agraham,
thanks for your careful reply. I will do some more in-depth searching. Thank you for your googling as well.
Your conceptual remarks on the policy files being part of the JRE and not the JDK make sense to me. I had mistakenly thought they were being checked at compile time. So now two things need to be checked out:
1) How can I test the strength of the encrytion algorithm used by the JRE on the device? Will there be execeptions thrown when the app tries to exceed these limitations, or will the attempt to do so just die silently, or will the strength be reduced to the maximally allowed strength?
As Android devices are sold in the U.S. (with their restrictive policies on encrytion strength) and, for instance, in Germany (with a government that rather liberally encourages people to use encryption schemes that are as strong as possible), I can hardly imagine that vendors will go the extra mile of adjusting the policy files for each country invidually. Which would mean that they, in order to be allowed to sell their software in the U.S., probably settle for the greatest common divisor, so to speak: the weaker version of the encrption algorithms.
Different encryption strength policies that vary with the respective country would pose issues for App vendors as well, as then "unlimited strength"
Apps that are legal in Germany would have to either (illegally) maintain their encryption strength or have it reduced (supposedly silently, which is potentially dangerous) by the Android system down to the level allowed overseas.
2) I think since the advent of Android 2.2 or 2.3, just-in-time compilation of the Dalvik jars is being performed, and so it would have to be the JIT compiler that checks the JRE policy files. Where to find these files on the device? That will be one venue for investigation. Is there any security policy check being performed by the JIT or the JRE bytecode interpreter on Android 1.5/1.6/2.0?
More input from the forum members will be greatly appreciated.
Thank you.
Regards,