Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2640576rdh; Mon, 30 Oct 2023 03:31:21 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEuRDJz7NkoDfygBK4fDD0IS9+VFT1qh1eiHqsbZbzlFTwBJ8MQBtibOpOIrCJi4AXYS0ze X-Received: by 2002:a05:6358:338c:b0:168:e589:6494 with SMTP id i12-20020a056358338c00b00168e5896494mr11492474rwd.24.1698661881646; Mon, 30 Oct 2023 03:31:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698661881; cv=none; d=google.com; s=arc-20160816; b=lWT3kjk3pFCffecJQ3bsALNaL9aq57ueGy6vErRpc/jyQHqjjfnJqxvPG3tfWrD+aG vmBj7WfPdMYVfEZOENSEopjpFLU8IL7k5OCh1MuTEIn/CfEn1aZSBugJWNRPJVHo+0/6 +2a8WKm9OiaWXUk4z5tp7n/cy23mPLCugZ8IbnI/rpgKEeyn1kaMqeQSTn04yOOiNpao WrhhjgkhqkKQ6q4Aszc+DCwtCz32Et6wwybCRUMao670RhuFuVddmTSHEKop2uAuDPXv IyKJZpzIBU4YlGhlAjrA13Ou+zqFCUuQXuuLfvMJJNrVem8xT4e/Gva+NbjjEVuYTCmS +PoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=9khDIoutyVVO4OorlUjWR4zCGtUfevyQIKBqlCrcSI4=; fh=rAloy5qvB3whLllVyjQFtoFWMezRBzi5Xte7ricA7DA=; b=e664PDUXfxiEwN87VrXfhCXUitPwFVTfoIwqRGebEwcuPhvcPW/U6YqaoONl5AKFqe 842tszd727ykJ/FplsoLQ2zymApPb5KYSQoqbRcv0YQWUISq3vbrqVdD0r80q9ascfCf 3vcNPBHqTt3flEaIgk5hMh2hFlWdtyMtN3hVMCeVjmHkR79csj1OOejJNbFp90uaHIHM FyM9fO3G7hISQ5EAmJzOfyk+uVctz0eiqDwvaRfBZiHS2LALNvOHYlID+1OKozpgmpam j4BLPrdMVuYnvt5klpCkjPaUhX9pFXNNn97YDbmcn8fNY47NzS1Fed6joivv7EgEN4r9 U9Qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=b7jjbcev; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id ch10-20020a056a0208ca00b005b2cbc049c8si5015455pgb.647.2023.10.30.03.31.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 Oct 2023 03:31:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=b7jjbcev; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 92176806533D; Mon, 30 Oct 2023 03:31:17 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232539AbjJ3KbS (ORCPT + 99 others); Mon, 30 Oct 2023 06:31:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232532AbjJ3KbR (ORCPT ); Mon, 30 Oct 2023 06:31:17 -0400 Received: from smtp-relay-internal-1.canonical.com (smtp-relay-internal-1.canonical.com [185.125.188.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B22B8E for ; Mon, 30 Oct 2023 03:31:15 -0700 (PDT) Received: from mail-lf1-f72.google.com (mail-lf1-f72.google.com [209.85.167.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id BF3603F04D for ; Mon, 30 Oct 2023 10:31:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1698661869; bh=9khDIoutyVVO4OorlUjWR4zCGtUfevyQIKBqlCrcSI4=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=b7jjbcevW6TEkqWllgoeUjGHjvOfuI2jC4XmBXk3cf+A/gWbxjNdCqGzR22Hhrh1R G+Uj/SK5yzOJQQ56W7FKEfVpC+kVf9JNz3JDlDsveW5Z+FTxPzh7duJ7mTyggJnyYR fDhbxAkgvqro6bPkppuEc2mRT5fe6zk65G7WI98PjDAU0wvQf6C2T4Yt9gkmtzIb8T t9xUpRCB+Eq+XVyc1fp7O8JsfEmJ5zChC9yMzcI6VONO80afizsQc1pojkoXg4W/Ae AdjLA1CSBfF7NmffTwj4gWfYHD15p9ZJBb3vh8aILB5fqpCDID/fltYdYEnZpWacnQ 8SozQFnZud69Q== Received: by mail-lf1-f72.google.com with SMTP id 2adb3069b0e04-50911cc75adso1976020e87.1 for ; Mon, 30 Oct 2023 03:31:09 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698661868; x=1699266668; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=9khDIoutyVVO4OorlUjWR4zCGtUfevyQIKBqlCrcSI4=; b=OH2vQBFGD6orECetqGoQNaGwIVCxOzVjMUpwSOzyawQrSh1i1dZPbnch2Siwmxvk76 wTaQcJMriXsHpByg+Mu1LG4eKWHhshQ2jKwKHbuNqkxvYSWGzm93tatvybRKDRTg7W7s jDxOR6MVWKHkKzPXByHPPlQ5L8lji27EuoiQE1qTvmkmkh4WRrC/LKtb0hkUPrXBvhk9 aexkKojeUzI+9yQWyKYsTIXlaEL9VTcJfbPRnTMdMTENUDlGBz/pjn3G9zg/U6zoizpj DK6KVwqPexLH/J/oTK5/ADjJ7XlvoZHSd6RmhAjVyJrR2v/iJEIoEJ4Ux4jGuKkXkCWU TkSw== X-Gm-Message-State: AOJu0YybbMhwcJUNzg8sV2l9q9dt7LnvTQtFkPgQq059V8oCiN/gNoby MaAjFKx4mEm4Bs3w1SwFlBNZ76Qq+On/Pe74QgKIgGxfsK0qlwiaWTLx5n62jQ6Wg64Ra2+b1H5 hig1xhpLZCFXSchHMAc6jeyB6gZozbHeSOc9ldGfEa/3980YNTECqiVeQSg== X-Received: by 2002:a19:ca45:0:b0:502:9fce:b6da with SMTP id h5-20020a19ca45000000b005029fceb6damr6117132lfj.21.1698661868747; Mon, 30 Oct 2023 03:31:08 -0700 (PDT) X-Received: by 2002:a19:ca45:0:b0:502:9fce:b6da with SMTP id h5-20020a19ca45000000b005029fceb6damr6117116lfj.21.1698661868368; Mon, 30 Oct 2023 03:31:08 -0700 (PDT) MIME-Version: 1.0 References: <20231029204823.663930-1-dimitri.ledkov@canonical.com> <20231029204823.663930-2-dimitri.ledkov@canonical.com> <6413919.eMfrkXpHmx@tauon.chronox.de> In-Reply-To: <6413919.eMfrkXpHmx@tauon.chronox.de> From: Dimitri John Ledkov Date: Mon, 30 Oct 2023 12:30:32 +0200 Message-ID: Subject: Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256 To: Stephan Mueller Cc: Herbert Xu , "David S. Miller" , simo@redhat.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Mon, 30 Oct 2023 03:31:17 -0700 (PDT) On Mon, 30 Oct 2023 at 12:23, Stephan Mueller wrote: > > Am Sonntag, 29. Oktober 2023, 21:48:21 CET schrieb Dimitri John Ledkov: > > Hi Dimitri, > > > When originally drbg was introduced FIPS self-checks for all types but > > CTR were using the most preferred parameters for each type of > > DRBG. Update CTR self-check to use aes256. > > > > Fixes: 541af946fe ("crypto: drbg - SP800-90A Deterministic Random Bit > > Generator") Signed-off-by: Dimitri John Ledkov > > > > > > > --- > > crypto/drbg.c | 6 +++--- > > 1 file changed, 3 insertions(+), 3 deletions(-) > > > > diff --git a/crypto/drbg.c b/crypto/drbg.c > > index 2cce18dcfc..b120e2866b 100644 > > --- a/crypto/drbg.c > > +++ b/crypto/drbg.c > > @@ -1478,8 +1478,8 @@ static int drbg_generate(struct drbg_state *drbg, > > err = alg_test("drbg_pr_hmac_sha256", > > "drbg_pr_hmac_sha256", 0, 0); > > else if (drbg->core->flags & DRBG_CTR) > > - err = alg_test("drbg_pr_ctr_aes128", > > - "drbg_pr_ctr_aes128", 0, 0); > > + err = alg_test("drbg_pr_ctr_aes256", > > + "drbg_pr_ctr_aes256", 0, 0); > > else > > err = alg_test("drbg_pr_sha256", > > "drbg_pr_sha256", 0, 0); > > @@ -2017,7 +2017,7 @@ static inline int __init drbg_healthcheck_sanity(void) > > return 0; > > > > #ifdef CONFIG_CRYPTO_DRBG_CTR > > - drbg_convert_tfm_core("drbg_nopr_ctr_aes128", &coreref, &pr); > > + drbg_convert_tfm_core("drbg_nopr_ctr_aes256", &coreref, &pr); > > #endif > > #ifdef CONFIG_CRYPTO_DRBG_HASH > > drbg_convert_tfm_core("drbg_nopr_sha256", &coreref, &pr); > > I am not sure again whether this warrants a "Fixes" tag, because the first > modification is in a commented-out code section and the latter again intends > to test the DRBG thresholds and thus just needs "a" DRBG. > Agreed, it is more of a reference. But yes, I don't believe this needs to trigger stable backports - because yes it is like dead code, or fips only code which majority kernels don't do. Maybe I should reference that commit in description only? > Anyhow: > > Reviewed-by: Stephan Mueller > > > Ciao > Stephan > > -- okurrr, Dimitri