linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/2] Convert lib/digsig.c to SHA-1 library
@ 2025-08-15  2:17 Eric Biggers
  2025-08-15  2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
                   ` (2 more replies)
  0 siblings, 3 replies; 6+ messages in thread
From: Eric Biggers @ 2025-08-15  2:17 UTC (permalink / raw)
  To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
  Cc: Eric Snowberg, linux-crypto, Eric Biggers

This series converts lib/digsig.c to use the SHA-1 library API.

Please consider taking this series through the integrity tree.

Eric Biggers (2):
  integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
  lib/digsig: Use SHA-1 library instead of crypto_shash

 lib/Kconfig                |  3 +--
 lib/digsig.c               | 46 +++++---------------------------------
 security/integrity/Kconfig |  1 +
 3 files changed, 8 insertions(+), 42 deletions(-)

base-commit: 8f5ae30d69d7543eee0d70083daf4de8fe15d585
-- 
2.50.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
  2025-08-15  2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
@ 2025-08-15  2:17 ` Eric Biggers
  2025-08-15 16:48   ` Paul Menzel
  2025-08-15  2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
  2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar
  2 siblings, 1 reply; 6+ messages in thread
From: Eric Biggers @ 2025-08-15  2:17 UTC (permalink / raw)
  To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
  Cc: Eric Snowberg, linux-crypto, Eric Biggers

Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS, since
INTEGRITY_ASYMMETRIC_KEYS selects several options that depend on CRYPTO.

This unblocks the removal of the CRYPTO selection from SIGNATURE.
SIGNATURE (lib/digsig.c) itself will no longer need CRYPTO, but
INTEGRITY_ASYMMETRIC_KEYS was depending on it indirectly via the chain
SIGNATURE => INTEGRITY_SIGNATURE => INTEGRITY_ASYMMETRIC_KEYS.

Signed-off-by: Eric Biggers <ebiggers@kernel.org>
---
 security/integrity/Kconfig | 1 +
 1 file changed, 1 insertion(+)

diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig
index 3c45f4f3455fb..916d4f2bfc441 100644
--- a/security/integrity/Kconfig
+++ b/security/integrity/Kconfig
@@ -34,10 +34,11 @@ config INTEGRITY_ASYMMETRIC_KEYS
 	bool "Enable asymmetric keys support"
 	depends on INTEGRITY_SIGNATURE
 	default n
 	select ASYMMETRIC_KEY_TYPE
 	select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
+	select CRYPTO
 	select CRYPTO_RSA
 	select X509_CERTIFICATE_PARSER
 	help
 	  This option enables digital signature verification using
 	  asymmetric keys.
-- 
2.50.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash
  2025-08-15  2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
  2025-08-15  2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
@ 2025-08-15  2:17 ` Eric Biggers
  2025-08-15 16:48   ` Paul Menzel
  2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar
  2 siblings, 1 reply; 6+ messages in thread
From: Eric Biggers @ 2025-08-15  2:17 UTC (permalink / raw)
  To: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin
  Cc: Eric Snowberg, linux-crypto, Eric Biggers

Now that a SHA-1 library API is available, use it instead of
crypto_shash.  This is simpler and faster.

Signed-off-by: Eric Biggers <ebiggers@kernel.org>
---
 lib/Kconfig  |  3 +--
 lib/digsig.c | 46 ++++++----------------------------------------
 2 files changed, 7 insertions(+), 42 deletions(-)

diff --git a/lib/Kconfig b/lib/Kconfig
index c483951b624ff..e629449dd2a36 100644
--- a/lib/Kconfig
+++ b/lib/Kconfig
@@ -475,12 +475,11 @@ config MPILIB
 	  which is used by IMA/EVM digital signature extension.
 
 config SIGNATURE
 	tristate
 	depends on KEYS
-	select CRYPTO
-	select CRYPTO_SHA1
+	select CRYPTO_LIB_SHA1
 	select MPILIB
 	help
 	  Digital signature verification. Currently only RSA is supported.
 	  Implementation is done using GnuPG MPI library
 
diff --git a/lib/digsig.c b/lib/digsig.c
index 04b5e55ed95f5..5ddcc52f76863 100644
--- a/lib/digsig.c
+++ b/lib/digsig.c
@@ -16,19 +16,15 @@
 
 #include <linux/err.h>
 #include <linux/module.h>
 #include <linux/slab.h>
 #include <linux/key.h>
-#include <linux/crypto.h>
-#include <crypto/hash.h>
 #include <crypto/sha1.h>
 #include <keys/user-type.h>
 #include <linux/mpi.h>
 #include <linux/digsig.h>
 
-static struct crypto_shash *shash;
-
 static const char *pkcs_1_v1_5_decode_emsa(const unsigned char *msg,
 						unsigned long  msglen,
 						unsigned long  modulus_bitlen,
 						unsigned long *outlen)
 {
@@ -197,16 +193,16 @@ static int digsig_verify_rsa(struct key *key,
  *
  */
 int digsig_verify(struct key *keyring, const char *sig, int siglen,
 						const char *data, int datalen)
 {
-	int err = -ENOMEM;
 	struct signature_hdr *sh = (struct signature_hdr *)sig;
-	struct shash_desc *desc = NULL;
+	struct sha1_ctx ctx;
 	unsigned char hash[SHA1_DIGEST_SIZE];
 	struct key *key;
 	char name[20];
+	int err;
 
 	if (siglen < sizeof(*sh) + 2)
 		return -EINVAL;
 
 	if (sh->algo != PUBKEY_ALGO_RSA)
@@ -229,51 +225,21 @@ int digsig_verify(struct key *keyring, const char *sig, int siglen,
 	if (IS_ERR(key)) {
 		pr_err("key not found, id: %s\n", name);
 		return PTR_ERR(key);
 	}
 
-	desc = kzalloc(sizeof(*desc) + crypto_shash_descsize(shash),
-		       GFP_KERNEL);
-	if (!desc)
-		goto err;
-
-	desc->tfm = shash;
-
-	crypto_shash_init(desc);
-	crypto_shash_update(desc, data, datalen);
-	crypto_shash_update(desc, sig, sizeof(*sh));
-	crypto_shash_final(desc, hash);
-
-	kfree(desc);
+	sha1_init(&ctx);
+	sha1_update(&ctx, data, datalen);
+	sha1_update(&ctx, sig, sizeof(*sh));
+	sha1_final(&ctx, hash);
 
 	/* pass signature mpis address */
 	err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh),
 			     hash, sizeof(hash));
 
-err:
 	key_put(key);
 
 	return err ? -EINVAL : 0;
 }
 EXPORT_SYMBOL_GPL(digsig_verify);
 
-static int __init digsig_init(void)
-{
-	shash = crypto_alloc_shash("sha1", 0, 0);
-	if (IS_ERR(shash)) {
-		pr_err("shash allocation failed\n");
-		return  PTR_ERR(shash);
-	}
-
-	return 0;
-
-}
-
-static void __exit digsig_cleanup(void)
-{
-	crypto_free_shash(shash);
-}
-
-module_init(digsig_init);
-module_exit(digsig_cleanup);
-
 MODULE_LICENSE("GPL");
-- 
2.50.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
  2025-08-15  2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
@ 2025-08-15 16:48   ` Paul Menzel
  0 siblings, 0 replies; 6+ messages in thread
From: Paul Menzel @ 2025-08-15 16:48 UTC (permalink / raw)
  To: Eric Biggers
  Cc: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin,
	Eric Snowberg, linux-crypto

Dear Eric,


Thank you for your patch.

Am 15.08.25 um 04:17 schrieb Eric Biggers:
> Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS, since
> INTEGRITY_ASYMMETRIC_KEYS selects several options that depend on CRYPTO.
> 
> This unblocks the removal of the CRYPTO selection from SIGNATURE.
> SIGNATURE (lib/digsig.c) itself will no longer need CRYPTO, but
> INTEGRITY_ASYMMETRIC_KEYS was depending on it indirectly via the chain
> SIGNATURE => INTEGRITY_SIGNATURE => INTEGRITY_ASYMMETRIC_KEYS.
> 
> Signed-off-by: Eric Biggers <ebiggers@kernel.org>
> ---
>   security/integrity/Kconfig | 1 +
>   1 file changed, 1 insertion(+)
> 
> diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig
> index 3c45f4f3455fb..916d4f2bfc441 100644
> --- a/security/integrity/Kconfig
> +++ b/security/integrity/Kconfig
> @@ -34,10 +34,11 @@ config INTEGRITY_ASYMMETRIC_KEYS
>   	bool "Enable asymmetric keys support"
>   	depends on INTEGRITY_SIGNATURE
>   	default n
>   	select ASYMMETRIC_KEY_TYPE
>   	select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
> +	select CRYPTO
>   	select CRYPTO_RSA
>   	select X509_CERTIFICATE_PARSER
>   	help
>   	  This option enables digital signature verification using
>   	  asymmetric keys.

Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>


Kind regards,

Paul

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash
  2025-08-15  2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
@ 2025-08-15 16:48   ` Paul Menzel
  0 siblings, 0 replies; 6+ messages in thread
From: Paul Menzel @ 2025-08-15 16:48 UTC (permalink / raw)
  To: Eric Biggers
  Cc: linux-integrity, Mimi Zohar, Roberto Sassu, Dmitry Kasatkin,
	Eric Snowberg, linux-crypto

Dear Eric,


Thank you for your patch.

Am 15.08.25 um 04:17 schrieb Eric Biggers:
> Now that a SHA-1 library API is available, use it instead of
> crypto_shash.  This is simpler and faster.
> 
> Signed-off-by: Eric Biggers <ebiggers@kernel.org>
> ---
>   lib/Kconfig  |  3 +--
>   lib/digsig.c | 46 ++++++----------------------------------------
>   2 files changed, 7 insertions(+), 42 deletions(-)
> 
> diff --git a/lib/Kconfig b/lib/Kconfig
> index c483951b624ff..e629449dd2a36 100644
> --- a/lib/Kconfig
> +++ b/lib/Kconfig
> @@ -475,12 +475,11 @@ config MPILIB
>   	  which is used by IMA/EVM digital signature extension.
>   
>   config SIGNATURE
>   	tristate
>   	depends on KEYS
> -	select CRYPTO
> -	select CRYPTO_SHA1
> +	select CRYPTO_LIB_SHA1
>   	select MPILIB
>   	help
>   	  Digital signature verification. Currently only RSA is supported.
>   	  Implementation is done using GnuPG MPI library
>   
> diff --git a/lib/digsig.c b/lib/digsig.c
> index 04b5e55ed95f5..5ddcc52f76863 100644
> --- a/lib/digsig.c
> +++ b/lib/digsig.c
> @@ -16,19 +16,15 @@
>   
>   #include <linux/err.h>
>   #include <linux/module.h>
>   #include <linux/slab.h>
>   #include <linux/key.h>
> -#include <linux/crypto.h>
> -#include <crypto/hash.h>
>   #include <crypto/sha1.h>
>   #include <keys/user-type.h>
>   #include <linux/mpi.h>
>   #include <linux/digsig.h>
>   
> -static struct crypto_shash *shash;
> -
>   static const char *pkcs_1_v1_5_decode_emsa(const unsigned char *msg,
>   						unsigned long  msglen,
>   						unsigned long  modulus_bitlen,
>   						unsigned long *outlen)
>   {
> @@ -197,16 +193,16 @@ static int digsig_verify_rsa(struct key *key,
>    *
>    */
>   int digsig_verify(struct key *keyring, const char *sig, int siglen,
>   						const char *data, int datalen)
>   {
> -	int err = -ENOMEM;
>   	struct signature_hdr *sh = (struct signature_hdr *)sig;
> -	struct shash_desc *desc = NULL;
> +	struct sha1_ctx ctx;
>   	unsigned char hash[SHA1_DIGEST_SIZE];
>   	struct key *key;
>   	char name[20];
> +	int err;
>   
>   	if (siglen < sizeof(*sh) + 2)
>   		return -EINVAL;
>   
>   	if (sh->algo != PUBKEY_ALGO_RSA)
> @@ -229,51 +225,21 @@ int digsig_verify(struct key *keyring, const char *sig, int siglen,
>   	if (IS_ERR(key)) {
>   		pr_err("key not found, id: %s\n", name);
>   		return PTR_ERR(key);
>   	}
>   
> -	desc = kzalloc(sizeof(*desc) + crypto_shash_descsize(shash),
> -		       GFP_KERNEL);
> -	if (!desc)
> -		goto err;
> -
> -	desc->tfm = shash;
> -
> -	crypto_shash_init(desc);
> -	crypto_shash_update(desc, data, datalen);
> -	crypto_shash_update(desc, sig, sizeof(*sh));
> -	crypto_shash_final(desc, hash);
> -
> -	kfree(desc);
> +	sha1_init(&ctx);
> +	sha1_update(&ctx, data, datalen);
> +	sha1_update(&ctx, sig, sizeof(*sh));
> +	sha1_final(&ctx, hash);
>   
>   	/* pass signature mpis address */
>   	err = digsig_verify_rsa(key, sig + sizeof(*sh), siglen - sizeof(*sh),
>   			     hash, sizeof(hash));
>   
> -err:
>   	key_put(key);
>   
>   	return err ? -EINVAL : 0;
>   }
>   EXPORT_SYMBOL_GPL(digsig_verify);
>   
> -static int __init digsig_init(void)
> -{
> -	shash = crypto_alloc_shash("sha1", 0, 0);
> -	if (IS_ERR(shash)) {
> -		pr_err("shash allocation failed\n");
> -		return  PTR_ERR(shash);
> -	}
> -
> -	return 0;
> -
> -}
> -
> -static void __exit digsig_cleanup(void)
> -{
> -	crypto_free_shash(shash);
> -}
> -
> -module_init(digsig_init);
> -module_exit(digsig_cleanup);
> -
>   MODULE_LICENSE("GPL");

Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>


Kind regards,

Paul

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 0/2] Convert lib/digsig.c to SHA-1 library
  2025-08-15  2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
  2025-08-15  2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
  2025-08-15  2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
@ 2025-08-19 18:11 ` Mimi Zohar
  2 siblings, 0 replies; 6+ messages in thread
From: Mimi Zohar @ 2025-08-19 18:11 UTC (permalink / raw)
  To: Eric Biggers, linux-integrity, Roberto Sassu, Dmitry Kasatkin
  Cc: Eric Snowberg, linux-crypto

On Thu, 2025-08-14 at 19:17 -0700, Eric Biggers wrote:
> This series converts lib/digsig.c to use the SHA-1 library API.
> 
> Please consider taking this series through the integrity tree.
> 
> Eric Biggers (2):

Thanks, Eric.

Mimi


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2025-08-19 18:11 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-08-15  2:17 [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Eric Biggers
2025-08-15  2:17 ` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS Eric Biggers
2025-08-15 16:48   ` Paul Menzel
2025-08-15  2:17 ` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash Eric Biggers
2025-08-15 16:48   ` Paul Menzel
2025-08-19 18:11 ` [PATCH 0/2] Convert lib/digsig.c to SHA-1 library Mimi Zohar

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).