| /third_party/node/test/parallel/ |
| D | test-crypto-fips.js | 1 // Flags: --expose-internals 17 'Error [ERR_CRYPTO_FIPS_FORCED]: Cannot set FIPS mode, it was forced with ' + 18 '--force-fips at startup.'; 19 const FIPS_UNSUPPORTED_ERROR_STRING = 'fips mode not supported'; 31 const fullArgs = args.concat(['-e', `console.log(${cmd})`]); 52 // Normal path where we expect either FIPS enabled or disabled. 61 // By default FIPS should be off in both FIPS and non-FIPS builds. 69 // --enable-fips should turn FIPS mode on 72 ['--enable-fips'], 77 // --force-fips should turn FIPS mode on [all …]
|
| D | test-cli-node-print-help.js | 1 // Flags: --expose-internals 15 exec(`${process.execPath} --help`, common.mustSucceed((stdout, stderr) => { 28 flags: [ '--openssl-config=...', '--tls-cipher-list=...', 29 '--use-bundled-ca', '--use-openssl-ca', 30 '--enable-fips', '--force-fips' ] }, 32 flags: [ '--icu-data-dir=...', 'NODE_ICU_DATA' ] }, 34 flags: [ '--inspect-brk[=[host:]port]', '--inspect-port=[host:]port', 35 '--inspect[=[host:]port]' ] }, 44 assert.strictEqual(stdOut.indexOf(flag) !== -1, true, 49 assert.strictEqual(stdOut.indexOf(flag), -1,
|
| D | test-process-env-allowed-flags-are-documented.js | 22 '<!-- node-options-node start -->', 23 '<!-- node-options-node end -->'); 25 '<!-- node-options-v8 start -->', 26 '<!-- node-options-v8 end -->'); 33 for (const match of line.matchAll(/`(-[^`]+)`/g)) { 35 const option = match[1].replace('--no-', '--'); 49 '--openssl-config', 50 '--openssl-shared-config', 51 '--tls-cipher-list', 52 '--use-bundled-ca', [all …]
|
| /third_party/openssl/.github/workflows/ |
| D | ci.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 14 # BUILDOPTS: "-j4" 15 # HARNESS_JOBS: "${HARNESS_JOBS:-4}" 19 # - make="make -s" 26 runs-on: ubuntu-latest 28 - name: install unifdef 30 sudo apt-get update 31 sudo apt-get -yq --no-install-suggests --no-install-recommends --force-yes install unifdef 32 - uses: actions/checkout@v2 34 fetch-depth: 0 [all …]
|
| D | fips-old.yml | 15 fips-provider-validation: 20 dir: openssl-3.0.0, 21 tgz: openssl-3.0.0.tar.gz, 22 url: "https://www.openssl.org/source/old/3.0/openssl-3.0.0.tar.gz" 25 runs-on: ubuntu-latest 27 - name: create directory 29 - uses: actions/checkout@v2 32 - name: download module source 33 run: wget --no-verbose ${{ matrix.module.url }} 34 - name: unpack module source [all …]
|
| D | fips-checksums.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 8 name: FIPS Checksums 15 compute-checksums: 16 runs-on: ubuntu-latest 18 - name: install unifdef 20 sudo apt-get update 21 … sudo apt-get -yq --no-install-suggests --no-install-recommends --force-yes install unifdef 22 - name: create build dirs 24 mkdir ./build-pristine 25 mkdir ./source-pristine [all …]
|
| D | run-checker-daily.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 8 name: Run-checker daily 13 - cron: '0 6 * * *' 18 run-checker: 20 fail-fast: false 24 no-afalgeng, 25 no-aria, 26 no-asan, 27 no-asm, 28 no-async, [all …]
|
| D | cross-compiles.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 16 cross-compilation: 18 fail-fast: false 21 # arch: the architecture to build for, this defines the tool-chain 22 # prefix {arch}- and the Debian compiler package gcc-{arch} 27 # fips: set to "no" to disable building FIPS, leave unset to 28 # build the FIPS provider. 35 arch: aarch64-linux-gnu, 36 libs: libc6-dev-arm64-cross, 37 target: linux-aarch64 [all …]
|
| D | windows.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 21 - windows-2019 22 - windows-2022 24 - arch: win64 25 config: enable-fips 26 - arch: win32 27 config: --strict-warnings no-fips 28 runs-on: ${{matrix.os}} 30 - uses: actions/checkout@v2 31 - uses: ilammy/msvc-dev-cmd@v1 [all …]
|
| D | coveralls.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 13 - cron: '49 0 * * *' 21 checks: write # for coverallsapp/github-action to create new checks 23 runs-on: ubuntu-latest 25 - uses: actions/checkout@v2 26 - name: package installs 28 sudo apt-get -yq install lcov 29 - name: config 30 …--banner=Configured --debug --coverage no-asm enable-fips enable-rc5 enable-md2 enable-ssl3 enable… 31 - name: config dump [all …]
|
| D | run-checker-ci.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 9 name: Run-checker CI 15 run-checker: 17 fail-fast: false 20 no-cmp, 21 no-cms, 22 no-ct, 23 no-dtls, 24 no-ec, 25 no-ec2m, [all …]
|
| D | fuzz-checker.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 8 name: Fuzz-checker CI 16 fuzz-checker: 18 fail-fast: false 23 config: enable-fuzz-afl no-module, 24 install: afl++-clang, 25 cc: afl-clang-fast 28 config: enable-fuzz-libfuzzer enable-asan enable-ubsan, 29 …libs: --with-fuzzer-lib=/usr/lib/llvm-12/lib/libFuzzer.a --with-fuzzer-include=/usr/lib/llvm-12/bu… 30 install: libfuzzer-12-dev, [all …]
|
| /third_party/openssl/ |
| D | README-FIPS.md | 1 OpenSSL FIPS support 5 FIPS 140-2 validated. The module is implemented as an OpenSSL provider. 7 cryptographic algorithms, see the [README-PROVIDERS](README-PROVIDERS.md) file 10 The OpenSSL FIPS provider comes as shared library called `fips.so` (on Unix) 11 resp. `fips.dll` (on Windows). The FIPS provider does not get built and 12 installed automatically. To enable it, you need to configure OpenSSL using 13 the `enable-fips` option. 15 Installing the FIPS module 18 If the FIPS provider is enabled, it gets installed automatically during the 31 $ make install_fips # for `enable-fips` only [all …]
|
| D | INSTALL.md | 11 - [Prerequisites](#prerequisites) 12 - [Notational Conventions](#notational-conventions) 13 - [Quick Installation Guide](#quick-installation-guide) 14 - [Building OpenSSL](#building-openssl) 15 - [Installing OpenSSL](#installing-openssl) 16 - [Configuration Options](#configuration-options) 17 - [API Level](#api-level) 18 - [Cross Compile Prefix](#cross-compile-prefix) 19 - [Build Type](#build-type) 20 - [Directories](#directories) [all …]
|
| D | NOTES-NONSTOP.md | 5 ------------------- 11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script. 13 be used if FIPS is selected. 15 specify the `--with-rand-seed=egd` option to the `./Configure` script. 18 ------------------ 27 ---------------- 31 the TNS/X (L-Series) platform: 33 * `nonstop-nsx` or default will select an unthreaded build. 34 * `nonstop-nsx_put` selects the PUT build. 35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build. [all …]
|
| D | appveyor.yml | 2 - Visual Studio 2017 5 - x64 6 - x86 11 - VSVER: 15 14 - shared 15 - minimal 18 - 21 - master 23 - shared 24 - plain [all …]
|
| /third_party/node/doc/ |
| D | node.1 | 8 .\" https://atom.io/packages/language-roff 11 .\" mandoc -Wall -Tlint /path/to/this.file # BSD 12 .\" groff -w all -z /path/to/this.file # GNU/Linux, macOS 18 .\" the Roff formatter better control over text-spacing, line-wrapping, 34 .Nd server-side JavaScript runtime 40 .Op Ar v8-options 42 .Op Fl - 51 .Op Fl -v8-options 56 It is primarily focused on creating simple, easy-to-build network clients and servers. 63 .Bl -tag -width 6n [all …]
|
| /third_party/openssl/doc/man3/ |
| D | EVP_set_default_properties.pod | 7 - Set default properties for future algorithm fetches 14 int EVP_default_properties_enable_fips(OSSL_LIB_CTX *libctx, int enable); 31 EVP_default_properties_enable_fips() sets the 'fips=yes' to be a default property 32 if I<enable> is non zero, otherwise it clears 'fips' from the default property 33 query for the given I<libctx>. It merges the fips default property query with any 36 EVP_default_properties_is_fips_enabled() indicates if 'fips=yes' is a default 51 EVP_default_properties_is_fips_enabled() returns 1 if the 'fips=yes' default 64 Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
|
| /third_party/rust/crates/rust-openssl/openssl/src/ |
| D | fips.rs | 1 //! FIPS 140-2 support. 5 //! [OpenSSL's documentation]: https://www.openssl.org/docs/fips/UserGuide-2.0.pdf 10 /// Moves the library into or out of the FIPS 140-2 mode of operation. 12 pub fn enable(enabled: bool) -> Result<(), ErrorStack> { in enable() function 17 /// Determines if the library is running in the FIPS 140-2 mode of operation. 19 pub fn enabled() -> bool { in enabled()
|
| /third_party/node/doc/api/ |
| D | cli.md | 1 # Command-line options 3 <!--introduced_in=v5.9.1--> 4 <!--type=misc--> 6 Node.js comes with a variety of CLI options. These options expose built-in 13 `node [options] [V8 options] [script.js | -e "script" | -] [--] [arguments]` 15 `node inspect [script.js | -e "script" | <host>:<port>] …` 17 `node --v8-options` 24 <!-- YAML 26 - version: v10.12.0 27 pr-url: https://github.com/nodejs/node/pull/23020 [all …]
|
| D | cli.json | 7 "textRaw": "Command-line options", 8 "name": "Command-line options", 11 …"desc": "<p>Node.js comes with a variety of CLI options. These options expose built-in\ndebugging,… 16 …-e \"script\" | -] [--] [arguments]</code></p>\n<p><code>node inspect [script.js | -e \"script\" |… 27 "pr-url": "https://github.com/nodejs/node/pull/23020", 32 …-</code>) or underscores (<code>_</code>). For example, <code>--pending-deprecation</code> is\nequ… 35 "textRaw": "`-`", 36 "name": "`-`", 43 …"desc": "<p>Alias for stdin. Analogous to the use of <code>-</code> in other command-line utilitie… 45 "displayName": "`-`" [all …]
|
| /third_party/openssl/doc/man7/ |
| D | EVP_MAC-KMAC.pod | 5 EVP_MAC-KMAC, EVP_MAC-KMAC128, EVP_MAC-KMAC256 6 - The KMAC EVP_MAC implementations 19 =item "KMAC-128", "provider=default" or "provider=fips" 21 =item "KMAC-256", "provider=default" or "provider=fips" 34 Likewise, the "block-size" parameter can be retrieved with 53 By default, it is 16 for C<KMAC-128> and 32 for C<KMAC-256>. 55 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 58 By default, it is 168 for C<KMAC-128> and 136 for C<KMAC-256>. 62 The "xof" parameter value is expected to be 1 or 0. Use 1 to enable XOF mode. 88 mac = EVP_MAC_fetch(NULL, "KMAC-128", NULL); [all …]
|
| D | migration_guide.pod | 5 migration_guide - OpenSSL migration guide 32 OpenSSL 3.0 such as the availability of the FIPS module. 37 licenses|https://www.openssl.org/source/license-openssl-ssleay.txt> 39 L<Apache License v2|https://www.openssl.org/source/apache-license-2.0.txt>. 41 =head3 Providers and FIPS support 53 One of the standard providers available is the FIPS provider. This makes 54 available FIPS validated cryptographic algorithms. 55 The FIPS provider is disabled by default and needs to be enabled explicitly 56 at configuration time using the C<enable-fips> option. If it is enabled, 57 the FIPS provider gets built and installed in addition to the other standard [all …]
|
| /third_party/openssl/Configurations/ |
| D | unix-Makefile.tmpl | 4 ## {- join("\n## ", @autowarntext) -} 5 {- 9 our $makedepcmd = platform->makedepcmd(); 17 our $sover_dirname = platform->shlib_version_as_filename(); 29 $COLUMNS = int($COLUMNS) - 2; # 2 to leave space for ending ' \' 61 -} 62 PLATFORM={- $config{target} -} 63 OPTIONS={- $config{options} -} 64 CONFIGURE_ARGS=({- join(", ",quotify_l(@{$config{perlargv}})) -}) 65 SRCDIR={- $config{sourcedir} -} [all …]
|
| /third_party/node/ |
| D | configure.py | 61 valid_arm_fpu = ('vfp', 'vfpv3', 'vfpv3-d16', 'neon') 65 valid_intl_modes = ('none', 'small-icu', 'full-icu', 'system-icu') 72 "built-in dependencies or its shared representations. If necessary, " 75 "Flags that lets you enable i18n features in Node.js as well as which " 80 # Options should be in alphabetical order but keep --prefix at the top, 82 parser.add_option('--prefix', 88 parser.add_option('--coverage', 93 parser.add_option('--debug', 98 parser.add_option('--debug-node', 103 parser.add_option('--dest-cpu', [all …]
|