Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2989858imm; Sun, 1 Jul 2018 09:49:56 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdNn0mqdkEaGq3Gk/V4vK6w3O+e5DO5VwPlVbakI0gjAzsEKkDlADnST+OrobvBIueBGR+N X-Received: by 2002:a17:902:9695:: with SMTP id n21-v6mr9868424plp.6.1530463796377; Sun, 01 Jul 2018 09:49:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530463796; cv=none; d=google.com; s=arc-20160816; b=zEm6u3bzUZp56KUFst+6LqzEI+M7UlFI/s4bYAtfJwSjBocBuWgKfQldfkwXqiqK+e BIfy5Zw4W0uj6FVchGseqH+LomTGKkKNcffUzTmLjT5MD5Xug8dgLYYd0KeSzLsh4IRW QIwpajwcl1oWv0wH7Vn3hqpyGeElpVstJ7579lDtmi5tGWqkmM1lKA7YFoOo+oV1lWYU 22WhWt9lpuXjArvZW8zUQarV9NkYSoSmUvgFMIOUOe3ssXQrHvCpnVvQ9x5cT3+Jrnqp /2MdEQgjZLzprtee7K99iI18uku8pLBkZBC9Kvd35C2eVnevmVsVzsqBLDeyKXWFM9kj gjXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=ml2d/AVS8vKLhmI8nzKTS0KLbnpnlT+TSRcX/+UR3gY=; b=PM38SEJN+VGdNcfx/WJ1PyllUlUhpqYstIdkUUSKHDaGR4Lfa3uhYOpOHBnGszj49l eakby6z0CZN4r3y5RkVVE964a/EA9kW9ar1KLZSlgYz+b0+ff+5QECHJkQxO2LD4xlx3 GCbmgz6yomQIau8so4j3aPy/rIB0Tvgguxns0GTXA5wbrEBATqQm9x2T0cLnWsMYizrr 9MKpoff7MFIxtQjBw3yYoX11P5ZtRzxyuMbGo6KPYSq2gMpZosATxHKwSPy/2uEVdAIw 40ni4KvRaCFPTKO1WlB+ij6PDiUQcj56tpkBYxvHJTOmcfMj+cOAMI6kt2t7TBByCvC2 7K4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@lakedaemon.net header.s=mail header.b=JseEuHbD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si14512118plc.415.2018.07.01.09.49.42; Sun, 01 Jul 2018 09:49:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@lakedaemon.net header.s=mail header.b=JseEuHbD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753830AbeGAQsW (ORCPT + 99 others); Sun, 1 Jul 2018 12:48:22 -0400 Received: from outbound1.eu.mailhop.org ([52.28.251.132]:35401 "EHLO outbound1.eu.mailhop.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753710AbeGAQsR (ORCPT ); Sun, 1 Jul 2018 12:48:17 -0400 X-MHO-RoutePath: amFjMjk5NzkyNDU4 X-MHO-User: 4a9b326c-7d4c-11e8-aa1a-954dbaed88ca X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information X-Originating-IP: 108.39.81.162 X-Mail-Handler: DuoCircle Outbound SMTP Received: from io (unknown [108.39.81.162]) by outbound1.eu.mailhop.org (Halon) with ESMTPSA id 4a9b326c-7d4c-11e8-aa1a-954dbaed88ca; Sun, 01 Jul 2018 16:32:08 +0000 (UTC) Received: from io.lakedaemon.net (localhost [127.0.0.1]) by io (Postfix) with ESMTP id 0A7A38007B; Sun, 1 Jul 2018 16:32:05 +0000 (UTC) X-DKIM: OpenDKIM Filter v2.6.8 io 0A7A38007B DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lakedaemon.net; s=mail; t=1530462725; bh=ml2d/AVS8vKLhmI8nzKTS0KLbnpnlT+TSRcX/+UR3gY=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=JseEuHbDpstExzoaVxSucibFsxmqzBYa1Yev0PccEubRyo2WGKPW/3UOQIpHX+T8E u15aYCzbytLVWXSIfiS6dzjC+UuQvy1LWVKDkV/qW/rUAhxRMM1KVJbaPrUqCpe1sG YXm6a2c+9Rq9l9JMSGCZX15qu+SmjO+JLMfliLlQmfW5xiAe0SXg/na8uvlfChvcOk HlLEvZgrKc32I1swYGHJqQHzEdu0A+D4bWauJpDMtEzACgqk+8k0kwbUdf6n8e70oU b8HZy5EPNluebzhM1bWCquK07X1iKTn3TZ8BfdVA7yecOgACKIDKbMx2AkaW2OF5tr uHW+fEsaFfRCA== Date: Sun, 1 Jul 2018 16:32:04 +0000 From: Jason Cooper To: Greg Kroah-Hartman Cc: Herbert Xu , Juan Manuel Torres Palma , Eric Biggers , linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, davem@davemloft.net Subject: Re: [PATCH] crypto: testmgr: add test vectors for skein Message-ID: <20180701163204.GE26205@io.lakedaemon.net> References: <20180620105714.18359-1-j.m.torrespalma@gmail.com> <20180620181051.GC76265@gmail.com> <20180620221247.GA25379@randy-betty> <20180701091611.z24lln7cyho6ktlb@gondor.apana.org.au> <20180701094719.GC9956@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180701094719.GC9956@kroah.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Greg, On Sun, Jul 01, 2018 at 11:47:19AM +0200, Greg Kroah-Hartman wrote: > On Sun, Jul 01, 2018 at 05:16:11PM +0800, Herbert Xu wrote: > > On Thu, Jun 21, 2018 at 07:12:47AM +0900, Juan Manuel Torres Palma wrote: > > > On Wed, Jun 20, 2018 at 11:10:51AM -0700, Eric Biggers wrote: > > > > Also, can you describe the users of Skein in the kernel? If there are no users, > > > > there's no need to move it out of staging, or even have it in the kernel at all > > > > anymore. I say that as someone who has had to volunteer to fix critical bugs > > > > found by fuzzing in crypto algorithms for which it's unclear why they are in the > > > > kernel at all, as there are no apparent users. > > > > > > To be honest I'm not aware of anyone actually using Skein. > > > > > > So by this are you suggesting that we drop support? If not removed, I believe > > > it's better to use test vectors as regression tests for further modifications. > > > > Let's just remove skein. In fact staging should never add generic > > crypto algorithms. The original reason was that I was testing an automated method for making a massive number of style changes to cryptographic code (convert to kernel coding style), while being able to automatically determine that no changes had been made to the resulting object code. The purpose being, if you chose to place trust in Werner Dittman's implementation, you could programatically prove that the re-styled code in the kernel was the exact same when it came to the resulting machine code. Thus, you could extend your trust to the code in the kernel. That's how ./scripts/objdiff.sh came to be. If you look at the first 20 - 22 commits in the history of drivers/staging/skein, you can try it yourself. > Ok, I'll go drop it. I forgot why we added it in the first place, it > has been there for 4 years and not moved out, so it's not a problem to > drop it now. Yes, that was me that added it. In the intervening time, unfortunately, Skein / Threefish hasn't picked up adoption anywhere afaict. For example, it's not one of the candidates for replacing SHA1 within git. So, as much as I hate to delete it, I agree that it's time to drop it. I'll submit a patch to that effect soon. Thanks for adding me to the Cc. Thanks, Jason.