openssl/providers
Pauli 00f5f3cd00 drbg: allow the ctr derivation function to be disabled in FIPS mode
Word from the lab is:

    The use of the derivation function is optional if either an approved
    RBG or an entropy source provides full entropy output when entropy
    input is requested by the DRBG mechanism. Otherwise, the derivation
    function shall be used.

So our disallowing it's use was more than required.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/16096)
2021-07-20 18:34:07 +10:00
..
common fips module header inclusion fine-tunning 2021-07-06 10:52:27 +10:00
fips Change self test for AES_CGM to perform both an encrypt and decrypt. 2021-06-22 15:04:30 +10:00
implementations drbg: allow the ctr derivation function to be disabled in FIPS mode 2021-07-20 18:34:07 +10:00
baseprov.c
build.info Avoid duplicating prov_running.o in libdefault and libcrypto 2021-06-14 09:18:41 +10:00
decoders.inc prov: tag SM2 encoders and decoders as non-FIPS 2021-06-16 14:42:38 +01:00
defltprov.c
encoders.inc prov: tag SM2 encoders and decoders as non-FIPS 2021-06-16 14:42:38 +01:00
fips-sources.checksums update fips checksums 2021-07-06 10:52:27 +10:00
fips.checksum update fips checksums 2021-07-06 10:52:27 +10:00
fips.module.sources update fips checksums 2021-07-06 10:52:27 +10:00
legacyprov.c provider: use #define for PBKDF1 algorithm name 2021-07-05 11:49:42 +10:00
nullprov.c
prov_running.c
stores.inc