$search

sha1.h File Reference

This graph shows which files directly or indirectly include this file:

Go to the source code of this file.

Defines

#define SHA1_MAC_LEN   20

Functions

int hmac_sha1 (const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac)
int hmac_sha1_vector (const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
int pbkdf2_sha1 (const char *passphrase, const char *ssid, size_t ssid_len, int iterations, u8 *buf, size_t buflen)
int sha1_prf (const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len)
int sha1_t_prf (const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len)
int __must_check tls_prf (const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen)

Define Documentation

#define SHA1_MAC_LEN   20

Definition at line 18 of file sha1.h.


Function Documentation

int hmac_sha1 ( const u8 key,
size_t  key_len,
const u8 data,
size_t  data_len,
u8 mac 
)

hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) : Key for HMAC operations : Length of the key in bytes : Pointers to the data area : Length of the data area : Buffer for the hash (20 bytes) Returns: 0 on success, -1 of failure

Definition at line 106 of file sha1.c.

int hmac_sha1_vector ( const u8 key,
size_t  key_len,
size_t  num_elem,
const u8 addr[],
const size_t *  len,
u8 mac 
)

hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104) : Key for HMAC operations : Length of the key in bytes : Number of elements in the data vector : Pointers to the data areas : Lengths of the data blocks : Buffer for the hash (20 bytes) Returns: 0 on success, -1 on failure

Definition at line 32 of file sha1.c.

int pbkdf2_sha1 ( const char *  passphrase,
const char *  ssid,
size_t  ssid_len,
int  iterations,
u8 buf,
size_t  buflen 
)

pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i : ASCII passphrase : SSID : SSID length in bytes : Number of iterations to run : Buffer for the generated key : Length of the buffer in bytes Returns: 0 on success, -1 of failure

This function is used to derive PSK for WPA-PSK. For this protocol, iterations is set to 4096 and buflen to 32. This function is described in IEEE Std 802.11-2004, Clause H.4. The main construction is from PKCS#5 v2.0.

Definition at line 80 of file sha1-pbkdf2.c.

int sha1_prf ( const u8 key,
size_t  key_len,
const char *  label,
const u8 data,
size_t  data_len,
u8 buf,
size_t  buf_len 
)

sha1_prf - SHA1-based Pseudo-Random Function (PRF) (IEEE 802.11i, 8.5.1.1) : Key for PRF : Length of the key in bytes : A unique label for each purpose of the PRF : Extra data to bind into the key : Length of the data : Buffer for the generated pseudo-random key : Number of bytes of key to generate Returns: 0 on success, -1 of failure

This function is used to derive new, cryptographically separate keys from a given key (e.g., PMK in IEEE 802.11i).

Definition at line 127 of file sha1.c.

int sha1_t_prf ( const u8 key,
size_t  key_len,
const char *  label,
const u8 seed,
size_t  seed_len,
u8 buf,
size_t  buf_len 
)

sha1_t_prf - EAP-FAST Pseudo-Random Function (T-PRF) : Key for PRF : Length of the key in bytes : A unique label for each purpose of the PRF : Seed value to bind into the key : Length of the seed : Buffer for the generated pseudo-random key : Number of bytes of key to generate Returns: 0 on success, -1 of failure

This function is used to derive new, cryptographically separate keys from a given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5.

Definition at line 35 of file sha1-tprf.c.

int __must_check tls_prf ( const u8 secret,
size_t  secret_len,
const char *  label,
const u8 seed,
size_t  seed_len,
u8 out,
size_t  outlen 
)

tls_prf - Pseudo-Random Function for TLS (TLS-PRF, RFC 2246) : Key for PRF : Length of the key in bytes : A unique label for each purpose of the PRF : Seed value to bind into the key : Length of the seed : Buffer for the generated pseudo-random key : Number of bytes of key to generate Returns: 0 on success, -1 on failure.

This function is used to derive new, cryptographically separate keys from a given key in TLS. This PRF is defined in RFC 2246, Chapter 5.

Definition at line 37 of file sha1-tlsprf.c.

 All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Properties Friends Defines


wpa_supplicant_node
Author(s): Package maintained by Blaise Gassend
autogenerated on Fri Mar 1 16:00:39 2013