| /third_party/node/deps/openssl/ |
| D | openssl-fips_no_asm.gypi | 5 'includes': ['config/archs/aix64-gcc-as/no-asm/openssl-fips.gypi'], 7 'includes': ['config/archs/linux-ppc64le/no-asm/openssl-fips.gypi'], 9 'includes': ['config/archs/linux64-s390x/no-asm/openssl-fips.gypi'], 11 'includes': ['config/archs/linux-armv4/no-asm/openssl-fips.gypi'], 13 'includes': ['config/archs/linux-aarch64/no-asm/openssl-fips.gypi'], 15 'includes': ['config/archs/BSD-x86/no-asm/openssl-fips.gypi'], 17 'includes': ['config/archs/linux-elf/no-asm/openssl-fips.gypi'], 19 'includes': ['config/archs/darwin-i386-cc/no-asm/openssl-fips.gypi'], 21 'includes': ['config/archs/solaris-x86-gcc/no-asm/openssl-fips.gypi'], 23 'includes': ['config/archs/VC-WIN32/no-asm/openssl-fips.gypi'], [all …]
|
| /third_party/openssl/test/recipes/ |
| D | 30-test_evp_fetch_prov.t | 2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved. 22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 31 { args => [ '-property', 'provider=default' ], 33 { args => [ '-property', 'provider!=fips' ], 34 message => 'using property "provider!=fips"' }, 35 { args => [ '-property', 'provider!=default', '-fetchfail' ], 38 { args => [ '-property', 'provider=fips', '-fetchfail' ], 40 'using property "provider=fips" is expected to fail' } ] } 45 { config => srctop_file("test", "fips.cnf"), 46 providers => [ 'fips' ], [all …]
|
| D | 03-test_fipsinstall.t | 2 # Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. 25 plan skip_all => "Test only supported in a fips build" if disabled("fips"); 29 my $infile = bldtop_file('providers', platform->dso('fips')); 31 my $provconf = srctop_file("test", "fips-and-base.cnf"); 52 # Read in the text input file 'fips.cnf' 67 return replace_line_file_internal('fips.cnf', $srch, $rep, $outfile); 70 # Read in the text input file 'test/fips.cnf' 79 return replace_line_file_internal(srctop_file("test", 'fips.cnf'), 83 # fail if no module name 84 ok(!run(app(['openssl', 'fipsinstall', '-out', 'fips.cnf', '-module', [all …]
|
| D | 20-test_cli_fips.t | 2 # Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. 26 my $no_check = disabled("fips") || disabled('fips-securitychecks'); 27 plan skip_all => "Test only supported in a fips build with security checks" 31 my $fipsmodule = bldtop_file('providers', platform->dso('fips')); 32 my $fipsconf = srctop_file("test", "fips-and-base.cnf"); 39 ok(run(app(['openssl', 'list', '-public-key-methods', '-verbose'])), 41 ok(run(app(['openssl', 'list', '-public-key-algorithms', '-verbose'])), 43 ok(run(app(['openssl', 'list', '-key-managers', '-verbose'])), 45 ok(run(app(['openssl', 'list', '-key-exchange-algorithms', '-verbose'])), 47 ok(run(app(['openssl', 'list', '-kem-algorithms', '-verbose'])), [all …]
|
| D | 30-test_evp_libctx.t | 2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 20 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 25 # If no fips then run the test with no extra arguments. 31 @test_args = ("-config", srctop_file("test","fips-and-base.cnf"), 32 "-provider", "fips"); 34 ok(run(test(["evp_libctx_test", @test_args])), "running fips evp_libctx_test"); 38 "-config", srctop_file("test","default.cnf"),])), 43 "-config", srctop_file("test","default-and-legacy.cnf"),])), 44 "running default-and-legacy evp_libctx_test");
|
| D | 65-test_cmp_client.t | 2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. 3 # Copyright Nokia 2007-2019 4 # Copyright Siemens AG 2015-2019 22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 24 plan skip_all => "This test is not supported in a no-cmp or no-ec build" 27 plan tests => 2 + ($no_fips ? 0 : 1); # fips test 41 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
|
| D | 65-test_cmp_server.t | 2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. 3 # Copyright Nokia 2007-2020 4 # Copyright Siemens AG 2015-2020 22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 24 plan skip_all => "This test is not supported in a no-cmp build" 27 plan skip_all => "This test is not supported in a no-ec build" 30 plan tests => 2 + ($no_fips ? 0 : 1); #fips test 39 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
|
| D | 65-test_cmp_vfy.t | 2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. 3 # Copyright Nokia 2007-2019 4 # Copyright Siemens AG 2015-2019 22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 24 plan skip_all => "This test is not supported in a no-cmp build" 27 plan skip_all => "This test is not supported in a no-ec build" 30 plan tests => 2 + ($no_fips ? 0 : 1); #fips test 50 ok(run(test([@basic_cmd, "fips", srctop_file("test", "fips-and-base.cnf")])));
|
| D | 65-test_cmp_msg.t | 2 # Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. 3 # Copyright Nokia 2007-2019 4 # Copyright Siemens AG 2015-2019 22 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0); 24 plan skip_all => "This test is not supported in a no-cmp build" 27 plan tests => 2 + ($no_fips ? 0 : 1); #fips test 40 "fips", srctop_file("test", "fips-and-base.cnf")])));
|
| /third_party/openssl/doc/man7/ |
| D | fips_module.pod | 5 fips_module - OpenSSL fips module guide 14 with the FIPS module. Which is the correct approach to use will depend on your 17 Note that the old functions FIPS_mode() and FIPS_mode_set() are no longer 20 Applications written to use the OpenSSL 3.0 FIPS module should not use any 21 legacy APIs or features that avoid the FIPS module. Specifically this includes: 41 All of the above APIs are deprecated in OpenSSL 3.0 - so a simple rule is to 45 =head2 Making all applications use the FIPS module by default 48 use the FIPS module for cryptographic algorithms by default. 53 FIPS module without the need for any further code changes. 60 $ openssl version -d [all …]
|
| D | crypto.pod | 5 crypto - OpenSSL cryptographic library 21 pseudo-random number generators, message authentication codes (MACs), key 29 a "default" implementation suitable for general use, and a "fips" implementation 30 which has been validated to FIPS standards for situations where that is 52 OpenSSL built-in "default" provider will be automatically loaded. 72 1.1.0) no explicit initialisation steps need to be taken. 75 automatically destroyed. No explicit de-initialisation steps need to be taken. 80 =head2 Multi-threaded applications 83 on most platforms) then most OpenSSL I<functions> are thread-safe in the sense 85 time. However most OpenSSL I<data structures> are not thread-safe. For example [all …]
|
| D | property.pod | 5 property - Properties, a selection mechanism for algorithm implementations 23 A I<reserved> property name consists of a single C-style identifier 27 Property names are case-insensitive, but OpenSSL will only use lowercase 31 two or more C-style identifiers, separated by periods. 46 For example: "" defines an empty property definition (i.e., no restriction); 58 Likewise, OpenSSL's FIPS provider defines I<provider=fips> and the legacy 64 For example, "fips=yes", "provider!=default" or "?iteration.count=3". 93 B<-> is a prefix operator that means any global query clause involving the 134 property query by preceding the property name with a '-'. 135 For example, a context property query that contains "fips=yes" would normally [all …]
|
| /third_party/openssl/test/ |
| D | property_test.c | 2 * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. 63 && TEST_int_ne(i = ossl_property_value(NULL, "no", 0), 0) in test_property_string() 67 && TEST_int_eq(ossl_property_value(NULL, "no", 1), i) in test_property_string() 85 { "", "sky=blue", -1 }, 90 { "cold=yes", "cold!=no", 1 }, 92 { "groan", "groan=no", -1 }, 93 { "groan", "groan!=yes", -1 }, 94 { "cold=no", "cold", -1 }, 95 { "cold=no", "?cold", 0 }, 96 { "cold=no", "cold=no", 1 }, [all …]
|
| D | endecode_test.c | 2 * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. 79 * Use 512-bit DH(X) keys with predetermined parameters for efficiency, in make_template() 90 * No real need to check the errors other than for the cascade in make_template() 115 * No real need to check the errors other than for the cascade in make_key() 253 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov() 254 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_prov() 258 mem_buf->data = NULL; in encode_EVP_PKEY_prov() 259 mem_buf->length = 0; in encode_EVP_PKEY_prov() 368 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM() 369 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_legacy_PEM() [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-fipsinstall.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-fipsinstall - perform FIPS configuration installation 11 [B<-help>] 12 [B<-in> I<configfilename>] 13 [B<-out> I<configfilename>] 14 [B<-module> I<modulefilename>] 15 [B<-provider_name> I<providername>] 16 [B<-section_name> I<sectionname>] 17 [B<-verify>] 18 [B<-mac_name> I<macname>] [all …]
|
| /third_party/node/deps/openssl/openssl/ |
| D | README-PROVIDERS.md | 4 - [Standard Providers](#standard-providers) 5 - [The Default Provider](#the-default-provider) 6 - [The Legacy Provider](#the-legacy-provider) 7 - [The FIPS Provider](#the-fips-provider) 8 - [The Base Provider](#the-base-provider) 9 - [The Null Provider](#the-null-provider) 10 - [Loading Providers](#loading-providers) 26 -------------------- 28 The default provider collects together all of the standard built-in OpenSSL 32 get an algorithm from a provider if no other provider has been loaded yet. [all …]
|
| D | NOTES-NONSTOP.md | 5 ------------------- 11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script. 13 be used if FIPS is selected. 15 specify the `--with-rand-seed=egd` option to the `./Configure` script. 18 ------------------ 27 ---------------- 31 the TNS/X (L-Series) platform: 33 * `nonstop-nsx` or default will select an unthreaded build. 34 * `nonstop-nsx_put` selects the PUT build. 35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build. [all …]
|
| /third_party/openssl/ |
| D | README-PROVIDERS.md | 4 - [Standard Providers](#standard-providers) 5 - [The Default Provider](#the-default-provider) 6 - [The Legacy Provider](#the-legacy-provider) 7 - [The FIPS Provider](#the-fips-provider) 8 - [The Base Provider](#the-base-provider) 9 - [The Null Provider](#the-null-provider) 10 - [Loading Providers](#loading-providers) 26 -------------------- 28 The default provider collects together all of the standard built-in OpenSSL 32 get an algorithm from a provider if no other provider has been loaded yet. [all …]
|
| D | NOTES-NONSTOP.md | 5 ------------------- 11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script. 13 be used if FIPS is selected. 15 specify the `--with-rand-seed=egd` option to the `./Configure` script. 18 ------------------ 27 ---------------- 31 the TNS/X (L-Series) platform: 33 * `nonstop-nsx` or default will select an unthreaded build. 34 * `nonstop-nsx_put` selects the PUT build. 35 * `nonstop-nsx_64_put` selects the 64 bit file length PUT build. [all …]
|
| /third_party/node/test/parallel/ |
| D | test-crypto-fips.js | 1 // Flags: --expose-internals 17 'Error [ERR_CRYPTO_FIPS_FORCED]: Cannot set FIPS mode, it was forced with ' + 18 '--force-fips at startup.'; 19 const FIPS_UNSUPPORTED_ERROR_STRING = 'fips mode not supported'; 20 const FIPS_ENABLE_ERROR_STRING = 'OpenSSL error when trying to enable FIPS:'; 32 const fullArgs = args.concat(['-e', `console.log(${cmd})`]); 55 // Normal path where we expect either FIPS enabled or disabled. 64 // --enable-fips should raise an error if OpenSSL is not FIPS enabled. 67 ['--enable-fips'], 72 // --force-fips should raise an error if OpenSSL is not FIPS enabled. [all …]
|
| /third_party/openssl/doc/man5/ |
| D | fips_config.pod | 5 fips_config - OpenSSL FIPS configuration 10 is used to hold information about the FIPS module. This includes a digest 11 of the shared library file, and status about the self-testing. 17 =item - Run the startup FIPS self-test known answer tests (KATS). 22 =item - Verify the module's checksum. 28 This file is generated by the L<openssl-fipsinstall(1)> program, and 29 used internally by the FIPS module during its initialization. 32 whose name is identified by the B<fips> option in the B<providers> 42 =item B<install-version> 44 A version number for the fips install process. Should be 1. [all …]
|
| /third_party/node/deps/openssl/openssl/providers/ |
| D | build.info | 5 # go in the FIPS provider. The compilations for this 15 # To be noted is that the FIPS provider shares source code with libcrypto, 21 # -o {modulename}.so {object files...} lib{modulename}.a libcommon.a 58 # used is determined by non-weak dependencies. 92 # FIPS provider stuff 97 # diverse build.info files. libfips.a, fips.so and their sources aren't 100 IF[{- !$disabled{fips} -}] 101 SUBDIRS=fips 102 $FIPSGOAL=fips 104 # This is the trigger to actually build the FIPS module. Without these [all …]
|
| /third_party/openssl/providers/ |
| D | build.info | 5 # go in the FIPS provider. The compilations for this 15 # To be noted is that the FIPS provider shares source code with libcrypto, 21 # -o {modulename}.so {object files...} lib{modulename}.a libcommon.a 58 # used is determined by non-weak dependencies. 92 # FIPS provider stuff 97 # diverse build.info files. libfips.a, fips.so and their sources aren't 100 IF[{- !$disabled{fips} -}] 101 SUBDIRS=fips 102 $FIPSGOAL=fips 104 # This is the trigger to actually build the FIPS module. Without these [all …]
|
| /third_party/node/doc/ |
| D | node.1 | 8 .\" https://atom.io/packages/language-roff 11 .\" mandoc -Wall -Tlint /path/to/this.file # BSD 12 .\" groff -w all -z /path/to/this.file # GNU/Linux, macOS 18 .\" the Roff formatter better control over text-spacing, line-wrapping, 29 .tr -\-^\(ha~\(ti`\(ga 35 .Nd server-side JavaScript runtime 41 .Op Ar v8-options 43 .Op Fl - 52 .Op Fl -v8-options 57 It is primarily focused on creating simple, easy-to-build network clients and servers. [all …]
|
| /third_party/openssl/test/ssl-tests/ |
| D | protocol_version.pm | 1 # -*- mode: perl; -*- 2 # Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. 25 # undef stands for "no limit". 85 # undef stands for "no limit". 105 my ($dtls, $fips) = @_; 106 if ($dtls && $fips) { 115 my $fips = shift; 126 if ($fips) { 140 if (no_tests($dtls, $fips)) { 148 my $c_max_min = $c_min == 0 ? 0 : $c_min - 1; [all …]
|