Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp405595imm; Thu, 11 Oct 2018 23:41:46 -0700 (PDT) X-Google-Smtp-Source: ACcGV61gWitTqHGkqALDKKCM5wbESHzQ9BXjz5fkphFLZnSgDbVqnLWvpFJw4VlPKLJuX2DwUyVq X-Received: by 2002:a62:204a:: with SMTP id g71-v6mr4814688pfg.70.1539326506696; Thu, 11 Oct 2018 23:41:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539326506; cv=none; d=google.com; s=arc-20160816; b=Bf/XJpMVwXNj2vMQz5QLU8du7H1QyMNBtuT/1Zll8Agv/5OX5+xGT23nh4LTCt8pGu JIUBqWvaNQym3AOJDcPNx9JEepJ04KekAx9Idgcs+4RcLDLLHAQdU8CMmC6AntvAsDcO m36ZuIO7F+JLqpG2xly0QprrVmPW0bdJeVeAG/SnlrK18VyH9M1dfipvPpp/r8gKC/ob Tc2CD9r1FmhHCiOde1FIARGqi3GOgLlWh+d492WfsKcNAuGPz5N2f77mKiDoaobgxnh8 upUufOYeyT32JOBGkfeq/Wgv7rISbq155fUvoUJ7cMqeYgPR99Id4UrCl+Sg/DUIW+24 jYmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ey0qpdPCqkGjWbW9qbMT2Jt1J7lFqhYeEPVaSobCzNI=; b=AXLDVK19CHr32Uf2ArtZ+bxUw4ptt8g5qzz13xUK09NDERRDT/rff16/IL3ukPFwgE +O/V2LvfTlbW5ZYkt3xzfbkIS+e9e0k393wvRd+SvqHgZRUWt2Lcm4SdOjwToUNIM0Pi IHPmEEI5AvbItmKEcm/hLgiYZb7TRYOH9PZi/dkYAmTPaO3o99PdBCYCL1HJVZs5tul3 7xKjZhBPfLFmbWBwIvzYjT4Vy+u965CbfJwmERSGVPwTpUPhat91Z4UoOipaCD5X1xI+ w92Xx2WCGYm9zhoGMmC7cdPgxVU9Myt0XVgRLzLM70l9SdHGVEB946QnS90s7HJxnZHE 6iug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q12-v6si284722pgl.531.2018.10.11.23.41.30; Thu, 11 Oct 2018 23:41:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727510AbeJLOMF (ORCPT + 99 others); Fri, 12 Oct 2018 10:12:05 -0400 Received: from vmicros1.altlinux.org ([194.107.17.57]:41064 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727056AbeJLOMF (ORCPT ); Fri, 12 Oct 2018 10:12:05 -0400 Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id 3BC0872CC5E; Fri, 12 Oct 2018 09:41:06 +0300 (MSK) Received: from sole.flsd.net (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id 2786C4A4A29; Fri, 12 Oct 2018 09:41:06 +0300 (MSK) Date: Fri, 12 Oct 2018 09:41:05 +0300 From: Vitaly Chikunov To: Herbert Xu Cc: "David S. Miller" , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 0/2] crypto: streebog - add Streebog hash function Message-ID: <20181012064105.bchujbwoaszrcu3l@sole.flsd.net> References: <20181010121254.12220-1-vt@altlinux.org> <20181012061659.mextetc3v7urqkzx@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: <20181012061659.mextetc3v7urqkzx@gondor.apana.org.au> User-Agent: NeoMutt/20171215-106-ac61c7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 12, 2018 at 02:16:59PM +0800, Herbert Xu wrote: > On Wed, Oct 10, 2018 at 03:12:50PM +0300, Vitaly Chikunov wrote: > > Add GOST/IETF Streebog hash function (GOST R 34.11-2012, RFC 6986) > > generic hash transformation with appropriate testmgr and tcrypt > > tests and vectors. > > > > Streebog Hash Function (GOST R 34.11-2012, RFC 6986) is one of the Russian > > cryptographic standard algorithms (called GOST algorithms). > > > > References: > > https://tc26.ru/upload/iblock/fed/feddbb4d26b685903faa2ba11aea43f6.pdf > > https://tools.ietf.org/html/rfc6986 > > > > Tested using testmgr and tcrypt on x86_64, arm, arm64, and s390x on qemu. > > We don't add algorithms purely used by user-space. > > So please clarify who is going to be using this algorithm *within* > the kernel. It is the first part of attempts to add to the Integrity subsystem ability of verifying file and module signatures by Russian GOST algorithms. Thanks,