linux-stable/kernel/module
Eric Biggers f0caeb2681 Revert "crypto: pkcs7 - remove sha1 support"
commit 203a6763ab upstream.

This reverts commit 16ab7cb582 because it
broke iwd.  iwd uses the KEYCTL_PKEY_* UAPIs via its dependency libell,
and apparently it is relying on SHA-1 signature support.  These UAPIs
are fairly obscure, and their documentation does not mention which
algorithms they support.  iwd really should be using a properly
supported userspace crypto library instead.  Regardless, since something
broke we have to revert the change.

It may be possible that some parts of this commit can be reinstated
without breaking iwd (e.g. probably the removal of MODULE_SIG_SHA1), but
for now this just does a full revert to get things working again.

Reported-by: Karel Balej <balejk@matfyz.cz>
Closes: https://lore.kernel.org/r/CZSHRUIJ4RKL.34T4EASV5DNJM@matfyz.cz
Cc: Dimitri John Ledkov <dimitri.ledkov@canonical.com>
Signed-off-by: Eric Biggers <ebiggers@google.com>
Tested-by: Karel Balej <balejk@matfyz.cz>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-04-03 15:32:31 +02:00
..
Kconfig Revert "crypto: pkcs7 - remove sha1 support" 2024-04-03 15:32:31 +02:00
Makefile
debug_kmemleak.c
decompress.c module/decompress: use kvmalloc() consistently 2023-11-02 07:35:39 -10:00
dups.c module: Remove redundant TASK_UNINTERRUPTIBLE 2023-12-19 13:30:28 -08:00
internal.h
kallsyms.c
kdb.c
kmod.c
livepatch.c
main.c modules: wait do_free_init correctly 2024-03-26 18:17:17 -04:00
procfs.c
signing.c
stats.c
strict_rwx.c
sysfs.c module: Annotate struct module_notes_attrs with __counted_by 2023-11-01 13:07:32 -07:00
tracking.c
tree_lookup.c
version.c