/openssl/doc/man5/ |
H A D | fips_config.pod | 97 =item B<tls1-prf-ems-check> 113 =item B<hkdf-digest-check> 129 =item B<sskdf-digest-check> 157 =item B<hkdf-key-check> 161 =item B<kbkdf-key-check> 173 =item B<sshkdf-key-check> 177 =item B<sskdf-key-check> 181 =item B<x963kdf-key-check> 185 =item B<x942kdf-key-check> 197 =item B<hmac-key-check> [all …]
|
/openssl/doc/designs/quic-design/ |
H A D | tx-packetiser.md | 263 | 0x00 | padding | ✓ | ✓ | ✓ | ✓ | ✓ | | &check… 264 | 0x01 | ping | ✓ | ✓ | ✓ | ✓ | | | … 265 | 0x02 | ack 0x02 | ✓ | ✓ | | ✓ | ✓ | ✓ | … 266 | 0x03 | ack 0x03 | ✓ | ✓ | | ✓ | ✓ | ✓ | … 269 | 0x06 | crypto | ✓ | ✓ | | ✓ | | | … 271 …8 | stream 0x08 | | | ✓ | ✓ | | | | … 272 …9 | stream 0x09 | | | ✓ | ✓ | | | | … 273 …A | stream 0x0A | | | ✓ | ✓ | | | | … 274 …B | stream 0x0B | | | ✓ | ✓ | | | | … 275 …C | stream 0x0C | | | ✓ | ✓ | | | | … [all …]
|
/openssl/test/ |
H A D | rdcpu_sanitytest.c | 41 unsigned char prior[31] = {0}, buf[31] = {0}, check[7]; in sanity_check_bytes() local 74 unsigned char *tail = &buf[sizeof(buf) - sizeof(check)]; in sanity_check_bytes() 75 memset(check, tail[0], 7); in sanity_check_bytes() 76 if (!TEST_false(!memcmp(check, tail, sizeof(check)))) in sanity_check_bytes()
|
H A D | quic_cfq_test.c | 66 static int check(QUIC_CFQ *cfq) in check() function 135 if (!check(cfq)) in test_cfq() 155 if (!check(cfq)) in test_cfq()
|
/openssl/util/ |
H A D | check-format-commit.sh | 112 mkdir -p $TEMPDIR/check-format/$FDIR 113 git show $COMMIT_LAST:$j > $TEMPDIR/check-format/$j 140 [ -n "$COMMIT_RANGE" ] && cd $TEMPDIR/check-format 145 $TOPDIR/util/check-format.pl $j > $TEMPDIR/results.txt
|
/openssl/.github/workflows/ |
H A D | style-checks.yml | 20 check-style: 27 - name: check style for each commit 38 ./util/check-format-commit.sh $REFSTART..$REFEND 50 echo "PR $PR_NUMBER is marked with style: waived, waiving style check errors"
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 378 CtrlInit = sign-check:0 379 CtrlInit = key-check:0 390 CtrlInit = sign-check:0 401 CtrlInit = sign-check:0 402 CtrlInit = key-check:0 413 CtrlInit = sign-check:0 414 CtrlInit = key-check:0 425 CtrlInit = sign-check:0 426 CtrlInit = digest-check:0 436 CtrlInit = sign-check:0 [all …]
|
H A D | evppkey_dsa_sigalg.txt | 371 CtrlInit = sign-check:0 372 CtrlInit = key-check:0 376 # Test sign with a 1024 bit key is unapproved and fails the key check in 377 # fips mode if the sign check is ignored 383 CtrlInit = sign-check:0 394 CtrlInit = sign-check:0 395 CtrlInit = key-check:0 406 CtrlInit = sign-check:0 407 CtrlInit = key-check:0 411 # Test sign with SHA1 is unapproved in fips mode if DSA sign check is ignored [all …]
|
H A D | evppkey_kdf_tls1_prf.txt | 102 Ctrl.digest-check = digest-check:0 128 Ctrl.key-check = key-check:0
|
H A D | evpkdf_tls12_prf.txt | 106 Ctrl.digest-check = digest-check:0 133 Ctrl.key-check = key-check:0
|
H A D | evpkdf_x963.txt | 160 Ctrl.digest-check = digest-check:0 182 Ctrl.key-check = key-check:0
|
/openssl/doc/man1/ |
H A D | openssl-fipsinstall.pod.in | 111 Filename of the FIPS module to perform an integrity check on. 205 turn off the check at compile time. 209 Configure the module to enable a run-time Extended Master Secret (EMS) check 210 when using the TLS1_PRF KDF algorithm. This check is disabled by default. 240 Configure the module to enable a run-time digest check when deriving a key by 246 Configure the module to enable a run-time digest check when deriving a key by 252 Configure the module to enable a run-time digest check when deriving a key by 258 Configure the module to enable a run-time digest check when deriving a key by 264 Configure the module to enable a run-time digest check when deriving a key by 352 Configure the module to not perform run-time lower bound check for PBKDF2. [all …]
|
/openssl/ |
H A D | NOTES-VALGRIND.md | 5 which is commonly used to check for memory leaks, etc. The default tool 35 "$(/bin/pwd)/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q" 40 The `--leak-check=full` option specifies extensive memory checking. 66 --leak-check=full -q" OPENSSL_ia32cap=":0" 72 valgrind --error-exitcode=1 --leak-check=full -q" OPENSSL_ia32cap=":0"
|
/openssl/apps/ |
H A D | pkeyparam.c | 52 int text = 0, noout = 0, ret = EXIT_FAILURE, check = 0, r; in pkeyparam_main() local 84 check = 1; in pkeyparam_main() 111 if (check) { in pkeyparam_main()
|
H A D | pkey.c | 80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local 141 check = 1; in pkey_main() 242 if (check || pub_check) { in pkey_main() 251 if (check && !pubin) in pkey_main()
|
H A D | rsa.c | 132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local 205 check = 1; in rsa_main() 232 if (check && pubin) { in rsa_main() 288 if (check) { in rsa_main()
|
H A D | verify.c | 22 static int check(X509_STORE *ctx, const char *file, 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 245 static int check(X509_STORE *ctx, const char *file, in check() function
|
H A D | ec.c | 78 int check = 0; in ec_main() local 151 check = 1; in ec_main() 225 if (check) { in ec_main()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-X963.pod | 50 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check" 51 related parameter is set to 0 and the check fails. 53 =item "digest-check" (B<OSSL_KDF_PARAM_FIPS_DIGEST_CHECK>) <int> 66 =item "key-check" (B<OSSL_KDF_PARAM_FIPS_KEY_CHECK>) <integer>
|
H A D | provider-keymgmt.pod | 319 OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid 324 for short) is expected to check that the pairwise consistency of 326 performed on the subset of data. Two types of check are defined: 328 The interpretation of how much checking is performed in a full check versus a 329 quick check is key type specific. Some providers may have no distinction 330 between a full check and a quick check. For algorithms where some selection is 335 OSSL_FUNC_keymgmt_match() should check if the data subset indicated by 449 return 0 if either the "key-check", or "sign-check" are set to 0. 451 =item "key-check" (B<OSSL_PKEY_PARAM_FIPS_KEY_CHECK>) <integer> 461 =item "sign-check" (B<OSSL_PKEY_PARAM_FIPS_SIGN_CHECK>) <integer> [all …]
|
H A D | EVP_KDF-TLS1_PRF.pod | 58 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check" 59 related parameter is set to 0 and the check fails. 69 =item "digest-check" (B<OSSL_KDF_PARAM_FIPS_DIGEST_CHECK>) <integer> 81 =item "key-check" (B<OSSL_KDF_PARAM_FIPS_KEY_CHECK>) <integer>
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf.in | 16 # Sanity-check that verification indeed succeeds without the 68 # Sanity-check that verification indeed succeeds if peer verification 114 # Sanity-check that verification indeed fails without the
|
/openssl/doc/man3/ |
H A D | DH_generate_parameters.pod | 8 - generate and check Diffie-Hellman 65 This is a lightweight check, if a more thorough check is needed, use 143 if the check could be performed, 0 otherwise. 149 check is successful, 0 for failed.
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 72 Returning 0 allows the algorithm to fail, in the same way that a strict check 75 - To control an algorithm context's checks via code requires a setter for each individual check e.g… 85 If the setter is needed it must be set BEFORE the FIPS related check is done. 87 If the FIPS related approved mode check fails and either the ctx setter is zero 139 - Existing security check changes 180 Delaying the check to after the init would be possible, but it would be a change 277 …If we chose not to remove them , then we need to check that OSSL_PKEY_PARAM_USE_COFACTOR_ECDH is s… 313 Do we need to check which algorithms allow SHA1 also? 323 We should only allow AES. We currently just check the mode. 327 - PBKDF2 'lower_bound_checks' needs to be part of the indicator check [all …]
|
/openssl/dev/release-aux/ |
H A D | openssl-announce-pre-release.tmpl | 39 Please download and check this $label release as soon as possible. 44 Please check the release notes and mailing lists to avoid duplicate
|