nrfxlib API 2.8.99
|
#include "ocrypto_types.h"
Go to the source code of this file.
Macros | |
#define | ocrypto_srp_SALT_BYTES (16) |
#define | ocrypto_srp_VERIFIER_BYTES (384) |
#define | ocrypto_srp_SECRET_KEY_BYTES (32) |
#define | ocrypto_srp_PUBLIC_KEY_BYTES (384) |
#define | ocrypto_srp_SCRAMBLING_PARAMETER_BYTES (64) |
#define | ocrypto_srp_PREMASTER_SECRET_BYTES (384) |
#define | ocrypto_srp_SESSION_KEY_BYTES (64) |
#define | ocrypto_srp_PROOF_BYTES (64) |
Functions | |
void | ocrypto_srp_server_public_key (uint8_t pub_b[(384)], const uint8_t priv_b[(32)], const uint8_t k[(384)], const uint8_t v[(384)]) |
void | ocrypto_srp_client_public_key (unsigned char pub_a[(384)], const unsigned char *priv_a, size_t a_len) |
SRP-6 password verifier generation. | |
A password verifier is generated from a user name and a password. The password | |
void | ocrypto_srp_verifier (uint8_t v[(384)], const uint8_t salt[(16)], const uint8_t *user, size_t user_len, const uint8_t *pass, size_t pass_len) |
SRP-6 public key generation. | |
An ephemeral keypair can be generated based on the password verifier to be used when opening a new session. | |
void | ocrypto_srp_public_key (uint8_t pub_b[(384)], const uint8_t priv_b[(32)], const uint8_t v[(384)]) |
SRP-6 session key generation. | |
A premaster secret can be derived from both the client's and server's public keys, the server's private key and the password verifier. A shared session key can be generated from this premaster secret. | |
void | ocrypto_srp_scrambling_parameter (uint8_t u[(64)], const uint8_t pub_a[(384)], const uint8_t pub_b[(384)]) |
int | ocrypto_srp_premaster_secret (uint8_t s[(384)], const uint8_t pub_a[(384)], const uint8_t priv_b[(32)], const uint8_t u[(64)], const uint8_t v[(384)]) |
int | ocrypto_srp_server_premaster_secret (uint8_t s[(384)], const uint8_t pub_a[(384)], const uint8_t priv_b[(32)], const uint8_t *u, size_t u_len, const uint8_t v[(384)]) |
int | ocrypto_srp_client_premaster_secret (uint8_t s[(384)], const uint8_t priv_a[(32)], const uint8_t pub_b[(384)], const uint8_t k[(384)], const uint8_t *u, const uint8_t *h, size_t h_len) |
void | ocrypto_srp_session_key (uint8_t k[(64)], const uint8_t s[(384)]) |
SRP-6 proof exchange. | |
Proofs are exchanged from client to server and vice versa to ensure that both parties computed the same shared session key. The proofs only match if the correct password is used by the client. | |
void | ocrypto_srp_proof_m1 (uint8_t m1[(64)], const uint8_t *user, size_t user_len, const uint8_t salt[(16)], const uint8_t pub_a[(384)], const uint8_t pub_b[(384)], const uint8_t k[(64)]) |
void | ocrypto_srp_proof_m2 (uint8_t m2[(64)], const uint8_t pub_a[(384)], const uint8_t m1[(64)], const uint8_t k[(64)]) |
SRP-6 password verifier generation with context. | |
A password verifier is generated from a user name and a password. The password | |
void | ocrypto_srp_verifier_ctx (ocrypto_srp_ctx *ctx, uint8_t v[(384)], const uint8_t salt[(16)], const uint8_t *user, size_t user_len, const uint8_t *pass, size_t pass_len) |
SRP-6 public key generation with context. | |
An ephemeral keypair can be generated based on the password verifier to be used when opening a new session. | |
void | ocrypto_srp_public_key_ctx (ocrypto_srp_ctx *ctx, uint8_t pub_b[(384)], const uint8_t priv_b[(32)], const uint8_t v[(384)]) |
SRP-6 session key generation with context. | |
A premaster secret can be derived from both the client's and server's public keys, the server's private key and the password verifier. A shared session key can be generated from this premaster secret. | |
void | ocrypto_srp_scrambling_parameter_ctx (ocrypto_srp_ctx *ctx, uint8_t u[(64)], const uint8_t pub_a[(384)], const uint8_t pub_b[(384)]) |
int | ocrypto_srp_premaster_secret_ctx (ocrypto_srp_ctx *ctx, uint8_t s[(384)], const uint8_t pub_a[(384)], const uint8_t priv_b[(32)], const uint8_t u[(64)], const uint8_t v[(384)]) |
void | ocrypto_srp_session_key_ctx (ocrypto_srp_ctx *ctx, uint8_t k[(64)], const uint8_t s[(384)]) |
SRP-6 proof exchange with context. | |
Proofs are exchanged from client to server and vice versa to ensure that both parties computed the same shared session key. The proofs only match if the correct password is used by the client. | |
void | ocrypto_srp_proof_m1_ctx (ocrypto_srp_ctx *ctx, uint8_t m1[(64)], const uint8_t *user, size_t user_len, const uint8_t salt[(16)], const uint8_t pub_a[(384)], const uint8_t pub_b[(384)], const uint8_t k[(64)]) |
void | ocrypto_srp_proof_m2_ctx (ocrypto_srp_ctx *ctx, uint8_t m2[(64)], const uint8_t pub_a[(384)], const uint8_t m1[(64)], const uint8_t k[(64)]) |