Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp3372797rwb; Tue, 16 Aug 2022 01:32:02 -0700 (PDT) X-Google-Smtp-Source: AA6agR5awC6l+xLSWQRn9lJZbpf7TYSULh+uOkm6GeJdNFp44i8Bid8nOZ438isgXwPXGSga0tOL X-Received: by 2002:a17:90b:1e49:b0:1f5:1dbf:4c3a with SMTP id pi9-20020a17090b1e4900b001f51dbf4c3amr32691762pjb.232.1660638722681; Tue, 16 Aug 2022 01:32:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660638722; cv=none; d=google.com; s=arc-20160816; b=Znb68BobEIqhVyQI33E7iFGcG0Pw2V/tMLfcglNQkh9VFqBxM92re1jDJ5iRjd095V sLp1jtHfs9tg65bViOLZhfvRrsmizaFmWilfqQA7vNP90uIGcc7m5A3jHuRvZOPgE09+ 6jYS+EQsu24sSucx93ytdbE59H5K5B+Cl6QkQmrMHhgIsvnaj/f5VJ1VilHF/rO9XVOP 9dSpImljtm/j0s3P4yGAcrAaSmxRKJ60rIsCGdMGwMLdc4AbBUG9nl53Uo3SJL2jBknH j/KTAw8gI+nWWvcsjdK9h9y9EXQucqTRa3+WIqYMayOUj7XGsTp2tATzeF+cBbSH75Nu AWQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=um0Lj9gvVTdRN5Dn9EfGnG5sR45OGTItOsvLoOs3e34=; b=QIVH2uYDfwfqWD/4gF7uXWT9n++e2IA7ZD8rno4giZMAwsdFGSNSpP+oF0c54j6TEU Cd1Eun/7eE8DfqmT9ZzVmYvbhNZt2HGiA+s4htskJ7QLp4tK7Ga/v7TNEg0dcse25RFg AowMVrQ/MCIrN2YWtgCsjzW1kXW1FkP58Ro8SvxWoTSOdLw6t7kDn0/mOOG9ozlLXgdQ 0pDn/yxObeUph3GUs7juO+iq5inxIq0/F4XmS/1KpJyaF91Yo45mxkK6W4dw53+Ge5CN o6sxWXGplqdgWUWA9Phv7M0JHtd/Z9eHWL/cOqTzva6wAt4UK03B5OQ/ettyC9uhgSh5 w+ow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i3-20020a6551c3000000b00412b3d1a154si14915434pgq.734.2022.08.16.01.31.49; Tue, 16 Aug 2022 01:32:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232807AbiHPIb0 (ORCPT + 99 others); Tue, 16 Aug 2022 04:31:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40306 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233427AbiHPIaz (ORCPT ); Tue, 16 Aug 2022 04:30:55 -0400 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9245B131A31 for ; Mon, 15 Aug 2022 22:50:17 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1oNpSh-00BVmN-GH; Tue, 16 Aug 2022 15:50:00 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Tue, 16 Aug 2022 13:49:59 +0800 Date: Tue, 16 Aug 2022 13:49:59 +0800 From: Herbert Xu To: Stephan Mueller Cc: Eric Biggers , Robert Elliott , tim.c.chen@linux.intel.com, davem@davemloft.net, linux-crypto@vger.kernel.org, toshi.kani@hpe.com, rwright@hpe.com Subject: Re: [PATCH] crypto: testmgr - don't generate WARN for missing modules Message-ID: References: <20220813231443.2706-1-elliott@hpe.com> <2802022.gAprrWTQMp@tauon.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2802022.gAprrWTQMp@tauon.chronox.de> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Aug 16, 2022 at 07:09:44AM +0200, Stephan Mueller wrote: > > The tcrypt code has only one purpose for FIPS: to allocate all crypto > algorithms at boot time and thus to trigger the self test during boot time. > That was a requirement until some time ago. These requirements were relaxed a > bit such that a self test before first use is permitted, i.e. the approach we > have in testmgr.c. > > Therefore, presently we do not need this boot-time allocation of an algorithm > via tcrypt which means that from a FIPS perspective tcrypt is no longer > required. Hi Stephan, Eric: That makes sense. So the tcrypt code also has the side-effect of instantiating all the algorithms which testmgr does not do. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt