|
8 | 8 | #include "pico.h"
|
9 | 9 | #include "pico/rand.h"
|
10 | 10 | #include "mbedtls/sha256.h"
|
| 11 | +#include "mbedtls/version.h" |
| 12 | + |
| 13 | +#if MBEDTLS_VERSION_MAJOR < 3 |
| 14 | +#define mbedtls_sha256_starts mbedtls_sha256_starts_ret |
| 15 | +#define mbedtls_sha256_update mbedtls_sha256_update_ret |
| 16 | +#define mbedtls_sha256_finish mbedtls_sha256_finish_ret |
| 17 | +#endif |
11 | 18 |
|
12 | 19 | /* Function to feed mbedtls entropy. */
|
13 | 20 | int mbedtls_hardware_poll(void *data __unused, unsigned char *output, size_t len, size_t *olen) {
|
@@ -38,17 +45,17 @@ void mbedtls_sha256_free(__unused mbedtls_sha256_context *ctx) {
|
38 | 45 | pico_sha256_cleanup(ctx);
|
39 | 46 | }
|
40 | 47 |
|
41 |
| -int mbedtls_sha256_starts_ret(mbedtls_sha256_context *ctx, int is224) { |
| 48 | +int mbedtls_sha256_starts(mbedtls_sha256_context *ctx, int is224) { |
42 | 49 | hard_assert(!is224); // that's annoying
|
43 | 50 | return pico_sha256_start_blocking(ctx, SHA256_BIG_ENDIAN, PICO_MBEDTLS_SHA256_ALT_USE_DMA);
|
44 | 51 | }
|
45 | 52 |
|
46 |
| -int mbedtls_sha256_update_ret(mbedtls_sha256_context *ctx, const unsigned char *input, size_t ilen) { |
| 53 | +int mbedtls_sha256_update(mbedtls_sha256_context *ctx, const unsigned char *input, size_t ilen) { |
47 | 54 | pico_sha256_update_blocking(ctx, input, ilen);
|
48 | 55 | return 0;
|
49 | 56 | }
|
50 | 57 |
|
51 |
| -int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx, unsigned char output[32]) { |
| 58 | +int mbedtls_sha256_finish( mbedtls_sha256_context *ctx, unsigned char output[32]) { |
52 | 59 | sha256_result_t result;
|
53 | 60 | pico_sha256_finish(ctx, &result);
|
54 | 61 | memcpy(output, result.bytes, 32);
|
|
0 commit comments