[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221221224111.19254-5-vdronov@redhat.com>
Date: Wed, 21 Dec 2022 23:41:09 +0100
From: Vladis Dronov <vdronov@...hat.com>
To: herbert@...dor.apana.org.au, davem@...emloft.net
Cc: nstange@...e.de, elliott@....com, linux-crypto@...r.kernel.org,
linux-kernel@...r.kernel.org, smueller@...onox.de,
vdronov@...hat.com
Subject: [PATCH 4/6] crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
From: Nicolai Stange <nstange@...e.de>
cbcmac(aes) may be used only as part of the ccm(aes) construction in FIPS
mode. Since commit d6097b8d5d55 ("crypto: api - allow algs only in specific
constructions in FIPS mode") there's support for using spawns which by
itself are marked as non-approved from approved template instantiations.
So simply mark plain cbcmac(aes) as non-approved in testmgr to block any
attempts of direct instantiations in FIPS mode.
Signed-off-by: Nicolai Stange <nstange@...e.de>
Signed-off-by: Vladis Dronov <vdronov@...hat.com>
---
crypto/testmgr.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 4476ac97baa5..562463a77a76 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -4501,7 +4501,6 @@ static const struct alg_test_desc alg_test_descs[] = {
}, {
#endif
.alg = "cbcmac(aes)",
- .fips_allowed = 1,
.test = alg_test_hash,
.suite = {
.hash = __VECS(aes_cbcmac_tv_template)
--
2.38.1
Powered by blists - more mailing lists