Home
last modified time | relevance | path

Searched +full:enable +full:- +full:fips (Results 1 – 25 of 94) sorted by relevance

1234

/third_party/node/test/parallel/
Dtest-crypto-fips.js1 // Flags: --expose-internals
17 'Error [ERR_CRYPTO_FIPS_FORCED]: Cannot set FIPS mode, it was forced with ' +
18 '--force-fips at startup.';
19 const FIPS_UNSUPPORTED_ERROR_STRING = 'fips mode not supported';
31 const fullArgs = args.concat(['-e', `console.log(${cmd})`]);
52 // Normal path where we expect either FIPS enabled or disabled.
61 // By default FIPS should be off in both FIPS and non-FIPS builds.
69 // --enable-fips should turn FIPS mode on
72 ['--enable-fips'],
77 // --force-fips should turn FIPS mode on
[all …]
Dtest-cli-node-print-help.js1 // Flags: --expose-internals
15 exec(`${process.execPath} --help`, common.mustSucceed((stdout, stderr) => {
28 flags: [ '--openssl-config=...', '--tls-cipher-list=...',
29 '--use-bundled-ca', '--use-openssl-ca',
30 '--enable-fips', '--force-fips' ] },
32 flags: [ '--icu-data-dir=...', 'NODE_ICU_DATA' ] },
34 flags: [ '--inspect-brk[=[host:]port]', '--inspect-port=[host:]port',
35 '--inspect[=[host:]port]' ] },
44 assert.strictEqual(stdOut.indexOf(flag) !== -1, true,
49 assert.strictEqual(stdOut.indexOf(flag), -1,
Dtest-process-env-allowed-flags-are-documented.js22 '<!-- node-options-node start -->',
23 '<!-- node-options-node end -->');
25 '<!-- node-options-v8 start -->',
26 '<!-- node-options-v8 end -->');
33 for (const match of line.matchAll(/`(-[^`]+)`/g)) {
35 const option = match[1].replace('--no-', '--');
49 '--openssl-config',
50 '--openssl-shared-config',
51 '--tls-cipher-list',
52 '--use-bundled-ca',
[all …]
/third_party/openssl/.github/workflows/
Dci.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
14 # BUILDOPTS: "-j4"
15 # HARNESS_JOBS: "${HARNESS_JOBS:-4}"
19 # - make="make -s"
26 runs-on: ubuntu-latest
28 - name: install unifdef
30 sudo apt-get update
31 sudo apt-get -yq --no-install-suggests --no-install-recommends --force-yes install unifdef
32 - uses: actions/checkout@v2
34 fetch-depth: 0
[all …]
Dfips-old.yml15 fips-provider-validation:
20 dir: openssl-3.0.0,
21 tgz: openssl-3.0.0.tar.gz,
22 url: "https://www.openssl.org/source/old/3.0/openssl-3.0.0.tar.gz"
25 runs-on: ubuntu-latest
27 - name: create directory
29 - uses: actions/checkout@v2
32 - name: download module source
33 run: wget --no-verbose ${{ matrix.module.url }}
34 - name: unpack module source
[all …]
Dfips-checksums.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
8 name: FIPS Checksums
15 compute-checksums:
16 runs-on: ubuntu-latest
18 - name: install unifdef
20 sudo apt-get update
21 … sudo apt-get -yq --no-install-suggests --no-install-recommends --force-yes install unifdef
22 - name: create build dirs
24 mkdir ./build-pristine
25 mkdir ./source-pristine
[all …]
Drun-checker-daily.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
8 name: Run-checker daily
13 - cron: '0 6 * * *'
18 run-checker:
20 fail-fast: false
24 no-afalgeng,
25 no-aria,
26 no-asan,
27 no-asm,
28 no-async,
[all …]
Dcross-compiles.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
16 cross-compilation:
18 fail-fast: false
21 # arch: the architecture to build for, this defines the tool-chain
22 # prefix {arch}- and the Debian compiler package gcc-{arch}
27 # fips: set to "no" to disable building FIPS, leave unset to
28 # build the FIPS provider.
35 arch: aarch64-linux-gnu,
36 libs: libc6-dev-arm64-cross,
37 target: linux-aarch64
[all …]
Dwindows.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
21 - windows-2019
22 - windows-2022
24 - arch: win64
25 config: enable-fips
26 - arch: win32
27 config: --strict-warnings no-fips
28 runs-on: ${{matrix.os}}
30 - uses: actions/checkout@v2
31 - uses: ilammy/msvc-dev-cmd@v1
[all …]
Dcoveralls.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
13 - cron: '49 0 * * *'
21 checks: write # for coverallsapp/github-action to create new checks
23 runs-on: ubuntu-latest
25 - uses: actions/checkout@v2
26 - name: package installs
28 sudo apt-get -yq install lcov
29 - name: config
30--banner=Configured --debug --coverage no-asm enable-fips enable-rc5 enable-md2 enable-ssl3 enable…
31 - name: config dump
[all …]
Drun-checker-ci.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
9 name: Run-checker CI
15 run-checker:
17 fail-fast: false
20 no-cmp,
21 no-cms,
22 no-ct,
23 no-dtls,
24 no-ec,
25 no-ec2m,
[all …]
Dfuzz-checker.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
8 name: Fuzz-checker CI
16 fuzz-checker:
18 fail-fast: false
23 config: enable-fuzz-afl no-module,
24 install: afl++-clang,
25 cc: afl-clang-fast
28 config: enable-fuzz-libfuzzer enable-asan enable-ubsan,
29 …libs: --with-fuzzer-lib=/usr/lib/llvm-12/lib/libFuzzer.a --with-fuzzer-include=/usr/lib/llvm-12/bu…
30 install: libfuzzer-12-dev,
[all …]
/third_party/openssl/
DREADME-FIPS.md1 OpenSSL FIPS support
5 FIPS 140-2 validated. The module is implemented as an OpenSSL provider.
7 cryptographic algorithms, see the [README-PROVIDERS](README-PROVIDERS.md) file
10 The OpenSSL FIPS provider comes as shared library called `fips.so` (on Unix)
11 resp. `fips.dll` (on Windows). The FIPS provider does not get built and
12 installed automatically. To enable it, you need to configure OpenSSL using
13 the `enable-fips` option.
15 Installing the FIPS module
18 If the FIPS provider is enabled, it gets installed automatically during the
31 $ make install_fips # for `enable-fips` only
[all …]
DINSTALL.md11 - [Prerequisites](#prerequisites)
12 - [Notational Conventions](#notational-conventions)
13 - [Quick Installation Guide](#quick-installation-guide)
14 - [Building OpenSSL](#building-openssl)
15 - [Installing OpenSSL](#installing-openssl)
16 - [Configuration Options](#configuration-options)
17 - [API Level](#api-level)
18 - [Cross Compile Prefix](#cross-compile-prefix)
19 - [Build Type](#build-type)
20 - [Directories](#directories)
[all …]
DNOTES-NONSTOP.md5 -------------------
11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script.
13 be used if FIPS is selected.
15 specify the `--with-rand-seed=egd` option to the `./Configure` script.
18 ------------------
27 ----------------
31 the TNS/X (L-Series) platform:
33 * `nonstop-nsx` or default will select an unthreaded build.
34 * `nonstop-nsx_put` selects the PUT build.
35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build.
[all …]
Dappveyor.yml2 - Visual Studio 2017
5 - x64
6 - x86
11 - VSVER: 15
14 - shared
15 - minimal
18 -
21 - master
23 - shared
24 - plain
[all …]
/third_party/node/doc/
Dnode.18 .\" https://atom.io/packages/language-roff
11 .\" mandoc -Wall -Tlint /path/to/this.file # BSD
12 .\" groff -w all -z /path/to/this.file # GNU/Linux, macOS
18 .\" the Roff formatter better control over text-spacing, line-wrapping,
34 .Nd server-side JavaScript runtime
40 .Op Ar v8-options
42 .Op Fl -
51 .Op Fl -v8-options
56 It is primarily focused on creating simple, easy-to-build network clients and servers.
63 .Bl -tag -width 6n
[all …]
/third_party/openssl/doc/man3/
DEVP_set_default_properties.pod7 - Set default properties for future algorithm fetches
14 int EVP_default_properties_enable_fips(OSSL_LIB_CTX *libctx, int enable);
31 EVP_default_properties_enable_fips() sets the 'fips=yes' to be a default property
32 if I<enable> is non zero, otherwise it clears 'fips' from the default property
33 query for the given I<libctx>. It merges the fips default property query with any
36 EVP_default_properties_is_fips_enabled() indicates if 'fips=yes' is a default
51 EVP_default_properties_is_fips_enabled() returns 1 if the 'fips=yes' default
64 Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
/third_party/rust/crates/rust-openssl/openssl/src/
Dfips.rs1 //! FIPS 140-2 support.
5 //! [OpenSSL's documentation]: https://www.openssl.org/docs/fips/UserGuide-2.0.pdf
10 /// Moves the library into or out of the FIPS 140-2 mode of operation.
12 pub fn enable(enabled: bool) -> Result<(), ErrorStack> { in enable() function
17 /// Determines if the library is running in the FIPS 140-2 mode of operation.
19 pub fn enabled() -> bool { in enabled()
/third_party/node/doc/api/
Dcli.md1 # Command-line options
3 <!--introduced_in=v5.9.1-->
4 <!--type=misc-->
6 Node.js comes with a variety of CLI options. These options expose built-in
13 `node [options] [V8 options] [script.js | -e "script" | -] [--] [arguments]`
15 `node inspect [script.js | -e "script" | <host>:<port>] …`
17 `node --v8-options`
24 <!-- YAML
26 - version: v10.12.0
27 pr-url: https://github.com/nodejs/node/pull/23020
[all …]
Dcli.json7 "textRaw": "Command-line options",
8 "name": "Command-line options",
11 …"desc": "<p>Node.js comes with a variety of CLI options. These options expose built-in\ndebugging,…
16-e \"script\" | -] [--] [arguments]</code></p>\n<p><code>node inspect [script.js | -e \"script\" |…
27 "pr-url": "https://github.com/nodejs/node/pull/23020",
32-</code>) or underscores (<code>_</code>). For example, <code>--pending-deprecation</code> is\nequ…
35 "textRaw": "`-`",
36 "name": "`-`",
43 …"desc": "<p>Alias for stdin. Analogous to the use of <code>-</code> in other command-line utilitie…
45 "displayName": "`-`"
[all …]
/third_party/openssl/doc/man7/
DEVP_MAC-KMAC.pod5 EVP_MAC-KMAC, EVP_MAC-KMAC128, EVP_MAC-KMAC256
6 - The KMAC EVP_MAC implementations
19 =item "KMAC-128", "provider=default" or "provider=fips"
21 =item "KMAC-256", "provider=default" or "provider=fips"
34 Likewise, the "block-size" parameter can be retrieved with
53 By default, it is 16 for C<KMAC-128> and 32 for C<KMAC-256>.
55 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
58 By default, it is 168 for C<KMAC-128> and 136 for C<KMAC-256>.
62 The "xof" parameter value is expected to be 1 or 0. Use 1 to enable XOF mode.
88 mac = EVP_MAC_fetch(NULL, "KMAC-128", NULL);
[all …]
Dmigration_guide.pod5 migration_guide - OpenSSL migration guide
32 OpenSSL 3.0 such as the availability of the FIPS module.
37 licenses|https://www.openssl.org/source/license-openssl-ssleay.txt>
39 L<Apache License v2|https://www.openssl.org/source/apache-license-2.0.txt>.
41 =head3 Providers and FIPS support
53 One of the standard providers available is the FIPS provider. This makes
54 available FIPS validated cryptographic algorithms.
55 The FIPS provider is disabled by default and needs to be enabled explicitly
56 at configuration time using the C<enable-fips> option. If it is enabled,
57 the FIPS provider gets built and installed in addition to the other standard
[all …]
/third_party/openssl/Configurations/
Dunix-Makefile.tmpl4 ## {- join("\n## ", @autowarntext) -}
5 {-
9 our $makedepcmd = platform->makedepcmd();
17 our $sover_dirname = platform->shlib_version_as_filename();
29 $COLUMNS = int($COLUMNS) - 2; # 2 to leave space for ending ' \'
61 -}
62 PLATFORM={- $config{target} -}
63 OPTIONS={- $config{options} -}
64 CONFIGURE_ARGS=({- join(", ",quotify_l(@{$config{perlargv}})) -})
65 SRCDIR={- $config{sourcedir} -}
[all …]
/third_party/node/
Dconfigure.py61 valid_arm_fpu = ('vfp', 'vfpv3', 'vfpv3-d16', 'neon')
65 valid_intl_modes = ('none', 'small-icu', 'full-icu', 'system-icu')
72 "built-in dependencies or its shared representations. If necessary, "
75 "Flags that lets you enable i18n features in Node.js as well as which "
80 # Options should be in alphabetical order but keep --prefix at the top,
82 parser.add_option('--prefix',
88 parser.add_option('--coverage',
93 parser.add_option('--debug',
98 parser.add_option('--debug-node',
103 parser.add_option('--dest-cpu',
[all …]

1234