Home
last modified time | relevance | path

Searched hist:"7 cbe0932c2f2014d6e24e716e79ea3910b468950" (Results 1 – 2 of 2) sorted by relevance

/linux/security/keys/
H A Ddh.c7cbe0932c2f2014d6e24e716e79ea3910b468950 Thu Jun 08 13:50:11 UTC 2017 Mat Martineau <mathew.j.martineau@linux.intel.com> KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP API

The initial Diffie-Hellman computation made direct use of the MPI
library because the crypto module did not support DH at the time. Now
that KPP is implemented, KEYCTL_DH_COMPUTE should use it to get rid of
duplicate code and leverage possible hardware acceleration.

This fixes an issue whereby the input to the KDF computation would
include additional uninitialized memory when the result of the
Diffie-Hellman computation was shorter than the input prime number.

Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
H A DKconfig7cbe0932c2f2014d6e24e716e79ea3910b468950 Thu Jun 08 13:50:11 UTC 2017 Mat Martineau <mathew.j.martineau@linux.intel.com> KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP API

The initial Diffie-Hellman computation made direct use of the MPI
library because the crypto module did not support DH at the time. Now
that KPP is implemented, KEYCTL_DH_COMPUTE should use it to get rid of
duplicate code and leverage possible hardware acceleration.

This fixes an issue whereby the input to the KDF computation would
include additional uninitialized memory when the result of the
Diffie-Hellman computation was shorter than the input prime number.

Signed-off-by: Mat Martineau <mathew.j.martineau@linux.intel.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>