I know nothing about crypto beyond the fact that it codes information. 
What is a policy file? Where precisely do I get it? How do I know 
exactly which policy file I need? Where do I install it in Eclipse to 
make sure the iText and BouncyCastle classes compile correctly?

--
Rhino

Paulo Soares wrote:
> You'll have to download a policy file from Sun to be able to use the full 
> crypto strength.
>
> Paulo
>
> ----- Original Message ----- 
> From: "Rhino" <[email protected]>
> To: <[email protected]>
> Sent: Monday, January 18, 2010 3:02 AM
> Subject: [iText-questions] Setting Up iText and BouncyCastle
>
>
> I was using an older version of iText - 1.22 perhaps? - back around
> 2005/2006 and have been away from Java development since then. Now, I
> find myself back and the intervening years have been hard on my memory.
> I would appreciate some guidance on setting up iText and BouncyCastle.
>
> I have Eclipse 3.5.1 up and running on Windows XP and I am trying to
> remember how to set up a Java project so that it can see both iText 5.0
> and BouncyCastle. I'd like to be able to call on all the classes of both
> and be able to debug the source for my project, iText and BouncyCastle.
>
> I've tried everything I can think of to make iText and BouncyCastle
> visible to my project but I know I'm doing something wrong because a few
> of the classes can't be seen. I keep getting messages like:
>
>     "/Access Restriction: The type BlockCipher is not accessible due to
> restriction on required library C:\Program
> Files\Java\jre6\lib\ext\bcprov-jdk16-145.jar./ "
>
> I have placed bcprov-jdk16-145.jar, bctsp-jdk16-145.jar, and
> bcmail-jdk16-145.jar in the lib/ext folder of my JRE. I've also down
> hours of fiddling within Eclipse to make the source and jars visible but
> I always have a few classes that have red X's on them and the error
> messages always look like the one I've cited.
>
> Can someone please remind me how to get this all working correctly?
>
> --
> Rhino
>
>
> ------------------------------------------------------------------------------
> Throughout its 18-year history, RSA Conference consistently attracts the
> world's best and brightest in the field, creating opportunities for Conference
> attendees to learn about information security's most important issues through
> interactions with peers, luminaries and emerging and established companies.
> http://p.sf.net/sfu/rsaconf-dev2dev
> _______________________________________________
> iText-questions mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/itext-questions
>
> Buy the iText book: http://www.1t3xt.com/docs/book.php
> Check the site with examples before you ask questions: 
> http://www.1t3xt.info/examples/
> You can also search the keywords list: http://1t3xt.info/tutorials/keywords/
>
>
>   

------------------------------------------------------------------------------
Throughout its 18-year history, RSA Conference consistently attracts the
world's best and brightest in the field, creating opportunities for Conference
attendees to learn about information security's most important issues through
interactions with peers, luminaries and emerging and established companies.
http://p.sf.net/sfu/rsaconf-dev2dev
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

Buy the iText book: http://www.1t3xt.com/docs/book.php
Check the site with examples before you ask questions: 
http://www.1t3xt.info/examples/
You can also search the keywords list: http://1t3xt.info/tutorials/keywords/

Reply via email to