Home
last modified time | relevance | path

Searched refs:fips (Results 1 – 25 of 119) sorted by relevance

12345

/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa_sigalg.txt163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
169 # Test that a nist curve with SHA3 is allowed in fips mode
176 # Test that a explicit curve that is a named curve is allowed in fips mode
184 # Test that a explicit curve is not allowed in fips mode
185 Availablein = fips
191 # Test that a curve with < 112 bits is not allowed in fips mode for signing
192 Availablein = fips
199 # Test that a non nist curve is not allowed in fips mode
200 Availablein = fips
207 # Test that SHA1 is not allowed in fips mode for signing
[all …]
H A Devppkey_dsa_sigalg.txt272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
273 Availablein = fips
280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
302 # Test sign with a 2048 bit SHA3 is allowed in fips mode
309 # Test verify with a 1024 bit key is allowed in fips mode
315 # Test verify with SHA1 is allowed in fips mode
321 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
[all …]
H A Devppkey_dsa.txt271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
272 Availablein = fips
279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
301 # Test sign with a 2048 bit SHA3 is allowed in fips mode
308 # Test verify with a 1024 bit key is allowed in fips mode
314 # Test verify with SHA1 is allowed in fips mode
320 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
[all …]
H A Devppkey_ecdsa.txt164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
170 # Test that a nist curve with SHA3 is allowed in fips mode
177 # Test that a explicit curve that is a named curve is allowed in fips mode
185 # Test that a explicit curve is not allowed in fips mode
186 Availablein = fips
192 # Test that a curve with < 112 bits is not allowed in fips mode for signing
193 Availablein = fips
200 # Test that a non nist curve is not allowed in fips mode
201 Availablein = fips
208 # Test that SHA1 is not allowed in fips mode for signing
[all …]
H A Devpciph_des3_common.txt44 Availablein = fips
54 Availablein = fips
65 Availablein = fips
77 Availablein = fips
H A Devpkdf_x963.txt125 Availablein = fips
133 Availablein = fips
145 Availablein = fips
156 Availablein = fips
167 Availablein = fips
178 Availablein = fips
H A Devpkdf_tls12_prf.txt64 Availablein = fips
89 Availablein = fips
102 Availablein = fips
116 Availablein = fips
129 Availablein = fips
H A Devppkey_rsa_common.txt283 Availablein = fips
291 Availablein = fips
305 Availablein = fips
312 Availablein = fips
332 Availablein = fips
341 Availablein = fips
1922 Availablein = fips
1928 # Verifying with SHA1 is permitted in fips mode for older applications
1934 # Verifying with a 1024 bit key is permitted in fips mode for older applications
1940 # Signing with SHA1 is not allowed in fips mode
[all …]
H A Devpkdf_pbkdf2.txt210 Availablein = fips
220 Availablein = fips
234 Availablein = fips
245 Availablein = fips
258 Availablein = fips
270 Availablein = fips
/freebsd/crypto/openssl/
H A DREADME-FIPS.md26 The OpenSSL FIPS provider is a shared library called `fips.so` (on Unix), or
27 resp. `fips.dll` (on Windows). The FIPS provider does not get built and
29 the `enable-fips` option.
60 $ make install_fips # for `enable-fips` only
68 /usr/local/lib/ossl-modules/fips.so on Unix, and
69 C:\Program Files\OpenSSL\lib\ossl-modules\fips.dll on Windows.
85 … openssl fipsinstall -out /usr/local/ssl/fipsmodule.cnf -module /usr/local/lib/ossl-modules/fips.so
105 $ ./Configure enable-fips
117 $ ./Configure enable-fips
127 $ cp ../openssl-3.1.2/providers/fips.so providers/.
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A Dprotocol_version.pm105 my ($dtls, $fips) = @_;
106 if ($dtls && $fips) {
115 my $fips = shift;
126 if ($fips) {
140 if (no_tests($dtls, $fips)) {
223 my $fips = shift;
233 if ($fips) {
/freebsd/crypto/openssl/doc/man7/
H A Dfips_module.pod5 fips_module - OpenSSL fips module guide
89 fips = fips_sect
96 default_properties = fips=yes
188 OSSL_PROVIDER *fips;
191 fips = OSSL_PROVIDER_load(NULL, "fips");
192 if (fips == NULL) {
198 OSSL_PROVIDER_unload(fips);
206 OSSL_PROVIDER_unload(fips);
240 standards you can specify the property query C<fips=yes> like this:
244 sha256 = EVP_MD_fetch(NULL, "SHA2-256", "fips=yes");
[all …]
H A DEVP_KDF-TLS1_PRF.pod55 =item "fips-indicator" (B<OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR>) <integer>
65 will ignore the error and set the approved "fips-indicator" to 0.
66 This option breaks FIPS compliance if it causes the approved "fips-indicator"
74 "fips-indicator" to 0.
75 This option breaks FIPS compliance if it causes the approved "fips-indicator"
87 "fips-indicator" to 0.
88 This option breaks FIPS compliance if it causes the approved "fips-indicator"
H A DEVP_SIGNATURE-ML-DSA.pod13 signature schemes described in L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final>.
16 L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Section 4 Table 1.
28 defined in L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Algorithm 2
59 L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Algorithm 2 step 10 and
77 from L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Algorithm 7 step 6 and
81 L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final> Algorithm 2 step 10 and
126 L<FIPS 204|https://csrc.nist.gov/pubs/fips/204/final>
H A Dproperty.pod58 Likewise, OpenSSL's FIPS provider defines I<provider=fips> and the legacy
64 For example, "fips=yes", "provider!=default" or "?iteration.count=3".
135 For example, a context property query that contains "fips=yes" would normally
136 result in implementations that have "fips=yes".
138 However, if the setting of the "fips" property is irrelevant to the
140 clause "-fips".
141 Note that the local property query could not use "fips=no" because that would
142 disallow any implementations with "fips=yes" rather than not caring about the
H A DEVP_KDF-X963.pod47 =item "fips-indicator" (B<OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR>) <integer>
58 "fips-indicator" to 0.
59 This option breaks FIPS compliance if it causes the approved "fips-indicator"
72 "fips-indicator" to 0.
73 This option breaks FIPS compliance if it causes the approved "fips-indicator"
H A DEVP_MAC-CMAC.pod21 =item "CMAC", "provider=default" or "provider=fips"
58 "fips-indicator" to 0.
59 This option breaks FIPS compliance if it causes the approved "fips-indicator"
80 =item "fips-indicator" (B<OSSL_CIPHER_PARAM_FIPS_APPROVED_INDICATOR>) <integer>
/freebsd/crypto/openssl/providers/
H A Dbuild.info50 fips/include
98 # diverse build.info files. libfips.a, fips.so and their sources aren't
101 IF[{- !$disabled{fips} -}]
102 SUBDIRS=fips
103 $FIPSGOAL=fips
107 MODULES{fips}=$FIPSGOAL
114 SOURCE[$FIPSGOAL]=fips.ld
115 GENERATE[fips.ld]=../util/providers.num
125 GENERATE[fips.rc]=../util/mkrc.pl fips
126 SOURCE[$FIPSGOAL]=fips.rc
/freebsd/crypto/openssl/test/recipes/
H A D90-test_fipsload.t28 my $fips = bldtop_file('providers', platform->dso('fips'));
30 ok(run(test(['moduleloadtest', $fips, 'OSSL_provider_init'])),
31 "trying to load $fips in its own");
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-fipsinstall.pod.in83 The default value of '1' will cause the fips module error state to be entered.
131 The default value is C<fips>.
204 Enabling the configuration option "no-fips-securitychecks" provides another way to
406 If the base configuration file is set up to autoload the fips module, then the
407 fips module will be loaded and self tested BEFORE the fipsinstall application
411 when generating the fips configuration file.
420 Calculate the mac of a FIPS module F<fips.so> and run a FIPS self test
421 for the module, and save the F<fips.cnf> configuration file:
423 openssl fipsinstall -module ./fips.so -out fips
[all...]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_set_default_properties.pod36 EVP_default_properties_enable_fips() sets the 'fips=yes' to be a default property
37 if I<enable> is non zero, otherwise it clears 'fips' from the default property
38 query for the given I<libctx>. It merges the fips default property query with any
41 EVP_default_properties_is_fips_enabled() indicates if 'fips=yes' is a default
60 EVP_default_properties_is_fips_enabled() returns 1 if the 'fips=yes' default
/freebsd/crypto/openssl/test/
H A Dendecode_test.c554 static int test_unprotected_via_DER(const char *type, EVP_PKEY *key, int fips) in check_unprotected_PKCS8_DER()
562 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_DER()
575 static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key, int fips) in check_unprotected_PKCS8_PEM()
583 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_PEM()
730 static int test_protected_via_DER(const char *type, EVP_PKEY *key, int fips) in check_protected_PKCS8_DER()
739 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_DER()
752 static int test_protected_via_PEM(const char *type, EVP_PKEY *key, int fips) in check_protected_PKCS8_PEM()
761 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_PEM()
822 static int test_public_via_DER(const char *type, EVP_PKEY *key, int fips) in check_public_DER()
830 fips in test_public_via_DER()
559 test_unprotected_via_DER(const char * type,EVP_PKEY * key,int fips) test_unprotected_via_DER() argument
581 test_unprotected_via_PEM(const char * type,EVP_PKEY * key,int fips) test_unprotected_via_PEM() argument
736 test_protected_via_DER(const char * type,EVP_PKEY * key,int fips) test_protected_via_DER() argument
759 test_protected_via_PEM(const char * type,EVP_PKEY * key,int fips) test_protected_via_PEM() argument
829 test_public_via_DER(const char * type,EVP_PKEY * key,int fips) test_public_via_DER() argument
851 test_public_via_PEM(const char * type,EVP_PKEY * key,int fips) test_public_via_PEM() argument
904 IMPLEMENT_TEST_SUITE(KEYTYPE,KEYTYPEstr,fips) global() argument
[all...]
H A Dfips.cnf16 default_properties = "fips=yes"
19 fips = fips_sect
H A Dfips-and-base.cnf15 default_properties = "fips=yes"
18 fips = fips_sect
/freebsd/crypto/openssl/Configurations/
H A Dunix-Makefile.tmpl121 && $unified_info{attributes}->{modules}->{$_}->{fips} }
200 && !$unified_info{attributes}->{modules}->{$_}->{fips} }
208 && $unified_info{attributes}->{modules}->{$_}->{fips} }
646 $(RM) providers/fips*.new
664 install: install_sw install_ssldirs {- "install_docs" if !$disabled{docs}; -} {- $disabled{fips} ? "" : "install_fips" -} ## Install software and documentation, create OpenSSL directories
666 uninstall: {- "uninstall_docs" if !$disabled{docs}; -} uninstall_sw {- $disabled{fips} ? "" : "uninstall_fips" -} ## Uninstall software and documentation
677 {- output_off() if $disabled{fips}; "" -}
697 {- if ($disabled{fips}) { output_on(); } else { output_off(); } "" -}
699 @$(ECHO) "The 'install_fips' target requires the 'enable-fips' option"
702 @$(ECHO) "The 'uninstall_fips' target requires the 'enable-fips' optio
[all...]

12345