diff --git a/1001-Remove-FEDORA32pmod-file.path b/1001-Remove-FEDORA32pmod-file.path new file mode 100644 index 0000000000000000000000000000000000000000..d01c2d0cdce26a5bb26182479fc9d8f4716ae470 --- /dev/null +++ b/1001-Remove-FEDORA32pmod-file.path @@ -0,0 +1,22 @@ +diff -Nurw fedora-crypto-policies-8b8e5af4e37cd7d3b12396cd2a2f7487a700680f_old/policies/modules/FEDORA32.pmod fedora-crypto-policies-8b8e5af4e37cd7d3b12396cd2a2f7487a700680f/policies/modules/FEDORA32.pmod +--- fedora-crypto-policies-8b8e5af4e37cd7d3b12396cd2a2f7487a700680f_old/policies/modules/FEDORA32.pmod 2022-11-18 10:27:34.490858278 +0800 ++++ fedora-crypto-policies-8b8e5af4e37cd7d3b12396cd2a2f7487a700680f/policies/modules/FEDORA32.pmod 1970-01-01 08:00:00.000000000 +0800 +@@ -1,18 +0,0 @@ +-# If this subpolicy is applied to the DEFAULT policy, +-# the result provides the same policy as in the Fedora 32 DEFAULT policy +- +-# DH params size: >= 1023 +-# SHA1 enabled in signatures +-# TLS protocols: TLS >= 1.0 DTLS >= 1.0 +- +-group@SSH = FFDHE-1536+ FFDHE-1024+ +- +-hash = SHA1+ +- +-sign = ECDSA-SHA1+ RSA-PSS-SHA1+ RSA-SHA1+ +- +-protocol@TLS = TLS1.1+ TLS1.0+ DTLS1.0+ +- +-min_dh_size = 1023 +- +-sha1_in_certs = 1 diff --git a/crypto-policies.spec b/crypto-policies.spec index 2f4d4e6f53f1b4d62b47cd211976938e5a63b909..63be5754ac36364c6a5aa25edaf6db57b9e96c8c 100644 --- a/crypto-policies.spec +++ b/crypto-policies.spec @@ -12,6 +12,10 @@ License: LGPLv2+ URL: https://gitlab.com/redhat-crypto/fedora-crypto-policies Source0: https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/archive/%{git_commit_hash}/%{name}-git%{git_commit_hash}.tar.gz +# add by anolis-23 +Patch1001: 1001-Remove-FEDORA32pmod-file.path +# end + BuildArch: noarch BuildRequires: asciidoc BuildRequires: libxslt @@ -190,6 +194,9 @@ end %changelog +* Fri Nov 18 2022 mgb01105731 - 20220314-3 +- remove FEDORA32 file + * Tue Nov 01 2022 mgb01105731 - 20220314-2 - optimise spec file