cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

kdf_sp800108.h (2121B)


      1/* SPDX-License-Identifier: GPL-2.0 */
      2
      3/*
      4 * Copyright (C) 2021, Stephan Mueller <smueller@chronox.de>
      5 */
      6
      7#ifndef _CRYPTO_KDF108_H
      8#define _CRYPTO_KDF108_H
      9
     10#include <crypto/hash.h>
     11#include <linux/uio.h>
     12
     13/**
     14 * Counter KDF generate operation according to SP800-108 section 5.1
     15 * as well as SP800-56A section 5.8.1 (Single-step KDF).
     16 *
     17 * @kmd Keyed message digest whose key was set with crypto_kdf108_setkey or
     18 *	unkeyed message digest
     19 * @info optional context and application specific information - this may be
     20 *	 NULL
     21 * @info_vec number of optional context/application specific information entries
     22 * @dst destination buffer that the caller already allocated
     23 * @dlen length of the destination buffer - the KDF derives that amount of
     24 *	 bytes.
     25 *
     26 * To comply with SP800-108, the caller must provide Label || 0x00 || Context
     27 * in the info parameter.
     28 *
     29 * @return 0 on success, < 0 on error
     30 */
     31int crypto_kdf108_ctr_generate(struct crypto_shash *kmd,
     32			       const struct kvec *info, unsigned int info_nvec,
     33			       u8 *dst, unsigned int dlen);
     34
     35/**
     36 * Counter KDF setkey operation
     37 *
     38 * @kmd Keyed message digest allocated by the caller. The key should not have
     39 *	been set.
     40 * @key Seed key to be used to initialize the keyed message digest context.
     41 * @keylen This length of the key buffer.
     42 * @ikm The SP800-108 KDF does not support IKM - this parameter must be NULL
     43 * @ikmlen This parameter must be 0.
     44 *
     45 * According to SP800-108 section 7.2, the seed key must be at least as large as
     46 * the message digest size of the used keyed message digest. This limitation
     47 * is enforced by the implementation.
     48 *
     49 * SP800-108 allows the use of either a HMAC or a hash primitive. When
     50 * the caller intends to use a hash primitive, the call to
     51 * crypto_kdf108_setkey is not required and the key derivation operation can
     52 * immediately performed using crypto_kdf108_ctr_generate after allocating
     53 * a handle.
     54 *
     55 * @return 0 on success, < 0 on error
     56 */
     57int crypto_kdf108_setkey(struct crypto_shash *kmd,
     58			 const u8 *key, size_t keylen,
     59			 const u8 *ikm, size_t ikmlen);
     60
     61#endif /* _CRYPTO_KDF108_H */