func crypto/tls.needFIPS

14 uses

	crypto/tls (current package)
		auth.go#L245: 		if needFIPS() && !isSupportedSignatureAlgorithm(preferredAlg, defaultSupportedSignatureAlgorithmsFIPS) {
		common.go#L1060: 		if needFIPS() {
		common.go#L1065: 	if needFIPS() {
		common.go#L1091: 		if needFIPS() && !slices.Contains(defaultSupportedVersionsFIPS, v) {
		common.go#L1139: 		if needFIPS() {
		common.go#L1144: 	} else if needFIPS() {
		common.go#L1616: 	if !needFIPS() {
		handshake_client.go#L629: 	if hs.c.config.CipherSuites == nil && !needFIPS() && rsaKexCiphers[hs.suite.id] {
		handshake_client.go#L633: 	if hs.c.config.CipherSuites == nil && !needFIPS() && tdesCiphers[hs.suite.id] {
		handshake_client_tls13.go#L48: 	if needFIPS() {
		handshake_server.go#L375: 	if c.config.CipherSuites == nil && !needFIPS() && rsaKexCiphers[hs.suite.id] {
		handshake_server.go#L379: 	if c.config.CipherSuites == nil && !needFIPS() && tdesCiphers[hs.suite.id] {
		handshake_server_tls13.go#L50: 	if needFIPS() {
		notboring.go#L9: func needFIPS() bool { return false }