-
### Enhancement Objective
Introduce configurable options in the plugin for managing encryption.blacklisted-algorithms in the SimpleSAMLphp library. This includes enabling the override of default de…
-
**What solution would you like?**
Currently we support only `bcrypt` for passwords hashing which is resource consuming for slow CPUs.
It would be a good idea to give customers a possibility to s…
-
### Issue Description:
I read the information about [reproducibility](https://github.com/NVIDIA/Megatron-LM#reproducibility), which mentions using `--deterministic-mode` by setting `NCCL_ALGO`, `NVTE…
-
-
```
For validation of long term signatures, xades4j needs to know when specific
hash functions, algorithms and algorithm parameters are considered insecure.
For example, signature based on a certifi…
-
```
For validation of long term signatures, xades4j needs to know when specific
hash functions, algorithms and algorithm parameters are considered insecure.
For example, signature based on a certifi…
-
**Description**
oidc-token-verifier checks the value of job_workflow_ref claim against an expected trusted workflow value. The expected workflow value is hardcoded along with trusted issuer dat…
-
### Discussed in https://github.com/Kong/kong/discussions/13335
Converting this back to an issue as it really is a bug. Internal ticket: [KAG-4871](https://konghq.atlassian.net/browse/KAG-4872)
…
-
Currently, some Chinese operating systems are gradually adopting the SM3 algorithm for system user encryption. The encrypted shadow value is provided below:
testuser:$sm3$wnY86eyUlB5946gU$99LlMr0dd…
-
### What happened?
When manually modifying the "CA certificate for outbound SSL/TLS inspection" in AWS TLS inspection configurations, Pulumi won't be able to make further changes to the `Certificat…