From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 3B04BC433EF for ; Wed, 22 Dec 2021 17:59:14 +0000 (UTC) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 55BFA3C9262 for ; Wed, 22 Dec 2021 18:59:12 +0100 (CET) Received: from in-2.smtp.seeweb.it (in-2.smtp.seeweb.it [217.194.8.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id A3A4D3C091D for ; Wed, 22 Dec 2021 18:59:02 +0100 (CET) Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by in-2.smtp.seeweb.it (Postfix) with ESMTPS id D20066000F7 for ; Wed, 22 Dec 2021 18:59:01 +0100 (CET) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 9B3ACB81DA8; Wed, 22 Dec 2021 17:59:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CC5E9C36AE8; Wed, 22 Dec 2021 17:58:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1640195939; bh=YzsGIhsCjKlo+Dr17RpxbVSdBhRvXkVe0NTxUujkss4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Rh14M3s5UinP19Tdq4TYIbylkdD3uwHSssNJMhXpgx9SKXi2wvS0p+dEa1NYQFmC8 BOZ6/t3iEwQMtZjqTQx7D0IJtRw5M7hZ2dtIc6QBgPObhJNsna9EjWFp5OeGMYh5+A xjjg5y+UnEdQcEd+Kaeht4iZA6QgFCw6MCO8K/p/d7UUAH1lINAUWS0bwhyTzp1gIK rVUVx18OGKrNBO8j8fczQMShwA1g81l0FxT4CDxQeqh9B8QsiohH/P5gZGm0nyO0JS jQC1ySF7aL/tSMfqxvkBTVrGBijk4JLvzVOhrIGylocoUCzOs6OIPouh//34aCCUzj qOplanY4zvGuQ== Date: Wed, 22 Dec 2021 11:58:55 -0600 From: Eric Biggers To: Petr Vorel Message-ID: References: <20211220212756.13510-1-pvorel@suse.cz> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: X-Virus-Scanned: clamav-milter 0.102.4 at in-2.smtp.seeweb.it X-Virus-Status: Clean Subject: Re: [LTP] [PATCH v2 1/1] tst_af_alg: Another fix for disabled weak cipher X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ltp@lists.linux.it Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ltp-bounces+ltp=archiver.kernel.org@lists.linux.it Sender: "ltp" On Wed, Dec 22, 2021 at 06:01:37PM +0100, Petr Vorel wrote: > Hi Eric, > > > On Mon, Dec 20, 2021 at 10:27:56PM +0100, Petr Vorel wrote: > > > tst_af_alg.c:84: TBROK: unexpected error binding AF_ALG socket to hash algorithm 'md5': ELIBBAD (80) > > > This seems like a kernel bug; shouldn't the kernel report ENOENT for the > > algorithms that fips_enabled isn't allowing, just like other algorithms that > > aren't available? Have you checked with linux-crypto@vger.kernel.org that the > > current behavior is actually intentional? > It reports ELIBBAD. Am I missing something? > It does. I am asking whether it should. The purpose of LTP is to find kernel bugs; perhaps it found a bug here? - Eric -- Mailing list info: https://lists.linux.it/listinfo/ltp