1 // SPDX-License-Identifier: GPL-2.0
4 * SP800-108 Key-derivation function
6 * Copyright (C) 2021, Stephan Mueller <smueller@chronox.de>
9 #include <linux/fips.h>
10 #include <linux/module.h>
11 #include <crypto/kdf_sp800108.h>
12 #include <crypto/internal/kdf_selftest.h>
15 * SP800-108 CTR KDF implementation
17 int crypto_kdf108_ctr_generate(struct crypto_shash
*kmd
,
18 const struct kvec
*info
, unsigned int info_nvec
,
19 u8
*dst
, unsigned int dlen
)
21 SHASH_DESC_ON_STACK(desc
, kmd
);
22 __be32 counter
= cpu_to_be32(1);
23 const unsigned int h
= crypto_shash_digestsize(kmd
), dlen_orig
= dlen
;
31 err
= crypto_shash_init(desc
);
35 err
= crypto_shash_update(desc
, (u8
*)&counter
, sizeof(__be32
));
39 for (i
= 0; i
< info_nvec
; i
++) {
40 err
= crypto_shash_update(desc
, info
[i
].iov_base
,
47 u8 tmpbuffer
[HASH_MAX_DIGESTSIZE
];
49 err
= crypto_shash_final(desc
, tmpbuffer
);
52 memcpy(dst
, tmpbuffer
, dlen
);
53 memzero_explicit(tmpbuffer
, h
);
57 err
= crypto_shash_final(desc
, dst
);
63 counter
= cpu_to_be32(be32_to_cpu(counter
) + 1);
68 memzero_explicit(dst_orig
, dlen_orig
);
69 shash_desc_zero(desc
);
72 EXPORT_SYMBOL(crypto_kdf108_ctr_generate
);
75 * The seeding of the KDF
77 int crypto_kdf108_setkey(struct crypto_shash
*kmd
,
78 const u8
*key
, size_t keylen
,
79 const u8
*ikm
, size_t ikmlen
)
81 unsigned int ds
= crypto_shash_digestsize(kmd
);
83 /* SP800-108 does not support IKM */
87 /* Check according to SP800-108 section 7.2 */
91 /* Set the key for the MAC used for the KDF. */
92 return crypto_shash_setkey(kmd
, key
, keylen
);
94 EXPORT_SYMBOL(crypto_kdf108_setkey
);
97 * Test vector obtained from
98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
100 static const struct kdf_testvec kdf_ctr_hmac_sha256_tv_template
[] = {
102 .key
= "\xdd\x1d\x91\xb7\xd9\x0b\x2b\xd3"
103 "\x13\x85\x33\xce\x92\xb2\x72\xfb"
104 "\xf8\xa3\x69\x31\x6a\xef\xe2\x42"
105 "\xe6\x59\xcc\x0a\xe2\x38\xaf\xe0",
110 .iov_base
= "\x01\x32\x2b\x96\xb3\x0a\xcd\x19"
111 "\x79\x79\x44\x4e\x46\x8e\x1c\x5c"
112 "\x68\x59\xbf\x1b\x1c\xf9\x51\xb7"
113 "\xe7\x25\x30\x3e\x23\x7e\x46\xb8"
114 "\x64\xa1\x45\xfa\xb2\x5e\x51\x7b"
115 "\x08\xf8\x68\x3d\x03\x15\xbb\x29"
116 "\x11\xd8\x0a\x0e\x8a\xba\x17\xf3"
120 .expected
= "\x10\x62\x13\x42\xbf\xb0\xfd\x40"
121 "\x04\x6c\x0e\x29\xf2\xcf\xdb\xf0",
126 static int __init
crypto_kdf108_init(void)
130 if (IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
))
133 ret
= kdf_test(&kdf_ctr_hmac_sha256_tv_template
[0], "hmac(sha256)",
134 crypto_kdf108_setkey
, crypto_kdf108_ctr_generate
);
137 panic("alg: self-tests for CTR-KDF (hmac(sha256)) failed (rc=%d)\n",
141 "alg: self-tests for CTR-KDF (hmac(sha256)) failed (rc=%d)\n",
143 } else if (fips_enabled
) {
144 pr_info("alg: self-tests for CTR-KDF (hmac(sha256)) passed\n");
150 static void __exit
crypto_kdf108_exit(void) { }
152 module_init(crypto_kdf108_init
);
153 module_exit(crypto_kdf108_exit
);
155 MODULE_LICENSE("GPL v2");
156 MODULE_AUTHOR("Stephan Mueller <smueller@chronox.de>");
157 MODULE_DESCRIPTION("Key Derivation Function conformant to SP800-108");