fix: allow ED25519 public key algorithm in FIPS mode
Previously ED25519 was not on the default public key algorithms, but this is actually allowed in FIPS 140-3. `curve25519-sha256` is not an allowed key exchange, but as the FIPS 140-3 PDF mentions: mentions: Curves that are included in SP 800-186 but not included in SP 800-56Arev3 are not approved for key agreement. E.g., the ECDH X25519 and X448 key agreement schemes (defined in RFC 7748) that use Curve25519 and Curve448, respectively, are not compliant to SP 800-56Arev3.
-
mentioned in merge request gitlab-com/gl-infra/platform/runway/example-service!395 (merged)
-
mentioned in merge request gitlab-org/duo-workflow/duo-workflow-executor!200
-
mentioned in merge request gitlab-pages!1200 (merged)
-
mentioned in merge request gitlab-elasticsearch-indexer!728 (merged)
-
mentioned in merge request gitlab-zoekt-indexer!655 (merged)
-
mentioned in merge request release-tools!4439 (merged)
-
mentioned in merge request gitlab-com/gl-infra/woodhouse!613
-
mentioned in merge request gitlab-org/auth/glgo!188
-
mentioned in merge request gitlab-org/cells/topology-service!336 (merged)
-
mentioned in merge request gitlab-com/gl-infra/cmbr!431 (merged)
-
mentioned in merge request gitlab-zoekt-indexer!664 (closed)
-
mentioned in merge request gitaly!8130 (merged)
-
mentioned in merge request gitaly!8139 (merged)
-
mentioned in merge request container-registry!2564 (merged)