SHA1 hash implementation and interface functions. More...
#include "includes.h"#include "common.h"#include "sha1.h"#include "crypto.h"
Go to the source code of this file.
Functions | |
| int | hmac_sha1_vector (const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) |
| HMAC-SHA1 over data vector (RFC 2104). | |
| int | hmac_sha1 (const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) |
| HMAC-SHA1 over data buffer (RFC 2104). | |
| int | sha1_prf (const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) |
| SHA1-based Pseudo-Random Function (PRF) (IEEE 802.11i, 8.5.1.1). | |
SHA1 hash implementation and interface functions.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation.
Alternatively, this software may be distributed under the terms of BSD license.
See README and COPYING for more details.
Definition in file sha1.c.
| int hmac_sha1 | ( | const u8 * | key, | |
| size_t | key_len, | |||
| const u8 * | data, | |||
| size_t | data_len, | |||
| u8 * | mac | |||
| ) |
HMAC-SHA1 over data buffer (RFC 2104).
| key | Key for HMAC operations | |
| key_len | Length of the key in bytes | |
| data | Pointers to the data area | |
| data_len | Length of the data area | |
| mac | Buffer for the hash (20 bytes) |
Definition at line 109 of file sha1.c.

| int hmac_sha1_vector | ( | const u8 * | key, | |
| size_t | key_len, | |||
| size_t | num_elem, | |||
| const u8 * | addr[], | |||
| const size_t * | len, | |||
| u8 * | mac | |||
| ) |
HMAC-SHA1 over data vector (RFC 2104).
| key | Key for HMAC operations | |
| key_len | Length of the key in bytes | |
| num_elem | Number of elements in the data vector | |
| addr | Pointers to the data areas | |
| len | Lengths of the data blocks | |
| mac | Buffer for the hash (20 bytes) |
Definition at line 34 of file sha1.c.

| int sha1_prf | ( | const u8 * | key, | |
| size_t | key_len, | |||
| const char * | label, | |||
| const u8 * | data, | |||
| size_t | data_len, | |||
| u8 * | buf, | |||
| size_t | buf_len | |||
| ) |
SHA1-based Pseudo-Random Function (PRF) (IEEE 802.11i, 8.5.1.1).
| key | Key for PRF | |
| key_len | Length of the key in bytes | |
| label | A unique label for each purpose of the PRF | |
| data | Extra data to bind into the key | |
| data_len | Length of the data | |
| buf | Buffer for the generated pseudo-random key | |
| buf_len | Number of bytes of key to generate |
This function is used to derive new, cryptographically separate keys from a given key (e.g., PMK in IEEE 802.11i).
Definition at line 131 of file sha1.c.

1.6.1