/src/duckdb/third_party/mbedtls/include/mbedtls/md.h
Line | Count | Source |
1 | | /** |
2 | | * \file md.h |
3 | | * |
4 | | * \brief This file contains the generic functions for message-digest |
5 | | * (hashing) and HMAC. |
6 | | * |
7 | | * \author Adriaan de Jong <dejong@fox-it.com> |
8 | | */ |
9 | | /* |
10 | | * Copyright The Mbed TLS Contributors |
11 | | * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
12 | | */ |
13 | | |
14 | | #ifndef MBEDTLS_MD_H |
15 | | #define MBEDTLS_MD_H |
16 | | #include "mbedtls/private_access.h" |
17 | | |
18 | | #include <stddef.h> |
19 | | |
20 | | #include "mbedtls/build_info.h" |
21 | | #include "mbedtls/platform_util.h" |
22 | | |
23 | | /** The selected feature is not available. */ |
24 | | #define MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE -0x5080 |
25 | | /** Bad input parameters to function. */ |
26 | 0 | #define MBEDTLS_ERR_MD_BAD_INPUT_DATA -0x5100 |
27 | | /** Failed to allocate memory. */ |
28 | 0 | #define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180 |
29 | | /** Opening or reading of file failed. */ |
30 | | #define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200 |
31 | | |
32 | | #ifdef __cplusplus |
33 | | extern "C" { |
34 | | #endif |
35 | | |
36 | | /** |
37 | | * \brief Supported message digests. |
38 | | * |
39 | | * \warning MD5 and SHA-1 are considered weak message digests and |
40 | | * their use constitutes a security risk. We recommend considering |
41 | | * stronger message digests instead. |
42 | | * |
43 | | */ |
44 | | /* Note: these are aligned with the definitions of PSA_ALG_ macros for hashes, |
45 | | * in order to enable an efficient implementation of conversion functions. |
46 | | * This is tested by md_to_from_psa() in test_suite_md. */ |
47 | | typedef enum { |
48 | | MBEDTLS_MD_NONE=0, /**< None. */ |
49 | | MBEDTLS_MD_MD5=0x03, /**< The MD5 message digest. */ |
50 | | MBEDTLS_MD_RIPEMD160=0x04, /**< The RIPEMD-160 message digest. */ |
51 | | MBEDTLS_MD_SHA1=0x05, /**< The SHA-1 message digest. */ |
52 | | MBEDTLS_MD_SHA224=0x08, /**< The SHA-224 message digest. */ |
53 | | MBEDTLS_MD_SHA256=0x09, /**< The SHA-256 message digest. */ |
54 | | MBEDTLS_MD_SHA384=0x0a, /**< The SHA-384 message digest. */ |
55 | | MBEDTLS_MD_SHA512=0x0b, /**< The SHA-512 message digest. */ |
56 | | MBEDTLS_MD_SHA3_224=0x10, /**< The SHA3-224 message digest. */ |
57 | | MBEDTLS_MD_SHA3_256=0x11, /**< The SHA3-256 message digest. */ |
58 | | MBEDTLS_MD_SHA3_384=0x12, /**< The SHA3-384 message digest. */ |
59 | | MBEDTLS_MD_SHA3_512=0x13, /**< The SHA3-512 message digest. */ |
60 | | } mbedtls_md_type_t; |
61 | | |
62 | | /* Note: this should always be >= PSA_HASH_MAX_SIZE |
63 | | * in all builds with both CRYPTO_C and MD_LIGHT. |
64 | | * |
65 | | * This is to make things easier for modules such as TLS that may define a |
66 | | * buffer size using MD_MAX_SIZE in a part of the code that's common to PSA |
67 | | * and legacy, then assume the buffer's size is PSA_HASH_MAX_SIZE in another |
68 | | * part of the code based on PSA. |
69 | | */ |
70 | | #if defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA3_512) |
71 | | #define MBEDTLS_MD_MAX_SIZE 64 /* longest known is SHA512 */ |
72 | | #elif defined(MBEDTLS_MD_CAN_SHA384) || defined(MBEDTLS_MD_CAN_SHA3_384) |
73 | | #define MBEDTLS_MD_MAX_SIZE 48 /* longest known is SHA384 */ |
74 | | #elif defined(MBEDTLS_MD_CAN_SHA256) || defined(MBEDTLS_MD_CAN_SHA3_256) |
75 | | #define MBEDTLS_MD_MAX_SIZE 32 /* longest known is SHA256 */ |
76 | | #elif defined(MBEDTLS_MD_CAN_SHA224) || defined(MBEDTLS_MD_CAN_SHA3_224) |
77 | | #define MBEDTLS_MD_MAX_SIZE 28 /* longest known is SHA224 */ |
78 | | #else |
79 | | #define MBEDTLS_MD_MAX_SIZE 20 /* longest known is SHA1 or RIPE MD-160 |
80 | | or smaller (MD5 and earlier) */ |
81 | | #endif |
82 | | |
83 | | #if defined(MBEDTLS_MD_CAN_SHA3_224) |
84 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 144 /* the longest known is SHA3-224 */ |
85 | | #elif defined(MBEDTLS_MD_CAN_SHA3_256) |
86 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 136 |
87 | | #elif defined(MBEDTLS_MD_CAN_SHA512) || defined(MBEDTLS_MD_CAN_SHA384) |
88 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 128 |
89 | | #elif defined(MBEDTLS_MD_CAN_SHA3_384) |
90 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 104 |
91 | | #elif defined(MBEDTLS_MD_CAN_SHA3_512) |
92 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 72 |
93 | | #else |
94 | | #define MBEDTLS_MD_MAX_BLOCK_SIZE 64 |
95 | | #endif |
96 | | |
97 | | /** |
98 | | * Opaque struct. |
99 | | * |
100 | | * Constructed using either #mbedtls_md_info_from_string or |
101 | | * #mbedtls_md_info_from_type. |
102 | | * |
103 | | * Fields can be accessed with #mbedtls_md_get_size, |
104 | | * #mbedtls_md_get_type and #mbedtls_md_get_name. |
105 | | */ |
106 | | /* Defined internally in library/md_wrap.h. */ |
107 | | typedef struct mbedtls_md_info_t mbedtls_md_info_t; |
108 | | |
109 | | /** |
110 | | * Used internally to indicate whether a context uses legacy or PSA. |
111 | | * |
112 | | * Internal use only. |
113 | | */ |
114 | | typedef enum { |
115 | | MBEDTLS_MD_ENGINE_LEGACY = 0, |
116 | | MBEDTLS_MD_ENGINE_PSA, |
117 | | } mbedtls_md_engine_t; |
118 | | |
119 | | /** |
120 | | * The generic message-digest context. |
121 | | */ |
122 | | typedef struct mbedtls_md_context_t { |
123 | | /** Information about the associated message digest. */ |
124 | | const mbedtls_md_info_t *MBEDTLS_PRIVATE(md_info); |
125 | | |
126 | | #if defined(MBEDTLS_MD_SOME_PSA) |
127 | | /** Are hash operations dispatched to PSA or legacy? */ |
128 | | mbedtls_md_engine_t MBEDTLS_PRIVATE(engine); |
129 | | #endif |
130 | | |
131 | | /** The digest-specific context (legacy) or the PSA operation. */ |
132 | | void *MBEDTLS_PRIVATE(md_ctx); |
133 | | |
134 | | #if defined(MBEDTLS_MD_C) |
135 | | /** The HMAC part of the context. */ |
136 | | void *MBEDTLS_PRIVATE(hmac_ctx); |
137 | | #endif |
138 | | } mbedtls_md_context_t; |
139 | | |
140 | | /** |
141 | | * \brief This function returns the message-digest information |
142 | | * associated with the given digest type. |
143 | | * |
144 | | * \param md_type The type of digest to search for. |
145 | | * |
146 | | * \return The message-digest information associated with \p md_type. |
147 | | * \return NULL if the associated message-digest information is not found. |
148 | | */ |
149 | | const mbedtls_md_info_t *mbedtls_md_info_from_type(mbedtls_md_type_t md_type); |
150 | | |
151 | | /** |
152 | | * \brief This function initializes a message-digest context without |
153 | | * binding it to a particular message-digest algorithm. |
154 | | * |
155 | | * This function should always be called first. It prepares the |
156 | | * context for mbedtls_md_setup() for binding it to a |
157 | | * message-digest algorithm. |
158 | | */ |
159 | | void mbedtls_md_init(mbedtls_md_context_t *ctx); |
160 | | |
161 | | /** |
162 | | * \brief This function clears the internal structure of \p ctx and |
163 | | * frees any embedded internal structure, but does not free |
164 | | * \p ctx itself. |
165 | | * |
166 | | * If you have called mbedtls_md_setup() on \p ctx, you must |
167 | | * call mbedtls_md_free() when you are no longer using the |
168 | | * context. |
169 | | * Calling this function if you have previously |
170 | | * called mbedtls_md_init() and nothing else is optional. |
171 | | * You must not call this function if you have not called |
172 | | * mbedtls_md_init(). |
173 | | */ |
174 | | void mbedtls_md_free(mbedtls_md_context_t *ctx); |
175 | | |
176 | | |
177 | | /** |
178 | | * \brief This function selects the message digest algorithm to use, |
179 | | * and allocates internal structures. |
180 | | * |
181 | | * It should be called after mbedtls_md_init() or |
182 | | * mbedtls_md_free(). Makes it necessary to call |
183 | | * mbedtls_md_free() later. |
184 | | * |
185 | | * \param ctx The context to set up. |
186 | | * \param md_info The information structure of the message-digest algorithm |
187 | | * to use. |
188 | | * \param hmac Defines if HMAC is used. 0: HMAC is not used (saves some memory), |
189 | | * or non-zero: HMAC is used with this context. |
190 | | * |
191 | | * \return \c 0 on success. |
192 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
193 | | * failure. |
194 | | * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure. |
195 | | */ |
196 | | MBEDTLS_CHECK_RETURN_TYPICAL |
197 | | int mbedtls_md_setup(mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac); |
198 | | |
199 | | /** |
200 | | * \brief This function clones the state of a message-digest |
201 | | * context. |
202 | | * |
203 | | * \note You must call mbedtls_md_setup() on \c dst before calling |
204 | | * this function. |
205 | | * |
206 | | * \note The two contexts must have the same type, |
207 | | * for example, both are SHA-256. |
208 | | * |
209 | | * \warning This function clones the message-digest state, not the |
210 | | * HMAC state. |
211 | | * |
212 | | * \param dst The destination context. |
213 | | * \param src The context to be cloned. |
214 | | * |
215 | | * \return \c 0 on success. |
216 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure. |
217 | | * \return #MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE if both contexts are |
218 | | * not using the same engine. This can be avoided by moving |
219 | | * the call to psa_crypto_init() before the first call to |
220 | | * mbedtls_md_setup(). |
221 | | */ |
222 | | MBEDTLS_CHECK_RETURN_TYPICAL |
223 | | int mbedtls_md_clone(mbedtls_md_context_t *dst, |
224 | | const mbedtls_md_context_t *src); |
225 | | |
226 | | /** |
227 | | * \brief This function extracts the message-digest size from the |
228 | | * message-digest information structure. |
229 | | * |
230 | | * \param md_info The information structure of the message-digest algorithm |
231 | | * to use. |
232 | | * |
233 | | * \return The size of the message-digest output in Bytes. |
234 | | */ |
235 | | unsigned char mbedtls_md_get_size(const mbedtls_md_info_t *md_info); |
236 | | |
237 | | /** |
238 | | * \brief This function gives the message-digest size associated to |
239 | | * message-digest type. |
240 | | * |
241 | | * \param md_type The message-digest type. |
242 | | * |
243 | | * \return The size of the message-digest output in Bytes, |
244 | | * or 0 if the message-digest type is not known. |
245 | | */ |
246 | | inline unsigned char mbedtls_md_get_size_from_type(mbedtls_md_type_t md_type) |
247 | 0 | { |
248 | 0 | return mbedtls_md_get_size(mbedtls_md_info_from_type(md_type)); |
249 | 0 | } |
250 | | |
251 | | /** |
252 | | * \brief This function extracts the message-digest type from the |
253 | | * message-digest information structure. |
254 | | * |
255 | | * \param md_info The information structure of the message-digest algorithm |
256 | | * to use. |
257 | | * |
258 | | * \return The type of the message digest. |
259 | | */ |
260 | | mbedtls_md_type_t mbedtls_md_get_type(const mbedtls_md_info_t *md_info); |
261 | | |
262 | | /** |
263 | | * \brief This function starts a message-digest computation. |
264 | | * |
265 | | * You must call this function after setting up the context |
266 | | * with mbedtls_md_setup(), and before passing data with |
267 | | * mbedtls_md_update(). |
268 | | * |
269 | | * \param ctx The generic message-digest context. |
270 | | * |
271 | | * \return \c 0 on success. |
272 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
273 | | * failure. |
274 | | */ |
275 | | MBEDTLS_CHECK_RETURN_TYPICAL |
276 | | int mbedtls_md_starts(mbedtls_md_context_t *ctx); |
277 | | |
278 | | /** |
279 | | * \brief This function feeds an input buffer into an ongoing |
280 | | * message-digest computation. |
281 | | * |
282 | | * You must call mbedtls_md_starts() before calling this |
283 | | * function. You may call this function multiple times. |
284 | | * Afterwards, call mbedtls_md_finish(). |
285 | | * |
286 | | * \param ctx The generic message-digest context. |
287 | | * \param input The buffer holding the input data. |
288 | | * \param ilen The length of the input data. |
289 | | * |
290 | | * \return \c 0 on success. |
291 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
292 | | * failure. |
293 | | */ |
294 | | MBEDTLS_CHECK_RETURN_TYPICAL |
295 | | int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen); |
296 | | |
297 | | /** |
298 | | * \brief This function finishes the digest operation, |
299 | | * and writes the result to the output buffer. |
300 | | * |
301 | | * Call this function after a call to mbedtls_md_starts(), |
302 | | * followed by any number of calls to mbedtls_md_update(). |
303 | | * Afterwards, you may either clear the context with |
304 | | * mbedtls_md_free(), or call mbedtls_md_starts() to reuse |
305 | | * the context for another digest operation with the same |
306 | | * algorithm. |
307 | | * |
308 | | * \param ctx The generic message-digest context. |
309 | | * \param output The buffer for the generic message-digest checksum result. |
310 | | * |
311 | | * \return \c 0 on success. |
312 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
313 | | * failure. |
314 | | */ |
315 | | MBEDTLS_CHECK_RETURN_TYPICAL |
316 | | int mbedtls_md_finish(mbedtls_md_context_t *ctx, unsigned char *output); |
317 | | |
318 | | /** |
319 | | * \brief This function calculates the message-digest of a buffer, |
320 | | * with respect to a configurable message-digest algorithm |
321 | | * in a single call. |
322 | | * |
323 | | * The result is calculated as |
324 | | * Output = message_digest(input buffer). |
325 | | * |
326 | | * \param md_info The information structure of the message-digest algorithm |
327 | | * to use. |
328 | | * \param input The buffer holding the data. |
329 | | * \param ilen The length of the input data. |
330 | | * \param output The generic message-digest checksum result. |
331 | | * |
332 | | * \return \c 0 on success. |
333 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
334 | | * failure. |
335 | | */ |
336 | | MBEDTLS_CHECK_RETURN_TYPICAL |
337 | | int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, |
338 | | unsigned char *output); |
339 | | |
340 | | /** |
341 | | * \brief This function returns the list of digests supported by the |
342 | | * generic digest module. |
343 | | * |
344 | | * \note The list starts with the strongest available hashes. |
345 | | * |
346 | | * \return A statically allocated array of digests. Each element |
347 | | * in the returned list is an integer belonging to the |
348 | | * message-digest enumeration #mbedtls_md_type_t. |
349 | | * The last entry is 0. |
350 | | */ |
351 | | const int *mbedtls_md_list(void); |
352 | | |
353 | | /** |
354 | | * \brief This function returns the message-digest information |
355 | | * associated with the given digest name. |
356 | | * |
357 | | * \param md_name The name of the digest to search for. |
358 | | * |
359 | | * \return The message-digest information associated with \p md_name. |
360 | | * \return NULL if the associated message-digest information is not found. |
361 | | */ |
362 | | const mbedtls_md_info_t *mbedtls_md_info_from_string(const char *md_name); |
363 | | |
364 | | /** |
365 | | * \brief This function returns the name of the message digest for |
366 | | * the message-digest information structure given. |
367 | | * |
368 | | * \param md_info The information structure of the message-digest algorithm |
369 | | * to use. |
370 | | * |
371 | | * \return The name of the message digest. |
372 | | */ |
373 | | const char *mbedtls_md_get_name(const mbedtls_md_info_t *md_info); |
374 | | |
375 | | /** |
376 | | * \brief This function returns the message-digest information |
377 | | * from the given context. |
378 | | * |
379 | | * \param ctx The context from which to extract the information. |
380 | | * This must be initialized (or \c NULL). |
381 | | * |
382 | | * \return The message-digest information associated with \p ctx. |
383 | | * \return \c NULL if \p ctx is \c NULL. |
384 | | */ |
385 | | const mbedtls_md_info_t *mbedtls_md_info_from_ctx( |
386 | | const mbedtls_md_context_t *ctx); |
387 | | |
388 | | #if defined(MBEDTLS_FS_IO) |
389 | | /** |
390 | | * \brief This function calculates the message-digest checksum |
391 | | * result of the contents of the provided file. |
392 | | * |
393 | | * The result is calculated as |
394 | | * Output = message_digest(file contents). |
395 | | * |
396 | | * \param md_info The information structure of the message-digest algorithm |
397 | | * to use. |
398 | | * \param path The input file name. |
399 | | * \param output The generic message-digest checksum result. |
400 | | * |
401 | | * \return \c 0 on success. |
402 | | * \return #MBEDTLS_ERR_MD_FILE_IO_ERROR on an I/O error accessing |
403 | | * the file pointed by \p path. |
404 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA if \p md_info was NULL. |
405 | | */ |
406 | | MBEDTLS_CHECK_RETURN_TYPICAL |
407 | | int mbedtls_md_file(const mbedtls_md_info_t *md_info, const char *path, |
408 | | unsigned char *output); |
409 | | #endif /* MBEDTLS_FS_IO */ |
410 | | |
411 | | /** |
412 | | * \brief This function sets the HMAC key and prepares to |
413 | | * authenticate a new message. |
414 | | * |
415 | | * Call this function after mbedtls_md_setup(), to use |
416 | | * the MD context for an HMAC calculation, then call |
417 | | * mbedtls_md_hmac_update() to provide the input data, and |
418 | | * mbedtls_md_hmac_finish() to get the HMAC value. |
419 | | * |
420 | | * \param ctx The message digest context containing an embedded HMAC |
421 | | * context. |
422 | | * \param key The HMAC secret key. |
423 | | * \param keylen The length of the HMAC key in Bytes. |
424 | | * |
425 | | * \return \c 0 on success. |
426 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
427 | | * failure. |
428 | | */ |
429 | | MBEDTLS_CHECK_RETURN_TYPICAL |
430 | | int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, |
431 | | size_t keylen); |
432 | | |
433 | | /** |
434 | | * \brief This function feeds an input buffer into an ongoing HMAC |
435 | | * computation. |
436 | | * |
437 | | * Call mbedtls_md_hmac_starts() or mbedtls_md_hmac_reset() |
438 | | * before calling this function. |
439 | | * You may call this function multiple times to pass the |
440 | | * input piecewise. |
441 | | * Afterwards, call mbedtls_md_hmac_finish(). |
442 | | * |
443 | | * \param ctx The message digest context containing an embedded HMAC |
444 | | * context. |
445 | | * \param input The buffer holding the input data. |
446 | | * \param ilen The length of the input data. |
447 | | * |
448 | | * \return \c 0 on success. |
449 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
450 | | * failure. |
451 | | */ |
452 | | MBEDTLS_CHECK_RETURN_TYPICAL |
453 | | int mbedtls_md_hmac_update(mbedtls_md_context_t *ctx, const unsigned char *input, |
454 | | size_t ilen); |
455 | | |
456 | | /** |
457 | | * \brief This function finishes the HMAC operation, and writes |
458 | | * the result to the output buffer. |
459 | | * |
460 | | * Call this function after mbedtls_md_hmac_starts() and |
461 | | * mbedtls_md_hmac_update() to get the HMAC value. Afterwards |
462 | | * you may either call mbedtls_md_free() to clear the context, |
463 | | * or call mbedtls_md_hmac_reset() to reuse the context with |
464 | | * the same HMAC key. |
465 | | * |
466 | | * \param ctx The message digest context containing an embedded HMAC |
467 | | * context. |
468 | | * \param output The generic HMAC checksum result. |
469 | | * |
470 | | * \return \c 0 on success. |
471 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
472 | | * failure. |
473 | | */ |
474 | | MBEDTLS_CHECK_RETURN_TYPICAL |
475 | | int mbedtls_md_hmac_finish(mbedtls_md_context_t *ctx, unsigned char *output); |
476 | | |
477 | | /** |
478 | | * \brief This function prepares to authenticate a new message with |
479 | | * the same key as the previous HMAC operation. |
480 | | * |
481 | | * You may call this function after mbedtls_md_hmac_finish(). |
482 | | * Afterwards call mbedtls_md_hmac_update() to pass the new |
483 | | * input. |
484 | | * |
485 | | * \param ctx The message digest context containing an embedded HMAC |
486 | | * context. |
487 | | * |
488 | | * \return \c 0 on success. |
489 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
490 | | * failure. |
491 | | */ |
492 | | MBEDTLS_CHECK_RETURN_TYPICAL |
493 | | int mbedtls_md_hmac_reset(mbedtls_md_context_t *ctx); |
494 | | |
495 | | /** |
496 | | * \brief This function calculates the full generic HMAC |
497 | | * on the input buffer with the provided key. |
498 | | * |
499 | | * The function allocates the context, performs the |
500 | | * calculation, and frees the context. |
501 | | * |
502 | | * The HMAC result is calculated as |
503 | | * output = generic HMAC(hmac key, input buffer). |
504 | | * |
505 | | * \param md_info The information structure of the message-digest algorithm |
506 | | * to use. |
507 | | * \param key The HMAC secret key. |
508 | | * \param keylen The length of the HMAC secret key in Bytes. |
509 | | * \param input The buffer holding the input data. |
510 | | * \param ilen The length of the input data. |
511 | | * \param output The generic HMAC result. |
512 | | * |
513 | | * \return \c 0 on success. |
514 | | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification |
515 | | * failure. |
516 | | */ |
517 | | MBEDTLS_CHECK_RETURN_TYPICAL |
518 | | int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen, |
519 | | const unsigned char *input, size_t ilen, |
520 | | unsigned char *output); |
521 | | |
522 | | #ifdef __cplusplus |
523 | | } |
524 | | #endif |
525 | | |
526 | | #endif /* MBEDTLS_MD_H */ |