diff options
author | Eric Biggers <ebiggers@google.com> | 2019-08-04 19:35:47 -0700 |
---|---|---|
committer | Eric Biggers <ebiggers@google.com> | 2019-08-12 19:18:50 -0700 |
commit | c1144c9b8ad94d8c11809d75c1f322a853cdfc4a (patch) | |
tree | a990dc017fe01c2cf0ded7a29844b75728ee3456 /include/uapi/linux/if_x25.h | |
parent | 5a7e29924dac34f0690b06906aad9d70d3c022a5 (diff) | |
download | linux-riscv-c1144c9b8ad94d8c11809d75c1f322a853cdfc4a.tar.gz linux-riscv-c1144c9b8ad94d8c11809d75c1f322a853cdfc4a.tar.bz2 linux-riscv-c1144c9b8ad94d8c11809d75c1f322a853cdfc4a.zip |
fscrypt: add an HKDF-SHA512 implementation
Add an implementation of HKDF (RFC 5869) to fscrypt, for the purpose of
deriving additional key material from the fscrypt master keys for v2
encryption policies. HKDF is a key derivation function built on top of
HMAC. We choose SHA-512 for the underlying unkeyed hash, and use an
"hmac(sha512)" transform allocated from the crypto API.
We'll be using this to replace the AES-ECB based KDF currently used to
derive the per-file encryption keys. While the AES-ECB based KDF is
believed to meet the original security requirements, it is nonstandard
and has problems that don't exist in modern KDFs such as HKDF:
1. It's reversible. Given a derived key and nonce, an attacker can
easily compute the master key. This is okay if the master key and
derived keys are equally hard to compromise, but now we'd like to be
more robust against threats such as a derived key being compromised
through a timing attack, or a derived key for an in-use file being
compromised after the master key has already been removed.
2. It doesn't evenly distribute the entropy from the master key; each 16
input bytes only affects the corresponding 16 output bytes.
3. It isn't easily extensible to deriving other values or keys, such as
a public hash for securely identifying the key, or per-mode keys.
Per-mode keys will be immediately useful for Adiantum encryption, for
which fscrypt currently uses the master key directly, introducing
unnecessary usage constraints. Per-mode keys will also be useful for
hardware inline encryption, which is currently being worked on.
HKDF solves all the above problems.
Reviewed-by: Paul Crowley <paulcrowley@google.com>
Reviewed-by: Theodore Ts'o <tytso@mit.edu>
Signed-off-by: Eric Biggers <ebiggers@google.com>
Diffstat (limited to 'include/uapi/linux/if_x25.h')
0 files changed, 0 insertions, 0 deletions