Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp525519ybl; Wed, 4 Dec 2019 06:43:58 -0800 (PST) X-Google-Smtp-Source: APXvYqyKaSCxyitn0E6kJN6teL1w4Ypcme3OxEqpF4Qb/+G49HEUw7mwWWBsu5BuVfpCcLZGhUqH X-Received: by 2002:a9d:6084:: with SMTP id m4mr2871625otj.4.1575470638740; Wed, 04 Dec 2019 06:43:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575470638; cv=none; d=google.com; s=arc-20160816; b=LyXgo2vv124Q4r0daWKQXWpxat8xztXo1tySxcX/ndvKRz+dhn6HG18eJym/f2CQ43 4MLThXGW0K6QtueVr0yXodQDGlxZ+PNoJmyl8//30/EGQhNHSqceRrMHnkBc+jNhymYe aO1Zd+z8eE1grlHGPIjBWY2P4YdjChLT317zuCMQdISexmNtg+9nEa998ECbM0V+IO/r VbBOV2WqWr+xrO+7E0qucTE9tBJYexpv1g/sbh+t4MZZSQB+ejAPaQIw3MnjjPULcyR2 /8GeY6hqFwRPkfu2WhDg5Yg7QTCluXPyQZT25QoBdLwNHdNKl5l1p0U/fNcjX929F5m2 cxzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=71DDqTK7SGG12Z0MAUYKioVk43X0P548ZzvubPDcpes=; b=ShGi1scOrd2HaPOqcjZ2dA6Tr8Ib+sFiqwk7NJrmeWvYiL/M2L3mz2VEgcGH2g6mkP ao/dKCEYeRAexFLZOC7WpxKyZ4MWS9kC/b1skme8+Mgl74JPTtHyOnQVo3eOy5R+j0Yl 4lCDO3TbCFcnk/sRcPKfqZ/UcYAkj3GliKT9DjDH8x18sNbuspjMewhnZT2FeQrTVmIz Q9ViGs4dtUmiwsvTXC7XZpRb1gxOEGg5hjkgHQXLH3GVXKjknsfDfj0wbF4l7vpdJB1H 3ltpJKKVEjeVU1Q9wmjynScRTuQCrq56L3ivgd5djcXc5dcnspngadZGMNA78PX++XJK aSpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=xfGLXTgY; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l125si3363568oih.223.2019.12.04.06.43.38; Wed, 04 Dec 2019 06:43:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=xfGLXTgY; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727880AbfLDOnE (ORCPT + 99 others); Wed, 4 Dec 2019 09:43:04 -0500 Received: from mail-wm1-f65.google.com ([209.85.128.65]:56249 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727850AbfLDOnE (ORCPT ); Wed, 4 Dec 2019 09:43:04 -0500 Received: by mail-wm1-f65.google.com with SMTP id q9so6186528wmj.5 for ; Wed, 04 Dec 2019 06:43:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=71DDqTK7SGG12Z0MAUYKioVk43X0P548ZzvubPDcpes=; b=xfGLXTgYxFM84Pj6WXIKpkTBhgV8oH+4gBdq1RyvnYhawSBF8J2cwk5zOUkm2AkwBB UXLF/UO/MgqC6imITb42Yz650P37738iiPggY/7Tp9sGnRo0mx1LhxkuZcWsaiQtr3Yi FkP6cGyRHUH8nI8pLz4H6U0yOjZr1l/4yAUdSdFuoQ7OpX3R+glAHgOtA2W1zIjlhoCT WztW2OPjojfkR3LiY03h5r9yKgoOER6NRh/swNhwjJKKOb6pY1/tF/QM0rG1OBONBiCC b0xlMYBLBHrOvUh/6gDA5zhdfxwQ86cniJAOZtvVIEgww/uAIJVkOWV3wouQNDgaTQDW DH0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=71DDqTK7SGG12Z0MAUYKioVk43X0P548ZzvubPDcpes=; b=TgfZt9jSJ8c6w6mh6B6aCCpu5r40IuJfvMWHFy3ohjPM/Vzeql8rMqLpAMcjokpYKb vdZ7x1/66WVCqGLY4Dz26BVWtQEsKeL2BS8zfvQVZDm+7g6KOYItDYPRL3UeUtwbBiXJ g3Rlczqh+rMnL/0gT+F0arPLrpI0Uxyk0hJrRe97PMIQJbpL6icZvwBXv4upDufSaDxY lgTvI3E022ndb0vHw6m+ZR02ndDygEPbUo6BiN9mdybJiQ0m1HDugT4+EjVclEeDHCR3 PgOKbrbf+0ibzI7kq7OFNYyXtTjdJOJgP4rBwKT7zoFJ34CTfNZ79TSTgwJjYiyfO5xf NGeQ== X-Gm-Message-State: APjAAAWFt7yuzZJNsLEJdrAy7vtRDGnWCLqQsMN/cZMAyWlB4LdDerMS 0fLIyLBb7MzVYlDzPnR8YwKpWq6e33/3ljGd6sCGOmoWVHE9s/wu X-Received: by 2002:a7b:c778:: with SMTP id x24mr25114169wmk.119.1575470581747; Wed, 04 Dec 2019 06:43:01 -0800 (PST) MIME-Version: 1.0 References: <20191201215330.171990-1-ebiggers@kernel.org> In-Reply-To: From: Ard Biesheuvel Date: Wed, 4 Dec 2019 14:42:58 +0000 Message-ID: Subject: Re: [PATCH 0/7] crypto: more self-test improvements To: Eric Biggers Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, 3 Dec 2019 at 12:39, Ard Biesheuvel wrote: > > On Sun, 1 Dec 2019 at 21:54, Eric Biggers wrote: > > > > This series makes some more improvements to the crypto self-tests, the > > largest of which is making the AEAD fuzz tests test inauthentic inputs, > > i.e. cases where decryption is expected to fail due to the (ciphertext, > > AAD) pair not being the correct result of an encryption with the key. > > > > It also updates the self-tests to test passing misaligned buffers to the > > various setkey() functions, and to check that skciphers have the same > > min_keysize as the corresponding generic implementation. > > > > I haven't seen any test failures from this on x86_64, arm64, or arm32. > > But as usual I haven't tested drivers for crypto accelerators. > > > > For this series to apply this cleanly, my other series > > "crypto: skcipher - simplifications due to {,a}blkcipher removal" > > needs to be applied first, due to a conflict in skcipher.h. > > > > This can also be retrieved from git at > > https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git > > tag "crypto-self-tests_2019-12-01". > > > > Eric Biggers (7): > > crypto: aead - move crypto_aead_maxauthsize() to > > crypto: skcipher - add crypto_skcipher_min_keysize() > > crypto: testmgr - don't try to decrypt uninitialized buffers > > crypto: testmgr - check skcipher min_keysize > > crypto: testmgr - test setting misaligned keys > > crypto: testmgr - create struct aead_extra_tests_ctx > > crypto: testmgr - generate inauthentic AEAD test vectors > > > > I've dropped this into kernelci again, let's see if anything turns out > to be broken. > > For this series, > > Acked-by: Ard Biesheuvel > Results here: https://kernelci.org/boot/all/job/ardb/branch/for-kernelci/kernel/v5.4-9340-g16839329da69/ Only the usual suspects failed (rk3288) > > crypto/testmgr.c | 574 +++++++++++++++++++++++++-------- > > crypto/testmgr.h | 14 +- > > include/crypto/aead.h | 10 + > > include/crypto/internal/aead.h | 10 - > > include/crypto/skcipher.h | 6 + > > 5 files changed, 461 insertions(+), 153 deletions(-) > > > > -- > > 2.24.0 > >