|
|
|
@ -698,3 +698,42 @@ int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
|
|
|
|
return -1;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
|
|
|
|
|
const u8 *addr[], const size_t *len, u8 *mac)
|
|
|
|
|
{
|
|
|
|
|
HMAC_CTX ctx;
|
|
|
|
|
size_t i;
|
|
|
|
|
unsigned int mdlen;
|
|
|
|
|
int res;
|
|
|
|
|
|
|
|
|
|
HMAC_CTX_init(&ctx);
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x00909000
|
|
|
|
|
HMAC_Init_ex(&ctx, key, key_len, EVP_sha1(), NULL);
|
|
|
|
|
#else /* openssl < 0.9.9 */
|
|
|
|
|
if (HMAC_Init_ex(&ctx, key, key_len, EVP_sha1(), NULL) != 1)
|
|
|
|
|
return -1;
|
|
|
|
|
#endif /* openssl < 0.9.9 */
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < num_elem; i++)
|
|
|
|
|
HMAC_Update(&ctx, addr[i], len[i]);
|
|
|
|
|
|
|
|
|
|
mdlen = 20;
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x00909000
|
|
|
|
|
HMAC_Final(&ctx, mac, &mdlen);
|
|
|
|
|
res = 1;
|
|
|
|
|
#else /* openssl < 0.9.9 */
|
|
|
|
|
res = HMAC_Final(&ctx, mac, &mdlen);
|
|
|
|
|
#endif /* openssl < 0.9.9 */
|
|
|
|
|
HMAC_CTX_cleanup(&ctx);
|
|
|
|
|
|
|
|
|
|
return res == 1 ? 0 : -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
|
|
|
|
u8 *mac)
|
|
|
|
|
{
|
|
|
|
|
return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
|
|
|
|
}
|
|
|
|
|