uint32_t state[5];
uint32_t count[2];
uint8_t buffer[64];
-} fr_SHA1_CTX;
+} fr_sha1_ctx;
void fr_sha1_transform(uint32_t state[5], uint8_t const buffer[64]);
-void fr_sha1_init(fr_SHA1_CTX *context);
-void fr_sha1_update(fr_SHA1_CTX *context, uint8_t const *data, size_t len);
-void fr_sha1_final(uint8_t digest[20], fr_SHA1_CTX *context);
+void fr_sha1_init(fr_sha1_ctx *context);
+void fr_sha1_update(fr_sha1_ctx *context, uint8_t const *data, size_t len);
+void fr_sha1_final(uint8_t digest[20], fr_sha1_ctx *context);
/*
* this version implements a raw SHA1 transform, no length is appended,
* nor any 128s out to the block size.
*/
-void fr_sha1_final_no_len(uint8_t digest[20], fr_SHA1_CTX* context);
+void fr_sha1_final_no_len(uint8_t digest[20], fr_sha1_ctx* context);
#else /* WITH_OPENSSL_SHA1 */
USES_APPLE_DEPRECATED_API
-#define fr_SHA1_CTX SHA_CTX
+#define fr_sha1_ctx SHA_CTX
#define fr_sha1_init SHA1_Init
#define fr_sha1_update SHA1_Update
#define fr_sha1_final SHA1_Final
void fr_hmac_sha1(uint8_t digest[SHA1_DIGEST_LENGTH], uint8_t const *text, size_t text_len,
uint8_t const *key, size_t key_len)
{
- fr_SHA1_CTX context;
+ fr_sha1_ctx context;
uint8_t k_ipad[65]; /* inner padding - key XORd with ipad */
uint8_t k_opad[65]; /* outer padding - key XORd with opad */
uint8_t tk[20];
/* if key is longer than 64 bytes reset it to key=SHA1(key) */
if (key_len > 64) {
- fr_SHA1_CTX tctx;
+ fr_sha1_ctx tctx;
fr_sha1_init(&tctx);
fr_sha1_update(&tctx, key, key_len);
/* fr_sha1_init - Initialize new context */
-void fr_sha1_init(fr_SHA1_CTX* context)
+void fr_sha1_init(fr_sha1_ctx* context)
{
/* SHA1 initialization constants */
context->state[0] = 0x67452301;
}
/* Run your data through this. */
-void fr_sha1_update(fr_SHA1_CTX *context,uint8_t const *data, size_t len)
+void fr_sha1_update(fr_sha1_ctx *context,uint8_t const *data, size_t len)
{
unsigned int i, j;
/* Add padding and return the message digest. */
-void fr_sha1_final(uint8_t digest[20], fr_SHA1_CTX *context)
+void fr_sha1_final(uint8_t digest[20], fr_sha1_ctx *context)
{
uint32_t i, j;
uint8_t finalcount[8];
# endif
}
-void fr_sha1_final_no_len(uint8_t digest[20], fr_SHA1_CTX *context)
+void fr_sha1_final_no_len(uint8_t digest[20], fr_sha1_ctx *context)
{
uint32_t i, j;
{
uint8_t buf[1024];
int i;
- fr_SHA1_CTX context;
+ fr_sha1_ctx context;
memset(buf, 0, 1024);
memset(buf, 0x36, 64);
void eapsim_calculate_keys(struct eapsim_keys *ek)
{
- fr_SHA1_CTX context;
+ fr_sha1_ctx context;
uint8_t fk[160];
unsigned char buf[256];
unsigned char *p;
*/
void fips186_2prf(uint8_t mk[20], uint8_t finalkey[160])
{
- fr_SHA1_CTX context;
+ fr_sha1_ctx context;
int j;
onesixty xval, xkey, w_0, w_1, sum, one;
uint8_t *f;
uint8_t digest[20];
ssize_t i, len, inlen;
uint8_t const *p;
- fr_SHA1_CTX ctx;
+ fr_sha1_ctx ctx;
/*
* We need room for at least one octet of output.
uint8_t const *auth_challenge,
char const *user_name, uint8_t *challenge )
{
- fr_SHA1_CTX Context;
+ fr_sha1_ctx Context;
uint8_t hash[20];
fr_sha1_init(&Context);
uint8_t const *peer_challenge, uint8_t const *auth_challenge,
char *response)
{
- fr_SHA1_CTX Context;
+ fr_sha1_ctx Context;
static const uint8_t magic1[39] =
{0x4D, 0x61, 0x67, 0x69, 0x63, 0x20, 0x73, 0x65, 0x72, 0x76,
0x65, 0x72, 0x20, 0x74, 0x6F, 0x20, 0x63, 0x6C, 0x69, 0x65,
uint8_t *masterkey)
{
uint8_t digest[20];
- fr_SHA1_CTX Context;
+ fr_sha1_ctx Context;
fr_sha1_init(&Context);
fr_sha1_update(&Context,nt_hashhash,NT_DIGEST_LENGTH);
{
uint8_t digest[20];
const uint8_t *s;
- fr_SHA1_CTX Context;
+ fr_sha1_ctx Context;
memset(digest,0,20);
static rlm_rcode_t CC_HINT(nonnull) pap_auth_sha(rlm_pap_t *inst, REQUEST *request, VALUE_PAIR *vp)
{
- fr_SHA1_CTX sha1_context;
+ fr_sha1_ctx sha1_context;
uint8_t digest[128];
RDEBUG("Comparing with \"known-good\" SHA-Password");
static rlm_rcode_t CC_HINT(nonnull) pap_auth_ssha(rlm_pap_t *inst, REQUEST *request, VALUE_PAIR *vp)
{
- fr_SHA1_CTX sha1_context;
+ fr_sha1_ctx sha1_context;
uint8_t digest[128];
RDEBUG("Comparing with \"known-good\" SSHA-Password");