Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3916654pxb; Fri, 11 Feb 2022 10:31:55 -0800 (PST) X-Google-Smtp-Source: ABdhPJwSiCxrwLm5M+PQLk2+lpsOvGFyC+/ZdmPMOs9UZyKibvW7Q+EcZB68eq1TBXcMlC9se/8z X-Received: by 2002:a17:903:124a:: with SMTP id u10mr2726942plh.63.1644604315549; Fri, 11 Feb 2022 10:31:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644604315; cv=none; d=google.com; s=arc-20160816; b=ikEOE4Qkukj6JEin+OWiF05+7LnKS8v1c04Z8LjXbYwhWHjEkhPvZ/7GNU6ISiv9Oy 2WdNcbqH/kN+vXevLTCfnYJBChaV7pPnDZ/NCdKv1wzIBk06gaU2vpnnCFehcmj7ukUX oXCuTuZl11PaGMT5a6NC3UACX0aWhgif5fCKOADR3EgOdqL576D/Qvu5RSYHWlFDznKf aNRYwumuov5lxIEfQ095L34aZ5F9M8dJwJ8C8F+0hd+1R+yyNIDlbJJrIrthZrW0g3Wj Zyu+35Asur8WeMkNRluyBOfvLgYOM+s3UAfe0m4hWHbE6fXen58MUJKXY0VKwnS+J9qm yK+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Jugz2gmAng9AoYMZ/JQJ9P1EaL48sKeLH9qfOA1HmMs=; b=D4piJHFgPAOt6ma0X7tDSx7d0/XmlYsEuJzuilVODOiwJ9FJ8J1mIFiJK4xUAKuEB5 slm9xdqz/Y8jjwpbhlxvQuUGbtaBITZRAgUR7LIzd8+9RYM3pMxvQBuFP1tThjhh/GgM uhSOgak9iBa04yTQ65NwRURwlmx6jLEzIaseiKAS4+ffsMPgBbCKLzIf1tGhDZZXIOVk 4ufPrLCefFRNdGhtqGaWLOCMFJdi9xyXC+v+CL2jDUpxplgG41WWrJIwdbhDgHiaOfKx EHWw37ppNURYk2FmxBhI9Lqr6OczFPMYmDJHUJFdGjpQM1oAOhFC9sXZU7PtNZ92SRcl gMnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i6si3848603plr.396.2022.02.11.10.31.35; Fri, 11 Feb 2022 10:31:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234037AbiBKJe6 (ORCPT + 99 others); Fri, 11 Feb 2022 04:34:58 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:54804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233768AbiBKJe5 (ORCPT ); Fri, 11 Feb 2022 04:34:57 -0500 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F28A5F5B for ; Fri, 11 Feb 2022 01:34:56 -0800 (PST) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1nISKK-0004R4-Rm; Fri, 11 Feb 2022 20:34:53 +1100 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 11 Feb 2022 20:34:52 +1100 Date: Fri, 11 Feb 2022 20:34:52 +1100 From: Herbert Xu To: Stephan =?iso-8859-1?Q?M=FCller?= Cc: linux-crypto@vger.kernel.org, Niolai Stange , Simo Sorce Subject: Re: [PATCH v2 0/2] crypto: HMAC - disallow keys < 112 bits in FIPS mode Message-ID: References: <2075651.9o76ZdvQCi@positron.chronox.de> <4609802.vXUDI8C0e8@positron.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <4609802.vXUDI8C0e8@positron.chronox.de> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Feb 01, 2022 at 09:40:24AM +0100, Stephan M?ller wrote: > Hi, > > this is patch set version 2 for adding the HMAC limitation to disallow > keys < 112 bits in FIPS mode. > > Version 2 changes: > > As requested, instead of ifdef'ing test vectors out that violate the > constraint added with this patch set, they are compiled but disabled in > FIPS mode based on the .fips_skip flag. > > The first patch adds the generic support for the fips_skip flag to > hashes / HMAC test vectors similarly to the support found for symmetric > algorithms. > > The second patch uses the fips_skip flag to mark offending test vectors. > > Stephan Mueller (2): > crypto: HMAC - add fips_skip support > crypto: HMAC - disallow keys < 112 bits in FIPS mode > > crypto/hmac.c | 4 ++++ > crypto/testmgr.c | 3 +++ > crypto/testmgr.h | 11 +++++++++++ > 3 files changed, 18 insertions(+) All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt