OPENSSL-FIPSINSTALL(1ossl) OpenSSL OPENSSL-FIPSINSTALL(1ossl)
NAME
openssl-fipsinstall - perform FIPS configuration installation
SYNOPSIS
openssl fipsinstall [-help] [-in configfilename] [-out configfilename]
[-module modulefilename] [-provider_name providername] [-section_name
sectionname] [-verify] [-mac_name macname] [-macopt nm:v] [-noout]
[-quiet] [-pedantic] [-no_conditional_errors] [-no_security_checks]
[-hmac_key_check] [-kmac_key_check] [-ems_check]
[-no_drbg_truncated_digests] [-signature_digest_check]
[-hkdf_digest_check] [-tls13_kdf_digest_check] [-tls1_prf_digest_check]
[-sshkdf_digest_check] [-sskdf_digest_check] [-x963kdf_digest_check]
[-dsa_sign_disabled] [-no_pbkdf2_lower_bound_check] [-no_short_mac]
[-tdes_encrypt_disabled] [-rsa_pkcs15_padding_disabled]
[-rsa_pss_saltlen_check] [-rsa_sign_x931_disabled] [-hkdf_key_check]
[-kbkdf_key_check] [-tls13_kdf_key_check] [-tls1_prf_key_check]
[-sshkdf_key_check] [-sskdf_key_check] [-x963kdf_key_check]
[-x942kdf_key_check] [-ecdh_cofactor_check] [-self_test_onload]
[-self_test_oninstall] [-corrupt_desc selftest_description]
[-corrupt_type selftest_type] [-config parent_config]
DESCRIPTION
This command is used to generate a FIPS module configuration file.
This configuration file can be used each time a FIPS module is loaded
in order to pass data to the FIPS module self tests. The FIPS module
always verifies its MAC, but optionally only needs to run the KAT's
once, at installation.
The generated configuration file consists of:
- A MAC of the FIPS module file.
- A test status indicator.
This indicates if the Known Answer Self Tests (KAT's) have
successfully run.
- A MAC of the status indicator.
- A control for conditional self tests errors.
By default if a continuous test (e.g a key pair test) fails then
the FIPS module will enter an error state, and no services or
cryptographic algorithms will be able to be accessed after this
point. The default value of '1' will cause the fips module error
state to be entered. If the value is '0' then the module error
state will not be entered. Regardless of whether the error state
is entered or not, the current operation (e.g. key generation) will
return an error. The user is responsible for retrying the operation
if the module error state is not entered.
- A control to indicate whether run-time security checks are done.
This indicates if run-time checks related to enforcement of
security parameters such as minimum security strength of keys and
approved curve names are used. The default value of '1' will
perform the checks. If the value is '0' the checks are not
performed and FIPS compliance must be done by procedures documented
in the relevant Security Policy.
This file is described in fips_config(5).
OPTIONS
-help
Print a usage message.
-module filename
Filename of the FIPS module to perform an integrity check on. The
path provided in the filename is used to load the module when it is
activated, and this overrides the environment variable
OPENSSL_MODULES.
-out configfilename
Filename to output the configuration data to; the default is
standard output.
-in configfilename
Input filename to load configuration data from. Must be used if
the -verify option is specified.
-verify
Verify that the input configuration file contains the correct
information.
-provider_name providername
Name of the provider inside the configuration file. The default
value is "fips".
-section_name sectionname
Name of the section inside the configuration file. The default
value is "fips_sect".
-mac_name name
Specifies the name of a supported MAC algorithm which will be used.
The MAC mechanisms that are available will depend on the options
used when building OpenSSL. To see the list of supported MAC's use
the command "openssl list -mac-algorithms". The default is HMAC.
-macopt nm:v
Passes options to the MAC algorithm. A comprehensive list of
controls can be found in the EVP_MAC implementation documentation.
Common control strings used for this command are:
key:string
Specifies the MAC key as an alphanumeric string (use if the key
contains printable characters only). The string length must
conform to any restrictions of the MAC algorithm. A key must
be specified for every MAC algorithm. If no key is provided,
the default that was specified when OpenSSL was configured is
used.
hexkey:string
Specifies the MAC key in hexadecimal form (two hex digits per
byte). The key length must conform to any restrictions of the
MAC algorithm. A key must be specified for every MAC
algorithm. If no key is provided, the default that was
specified when OpenSSL was configured is used.
digest:string
Used by HMAC as an alphanumeric string (use if the key contains
printable characters only). The string length must conform to
any restrictions of the MAC algorithm. To see the list of
supported digests, use the command "openssl list
-digest-commands". The default digest is SHA-256.
-noout
Disable logging of the self tests.
-pedantic
Configure the module so that it is strictly FIPS compliant rather
than being backwards compatible. This enables conditional errors,
security checks etc. Note that any previous configuration options
will be overwritten and any subsequent configuration options that
violate FIPS compliance will result in an error.
-no_conditional_errors
Configure the module to not enter an error state if a conditional
self test fails as described above.
-no_security_checks
Configure the module to not perform run-time security checks as
described above.
Enabling the configuration option "no-fips-securitychecks" provides
another way to turn off the check at compile time.
-ems_check
Configure the module to enable a run-time Extended Master Secret
(EMS) check when using the TLS1_PRF KDF algorithm. This check is
disabled by default. See RFC 7627 for information related to EMS.
-no_short_mac
Configure the module to not allow short MAC outputs. See SP
800-185 8.4.2 and FIPS 140-3 ID C.D for details.
-hmac_key_check
Configure the module to not allow small keys sizes when using HMAC.
See SP 800-131Ar2 for details.
-kmac_key_check
Configure the module to not allow small keys sizes when using KMAC.
See SP 800-131Ar2 for details.
-no_drbg_truncated_digests
Configure the module to not allow truncated digests to be used with
Hash and HMAC DRBGs. See FIPS 140-3 IG D.R for details.
-signature_digest_check
Configure the module to enforce signature algorithms to use digests
that are explicitly permitted by the various standards.
-hkdf_digest_check
This option is deprecated.
-tls13_kdf_digest_check
Configure the module to enable a run-time digest check when
deriving a key by TLS13 KDF. See RFC 8446 for details.
-tls1_prf_digest_check
Configure the module to enable a run-time digest check when
deriving a key by TLS_PRF. See NIST SP 800-135r1 for details.
-sshkdf_digest_check
Configure the module to enable a run-time digest check when
deriving a key by SSHKDF. See NIST SP 800-135r1 for details.
-sskdf_digest_check
This option is deprecated.
-x963kdf_digest_check
Configure the module to enable a run-time digest check when
deriving a key by X963KDF. See NIST SP 800-131Ar2 for details.
-dsa_sign_disabled
Configure the module to not allow DSA signing (DSA signature
verification is still allowed). See FIPS 140-3 IG C.K for details.
-tdes_encrypt_disabled
Configure the module to not allow Triple-DES encryption. Triple-
DES decryption is still allowed for legacy purposes. See
SP800-131Ar2 for details.
-rsa_pkcs15_padding_disabled
Configure the module to not allow PKCS#1 version 1.5 padding to be
used with RSA for key transport and key agreement. See NIST's SP
800-131A Revision 2 for details.
-rsa_pss_saltlen_check
Configure the module to enable a run-time salt length check when
generating or verifying a RSA-PSS signature. See FIPS 186-5 5.4
(g) for details.
-rsa_sign_x931_disabled
Configure the module to not allow X9.31 padding to be used when
signing with RSA. See FIPS 140-3 IG C.K for details.
-hkdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by HKDF. See NIST SP 800-131Ar2 for
details.
-kbkdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by KBKDF. See NIST SP 800-131Ar2 for
details.
-tls13_kdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by TLS13 KDF. See NIST SP 800-131Ar2 for
details.
-tls1_prf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by TLS_PRF. See NIST SP 800-131Ar2 for
details.
-sshkdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by SSHKDF. See NIST SP 800-131Ar2 for
details.
-sskdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by SSKDF. See NIST SP 800-131Ar2 for
details.
-x963kdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by X963KDF. See NIST SP 800-131Ar2 for
details.
-x942kdf_key_check
Configure the module to enable a run-time short key-derivation key
check when deriving a key by X942KDF. See NIST SP 800-131Ar2 for
details.
-no_pbkdf2_lower_bound_check
Configure the module to not perform run-time lower bound check for
PBKDF2. See NIST SP 800-132 for details.
-ecdh_cofactor_check
Configure the module to enable a run-time check that ECDH uses the
EC curves cofactor value when deriving a key. This only affects the
'B' and 'K' curves. See SP 800-56A r3 Section 5.7.1.2 for details.
-self_test_onload
Do not write the two fields related to the "test status indicator"
and "MAC status indicator" to the output configuration file.
Without these fields the self tests KATS will run each time the
module is loaded. This option could be used for cross compiling,
since the self tests need to run at least once on each target
machine. Once the self tests have run on the target machine the
user could possibly then add the 2 fields into the configuration
using some other mechanism. This option defaults to 0 for any
OpenSSL FIPS 140-2 provider (OpenSSL 3.0.X). and is not relevant
for an OpenSSL FIPS 140-3 provider, since this is no longer
allowed.
-self_test_oninstall
The converse of -self_test_oninstall. The two fields related to
the "test status indicator" and "MAC status indicator" are written
to the output configuration file. This field is not relevant for
an OpenSSL FIPS 140-3 provider, since this is no longer allowed.
-quiet
Do not output pass/fail messages. Implies -noout.
-corrupt_desc selftest_description, -corrupt_type selftest_type
The corrupt options can be used to test failure of one or more self
tests by name. Either option or both may be used to select the
tests to corrupt. Refer to the entries for st-desc and st-type in
OSSL_PROVIDER-FIPS(7) for values that can be used.
-config parent_config
Test that a FIPS provider can be loaded from the specified
configuration file. A previous call to this application needs to
generate the extra configuration data that is included by the base
"parent_config" configuration file. See config(5) for further
information on how to set up a provider section. All other options
are ignored if '-config' is used.
NOTES
Self tests results are logged by default if the options -quiet and
-noout are not specified, or if either of the options -corrupt_desc or
-corrupt_type are used. If the base configuration file is set up to
autoload the fips module, then the fips module will be loaded and self
tested BEFORE the fipsinstall application has a chance to set up its
own self test callback. As a result of this the self test output and
the options -corrupt_desc and -corrupt_type will be ignored. For
normal usage the base configuration file should use the default
provider when generating the fips configuration file.
The -self_test_oninstall option was added and the -self_test_onload
option was made the default in OpenSSL 3.1.
The command and all remaining options were added in OpenSSL 3.0.
EXAMPLES
Calculate the mac of a FIPS module fips.so and run a FIPS self test for
the module, and save the fips.cnf configuration file:
openssl fipsinstall -module ./fips.so -out fips.cnf -provider_name fips
Verify that the configuration file fips.cnf contains the correct info:
openssl fipsinstall -module ./fips.so -in fips.cnf -provider_name fips -verify
Corrupt any self tests which have the description "SHA1":
openssl fipsinstall -module ./fips.so -out fips.cnf -provider_name fips \
-corrupt_desc 'SHA1'
Validate that the fips module can be loaded from a base configuration
file:
export OPENSSL_CONF_INCLUDE=<path of configuration files>
export OPENSSL_MODULES=<provider-path>
openssl fipsinstall -config' 'default.cnf'
SEE ALSO
config(5), fips_config(5), OSSL_PROVIDER-FIPS(7), EVP_MAC(3)
HISTORY
The openssl-fipsinstall application was added in OpenSSL 3.0.
The following options were added in OpenSSL 3.1:
-ems_check, -self_test_oninstall
The following options were added in OpenSSL 3.2:
-pedantic, -no_drbg_truncated_digests
The following options were added in OpenSSL 3.4:
-hmac_key_check, -kmac_key_check, -signature_digest_check,
-hkdf_digest_check, -tls13_kdf_digest_check, -tls1_prf_digest_check,
-sshkdf_digest_check, -sskdf_digest_check, -x963kdf_digest_check,
-dsa_sign_disabled, -no_pbkdf2_lower_bound_check, -no_short_mac,
-tdes_encrypt_disabled, -rsa_pkcs15_padding_disabled,
-rsa_pss_saltlen_check, -rsa_sign_x931_disabled, -hkdf_key_check,
-kbkdf_key_check, -tls13_kdf_key_check, -tls1_prf_key_check,
-sshkdf_key_check, -sskdf_key_check, -x963kdf_key_check,
-x942kdf_key_check, -ecdh_cofactor_check
COPYRIGHT
Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the Apache License 2.0 (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy
in the file LICENSE in the source distribution or at
<https://www.openssl.org/source/license.html>.
3.5.2 2025-08-07 OPENSSL-FIPSINSTALL(1ossl)
openssl 3.5.2 - Generated Fri Aug 8 05:31:03 CDT 2025
