OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:fips
(Results
1 - 25
of
78
) sorted by relevancy
1
2
3
4
/src/external/mpl/bind/dist/bin/tests/system/tsiggss/
prereq.sh
22
$FEATURETEST --have-
fips
-dh || {
23
echo_i "
FIPS
mode Diffie-Hellman not working - skipping tsiggss test"
/src/external/mpl/bind/dist/bin/tests/system/doth/
prereq.sh
21
$FEATURETEST --have-
fips
-dh || {
22
echo_i "
FIPS
mode Diffie-Hellman not working - skipping doth test"
/src/crypto/external/apache2/openssl/dist/test/recipes/
90-test_fipsload.t
19
plan skip_all => 'Test is disabled with disabled
fips
' if disabled('
fips
');
28
my $
fips
= bldtop_file('providers', platform->dso('
fips
'));
30
ok(run(test(['moduleloadtest', $
fips
, 'OSSL_provider_init'])),
31
"trying to load $
fips
in its own");
/src/crypto/external/bsd/openssl/dist/test/recipes/
90-test_fipsload.t
19
plan skip_all => 'Test is disabled with disabled
fips
' if disabled('
fips
');
28
my $
fips
= bldtop_file('providers', platform->dso('
fips
'));
30
ok(run(test(['moduleloadtest', $
fips
, 'OSSL_provider_init'])),
31
"trying to load $
fips
in its own");
/src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evpciph_des3_common.txt
26
#
FIPS
(3.0.0): has a bug in the IV length #17591
43
# Test that DES3 CBC mode encryption fails because it is not
FIPS
approved
44
Availablein =
fips
53
# Test that DES3 EBC mode encryption fails because it is not
FIPS
approved
54
Availablein =
fips
62
Title = DES3
FIPS
Indicator Tests
64
# Test that DES3 CBC mode encryption is not
FIPS
approved
65
Availablein =
fips
76
# Test that DES3 ECB mode encryption is not
FIPS
approved
77
Availablein =
fips
[
all
...]
evpmac_cmac_des.txt
15
Title = CMAC tests (from
FIPS
module)
31
Availablein =
fips
39
Availablein =
fips
evppkey_ecdsa_sigalg.txt
161
Title =
FIPS
tests
163
# Test that a nist curve with < 112 bits is allowed in
fips
mode for verifying
169
# Test that a nist curve with SHA3 is allowed in
fips
mode
176
# Test that a explicit curve that is a named curve is allowed in
fips
mode
182
Title =
FIPS
Negative tests (using different curves and digests)
184
# Test that a explicit curve is not allowed in
fips
mode
185
Availablein =
fips
191
# Test that a curve with < 112 bits is not allowed in
fips
mode for signing
192
Availablein =
fips
199
# Test that a non nist curve is not allowed in
fips
mod
[
all
...]
evpkdf_x963.txt
125
Availablein =
fips
133
Availablein =
fips
142
Title =
FIPS
indicator tests
145
Availablein =
fips
156
Availablein =
fips
167
Availablein =
fips
178
Availablein =
fips
evpkdf_tls12_prf.txt
52
# Test that "master secret" is not not used in
FIPS
mode
63
#
FIPS
indicator callback test
64
Availablein =
fips
86
Title =
FIPS
indicator tests
89
Availablein =
fips
102
Availablein =
fips
116
Availablein =
fips
129
Availablein =
fips
evppkey_ecdsa.txt
162
Title =
FIPS
tests
164
# Test that a nist curve with < 112 bits is allowed in
fips
mode for verifying
170
# Test that a nist curve with SHA3 is allowed in
fips
mode
177
# Test that a explicit curve that is a named curve is allowed in
fips
mode
183
Title =
FIPS
Negative tests (using different curves and digests)
185
# Test that a explicit curve is not allowed in
fips
mode
186
Availablein =
fips
192
# Test that a curve with < 112 bits is not allowed in
fips
mode for signing
193
Availablein =
fips
200
# Test that a non nist curve is not allowed in
fips
mod
[
all
...]
evppkey_dsa_sigalg.txt
270
Title =
FIPS
Tests (using different key sizes and digests)
272
# Test sign with a 2048 bit key with N == 160 is not allowed in
fips
mode
273
Availablein =
fips
280
# Test sign with a 2048 bit key with N == 224 is allowed in
fips
mode
288
# Test sign with a 2048 bit key with N == 256 is allowed in
fips
mode
295
# Test sign with a 3072 bit key with N == 256 is allowed in
fips
mode
302
# Test sign with a 2048 bit SHA3 is allowed in
fips
mode
309
# Test verify with a 1024 bit key is allowed in
fips
mode
315
# Test verify with SHA1 is allowed in
fips
mode
321
# Test verify with a 2048/160 bit key is allowed in
fips
mod
[
all
...]
evppkey_kdf_tls1_prf.txt
82
Title =
FIPS
indicator tests
85
Availablein =
fips
98
Availablein =
fips
111
Availablein =
fips
124
Availablein =
fips
evppkey_rsa_common.txt
256
# The old
FIPS
provider doesn't include the workaround (#13817)
264
# The old
FIPS
provider doesn't include the workaround (#13817)
272
# The old
FIPS
provider doesn't include the workaround (#13817)
283
Availablein =
fips
291
Availablein =
fips
305
Availablein =
fips
312
Availablein =
fips
332
Availablein =
fips
341
Availablein =
fips
413
# The old
FIPS
provider doesn't include the workaround (#13817
[
all
...]
evppkey_dsa.txt
269
Title =
FIPS
Tests (using different key sizes and digests)
271
# Test sign with a 2048 bit key with N == 160 is not allowed in
fips
mode
272
Availablein =
fips
279
# Test sign with a 2048 bit key with N == 224 is allowed in
fips
mode
287
# Test sign with a 2048 bit key with N == 256 is allowed in
fips
mode
294
# Test sign with a 3072 bit key with N == 256 is allowed in
fips
mode
301
# Test sign with a 2048 bit SHA3 is allowed in
fips
mode
308
# Test verify with a 1024 bit key is allowed in
fips
mode
314
# Test verify with SHA1 is allowed in
fips
mode
320
# Test verify with a 2048/160 bit key is allowed in
fips
mod
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/
feature-test.c
28
#include <isc/
fips
.h>
46
fprintf(stderr, "\t--
fips
-provider\n");
49
fprintf(stderr, "\t--have-
fips
-dh\n");
50
fprintf(stderr, "\t--have-
fips
-mode\n");
104
if (strcasecmp(argv[1], "--
fips
-provider") == 0) {
106
OSSL_PROVIDER *
fips
= OSSL_PROVIDER_load(NULL, "
fips
");
local
107
if (
fips
!= NULL) {
108
OSSL_PROVIDER_unload(
fips
);
110
return
fips
!= NULL ? 0 : 1
[
all
...]
/src/crypto/external/bsd/openssl.old/lib/libcrypto/
Makefile
187
#
FIPS
189
# The
FIPS
include files
190
.PATH: ${OPENSSLSRC}/
fips
${OPENSSLSRC}/
fips
/rand
191
INCS+=
fips
.h fips_rand.h
196
.PATH: ${OPENSSLSRC}/
fips
/aes
198
.PATH: ${OPENSSLSRC}/
fips
/des
200
# asm/
fips
-dx86-elf.s
201
.PATH: ${OPENSSLSRC}/
fips
/dh
203
.PATH: ${OPENSSLSRC}/
fips
/ds
[
all
...]
/src/external/mpl/bind/dist/lib/isc/
fips.c
1
/* $NetBSD:
fips
.c,v 1.2 2025/01/26 16:25:37 christos Exp $ */
18
#include <isc/
fips
.h>
/src/crypto/external/apache2/openssl/lib/libcrypto/
Makefile
45
CPPFLAGS+= -I${OPENSSLSRC}/providers/
fips
/include
219
#
FIPS
221
# The
FIPS
include files
222
.PATH: ${OPENSSLSRC}/
fips
${OPENSSLSRC}/
fips
/rand
223
INCS+=
fips
.h fips_rand.h
228
.PATH: ${OPENSSLSRC}/
fips
/aes
230
.PATH: ${OPENSSLSRC}/
fips
/des
232
# asm/
fips
-dx86-elf.s
233
.PATH: ${OPENSSLSRC}/
fips
/d
[
all
...]
/src/crypto/external/bsd/openssl/lib/libcrypto/
Makefile
215
#
FIPS
217
# The
FIPS
include files
218
.PATH: ${OPENSSLSRC}/
fips
${OPENSSLSRC}/
fips
/rand
219
INCS+=
fips
.h fips_rand.h
224
.PATH: ${OPENSSLSRC}/
fips
/aes
226
.PATH: ${OPENSSLSRC}/
fips
/des
228
# asm/
fips
-dx86-elf.s
229
.PATH: ${OPENSSLSRC}/
fips
/dh
231
.PATH: ${OPENSSLSRC}/
fips
/ds
[
all
...]
/src/crypto/external/apache2/openssl/dist/test/ssl-tests/
protocol_version.pm
105
my ($dtls, $
fips
) = @_;
106
if ($dtls && $
fips
) {
115
my $
fips
= shift;
126
if ($
fips
) {
140
if (no_tests($dtls, $
fips
)) {
223
my $
fips
= shift;
233
if ($
fips
) {
/src/crypto/external/bsd/openssl/dist/test/ssl-tests/
protocol_version.pm
105
my ($dtls, $
fips
) = @_;
106
if ($dtls && $
fips
) {
115
my $
fips
= shift;
126
if ($
fips
) {
140
if (no_tests($dtls, $
fips
)) {
223
my $
fips
= shift;
233
if ($
fips
) {
/src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evppkey_ecdsa.txt
162
Title =
FIPS
tests
164
# Test that a nist curve with < 112 bits is allowed in
fips
mode for verifying
170
# Test that a nist curve with SHA3 is allowed in
fips
mode
177
# Test that a explicit curve that is a named curve is allowed in
fips
mode
183
Title =
FIPS
Negative tests (using different curves and digests)
185
# Test that a explicit curve is not allowed in
fips
mode
186
Availablein =
fips
193
# Test that a curve with < 112 bits is not allowed in
fips
mode for signing
194
Availablein =
fips
201
# Test that a non nist curve is not allowed in
fips
mod
[
all
...]
/src/crypto/external/apache2/openssl/dist/Configurations/
unix-Makefile.tmpl
121
&& $unified_info{attributes}->{modules}->{$_}->{
fips
} }
123
die "More that one
FIPS
module" if scalar @fipsmodules > 1;
125
FIPSMODULENAME={- die "More that one
FIPS
module" if scalar @fipsmodules > 1;
200
&& !$unified_info{attributes}->{modules}->{$_}->{
fips
} }
208
&& $unified_info{attributes}->{modules}->{$_}->{
fips
} }
646
$(RM) providers/
fips
*.new
664
install: install_sw install_ssldirs {- "install_docs" if !$disabled{docs}; -} {- $disabled{
fips
} ? "" : "install_fips" -} ## Install software and documentation, create OpenSSL directories
666
uninstall: {- "uninstall_docs" if !$disabled{docs}; -} uninstall_sw {- $disabled{
fips
} ? "" : "uninstall_fips" -} ## Uninstall software and documentation
677
{- output_off() if $disabled{
fips
}; "" -}
682
@$(ECHO) "*** Installing
FIPS
module
[
all
...]
/src/crypto/external/bsd/openssl/dist/Configurations/
unix-Makefile.tmpl
104
&& $unified_info{attributes}->{modules}->{$_}->{
fips
} }
106
die "More that one
FIPS
module" if scalar @fipsmodules > 1;
108
FIPSMODULENAME={- die "More that one
FIPS
module" if scalar @fipsmodules > 1;
183
&& !$unified_info{attributes}->{modules}->{$_}->{
fips
} }
191
&& $unified_info{attributes}->{modules}->{$_}->{
fips
} }
550
install: install_sw install_ssldirs install_docs {- $disabled{
fips
} ? "" : "install_fips" -}
552
uninstall: uninstall_docs uninstall_sw {- $disabled{
fips
} ? "" : "uninstall_fips" -}
593
$(RM) providers/
fips
*.new
620
{- output_off() if $disabled{
fips
}; "" -}
625
@$(ECHO) "*** Installing
FIPS
module
[
all
...]
/src/crypto/external/apache2/openssl/lib/libdefault/
Makefile
34
CPPFLAGS+= -I${OPENSSLSRC}/providers/
fips
/include
Completed in 40 milliseconds
1
2
3
4
Indexes created Sat Feb 28 05:31:39 UTC 2026