- Fix the testsuite:
* Port all the policy changes to the config files in the test suite.
* Use the newly introduced SKIP_LINTING=1 option.
* Rebase crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch
- Adapt the manpages to SUSE/openSUSE:
* Add crypto-policies-SUSE-manpages.patch
* Compress all the man pages for update-crypto-policies.8.gz,
crypto-policies.7.gz, fips-finish-install.8.gz and
fips-mode-setup.8.gz into man-crypto-policies.tar.xz
- Update to version 20250714.cd6043a: [bsc#1253025, bsc#1252696]
* gnutls: enable ML-DSA, for both secure-sig and secure-sig-for-cert
* python, policies, tests: alias X25519-MLKEM768 to MLKEM768-X25519
* FIPS: disable MLKEM768-X25519 for openssh (no-op)
* FIPS: deprioritize X25519-MLKEM768 over P256-MLKEM768 for openssl...
* TEST-PQ: be more careful with the ordering
* openssl: send one PQ and one classic key_share; prioritize PQ groups
* sequoia: Generate AEAD policy
* Do not include EdDSA in FIPS policy
* sequoia: Add PQC algorithm
* sequoia: Run tests against PQC capable policy-config-check
* Revert "openssl, policies: implement group_key_share option"
* openssl, policies: implement group_key_share option
* FIPS: enable hybrid ML-KEM (TLS only) and pure ML-DSA
* python/build-crypto-policies: output diffs on --test mismatches
* sequoia, rpm-sequoia: use ignore_invalid with sha3, x25519, ...
* policies, alg_lists, openssl: remove KYBER from allowed values
* openssl: stricter enabling of Ciphersuites
* openssl: make use of -CBC and -AESGCM keywords
OBS-URL: https://build.opensuse.org/request/show/1317102
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/crypto-policies?expand=0&rev=13
The back-end policies supported in this build are: * GnuTLS TLS library (scope: GnuTLS, SSL, TLS) * OpenSSL TLS library (scope: OpenSSL, SSL, TLS) * NSS TLS library (scope: NSS, SSL, TLS) * OpenJDK runtime environment (scope: java-tls, SSL, TLS) * Kerberos 5 library Libkrb5 (scope: krb5, kerberos) * BIND DNS name server daemon (scope: BIND, DNSSec) * OpenSSH SSH2 protocol implementation (scope: OpenSSH, SSH) * libssh SSH2 protocol implementation (scope: libssh, SSH) The back-end policies not supported in this build are: * Libreswan (scope: libreswan, IKE, IPSec) * Sequoia PGP implementation (scope: sequoia) * rpm-sequoia RPM Sequoia PGP (scope: rpm, rpm-sequoia) Please, refer to 'man 8 update-crypto-policies' for more info.
Description
Languages
Shell
100%