Home
last modified time | relevance | path

Searched +full:no +full:- +full:fips (Results 1 – 25 of 436) sorted by relevance

12345678910>>...18

/third_party/node/deps/openssl/
Dopenssl-fips_no_asm.gypi5 'includes': ['config/archs/aix64-gcc-as/no-asm/openssl-fips.gypi'],
7 'includes': ['config/archs/linux-ppc64le/no-asm/openssl-fips.gypi'],
9 'includes': ['config/archs/linux64-s390x/no-asm/openssl-fips.gypi'],
11 'includes': ['config/archs/linux-armv4/no-asm/openssl-fips.gypi'],
13 'includes': ['config/archs/linux-aarch64/no-asm/openssl-fips.gypi'],
15 'includes': ['config/archs/BSD-x86/no-asm/openssl-fips.gypi'],
17 'includes': ['config/archs/linux-elf/no-asm/openssl-fips.gypi'],
19 'includes': ['config/archs/darwin-i386-cc/no-asm/openssl-fips.gypi'],
21 'includes': ['config/archs/solaris-x86-gcc/no-asm/openssl-fips.gypi'],
23 'includes': ['config/archs/VC-WIN32/no-asm/openssl-fips.gypi'],
[all …]
/third_party/openssl/test/recipes/
D30-test_evp_fetch_prov.t2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
31 { args => [ '-property', 'provider=default' ],
33 { args => [ '-property', 'provider!=fips' ],
34 message => 'using property "provider!=fips"' },
35 { args => [ '-property', 'provider!=default', '-fetchfail' ],
38 { args => [ '-property', 'provider=fips', '-fetchfail' ],
40 'using property "provider=fips" is expected to fail' } ] }
45 { config => srctop_file("test", "fips.cnf"),
46 providers => [ 'fips' ],
[all …]
D03-test_fipsinstall.t2 # Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
25 plan skip_all => "Test only supported in a fips build" if disabled("fips");
29 my $infile = bldtop_file('providers', platform->dso('fips'));
31 my $provconf = srctop_file("test", "fips-and-base.cnf");
52 # Read in the text input file 'fips.cnf'
67 return replace_line_file_internal('fips.cnf', $srch, $rep, $outfile);
70 # Read in the text input file 'test/fips.cnf'
79 return replace_line_file_internal(srctop_file("test", 'fips.cnf'),
83 # fail if no module name
84 ok(!run(app(['openssl', 'fipsinstall', '-out', 'fips.cnf', '-module',
[all …]
D20-test_cli_fips.t2 # Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved.
26 my $no_check = disabled("fips") || disabled('fips-securitychecks');
27 plan skip_all => "Test only supported in a fips build with security checks"
31 my $fipsmodule = bldtop_file('providers', platform->dso('fips'));
32 my $fipsconf = srctop_file("test", "fips-and-base.cnf");
39 ok(run(app(['openssl', 'list', '-public-key-methods', '-verbose'])),
41 ok(run(app(['openssl', 'list', '-public-key-algorithms', '-verbose'])),
43 ok(run(app(['openssl', 'list', '-key-managers', '-verbose'])),
45 ok(run(app(['openssl', 'list', '-key-exchange-algorithms', '-verbose'])),
47 ok(run(app(['openssl', 'list', '-kem-algorithms', '-verbose'])),
[all …]
D30-test_evp_libctx.t2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
20 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
25 # If no fips then run the test with no extra arguments.
31 @test_args = ("-config", srctop_file("test","fips-and-base.cnf"),
32 "-provider", "fips");
34 ok(run(test(["evp_libctx_test", @test_args])), "running fips evp_libctx_test");
38 "-config", srctop_file("test","default.cnf"),])),
43 "-config", srctop_file("test","default-and-legacy.cnf"),])),
44 "running default-and-legacy evp_libctx_test");
D65-test_cmp_client.t2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
3 # Copyright Nokia 2007-2019
4 # Copyright Siemens AG 2015-2019
22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
24 plan skip_all => "This test is not supported in a no-cmp or no-ec build"
27 plan tests => 2 + ($no_fips ? 0 : 1); # fips test
41 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
D65-test_cmp_server.t2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
3 # Copyright Nokia 2007-2020
4 # Copyright Siemens AG 2015-2020
22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
24 plan skip_all => "This test is not supported in a no-cmp build"
27 plan skip_all => "This test is not supported in a no-ec build"
30 plan tests => 2 + ($no_fips ? 0 : 1); #fips test
39 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
D65-test_cmp_vfy.t2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
3 # Copyright Nokia 2007-2019
4 # Copyright Siemens AG 2015-2019
22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
24 plan skip_all => "This test is not supported in a no-cmp build"
27 plan skip_all => "This test is not supported in a no-ec build"
30 plan tests => 2 + ($no_fips ? 0 : 1); #fips test
50 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
D65-test_cmp_msg.t2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
3 # Copyright Nokia 2007-2019
4 # Copyright Siemens AG 2015-2019
22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
24 plan skip_all => "This test is not supported in a no-cmp build"
27 plan tests => 2 + ($no_fips ? 0 : 1); #fips test
40 "fips", srctop_file("test", "fips-and-base.cnf")])));
/third_party/openssl/doc/man7/
Dfips_module.pod5 fips_module - OpenSSL fips module guide
14 with the FIPS module. Which is the correct approach to use will depend on your
17 Note that the old functions FIPS_mode() and FIPS_mode_set() are no longer
20 Applications written to use the OpenSSL 3.0 FIPS module should not use any
21 legacy APIs or features that avoid the FIPS module. Specifically this includes:
41 All of the above APIs are deprecated in OpenSSL 3.0 - so a simple rule is to
45 =head2 Making all applications use the FIPS module by default
48 use the FIPS module for cryptographic algorithms by default.
53 FIPS module without the need for any further code changes.
60 $ openssl version -d
[all …]
Dcrypto.pod5 crypto - OpenSSL cryptographic library
21 pseudo-random number generators, message authentication codes (MACs), key
29 a "default" implementation suitable for general use, and a "fips" implementation
30 which has been validated to FIPS standards for situations where that is
52 OpenSSL built-in "default" provider will be automatically loaded.
72 1.1.0) no explicit initialisation steps need to be taken.
75 automatically destroyed. No explicit de-initialisation steps need to be taken.
80 =head2 Multi-threaded applications
83 on most platforms) then most OpenSSL I<functions> are thread-safe in the sense
85 time. However most OpenSSL I<data structures> are not thread-safe. For example
[all …]
Dproperty.pod5 property - Properties, a selection mechanism for algorithm implementations
23 A I<reserved> property name consists of a single C-style identifier
27 Property names are case-insensitive, but OpenSSL will only use lowercase
31 two or more C-style identifiers, separated by periods.
46 For example: "" defines an empty property definition (i.e., no restriction);
58 Likewise, OpenSSL's FIPS provider defines I<provider=fips> and the legacy
64 For example, "fips=yes", "provider!=default" or "?iteration.count=3".
93 B<-> is a prefix operator that means any global query clause involving the
134 property query by preceding the property name with a '-'.
135 For example, a context property query that contains "fips=yes" would normally
[all …]
/third_party/openssl/test/
Dproperty_test.c2 * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
63 && TEST_int_ne(i = ossl_property_value(NULL, "no", 0), 0) in test_property_string()
67 && TEST_int_eq(ossl_property_value(NULL, "no", 1), i) in test_property_string()
85 { "", "sky=blue", -1 },
90 { "cold=yes", "cold!=no", 1 },
92 { "groan", "groan=no", -1 },
93 { "groan", "groan!=yes", -1 },
94 { "cold=no", "cold", -1 },
95 { "cold=no", "?cold", 0 },
96 { "cold=no", "cold=no", 1 },
[all …]
Dendecode_test.c2 * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved.
79 * Use 512-bit DH(X) keys with predetermined parameters for efficiency, in make_template()
90 * No real need to check the errors other than for the cascade in make_template()
115 * No real need to check the errors other than for the cascade in make_key()
253 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov()
254 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_prov()
258 mem_buf->data = NULL; in encode_EVP_PKEY_prov()
259 mem_buf->length = 0; in encode_EVP_PKEY_prov()
368 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM()
369 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_legacy_PEM()
[all …]
/third_party/openssl/doc/man1/
Dopenssl-fipsinstall.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-fipsinstall - perform FIPS configuration installation
11 [B<-help>]
12 [B<-in> I<configfilename>]
13 [B<-out> I<configfilename>]
14 [B<-module> I<modulefilename>]
15 [B<-provider_name> I<providername>]
16 [B<-section_name> I<sectionname>]
17 [B<-verify>]
18 [B<-mac_name> I<macname>]
[all …]
/third_party/node/deps/openssl/openssl/
DREADME-PROVIDERS.md4 - [Standard Providers](#standard-providers)
5 - [The Default Provider](#the-default-provider)
6 - [The Legacy Provider](#the-legacy-provider)
7 - [The FIPS Provider](#the-fips-provider)
8 - [The Base Provider](#the-base-provider)
9 - [The Null Provider](#the-null-provider)
10 - [Loading Providers](#loading-providers)
26 --------------------
28 The default provider collects together all of the standard built-in OpenSSL
32 get an algorithm from a provider if no other provider has been loaded yet.
[all …]
DNOTES-NONSTOP.md5 -------------------
11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script.
13 be used if FIPS is selected.
15 specify the `--with-rand-seed=egd` option to the `./Configure` script.
18 ------------------
27 ----------------
31 the TNS/X (L-Series) platform:
33 * `nonstop-nsx` or default will select an unthreaded build.
34 * `nonstop-nsx_put` selects the PUT build.
35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build.
[all …]
/third_party/openssl/
DREADME-PROVIDERS.md4 - [Standard Providers](#standard-providers)
5 - [The Default Provider](#the-default-provider)
6 - [The Legacy Provider](#the-legacy-provider)
7 - [The FIPS Provider](#the-fips-provider)
8 - [The Base Provider](#the-base-provider)
9 - [The Null Provider](#the-null-provider)
10 - [Loading Providers](#loading-providers)
26 --------------------
28 The default provider collects together all of the standard built-in OpenSSL
32 get an algorithm from a provider if no other provider has been loaded yet.
[all …]
DNOTES-NONSTOP.md5 -------------------
11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script.
13 be used if FIPS is selected.
15 specify the `--with-rand-seed=egd` option to the `./Configure` script.
18 ------------------
27 ----------------
31 the TNS/X (L-Series) platform:
33 * `nonstop-nsx` or default will select an unthreaded build.
34 * `nonstop-nsx_put` selects the PUT build.
35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build.
[all …]
/third_party/node/test/parallel/
Dtest-crypto-fips.js1 // Flags: --expose-internals
17 'Error [ERR_CRYPTO_FIPS_FORCED]: Cannot set FIPS mode, it was forced with ' +
18 '--force-fips at startup.';
19 const FIPS_UNSUPPORTED_ERROR_STRING = 'fips mode not supported';
20 const FIPS_ENABLE_ERROR_STRING = 'OpenSSL error when trying to enable FIPS:';
32 const fullArgs = args.concat(['-e', `console.log(${cmd})`]);
55 // Normal path where we expect either FIPS enabled or disabled.
64 // --enable-fips should raise an error if OpenSSL is not FIPS enabled.
67 ['--enable-fips'],
72 // --force-fips should raise an error if OpenSSL is not FIPS enabled.
[all …]
/third_party/openssl/doc/man5/
Dfips_config.pod5 fips_config - OpenSSL FIPS configuration
10 is used to hold information about the FIPS module. This includes a digest
11 of the shared library file, and status about the self-testing.
17 =item - Run the startup FIPS self-test known answer tests (KATS).
22 =item - Verify the module's checksum.
28 This file is generated by the L<openssl-fipsinstall(1)> program, and
29 used internally by the FIPS module during its initialization.
32 whose name is identified by the B<fips> option in the B<providers>
42 =item B<install-version>
44 A version number for the fips install process. Should be 1.
[all …]
/third_party/node/deps/openssl/openssl/providers/
Dbuild.info5 # go in the FIPS provider. The compilations for this
15 # To be noted is that the FIPS provider shares source code with libcrypto,
21 # -o {modulename}.so {object files...} lib{modulename}.a libcommon.a
58 # used is determined by non-weak dependencies.
92 # FIPS provider stuff
97 # diverse build.info files. libfips.a, fips.so and their sources aren't
100 IF[{- !$disabled{fips} -}]
101 SUBDIRS=fips
102 $FIPSGOAL=fips
104 # This is the trigger to actually build the FIPS module. Without these
[all …]
/third_party/openssl/providers/
Dbuild.info5 # go in the FIPS provider. The compilations for this
15 # To be noted is that the FIPS provider shares source code with libcrypto,
21 # -o {modulename}.so {object files...} lib{modulename}.a libcommon.a
58 # used is determined by non-weak dependencies.
92 # FIPS provider stuff
97 # diverse build.info files. libfips.a, fips.so and their sources aren't
100 IF[{- !$disabled{fips} -}]
101 SUBDIRS=fips
102 $FIPSGOAL=fips
104 # This is the trigger to actually build the FIPS module. Without these
[all …]
/third_party/node/doc/
Dnode.18 .\" https://atom.io/packages/language-roff
11 .\" mandoc -Wall -Tlint /path/to/this.file # BSD
12 .\" groff -w all -z /path/to/this.file # GNU/Linux, macOS
18 .\" the Roff formatter better control over text-spacing, line-wrapping,
29 .tr -\-^\(ha~\(ti`\(ga
35 .Nd server-side JavaScript runtime
41 .Op Ar v8-options
43 .Op Fl -
52 .Op Fl -v8-options
57 It is primarily focused on creating simple, easy-to-build network clients and servers.
[all …]
/third_party/openssl/test/ssl-tests/
Dprotocol_version.pm1 # -*- mode: perl; -*-
2 # Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
25 # undef stands for "no limit".
85 # undef stands for "no limit".
105 my ($dtls, $fips) = @_;
106 if ($dtls && $fips) {
115 my $fips = shift;
126 if ($fips) {
140 if (no_tests($dtls, $fips)) {
148 my $c_max_min = $c_min == 0 ? 0 : $c_min - 1;
[all …]

12345678910>>...18