source: mainline/uspace/lib/crypto/crypto.h@ 1dcc0b9

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 1dcc0b9 was 1dcc0b9, checked in by Jan Kolarik <kolarik@…>, 10 years ago

Scanning whole 2.4GHz spectrum, created supplicant for managing connection between device STA and AP, finished association process between STA and AP, handling 4way handshake protocol used for key management, written needed cryptographic algorithms (AES, SHA1, HMAC, PBKDF2) for CCMP protocol, data communication on OPEN/CCMP networks.

  • Property mode set to 100644
File size: 2.2 KB
Line 
1/*
2 * Copyright (c) 2015 Jan Kolarik
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29#ifndef LIBCRYPTO_H
30#define LIBCRYPTO_H
31
32#include <sys/types.h>
33
34#define AES_CIPHER_LENGTH 16
35#define MD5_HASH_LENGTH 16
36#define SHA1_HASH_LENGTH 20
37#define HMAC_BLOCK_LENGTH 64
38#define PBKDF2_KEY_LENGTH 32
39
40/** Hash function selector. */
41typedef enum {
42 HASH_MD5,
43 HASH_SHA1
44} hash_func_t;
45
46extern int aes_encrypt(uint8_t *key, uint8_t *input, uint8_t *output);
47extern int aes_decrypt(uint8_t *key, uint8_t *input, uint8_t *output);
48extern int sha1(uint8_t *input, size_t input_size, uint8_t *hash);
49extern int md5(uint8_t *input, size_t input_size, uint8_t *hash);
50extern int hmac(uint8_t *key, size_t key_size, uint8_t *msg, size_t msg_size,
51 uint8_t *hash, hash_func_t hash_sel);
52extern int pbkdf2(uint8_t *pass, size_t pass_size, uint8_t *salt,
53 size_t salt_size, uint8_t *hash, hash_func_t hash_sel);
54
55#endif
Note: See TracBrowser for help on using the repository browser.