Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: crypto-policies | Distribution: openSUSE:Factory:zSystems |
Version: 20230920.570ea89 | Vendor: openSUSE |
Release: 3.3 | Build date: Tue Jan 30 19:36:34 2024 |
Group: Productivity/Networking/Security | Build host: reproducible |
Size: 122419 | Source RPM: crypto-policies-20230920.570ea89-3.3.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies | |
Summary: System-wide crypto policies |
This package provides pre-built configuration files with cryptographic policies for various cryptographic back-ends, such as SSL/TLS libraries.
LGPL-2.1-or-later
* Tue Jan 30 2024 Dirk Müller <[email protected]> - avoid the cycle rpm/cmake/crypto-policies/python-rpm-macros: we only need python3-base here, we don't need the python macros as no module is being built * Thu Oct 05 2023 Daniel Garcia <[email protected]> - Remove dependency on /usr/bin/python3, making scripts to depends on the real python3 binary, not the link. bsc#1212476 * Wed Sep 27 2023 Pedro Monreal <[email protected]> - nss: Skip the NSS policy check if the mozilla-nss-tools package is not installed. This avoids adding more dependencies in ring0. * Add crypto-policies-nss.patch [bsc#1211301] * Fri Sep 22 2023 Pedro Monreal <[email protected]> - Update to version 20230920.570ea89: * fips-mode-setup: more thorough --disable, still unsupported * FIPS:OSPP: tighten beyond reason for OSPP 4.3 * krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones * openssl: implement relaxing EMS in FIPS (NO-ENFORCE-EMS) * gnutls: prepare for tls-session-hash option coming * nss: prepare for TLS-REQUIRE-EMS option coming * NO-ENFORCE-EMS: add subpolicy * FIPS: set __ems = ENFORCE * cryptopolicies: add enums and __ems tri-state * docs: replace `FIPS 140-2` with just `FIPS 140` * .gitlab-ci: remove forcing OPENSSH_MIN_RSA_SIZE * cryptopolicies: add comments on dunder options * nss: retire NSS_OLD and replace with NSS_LAX 3.80 check * BSI: start a BSI TR 02102 policy [jsc#PED-4933] * Rebase patches: - crypto-policies-policygenerators.patch - crypto-policies-revert-rh-allow-sha1-signatures.patch - crypto-policies-FIPS.patch * Fri Sep 15 2023 Pedro Monreal <[email protected]> - Conditionally recommend the crypto-policies-scripts package when python is not installed in the system [bsc#1215201] * Thu Aug 31 2023 Pedro Monreal <[email protected]> - Tests: Fix pylint versioning for TW and fix the parsing of the policygenerators to account for the commented lines correctly. * Add crypto-policies-pylint.patch * Rebase crypto-policies-policygenerators.patch * Tue Aug 01 2023 Pedro Monreal <[email protected]> - FIPS: Adapt the fips-mode-setup script to use the pbl command from the perl-Bootloader package to replace grubby. Add a note for transactional systems [jsc#PED-5041]. * Rebase crypto-policies-FIPS.patch * Fri Jul 14 2023 Marcus Meissner <[email protected]> - BSI.pol: Added a new BSI policy for BSI TR 02102* (jsc#PED-4933) derived from NEXT.pol * Thu Jul 13 2023 Pedro Monreal <[email protected]> - Update to version 20230614.5f3458e: * policies: impose old OpenSSL groups order for all back-ends * Rebase patches: - crypto-policies-revert-rh-allow-sha1-signatures.patch - crypto-policies-supported.patch * Thu May 25 2023 Pedro Monreal <[email protected]> - FIPS: Enable to set the kernel FIPS mode with fips-mode-setup and fips-finish-install commands, add also the man pages. The required FIPS modules are left to be installed by the user. * Rebase crypto-policies-FIPS.patch * Wed May 24 2023 Pedro Monreal <[email protected]> - Revert a breaking change that introduces the config option rh-allow-sha1-signatures that is unkown to OpenSSL and fails on startup. We will consider adding this option to openssl. * https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/commit/97fe4494 * Add crypto-policies-revert-rh-allow-sha1-signatures.patch * Mon May 08 2023 Pedro Monreal <[email protected]> - Update the update-crypto-policies(8) man pages and README.SUSE to mention the supported back-end policies. [bsc#1209998] * Add crypto-policies-supported.patch * Mon May 08 2023 Pedro Monreal <[email protected]> - Update to version 20230420.3d08ae7: * openssl, alg_lists: add brainpool support * openssl: set Groups explicitly * codespell: ignore aNULL * rpm-sequoia: allow 1024 bit DSA and SHA-1 per FeSCO decision 2960 * sequoia: add separate rpm-sequoia backend * crypto-policies.7: state upfront that FUTURE is not so interoperable * Makefile: update for asciidoc 10 * Skip not needed LibreswanGenerator and SequoiaGenerator: - Add crypto-policies-policygenerators.patch * Remove crypto-policies-test_supported_modules_only.patch * Rebase crypto-policies-no-build-manpages.patch * Fri Jan 20 2023 Pedro Monreal <[email protected]> - Update to version 20221214.a4c31a3: * bind: expand the list of disableable algorithms * libssh: Add support for openssh fido keys * .gitlab-ci.yml: install krb5-devel for krb5-config * sequoia: check using sequoia-policy-config-check * sequoia: introduce new back-end * Makefile: support overriding asciidoc executable name * openssh: make none and auto explicit and different * openssh: autodetect and allow forcing RequiredRSASize presence/name * openssh: remove _pre_8_5_ssh * pylintrc: update * Revert "disable SHA-1 further for a Fedora 38 Rawhide "jump scare"..." * disable SHA-1 further for a Fedora 38 Rawhide "jump scare"... * Makefile: exclude built manpages from codespell * add openssh HostbasedAcceptedAlgorithms * openssh: add RSAMinSize option following min_rsa_size * Revert ".gitlab-ci.yml: skip pylint (bz2069837)" * docs: add customization recommendation * tests/java: fix java.security.disableSystemPropertiesFile=true * policies: add FEDORA38 and TEST-FEDORA39 * bind: control ED25519/ED448 * openssl: disable SHA-1 signatures in FUTURE/NO-SHA1 * .gitlab-ci.yml: skip pylint (bz2069837) * openssh: add support for [email protected] * fips-mode-setup: fix one unrelated check to intended state * fips-mode-setup, fips-finish-install: abandon /etc/system-fips * Makefile: fix alt-policy test of LEGACY:AD-SUPPORT * fips-mode-setup: catch more inconsistencies, clarify --check * fips-mode-setup: improve handling FIPS plus subpolicies * .gitlab-ci.yml: use rawhide so that we get gnutls 3.7.3 * gnutls: enable SHAKE, needed for Ed448 * gnutls: use allowlisting * openssl: add newlines at the end of the output * FIPS:OSPP: relax -ECDSA-SHA2-512, -FFDHE-* * fips-mode-setup, fips-finish-install: call zipl more often * Add crypto-policies-rpmlintrc file to avoid files-duplicate, zero-length and non-conffile-in-etc warnings. * Rebase patches: - crypto-policies-FIPS.patch - crypto-policies-no-build-manpages.patch * Update README.SUSE * Fri Sep 24 2021 Pedro Monreal <[email protected]> - Remove the scripts and documentation regarding fips-finish-install and test-fips-setup * Add crypto-policies-FIPS.patch * Fri Sep 24 2021 Pedro Monreal <[email protected]> - Update to version 20210917.c9d86d1: * openssl: fix disabling ChaCha20 * pacify pylint 2.11: use format strings * pacify pylint 2.11: specify explicit encoding * fix minor things found by new pylint * update-crypto-policies: --check against regenerated * update-crypto-policies: fix --check's walking order * policygenerators/gnutls: revert disabling DTLS0.9... * policygenerators/java: add javasystem backend * LEGACY: bump 1023 key size to 1024 * cryptopolicies: fix 'and' in deprecation warnings * *ssh: condition ecdh-sha2-nistp384 on SECP384R1 * nss: hopefully the last fix for nss sigalgs check * cryptopolicies: Python 3.10 compatibility * nss: postponing check + testing at least something * Rename 'policy modules' to 'subpolicies' * validation.rules: fix a missing word in error * cryptopolicies: raise errors right after warnings * update-crypto-policies: capitalize warnings * cryptopolicies: syntax-precheck scope errors * .gitlab-ci.yml, Makefile: enable codespell * all: fix several typos * docs: don't leave zero TLS/DTLS protocols on * openssl: separate TLS/DTLS MinProtocol/MaxProtocol * alg_lists: order protocols new-to-old for consistency * alg_lists: max_{d,}tls_version * update-crypto-policies: fix pregenerated + local.d * openssh: allow validation with pre-8.5 * .gitlab-ci.yml: run commit-range against upstream * openssh: Use the new name for PubkeyAcceptedKeyTypes * sha1_in_dnssec: deprecate * .gitlab-ci.yml: test commit ranges * FIPS:OSPP: sign = -*-SHA2-224 * scoped policies: documentation update * scoped policies: use new features to the fullest... * scoped policies: rewrite + minimal policy changes * scoped policies: rewrite preparations * nss: postponing the version check again, to 3.64 - Remove patches fixed upstream: crypto-policies-typos.patch - Rebase: crypto-policies-test_supported_modules_only.patch - Merge crypto-policies-asciidoc.patch into crypto-policies-no-build-manpages.patch * Thu Feb 25 2021 Pedro Monreal <[email protected]> - Update to version 20210225.05203d2: * Disable DTLS0.9 protocol in the DEFAULT policy. * policies/FIPS: insignificant reformatting * policygenerators/libssh: respect ssh_certs * policies/modules/OSPP: tighten to follow RHEL 8 * crypto-policies(7): drop not-reenableable comment * follow up on disabling RC4 * Thu Feb 25 2021 Pedro Monreal <[email protected]> - Remove not needed scripts: fips-finish-install fips-mode-setup * Wed Feb 24 2021 Pedro Monreal <[email protected]> - Disable DTLS0.9 protocol in GnuTLS DEFAULT policy. [bsc#1180938] * The minimum DTLS protocol version in the DEFAULT and FUTURE policies is DTLS1.2. * Fixed upstream: 05203d21f6d0ea9bbdb351e4600f1e273720bb8e * Wed Feb 17 2021 Pedro Monreal <[email protected]> - Update to version 20210213.5c710c0: [bsc#1180938] * setup_directories(): perform safer creation of directories * save_config(): avoid re-opening output file for each iteration * save_config(): break after first match to avoid unnecessary stat() calls * CryptoPolicy.parse(): actually stop parsing line on syntax error * ProfileConfig.parse_string(): correctly extended subpolicies * Exclude RC4 from LEGACY * Introduce rc4_md5_in_krb5 to narrow AD_SUPPORT * code style: fix 'not in' membership testing * pylintrc: tighten up a bit * formatting: avoid long lines * formatting: use f-strings instead of format() * formatting: reformat all python code with autopep8 * nss: postponing the version check again, to 3.61 * Revert "Unfortunately we have to keep ignoring the openssh check for sk-" * Tue Feb 09 2021 Dominique Leuenberger <[email protected]> - Use tar_scm service, not obs_scm: With crypto-policies entering Ring0 (distro bootstrap) we want to be sure to keep the buildtime deps as low as possible. - Add python3-base BuildRequires: previously, OBS' tar service pulled this in for us. * Mon Feb 08 2021 Pedro Monreal <[email protected]> - Add a BuildIgnore for crypto-policies * Mon Feb 08 2021 Pedro Monreal <[email protected]> - Use gzip instead of xz in obscpio and sources * Fri Feb 05 2021 Pedro Monreal <[email protected]> - Do not build the manpages to avoid build cycles - Add crypto-policies-no-build-manpages.patch * Tue Feb 02 2021 Dominique Leuenberger <[email protected]> - Convert to use a proper git source _service: + To update, one just needs to update the commit/revision in the _service file and run `osc service dr`. + The version of the package is defined by the commit date of the revision, followed by the abbreviated git hash (The same revision used before results thus in a downgrade to 20210118, but as this is a alltime new package, this is acceptable. * Tue Feb 02 2021 Pedro Monreal <[email protected]> - Update to git version 20210127 * Bump Python requirement to 3.6 * Output sigalgs required by nss >=3.59 * Do not require bind during build * Break build cycles with openssl and gnutls * Thu Jan 21 2021 Pedro Monreal <[email protected]> - Update to git version 20210118 * Output sigalgs required by nss >=3.59 * Bump Python requirement to 3.6 * Kerberos 5: Fix policy generator to account for macs * Add AES-192 support (non-TLS scenarios) * Add documentation of the --check option * Thu Jan 21 2021 Pedro Monreal <[email protected]> - Fix the man pages generation - Add crypto-policies-asciidoc.patch * Thu Jan 21 2021 Pedro Monreal <[email protected]> - Test only supported modules - Add crypto-policies-test_supported_modules_only.patch
/etc/crypto-policies /etc/crypto-policies/README.SUSE /etc/crypto-policies/back-ends /etc/crypto-policies/back-ends/bind.config /etc/crypto-policies/back-ends/gnutls.config /etc/crypto-policies/back-ends/java.config /etc/crypto-policies/back-ends/javasystem.config /etc/crypto-policies/back-ends/krb5.config /etc/crypto-policies/back-ends/libreswan.config /etc/crypto-policies/back-ends/libssh.config /etc/crypto-policies/back-ends/nss.config /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config /etc/crypto-policies/back-ends/openssl.config /etc/crypto-policies/back-ends/openssl_fips.config /etc/crypto-policies/back-ends/opensslcnf.config /etc/crypto-policies/back-ends/rpm-sequoia.config /etc/crypto-policies/back-ends/sequoia.config /etc/crypto-policies/config /etc/crypto-policies/local.d /etc/crypto-policies/policies /etc/crypto-policies/policies/modules /etc/crypto-policies/state /etc/crypto-policies/state/CURRENT.pol /etc/crypto-policies/state/current /usr/share/crypto-policies /usr/share/crypto-policies/BSI /usr/share/crypto-policies/BSI/bind.txt /usr/share/crypto-policies/BSI/gnutls.txt /usr/share/crypto-policies/BSI/java.txt /usr/share/crypto-policies/BSI/javasystem.txt /usr/share/crypto-policies/BSI/krb5.txt /usr/share/crypto-policies/BSI/libssh.txt /usr/share/crypto-policies/BSI/nss.txt /usr/share/crypto-policies/BSI/openssh.txt /usr/share/crypto-policies/BSI/opensshserver.txt /usr/share/crypto-policies/BSI/openssl.txt /usr/share/crypto-policies/BSI/openssl_fips.txt /usr/share/crypto-policies/BSI/opensslcnf.txt /usr/share/crypto-policies/DEFAULT /usr/share/crypto-policies/DEFAULT/bind.txt /usr/share/crypto-policies/DEFAULT/gnutls.txt /usr/share/crypto-policies/DEFAULT/java.txt /usr/share/crypto-policies/DEFAULT/javasystem.txt /usr/share/crypto-policies/DEFAULT/krb5.txt /usr/share/crypto-policies/DEFAULT/libssh.txt /usr/share/crypto-policies/DEFAULT/nss.txt /usr/share/crypto-policies/DEFAULT/openssh.txt /usr/share/crypto-policies/DEFAULT/opensshserver.txt /usr/share/crypto-policies/DEFAULT/openssl.txt /usr/share/crypto-policies/DEFAULT/openssl_fips.txt /usr/share/crypto-policies/DEFAULT/opensslcnf.txt /usr/share/crypto-policies/EMPTY /usr/share/crypto-policies/EMPTY/bind.txt /usr/share/crypto-policies/EMPTY/gnutls.txt /usr/share/crypto-policies/EMPTY/java.txt /usr/share/crypto-policies/EMPTY/javasystem.txt /usr/share/crypto-policies/EMPTY/krb5.txt /usr/share/crypto-policies/EMPTY/libssh.txt /usr/share/crypto-policies/EMPTY/nss.txt /usr/share/crypto-policies/EMPTY/openssh.txt /usr/share/crypto-policies/EMPTY/opensshserver.txt /usr/share/crypto-policies/EMPTY/openssl.txt /usr/share/crypto-policies/EMPTY/openssl_fips.txt /usr/share/crypto-policies/EMPTY/opensslcnf.txt /usr/share/crypto-policies/FIPS /usr/share/crypto-policies/FIPS/bind.txt /usr/share/crypto-policies/FIPS/gnutls.txt /usr/share/crypto-policies/FIPS/java.txt /usr/share/crypto-policies/FIPS/javasystem.txt /usr/share/crypto-policies/FIPS/krb5.txt /usr/share/crypto-policies/FIPS/libssh.txt /usr/share/crypto-policies/FIPS/nss.txt /usr/share/crypto-policies/FIPS/openssh.txt /usr/share/crypto-policies/FIPS/opensshserver.txt /usr/share/crypto-policies/FIPS/openssl.txt /usr/share/crypto-policies/FIPS/openssl_fips.txt /usr/share/crypto-policies/FIPS/opensslcnf.txt /usr/share/crypto-policies/FUTURE /usr/share/crypto-policies/FUTURE/bind.txt /usr/share/crypto-policies/FUTURE/gnutls.txt /usr/share/crypto-policies/FUTURE/java.txt /usr/share/crypto-policies/FUTURE/javasystem.txt /usr/share/crypto-policies/FUTURE/krb5.txt /usr/share/crypto-policies/FUTURE/libssh.txt /usr/share/crypto-policies/FUTURE/nss.txt /usr/share/crypto-policies/FUTURE/openssh.txt /usr/share/crypto-policies/FUTURE/opensshserver.txt /usr/share/crypto-policies/FUTURE/openssl.txt /usr/share/crypto-policies/FUTURE/openssl_fips.txt /usr/share/crypto-policies/FUTURE/opensslcnf.txt /usr/share/crypto-policies/LEGACY /usr/share/crypto-policies/LEGACY/bind.txt /usr/share/crypto-policies/LEGACY/gnutls.txt /usr/share/crypto-policies/LEGACY/java.txt /usr/share/crypto-policies/LEGACY/javasystem.txt /usr/share/crypto-policies/LEGACY/krb5.txt /usr/share/crypto-policies/LEGACY/libssh.txt /usr/share/crypto-policies/LEGACY/nss.txt /usr/share/crypto-policies/LEGACY/openssh.txt /usr/share/crypto-policies/LEGACY/opensshserver.txt /usr/share/crypto-policies/LEGACY/openssl.txt /usr/share/crypto-policies/LEGACY/openssl_fips.txt /usr/share/crypto-policies/LEGACY/opensslcnf.txt /usr/share/crypto-policies/back-ends /usr/share/crypto-policies/back-ends/BSI /usr/share/crypto-policies/back-ends/BSI/bind.config /usr/share/crypto-policies/back-ends/BSI/gnutls.config /usr/share/crypto-policies/back-ends/BSI/java.config /usr/share/crypto-policies/back-ends/BSI/javasystem.config /usr/share/crypto-policies/back-ends/BSI/krb5.config /usr/share/crypto-policies/back-ends/BSI/libssh.config /usr/share/crypto-policies/back-ends/BSI/nss.config /usr/share/crypto-policies/back-ends/BSI/openssh.config /usr/share/crypto-policies/back-ends/BSI/opensshserver.config /usr/share/crypto-policies/back-ends/BSI/openssl.config /usr/share/crypto-policies/back-ends/BSI/openssl_fips.config /usr/share/crypto-policies/back-ends/BSI/opensslcnf.config /usr/share/crypto-policies/back-ends/DEFAULT /usr/share/crypto-policies/back-ends/DEFAULT/bind.config /usr/share/crypto-policies/back-ends/DEFAULT/gnutls.config /usr/share/crypto-policies/back-ends/DEFAULT/java.config /usr/share/crypto-policies/back-ends/DEFAULT/javasystem.config /usr/share/crypto-policies/back-ends/DEFAULT/krb5.config /usr/share/crypto-policies/back-ends/DEFAULT/libssh.config /usr/share/crypto-policies/back-ends/DEFAULT/nss.config /usr/share/crypto-policies/back-ends/DEFAULT/openssh.config /usr/share/crypto-policies/back-ends/DEFAULT/opensshserver.config /usr/share/crypto-policies/back-ends/DEFAULT/openssl.config /usr/share/crypto-policies/back-ends/DEFAULT/openssl_fips.config /usr/share/crypto-policies/back-ends/DEFAULT/opensslcnf.config /usr/share/crypto-policies/back-ends/FIPS /usr/share/crypto-policies/back-ends/FIPS/bind.config /usr/share/crypto-policies/back-ends/FIPS/gnutls.config /usr/share/crypto-policies/back-ends/FIPS/java.config /usr/share/crypto-policies/back-ends/FIPS/javasystem.config /usr/share/crypto-policies/back-ends/FIPS/krb5.config /usr/share/crypto-policies/back-ends/FIPS/libssh.config /usr/share/crypto-policies/back-ends/FIPS/nss.config /usr/share/crypto-policies/back-ends/FIPS/openssh.config /usr/share/crypto-policies/back-ends/FIPS/opensshserver.config /usr/share/crypto-policies/back-ends/FIPS/openssl.config /usr/share/crypto-policies/back-ends/FIPS/openssl_fips.config /usr/share/crypto-policies/back-ends/FIPS/opensslcnf.config /usr/share/crypto-policies/back-ends/FUTURE /usr/share/crypto-policies/back-ends/FUTURE/bind.config /usr/share/crypto-policies/back-ends/FUTURE/gnutls.config /usr/share/crypto-policies/back-ends/FUTURE/java.config /usr/share/crypto-policies/back-ends/FUTURE/javasystem.config /usr/share/crypto-policies/back-ends/FUTURE/krb5.config /usr/share/crypto-policies/back-ends/FUTURE/libssh.config /usr/share/crypto-policies/back-ends/FUTURE/nss.config /usr/share/crypto-policies/back-ends/FUTURE/openssh.config /usr/share/crypto-policies/back-ends/FUTURE/opensshserver.config /usr/share/crypto-policies/back-ends/FUTURE/openssl.config /usr/share/crypto-policies/back-ends/FUTURE/openssl_fips.config /usr/share/crypto-policies/back-ends/FUTURE/opensslcnf.config /usr/share/crypto-policies/back-ends/LEGACY /usr/share/crypto-policies/back-ends/LEGACY/bind.config /usr/share/crypto-policies/back-ends/LEGACY/gnutls.config /usr/share/crypto-policies/back-ends/LEGACY/java.config /usr/share/crypto-policies/back-ends/LEGACY/javasystem.config /usr/share/crypto-policies/back-ends/LEGACY/krb5.config /usr/share/crypto-policies/back-ends/LEGACY/libssh.config /usr/share/crypto-policies/back-ends/LEGACY/nss.config /usr/share/crypto-policies/back-ends/LEGACY/openssh.config /usr/share/crypto-policies/back-ends/LEGACY/opensshserver.config /usr/share/crypto-policies/back-ends/LEGACY/openssl.config /usr/share/crypto-policies/back-ends/LEGACY/openssl_fips.config /usr/share/crypto-policies/back-ends/LEGACY/opensslcnf.config /usr/share/crypto-policies/default-config /usr/share/crypto-policies/policies /usr/share/crypto-policies/policies/BSI.pol /usr/share/crypto-policies/policies/DEFAULT.pol /usr/share/crypto-policies/policies/EMPTY.pol /usr/share/crypto-policies/policies/FEDORA38.pol /usr/share/crypto-policies/policies/FIPS.pol /usr/share/crypto-policies/policies/FUTURE.pol /usr/share/crypto-policies/policies/GOST-ONLY.pol /usr/share/crypto-policies/policies/LEGACY.pol /usr/share/crypto-policies/policies/NEXT.pol /usr/share/crypto-policies/policies/TEST-FEDORA39.pol /usr/share/crypto-policies/policies/modules /usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod /usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod /usr/share/crypto-policies/policies/modules/FEDORA32.pmod /usr/share/crypto-policies/policies/modules/GOST.pmod /usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod /usr/share/crypto-policies/policies/modules/NO-ENFORCE-EMS.pmod /usr/share/crypto-policies/policies/modules/NO-SHA1.pmod /usr/share/crypto-policies/policies/modules/OSPP.pmod /usr/share/crypto-policies/policies/modules/SHA1.pmod /usr/share/crypto-policies/reload-cmds.sh /usr/share/doc/packages/crypto-policies /usr/share/doc/packages/crypto-policies/CONTRIBUTING.md /usr/share/doc/packages/crypto-policies/NEWS /usr/share/doc/packages/crypto-policies/README.md /usr/share/licenses/crypto-policies /usr/share/licenses/crypto-policies/COPYING.LESSER /usr/share/man/man7/crypto-policies.7.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Dec 3 23:45:09 2024