* [PATCH 0/2] Convert lib/digsig.c to SHA-1 library
@ 2025-08-15 2:17 Eric Biggers
2025-08-15 2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: Eric Biggers @ 2025-08-15 2:17 UTC (permalink / raw)
To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
Cc: Eric Snowberg, linux-crypto, Eric Biggers
This series converts lib/digsig.c to use the SHA-1 library API.
Please consider taking this series through the integrity tree.
Eric Biggers (2):
integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
lib/digsig: Use SHA-1 library instead of crypto_shash
lib/Kconfig | 3 +--
lib/digsig.c | 46 +++++---------------------------------
security/integrity/Kconfig | 1 +
3 files changed, 8 insertions(+), 42 deletions(-)
base-commit: 8f5ae30d69d7543eee0d70083daf4de8fe15d585
--
2.50.1
^ permalink raw reply [flat|nested] 6+ messages in thread
* [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
2025-08-15 2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
@ 2025-08-15 2:17 ` Eric Biggers
2025-08-15 16:48 ` Paul Menzel
2025-08-15 2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar
2 siblings, 1 reply; 6+ messages in thread
From: Eric Biggers @ 2025-08-15 2:17 UTC (permalink / raw)
To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
Cc: Eric Snowberg, linux-crypto, Eric Biggers
Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS, since
INTEGRITY_ASYMMETRIC_KEYS selects several options that depend on CRYPTO.
This unblocks the removal of the CRYPTO selection from SIGNATURE.
SIGNATURE (lib/digsig.c) itself will no longer need CRYPTO, but
INTEGRITY_ASYMMETRIC_KEYS was depending on it indirectly via the chain
SIGNATURE => INTEGRITY_SIGNATURE => INTEGRITY_ASYMMETRIC_KEYS.
Signed-off-by: Eric Biggers <ebiggers@kernel.org>
---
security/integrity/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig
index 3c45f4f3455fb..916d4f2bfc441 100644
--- a/security/integrity/Kconfig
+++ b/security/integrity/Kconfig
@@ -34,10 +34,11 @@ config INTEGRITY_ASYMMETRIC_KEYS
bool "Enable asymmetric keys support"
depends on INTEGRITY_SIGNATURE
default n
select ASYMMETRIC_KEY_TYPE
select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
+ select CRYPTO
select CRYPTO_RSA
select X509_CERTIFICATE_PARSER
help
This option enables digital signature verification using
asymmetric keys.
--
2.50.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash
2025-08-15 2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
2025-08-15 2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
@ 2025-08-15 2:17 ` Eric Biggers
2025-08-15 16:48 ` Paul Menzel
2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar
2 siblings, 1 reply; 6+ messages in thread
From: Eric Biggers @ 2025-08-15 2:17 UTC (permalink / raw)
To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
Cc: Eric Snowberg, linux-crypto, Eric Biggers
Now that a SHA-1 library API is available, use it instead of
crypto_shash. This is simpler and faster.
Signed-off-by: Eric Biggers <ebiggers@kernel.org>
---
lib/Kconfig | 3 +--
lib/digsig.c | 46 ++++++----------------------------------------
2 files changed, 7 insertions(+), 42 deletions(-)
diff --git a/lib/Kconfig b/lib/Kconfig
index c483951b624ff..e629449dd2a36 100644
--- a/lib/Kconfig
+++ b/lib/Kconfig
@@ -475,12 +475,11 @@ config MPILIB
which is used by IMA/EVM digital signature extension.
config SIGNATURE
tristate
depends on KEYS
- select CRYPTO
- select CRYPTO_SHA1
+ select CRYPTO_LIB_SHA1
select MPILIB
help
Digital signature verification. Currently only RSA is supported.
Implementation is done using GnuPG MPI library
diff --git a/lib/digsig.c b/lib/digsig.c
index 04b5e55ed95f5..5ddcc52f76863 100644
--- a/lib/digsig.c
+++ b/lib/digsig.c
@@ -16,19 +16,15 @@
#include <linux/err.h>
#include <linux/module.h>
#include <linux/slab.h>
#include <linux/key.h>
-#include <linux/crypto.h>
-#include <crypto/hash.h>
#include <crypto/sha1.h>
#include <keys/user-type.h>
#include <linux/mpi.h>
#include <linux/digsig.h>
-static struct crypto_shash *shash;
-
static const char *pkcs_1_v1_5_decode_emsa(const unsigned char *msg,
unsigned long msglen,
unsigned long modulus_bitlen,
unsigned long *outlen)
{
@@ -197,16 +193,16 @@ static int digsig_verify_rsa(struct key *key,
*
*/
int digsig_verify(struct key *keyring, const char *sig, int siglen,
const char *data, int datalen)
{
- int err = -ENOMEM;
struct signature_hdr *sh = (struct signature_hdr *)sig;
- struct shash_desc *desc = NULL;
+ struct sha1_ctx ctx;
unsigned char hash[SHA1_DIGEST_SIZE];
struct key *key;
char name[20];
+ int err;
if (siglen < sizeof(*sh) + 2)
return -EINVAL;
if (sh->algo != PUBKEY_ALGO_RSA)
@@ -229,51 +225,21 @@ int digsig_verify(struct key *keyring, const char *sig, int siglen,
if (IS_ERR(key)) {
pr_err("key not found, id: %s\n", name);
return PTR_ERR(key);
}
- desc = kzalloc(sizeof(*desc) + crypto_shash_descsize(shash),
- GFP_KERNEL);
- if (!desc)
- goto err;
-
- desc->tfm = shash;
-
- crypto_shash_init(desc);
- crypto_shash_update(desc, data, datalen);
- crypto_shash_update(desc, sig, sizeof(*sh));
- crypto_shash_final(desc, hash);
-
- kfree(desc);
+ sha1_init(&ctx);
+ sha1_update(&ctx, data, datalen);
+ sha1_update(&ctx, sig, sizeof(*sh));
+ sha1_final(&ctx, hash);
/* pass signature mpis address */
err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh),
hash, sizeof(hash));
-err:
key_put(key);
return err ? -EINVAL : 0;
}
EXPORT_SYMBOL_GPL(digsig_verify);
-static int __init digsig_init(void)
-{
- shash = crypto_alloc_shash("sha1", 0, 0);
- if (IS_ERR(shash)) {
- pr_err("shash allocation failed\n");
- return PTR_ERR(shash);
- }
-
- return 0;
-
-}
-
-static void __exit digsig_cleanup(void)
-{
- crypto_free_shash(shash);
-}
-
-module_init(digsig_init);
-module_exit(digsig_cleanup);
-
MODULE_LICENSE("GPL");
--
2.50.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
2025-08-15 2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
@ 2025-08-15 16:48 ` Paul Menzel
0 siblings, 0 replies; 6+ messages in thread
From: Paul Menzel @ 2025-08-15 16:48 UTC (permalink / raw)
To: Eric Biggers
Cc: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin,
Eric Snowberg, linux-crypto
Dear Eric,
Thank you for your patch.
Am 15.08.25 um 04:17 schrieb Eric Biggers:
> Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS, since
> INTEGRITY_ASYMMETRIC_KEYS selects several options that depend on CRYPTO.
>
> This unblocks the removal of the CRYPTO selection from SIGNATURE.
> SIGNATURE (lib/digsig.c) itself will no longer need CRYPTO, but
> INTEGRITY_ASYMMETRIC_KEYS was depending on it indirectly via the chain
> SIGNATURE => INTEGRITY_SIGNATURE => INTEGRITY_ASYMMETRIC_KEYS.
>
> Signed-off-by: Eric Biggers <ebiggers@kernel.org>
> ---
> security/integrity/Kconfig | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig
> index 3c45f4f3455fb..916d4f2bfc441 100644
> --- a/security/integrity/Kconfig
> +++ b/security/integrity/Kconfig
> @@ -34,10 +34,11 @@ config INTEGRITY_ASYMMETRIC_KEYS
> bool "Enable asymmetric keys support"
> depends on INTEGRITY_SIGNATURE
> default n
> select ASYMMETRIC_KEY_TYPE
> select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
> + select CRYPTO
> select CRYPTO_RSA
> select X509_CERTIFICATE_PARSER
> help
> This option enables digital signature verification using
> asymmetric keys.
Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>
Kind regards,
Paul
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash
2025-08-15 2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
@ 2025-08-15 16:48 ` Paul Menzel
0 siblings, 0 replies; 6+ messages in thread
From: Paul Menzel @ 2025-08-15 16:48 UTC (permalink / raw)
To: Eric Biggers
Cc: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin,
Eric Snowberg, linux-crypto
Dear Eric,
Thank you for your patch.
Am 15.08.25 um 04:17 schrieb Eric Biggers:
> Now that a SHA-1 library API is available, use it instead of
> crypto_shash. This is simpler and faster.
>
> Signed-off-by: Eric Biggers <ebiggers@kernel.org>
> ---
> lib/Kconfig | 3 +--
> lib/digsig.c | 46 ++++++----------------------------------------
> 2 files changed, 7 insertions(+), 42 deletions(-)
>
> diff --git a/lib/Kconfig b/lib/Kconfig
> index c483951b624ff..e629449dd2a36 100644
> --- a/lib/Kconfig
> +++ b/lib/Kconfig
> @@ -475,12 +475,11 @@ config MPILIB
> which is used by IMA/EVM digital signature extension.
>
> config SIGNATURE
> tristate
> depends on KEYS
> - select CRYPTO
> - select CRYPTO_SHA1
> + select CRYPTO_LIB_SHA1
> select MPILIB
> help
> Digital signature verification. Currently only RSA is supported.
> Implementation is done using GnuPG MPI library
>
> diff --git a/lib/digsig.c b/lib/digsig.c
> index 04b5e55ed95f5..5ddcc52f76863 100644
> --- a/lib/digsig.c
> +++ b/lib/digsig.c
> @@ -16,19 +16,15 @@
>
> #include <linux/err.h>
> #include <linux/module.h>
> #include <linux/slab.h>
> #include <linux/key.h>
> -#include <linux/crypto.h>
> -#include <crypto/hash.h>
> #include <crypto/sha1.h>
> #include <keys/user-type.h>
> #include <linux/mpi.h>
> #include <linux/digsig.h>
>
> -static struct crypto_shash *shash;
> -
> static const char *pkcs_1_v1_5_decode_emsa(const unsigned char *msg,
> unsigned long msglen,
> unsigned long modulus_bitlen,
> unsigned long *outlen)
> {
> @@ -197,16 +193,16 @@ static int digsig_verify_rsa(struct key *key,
> *
> */
> int digsig_verify(struct key *keyring, const char *sig, int siglen,
> const char *data, int datalen)
> {
> - int err = -ENOMEM;
> struct signature_hdr *sh = (struct signature_hdr *)sig;
> - struct shash_desc *desc = NULL;
> + struct sha1_ctx ctx;
> unsigned char hash[SHA1_DIGEST_SIZE];
> struct key *key;
> char name[20];
> + int err;
>
> if (siglen < sizeof(*sh) + 2)
> return -EINVAL;
>
> if (sh->algo != PUBKEY_ALGO_RSA)
> @@ -229,51 +225,21 @@ int digsig_verify(struct key *keyring, const char *sig, int siglen,
> if (IS_ERR(key)) {
> pr_err("key not found, id: %s\n", name);
> return PTR_ERR(key);
> }
>
> - desc = kzalloc(sizeof(*desc) + crypto_shash_descsize(shash),
> - GFP_KERNEL);
> - if (!desc)
> - goto err;
> -
> - desc->tfm = shash;
> -
> - crypto_shash_init(desc);
> - crypto_shash_update(desc, data, datalen);
> - crypto_shash_update(desc, sig, sizeof(*sh));
> - crypto_shash_final(desc, hash);
> -
> - kfree(desc);
> + sha1_init(&ctx);
> + sha1_update(&ctx, data, datalen);
> + sha1_update(&ctx, sig, sizeof(*sh));
> + sha1_final(&ctx, hash);
>
> /* pass signature mpis address */
> err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh),
> hash, sizeof(hash));
>
> -err:
> key_put(key);
>
> return err ? -EINVAL : 0;
> }
> EXPORT_SYMBOL_GPL(digsig_verify);
>
> -static int __init digsig_init(void)
> -{
> - shash = crypto_alloc_shash("sha1", 0, 0);
> - if (IS_ERR(shash)) {
> - pr_err("shash allocation failed\n");
> - return PTR_ERR(shash);
> - }
> -
> - return 0;
> -
> -}
> -
> -static void __exit digsig_cleanup(void)
> -{
> - crypto_free_shash(shash);
> -}
> -
> -module_init(digsig_init);
> -module_exit(digsig_cleanup);
> -
> MODULE_LICENSE("GPL");
Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>
Kind regards,
Paul
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH 0/2] Convert lib/digsig.c to SHA-1 library
2025-08-15 2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
2025-08-15 2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
2025-08-15 2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
@ 2025-08-19 18:11 ` Mimi Zohar
2 siblings, 0 replies; 6+ messages in thread
From: Mimi Zohar @ 2025-08-19 18:11 UTC (permalink / raw)
To: Eric Biggers, linux-integrity, Roberto Sassu, Dmitry Kasatkin
Cc: Eric Snowberg, linux-crypto
On Thu, 2025-08-14 at 19:17 -0700, Eric Biggers wrote:
> This series converts lib/digsig.c to use the SHA-1 library API.
>
> Please consider taking this series through the integrity tree.
>
> Eric Biggers (2):
Thanks, Eric.
Mimi
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2025-08-19 18:11 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-08-15 2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
2025-08-15 2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
2025-08-15 16:48 ` Paul Menzel
2025-08-15 2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
2025-08-15 16:48 ` Paul Menzel
2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).