Pauli
Pauli
If there is no timer available to seed the stochastic flushing, revert to a global seed that gets updated each flush. This is mitigating the possibility that the cache flushing...
This prevents misuses creeping in that would make converting later difficult. - [x] documentation is added or updated - [x] tests are added or updated
Intended as a companion for #18564, although less advanced. - [x] documentation is added or updated - [ ] tests are added or updated
The old cipher returning calls like `EVP_aes_128_gcm()` perform late binding which means they fetch on initialisation. Fetching in OpenSSL 3.0 is a relatively expensive operation. Instead of fetching every time...
- [x] documentation is added or updated - [ ] tests are added or updated
An OpenSSL build that doesn't support the FIPS provider ought to support a FIPS provider built against an easlier/later version of OpenSSL. I.e. the detection of the FIPS provider should...
- [ ] documentation is added or updated - [x] tests are added or updated
Not possible to hit but good to address. - [ ] documentation is added or updated - [x] tests are added or updated
The [security policy](https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4282.pdf) lists the following MACs for use with KBKDF: CMAC AES128, AES192, AES256 and HMAC-SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512. Missing are HMAC SHA3, truncated HMAC SHA2 and KMAC...
Currently KBKDF has explicit checks for CMAC or HMAC and if neither is being used, it errors out. This prevents the use of KMAC. All three options are defined for...