Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: crypto-policies-scripts | Distribution: SUSE Linux Enterprise 15 |
Version: 20210917.c9d86d1 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150400.1.7 | Build date: Sat May 7 23:17:56 2022 |
Group: Productivity/Networking/Security | Build host: sheep19 |
Size: 198939 | Source RPM: crypto-policies-20210917.c9d86d1-150400.1.7.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies | |
Summary: Tool to switch between crypto policies |
This package provides a tool update-crypto-policies, which applies the policies provided by the crypto-policies package. These can be either the pre-built policies from the base package or custom policies defined in simple policy definition files.
LGPL-2.1-or-later
* Fri Sep 24 2021 pmonreal@suse.com - Remove the scripts and documentation regarding fips-finish-install and test-fips-setup * Add crypto-policies-FIPS.patch * Fri Sep 24 2021 pmonreal@suse.com - Update to version 20210917.c9d86d1: * openssl: fix disabling ChaCha20 * pacify pylint 2.11: use format strings * pacify pylint 2.11: specify explicit encoding * fix minor things found by new pylint * update-crypto-policies: --check against regenerated * update-crypto-policies: fix --check's walking order * policygenerators/gnutls: revert disabling DTLS0.9... * policygenerators/java: add javasystem backend * LEGACY: bump 1023 key size to 1024 * cryptopolicies: fix 'and' in deprecation warnings * *ssh: condition ecdh-sha2-nistp384 on SECP384R1 * nss: hopefully the last fix for nss sigalgs check * cryptopolicies: Python 3.10 compatibility * nss: postponing check + testing at least something * Rename 'policy modules' to 'subpolicies' * validation.rules: fix a missing word in error * cryptopolicies: raise errors right after warnings * update-crypto-policies: capitalize warnings * cryptopolicies: syntax-precheck scope errors * .gitlab-ci.yml, Makefile: enable codespell * all: fix several typos * docs: don't leave zero TLS/DTLS protocols on * openssl: separate TLS/DTLS MinProtocol/MaxProtocol * alg_lists: order protocols new-to-old for consistency * alg_lists: max_{d,}tls_version * update-crypto-policies: fix pregenerated + local.d * openssh: allow validation with pre-8.5 * .gitlab-ci.yml: run commit-range against upstream * openssh: Use the new name for PubkeyAcceptedKeyTypes * sha1_in_dnssec: deprecate * .gitlab-ci.yml: test commit ranges * FIPS:OSPP: sign = -*-SHA2-224 * scoped policies: documentation update * scoped policies: use new features to the fullest... * scoped policies: rewrite + minimal policy changes * scoped policies: rewrite preparations * nss: postponing the version check again, to 3.64 - Remove patches fixed upstream: crypto-policies-typos.patch - Rebase: crypto-policies-test_supported_modules_only.patch - Merge crypto-policies-asciidoc.patch into crypto-policies-no-build-manpages.patch * Thu Feb 25 2021 pmonreal@suse.com - Update to version 20210225.05203d2: * Disable DTLS0.9 protocol in the DEFAULT policy. * policies/FIPS: insignificant reformatting * policygenerators/libssh: respect ssh_certs * policies/modules/OSPP: tighten to follow RHEL 8 * crypto-policies(7): drop not-reenableable comment * follow up on disabling RC4 * Thu Feb 25 2021 pmonreal@suse.com - Remove not needed scripts: fips-finish-install fips-mode-setup * Wed Feb 24 2021 pmonreal@suse.com - Disable DTLS0.9 protocol in GnuTLS DEFAULT policy. [bsc#1180938] * The minimum DTLS protocol version in the DEFAULT and FUTURE policies is DTLS1.2. * Fixed upstream: 05203d21f6d0ea9bbdb351e4600f1e273720bb8e * Wed Feb 17 2021 pmonreal@suse.com - Update to version 20210213.5c710c0: [bsc#1180938] * setup_directories(): perform safer creation of directories * save_config(): avoid re-opening output file for each iteration * save_config(): break after first match to avoid unnecessary stat() calls * CryptoPolicy.parse(): actually stop parsing line on syntax error * ProfileConfig.parse_string(): correctly extended subpolicies * Exclude RC4 from LEGACY * Introduce rc4_md5_in_krb5 to narrow AD_SUPPORT * code style: fix 'not in' membership testing * pylintrc: tighten up a bit * formatting: avoid long lines * formatting: use f-strings instead of format() * formatting: reformat all python code with autopep8 * nss: postponing the version check again, to 3.61 * Revert "Unfortunately we have to keep ignoring the openssh check for sk-" * Tue Feb 09 2021 dimstar@opensuse.org - Use tar_scm service, not obs_scm: With crypto-policies entering Ring0 (distro bootstrap) we want to be sure to keep the buildtime deps as low as possible. - Add python3-base BuildRequires: previously, OBS' tar service pulled this in for us. * Mon Feb 08 2021 pmonreal@suse.com - Add a BuildIgnore for crypto-policies * Mon Feb 08 2021 pmonreal@suse.com - Use gzip instead of xz in obscpio and sources * Fri Feb 05 2021 pmonreal@suse.com - Do not build the manpages to avoid build cycles - Add crypto-policies-no-build-manpages.patch * Tue Feb 02 2021 dimstar@opensuse.org - Convert to use a proper git source _service: + To update, one just needs to update the commit/revision in the _service file and run `osc service dr`. + The version of the package is defined by the commit date of the revision, followed by the abbreviated git hash (The same revision used before results thus in a downgrade to 20210118, but as this is a alltime new package, this is acceptable. * Tue Feb 02 2021 pmonreal@suse.com - Update to git version 20210127 * Bump Python requirement to 3.6 * Output sigalgs required by nss >=3.59 * Do not require bind during build * Break build cycles with openssl and gnutls * Thu Jan 21 2021 pmonreal@suse.com - Update to git version 20210118 * Output sigalgs required by nss >=3.59 * Bump Python requirement to 3.6 * Kerberos 5: Fix policy generator to account for macs * Add AES-192 support (non-TLS scenarios) * Add documentation of the --check option * Thu Jan 21 2021 pmonreal@suse.com - Fix the man pages generation - Add crypto-policies-asciidoc.patch * Thu Jan 21 2021 pmonreal@suse.com - Test only supported modules - Add crypto-policies-test_supported_modules_only.patch * Tue Dec 22 2020 pmonreal@suse.com - Add crypto-policies-typos.patch to fix some typos * Thu Nov 12 2020 vcizek@suse.com - Initial packaging, git version 20200918 (jsc#SLE-15832)
/usr/bin/update-crypto-policies /usr/share/crypto-policies/python /usr/share/crypto-policies/python/__pycache__ /usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-36.pyc /usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-36.pyc /usr/share/crypto-policies/python/build-crypto-policies.py /usr/share/crypto-policies/python/cryptopolicies /usr/share/crypto-policies/python/cryptopolicies/__init__.py /usr/share/crypto-policies/python/cryptopolicies/__pycache__ /usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/alg_lists.py /usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py /usr/share/crypto-policies/python/cryptopolicies/validation /usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__ /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-36.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py /usr/share/crypto-policies/python/cryptopolicies/validation/general.py /usr/share/crypto-policies/python/cryptopolicies/validation/rules.py /usr/share/crypto-policies/python/cryptopolicies/validation/scope.py /usr/share/crypto-policies/python/policygenerators /usr/share/crypto-policies/python/policygenerators/__init__.py /usr/share/crypto-policies/python/policygenerators/__pycache__ /usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libreswan.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-36.pyc /usr/share/crypto-policies/python/policygenerators/bind.py /usr/share/crypto-policies/python/policygenerators/configgenerator.py /usr/share/crypto-policies/python/policygenerators/gnutls.py /usr/share/crypto-policies/python/policygenerators/java.py /usr/share/crypto-policies/python/policygenerators/krb5.py /usr/share/crypto-policies/python/policygenerators/libreswan.py /usr/share/crypto-policies/python/policygenerators/libssh.py /usr/share/crypto-policies/python/policygenerators/nss.py /usr/share/crypto-policies/python/policygenerators/openssh.py /usr/share/crypto-policies/python/policygenerators/openssl.py /usr/share/crypto-policies/python/update-crypto-policies.py /usr/share/man/man8/update-crypto-policies.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 15:53:55 2024