]> www.infradead.org Git - users/hch/misc.git/commitdiff
crypto: curve25519 - Remove unused kpp support
authorEric Biggers <ebiggers@kernel.org>
Sat, 6 Sep 2025 21:35:17 +0000 (14:35 -0700)
committerEric Biggers <ebiggers@kernel.org>
Sat, 6 Sep 2025 21:45:49 +0000 (14:45 -0700)
Curve25519 has both a library API and a crypto_kpp API.  However, the
crypto_kpp API for Curve25519 had no users outside crypto/testmgr.c.
I.e., no non-test code ever passed "curve25519" to crypto_alloc_kpp().

Remove this unused code.  We'll instead focus on the Curve25519 library
API (<crypto/curve25519.h>), which is a simpler and easier-to-use API
and is the API that is actually being used.

Acked-by: Geert Uytterhoeven <geert@linux-m68k.org> # m68k
Link: https://lore.kernel.org/r/20250906213523.84915-7-ebiggers@kernel.org
Signed-off-by: Eric Biggers <ebiggers@kernel.org>
17 files changed:
arch/m68k/configs/amiga_defconfig
arch/m68k/configs/apollo_defconfig
arch/m68k/configs/atari_defconfig
arch/m68k/configs/bvme6000_defconfig
arch/m68k/configs/hp300_defconfig
arch/m68k/configs/mac_defconfig
arch/m68k/configs/multi_defconfig
arch/m68k/configs/mvme147_defconfig
arch/m68k/configs/mvme16x_defconfig
arch/m68k/configs/q40_defconfig
arch/m68k/configs/sun3_defconfig
arch/m68k/configs/sun3x_defconfig
arch/s390/configs/debug_defconfig
arch/s390/configs/defconfig
crypto/Kconfig
crypto/Makefile
crypto/curve25519-generic.c [deleted file]

index 5171bb183967b91f740f44236c14cfbddb4edbf0..24e7314ae4d3c10389d5e2fb2665fd09bde210d5 100644 (file)
@@ -560,7 +560,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 16f343ae48c67592b53daee968c96cc94bef25cc..4f13c2fa2097e1fce6d3b090ab502b8102f8685b 100644 (file)
@@ -517,7 +517,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index c08788728ea9622ef8fa91e6e77ea456e89ed8f3..95ef2c838141d2929d44b4c15839459c831b000a 100644 (file)
@@ -537,7 +537,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 962497e7c53fd62066b2ed8ad04f4fac01209e8d..d0aca54485f2d9e076021f7ea7f68c1bba9b2a8b 100644 (file)
@@ -509,7 +509,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index ec28650189e406dbd1dcb56a91d8a007ae90cc22..faa5ec07cf9e53aeef15249944b8d1c9ba6e9094 100644 (file)
@@ -519,7 +519,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 0afb3ad180dee355dae8639e819eb98bf7d59493..313a52341dafae11263ec6242fa3d1b5bb857ed7 100644 (file)
@@ -536,7 +536,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index b311e953995d6da2ee5d270582efdaf29ae60216..44cc3461f569507ce8ddd4ed7df3b3800fed54ea 100644 (file)
@@ -623,7 +623,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index f4e6224f137f99f6343e68d8b26a8c18c2b27626..0394fd631679e19fbd67b27f84fe334bce76bcb9 100644 (file)
@@ -509,7 +509,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 498e167222f18c7eda7e84fd911232d75d1683d0..d8ad11b7054c425a58672906bf97e70aa91c0829 100644 (file)
@@ -510,7 +510,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 8c6b1eef8534237af0d947b1fdba7c6be553c2dd..bdc090d0c0ad09e0ac78cc7323a2a6905de1ae45 100644 (file)
@@ -526,7 +526,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index c34648f299efb99a72b566b84cac30ac4639f44e..05324e30c65f54d6aeaf88231eaee8af78f68372 100644 (file)
@@ -507,7 +507,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 73810d14660f2177d6f49e38ca9e95421c44f2b9..a1a3fb24fb7b0bba16f110374de725aa152112d0 100644 (file)
@@ -507,7 +507,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES=y
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
index 5e616bc988ac355b94d87c1153c09d3f9bfffc89..1c54348b812da2cda4faa86950deeb0c905cff27 100644 (file)
@@ -761,7 +761,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
 CONFIG_CRYPTO_ARIA=m
index 094599cdaf4d9b8473dad2cdcf6d3fca165cca90..90a9dad7f80154dea100ee1883a1e37a3466b5b8 100644 (file)
@@ -745,7 +745,6 @@ CONFIG_CRYPTO_DH=m
 CONFIG_CRYPTO_ECDH=m
 CONFIG_CRYPTO_ECDSA=m
 CONFIG_CRYPTO_ECRDSA=m
-CONFIG_CRYPTO_CURVE25519=m
 CONFIG_CRYPTO_AES_TI=m
 CONFIG_CRYPTO_ANUBIS=m
 CONFIG_CRYPTO_ARIA=m
index 09e8fb6ee0813f6f97d75db6a2c86a41d67e4a9e..a04595f9d0ca4b4c54a787cc58b8f6ef80f68dea 100644 (file)
@@ -344,14 +344,6 @@ config CRYPTO_ECRDSA
          One of the Russian cryptographic standard algorithms (called GOST
          algorithms). Only signature verification is implemented.
 
-config CRYPTO_CURVE25519
-       tristate "Curve25519"
-       select CRYPTO_KPP
-       select CRYPTO_LIB_CURVE25519_GENERIC
-       select CRYPTO_LIB_CURVE25519_INTERNAL
-       help
-         Curve25519 elliptic curve (RFC7748)
-
 endmenu
 
 menu "Block ciphers"
index 6c5d59369dacc646975b4e109780e5d4e3e84212..e430e6e99b6a24029f2ff298338e1be1e9d4f085 100644 (file)
@@ -182,7 +182,6 @@ obj-$(CONFIG_CRYPTO_USER_API_AEAD) += algif_aead.o
 obj-$(CONFIG_CRYPTO_ZSTD) += zstd.o
 obj-$(CONFIG_CRYPTO_ECC) += ecc.o
 obj-$(CONFIG_CRYPTO_ESSIV) += essiv.o
-obj-$(CONFIG_CRYPTO_CURVE25519) += curve25519-generic.o
 
 ecdh_generic-y += ecdh.o
 ecdh_generic-y += ecdh_helper.o
diff --git a/crypto/curve25519-generic.c b/crypto/curve25519-generic.c
deleted file mode 100644 (file)
index f3e56e7..0000000
+++ /dev/null
@@ -1,91 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0-or-later
-
-#include <crypto/curve25519.h>
-#include <crypto/internal/kpp.h>
-#include <crypto/kpp.h>
-#include <linux/module.h>
-#include <linux/scatterlist.h>
-
-static int curve25519_set_secret(struct crypto_kpp *tfm, const void *buf,
-                                unsigned int len)
-{
-       u8 *secret = kpp_tfm_ctx(tfm);
-
-       if (!len)
-               curve25519_generate_secret(secret);
-       else if (len == CURVE25519_KEY_SIZE &&
-                crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE))
-               memcpy(secret, buf, CURVE25519_KEY_SIZE);
-       else
-               return -EINVAL;
-       return 0;
-}
-
-static int curve25519_compute_value(struct kpp_request *req)
-{
-       struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
-       const u8 *secret = kpp_tfm_ctx(tfm);
-       u8 public_key[CURVE25519_KEY_SIZE];
-       u8 buf[CURVE25519_KEY_SIZE];
-       int copied, nbytes;
-       u8 const *bp;
-
-       if (req->src) {
-               copied = sg_copy_to_buffer(req->src,
-                                          sg_nents_for_len(req->src,
-                                                           CURVE25519_KEY_SIZE),
-                                          public_key, CURVE25519_KEY_SIZE);
-               if (copied != CURVE25519_KEY_SIZE)
-                       return -EINVAL;
-               bp = public_key;
-       } else {
-               bp = curve25519_base_point;
-       }
-
-       curve25519_generic(buf, secret, bp);
-
-       /* might want less than we've got */
-       nbytes = min_t(size_t, CURVE25519_KEY_SIZE, req->dst_len);
-       copied = sg_copy_from_buffer(req->dst, sg_nents_for_len(req->dst,
-                                                               nbytes),
-                                    buf, nbytes);
-       if (copied != nbytes)
-               return -EINVAL;
-       return 0;
-}
-
-static unsigned int curve25519_max_size(struct crypto_kpp *tfm)
-{
-       return CURVE25519_KEY_SIZE;
-}
-
-static struct kpp_alg curve25519_alg = {
-       .base.cra_name          = "curve25519",
-       .base.cra_driver_name   = "curve25519-generic",
-       .base.cra_priority      = 100,
-       .base.cra_module        = THIS_MODULE,
-       .base.cra_ctxsize       = CURVE25519_KEY_SIZE,
-
-       .set_secret             = curve25519_set_secret,
-       .generate_public_key    = curve25519_compute_value,
-       .compute_shared_secret  = curve25519_compute_value,
-       .max_size               = curve25519_max_size,
-};
-
-static int __init curve25519_init(void)
-{
-       return crypto_register_kpp(&curve25519_alg);
-}
-
-static void __exit curve25519_exit(void)
-{
-       crypto_unregister_kpp(&curve25519_alg);
-}
-
-module_init(curve25519_init);
-module_exit(curve25519_exit);
-
-MODULE_ALIAS_CRYPTO("curve25519");
-MODULE_ALIAS_CRYPTO("curve25519-generic");
-MODULE_DESCRIPTION("Curve25519 elliptic curve (RFC7748)");
-MODULE_LICENSE("GPL");