| 192 |
- |
1 |
# This file should contain a single keyword, the crypto policy to
|
|
|
2 |
# be applied by default to applications. The available policies are
|
|
|
3 |
# restricted to the following profiles.
|
|
|
4 |
#
|
|
|
5 |
# * LEGACY: Ensures maximum compatibility with legacy systems (64-bit
|
|
|
6 |
# security).
|
|
|
7 |
#
|
|
|
8 |
# * DEFAULT: A reasonable default for today's standards (112-bit security).
|
|
|
9 |
#
|
|
|
10 |
# * FUTURE: A level that will provide security on a conservative level that is
|
|
|
11 |
# believed to withstand any near-term future attacks (128-bit security).
|
|
|
12 |
#
|
|
|
13 |
# * FIPS: Policy that enables only FIPS 140-2 approved or allowed algorithms.
|
|
|
14 |
#
|
|
|
15 |
# After modifying this file, you need to run update-crypto-policies
|
|
|
16 |
# for the changes to propagate.
|
|
|
17 |
#
|
|
|
18 |
DEFAULT
|