You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/Org.Security.Cryptography.X509Extensions/ReadMe-FIPS.md
+25-26Lines changed: 25 additions & 26 deletions
Original file line number
Diff line number
Diff line change
@@ -4,16 +4,16 @@
4
4
Is this package FIPS compliant? Depends.
5
5
6
6
### .NET Core Federal Information Processing Standard (FIPS) compliance
7
+
*[.NET Core and FIPS](https://docs.microsoft.com/en-us/dotnet/standard/security/fips-compliance)
7
8
* Does not enforce the use of FIPS Approved algorithms or key sizes in .NET Core apps.
8
-
* The developer is responsible for ensuring that non-compliant FIPS algorithms aren't used.
9
-
REF: [.NET Core and FIPS](https://docs.microsoft.com/en-us/dotnet/standard/security/fips-compliance)
9
+
* The developer is responsible for ensuring that non-compliant FIPS algorithms aren't used.
10
10
11
11
### Microsoft’s approach to FIPS 140-2 validation
12
12
13
-
REF:[Microsoft’s approach to FIPS 140-2 validation](https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation)
14
-
REF:[Using Windows in a FIPS 140-2 approved mode](https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation#using-windows-in-a-fips-140-2-approved-mode-of-operation)
15
-
REF:[Use FIPS compliant algorithms for encryption, hashing, and signing](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing)
16
-
REF:[Why We’re Not Recommending FIPS Mode Anymore](https://docs.microsoft.com/en-us/archive/blogs/secguide/why-were-not-recommending-fips-mode-anymore)
13
+
*[Microsoft’s approach to FIPS 140-2 validation](https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation)
14
+
*[Using Windows in a FIPS 140-2 approved mode](https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation#using-windows-in-a-fips-140-2-approved-mode-of-operation)
15
+
*[Use FIPS compliant algorithms for encryption, hashing, and signing](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing)
16
+
*[Why We’re Not Recommending FIPS Mode Anymore](https://docs.microsoft.com/en-us/archive/blogs/secguide/why-were-not-recommending-fips-mode-anymore)
17
17
18
18
> ### FIPS Mode:
19
19
> This policy setting determines whether the TLS/SSL security provider supports only the FIPS-compliant strong cipher suite known as TLS_RSA_WITH_3DES_EDE_CBC_SHA, which means that
@@ -26,30 +26,29 @@ REF: [Why We’re Not Recommending FIPS Mode Anymore](https://docs.microsoft.com
0 commit comments