mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-03 20:54:41 +02:00
Maintenance BLAKE2
1. Remove BLAKE2 support from HMAC. 2. Update doxy header for HMAC with removal of BLAKE2 and addition of SHA-3.
This commit is contained in:
@@ -6,7 +6,8 @@
|
|||||||
|
|
||||||
\return 0 Returned on successfully initializing the Hmac object
|
\return 0 Returned on successfully initializing the Hmac object
|
||||||
\return BAD_FUNC_ARG Returned if the input type is invalid. Valid options
|
\return BAD_FUNC_ARG Returned if the input type is invalid. Valid options
|
||||||
are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384,
|
||||||
|
SHA3-512
|
||||||
\return MEMORY_E Returned if there is an error allocating memory for the
|
\return MEMORY_E Returned if there is an error allocating memory for the
|
||||||
structure to use for hashing
|
structure to use for hashing
|
||||||
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
||||||
@@ -15,7 +16,8 @@
|
|||||||
|
|
||||||
\param hmac pointer to the Hmac object to initialize
|
\param hmac pointer to the Hmac object to initialize
|
||||||
\param type type specifying which encryption method the Hmac object
|
\param type type specifying which encryption method the Hmac object
|
||||||
should use. Valid options are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
should use. Valid options are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224,
|
||||||
|
SHA3-256, SHA3-384, SHA3-512
|
||||||
\param key pointer to a buffer containing the key with which to
|
\param key pointer to a buffer containing the key with which to
|
||||||
initialize the Hmac object
|
initialize the Hmac object
|
||||||
\param length length of the key
|
\param length length of the key
|
||||||
@@ -131,14 +133,15 @@ WOLFSSL_API int wolfSSL_GetHmacMaxSize(void);
|
|||||||
|
|
||||||
\return 0 Returned upon successfully generating a key with the given inputs
|
\return 0 Returned upon successfully generating a key with the given inputs
|
||||||
\return BAD_FUNC_ARG Returned if an invalid hash type is given as
|
\return BAD_FUNC_ARG Returned if an invalid hash type is given as
|
||||||
argument. Valid types are: MD5, SHA, SHA256, SHA384, SHA512, BLAKE2B_ID
|
argument. Valid types are: MD5, SHA, SHA256, SHA384, SHA512, SHA3-224,
|
||||||
|
SHA3-256, SHA3-384, SHA3-512
|
||||||
\return MEMORY_E Returned if there is an error allocating memory
|
\return MEMORY_E Returned if there is an error allocating memory
|
||||||
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
\return HMAC_MIN_KEYLEN_E May be returned when using a FIPS implementation
|
||||||
and the key length specified is shorter than the minimum acceptable FIPS
|
and the key length specified is shorter than the minimum acceptable FIPS
|
||||||
standard
|
standard
|
||||||
|
|
||||||
\param type hash type to use for the HKDF. Valid types are: MD5, SHA,
|
\param type hash type to use for the HKDF. Valid types are: MD5, SHA,
|
||||||
SHA256, SHA384, SHA512, BLAKE2B_ID
|
SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
|
||||||
\param inKey pointer to the buffer containing the key to use for KDF
|
\param inKey pointer to the buffer containing the key to use for KDF
|
||||||
\param inKeySz length of the input key
|
\param inKeySz length of the input key
|
||||||
\param salt pointer to a buffer containing an optional salt. Use NULL
|
\param salt pointer to a buffer containing an optional salt. Use NULL
|
||||||
|
@@ -65,8 +65,7 @@
|
|||||||
{
|
{
|
||||||
if (hmac == NULL || (key == NULL && keySz != 0) ||
|
if (hmac == NULL || (key == NULL && keySz != 0) ||
|
||||||
!(type == WC_MD5 || type == WC_SHA || type == WC_SHA256 ||
|
!(type == WC_MD5 || type == WC_SHA || type == WC_SHA256 ||
|
||||||
type == WC_SHA384 || type == WC_SHA512 ||
|
type == WC_SHA384 || type == WC_SHA512)) {
|
||||||
type == BLAKE2B_ID)) {
|
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -131,8 +130,7 @@ int wc_HmacSizeByType(int type)
|
|||||||
type == WC_SHA224 || type == WC_SHA256 ||
|
type == WC_SHA224 || type == WC_SHA256 ||
|
||||||
type == WC_SHA384 || type == WC_SHA512 ||
|
type == WC_SHA384 || type == WC_SHA512 ||
|
||||||
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
||||||
type == WC_SHA3_384 || type == WC_SHA3_512 ||
|
type == WC_SHA3_384 || type == WC_SHA3_512)) {
|
||||||
type == BLAKE2B_ID)) {
|
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -172,12 +170,6 @@ int wc_HmacSizeByType(int type)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
ret = BLAKE2B_OUTBYTES;
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
ret = WC_SHA3_224_DIGEST_SIZE;
|
ret = WC_SHA3_224_DIGEST_SIZE;
|
||||||
@@ -245,12 +237,6 @@ int _InitHmac(Hmac* hmac, int type, void* heap)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
ret = wc_InitBlake2b(&hmac->hash.blake2b, BLAKE2B_256);
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
@@ -303,8 +289,7 @@ int wc_HmacSetKey(Hmac* hmac, int type, const byte* key, word32 length)
|
|||||||
type == WC_SHA224 || type == WC_SHA256 ||
|
type == WC_SHA224 || type == WC_SHA256 ||
|
||||||
type == WC_SHA384 || type == WC_SHA512 ||
|
type == WC_SHA384 || type == WC_SHA512 ||
|
||||||
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
type == WC_SHA3_224 || type == WC_SHA3_256 ||
|
||||||
type == WC_SHA3_384 || type == WC_SHA3_512 ||
|
type == WC_SHA3_384 || type == WC_SHA3_512)) {
|
||||||
type == BLAKE2B_ID)) {
|
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -457,27 +442,6 @@ int wc_HmacSetKey(Hmac* hmac, int type, const byte* key, word32 length)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
hmac_block_size = BLAKE2B_BLOCKBYTES;
|
|
||||||
if (length <= BLAKE2B_BLOCKBYTES) {
|
|
||||||
if (key != NULL) {
|
|
||||||
XMEMCPY(ip, key, length);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, key, length);
|
|
||||||
if (ret != 0)
|
|
||||||
break;
|
|
||||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, ip, BLAKE2B_256);
|
|
||||||
if (ret != 0)
|
|
||||||
break;
|
|
||||||
|
|
||||||
length = BLAKE2B_256;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
@@ -643,13 +607,6 @@ static int HmacKeyInnerHash(Hmac* hmac)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->ipad,
|
|
||||||
BLAKE2B_BLOCKBYTES);
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
@@ -760,12 +717,6 @@ int wc_HmacUpdate(Hmac* hmac, const byte* msg, word32 length)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, msg, length);
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
@@ -939,24 +890,6 @@ int wc_HmacFinal(Hmac* hmac, byte* hash)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, (byte*)hmac->innerHash,
|
|
||||||
BLAKE2B_256);
|
|
||||||
if (ret != 0)
|
|
||||||
break;
|
|
||||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->opad,
|
|
||||||
BLAKE2B_BLOCKBYTES);
|
|
||||||
if (ret != 0)
|
|
||||||
break;
|
|
||||||
ret = wc_Blake2bUpdate(&hmac->hash.blake2b, (byte*)hmac->innerHash,
|
|
||||||
BLAKE2B_256);
|
|
||||||
if (ret != 0)
|
|
||||||
break;
|
|
||||||
ret = wc_Blake2bFinal(&hmac->hash.blake2b, hash, BLAKE2B_256);
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
@@ -1136,11 +1069,6 @@ void wc_HmacFree(Hmac* hmac)
|
|||||||
break;
|
break;
|
||||||
#endif /* WOLFSSL_SHA512 */
|
#endif /* WOLFSSL_SHA512 */
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
case BLAKE2B_ID:
|
|
||||||
break;
|
|
||||||
#endif /* HAVE_BLAKE2 */
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
#ifndef WOLFSSL_NOSHA3_224
|
#ifndef WOLFSSL_NOSHA3_224
|
||||||
case WC_SHA3_224:
|
case WC_SHA3_224:
|
||||||
|
@@ -289,7 +289,6 @@ int hmac_sha224_test(void);
|
|||||||
int hmac_sha256_test(void);
|
int hmac_sha256_test(void);
|
||||||
int hmac_sha384_test(void);
|
int hmac_sha384_test(void);
|
||||||
int hmac_sha512_test(void);
|
int hmac_sha512_test(void);
|
||||||
int hmac_blake2b_test(void);
|
|
||||||
int hmac_sha3_test(void);
|
int hmac_sha3_test(void);
|
||||||
int hkdf_test(void);
|
int hkdf_test(void);
|
||||||
int x963kdf_test(void);
|
int x963kdf_test(void);
|
||||||
@@ -749,13 +748,6 @@ initDefaultName();
|
|||||||
test_pass("HMAC-SHA512 test passed!\n");
|
test_pass("HMAC-SHA512 test passed!\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
if ( (ret = hmac_blake2b_test()) != 0)
|
|
||||||
return err_sys("HMAC-BLAKE2 test failed!\n", ret);
|
|
||||||
else
|
|
||||||
test_pass("HMAC-BLAKE2 test passed!\n");
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA3) && \
|
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA3) && \
|
||||||
!defined(WOLFSSL_NOSHA3_224) && !defined(WOLFSSL_NOSHA3_256) && \
|
!defined(WOLFSSL_NOSHA3_224) && !defined(WOLFSSL_NOSHA3_256) && \
|
||||||
!defined(WOLFSSL_NOSHA3_384) && !defined(WOLFSSL_NOSHA3_512)
|
!defined(WOLFSSL_NOSHA3_384) && !defined(WOLFSSL_NOSHA3_512)
|
||||||
@@ -3684,95 +3676,6 @@ int hmac_sha256_test(void)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
#if !defined(NO_HMAC) && defined(HAVE_BLAKE2)
|
|
||||||
int hmac_blake2b_test(void)
|
|
||||||
{
|
|
||||||
Hmac hmac;
|
|
||||||
byte hash[BLAKE2B_256];
|
|
||||||
|
|
||||||
const char* keys[]=
|
|
||||||
{
|
|
||||||
"\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
|
|
||||||
"\x0b\x0b\x0b",
|
|
||||||
"Jefe",
|
|
||||||
"\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
|
|
||||||
"\xAA\xAA\xAA"
|
|
||||||
};
|
|
||||||
|
|
||||||
testVector a, b, c;
|
|
||||||
testVector test_hmac[3];
|
|
||||||
|
|
||||||
int ret;
|
|
||||||
int times = sizeof(test_hmac) / sizeof(testVector), i;
|
|
||||||
|
|
||||||
a.input = "Hi There";
|
|
||||||
a.output = "\x72\x93\x0d\xdd\xf5\xf7\xe1\x78\x38\x07\x44\x18\x0b\x3f\x51"
|
|
||||||
"\x37\x25\xb5\x82\xc2\x08\x83\x2f\x1c\x99\xfd\x03\xa0\x16\x75"
|
|
||||||
"\xac\xfd";
|
|
||||||
a.inLen = XSTRLEN(a.input);
|
|
||||||
a.outLen = BLAKE2B_256;
|
|
||||||
|
|
||||||
b.input = "what do ya want for nothing?";
|
|
||||||
b.output = "\x3d\x20\x50\x71\x05\xc0\x8c\x0c\x38\x44\x1e\xf7\xf9\xd1\x67"
|
|
||||||
"\x21\xff\x64\xf5\x94\x00\xcf\xf9\x75\x41\xda\x88\x61\x9d\x7c"
|
|
||||||
"\xda\x2b";
|
|
||||||
b.inLen = XSTRLEN(b.input);
|
|
||||||
b.outLen = BLAKE2B_256;
|
|
||||||
|
|
||||||
c.input = "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
|
||||||
"\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
|
||||||
"\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
|
|
||||||
"\xDD\xDD\xDD\xDD\xDD\xDD";
|
|
||||||
c.output = "\xda\xfe\x2a\x24\xfc\xe7\xea\x36\x34\xbe\x41\x92\xc7\x11\xa7"
|
|
||||||
"\x00\xae\x53\x9c\x11\x9c\x80\x74\x55\x22\x25\x4a\xb9\x55\xd3"
|
|
||||||
"\x0f\x87";
|
|
||||||
c.inLen = XSTRLEN(c.input);
|
|
||||||
c.outLen = BLAKE2B_256;
|
|
||||||
|
|
||||||
test_hmac[0] = a;
|
|
||||||
test_hmac[1] = b;
|
|
||||||
test_hmac[2] = c;
|
|
||||||
|
|
||||||
for (i = 0; i < times; ++i) {
|
|
||||||
#if defined(HAVE_FIPS) || defined(HAVE_CAVIUM)
|
|
||||||
if (i == 1)
|
|
||||||
continue; /* cavium can't handle short keys, fips not allowed */
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if !defined(HAVE_CAVIUM_V)
|
|
||||||
/* Blake2 only supported on Cavium Nitrox III */
|
|
||||||
if (wc_HmacInit(&hmac, HEAP_HINT, devId) != 0)
|
|
||||||
return -3600;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
ret = wc_HmacSetKey(&hmac, BLAKE2B_ID, (byte*)keys[i],
|
|
||||||
(word32)XSTRLEN(keys[i]));
|
|
||||||
if (ret != 0)
|
|
||||||
return -3601;
|
|
||||||
ret = wc_HmacUpdate(&hmac, (byte*)test_hmac[i].input,
|
|
||||||
(word32)test_hmac[i].inLen);
|
|
||||||
if (ret != 0)
|
|
||||||
return -3602;
|
|
||||||
ret = wc_HmacFinal(&hmac, hash);
|
|
||||||
if (ret != 0)
|
|
||||||
return -3603;
|
|
||||||
|
|
||||||
if (XMEMCMP(hash, test_hmac[i].output, BLAKE2B_256) != 0)
|
|
||||||
return -3604 - i;
|
|
||||||
|
|
||||||
wc_HmacFree(&hmac);
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef HAVE_FIPS
|
|
||||||
if (wc_HmacSizeByType(BLAKE2B_ID) != BLAKE2B_OUTBYTES)
|
|
||||||
return -3614;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
|
||||||
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA384)
|
#if !defined(NO_HMAC) && defined(WOLFSSL_SHA384)
|
||||||
int hmac_sha384_test(void)
|
int hmac_sha384_test(void)
|
||||||
{
|
{
|
||||||
|
@@ -84,12 +84,6 @@ enum {
|
|||||||
#ifndef WOLFSSL_SHA384
|
#ifndef WOLFSSL_SHA384
|
||||||
WC_SHA384 = WC_HASH_TYPE_SHA384,
|
WC_SHA384 = WC_HASH_TYPE_SHA384,
|
||||||
#endif
|
#endif
|
||||||
#ifndef HAVE_BLAKE2B
|
|
||||||
BLAKE2B_ID = WC_HASH_TYPE_BLAKE2B,
|
|
||||||
#endif
|
|
||||||
#ifndef HAVE_BLAKE2S
|
|
||||||
BLAKE2S_ID = WC_HASH_TYPE_BLAKE2S,
|
|
||||||
#endif
|
|
||||||
#ifndef WOLFSSL_SHA224
|
#ifndef WOLFSSL_SHA224
|
||||||
WC_SHA224 = WC_HASH_TYPE_SHA224,
|
WC_SHA224 = WC_HASH_TYPE_SHA224,
|
||||||
#endif
|
#endif
|
||||||
@@ -107,9 +101,9 @@ enum {
|
|||||||
/* Select the largest available hash for the buffer size. */
|
/* Select the largest available hash for the buffer size. */
|
||||||
#define WC_HMAC_BLOCK_SIZE WC_MAX_BLOCK_SIZE
|
#define WC_HMAC_BLOCK_SIZE WC_MAX_BLOCK_SIZE
|
||||||
|
|
||||||
#if !defined(WOLFSSL_SHA3) && !defined(WOLFSSL_SHA512) && !defined(HAVE_BLAKE2) && \
|
#if !defined(WOLFSSL_SHA3) && !defined(WOLFSSL_SHA512) && \
|
||||||
!defined(WOLFSSL_SHA384) && defined(NO_SHA256) && defined(WOLFSSL_SHA224) && \
|
!defined(WOLFSSL_SHA384) && defined(NO_SHA256) && \
|
||||||
defined(NO_SHA) && defined(NO_MD5)
|
defined(WOLFSSL_SHA224) && defined(NO_SHA) && defined(NO_MD5)
|
||||||
#error "You have to have some kind of hash if you want to use HMAC."
|
#error "You have to have some kind of hash if you want to use HMAC."
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -134,9 +128,6 @@ typedef union {
|
|||||||
#ifdef WOLFSSL_SHA512
|
#ifdef WOLFSSL_SHA512
|
||||||
wc_Sha512 sha512;
|
wc_Sha512 sha512;
|
||||||
#endif
|
#endif
|
||||||
#ifdef HAVE_BLAKE2
|
|
||||||
Blake2b blake2b;
|
|
||||||
#endif
|
|
||||||
#ifdef WOLFSSL_SHA3
|
#ifdef WOLFSSL_SHA3
|
||||||
wc_Sha3 sha3;
|
wc_Sha3 sha3;
|
||||||
#endif
|
#endif
|
||||||
|
Reference in New Issue
Block a user