summaryrefslogtreecommitdiff
path: root/crypto/crypto_user.c
diff options
context:
space:
mode:
authorJoachim Vandersmissen <git@jvdsn.com>2024-03-20 08:13:38 +0300
committerHerbert Xu <herbert@gondor.apana.org.au>2024-04-02 05:49:38 +0300
commitdbad7b6969c10b746a3d8b53c6cf6b4ec62ae5e1 (patch)
tree2c906e746ebad37c247d0f12c588d8763ea5d1c0 /crypto/crypto_user.c
parenteb5739a1efbc9ff216271aeea0ebe1c92e5383e5 (diff)
downloadlinux-dbad7b6969c10b746a3d8b53c6cf6b4ec62ae5e1.tar.xz
crypto: ecc - update ecc_gen_privkey for FIPS 186-5
FIPS 186-5 [1] was released approximately 1 year ago. The most interesting change for ecc_gen_privkey is the removal of curves with order < 224 bits. This is minimum is now checked in step 1. It is unlikely that there is still any benefit in generating private keys for curves with n < 224, as those curves provide less than 112 bits of security strength and are therefore unsafe for any modern usage. This patch also updates the documentation for __ecc_is_key_valid and ecc_gen_privkey to clarify which FIPS 186-5 method is being used to generate private keys. Previous documentation mentioned that "extra random bits" was used. However, this did not match the code. Instead, the code currently uses (and always has used) the "rejection sampling" ("testing candidates" in FIPS 186-4) method. [1]: https://doi.org/10.6028/NIST.FIPS.186-5 Signed-off-by: Joachim Vandersmissen <git@jvdsn.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/crypto_user.c')
0 files changed, 0 insertions, 0 deletions