openssl/providers/implementations
Shane Lontis 341c3e7f28 Add fips checks for ecdh key agreement
For key agreement only NIST curves that have a security strength of 112 bits or more are allowed.
Fixed tests so they obey these restrictions when testing in fips mode.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12745)
2020-09-18 14:20:38 +01:00
..
asymciphers Add fips checks for rsa encryption 2020-09-18 14:20:38 +01:00
ciphers Fix AES_XTS on x86-64 platforms with BSAES and VPAES support. 2020-09-18 06:15:50 +10:00
digests digests: add FIPS error state handling 2020-09-12 16:46:20 +10:00
encode_decode ENCODER: Refactor provider implementations, and some cleanup 2020-09-09 16:35:22 +02:00
exchange Add fips checks for ecdh key agreement 2020-09-18 14:20:38 +01:00
include/prov Update AES GCM IV max length to be 1024 bits (was 512) 2020-09-17 12:55:39 +10:00
kdfs Make KDFs fail if requesting a zero-length key. 2020-09-17 18:30:40 +10:00
keymgmt keymgmt: add FIPS error state handling 2020-09-12 16:46:51 +10:00
macs Allow zero-length secret for EVP_KDF API 2020-09-17 18:27:28 +10:00
rands Add selftest callback to CRNG output test 2020-09-18 06:20:33 +10:00
signature Add fips checks for ecdsa signatures 2020-09-18 14:20:38 +01:00
storemgmt Fix safestack issues in x509.h 2020-09-13 11:09:45 +01:00
build.info STORE: Add a built-in 'file:' storemgmt implementation (loader) 2020-09-03 17:48:32 +02:00