Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp523494pxb; Wed, 18 Aug 2021 07:47:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQvh1R15dRcK2U6ir9UEK+Qdb+BX77XAFEXXaaedFgh3lplgsm+uvmBSH98zoMUd9vqTTq X-Received: by 2002:a92:d5d1:: with SMTP id d17mr6296121ilq.106.1629298032806; Wed, 18 Aug 2021 07:47:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629298032; cv=none; d=google.com; s=arc-20160816; b=OylagvloLHtD2C6HCB7nttL86oIo7Zs5zxmBfhVpbkpcRjstSZRFWIme2z9bZm48NO ViGYVBlHHJq2IgQB0bnKwiB7l6zFm9tBxoIzsF4zV0AxTfw8UWaQ8gNEyW5i3/VNDgrL 1GtFd0lRw6AdaQUPJWQJOf8Sgux9kewsbd7yWbdzmrh/6CaUDBasCjc6m1bFKDpf/VDP lFZGq/alC4zk+/XxxgP4dBTksYJv8EEsfmMrWy/6D0dlnOnFqYCRJkjfK6LXRrjbOZ+j dBzCV+eK8UdC8oGOElJ0D2rhbNZJEv3ovEw8PAq7OiX7HI/knBIRULhBOrDGc5Em1Ijs nWfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/E+EPJ2w9qA1doilhz7TG66qhQWWBL3wwhngIlw6mxo=; b=xkGPB1053oj6Zr3cxKIk3Kkxy9EVaZ4mZNvYiFa/+QHxLp1hMnPwNn8h2dDeojksoa MIZ4l2ZvVff6DL28geNc+9qJ7ionkElS4gffn55kDSb+296da4gn6sV3Tp1TBmvYhlAE aN0Dns/AfaOvR+q2ByziNl+GN3xrkCNAPXD8/tacujSyOuUbuauLpKcidCMwNxQSu5ih pyJIJIldpEMr4JJBRDK8JdYZ39vT55yo5peE2TV0tns5VeL34ruDMFG+u9cMD6l9uMwO jpZnu8THF1jyyRWC+gpPQZC2qvB9dK5u2Iu2hV7qio+1/Z/WrvAKjkeQv4BPzP6b6f1B PRGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aSkQE0sj; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z9si6211461jat.41.2021.08.18.07.46.50; Wed, 18 Aug 2021 07:47:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aSkQE0sj; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239625AbhHROrO (ORCPT + 99 others); Wed, 18 Aug 2021 10:47:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:42928 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238799AbhHROrK (ORCPT ); Wed, 18 Aug 2021 10:47:10 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 904FB610CB; Wed, 18 Aug 2021 14:46:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1629297995; bh=5aoQRtG2q72qoZysMHWqLQqHnUVvIzSZLuN+xGxl7CY=; h=From:To:Cc:Subject:Date:From; b=aSkQE0sjxMYm4ZODFeZIbIWbqNi7lylBeO03gIFAWgmOiiBq8p/A+d0UrTJm+omnU 107UephuHebEu3cFpVxLIazaPXU2C1l8qbKjEKZUPtJ90ipXlt3nuul4S80Rgr2Wqf r9q/hpUhiJgxZ6MtSaS7TR+N8eIewgS8zFXc96rzcuGvfHDifmw1Jz/yYK8t9zWXpU IyN+qRlVAXQB96z84vYxX5R/SwGt+TN3xTzpesr7c+TFiDW0r+evtzhc2TLn7Gux/x 7LpVko1g0GyKllR+oHoZmy6sixH8mDswa1RvOrYg9Cb+ZlkT7lcWpy7AoI8Mg6nbXX 2FDFXxjdg39hw== From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: herbert@gondor.apana.org.au, Ard Biesheuvel , Eric Biggers , ronnie sahlberg , linux-cifs , Steve French , David Howells , keyrings@vger.kernel.org Subject: [PATCH 0/2] crypto: remove MD4 generic shash Date: Wed, 18 Aug 2021 16:46:15 +0200 Message-Id: <20210818144617.110061-1-ardb@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org As discussed on the list [0], MD4 is still being relied upon by the CIFS driver, even though successful attacks on MD4 are as old as Linux itself. So let's move the code into the CIFS driver, and remove it from the crypto API so that it is no longer exposed to other subsystems or to user space via AF_ALG. Note: this leaves the code in crypto/asymmetric_keys that is able to parse RSA+MD4 keys if an "md4" shash is available. Given that its Kconfig symbol does not select CRYPTO_MD4, it only has a runtime dependency on md4 and so we can either decide remove it later, or just let it fail on the missing MD4 shash as it would today if the module is not enabled. [0] https://lore.kernel.org/linux-cifs/YRXlwDBfQql36wJx@sol.localdomain/ Cc: Eric Biggers Cc: ronnie sahlberg Cc: linux-cifs Cc: Steve French Cc: David Howells Cc: keyrings@vger.kernel.org Ard Biesheuvel (2): fs/cifs: Incorporate obsolete MD4 crypto code crypto: md4 - Remove obsolete algorithm crypto/Kconfig | 6 - crypto/Makefile | 1 - crypto/md4.c | 241 -------------------- crypto/tcrypt.c | 14 +- crypto/testmgr.c | 6 - crypto/testmgr.h | 42 ---- fs/cifs/Kconfig | 1 - fs/cifs/cifsfs.c | 1 - fs/cifs/smbencrypt.c | 200 ++++++++++++++-- 9 files changed, 178 insertions(+), 334 deletions(-) delete mode 100644 crypto/md4.c -- 2.20.1