Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp3788663rwl; Mon, 27 Mar 2023 20:41:50 -0700 (PDT) X-Google-Smtp-Source: AKy350b/ZflJo7RdKye7k841EQJQydh255JGK/3wH4Z0DGx5xs7VKTty/45WVshudVk6DtrOoDHA X-Received: by 2002:a17:90b:1215:b0:234:b170:1f27 with SMTP id gl21-20020a17090b121500b00234b1701f27mr10682445pjb.0.1679974909834; Mon, 27 Mar 2023 20:41:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679974909; cv=none; d=google.com; s=arc-20160816; b=RqS1Zu2oQY07M0Zd2JMceg/J3rGT+LNWEyXtiio7H8oEJgEf/3+vWzAonEvyWH1IYB DNOy2znedLGpzZO7lWqAJ5/4AyQ1bY0oa2sW2xrXhc2SY2qGSOzF5utFZNoajBAIOQsH cQthmIUgdP7ENJjdvfNpPEjlNcY+V3SCT/HAcJedBMFFTTnkols4V+iUZsNWnGwfB3tk t/MLusCfWjOIGDio8lGZ1JNzruPh4kAQHlreA9Hc/0r9AfoiPL2Jnd/spIN9zaIUBCrh MRtKPQRX+/Xf1D7lcckNoaYC7xEzqQ99d4uiVmPqaoD57KKw6VZ3T1b5R5shqr0ZDqRr kebw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date; bh=yH0nreXbeHgSVLF3w/SVcmLXdqoMNPav6vTgIMqSob4=; b=suNlvxYwysBSIjP0fpr3G9YgT2sL6IYHiu6F979uvo5sQdjpIXYrSP+uJfA/qO1RX7 rh19dco6nJVdLYIt3Vf9BCVd3y7VTz03aOaKSXYDwKQqc5/6eqsCU5zpWLf/ZsIxr2t7 V/GK67bI1A0PjjW4edk9pHRqfypG8AKbxFhWB8Wo/a9NCga+r3FkMLB0F3rmh67TW/2V la+emSDK2ocF/ki+a/jTkD4PS/PYd9MwkgJFZ2Z+mhKwknFmdM3wWdWkuBdmS+wYNVIE szlEi9gkAPdi8LzFs0/+CWN9WXHvM97zJcDGTC2EDB5TUoX66QaYazcEYls8rzkDjHI/ tgXQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e7-20020a17090301c700b001a048529dd3si30007908plh.54.2023.03.27.20.41.26; Mon, 27 Mar 2023 20:41:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230391AbjC1DgL (ORCPT + 99 others); Mon, 27 Mar 2023 23:36:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42000 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232701AbjC1Dfr (ORCPT ); Mon, 27 Mar 2023 23:35:47 -0400 Received: from 167-179-156-38.a7b39c.syd.nbn.aussiebb.net (167-179-156-38.a7b39c.syd.nbn.aussiebb.net [167.179.156.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98B35198D for ; Mon, 27 Mar 2023 20:35:28 -0700 (PDT) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1ph07H-009OEg-EX; Tue, 28 Mar 2023 11:35:24 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Tue, 28 Mar 2023 11:35:23 +0800 Date: Tue, 28 Mar 2023 11:35:23 +0800 From: Herbert Xu To: Stephan Mueller , Linux Crypto Mailing List Subject: [PATCH] crypto: drbg - Only fail when jent is unavailable in FIPS mode Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=4.3 required=5.0 tests=HELO_DYNAMIC_IPADDR2, PDS_RDNS_DYNAMIC_FP,RDNS_DYNAMIC,SPF_HELO_NONE,SPF_PASS,TVD_RCVD_IP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: **** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org When jent initialisation fails for any reason other than ENOENT, the entire drbg fails to initialise, even when we're not in FIPS mode. This is wrong because we can still use the kernel RNG when we're not in FIPS mode. Change it so that it only fails when we are in FIPS mode. Fixes: 57225e679788 ("crypto: drbg - Use callback API for random readiness") Signed-off-by: Herbert Xu diff --git a/crypto/drbg.c b/crypto/drbg.c index 982d4ca4526d..ff4ebbc68efa 100644 --- a/crypto/drbg.c +++ b/crypto/drbg.c @@ -1546,7 +1546,7 @@ static int drbg_prepare_hrng(struct drbg_state *drbg) const int err = PTR_ERR(drbg->jent); drbg->jent = NULL; - if (fips_enabled || err != -ENOENT) + if (fips_enabled) return err; pr_info("DRBG: Continuing without Jitter RNG\n"); } -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt