kernel-ark/Documentation/security
Stephan Mueller f1c316a3ab KEYS: add SP800-56A KDF support for DH
SP800-56A defines the use of DH with key derivation function based on a
counter. The input to the KDF is defined as (DH shared secret || other
information). The value for the "other information" is to be provided by
the caller.

The KDF is implemented using the hash support from the kernel crypto API.
The implementation uses the symmetric hash support as the input to the
hash operation is usually very small. The caller is allowed to specify
the hash name that he wants to use to derive the key material allowing
the use of all supported hashes provided with the kernel crypto API.

As the KDF implements the proper truncation of the DH shared secret to
the requested size, this patch fills the caller buffer up to its size.

The patch is tested with a new test added to the keyutils user space
code which uses a CAVS test vector testing the compliance with
SP800-56A.

Signed-off-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: David Howells <dhowells@redhat.com>
2017-04-04 22:33:38 +01:00
..
tpm tpm: move documentation under Documentation/security 2016-11-07 18:56:42 -07:00
00-INDEX ima: new templates management mechanism 2013-10-25 17:17:04 -04:00
apparmor.txt
conf.py docs: Add more manuals to the PDF build 2016-11-16 16:07:02 -07:00
credentials.txt Documentation: clarify the purpose of LSMs 2011-11-16 12:37:27 +11:00
IMA-templates.txt ima: added support for new kernel cmdline parameter ima_template_fmt 2014-10-13 08:39:02 -04:00
index.rst tpm: move documentation under Documentation/security 2016-11-07 18:56:42 -07:00
keys-ecryptfs.txt
keys-request-key.txt
keys-trusted-encrypted.txt Doc: security: keys-trusted: drop duplicate blobauth entry 2016-11-13 22:50:10 -05:00
keys.txt KEYS: add SP800-56A KDF support for DH 2017-04-04 22:33:38 +01:00
LoadPin.txt LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
LSM.txt LSM: Add /sys/kernel/security/lsm 2017-01-19 13:18:29 +11:00
self-protection.txt arch: Rename CONFIG_DEBUG_RODATA and CONFIG_DEBUG_MODULE_RONX 2017-02-07 12:32:52 -08:00
SELinux.txt
Smack.txt Smack: limited capability for changing process label 2015-10-19 12:06:47 -07:00
tomoyo.txt
Yama.txt Yama: remove needless CONFIG_SECURITY_YAMA_STACKED 2015-07-28 13:18:19 +10:00