Systemwide crypto policies
Go to file
Alexander Sosedkin e045e42116 Update from upstream (sequoia, openssl groups, gnutls ML-DSA, ...)
- sequoia: add sha3, x25519, ed25519, x448, ed448, but not for rpm-sequoia
- sequoia, rpm-sequoia: use ignore_invalid with sha3, x25519, ...
- sequoia: Add PQC algorithm
- sequoia: Do not include EdDSA in FIPS policy
- sequoia: Generate AEAD policy
- openssl: send one PQ and one classic key_share; prioritize PQ groups
- FIPS: deprioritize X25519-MLKEM768 over P256-MLKEM768 for openssl...
- python, policies, tests: alias X25519-MLKEM768 to MLKEM768-X25519
- gnutls: enable ML-DSA, for both secure-sig and secure-sig-for-cert

Resolves: RHEL-98732
Resolves: RHEL-99813
Resolves: RHEL-97763
Resolves: RHEL-101123
2025-07-14 17:59:07 +02:00
.fmf Add RHEL-10 CI and gating configuration 2024-10-15 17:11:44 +02:00
plans Add RHEL-10 CI and gating configuration 2024-10-15 17:11:44 +02:00
.gitignore RHEL 9.0.0 Alpha bootstrap 2020-10-14 23:21:50 +02:00
ci.fmf Add RHEL-10 CI and gating configuration 2024-10-15 17:11:44 +02:00
crypto-policies.spec Update from upstream (sequoia, openssl groups, gnutls ML-DSA, ...) 2025-07-14 17:59:07 +02:00
gating.yaml Add RHEL-10 CI and gating configuration 2024-10-15 17:11:44 +02:00
sources Update from upstream (sequoia, openssl groups, gnutls ML-DSA, ...) 2025-07-14 17:59:07 +02:00