summaryrefslogtreecommitdiff
path: root/release/src/router/cyassl/ctaocrypt/src/pwdbased.c
diff options
context:
space:
mode:
authorAndreas Baumann <mail@andreasbaumann.cc>2015-01-09 09:46:07 +0100
committerAndreas Baumann <mail@andreasbaumann.cc>2015-01-09 09:46:07 +0100
commit5ac03256db0fe4ca7e3ad1117d096c3a76368b76 (patch)
treec767808892cc7f013b87174ad3b31c23508b5fa5 /release/src/router/cyassl/ctaocrypt/src/pwdbased.c
parentd89b5dc1509c66ccbed1dbc7ed0e09264ea3179e (diff)
downloadtomato-5ac03256db0fe4ca7e3ad1117d096c3a76368b76.tar.gz
tomato-5ac03256db0fe4ca7e3ad1117d096c3a76368b76.tar.bz2
backported CyaSSL/OpenSSL support for internal webserver instead of MatrixSSL
Diffstat (limited to 'release/src/router/cyassl/ctaocrypt/src/pwdbased.c')
-rw-r--r--release/src/router/cyassl/ctaocrypt/src/pwdbased.c76
1 files changed, 76 insertions, 0 deletions
diff --git a/release/src/router/cyassl/ctaocrypt/src/pwdbased.c b/release/src/router/cyassl/ctaocrypt/src/pwdbased.c
new file mode 100644
index 00000000..2cd380f0
--- /dev/null
+++ b/release/src/router/cyassl/ctaocrypt/src/pwdbased.c
@@ -0,0 +1,76 @@
+/* pwdbased.c
+ *
+ * Copyright (C) 2006-2011 Sawtooth Consulting Ltd.
+ *
+ * This file is part of CyaSSL.
+ *
+ * CyaSSL is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * CyaSSL is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+ */
+
+
+#ifndef NO_PWDBASED
+
+#include "pwdbased.h"
+
+
+int PBKDF1(byte* output, const byte* passwd, int pLen, const byte* salt,
+ int sLen, int iterations, int kLen, int hashType)
+{
+ Md5 md5;
+ Sha sha;
+ int hLen = (hashType == MD5) ? MD5_DIGEST_SIZE : SHA_DIGEST_SIZE;
+ int i;
+ byte buffer[SHA_DIGEST_SIZE]; /* max size */
+
+ if (hashType != MD5 && hashType != SHA)
+ return -1;
+
+ if (kLen > hLen)
+ return -1;
+
+ if (iterations < 1)
+ return -1;
+
+ if (hashType == MD5) {
+ InitMd5(&md5);
+ Md5Update(&md5, passwd, pLen);
+ Md5Update(&md5, salt, sLen);
+ Md5Final(&md5, buffer);
+ }
+ else {
+ InitSha(&sha);
+ ShaUpdate(&sha, passwd, pLen);
+ ShaUpdate(&sha, salt, sLen);
+ ShaFinal(&sha, buffer);
+ }
+
+ for (i = 1; i < iterations; i++) {
+ if (hashType == MD5) {
+ Md5Update(&md5, buffer, hLen);
+ Md5Final(&md5, buffer);
+ }
+ else {
+ ShaUpdate(&sha, buffer, hLen);
+ ShaFinal(&sha, buffer);
+ }
+ }
+ XMEMCPY(output, buffer, kLen);
+
+ return 0;
+}
+
+
+#endif /* NO_PWDBASED */
+