questdb-6.0.4-SNAPSHOT-rt-osx-amd64.tar.gz

  • e3_445044
    了解作者
  • 18.7MB
    文件大小
  • gz
    文件格式
  • 0
    收藏次数
  • VIP专享
    资源类型
  • 0
    下载次数
  • 2022-04-01 10:33
    上传日期
时序数据库questdb6.0.4最新版。针对mac自编译的可运行包。内置jre11。解开直接运行bin下的quest.sh start就可以了。在mac10.15.7上实际测试通过。 其他平台(linux,windows)请自行去官方网站下。官方因为没有提供mac的独立可运行包,才自行编译的。有需要的可以下!
questdb-6.0.4-SNAPSHOT-rt-osx-amd64.tar.gz
内容介绍
Java(TM) Cryptography Extension Policy Files for the Java(TM) Platform, Standard Edition Runtime Environment README ------------------------------------------------------------------------ Import and export control rules on cryptographic software vary from country to country. The Java Cryptography Extension (JCE) architecture allows flexible cryptographic key strength to be configured via the jurisdiction policy files which are referenced by the "crypto.policy" security property in the <java-home>/conf/security/java.security file. By default, Java provides two different sets of cryptographic policy files: unlimited: These policy files contain no restrictions on cryptographic strengths or algorithms limited: These policy files contain more restricted cryptographic strengths These files reside in <java-home>/conf/security/policy in the "unlimited" or "limited" subdirectories respectively. Each subdirectory contains a complete policy configuration, and subdirectories can be added/edited/removed to reflect your import or export control product requirements. Within a subdirectory, the effective policy is the combined minimum permissions of the grant statements in the file(s) matching the filename pattern "default_*.policy". At least one grant is required. For example: limited = Export (all) + Import (limited) = Limited unlimited = Export (all) + Import (all) = Unlimited The effective exemption policy is the combined minimum permissions of the grant statements in the file(s) matching the filename pattern "exempt_*.policy". Exemption grants are optional. For example: limited = grants exemption permissions, by which the effective policy can be circumvented. e.g. KeyRecovery/KeyEscrow/KeyWeakening. Please see the Java Cryptography Architecture (JCA) documentation for additional information on these files and formats. YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY TO DETERMINE THE EXACT REQUIREMENTS. Please note that the JCE for Java SE, including the JCE framework, cryptographic policy files, and standard JCE providers provided with the Java SE, have been reviewed and approved for export as mass market encryption item by the US Bureau of Industry and Security.
评论
    相关推荐