openssl/providers
Pauli 9c57eb736e drbg: streamline test for allowed digests
Under FIPS, we've got a whitelist of algorithms.  There is no need to then
also check for XOF digests because they aren't possible.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25007)
2024-07-28 18:49:52 +10:00
..
common Add FIPS indicator support for Triple-DES encryption. 2024-07-26 14:26:49 +10:00
fips Add FIPS indicator support for Triple-DES encryption. 2024-07-26 14:26:49 +10:00
implementations drbg: streamline test for allowed digests 2024-07-28 18:49:52 +10:00
baseprov.c fips: use seed source requested 2023-09-27 17:23:04 +01:00
build.info Add VERSIONINFO resource to legacy provider if it is not builtin 2022-06-02 11:09:10 -04:00
decoders.inc Copyright year updates 2023-09-07 09:59:15 +01:00
defltprov.c Copyright year updates 2023-09-07 09:59:15 +01:00
encoders.inc Copyright year updates 2023-09-07 09:59:15 +01:00
fips-sources.checksums make update 2023-09-28 14:24:31 +01:00
fips.checksum make update 2023-09-28 14:24:31 +01:00
fips.module.sources make update 2023-09-07 10:00:21 +01:00
legacyprov.c Copyright year updates 2023-09-07 09:59:15 +01:00
nullprov.c Copyright year updates 2023-09-07 09:59:15 +01:00
prov_running.c
stores.inc Add support for loading root CAs from Windows crypto API 2022-09-14 14:10:18 +01:00