summaryrefslogtreecommitdiff
path: root/src/libstrongswan/crypto/prfs
diff options
context:
space:
mode:
Diffstat (limited to 'src/libstrongswan/crypto/prfs')
-rw-r--r--src/libstrongswan/crypto/prfs/prf.c11
-rw-r--r--src/libstrongswan/crypto/prfs/prf.h20
2 files changed, 16 insertions, 15 deletions
diff --git a/src/libstrongswan/crypto/prfs/prf.c b/src/libstrongswan/crypto/prfs/prf.c
index 812f6278d..8681a5b97 100644
--- a/src/libstrongswan/crypto/prfs/prf.c
+++ b/src/libstrongswan/crypto/prfs/prf.c
@@ -12,8 +12,6 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
- *
- * $Id: prf.c 3619 2008-03-19 14:02:52Z martin $
*/
#include "prf.h"
@@ -23,13 +21,14 @@ ENUM_BEGIN(pseudo_random_function_names, PRF_UNDEFINED, PRF_KEYED_SHA1,
"PRF_FIPS_SHA1_160",
"PRF_FIPS_DES",
"PRF_KEYED_SHA1");
-ENUM_NEXT(pseudo_random_function_names, PRF_HMAC_MD5, PRF_HMAC_SHA2_512, PRF_KEYED_SHA1,
+ENUM_NEXT(pseudo_random_function_names, PRF_HMAC_MD5, PRF_AES128_CMAC, PRF_KEYED_SHA1,
"PRF_HMAC_MD5",
"PRF_HMAC_SHA1",
"PRF_HMAC_TIGER",
- "PRF_AES128_CBC",
+ "PRF_AES128_XCBC",
"PRF_HMAC_SHA2_256",
"PRF_HMAC_SHA2_384",
- "PRF_HMAC_SHA2_512");
-ENUM_END(pseudo_random_function_names, PRF_HMAC_SHA2_512);
+ "PRF_HMAC_SHA2_512",
+ "PRF_AES128_CMAC");
+ENUM_END(pseudo_random_function_names, PRF_AES128_CMAC);
diff --git a/src/libstrongswan/crypto/prfs/prf.h b/src/libstrongswan/crypto/prfs/prf.h
index e2b4f6fe0..f2a5afc45 100644
--- a/src/libstrongswan/crypto/prfs/prf.h
+++ b/src/libstrongswan/crypto/prfs/prf.h
@@ -12,8 +12,6 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
- *
- * $Id: prf.h 5003 2009-03-24 17:43:01Z martin $
*/
/**
@@ -37,21 +35,25 @@ typedef struct prf_t prf_t;
*/
enum pseudo_random_function_t {
PRF_UNDEFINED = 1024,
- /** Implemented via hmac_prf_t. */
+ /** RFC2104 */
PRF_HMAC_MD5 = 1,
- /** Implemented via hmac_prf_t. */
+ /** RFC2104 */
PRF_HMAC_SHA1 = 2,
+ /** RFC2104 */
PRF_HMAC_TIGER = 3,
+ /** RFC4434 */
PRF_AES128_XCBC = 4,
- /** Implemented via hmac_prf_t. */
+ /** RFC4868 */
PRF_HMAC_SHA2_256 = 5,
- /** Implemented via hmac_prf_t. */
+ /** RFC4868. */
PRF_HMAC_SHA2_384 = 6,
- /** Implemented via hmac_prf_t. */
+ /** RFC4868 */
PRF_HMAC_SHA2_512 = 7,
- /** Implemented via fips_prf_t, other output sizes would be possible */
+ /** RFC4615 */
+ PRF_AES128_CMAC = 8,
+ /** FIPS 186-2-change1 */
PRF_FIPS_SHA1_160 = 1025,
- /** Could be implemented via fips_prf_t, uses fixed output size of 160bit */
+ /** FIPS 186-2-change1, uses fixed output size of 160bit */
PRF_FIPS_DES = 1026,
/**
* Keyed hash algorithm using SHA1, used in EAP-AKA: