Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

  
 
  

home | help
OPENSSL-FIPSINSTALL(1ossl)	    OpenSSL	    OPENSSL-FIPSINSTALL(1ossl)

NAME
       openssl-fipsinstall - perform FIPS configuration	installation

SYNOPSIS
       openssl fipsinstall [-help] [-in	configfilename]	[-out configfilename]
       [-module	modulefilename]	[-provider_name	providername] [-section_name
       sectionname] [-verify] [-mac_name macname] [-macopt nm:v] [-noout]
       [-quiet]	[-pedantic] [-no_conditional_errors] [-no_security_checks]
       [-hmac_key_check] [-kmac_key_check] [-ems_check]
       [-no_drbg_truncated_digests] [-signature_digest_check]
       [-hkdf_digest_check] [-tls13_kdf_digest_check] [-tls1_prf_digest_check]
       [-sshkdf_digest_check] [-sskdf_digest_check] [-x963kdf_digest_check]
       [-dsa_sign_disabled] [-no_pbkdf2_lower_bound_check] [-no_short_mac]
       [-tdes_encrypt_disabled]	[-rsa_pkcs15_padding_disabled]
       [-rsa_pss_saltlen_check]	[-rsa_sign_x931_disabled] [-hkdf_key_check]
       [-kbkdf_key_check] [-tls13_kdf_key_check] [-tls1_prf_key_check]
       [-sshkdf_key_check] [-sskdf_key_check] [-x963kdf_key_check]
       [-x942kdf_key_check] [-ecdh_cofactor_check] [-self_test_onload]
       [-self_test_oninstall] [-corrupt_desc selftest_description]
       [-corrupt_type selftest_type] [-config parent_config]

DESCRIPTION
       This command is used to generate	a FIPS module configuration file.
       This configuration file can be used each	time a FIPS module is loaded
       in order	to pass	data to	the FIPS module	self tests. The	FIPS module
       always verifies its MAC,	but optionally only needs to run the KAT's
       once, at	installation.

       The generated configuration file	consists of:

       - A MAC of the FIPS module file.
       - A test	status indicator.
	   This	 indicates  if	the  Known  Answer  Self  Tests	 (KAT's)  have
	   successfully	run.

       - A MAC of the status indicator.
       - A control for conditional self	tests errors.
	   By default if a continuous test (e.g	a key pair  test)  fails  then
	   the	FIPS  module  will  enter  an  error state, and	no services or
	   cryptographic algorithms will be able to  be	 accessed  after  this
	   point.   The	 default value of '1' will cause the fips module error
	   state to be entered.	 If the	value is '0'  then  the	 module	 error
	   state  will	not be entered.	 Regardless of whether the error state
	   is entered or not, the current operation (e.g. key generation) will
	   return an error. The	user is	responsible for	retrying the operation
	   if the module error state is	not entered.

       - A control to indicate whether run-time	security checks	are done.
	   This	 indicates  if	run-time  checks  related  to  enforcement  of
	   security  parameters	 such as minimum security strength of keys and
	   approved curve names	are used.   The	 default  value	 of  '1'  will
	   perform  the	 checks.   If  the  value  is  '0'  the	checks are not
	   performed and FIPS compliance must be done by procedures documented
	   in the relevant Security Policy.

       This file is described in fips_config(5).

OPTIONS
       -help
	   Print a usage message.

       -module filename
	   Filename of the FIPS	module to perform an integrity check on.   The
	   path	provided in the	filename is used to load the module when it is
	   activated,	 and   this   overrides	  the	environment   variable
	   OPENSSL_MODULES.

       -out configfilename
	   Filename to output  the  configuration  data	 to;  the  default  is
	   standard output.

       -in configfilename
	   Input  filename  to	load configuration data	from.  Must be used if
	   the -verify option is specified.

       -verify
	   Verify that the  input  configuration  file	contains  the  correct
	   information.

       -provider_name providername
	   Name	 of  the  provider inside the configuration file.  The default
	   value is "fips".

       -section_name sectionname
	   Name	of the section inside the  configuration  file.	  The  default
	   value is "fips_sect".

       -mac_name name
	   Specifies the name of a supported MAC algorithm which will be used.
	   The	MAC  mechanisms	 that are available will depend	on the options
	   used	when building OpenSSL.	To see the list	of supported MAC's use
	   the command "openssl	list -mac-algorithms".	The default is HMAC.

       -macopt nm:v
	   Passes options to the  MAC  algorithm.   A  comprehensive  list  of
	   controls  can be found in the EVP_MAC implementation	documentation.
	   Common control strings used for this	command	are:

	   key:string
	       Specifies the MAC key as	an alphanumeric	string (use if the key
	       contains	printable characters only).  The  string  length  must
	       conform	to  any	restrictions of	the MAC	algorithm.  A key must
	       be specified for	every MAC algorithm.  If no key	 is  provided,
	       the  default  that was specified	when OpenSSL was configured is
	       used.

	   hexkey:string
	       Specifies the MAC key in	hexadecimal form (two hex  digits  per
	       byte).	The key	length must conform to any restrictions	of the
	       MAC  algorithm.	 A  key	 must  be  specified  for  every   MAC
	       algorithm.   If	no  key	 is  provided,	the  default  that was
	       specified when OpenSSL was configured is	used.

	   digest:string
	       Used by HMAC as an alphanumeric string (use if the key contains
	       printable characters only).  The	string length must conform  to
	       any  restrictions  of  the  MAC	algorithm.  To see the list of
	       supported   digests,   use   the	   command    "openssl	  list
	       -digest-commands".  The default digest is SHA-256.

       -noout
	   Disable logging of the self tests.

       -pedantic
	   Configure  the  module so that it is	strictly FIPS compliant	rather
	   than	being backwards	compatible.  This enables conditional  errors,
	   security  checks etc.  Note that any	previous configuration options
	   will	be overwritten and any subsequent configuration	 options  that
	   violate FIPS	compliance will	result in an error.

       -no_conditional_errors
	   Configure  the  module to not enter an error	state if a conditional
	   self	test fails as described	above.

       -no_security_checks
	   Configure the module	to not perform	run-time  security  checks  as
	   described above.

	   Enabling the	configuration option "no-fips-securitychecks" provides
	   another way to turn off the check at	compile	time.

       -ems_check
	   Configure  the  module  to enable a run-time	Extended Master	Secret
	   (EMS) check when using the TLS1_PRF KDF algorithm.  This  check  is
	   disabled by default.	 See RFC 7627 for information related to EMS.

       -no_short_mac
	   Configure  the  module  to  not  allow  short  MAC outputs.	See SP
	   800-185 8.4.2 and FIPS 140-3	ID C.D for details.

       -hmac_key_check
	   Configure the module	to not allow small keys	sizes when using HMAC.
	   See SP 800-131Ar2 for details.

       -kmac_key_check
	   Configure the module	to not allow small keys	sizes when using KMAC.
	   See SP 800-131Ar2 for details.

       -no_drbg_truncated_digests
	   Configure the module	to not allow truncated digests to be used with
	   Hash	and HMAC DRBGs.	 See FIPS 140-3	IG D.R for details.

       -signature_digest_check
	   Configure the module	to enforce signature algorithms	to use digests
	   that	are explicitly permitted by the	various	standards.

       -hkdf_digest_check
	   This	option is deprecated.

       -tls13_kdf_digest_check
	   Configure the  module  to  enable  a	 run-time  digest  check  when
	   deriving a key by TLS13 KDF.	 See RFC 8446 for details.

       -tls1_prf_digest_check
	   Configure  the  module  to  enable  a  run-time  digest  check when
	   deriving a key by TLS_PRF.  See NIST	SP 800-135r1 for details.

       -sshkdf_digest_check
	   Configure the  module  to  enable  a	 run-time  digest  check  when
	   deriving a key by SSHKDF.  See NIST SP 800-135r1 for	details.

       -sskdf_digest_check
	   This	option is deprecated.

       -x963kdf_digest_check
	   Configure  the  module  to  enable  a  run-time  digest  check when
	   deriving a key by X963KDF.  See NIST	SP 800-131Ar2 for details.

       -dsa_sign_disabled
	   Configure the module	 to  not  allow	 DSA  signing  (DSA  signature
	   verification	is still allowed). See FIPS 140-3 IG C.K for details.

       -tdes_encrypt_disabled
	   Configure  the  module to not allow Triple-DES encryption.  Triple-
	   DES	decryption  is	still  allowed	for  legacy   purposes.	   See
	   SP800-131Ar2	for details.

       -rsa_pkcs15_padding_disabled
	   Configure  the module to not	allow PKCS#1 version 1.5 padding to be
	   used	with RSA for key transport and key agreement.  See  NIST's  SP
	   800-131A Revision 2 for details.

       -rsa_pss_saltlen_check
	   Configure  the  module  to enable a run-time	salt length check when
	   generating or verifying a RSA-PSS signature.	 See  FIPS  186-5  5.4
	   (g) for details.

       -rsa_sign_x931_disabled
	   Configure  the  module  to  not allow X9.31 padding to be used when
	   signing with	RSA.  See FIPS 140-3 IG	C.K for	details.

       -hkdf_key_check
	   Configure the module	to enable a run-time short key-derivation  key
	   check  when	deriving  a  key  by HKDF.  See	NIST SP	800-131Ar2 for
	   details.

       -kbkdf_key_check
	   Configure the module	to enable a run-time short key-derivation  key
	   check  when	deriving  a  key by KBKDF.  See	NIST SP	800-131Ar2 for
	   details.

       -tls13_kdf_key_check
	   Configure the module	to enable a run-time short key-derivation  key
	   check when deriving a key by	TLS13 KDF.  See	NIST SP	800-131Ar2 for
	   details.

       -tls1_prf_key_check
	   Configure  the module to enable a run-time short key-derivation key
	   check when deriving a key by	TLS_PRF.  See NIST SP  800-131Ar2  for
	   details.

       -sshkdf_key_check
	   Configure  the module to enable a run-time short key-derivation key
	   check when deriving a key by	SSHKDF.	 See NIST  SP  800-131Ar2  for
	   details.

       -sskdf_key_check
	   Configure  the module to enable a run-time short key-derivation key
	   check when deriving a key by	SSKDF.	See  NIST  SP  800-131Ar2  for
	   details.

       -x963kdf_key_check
	   Configure  the module to enable a run-time short key-derivation key
	   check when deriving a key by	X963KDF.  See NIST SP  800-131Ar2  for
	   details.

       -x942kdf_key_check
	   Configure  the module to enable a run-time short key-derivation key
	   check when deriving a key by	X942KDF.  See NIST SP  800-131Ar2  for
	   details.

       -no_pbkdf2_lower_bound_check
	   Configure  the module to not	perform	run-time lower bound check for
	   PBKDF2.  See	NIST SP	800-132	for details.

       -ecdh_cofactor_check
	   Configure the module	to enable a run-time check that	ECDH uses  the
	   EC curves cofactor value when deriving a key. This only affects the
	   'B' and 'K' curves.	See SP 800-56A r3 Section 5.7.1.2 for details.

       -self_test_onload
	   Do  not write the two fields	related	to the "test status indicator"
	   and "MAC  status  indicator"	 to  the  output  configuration	 file.
	   Without  these  fields  the	self tests KATS	will run each time the
	   module is loaded. This option could be used	for  cross  compiling,
	   since  the  self  tests  need  to  run at least once	on each	target
	   machine. Once the self tests	have run on  the  target  machine  the
	   user	 could	possibly  then add the 2 fields	into the configuration
	   using some other mechanism.	This option  defaults  to  0  for  any
	   OpenSSL  FIPS  140-2	provider (OpenSSL 3.0.X).  and is not relevant
	   for an OpenSSL  FIPS	 140-3	provider,  since  this	is  no	longer
	   allowed.

       -self_test_oninstall
	   The	converse  of  -self_test_oninstall.  The two fields related to
	   the "test status indicator" and "MAC	status indicator" are  written
	   to  the  output configuration file.	This field is not relevant for
	   an OpenSSL FIPS 140-3 provider, since this is no longer allowed.

       -quiet
	   Do not output pass/fail messages. Implies -noout.

       -corrupt_desc selftest_description, -corrupt_type selftest_type
	   The corrupt options can be used to test failure of one or more self
	   tests by name.  Either option or both may be	 used  to  select  the
	   tests  to corrupt.  Refer to	the entries for	st-desc	and st-type in
	   OSSL_PROVIDER-FIPS(7) for values that can be	used.

       -config parent_config
	   Test	that  a	 FIPS  provider	 can  be  loaded  from	the  specified
	   configuration  file.	  A previous call to this application needs to
	   generate the	extra configuration data that is included by the  base
	   "parent_config"  configuration  file.   See	config(5)  for further
	   information on how to set up	a provider section.  All other options
	   are ignored if '-config' is used.

NOTES
       Self tests results are logged by	default	 if  the  options  -quiet  and
       -noout  are not specified, or if	either of the options -corrupt_desc or
       -corrupt_type are used.	If the base configuration file is  set	up  to
       autoload	 the fips module, then the fips	module will be loaded and self
       tested BEFORE the fipsinstall application has a chance to  set  up  its
       own  self  test	callback. As a result of this the self test output and
       the options -corrupt_desc  and  -corrupt_type  will  be	ignored.   For
       normal  usage  the  base	 configuration	file  should  use  the default
       provider	when generating	the fips configuration file.

       The -self_test_oninstall	option was  added  and	the  -self_test_onload
       option was made the default in OpenSSL 3.1.

       The command and all remaining options were added	in OpenSSL 3.0.

EXAMPLES
       Calculate the mac of a FIPS module fips.so and run a FIPS self test for
       the module, and save the	fips.cnf configuration file:

	openssl	fipsinstall -module ./fips.so -out fips.cnf -provider_name fips

       Verify that the configuration file fips.cnf contains the	correct	info:

	openssl	fipsinstall -module ./fips.so -in fips.cnf  -provider_name fips	-verify

       Corrupt any self	tests which have the description "SHA1":

	openssl	fipsinstall -module ./fips.so -out fips.cnf -provider_name fips	\
		-corrupt_desc 'SHA1'

       Validate	 that  the fips	module can be loaded from a base configuration
       file:

	export OPENSSL_CONF_INCLUDE=<path of configuration files>
	export OPENSSL_MODULES=<provider-path>
	openssl	fipsinstall -config' 'default.cnf'

SEE ALSO
       config(5), fips_config(5), OSSL_PROVIDER-FIPS(7), EVP_MAC(3)

HISTORY
       The openssl-fipsinstall application was added in	OpenSSL	3.0.

       The following options were added	in OpenSSL 3.1:

       -ems_check, -self_test_oninstall

       The following options were added	in OpenSSL 3.2:

       -pedantic, -no_drbg_truncated_digests

       The following options were added	in OpenSSL 3.4:

       -hmac_key_check,	      -kmac_key_check,	      -signature_digest_check,
       -hkdf_digest_check,   -tls13_kdf_digest_check,  -tls1_prf_digest_check,
       -sshkdf_digest_check,	-sskdf_digest_check,	-x963kdf_digest_check,
       -dsa_sign_disabled,     -no_pbkdf2_lower_bound_check,	-no_short_mac,
       -tdes_encrypt_disabled,			 -rsa_pkcs15_padding_disabled,
       -rsa_pss_saltlen_check,	  -rsa_sign_x931_disabled,    -hkdf_key_check,
       -kbkdf_key_check,      -tls13_kdf_key_check,	  -tls1_prf_key_check,
       -sshkdf_key_check,	  -sskdf_key_check,	   -x963kdf_key_check,
       -x942kdf_key_check, -ecdh_cofactor_check

COPYRIGHT
       Copyright 2019-2025 The OpenSSL Project Authors.	All Rights Reserved.

       Licensed	under the Apache License 2.0 (the "License").  You may not use
       this file except	in compliance with the License.	 You can obtain	a copy
       in   the	  file	 LICENSE   in	the   source   distribution   or    at
       <https://www.openssl.org/source/license.html>.

3.5.4				  2025-09-30	    OPENSSL-FIPSINSTALL(1ossl)

Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=openssl-fipsinstall&sektion=1&manpath=FreeBSD+15.0-RELEASE+and+Ports>

home | help