Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2638833rdh; Mon, 30 Oct 2023 03:27:10 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEkRpqR7ug/0FAfHxWKI40mTYydCVfUpolSXPogXFmW/zn3DRjTEfo71V4tJ9q4TSt7Y53E X-Received: by 2002:a05:6a20:8f06:b0:135:8a04:9045 with SMTP id b6-20020a056a208f0600b001358a049045mr9831993pzk.1.1698661630018; Mon, 30 Oct 2023 03:27:10 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1698661630; cv=pass; d=google.com; s=arc-20160816; b=ftyq2QcWpMiwxmchI47f9rIhssuFaYy135t6l4QllzCtnv+gBKTu+km2YPShZEj2zb GZeOPaymgRA2nvseVbRzr6woWfupri6TWD4+t2xpwT3DPdlsMnCtfe551Kw5dRbgQtUn pPnnQqhN9CQs+OnbVzA0VpEA1I2HzzhKpqZikbJx0ygwYYphYhDF+HLiVtBXBXGMtCA3 0MOV1BEAn0TzLppedSZXeT8FkHu4lhDrZm0xwwCxv06Lzsbm3d1r8+AZNQ98rU+7fEwd NtbuVlA5fuZRmUTtvo4irKgYQD7FsTHfVetUH/sv6scueKvXX8JiF9aOJyqS9BO+J6/B zQWQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=Is4ojSgv4+/AkEpUYaQLScwdT0YQ0luLjdPNWA9pmk4=; fh=h63CLocenEMtNqIbNpgsPJN2RFDQBwtLWQS/l/9B930=; b=uLVKq4Y9DrhnT+ZN0Rcubsm1Z1t93E163VThLUTjjj3mHbtVAMH4h1YORFz9JRGwf6 b8ST9IYJX3dEvpEjlxHcELLv0BLZ5ggQkwXXCUVXeEb2MqHbkLtpf+sl3apQEYfMavH/ e+7En9ohAOm+V95TPGox2y5zetk+NcuwYDLw2RlkigZc98UMrDC5vktIvad9FKxU6phE n77EZzOhGATgDSD77VFcPAzIF43y7b17wz2AgXNCpCqiahpjRmAbViZQpIv1n8lDWvad PYIrAwIaSUkA8Mb8MqH8JWBzsY1caL424mHVM+LKQ03g8Ff7JC+Yk98ZvogYBSVIxOhw 16Sg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=J8gpWczp; dkim=neutral (no key) header.i=@chronox.de header.s=strato-dkim-0003; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id o5-20020a056a0015c500b006bd27e41c15si4842547pfu.291.2023.10.30.03.27.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 Oct 2023 03:27:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=J8gpWczp; dkim=neutral (no key) header.i=@chronox.de header.s=strato-dkim-0003; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 7FFCC809F382; Mon, 30 Oct 2023 03:27:07 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231741AbjJ3K05 (ORCPT + 99 others); Mon, 30 Oct 2023 06:26:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232532AbjJ3K0y (ORCPT ); Mon, 30 Oct 2023 06:26:54 -0400 X-Greylist: delayed 178 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Mon, 30 Oct 2023 03:26:52 PDT Received: from mo4-p01-ob.smtp.rzone.de (mo4-p01-ob.smtp.rzone.de [85.215.255.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 402FFE9 for ; Mon, 30 Oct 2023 03:26:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698661431; cv=none; d=strato.com; s=strato-dkim-0002; b=OYveJeGr3RNT499TRmN+g8UPPI8wXtE9UlzNQ3/e7Rz8BdZ50r/TERSC4fHvmwAg91 HiUHnlaB1yPPEmdstr4knjxj0aIRjX9E8BT0XpenLcTvznW5p2dFo8pWsgWRjOn/D0l1 WBGJSk5SyR+jyCBqT3QbthcjKziXSs9oRETz3bIqr7xvfqSGtm1EU9Sp0l2xxD4ECZEw KfI2u/gv9Wfhc6Z0cF1ndg8JFCVuQefdn4YdW/aRBkd94jNpw231U2qH4q1N8vxbaVm0 2otahnLz26yY/OVkkXxv5vwNq+gi4UFSCmyiwmMkyIl9oWoRpCe8Y4hR64KvDl4KA/GL kEUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1698661431; s=strato-dkim-0002; d=strato.com; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=Is4ojSgv4+/AkEpUYaQLScwdT0YQ0luLjdPNWA9pmk4=; b=mKIv/NBfuAsFOEqVF3pAcU92xIYWJ6eJxW8gdFLTlfnSWDR/ATHMVBx9JXd28P5vkn hxNd7/EY1A9xoIGw7UZx4NiTF8d4e93rzsIF9Wu9lZWyoUbPaM5GwuL0ZRdFwc0XbI9A I5LFSOYCuxdy2xxx02Vdxbw8FGlDljRf0DuPT+K+QdZp8JKtyHgbXRGNJvDVFzHmSTdf 3+uzegsk+o5ZiNcoICYvZ4YNVV36q6FJjVxOjqNQb32MazjS/ZcuidfwWVKmOF06zRpo 9PFQ64DQmGBJ3egY9rJq15u7ALLicyRuTQYfBcbWqDN6aHePiTvbi96otxwVayFtJpmj YPWg== ARC-Authentication-Results: i=1; strato.com; arc=none; dkim=none X-RZG-CLASS-ID: mo01 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1698661431; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=Is4ojSgv4+/AkEpUYaQLScwdT0YQ0luLjdPNWA9pmk4=; b=J8gpWczp4C/WTKP9oImFoca1P33GTm+6lY3UuERoIDozFQ5NijQ6N1EjK1LJkIx0EH GhIJWd+5pH507Lcumjgaop9wt0ccbaGrSzP4wZTEr5gPsUqd6uGl28aE7BxwiQ+eJr8Z +hdqT8+RQjoOGQ+nQOF9c0468tTDZe4mYbBrxOiOBJgjts97XSsBK0Ot9kAgfwnFJKnY biYAzs8FW0nABmf9mXyg9cz2H8sKLDWAUDTdyQJSQKJ1JvHogev9+4c/dGMWiLFW4qpm KY8Yl7v1bpguGL84Jt3YQTxnhSSSCwR0Z3boLEHWn08/odi9op7DTeZ0xEkNlEz+FPU2 4SqA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1698661431; s=strato-dkim-0003; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=Is4ojSgv4+/AkEpUYaQLScwdT0YQ0luLjdPNWA9pmk4=; b=7c2ELGgCqjWSYYNL1Y2+FW6P6MhCUOa8GPPiZqwc65ZMdGn4UVHC2s/yIPBLmrRh1O K/PE1nmJGjsy/lQ5+fAw== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9yWsdNeEDyFXR1lg3JD8=" Received: from tauon.chronox.de by smtp.strato.de (RZmta 49.9.1 AUTH) with ESMTPSA id 6b1cadz9UANnTda (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Mon, 30 Oct 2023 11:23:49 +0100 (CET) From: Stephan Mueller To: Herbert Xu , "David S. Miller" , Dimitri John Ledkov Cc: simo@redhat.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256 Date: Mon, 30 Oct 2023 11:23:49 +0100 Message-ID: <6413919.eMfrkXpHmx@tauon.chronox.de> In-Reply-To: <20231029204823.663930-2-dimitri.ledkov@canonical.com> References: <20231029204823.663930-1-dimitri.ledkov@canonical.com> <20231029204823.663930-2-dimitri.ledkov@canonical.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Mon, 30 Oct 2023 03:27:07 -0700 (PDT) Am Sonntag, 29. Oktober 2023, 21:48:21 CET schrieb Dimitri John Ledkov: Hi Dimitri, > When originally drbg was introduced FIPS self-checks for all types but > CTR were using the most preferred parameters for each type of > DRBG. Update CTR self-check to use aes256. > > Fixes: 541af946fe ("crypto: drbg - SP800-90A Deterministic Random Bit > Generator") Signed-off-by: Dimitri John Ledkov > > --- > crypto/drbg.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/crypto/drbg.c b/crypto/drbg.c > index 2cce18dcfc..b120e2866b 100644 > --- a/crypto/drbg.c > +++ b/crypto/drbg.c > @@ -1478,8 +1478,8 @@ static int drbg_generate(struct drbg_state *drbg, > err = alg_test("drbg_pr_hmac_sha256", > "drbg_pr_hmac_sha256", 0, 0); > else if (drbg->core->flags & DRBG_CTR) > - err = alg_test("drbg_pr_ctr_aes128", > - "drbg_pr_ctr_aes128", 0, 0); > + err = alg_test("drbg_pr_ctr_aes256", > + "drbg_pr_ctr_aes256", 0, 0); > else > err = alg_test("drbg_pr_sha256", > "drbg_pr_sha256", 0, 0); > @@ -2017,7 +2017,7 @@ static inline int __init drbg_healthcheck_sanity(void) > return 0; > > #ifdef CONFIG_CRYPTO_DRBG_CTR > - drbg_convert_tfm_core("drbg_nopr_ctr_aes128", &coreref, &pr); > + drbg_convert_tfm_core("drbg_nopr_ctr_aes256", &coreref, &pr); > #endif > #ifdef CONFIG_CRYPTO_DRBG_HASH > drbg_convert_tfm_core("drbg_nopr_sha256", &coreref, &pr); I am not sure again whether this warrants a "Fixes" tag, because the first modification is in a commented-out code section and the latter again intends to test the DRBG thresholds and thus just needs "a" DRBG. Anyhow: Reviewed-by: Stephan Mueller Ciao Stephan