text
stringlengths 0
234
|
---|
char *otherinfo; /* sp800\-56a otherinfo */ |
__u32 otherinfolen; /* length of otherinfo data */ |
__u32 __spare[8]; /* reserved */ |
}; |
.ee |
.in |
.ip |
the |
.i hashname |
field is a null-terminated string which specifies a hash name |
(available in the kernel's crypto api; the list of the hashes available |
is rather tricky to observe; please refer to the |
.ur https://www.kernel.org\:/doc\:/html\:/latest\:/crypto\:/architecture.html |
"kernel crypto api architecture" |
.ue |
documentation for the information regarding how hash names are constructed and |
your kernel's source and configuration regarding what ciphers |
and templates with type |
.b crypto_alg_type_shash |
are available) |
to be applied to dh result in kdf operation. |
.ip |
the |
.i otherinfo |
field is an |
.i otherinfo |
data as described in sp800-56a section 5.8.1.2 and is algorithm-specific. |
this data is concatenated with the result of dh operation and is provided as |
an input to the kdf operation. |
its size is provided in the |
.i otherinfolen |
field and is limited by |
.b keyctl_kdf_max_oi_len |
constant that defined in |
.i security/keys/internal.h |
to a value of 64. |
.ip |
the |
.b __spare |
field is currently unused. |
.\" commit 4f9dabfaf8df971f8a3b6aa324f8f817be38d538 |
it was ignored until linux 4.13 (but still should be |
user-addressable since it is copied to the kernel), |
and should contain zeros since linux 4.13. |
.ip |
the kdf implementation complies with sp800-56a as well |
as with sp800-108 (the counter kdf). |
.ip |
.\" keyutils commit 742c9d7b94051d3b21f9f61a73ed6b5f3544cb82 |
.\" keyutils commit d68a981e5db41d059ac782071c35d1e8f3aaf61c |
this operation is exposed by |
.i libkeyutils |
(from version 1.5.10 onwards) via the functions |
.br keyctl_dh_compute (3) |
and |
.br keyctl_dh_compute_alloc (3). |
.tp |
.br keyctl_restrict_keyring " (since linux 4.12)" |
.\" commit 6563c91fd645556c7801748f15bc727c77fcd311 |
.\" commit 7228b66aaf723a623e578aa4db7d083bb39546c9 |
apply a key-linking restriction to the keyring with the id provided in |
.ir arg2 |
(cast to |
.ir key_serial_t ). |
the caller must have |
.ir setattr |
permission on the key. |
if |
.i arg3 |
is null, any attempt to add a key to the keyring is blocked; |
otherwise it contains a pointer to a string with a key type name and |
.i arg4 |
contains a pointer to string that describes the type-specific restriction. |
as of linux 4.12, only the type "asymmetric" has restrictions defined: |
.rs |
.tp |
.b builtin_trusted |
allows only keys that are signed by a key linked to the built-in keyring |
(".builtin_trusted_keys"). |
.tp |
.b builtin_and_secondary_trusted |
allows only keys that are signed by a key linked to the secondary keyring |
(".secondary_trusted_keys") or, by extension, a key in a built-in keyring, |
as the latter is linked to the former. |
.tp |
.bi key_or_keyring: key |
.tq |
.bi key_or_keyring: key :chain |
if |
.i key |
specifies the id of a key of type "asymmetric", |
then only keys that are signed by this key are allowed. |
.ip |
if |
.i key |
specifies the id of a keyring, |
then only keys that are signed by a key linked |
to this keyring are allowed. |
.ip |
if ":chain" is specified, keys that are signed by a keys linked to the |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.