summaryrefslogtreecommitdiff
path: root/crypto/asymmetric_keys/x509.asn1
diff options
context:
space:
mode:
authorRobert Elliott <elliott@hpe.com>2022-08-14 23:29:15 -0500
committerHerbert Xu <herbert@gondor.apana.org.au>2022-08-26 18:49:09 +0800
commitf5c203d7a37bf6e01bbdde8106e11f5257871430 (patch)
treee07989389bbc18abc3236d166d5d230824a5e54f /crypto/asymmetric_keys/x509.asn1
parent6be1ecadb37bb7bcc13b1b2c1c3cd84b3b15a1e7 (diff)
downloadlinux-crypto-f5c203d7a37bf6e01bbdde8106e11f5257871430.tar.gz
linux-crypto-f5c203d7a37bf6e01bbdde8106e11f5257871430.zip
crypto: tcrypt - remove mode=1000
The lists of algothms checked for existence by modprobe tcrypt mode=1000 generates three bogus errors: modprobe tcrypt mode=1000 console log: tcrypt: alg rot13 not found tcrypt: alg cts not found tcrypt: alg arc4 not found rot13 is not an algorithm in the crypto API or tested. cts is a wrapper, not a base algorithm. arc4 is named ecb(arc4), not arc4. Also, the list is missing numerous algorithms that are tested by other test modes: blake2b-512 blake2s-256 crct10dif xxhash64 ghash cast5 sm4 ansi_prng Several of the algorithms are only available if CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE is enabled: arc4 khazad seed tea, xtea, xeta Rather that fix that list, remove test mode=1000 entirely. It seems to have limited utility, and a web search shows no discussion of anybody using it. Suggested-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Robert Elliott <elliott@hpe.com> Reviewed-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/asymmetric_keys/x509.asn1')
0 files changed, 0 insertions, 0 deletions