| /third_party/ltp/lib/ |
| H A D | tst_fips.c | 16 int fips = 0; in tst_fips_enabled() local 19 SAFE_FILE_SCANF(PATH_FIPS, "%d", &fips); in tst_fips_enabled() 22 tst_res(TINFO, "FIPS: %s", fips ? "on" : "off"); in tst_fips_enabled() 23 return fips; in tst_fips_enabled()
|
| /third_party/openssl/test/ssl-tests/ |
| H A D | protocol_version.pm | 105 my ($dtls, $fips) = @_; 106 if ($dtls && $fips) { 115 my $fips = shift; 126 if ($fips) { 140 if (no_tests($dtls, $fips)) { 223 my $fips = shift; 233 if ($fips) {
|
| /kernel/linux/linux-6.6/crypto/ |
| H A D | api.c | 237 const u32 fips = CRYPTO_ALG_FIPS_INTERNAL; in crypto_alg_lookup() local 245 alg = __crypto_alg_lookup(name, (type | test) & ~fips, in crypto_alg_lookup() 246 (mask | test) & ~fips); in crypto_alg_lookup() 248 if (((type | mask) ^ fips) & fips) in crypto_alg_lookup() 249 mask |= fips; in crypto_alg_lookup() 250 mask &= fips; in crypto_alg_lookup()
|
| H A D | fips.c | 9 #include <linux/fips.h> 23 /* Process kernel command-line parameter at boot time. fips=0 or fips=1 */ 27 printk(KERN_INFO "fips mode: %s\n", in fips_enable() 32 __setup("fips=", fips_enable);
|
| H A D | proc.c | 14 #include <linux/fips.h> 53 seq_printf(m, "fips : %s\n", in c_show()
|
| H A D | kdf_sp800108.c | 9 #include <linux/fips.h>
|
| H A D | rsa_helper.c | 11 #include <linux/fips.h>
|
| /third_party/openssl/test/ |
| H A D | endecode_test.c | 537 static int test_unprotected_via_DER(const char *type, EVP_PKEY *key, int fips) in test_unprotected_via_DER() argument 545 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_DER() 559 static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key, int fips) in test_unprotected_via_PEM() argument 567 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_PEM() 714 static int test_protected_via_DER(const char *type, EVP_PKEY *key, int fips) in test_protected_via_DER() argument 723 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_DER() 737 static int test_protected_via_PEM(const char *type, EVP_PKEY *key, int fips) in test_protected_via_PEM() argument 746 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_PEM() 807 static int test_public_via_DER(const char *type, EVP_PKEY *key, int fips) in test_public_via_DER() argument 815 fips in test_public_via_DER() 829 test_public_via_PEM(const char *type, EVP_PKEY *key, int fips) test_public_via_PEM() argument [all...] |
| /kernel/linux/linux-6.6/include/crypto/ |
| H A D | xts.h | 7 #include <linux/fips.h>
|
| H A D | drbg.h | 52 #include <linux/fips.h>
|
| /kernel/linux/linux-5.10/include/crypto/ |
| H A D | xts.h | 7 #include <linux/fips.h>
|
| H A D | drbg.h | 52 #include <linux/fips.h>
|
| /kernel/linux/linux-5.10/crypto/ |
| H A D | fips.c | 9 #include <linux/fips.h> 22 /* Process kernel command-line parameter at boot time. fips=0 or fips=1 */ 26 printk(KERN_INFO "fips mode: %s\n", in fips_enable() 31 __setup("fips=", fips_enable);
|
| H A D | jitterentropy-kcapi.c | 43 #include <linux/fips.h>
|
| H A D | rsa_helper.c | 11 #include <linux/fips.h>
|
| H A D | sm2.c | 26 unsigned int fips:1; /* True if this is a FIPS140-2 approved curve */ member 51 .fips = 0,
|
| /kernel/linux/linux-6.6/fs/smb/client/ |
| H A D | smbencrypt.c | 16 #include <linux/fips.h>
|
| /kernel/linux/linux-5.10/include/crypto/internal/ |
| H A D | des.h | 10 #include <linux/fips.h>
|
| /kernel/linux/linux-6.6/include/crypto/internal/ |
| H A D | des.h | 10 #include <linux/fips.h>
|
| /third_party/rust/crates/rust-openssl/openssl/src/ |
| H A D | lib.rs | 158 pub mod fips; modules
|
| /kernel/linux/linux-5.10/drivers/crypto/ccree/ |
| H A D | cc_fips.c | 5 #include <linux/fips.h> 94 panic("ccree: TEE reported cryptographic error in fips mode!\n"); in tee_fips_error() 100 * This function check if cryptocell tee fips error occurred 145 dev_dbg(dev, "Initializing fips tasklet\n"); in cc_fips_init()
|
| /kernel/linux/linux-6.6/drivers/crypto/ccree/ |
| H A D | cc_fips.c | 5 #include <linux/fips.h> 94 panic("ccree: TEE reported cryptographic error in fips mode!\n"); in tee_fips_error() 100 * This function check if cryptocell tee fips error occurred 145 dev_dbg(dev, "Initializing fips tasklet\n"); in cc_fips_init()
|
| /third_party/curl/tests/ |
| H A D | secureserver.pl | 213 elsif($verstr =~ /^sslVersion.*fips *= *yes/) { 214 # the fips option causes an error if stunnel doesn't support it 296 # disable fips in case OpenSSL doesn't support it 297 print $stunconf "fips = no\n"; 326 print "fips = no\n";
|
| /third_party/node/deps/openssl/config/ |
| H A D | Makefile | 28 COPTS = no-comp no-shared no-afalgeng enable-ssl-trace enable-fips
|
| /kernel/linux/linux-5.10/fs/cifs/ |
| H A D | smbencrypt.c | 16 #include <linux/fips.h>
|