Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4155440ybi; Mon, 27 May 2019 12:16:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxAvuIlsj4pcU0mBpbdFWf0To35nzmiSYmpyxs7qOjYCG5LJwfCiDDZz7OoGzqqFOEfJ3KN X-Received: by 2002:a17:902:c7:: with SMTP id a65mr24154682pla.182.1558984570692; Mon, 27 May 2019 12:16:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558984570; cv=none; d=google.com; s=arc-20160816; b=z7DLO57Sua1SKC/KBNIP7LCzceggPPJudNDGaGhQiYJVuvmdV+Ahe5AzZ8fJGWD514 H/4AI2VuJQL/tfgQ1a/8cF7/twJTWe8V5VKe4xovpNO1thFAT3h69p8ZZOaYMCB8vN4y 5EcZegBN7KGTG/nWIvSy1Lnel2Qls1YSrCUIn9vvJmROxZAANx8wqu9ZJU/YWe1osBHL uMtm4+a853AzvwKiXwc7ILQKEW+cMShJHdlZL+7j+yEndfrOvGQ71DWzCuM0nHT8Fzxn J7L9qMi2J+3Oqbp7JpHIEt5oKPkkQPHH/br1x4KjcxzpmFe5B4zHe3DA9seK+RGrG+Er j8tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=t5a81ZyDpMx05/Aj0mP8t1Q8VGOhjze5yoZ0qR1HTG0=; b=LAMJRDaW9aw4hwnscgJb6EtPXOjmiUIqQWxBJC64rGznpsehPz5NJxM96PJaFf7k3U T27cr7QDYV2JZmD9hiUJ9nVb4F6Dn956+zpi+d72fQUPfV/E3ma5f/7uTlGbvCCxiH2e +5BApRnaj2iCqmCWf+sUeDsn4JJvuWZY/FTQmzfQz/EDZqDtM8oVJcWnNS97b6oblIEM FYLAtpuGh9H+MgQGd/3/an+xKeONH3cGhzQziY6+cqOXTLFjDfTbI8QpGz59V1smNvxW TQJLOnwpWZ44S2fdhIn//SRXasJpUTMDA3oEFRuR/bOUNDWHma3lethgLzv/5r6xaGYl zWmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="mxStrsN/"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q193si20883038pfq.95.2019.05.27.12.15.55; Mon, 27 May 2019 12:16:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="mxStrsN/"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726899AbfE0TPy (ORCPT + 99 others); Mon, 27 May 2019 15:15:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:52954 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726801AbfE0TPx (ORCPT ); Mon, 27 May 2019 15:15:53 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 550CE208C3; Mon, 27 May 2019 19:15:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558984553; bh=mIZEOAo28ilFQHB1s5QFB2cR7tMS7AafmOGavuYZsjA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=mxStrsN/czETnQglowYNZX7jKBmGiXIoGSvFk+sQr1WNBkxXoehQPm8r3Z4q3qtJl tKRecL4I93NsLnrE5xzkd7ykgO1o8edw1xkhdu1sMrKoHcmDjTkZh5QMMODpOe7+wC Lr3iA96eSE3RzvXTxIwNh3iu+v8IkVrXHfU6Lb3Q= Date: Mon, 27 May 2019 12:15:51 -0700 From: Eric Biggers To: Stephan Mueller Cc: Nikolay Borisov , herbert@gondor.apana.org.au, davem@davemloft.net, linux-crypto@vger.kernel.org, terrelln@fb.com, jthumshirn@suse.de Subject: Re: [PATCH] crypto: xxhash - Implement xxhash support Message-ID: <20190527191550.GC9394@sol.localdomain> References: <20190527142810.31472-1-nborisov@suse.com> <1582734.iyJbpUVI2p@tauon.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1582734.iyJbpUVI2p@tauon.chronox.de> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, May 27, 2019 at 05:06:53PM +0200, Stephan Mueller wrote: > > obj-$(CONFIG_CRYPTO_JITTERENTROPY) += jitterentropy_rng.o > > CFLAGS_jitterentropy.o = -O0 > > jitterentropy_rng-y := jitterentropy.o jitterentropy-kcapi.o > > diff --git a/crypto/testmgr.c b/crypto/testmgr.c > > index 8386038d67c7..322e906b6b6a 100644 > > --- a/crypto/testmgr.c > > +++ b/crypto/testmgr.c > > @@ -3879,6 +3879,13 @@ static const struct alg_test_desc alg_test_descs[] = > > { .alg = "xts512(paes)", > > .test = alg_test_null, > > .fips_allowed = 1, > > + }, { > > + .alg = "xxhash64", > > + .test = alg_test_hash, > > + .fips_allowed = 1, > > Why is this intended to be allowed in FIPS mode? This does not seem to be a > FIPS approved cipher. > The other non-cryptographic algorithms like crc32, crc32c, crct10dif, zstd, zlib-deflate, lzo, lzohc have the fips_allowed flag set too, the argument being the FIPS restrictions don't apply to non-cryptographic algorithms. I'm not very familiar with FIPS, but I'd assume the same would be true for xxhash. - Eric