Home
last modified time | relevance | path

Searched +full:enable +full:- +full:fips (Results 1 – 25 of 224) sorted by relevance

123456789

/third_party/node/test/parallel/
Dtest-crypto-fips.js1 // Flags: --expose-internals
17 'Error [ERR_CRYPTO_FIPS_FORCED]: Cannot set FIPS mode, it was forced with ' +
18 '--force-fips at startup.';
19 const FIPS_UNSUPPORTED_ERROR_STRING = 'fips mode not supported';
20 const FIPS_ENABLE_ERROR_STRING = 'OpenSSL error when trying to enable FIPS:';
32 const fullArgs = args.concat(['-e', `console.log(${cmd})`]);
55 // Normal path where we expect either FIPS enabled or disabled.
64 // --enable-fips should raise an error if OpenSSL is not FIPS enabled.
67 ['--enable-fips'],
72 // --force-fips should raise an error if OpenSSL is not FIPS enabled.
[all …]
Dtest-cli-node-print-help.js1 // Flags: --expose-internals
15 exec(`${process.execPath} --help`, common.mustSucceed((stdout, stderr) => {
28 flags: [ '--openssl-config=...', '--tls-cipher-list=...',
29 '--use-bundled-ca', '--use-openssl-ca',
30 '--enable-fips', '--force-fips' ] },
32 flags: [ '--icu-data-dir=...', 'NODE_ICU_DATA' ] },
34 flags: [ '--inspect-brk[=[host:]port]', '--inspect-port=[host:]port',
35 '--inspect[=[host:]port]' ] },
44 assert.strictEqual(stdOut.indexOf(flag) !== -1, true,
49 assert.strictEqual(stdOut.indexOf(flag), -1,
Dtest-process-env-allowed-flags-are-documented.js24 '<!-- node-options-node start -->',
25 '<!-- node-options-node end -->');
27 '<!-- node-options-v8 start -->',
28 '<!-- node-options-v8 end -->');
36 for (const match of line.matchAll(/`(-[^`]+)`/g)) {
38 const option = match[1].replace('--no-', '--');
47 documented.delete('--openssl-legacy-provider');
48 documented.delete('--openssl-shared-config');
57 '--openssl-config',
58 common.hasOpenSSL3 ? '--openssl-legacy-provider' : '',
[all …]
/third_party/node/deps/openssl/openssl/
DREADME-FIPS.md1 OpenSSL FIPS support
5 FIPS validated. The module is implemented as an OpenSSL provider.
7 cryptographic algorithms, see the [README-PROVIDERS](README-PROVIDERS.md) file
10 A cryptographic module is only FIPS validated after it has gone through the complex
11 FIPS 140 validation process. As this process takes a very long time, it is not
13 If you need a FIPS validated module then you must ONLY generate a FIPS provider
14 using OpenSSL versions that have valid FIPS certificates. A FIPS certificate
16 in the Security Policy in order to be FIPS compliant.
18 FIPS certificates and Security Policies.
22 legacy providers) without any restrictions, but the FIPS provider must be built
[all …]
DINSTALL.md11 - [Prerequisites](#prerequisites)
12 - [Notational Conventions](#notational-conventions)
13 - [Quick Installation Guide](#quick-installation-guide)
14 - [Building OpenSSL](#building-openssl)
15 - [Installing OpenSSL](#installing-openssl)
16 - [Configuration Options](#configuration-options)
17 - [API Level](#api-level)
18 - [Cross Compile Prefix](#cross-compile-prefix)
19 - [Build Type](#build-type)
20 - [Directories](#directories)
[all …]
DNOTES-NONSTOP.md5 -------------------
11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script.
13 be used if FIPS is selected.
15 specify the `--with-rand-seed=egd` option to the `./Configure` script.
18 ------------------
27 ----------------
31 the TNS/X (L-Series) platform:
33 * `nonstop-nsx` or default will select an unthreaded build.
34 * `nonstop-nsx_put` selects the PUT build.
35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build.
[all …]
DREADME.md4 This is a fork of [OpenSSL](https://www.openssl.org) to enable QUIC. In addition
7 [README-OpenSSL.md](https://github.com/quictls/openssl/blob/openssl-3.0.10%2Bquic/README-OpenSSL.md)
11 [charter](https://datatracker.ietf.org/wg/quic/about/), QUIC is a "UDP-based,
12 stream-multiplexing, encrypted transport protocol." If you don't need QUIC, you
22 [blog post](https://www.openssl.org/blog/blog/2020/02/17/QUIC-and-OpenSSL/) and
23 [openssl-project email](https://github.com/quictls/openssl/discussions/54)
27 (released 2021-09-07), and does not intend to add QUIC functionality to 1.1.x.
28 There is a community need for a QUIC-capable TLS library. This fork is intended
29 as stopgap solution to enable higher level frameworks and runtimes to use QUIC
42 --------------------
[all …]
Dappveyor.yml2 - Visual Studio 2017
5 - x64
6 - x86
11 - VSVER: 15
14 - shared
15 - minimal
18 -
21 - master
23 - shared
24 - plain
[all …]
/third_party/openssl/
DREADME-FIPS.md1 OpenSSL FIPS support
5 FIPS 140-2 validated. The module is implemented as an OpenSSL provider.
7 cryptographic algorithms, see the [README-PROVIDERS](README-PROVIDERS.md) file
10 A cryptographic module is only FIPS validated after it has gone through the complex
11 FIPS 140 validation process. As this process takes a very long time, it is not
13 If you need a FIPS validated module then you must ONLY generate a FIPS provider
14 using OpenSSL versions that have valid FIPS certificates. A FIPS certificate
16 in the Security Policy in order to be FIPS compliant.
18 FIPS certificates and Security Policies.
22 legacy providers) without any restrictions, but the FIPS provider must be built
[all …]
DINSTALL.md11 - [Prerequisites](#prerequisites)
12 - [Notational Conventions](#notational-conventions)
13 - [Quick Installation Guide](#quick-installation-guide)
14 - [Building OpenSSL](#building-openssl)
15 - [Installing OpenSSL](#installing-openssl)
16 - [Configuration Options](#configuration-options)
17 - [API Level](#api-level)
18 - [Cross Compile Prefix](#cross-compile-prefix)
19 - [Build Type](#build-type)
20 - [Directories](#directories)
[all …]
DNOTES-NONSTOP.md5 -------------------
11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script.
13 be used if FIPS is selected.
15 specify the `--with-rand-seed=egd` option to the `./Configure` script.
18 ------------------
27 ----------------
31 the TNS/X (L-Series) platform:
33 * `nonstop-nsx` or default will select an unthreaded build.
34 * `nonstop-nsx_put` selects the PUT build.
35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build.
[all …]
Dappveyor.yml2 - Visual Studio 2017
5 - x64
6 - x86
11 - VSVER: 15
14 - shared
15 - minimal
18 -
21 - master
23 - shared
24 - plain
[all …]
/third_party/node/doc/
Dnode.18 .\" https://atom.io/packages/language-roff
11 .\" mandoc -Wall -Tlint /path/to/this.file # BSD
12 .\" groff -w all -z /path/to/this.file # GNU/Linux, macOS
18 .\" the Roff formatter better control over text-spacing, line-wrapping,
29 .tr -\-^\(ha~\(ti`\(ga
35 .Nd server-side JavaScript runtime
41 .Op Ar v8-options
43 .Op Fl -
52 .Op Fl -v8-options
57 It is primarily focused on creating simple, easy-to-build network clients and servers.
[all …]
/third_party/openssl/doc/man3/
DEVP_set_default_properties.pod7 - Set default properties for future algorithm fetches
14 int EVP_default_properties_enable_fips(OSSL_LIB_CTX *libctx, int enable);
31 EVP_default_properties_enable_fips() sets the 'fips=yes' to be a default property
32 if I<enable> is non zero, otherwise it clears 'fips' from the default property
33 query for the given I<libctx>. It merges the fips default property query with any
36 EVP_default_properties_is_fips_enabled() indicates if 'fips=yes' is a default
51 EVP_default_properties_is_fips_enabled() returns 1 if the 'fips=yes' default
64 Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
/third_party/rust/crates/rust-openssl/openssl/src/
Dfips.rs1 //! FIPS 140-2 support.
5 //! [OpenSSL's documentation]: https://www.openssl.org/docs/fips/UserGuide-2.0.pdf
10 /// Moves the library into or out of the FIPS 140-2 mode of operation.
12 pub fn enable(enabled: bool) -> Result<(), ErrorStack> { in enable() function
17 /// Determines if the library is running in the FIPS 140-2 mode of operation.
19 pub fn enabled() -> bool { in enabled()
/third_party/node/doc/api/
Dcli.md1 # Command-line API
3 <!--introduced_in=v5.9.1-->
5 <!--type=misc-->
7 Node.js comes with a variety of CLI options. These options expose built-in
14 `node [options] [V8 options] [<program-entry-point> | -e "script" | -] [--] [arguments]`
16 `node inspect [<program-entry-point> | -e "script" | <host>:<port>] …`
18 `node --v8-options`
26 The program entry point is a specifier-like string. If the string is not an
34 * The program was started with a command-line flag that forces the entry
38 `package.json` file contains a top-level [`"type"`][] field with a value of
[all …]
Dcli.json7 "textRaw": "Command-line API",
8 "name": "Command-line API",
11 …"desc": "<p>Node.js comes with a variety of CLI options. These options expose built-in\ndebugging,…
16-entry-point> | -e \"script\" | -] [--] [arguments]</code></p>\n<p><code>node inspect [&#x3C;progr…
23-like string. If the string is not an\nabsolute path, it's resolved as a relative path from the cu…
28 … <code>.wasm</code> extensions when\n<a href=\"#--experimental-wasm-modules\"><code>--experimental
43 "pr-url": "https://github.com/nodejs/node/pull/23020",
48-</code>) or underscores (<code>_</code>). For example, <code>--pending-deprecation</code> is\nequ…
51 "textRaw": "`-`",
52 "name": "`-`",
[all …]
/third_party/node/src/crypto/
Dcrypto_util.cc2 #include "async_wrap-inl.h"
5 #include "env-inl.h"
6 #include "memory_tracker-inl.h"
8 #include "node_options-inl.h"
10 #include "threadpoolwork-inl.h"
11 #include "util-inl.h"
72 length -= INT_MAX; in CSPRNG()
101 size_t len = passphrase->size(); in PasswordCallback()
103 return -1; in PasswordCallback()
104 memcpy(buf, passphrase->data(), len); in PasswordCallback()
[all …]
/third_party/node/deps/openssl/config/
DMakefile4 UNAME_S := $(shell uname -s)
12 ASM_ARCHS = aix64-gcc-as BSD-x86 BSD-x86_64 \
13 darwin64-x86_64-cc darwin-i386-cc darwin64-arm64-cc linux-aarch64 \
14 linux-armv4 linux-elf linux-x86_64 \
15 linux-ppc64le linux32-s390x linux64-s390x linux64-mips64\
16 solaris-x86-gcc solaris64-x86_64-gcc VC-WIN64A VC-WIN32
18 NO_ASM_ARCHS = VC-WIN64-ARM linux64-riscv64 linux64-loongarch64
24 # no-comp: against CRIME attack
25 # no-shared: openssl-cli needs static link
26 # no-afalgeng: old Linux kernel < 4.0 does not support it
[all …]
/third_party/node/
DBUILDING.md13 * [Supported platforms](#supported-platforms)
16 * [Platform list](#platform-list)
17 * [Supported toolchains](#supported-toolchains)
18 * [Official binary platforms and toolchains](#official-binary-platforms-and-toolchains)
19 * [OpenSSL asm support](#openssl-asm-support)
20 * [Previous versions of this document](#previous-versions-of-this-document)
21 * [Building Node.js on supported platforms](#building-nodejs-on-supported-platforms)
22 * [Note about Python](#note-about-python)
23 * [Unix and macOS](#unix-and-macos)
24 * [Unix prerequisites](#unix-prerequisites)
[all …]
/third_party/openssl/doc/man7/
DEVP_MAC-KMAC.pod5 EVP_MAC-KMAC, EVP_MAC-KMAC128, EVP_MAC-KMAC256
6 - The KMAC EVP_MAC implementations
19 =item "KMAC-128", "provider=default" or "provider=fips"
21 =item "KMAC-256", "provider=default" or "provider=fips"
34 Likewise, the "block-size" parameter can be retrieved with
54 By default, it is 16 for C<KMAC-128> and 32 for C<KMAC-256>.
56 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
59 By default, it is 168 for C<KMAC-128> and 136 for C<KMAC-256>.
63 The "xof" parameter value is expected to be 1 or 0. Use 1 to enable XOF mode.
89 mac = EVP_MAC_fetch(NULL, "KMAC-128", NULL);
[all …]
Dmigration_guide.pod5 migration_guide - OpenSSL migration guide
32 OpenSSL 3.0 such as the availability of the FIPS module.
37 licenses|https://www.openssl.org/source/license-openssl-ssleay.txt>
39 L<Apache License v2|https://www.openssl.org/source/apache-license-2.0.txt>.
41 =head3 Providers and FIPS support
53 One of the standard providers available is the FIPS provider. This makes
54 available FIPS validated cryptographic algorithms.
55 The FIPS provider is disabled by default and needs to be enabled explicitly
56 at configuration time using the C<enable-fips> option. If it is enabled,
57 the FIPS provider gets built and installed in addition to the other standard
[all …]
/third_party/node/deps/openssl/openssl/Configurations/
Dunix-Makefile.tmpl4 ## {- join("\n## ", @autowarntext) -}
5 {-
9 our $makedepcmd = platform->makedepcmd();
17 our $sover_dirname = platform->shlib_version_as_filename();
29 $COLUMNS = int($COLUMNS) - 2; # 2 to leave space for ending ' \'
61 -}
62 PLATFORM={- $config{target} -}
63 OPTIONS={- $config{options} -}
64 CONFIGURE_ARGS=({- join(", ",quotify_l(@{$config{perlargv}})) -})
65 SRCDIR={- $config{sourcedir} -}
[all …]
/third_party/openssl/Configurations/
Dunix-Makefile.tmpl4 ## {- join("\n## ", @autowarntext) -}
5 {-
9 our $makedepcmd = platform->makedepcmd();
17 our $sover_dirname = platform->shlib_version_as_filename();
29 $COLUMNS = int($COLUMNS) - 2; # 2 to leave space for ending ' \'
61 -}
62 PLATFORM={- $config{target} -}
63 OPTIONS={- $config{options} -}
64 CONFIGURE_ARGS=({- join(", ",quotify_l(@{$config{perlargv}})) -})
65 SRCDIR={- $config{sourcedir} -}
[all …]
/third_party/node/deps/openssl/openssl/crypto/evp/
Devp_fetch.c2 * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
69 if (methdata->tmp_store == NULL) in get_tmp_evp_method_store()
70 methdata->tmp_store = ossl_method_store_new(methdata->libctx); in get_tmp_evp_method_store()
71 return methdata->tmp_store; in get_tmp_evp_method_store()
91 && (store = get_evp_method_store(methdata->libctx)) == NULL) in reserve_evp_method_store()
102 && (store = get_evp_method_store(methdata->libctx)) == NULL) in unreserve_evp_method_store()
113 * The resulting identity is a 31-bit integer, composed like this:
115 * +---------23 bits--------+-8 bits-+
117 * +------------------------+--------+
126 #define METHOD_ID_OPERATION_MAX ((1 << 8) - 1)
[all …]

123456789