이 콘텐츠는 선택한 언어로 제공되지 않습니다.8.5. Checksums Red Hat Enterprise Linux now uses the SHA-256 digest algorithm for data verification and authentication in more places than before, upgrading from the cryptographically weaker SHA-1 and MD5 algorithms. 이전다음