Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp6427482rwl; Thu, 29 Dec 2022 12:40:42 -0800 (PST) X-Google-Smtp-Source: AMrXdXtIL+7V/xpOIcPXheuhWe+qYFJnbSNVE55RRUutAtWDJzcPgc88Bz6myHIGWGjrwu4MGjuu X-Received: by 2002:a17:907:6f09:b0:7c0:a877:1cf1 with SMTP id sy9-20020a1709076f0900b007c0a8771cf1mr29283313ejc.12.1672346442383; Thu, 29 Dec 2022 12:40:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672346442; cv=none; d=google.com; s=arc-20160816; b=hsQLYbAohvBKeXUjTpVt5NEkcJz2wv0DKsUjSaSYcLohxlJnb5YJMtJ6DwTWcChcVK 3Wj1KOff9kCQKACVFRaWK9zoguzMhnZ5G5oaYkkq7qROniZLquSXKagpl1N4e8HPXjEI 6MYpFD1EDcVGW3i5x+c+M0pK7jrLP1/QOIr+7X4Hde8/qZUqjHiJCn9V61h3swQqtHBc 7cCEYRznyuKmzBs57kGxOlILlgItWmb3UE03VWkQwDIJWjsBqleoxW42e3+MBAnmVdrk 9NqnvErrTDXu223cwjAEykKBWoDjtEY8HFB9bXOlk4ZrYovgD59kWWhV2cxSlb5c2bjg /kzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=CxtpMgRv0k0qCDaERH6Q08EjUCmn4oR74f97lfTFabI=; b=TiA44Q7MwoZCe7KD1FcFReOwlqlvkypUBwkXeJxygwiKI67iRr4PWw1O+jo30ukeLP 8NJXUOy8vQ4Y38CPcx1uxFJy4mlsLoXCSV/qDapeDKSsDPOJveT9NX+1xKqmhpUzIpr6 5dqgKHX/4ZXQkv/uXuHNdcXR1ZVf/79JGwehHVlCApqt66OYIwOLHpnYrxql5t3+0a7l vXqxBCONqUZnrTy7WY2X/d3GdMKXDAYCK7MekvWGi5/RRm7v1DADeEc0q78n22IpwFbl qBJYvqwj0vBT0ovM/pkRFvjwJ5rOkwlisMANaAh0hNrrNW4FSaQ4iJmJmEyHV4gMH0bA cWeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CQm9upLu; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dp21-20020a170906c15500b007add6c835a9si16379945ejc.867.2022.12.29.12.40.18; Thu, 29 Dec 2022 12:40:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CQm9upLu; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233994AbiL2Uj1 (ORCPT + 99 others); Thu, 29 Dec 2022 15:39:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229957AbiL2Uih (ORCPT ); Thu, 29 Dec 2022 15:38:37 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EBE3C1706E for ; Thu, 29 Dec 2022 12:37:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1672346264; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=CxtpMgRv0k0qCDaERH6Q08EjUCmn4oR74f97lfTFabI=; b=CQm9upLuMj3t89XZtgxVF2+ZML5v/LnPTHntpR+pbwU0FWJ1WAppOdyA/PH0XNV2Mu6K73 TlXblsMzrr7wjiCqKTyJ6/QyAyM7Q+Lpbzj+t5lryxV9Xc5CCNwXfYJiG3iWRCE24hf9b1 S3+y/HLX4r3vvko9RoF3U4JQlR5Q6mc= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-624-OqHRH9skM9qLEFXXrqUGOA-1; Thu, 29 Dec 2022 15:37:40 -0500 X-MC-Unique: OqHRH9skM9qLEFXXrqUGOA-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 5CEB68F6E88; Thu, 29 Dec 2022 20:37:40 +0000 (UTC) Received: from rules.brq.redhat.com (ovpn-208-2.brq.redhat.com [10.40.208.2]) by smtp.corp.redhat.com (Postfix) with ESMTP id BCB9C1121339; Thu, 29 Dec 2022 20:37:37 +0000 (UTC) From: Vladis Dronov To: Herbert Xu , "David S . Miller" Cc: Nicolai Stange , Elliott Robert , Stephan Mueller , Eric Biggers , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Vladis Dronov Subject: [PATCH v2 0/6] Trivial set of FIPS 140-3 related changes Date: Thu, 29 Dec 2022 21:37:02 +0100 Message-Id: <20221229203708.13628-1-vdronov@redhat.com> MIME-Version: 1.0 Content-type: text/plain Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.3 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, This patchset and cover letter was initially composed by Nicolai Stange and sent earlier as: https://lore.kernel.org/r/20221108142025.13461-1-nstange@suse.de/ with a subject: [PATCH 0/4] Trivial set of FIPS 140-3 related changes I'm adding patches 2 and 3 which (I hope) resolve issues spotted by reviewers of previous version of the patchset. This new patchset should ease our future kernel work on the FIPS mode. I'm quoting Nicolai's cover letter here: > Hi all, > > these four rather unrelated patches are basically a dump of some of the > more trivial changes required for working towards FIPS 140-3 conformance. > > Please pick as you deem appropriate. > > Thanks! > > Nicolai v2: - fixed a block comment formatting - "Reviewed-by: Eric Biggers" was copied from the v1 thread: https://lore.kernel.org/r/Y6OXuT95MlkNanSR@sol.localdomain/ Nicolai Stange (4): crypto: xts - restrict key lengths to approved values in FIPS mode crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode crypto: testmgr - disallow plain ghash in FIPS mode crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode Vladis Dronov (2): crypto: xts - drop xts_check_key() crypto: xts - drop redundant xts key check arch/s390/crypto/aes_s390.c | 4 --- arch/s390/crypto/paes_s390.c | 2 +- crypto/testmgr.c | 4 +-- drivers/crypto/atmel-aes.c | 2 +- drivers/crypto/axis/artpec6_crypto.c | 2 +- drivers/crypto/cavium/cpt/cptvf_algs.c | 8 +++--- .../crypto/cavium/nitrox/nitrox_skcipher.c | 8 +++--- drivers/crypto/ccree/cc_cipher.c | 2 +- .../crypto/marvell/octeontx/otx_cptvf_algs.c | 2 +- .../marvell/octeontx2/otx2_cptvf_algs.c | 2 +- include/crypto/xts.h | 25 +++++++------------ 11 files changed, 23 insertions(+), 38 deletions(-) base-commit: b6bb9676f2165d518b35ba3bea5f1fcfc0d969bf -- 2.38.1