Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp6460909rwl; Thu, 29 Dec 2022 13:20:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXuMrnNd2dFkRCoxCxxEURMlSnBpPxqZISIiuDA6PPAmEmMgOelbHAZ4vDAshbbE/0WkNeLJ X-Received: by 2002:a05:6a20:8b90:b0:9d:efbf:48f2 with SMTP id m16-20020a056a208b9000b0009defbf48f2mr33627198pzh.54.1672348830120; Thu, 29 Dec 2022 13:20:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672348830; cv=none; d=google.com; s=arc-20160816; b=qx9ST2YkrICywZLuGcdTJC8rcY4MWS91gvtORa1W2mPtEAlq5KyE4FwPkGf0C+ohU/ F1E/dtLDjndtSV8i16x6yqcg/s4cDOCAlhfAkgX0cEDIQ9p72jkWQMJKCS+4o/N5zCtE cK1K4QXxgjF4bl1hjKa9ZpqXbT33JwuRGAxllRRq/vxLZmYBTigsOOslNnVRBZ8aiazs jW+6i0JGzJzF8JXU0yu8no+TisOhrHBauRZ7WbUZ+NzlTItZHQ3Uxs4XfiC3d0KsAK/f YmE85U6d0js3qEl+nw5FjqME7Eg0n/tb/Vb+22JlRr/UPVYcLJ6RaGbeViBrGPc3BSWi fi3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=tkUzY+hLJqmesjdPwUJqndx8IuEcY0lUlWUymOpNZXo=; b=N5EvqIFJYk74qaUbwWQh/ZbzmGZrbsTpu0MBbrOkouQF5sGFrBejFhRFTdSx1Ih92t Ny8Xx1iNE5ByMV0oh8XJy++UhZqEmz/tIeBbsfsDGD2j9BRWfwfUQZkBTQPftvUgX1y5 pKjrR16xwQsi1Ki8mOjqbxIPSzhuq2+N1NwHCPzRuhfLVVUFS2QQAecCZRb9saGaRPqd YT4i3/YzdsTOJUuxSa7lUZ+46puVlD4I9XI1Obvn1yermDKhxQVV1YQTr4hQn9B/0N7p LlQvOYnLfvqSNiymKW4LBEtzCSFsYPzMLMyl5HMdE/4xLgNIHSgntxPhuHeTjV52dkYk FWAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aiLr6aOh; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d10-20020a056a0024ca00b0057731e4f614si3732599pfv.85.2022.12.29.13.20.17; Thu, 29 Dec 2022 13:20:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aiLr6aOh; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234215AbiL2VS0 (ORCPT + 99 others); Thu, 29 Dec 2022 16:18:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39578 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234153AbiL2VSL (ORCPT ); Thu, 29 Dec 2022 16:18:11 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 90D27A1AE for ; Thu, 29 Dec 2022 13:17:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1672348641; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=tkUzY+hLJqmesjdPwUJqndx8IuEcY0lUlWUymOpNZXo=; b=aiLr6aOhtYTdIOyA74fgpltmRgwKQon4Cj2N1yqm0frHSB9BpLAJuZR+xMVMkd3AaOSY8G coN2O5b4CV8k6xVREPIQBSoTWBYlTB761aUrPXRSlp0FQG0eHtDKMr+K3TwcVf2eE5+VCK Zgn79G5GVMqBngRV/jjH1qKIFojEfY0= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-610-2LQ8xaXgMj-sJWZYxP5oHw-1; Thu, 29 Dec 2022 16:17:20 -0500 X-MC-Unique: 2LQ8xaXgMj-sJWZYxP5oHw-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id ED2108F6E80; Thu, 29 Dec 2022 21:17:19 +0000 (UTC) Received: from rules.brq.redhat.com (ovpn-208-2.brq.redhat.com [10.40.208.2]) by smtp.corp.redhat.com (Postfix) with ESMTP id B7D12492B00; Thu, 29 Dec 2022 21:17:17 +0000 (UTC) From: Vladis Dronov To: Herbert Xu , "David S . Miller" Cc: Nicolai Stange , Elliott Robert , Stephan Mueller , Eric Biggers , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Vladis Dronov Subject: [PATCH v3 0/6] Trivial set of FIPS 140-3 related changes Date: Thu, 29 Dec 2022 22:17:04 +0100 Message-Id: <20221229211710.14912-1-vdronov@redhat.com> MIME-Version: 1.0 Content-type: text/plain Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, This patchset and cover letter was initially composed by Nicolai Stange and sent earlier as: https://lore.kernel.org/r/20221108142025.13461-1-nstange@suse.de/ with a subject: [PATCH 0/4] Trivial set of FIPS 140-3 related changes I'm adding patches 2 and 3 which (I hope) resolve issues spotted by reviewers of previous version of the patchset. This new patchset should ease our future kernel work on the FIPS mode. I'm quoting Nicolai's cover letter here: > Hi all, > > these four rather unrelated patches are basically a dump of some of the > more trivial changes required for working towards FIPS 140-3 conformance. > > Please pick as you deem appropriate. > > Thanks! > > Nicolai v2: fixed a block comment formatting v3: "Reviewed-by: Eric Biggers" was copied from the v1 thread: https://lore.kernel.org/r/Y6OXuT95MlkNanSR@sol.localdomain/ Nicolai Stange (4): crypto: xts - restrict key lengths to approved values in FIPS mode crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode crypto: testmgr - disallow plain ghash in FIPS mode crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode Vladis Dronov (2): crypto: xts - drop xts_check_key() crypto: xts - drop redundant xts key check arch/s390/crypto/aes_s390.c | 4 --- arch/s390/crypto/paes_s390.c | 2 +- crypto/testmgr.c | 4 +-- drivers/crypto/atmel-aes.c | 2 +- drivers/crypto/axis/artpec6_crypto.c | 2 +- drivers/crypto/cavium/cpt/cptvf_algs.c | 8 +++--- .../crypto/cavium/nitrox/nitrox_skcipher.c | 8 +++--- drivers/crypto/ccree/cc_cipher.c | 2 +- .../crypto/marvell/octeontx/otx_cptvf_algs.c | 2 +- .../marvell/octeontx2/otx2_cptvf_algs.c | 2 +- include/crypto/xts.h | 25 +++++++------------ 11 files changed, 23 insertions(+), 38 deletions(-) base-commit: b6bb9676f2165d518b35ba3bea5f1fcfc0d969bf -- 2.38.1