Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2068466rdh; Sat, 28 Oct 2023 22:04:11 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHCCWIMyl/i37/u9eDPTwleVxbQp74TGhXTLfDs5otrTPt9YROV2r8IowYxD/EvD70D4VIO X-Received: by 2002:a05:6a20:4409:b0:17a:4871:63fd with SMTP id ce9-20020a056a20440900b0017a487163fdmr9553867pzb.0.1698555851025; Sat, 28 Oct 2023 22:04:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698555851; cv=none; d=google.com; s=arc-20160816; b=tXX+qD3SBDkav1N1okObZkY0A40FTxsLIlKGP78/wFlMZSOtEi/b6Yl0829grckd76 Oq0j2KJvjjjSm41wx+laf2CWQKjWN+lbHAoW+u8GwN+7X9dalyZsGiZQyfpYSkHdxkJX uIRjte8/Af2W9ePlKE/MXtFAPtTeH0XEsjWYcQbaBo1IhGsg0EbaJUlK9ph/IrQaHspy qujCiUZ6j608XeuKq93tWxmeZr/i7OaGhioqVi7WEfzQjhQkRm7Cicx2VBeaQCQc7KTp iR/2kSsFbBgZ8ffq8ENiT8uciFLpA4EDZ3ER+X16RzVja+dnAVFTinBkVJHdwlU0gHoY PEIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=qcsTEJXOXLz+xjn9GuoUvjCKhXwOSqrnevnhPwobnpw=; fh=VaKvKJ5H/ucUR+/mKE2TmVCOnbVPwJJaSq4QLCnqOhw=; b=cwYoWMup9EUOfCuDDV10aj1so7cT3fdq0dNByjbDYb/z8VqJA1IG8OIX2pP1sdzXs7 donC8sb8sSBJK238XSGlnXC4ceXZUkmOIxjWLIOUC8YOB4F2Bg3x6uDX8akNpRsppu2+ nCddr7NwhbIrclsMs+izs1iS5NH6diPHbhoFpiwtSd+rvRAq57+V7o9ZDAjziRAMF0Aa NIcylnPGaS3lwXX4ESfkyOfdt/fyrOAiuHySthAo1tdRRFU1HjIhX9xKaIBx9f93Ujae tHOXky83Jj5Pke6hzMADy7cWKi/MCNhnsdIOE1bgxuk8Vxli+7BM6iE/FPiYb0nqFKDR Bxlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mw1IfVQZ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id z4-20020aa79484000000b006b7582b294dsi3204434pfk.129.2023.10.28.22.04.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 Oct 2023 22:04:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mw1IfVQZ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 10B388055648; Sat, 28 Oct 2023 22:04:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229451AbjJ2FEI (ORCPT + 99 others); Sun, 29 Oct 2023 01:04:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbjJ2FEH (ORCPT ); Sun, 29 Oct 2023 01:04:07 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DC2CCC5 for ; Sat, 28 Oct 2023 22:04:05 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6C751C433C7; Sun, 29 Oct 2023 05:04:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1698555845; bh=Bd85Pl0HxDFyn+Xmq89TAE0x2+xo8OOJv3Wbz88xxEA=; h=From:To:Cc:Subject:Date:From; b=Mw1IfVQZiMp5BpDGgUt/tVQwmrsRmtydrP/mY+CD9xI+TnspAOs6HHsaKEdBaB97W Mzm57m4NaWDKJRdDI0Rh65r96MWyM0gFobkYFXPQfYKefodqAvJW9v8saGakPoAakL oFnyVVCqNetSd5falmLFuPW7gD/04tSmozJvE319Wqono21d9mEXhBC0nI5QdQW29Z q6ddAZvkQIiRDqk5JN6tsoRD1uuBxbbDgiBH/3vHXKCUx3rXjyzAyttUET8QsqfdJw fobRnFp1Qwd7gxrvtbgFwk/9+lq1hqCjrRkzUzt3mzFe+/KKsTa2Y7qR+0D2r6W3Cd 0q67pUFqmu5yQ== From: Eric Biggers To: Richard Weinberger , linux-mtd@lists.infradead.org Cc: linux-crypto@vger.kernel.org Subject: [PATCH] ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm() Date: Sat, 28 Oct 2023 22:03:55 -0700 Message-ID: <20231029050355.154989-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.42.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Sat, 28 Oct 2023 22:04:08 -0700 (PDT) From: Eric Biggers Simplify ubifs_hmac_wkm() by using crypto_shash_tfm_digest() instead of an alloc+init+update+final sequence. This should also improve performance. Signed-off-by: Eric Biggers --- fs/ubifs/auth.c | 19 ++----------------- 1 file changed, 2 insertions(+), 17 deletions(-) diff --git a/fs/ubifs/auth.c b/fs/ubifs/auth.c index e564d5ff8781..4add4a4f0720 100644 --- a/fs/ubifs/auth.c +++ b/fs/ubifs/auth.c @@ -501,42 +501,27 @@ int __ubifs_shash_copy_state(const struct ubifs_info *c, struct shash_desc *src, * * This function creates a HMAC of a well known message. This is used * to check if the provided key is suitable to authenticate a UBIFS * image. This is only a convenience to the user to provide a better * error message when the wrong key is provided. * * This function returns 0 for success or a negative error code otherwise. */ int ubifs_hmac_wkm(struct ubifs_info *c, u8 *hmac) { - SHASH_DESC_ON_STACK(shash, c->hmac_tfm); - int err; const char well_known_message[] = "UBIFS"; if (!ubifs_authenticated(c)) return 0; - shash->tfm = c->hmac_tfm; - - err = crypto_shash_init(shash); - if (err) - return err; - - err = crypto_shash_update(shash, well_known_message, - sizeof(well_known_message) - 1); - if (err < 0) - return err; - - err = crypto_shash_final(shash, hmac); - if (err) - return err; - return 0; + return crypto_shash_tfm_digest(c->hmac_tfm, well_known_message, + sizeof(well_known_message) - 1, hmac); } /* * ubifs_hmac_zero - test if a HMAC is zero * @c: UBIFS file-system description object * @hmac: the HMAC to test * * This function tests if a HMAC is zero and returns true if it is * and false otherwise. */ base-commit: 2af9b20dbb39f6ebf9b9b6c090271594627d818e -- 2.42.0