Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp470154imn; Tue, 26 Jul 2022 00:07:57 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ssjunL1FF3D9qTQtkuplbKFfsMVJLvkTs59DKHpYbD54B8TEanb87lbumcGj/zbmrVK7tj X-Received: by 2002:a17:902:d890:b0:16c:abb4:94d0 with SMTP id b16-20020a170902d89000b0016cabb494d0mr15645084plz.50.1658819277627; Tue, 26 Jul 2022 00:07:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658819277; cv=none; d=google.com; s=arc-20160816; b=SwL05zALU3hU4NWo9vv5jvtvIwujTG4ekOvDD//RffKo66IJx/TjneINqb4WuNIjLJ rNIoA6dH7m24XgcKlrVFzqWOlMtrZydz+G1ogaQZQ56C0wlPWdty2V5upBOfVTBZQ8iP gms67DHgwrRVjyK5QPwEiSJ6fGYObpHyXfdWdy4VcleOEzljQ5kHWtdFSxjrjtUIAVkL Zu/TrrhFTfhIHZpS0Iuk+ApoYR+0AdjnOb7+6wZmfIQdcXYR2i0CcfX78GXKwViOmXeL yKNvzpdtYghZKbXSJgA1DJn9SUMoPLFNsni420g62ahMf3ZIzO7RknI9Sok1b6qEwqV3 7k/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=rcgy86h3bKxOBeG//wWyMWAkfwgF/OHgbS5GdJlqF1Q=; b=EWxLMiiqr302PqiJRw8CSZI4CW80XfIzlnbi7uA86f1NGxfhm9MvD8jZUAseToeV1K pOFtlK2QZHMB1GUwyNAQ0MK000wepz7bJJGpwKIcXw/RsrasQJx6gkCQU8r5v5/P7oRo IMKYUnRUz+o9kw/hppZbbo/Juyd77byAtRZVjeZ7fNiJswwNnrec5uOivjnvXDR63PsC 5ztoXRehwV/8bfVGYESWXPeTks1HhbRCLO+dXUZFvGIQz5FBNzCmLVb8OK/9mCaMJCvM IDQNtdxTHAzyQ5im7MHkMHdSlaAnhPPHayK08WzVRvfgTQ01gXccnpQiaEV3YIoC2OIn NRmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=rP6hiQUS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id me18-20020a17090b17d200b001f2ab2f25cesi6651828pjb.157.2022.07.26.00.07.29; Tue, 26 Jul 2022 00:07:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=rP6hiQUS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232180AbiGZHHL (ORCPT + 99 others); Tue, 26 Jul 2022 03:07:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44726 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231600AbiGZHHK (ORCPT ); Tue, 26 Jul 2022 03:07:10 -0400 Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0240A27B07 for ; Tue, 26 Jul 2022 00:07:05 -0700 (PDT) Received: by mail-yb1-xb35.google.com with SMTP id 6so23906611ybc.8 for ; Tue, 26 Jul 2022 00:07:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rcgy86h3bKxOBeG//wWyMWAkfwgF/OHgbS5GdJlqF1Q=; b=rP6hiQUSnsCrLEpGMJ284D5gsGAEYG/Np9YNYB6fl6LnUVCfwCvUxh4qD3C5tJTybh XrZCfH6LhMs4TZkLWoBBPpiVAGUmIvCk8Qw3nT9Qu2AQAUNYU3nT4USafHn66aKeMlNJ yCFbhZu+bvyH00Uvz46+xPIRCAbWBd1kLGKgbyH0uCwSeggs64o0leDgdEXUQereCBF6 D99PIPkqaJIU/zaeVVso3vdqGKZdN0BiBtol8ZP3c08H4YtCwdienRdabs2P5ikL3k6n yy6nVtKG38EDVLJQE7YMdfQdunpwFQWoc77YXmbOWmbcGUsOEi9FI4mmB+MuGnjZlUtU 3AxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rcgy86h3bKxOBeG//wWyMWAkfwgF/OHgbS5GdJlqF1Q=; b=Pi/lMKO67IQdqucHahGyAdMGhwcNvFhMNf9wBBrzal3yUhWvB9aLqXFhUp0RziWf/f rEi6f6KWxaolgfzGSrKIhPUku8EgXe/JsKCCLgeiMh7IXBL10yEmoHu2fdf0vqzvIQY9 my65aBz6lBZBORSIvGCL6k4OURWxO03KVQIXmBGBRJ1m70d8iK/e79R1U8hxdYheQ5GK to+l6eI7e8KLpw3TB2sRqKDbOV54ht0oe7z1HwIbOZQoelwnzubsRkx9OnuxVjluJDIG k32rbcgj0lylUsr0awksdhiA2N4kwoLk4x5Ax1ywjLwNj/GriFt5/J0BBBhv3nGM7UIU K9fA== X-Gm-Message-State: AJIora+K5mpg8gS7x2U5ClyWtXbRfuzf3en8QANFC8sCNHX2sKh5jJqh /dVhAEmAPUNIoi3l2AthSGdEV2HP7f9Y7C5BeNgKhQ== X-Received: by 2002:a25:ab84:0:b0:671:748b:ffab with SMTP id v4-20020a25ab84000000b00671748bffabmr792029ybi.427.1658819223983; Tue, 26 Jul 2022 00:07:03 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Eric Dumazet Date: Tue, 26 Jul 2022 09:06:52 +0200 Message-ID: Subject: Re: [PATCH v6 21/26] selftests: net/fcnal: Initial tcp_authopt support To: Leonard Crestez Cc: David Ahern , Philip Paeps , Dmitry Safonov <0x7f454c46@gmail.com>, Shuah Khan , "David S. Miller" , Herbert Xu , Kuniyuki Iwashima , Hideaki YOSHIFUJI , Jakub Kicinski , Yuchung Cheng , Francesco Ruggeri , Mat Martineau , Christoph Paasch , Ivan Delalande , Caowangbao , Priyaranjan Jha , netdev , "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , "open list:KERNEL SELFTEST FRAMEWORK" , LKML Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jul 26, 2022 at 8:16 AM Leonard Crestez wrote: > > Tests are mostly copied from tcp_md5 with minor changes. > > It covers VRF support but only based on binding multiple servers: not > multiple keys bound to different interfaces. > > Also add a specific -t tcp_authopt to run only these tests specifically. > Thanks for the test. Could you amend the existing TCP MD5 test to make sure dual sockets mode is working ? Apparently, if we have a dual stack listener socket (AF_INET6), correct incoming IPV4 SYNs are dropped. If this is the case, fixing MD5 should happen first ;) I think that we are very late in the cycle (linux-5.19 should be released in 5 days), and your patch set should not be merged so late. Thanks. > Signed-off-by: Leonard Crestez > --- >