crypto-policies/sources
Alexander Sosedkin e045e42116 Update from upstream (sequoia, openssl groups, gnutls ML-DSA, ...)
- sequoia: add sha3, x25519, ed25519, x448, ed448, but not for rpm-sequoia
- sequoia, rpm-sequoia: use ignore_invalid with sha3, x25519, ...
- sequoia: Add PQC algorithm
- sequoia: Do not include EdDSA in FIPS policy
- sequoia: Generate AEAD policy
- openssl: send one PQ and one classic key_share; prioritize PQ groups
- FIPS: deprioritize X25519-MLKEM768 over P256-MLKEM768 for openssl...
- python, policies, tests: alias X25519-MLKEM768 to MLKEM768-X25519
- gnutls: enable ML-DSA, for both secure-sig and secure-sig-for-cert

Resolves: RHEL-98732
Resolves: RHEL-99813
Resolves: RHEL-97763
Resolves: RHEL-101123
2025-07-14 17:59:07 +02:00

2 lines
174 B
Plaintext

SHA512 (crypto-policies-git95bf40e.tar.gz) = 733689f356fad8052d084b721e0b87a171de90aaa2889725ccad6180d3cc95ca22b79e17894d1bd0dde40438f94d70148f765b33a215361df217015d803f5114