openssl/providers
Shane Lontis 341c3e7f28 Add fips checks for ecdh key agreement
For key agreement only NIST curves that have a security strength of 112 bits or more are allowed.
Fixed tests so they obey these restrictions when testing in fips mode.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12745)
2020-09-18 14:20:38 +01:00
..
common Add fips checks for ecdsa signatures 2020-09-18 14:20:38 +01:00
fips Add self tests for rsa encryption 2020-09-16 14:10:23 +10:00
implementations Add fips checks for ecdh key agreement 2020-09-18 14:20:38 +01:00
baseprov.c provider: add an 'is_running' call to all providers. 2020-09-12 16:46:20 +10:00
build.info provider: add an 'is_running' call to all providers. 2020-09-12 16:46:20 +10:00
decoders.inc
defltprov.c provider: add an 'is_running' call to all providers. 2020-09-12 16:46:20 +10:00
encoders.inc ENCODER: Refactor provider implementations, and some cleanup 2020-09-09 16:35:22 +02:00
legacyprov.c provider: add an 'is_running' call to all providers. 2020-09-12 16:46:20 +10:00
nullprov.c provider: add an 'is_running' call to all providers. 2020-09-12 16:46:20 +10:00
prov_running.c keygen: add FIPS error state management to conditional self tests 2020-09-12 16:46:51 +10:00
stores.inc