On Mon, Jul 29, 2019 at 10:16:48PM +0000, Pascal Van Leeuwen wrote: > > > > Note that the "empty test suite" message shouldn't be printed (especially not at > > > > KERN_ERR level!) if it's working as intended. > > > > > > > That's not my code, that was already there. I already got these messages before my > > > modifications, for some ciphersuites. Of course if we don't want that, we can make > > > it a pr_warn pr_dbg? > > > > I didn't get these error messages before this patch. They start showing up > > because this patch changes alg_test_null to alg_test_aead for algorithms with no > > test vectors. > > > Ok, I guess I caused it for some additional ciphersuites by forcing them > to be at least fuzz tested. But there were some ciphersuites without test > vectors already reporting this in my situation because they did not point > to alg_test_null in the first place. Are you sure? I don't see anything that had no test vectors but didn't use alg_test_null. > So it wasn't entirely clear what the > whole intention was in the first place, as it wasn't consistent. > If we all agree on the logging level we want for this message, then I can > make that change. I suggest at least downgrading it to KERN_INFO, since that's the level used for logging that there wasn't any test description found at all: printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver); > > > > > Why not put these new fields in the existing 'struct aead_test_suite'? > > > > > > > > I don't see the point of the separate 'params' struct. It just confuses things. > > > > > > > Mostly because I'm not that familiar with C datastructures (I'm not a programmer > > > and this is pretty much my first serious experience with C), so I didn't know how > > > to do that / didn't want to break anything else :-) > > > > > > So if you can provide some example on how to do that ... > > > > I'm simply suggesting adding the fields of 'struct aead_test_params' to > > 'struct aead_test_suite'. > > > My next mail tried to explain why that's not so simple ... The only actual issue is that you can't reuse the __VECS() macro because it adds an extra level of braces, right? > Actually, the patch *should* (didn't try yet) make it work for both: if both > alen and clen are valid (>=0) then it creates a key blob from those ranges. > If only clen is valid (>=0) but a alen is not (i.e., -1), then it will just > generate a random key the "normal" way with length clen. > So, for authenc you define both ranges, for other AEAD you define only a > cipher key length range with the auth key range count at 0. > Okay, I guess that makes sense. It wasn't obvious to me though. - Eric