Syntax is documented on:
- man pages `man crypto-policies`
- Red Hat system-wide cryptographic policies documentation
Example subpolicy files are located in:
`/usr/share/crypto-policies/policies/modules/`
### See also
1. [[How to disable weak MAC algorithms on a Linux server for SSH?]]
2. [[How to check which Crypto Policy is currently applied on Linux machine?]]