summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorAleksander Jan Bajkowski <olek2@wp.pl>2026-02-06 20:26:59 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2026-02-28 12:53:58 +0900
commit0441ee8d35ad6998da5043c65c4124904e8daee2 (patch)
tree83268fe7b03b26408bf1acf101bb00c820136859 /crypto
parentf050e4209ab0ba3f13bb6272a07ce87cbea922c9 (diff)
downloadlwn-0441ee8d35ad6998da5043c65c4124904e8daee2.tar.gz
lwn-0441ee8d35ad6998da5043c65c4124904e8daee2.zip
crypto: tesmgr - allow authenc(hmac(sha224/sha384),cbc(aes)) in fips mode
The remaining combinations of AES-CBC and SHA* have already been marked as allowed. This commit does the same for SHA224 and SHA384. Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/testmgr.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 49b607f65f63..9f41e7b50edc 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -4134,6 +4134,7 @@ static const struct alg_test_desc alg_test_descs[] = {
.alg = "authenc(hmac(sha224),cbc(aes))",
.generic_driver = "authenc(hmac-sha224-lib,cbc(aes-generic))",
.test = alg_test_aead,
+ .fips_allowed = 1,
.suite = {
.aead = __VECS(hmac_sha224_aes_cbc_tv_temp)
}
@@ -4196,6 +4197,7 @@ static const struct alg_test_desc alg_test_descs[] = {
.alg = "authenc(hmac(sha384),cbc(aes))",
.generic_driver = "authenc(hmac-sha384-lib,cbc(aes-generic))",
.test = alg_test_aead,
+ .fips_allowed = 1,
.suite = {
.aead = __VECS(hmac_sha384_aes_cbc_tv_temp)
}