$search
Go to the source code of this file.
Defines | |
#define | SHA256_MAC_LEN 32 |
Functions | |
void | hmac_sha256 (const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) |
void | hmac_sha256_vector (const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) |
void | sha256_prf (const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) |
void sha256_prf | ( | const u8 * | key, | |
size_t | key_len, | |||
const char * | label, | |||
const u8 * | data, | |||
size_t | data_len, | |||
u8 * | buf, | |||
size_t | buf_len | |||
) |
sha256_prf - SHA256-based Pseudo-Random Function (IEEE 802.11r, 8.5.1.5.2) : Key for PRF : Length of the key in bytes : A unique label for each purpose of the PRF : Extra data to bind into the key : Length of the data : Buffer for the generated pseudo-random key : Number of bytes of key to generate
This function is used to derive new, cryptographically separate keys from a given key.