/openssl/providers/common/ |
H A D | securitycheck_fips.c | 86 int approved = (nid != NID_undef && nid != NID_sha1); in ossl_fips_ind_digest_exch_check() local 88 if (!approved) { in ossl_fips_ind_digest_exch_check() 104 int approved; in ossl_fips_ind_digest_sign_check() local 107 approved = 0; in ossl_fips_ind_digest_sign_check() 109 approved = sha1_allowed || nid != NID_sha1; in ossl_fips_ind_digest_sign_check() 111 if (!approved) { in ossl_fips_ind_digest_sign_check()
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 21 - A module must have an approved mode of operation that requires at least one service to use an app… 23 - If a module only supports approved services in an approved manner an implicit indicator can be us… 98 if (p != NULL && !OSSL_PARAM_set_int(p, ctx->approved)) 112 ctx->approved = 1; 124 int approved; 127 if (!approved) { 128 ctx->approved = 0; 195 the approved flag. 199 unsigned char approved; 278 - ED25519/ED448 is now approved. [all …]
|
/openssl/doc/man3/ |
H A D | OSSL_INDICATOR_set_callback.pod | 23 I<libctx> that will be called when a non approved FIPS operation is detected. 26 to indicate different approved mode checks have failed. 28 Non approved operations may only occur if the user has deliberately chosen to do 33 contain the algorithm type and operation that is not approved. 47 A simple indicator callback to log non approved FIPS operations 53 fprintf(stdout, "%s %s is not approved\n", type, desc);
|
/openssl/doc/man7/ |
H A D | EVP_KDF-TLS1_PRF.pod | 57 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 65 will ignore the error and set the approved "fips-indicator" to 0. 66 This option breaks FIPS compliance if it causes the approved "fips-indicator" 72 used digest is not approved. 73 Setting this to zero will ignore the error and set the approved 75 This option breaks FIPS compliance if it causes the approved "fips-indicator" 78 According to SP 800-135r1, the following are approved digest algorithms: 86 Setting this to zero will ignore the error and set the approved 88 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-X963.pod | 49 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 56 used digest is not approved. 57 Setting this to zero will ignore the error and set the approved 59 This option breaks FIPS compliance if it causes the approved "fips-indicator" 62 According to ANSI X9.63-2001, the following are approved digest algorithms: 71 Setting this to zero will ignore the error and set the approved 73 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-SSHKDF.pod | 93 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 100 used digest is not approved. 101 Setting this to zero will ignore the error and set the approved 103 This option breaks FIPS compliance if it causes the approved "fips-indicator" 106 According to SP 800-135r1, the following are approved digest algorithms: SHA-1, 114 Setting this to zero will ignore the error and set the approved 116 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-TLS13_KDF.pod | 90 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 97 used digest is not approved. 98 Setting this to zero will ignore the error and set the approved 100 This option breaks FIPS compliance if it causes the approved "fips-indicator" 103 According to RFC 8446, the following are approved digest algorithms: SHA2-256, 111 Setting this to zero will ignore the error and set the approved 113 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_MAC-CMAC.pod | 57 Setting this to 0 will ignore the error and set the approved 59 This option breaks FIPS compliance if it causes the approved "fips-indicator" 84 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
|
H A D | provider-keyexch.pod | 215 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 223 approved (e.g. The key has a security strength of less than 112 bits). Setting 224 this to 0 will ignore the error and set the approved "fips-indicator" to 0. 225 This option breaks FIPS compliance if it causes the approved "fips-indicator" 232 not FIPS approved. Setting this to 0 will ignore the error and set the 233 approved "fips-indicator" to 0. 234 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | provider-mac.pod | 202 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 210 asked for. Setting this to 0 will ignore the error and set the approved 212 This option breaks FIPS compliance if it causes the approved "fips-indicator" 219 asked for. Setting this to 0 will ignore the error and set the approved 221 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-SS.pod | 74 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 83 Setting this to zero will ignore the error and set the approved 85 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-X942-ASN1.pod | 88 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 97 Setting this to zero will ignore the error and set the approved 99 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_ASYM_CIPHER-RSA.pod | 94 Setting this to zero will ignore the error and set the approved 96 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | provider-signature.pod | 509 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 517 indicates likely non-approved usage of the FIPS provider. This flag is 527 approved (e.g. The key has a security strength of less than 112 bits). 528 Setting this to 0 will ignore the error and set the approved "indicator" to 0. 529 This option breaks FIPS compliance if it causes the approved "fips-indicator" 536 not FIPS approved (e.g. SHA1 is used for signing). Setting this to 0 will ignore 537 the error and set the approved "fips-indicator" to 0. 538 This option breaks FIPS compliance if it causes the approved "fips-indicator" 547 This option breaks FIPS compliance if it causes the approved "fips-indicator" to 555 approved "fips-indicator" to 0. [all …]
|
H A D | fips_module.pod | 343 * approved algorithms in the FIPS provider for backward compatibility reasons. 449 * The "fips=yes" property includes all FIPS approved algorithms 478 approved algorithms. An algorithm is approved if it passes all required checks 485 unapproved algorithms. At the end of any algorithm operation the approved status 492 is approved: 498 DSA Key generation is no longer approved. 503 DSA Signature generation is no longer approved. 516 "pkcs1" padding is no longer approved. 532 Triple-DES is not longer approved for encryption. 593 require FIPS-approved functionality, it is essential to build your FIPS [all …]
|
H A D | EVP_KDF-PBKDF2.pod | 62 This option breaks FIPS compliance if it causes the approved "fips-indicator" 69 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
|
H A D | EVP_KDF-KB.pod | 78 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 87 Setting this to zero will ignore the error and set the approved 89 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
H A D | EVP_KDF-HKDF.pod | 93 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 102 Setting this to zero will ignore the error and set the approved 104 This option breaks FIPS compliance if it causes the approved "fips-indicator"
|
/openssl/providers/fips/ |
H A D | fipsindicator.c | 27 ind->approved = 1; in ossl_FIPS_IND_set_approved() 64 ind->approved = 0; in ossl_FIPS_IND_on_unapproved() 98 return p == NULL || OSSL_PARAM_set_int(p, ind->approved); in ossl_FIPS_IND_get_ctx_param()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_des3_common.txt | 43 # Test that DES3 CBC mode encryption fails because it is not FIPS approved 53 # Test that DES3 EBC mode encryption fails because it is not FIPS approved 64 # Test that DES3 CBC mode encryption is not FIPS approved 76 # Test that DES3 ECB mode encryption is not FIPS approved
|
/openssl/providers/implementations/macs/ |
H A D | hmac_prov.c | 167 int approved = ossl_mac_check_key_size(keylen); in hmac_setkey() local 169 if (!approved) { in hmac_setkey() 297 int approved = 0; in hmac_get_ctx_params() local 300 approved = OSSL_FIPS_IND_GET(macctx)->approved; in hmac_get_ctx_params() 301 if (!OSSL_PARAM_set_int(p, approved)) in hmac_get_ctx_params()
|
/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 193 int approved = 0; in ecx_get_ctx_params() local 197 if (p != NULL && !OSSL_PARAM_set_int(p, approved)) in ecx_get_ctx_params()
|
/openssl/test/ |
H A D | fips-alt.cnf | 10 # Ensure FIPS non-approved algorithms in the FIPS module are suppressed (e.g.
|
H A D | fips.cnf | 13 # Ensure FIPS non-approved algorithms in the FIPS module are suppressed (e.g.
|
H A D | fips-and-base.cnf | 10 # You MUST uncomment the following line to operate in a FIPS approved manner,
|