On Tue, Jun 17, 2025 at 03:30:05PM -0400, Jeff Barnes wrote: > Set .fips_allowed in the following drbg alg_test_desc structs. > > drbg_nopr_hmac_sha384 > drbg_nopr_sha384 > drbg_pr_hmac_sha384 > drbg_pr_sha384 > > The sha384 and hmac_sha384 DRBGs with and without prediction resistance > were disallowed in an early version of the FIPS 140-3 Implementation > Guidance document. Hence, the fips_allowed flag in struct alg_test_desc > pertaining to the affected DRBGs was unset. The IG has been withdrawn > and they are allowed again. > > Furthermore, when the DRBGs are configured, /proc/crypto shows that > drbg_*pr_sha384 and drbg_*pr_hmac_sha384 are fips-approved ("fips: yes") > but because their self-tests are not run (a consequence of unsetting > the fips_allowed flag), the drbgs won't load successfully with the seeming > contradictory "fips: yes" in /proc/crypto. > > This series contains a single patch that sets the fips_allowed flag in > the sha384-impacted DRBGs, which restores the ability to load them in > FIPS mode. > > Link: https://lore.kernel.org/linux-crypto/979f4f6f-bb74-4b93-8cbf-6ed653604f0e@xxxxxxxxx/ > Link: https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf > > To: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> > To: David S. Miller <davem@xxxxxxxxxxxxx> > Cc: linux-crypto@xxxxxxxxxxxxxxx > Cc: linux-kernel@xxxxxxxxxxxxxxx > Signed-off-by: Jeff Barnes <jeffbarnes@xxxxxxxxxxxxxxxxxxx> > --- > crypto/testmgr.c | 4 ++++ > 1 file changed, 4 insertions(+) Patch applied. Thanks. -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt