Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp1043978pxt; Fri, 6 Aug 2021 22:33:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy8yoKkvNV0PtQapBKTYR3aZHl3zEdQTHIiAswJu3zEKGRB8rD5CHiAlAdD+7ywMv6a+YzB X-Received: by 2002:a05:6638:2714:: with SMTP id m20mr13003093jav.41.1628314435803; Fri, 06 Aug 2021 22:33:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628314435; cv=none; d=google.com; s=arc-20160816; b=tP5sEF8p8m7mSeNFLR1bV+mfklkmhL0JGrQo8q63H2mtM9e7TmRuuGIZ43ZyDhjHTS sl7IG9xcBuCOwcRm0algQJQkBkd1wvFKsxqIO9eaN89WrICvVY6gNK0WnC/jEJhkL4y7 XtnnYF3cJfKClIafyBv+rB+5tXlTzUFrIpOKmc1qYkekvUJi/DdUqoL4KaXsUmo5+ZgH 8yJB/i4J0ADjtCOOXxSBirCytxNZa107rcFHbXmtwZnFxQnNVN5WLe+PVVt4h7O1ht5l 7dDzWEiwNVDY2fhDa52SUejaZ4YmK3v2ZD1NvNknNFja5BJex3IJVcRobgZ8TxJcKgLU Gn3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=5QNRU64Ayd4lyfw+KBaQ95sxBs3Uu1oi3/geCY0rcr8=; b=DLP6RzM11qMfhy7Oo9QKgXdP3drgxlIDxDV/ZXIvvaUo4IUUcaMa6DoexUQvQZP5Pj crG2nl+9Dbayl31dM0sxmDnlJB8ibeADgO7C/pJFu4Da07nggGtLiTGcCmCRPWYhEqN3 6Z/xKCLrntU5bl4UZGGNUd5X2bp1fk9u+GBXViZ+MN7aT0S8W5mrUIyCk0Uq0yWKfdAQ vwpy0XmJRVj7Vd5Jb6RCeF6+sAU+pLsg13Jy0pDIzVGXYIqM/v9qicLhS+TRRaJ0poQh 2eyZX/Bl2VzXMimir8f7FuTP4Gv3UViLQ2KxsUjjdAX+ypvQr/gs2shsLa/kkALqvgUA g2Pg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Ys9/0zUk"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b15si12768665ilv.151.2021.08.06.22.33.31; Fri, 06 Aug 2021 22:33:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Ys9/0zUk"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230423AbhHGFdq (ORCPT + 99 others); Sat, 7 Aug 2021 01:33:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:51282 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230377AbhHGFdq (ORCPT ); Sat, 7 Aug 2021 01:33:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1F25261050; Sat, 7 Aug 2021 05:33:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1628314409; bh=HNt1FmbyVPf6HRrgnnW4+/eZ4HV+Da68T9WAMEWLK3M=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Ys9/0zUkuvZinfMRS6ci6qvNyzySEyediZANpXqbzYr/+QWF0VUNmEEiol0cqBz0E QWJTcubDIqtjEo3A6le8bL9H5DcaQtkwwBoaEQgq31ZZHnr/3Z/ec+3MJVYvUuNtzI UUfvrBLaCOkySARDvGOeTnRsJJjirvsAU4xL6+/+P2iuExk5PaIiqber+FZ3yJB4XF gzfQ4jG93YtRK8CmLjNVX9CwKj3SwOBJtCsmj1Gg107ZqdbQrDX26gZaYHQX3eVBzt bgymv2ZejYFrSRx0x7ukoAiw4moGzZfmFTj3MUH6YdscaTVJ0r3nOpdQCalApdMh5g GbB5ajJLTNyvQ== Date: Fri, 6 Aug 2021 22:33:27 -0700 From: Eric Biggers To: Chen Li Cc: herbert , davem , linux-crypto , linux-kernel Subject: Re: [PATCH] crypto: lib/sha256 - add sha256_value function Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sat, Aug 07, 2021 at 11:06:39AM +0800, Chen Li wrote: > Add a function sha256_value() which accepts a string and store SHA256 hash > of this string into dest. > > Signed-off-by: Chen Li > --- > include/crypto/sha2.h | 1 + > lib/crypto/sha256.c | 23 +++++++++++++++++++++++ > 2 files changed, 24 insertions(+) > > diff --git a/include/crypto/sha2.h b/include/crypto/sha2.h > index 2838f529f31e..ce17954cab38 100644 > --- a/include/crypto/sha2.h > +++ b/include/crypto/sha2.h > @@ -115,6 +115,7 @@ static inline void sha256_init(struct sha256_state *sctx) > void sha256_update(struct sha256_state *sctx, const u8 *data, unsigned int len); > void sha256_final(struct sha256_state *sctx, u8 *out); > void sha256(const u8 *data, unsigned int len, u8 *out); > +int sha256_value(u8 **dest, const u8 *src); > > static inline void sha224_init(struct sha256_state *sctx) > { > diff --git a/lib/crypto/sha256.c b/lib/crypto/sha256.c > index 72a4b0b1df28..ce1de7a3e32e 100644 > --- a/lib/crypto/sha256.c > +++ b/lib/crypto/sha256.c > @@ -13,6 +13,8 @@ > > #include > #include > +#include > +#include > #include > #include > #include > @@ -206,4 +208,25 @@ void sha256(const u8 *data, unsigned int len, u8 *out) > } > EXPORT_SYMBOL(sha256); > > +int sha256_value(u8 **dest, const u8 *src) > +{ > + u8 out[SHA256_DIGEST_SIZE]; > + int i, k; > + unsigned char hex[2]; > + > + *dest = kvmalloc(sizeof(u8) * (SHA256_BLOCK_SIZE + 1), GFP_KERNEL); > + if (ZERO_OR_NULL_PTR(*dest)) > + return -ENOMEM; > + sha256(src, strlen(src), out); > + > + for (i = 0, k = 0; i < SHA256_DIGEST_SIZE; i++) { > + sprintf(hex, "%02x", out[i]); > + (*dest)[k++] = hex[0]; > + (*dest)[k++] = hex[1]; > + } > + (*dest)[k] = '\0'; > + return 0; > +} > +EXPORT_SYMBOL(sha256_value); You forgot to include something that actually calls this function. Anyway, there should be no need for this. If you're trying to convert a SHA-256 hash value to a string, just use the %*phN printk format specifier which converts bytes to hex. - Eric