pub unsafe extern "C" fn ocrypto_hmac_sha1(
r: *mut u8,
key: *const u8,
key_len: usize,
in_: *const u8,
in_len: usize,
)Expand description
HMAC-SHA1 algorithm.
The input message * in - is authenticated using the key * key - . The computed
authenticator is put into * r - . To verify the authenticator, the recipient
needs to recompute the HMAC authenticator and can then compare it with the
received authenticator.
r- HMAC output.key- HMAC key.key_len- Length of *key- .in- Input data.in_len- Length of *in- .