pub unsafe extern "C" fn ocrypto_hmac_sha256(
r: *mut u8,
key: *const u8,
key_len: usize,
in_: *const u8,
in_len: usize,
)Expand description
HMAC-SHA256 algorithm.
The input message * in - is authenticated using the key * key - . The computed
authenticator is put into * r - . To verify the authenticator, the recipient
needs to recompute the HMAC authenticator and can then compare it with the
received authenticator.
r- HMAC output.key- HMAC key.key_len- Length of *key- .in- Input data.in_len- Length of *in- .