commit | ce0c9dbeb64d8d748fd2e321d8ad34c78f888206 | [log] [tgz] |
---|---|---|
author | Hanno Becker <hanno.becker@arm.com> | Thu Sep 28 15:39:45 2017 +0100 |
committer | Jaeden Amero <jaeden.amero@arm.com> | Tue Jan 30 10:38:40 2018 +0000 |
tree | cd7053ff1acb371457b75e395bb11f29ac751032 | |
parent | 8fdb9daa597ec8269268d4e47aa8a2ed4e5c76ab [diff] |
Add documentation warnings for weak algorithms MD2, MD4, MD5, DES and SHA-1 are considered weak and their use constitutes a security risk. If possible, we recommend avoiding dependencies on them, and considering stronger message digests and ciphers instead.