Hi Michael, I'm attaching the output of diff <updated source file> <original source file>. > If we could prove that sha2-openssl.c is actually unreliable even if FIPS is enabled system-wide with either SCRAM authentication or any of the other hashing functions, then I would be ready to accept a patch. Now, as far as I can see and heard from other folks for at least Linux, if FIPS is enabled at the OS level, then Postgres would use it automatically and SCRAM is able to work. Not sure why it works on Linux but not on Windows. That the low-level digest APIs can't be used when FIPS is enabled is by design, other people have encountered that problem, e.g., http://openssl.6102.n7.nabble.com/Low-Level-Digest-if-Fips-mode-td54983.html . Thanks,Alessandro
be-secure-openssl.c.diff
Description: Binary data
fe-secure-openssl.c.diff
Description: Binary data
sha2.h.diff
Description: Binary data
sha2_openssl.c.diff
Description: Binary data