keycloak-scim/model
Bruno Oliveira da Silva f9d4566723 Replace the cryptographic algorithm by SHA-2
The static code scanning analysis detected the usage of MD5 as part of [
MapDeploymentStateProviderFactory](a6dd9dc0f1/model/map/src/main/java/org/keycloak/models/map/deploymentState/MapDeploymentStateProviderFactory.java (L58-L58)).

Even though we could not find any ways of exploiting the code, we should
avoid its usage considering that MD5 is not collision-resistant.

Resolves #11290
2022-04-18 07:10:04 -03:00
..
build-processor Hot Rod map storage: User / client session no-downtime store 2022-04-14 15:34:22 +02:00
infinispan NPE when caching policies based on scopes without a resource 2022-04-08 08:43:08 -03:00
jpa Add support for filtering by enabled attribute on users count endpoint (#9842) 2022-04-13 13:57:22 -03:00
map Replace the cryptographic algorithm by SHA-2 2022-04-18 07:10:04 -03:00
map-hot-rod Hot Rod map storage: User / client session no-downtime store 2022-04-14 15:34:22 +02:00
map-jpa Store time as seconds as a long in map store 2022-04-12 14:22:44 +02:00
map-ldap Avoiding AvlPartitionFactory and using JdbmPartitionFactory for the embedded LDAP to work around unstable tests. 2022-04-12 09:12:21 +02:00
pom.xml Set version to 999-SNAPSHOT (#10784) 2022-03-22 09:22:48 +01:00