crypto-policies/sources
Alexander Sosedkin 410734bda5 Update from upstream (java, RSA in DEFAULT, SHA1 in LEGACY...)
- nss: wire KYBER768 to XYBER768D00
- java: start controlling / disable DTLSv1.0
- java: disable anon ciphersuites, tying them to NULL
- java: respect more key size restrictions
- java: specify jdk.tls.namedGroups system property
- java: make hash, mac and sign more orthogonal
- fips-mode-setup: add another scary "unsupported"
- fips-mode-setup: flashy ticking warning upon use
- java: use and include jdk.disabled.namedCurves
- ec_min_size: introduce and use in java, default to 256
- java: stop specifying jdk.tls.namedGroups in javasystem
- java: drop unused javasystem backend
- openssh: make dss no longer enableble, support is dropped
- LEGACY: disable sign = *-SHA1
- DEFAULT: disable RSA key exchange
- nss: TLS-REQUIRE-EMS in FIPS

Resolves: RHEL-36300
Resolves: RHEL-50106
Resolves: RHEL-50464
Related: RHEL-18442
Related: RHEL-28848
Related: RHEL-45618
Related: RHEL-45620
Related: RHEL-5206
2024-07-26 11:38:30 +02:00

2 lines
174 B
Plaintext

SHA512 (crypto-policies-git3de485c.tar.gz) = 776b93d9c9ae30f2fa75ef2fefdb32b7df8d680bdd37375917a61c94055ec9195801d61992593dd9ce68f501c429478a7f7b9419d8964d97601ae82877c1a24c