You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In ECDSA SIGN operation, a random scalar 'k' is used to generate
one part of signature. As this value SHOULD be randomly secure,
the application might supply it through secure RNG rather than
relying on SIGN implementation.
Another parameter is prehash algorithm to hash source data before
SIGN operation on it.
Current data queue struct for AKCIPHER do not hold any option
to input algorithm specific parameter. Hence, in this patch
new fields are introduced in data queue struct for AKCIPHER to
support additional parameters.
In ECDSA SIGN operation, a random scalar 'k' is used to generate
one part of signature. As this value SHOULD be randomly secure,
the application might supply it through secure RNG rather than
relying on SIGN implementation.
Another parameter is prehash algorithm to hash source data before
SIGN operation on it.
Current data queue struct for AKCIPHER do not hold any option
to input algorithm specific parameter. Hence, in this patch
new fields are introduced in data queue struct for AKCIPHER to
support additional parameters.
Patch available at:
https://lore.kernel.org/virtio-comment/[email protected]
The text was updated successfully, but these errors were encountered: