17
0
Ana Guerrero 91046d46fb Accepting request 1317102 from security:tls
- Fix the testsuite:
  * Port all the policy changes to the config files in the test suite.
  * Use the newly introduced SKIP_LINTING=1 option.
  * Rebase crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch

- Adapt the manpages to SUSE/openSUSE:
  * Add crypto-policies-SUSE-manpages.patch
  * Compress all the man pages for update-crypto-policies.8.gz,
    crypto-policies.7.gz, fips-finish-install.8.gz and
    fips-mode-setup.8.gz into man-crypto-policies.tar.xz

- Update to version 20250714.cd6043a: [bsc#1253025, bsc#1252696]
  * gnutls: enable ML-DSA, for both secure-sig and secure-sig-for-cert
  * python, policies, tests: alias X25519-MLKEM768 to MLKEM768-X25519
  * FIPS: disable MLKEM768-X25519 for openssh (no-op)
  * FIPS: deprioritize X25519-MLKEM768 over P256-MLKEM768 for openssl...
  * TEST-PQ: be more careful with the ordering
  * openssl: send one PQ and one classic key_share; prioritize PQ groups
  * sequoia: Generate AEAD policy
  * Do not include EdDSA in FIPS policy
  * sequoia: Add PQC algorithm
  * sequoia: Run tests against PQC capable policy-config-check
  * Revert "openssl, policies: implement group_key_share option"
  * openssl, policies: implement group_key_share option
  * FIPS: enable hybrid ML-KEM (TLS only) and pure ML-DSA
  * python/build-crypto-policies: output diffs on --test mismatches
  * sequoia, rpm-sequoia: use ignore_invalid with sha3, x25519, ...
  * policies, alg_lists, openssl: remove KYBER from allowed values
  * openssl: stricter enabling of Ciphersuites
  * openssl: make use of -CBC and -AESGCM keywords

OBS-URL: https://build.opensuse.org/request/show/1317102
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/crypto-policies?expand=0&rev=13
2025-11-12 20:41:33 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00
2025-11-11 11:20:43 +00:00

The back-end policies supported in this build are:
  * GnuTLS TLS library (scope: GnuTLS, SSL, TLS)
  * OpenSSL TLS library (scope: OpenSSL, SSL, TLS)
  * NSS TLS library (scope: NSS, SSL, TLS)
  * OpenJDK runtime environment (scope: java-tls, SSL, TLS)
  * Kerberos 5 library Libkrb5 (scope: krb5, kerberos)
  * BIND DNS name server daemon (scope: BIND, DNSSec)
  * OpenSSH SSH2 protocol implementation (scope: OpenSSH, SSH)
  * libssh SSH2 protocol implementation (scope: libssh, SSH)

The back-end policies not supported in this build are:
  * Libreswan (scope: libreswan, IKE, IPSec)
  * Sequoia PGP implementation (scope: sequoia)
  * rpm-sequoia RPM Sequoia PGP (scope: rpm, rpm-sequoia)

Please, refer to 'man 8 update-crypto-policies' for more info.
Description
No description provided
Readme 532 KiB
Languages
Shell 100%