11a1589223
Files which are installed as-is (any .service and other unit files, .conf files, .policy files, etc), are left as is. My assumption is that SPDX identifiers are not yet that well known, so it's better to retain the extended header to avoid any doubt. I also kept any copyright lines. We can probably remove them, but it'd nice to obtain explicit acks from all involved authors before doing that.
44 lines
1.4 KiB
C
44 lines
1.4 KiB
C
/* SPDX-License-Identifier: LGPL-2.1+ */
|
|
#pragma once
|
|
|
|
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2016 Lennart Poettering
|
|
***/
|
|
|
|
#include <inttypes.h>
|
|
#include <sys/types.h>
|
|
#include <sys/uio.h>
|
|
|
|
#include "macro.h"
|
|
|
|
typedef struct khash khash;
|
|
|
|
int khash_supported(void);
|
|
|
|
/* For plain hash functions. Hash functions commonly supported on today's kernels are: crc32c, crct10dif, crc32,
|
|
* sha224, sha256, sha512, sha384, sha1, md5, md4, sha3-224, sha3-256, sha3-384, sha3-512, and more. */
|
|
int khash_new(khash **ret, const char *algorithm);
|
|
|
|
/* For keyed hash functions. Hash functions commonly supported on today's kernels are: hmac(sha256), cmac(aes),
|
|
* cmac(des3_ede), hmac(sha3-512), hmac(sha3-384), hmac(sha3-256), hmac(sha3-224), hmac(rmd160), hmac(rmd128),
|
|
* hmac(sha224), hmac(sha512), hmac(sha384), hmac(sha1), hmac(md5), and more. */
|
|
int khash_new_with_key(khash **ret, const char *algorithm, const void *key, size_t key_size);
|
|
|
|
int khash_dup(khash *h, khash **ret);
|
|
khash* khash_unref(khash *h);
|
|
|
|
const char *khash_get_algorithm(khash *h);
|
|
size_t khash_get_size(khash *h);
|
|
|
|
int khash_reset(khash *h);
|
|
|
|
int khash_put(khash *h, const void *buffer, size_t size);
|
|
int khash_put_iovec(khash *h, const struct iovec *iovec, size_t n);
|
|
|
|
int khash_digest_data(khash *h, const void **ret);
|
|
int khash_digest_string(khash *h, char **ret);
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(khash*, khash_unref);
|