[PATCH RFC 010/104] crypto/testmgr: make fips_allowed a bit set

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



We'd like to distinguish between algorithms that are allowed by FIPS
due to being approved and algorithms that are allowed by FIPS due to
being non-cryptographic in nature (despite using the kernel's crypto
API).

Replace "1" with a named constant, FIPS_ALLOWED.

Signed-off-by: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
---
 crypto/testmgr.c | 218 ++++++++++++++++++++++++-----------------------
 1 file changed, 112 insertions(+), 106 deletions(-)

diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 47764fc879bb..4ca54cf6e244 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -142,12 +142,18 @@ struct kpp_test_suite {
 	unsigned int count;
 };
 
+/*
+ * Allowed algorithms are those which can exist inside a
+ * cryptographic module without making the module non-compliant
+ */
+#define FIPS_ALLOWED		1
+
 struct alg_test_desc {
 	const char *alg;
 	const char *generic_driver;
 	int (*test)(const struct alg_test_desc *desc, const char *driver,
 		    u32 type, u32 mask);
-	int fips_allowed;	/* set if alg is allowed in fips mode */
+	int fips_allowed;	/* see FIPS_* constants above */
 
 	union {
 		struct aead_test_suite aead;
@@ -4234,7 +4240,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "authenc(hmac(sha256),cbc(aes))",
 		.generic_driver = "authenc(hmac-sha256-lib,cbc(aes-generic))",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = __VECS(hmac_sha256_aes_cbc_tv_temp)
 		}
@@ -4255,7 +4261,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "authenc(hmac(sha256),ctr(aes))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "authenc(hmac(sha256),cts(cbc(aes)))",
 		.generic_driver = "authenc(hmac-sha256-lib,cts(cbc(aes-generic)))",
@@ -4266,7 +4272,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "authenc(hmac(sha384),cbc(des))",
 		.generic_driver = "authenc(hmac-sha384-lib,cbc(des-generic))",
@@ -4284,7 +4290,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "authenc(hmac(sha384),ctr(aes))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "authenc(hmac(sha384),cts(cbc(aes)))",
 		.generic_driver = "authenc(hmac-sha384-lib,cts(cbc(aes-generic)))",
@@ -4295,11 +4301,11 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "authenc(hmac(sha384),rfc3686(ctr(aes)))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "authenc(hmac(sha512),cbc(aes))",
 		.generic_driver = "authenc(hmac-sha512-lib,cbc(aes-generic))",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_aead,
 		.suite = {
 			.aead = __VECS(hmac_sha512_aes_cbc_tv_temp)
@@ -4321,11 +4327,11 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "authenc(hmac(sha512),ctr(aes))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "authenc(hmac(sha512),rfc3686(ctr(aes)))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "blake2b-160",
 		.test = alg_test_hash,
@@ -4357,7 +4363,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "cbc(aes)",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(aes_cbc_tv_template)
 		},
@@ -4415,7 +4421,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "cbc(paes)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		/* Same as cbc(sm4) except the key is stored in
 		 * hardware secure memory which we reference by index
@@ -4443,7 +4449,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 #if IS_ENABLED(CONFIG_CRYPTO_PAES_S390)
 		.alg = "cbc-paes-s390",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_skcipher,
 		.suite = {
 			.cipher = __VECS(aes_cbc_tv_template)
@@ -4465,7 +4471,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "ccm(aes)",
 		.generic_driver = "ccm_base(ctr(aes-generic),cbcmac(aes-generic))",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = {
 				____VECS(aes_ccm_tv_template),
@@ -4490,7 +4496,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		},
 	}, {
 		.alg = "cmac(aes)",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_hash,
 		.suite = {
 			.hash = __VECS(aes_cmac128_tv_template)
@@ -4517,7 +4523,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "crc32",
 		.generic_driver = "crc32-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(crc32_tv_template)
 		}
@@ -4525,14 +4531,14 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "crc32c",
 		.generic_driver = "crc32c-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(crc32c_tv_template)
 		}
 	}, {
 		.alg = "ctr(aes)",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(aes_ctr_tv_template)
 		}
@@ -4584,7 +4590,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "ctr(paes)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 
 		/* Same as ctr(sm4) except the key is stored in
@@ -4613,7 +4619,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 #if IS_ENABLED(CONFIG_CRYPTO_PAES_S390)
 		.alg = "ctr-paes-s390",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_skcipher,
 		.suite = {
 			.cipher = __VECS(aes_ctr_tv_template)
@@ -4622,7 +4628,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 #endif
 		.alg = "cts(cbc(aes))",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(cts_mode_tv_template)
 		}
@@ -4632,7 +4638,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "cts(cbc(paes))",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "cts(cbc(sm4))",
 		.test = alg_test_skcipher,
@@ -4648,7 +4654,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "deflate",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(deflate_comp_tv_template),
@@ -4658,7 +4664,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "deflate-iaa",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(deflate_comp_tv_template),
@@ -4677,28 +4683,28 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "drbg_nopr_ctr_aes128",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_ctr_aes128_tv_template)
 		}
 	}, {
 		.alg = "drbg_nopr_ctr_aes192",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_ctr_aes192_tv_template)
 		}
 	}, {
 		.alg = "drbg_nopr_ctr_aes256",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_ctr_aes256_tv_template)
 		}
 	}, {
 		.alg = "drbg_nopr_hmac_sha256",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_hmac_sha256_tv_template)
 		}
@@ -4709,18 +4715,18 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "drbg_nopr_hmac_sha384",
 		.test = alg_test_null,
-		.fips_allowed = 1
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "drbg_nopr_hmac_sha512",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_hmac_sha512_tv_template)
 		}
 	}, {
 		.alg = "drbg_nopr_sha256",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_nopr_sha256_tv_template)
 		}
@@ -4728,31 +4734,31 @@ static const struct alg_test_desc alg_test_descs[] = {
 		/* covered by drbg_nopr_sha256 test */
 		.alg = "drbg_nopr_sha384",
 		.test = alg_test_null,
-		.fips_allowed = 1
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "drbg_nopr_sha512",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_null,
 	}, {
 		.alg = "drbg_pr_ctr_aes128",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_pr_ctr_aes128_tv_template)
 		}
 	}, {
 		/* covered by drbg_pr_ctr_aes128 test */
 		.alg = "drbg_pr_ctr_aes192",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_null,
 	}, {
 		.alg = "drbg_pr_ctr_aes256",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_null,
 	}, {
 		.alg = "drbg_pr_hmac_sha256",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_pr_hmac_sha256_tv_template)
 		}
@@ -4760,15 +4766,15 @@ static const struct alg_test_desc alg_test_descs[] = {
 		/* covered by drbg_pr_hmac_sha256 test */
 		.alg = "drbg_pr_hmac_sha384",
 		.test = alg_test_null,
-		.fips_allowed = 1
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "drbg_pr_hmac_sha512",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "drbg_pr_sha256",
 		.test = alg_test_drbg,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.drbg = __VECS(drbg_pr_sha256_tv_template)
 		}
@@ -4776,15 +4782,15 @@ static const struct alg_test_desc alg_test_descs[] = {
 		/* covered by drbg_pr_sha256 test */
 		.alg = "drbg_pr_sha384",
 		.test = alg_test_null,
-		.fips_allowed = 1
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "drbg_pr_sha512",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_null,
 	}, {
 		.alg = "ecb(aes)",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(aes_tv_template)
 		}
@@ -4834,7 +4840,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "ecb(cipher_null)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "ecb(des)",
 		.test = alg_test_skcipher,
@@ -4868,7 +4874,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "ecb(paes)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "ecb(seed)",
 		.test = alg_test_skcipher,
@@ -4914,7 +4920,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 #if IS_ENABLED(CONFIG_CRYPTO_PAES_S390)
 		.alg = "ecb-paes-s390",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_skcipher,
 		.suite = {
 			.cipher = __VECS(aes_tv_template)
@@ -4929,14 +4935,14 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "ecdh-nist-p256",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ecdh_p256_tv_template)
 		}
 	}, {
 		.alg = "ecdh-nist-p384",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ecdh_p384_tv_template)
 		}
@@ -4949,21 +4955,21 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "ecdsa-nist-p256",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(ecdsa_nist_p256_tv_template)
 		}
 	}, {
 		.alg = "ecdsa-nist-p384",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(ecdsa_nist_p384_tv_template)
 		}
 	}, {
 		.alg = "ecdsa-nist-p521",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(ecdsa_nist_p521_tv_template)
 		}
@@ -4977,7 +4983,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "essiv(authenc(hmac(sha256),cbc(aes)),sha256)",
 		.generic_driver = "essiv(authenc(hmac-sha256-lib,cbc(aes-generic)),sha256-lib)",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = __VECS(essiv_hmac_sha256_aes_cbc_tv_temp)
 		}
@@ -4985,7 +4991,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "essiv(cbc(aes),sha256)",
 		.generic_driver = "essiv(cbc(aes-generic),sha256-lib)",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(essiv_aes_cbc_tv_template)
 		}
@@ -4993,35 +4999,35 @@ static const struct alg_test_desc alg_test_descs[] = {
 #if IS_ENABLED(CONFIG_CRYPTO_DH_RFC7919_GROUPS)
 		.alg = "ffdhe2048(dh)",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ffdhe2048_dh_tv_template)
 		}
 	}, {
 		.alg = "ffdhe3072(dh)",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ffdhe3072_dh_tv_template)
 		}
 	}, {
 		.alg = "ffdhe4096(dh)",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ffdhe4096_dh_tv_template)
 		}
 	}, {
 		.alg = "ffdhe6144(dh)",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ffdhe6144_dh_tv_template)
 		}
 	}, {
 		.alg = "ffdhe8192(dh)",
 		.test = alg_test_kpp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.kpp = __VECS(ffdhe8192_dh_tv_template)
 		}
@@ -5030,7 +5036,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "gcm(aes)",
 		.generic_driver = "gcm_base(ctr(aes-generic),ghash-generic)",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = __VECS(aes_gcm_tv_template)
 		}
@@ -5085,7 +5091,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "hmac(sha224)",
 		.generic_driver = "hmac-sha224-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha224_tv_template)
 		}
@@ -5093,35 +5099,35 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "hmac(sha256)",
 		.generic_driver = "hmac-sha256-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha256_tv_template)
 		}
 	}, {
 		.alg = "hmac(sha3-224)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha3_224_tv_template)
 		}
 	}, {
 		.alg = "hmac(sha3-256)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha3_256_tv_template)
 		}
 	}, {
 		.alg = "hmac(sha3-384)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha3_384_tv_template)
 		}
 	}, {
 		.alg = "hmac(sha3-512)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha3_512_tv_template)
 		}
@@ -5129,7 +5135,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "hmac(sha384)",
 		.generic_driver = "hmac-sha384-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha384_tv_template)
 		}
@@ -5137,7 +5143,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "hmac(sha512)",
 		.generic_driver = "hmac-sha512-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha512_tv_template)
 		}
@@ -5161,7 +5167,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		}
 	}, {
 		.alg = "jitterentropy_rng",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_null,
 	}, {
 		.alg = "krb5enc(cmac(camellia),cts(cbc(camellia)))",
@@ -5205,7 +5211,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "lz4",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(lz4_comp_tv_template),
@@ -5215,7 +5221,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "lz4hc",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(lz4hc_comp_tv_template),
@@ -5225,7 +5231,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "lzo",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(lzo_comp_tv_template),
@@ -5235,7 +5241,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "lzo-rle",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(lzorle_comp_tv_template),
@@ -5272,18 +5278,18 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "p1363(ecdsa-nist-p256)",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(p1363_ecdsa_nist_p256_tv_template)
 		}
 	}, {
 		.alg = "p1363(ecdsa-nist-p384)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "p1363(ecdsa-nist-p521)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pcbc(fcrypt)",
 		.test = alg_test_skcipher,
@@ -5294,28 +5300,28 @@ static const struct alg_test_desc alg_test_descs[] = {
 #if IS_ENABLED(CONFIG_CRYPTO_PHMAC_S390)
 		.alg = "phmac(sha224)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha224_tv_template)
 		}
 	}, {
 		.alg = "phmac(sha256)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha256_tv_template)
 		}
 	}, {
 		.alg = "phmac(sha384)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha384_tv_template)
 		}
 	}, {
 		.alg = "phmac(sha512)",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(hmac_sha512_tv_template)
 		}
@@ -5329,38 +5335,38 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "pkcs1(rsa,sha224)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1(rsa,sha256)",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(pkcs1_rsa_tv_template)
 		}
 	}, {
 		.alg = "pkcs1(rsa,sha3-256)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1(rsa,sha3-384)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1(rsa,sha3-512)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1(rsa,sha384)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1(rsa,sha512)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "pkcs1pad(rsa)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "polyval",
 		.test = alg_test_hash,
@@ -5370,7 +5376,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "rfc3686(ctr(aes))",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(aes_ctr_rfc3686_tv_template)
 		}
@@ -5384,7 +5390,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "rfc4106(gcm(aes))",
 		.generic_driver = "rfc4106(gcm_base(ctr(aes-generic),ghash-generic))",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = {
 				____VECS(aes_gcm_rfc4106_tv_template),
@@ -5396,7 +5402,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "rfc4309(ccm(aes))",
 		.generic_driver = "rfc4309(ccm_base(ctr(aes-generic),cbcmac(aes-generic)))",
 		.test = alg_test_aead,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.aead = {
 				____VECS(aes_ccm_rfc4309_tv_template),
@@ -5440,7 +5446,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "rsa",
 		.test = alg_test_akcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.akcipher = __VECS(rsa_tv_template)
 		}
@@ -5455,7 +5461,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "sha224",
 		.generic_driver = "sha224-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha224_tv_template)
 		}
@@ -5463,35 +5469,35 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "sha256",
 		.generic_driver = "sha256-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha256_tv_template)
 		}
 	}, {
 		.alg = "sha3-224",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha3_224_tv_template)
 		}
 	}, {
 		.alg = "sha3-256",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha3_256_tv_template)
 		}
 	}, {
 		.alg = "sha3-384",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha3_384_tv_template)
 		}
 	}, {
 		.alg = "sha3-512",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha3_512_tv_template)
 		}
@@ -5499,7 +5505,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "sha384",
 		.generic_driver = "sha384-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha384_tv_template)
 		}
@@ -5507,7 +5513,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "sha512",
 		.generic_driver = "sha512-lib",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(sha512_tv_template)
 		}
@@ -5556,21 +5562,21 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 		.alg = "x962(ecdsa-nist-p256)",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(x962_ecdsa_nist_p256_tv_template)
 		}
 	}, {
 		.alg = "x962(ecdsa-nist-p384)",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(x962_ecdsa_nist_p384_tv_template)
 		}
 	}, {
 		.alg = "x962(ecdsa-nist-p521)",
 		.test = alg_test_sig,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.sig = __VECS(x962_ecdsa_nist_p521_tv_template)
 		}
@@ -5608,7 +5614,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		.alg = "xts(aes)",
 		.generic_driver = "xts(ecb(aes-generic))",
 		.test = alg_test_skcipher,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.cipher = __VECS(aes_xts_tv_template)
 		}
@@ -5632,7 +5638,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 		 */
 		.alg = "xts(paes)",
 		.test = alg_test_null,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 	}, {
 		.alg = "xts(serpent)",
 		.generic_driver = "xts(ecb(serpent-generic))",
@@ -5657,7 +5663,7 @@ static const struct alg_test_desc alg_test_descs[] = {
 	}, {
 #if IS_ENABLED(CONFIG_CRYPTO_PAES_S390)
 		.alg = "xts-paes-s390",
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.test = alg_test_skcipher,
 		.suite = {
 			.cipher = __VECS(aes_xts_tv_template)
@@ -5666,14 +5672,14 @@ static const struct alg_test_desc alg_test_descs[] = {
 #endif
 		.alg = "xxhash64",
 		.test = alg_test_hash,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.hash = __VECS(xxhash64_tv_template)
 		}
 	}, {
 		.alg = "zstd",
 		.test = alg_test_comp,
-		.fips_allowed = 1,
+		.fips_allowed = FIPS_ALLOWED,
 		.suite = {
 			.comp = {
 				.comp = __VECS(zstd_comp_tv_template),
-- 
2.39.3





[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]
  Powered by Linux