Lines Matching refs:not

23 Applications written to use the OpenSSL 3.0 FIPS module should not use any
54 built and linked against OpenSSL 3.0 and do not override the loading of the
67 to not have the correct version of OpenSSL in your $PATH. Check that you are
109 also activates the "base" provider. The base provider does not include any
110 cryptographic algorithms (and therefore does not impact the validation status of
122 You may not want all applications to use the FIPS module.
124 It may be the case that some applications should and some should not use the
129 If applications take explicit steps to not load the default config file or
132 This method will not work for these cases.
139 If any applications attempt to use any algorithms that are not present,
146 If any applications use those APIs then the FIPS module will not be used.
164 This removes the disadvantage listed above that you may not want all
173 in this case we do not automatically activate the FIPS provider via that config
179 C<activate = 1> (note that setting this value to 0 is I<not> sufficient).
181 FIPS module, but it is not automatically loaded when the application starts. The
217 have not explicitly specified via a property query (see below) which one should
224 decoding keys. If you decide not to load the default provider then you
279 file. The encoder and decoder algorithms are not in the FIPS module itself but
285 does not load the "base" provider. All supporting algorithms that are in "base"
385 for other usages - or vice versa. However if code has not been converted to use
392 explicitly loaded, the default provider will not automatically load. This means
410 implemented in both the default and base providers and are not in the FIPS
411 module boundary. However since they are not cryptographic algorithms themselves
483 setter. Overriding the check means that the algorithm is not FIPS compliant.
532 Triple-DES is not longer approved for encryption.
571 The following algorithms use a unique indicator and do not trigger the
589 Some released versions of OpenSSL do not include a validated
619 Licensed under the Apache License 2.0 (the "License"). You may not use