Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10420888ybi; Thu, 11 Jul 2019 05:05:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0LIqZA6Nl36BgQspKd3Q6kBXHdXg/TAru9WA/Dp4TxVx6SL9sgDHaHBB0NDu6S1La7XMl X-Received: by 2002:a17:902:2aab:: with SMTP id j40mr4136966plb.76.1562846743851; Thu, 11 Jul 2019 05:05:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562846743; cv=none; d=google.com; s=arc-20160816; b=FiPxm9me4e25+Loqu0g/KUqf2/IwcycmuwBXUPQOyMqWG72ovElQQgN2Y4UfbNdP8g P61MtqqQ4vtbhUfgYhdozXnrPFpvhs2+XPDWfCLok1kAEhKqjdLkRS8YesTskejLj2c4 T/roRSJLCsix0S1ToiFUsp0vRClu3gLf71Mjwwy+ohBg/U7+XcUi8onjzbRGxVpJsu6c zMNMZCbmWmYxhCbKfWrejjP8dyMqOQTDXfHBYvuApC6KTBf0R02OdZsXVQajcFSxLAo1 F6t2bRL5fEE9NHMBGphKIJcZ9hdGvkfKqLUV/l5LH8MJrdofnU+DkYzo6O630Jy0SG+t e+bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=QDS5m6ANTja1UHGsEZTYM5Uqcp3Q5tifOJ+FzapbgHU=; b=VTPW7BmKKEsPrcaTgccYeLkZQHJ7MfPnZVLS+Lj5JEMff3uOtO5mC2L0p1qQquXEHx E0eeJVMihzoUeiPpyAcUNZ9fv62z3bz/dN1o1TqORcaleUQVccw6iod2VEi/hsqCkDtO WBxN/+mlniH7VFT30kYDqU6faTJ2Lrbm9MXG8biXQjluU6VCd2jol/mRaJDMgA4F5iCi x4/qRFkck3SzdKkNVzZz/+IXJBJQHR+jOSAiXH3cNpToFUW2s+lXbR89zyQJKK1KD32g 2Y85kqmbu2roJQVH3QZyla60EelaR2PQXZE9FXr6PVqt8iwsGc5LBTBHoAGXzZ3NBBFB giyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=p2mj6ert; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d67si4866076pgc.62.2019.07.11.05.05.29; Thu, 11 Jul 2019 05:05:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=p2mj6ert; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728320AbfGKMEs (ORCPT + 99 others); Thu, 11 Jul 2019 08:04:48 -0400 Received: from mo4-p00-ob.smtp.rzone.de ([81.169.146.218]:30341 "EHLO mo4-p00-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728427AbfGKMEs (ORCPT ); Thu, 11 Jul 2019 08:04:48 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1562846686; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=QDS5m6ANTja1UHGsEZTYM5Uqcp3Q5tifOJ+FzapbgHU=; b=p2mj6ert5DYU2/pDGFn3m5hsdjkaPRT031SKXff0W83OSFfYVT9WRo2K5EIQlLWsru GZ2TO0ZsDotSnyx1d9SpnaV1Z8ygjubfNSRKjcg0CpiF0A8ZhAB4RsVSo1Ds2ClyXgcv lQHypijIeMXfmDIk5CcmreePPFluwOG2FcmoeqTX4oQ32WGpWmslqS0kK6ONTADr4oWe tqpJpUQop4GRM4+4PJ09c6DIO+JssW2SXX7qHWa2BZH36W9wMiOgYWcb27tu6h1qni0O 7m7CIeqzb1EaLh+kY5sb6wPmmFH4GzREcx4HA2vyarjyWKXJtyxs1/2quGth/ssi5Xsj WeeA== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xm0dNS3IdRcRALiq2+M=" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 44.24 DYNA|AUTH) with ESMTPSA id 9078d1v6BBqTwpr (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp521r1 with 521 ECDH bits, eq. 15360 bits RSA)) (Client did not present a certificate); Thu, 11 Jul 2019 13:52:29 +0200 (CEST) From: Stephan Mueller To: "Bhat, Jayalakshmi Manjunath" Cc: "linux-crypto@vger.kernel.org" Subject: Re: CAVS test harness Date: Thu, 11 Jul 2019 13:52:29 +0200 Message-ID: <3201120.NINpRaGeap@tauon.chronox.de> In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am Dienstag, 9. Juli 2019, 08:43:51 CEST schrieb Bhat, Jayalakshmi Manjunath: Hi Jayalakshmi, > Hi All, > > We are working on a product that requires NIAP certification and use IPSec > environment for certification. IPSec functionality is achieved by third > party IPsec library and native XFRM. Third party IPsec library is used for > ISAKMP and XFRM for IPsec. > > CAVS test cases are required for NIAP certification. Thus we need to > implement CAVS test harness for Third party library and Linux crypto > algorithms. I found the documentation on kernel crypto API usage. > > Please can you indication what is the right method to implement the test > harness for Linux crypto algorithms. > 1. Should I implement CAVS test > harness for Linux kernel crypto algorithms as a user space application that > exercise the kernel crypto API? > 2. Should I implement CAVS test harness as > module in Linux kernel? As I have implemented the full CAVS test framework I can tell you that the AF_ALG interface will not allow you to perform all tests required by CAVS. Thus you need to implement your own kernel module with its own interface. > > > Any information on this will help me very much on implementation. > > Regards, > Jayalakshmi Ciao Stephan