summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorAleksander Jan Bajkowski <olek2@wp.pl>2026-01-01 16:25:18 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2026-01-23 13:48:44 +0800
commite1dc530d0c082c903e74bf6e16d8a38843d3d1d7 (patch)
treebc99d076df331231b448d55ea7769262042579ee /crypto
parentb6e32ba6d32503440a3e3e16c8d0521cbb7e0c5d (diff)
crypto: testmgr - allow authenc(sha224,rfc3686) variant in fips mode
The remaining combinations of AES-CTR-RFC3686 and SHA* have already been marked as allowed in 8888690ef5f7. This commit does the same for SHA224. rfc3686(ctr(aes)) is already marked fips compliant, so these should be fine. Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/testmgr.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index a302be53896d..5bae4871690f 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -4138,6 +4138,10 @@ static const struct alg_test_desc alg_test_descs[] = {
.aead = __VECS(hmac_sha224_des3_ede_cbc_tv_temp)
}
}, {
+ .alg = "authenc(hmac(sha224),rfc3686(ctr(aes)))",
+ .test = alg_test_null,
+ .fips_allowed = 1,
+ }, {
.alg = "authenc(hmac(sha256),cbc(aes))",
.generic_driver = "authenc(hmac-sha256-lib,cbc(aes-generic))",
.test = alg_test_aead,