
||||
|
||||
unlimited: These policy files contain no restrictions on cryptographic
|
||||
strengths or algorithms
|
||||
|
||||
limited: These policy files contain more restricted cryptographic
|
||||
strengths
|
||||
|
||||
These files reside in <java-home>/conf/security/policy in the "unlimited"
|
||||
or "limited" subdirectories respectively.
|
||||
|
||||
Each subdirectory contains a complete policy configuration,
|
||||
and subdirectories can be added/edited/removed to reflect your
|
||||
import or export control product requirements.
|
||||
|
||||
Within a subdirectory, the effective policy is the combined minimum
|
||||
permissions of the grant statements in the file(s) matching the filename
|
||||
pattern "default_*.policy". At least one grant is required. For example:
|
||||
|
||||
limited = Export (all) + Import (limited) = Limited
|
||||
unlimited = Export (all) + Import (all) = Unlimited
|
||||
|
||||
The effective exemption policy is the combined minimum permissions
|
||||
of the grant statements in the file(s) matching the filename pattern
|
||||
"exempt_*.policy". Exemption grants are optional. For example:
|
||||
|
||||
limited = grants exemption permissions, by which the
|
||||
effective policy can be circumvented.
|
||||
e.g. KeyRecovery/KeyEscrow/KeyWeakening.
|
||||
|
||||
Please see the Java Cryptography Architecture (JCA) documentation for
|
||||
additional information on these files and formats.
|
||||
|
||||
YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
|
||||
TO DETERMINE THE EXACT REQUIREMENTS.
|
||||
|
||||
Please note that the JCE for Java SE, including the JCE framework,
|
||||
cryptographic policy files, and standard JCE providers provided with
|
||||
the Java SE, have been reviewed and approved for export as mass market
|
||||
encryption item by the US Bureau of Industry and Security.
|
|
@ -0,0 +1,6 @@
|
|||
// Default US Export policy file.
|
||||
|
||||
grant {
|
||||
// There is no restriction to any algorithms.
|
||||
permission javax.crypto.CryptoAllPermission;
|
||||
};
|
14
.local/bin/IPMIView/jre/conf/security/policy/limited/default_local.policy
Executable file
14
.local/bin/IPMIView/jre/conf/security/policy/limited/default_local.policy
Executable file
|
@ -0,0 +1,14 @@
|
|||
// Some countries have import limits on crypto strength. This policy file
|
||||
// is worldwide importable.
|
||||
|
||||
grant {
|
||||
permission javax.crypto.CryptoPermission "DES", 64;
|
||||
permission javax.crypto.CryptoPermission "DESede", *;
|
||||
permission javax.crypto.CryptoPermission "RC2", 128,
|
||||
"javax.crypto.spec.RC2ParameterSpec", 128;
|
||||
permission javax.crypto.CryptoPermission "RC4", 128;
|
||||
permission javax.crypto.CryptoPermission "RC5", 128,
|
||||
"javax.crypto.spec.RC5ParameterSpec", *, 12, *;
|
||||
permission javax.crypto.CryptoPermission "RSA", *;
|
||||
permission javax.crypto.CryptoPermission *, 128;
|
||||
};
|
13
.local/bin/IPMIView/jre/conf/security/policy/limited/exempt_local.policy
Executable file
13
.local/bin/IPMIView/jre/conf/security/policy/limited/exempt_local.policy
Executable file
|
@ -0,0 +1,13 @@
|
|||
// Some countries have import limits on crypto strength, but may allow for
|
||||
// these exemptions if the exemption mechanism is used.
|
||||
|
||||
grant {
|
||||
// There is no restriction to any algorithms if KeyRecovery is enforced.
|
||||
permission javax.crypto.CryptoPermission *, "KeyRecovery";
|
||||
|
||||
// There is no restriction to any algorithms if KeyEscrow is enforced.
|
||||
permission javax.crypto.CryptoPermission *, "KeyEscrow";
|
||||
|
||||
// There is no restriction to any algorithms if KeyWeakening is enforced.
|
||||
permission javax.crypto.CryptoPermission *, "KeyWeakening";
|
||||
};
|
|
@ -0,0 +1,6 @@
|
|||
// Default US Export policy file.
|
||||
|
||||
grant {
|
||||
// There is no restriction to any algorithms.
|
||||
permission javax.crypto.CryptoAllPermission;
|
||||
};
|
|
@ -0,0 +1,6 @@
|
|||
// Country-specific policy file for countries with no limits on crypto strength.
|
||||
|
||||
grant {
|
||||
// There is no restriction to any algorithms.
|
||||
permission javax.crypto.CryptoAllPermission;
|
||||
};
|
Loading…
Add table
Add a link
Reference in a new issue