|
8 | 8 | #include "pico.h" |
9 | 9 | #include "pico/rand.h" |
10 | 10 | #include "mbedtls/sha256.h" |
| 11 | +#include "mbedtls/version.h" |
| 12 | + |
| 13 | +#if MBEDTLS_VERSION_MAJOR < 3 |
| 14 | +#define mbedtls_sha256_starts mbedtls_sha256_starts_ret |
| 15 | +#define mbedtls_sha256_update mbedtls_sha256_update_ret |
| 16 | +#define mbedtls_sha256_finish mbedtls_sha256_finish_ret |
| 17 | +#endif |
11 | 18 |
|
12 | 19 | /* Function to feed mbedtls entropy. */ |
13 | 20 | int mbedtls_hardware_poll(void *data __unused, unsigned char *output, size_t len, size_t *olen) { |
@@ -38,17 +45,17 @@ void mbedtls_sha256_free(__unused mbedtls_sha256_context *ctx) { |
38 | 45 | pico_sha256_cleanup(ctx); |
39 | 46 | } |
40 | 47 |
|
41 | | -int mbedtls_sha256_starts_ret(mbedtls_sha256_context *ctx, int is224) { |
| 48 | +int mbedtls_sha256_starts(mbedtls_sha256_context *ctx, int is224) { |
42 | 49 | hard_assert(!is224); // that's annoying |
43 | 50 | return pico_sha256_start_blocking(ctx, SHA256_BIG_ENDIAN, PICO_MBEDTLS_SHA256_ALT_USE_DMA); |
44 | 51 | } |
45 | 52 |
|
46 | | -int mbedtls_sha256_update_ret(mbedtls_sha256_context *ctx, const unsigned char *input, size_t ilen) { |
| 53 | +int mbedtls_sha256_update(mbedtls_sha256_context *ctx, const unsigned char *input, size_t ilen) { |
47 | 54 | pico_sha256_update_blocking(ctx, input, ilen); |
48 | 55 | return 0; |
49 | 56 | } |
50 | 57 |
|
51 | | -int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx, unsigned char output[32]) { |
| 58 | +int mbedtls_sha256_finish( mbedtls_sha256_context *ctx, unsigned char output[32]) { |
52 | 59 | sha256_result_t result; |
53 | 60 | pico_sha256_finish(ctx, &result); |
54 | 61 | memcpy(output, result.bytes, 32); |
|
0 commit comments