HomeSort by: relevance | last modified time | path
    Searched refs:fips (Results 1 - 25 of 78) sorted by relevancy

1 2 3 4

  /src/external/mpl/bind/dist/bin/tests/system/tsiggss/
prereq.sh 22 $FEATURETEST --have-fips-dh || {
23 echo_i "FIPS mode Diffie-Hellman not working - skipping tsiggss test"
  /src/external/mpl/bind/dist/bin/tests/system/doth/
prereq.sh 21 $FEATURETEST --have-fips-dh || {
22 echo_i "FIPS mode Diffie-Hellman not working - skipping doth test"
  /src/crypto/external/apache2/openssl/dist/test/recipes/
90-test_fipsload.t 19 plan skip_all => 'Test is disabled with disabled fips' if disabled('fips');
28 my $fips = bldtop_file('providers', platform->dso('fips'));
30 ok(run(test(['moduleloadtest', $fips, 'OSSL_provider_init'])),
31 "trying to load $fips in its own");
  /src/crypto/external/bsd/openssl/dist/test/recipes/
90-test_fipsload.t 19 plan skip_all => 'Test is disabled with disabled fips' if disabled('fips');
28 my $fips = bldtop_file('providers', platform->dso('fips'));
30 ok(run(test(['moduleloadtest', $fips, 'OSSL_provider_init'])),
31 "trying to load $fips in its own");
  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evpciph_des3_common.txt 26 # FIPS(3.0.0): has a bug in the IV length #17591
43 # Test that DES3 CBC mode encryption fails because it is not FIPS approved
44 Availablein = fips
53 # Test that DES3 EBC mode encryption fails because it is not FIPS approved
54 Availablein = fips
62 Title = DES3 FIPS Indicator Tests
64 # Test that DES3 CBC mode encryption is not FIPS approved
65 Availablein = fips
76 # Test that DES3 ECB mode encryption is not FIPS approved
77 Availablein = fips
    [all...]
evpmac_cmac_des.txt 15 Title = CMAC tests (from FIPS module)
31 Availablein = fips
39 Availablein = fips
evppkey_ecdsa_sigalg.txt 161 Title = FIPS tests
163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
169 # Test that a nist curve with SHA3 is allowed in fips mode
176 # Test that a explicit curve that is a named curve is allowed in fips mode
182 Title = FIPS Negative tests (using different curves and digests)
184 # Test that a explicit curve is not allowed in fips mode
185 Availablein = fips
191 # Test that a curve with < 112 bits is not allowed in fips mode for signing
192 Availablein = fips
199 # Test that a non nist curve is not allowed in fips mod
    [all...]
evpkdf_x963.txt 125 Availablein = fips
133 Availablein = fips
142 Title = FIPS indicator tests
145 Availablein = fips
156 Availablein = fips
167 Availablein = fips
178 Availablein = fips
evpkdf_tls12_prf.txt 52 # Test that "master secret" is not not used in FIPS mode
63 # FIPS indicator callback test
64 Availablein = fips
86 Title = FIPS indicator tests
89 Availablein = fips
102 Availablein = fips
116 Availablein = fips
129 Availablein = fips
evppkey_ecdsa.txt 162 Title = FIPS tests
164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
170 # Test that a nist curve with SHA3 is allowed in fips mode
177 # Test that a explicit curve that is a named curve is allowed in fips mode
183 Title = FIPS Negative tests (using different curves and digests)
185 # Test that a explicit curve is not allowed in fips mode
186 Availablein = fips
192 # Test that a curve with < 112 bits is not allowed in fips mode for signing
193 Availablein = fips
200 # Test that a non nist curve is not allowed in fips mod
    [all...]
evppkey_dsa_sigalg.txt 270 Title = FIPS Tests (using different key sizes and digests)
272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
273 Availablein = fips
280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
302 # Test sign with a 2048 bit SHA3 is allowed in fips mode
309 # Test verify with a 1024 bit key is allowed in fips mode
315 # Test verify with SHA1 is allowed in fips mode
321 # Test verify with a 2048/160 bit key is allowed in fips mod
    [all...]
evppkey_kdf_tls1_prf.txt 82 Title = FIPS indicator tests
85 Availablein = fips
98 Availablein = fips
111 Availablein = fips
124 Availablein = fips
evppkey_rsa_common.txt 256 # The old FIPS provider doesn't include the workaround (#13817)
264 # The old FIPS provider doesn't include the workaround (#13817)
272 # The old FIPS provider doesn't include the workaround (#13817)
283 Availablein = fips
291 Availablein = fips
305 Availablein = fips
312 Availablein = fips
332 Availablein = fips
341 Availablein = fips
413 # The old FIPS provider doesn't include the workaround (#13817
    [all...]
evppkey_dsa.txt 269 Title = FIPS Tests (using different key sizes and digests)
271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
272 Availablein = fips
279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
301 # Test sign with a 2048 bit SHA3 is allowed in fips mode
308 # Test verify with a 1024 bit key is allowed in fips mode
314 # Test verify with SHA1 is allowed in fips mode
320 # Test verify with a 2048/160 bit key is allowed in fips mod
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/
feature-test.c 28 #include <isc/fips.h>
46 fprintf(stderr, "\t--fips-provider\n");
49 fprintf(stderr, "\t--have-fips-dh\n");
50 fprintf(stderr, "\t--have-fips-mode\n");
104 if (strcasecmp(argv[1], "--fips-provider") == 0) {
106 OSSL_PROVIDER *fips = OSSL_PROVIDER_load(NULL, "fips"); local
107 if (fips != NULL) {
108 OSSL_PROVIDER_unload(fips);
110 return fips != NULL ? 0 : 1
    [all...]
  /src/crypto/external/bsd/openssl.old/lib/libcrypto/
Makefile 187 # FIPS
189 # The FIPS include files
190 .PATH: ${OPENSSLSRC}/fips ${OPENSSLSRC}/fips/rand
191 INCS+= fips.h fips_rand.h
196 .PATH: ${OPENSSLSRC}/fips/aes
198 .PATH: ${OPENSSLSRC}/fips/des
200 # asm/fips-dx86-elf.s
201 .PATH: ${OPENSSLSRC}/fips/dh
203 .PATH: ${OPENSSLSRC}/fips/ds
    [all...]
  /src/external/mpl/bind/dist/lib/isc/
fips.c 1 /* $NetBSD: fips.c,v 1.2 2025/01/26 16:25:37 christos Exp $ */
18 #include <isc/fips.h>
  /src/crypto/external/apache2/openssl/lib/libcrypto/
Makefile 45 CPPFLAGS+= -I${OPENSSLSRC}/providers/fips/include
219 # FIPS
221 # The FIPS include files
222 .PATH: ${OPENSSLSRC}/fips ${OPENSSLSRC}/fips/rand
223 INCS+= fips.h fips_rand.h
228 .PATH: ${OPENSSLSRC}/fips/aes
230 .PATH: ${OPENSSLSRC}/fips/des
232 # asm/fips-dx86-elf.s
233 .PATH: ${OPENSSLSRC}/fips/d
    [all...]
  /src/crypto/external/bsd/openssl/lib/libcrypto/
Makefile 215 # FIPS
217 # The FIPS include files
218 .PATH: ${OPENSSLSRC}/fips ${OPENSSLSRC}/fips/rand
219 INCS+= fips.h fips_rand.h
224 .PATH: ${OPENSSLSRC}/fips/aes
226 .PATH: ${OPENSSLSRC}/fips/des
228 # asm/fips-dx86-elf.s
229 .PATH: ${OPENSSLSRC}/fips/dh
231 .PATH: ${OPENSSLSRC}/fips/ds
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/ssl-tests/
protocol_version.pm 105 my ($dtls, $fips) = @_;
106 if ($dtls && $fips) {
115 my $fips = shift;
126 if ($fips) {
140 if (no_tests($dtls, $fips)) {
223 my $fips = shift;
233 if ($fips) {
  /src/crypto/external/bsd/openssl/dist/test/ssl-tests/
protocol_version.pm 105 my ($dtls, $fips) = @_;
106 if ($dtls && $fips) {
115 my $fips = shift;
126 if ($fips) {
140 if (no_tests($dtls, $fips)) {
223 my $fips = shift;
233 if ($fips) {
  /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evppkey_ecdsa.txt 162 Title = FIPS tests
164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
170 # Test that a nist curve with SHA3 is allowed in fips mode
177 # Test that a explicit curve that is a named curve is allowed in fips mode
183 Title = FIPS Negative tests (using different curves and digests)
185 # Test that a explicit curve is not allowed in fips mode
186 Availablein = fips
193 # Test that a curve with < 112 bits is not allowed in fips mode for signing
194 Availablein = fips
201 # Test that a non nist curve is not allowed in fips mod
    [all...]
  /src/crypto/external/apache2/openssl/dist/Configurations/
unix-Makefile.tmpl 121 && $unified_info{attributes}->{modules}->{$_}->{fips} }
123 die "More that one FIPS module" if scalar @fipsmodules > 1;
125 FIPSMODULENAME={- die "More that one FIPS module" if scalar @fipsmodules > 1;
200 && !$unified_info{attributes}->{modules}->{$_}->{fips} }
208 && $unified_info{attributes}->{modules}->{$_}->{fips} }
646 $(RM) providers/fips*.new
664 install: install_sw install_ssldirs {- "install_docs" if !$disabled{docs}; -} {- $disabled{fips} ? "" : "install_fips" -} ## Install software and documentation, create OpenSSL directories
666 uninstall: {- "uninstall_docs" if !$disabled{docs}; -} uninstall_sw {- $disabled{fips} ? "" : "uninstall_fips" -} ## Uninstall software and documentation
677 {- output_off() if $disabled{fips}; "" -}
682 @$(ECHO) "*** Installing FIPS module
    [all...]
  /src/crypto/external/bsd/openssl/dist/Configurations/
unix-Makefile.tmpl 104 && $unified_info{attributes}->{modules}->{$_}->{fips} }
106 die "More that one FIPS module" if scalar @fipsmodules > 1;
108 FIPSMODULENAME={- die "More that one FIPS module" if scalar @fipsmodules > 1;
183 && !$unified_info{attributes}->{modules}->{$_}->{fips} }
191 && $unified_info{attributes}->{modules}->{$_}->{fips} }
550 install: install_sw install_ssldirs install_docs {- $disabled{fips} ? "" : "install_fips" -}
552 uninstall: uninstall_docs uninstall_sw {- $disabled{fips} ? "" : "uninstall_fips" -}
593 $(RM) providers/fips*.new
620 {- output_off() if $disabled{fips}; "" -}
625 @$(ECHO) "*** Installing FIPS module
    [all...]
  /src/crypto/external/apache2/openssl/lib/libdefault/
Makefile 34 CPPFLAGS+= -I${OPENSSLSRC}/providers/fips/include

Completed in 47 milliseconds

1 2 3 4