openssl/providers/implementations/signature
slontis c13ddf0a6c Change all existing FIPS configurable checks to use FIPS indicators.
This changes the logic to always do the security checks and then decide
what to do based on if this passes or not. Failure of a check causes
either a failure OR the FIPS indicator callback to be triggered.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24623)
2024-07-11 08:29:43 +10:00
..
build.info configure: introduce no-ecx to remove ECX related feature 2023-06-14 13:06:22 +10:00
dsa_sig.c Change all existing FIPS configurable checks to use FIPS indicators. 2024-07-11 08:29:43 +10:00
ecdsa_sig.c Change all existing FIPS configurable checks to use FIPS indicators. 2024-07-11 08:29:43 +10:00
eddsa_sig.c Copyright year updates 2023-09-07 09:59:15 +01:00
mac_legacy_sig.c Copyright year updates 2023-09-07 09:59:15 +01:00
rsa_sig.c Change all existing FIPS configurable checks to use FIPS indicators. 2024-07-11 08:29:43 +10:00
sm2_sig.c Break the if statement up into 2 if statements 2024-03-30 09:05:32 -04:00